Clandestine communications in cyber-denied environments: numbers stations and radio in the 21st century/ Tony Ingesson and Magnus Anderson
Material type: TextPublication details: 2024Subject(s): Online resources: In: The Journal of Policing, Intelligence and Counter Terrorism, Volume 19, Number 2, April 2024, page: 144-165Summary: Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment.Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | CRIMINAL INTELLIGENCE (Browse shelf(Opens below)) | Not for loan |
Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment.
CRIMINAL INTELLIGENCE, COUNTERINTELLIGENCE, NEWARTICLS
There are no comments on this title.