Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Clandestine Communications in Cyber-Denied Environments : Numbers stations and radio in the 21st century

Ingesson, Tony LU orcid and Andersson, Magnus LU (2023) In Journal of Policing, Intelligence and Counter Terrorism
Abstract
Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be... (More)
Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment. Drawing on case studies from the Cold War, contemporary observations of clandestine radio networks in use today, and technical tests carried out by the authors, this paper stresses the importance for counterintelligence and law enforcement to be prepared for a potential shift in how clandestine communications are implemented by both hostile intelligence services and organized crime. Finally, the paper addresses the issue of proactively countering these techniques by presenting concrete methods for use by counterintelligence and law enforcement to detect radio-based clandestine communications and secure evidence. (Less)
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Contribution to journal
publication status
epub
subject
keywords
criminal intelligence, counterintelligence, numbers stations, clandestine communications, radio
in
Journal of Policing, Intelligence and Counter Terrorism
publisher
Taylor & Francis
external identifiers
  • scopus:85159338432
ISSN
1833-5330
DOI
10.1080/18335330.2023.2209578
project
Clandestine Communications: Old Technologies, New Opportunities
language
English
LU publication?
yes
id
c9a99bf4-2bfa-44ed-924c-918a402f3f1a
date added to LUP
2023-04-28 09:36:26
date last changed
2023-08-24 13:56:39
@article{c9a99bf4-2bfa-44ed-924c-918a402f3f1a,
  abstract     = {{Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment. Drawing on case studies from the Cold War, contemporary observations of clandestine radio networks in use today, and technical tests carried out by the authors, this paper stresses the importance for counterintelligence and law enforcement to be prepared for a potential shift in how clandestine communications are implemented by both hostile intelligence services and organized crime. Finally, the paper addresses the issue of proactively countering these techniques by presenting concrete methods for use by counterintelligence and law enforcement to detect radio-based clandestine communications and secure evidence.}},
  author       = {{Ingesson, Tony and Andersson, Magnus}},
  issn         = {{1833-5330}},
  keywords     = {{criminal intelligence; counterintelligence; numbers stations; clandestine communications; radio}},
  language     = {{eng}},
  month        = {{05}},
  publisher    = {{Taylor & Francis}},
  series       = {{Journal of Policing, Intelligence and Counter Terrorism}},
  title        = {{Clandestine Communications in Cyber-Denied Environments : Numbers stations and radio in the 21st century}},
  url          = {{http://dx.doi.org/10.1080/18335330.2023.2209578}},
  doi          = {{10.1080/18335330.2023.2209578}},
  year         = {{2023}},
}