HUMINT-Human Intelligence Research Papers - Academia.edu (original) (raw)

2025

Israel Attacks and Targeting Intelligence, "Where is Daddy?"

2025, Szakmai Szemle

„IN SPARED STATE” THE ACTIVIES AND THE SAFETY SITUATION OF THE HUNGARIAN INTELLIGENCE RESIDENCY IN THE EARLY 1980s. At the 1977 meeting of Foreign Ministers in London, both Frigyes Puja and David Owen described the relationship... more

2025, Independent Türkçe

Israel, which aims to create a homogeneous country of Jews and to establish a perimeter around it, has also achieved this at sea. The Israeli Navy, acting with the slogan of “safe coasts, open seas”, has created a Sea Defense Wall on its... more

Israel, which aims to create a homogeneous country of Jews and to establish a perimeter around it, has also achieved this at sea.
The Israeli Navy, acting with the slogan of “safe coasts, open seas”, has created a Sea Defense Wall on its coasts, including the blockaded Gaza Strip.
Since its establishment, Israel has been trying to realize this sea wall with naval vessels and has been trying to reinforce it physically by establishing artificial islands off its coasts.
Israel, which has the most powerful navy in the Eastern Mediterranean and has the ability to wage war and conflict far beyond its shores, is trying to monitor the Eastern Mediterranean and the Sea of Islands (Aegean) by establishing air defense systems in Cyprus and Greece, which it will produce and control.
Thus, it aims to create acceptable states in the region by neutralizing neighboring states in the sea direction.

2025, Security Intelligence

Abstract: This research investigates the "Deep State Network," a theorized web of unelected insiders wielding covert influence within and beyond formal governance structures. Focusing on its role in clandestine operations, the study... more

Abstract: This research investigates the "Deep State Network," a theorized web of unelected insiders wielding covert influence within and beyond formal governance structures. Focusing on its role in clandestine operations, the study dissects the network’s operational mechanisms, functional roles, and impacts on national and global security. Employing a qualitative methodology—integrating historical analysis, case studies (e.g., Watergate, Snowden leaks), and discourse analysis—the research draws on declassified documents, whistleblower accounts, and academic literature to ground its findings. The analysis reveals a sophisticated system of hierarchical and decentralized structures, secure communications, covert funding, and advanced technologies (e.g., PRISM, Stuxnet) that enable strategic policy-shaping, deniable missions, and political influence. While enhancing threat detection and geopolitical leverage, the network’s secrecy erodes public trust, civil liberties, and democratic accountability, as seen in controversies like mass surveillance and bureaucratic resistance. The study projects future trends driven by AI, cyber warfare, and public scrutiny via platforms like X, proposing stronger oversight, transparency in intelligence-sharing, and ethical technology frameworks to balance security with democracy. By unveiling the Deep State Network’s complexities, this research contributes to understanding covert power dynamics and informs policy to ensure accountability in clandestine operations.

2025

Taylor & Francis makes every effort to ensure the accuracy of all the information (the "Content") contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or... more

Taylor & Francis makes every effort to ensure the accuracy of all the information (the "Content") contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.

2025, Self-Published via Kindle Direct Publishing

This academic monograph explores the life and contributions of Igor Vepretski — a former HUMINT officer turned civic entrepreneur and communication scholar. Through ten chapters, it introduces the “Vepretski Model” for hybrid digital... more

This academic monograph explores the life and contributions of Igor Vepretski — a former HUMINT officer turned civic entrepreneur and communication scholar. Through ten chapters, it introduces the “Vepretski Model” for hybrid digital civic leadership, blending media theory, public trust, surveillance ethics, and NGO innovation. The book includes case studies, viral campaign analysis, and interdisciplinary research across media, security, and society.

2025, The International Journal of Intelligence, Security, and Public Affairs

Within a generation, intelligence studies have established themselves in continental Europe. Research infrastructure has been created with journals and conferences. The article explores how a European School of Intelligence Studies (ESIS)... more

Within a generation, intelligence studies have established themselves in continental Europe. Research infrastructure has been created with journals and conferences. The article explores how a European School of Intelligence Studies (ESIS) differs from the traditional British and American research and which scholars constitute ESIS. This work also presents new methodical proposals (e.g. using a quantitative method for selecting material from the existing empirical data sets), following the requirement that intelligence studies should have an interdisciplinary nature. Our argumentation is based on an analysis of the two main conferences, the conference of the International Intelligence History Association (IIHA) and the Need to Know-format (NtK), and it defines the content of the ESIS based on state of the art. European researchers participating in these fora were primary from Germany, Benelux, the Nordic states, and Central-and Eastern Europe. ESIS shows European West-East unity and strong ties to British, American and Israeli research, it also indicates a North-South divide. The Archival Revolution has been defining for the development of the ESIS. The access to documents regarding all areas of intelligence activity, including operational records and personal files of agents, differs from traditional declassification. This way, it is possible in Europe to do empirical research on intelligence operations in a hitherto unseen scale. Furthermore, the ESIS is characterized by substantial interest to counterintelligence and awareness of the differences between intelligence in democracies and authoritarian regimes.

2025

The prevalence of the smart phones, the large market share of android and the openness of the android market make android more sensitive platform for malware attacks. For understanding the threat to security and privacy it is important to... more

The prevalence of the smart phones, the large market share of android and the openness of the android market make android more sensitive platform for malware attacks. For understanding the threat to security and privacy it is important to analyze the behavior of the malicious application. For a forensic point of view an analyst need to understand the behavior of the application to find out the suspicious application In this paper, we are focusing on a different type of android malware analysis techniques: static analysis, dynamic analysis and hybrid analysis (combination of static and dynamic analysis). This paper also presence different methods of these analyses along with their functionality and working.Comparisons of these analyses have been done along with their advantages and disadvantages.

2025, Military Intelligence Professional Bulletin

2025, Polymatheia

As the Soviet army launched its final offensive to suppress the revolution on 4 November 1956, nearly 200,000 people fled the country in the following months. By August 1957, 21,224 Hungarian citizens had arrived in Great Britain, of... more

As the Soviet army launched its final offensive to suppress the
revolution on 4 November 1956, nearly 200,000 people fled the country
in the following months. By August 1957, 21,224 Hungarian citizens
had arrived in Great Britain, of whom 15,000 remained in the United
Kingdom long-term. Following the reorganization of state security, the
Ministry of the Interior (BM) II/3. (Intelligence) Department devoted
considerable energy from the very first moment to mapping and disrupting
the new emigration, which they attempted to achieve by activating,
in addition to the agents newly deployed from the spring of 1957, old
network individuals who had gone abroad. Former military officer Attila
Dénes Boronkay represented the latter category in England, whose reemployment in service would have been of particular importance from
an intelligence perspective due to his technical education and field of
expertise. However, the competent bodies of the Hungarian People’s
Republic (MNK) did not expect that MI5 (Military Intelligence Section
5 D Branch - the counterintelligence branch of the British security
service) would put these efforts under control thanks to the Double Cross
method - a double agent game developed during World War II

2025, American Intelligence Journal

This paper examines the positioning of counterintelligence (CI) as a supported J3 fires function rather than an organic J2 supporting intelligence function. According to the DoD, counterintelligence includes ‘All activities to protect... more

This paper examines the positioning of counterintelligence (CI) as a supported J3 fires function rather than an organic J2 supporting intelligence function. According to the DoD, counterintelligence includes ‘All activities to protect against espionage, other intelligence activities, sabotage, or assassinations for or on behalf of foreign powers, organizations, or persons, but not including military or naval intelligence.’ Traditionally, CI is viewed as an intelligence discipline as it has been classified under J2, but primarily because its activities are more supportive in nature. It plays only secondary roles to other disciplines in the intelligence function. Nonetheless, because of the proactive nature of CI activities and given its dynamic pursuits, it may be better positioned under J3 as a fires function where it can have direct operational support in combat and strategic environments. This operational realignment allows CI to operate offensively and defensively in multiple domains, utilizing several different disciplines that include cyber operations, security, open-source intelligence (OSINT), special operations, and other foreign intelligence disciplines. The purpose of this paper is to outline the strategic benefits of this repositioning and to provide a case for how the integration of these diverse disciplines can successfully contribute towards CI goals as identified by the DoD. The potential of increased operational effectiveness and strategic advantage of aligning CI as a fires function will be examined. This paper will provide an analysis of the rationale for the shift by citing real-world case studies from the US Army and other military services.

2024, Journal of Cold War Studies

The 1969 edition of a document known as the “KGB Wanted List” was smuggled to the West in 1972 by a Soviet State Security Committee (KGB) officer who defected. The KGB periodically compiled the list to target people around the world whom... more

The 1969 edition of a document known as the “KGB Wanted List” was smuggled to the West in 1972 by a Soviet State Security Committee (KGB) officer who defected. The KGB periodically compiled the list to target people around the world whom the Soviet government accused of violating Soviet law, especially through defection. More than four decades after the 1969 list became available in the West, the Security Service of Ukraine—the main counterintelligence agency in independent Ukraine—declassified a later edition of the KGB list, dated 1979. This article compares these two editions of the list, analyzing the individuals included (and excluded) in each, the judicial sentences passed against subjects, and the KGB organizations responsible for handling their cases. The article shows that the Soviet view of defectors evolved throughout the Cold War and that the KGB was far from omnipotent even on Soviet territory. It further shows that post-Soviet Russia's pursuit of defectors bears many similarities to practices of the Soviet era, with equivalents of the KGB Wanted List reported in Russia today.

2024

Civil Society Organizations (CSOs) otherwise known as the "third sector" have become gargantuan tools for societal peace, progress and stability. Through collaborations and alliances, they are able to intervene in resolving critical... more

Civil Society Organizations (CSOs) otherwise known as the "third sector" have become gargantuan tools for societal peace, progress and stability. Through collaborations and alliances, they are able to intervene in resolving critical problems affecting a given community especially where government's hand could not have reached. One of the areas where Civil Society takes a bold step in modern society is fighting terrorism. They help in eradicating the menace of terrorism through awareness, damnation, motivation, appraise, rehabilitation, partnership, indoctrination and co-ordinational approaches. Thus, the objective of this paper is to adopt functional approach to critically compare the roles of CSOs in fighting terrorism between Nigeria and Tunisia. The article place more emphasis on content analysis to tests the hypothesis that a country with vibrant CSOs is more likely to eradicate terrorism than the one that has not. The article also responds to question that: how effective are the CSOs' anti-terrorism policies in the two countries? This research found out that even though Tunisia has more coordinated CSOs than Nigeria, the roles of the CSOs in both countries is not significant enough to help in getting rid of terrorism. So, there is need of more practical approach such as mediation, espionage or infiltration which this research recommends to the global Civil Societies.

2024, Szakmai Szemle

Shortly after the oppression of the Hungarian Revolt of 1956 approximately 21000 refugees arrived in Great-Britain among whom, according to the contemporary evaluation of the Home Office, a large number of the State Protection Authority’s... more

Shortly after the oppression of the Hungarian Revolt of 1956 approximately 21000 refugees arrived in Great-Britain among whom, according to the contemporary evaluation of the Home Office, a large number of the State Protection Authority’s agents would appear. In practice this meant that many of the former members of the state security’s internal network of informants also defected to the west, p.e. István Vörös who was Transylvanian origin. The webster having previously been incarcerated for war crimes started to approach the Legation of the Hungarian People’s Republic with the intent to repatriate from the beginning of 1957 while emphasizing that he deemed his intelligence assignment dated back to 1952. However, it soon turned out that the British police had already known his past, thus compelled him to cooperate. Unfortunately, the other side has not made the agent's file available, but it seems that Vörös was compelled memorize an unlikely scheme that he was parroting for two years in order to distract the London Residency of the Hungarian Intelligence Service from the more valuable recruits.

2024, Yale JL & Tech.

As the 110 th Congress begins to flex its atrophied oversight muscle 1 it bears reminding in the ongoing debate over who should have the authority to authorize and oversight foreign intelligence surveillance programs, 2 that someone must,... more

As the 110 th Congress begins to flex its atrophied oversight muscle 1 it bears reminding in the ongoing debate over who should have the authority to authorize and oversight foreign intelligence surveillance programs, 2 that someone must, 3 and the existing mechanisms, *

2024, Mesismerni a megismerhetetlent. Tanulmányok Baráth Magdolna tiszteletére

After the opression of the Hungarian Revolt of 1956 more than 20.000 people had immigrated to Britain among whom approximately 1500 returned to the fatherland. This essay tells the story of a former university student in journalism who... more

After the opression of the Hungarian Revolt of 1956 more than 20.000 people had immigrated to Britain among whom approximately 1500 returned to the fatherland. This essay tells the story of a former university student in journalism who did not find his place abroad being critical about capitalism and came home but could not identify with the existing state socialism either . His decision was not met with appreciation since the ruling party did not authorize him to work in the press.

2024, Law and Business Review of the Americas

2024, Journal of Scientific Reports-A

With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently... more

With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently in use for communication, social networking, banking, and payment transactions and become an important part of developing technology. Although the Android operating system is among the most popular operating systems, one of the biggest challenges faced by android users and developers is to ensure the security of the operating system. In this research, the security mechanism was examined with the android operating system architecture, and the exploitation of android vulnerabilities scenarios was created. These scenarios were carried out on various examples using the Smart Pentester Framework (SPF) tool. Also, by examining the sources in the literature, exploitations of android vulnerabilities are classified into categories. Based on the created classification and the exploitation methods scenarios taking place in the virtual environment built on Kali Linux, it is aimed to raise awareness of android operating system users and developers against possible risks.

2024, VII. International Scientific Research Conference June 29-30, 2024, Istanbul, Türkiye Conference Book/VII.-ULUSLARARASI-BILIMSEL-ARASTIRMALAR-KONGRE-KITABI

Abstract: This research suggests that the changes and developments experienced today are at the forefront of military intelligence in the world. In this context, the security perception that states will not be safe without military... more

2024

Review of Invisible Agents: Women & Espionage in Seventeenth Century Britain by Nadine Akkerman

2024, Polymatheia

Shortly after the ’Hungarian Question’ had been taken off of the agenda of the United Nations in 1963, certain members of the Hungarian émigré community, especially those who had departed in the late 1940s endeavoured to visit their... more

Shortly after the ’Hungarian Question’ had been taken off of the
agenda of the United Nations in 1963, certain members of the Hungarian
émigré community, especially those who had departed in the late 1940s
endeavoured to visit their relatives still living in the motherland. One
of them was grammar school teacher Endre Gyuranyi who was taking
refuge in Australia following his short detainment by the State Protection
Authority in 1949. The London Residency of the III/I. Directorate
of the Ministry of the Interior contemplated his recruitment based on
the certain degree of understanding he displayed toward the Kadar
regime. However, Gyuranyi insisted on the democratic principles he had
internalised during the liquidated democratic attempt of 1945–1947.

2024

Miután 1963-ban a legfontosabb nyugati-európai országok többsége nagyköveti szintre emelte a diplomáciai viszonyt a Magyar Népköztársasággal (MNK), Radványi János washingtoni ügyvivő arra a (lehetetlen) feladatra vállalkozott, hogy... more

Miután 1963-ban a legfontosabb nyugati-európai országok többsége nagyköveti szintre emelte a diplomáciai viszonyt a Magyar Népköztársasággal (MNK), Radványi János washingtoni ügyvivő arra a (lehetetlen) feladatra vállalkozott, hogy egyidejűleg közvetítsen a vietnámi háború hadviselő felei között és érje el a magyar-amerikai kapcsolatok helyrehozatalát. Céljai elérésében számított az államszocializmus iránt valamelyest megértő / kevésbé ellenséges amerikai újságírók fiatal generációjára, amelyet pl. Bernard Gwertzman képviselt. Ám amint kiderült, hogy Péter János külügyminiszter rendezési tervét Ho Si Minh egyáltalán nem támogatja, az ügyvivő kiábrándult az államszocialista rendszerből, és átállt az Egyesült Államokhoz. Ez pedig akár azt is jelenthette, hogy a legfontosabb sajtókapcsolat felhasználása időközben más irányt vett…

2024, Wilson Center Blog

The object of this project is the establishment of two reception and training centers, one within the continental limits of the United States and a second in a more forward area (possibly Alaska or the Aleutians) for the reception... more

The object of this project is the establishment of two reception and training centers, one within the continental limits of the United States and a second in a more forward area (possibly Alaska or the Aleutians) for the reception training and forward movement of selected Russian agents to be employed in Far Eastern operations presumably Eastern and Northern Siberia.

2024, Colombian Army Military Intelligence: a successful model living in the past

Este estudio se propone analizar el sistema de inteligencia humana del Ejército Colombiano para identificar sus principales debilidades y fortalezas. Con el fin de ofrecer una explicación clara de ambos aspectos, se proponen diversas... more

Este estudio se propone analizar el sistema de inteligencia humana del Ejército Colombiano para identificar sus principales debilidades y fortalezas. Con el fin de ofrecer una explicación clara de ambos aspectos, se proponen diversas recomendaciones para mejorar las actividades de recolección y así mitigar tanto las amenazas convencionales como las no convencionales.

2024

I confirm that the above-submitted paper is my own work, under the instruction of my supervisor, and all references/sources are duly acknowledged. All individuals and groups who have made their contributions to the research of my paper... more

I confirm that the above-submitted paper is my own work, under the instruction of my supervisor, and all references/sources are duly acknowledged. All individuals and groups who have made their contributions to the research of my paper have been clearly acknowledged and noted. I am the person subject to any legal responsibilities if there is any dishonest data in my degree paper. Author (signature):______________________ Supervisor (signature): __________________ _____(year)_____(month)_____(day) AUTHORIZATION LETTER I, the undersigned, fully understand concerned regulations of NDU to protect the intellectual rights, which are, the owner of intellectual rights of the master degree paper is the National Defense University. I agree that the NDU may preserve hard copies and e-copies of my degree paper, allowing which to be read and borrowed. I authorize that College of Defense Studies, NDU may publish part or whole of my degree paper, store into a database for reference, photocopy, reproduced print, scan or use other copying means to preserve and compile my degree paper in accordance with concerned regulations.

2024

file:///Users/ludmila/Downloads/17_Stern_Woman_with_camera_2019_.pdf

2024, The Global Impacts of Russia’s Great War and Revolution, Book 2: The Wider Arc of Revolution, part 1.

2024

which pronounced unconstitutional the norm contained in Decree nº 426/XII, of the Republic's Assembly, article nº 78, nº2, which intended to allow Intelligence Services access to the so-called "metadata", as well as to tax and banking... more

which pronounced unconstitutional the norm contained in Decree nº 426/XII, of the Republic's Assembly, article nº 78, nº2, which intended to allow Intelligence Services access to the so-called "metadata", as well as to tax and banking information. It is our understanding, and we demonstrate it in our dissertation, that should be allowed the access of, not only the above mentioned information, but also the means known as communications interception and undercover operations to the Intelligence Services, as long as properly supervised and inspected.

2024, Militaergeschichtliche Zeitschrift

2024

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. R AND's publications do not necessarily reflect the opinions of its research clients and sponsors. R ® is a registered trademark.

2024, Szakmai Szemle

The majority of Hungarian refugees of 1956 had not dared to visit their relatives who had stayed behind in Hungary before the decree on the general amnesty of 1963 because they were simultaneously afraid of the retaliation of the... more

The majority of Hungarian refugees of 1956 had not dared to visit their relatives who had stayed behind in Hungary before the decree on the general amnesty of 1963 because they were simultaneously afraid of the retaliation of the Hungarian State Security and negative reaction of the counterintelligence of the western countries granting asylum for them. István Jászay taxi driver who had been living in New York
since 1956 endeavoured to spend a relatively long time in Hungary in 1962 despitethe fact that – due to his family background – he was not favoured by the party state, while his service in the State Police of Hungary that lasted to 1951 must have arisen suspicion in the eyes of the American counterintelligence. Jászay’s behaviour displayed serious contradictions: he volunteered his collaboration in the surveillance of the Hungarian Émigrés, at the same time, on the occasion of his third trip to
Budapest, he lurked around the centre of Hungarian intelligence. In the absence of an American source, we cannot prove it, but it is very likely that the FBI used the New York taxi driver as a bait to uncover the interests and methods of Hungarian state security.

2024, Intelligence and National Security

Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document. When citing, please reference the published version. Take down policy While the University of Birmingham exercises... more

Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document. When citing, please reference the published version. Take down policy While the University of Birmingham exercises care and attention in making items available there are rare occasions when an item has been uploaded in error or has been deemed to be commercially or otherwise sensitive.

2024

Smartphone have been widely used in recent years due to their functionality, thus they also become attack targets of malware. Android provides a permission category that requires each application to explicitly request permission before it... more

Smartphone have been widely used in recent years due to their functionality, thus they also become attack targets of malware. Android provides a permission category that requires each application to explicitly request permission before it can be installed to run. Permissions are silent work when it is given request by the user, means over privileged permissions action going towards malicious purpose. Reverse engineering process application is repacked with the malicious permissions. Android provides inter process communication to other application are able to leak user’s location, data and identity. To protect from malicious application it is needed to have some control mechanism to analyze application from malicious activity. This paper focuses of various permission based malware analysis method to detect malwares in android application. KeywordsAndroid Security, Permission based analysis, Android malware detection, and Mobile malware detection.

2024, SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE

Academic studies in the sphere of intelligence and counterintelligence focused predominantly on aspects of the intelligence cycle area, intelligence typology, collecting information from technical sources, axiological aspects (especially... more

Academic studies in the sphere of intelligence and counterintelligence focused predominantly on aspects of the intelligence cycle area, intelligence typology, collecting information from technical sources, axiological aspects (especially those related to the ethics connected to the process of collecting information, recruiting sources), or the feedback received from the decision-makers / beneficiaries of the finite intelligence product, but they have put less emphasis on collecting information from human sources, process and technique that have occupied and continue to occupy a central and determinant role within the domains of reference. Although the intelligence field has developed and applied scientific methods, the HUMINT approach as a discipline is found in the context of other socio-human sciences, such as history, psychology, sociology, anthropology, or communication sciences. The concerns in this regard are largely circumscribed to the applied psychology and US intelligence agencies', practices succeeding the Second World War in an attempt to support operational intelligence by delimiting sets of techniques explicitly addressing intelligence from human sources.[1]

2024, SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE

Academic studies in the sphere of intelligence and counterintelligence focused predominantly on aspects of the intelligence cycle area, intelligence typology, collecting information from technical sources, axiological aspects (especially... more

Academic studies in the sphere of intelligence and counterintelligence focused predominantly on aspects of the intelligence cycle area, intelligence typology, collecting information from technical sources, axiological aspects (especially those related to the ethics connected to the process of collecting information, recruiting sources), or the feedback received from the decision-makers / beneficiaries of the finite intelligence product, but they have put less emphasis on collecting information from human sources, process and technique that have occupied and continue to occupy a central and determinant role within the domains of reference. Although the intelligence field has developed and applied scientific methods, the HUMINT approach as a discipline is found in the context of other socio-human sciences, such as history, psychology, sociology, anthropology, or communication sciences. The concerns in this regard are largely circumscribed to the applied psychology and US intelligence agencies', practices succeeding the Second World War in an attempt to support operational intelligence by delimiting sets of techniques explicitly addressing intelligence from human sources.[1]

2024, Lecture Notes in Computer Science

The tremendous success of the mobile application paradigm is due to the ease with which new applications are uploaded by developers, distributed through the application markets (e.g. Google Play), and finally installed by the users. Yet,... more

The tremendous success of the mobile application paradigm is due to the ease with which new applications are uploaded by developers, distributed through the application markets (e.g. Google Play), and finally installed by the users. Yet, the very same model is causing serious security concerns, since users have no or little means to ascertain the trustworthiness of the applications they install on their devices. To protect their customers, Poste Italiane has defined the Mobile Application Verification Cluster (MAVERIC), a process for the systematic security analysis of third-party mobile apps that leverage the online services provided by the company (e.g. home banking, parcel tracking). We present SAM, a toolkit that supports this process by automating a number of operations including reverse engineering, privilege analysis, and automatic verification of security properties. We introduce the functionalities of SAM through a demonstration of the platform applied to real Android applications.

2024, Journal of Conflict Studies

2024

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is... more

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.

2024, Journal of Defense Resources Management

The main goal of this paper is to analyze the new theoretical concepts that provide a vision regarding the future armed conflicts, determined by the technological advance and the increased dynamics of the information flows between... more

The main goal of this paper is to analyze the new theoretical concepts that provide a vision regarding the future armed conflicts, determined by the technological advance and the increased dynamics of the information flows between different levels of authority within modern societies. The paper starts with an analysis of today's international environment (characterized by the existence of competing cultural contexts and political opinions which generate frictions, crisis and eventually military conflict), followed by a comprehensive plea regarding the necessity of changing the current military operating concepts. Finally there are presented two solutions that address the desired conceptual change, which fit the uncertainty of future conflicts: the "Army Operating Concept" developed by the US Army Training and Doctrine Command, and "Future Operating Environment 2035", developed by the UK Concepts and Doctrine Centre's (DCDC).

2024, Intelligence Studies Review

In September 2023, five Bulgarians--Orlin, Rusev, Vanya Gaberova, Ivan Stoyanov, and Bizer Dzhambazov and Katrin Ivanova as a couple--appeared in a British court charged with 'conspiring to collect information intended to be directly or... more

In September 2023, five Bulgarians--Orlin, Rusev, Vanya Gaberova, Ivan Stoyanov, and Bizer Dzhambazov and Katrin Ivanova as a couple--appeared in a British court charged with 'conspiring to collect information intended to be directly or indirectly useful to an enemy', in other words, espionage. Some have assessed that the five Bulgarians were Russian intelligence illegals similar to others arrested since Russia's invasion of Ukraine, like Mikhail Mikushin/José Assis Giammaria, who was arrested while working at the Arctic University of Norway in Tromsø, and Sergey Cherkasov/Viktor Muller Ferreira, who was refused entry into the Netherlands to start a position at the International Criminal Court. Both Mikushin and Cherkasov were affiliated with the Russian military intelligence service, the GU (formerly known as the GRU). However, several aspects of the Bulgarians' case are different and cast doubt on the assessment that they were illegals like Mikushin and Cherkasov.

2024, Critical Infrastructure Protection XII

One key factor underpinning a state's capacity to respond to policy challenges of cybersecurity is the quality of evidence supporting such decision making. As part of this process, policy advisers, essentially a diverse group including... more

One key factor underpinning a state's capacity to respond to policy challenges of cybersecurity is the quality of evidence supporting such decision making. As part of this process, policy advisers, essentially a diverse group including everyone from civil servants to elected policy makers, are asked to assess evidence from a mix of sources. Sometimes with little relevant expertise and often in time-critical scenarios, assessing threat, risk and proportionate response based on a mix of official briefings, academic sources, and industry threat reports is a challenge. The imperative of dealing with such issues in a timely fashion presents novel technical and political challenges for policy advisers. In this paper we present a model to help assess the quality of such evidence. The Evidence Quality Assessment Model (EQAM) is essentially a tool to help assess evidence fitness and credibility for use in such decision making. We illustrate the model with a sample of possible evidence sources to demonstrate how different attributes could be used for a comparison. The ultimate goal here is to help resolve potential conflicts and weigh findings and opinions systematically.

2024, Washington Institute for Near East Policy

In April, Islamic State fighters in Mali seized villages surrounding the city of Menaka, marking the group’s first territorial conquest since losing its final Syrian foothold in 2019. The human cost of these advances has been steep. By... more

2024, Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy

The recent past has shown that Android smartphones became the most popular target for malware authors. Malware families offer a variety of features that allow, among the others, to steal arbitrary data and to cause significant monetary... more

The recent past has shown that Android smartphones became the most popular target for malware authors. Malware families offer a variety of features that allow, among the others, to steal arbitrary data and to cause significant monetary losses. This circumstances led to the development of many different analysis methods that are aimed to assess the absence of potential harm or malicious behavior in mobile apps. In return, malware authors devised more sophisticated methods to write mobile malware that attempt to thwart such analyses. In this work, we briefly describe assumptions analysis tools rely on to detect malicious content and behavior. We then present results of a new obfuscation framework that aims to break such assumptions, thus modifying Android apps to avoid them being analyzed by the targeted systems. We use our framework to evaluate the robustness of static and dynamic analysis systems for Android apps against such transformations.

2024, FINS Journal of Diplomacy & Strategy

National security to sustain, there is nothing immoral in surveillance or snooping, the agencies must be empowered with all espionage capacities to do snooping in the larger national interest. The cyberelectronic (CybEL) snooping and... more

National security to sustain, there is nothing immoral in surveillance or snooping, the agencies must be empowered with all espionage capacities to do snooping in the larger national interest. The cyberelectronic (CybEL) snooping and counter-snooping capacity of all intelligence services need further strengthening so that the hybrid intent of the adversaries 'within' as well as 'operating from outside' can remain under smart surveillance-unremitting. Forthrightly, Intelligence Agencies in the country must be encouraged to snoop into all potent forces irrespective of their rank and affiliations in the larger interest of the nation-precisely the way India's great sage Chanakya has prescribed.

2024, arXiv (Cornell University)

In this paper, we present a concolic execution technique for detecting SQL injection vulnerabilities in Android apps, with a new tool we called ConsiDroid. We extend the source code of apps with mocking technique, such that the execution... more

In this paper, we present a concolic execution technique for detecting SQL injection vulnerabilities in Android apps, with a new tool we called ConsiDroid. We extend the source code of apps with mocking technique, such that the execution of original source code is not affected. The extended source code can be treated as Java applications and may be executed by SPF with concolic execution. We automatically produce a DummyMain class out of static analysis such that the essential functions are called sequentially and, the events leading to vulnerable functions are triggered. We extend SPF with taint analysis in ConsiDroid. For making taint analysis possible, we introduce a new technique of symbolic mock classes in order to ease the propagation of tainted values in the code. An SQL injection vulnerability is detected through receiving a tainted value by a vulnerable function. Besides, ConsiDroid takes advantage of static analysis to adjust SPF in order to inspect only suspicious paths. To illustrate the applicability of ConsiDroid, we have inspected randomly selected 140 apps from F-Droid repository. From these apps, we found three apps vulnerable to SQL injection. To verify their vulnerability, we analyzed the apps manually based on ConsiDroidâȂŹs reports by using Robolectric.

2024

A közösségi média szerepe a választásokban The Role of Social Media in Elections 2 Az elmúlt években világszerte felértékelődött a közösségi média szerepe a választások során. A közösségi oldalakat nem csupán a civilek és a pártok... more

A közösségi média szerepe a választásokban The Role of Social Media in Elections 2 Az elmúlt években világszerte felértékelődött a közösségi média szerepe a választások során. A közösségi oldalakat nem csupán a civilek és a pártok kampánytanácsadói használják előszeretettel, hanem gyakran idegen államok nemzetbiztonsági szolgálatai is annak érdekében, hogy egy politikai választás előtt álló nemzet döntéshozatalát számukra kedvező irányba tereljék. Jelen tanulmány a közösségi média választásokban betöltött szerepét vizsgálja, elsősorban a 2016-os brexit-népszavazás és az amerikai elnökválasztás kontextusában, tudománymetriai aspektusból.

2024, International Journal of Intelligence and Counterintelligence

The struggle against terrorism has always been an intelligence challenge-a continuing effort to detect and prevent terrorist activity at the earliest possible moment, long before the ''ticking bomb'' situation is at hand. A central issue... more

The struggle against terrorism has always been an intelligence challenge-a continuing effort to detect and prevent terrorist activity at the earliest possible moment, long before the ''ticking bomb'' situation is at hand. A central issue of prevention is acquiring intelligence from human sources, including suspected terrorists. This poses problematic questions concerning intelligence collection, specifically regarding the rules of interrogation and treatment of