JOURNAL ARTICLE

Clandestine communications in cyber-denied environments

Tony IngessonMagnus Andersson

Year: 2023 Journal:   Journal of Policing Intelligence and Counter Terrorism Vol: 19 (2)Pages: 144-165   Publisher: Taylor & Francis

Abstract

Both intelligence operatives and criminals have a constant need to be able to communicate clandestinely, circumventing surveillance efforts carried out by highly capable adversaries. The recent highly-publicized breaches of internet-based clandestine communications technology and targeted malware attacks, in combination with increasingly sophisticated methods for surveillance of internet traffic has arguably resulted in a cyber-denied environment. This paper employs a red-teaming approach to explore how clandestine communications can be structured using platforms that are physically separated from the internet and thus not vulnerable to internet-based surveillance or attacks. Recent developments in computer-based radio software can be combined with legacy radio technology to provide robust solutions for clandestine communications in a cyber-denied environment. Drawing on case studies from the Cold War, contemporary observations of clandestine radio networks in use today, and technical tests carried out by the authors, this paper stresses the importance for counterintelligence and law enforcement to be prepared for a potential shift in how clandestine communications are implemented by both hostile intelligence services and organized crime. Finally, the paper addresses the issue of proactively countering these techniques by presenting concrete methods for use by counterintelligence and law enforcement to detect radio-based clandestine communications and secure evidence.

Keywords:
Law enforcement Computer security Counterintelligence The Internet Cyberspace Internet privacy Cybercrime Espionage Law Computer science Political science World Wide Web

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
12
Refs
0.07
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.