CONTENTS Part-I “CLASSICAL INTELLIGENCE” CHAPTER I. FUNDAMENTALS OF INTELLIGENCE (1.1.). (1.2). (1.3). (1.3.1). (1.3.2) (1.4). (1 4.l). (1.4.2). (1.5). (1.5.1). (1.6). (1.6.1). WHAT IS INTELLIGENCE WHY DO NATIONS NEED INTELLIGENCE VARIOUS LEVELS AND TYPES OF INTELLIGENCE Strategic, operational and tactical Levels Miscellaneous types of intelligence INTELLIGENCE COLLECTION DISCIPLINES Human intelligence (HUMINT) Open source intelligence (OSINT) THE INTELLIGENCE CYCLE The great significance of analysis in the production of good intelligence INTELLIGENCE IN MILITARY CONTEXT Characteristics of effective military intelligence References CHAPTER II. ESPIONAGE: THEORY, TRADECRAFT AND PRACTICE (2.1). (2.1.1). (2.1.2). (2.2). (2.2.1). (2.2.2). (2.3). (2.3.1). (2.3.2).. (2.4). (2.4.1). (2.4.2). (2.4.3). (2.4.4). (2.5). A BRIEF HISTORY OF ESPIONAGE Espionage in ancient India Espionage in the Western world and elsewhere INTELLIGENCE OBTAINED THROUGH ESPIONAGE: ADVANTAGES AND LIMITATIONS Advantages Limitations THEORY OF ESPIONAGE: WHY DO PEOPLE BECOME SPIES Motivating and causal factors Vulnerable personality profiles ESPIONAGE TRADECRAFT: COMPONENTS ANDSKILLS From talent-spotting to debriefing agents Communicating with agents Operations . Surveillance, anti-surveillance and countersurveillance ESPIONAGE IN PRACTICE: INDIAN PROBLEMS References CHAPTER III. COUNTERINTELLIGENCE: SECURITY FROM HOSTILE INTELLIGENCE ACTIVITIES (3.1). (3.1.1). (3.2). DEFINITION AND SIGNIFICANCE OF COUNTERINTELLIGENCE Various facets of counterintelligence COUNTERINTELLIGENCE IN PRACTICE (3.2.1). (3.2.2). (3.2.3). (3.3). (3.4). (3.5). (3.5.1). (3.5.2). Intricacies of CI work Offensive counterintelligence techniques (a). Basic techniques (b). Counterespionage techniques (c). Advanced techniques Defensive counterintelligence techniques PITFALLS IN COUNTERINTELLIGENCE: LESSONS DRAWN FROM ACROSS THE WORLD THE THIN LINE BETWEEN THE USE AND ABUSE OF COUNTERINTELLIGENCE COUNTERINTELLIGENCE IN MILITARY CONTEXT Roles and functions C-HUMINT, C-SIGINT and C-IMINT References CHAPTER IV. THE SOBER TRUTH ABOUT COVERT ACTION (4.1). (4.2). (4.2.1). (4.2.2). (4.2.3). (4.3). (4.4). (4.5). COVERT ACTION: AN INTRODUCTION THE MECHANICS OF COVERT ACTION Psychological actions Political actions Paramilitary actions CRITIQUE OF COVERT ACTION IN DEFENCE OF COVERT ACTION COVERT ACTION IN INDIAN CONTEXT References Part II “QUALITY CONTROL IN INTELLIGENCE” CHAPTER V. WHEN INTELLIGENCE BECOMES UNINTELLIGENT (5.1). (5.1.1). (5.1.2). (5.1.3). (5.1.4). (5.1.5). (5.1.6). (5.1.7). VARIOUS DIMENSIONS OF VACUOUSNESS IN INTELLIGENCE Sensational flights of fancy A self-supporting nexus of intelligence agencies, media, and politicians “Tailored” intelligence Deliberately propagating false notions and myths A jargonised version of speculative media reports (a). The “current events” syndrome The problem of intellectually handicapped consumers Various vays in which impoverished contents are reflected (a). Stating the obvious (b). The vague and the unverifiable (c). The art of the impossible (d). A false claim to the heart of the matter (e). The long shots (5.2). (5.2.1). (5.2.2). (5.2.3). (5.2.4). (5.2.5). (5.2.6). (5.2.7). (5.3). (5.3.1). (5.3.2). (5.3.3). (f). Simple intellectual bankruptcy SYSTEMIC DEFECTS: ISSUES IN MANAGEMENT OF INTELLIGENCE Imbalanced emphasis on different modes of intelligence collection Corroboration by default Inherent problem of intelligence collectors’ narrow vision and limited understanding Lack of consumer guidance and evaluation Biases introduced by extraneous influences Analysis: The Achilles Heel Problem of unrealistic expectations from intelligence SOME HISTORIC HOWLERS The Kargil experience Intelligence non sequitur: Some recent examples Intelligence that let us down: Some past examples References CHAPTER VI: IMPROVING THE QUALITY OF INTELLIGENCE: MANAGEMENT ISSUES AND STRATEGIES (6.1). (6.2). (6.3). (6.4). (6.5). (6.6). (6.7). IMPERATIVES OF SYSTEMIC IMPROVEMENTS DEFINING THE PROPER ROLE OF INTELLIGENCE IN THE POLICY-MAKING PROCESS OPTIMAL UTILISATION OF THE SYSTEM: EXPECTATIONS FROM THE CONSUMERS OF INTELLIGENCE RESOURCE MANAGEMENT: SETTING INTELLIGENCE PRIORITIES SPECIAL EMPHASIS ON ANALYSIS AND EVALUATION REQUISITE ORGANISATIONAL MODELS AND BEHAVIOUR INTRODUCING ACCOUNTABILITY AND OVERSIGHT References Part III “INTELLIGENCE AND TECHNOLOGY” CHAPTER VII. TECHNICAL MEANS OF INTELLIGENCE COLLECTION: A REVIEW (7.1) SPY PLANES FOR STRATEGIC INTELLIGENCE COLLECTION (7.1.1.). (7.1.2.). (7.2). (7.2.1.). (7.2.2.). (7.2.3.). (7.3). (7.3.1). (7.4). (7.5). The U-2 story Soaring higher with the SR-71 ‘Blackbird’ THE AWESOME REACH OF SPY SATELLITES Landmarks in the development of spy satellites Technological sophistication in spy satellites of the U.S.A. Russian expertise in spy satellites THE INDIAN ‘TES’ (TECHNOLOGY EXPERIMENTAL SATELLITE) AND BEYOND IRS-P5 (Cartosat) PROBLEMS ASSOCIATED WITH PRIVATE SATELLITES VULNERABILITY OF SATELLITES (7.6). (7.6.1). (7.6.2). (7.7). (7.7.1). (7.7.2). (7.7.3). (7.7.4). (7.7.5). (7.7.6). (7.8). (7.8.1). (7.8.2). (7.8.3). (7.9). (7.9.1). (7.9.2). (7.9.3). (7.9.4). (7.10). TACTICAL AND BATTLEFIELD INTELLIGENCE COLLECTION SYSTEMS State of the art systems Indian systems FERRETING SECRETS ON GROUND: MEASURES AND COUNTERMEASURES FOR TECHNICAL SURVEILLANCE Various types of bugs and wiretaps (a). Supplying power to microphones (b). Different categories of bugs Capabilities and limitations of bugs The Indian scene Wiretapping (a). Different categories of wiretaps (b). The Indian position Technical surveillance countermeasures (TSCM) (a). Warning signs of technical surveillance (b). TSCM ‘sweeps’ Covert visual observation through spy cameras VAN ECK MONITORING AND ‘TEMPEST’ Van Eck monitoring technology TEMPEST technology Indian vulnerabilities DESIRABILITY OF HAVING AN AGENCY ON THE PATTERN OF THE N. S. A. (NATIONAL SECURITY AGENCY) Importance attached to the NSA Missions of the NSA Wartime role of the NSA Lessons to be learnt by India CHEMICAL AND BIOLOGICAL RESEARCH IN SUPPORT OF INTELLIGENCE OPERATIONS References CHAPTER VII. FRONTIER DISCIPLINES OF TECHNICAL INTELLIGENCE (8.1). (8.1.1). (8.1.2). (8.1.3). (8.1.4). (8.2). (8.2.1). (8.2.2). (8.2.3). (8.3). SIGINT (SIGNALS INTELLIGENCE) Different categories of SIGrNT Some success stories and the importance of SIGINT Technology of SIGINT satellites (a). Problems in antenna design and deployment (b). Orbit considerations The long road before us: What India should do for SIGINT MASINT (MEASUREMENT AND SIGNAT INTELLIGENCE) Components of MASINT Capabilities of MASINT Examples of MASINT IMINT (IMAGERY INTELLIGENCE) (8.3.1). (8.3.2). (8.4). (8.4.1). (8.4.2). (8.4.3). Various types of IMINT Tactical IMINT operations (a). Various formats used in PHOTINT INTELLIGENCE AND ELECTRONIC WARFARE SYSTEM Electronic support measures Electronic countermeasures (a). Jamming (b). Electronic deception Electronic counter-countermeasures References CHAPTER IX: INTELLIGENCE WARFARE IN CYBERSPACE (9.1). A BRIEF HISTORY OF THE NET (9.2). MANIPULATIVE EXPLOITATION OF THE NET (9.2.1). Mischievous, criminal and other disruptive activities on the Net (9.3). WARLIKE OFFENSIVE OPERATIONS THROUGH THE INTERNET (9.3.1). The extent of damage than can be inflicted by such operations (9.4). BASIC DEFENSIVE MEASURES IN CYBER WAR (9.4.1). Fundamental principles of information protection (9.4.2). Common sources of threat and risk management (9.4.3). A typical information protection programme (9.5). ADVANCED CYBER SECURITY DEVICES (9.5.1). The question of encryption (9.5.2). The matter of firewalls, etc (9.5.3). Tracing the attacker (9.6). INDIAN PROSPECTS IN THE BATTLEFIELDS OF CYBER SPACE Notes References Part IV “VIP SECURITY” CHAPTER X: ADVANCED CONCEPTS IN SECURITY MANAGEMENT: VIP SECURITY, SUICIDE TERRORISM, AND MOVEMENT SECURITY (10.1). (10.1.1). (10.1.2). (10.1.3). (10.1.4). (10.1.5). (10.1.6). A SCIENTIFIC APPROACH TO VIP SECURITY Tactical concerns of VIP security Importance of intelligence in security management (a). Protective research Individual protective measures (a). Overcoming routine and introducing the element of surprise (b). Adopting a security mind-set and to prepare for the unexpected Enhanced residential security measures Protection in the working environment VIP motorcades: Devising a unique and functionally the most efficient plan (a). The prevailing “in tandem” plan (b). Frailties of the prevailing system (c). Introducing the “elongated diamond” formation (d). The “elongated diamond” formation in operation (e). Selecting cars and motorcycles for VIP motorcades (f). Weaponry to be carried in the VIP motocade (10.1.7). Close protection (10.1.8). Protective driving (10.1.9). Selecting the best handgun for VIP security (10.1.10). Vulnerabilities of the present system of VIP security to innovative methods of attack (10.2). SUICIDE TERRORISM: THE DESPERATE OPTION (10.2.1). Suicide operations: Historical background and definitional aspects (10.2.2). The expedience of using suicide terrorism (10.2.3). The technology of suicide terrorism and possible counters (10.3). THE VEXATIOUS PROBLEM OF MOVEMENT SECURITY (10.3.1). Classification of roads (10.3.2). Providing protection en route (10.3.3). Convoy preparation and discipline (10.3.4). Action on contact References Part-V “PHYSICAL SECURITY” CHAPTER XI . SUPERIOR TECHNIQUES IN PHYSICAL SECURITY OF VITAL INSTALLATIONS (11.1). THE CONCEPT OF INTEGRATED PROTECTIVE SYSTEMS 11.1.1). Design approach (11.2). DESIGN STRATEGIES FOR DEFENDING VITAL ASSETS AGAINST VARIOUS TYPES OF ATTACKS (11.2.1). Vehicle bombs (11.2.2). Others types of bombings (11.2.3). Attacks using stand-off weapons (11.2.4). Small arms and grenades (11.2.5). Forced-entry tactic (11.2.6). Covert-entry and insider-compromise tactics (11.2.7). Airborne or waterborne contamination (11.3). INNOVATIVE TECHNOLOGIES AND PROCEDURES IN ACCESS CONTROL, PERIMETER SECURITY AND RELATED MATTERS (11.3.1). Access control (11.3.2). Designating and establishing restricted areas (11.3.3). Movement and control of personnel in restricted areas (11.3.4). Security controls of packages, personal property, and vehicles (11.3.5). Personnel screening and identification systems (a). Multiple card exchange system (b). Mechanised/automated systems and biometric devices (11.3.6). Protective barriers (a). Some sophisticated barriers (b). Security towers (c). Perimeter roads and clear zones (11.3.7) Security lighting (11.3.8). Security forces (11.4) PROTECTION OF SENSITIVE POINTS AGAINST TERRORIST ATTACKS IN INSURGENCY-AFFECTED AREAS (11.5) A REVIEW OF ELECTRONIC SECURITY’ SYSTEMS AND THEIR ROLE IN BORDER MANAGEMENT (11.5.1.). Interior intrusion detection systems (a). Boundary-penetration sensors (b). Volumetric motion sensors (c). Point sensors (11.5.2.). Exterior intrusion detection systems (a). Fence sensors (b). Invisible perimeter sensors (11.5.3.). Scientific border management (11.6.). SPECIAL PROBLEMS ASSOCIATED WITH VIP STRUCTURES References CHAPTER XII. THE CRITICAL FIELDS OF NUCLEAR SECURITY AND AVIATION SECURITY (12.1). SECURITY ISSUES CONCERNING NUCLEAR FACILITIES (12.1.1). Physical security of labs, plants and materials (12.1.2). Screening and monitoring of personnel (12.1.3). Protection of classified information (12.1.4). Accounting for nuclear material (12.1.5). Foreign visitors (12.2). RISKS FACED BY NUCLEAR WEAPONS STATES AND THOSE POSSESSING NUCLEAR FACILITIES (12.2.1). Theft of nuclear material (12.2.2). Sale/theft of nuclear weapons (12.3). THE SPECTRE OF NUCLEAR TERRORISM (12.3.1). Attacks using heavy vehicles laden with thousands of pounds of high explosives (12.3.2). Attacks using large aircrafts (12.3.3). Can terrorists make nuclear weapons? (12.3.4). Radiation dispersal devices or the “dirty bombs” (12.4). STRENGTHENING AVIATION SECURITY (12.4.1). Pre-screening of passengers (12.4.2). Airport security management (a). Advanced security systems for passengers and hand baggage (b). Enhanced security for cargo and hold baggage (c). Plugging loopholes in security procedures and devising more stringent ones (12.4.3). (12.4.4). Anti-hijacking measures Security of the flight References EPILOGUE APPENDIX A: SECURITY AGAINST NUCLEAR, BIOLOGICAL, AND CHEMICAL (NBC) STRIKES (A.1). (A.2). (A.2.1). (A.2.2). (A.3). PROTECTION FROM NUCLEAR STRIKES DEFENCE AGAINST BIOLOGICAL WARFARE Difficulties involved in the use of biological weapons by terrorists Protective measures COPING WITH CHEMICAL WEAPONS References APPENDIX B: SOME IMPORTANT INTELLIGENCE AGENCIES OF THE WORLD (B.1). SECRET INTELLIGENCE SERVICE MI6 (B.2). SECURITY SERVICE MI5 (B.3). FOREIGN INTELLIGENCE SERVICE SLUZHBA VNESHNEY RAZVEDKI (SVR) (B.4). MOSSAD—THE INSTITUTE FOR INTELLIGENCE AND SPECIAL TASKS (HA-MOSSAD LE-MODHNULE-TAFKIDIM MEYUHADIM) (B.5). SHIN BET-GENERAL SECURITY SERVICE—SHERUT HA-BITACHON HA-KLALI (B.6). MINISTRY OF STATE SECURITY (MSS) GUOJIA ANQUAN BU (GUOANBU) References APPENDIX C: OPERATIONS SECURITY (OPSEC) References APPENDIX D: DISINFORMATION (D.I). THEORY AND PRACTICE (D.2). AMERICAN DISINFORMATION: A CASE STUDY References APPENDIX E: PSYCHOLOGICAL OPERATIONS (PSYOPS) References APPENDIX F: ECONOMIC INTELLIGENCE References