Master Thesis Master's Programme in Network Forensics, 60 Credits

Total Page:16

File Type:pdf, Size:1020Kb

Master Thesis Master's Programme in Network Forensics, 60 Credits Master Thesis Master's Programme in Network Forensics, 60 credits Blind Image Steganalytic Optimization by using Machine Learning Digital Forensics, 15 credits Halmstad 2018-08-05 Despoina Giarimpampa HALMSTAD UNIVERSITY Contact details: Despoina GIARIMPAMPA Nyhemsgatan 42 302 49 Halmstad [email protected] Ph.D Eric JÄRPE Halmstad University School of Information Technology Department of Intelligent Systems and Digital Design 301 18 Halmstad [email protected] Ph.D Stefan AXELSSON Halmstad University School of Information Technology 301 18 Halmstad [email protected] iii Abstract Since antiquity, steganography has existed in protecting sensitive informa- tion against unauthorized unveiling attempts. Nevertheless, digital media’s evolution, reveals that steganography has been used as a tool for activities such as terrorism or child pornography. Given this background, steganaly- sis arises as an antidote to steganography. Steganalysis can be divided into two main approaches: universal – also called blind – and specific. Specific methods request a previous knowledge of the steganographic technique un- der analysis. On the other hand, universal methods which can be widely practiced in a variety of algorithms, are more adaptable to real-world appli- cations. Thus, it is necessary to establish even more accurate steganalysis techniques capable of detecting the hidden information coming from the use of diverse steganographic methods. Considering this, a universal steganal- ysis method specialized in images is proposed. The method is based on the typical steganalysis process, where feature extractors and classifiers are used. The experiments were implemented on different embedding rates and for various steganographic techniques. It turns out that the proposed method succeeds for the most part, providing dignified results on color images and promising results on gray-scale images. v Acknowledgements I must first express my very profound gratitude to my thesis advisor Eric Järpe. The door to Prof. Järpe’s office was open whenever I had a question about my research or writing. Furthermore, as the second reader of this the- sis, I am gratefully indebted to him for his worthwhile comments on this thesis. I would also like to thank the colleagues who were involved in this re- search project: Mujtaba Aldebes, Mohammad Mirian and Shooresh Sufiye. Without their proper suggestions and useful advices, the study could not have been successfully conducted. Additionally, I would like to acknowledge Mohammed Abdulrazzaq who set up the University Server and provided me with the necessary hardware resources for the experiment. Finally, I would like to thank my family for providing me with support and constant fortitude throughout my years of study and through the process of researching and writing this thesis. This accomplishment would not have been possible without them. Thank you. Despoina Giarimpampa vi When you surround an army, leave an outlet free. Do not press a desperate foe too hard. Sun Tzu, The Art of War vii Contents Abstract iii Acknowledgementsv List of Figuresx List of Tables xi 1 Introduction1 1.1 Purpose of the study........................1 1.2 Motivation..............................2 1.3 Objectives..............................2 1.3.1 Main Objective.......................2 1.3.2 Specific Objectives.....................2 1.4 Methodology............................3 1.5 Significance of the study......................4 1.6 Delimitations, Limitations and Assumptions..........4 1.6.1 Assumptions........................4 1.6.2 Limitations.........................5 1.6.3 Delimitations........................5 1.7 Thesis Organization.........................5 2 Background7 2.1 Steganography...........................7 2.1.1 Characteristics of steganography.............9 2.1.2 Steganography Categorization.............. 10 2.1.3 Steganography in JPEG.................. 13 2.1.4 Applications of Steganography.............. 14 2.2 Steganalysis............................. 15 2.2.1 Steganalysis Categorization................ 15 2.2.2 Steganalytic Process.................... 18 Feature Extraction..................... 18 Classification........................ 20 2.3 Machine Learning.......................... 20 3 Related Work 23 3.1 Steganographic Algorithms.................... 23 3.1.1 The Least Significant Bit Family............. 23 LSB+............................. 24 LSB++............................ 24 viii Contents LSB Matching........................ 24 LSB Matching Revisited.................. 24 Steghide........................... 24 S-UNIWARD........................ 24 Jphide and Jpseek...................... 25 3.1.2 F5............................... 25 3.1.3 Outguess........................... 27 3.1.4 Other Steganographic Methods.............. 27 3.2 Steganalytic Algorithms...................... 30 3.2.1 Subtractive Pixel Adjacency Model............ 30 3.2.2 CC-PEV........................... 30 3.2.3 Cross Domain Features.................. 30 3.2.4 Local Binary Pattern.................... 30 3.2.5 Content-Selective Residuals................ 31 3.2.6 Other Feature Extractors.................. 31 3.3 Machine Learning in Steganalysis................. 32 3.4 Chapter Summary.......................... 34 4 Proposed Method 35 4.1 Proposed Method.......................... 35 4.2 Experimental Setup......................... 37 4.2.1 Datasets........................... 37 4.2.2 Embedding Software.................... 39 4.3 Feature Extraction.......................... 40 4.4 Classification............................. 42 4.4.1 Classifiers.......................... 42 4.4.2 Evaluation Metrics..................... 44 4.5 Chapter Summary.......................... 45 5 Results and Discussion 47 5.1 Results and Analysis........................ 47 5.2 Ethical and Social Analysis..................... 54 5.3 Chapter Summary.......................... 56 6 Conclusion 57 6.1 Contributions............................ 57 Intergation of datasets................... 57 Development of a reliable method............ 57 Reliable classification.................... 57 Avoidance of any dependence.............. 57 Evaluation.......................... 57 6.2 Discussions............................. 57 6.3 Future/Further Work........................ 58 A Matlab Code 59 B Batch File 61 ix List of Figures 1.1 Methodology............................3 2.1 Evolution in hiding methods...................9 2.2 The steganography scheme.................... 10 2.3 The principles of steganography................. 11 2.4 Classification of steganographic methods............ 12 2.5 Classification of stegosystems................... 12 2.6 JPEG Mechanism.......................... 14 2.7 The Passive Warden Scheme.................... 16 2.8 The Active Warden Scheme.................... 16 2.9 Visual based steganalysis...................... 17 2.10 Steganalysis categorization.................... 18 2.11 Steganalitic process......................... 19 2.12 Simple Model of steganography.................. 19 3.1 F5 Implementation Steps...................... 26 3.2 Interblock and Intrablock correlation............... 31 4.1 General Steps............................ 35 4.2 Method Stages............................ 36 4.3 Dresden Database.......................... 38 4.4 Bmp Database............................ 38 4.5 BOSS Database........................... 39 4.6 Steganographic Methods Used.................. 40 4.7 First-level Classification...................... 43 4.8 Second-level Classification..................... 43 5.1 Plot of Class-Spam Features.................... 47 5.2 Plot of Class-LBP Features..................... 48 5.3 Plot of Class-CSR Features..................... 48 5.4 Plot of Class-Bytes......................... 49 5.5 Plot of Class-Dimensions...................... 50 5.6 Plot of Bytes-Dimensions...................... 50 5.7 Highest Detection Rate....................... 51 5.8 Comparison between embedding rates detection of the LSB Family methods........................... 52 5.9 ROC curve for BMP images.................... 52 5.10 ROC curve for PGM images.................... 53 5.11 ROC curve for JPEG images.................... 53 5.12 PRC curve for JPEG images.................... 54 x List of Figures 5.13 PRC curve for BMP images.................... 54 xi List of Tables 4.1 Selected Steganographic Methods................. 41 5.1 Method Results............................ 51 xiii List of Abbreviations bpp bits per pixel DCT Discrete Cosine Transform HVS Human Visual System LSB Least Significant Bit SVM Support Vector Machine TP True Positive TN True Negative FN False Negative FP False Positive 1 Chapter 1 Introduction Information is power. There is an ongoing digital war leading into an esca- lated secrecy in data with regards to possession as well as to transmission. The current thesis will try to dissect the phenomenon and investigate a forensic approach on steganography, an information hiding method that steadily gains ground. Index Terms Cover media: an object that is original, without a secret message stored in it, the carrier of the hidden message Stego media: a medium in which the information is hidden, the cover image with a secret message concealed within it Embedded payload: the information which is to be hidden or concealed Training objects: data used for producing a model Image Feature: statistical representation of an image These terms will hence forth be used without further ado. 1.1 Purpose of the study Steganography is the technique of concealing particulars in data of any
Recommended publications
  • 1 ISR Asset Visibility and Collection Management Optimization Through
    ISR asset visibility and collection management optimization through knowledge models and automated reasoning Anne-Claire Boury-Brisset1, Michael A. Kolodny2, Tien Pham2 (1) Defence Research and Development (2) U.S. Army Research Laboratory Canada 2800 Powder Mill Road 2459 de la Bravoure Road Adelphi, MD 20783-1197 Quebec, QC, G3J 1X5, Canada [email protected] [email protected] [email protected] Abstract The increasing number and diversity of information sources makes ISR operations more and more challenging; this is especially true in a coalition environment. Optimizing the discovery and utility of coalition ISR assets when facing multiple requests for information, and enhancing the data to decisions process by gathering mission-relevant information to consumers will require automated tools in support of collection planning and assessment. Defence R&D Canada and the US Army Research Laboratory have related research activities in the area of ISR asset interoperability and information collection. In this paper, we present these projects and collaborative efforts to enhance ISR interoperability, through plug-and-play ISR interoperability and semantic knowledge representation of ISR concepts as well as approaches to maximize the utilization of available ISR collection assets. Keywords: Intelligence, Surveillance, Reconnaissance, information collection, sensors, UGS, standards, ontology. Published in the KSCO-2016 conference proceedings, ICCRTS-KSCO 2016 DRDC-RDDC-2016-P144 © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2016 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2016 1 1.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • Cyber-Espionage: a Growing Threat to the American Economy
    Cyber-Espionage: A Growing Threat to the American Economy Gerald O'Harat "It's the great irony of our Information Age-the very technologies that empower us to create and to build also empower those who would disrupt and destroy. "' I. INTRODUCTION The American economy is currently the world's largest and most advanced. 2 It is this status that allows the United States to remain among the most power- ful and influential countries in the world. However, the country's economy is at risk of marginalization in a way that many policymakers could not have en- visioned just a decade ago. The potential result threatens not only the economic standing of the United States in the global economy, but its national security as well. Although threats of economic and industrial espionage have long ex- isted,' the international proliferation of the Internet makes cyber economic and J.D. 2010, The Catholic University of America, Columbus School of Law. The author would like to thank Ed Schellhom and Jenny Childs for their thoughtful suggestions throughout the writing process, as well as the editors and staff of the COMMLAW CONSPEC- TUS for all of their hard work in preparing Volume 19. 1 President Barack Obama, Remarks by the President on Securing Our Nation's Cyber Infrastructure (May 29, 2009), available at http://www.whitehouse.gov/thepress-office/Remarks-by-the-President-on-Securing-Our- Nations-Cyber-Infrastructure/. 2 The World Factbook, CENT. INTELLIGENCE AGENCY, http://www.cia.gov/library/publications/the-world-factbook/geos/us.html (follow "Econ- omy" hyperlink) (last visited Jan.
    [Show full text]
  • Fm 2-22.3 (Fm 34-52)
    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
    [Show full text]
  • Chapter Ten Intelligence at Home: the Fbi, Justice, and Homeland Security
    INTELLIGENCE AT HOME CHAPTER TEN INTELLIGENCE AT HOME: THE FBI, JUSTICE, AND HOMELAND SECURITY Summary & Recommendations Combating chemical, biological, and nuclear terrorism, as well as other foreign intelligence challenges, will require intelligence assets both inside and outside the United States. As the events of September 11 demonstrated, we cannot afford a wall that divides U.S. intelligence efforts at the border. Although the FBI is making progress toward becoming a full member of the Intelligence Community, it has a long way to go, and significant hurdles still remain. In our view, the FBI has not constructed its intelligence program in a way that will promote integrated intelligence efforts, and its ambitions have led it into unnecessary new turf battles with the CIA. Meanwhile, the Department of Justice has not yet put its national security components in one office; its anti-terrorism and intelligence support offices are as scattered as they were on September 10, 2001. And the Department of Homeland Security is still following a Treasury Department order from the 1980s that requires high-level approval for virtually all information sharing and assistance to the Intelligence Community. In light of these problems we recommend that: ■ The FBI create a new National Security Service within the Bureau and under a single Executive Assistant Director. This service would include the FBI’s Counterterrorism and Counterintelligence Divisions and its Director- ate of Intelligence, and would be subject to the coordination and budget authorities
    [Show full text]
  • The Fight Against Russian “Illegal” Spies in Great Britain During the Early Cold War
    Volume 3, Issue 2: November 2020 The Fight against Russian “Illegal” Spies in Great Britain During the Early Cold War Trevor Barnes (Corpus Christi College, University of Cambridge) Introduction In September 1960 Britain’s counterintelligence service MI5 (also known as the Security Service) secretly broke into the London bank deposit box of a Canadian businessman, Gordon Lonsdale. They found a treasure trove of KGB spy paraphernalia: proof that Lonsdale was in fact a Russian deep cover “illegal” spy, whose real name was Konon Molody.1 Although Molody was the first Russian “illegal” spy MI5 uncovered in Britain during the Cold War, the Security Service had been far from complacent in the preceding years about the threat “illegals” posed and had obtained valuable information about their methods from a notorious and earlier American case. In 1957 the FBI had arrested in New York a man known as Rudolf Abel. The bureau shared valuable information about the case with the British, and the declassified Security Service files on Abel (real name William Fisher)2 provide valuable insights into the reaction of British and other Five Eyes intelligence agencies and their combat against Russian “illegals.” The arrest on January 7, 1961, of Konon Molody and two fellow KGB “illegals” in the Portland Spy Ring—Morris and Lona Cohen—was precipitated by the defection in Berlin 1 See Christopher Andrew, Defence of the Realm (London: Penguin, 2010), 485–88; Christopher Andrew and Vasili Mitrokhin, The Mitrokhin Archive: The KGB in Europe and the West (London: Penguin, 2000), 532–37; and Trevor Barnes, Dead Doubles: The Extraordinary Worldwide Hunt for One of the Cold War’s Most Notorious Spy Rings (London: Weidenfeld and Nicolson, 2020), 184–85, 219–34.
    [Show full text]
  • A Review of the FBI's Handling and Oversight of FBI Asset Katrina Leung
    U.S. Department of Justice Office of the Inspector General i • . | m ............. i A Review of the FBI's Handling and Oversight of FBI Asset Katrina Leung. (U) Unclassified Executive Summary Office of the Inspector General May 2006 EXECUTI_ SUMMARY I. Introduction In May 2000, the Federal Bureau of Investigation (FBI) receiw_d credible information that Katrina Leung, one of the FBI's most highly paid assets, was actively spying for the People's Republic of China (PRC) against the United States. 1 A year later, the FBI began an investigation that led to the discovery that Leung had been involved in an intimate romantic relationship witZh her handler of 18 years, Special Agent James ,J. Smith, who retired from the FBI in November 2000, The investigation also revealed that Leung had been involved in a sporadic affair with William Clevdand, another highly regarded FBI Special Agent, who retired from the FBI in 1993. The FBI's investigation further established that over theyears, FBI officials had lea:reed of several incidents indicating that Leung had provided classified U.S. government information to the PRC without FBI authorization. During the 18 years Leung was an asset, the FBI paid her over $1.7 million in services and expenses. In April 2003, Smith and Leung were arrested. FBI Director Robert Mueller asked the Office of the Inspector General (OIG) to reviewthe FBI's handling of Leung and the performance and management isSues relating to her case, and to recommend changes to improve FBI procedures and •practices where necessary. The OIG's investigation revealed that the FBI did little or nothing to resolve the numerous counterintelligence concerns that arose during Smith's handling of Leung.
    [Show full text]
  • Intelligence Capabilities Weapons of Mass Destruction
    The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction Report to the President of the United States March 31, 2005 CHAPTER ONE BIOLOGICAL WARFARE Biological Warfare Summary Finding The Intelligence Community seriously misjudged the status of Iraq’s biological weapons program in the 2002 NIE and other pre-war intelligence products. The primary reason for this misjudgment was the Intelligence Community’s heavy reliance on a human source—codenamed “Curveball”—whose informa- tion later proved to be unreliable. The Intelligence Community assessed with “high confidence” in the fall of 2002 that Iraq “has” biological weapons, and that “all key aspects” of Iraq’s offensive BW program “are active and that most elements are larger and more advanced than they were before the Gulf War.”219 These conclusions were based largely on the Intelligence Community’s judgment that Iraq had “trans- portable facilities for producing” BW agents.220 That assessment, in turn, was based largely on reporting from a single human source. Contrary to the Intelligence Community’s pre-war assessments, the ISG’s post-war investigations concluded that Iraq had unilaterally destroyed its bio- logical weapons stocks and probably destroyed its remaining holdings of bulk BW agent in 1991 and 1992.221 Moreover, the ISG concluded that Iraq had conducted no research on BW agents since that time, although Iraq had retained some dual-use equipment and intellectual capital.222 The ISG found no evidence of a mobile BW program.223 That Iraq was cooking up biological agents in mobile facilities designed to elude the prying eyes of international inspectors and Western intelligence ser- vices was, along with the aluminum tubes, the most important and alarming assessment in the October 2002 NIE.
    [Show full text]
  • Criminal Intelligence: Manual for Analysts
    Vienna International Centre, PO Box 500, 1400 Vienna, Austria Tel.: (+43-1) 26060-0, Fax: (+43-1) 26060-5866, www.unodc.org Criminal Intelligence Manual for Analysts United Nations publication Printed in Austria *1058435*V.10-58435—April 2011—100 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Criminal Intelligence Manual for Analysts United nations new York, 2011 © United Nations, April 2011. All rights reserved. This publication was made possible through funding received from the Government of the United States of America. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Contents 1. An introduction to intelligence . 1 2. The intelligence process . 9 3. Example of a national intelligence model: the United Kingdom . 17 4. Evaluation of source and data . 25 5. Analysis and analytical process . 29 6. Basic analysis techniques: link analysis . 35 7. Basic analysis techniques: event charting . 49 8. Basic analysis techniques: flow analysis . 53 9. Basic analysis techniques: telephone analysis . 59 10. Inference development . 65 11. Presentation of results . 71 Annex I. Sample: criminal information and intelligence guidelines . 81 Annex II. Making recommendations . 87 Annex III. Criminal Intelligence Databases . 89 iii 1. An introduction to intelligence FROM INFORMATION TO INTELLIGENCE Before we can properly discuss and explore information, intelligence and analysis in theoretical and practical terms, we need to have some common understanding as to what these terms mean.
    [Show full text]
  • Weapons of Mass Destruction Intelligence Capabilities
    The Commission on the on The Commission United States Regarding Regarding States United he Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction was established by Executive Order 13328 and signed by President George W. Bush on February 6, 2004. The Commission’s The Commission on the Ttask was twofold: first, examine the Intelligence Community’s assessments of weapons of mass destruction (WMD) programs in Iraq, Libya, and Afghanistan, and the Intelligence Intelligence Capabilities Intelligence Capabilities Intelligence Community’s current capabilities to confront the challenges posed by WMD and “related of Destruction Mass Weapons of the 21st century threats”; and second, recommend ways in which the Community could be better positioned in the future to address the problem of nuclear, biological, and chemical weapons United States and the threat they pose to the United States. In the midst of the Commission’s work, Congress passed the Intelligence Reform and Terrorism Prevention Act of 2004, and the Commission’s Regarding inquiry carefully considered the legislation and how it might serve as a framework for a stronger, Weapons of better-integrated Intelligence Community. After a year of study that included the review of thousands of documents and hundreds of interviews with knowledgeable observers from both of the Mass Destruction within and outside the Intelligence Community, the Commission presented this report to the President on March 31, 2005. Laurence H. Silberman Charles S. Robb Co-Chairman Co-Chairman Commissioners States of the United the President to Report Richard C. Levin Henry S. Rowen William O. Studeman Patricia Wald John McCain Walter B.
    [Show full text]
  • Wisdom Begins with the Definition of Terms -- Socrates
    OFFICE OF COUNTERINTELLIGENCE (DXC) DEFENSE CI & HUMINT CENTER DEFENSE INTELLIGENCE AGENCY 2 May 2011 GLOSSARY (UNCLASSIFIED) TERMS & DEFINITIONS OF INTEREST FOR DoD COUNTERINTELLIGENCE PROFESSIONALS Wisdom begins with the definition of terms -- Socrates 2X The counterintelligence and human intelligence advisor to the C/J/G/S-2. Denotes the 2X positions at all echelons. The 2X staff conducts technical control and oversight for all counterintelligence and human intelligence entities with[in] their operational purview. It coordinates, de-conflicts, and synchronizes all counterintelligence and human intelligence activities at each level of command. (Army FM 2-22.2, Counterintelligence, Oct 2009) Also see J2X. -- Also, the manager of the counterintelligence and human intelligence missions at various levels of DoD structure, including joint, command, service, and task force. The 2X structure includes the Counterintelligence Coordinating Authority (CICA) and the Human Intelligence Operations Center (HOC). (AR 381-20, Army CI Program (U), 25 May 2010) 811 Referral. See Section 811 Referral. A-Space. An abbreviation for Analytical Space. A virtual work environment that provides analyst from across the Intelligence Community a common platform to do their research and analysis and to easily connect with colleagues working the same or similar issues to collaboratively achieve common mission objectives. (Intellipedia; accessed 22 Oct 2010) Also see J-Space. Abort. To terminate a mission for any reason other than enemy action. It may occur at any point after the beginning of the mission and prior to its completion. (JP 1-02)* This unclassified glossary is periodically updated. Recommended changes, corrections, and/or additions are encouraged. For recommended additions provide a source for the definition.
    [Show full text]
  • Diagnosing Distortion in Source Reporting: Lessons for Humint Reliability from Other Fields
    DIAGNOSING DISTORTION IN SOURCE REPORTING: LESSONS FOR HUMINT RELIABILITY FROM OTHER FIELDS GEORGE P. NOBLE, JR. A Thesis Submitted to the Faculty of Mercyhurst College In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE DEPARTMENT OF INTELLIGENCE STUDIES MERCYHURST COLLEGE ERIE, PENNSYLVANIA MARCH 2009 DEPARTMENT OF INTELLIGENCE STUDIES MERCYHURST COLLEGE ERIE, PENNSYLVANIA DIAGNOSING DISTORTION IN SOURCE REPORTING: LESSONS FOR HUMINT RELIABILITY FROM OTHER FIELDS A Thesis Submitted to the Faculty of Mercyhurst College In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: GEORGE P. NOBLE, JR. Certificate of Approval: _____________________________________ Stephen Marrin Assistant Professor Department of Intelligence Studies _____________________________________ William Welch Instructor Department of Intelligence Studies _____________________________________ Phillip J. Belfiore Vice President Office of Academic Affairs March 2009 Copyright © 2009 by George P. Noble, Jr. All rights reserved. iii DEDICATION This work is dedicated to my dear friend and colleague Nancy Calzaretta, who taught me most everything I know about the handling of sensitive source information. iv ACKNOWLEDGEMENTS I would like to thank Allen Bostdorff for his encouragement and ideas. I would also like to thank my primary reader, Stephen Marrin, for his adroit direction and many hours of wise counsel. Finally, I am grateful to my family and my employer for allowing me this time for dedicated study and reflection on the field of intelligence. v ABSTRACT OF THE THESIS Diagnosing Distortion in Source Reporting: Lessons for HUMINT Reliability from Other Fields By George P. Noble, Jr. Master of Science in Applied Intelligence Mercyhurst College, 2009 Assistant Professor Stephen Marrin, Chair The views expressed in this thesis do not necessarily represent the views of the FBI.
    [Show full text]