Cyber Humint
Cyber Humint
November 2021
Table of Contents
1. Introduction……………………………………………………...…………….….……… 3
2. What is Cyber HUMINT……………………………………………...…....…….……… 4
3. HUMINT vs Cyber HUMINT………………………………...…………....…....………. 4
4. Cyber HUMINT and OSINT…………………………………………….…....……….. 5
5. Cyber HUMINT: Understanding the Cyberspace and its Different Aspects.…...…. 5
5.1 Networks and Infrastructures…………………………………………..…....… 5
5.2 Sources and Data………………………………………………………...….…. 7
6. Cyber HUMINT: Understanding the Different Threat Actors' Profiles.......……….. 12
6.1 Cyber Criminal………………………………………………………………..… 12
6.2 Hacktivist…………………………………………………………………..……. 17
6.3 Cyber Terrorist………………………………………………………...……..… 18
6.4 Cyber Espionage (APT)………………………………………………….….… 20
7. Cyber HUMINT: Financial Transactions and Threat Actors' Behaviour.....……..... 21
8. Avatar and Cover Stories…………………………………………………………....… 23
8.1 What is an Avatar…………………………………………………………..….. 23
8.2 How to Build an Avatar………………………………………………………... 23
8.3 Operating and Managing an Avatar……………………………………….… 25
9. Cyber HUMINT: Understanding Operational Security (Opsec) Measures............ 26
10. Cyber HUMINT: Advantages and Benefits………………….......……...………...… 27
11. Cyber HUMINT and Legal Issues…………………………………………………….. 27
12. Conclusion…………………………………………………………………………....…. 28
13. About the Author……………………………………………………………………..…. 29
14. Thanks………………………………………………………………………………….… 30
15. References…………………………………………………………………............…… 31
2
1. Introduction
With the emergence and development of social networks, forums, boards and
encrypted messaging applications, cyberspace became a vaste battlefield made up of
different types of threat actors. On a daily base, they use it to disturb, compromise or
destroy national critical infrastructures, private companies as well as financial
institutions . While most of governments and private companies have understood the
challenges of cybersecurity and adopted its culture, the use of cyber intelligence and
more particularly Cyber HUMINT remains insufficiently used, despite the emergence
on the market of several companies offering cyber intelligence collection's systems
and services.
It is important to distinguish between the different aspects of cyber threat intelligence
and their added values. Cyber threat intelligence is a discipline that brings together
several areas including: network and threat intelligence (packet analysis and reverse
engineering), OSINT (surface web and open source collection) and Cyber HUMINT
(deep sources collection with human interaction) . All of these areas each have their
own advantages and specificities. However it is important to notice that Cyber HUMINT
is the only area considered as active because it requires a virtual human interaction
which makes it so special.
Figure 1: connection between the target and the different intelligence steps
3
2. What is Cyber HUMINT ?
Cyber HUMINT is the use of traditional HUMINT techniques and methodologies
coupled with the use of computer tools and skills to identify, recruit, manipulate and
gather information on sources or targets operating online. Cyber HUMINT takes
advantage of the human factor, using different techniques such as:
➢ Social Engineering.
➢ Natural Language Processing.
➢ Psychology.
➢ Negotiation Techniques.
Cyber HUMINT requires a deep understanding of the intelligence world as well as the
cyberspace and its different threat actors. For military or law enforcement intelligence
specialists, Cyber HUMINT is a great methods to identify and collect information on
the activities and modus operandi used by cybercriminals and terrorists targeting
critical infrastructures and national institutions. On the commercial side, civilian
intelligence analysts mainly use Cyber HUMINT to actively collect information on
threat actors seeking to target private companies and financial institutions. The
fundamental difference in the use of Cyber HUMINT between governments and
private companies reside in the fact that governments are usually more interested in
identifying threat actors to sue or target them back, while private companies are more
interested in gathering intelligence on threats and vulnerabilities to help their clients
to protect their business, IT infrastructures and improve their cyber security policy.
3. HUMINT vs Cyber HUMINT
Traditional HUMINT uses a set of skills and methods which are applicable in the
physical world such as behavioral analysis or body language. These techniques and
methods allow HUMINT professionals to identify and draw up the profile of their
interlocutor. Indeed, when a HUMINT specialist meets a source, in a few hours they
can realize the type of person he has
in front of him and thus activate
levers that will allow him to bring his
interlocutor to give him the
information he needs. Unlike
traditional HUMINT, Cyber HUMINT
has a different approach due to its
environment. If during a tradditional
HUMINT operation an intelligence
officer can physically analyse the behaviour of its source/target by using techniques
such as body language or behaviour analysis, it does not work when it comes to Cyber
HUMINT operation. A non-physical contact allows a much smaller field of possibilities.
However, it is possible to try to identify the origin of a threat actor by paying attention
and analyzing certain details such as the language used by the threat actor as well as
its syntax. If Cyber HUMINT and HUMINT have differences, these two disciplines are
also very complementary. When a HUMINT specialist operates on the field he may
collect from a source useful information such as email addresses or nicknames that
may be useful for a cyber HUMINT specialist.
4
4. Cyber HUMINT and OSINT
OSINT is the process of passive data collection on threat actors and their activities
from various sources (mostly digital). Today unlike Cyber HUMINT OSINT is mainly
carried out automatically. Many global cyber security companies offer automatic
intelligence collection systems which collect data from the surface web to the darknet.
These systems are usually using artificial intelligence as well as link analysis and
specific patterns in order to collect different types of data (e.g. name, nickname,
address, phone number, IP, email, crypto currency addresses, IOC…). Usually a cyber
intelligence gathering process begins with the collection of data by using an automatic
intelligence collection system in order to have a first view of the exposed assets and
threat actors targets.
This step can possibly be followed by a Cyber HUMINT operation if the information
collected by the OSINT automatic system is sufficiently relevant and consistent. Cyber
HUMINT is an intelligence discipline that has proven itself and continues to contribute
to the fight against different types of crime and terrorism activities in all its forms
(traditional and digital). It helps to identify threat actor, their modus operandi and can
be effective in the prediction of potential future cyber attacks.
5
usually services that require a restricted access such as, online banking, mail servers
or social media private pages. From the infrastructure perpective, deep web websites
are reachable by regular URL or IP address, however they can require to go through
a secure access (user/password) in order to reach public-website pages.
The Darknet refers to underground networks which are overlayed to the internet. The
darknet is reachable with the help of a specific browser or software. The most popular
networks of the Darknet are The Onion Router (Tor) and The Invisible Internet
Project (I2P). These two browsers allow to access underground websites which are
usually indexed by repositories and search engines. The main goal of these networks
is to remain anonymous and keep privacy with the help of advanced encryption
systems. However most of the darknet sources (forums, markets, boards, automatic
shops, paste sites…) involve cyber criminal and terrorist activities. In terms of cyber
criminal activities, the darknet is more often the playground of gun and drug dealers
as well as pedophiles rather than advanced hackers. Indeed forums and markets
offering hacking services, vulnerabilities or malware are of low level and cannot be
compared to hacking forums of the deep or surface web. Additionally the stability of
the darknet is relatively weak. Many of the forums and markets do not last more than
one or two years for multiple reasons (takedown by law enforcement, multiple DDoS
attacks, or lack of users and activities).
6
5.2 Sources and Data
Sources are one of the key points to a successful Cyber HUMINT operation. They are
the place to be in order to identify relevant threat actors and threats. They are varied
and can take several forms such as: social networks, paste sites, forums, boards,
markets, encrypted messaging applications…
• Social Networks
Social networks are the sources with the largest number of active users in the world
since they have several billion. They are hosted and operates within the surface web
and have widely multiplied in recent years. Today beyond Facebook and Twitter, there
are multiple social networks specific to particular domains or languages. To conduct
an effective Cyber HUMINT operation, it is important to understand that social
networks have their own rules and work methods. Some of them would require to have
a well structured and active profile to avoid looking suspicious and getting blocked. To
maintain a good profile on social networks, it is important to be active and consistent
in your behavior and online activities. The information on social networks can be
divided into two categories public and private. Public contents are accessible to
everyone while private contents have undergo privacy policy and cannot be accessed
without the approval of its writter. In order to gather intelligence from restricted profiles
or groups, Cyber HUMINT is probably the best way. With a well structured real fake
profile it is possible to approach and be connected to a threat actor in order to access
his private information and published content.
7
.
• Forums
Forums are certainly the most interesting sources when it comes to hacking and cyber
crime. While social networks are the battlefield of hacktivists, forums are clearly the
land of cyber criminals. There are hundreds of forums and they are all different
depending on their sizes (e.g. number of posts, number of users) speciality (e.g.
hacking, financial fraud, data leak...) as well as languages (e.g. French, Spanish,
English, Arabic, Russian, Chinese, Persian ...). Moreover some forums are more
exclusive and private than others as they require entrance fees or knowing a forum
member who can vouch for you to become a new member.
Figure 6: : A list of hacking / cybercrime forums from all over the world (source link-base)
8
Each forum has its own rules and internal policies that help understand how to behave
towards users and administrators. To conduct an effective Cyber HUMINT operation
on a forum, it is important or even essential to know these rules and to understand
what is possible or not.
Figure 7: A list of internal rules and policy from an En glish speaking hacking forum (source: Raidforums)
• Markets
Underground markets give cyber criminals the opportunity to trade in illegal products.
Each market allows sellers to have a shop within the market. Sellers typically offer for
sale: credit cards, bank logins, exploit kits, malware, personal identity information,
drugs, weapons, counterfeit money, and documents. Usually each seller has a profile
with the details of the products they sell and most of the time their PGP encryption key
so buyers can send them private message and encrypt the marketplace. Additionally,
sellers can be rated based on the quality and service they provide. However, it is
important to understand that some sellers open multiple accounts and play with their
avatars by writing positive reviews to increase their reputation.
Before being engaged in a Cyber HUMINT operation on an underground market, it is
important to be aware that there are many scammers. In order to evaluate the risk and
the efficiency of the operation, it is preferable to check the reputation of a vendor on
forums which deal with underground darknet markets (e.g. The HUB forum). It is also
important to know that darknet markets do not have long term stability as they are
either suppressed by law enforcement, targeted by DDoS attacks as well as
modification of hosting service and onion link.
9
Figure 8: Profile of a vendor on a darknet market (source: empire market)
Figure 9: Some contact examples published by Threat Actors on different forums (source: Bank Security Info)
10
Figure 10: A Whatsapp conversation between a member of the ISIS terrorist group and a potential recruit (source: MIRCHI9)
Currently Telegram is probably one of the the most popular applications used by
cybercriminals and terrorists. This application provides an end to end encryption
service as well as hiding the phone number used by the application. This application
allows certain functions such as secret chat mode which allow to send secure
messages with an auto-erase function after a few seconds or minutes. Moreover,
telegram allows to create different groups and channels that are used by threat actors
as a way of promoting their ilegal items, ideology or recruiting people. If the proliferation
of private and public groups on this application can be seen as a problem in terms
criminal and terrorism activities, they are also very good sources fto find relevent
information on threat actors' activities. Encrypted messaging applications have
enabled threat actors to target a wider audience since they are mainly used from
smartphones. This mobility has taken precedence over the use of the TOR network
which, even with a smartphone version, remains more complex to implement and use,
rather than Telegram or other secured messaging applications.
Figure 11: Some exemples of Telegram's groups dealing with weapons, drugs, exploits, malware. (open source telegram)
11
6. Cyber HUMINT: Understanding the Different Threat Actors' Profiles.
12
Figure 12: One of the top Russian speaking hacking forum (source: xss hacking forum)
In recent years a large wave of ransomware attacks has been observed. Private
companies as well as nation state critical infrastructures from all over the world have
been affected by ransomware. Most of the time they have been sent by Russian-or
Chinese threat actors. While most governments do not agree with the principle of
paying a ransom, during a ransomware attack on a hospital or vital infrastructure,
Cyber HUMINT can be considered as an option to try to negotiate the price of the
ransom and to collect information on the identity of the threat actor operating the
ransomware. In the framework of negotiations with cyber criminals, it is important to
underline that people trying to negotiate the price of the ransom should be
professionals that know how to negotiate but that also know the cybercrime world.
The stress caused by the attack gives cybercriminals a certain psychological edge on
their victims who can make mistakes if they decide to negotiate on their own. Indeed
in some cases the victims trying to negotiate may say things which can anger the cyber
criminals and thus cause an increase in the ransom. When negotiating, certain
techniques can be used such as:
➢ Try to generate empathy from the hacker (especially when the victim is a
hospital or a small company without large financial resources).
➢ Compliment the hacker for his exploits.
➢ Establish a business relationship (win-win).
13
Unlike Russian speaking threat actors, those from Arab countries usually have a more
flexible behavior. They are generally more open to discussion as they like to show their
capabilities. It will generally be easier to discuss and try to extract information from an
Arab speaking hacker rather than from a Russian one. On
the other hand, Arabic-speaking threat actors can be
seen as persons not always trustworthy. Indeed they do
not always honor their agreements or promises, meaning
that some of them will scam or provide information or
services that are not always worth the price they ask for.
Their behavior and motivations often reflect a certain mix
of genres. Most of the Arabic-speaking forums present a
combination of religious and socio-political references as
well as technical and hacking aspetcs. Many Arab-
speaking threat actors are often either nationalistic or
claim their Islamic identity. They generally have no problem having discussions with
other non-Arab-speaking threat actors, but it is true that to infiltrate threat actor groups
on Arab hacking forums, it is much easier to be Arab-speaking.
Figure 13: An Arabic speaking hacking forum (source: Aljyyosh hacking forum)
Like Arabic English-speaking threat actors (which generally include european threat
actors) are usually open to discussion but have a certain reserve, more or less
depending on their nationality and culture. It is also well known that many threat actors
from South America, Asia and the Middle East are also active in English hacking
forums. Usually, it is easy to recognize those who are non-native English speakers
due to the vocabulary and expressions theu use. Some non-native English speakers
use online translation of their own language, but this does not necessarily translate
well into English.
14
Figure 14: One of the most famous English sphacking forum (source: hackforums)
The Chinese hacking community is less open than the Russian, Arab or English ones.
It is extremely difficult if not impossible to conduct a Cyber HUMINT operation on
Chinese threat actors when not being a Chinese speaker. Additionally a deep
understandong of the Chinese hacking community environment is required. Indeed
they have their own specific ways of communication (QQ, WeChat...) and do not use
the popular ones like other communities. Chinese forums generally require members
to be active before being able to make some deals. Some state limitation of the content
of these forums makes it more difficult to find interesting information than on Russian
forums. Moreover unlike on Russian-speaking hacking forums, there are no active
English speakers on the Chinese ones.
15
Figure 15: A Chinese hacking forum (source: Card Fan Chinese forum)
This view on the different comunities is an observation after carrying out multiple
Cyber HUMINT operations with threat actors from different countries and cultures.
However the personality and character of each threat actor, regardless of his country
of origin and his culture has an important part on his behavior.
What are the different steps to perform before being engaged in a deep Cyber
HUMINT operation regarding cyber criminal activites?
➢ Identifying the different forums where the targeted threat actor is active.
➢ Understanding the threat actor expertise (e.g. hacking, carding, money
laundering, weapons, drugs...).
➢ Be sure to have the right technical, professional knowledge and skills relevent
to the operation.
➢ Preferably speak the language of the threat actor.
➢ Building a strong cover story as well as a good a profile with some relevant
threads and posts that can be found on various cyber criminal forums.
➢ Make sure to have the right ways of communication depending on what the
targeted threat actor uses (Telegram, Signal, Whatsapp, Jabber ...).
In a Cyber HUMINT operation it is sometimes possible to identify things such as the
ability and willingness of the threat actor to engage in dialogue. Indeed, if the size of
his sentences is short it may reflect a certain reluctance to open up and have a
dialogue. On the other hand, if the questions asked to the threat actor are rather short
and his answers are longer with some details about his activities and techniques, it
shows an openness and a greater willingness for communication. While there is no
absolute rule in terms of Cyber HUMINT techniques, it is nevertheless recommended
to adapt to your interlocutor. It is often good to go in his direction by adhering to his
ideas and/or by complimenting him on his technical and professional skills. This
usually greatly increases the chances of obtaining information or contacts which only
the threat actor can provide.
16
6.2 Hacktivist
Hacktivism is a phenomenon which began to be significant in 2003 with the creation of
the decentralized movement Anonymous. This term of hacktivism (contraction of
activism and hacker) was then "democratized" with the emergence of Facebook in
2006 and other social networks such as twitter, Youtube , Instagram, tiktok and VK.
Hacktivists have seen in social networks the opportunity to broadcast their religious,
political or social ideological messages by creating cyber attack campaigns and
publishing the results of these attacks (website defacement, database leak ...). For
hacktivists, social networks are an important way of communication which allow them
to reach a large number of people.
Figure 16: The Facebook page of the hacktivist group Dragonforce (source: Facebook)
Moreover it has given them the opportunity to unify their forces and get more powerful.
Additionally it may happen that some groups of hacktivists will also publish about cyber
attack campaigns on hacking forums or on encrypted chat application groups such as
Telegram.
Figure 17: A post annoncing the hack of an Israeli university by the hacktivist group Dragonforce on their forum (source: Dragomforce forum)
17
Unlike cybercrime, the primary goal of hacktivists is not to make profits. Their main
goal is to broadcast an ideology or demonstrate strong opposition to a social, political
or religious idea, act or decision taken by a government. There are multiple groups of
activists, each with its own pre-vision and ideology. However, many groups join forces
for specific campaigns against infrastructures (mostly web) of different countries.
When it comes to hacktivism, Cyber HUMINT operations are very useful in collecting
confidential information that is not public on social networks. Cyber HUMINT gives the
opportunity to infiltrate hacktivist groups in order to identify the targets of cyber attack
campaigns as well as to collect information on members of these groups.
Hacktivists often seek to rally as many people as possible to support their cause. It is
therefore often easier to infiltrate hacktivist groups with a good fake profile and cover
story that allow to gather information from them. In general, to be effective during a
Cyber HUMINT operation on hacktivism there are several steps that need to be done
including
➢ The creation of social networks, profiles (fitting to the needs of the operation).
➢ Joining several social networks public and private groups.
➢ Being connected to the relevant people (hacktivist members and groups).
18
Figure 18: Cyber security guidelines from the Cyber Terrorism group Jerusalem Electronic Army (source: JEArmy website)
One of the Cyber HUMINT modus operandi used by the Hamas to gather intelligence
on Israeli military operations and soldiers' geolocation is to create fake attractive young
women social network profiles. Once created, they use them to get in touch with Israeli
soldiers through messages intended to charm them. These operations aim to infect
their smartphone with malware that allows them to collect information on geolocation,
messages, emails, and phone conversations. It is often easy to exploit human
weakness to implement a Cyber HUMINT strategy that will take advantage of some
naivety of targets. The human factor remaining the greatest vulnerability, this
technique remains essential and works very often.
Figure 19: A Facebook profile used by the Hamas to target soldiers with spyware. (source: Times of Israel)
19
6.4 Cyber Espionage (APT)
Cyber espionage is very relevant to the subject of Cyber HUMINT. In recent years,
several Iranian APT groups such as APT34, aka OilRig or APT35 aka Kitten took
advantages of the social network Linkedin to carry out cyber HUMINT operations
targeting business leaders in the field of high tech, finance and defense. Linkedin is
found to be an excellent playground for these APT groups generally linked to
governments. It allows them to conduct Cyber HUMINT operations by creating and
using fake professional profiles. They virtually approach their targets, build a trusted
relation , manipulate and use them as an attack vector.The fact that a large majority of
people with various profesionnal backgrounds use social networks such as Linkedin
makes it a great way to target them. It allows to contact targets in order to directly or
indirectly collect confidential information and / or send malicious links and thus gain a
remote access to internal computers and systems.
Figure 20: A fake journalist LinkedIn profile created and used by the Iranian APT group Kitten (source: Ban Security Info)
Apart from cyber intelligence campaigns via professional social networks like LinkedIn,
some threat actors go further. Firstly, they passively collect information on key people
from governments or private companies by using OSINT tools. Secondly, they create
real fake corporate email addresses and websites which improve their cover story and
credibility. All these elements help them to increase their chances of reaching their
targets and gain their trust.
20
7 Cyber HUMINT: Financial Transactions and Threat Actors Behaviour
Figure 21: A website that allow to find people who sell and buy bitcoin anonymously. (source: Paxful)
21
However, the choice of payment method as well as its use allows us to learn a lot about
the behavior of the threat actors. According to their geolocation, culture and
infrastructure habits, each threat actor will have his preference in terms of crypto
currency. Certain threat actors concerned about their security will tend to choose a
completely untraceable crypto currency. If transactions carried out in bitcoin and
ethereum remain anonymous, they can still be traced on the blockchain. Thus certain
threat actors will tend to prefer to use a mixing service. This service allows transfers
from one wallet to another, through a multitude of different wallets and sometimes
converting the transaction to a different crypto currency on the way. if a threat actor
uses a mixing service and chooses especially an untraceable crypto currency, it
demonstrates a certain level of operational security.
Figure 22: An illustration that explains the principle of Bitcoin mixing (open source)
22
8 Avatar and Cover Stories
3. Depending on the need of the Cyber HUMINT operation, create a fake profile
than can go from a simple email address or nickname to a complete fake profile
with:
➢ A real fake identity (gender, name, nickname, age, community…).
➢ A strong background story (origins, country of living, job and professional
skills, family situation...).
➢ A fitting profile picture that looks real but that is not (e.g.
thispersondoesnotexist.com).
➢ A profile on different platforms (social networks, forums, markets, chat
applications, email…) according to the needs of the operation.
23
Figure 23: A website to generate non-existent profile photos using artificial intelligence (open source)
24
8.3 Operating and Managing an Avatar
Operating an avatar depends on the environment where it will be operational. Its
behavior and activities will be different according to its environment and goal. While
each Cyber HUMINT collection operation is unique, there are, however, certain tasks
that an avatar should perform to adapt itself to the environment where it operates.
On Forums
➢ Publish pertinent contents (tutorials, techniques, resources…) as well, as
commenting on other members threads at the right frequency (daily, weekly,
monthly…) depending on forum's traffic and activities.
➢ Interact with other forum's members on specific subjects by posting comments
or sending private messages.
➢ Follow and respect forums' rules.
➢ Build yourself a reputation (in the field you choose).
➢ Do not republish existing or very similar content.
➢ Do not use multiple avatars on the same forum (to avoid ban).
When talking about reputation on forums it is important to understand a key point. In
the perspective of the implementation of a cyber HUMINT operation especially if it is
to be long term, it is preferable to have an avatar with a good reputation but not a great
popularity. Law enforcement, intelligence agencies as well as cyber security experts
and criminals constantly monitor forums, it is therefore preferable not to have an overly
popular avatar who would be too noticeable due to the content he publishes or by his
online activities.
On Social Networks
➢ Publish relevant contents (posts, comments, pictures, videos) at the right
frequency depending on the avatar cover story and the goal of the operation.
➢ Add friends and join communities/groups relevant to the cover story of the
avatar (preferably not buying likes and friends as it can look suspicious and is
not a reliable technique).
25
9 Cyber HUMINT: Understanding Operational Security (Opsec) Measures
Operational security or Opsec refers to the measures taken to ensure security as well
as to remain anonymous on networks. These measures are very important as they
provide important indications on the skills level of a threat actor as well as on its
techniques . In addition a deep understanding of its measures allows you to better
prepare for a Cyber HUMINT collection operation and to protect yourself so as not to
reveal sensitive information.
There are several types of opsec configurations but some so-called basic elements
are used by many threat actors including:
➢ Virtual Private Network / Proxy (for anonymous network connection).
➢ Virtual Private Server (to remain anonymous and store data).
➢ TOR Browser (for encrypted Darknet and regular browsing).
➢ Virtual Machine (to protect local computer in case of malware infection).
➢ Prepaid SIM card (for opening and authentication process of email, social
networks and chat applications accounts).
➢ Encrypted email provider (additionally a PGP key can be used).
➢ Physically or virtually disable computer's microphone and webcam.
Additionally some threat actors use specific operating system for their opsec such as
Linux Tails or Whonix which have a default configuration that uses a TOR browser and
automatically encrypts every internet connection. For the past few years
cybercriminals and cyber terrorist often use what is called Bulletproof Hosting Service
(BPHS) for their operations. This service offers a secure hosting infractructure but with
the particularity of not being concerned about the content or the use of the server. They
usually pay for this service in crypto currency which makes it even more secure and
less traecable. Usually a Bulletproof Hosting service is used by threat actors to perform
the following activities:
➢ To perform spam/phishing (campaigns).
➢ To use it as a C&C server (to control a botnet of infected machines).
➢ To drop Exploit Kit.
➢ To host extremism and terrorism content websites.
➢ To host hacking and cybercrime forums.
➢ To host drugs and weapons markets.
26
10 Advantages and Benefits of Cyber HUMINT
27
12. Conclusion
While cyber-attack techniques and technologies used by the different types of threat
actors are constantly evolving, there is one thing that does not seem to change - the
human being behind the keyboard. Indeed, on a yearly base, nation states, institutions
and private companies spend billions of dollars on cyber defense and information
security systems but forget that the biggest vulnerability is and will remain people. If
the human aspect is considered as a vulnerability on the defensive side, on the
intelligence one it is a great opportunity. Cyber HUMINT allows performing so-called
active intelligence gathering operations that even the best artificial intelligence
gathering systems will not allow.
Cyber HUMINT operations allow collecting important and sometimes crucial
information about threat actors' capabilities to harm a government, an institution, or a
private company. It also gives the opportunity to infiltrate groups of criminals and
terrorists for a better understanding of their strategies as well as attempting to identify
them and prevent future attacks. However, as previously underlined, Cyber HUMINT
operations must be carried out by people with strong professional and technical skills,
good knowledge of the human behavior and a good anticipation of the different trends
on the various networks. It is not always easy to find competent people with good
experience in this area of intelligence. Moreover, the amount of professional training
on the market in this domain is still too low in comparison to defensive and offensive
cyber security trainings. Cyber HUMINT operations should be more popular with well-
defined legal and operational frameworks.
28
13. About the author
I am a cyber intelligence expert who has worked in a variety
of environments over the past 10 years including academia,
high tech, military, and law enforcement.
My field of expertise is cyber intelligence including strategy,
collection, research, and analysis as well the lead of Cyber
HUMINT operations on criminal and terrorist activities within
the cyberspace. I have trained many civilian analysts as well
as Military and Law Enforcement officers on the Deep & Dark
Web environments, Cyber intelligence collection and Cyber
HUMINT operations.
29
14. Thanks
This paper is an operational approach of Cyber HUMINT and reflects a concrete and
professional vision. As such, I would like to thank the following people for their advice
and support.
30
15. References:
2. Link-base, World's biggest link list for hacking & security boards 2021.
https://link-base.org
5. MIRCHI9, Shock: ISIS lays trap for youth via WhatsApp, September 2015.
https://www.mirchi9.com/politics/shock-isis-lays-trap-for-youth-via-whatsapp/
9. Aljyyosh, Hackers armies’ forums, the largest Arab forum specialized in new
vulnerabilities and hacking sites.
https://www.aljyyosh.com/vb/
10. Hackforums, The ultimate security technology and social media forum.
https://hackforums.net/
12. Times of Israel, Hamas uses fake Facebook friends to dupe 100 soldiers into
downloading spyware, July 2018.
https://www.timesofisrael.com/idf-warns-soldiers-hamas-trying-to-spy-on-them-
with-fake-dating-world-cup-apps/
13. Bank Security Info, Iranian Hackers Using LinkedIn, WhatsApp to Target Victims,
August 2020.
https://www.bankinfosecurity.com/iranian-hackers-using-linkedin-whatsapp-to-
target-victims-a-14914
31
14. The Financial Times and Cyberint, Telegram emerges as new dark web for cyber
criminals, September 2021.
https://www.ft.com/content/cc3e3854-5f76-4422-a970-9010c3bc732b
32