contemporary intelligence support systems2 this publication was published in march 2013 by the...

34
The 1st international academic conference on intelligence and security Contemporary Intelligence Support Systems Conference Proceedings Editors: prof. dr. Iztok Podbregar Blaţ Ivanc Marija Umolac

Upload: others

Post on 02-Feb-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

  • The 1st international academic conference on intelligence and

    security

    Contemporary Intelligence Support Systems

    Conference Proceedings

    Editors:

    prof. dr. Iztok Podbregar

    Blaţ Ivanc

    Marija Umolac

  • 1

    University of Maribor

    Faculty of Criminal Justice and Security

    The 1st international academic conference on intelligence and security

    Contemporary Intelligence Support

    Systems

    Conference Proceedings

    Ljubljana, Slovenia, March 2013

  • 2

    This publication was published in March 2013 by the Faculty of Criminal Justice and

    Security, University of Maribor, Kotnikova 8, 1000 Ljubljana, Slovenia.

    To publikacijo je marca 2013 izdala Fakulteta za varnostne vede, Univerza v Mariboru,

    Kotnikova 8, 1000 Ljubljana, Slovenija.

    Editors/chairs of the conference:

    prof. dr. Iztok Podbregar (conference director)

    Blaž Ivanc (professional head of the conference)

    Marija Umolac (conference secretary)

    ePublishing/E-publikacija: http://www.fvv.uni-mb.si/ovd2013/zbornik.pdf

    The editors are grateful to the authors for their contributions and effort.

    Uredniki se zahvaljujejo avtorjem za njihove prispevke.

    Disclaimer: Contributions have not been reviewed - the authors are fully responsible for the content.

    Opomba: Avtorje in udeležence konference organizacijski odbor obvešča, da prispevki niso

    lektorirani in so za vsebino in angleški jezik odgovorni avtorji sami.

    CIP - Kataložni zapis o publikaciji

    Narodna in univerzitetna knjižnica, Ljubljana

    351.78(082)(0.034.2)

    INTERNATIONAL AcademicConference on Intelligence and Security (1 ; 2013 ; Ljubljana)

    Contemporaryintelligencesupportsystems [Elektronski vir] : conferenceproceedings / The 1st

    InternationalAcademicConference on IntelligenceandSecurity, Ljubljana, Slovenia, March 2013 ;

    [editors Iztok Podbregar, Blaž Ivanc, Marija Umolac]. - El. knjiga. - Ljubljana : FacultyofCriminal

    Justice andSecurity, 2013

    ISBN 978-961-6821-37-7 (pdf)

    1. Gl. stv. nasl. 2. Podbregar, Iztok

    266188544

    http://www.fvv.uni-mb.si/ovd2013/zbornik.pdf

  • 3

    Program Committee

    Iztok Podbregar, PhD, Full Professor, University of Maribor

    Matjaž Mulej, PhD, PhD, Professor Emeritus, University of Maribor

    Bojan Dobovšek, PhD, Associate Professor, University of Maribor

    Dario Matika, PhD, Colonel Professor, IROS, Zagreb

    Martin Rudner, PhD, Professor Emeritus, Carleton University, Ottawa

    Goran Mandić, PhD, professor, University of Belgrade

    Blaž Ivanc, Independent Researcher, Jožef Stefan IPS

    Organizing Committee

    Iztok Podbregar, PhD, Full Professor, University of Maribor

    Branko Lobnikar, PhD, Associate Professor, University of Maribor

    Maja Jere, assistant, University of Maribor

    Blaž Ivanc, Independent Researcher, Jožef Stefan IPS

    Marija Umolac, Demonstrator

    Conference Director Iztok Podbregar, Ph.D., Full Professor

    Professional Head of the Conference Blaž Ivanc

    Conference Secretary Marija Umolac

  • 4

    TABLE OF CONTENTS

    Part 1: STRUCTURED ABSTRACTS ............................................................................................................ 5

    Denis Čaleta, Anita Perešin, Strategic security decision-making process in the corporate

    environment using open sources information .................................................................................... 6

    Adriana Dvoršak, Application of principles of international law to computer networks operations

    management ....................................................................................................................................... 8

    Maj Fritz, Andrej Sotlar, Jaroš Britovšek, Private Military/Security Companies and Intelligence ...... 9

    Gašper Hribar, Teodora Ivanuša, OSINT as a 'grey zone'? ........................................................... .....11

    Blaž Ivanc, Modeling of offensive computer-network operations by using an advanced structural

    model ................................................................................................................................................. 12

    Dražen Škrtid, Lawful interception: European Union legal framework ............................................. 13

    Bernarda Tominc, Andrej Sotlar, Public opinion on the Transnational Sources of Threat to National

    Security .............................................................................................................................................. 14

    Janez Žirovnik, The probative value of the results of monitoring communication privacy, derived

    from intelligence services .................................................................................................................. 16

    Franc Željko Županič, Working methods of defense attachés in the Information Age ..................... 17

    Part 2: UNSTRUCTURED ABSTRACTS ..................................................................................................... 20

    Robert BožičExtending security intelligence with big data solutions ............................................... 21

    Robert Brumnik, Sergii Kavun, Information technology in domain of electronic intelligence ......... 22

    Simon Čimžar, Miro Udir, Provisioning of uniform lawful interception solution in data networks .. 24

    Matevž Gačnik, Technology of capturing and converting mass data from social networks ............. 26

    Irena Kranjc, Open sources in the intelligence and security ............................................................. 28

    Mojca Perid, Real-time public opinion monitoring - a modern way of understanding public opinion

    and mood .......................................................................................................................................... 29

    Aleksander Pur, Robert Djuras, Open sources information for improvment of public safety .......... 31

    Milan Mijalkovski, Vesela Radovid, Duško Tomid, Direct implementation of the security function in

    intelligence system............................................................................................................................32

    Dragan Trivan, The importance of Business Intelligence and its application in the companies in the

    region of Western Balkans ................................................................................................................ 33

  • 5

    Part 1

    STRUCTURED ABSTRACTS

  • 6

    Strategic security decision-making process in the corporate environment

    using open sources information

    Denis Čaleta, Anita Perešin

    Purpose

    Globalization of the world and the globalization of security indirectly confront modern society with

    the difficult dilemma, how to continue its development based on the basic postulates of the free

    movement of goods, services and people but on the other hand, to mitigate threats to an acceptable

    level of risk. Asymmetric threats to national and international security arise from completely different

    basic concepts of safety assumptions and perceptions which we used to recognize in the past.

    Globalization in its essence is driven primarily by economic factors, which largely reflected through

    the interests of big multinational corporations. They are in a constant need for expansion and revenue

    growth is always looking for new markets. In this article we are planning to further defines some

    important dilemmas and factors related to the role of supporting strategic decision-making process

    with the help of intelligence analysis based on the data and information derived from publicly

    available sources. The purpose of this paper is also to analyze the factors that occur in the interaction

    between public and private environments, especially in terms of user intelligence products. We are

    located in a period where certain corporations in the wind of globalization processes outgrown the

    exclusive influence of nation-states. Important information is increasingly becoming a tool in the

    hands of multinational corporations in achieving their strategic objectives. Corporate security

    environment aims at maximizing risk, which could adversely affect the continuity of the underlying

    business processes of the organization. Intelligence process, which is based primarily on the collection

    of information from publicly available sources, is becoming an effective tool in the hands of strategic

    management which plans and promotes its strategic interests of corporations. These include corporate

    security factors.

    Design/Methods/Approach

    The paper will use more scientific methods, which are necessary for a thorough analysis of the subject

    matter and explain new findings. We are planning to use a historical, descriptive and analytical

    method by which we thoroughly analyze the current state of discussion. The final stage of verification

    process of pointed problem we will use inductive and deductive method. Theoretical knowledge will

    be further examined by undertaking interviews with selected representatives of the corporate strategic

    management.

    Findings

    Findings will certainly focus on intelligence analysis processes which are in accordance with the legal

    basis and avails itself of useful tool for strategic management in the corporate environment. Special

    emphasis will be put to analysis of public-private relations in the field of cooperation in the exchange

    of important security information. In this respect we are interested in particular in the key information

    which has a significant impact on the provision of adequate security environment. Stable security

    environment is in the interest of national security authorities, as well as corporations that operate in

    this environment. Another important findings leads in the way of usefulness of intelligence analysis

    for strategic management decisions process and their quality of data derived from public sources.

    These facts are critical in the process of Critical Infrastructure protection where we have public and

    also private management.

  • 7

    Research Limitations/Implications

    Exploring such a sensitive subject, which on the one hand affect the mechanisms put in place in

    corporations, on the other hand is touching national classified information is always challenging due to

    fact that these data are labeled with different classification levels and as such are not accessible to the

    wider research activity. Because of the wider field of research we will focus on the region of SE

    Europe, of course with applications and comparison with the broader international environment.

    Practical Implications

    The applicability of the research results, approaches and new knowledge will be very applicable in the

    current corporate environment in the region. On the one hand, these models will be usable to obtain

    information from public sources, which will be an appropriate basis for strategic decisions making

    process of management. On the other hand, will be useful base of information and the appropriate

    signal indicator, especially for corporate-security experts where are those channels through which the

    corporations reach a lot of important data that can be in the long-term damageable in the severe

    competitive struggle in the global marketplace.

    Originality/Value

    In the region of Southeast Europe have not yet been traced similar scientific contributions that are

    specifically dealt with this issue from the perspective of efficiency of collecting information from

    publicly available sources and their use in the corporate environment. An important fact is certainly

    present the findings, which are very important in emerging democracies, where certain methods of

    intelligence analysts all too often associated with a negative connotation. Because of this their

    applicability has a negative connotation in the business environment.

    Key words

    corporative security, open source, intelligence, analytical process, management decision, critical

    infrastructure

    About the authors

    Denis Čaleta holds Ph. D. from Faculty of state and European studies, Slovenia in 2007. He is

    assistant professor at Faculty of state and European studies. He is also President of the Board in

    Institute for Corporative security studies (ICS), a head of the resource group in the ICS and President

    of Slovenian Association for Corporative Security. He has been managed and participated in several

    research projects. He also works for Ministry of Defense and participate as a member of a few

    coordination bodies in National Security Council. He presented papers at many research conferences

    worldwide. He authored and co-authored more than fifteen original scientific articles published in

    journals. The papers and articles cover topics in managing the security threats. He is also author of two

    scientific monograph publications. He supervised more diploma, master and doctor thesis. He also

    teaches part time at two other faculties in Slovenia.

    Anita Perešin, finished her PhD in 2008 at the Faculty of Political Science, University of Zagreb,

    Croatia. As an assistant professor at Zagreb University, her research focuses on new counterterrorism

    challenges. She has published a number of articles on transformation of terrorism, relations between

    media and terrorism, security sector reform, information security and critical infrastructure protection.

  • 8

    Application of principles of international law to computer networks

    operations management

    Adriana Dvoršak

    Purpose

    Purpose of the research paper is to present the legal principles and considerations relevant for a small

    state cyber defense policy.

    Design/Methodology/Approach

    Descriptive and comparative methods are applied.

    Findings

    There is a certain lack of legislation in regard to computer network operations (CNO) but the states

    can refer to principles of international law, law of armed conflict, UN Charter and to provisions of

    Constitution of the ITU. Principles of international law that apply to CNO are principles of necessity

    and proportionality, principle of distinction between civilians and combatants, whereas limits of means

    and methods of (cyber) warfare are still developing. The author claims that slow development of legal

    rules is the consequence of the military secrecies, of the limited experience of the international

    community with CNO, and finally due to the compelling differences in character of kinetic and cyber

    warfare. The speed influences the character of CNO and it defies political and military decision

    makers, as well as the principles of international law.

    Research limitations/implications

    Research builds upon Information Warfare Lifecycle Model and proposes a model for CNO lifecycle

    in a small state. Proposed model integrates legal, political and social functions into the planning of

    CNO.

    Practical implications:

    The paper outlines the basis for discussion of CNO management in the complex institutional and

    organizational environment, applicable to NATO and EU member states.

    Originality/Value

    The research paper contributes to the understanding of the importance of international norms and

    regimes for the national CNO management.

    Keywords

    computer network operations, international law, lifecycle model, national security

    About the author

    Adriana Dvoršak was awarded bachelor degree at the Faculty of Social Sciences, Ljubljana and

    specialized in political science - international relations. Presently she is a doctoral candidate at the

    Faculty for Applied Social Sciences, Nova Gorica. In 2012 she participated at the conference

    »Information Security - Guidelines for the Future,« with the paper: »Cyber security strategy and cyber

    defense strategy in the framework of Slovenian strategic culture.« Her paper »Building trust in South

  • 9

    East Europe in the field of cyber security and cyber defense«, is due to be published by »European

    Perspectives,« in April 2013.

    Private Military/Security Companies and Intelligence

    Maj Fritz, Andrej Sotlar, Jaroš Britovšek

    Purpose

    The purpose of this research is to determine whether and to what extent private military/security

    companies openly offer intelligence as one of their services.

    Design/methodology/approach

    The analysis of official websites of fifty different private military/security companies tries to answer

    the following question: “Do private military/security companies offer intelligence as one of their main

    services?” The results will be interpreted through the already known facts, namely that private

    military/security companies have been involved in the entire spectrum of intelligence in Iraq and

    Afghanistan.

    Findings

    Private military/security companies have been in the national and international spotlight in the recent

    years. They represent attempts to label the phenomenon of private companies which offer those

    services on the world market that are normally duties of national military or security forces. These

    services include training of local forces, risk advisory, intelligence services, covert operations,

    weapons procurement, weapons destruction, armed site security, workplace and building security, war

    zone security needs, personnel and budget vetting, logistic support, air support, armed support,

    surveillance, psychological warfare, propaganda tactics, close protection and investigations. In short,

    among many services offered by private military/security companies, intelligence is an activity which,

    on one hand, is used by private military/security companies to operate, and, on the other hand, it is one

    of the services provided to clients.

    Research limitations/implications

    The article is limited to theoretical conclusions of different authors addressing a phenomenon of

    military outsourcing. Our research is limited to public information available on official websites of

    different private military/security companies. In our research we use the term “private

    military/security companies”. The main reason for this lies in the fact that many companies consider

    themselves security, and not military services providers, mainly because of a negative connotation the

    term “private military company” carries.

    Practical implications

    A useful source of information for individuals who wish to understand the basics of intelligence-

    related private military and security business, and for academics who are eager to conduct further

    research on this matter.

    Originality/value

    This paper lays down the foundation in understanding that intelligence in all its forms is one of the

    services offered by private military/security companies.

    Keywords

  • 10

    Private military company, private security company, intelligence.

    Article Type

    Research paper

    About the authors

    Maj Fritz, M.A, is Ph.D. candidate at the Faculty of Criminal Justice and Security, University of

    Maribor. He graduated at Faculty of Criminal Justice and Security, University of Maribor, Slovenia

    (1999). He holds M.A. in European Studies (2008). He has been working for Ministry of Defence of

    Republic of Slovenia since 1991. His interests and research include intelligence and security issues,

    peace operations and military outsourcing.

    Andrej Sotlar, Ph.D., is Assistant Professor and Vice dean in the Faculty of Criminal Justice and

    Security, University of Maribor, Slovenia. He has a B.A. (1993), M.A. (2000) and Ph.D. (2007) in

    Defence science from University of Ljubljana, Slovenia. He serves as the co-editor in chief of the

    Journal of Criminal Justice and Security (orig. Varstvoslovje) and a member of the editorial boards of

    several other journals. His research interests include national security, security policy, plural policing

    and private security.

    Jaroš Britovšek is Ph.D. candidate at the Faculty of Criminal Justice and Security, University of

    Maribor. He graduated in political science at the Faculty of Social Sciences in Ljubljana in 2007 and

    has been working for Slovenian Ministry of Defence since 2008. Since then he was deployed in ISAF

    - Afghanistan and EUFOR - Bosnia and Herzegovina. His interests and research include intelligence

    and security issues in both public and private spheres.

  • 11

    OSINT as a 'grey zone'?

    Gašper Hribar, Teodora Ivanuša

    Purpose

    General opinion and the facts concerning Open Source Intelligence (OSINT) are actually mostly

    positive and explicitly point out that OSINT does not violate human rights as the conventional

    intelligence collection. Free market offers different legal tools by which analytical procedure of data

    acquisition and analytics of the data do not represent a major technical and logistical obstacle. OSINT

    can be hypothetically carried out by everyone with such specific tools and the knowledge. It is also a

    formal tool and analytical support of intelligence services. Is there a „grey zone‟ in the frame of

    OSINT, useful for specific individual interests of the intelligence services to use OSINT in a legal

    manner and on behalf of the same legality interfere in another country where they would otherwise act

    illegally without this hypothetical 'grey zone' and so become a subject of counterintelligence

    observation?

    Methods/Approach

    Review and analysis of literature, descriptive method and comparative method.

    Findings

    Legislation, information and communications tools, and degree of safety culture enable irregularities

    and abuses in the collection of data from public sources, therefore grey zone in OSINT is hypotetically

    expected. This prevents the counterintelligence services to act against the foreign intelligence services

    which do not violate the law with OSINT (operation within the „grey zone‟) but can indirectly violate

    the human rights and endanger the national security system.

    Originality/Value

    Our paper points out some gaps in the national security system and general safety culture. We provide

    answers to some questions and proposals to reduce the „grey zone‟ of OSINT.

    Keywords

    OSINT, grey zone

    About the authors

    Gašper Hribar is a postgraduate student at the Faculty of Criminal Justice and Security, University of

    Maribor, Slovenia. E-mail: [email protected]

    Teodora Ivanuša is Assistant Professor of management and governance of security threats, and

    chemical, biological, radiological, nuclear, and liquid explosives defense at the Faculty of Criminal

    Justice and Security, University of Maribor, Slovenia. E-mail: [email protected]

    mailto:[email protected]:[email protected]

  • 12

    Modeling of offensive computer-network operations by using an advanced

    structural model

    Blaţ Ivanc

    Purpose

    Attack modeling allows us to anticipate the possible courses of computer-network operations and

    assess the suitability of the existing attack and defense mechanisms. A model is thus a tool for setting

    up the attack scenario, which shows the process of the attack and the techniques used. The paper

    shows a real-life snapshot of a target computer-based system. This serve as a basis for the computer-

    network operation analysis using the attack modeling method. An advanced structural model is used

    for attack modeling. In addition, the paper provides guidelines for the analysis of a simulated cyber

    attack presented on a real-life case including an advanced structural model for cyber attack modeling.

    Methodology

    The paper includes a real-life snapshot and an analysis of the application of an advanced structural

    model for attack modeling. Furthermore, the paper is based on a commented review of the research,

    existing literature and processes by using the method of abstraction and concretization.

    Findings

    Structural models are characterized by their lack of the time dimension. The development of an

    advanced structural model allows for the elimination of weaknesses such as difficult cyber attack

    dynamics capturing, while the model also serves in the improvement of methods in cyber conflicts.

    Originality

    The paper presents the threats to target systems and the conducted cyber attack analysis. An advanced

    structural model is demonstrated, which carries a strong communicative value and enables coordinated

    cyber attack capturing. The paper includes the demonstration of the practical use of the model, which

    may help in the development of automated solutions and process improvements.

    Keywords

    Attack modeling, cyber attack analysis, security mechanisms, system design

    About the author

    Blaţ Ivanc is an independent researcher at Jožef Stefan IPS and a member of Slovenian Association

    of Corporate Security. He has professional experience in red-team testing, network forensics and

    sensitive data protection. In addition he has been working on a research study at the Jozef Stefan IPS

    on critical infrastructure and classified data protection. His main research and development interests

    are new techniques, tactics and procedures for information operations.

  • 13

    Lawful interception: European Union legal framework

    Draţen Škrtić

    Purpose

    The purpose of the article is to present the lawful intercept and the legal framework for Lawful

    Interceptions of Telecommunications.

    Design/Methodology/Approach

    The article is based on a review and analysis of the European Union Directive that defines the Lawful

    Interceptions of Telecommunications, the retention of the data that is generated or processed in

    connection with the provision of publicly available electronic communications services or of public

    communications network.

    Findings

    The European Union issued a Directive 95/46/EC and Directive 2002/58/EC that defines the Lawful

    Interception of Telecommunications with the simultaneously protection of individuals. In general the

    directive defines the nature of the intercepted data and gives additional details on how the data may be

    used. One of the major parameters in electronic surveillance is data preservation. Retention refers to

    “the storage of telephony and Internet traffic” by companies that provide these services. This data

    specifically includes Call Detail Records (CDRs), sent and received emails, visited web sites of the

    customers of ISPs, and also the location of the customers of telecommunications companies. The

    European Union issued a Directive 2006/24/EC that specifies in detail the period of data preservation

    and also the kinds of information to be stored.

    Originality/Value

    The paper is the systematic overview of the history and development European Union legal framework

    the Lawful Interceptions of Telecommunications, the period of data preservation and the kinds of

    information to be stored.

    Keywords

    Interceptions, legal framework, telecommunications, Directive, data preservation.

    About the autor

    Draţen Škrtić, PhD, graduate criminalist on the High Police School Ministry of Interior, Croatia and

    Posgraduate study at Faculty of Law of the University of Zagreb, police officer at Criminal

    Investigation Division, Karlovac Police administration, Ministry of Interior, Croatia, lecturer of law

    science at the Karlovac University of Applied Sciences, author original scientific paper, preliminary

    comunications, author reviews, conference papers and professional papers in the field of criminal law,

    administrative law, criminology and criminalistic. His scope of researches covers criminal law,

    criminal procedure law criminology. E-mail: [email protected]

  • 14

    Public opinion on the Transnational Sources of Threat to National Security

    Bernarda Tominc, Andrej Sotlar

    Purpose

    The main aim of this paper is to present the public opinion on sources of threat and risk to national

    security of Republic of Slovenia that have a transnational origin and cross-border dimension and are

    therefore of concern of Slovene intelligence services: terrorism, organised crime, illegal migration, the

    proliferation of weapons of mass destruction, the misuse and movement of dual purpose materials etc.

    Design/methodology/approach

    The survey on the representative sample of Slovene citizens (961) was conducted at the end of the

    year 2011. Trough the structured questionnaire authors examined the attitudes relating to souces of

    threat on transnational sources of threat and risk to national security of RS according to the Resolution

    on national security strategy of the Republic of Slovenia (passed in 2010).

    Findings

    Resolution on national security strategy of the Republic of Slovenia (passed in 2010) as the highest

    political and strategic document deals with internal and external security of the state and defines

    various sources of threat that could endanger the Slovenian society. To respond effectively to

    contemporary security threats and risks the state needs effective national security system and

    functioning and responsive national security structure that also understand the needs of citizens. As an

    important part of it are intelligence services that support decision making proceses with the

    acquisition, evaluation and timely dissemination of intelligence and security information.

    With the exception of organized crime other transnational sources of threat are in the opinion of

    Slovene citizens ranked as the least threatening to Slovenia. At first glance it is clear that traditionally

    most political discussed threat – terrorism – do not pose serious threat to Slovene citizens; however

    they are of opinion that the effective intelligence is second most important method in countering

    terrorism.

    Research limitations/implications

    The article is limited to Slovene security system and to the sources of threat with transnational origin

    that are politically defined in ReSNV-1. This paper is based on the Target research program named

    Feelings of Safety and the Role of Police in Local Security Provision that was initiated/suggested by

    Ministry of Interior RS and is supported by Slovene National Research Agency.

    Originality/value

    Security policy makers and writers of strategic documents will be able to get an insight into how the

    lay public (residents) percept the official, politically-defined sources of threat to national security. This

    could help them in designing security policies and strategies in the future.

    Keywords

    transnational sources of threat, intelligence; public opinion.

    Article Type

    Research paper

  • 15

    About the authors

    Bernarda Tominc, BA, Teaching Assistant at the University of Maribor, Faculty of Criminal Justice

    and Security. Her research interest includes international political and security integrations, security

    threats in contemporary society, national security systems. Contacts: Kotnikova 8, 1000 Ljubljana,

    Slovenia, phone: + 386 1 300 83 05, fax: + 386 1 230 26 87, email: [email protected].

    Andrej Sotlar, PhD, Assistant Professor in Security Systems at the University of Maribor, Faculty of

    Criminal Justice and Security. His main research fields of interests are: the structure of national

    security systems; security policy-making process; intelligence and security services; private security

    and relationship between public and private security/policing providers; terrorism. Contacts:

    Kotnikova 8, 1000 Ljubljana, Slovenia, phone: + 386 1 300 83 32, fax: + 386 1 230 26 87, e-mail:

    [email protected].

    mailto:[email protected]

  • 16

    The probative value of the results of monitoring communication privacy,

    derived from intelligence services

    Janez Ţirovnik

    Purpose

    The paper finds considerable ambiguity in the probative value of the evidence presented in the context

    of gaining control of the intelligence services, for the purpose of criminal proceedings, which would,

    in the absence of other evidence of quality, leading to the final judgment of conviction of criminals.

    Only a matter of time it was, when the law enforcement authorities, and consequently the court, in

    Slovenia, in the context of criminal proceedings, started to face the question of the probative value of

    the evidence presented in the context of control communication privacy gaining intelligence. The

    constitution and law in this area are more or less defined, but courts have so far been few observations

    on that intelligence is within their powers are not competent to act in criminal matters in the context of

    pre-trial procedure.

    But they all, state bodies and organizations, not only on the basis of regional criminal-procedural

    legislation but also on the basis of legislation governing intelligence required law enforcement

    agencies to provide information about the suspected offenses.

    The fundamental question that we answer in this paper is whether these data are among the findings

    that intelligence obtained in the exercise of its powers.

    Since such evidence is extremely difficult to obtain, especially in cases when it comes to organized

    crime gangs involved in serious crime (against life and body in the field of illicit drugs or the sex

    trade), the utility of such data, although it was not obtained for the purpose of criminal proceedings,

    particularly important.

    By analyzing the existing legislation will answer the question in the introduction, then the comparative

    method will determine how this area is regulated in comparable European countries and countries of

    the Western Balkans to the basis of this, of course, if necessary, to present a model change in the law

    on the one hand, maintain independence intelligence to intervene in the privacy of communication, on

    the other hand, as the subject of national security, which enable the law enforcement authorities to

    justify suspicion that the offense was committed and who the perpetrator to be brought to justice

    which will also take account of the evidence.

    Methodology

    The basic starting point is represented by the analyzes of the regulatory framework and accepted

    jurisprudence in the area of intervention of intelligence services in the communications privacy and of

    the comparative method of analysis of existing regulation in some European countries and the Western

    Balkan countries in which the obtained data of the intelligence services, which interfere with the

    communication privacy, they have probative value.

    Findings

    The fact is, that the intelligence services in Slovenia have statutory obligation, to report the offenses,

    for which they are informed in their work, to the competent authorities. In doing so, they also must

    attached relevant evidence. However, the evidence relating to interference with the communications

  • 17

    privacy of individuals in accordance with applicable law, and based on observations by the Supreme,

    as well as the Constitutional Court of the Republic of Slovenia, are cannot be used as evidence in

    criminal proceedings. That effectively means that the offender, because this is the evidence, which

    cannot be repeated, has an option to avoid the hand of justice.

    Originality

    The author comes to the conclusion that with the proper completion of the legal provisions on the

    preparation process model assessment intervention of intelligence in the human rights and

    fundamental freedoms can achieve that, exceptionally, as evidence in criminal proceedings, also

    served intelligence data by the latter obtained during intrusions in the human rights and fundamental

    freedoms.

    Keywords

    Intelligence services, communication privacy, special forms of data collection, monitoring of

    communication, standards of proof, evidence, criminal procedure, security.

    About the author

    Mag. Janez Ţirovnik has graduated at Faculty of Law in Maribor. In 2003 he achieved a Masters in

    the field of labour law and social security law. By 2007, he was employed in the Slovenian

    Intelligence and Security Agency in the legal department and as Deputy Director, in charge of

    logistics. He was a member of several interagency working groups in the field of intelligence and

    security operations, but it is also one of the authors of the Act on the Slovenian Intelligence and

    security Agency. In 2007 he was nominated as a judge in the civil division of the District Court in

    Maribor, where he works as well as a duty investigating judge. Since its establishment, he is taking

    part in the learning process at the Faculty of Logistics, University of Maribor as a senior lecturer. He is

    the author of several professional and scientific articles in the areas in which technical and vocational

    functioning.

  • 18

    Working methods of defense attachés in the Information Age

    Franc Ţeljko Ţupanič

    Purpose

    Working methods of defence attachés are likely to have changed in today‟s advanced information

    society and contemporary social conditions compared to their modus operandi from before a decade or

    more, mostly due to extensive usage of innovative information and communication technology. This

    contributes to more focal and accurate acquisition as well as faster and efficient delivery of

    information to the sending country. The research aims to show how working methods of defence

    attachés have changed by use of modern information technology techniques. The purpose of the

    research is that stakeholders (Civil Community) get acquainted with the development of attachés‟

    working methods.

    Methods

    Theoretical groundwork for this paper is a review of relevant sources on working methods of defence

    attachés, then on methods for collecting data and their sources, on reporting procedures of attachés and

    diplomatic ways of communication between competent ministry and diplomatic mission, and finally

    on information delivery and distribution.

    The interview research method was used, administering a structured questionnaire (systematic data

    collection) to survey former and active defense attachés.

    Findings

    Most of the interviewees share the opinion that contemporary means of communication help the

    defence diplomacy become much more independent, autonomous and specialized state service. The

    progress in the field of communications technology enables faster access to ever larger amount of data

    whereas the duty of an attaché is to filter and convey them thus adding added value for a sending

    country.

    Research Limitations/Implications

    As far as defence diplomacy is concerned the research results are significant in view of changing

    methodologies of work of defence attachés. The path remains open to further researching as the

    existing one is based only on three interviews of which only one defence attaché is still in service.

    This would confirm the results of this existing research and at the same time expand the research with

    a number of attachés on duty.

    Practical Implications

    Results have shown that the use of publicly available resources in the area of defence diplomacy is

    gaining importance, data accessability is faster, their quantity is augmenting and above all results can

    be quicker and repeatedly verified. Responsible people on such positions are to be directed into the

    search and acquisition of quality information and last but not least towards obtaining the knowledge in

    this field while modern information technology requires an upgrade of tactical approach to data

    acquisition from various public sources and to form information to be delivered.

    Originality/Value

    There is no similar research carried out to date in Slovenia. This paper reveals the actual status of

    public sources usage in defence diplomacy and at the same time directs to a deepened insight in the

  • 19

    field rapidly developing by means of information and communication technologies in a contemporary

    information society.

    Key words working methods of defence attachés, public sources, data collection, information and

    communication technology.

    About the author

    Mr Franc Ţeljko Ţupanič, Ph.D., graduated from the Air Force Academy in 1984, in the year 2003

    he successfully completed his Masters at the University of Westminster in London, and in 2011 he

    earned his Ph.D. from Faculty of Criminal Justice and Security in Ljubljana. At Faculty of Criminal

    Justice and Security he has obtained habitation as lecturer for the field of security system. He is the

    author of a number of professional and science articles. Momentarily, he is performing the duties of

    CEO of Slovenia Control, Slovenian Air Navigation Services, Limited. Throughout his career he

    occupied a number of managerial positions, among which: Director General of Civil Aviation at the

    Ministry of Transport of the Republic of Slovenia, Defence Attaché in Great Britain at the Embassy of

    the Republic of Slovenia in London, Assistant Chief of the Slovenian Air Force and Chief of

    Counterintelligence Department in Intelligence And Security Service at the Ministry of Defence. He

    has a rank of Air Force Colonel and is a professional pilot and flight instructor.

  • 20

    Part 2

    UNSTRUCTURED ABSTRACTS

  • 21

    Extending security intelligence with big data solutions

    Robert Boţič

    What is Security/Intelligence Extension?

    It‟s using big data technologies to augment and enhance traditional security solutions by analyzing

    new types (unstructured, streaming) and sources of under-leveraged data to significantly improve

    intelligence, security, and law enforcement insight.

    What are the drivers for an Security/Intelligence Extension use case?

    Need to analyze from existing & new sources (data in motion and at rest) to find patterns &

    associations

    Need for more up-to-date intelligence information (currency)

    Ability to predict, detect, act to network/computer security threats sooner

    Inability to analyze telco and/or social data to track criminal/terrorist activity

    Need to analyze data that is continuously generated such as video, audio, smart devices

    Organizations want to enhance their existing security/intel platforms to improve local national

    security, protect their borders, and prevent criminal/terrorist activity.

    About the author

    Robert Boţič has graduated at Faculty of computer sciences and information technology in Ljubljana.

    He has been working in IT industry for more than 15 years and in this period was engaged in many

    different IT projects. Last five years he is working in IBM Slovenia covering information management

    portfolio of IBM‟s solutions. Lately he took over IBM Big Data business in South East Europe where

    he is working with clients from different industries.

  • 22

    Information technology in domain of electronic intelligence

    Robert Brumnik, Sergii Kavun

    Summary

    Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis,

    interpretation and use of information. Thus, the intelligence services in the future created an electronic

    database in which to their being classified intelligence products, users could choose between the latter

    themselves relevant information. The European Union (EU) that activities are carried out from at least

    in year 1996, terrorist attacks in year 2001 is only accelerating. Proposals to increase surveillance and

    international cooperation in this field have been drawn up before 11 September 2011. On the web you

    can find a list of networks (Cryptome, 2011), which could be connected, or are under the control of the

    Security Service NSA (National Security Agency). United States of America in year 1994 enacted a

    law for telephone communication (Digital Telephony Act), which would require manufacturers of

    telecommunications equipment, leave some security holes for control. In addition, we monitor the

    Internet and large corporations. In the United States of America example of this action reveals the

    organization for electronic freedoms against a telecom company that the NSA illegally gain access to

    data on information technology users and Internet telephony. Also known are Chinese dissidents

    which were identified and arrested on the basis of data provided by the Chinese authorities to obtain

    from corporation Yahoo. Even Google has a history of bowing to pressure from China's censorship

    purpose of obtaining intelligence. Recently, however Facebook is the most frightening spy device that

    humanity has ever done. It consolidates information about people, their relationships, names,

    addresses, location, communication, relatives and all the available American intelligence (Assagne,

    2012).

    It is understood that the success of preventive counter-terrorism, surveillance authorities want as much

    control. Recently, however, these skills can be used to gain competitive advantage of countries and the

    increase in economic espionage. Until these trends should public policy and take some distance and

    oversized "appetites" of supervisors limited. The problem is, because the surveillance technology can

    also turn against the state. A controlling existing technology, which was created for the purposes of

    legal supervision, can be abused is a criminal or terrorist organizations. Typical examples were

    listening affair in Greece and Italy. In Greece, the attacker (probably the Secret Service, but also could

    criminal group) managed to exploit security vulnerability in module PBX (Private, Branch, Exchange)

    designed to lawful interception.

    Keywords

    intelligence and counterintelligence activities, electronic spy devices and methods

    About the authors

    Robert Brumnik holds Ph. D. from University of Maribor, Slovenia in 2011 at the Faculty of

    Management and Organizations Science, Department of Business and Working Systems. In year 2011

    he also holds Ph. D. from University of Maribor, Slovenia at the Faculty of Criminal Justice and

    Security, Department of Security Studies. He was appointed to the rank of Professor Assistant in 2012

    at the GEA College, Faculty for Business and Economic study in field of Informatics. He is accredited

    auditor of quality system standard ISO9001. He has participate and lead several research projects

    within the research group Metra (group code: 1685), where he is regularly employed. He has presented

  • 23

    papers at international conferences and in scientific journals. The articles and research works are on

    the topic of information security and organization.

    Sergii Kavun holds Ph. D. from Kharkiv Military University, Ukraine in 2000 at the Faculty of

    Automatic Control System, Department of Computation System and Network. Since 2003, he also

    holds Ph. D. from Kharkiv National University of Economics, Ukraine at the Faculty of Economical

    Information, Department of Computer Systems and Technologies. He was appointed to the rank of

    Associated Professor in 2005 at the Kharkiv National University of Economics, Faculty of Economical

    Information in field of Information systems. He is accredited specialist of management information

    security by standard ISO 17799:2005 (ISO 27002:2005). He has participate and lead several research

    projects within the Kharkiv National University of Economics (registry code: DR 0107 U 007226, DR

    0109 U 007022, DR 0111 U 003026), where he is regularly employed. He has presented more than

    100 papers at international conferences and in scientific journals, also 3 patents. The articles and

    research works are on the topic of information and economic security.

  • 24

    Provisioning of uniform lawful interception solution in data networks

    Simon Čimţar, Miro Udir

    Abstract

    The contribution describes the challenge how to provide uniform lawful interception in data networks,

    within the specific requirements of some country specific requirements. The fact is that in some

    countries (e.g. CIS countries) the regulatory bodies do not follow the LI based on ETSI infrastructure

    and its requirements – they specify the specific requirements which may differ to the standards. The

    relation between network operator and lawful interception agency is specific and this requires different

    way of information collection and storage. The regulatory bodies require interception based on various

    parameters (from network connectivity to application′s parameters) which may not be easily

    supported. The preferred way of interception is the “passive model” by means of mirroring all traffic,

    not to influence the information flow and performances of operator‟s network.

    LI agencies prefer uniform realization of the requirements – this means one single approach for

    different types of operators which can be mobile, fixed or convergent. The operators may use different

    data traffic delivery models (e.g. GTP, PPPoE, IPoE) and various user identification mechanisms.

    Modern data network is dynamic, but all the network changes which may have an impact on the

    quality of interception must be identified and corrective measures are to be taken. In comparison the

    pure voice interception from the past, now the amount of data is much bigger and the collected data

    can be in very different formats (voice, video, data transfer, hyperlinks,…).

    The proper answer to this requirements and challenges is the modular solution architecture. The

    solution consists of:

    taps for real-time information collection,

    two step of filtering including advanced DPI modules for efficient filtering,

    modular mediation device for interaction and interoperability with other network elements.

    The contribution describes the building blocks of the solution and possible application scenarios in the

    networks. The efficiency of the solution can be improved by the regulatory requirements changes,

    which are proposed, too.

    However, the solution architecture is future oriented as further technology development and changed

    ways of communications bring new challenges which are to solved, too. Such examples are social

    networks and services of OTT (over-the-top) operators.

    About the authors

    Simon Čimţar is Product manager in the Iskratel's product line Intelligent Access. He is responsible

    for introducing new access product to the market and for developing in Iskratel. He has expert

    knowledge in networking technologies and holds several certificates from Cisco. In the latest time he

    is member of the expert team which is involved in developing of IP LI solution for CIS market.

    Miro Udir is Product Line Manager in the Iskratel's product line Multimedia Core. He is dealing with

    Iskratel core products for NGN and IMS solutions (SI3000 Call Server, SI3000 Signalling and Media

    Gateways, Lawful Interception and others). In the past he was responsible for the integration of

    various own and partner products into complex end-to-end solutions (NGN, Broadband, IPTV). He

  • 25

    was also involved in preparation of operator solutions for business users based on IP Centrex. Before

    moving to the Product Management, he was working in R&D, being responsible for different

    application and functional areas (e.g. Centrex, ISDN). He has experiences in the area of NGN, hosted

    solutions for business users, solution integration, network migration and convergence. Miro Udir has

    graduated on the Faculty for Electrical Engineering from the University of Ljubljana in 1989.

  • 26

    Technology of capturing and converting mass data from social networks

    Matevţ Gačnik

    Summary

    The most advanced technologies for capturing, processing, storing and analyzing messages from

    computer systems are so called "Big Data" solutions, which are among the most promising future IT

    trends. If we define big data as the data volume, variety and velocity that exceeds an organization‟s

    ability to independently and timely manage them, we find out that advanced solutions for big data are

    becoming crucial in most industries. We present an innovative solution with flexible infrastructure and

    high performance with possibilities of advanced analytics and big data management.

    Gama System® PerceptionAnalytics (GS PA) is connecting the various systems that so far haven‟t

    been able to communicate with each other, with enabling common denominator for communication in

    both directions. Systems for sending and receiving messages link up and GS PA captures a great

    number of data in an extremely short period of time. Hosting in the Microsoft cloud on four continents

    provides unlimited scale of processing and data storage without slowing activity. Therefore, solution

    application to social networks enables to capture and interpret key information of required area in real-

    time.

    So, GS PA enables monitoring of public perception through social networks. When we define search

    criteria as combination of key words and other definition, solution generates an archive of information

    that are stored and can be interpreted in any kind of analyses an used in any way. When entering new

    search criteria, solution provides thousands of last hits for the search and takes every new one in real-

    time. By analyzing the vocabulary and other characteristics of writing inside the hit results, the

    advanced sentiment analysis with classification process reveals if emotions in individual posts are

    positive, negative or neutral. That is achieved with machine learning techniques, which are continually

    improving.

    In a time when most of the communication takes place online and social networks allow fast

    information dissemination, we must be able to detect relevant information that can be spread globally

    within a few hours. The true value of big data lies in their real-time interpretation into information,

    that are fundamental for hast, fact based and correct decision.

    GS PA enables immediate access to all global conversation, very accurate sentiment and other

    analyses: hit count, reach, unique users and location that are continuously made in real-time. This

    generates accurate and timely visualized information, no matter how complex the search criteria.

    While designing the solutions, the company Gama System also considered the most common potential

    bias and manipulation.

    Key words

    Social networks, massive data, big data, data capture, data processing

    About the author

    Matevţ Gačnik is an author of numerous technical articles and books on services and solution

    architectures. He has well over a decade of experience as an architect and systems designer. Matevž is

    a frequent speaker at conferences and other public events. Most of his work includes architecture,

  • 27

    review and design, training and technology drilldown. He specializes in the middle tier, performance,

    XML related syntaxes, web services and the core development runtimes. Matevž is a Microsoft Most

    Valuable Professional and a Microsoft Regional Director for Slovenia.

  • 28

    Open sources in the intelligence and security

    Irena Kranjc

    Abstract

    The public sources in the modern information society can be accessed, here and now. A series of

    monographic publications, scientific studies and achievements from various fields, containing a

    multitude of data, information and knowledge, which appear in other works and are published, are

    frequently without any additional and new value.

    The article attempts to investigate the background and facts about an unsettled issue; the investigation

    is based solely on the published data and information; and it is multidisciplinary as it is an attempt to

    examine the unsettled issues by means of certain theories from several sciences. The research involves

    in a logical way certain elements of communicology, law, and history science as well as defence

    science and sociology in order to join them up with public sources in the intelligence and security

    activity. Some methods of work in the intelligence and security field are very similar with the

    investigative journalism, but not equally.

    One of the aims of the doctoral dissertation is to link theory with practice and present a useful product,

    especially the CDA (critical discourse analysis) and journalistic contributions whose subject relates to

    the intelligence and security activity, and especially to the research of public ie open sources in the

    intelligence and security activity with a proposal to use a new intelligence cycle and give stress to the

    research of analytical contents of information that produces a new text, intelligence based on public

    sources (OSINF). Here is a proposal for an amended ie supplemented Fairclough‟s model for

    producing information as a type of reporting, particularly for the needs of expert work in the

    intelligence and security field.

    Key words

    open sources (OSINT), CDA (critical discourse analysis), investigative journalism

    About the author

    Irena Kranjc, born in 1961 in Ljubljana, Ph.D., began his career in education field and continued in

    the state service. She graduated first in the Faculty of Education and then at the Faculty of Social

    Sciences, with a thesis entitled Thematic information for specific subscribers. Among the first is a

    pioneer in exploring open sources in the intelligence profession, to which she devoted more than 15

    years. Theory and practice of OSINT is attempting to connect and develop into practice. Her research

    work has been shown in her master ̓ s work, entitled “Obvious and veiled in public” (FSS, Ljubljana)

    and the doctoral disertaion “Media Representations of interstate conflict in the selected type” on

    Faculty of State and European Studies in Brdo. She continue with lectures and contributions to

    participate in conferences and mentoring to interested students.

  • 29

    Real-time public opinion monitoring - a modern way of understanding

    public opinion and mood

    Mojca Perić

    Summary

    The purpose of this paper is to present a new option of public opinion monitoring, completely different

    from the existing methods, which is searching to find its place in the complementarity or even

    replacement of current methods for identifying public opinion. The goals are to present this new way

    of real-time public opinion monitoring as the most modern approach of understanding public opinion

    and mood and present the relevance and usefulness of obtained results - information.

    We monitor public opinion in real-time with a new, innovative solution Gama System®

    PerceptionAnalytics (GS PA) which provides quality insight into public perception by following social

    networks. After creating simple or complex search criteria the solution provides advanced analyses,

    such as: sentiment, content analyses, word clouds and others. With a descriptive method, we explain

    how the solution helps to understand trends, opinions, mood and other perception in wider society.

    In comparison with existing studies we have no control over the composition of the sample that

    generates GS PA analyses, but on the other hand, the sample is incomparably greater and is increasing

    with every day. The fact is that even the most sophisticated methods of detecting public opinion can

    fail, which was also the case in 2012 presidential elections in Slovenia. On that opportunity GS PA

    was the only solution that correctly evaluated the sentiment and public opinion in both rounds of the

    election.

    Real-time public opinion monitoring with fast, accurate and reliable information, provided by GS PA

    analyses, assures the appropriate support on decision-making and timely responding, as well as fact-

    base planning in many different sectors and industries. Governmental organizations (intelligence

    agencies, police, etc.), media and other companies can use such information for: early warning system,

    crisis management, strategic and communication planning, understanding the competition, identifying

    trends and for numerous other purposes.

    The solution ensures unbiased and authentic information because this way of identifying public

    opinion is not stimulated by the interviewer but is expressed spontaneously and dedicated to one's

    social network. Such opinion does not exist in a vacuum, but has a wide reach and impact. Exploring

    the depth of semantics of web communication is the next big challenge for government agencies,

    media and companies that want to understand the environment in which they operate and Slovenian

    company Gama System is one of the first companies accepting that challenge.

    Keywords

    Social networks, public opinion, real time analysis, sentiment, public perception

    About the author

    Mojca Perić is a bachelor of Economic Science. As an associate consultant and project manager she

    worked in the field of strategic management and business excellence in several well-known Slovenian

    companies and she has experiences with service and product development. She is a licensed business

    excellence assessor and awarded with “Feniks” recognition for the best management consulting

  • 30

    project by the Chamber of Commerce and Industry of Slovenia. She also works as a technical assistant

    for Strategic management at the Faculty of Economics, University of Ljubljana.

  • 31

    Open sources information for improvment of public safety

    Aleksander Pur, Robert Djuras

    Abstract

    In general, we do not like that even our publicly available Tweets are systematically monitored and

    analysed, but in some events such as big incidents, we want that our published information on social

    networks can help emergency services.In this presentation we will discuss a concept of information

    systems that can improve the efficiency of emergency services by providing open source information

    from social media such as Twitter and Facebook, and other public sources, during incidents. These

    systems analyse open source information in order to help in early identification of big incidents and

    useful information, as well as disseminate the information among emergency services such as Police,

    Fire department, and Emergency medical service. Thus, there are at least three problems. The first one

    is aimed at techniques for early identification of incident. The second problem is automatic gathering

    and analyses of relevant information during the incident. Considering that open source information are

    usually semi-structured the incident identification, data gathering, and analyses can be improved by

    various Data Mining and Text Mining techniques, as well as rule based assessment models. The third

    problem is comprehensive and comprehensible dissemination of useful information related to

    incidents. Thus, we suggest the usage of advanced data visualization techniques. In the presentation

    we will show our suggestions related to these problems and examples how these systems can

    contribute to public safety.

    About the authors

    Robert Djuras is working in General Police Directorate in Application Development Division as

    Software engineer. His work is aimed at developing and implementing internet/intranet portals,

    searching tools and web applications, using mostly Java and PHP languages. During his work he try to

    use open source tools. He attended the Jožef Stefan International Postgraduate School and where he

    currently working on master's thesis in the field of decision support and text analysis.

    Aleksander Pur is working in General Police Directorate in Applications Development Division as

    Police Superintendent. His work is aimed at developing and implementing of information systems

    based on data exchange, data analyses, DSS, and E-learning systems. He completed his PhD in data

    analyses and DSS techniques, on the field of health care system.

  • 32

    Direct implementation of the security function in intelligence system

    Milan Mijalkovski, Vesela Radović, Duško Tomić

    In turbulent conditions of social and political life of one country, the security issue arises as the

    primary strategic goal of all citizens and institutions. However, security is a category that implies a

    critical and responsible attitude towards intern values and interactive relationship with extern, direct or

    indirect, environment. Security organisation of one country is extremely complex and diverse area that

    requires systematic organization in order to preserve the stability, sovereignty and territorial integrity

    of a country, its policy and its citizens.

    An aspect that is not usually visible to general public but that greatly contributes to stability and safety

    of a country and its citizens, involves simultaneous work of intelligence and counterintelligence

    services. Modern theory and practice of safety management is based on large number of preventive

    and reactive methods that can successfully remove all threats that could seriously damage the

    confidentiality of the state and its established values.

    This paper aims to highlight, on documentary basis, the main characteristics of the intelligence

    security system of one country and to clearly analyze the structural relationships that occur within it.

    Therefore, the main theme that is discussed refers to definition of direct implementation of the security

    function in much wider intelligence system. As well, the intention of the authors was to point out all

    the strengths and weaknesses of existing operational models of intelligence and counterintelligence

    service and to draw attention to the prevention and suppression of espionage activities in one country.

    Relying on that, alternatives for proper and professional data base protection were offered and the

    importance of counterintelligence assessment of security service is analyzed.

    Key words: safety, intelligence, operational activity, operational analysis of intelligence systems and

    services, protection of state security

    About the authors

    Milan Mijalkovski, PhD, Professor Mijalkovski has finished elementary and high school (1966) in

    Kriva Palanka and after that he graduated on the Military Academy (Ground Defense), Belgrade

    (1970). In 1990 he completed the highest Military School of National Defense. In 1988 professor

    Mijalkovski has completed postgraduate studies on the Military Academy KoV, JNA in Belgrade and

    on 2000 he completed his PhD. thesis on the Military Academy VJ, Belgrade.

    Vesela Radovic was born in Kosovska Mitrovica, and lives in Novi Sad . Dr. Radovic has an MPH in

    fire safety protection and a PhD in safety, protection and defense. She also completed postdoctoral

    education in the area of disaster management, environmental protection and risk communication, at

    Tulane University , New Orleans , Louisiana , USA . Dr Radovic has a long record of experience in

    the area of disaster management in Serbia and abroad. The major area of her work and research is

    focus was on public policy making and linkage emergency preparedness and environmental

    protection. She is currently working as an assistant professor at the Faculty of Environmental

    Protection, University EDUCONS, Sremska Kamenica, Vojvodina, Serbia and participaten numerous

    scientific projects (TEMPUS, IPA, PPES, NATO Program: Science for Peace and Security and few

    projects financed by the Ministry of Science and Education).

    Duško Tomić, PhD, Faculty of Applied Security, Educons University, Sremska Kamenica, Serbia

  • 33

    The importance of Business Intelligence and its application in the

    companies in the region of Western Balkans

    Dragan Trivan

    Abstract

    The reasons for writing this work are existing ambiguities and disagreements about the importance,

    role and practical application of Business Intelligence in the operations of companies in the Republic

    of Serbia and countries surrounding it. Having in mind that corporate security itself is still the subject

    of controversial interpretations in this region, analyzing Business Intelligence, as one of its least

    known segments in public, becomes more significant. The work and previous empirical research in

    Serbia, have demanded application of different scientific methods (historical-comparative method,

    case study, content analysis, testing). It is established that certain jobs which can be linked to Business

    Intelligence are performed at business enterprises in the Republic of Serbia and other countries of

    Western Balkans, but who and in which way collects business information is disputable. The findings

    also do not indicate that within framework of the system of corporate security in the companies from

    this region there are separate organisational units having competence over Business Intelligence jobs.

    The results of research support the assumption that for a wider application in the Western Balkans a

    higher level of overall development, reduction of state influence in the economy, greater market

    openness, efficient legislative framework, higher level of business ethics and application of e-business

    are needed. The obtained information can be also used by competent authorities in Serbia aimed at

    establishing European standards and redefinition of legal and practical starting points related to the

    position of corporate security in the national security system. The significance of the work also lies in

    the fact that there have been just a few studies in the Western Balkans until now on the subject of

    application of Business Intelligence in the corporate security system.

    Key words

    Business Intelligence, corporation, corporate security, Serbia, Western Balkans.

    About the author

    Dragan Trivan, PhD in Security and Protection Studies, Assistant Professor at the Faculty of Security

    Studies in Banja Luka , the Faculty for Detectives and Criminology in Skopje and the Academy for

    Economy and Security in Belgrade. He is the President of Serbian Association of Corporative

    Security Managers . He is the author of three monographs ( „Corporative Security“, “Corporative

    Security Systems” and „Private Security – the Basics of Physical and Technical Security“) and a

    number of papers presented at the national and international conferences and published in domestic

    and foreign journals.