• Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation

    Author(s): COMAN, Iulian Marius

    Quick view | Full article | Citations | Views: 256

    Author(s) keywords: , , , , ,

    Reference keywords: ,


    Technology has become the Intelligence Community’s new reliability, as well as its new challenge. The new transnational adversaries – international terrorists foremost among them – the flood of new information technologies, the easing of export controls on encryption technology and global access to the Internet, has led the security agencies to charting new directions in identifying, gaining access to and successfully exploiting target communications, through cooperation with all related bodies.


    [1]. Gheorghe Nicolaescu, "The role of intelligence services in the investigation, management and monitoring of crises", Academy of High Military Studies

    [2]. “Information war”, http://www.armyacademy.ro/buletin/2_2000/articol5.html

    [3]. “Technology and intelligence in military conflicts”, National University of Defence, CSSAS, V.Popa

    [4]. “Forbes Romania” magazine, https://www.forbes.ro/articles/forbes-heroes-editia-2018-pe-frontul-securitatii-informatice-122344

    [5]. “Infosfera”, Revision of Security Studies and Defense Information, Quarterly Review edited by the General Intelligence Directorate, I.S.S.N. 2065 – 3395

    [6]. Cristian Troncotă, “Neliniştile insecurităţii”, Tritonic, Bucharest, 2004

    [7]. Caplan, J. M. & Kennedy, L. W. (2010). Risk Terrain Modeling Manual. Newark, NJ: Rutgers Center on Public Security.

    [8]. Center for Strategic Defense and Security Studies, http://cssas.unap.ro/

    [9]. Gheorghe Nicolaescu, Course support,

    [10]. Mireille Rădoi, Course support, National College of Defence

    [11]. Cristian Troncotă, Horaţiu Blidaru, The creation of the European Intelligence Community - a possible solution to the challenges of the Millennium in the security plan

    [12]. Custers, B. (2012). Technology in policing: Experiences, obstacles and police needs. Computer Law & Security Review, 28(1), 62-68.

    [13]. European Security and Defense Policy, Department for Euro-Atlantic Integration and Defense Policy, Ministry of Defence, 2006

    [14]. Graham Messervy Whiting, Intelligence cooperation in the Euroepan Union, în The politics of european security, Jess Pilegaard, ed., Danish Institute for International Studies, 2004

    [15]. http://cebcp.org/wp-content/technology/ImpactTechnologyFinalReport.pdf

    [16]. https://studiidesecuritate.wordpress.com/2011/04/13/sistemul-de-intelligence-in-ue/

    [17]. https://www.dhs.gov/sites/default/files/publications/2018_AEP_Emerging_ Technology_and_National_Security.pdf

    [18]. https://www.interpol.int/en/INTERPOL-expertise/Data-exchange/I-link

    [19]. https://www.interpol.int/INTERPOL-expertise/Data-exchange/I-24-7

    [20]. J.Chan, D. Brereton, M. Legosz, S.Doran – The impact of information technology on police practices, 2001

    [21]. Muller Wille, Bjorn, For our eyes only? Shaping an intelligence community within the EU, Occasional paper no 50, ianuarie 2004, EU Institute for Security Studies

    [22]. NATO - Communications and Information Agency, https://www.ncia.nato.int/Our-Work/Pages/Joint-Intelligence-Surveillance-and-Reconnaissance.aspx

    [23]. Political analysis „ Analysis of the National Security Strategy of Romania”, „Ovidiu Şincai” Institute

    [24]. Press releases of the Romanian Intelligence Service, http://www.sri.ro/subpagini/340/comunicat-de-presa.html

    [25]. Resnyansky, L. (2009) ‘The Internet and the changing nature of intelligence’, IEEE Technology and Society Magazine, 28, 1, pp.41-7.

    [26]. Resnyansky, L., 2010, ‘The role of technology in intelligence practice: linking the developer and the user perspectives’, Prometheus, vol. 28, no. 4, pp. 361-374

    [27]. „Intelligence”, Romanian Intelligence Service

    [28]. Roundtable on "Society, Democracy and Intelligence", General Statement (r) Sergiu Medar, http://www.scribd.com/doc/11833839/Transformarea-serviciilor-de-informaii-in-contextul-actual

    [29]. Stratfor, Geopolitical Intelligence Platform, www.stratfor.com

    [30]. Subrahmanian, V.S., Reforgiato, D. (2008) “AVA: adjective-verb-adverb combinations for sentiment analysis,” IEEE Intelligent Systems, 23, 4, pp. 43-50

    [31]. The National Defense Strategy of Romania 2015-2019, www.presidency.ro/files/userfiles/Strategia_Nationala_de_Aparare_a_Tarii_1.pdf

    [32]. North Atlantic Treaty, NATO Intelligence Doctrine

    [33]. Troncotă, Cristian, Information Architecture at European Union level, course, Modern Information Communities, National Intelligence Academy, 2009

    [34]. MOD’s Strategic Trends Programme Future Character of Conflict (FCOC) and Global Strategic Trends-Out to 2040 (4th Edition) promulgated by DCDC

    Additional Information

    Article Title: Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation
    Author(s): COMAN, Iulian Marius
    Date of Publication: 2018-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2018.01.03
    Issue: Volume 7, Issue 1, Year 2018
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 32-36 (5 pages)

    Copyright ©2012-2023
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.