Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation
Author(s): COMAN, Iulian Marius
Author(s) keywords: communications, cooperation, cyber community, intelligence, risks, technology
Reference keywords: cyber intelligence, risk management
Abstract:
Technology has become the Intelligence Community’s new reliability, as well as its new challenge. The new transnational adversaries – international terrorists foremost among them – the flood of new information technologies, the easing of export controls on encryption technology and global access to the Internet, has led the security agencies to charting new directions in identifying, gaining access to and successfully exploiting target communications, through cooperation with all related bodies.
References:
[1]. Gheorghe Nicolaescu, "The role of intelligence services in the investigation, management and monitoring of crises", Academy of High Military Studies
[2]. “Information war”, http://www.armyacademy.ro/buletin/2_2000/articol5.html
[3]. “Technology and intelligence in military conflicts”, National University of Defence, CSSAS, V.Popa
[4]. “Forbes Romania” magazine, https://www.forbes.ro/articles/forbes-heroes-editia-2018-pe-frontul-securitatii-informatice-122344
[5]. “Infosfera”, Revision of Security Studies and Defense Information, Quarterly Review edited by the General Intelligence Directorate, I.S.S.N. 2065 – 3395
[6]. Cristian Troncotă, “Neliniştile insecurităţii”, Tritonic, Bucharest, 2004
[7]. Caplan, J. M. & Kennedy, L. W. (2010). Risk Terrain Modeling Manual. Newark, NJ: Rutgers Center on Public Security.
[8]. Center for Strategic Defense and Security Studies, http://cssas.unap.ro/
[9]. Gheorghe Nicolaescu, Course support,
[10]. Mireille Rădoi, Course support, National College of Defence
[11]. Cristian Troncotă, Horaţiu Blidaru, The creation of the European Intelligence Community - a possible solution to the challenges of the Millennium in the security plan
[12]. Custers, B. (2012). Technology in policing: Experiences, obstacles and police needs. Computer Law & Security Review, 28(1), 62-68.
[13]. European Security and Defense Policy, Department for Euro-Atlantic Integration and Defense Policy, Ministry of Defence, 2006
[14]. Graham Messervy Whiting, Intelligence cooperation in the Euroepan Union, în The politics of european security, Jess Pilegaard, ed., Danish Institute for International Studies, 2004
[15]. http://cebcp.org/wp-content/technology/ImpactTechnologyFinalReport.pdf
[16]. https://studiidesecuritate.wordpress.com/2011/04/13/sistemul-de-intelligence-in-ue/
[17]. https://www.dhs.gov/sites/default/files/publications/2018_AEP_Emerging_ Technology_and_National_Security.pdf
[18]. https://www.interpol.int/en/INTERPOL-expertise/Data-exchange/I-link
[19]. https://www.interpol.int/INTERPOL-expertise/Data-exchange/I-24-7
[20]. J.Chan, D. Brereton, M. Legosz, S.Doran – The impact of information technology on police practices, 2001
[21]. Muller Wille, Bjorn, For our eyes only? Shaping an intelligence community within the EU, Occasional paper no 50, ianuarie 2004, EU Institute for Security Studies
[22]. NATO - Communications and Information Agency, https://www.ncia.nato.int/Our-Work/Pages/Joint-Intelligence-Surveillance-and-Reconnaissance.aspx
[23]. Political analysis „ Analysis of the National Security Strategy of Romania”, „Ovidiu Şincai” Institute
[24]. Press releases of the Romanian Intelligence Service, http://www.sri.ro/subpagini/340/comunicat-de-presa.html
[25]. Resnyansky, L. (2009) ‘The Internet and the changing nature of intelligence’, IEEE Technology and Society Magazine, 28, 1, pp.41-7.
[26]. Resnyansky, L., 2010, ‘The role of technology in intelligence practice: linking the developer and the user perspectives’, Prometheus, vol. 28, no. 4, pp. 361-374
[27]. „Intelligence”, Romanian Intelligence Service
[28]. Roundtable on "Society, Democracy and Intelligence", General Statement (r) Sergiu Medar, http://www.scribd.com/doc/11833839/Transformarea-serviciilor-de-informaii-in-contextul-actual
[29]. Stratfor, Geopolitical Intelligence Platform, www.stratfor.com
[30]. Subrahmanian, V.S., Reforgiato, D. (2008) “AVA: adjective-verb-adverb combinations for sentiment analysis,” IEEE Intelligent Systems, 23, 4, pp. 43-50
[31]. The National Defense Strategy of Romania 2015-2019, www.presidency.ro/files/userfiles/Strategia_Nationala_de_Aparare_a_Tarii_1.pdf
[32]. North Atlantic Treaty, NATO Intelligence Doctrine
[33]. Troncotă, Cristian, Information Architecture at European Union level, course, Modern Information Communities, National Intelligence Academy, 2009
[34]. MOD’s Strategic Trends Programme Future Character of Conflict (FCOC) and Global Strategic Trends-Out to 2040 (4th Edition) promulgated by DCDC
Article Title: Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation
Author(s): COMAN, Iulian Marius
Date of Publication: 2018-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2018.01.03
Issue: Volume 7, Issue 1, Year 2018
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 32-36 (5 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.