Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
The 1st international academic conference on intelligence and
security
Contemporary Intelligence Support Systems
Conference Proceedings
Editors:
prof. dr. Iztok Podbregar
Blaţ Ivanc
Marija Umolac
1
University of Maribor
Faculty of Criminal Justice and Security
The 1st international academic conference on intelligence and security
Contemporary Intelligence Support
Systems
Conference Proceedings
Ljubljana, Slovenia, March 2013
2
This publication was published in March 2013 by the Faculty of Criminal Justice and
Security, University of Maribor, Kotnikova 8, 1000 Ljubljana, Slovenia.
To publikacijo je marca 2013 izdala Fakulteta za varnostne vede, Univerza v Mariboru,
Kotnikova 8, 1000 Ljubljana, Slovenija.
Editors/chairs of the conference:
prof. dr. Iztok Podbregar (conference director)
Blaž Ivanc (professional head of the conference)
Marija Umolac (conference secretary)
ePublishing/E-publikacija: http://www.fvv.uni-mb.si/ovd2013/zbornik.pdf
The editors are grateful to the authors for their contributions and effort.
Uredniki se zahvaljujejo avtorjem za njihove prispevke.
Disclaimer: Contributions have not been reviewed - the authors are fully responsible for the content.
Opomba: Avtorje in udeležence konference organizacijski odbor obvešča, da prispevki niso
lektorirani in so za vsebino in angleški jezik odgovorni avtorji sami.
CIP - Kataložni zapis o publikaciji
Narodna in univerzitetna knjižnica, Ljubljana
351.78(082)(0.034.2)
INTERNATIONAL AcademicConference on Intelligence and Security (1 ; 2013 ; Ljubljana)
Contemporaryintelligencesupportsystems [Elektronski vir] : conferenceproceedings / The 1st
InternationalAcademicConference on IntelligenceandSecurity, Ljubljana, Slovenia, March 2013 ;
[editors Iztok Podbregar, Blaž Ivanc, Marija Umolac]. - El. knjiga. - Ljubljana : FacultyofCriminal
Justice andSecurity, 2013
ISBN 978-961-6821-37-7 (pdf)
1. Gl. stv. nasl. 2. Podbregar, Iztok
266188544
http://www.fvv.uni-mb.si/ovd2013/zbornik.pdf
3
Program Committee
Iztok Podbregar, PhD, Full Professor, University of Maribor
Matjaž Mulej, PhD, PhD, Professor Emeritus, University of Maribor
Bojan Dobovšek, PhD, Associate Professor, University of Maribor
Dario Matika, PhD, Colonel Professor, IROS, Zagreb
Martin Rudner, PhD, Professor Emeritus, Carleton University, Ottawa
Goran Mandić, PhD, professor, University of Belgrade
Blaž Ivanc, Independent Researcher, Jožef Stefan IPS
Organizing Committee
Iztok Podbregar, PhD, Full Professor, University of Maribor
Branko Lobnikar, PhD, Associate Professor, University of Maribor
Maja Jere, assistant, University of Maribor
Blaž Ivanc, Independent Researcher, Jožef Stefan IPS
Marija Umolac, Demonstrator
Conference Director Iztok Podbregar, Ph.D., Full Professor
Professional Head of the Conference Blaž Ivanc
Conference Secretary Marija Umolac
4
TABLE OF CONTENTS
Part 1: STRUCTURED ABSTRACTS ............................................................................................................ 5
Denis Čaleta, Anita Perešin, Strategic security decision-making process in the corporate
environment using open sources information .................................................................................... 6
Adriana Dvoršak, Application of principles of international law to computer networks operations
management ....................................................................................................................................... 8
Maj Fritz, Andrej Sotlar, Jaroš Britovšek, Private Military/Security Companies and Intelligence ...... 9
Gašper Hribar, Teodora Ivanuša, OSINT as a 'grey zone'? ........................................................... .....11
Blaž Ivanc, Modeling of offensive computer-network operations by using an advanced structural
model ................................................................................................................................................. 12
Dražen Škrtid, Lawful interception: European Union legal framework ............................................. 13
Bernarda Tominc, Andrej Sotlar, Public opinion on the Transnational Sources of Threat to National
Security .............................................................................................................................................. 14
Janez Žirovnik, The probative value of the results of monitoring communication privacy, derived
from intelligence services .................................................................................................................. 16
Franc Željko Županič, Working methods of defense attachés in the Information Age ..................... 17
Part 2: UNSTRUCTURED ABSTRACTS ..................................................................................................... 20
Robert BožičExtending security intelligence with big data solutions ............................................... 21
Robert Brumnik, Sergii Kavun, Information technology in domain of electronic intelligence ......... 22
Simon Čimžar, Miro Udir, Provisioning of uniform lawful interception solution in data networks .. 24
Matevž Gačnik, Technology of capturing and converting mass data from social networks ............. 26
Irena Kranjc, Open sources in the intelligence and security ............................................................. 28
Mojca Perid, Real-time public opinion monitoring - a modern way of understanding public opinion
and mood .......................................................................................................................................... 29
Aleksander Pur, Robert Djuras, Open sources information for improvment of public safety .......... 31
Milan Mijalkovski, Vesela Radovid, Duško Tomid, Direct implementation of the security function in
intelligence system............................................................................................................................32
Dragan Trivan, The importance of Business Intelligence and its application in the companies in the
region of Western Balkans ................................................................................................................ 33
5
Part 1
STRUCTURED ABSTRACTS
6
Strategic security decision-making process in the corporate environment
using open sources information
Denis Čaleta, Anita Perešin
Purpose
Globalization of the world and the globalization of security indirectly confront modern society with
the difficult dilemma, how to continue its development based on the basic postulates of the free
movement of goods, services and people but on the other hand, to mitigate threats to an acceptable
level of risk. Asymmetric threats to national and international security arise from completely different
basic concepts of safety assumptions and perceptions which we used to recognize in the past.
Globalization in its essence is driven primarily by economic factors, which largely reflected through
the interests of big multinational corporations. They are in a constant need for expansion and revenue
growth is always looking for new markets. In this article we are planning to further defines some
important dilemmas and factors related to the role of supporting strategic decision-making process
with the help of intelligence analysis based on the data and information derived from publicly
available sources. The purpose of this paper is also to analyze the factors that occur in the interaction
between public and private environments, especially in terms of user intelligence products. We are
located in a period where certain corporations in the wind of globalization processes outgrown the
exclusive influence of nation-states. Important information is increasingly becoming a tool in the
hands of multinational corporations in achieving their strategic objectives. Corporate security
environment aims at maximizing risk, which could adversely affect the continuity of the underlying
business processes of the organization. Intelligence process, which is based primarily on the collection
of information from publicly available sources, is becoming an effective tool in the hands of strategic
management which plans and promotes its strategic interests of corporations. These include corporate
security factors.
Design/Methods/Approach
The paper will use more scientific methods, which are necessary for a thorough analysis of the subject
matter and explain new findings. We are planning to use a historical, descriptive and analytical
method by which we thoroughly analyze the current state of discussion. The final stage of verification
process of pointed problem we will use inductive and deductive method. Theoretical knowledge will
be further examined by undertaking interviews with selected representatives of the corporate strategic
management.
Findings
Findings will certainly focus on intelligence analysis processes which are in accordance with the legal
basis and avails itself of useful tool for strategic management in the corporate environment. Special
emphasis will be put to analysis of public-private relations in the field of cooperation in the exchange
of important security information. In this respect we are interested in particular in the key information
which has a significant impact on the provision of adequate security environment. Stable security
environment is in the interest of national security authorities, as well as corporations that operate in
this environment. Another important findings leads in the way of usefulness of intelligence analysis
for strategic management decisions process and their quality of data derived from public sources.
These facts are critical in the process of Critical Infrastructure protection where we have public and
also private management.
7
Research Limitations/Implications
Exploring such a sensitive subject, which on the one hand affect the mechanisms put in place in
corporations, on the other hand is touching national classified information is always challenging due to
fact that these data are labeled with different classification levels and as such are not accessible to the
wider research activity. Because of the wider field of research we will focus on the region of SE
Europe, of course with applications and comparison with the broader international environment.
Practical Implications
The applicability of the research results, approaches and new knowledge will be very applicable in the
current corporate environment in the region. On the one hand, these models will be usable to obtain
information from public sources, which will be an appropriate basis for strategic decisions making
process of management. On the other hand, will be useful base of information and the appropriate
signal indicator, especially for corporate-security experts where are those channels through which the
corporations reach a lot of important data that can be in the long-term damageable in the severe
competitive struggle in the global marketplace.
Originality/Value
In the region of Southeast Europe have not yet been traced similar scientific contributions that are
specifically dealt with this issue from the perspective of efficiency of collecting information from
publicly available sources and their use in the corporate environment. An important fact is certainly
present the findings, which are very important in emerging democracies, where certain methods of
intelligence analysts all too often associated with a negative connotation. Because of this their
applicability has a negative connotation in the business environment.
Key words
corporative security, open source, intelligence, analytical process, management decision, critical
infrastructure
About the authors
Denis Čaleta holds Ph. D. from Faculty of state and European studies, Slovenia in 2007. He is
assistant professor at Faculty of state and European studies. He is also President of the Board in
Institute for Corporative security studies (ICS), a head of the resource group in the ICS and President
of Slovenian Association for Corporative Security. He has been managed and participated in several
research projects. He also works for Ministry of Defense and participate as a member of a few
coordination bodies in National Security Council. He presented papers at many research conferences
worldwide. He authored and co-authored more than fifteen original scientific articles published in
journals. The papers and articles cover topics in managing the security threats. He is also author of two
scientific monograph publications. He supervised more diploma, master and doctor thesis. He also
teaches part time at two other faculties in Slovenia.
Anita Perešin, finished her PhD in 2008 at the Faculty of Political Science, University of Zagreb,
Croatia. As an assistant professor at Zagreb University, her research focuses on new counterterrorism
challenges. She has published a number of articles on transformation of terrorism, relations between
media and terrorism, security sector reform, information security and critical infrastructure protection.
8
Application of principles of international law to computer networks
operations management
Adriana Dvoršak
Purpose
Purpose of the research paper is to present the legal principles and considerations relevant for a small
state cyber defense policy.
Design/Methodology/Approach
Descriptive and comparative methods are applied.
Findings
There is a certain lack of legislation in regard to computer network operations (CNO) but the states
can refer to principles of international law, law of armed conflict, UN Charter and to provisions of
Constitution of the ITU. Principles of international law that apply to CNO are principles of necessity
and proportionality, principle of distinction between civilians and combatants, whereas limits of means
and methods of (cyber) warfare are still developing. The author claims that slow development of legal
rules is the consequence of the military secrecies, of the limited experience of the international
community with CNO, and finally due to the compelling differences in character of kinetic and cyber
warfare. The speed influences the character of CNO and it defies political and military decision
makers, as well as the principles of international law.
Research limitations/implications
Research builds upon Information Warfare Lifecycle Model and proposes a model for CNO lifecycle
in a small state. Proposed model integrates legal, political and social functions into the planning of
CNO.
Practical implications:
The paper outlines the basis for discussion of CNO management in the complex institutional and
organizational environment, applicable to NATO and EU member states.
Originality/Value
The research paper contributes to the understanding of the importance of international norms and
regimes for the national CNO management.
Keywords
computer network operations, international law, lifecycle model, national security
About the author
Adriana Dvoršak was awarded bachelor degree at the Faculty of Social Sciences, Ljubljana and
specialized in political science - international relations. Presently she is a doctoral candidate at the
Faculty for Applied Social Sciences, Nova Gorica. In 2012 she participated at the conference
»Information Security - Guidelines for the Future,« with the paper: »Cyber security strategy and cyber
defense strategy in the framework of Slovenian strategic culture.« Her paper »Building trust in South
9
East Europe in the field of cyber security and cyber defense«, is due to be published by »European
Perspectives,« in April 2013.
Private Military/Security Companies and Intelligence
Maj Fritz, Andrej Sotlar, Jaroš Britovšek
Purpose
The purpose of this research is to determine whether and to what extent private military/security
companies openly offer intelligence as one of their services.
Design/methodology/approach
The analysis of official websites of fifty different private military/security companies tries to answer
the following question: “Do private military/security companies offer intelligence as one of their main
services?” The results will be interpreted through the already known facts, namely that private
military/security companies have been involved in the entire spectrum of intelligence in Iraq and
Afghanistan.
Findings
Private military/security companies have been in the national and international spotlight in the recent
years. They represent attempts to label the phenomenon of private companies which offer those
services on the world market that are normally duties of national military or security forces. These
services include training of local forces, risk advisory, intelligence services, covert operations,
weapons procurement, weapons destruction, armed site security, workplace and building security, war
zone security needs, personnel and budget vetting, logistic support, air support, armed support,
surveillance, psychological warfare, propaganda tactics, close protection and investigations. In short,
among many services offered by private military/security companies, intelligence is an activity which,
on one hand, is used by private military/security companies to operate, and, on the other hand, it is one
of the services provided to clients.
Research limitations/implications
The article is limited to theoretical conclusions of different authors addressing a phenomenon of
military outsourcing. Our research is limited to public information available on official websites of
different private military/security companies. In our research we use the term “private
military/security companies”. The main reason for this lies in the fact that many companies consider
themselves security, and not military services providers, mainly because of a negative connotation the
term “private military company” carries.
Practical implications
A useful source of information for individuals who wish to understand the basics of intelligence-
related private military and security business, and for academics who are eager to conduct further
research on this matter.
Originality/value
This paper lays down the foundation in understanding that intelligence in all its forms is one of the
services offered by private military/security companies.
Keywords
10
Private military company, private security company, intelligence.
Article Type
Research paper
About the authors
Maj Fritz, M.A, is Ph.D. candidate at the Faculty of Criminal Justice and Security, University of
Maribor. He graduated at Faculty of Criminal Justice and Security, University of Maribor, Slovenia
(1999). He holds M.A. in European Studies (2008). He has been working for Ministry of Defence of
Republic of Slovenia since 1991. His interests and research include intelligence and security issues,
peace operations and military outsourcing.
Andrej Sotlar, Ph.D., is Assistant Professor and Vice dean in the Faculty of Criminal Justice and
Security, University of Maribor, Slovenia. He has a B.A. (1993), M.A. (2000) and Ph.D. (2007) in
Defence science from University of Ljubljana, Slovenia. He serves as the co-editor in chief of the
Journal of Criminal Justice and Security (orig. Varstvoslovje) and a member of the editorial boards of
several other journals. His research interests include national security, security policy, plural policing
and private security.
Jaroš Britovšek is Ph.D. candidate at the Faculty of Criminal Justice and Security, University of
Maribor. He graduated in political science at the Faculty of Social Sciences in Ljubljana in 2007 and
has been working for Slovenian Ministry of Defence since 2008. Since then he was deployed in ISAF
- Afghanistan and EUFOR - Bosnia and Herzegovina. His interests and research include intelligence
and security issues in both public and private spheres.
11
OSINT as a 'grey zone'?
Gašper Hribar, Teodora Ivanuša
Purpose
General opinion and the facts concerning Open Source Intelligence (OSINT) are actually mostly
positive and explicitly point out that OSINT does not violate human rights as the conventional
intelligence collection. Free market offers different legal tools by which analytical procedure of data
acquisition and analytics of the data do not represent a major technical and logistical obstacle. OSINT
can be hypothetically carried out by everyone with such specific tools and the knowledge. It is also a
formal tool and analytical support of intelligence services. Is there a „grey zone‟ in the frame of
OSINT, useful for specific individual interests of the intelligence services to use OSINT in a legal
manner and on behalf of the same legality interfere in another country where they would otherwise act
illegally without this hypothetical 'grey zone' and so become a subject of counterintelligence
observation?
Methods/Approach
Review and analysis of literature, descriptive method and comparative method.
Findings
Legislation, information and communications tools, and degree of safety culture enable irregularities
and abuses in the collection of data from public sources, therefore grey zone in OSINT is hypotetically
expected. This prevents the counterintelligence services to act against the foreign intelligence services
which do not violate the law with OSINT (operation within the „grey zone‟) but can indirectly violate
the human rights and endanger the national security system.
Originality/Value
Our paper points out some gaps in the national security system and general safety culture. We provide
answers to some questions and proposals to reduce the „grey zone‟ of OSINT.
Keywords
OSINT, grey zone
About the authors
Gašper Hribar is a postgraduate student at the Faculty of Criminal Justice and Security, University of
Maribor, Slovenia. E-mail: [email protected]
Teodora Ivanuša is Assistant Professor of management and governance of security threats, and
chemical, biological, radiological, nuclear, and liquid explosives defense at the Faculty of Criminal
Justice and Security, University of Maribor, Slovenia. E-mail: [email protected]
12
Modeling of offensive computer-network operations by using an advanced
structural model
Blaţ Ivanc
Purpose
Attack modeling allows us to anticipate the possible courses of computer-network operations and
assess the suitability of the existing attack and defense mechanisms. A model is thus a tool for setting
up the attack scenario, which shows the process of the attack and the techniques used. The paper
shows a real-life snapshot of a target computer-based system. This serve as a basis for the computer-
network operation analysis using the attack modeling method. An advanced structural model is used
for attack modeling. In addition, the paper provides guidelines for the analysis of a simulated cyber
attack presented on a real-life case including an advanced structural model for cyber attack modeling.
Methodology
The paper includes a real-life snapshot and an analysis of the application of an advanced structural
model for attack modeling. Furthermore, the paper is based on a commented review of the research,
existing literature and processes by using the method of abstraction and concretization.
Findings
Structural models are characterized by their lack of the time dimension. The development of an
advanced structural model allows for the elimination of weaknesses such as difficult cyber attack
dynamics capturing, while the model also serves in the improvement of methods in cyber conflicts.
Originality
The paper presents the threats to target systems and the conducted cyber attack analysis. An advanced
structural model is demonstrated, which carries a strong communicative value and enables coordinated
cyber attack capturing. The paper includes the demonstration of the practical use of the model, which
may help in the development of automated solutions and process improvements.
Keywords
Attack modeling, cyber attack analysis, security mechanisms, system design
About the author
Blaţ Ivanc is an independent researcher at Jožef Stefan IPS and a member of Slovenian Association
of Corporate Security. He has professional experience in red-team testing, network forensics and
sensitive data protection. In addition he has been working on a research study at the Jozef Stefan IPS
on critical infrastructure and classified data protection. His main research and development interests
are new techniques, tactics and procedures for information operations.
13
Lawful interception: European Union legal framework
Draţen Škrtić
Purpose
The purpose of the article is to present the lawful intercept and the legal framework for Lawful
Interceptions of Telecommunications.
Design/Methodology/Approach
The article is based on a review and analysis of the European Union Directive that defines the Lawful
Interceptions of Telecommunications, the retention of the data that is generated or processed in
connection with the provision of publicly available electronic communications services or of public
communications network.
Findings
The European Union issued a Directive 95/46/EC and Directive 2002/58/EC that defines the Lawful
Interception of Telecommunications with the simultaneously protection of individuals. In general the
directive defines the nature of the intercepted data and gives additional details on how the data may be
used. One of the major parameters in electronic surveillance is data preservation. Retention refers to
“the storage of telephony and Internet traffic” by companies that provide these services. This data
specifically includes Call Detail Records (CDRs), sent and received emails, visited web sites of the
customers of ISPs, and also the location of the customers of telecommunications companies. The
European Union issued a Directive 2006/24/EC that specifies in detail the period of data preservation
and also the kinds of information to be stored.
Originality/Value
The paper is the systematic overview of the history and development European Union legal framework
the Lawful Interceptions of Telecommunications, the period of data preservation and the kinds of
information to be stored.
Keywords
Interceptions, legal framework, telecommunications, Directive, data preservation.
About the autor
Draţen Škrtić, PhD, graduate criminalist on the High Police School Ministry of Interior, Croatia and
Posgraduate study at Faculty of Law of the University of Zagreb, police officer at Criminal
Investigation Division, Karlovac Police administration, Ministry of Interior, Croatia, lecturer of law
science at the Karlovac University of Applied Sciences, author original scientific paper, preliminary
comunications, author reviews, conference papers and professional papers in the field of criminal law,
administrative law, criminology and criminalistic. His scope of researches covers criminal law,
criminal procedure law criminology. E-mail: [email protected]
14
Public opinion on the Transnational Sources of Threat to National Security
Bernarda Tominc, Andrej Sotlar
Purpose
The main aim of this paper is to present the public opinion on sources of threat and risk to national
security of Republic of Slovenia that have a transnational origin and cross-border dimension and are
therefore of concern of Slovene intelligence services: terrorism, organised crime, illegal migration, the
proliferation of weapons of mass destruction, the misuse and movement of dual purpose materials etc.
Design/methodology/approach
The survey on the representative sample of Slovene citizens (961) was conducted at the end of the
year 2011. Trough the structured questionnaire authors examined the attitudes relating to souces of
threat on transnational sources of threat and risk to national security of RS according to the Resolution
on national security strategy of the Republic of Slovenia (passed in 2010).
Findings
Resolution on national security strategy of the Republic of Slovenia (passed in 2010) as the highest
political and strategic document deals with internal and external security of the state and defines
various sources of threat that could endanger the Slovenian society. To respond effectively to
contemporary security threats and risks the state needs effective national security system and
functioning and responsive national security structure that also understand the needs of citizens. As an
important part of it are intelligence services that support decision making proceses with the
acquisition, evaluation and timely dissemination of intelligence and security information.
With the exception of organized crime other transnational sources of threat are in the opinion of
Slovene citizens ranked as the least threatening to Slovenia. At first glance it is clear that traditionally
most political discussed threat – terrorism – do not pose serious threat to Slovene citizens; however
they are of opinion that the effective intelligence is second most important method in countering
terrorism.
Research limitations/implications
The article is limited to Slovene security system and to the sources of threat with transnational origin
that are politically defined in ReSNV-1. This paper is based on the Target research program named
Feelings of Safety and the Role of Police in Local Security Provision that was initiated/suggested by
Ministry of Interior RS and is supported by Slovene National Research Agency.
Originality/value
Security policy makers and writers of strategic documents will be able to get an insight into how the
lay public (residents) percept the official, politically-defined sources of threat to national security. This
could help them in designing security policies and strategies in the future.
Keywords
transnational sources of threat, intelligence; public opinion.
Article Type
Research paper
15
About the authors
Bernarda Tominc, BA, Teaching Assistant at the University of Maribor, Faculty of Criminal Justice
and Security. Her research interest includes international political and security integrations, security
threats in contemporary society, national security systems. Contacts: Kotnikova 8, 1000 Ljubljana,
Slovenia, phone: + 386 1 300 83 05, fax: + 386 1 230 26 87, email: [email protected].
Andrej Sotlar, PhD, Assistant Professor in Security Systems at the University of Maribor, Faculty of
Criminal Justice and Security. His main research fields of interests are: the structure of national
security systems; security policy-making process; intelligence and security services; private security
and relationship between public and private security/policing providers; terrorism. Contacts:
Kotnikova 8, 1000 Ljubljana, Slovenia, phone: + 386 1 300 83 32, fax: + 386 1 230 26 87, e-mail:
mailto:[email protected]
16
The probative value of the results of monitoring communication privacy,
derived from intelligence services
Janez Ţirovnik
Purpose
The paper finds considerable ambiguity in the probative value of the evidence presented in the context
of gaining control of the intelligence services, for the purpose of criminal proceedings, which would,
in the absence of other evidence of quality, leading to the final judgment of conviction of criminals.
Only a matter of time it was, when the law enforcement authorities, and consequently the court, in
Slovenia, in the context of criminal proceedings, started to face the question of the probative value of
the evidence presented in the context of control communication privacy gaining intelligence. The
constitution and law in this area are more or less defined, but courts have so far been few observations
on that intelligence is within their powers are not competent to act in criminal matters in the context of
pre-trial procedure.
But they all, state bodies and organizations, not only on the basis of regional criminal-procedural
legislation but also on the basis of legislation governing intelligence required law enforcement
agencies to provide information about the suspected offenses.
The fundamental question that we answer in this paper is whether these data are among the findings
that intelligence obtained in the exercise of its powers.
Since such evidence is extremely difficult to obtain, especially in cases when it comes to organized
crime gangs involved in serious crime (against life and body in the field of illicit drugs or the sex
trade), the utility of such data, although it was not obtained for the purpose of criminal proceedings,
particularly important.
By analyzing the existing legislation will answer the question in the introduction, then the comparative
method will determine how this area is regulated in comparable European countries and countries of
the Western Balkans to the basis of this, of course, if necessary, to present a model change in the law
on the one hand, maintain independence intelligence to intervene in the privacy of communication, on
the other hand, as the subject of national security, which enable the law enforcement authorities to
justify suspicion that the offense was committed and who the perpetrator to be brought to justice
which will also take account of the evidence.
Methodology
The basic starting point is represented by the analyzes of the regulatory framework and accepted
jurisprudence in the area of intervention of intelligence services in the communications privacy and of
the comparative method of analysis of existing regulation in some European countries and the Western
Balkan countries in which the obtained data of the intelligence services, which interfere with the
communication privacy, they have probative value.
Findings
The fact is, that the intelligence services in Slovenia have statutory obligation, to report the offenses,
for which they are informed in their work, to the competent authorities. In doing so, they also must
attached relevant evidence. However, the evidence relating to interference with the communications
17
privacy of individuals in accordance with applicable law, and based on observations by the Supreme,
as well as the Constitutional Court of the Republic of Slovenia, are cannot be used as evidence in
criminal proceedings. That effectively means that the offender, because this is the evidence, which
cannot be repeated, has an option to avoid the hand of justice.
Originality
The author comes to the conclusion that with the proper completion of the legal provisions on the
preparation process model assessment intervention of intelligence in the human rights and
fundamental freedoms can achieve that, exceptionally, as evidence in criminal proceedings, also
served intelligence data by the latter obtained during intrusions in the human rights and fundamental
freedoms.
Keywords
Intelligence services, communication privacy, special forms of data collection, monitoring of
communication, standards of proof, evidence, criminal procedure, security.
About the author
Mag. Janez Ţirovnik has graduated at Faculty of Law in Maribor. In 2003 he achieved a Masters in
the field of labour law and social security law. By 2007, he was employed in the Slovenian
Intelligence and Security Agency in the legal department and as Deputy Director, in charge of
logistics. He was a member of several interagency working groups in the field of intelligence and
security operations, but it is also one of the authors of the Act on the Slovenian Intelligence and
security Agency. In 2007 he was nominated as a judge in the civil division of the District Court in
Maribor, where he works as well as a duty investigating judge. Since its establishment, he is taking
part in the learning process at the Faculty of Logistics, University of Maribor as a senior lecturer. He is
the author of several professional and scientific articles in the areas in which technical and vocational
functioning.
18
Working methods of defense attachés in the Information Age
Franc Ţeljko Ţupanič
Purpose
Working methods of defence attachés are likely to have changed in today‟s advanced information
society and contemporary social conditions compared to their modus operandi from before a decade or
more, mostly due to extensive usage of innovative information and communication technology. This
contributes to more focal and accurate acquisition as well as faster and efficient delivery of
information to the sending country. The research aims to show how working methods of defence
attachés have changed by use of modern information technology techniques. The purpose of the
research is that stakeholders (Civil Community) get acquainted with the development of attachés‟
working methods.
Methods
Theoretical groundwork for this paper is a review of relevant sources on working methods of defence
attachés, then on methods for collecting data and their sources, on reporting procedures of attachés and
diplomatic ways of communication between competent ministry and diplomatic mission, and finally
on information delivery and distribution.
The interview research method was used, administering a structured questionnaire (systematic data
collection) to survey former and active defense attachés.
Findings
Most of the interviewees share the opinion that contemporary means of communication help the
defence diplomacy become much more independent, autonomous and specialized state service. The
progress in the field of communications technology enables faster access to ever larger amount of data
whereas the duty of an attaché is to filter and convey them thus adding added value for a sending
country.
Research Limitations/Implications
As far as defence diplomacy is concerned the research results are significant in view of changing
methodologies of work of defence attachés. The path remains open to further researching as the
existing one is based only on three interviews of which only one defence attaché is still in service.
This would confirm the results of this existing research and at the same time expand the research with
a number of attachés on duty.
Practical Implications
Results have shown that the use of publicly available resources in the area of defence diplomacy is
gaining importance, data accessability is faster, their quantity is augmenting and above all results can
be quicker and repeatedly verified. Responsible people on such positions are to be directed into the
search and acquisition of quality information and last but not least towards obtaining the knowledge in
this field while modern information technology requires an upgrade of tactical approach to data
acquisition from various public sources and to form information to be delivered.
Originality/Value
There is no similar research carried out to date in Slovenia. This paper reveals the actual status of
public sources usage in defence diplomacy and at the same time directs to a deepened insight in the
19
field rapidly developing by means of information and communication technologies in a contemporary
information society.
Key words working methods of defence attachés, public sources, data collection, information and
communication technology.
About the author
Mr Franc Ţeljko Ţupanič, Ph.D., graduated from the Air Force Academy in 1984, in the year 2003
he successfully completed his Masters at the University of Westminster in London, and in 2011 he
earned his Ph.D. from Faculty of Criminal Justice and Security in Ljubljana. At Faculty of Criminal
Justice and Security he has obtained habitation as lecturer for the field of security system. He is the
author of a number of professional and science articles. Momentarily, he is performing the duties of
CEO of Slovenia Control, Slovenian Air Navigation Services, Limited. Throughout his career he
occupied a number of managerial positions, among which: Director General of Civil Aviation at the
Ministry of Transport of the Republic of Slovenia, Defence Attaché in Great Britain at the Embassy of
the Republic of Slovenia in London, Assistant Chief of the Slovenian Air Force and Chief of
Counterintelligence Department in Intelligence And Security Service at the Ministry of Defence. He
has a rank of Air Force Colonel and is a professional pilot and flight instructor.
20
Part 2
UNSTRUCTURED ABSTRACTS
21
Extending security intelligence with big data solutions
Robert Boţič
What is Security/Intelligence Extension?
It‟s using big data technologies to augment and enhance traditional security solutions by analyzing
new types (unstructured, streaming) and sources of under-leveraged data to significantly improve
intelligence, security, and law enforcement insight.
What are the drivers for an Security/Intelligence Extension use case?
Need to analyze from existing & new sources (data in motion and at rest) to find patterns &
associations
Need for more up-to-date intelligence information (currency)
Ability to predict, detect, act to network/computer security threats sooner
Inability to analyze telco and/or social data to track criminal/terrorist activity
Need to analyze data that is continuously generated such as video, audio, smart devices
Organizations want to enhance their existing security/intel platforms to improve local national
security, protect their borders, and prevent criminal/terrorist activity.
About the author
Robert Boţič has graduated at Faculty of computer sciences and information technology in Ljubljana.
He has been working in IT industry for more than 15 years and in this period was engaged in many
different IT projects. Last five years he is working in IBM Slovenia covering information management
portfolio of IBM‟s solutions. Lately he took over IBM Big Data business in South East Europe where
he is working with clients from different industries.
22
Information technology in domain of electronic intelligence
Robert Brumnik, Sergii Kavun
Summary
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis,
interpretation and use of information. Thus, the intelligence services in the future created an electronic
database in which to their being classified intelligence products, users could choose between the latter
themselves relevant information. The European Union (EU) that activities are carried out from at least
in year 1996, terrorist attacks in year 2001 is only accelerating. Proposals to increase surveillance and
international cooperation in this field have been drawn up before 11 September 2011. On the web you
can find a list of networks (Cryptome, 2011), which could be connected, or are under the control of the
Security Service NSA (National Security Agency). United States of America in year 1994 enacted a
law for telephone communication (Digital Telephony Act), which would require manufacturers of
telecommunications equipment, leave some security holes for control. In addition, we monitor the
Internet and large corporations. In the United States of America example of this action reveals the
organization for electronic freedoms against a telecom company that the NSA illegally gain access to
data on information technology users and Internet telephony. Also known are Chinese dissidents
which were identified and arrested on the basis of data provided by the Chinese authorities to obtain
from corporation Yahoo. Even Google has a history of bowing to pressure from China's censorship
purpose of obtaining intelligence. Recently, however Facebook is the most frightening spy device that
humanity has ever done. It consolidates information about people, their relationships, names,
addresses, location, communication, relatives and all the available American intelligence (Assagne,
2012).
It is understood that the success of preventive counter-terrorism, surveillance authorities want as much
control. Recently, however, these skills can be used to gain competitive advantage of countries and the
increase in economic espionage. Until these trends should public policy and take some distance and
oversized "appetites" of supervisors limited. The problem is, because the surveillance technology can
also turn against the state. A controlling existing technology, which was created for the purposes of
legal supervision, can be abused is a criminal or terrorist organizations. Typical examples were
listening affair in Greece and Italy. In Greece, the attacker (probably the Secret Service, but also could
criminal group) managed to exploit security vulnerability in module PBX (Private, Branch, Exchange)
designed to lawful interception.
Keywords
intelligence and counterintelligence activities, electronic spy devices and methods
About the authors
Robert Brumnik holds Ph. D. from University of Maribor, Slovenia in 2011 at the Faculty of
Management and Organizations Science, Department of Business and Working Systems. In year 2011
he also holds Ph. D. from University of Maribor, Slovenia at the Faculty of Criminal Justice and
Security, Department of Security Studies. He was appointed to the rank of Professor Assistant in 2012
at the GEA College, Faculty for Business and Economic study in field of Informatics. He is accredited
auditor of quality system standard ISO9001. He has participate and lead several research projects
within the research group Metra (group code: 1685), where he is regularly employed. He has presented
23
papers at international conferences and in scientific journals. The articles and research works are on
the topic of information security and organization.
Sergii Kavun holds Ph. D. from Kharkiv Military University, Ukraine in 2000 at the Faculty of
Automatic Control System, Department of Computation System and Network. Since 2003, he also
holds Ph. D. from Kharkiv National University of Economics, Ukraine at the Faculty of Economical
Information, Department of Computer Systems and Technologies. He was appointed to the rank of
Associated Professor in 2005 at the Kharkiv National University of Economics, Faculty of Economical
Information in field of Information systems. He is accredited specialist of management information
security by standard ISO 17799:2005 (ISO 27002:2005). He has participate and lead several research
projects within the Kharkiv National University of Economics (registry code: DR 0107 U 007226, DR
0109 U 007022, DR 0111 U 003026), where he is regularly employed. He has presented more than
100 papers at international conferences and in scientific journals, also 3 patents. The articles and
research works are on the topic of information and economic security.
24
Provisioning of uniform lawful interception solution in data networks
Simon Čimţar, Miro Udir
Abstract
The contribution describes the challenge how to provide uniform lawful interception in data networks,
within the specific requirements of some country specific requirements. The fact is that in some
countries (e.g. CIS countries) the regulatory bodies do not follow the LI based on ETSI infrastructure
and its requirements – they specify the specific requirements which may differ to the standards. The
relation between network operator and lawful interception agency is specific and this requires different
way of information collection and storage. The regulatory bodies require interception based on various
parameters (from network connectivity to application′s parameters) which may not be easily
supported. The preferred way of interception is the “passive model” by means of mirroring all traffic,
not to influence the information flow and performances of operator‟s network.
LI agencies prefer uniform realization of the requirements – this means one single approach for
different types of operators which can be mobile, fixed or convergent. The operators may use different
data traffic delivery models (e.g. GTP, PPPoE, IPoE) and various user identification mechanisms.
Modern data network is dynamic, but all the network changes which may have an impact on the
quality of interception must be identified and corrective measures are to be taken. In comparison the
pure voice interception from the past, now the amount of data is much bigger and the collected data
can be in very different formats (voice, video, data transfer, hyperlinks,…).
The proper answer to this requirements and challenges is the modular solution architecture. The
solution consists of:
taps for real-time information collection,
two step of filtering including advanced DPI modules for efficient filtering,
modular mediation device for interaction and interoperability with other network elements.
The contribution describes the building blocks of the solution and possible application scenarios in the
networks. The efficiency of the solution can be improved by the regulatory requirements changes,
which are proposed, too.
However, the solution architecture is future oriented as further technology development and changed
ways of communications bring new challenges which are to solved, too. Such examples are social
networks and services of OTT (over-the-top) operators.
About the authors
Simon Čimţar is Product manager in the Iskratel's product line Intelligent Access. He is responsible
for introducing new access product to the market and for developing in Iskratel. He has expert
knowledge in networking technologies and holds several certificates from Cisco. In the latest time he
is member of the expert team which is involved in developing of IP LI solution for CIS market.
Miro Udir is Product Line Manager in the Iskratel's product line Multimedia Core. He is dealing with
Iskratel core products for NGN and IMS solutions (SI3000 Call Server, SI3000 Signalling and Media
Gateways, Lawful Interception and others). In the past he was responsible for the integration of
various own and partner products into complex end-to-end solutions (NGN, Broadband, IPTV). He
25
was also involved in preparation of operator solutions for business users based on IP Centrex. Before
moving to the Product Management, he was working in R&D, being responsible for different
application and functional areas (e.g. Centrex, ISDN). He has experiences in the area of NGN, hosted
solutions for business users, solution integration, network migration and convergence. Miro Udir has
graduated on the Faculty for Electrical Engineering from the University of Ljubljana in 1989.
26
Technology of capturing and converting mass data from social networks
Matevţ Gačnik
Summary
The most advanced technologies for capturing, processing, storing and analyzing messages from
computer systems are so called "Big Data" solutions, which are among the most promising future IT
trends. If we define big data as the data volume, variety and velocity that exceeds an organization‟s
ability to independently and timely manage them, we find out that advanced solutions for big data are
becoming crucial in most industries. We present an innovative solution with flexible infrastructure and
high performance with possibilities of advanced analytics and big data management.
Gama System® PerceptionAnalytics (GS PA) is connecting the various systems that so far haven‟t
been able to communicate with each other, with enabling common denominator for communication in
both directions. Systems for sending and receiving messages link up and GS PA captures a great
number of data in an extremely short period of time. Hosting in the Microsoft cloud on four continents
provides unlimited scale of processing and data storage without slowing activity. Therefore, solution
application to social networks enables to capture and interpret key information of required area in real-
time.
So, GS PA enables monitoring of public perception through social networks. When we define search
criteria as combination of key words and other definition, solution generates an archive of information
that are stored and can be interpreted in any kind of analyses an used in any way. When entering new
search criteria, solution provides thousands of last hits for the search and takes every new one in real-
time. By analyzing the vocabulary and other characteristics of writing inside the hit results, the
advanced sentiment analysis with classification process reveals if emotions in individual posts are
positive, negative or neutral. That is achieved with machine learning techniques, which are continually
improving.
In a time when most of the communication takes place online and social networks allow fast
information dissemination, we must be able to detect relevant information that can be spread globally
within a few hours. The true value of big data lies in their real-time interpretation into information,
that are fundamental for hast, fact based and correct decision.
GS PA enables immediate access to all global conversation, very accurate sentiment and other
analyses: hit count, reach, unique users and location that are continuously made in real-time. This
generates accurate and timely visualized information, no matter how complex the search criteria.
While designing the solutions, the company Gama System also considered the most common potential
bias and manipulation.
Key words
Social networks, massive data, big data, data capture, data processing
About the author
Matevţ Gačnik is an author of numerous technical articles and books on services and solution
architectures. He has well over a decade of experience as an architect and systems designer. Matevž is
a frequent speaker at conferences and other public events. Most of his work includes architecture,
27
review and design, training and technology drilldown. He specializes in the middle tier, performance,
XML related syntaxes, web services and the core development runtimes. Matevž is a Microsoft Most
Valuable Professional and a Microsoft Regional Director for Slovenia.
28
Open sources in the intelligence and security
Irena Kranjc
Abstract
The public sources in the modern information society can be accessed, here and now. A series of
monographic publications, scientific studies and achievements from various fields, containing a
multitude of data, information and knowledge, which appear in other works and are published, are
frequently without any additional and new value.
The article attempts to investigate the background and facts about an unsettled issue; the investigation
is based solely on the published data and information; and it is multidisciplinary as it is an attempt to
examine the unsettled issues by means of certain theories from several sciences. The research involves
in a logical way certain elements of communicology, law, and history science as well as defence
science and sociology in order to join them up with public sources in the intelligence and security
activity. Some methods of work in the intelligence and security field are very similar with the
investigative journalism, but not equally.
One of the aims of the doctoral dissertation is to link theory with practice and present a useful product,
especially the CDA (critical discourse analysis) and journalistic contributions whose subject relates to
the intelligence and security activity, and especially to the research of public ie open sources in the
intelligence and security activity with a proposal to use a new intelligence cycle and give stress to the
research of analytical contents of information that produces a new text, intelligence based on public
sources (OSINF). Here is a proposal for an amended ie supplemented Fairclough‟s model for
producing information as a type of reporting, particularly for the needs of expert work in the
intelligence and security field.
Key words
open sources (OSINT), CDA (critical discourse analysis), investigative journalism
About the author
Irena Kranjc, born in 1961 in Ljubljana, Ph.D., began his career in education field and continued in
the state service. She graduated first in the Faculty of Education and then at the Faculty of Social
Sciences, with a thesis entitled Thematic information for specific subscribers. Among the first is a
pioneer in exploring open sources in the intelligence profession, to which she devoted more than 15
years. Theory and practice of OSINT is attempting to connect and develop into practice. Her research
work has been shown in her master ̓ s work, entitled “Obvious and veiled in public” (FSS, Ljubljana)
and the doctoral disertaion “Media Representations of interstate conflict in the selected type” on
Faculty of State and European Studies in Brdo. She continue with lectures and contributions to
participate in conferences and mentoring to interested students.
29
Real-time public opinion monitoring - a modern way of understanding
public opinion and mood
Mojca Perić
Summary
The purpose of this paper is to present a new option of public opinion monitoring, completely different
from the existing methods, which is searching to find its place in the complementarity or even
replacement of current methods for identifying public opinion. The goals are to present this new way
of real-time public opinion monitoring as the most modern approach of understanding public opinion
and mood and present the relevance and usefulness of obtained results - information.
We monitor public opinion in real-time with a new, innovative solution Gama System®
PerceptionAnalytics (GS PA) which provides quality insight into public perception by following social
networks. After creating simple or complex search criteria the solution provides advanced analyses,
such as: sentiment, content analyses, word clouds and others. With a descriptive method, we explain
how the solution helps to understand trends, opinions, mood and other perception in wider society.
In comparison with existing studies we have no control over the composition of the sample that
generates GS PA analyses, but on the other hand, the sample is incomparably greater and is increasing
with every day. The fact is that even the most sophisticated methods of detecting public opinion can
fail, which was also the case in 2012 presidential elections in Slovenia. On that opportunity GS PA
was the only solution that correctly evaluated the sentiment and public opinion in both rounds of the
election.
Real-time public opinion monitoring with fast, accurate and reliable information, provided by GS PA
analyses, assures the appropriate support on decision-making and timely responding, as well as fact-
base planning in many different sectors and industries. Governmental organizations (intelligence
agencies, police, etc.), media and other companies can use such information for: early warning system,
crisis management, strategic and communication planning, understanding the competition, identifying
trends and for numerous other purposes.
The solution ensures unbiased and authentic information because this way of identifying public
opinion is not stimulated by the interviewer but is expressed spontaneously and dedicated to one's
social network. Such opinion does not exist in a vacuum, but has a wide reach and impact. Exploring
the depth of semantics of web communication is the next big challenge for government agencies,
media and companies that want to understand the environment in which they operate and Slovenian
company Gama System is one of the first companies accepting that challenge.
Keywords
Social networks, public opinion, real time analysis, sentiment, public perception
About the author
Mojca Perić is a bachelor of Economic Science. As an associate consultant and project manager she
worked in the field of strategic management and business excellence in several well-known Slovenian
companies and she has experiences with service and product development. She is a licensed business
excellence assessor and awarded with “Feniks” recognition for the best management consulting
30
project by the Chamber of Commerce and Industry of Slovenia. She also works as a technical assistant
for Strategic management at the Faculty of Economics, University of Ljubljana.
31
Open sources information for improvment of public safety
Aleksander Pur, Robert Djuras
Abstract
In general, we do not like that even our publicly available Tweets are systematically monitored and
analysed, but in some events such as big incidents, we want that our published information on social
networks can help emergency services.In this presentation we will discuss a concept of information
systems that can improve the efficiency of emergency services by providing open source information
from social media such as Twitter and Facebook, and other public sources, during incidents. These
systems analyse open source information in order to help in early identification of big incidents and
useful information, as well as disseminate the information among emergency services such as Police,
Fire department, and Emergency medical service. Thus, there are at least three problems. The first one
is aimed at techniques for early identification of incident. The second problem is automatic gathering
and analyses of relevant information during the incident. Considering that open source information are
usually semi-structured the incident identification, data gathering, and analyses can be improved by
various Data Mining and Text Mining techniques, as well as rule based assessment models. The third
problem is comprehensive and comprehensible dissemination of useful information related to
incidents. Thus, we suggest the usage of advanced data visualization techniques. In the presentation
we will show our suggestions related to these problems and examples how these systems can
contribute to public safety.
About the authors
Robert Djuras is working in General Police Directorate in Application Development Division as
Software engineer. His work is aimed at developing and implementing internet/intranet portals,
searching tools and web applications, using mostly Java and PHP languages. During his work he try to
use open source tools. He attended the Jožef Stefan International Postgraduate School and where he
currently working on master's thesis in the field of decision support and text analysis.
Aleksander Pur is working in General Police Directorate in Applications Development Division as
Police Superintendent. His work is aimed at developing and implementing of information systems
based on data exchange, data analyses, DSS, and E-learning systems. He completed his PhD in data
analyses and DSS techniques, on the field of health care system.
32
Direct implementation of the security function in intelligence system
Milan Mijalkovski, Vesela Radović, Duško Tomić
In turbulent conditions of social and political life of one country, the security issue arises as the
primary strategic goal of all citizens and institutions. However, security is a category that implies a
critical and responsible attitude towards intern values and interactive relationship with extern, direct or
indirect, environment. Security organisation of one country is extremely complex and diverse area that
requires systematic organization in order to preserve the stability, sovereignty and territorial integrity
of a country, its policy and its citizens.
An aspect that is not usually visible to general public but that greatly contributes to stability and safety
of a country and its citizens, involves simultaneous work of intelligence and counterintelligence
services. Modern theory and practice of safety management is based on large number of preventive
and reactive methods that can successfully remove all threats that could seriously damage the
confidentiality of the state and its established values.
This paper aims to highlight, on documentary basis, the main characteristics of the intelligence
security system of one country and to clearly analyze the structural relationships that occur within it.
Therefore, the main theme that is discussed refers to definition of direct implementation of the security
function in much wider intelligence system. As well, the intention of the authors was to point out all
the strengths and weaknesses of existing operational models of intelligence and counterintelligence
service and to draw attention to the prevention and suppression of espionage activities in one country.
Relying on that, alternatives for proper and professional data base protection were offered and the
importance of counterintelligence assessment of security service is analyzed.
Key words: safety, intelligence, operational activity, operational analysis of intelligence systems and
services, protection of state security
About the authors
Milan Mijalkovski, PhD, Professor Mijalkovski has finished elementary and high school (1966) in
Kriva Palanka and after that he graduated on the Military Academy (Ground Defense), Belgrade
(1970). In 1990 he completed the highest Military School of National Defense. In 1988 professor
Mijalkovski has completed postgraduate studies on the Military Academy KoV, JNA in Belgrade and
on 2000 he completed his PhD. thesis on the Military Academy VJ, Belgrade.
Vesela Radovic was born in Kosovska Mitrovica, and lives in Novi Sad . Dr. Radovic has an MPH in
fire safety protection and a PhD in safety, protection and defense. She also completed postdoctoral
education in the area of disaster management, environmental protection and risk communication, at
Tulane University , New Orleans , Louisiana , USA . Dr Radovic has a long record of experience in
the area of disaster management in Serbia and abroad. The major area of her work and research is
focus was on public policy making and linkage emergency preparedness and environmental
protection. She is currently working as an assistant professor at the Faculty of Environmental
Protection, University EDUCONS, Sremska Kamenica, Vojvodina, Serbia and participaten numerous
scientific projects (TEMPUS, IPA, PPES, NATO Program: Science for Peace and Security and few
projects financed by the Ministry of Science and Education).
Duško Tomić, PhD, Faculty of Applied Security, Educons University, Sremska Kamenica, Serbia
33
The importance of Business Intelligence and its application in the
companies in the region of Western Balkans
Dragan Trivan
Abstract
The reasons for writing this work are existing ambiguities and disagreements about the importance,
role and practical application of Business Intelligence in the operations of companies in the Republic
of Serbia and countries surrounding it. Having in mind that corporate security itself is still the subject
of controversial interpretations in this region, analyzing Business Intelligence, as one of its least
known segments in public, becomes more significant. The work and previous empirical research in
Serbia, have demanded application of different scientific methods (historical-comparative method,
case study, content analysis, testing). It is established that certain jobs which can be linked to Business
Intelligence are performed at business enterprises in the Republic of Serbia and other countries of
Western Balkans, but who and in which way collects business information is disputable. The findings
also do not indicate that within framework of the system of corporate security in the companies from
this region there are separate organisational units having competence over Business Intelligence jobs.
The results of research support the assumption that for a wider application in the Western Balkans a
higher level of overall development, reduction of state influence in the economy, greater market
openness, efficient legislative framework, higher level of business ethics and application of e-business
are needed. The obtained information can be also used by competent authorities in Serbia aimed at
establishing European standards and redefinition of legal and practical starting points related to the
position of corporate security in the national security system. The significance of the work also lies in
the fact that there have been just a few studies in the Western Balkans until now on the subject of
application of Business Intelligence in the corporate security system.
Key words
Business Intelligence, corporation, corporate security, Serbia, Western Balkans.
About the author
Dragan Trivan, PhD in Security and Protection Studies, Assistant Professor at the Faculty of Security
Studies in Banja Luka , the Faculty for Detectives and Criminology in Skopje and the Academy for
Economy and Security in Belgrade. He is the President of Serbian Association of Corporative
Security Managers . He is the author of three monographs ( „Corporative Security“, “Corporative
Security Systems” and „Private Security – the Basics of Physical and Technical Security“) and a
number of papers presented at the national and international conferences and published in domestic
and foreign journals.