Private Intel for Corporate Protection

Author(s):  
Aldo Montanari

The private information analysis is strictly inherent to the protection of corporate interests. This generally means protecting the company from fraud, theft of industrial secrets, and intellectual capital as well as protecting its cyber architecture. The tasks are delicate and suited to the various corporate interests. This information work would usefully be placed in the national intelligence context by providing a precious link between the national security services and the company itself, to which such an adhesion would be difficult to guarantee in any other way.

2015 ◽  
Vol 59 (4) ◽  
pp. 50-65 ◽  
Author(s):  
Sarah Kendzior

This article uses the example of Uzbekistan's national security services to consider how the psychic influence of a police state reveals itself online. What happens when the 'spectral double' of the police becomes a point of focus in a medium known for its transparency? I argue that although the Internet gives citizens the capability to organize and interact, it does not relieve their fears and suspicions; instead, it often intensifies them. Despite the 'transparency' that the Internet affords—and sometimes because of it—there are qualities bound up in the architecture of this medium that give rise to paranoia. Using examples from Uzbek online political discourse, I show how the Internet has fueled suspicion and fears about the state security services despite attempts to demystify and assuage them.


2020 ◽  
Vol 5 (2) ◽  
pp. 233-254
Author(s):  
James Pattison

AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a moderately restrictive approach should be adopted, which holds that private firms can justifiably launch some cybersecurity services – defensive measures – but are not permitted to perform others – offensive measures.


Author(s):  
James X. Dempsey ◽  
Fred H. Cate

The chapters in this volume are uniform in their commitment to the proposition that terrorism can be effectively fought and national security interests can be defended within a system of oversight and control that protects both corporate interests and individual privacy. Moreover, they are remarkable in their consistency in describing the components of an effective system of checks and balances. This chapter draws on the work of the contributors to this volume and on the flood of policy developments over the past five years to recommend a coherent framework for collection of private-sector data. The elements of this framework for governments are legality, proportionality, and accountability. For corporations, they are based on adoption of internal policies, internal and external accountability, and transparency, backed up by a willingness to challenge overbroad or unjustified government demands.


2011 ◽  
Vol 161 (3) ◽  
pp. 275-291
Author(s):  
Ziemowit KAYZER ◽  
Bernard KAYZER

The paper describes the personnel in the national security services in the autonomous Silesia province from 1922 to 1939. Moreover, it presents the deployment and evolution of the internal system of the departments in the Republic of Poland from 1922 to 1939.


2015 ◽  
Vol 2 (1) ◽  
pp. 68
Author(s):  
Kadri Arifi

The sophisticated forms of the organized crime, the high level of risk, complexity and threatening potential of the terrorism, impose the need (among other measures) for the application of covert investigative measures, among other the interception of telecommunications in order to prevent and combat these threats. Measures and traditional methods used by security institutions and law enforcement agencies do not provide adequate results and this raises the need and necessity for application of covert measures. In particular, the application of covert investigative measures for the security services as a measure, is necessary and essential for early detection and prevention of activities that affect the national security, while for the law enforcement agencies, the covert measures are used as a prevention and investigation measure of serious criminal acts and terrorism, but also as a measure to provide evidence for investigative processes. There is no doubt about the high sensitivity that the application of covert measures has in relation to human rights and freedom, respect and protection of which is the duty of the state and represents not an easy challenge for several reasons. In this regard, the application of covert measures should be limited by the law and their application in accordance with the law is a precondition for respecting human rights and freedom.


Author(s):  
B. Jack Copeland

The American ENIAC is customarily regarded as the first electronic computer. In this fascinating volume, Jack Copeland rewrites the history of computer science, arguing that in reality Colossus--the giant computer built in Bletchley Park by the British secret service during World War II--predates ENIAC by two years. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms employed during World War II remained in use by the British security services until a short time ago. Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world's first giant computer, the great-great-grandfather of the massive computers used today by the CIA and the National Security Agency.


2020 ◽  
pp. 32-34
Author(s):  
Aleksei Genrikhovich Shelestov

The article discusses the relationship between the stable functioning of the political system of the Russian Federation and the country's national security, through the implementation of the law enforcement function in emergency situations by the internal affairs bodies of Russia, taking into account the specifics of organizing rear services support.


2020 ◽  
Vol 68 (2) ◽  
pp. 123-137
Author(s):  
Tamás Tóth

For members of society, cyberspace has become an indispensable scene of their communication and everyday interaction, thus contributing to the emergence and functioning of the global information society. Depending on the stage of their lives in which the members of each generation have encountered ICT tools, different qualities, skills, abilities and expectations can be observed in them. The members of the Y, the Z, and now the alpha generation have a completely different set of values and adaptability than their predecessors. From the point of view of the national security services, it is important to examine the main characteristics of these generations and social groups, since among other things, the newly recruited members of the national security services are members of society. In order to ensure the operation of effective national security services based on traditional values, knowledge and age specifics, it is necessary to optimize recruitment systems that meet the needs of the next generation and are able to attract their attention and measure their suitability. The aim of this publication is to identify the main groups of challenges and to formulate possible solutions that can support the efficiency of both selection and recruitment activities for each national security service.


Sign in / Sign up

Export Citation Format

Share Document