intelligence gathering
Recently Published Documents


TOTAL DOCUMENTS

371
(FIVE YEARS 105)

H-INDEX

15
(FIVE YEARS 2)

2022 ◽  
Vol 7 (1) ◽  
pp. 43-51
Author(s):  
Stefanus Eko Prasetyo ◽  
Try Windranata

aringan Nirkabel merupakan sekumpulan perangkat elektronik yang menghubungkan satu dengan yang lain memanfaatkan perangkat udara alias frekuensi jadi alur lintas data. Masa sekarang ini, ada banyak pengguna yang memanfaatkan WPA2-PSK ataupun WPA2-EAP menjadi security system jaringan nirkabel yang bertujuan untuk menghindari orang yang mengakses tanpa izin.  Riset ini memakai teknik wireless penetration testing yang memakai fluxion tools dengan membandingkan dan menganalisis security system otentikasi WPA2 dengan EAP-PSK pada jaringan nirkabel yang bertujuan untuk mengetahui kerentanan sebuah sistem keamanan jaringan tersebut. Untuk melaksanakan penetration testing penulis mengacu terhadap “Wireless Network Penetration Testing Methodology.” Yang terdiri dari intelligence gathering, vulnerability analysis, threat modelling, password cracking, dan reporting. Dari penelitian ini akan menyimpulkan WPA2-PSK kurang aman untuk digunakan dikarenakan terlihat pada penetration testing tesrsebut WPA2-PSK berhasil dibobol dalam keadaan SSID unhide­, sedangkan WPA2-EAP berhasil dalam pembuatan Web Interface namun tidak berhasil dalam mendapatkan informasi seperti username dan passwor. Jika WPA2-PSK SSID dalam keadaan hide akan mengagalkan peretasan sehingga dari sistem keamanan kedua tersebut memiliki kelebihan dan kekurangan masing-masing tergantung kebutuhan pengguna.


2021 ◽  
Vol 20 (3) ◽  
pp. 388-398
Author(s):  
Ivan D. Puzyrev

Siberian Bukharans were one of the most agile group of the native population of Western Siberia and the Urals in the 17th and 18th centuries. This paper analyzes information about the border activities of Bukharans, characterizes their participation in the implementation of Russian foreign policy. The author considers the phenomenon of intelligence and the intermediary and diplomatic role of the Bukharans through the study of various aspects of Russian policy on the southeastern borderlands. The result shows that Bukharans were involved in intelligence activities in several forms. The Russian authorities could interview Bukharans who came to trade; they could include Bukharans in Russian embassies; or they could send them into the steppe as independent agents. The geography of their missions in the 17th and 18th centuries included the Kuchum lands, the Kazakh khanates, the Oirat and Dzungar lands, as well as the Qing Empire. Bukharans participated in the negotiations as interpreters and they were sometimes allowed to participate in diplomatic ceremonies such as gift exchange. The intelligence activities of some Bukharans could go hand in hand with their trade operations. Recruiting Bukharans for intelligence gathering tsks allowed the Siberian and Orenburg authorities to conduct a more effective policy in the steppe borderlands, based on the knowledge of local realities. The Russian authorities used information provided by the Bukharans for purposes such as drawing up maps, informing the voivodes of the borderlands about military dangers, the movement of troops, and diplomatic negotiations.


2021 ◽  
pp. 141-169
Author(s):  
Christine Jackson

Herbert’s embassy coincided with a particularly complex period of European diplomacy as Catholic and Protestant nations moved from negotiating to taking up arms in the Thirty Years War. Chapter 7 explores his diplomatic role, actions, and lifestyle. It considers the difficulties he encountered in serving an English monarch pursuing a pro-Spanish foreign policy unpopular with a majority of his subjects, while cultivating good relations with an inexperienced French monarch facing internal opposition from his politically ambitious mother, rebellious nobility, and a discontented Protestant minority. It looks at Herbert’s reinvigoration of his noble and princely contacts in France and other European states and his relations with princes, ministers, and fellow diplomats. It focuses upon his determination to maximize his status and dignity when representing James I in the renewal of the oath of alliance with France, his energetic but unofficial support for the elector and electress palatine when they accepted the Bohemian Crown and triggered European-wide war, and his robust defence of French Protestants. It emphasizes the quality of his diplomatic reports and the success of his diplomatic networking and intelligence gathering. It examines his controversial exchanges with Louis XIII, and the royal favourite, the duke of Luynes, when, on the direct instruction of James I, he criticized the French king’s use of military force to suppress French Protestantism in south-west France during 1620 to 1621.


2021 ◽  
Author(s):  
Mohammed Y. Alzahrani ◽  
Alwi M Bamhdi

Abstract In recent years, the use of the internet of things (IoT) has increased dramatically, and cybersecurity concerns have grown in tandem. Cybersecurity has become a major challenge for institutions and companies of all sizes, with the spread of threats growing in number and developing at a rapid pace. Artificial intelligence (AI) in cybersecurity can to a large extent help face the challenge, since it provides a powerful framework and coordinates that allow organisations to stay one step ahead of sophisticated cyber threats. AI provides real-time feedback, helping rollover daily alerts to be investigated and analysed, effective decisions to be made and enabling quick responses. AI-based capabilities make attack detection, security and mitigation more accurate for intelligence gathering and analysis, and they enable proactive protective countermeasures to be taken to overwhelm attacks. In this study, we propose a robust system specifically to help detect botnet attacks of IoT devices. This was done by innovatively combining the model of a convolutional neural network with a long short-term memory algorithm mechanism to detect two common and serious IoT attacks (BASHLITE and Mirai) on four types of security camera. The data sets, which contained normal malicious network packets, were collected from real-time lab-connected camera devices in IoT environments. The results of the experiment showed that the proposed system achieved optimal performance, according to evaluation metrics. The proposed system gave the following weighted average results for detecting the botnet on the Provision PT-737E camera: camera precision: 88%, recall: 87% and F1 score: 83%. The results of system for classifying botnet attacks and normal packets on the Provision PT-838 camera were 89% for recall, 85% for F1 score and 94%, precision. The intelligent security system using the advanced deep learning model was successful for detecting botnet attacks that infected camera devices connected to IoT applications.


2021 ◽  
Vol 11 (22) ◽  
pp. 10596
Author(s):  
Chung-Hong Lee ◽  
Hsin-Chang Yang ◽  
Yenming J. Chen ◽  
Yung-Lin Chuang

Recently, an emerging application field through Twitter messages and algorithmic computation to detect real-time world events has become a new paradigm in the field of data science applications. During a high-impact event, people may want to know the latest information about the development of the event because they want to better understand the situation and possible trends of the event for making decisions. However, often in emergencies, the government or enterprises are usually unable to notify people in time for early warning and avoiding risks. A sensible solution is to integrate real-time event monitoring and intelligence gathering functions into their decision support system. Such a system can provide real-time event summaries, which are updated whenever important new events are detected. Therefore, in this work, we combine a developed Twitter-based real-time event detection algorithm with pre-trained language models for summarizing emergent events. We used an online text-stream clustering algorithm and self-adaptive method developed to gather the Twitter data for detection of emerging events. Subsequently we used the Xsum data set with a pre-trained language model, namely T5 model, to train the summarization model. The Rouge metrics were used to compare the summary performance of various models. Subsequently, we started to use the trained model to summarize the incoming Twitter data set for experimentation. In particular, in this work, we provide a real-world case study, namely the COVID-19 pandemic event, to verify the applicability of the proposed method. Finally, we conducted a survey on the example resulting summaries with human judges for quality assessment of generated summaries. From the case study and experimental results, we have demonstrated that our summarization method provides users with a feasible method to quickly understand the updates in the specific event intelligence based on the real-time summary of the event story.


2021 ◽  
Vol 15 (3) ◽  
pp. 642-649
Author(s):  
Igor A. Ivankov

Introduction: the article analyzes legislative norms regulating the activities of operational units of the Federal Penitentiary Service of Russia. Aim: by analyzing the norms of the current intelligence-gathering, penal enforcement and criminal-procedural legislation, to put forward proposals for introducing amendments to certain norms so as to improve the effectiveness of legal regulation of the activities of operational units of the penal system. Methods: comparative legal method, empirical methods of description and interpretation, theoretical methods of formal and dialectical logic. Private scientific methods: legal-dogmatic method and the method of interpretation of legal norms. Results: having analyzed certain norms of the current intelligence-gathering, penal enforcement and criminal-procedural legislation, we see that the norms under consideration are in a certain contradiction, and there are also gaps in the legislative regulation of the activities of operational units of the Federal Penitentiary Service of Russia. Conclusions: we argue that structural operational units of the territorial and central management bodies of the Federal Penitentiary Service of Russia can conduct intelligence-gathering activities outside the territory of correctional institutions, including cases when such activities are conducted according to regulations set out as the tasks of intelligence-gathering activities in institutions executing sentences in the form of imprisonment. We also argue that operational units of the territorial bodies of the Federal Penitentiary Service of Russia can conduct intelligence-gathering activities aimed at establishing the location of convicts, those who have escaped from correctional institutions, their detention and delivery to the investigator (inquirer) for conducting investigative actions. We note legal gaps in the legislative regulation of these measures and propose amendments to legislative acts aimed at improving the effectiveness of law enforcement practice.


2021 ◽  
Vol 3 (13) ◽  
pp. 107-110
Author(s):  
E. I. PEN’KOV ◽  

The article provides a criminal-legal description of the abuse of official powers, identifies the problems of proving a selfish motive, collecting, checking and evaluating evidence in the investigation of crimes provided for in Article 285 of the Criminal Code of the Russian Federation. We pay special attention to the intelligence-gathering support to the investigation of abuse of official powers, its role in the fight against official crime, taking into account the current stage of development of social and economic relations.


2021 ◽  
Vol 1 (1) ◽  
pp. 58-71
Author(s):  
Damaris Muthoni

Purpose: Global Tourism destinations provide different products which satisfy tourists with different interests, needs and wants. The general objective of the study was to examine effect of terrorism on the performance of tourism industry. Methodology: The paper used a desk study review methodology where relevant empirical literature was reviewed to identify main themes and to extract knowledge gaps. Findings: The study concludes relevant governments should face the fact that terrorist attacks provoke a substitution effect on destination choice behaviors. Tourists will replace destinations considered unsafe due to terrorist threats with others considered safer. The physical distance of the tourists' home countries and their cultural and socio-economic traits influence this replacement behavior. Given the randomness of terrorist attacks, relevant governments should be prepared to alter quickly their marketing strategy, namely their market targeting strategies and promotion campaigns to prevent substitution effect and lack low returns from the tourism industry Recommendations: The study recommends that relevant governments in dealing with the root causes of terrorism should also denounce the terrorists considering their acts as criminal acts just like others. The tourism stakeholders should increase efficiency in law enforcement, prosecution of terrorist suspects, by improving intelligence gathering and the police should be effectively trained to deal with terrorism incidences. The covert nature of terrorism often precludes an easy analysis of their capabilities or intent, therefore, giving them an advantage of lying in wait and striking when least expected; thus, the government counterterrorism should be proactive  


2021 ◽  
Vol 142 (2) ◽  
pp. 141-153
Author(s):  
KRZYSZTOF HOROSIEWICZ

In 1990, due to political changes in Poland, the use of Covert Human Intelligence Sources (CHIS) in combating crime raised controversy. Therefore, the hastily and secretly prepared legislation limited the provisions to merely signalling the possibility of the police using this method of intelligence gathering. Despite further modifi cations of the existing law, the use of CHIS is still only referred to in Act on the Police [1990 Article 22(1)], which states that: “Police can use the help of non-police offi cers to perform their tasks.” The laxity of this provision is particularly evident in the context of precise and understandable regulations in countries such as Great Britain, Northern Ireland and the United States of America. The use of minors’ help is not regulated at the level of internal confi dential police regulations, which makes it diffi cult for police offi cers to fi ght juvenile delinquency. The aim of the research was to determine whether legal conditions in Poland prevent the use of juvenile CHIS. The analysis led to the conclusion that there are no legal obstacles present, but the use of juvenile informants should depend on the fulfi lment of certain conditions.


Sign in / Sign up

Export Citation Format

Share Document