Abstract: Today data is, in many aspects, the basis of production, and, therefore, has serious economic and social value. Besides handling and processing historical data, Big Data methods and technologies help to process enormous amounts of information almost real-time in the business sphere, as well as at institutions of public and national security. Big Data methods constitute an additional tool of extracting the meaning of assorted and processed data piles and drawing the attention of the decision makers to certain aspects, trends, or even patterns. In the first part of my study, I wish to describe the legal framework of extracting knowledge that pertains to the U.S. law enforcement agencies and national security services in the country where this method is used in the broadest spectrum of such work. Afterwards, in the second part, I shall review certain methods along with fields of possible usage.
Abstract: The study formulates some risk analysis and ideas about the national security in connection with typical inner proportions and presently processions in establishments of the hungarian correctional law-enforcement’s and also realizing the exceptional occurences.
Abstract: The paper presents the perpetrators of the grave terrorist attacks in Europe in the last years having been connected not only to the center and leadership of the ISIS in Syria, thus contradicting the theory of lone wolves, but also to some European cells and ringleaders of Al-Kaida networks, from whom they obtained logistical and ideological ammunition. These relationships have spanned decades and have survived the conflicts of the two organizations and played an important part behind the European attacks of the Islamic State. Among the terrorists of the Paris and Brussels attacks in 2015-16, those who served a key role in these attacks, especially the ringleader Abdelhamid Abaaoud, had the most intensive relationship to al-Kaida veterans. We might ask the question: after the fall of ISIS in Syria and Iraq, what kind of sleeper cells and resurgent networks we have to expect? The paper shows the complexity of these diversification procedures in the mirror of the ambivalent position of Morocco on the global map of Jihadist terrorism. Finally, it highlights the escalative nature of the attackers’s terrorist „carreer” and the dilemmas of early intelligence and detection with which the counterterrorist efforts are confronted.
Abstract: Managing and retaining secrets are inevitable elements of secret service work and are indispensable for the effective fulfillment of the underlying roles. At the same time, in modern democracies these services operate in an equilibrium built on legality, compliance with human rights and the democratic division of powers, and thus their performance is expected to be transparent and measurable. Secret services are like a double-edged sword: They are useful, but may turn into a destructive weapon in the wrong hands, endangering both themselves and the public. In a democracy they can prevent hazards, terrorist acts and may protect national interests. In a different historical situation or in a different social system, they may serve as the means of oppression, applying violence and depriving people of their rights. In all cases, secret services must be subjected to control by society. What was it like in an era when such control rights were not assigned to society? How and in what quality this control took shape? How does this impact the effectiveness of Romanian special services? These are the topics scrutinized in this paper.
Abstract: The Stasi developed out of the internal security and police apparatus established in the Soviet zone of occupation in Germany after WW II. The ministry, whose forerunner was the Kommissariat 5, was founded on February 8, 1950, four months after the establishment of the German Democratic Republic. Under Erich Mielke the Stasi became a highly effective secret police organization. Within East Germany it sought to infiltrate every institution of society and every aspect of daily life. The Stasi also had links to various terrorist groups, most notably the Red Army Fraction (RAF) in West Germany. During the 1970s and ’80s the Stasi worked closely with the RAF and cooperated with Abu Nidal, Ilich Ramírez Sánchez (commonly known as Carlos, “the Jackal”), and the Palestine Liberation Organization. The Stasi also allowed Libyan agents to use East Berlin as a base of operations for carrying out terrorist attacks in West Berlin. In addition, the present paper tries to contribute to the Hungarian aspect of the topic, to the bilateral cooperation with the GDR.
Abstract: The aim of this articles to give an overview about corporate intelligence and to specify its difference from industrial espionage. The corporate intelligence means the support of the strategic management and decision making of a corporate’s highest level by analyzing processes of markets. The goal of industrial espionage is the acquirement of corporate’s protected pieces of information and the unlawful advantage-making. The industrial counter-espionage as the application of defensive corporate intelligence is presented in the last chapter and beside the so called traditional forms of industrial espionage I call attention to two new threats, to the organized crime and terrorism, highlighting their important characteristics in terms of defense.