- citati u SCIndeksu: [1]
- citati u CrossRef-u:[1]
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:7
- preuzimanja u poslednjih 30 dana:5
|
|
2016, vol. 68, br. 7, str. 164-180
|
Aktivnosti savremenih obaveštajnih službi u kiber prostoru
Activities of modern intelligence services in cyberspace
aMinistarstvo odbrane Republike Srbije bUniverzitet u Beogradu, Fakultet bezbednosti, Srbija
e-adresa: nputnik@fb.bg.ac.rs
Sažetak
Špijunaža između država je stara stotinama godina. Od puštanja interneta u komercijalnu upotrebu razvijene zemlje počinju da koriste prednosti računara i interneta u toj aktivnosti. Obaveštajna delatnost teži da iskoristi sve prednosti i mane masovne upotrebe informaciono-komunikacione tehnologije (IKT) za obavljanje obaveštajnih aktivnosti. Nema ozbiljne obaveštajne službe u svetu koja nije zainteresovana za ovaj način obaveštajnog istraživanja, pogotovo zbog ekonomičnosti ovakve aktivnosti u odnosu na druge načine prikupljanja poverljivih podataka. U aktuelnoj navali međusobnog optuživanja velikih država za kiber špijunažu nema nevinih. Suštinska pitanja su kada je neko nekoga špijunirao, i ko je koga unajmio u te svrhe. Kiber prostor se, po svojoj prirodi, protivi pronalaženju odgovora na ova pitanja - u njemu je veoma teško otkriti identitet zlonamernog aktera, kao i dokazati sprovođenje i naručivanje takvih nelegalnih operacija. Zbog toga će i aktivnosti obaveštajnih službi u kiber prostoru biti sve izraženije, što će, po svoj prilici, voditi ka promenama u načinu prikupljanja obaveštajnih podataka.
Abstract
Espionage between countries dates back hundreds of years. Since the Internet was released for commercial use, developed countries started to exploit the advantages of computers and the Internet in espionage. Intelligence activity seeks to exploit all advantages and disadvantages of the mass use of information and communications technology (ICT) for purposes of intelligence activities. There is no serious intelligence service in the world which is not interested in this way of intelligence research, primarily because of the cost-effectiveness of such activity in comparison to other ways of collecting classified information. Nowadays, great powers are accusing each other of cyber espionage, the core issues being when one was spying on the other and who hired whom for that purpose. Cyberspace, by its nature, denies answers to these questions; in cyberspace it is very difficult to discover the identity of any malicious actor, as well as to prove the performance and ordering of such illegal operations. That is why the activities of the intelligence services in cyberspace will be ever more present, which will likely lead to changes in the way of intelligence gathering.
|
|
|
Reference
|
|
*** (2009) Zakon o potvrđivanju Konvencije o visokotehnološkom kriminalu. Sl. glasnik RS, br. 19, 19. mart
|
|
*** Finland's cyber security strategy. http://www.yhteiskunnanturvallisuus.fi/.../38-finlan, 04.05.2016
|
|
*** (2005-2014) Krivični zakonik. Sl. glasnik RS, Sl. glasnik RS, br. 85/2005, 88/2005 - ispr., 107/2005 ispr., 72/2009, 111/2009, 121/2012, 104/2013 i 108/2014
|
|
*** (2016) Zakon o informacionoj bezbednosti Republike Srbije. Službeni glasnik RS, broj 6, 28.01.2016
|
|
Adkins, B. (2001) The spectrum of cyber conflict from hacking to information warfare: What is law enforcement‘s role. Alabama: Air Command and Staff College Air University, USAF
|
|
Berg, C. (2005) High-Assurance Design: Architecting Secure and Reliable Enterprise Applications. Amsterdam: Addison-Wesley Longman
|
|
Brenner,, Susan, W., Anthony, S.C.C. (2006) Sponsored Crime: The Futility of the Economic Espionage Act. Houston journal of international law, Vol. 28: 2, pp. 389-465
|
1
|
Clarke, R.A., Knake, R.K. (2010) Cyber war: The next threat to national security and what to do about it. New York: Harper Collins
|
|
Coleman, K. (2008) The growing risk of cyber attack and other security threats. Risk report, Vol. XXXI, No. 3, November, http://www.hwphillips.com/wp-content/uploads/2012/09/The-Growing-Risk-of-Cyber-Attack-and-Other-Security-Threats.pdf, 07.02.2016
|
|
Cooperative Cyber Defence Centre of Excellence (2010) International cyber incidents: Legal considerations. u: Eneken Tikk; Kadri Kaska; Liis Vihul [ur.] Abbrevations and glossary, Tallinn: Cooperative Cyber Defence Centre of Excellence, http://www.ccdcoe.or, (preuzeto 12.07.2014)
|
|
Deibert, R., Rohozinski, R. (2016) Tracking GhostNet: Investigating a cyber espionage network. u: Information Warfare Monitor, 29.03.2009, The SecDev Group & The Citizen Lab, http://www.nsi.org/pdf/reports/Cyber%20Espionage%20Network.pdf (05.05.2016)
|
|
Federal Ministry of Interior (2011) Cyber security strategy for Germany. Berlin: Federal Ministry of the Interior, https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/CyberSecurity/Cyber_Security_Strategy_for_Germany.pdf?_blob=publicationFile (10.04.2012)
|
|
Golumbic, C.M. (2007) Fighting terror online: The convergence of security, technology, and the law. New York: Springer
|
|
Hathaway, O., Crootof, R., i dr. (2012) The law of cyber-attack. California Law Review, pp. 817-885
|
|
International Telecommunication Union (2011) The ITU national cyber security strategy guide. Geneva: ITU, http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-national-cybersecurity-guide.pdf (04.05.2016)
|
|
Kalauzović, G. (2011) Ofanzivne kiber aktivnosti. Novi glasnik, broj 1-4, januar-decembar
|
|
Kelsey, J.T.G. (2008) Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Michigan Law Review, Vol. 106, pp. 1427-1452
|
|
Kugler, R.L. (2009) Deterrence of Cyber Attacks. In Cyberpower and National Security. Washington, DC: National Defense University Press
|
|
Kuhn, M.G., Anderson, R.J. (1998) Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. Berlin, Heidelberg: Springer Nature, str. 124-142
|
|
Markagić, M. (2010) KEMZ i informaciona bezbednost. u: Petrović Slobodan [ur.] Zloupotreba informacionih tehnologija i zaštita, Beograd: Udruženje sudskih veštaka za informacione tehnologije, str. 185-192
|
|
McDowell, M. (2010) Cyber security tip ST0: Understanding denial-of-service attacks. US computer emergency readiness team, http://www.us-cert.gov/cas/tips/ST04-015.html (4.11.2010)
|
1
|
Milošević, M., Putnik, N. (2014) Problem pravne (ne)regulisanosti konflikata u kiber prostoru. Treći program, br. 162
|
1
|
Mladenović, D.D., Drakulić, M.S., Jovanović, D.M. (2012) Međunarodno pravo i sajber ratovanje. Vojno delo, vol. 64, br. 1, str. 9-39
|
3
|
Putnik, N. (2009) Sajber prostor i bezbednosni izazovi. Beograd: Univerzitet u Beogradu - Fakultet bezbednosti
|
|
Reljanović, M. (2013) Krivično pravna zaštita elektronskih tajnih podataka. u: Pristup informacijama od javnog značaja i zaštita tajnih podataka, Beograd: OEBS
|
|
Schaap, A.J. (2009) Cyber warfare operations: Development and use under international Law. Air Force Law Review - Cyberlaw Edition, Vol. 64, pp. 121-174
|
|
United States Government Accountability Office (2009) Information security: Cyber threats and vulnerabilities. Washington, DC: US GAO
|
4
|
van Eck, W. (1985) Electromagnetic radiation from video display units: An eavesdropping risk?. Computers & Security, 4(4): 269
|
|
William,, Spy, R.D. (2011) Game Change: Cyber Networks, Intelligence Collection, and Covert Action. George Washington Law Review, Vol. 79, pp. 1163-1200
|
|
Wulf, W. A., Jones, A. K. (2009) Reflections on Cybersecurity. Science, 326(5955): 943-944
|
|
|
|