In the modern world, the use of ICT communication technologies has become an integral part of life. ICT infrastructure is the bearer of digital traces of both legal and illegal activities performed through it. However, for something to become digital evidence, it must be obtained by law and by a person authorised by law. Namely, the virtual infrastructure, especially the Internet and the new challenges brought to us by cloud architectue due to its physical positioning outside national borders, calls into question the legality of searching and collecting digital evidence outside national borders. This paper analyses the legal basis for collecting digital evidence in cyberspace internationally, such as the Council of Europe Convention on Cybercrime, the US Cloud Act, the Australian Decryption Act and the European GDPR. Although the Court of Justice of the European Union declared invalid the decision of the European Commission (EU) 2016/1250 on the adequacy of data protection provided through the EU-US Privacy Shield, experts must not stop looking for a solution to the apparent problem. The paper intends to support decision-makers in taking clear national positions regarding the above controversial legal norms and their mutual conflict. The paper compares the legal consequences of such collection, and the acceptability of such digital evidence, and such collection may also be associated with a breach of the privacy of a legal and private entity.
{"title":"The Challenges of Collecting Digital Evidence Across Borders","authors":"Krunoslav Antoliš","doi":"10.59245/ps.32.3.2","DOIUrl":"https://doi.org/10.59245/ps.32.3.2","url":null,"abstract":"In the modern world, the use of ICT communication technologies has become an integral part of life. ICT infrastructure is the bearer of digital traces of both legal and illegal activities performed through it. However, for something to become digital evidence, it must be obtained by law and by a person authorised by law. Namely, the virtual infrastructure, especially the Internet and the new challenges brought to us by cloud architectue due to its physical positioning outside national borders, calls into question the legality of searching and collecting digital evidence outside national borders. This paper analyses the legal basis for collecting digital evidence in cyberspace internationally, such as the Council of Europe Convention on Cybercrime, the US Cloud Act, the Australian Decryption Act and the European GDPR. Although the Court of Justice of the European Union declared invalid the decision of the European Commission (EU) 2016/1250 on the adequacy of data protection provided through the EU-US Privacy Shield, experts must not stop looking for a solution to the apparent problem. The paper intends to support decision-makers in taking clear national positions regarding the above controversial legal norms and their mutual conflict. The paper compares the legal consequences of such collection, and the acceptability of such digital evidence, and such collection may also be associated with a breach of the privacy of a legal and private entity.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernard Vukelić, Alida Dina Zvonarić, Nikola Protrka
information (personal or official) for financial gain. That is one of the oldest cyber threats. There is a wide range of phishing attack techniques, and the most frequent one is performed via electronic mail. Due to major changes in conducting business in the last pandemic, which entail remote work, fast digital transformation and the increase of ICT technologies, the statistics show that phishing attacks are on the rise. Employees who lack developed awareness of phishing attacks, responsibility and knowledge represent a potential danger to the entire organisation. This paper describes the research on e-mail phishing recognition in business organisations in Primorje-Gorski kotar County. The research showed that employees are not aware of phishing attacks to a sufficient extent and that all the habits contributing to the IT security level regarding these attacks are not satisfying. To protect against such attacks, organisations should, in addition to implementing safety technical measures, actively educate employees and periodically implement testing.
{"title":"The Recognition of an E-Mail Phishing Cyberattack in Business Organizations","authors":"Bernard Vukelić, Alida Dina Zvonarić, Nikola Protrka","doi":"10.59245/ps.32.3.4","DOIUrl":"https://doi.org/10.59245/ps.32.3.4","url":null,"abstract":"information (personal or official) for financial gain. That is one of the oldest cyber threats. There is a wide range of phishing attack techniques, and the most frequent one is performed via electronic mail. Due to major changes in conducting business in the last pandemic, which entail remote work, fast digital transformation and the increase of ICT technologies, the statistics show that phishing attacks are on the rise. Employees who lack developed awareness of phishing attacks, responsibility and knowledge represent a potential danger to the entire organisation. This paper describes the research on e-mail phishing recognition in business organisations in Primorje-Gorski kotar County. The research showed that employees are not aware of phishing attacks to a sufficient extent and that all the habits contributing to the IT security level regarding these attacks are not satisfying. To protect against such attacks, organisations should, in addition to implementing safety technical measures, actively educate employees and periodically implement testing.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U članku se opisuje postupanje policijskih službenika u provedbi taktičke mjere izviđanja radi pripreme i planiranja intervencije. Daje se prikaz aktivnosti radi pribavljanja relevantnih podataka i saznanja nužnih za planiranje i provedbu intervencije, s analizom sadržaja postupanja. Skreće se pozornost na složenost procesa i utjecaj na postupak odlučivanja o izvršenju konkretne policijske intervencije.
{"title":"Izviđanje u funkciji pripreme i planiranja policijske intervencije","authors":"Dražen Kralj","doi":"10.59245/ps.32.3.3","DOIUrl":"https://doi.org/10.59245/ps.32.3.3","url":null,"abstract":"U članku se opisuje postupanje policijskih službenika u provedbi taktičke mjere izviđanja radi pripreme i planiranja intervencije. Daje se prikaz aktivnosti radi pribavljanja relevantnih podataka i saznanja nužnih za planiranje i provedbu intervencije, s analizom sadržaja postupanja. Skreće se pozornost na složenost procesa i utjecaj na postupak odlučivanja o izvršenju konkretne policijske intervencije.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ova studija opisuje širenje štetnog sadržaja putem zlonamjernih aplikacija implementiranih na društvenoj mreži Facebook. Opisan je sigurnosni incident, s naglaskom na motive i svrhu kibernetičkih napada, kao i opis napadača i žrtava. Detaljno su opisani alati napadača, kao i tehnike koje je koristio kako bi zahvatio mnoge potencijalne žrtve, inficirao ih zlonamjernim programima, monetizirao žrtve i prikrio tragove napada. Izvršena je analiza podataka na skupu podataka koji sadrži informacije o više od dva milijuna žrtava. Fokus analize je modeliranje širenja zlonamjernih programa te određivanje omjera žrtava na temelju spola i zemlje podrijetla. Studija pokazuje znatnu statističku razliku među žrtvama napada na temelju njihova spola.
Ova studija opis opis širenje štetnog sadržaja putem malamiernih aplikacija implementiranih na društvenoj sietji Facebook.它描述了一起严重事件,重点是网络攻击的动机和性质,以及对攻击者和受害者的描述。Detaljno su opisani alati napadača, kao i tehnike koje je koristio kako bi zahvatio mnoge potencijalne sacrtve, inficirao ih zlonamjernim programima, monetizirao sacrtve i prikrio tragove attackada.对包含 200 多万受害者信息的数据池数据进行了分析。分析的重点是建立恶意程序传播的模型,并根据性别和原籍国确定受害者。研究表明,根据性别,攻击受害者之间存在明显的统计差异。
{"title":"Preventing Security Incidents on Social Networks","authors":"Hrvoje Čemeljić, Marina Bagić Babac","doi":"10.59245/ps.32.3.1","DOIUrl":"https://doi.org/10.59245/ps.32.3.1","url":null,"abstract":"Ova studija opisuje širenje štetnog sadržaja putem zlonamjernih aplikacija implementiranih na društvenoj mreži Facebook. Opisan je sigurnosni incident, s naglaskom na motive i svrhu kibernetičkih napada, kao i opis napadača i žrtava. Detaljno su opisani alati napadača, kao i tehnike koje je koristio kako bi zahvatio mnoge potencijalne žrtve, inficirao ih zlonamjernim programima, monetizirao žrtve i prikrio tragove napada. Izvršena je analiza podataka na skupu podataka koji sadrži informacije o više od dva milijuna žrtava. Fokus analize je modeliranje širenja zlonamjernih programa te određivanje omjera žrtava na temelju spola i zemlje podrijetla. Studija pokazuje znatnu statističku razliku među žrtvama napada na temelju njihova spola.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Povijesno različito valorizirana, ali u konačnici odbačena metoda antropološke identifikacije poznata pod imenom Bertillonage, u suvremenim uvjetima mogla bi se, barem na simboličkoj razini, reafirmirati. Naime, Bertillonova metoda, zbog znanstveno-tehnoloških limita, te istodobno nadiruće daktiloskopije, odbačena je i „arhivirana“ kao povijesna znamenitost, gotovo na razini rariteta. U današnjim uvjetima sofisticiranih sigurnosnih računalnih i drugih alata i znatne „pokrivenosti“ javnih prostora različitim oblicima videonadzora, otvara se mogućnost pribavljanja golemih podataka o snimljenim osobama i registriranim događajima, kako u smislu identifikacije tih osoba, tako i u smislu utvrđivanja tijeka i dinamike (okolnosti) događaja. Iako postoje brojni forenzični računalni alati za automatiziranu antropometrijsku identifikaciju, u ovom radu prikazan je dio naših istraživanja o mogućnosti i pouzdanosti mjerenja antropometrijskih karakteristika maskiranih ili na snimci neprepoznatljivih počinitelja kaznenih djela snimljenih sigurnosnim videokamerama, pritom vodeći računa o varijabilnim parametrima poput visine kamere, kuta snimanja, kuta osi objektiva u odnosu na objekt snimanja, udaljenosti objekta od objektiva i dr. te njihovu utjecaju na konačni rezultat mjerenja. Također, u ovom radu prikazat će se relativno jednostavna i pouzdana metoda osiguravanja tzv. nespornog materijala tako da osigurava respektabilnu razinu preciznosti mjerenja visine nepoznate osobe.
被称为 "贝蒂隆方法"(Bertillonage)的人类学鉴定方法,在现代社会中,勉强可以在象征性的层面上得到重新肯定,但其价值却大相径庭,甚至最终被打了折扣。然而,由于科学和技术的局限性,以及当代双齿镜的优越性,贝蒂隆方法已被揭穿,并被 "归档 "为一种奇特的方法,当然也是一种稀有的方法。在当今世界,计算机和其他安全设备日趋完善,各种形式的视频监控也在公共场所大量 "覆盖",因此有可能获得关于被记录的人和事的大量数据,无论是在识别这些人的身份方面,还是在确定事件的过程和动态(情况)方面。Iako postoje brojni forenzični računalni alati za automatiziranu antropometrijsku identifikaciju, u ovom radu prikazan je dio naše istraživanja o mogućnosti i pouzdanosti mjerenja antropometrijskih karakteristika maskiranih ili na snimci neppoznatljivih počinitelja kaznenih djela snimljenih sigurnosnim videokamerama、同时考虑到摄像机高度、摄像机角度、摄像机轴线与拍摄对象的角度、拍摄对象与摄像机的距离等可变参数。这些参数都会对最终的测量结果产生影响。这些参数会对最终测量结果产生影响。
{"title":"Mjerenje antropometrijskih karakteristika osobe snimljene videonadzornom kamerom","authors":"Želimir Radmilović, Nikša Jelovčić, Ivan Gundić","doi":"10.59245/ps.32.3.5","DOIUrl":"https://doi.org/10.59245/ps.32.3.5","url":null,"abstract":"Povijesno različito valorizirana, ali u konačnici odbačena metoda antropološke identifikacije poznata pod imenom Bertillonage, u suvremenim uvjetima mogla bi se, barem na simboličkoj razini, reafirmirati. Naime, Bertillonova metoda, zbog znanstveno-tehnoloških limita, te istodobno nadiruće daktiloskopije, odbačena je i „arhivirana“ kao povijesna znamenitost, gotovo na razini rariteta. U današnjim uvjetima sofisticiranih sigurnosnih računalnih i drugih alata i znatne „pokrivenosti“ javnih prostora različitim oblicima videonadzora, otvara se mogućnost pribavljanja golemih podataka o snimljenim osobama i registriranim događajima, kako u smislu identifikacije tih osoba, tako i u smislu utvrđivanja tijeka i dinamike (okolnosti) događaja. Iako postoje brojni forenzični računalni alati za automatiziranu antropometrijsku identifikaciju, u ovom radu prikazan je dio naših istraživanja o mogućnosti i pouzdanosti mjerenja antropometrijskih karakteristika maskiranih ili na snimci neprepoznatljivih počinitelja kaznenih djela snimljenih sigurnosnim videokamerama, pritom vodeći računa o varijabilnim parametrima poput visine kamere, kuta snimanja, kuta osi objektiva u odnosu na objekt snimanja, udaljenosti objekta od objektiva i dr. te njihovu utjecaju na konačni rezultat mjerenja. Također, u ovom radu prikazat će se relativno jednostavna i pouzdana metoda osiguravanja tzv. nespornog materijala tako da osigurava respektabilnu razinu preciznosti mjerenja visine nepoznate osobe.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The outbreak of the pandemic, military conflicts and political maelstrom have changed the constellation of the information environment, generating a noticeable increase in ignorance, disinformation, manipulation resulting in fake news, conspiracy theories and the hate speech. The phenomena are escalated and intensified by rapid technological progress, widespread digitization and its impact on all areas of life, especially political activity. Due to the changes brought about by the digital revolution, a new social formation has emerged, known as the information society represented not only by politicians and social activists. The modified architecture of digital space causes the formation of new instruments, influence factors, and harmful social phenomena – previously present and recognized, but never before so intense. This article describes and analyses the issue of ignorance, misinformation, disinformation and manipulation as potential and actual tools of political power and terrorism. The study assesses the impact of disinformation, manipulation and hate speech disseminated through social media sites and abused by politicians who use it to build and extend political power. It also examines the impact of these detrimental and injurious phenomena on the functioning of the rule of law, democracy and fundamental human rights. The article defines the terms of ignorance, misinformation and manipulation proving that a language, as a means of communication should be neutral, is actually used for promoting ideology, coming to power, serving hatred, violence, and inciting criminal acts and crimes. Thus, political players worldwide use language and media to justify violence and to spread false ideologies and improve their public image.
{"title":"Ignorance,\u0000Disinformation, Manipulation and Hate Speech as Effective Tools of Political\u0000Power","authors":"M. Konieczny","doi":"10.59245/ps.32.2.1","DOIUrl":"https://doi.org/10.59245/ps.32.2.1","url":null,"abstract":"The outbreak of the pandemic, military conflicts and political maelstrom have changed the constellation of the information environment, generating a noticeable increase in ignorance, disinformation, manipulation resulting in fake news, conspiracy theories and the hate speech. The phenomena are escalated and intensified by rapid technological progress, widespread digitization and its impact on all areas of life, especially political activity. Due to the changes brought about by the digital revolution, a new social formation has emerged, known as the information society represented not only by politicians and social activists. The modified architecture of digital space causes the formation of new instruments, influence factors, and harmful social phenomena – previously present and recognized, but never before so intense. This article describes and analyses the issue of ignorance, misinformation, disinformation and manipulation as potential and actual tools of political power and terrorism. The study assesses the impact of disinformation, manipulation and hate speech disseminated through social media sites and abused by politicians who use it to build and extend political power. It also examines the impact of these detrimental and injurious phenomena on the functioning of the rule of law, democracy and fundamental human rights. The article defines the terms of ignorance, misinformation and manipulation proving that a language, as a means of communication should be neutral, is actually used for promoting ideology, coming to power, serving hatred, violence, and inciting criminal acts and crimes. Thus, political players worldwide use language and media to justify violence and to spread false ideologies and improve their public image.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.1,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45028172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}