Search Results

1 - 6 of 6 items :

Clear All
The Search for Classified Information – The Real Fight in the Cold War

Abstract

The effort to get classified information from inside the adverse camp was the main objective of both super powers involved in the Cold War. Both the USA and the USSR tried, by all means at their disposal, to be one step ahead of the opponent by knowing their capabilities and adverse plans. This paper approaches the manner in which intelligence-gathering specialized structures from both camps were involved in collecting data and intelligence to win the information battle during the Cold War

Open access
The Interaction between Intelligence Operations and Ethics in the Context of National Security: a Theoretical Review of the Problem

Abstract

The effectiveness of intelligence operations is directly related to the conduct of intelligence officers and depends on their moral attitudes and system of values. The specifics of intelligence operations may lead to moral dilemmas in the behaviour of the officers. The operating methods of intelligence institutions include both ethical tactical elements and those that run counter to the generally accepted ethical principles that could discredit democracy and the fundamental values that the state advocates. This article analyses the ethical problems that are encountered in the process of using HUMINT, an intelligence method. The authors employ theoretical analysis to construct an initial integral behaviour model of the intelligence officer based on the context of choices and operational implications that could encourage further scientific discussion of the subject.

Open access
Virtualization Solutions Supporting Privacy and Data Protection in Online Activities

Abstract

Nowadays, smart devices like computers, tablets, and smartphones allow transmitting the information everywhere, with high speed, over the World Wide Web. However, risks regarding data integrity, privacy and security when using the Internet, increased dramatically, as methods designed to exploit the system’s vulnerabilities are more and more sophisticated. Therefore the need for people working in professional environments to protect their private data when using unsecure connections, by employing advanced tools. There are multiple solutions, but we will focus on the use of virtualization software like VMware or Oracle Virtual Box, together with traditional privacy measures (use of proxies and VPN’s). Today’s smart devices store an important amount of data about their owners and, in most of the cases, people don’t even realize this. Installing and using protection means is often not enough. They have to be properly setup in order to ensure the desired level of security, or anonymity, when using the Internet, and require for the military personnel a good knowledge not only about cyber vulnerabilities and risks, but also technical capabilities and features of the employed security solutions.

DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE).

Open access
Key Performance Indicators for the Nato Centres of Excellence

Abstract

The NATO Centres of Excellence (COEs), entities involved in various fields of transformation in support of the Alliance, are subject of different levels of accreditation performed by NATO. An important aspect of such recognition comes with the NATO institutional accreditation for Quality Assurance (QA) in the case of the COEs involved in education and training delivery (alongside other NATO, National and Partner Education and Training Centres). The NATO QA seal is the trustworthy mark that a COE fulfils the expected quality requirements (based on a solid Quality Management System) in the educational process, and provides deliverables „fit for purpose” as solutions for the NATO education and training requirements. While the individual strategies of the COEs are pretty much different in this endeavour, we would outline the commonality of the standards they rely on. This paper focuses on institutional performance measurement as reference in the Quality Management System, trying to identify benchmarks for Key Performance Indicators (KPIs) based on the current experience at the COEs level - extended to the wider NATO Transformation Network - and shared best practice. DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE)

Open access
New Features of the NATO Centres of Excellence in Support of the North-Atlantic Alliance Transformation

describes how a force operates, the policy comes to explain why they do what they do. A doctrine is meant to be dynamic and constantly reviewed for relevance. [8] Kis, Alexandru, Standardizarea disciplinei HUMINT în NATO , proceedings of the conference ” Tehnologiile mileniului al III-lea şi viitorul activităţii de informaţii ”, 3 rd edition, Bucharest, 2013, sectiunea 2, p. 7. [9] http://nso.nato.int/nso/nsdd/_CommonList.html?runQ=no [10] Akşit, Cihangir, Idem . [11] http://www.nato.int/cps/en/natohq/topics_49206.htm [12] ACT holds lead

Open access
Polish - Romanian Military Cooperation

Humint Centre of Excellence, http://www.natohcoe.org [accessed: 09.03.2018]; [11] “Udział Polski w inicjatywach transformacyjnych NATO”, information of the Ministry of National Defence,http://www.archiwalny.mon.gov.pl/pliki/File/UDZIAL_POLSKI_W_INICJAT YWACH_TRANSFORMACYJNYCH_NATO_2011.pdf [accessed: 09.03.2018 r.]; [12] Progress on AGS with completion of first NATO-owned air vehicle, NATO information, 5th June 2015, http://www.nato.int/cps/en/natohq/news_120429.htm [accessed: 09.03.2018]; [13] Strategic Airlift, NATO

Open access