{"title":"The Challenges of Collecting Digital Evidence Across Borders","authors":"Krunoslav Antoliš","doi":"10.59245/ps.32.3.2","DOIUrl":"https://doi.org/10.59245/ps.32.3.2","url":null,"abstract":"In the modern world, the use of ICT communication technologies has become an integral part of life. ICT infrastructure is the bearer of digital traces of both legal and illegal activities performed through it. However, for something to become digital evidence, it must be obtained by law and by a person authorised by law. Namely, the virtual infrastructure, especially the Internet and the new challenges brought to us by cloud architectue due to its physical positioning outside national borders, calls into question the legality of searching and collecting digital evidence outside national borders. This paper analyses the legal basis for collecting digital evidence in cyberspace internationally, such as the Council of Europe Convention on Cybercrime, the US Cloud Act, the Australian Decryption Act and the European GDPR. Although the Court of Justice of the European Union declared invalid the decision of the European Commission (EU) 2016/1250 on the adequacy of data protection provided through the EU-US Privacy Shield, experts must not stop looking for a solution to the apparent problem. The paper intends to support decision-makers in taking clear national positions regarding the above controversial legal norms and their mutual conflict. The paper compares the legal consequences of such collection, and the acceptability of such digital evidence, and such collection may also be associated with a breach of the privacy of a legal and private entity.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernard Vukelić, Alida Dina Zvonarić, Nikola Protrka
{"title":"The Recognition of an E-Mail Phishing Cyberattack in Business Organizations","authors":"Bernard Vukelić, Alida Dina Zvonarić, Nikola Protrka","doi":"10.59245/ps.32.3.4","DOIUrl":"https://doi.org/10.59245/ps.32.3.4","url":null,"abstract":"information (personal or official) for financial gain. That is one of the oldest cyber threats. There is a wide range of phishing attack techniques, and the most frequent one is performed via electronic mail. Due to major changes in conducting business in the last pandemic, which entail remote work, fast digital transformation and the increase of ICT technologies, the statistics show that phishing attacks are on the rise. Employees who lack developed awareness of phishing attacks, responsibility and knowledge represent a potential danger to the entire organisation. This paper describes the research on e-mail phishing recognition in business organisations in Primorje-Gorski kotar County. The research showed that employees are not aware of phishing attacks to a sufficient extent and that all the habits contributing to the IT security level regarding these attacks are not satisfying. To protect against such attacks, organisations should, in addition to implementing safety technical measures, actively educate employees and periodically implement testing.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Izviđanje u funkciji pripreme i planiranja policijske intervencije","authors":"Dražen Kralj","doi":"10.59245/ps.32.3.3","DOIUrl":"https://doi.org/10.59245/ps.32.3.3","url":null,"abstract":"U članku se opisuje postupanje policijskih službenika u provedbi taktičke mjere izviđanja radi pripreme i planiranja intervencije. Daje se prikaz aktivnosti radi pribavljanja relevantnih podataka i saznanja nužnih za planiranje i provedbu intervencije, s analizom sadržaja postupanja. Skreće se pozornost na složenost procesa i utjecaj na postupak odlučivanja o izvršenju konkretne policijske intervencije.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing Security Incidents on Social Networks","authors":"Hrvoje Čemeljić, Marina Bagić Babac","doi":"10.59245/ps.32.3.1","DOIUrl":"https://doi.org/10.59245/ps.32.3.1","url":null,"abstract":"Ova studija opisuje širenje štetnog sadržaja putem zlonamjernih aplikacija implementiranih na društvenoj mreži Facebook. Opisan je sigurnosni incident, s naglaskom na motive i svrhu kibernetičkih napada, kao i opis napadača i žrtava. Detaljno su opisani alati napadača, kao i tehnike koje je koristio kako bi zahvatio mnoge potencijalne žrtve, inficirao ih zlonamjernim programima, monetizirao žrtve i prikrio tragove napada. Izvršena je analiza podataka na skupu podataka koji sadrži informacije o više od dva milijuna žrtava. Fokus analize je modeliranje širenja zlonamjernih programa te određivanje omjera žrtava na temelju spola i zemlje podrijetla. Studija pokazuje znatnu statističku razliku među žrtvama napada na temelju njihova spola.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mjerenje antropometrijskih karakteristika osobe snimljene videonadzornom kamerom","authors":"Želimir Radmilović, Nikša Jelovčić, Ivan Gundić","doi":"10.59245/ps.32.3.5","DOIUrl":"https://doi.org/10.59245/ps.32.3.5","url":null,"abstract":"Povijesno različito valorizirana, ali u konačnici odbačena metoda antropološke identifikacije poznata pod imenom Bertillonage, u suvremenim uvjetima mogla bi se, barem na simboličkoj razini, reafirmirati. Naime, Bertillonova metoda, zbog znanstveno-tehnoloških limita, te istodobno nadiruće daktiloskopije, odbačena je i „arhivirana“ kao povijesna znamenitost, gotovo na razini rariteta. U današnjim uvjetima sofisticiranih sigurnosnih računalnih i drugih alata i znatne „pokrivenosti“ javnih prostora različitim oblicima videonadzora, otvara se mogućnost pribavljanja golemih podataka o snimljenim osobama i registriranim događajima, kako u smislu identifikacije tih osoba, tako i u smislu utvrđivanja tijeka i dinamike (okolnosti) događaja. Iako postoje brojni forenzični računalni alati za automatiziranu antropometrijsku identifikaciju, u ovom radu prikazan je dio naših istraživanja o mogućnosti i pouzdanosti mjerenja antropometrijskih karakteristika maskiranih ili na snimci neprepoznatljivih počinitelja kaznenih djela snimljenih sigurnosnim videokamerama, pritom vodeći računa o varijabilnim parametrima poput visine kamere, kuta snimanja, kuta osi objektiva u odnosu na objekt snimanja, udaljenosti objekta od objektiva i dr. te njihovu utjecaju na konačni rezultat mjerenja. Također, u ovom radu prikazat će se relativno jednostavna i pouzdana metoda osiguravanja tzv. nespornog materijala tako da osigurava respektabilnu razinu preciznosti mjerenja visine nepoznate osobe.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ignorance,\u0000Disinformation, Manipulation and Hate Speech as Effective Tools of Political\u0000Power","authors":"M. Konieczny","doi":"10.59245/ps.32.2.1","DOIUrl":"https://doi.org/10.59245/ps.32.2.1","url":null,"abstract":"The outbreak of the pandemic, military conflicts and political maelstrom have changed the constellation of the information environment, generating a noticeable increase in ignorance, disinformation, manipulation resulting in fake news, conspiracy theories and the hate speech. The phenomena are escalated and intensified by rapid technological progress, widespread digitization and its impact on all areas of life, especially political activity. Due to the changes brought about by the digital revolution, a new social formation has emerged, known as the information society represented not only by politicians and social activists. The modified architecture of digital space causes the formation of new instruments, influence factors, and harmful social phenomena – previously present and recognized, but never before so intense. This article describes and analyses the issue of ignorance, misinformation, disinformation and manipulation as potential and actual tools of political power and terrorism. The study assesses the impact of disinformation, manipulation and hate speech disseminated through social media sites and abused by politicians who use it to build and extend political power. It also examines the impact of these detrimental and injurious phenomena on the functioning of the rule of law, democracy and fundamental human rights. The article defines the terms of ignorance, misinformation and manipulation proving that a language, as a means of communication should be neutral, is actually used for promoting ideology, coming to power, serving hatred, violence, and inciting criminal acts and crimes. Thus, political players worldwide use language and media to justify violence and to spread false ideologies and improve their public image.","PeriodicalId":40387,"journal":{"name":"Policija i Sigurnost-Police and Security","volume":null,"pages":null},"PeriodicalIF":0.1,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45028172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}