SPECIFICITIES OF NON-INTELLIGENCE WORK OF MODERN SECURITY SERVICES
Abstract
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception. Тhis role has varied exclusively from the intentions of the bearers of political systems and the nature of their activities. What unites all security services in the world are the objects of their security-related interest, which, depending on the time in which they take place, represent responses to current risks and threats directed against the state and society in every sense. The aim of this paper is to present the most common techniques of non-intelligence work of security services through a scientific description, as an instrument by which organized states from a position of power create their foreign policy and international position. The paper presents a comprehensive overview of the general theoretical definition of non-intelligence work with its classification and normative definition in individual international documents. A special part of the research concerns the identification of various forms of non-intelligence work of security services in practice, in relation to the organizational character and structure of the security service itself, where current events on a global level have shown that non-intelligence work of security services, due to the progress of new information technologies, has become an extremely important technique of intelligence and security systems of modern states and an indispensable security instrument of the state today. The result of this research are recommendations that it is necessary to intensively strengthen the counterintelligence potential of national intelligence and security systems, as a reaction to all identified and future techniques of non-intelligence work of security services. The paper uses the method of theoretical analysis and the deductive method to understand and explain subversive and non-subversive activities of non-intelligence work of security services.
References
Београд, стр. 19-28.
Arkin, William M. (1999): "Secretary Goes to the Yard" Washington Post Online Edition. March 1, 1999. р-46.
Бајагић, М. (2015). Методика обавештајног рада, друго, измењено и допуњено издање, КПА, Београд, стр.
395-465.
Banerjee, S., Tekin, A. & Ercetin, S. S. (2014). Chaos Theory in Politics, Springer, Understanding Complex System,
London, p. 177.
Bowen, Russell J. (1983): A digital bibliography of the collection of papers by Russell J. Bowen on intelligence,
security and covert activities. Washington, DC National Intelligence Book Center. in 1983, р- 45.
Bill Marczak et al., “FORCEDENTRI: NSO Group iMessage Zero-Click Exploit Caught in the Wild,” Citizen
Вујаклија, М. (1980). Лексикон страних речи и израза, Просвета-Београд, 1980, стр. 879.
Bilandžić, M. (2005). Tajne operacije CIA kao komponenta vanjske politike SAD u posthladnoratovskom
razdoblju, Polemos 8 (2005.) 1-2: ISSN 1331-5595, Zagreb, p. 221-238.
Craig Timberg and Elizabeth Dvoskin, (2020) “Washington firm ran fake Facebook accounts in Venezuela,
Bolivia and Mexico, report finds,” Washington Post, 4 September.
Craig Timberg and Elizabeth Dvoskin, “Washington firm ran fake Facebook accounts in Venezuela, Bolivia and
Mexico, report finds,” Washington Post, 4 September 2020. р-23.
Darczewska, J. & Żochowski, P. (2017). Active measures Russia’s key export, Copyright by Ośrodek Studiów
Wschodnich OSW im. Marka Karpia, Centre for Eastern Studies, p. 5-71.
DeVine, E. M. (2019). Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions
in Brief, CRS Report, Congressional Research Service, 14. June 2019, p. 4, 5.
Executive Order 13470 of July 30, 2008: Further Amendments to Executive Order 12333, United States Intelligence
Activities, U.S. Federal Register, Vol. 73, No. 150, August 4, 2008, p. 45325-45342.
Fatouros, A. A. (1976). Covert Intervention and International Law, Articles by Maurer Faculty. Paper 1890. p. 192-
194.
FM 100-5 Operations, Headquarters department of the army, (1993). Headquarters 100-5 Department of the Army
Washington, DC, 14 June 1993, p.13.0-13.8.
Foreign Relations Of The United States, 1945-1950, Emergence Of The Intelligence Establishment. 292.
National Security Council Directive on Office of Special Projects. Washington, June 18, 1948.
Ora John Reuter and David Chaconny, “Online Social Media and Political Consciousness in Authoritarian
Regimes,” British Journal of Political Science 45 (2015): 29–51
Jonathan Corpus Ong and Jason Vincent A. Cabanes, “Architects of Networked Disinformation: Behind the Scenes of Troll Accounts and Fake News Production in the Philippines,” Faculty of Communication Publication Series, University of Massachusetts–Amherst, https:/ 18, 2018
/scholarvorks.umass.edu/communication_faculti_pubs/74.
Johnson, L. (ed.), (2007). Strategic Intelligence (Vol. 1-5). Westport, Connecticut, Praeger Security International,
Westport, Connecticut, London, 2007, p. 355-361.
Kahana, E. (2006). Historical Dictionary of Israeli Intelligence Historical Dictionaries of Intelligence and
Counterintelligence, No. 3, (In: Woronoff, J., (ed), (2006). Historical dictionaries of intelligence and
counterintelligence series, Lanham, Maryland, Toronto, Oxford), p. 57, 58, 61, 74, 75.
Karlsen, H. G. (2019). Divide and rule: ten lessons about Russian political influence activities in Europe, Palgrave
communications, p. 1-14.
Конатар, В. (2012). (Не) Обавештајне операције као акти агресије, Култура полиса, год. IX (2012), бр.
17, стр. 27-44.
Larry Diamond, “Democratic Regression in Comparative Perspective: Scope, Methods, and Causes,”
Democratization 28, no. 1 (2021): 22–42
Leary, M. W. (1984). The Central Intelligence Agency: History and Documents, The University of Alabama Press, p.
144.
Lennart Maschmeier, “Why Cyber War Is Subversive and How This Limits Its Strategic Value,” War on the Rocks, November 17, 2021, https://varontherocks.com/2021/11/vhi-cyber-war-is-subversive-i -how-it-limits.
Lowenthal, М. M. (2009). Intelligence: from secrets to policy, 4th ed.,Covert action, Chapter 8. Washington,
USA: CQ Press is a division of SAGE.
Monje, C. S. (2008). The Central Intelligence Agency, A Documentary History, Greenwood Press, 88 Post Road
West, Westport, p. 28.
Мијалковски, М. (2003). Специјална дејства, Војна академија, Министарство одбране Р Србије, Београд,
стр. 80-85.
Мијалковски, М. (2009). Обавештајне и безбедносне службе, Факултет безбедности, Јавно предузеће
Службени гласник, 2009., стр. 62, 122-137.
Мијалковски, М. и Конатар, В. (2010). Необавештајна роварења обавештајаца у лавиринтима
специјалних операција, Прометеј, Нови Сад, стр. 91-309.NSC 10/2, (1948).
NSC 4-A, (1947). Coordination Of Foreign Information Measures (NSC 4) Psychological Operations (NSC 4-A).
256. Department of State Briefing Memorandum Washington, December 17, 1947.
Reisman, M. & Baker, J. (1992). Regulating Covert action: practices, contexts, and policies of covert coercion
abroad in International and american law, New Haven: Yale University Press, p. 431.
Ronald J. Deiberta, "Authoritarian Power and the Market for Commercial Surveillance and Private Intelligence,"
Democraci and Autocraci 20, no. 1, 2022.
Schwartz, Leo (2021) “Prominent PR Firm Spreads Disinformation Ahead of Honduran Election, New
Investigation Finds,” Rest of the World, October 29, 2021, https://restofvorld.org/2021/political-pr-
firm-disinformation-honduras-elections.
Турудић, М. (2014). И камење би проговорило, текст написан 18.12.2014. године у српском часопису
„Време“, а приступ Интернету извршен дана 17.03.2020. године на сајт
www.vreme.com/cms/view.php?id=1254069
Uram, A. D. (2005). Covert Action: A Useful Tool for United States Foreign Policy?, University of Victoria, p. 16,
45, 56.
Doctrine of Information Security of the Russian Federation, (2016). Approved by Decree of the President of the
Russian Federation No. 646 of December 5, 2016.
Закон о основама уређења служби безбедности Републике Србије, (2007, 2012). Службени гласник РС, број
116/2007 и 72/2012.
Закон о безбедносно-информативној агенцији, (2002, 2009, 2014, 2018). Службени гласник Републике Србије
број 42/2002, 111/2009, 65/2014 - одлука УС, 66/2014 и 36/2018.
Закон о Војнобезбедносној агенцији и Војнообавештајној агенцији (2009, 2012, 2013). Службени гласник
Републике Србије број 88/2009, 55/2012, 17/2013.
Glosary of Terms: Language of Espionage, Интернет приступ извршен дана 12.10.2024. године у 13.50
часова, www.spymuseum.org/education-programs/spy-resources/language-of-espionage/
Радио слободна Европа. 18.05.2022. : htps.//www. slobodna evropa.org. html