PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Travel intelligence as a tool for counterintelligence and border security

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Counterintelligence and border security are two cornerstones of national security protection processes. They utilise intelligence sources and procedures extensively to assist in decision-making regarding countermeasures against high-degree threats and risks. Both employ intelligence cycle activities and risk analysis models to combine information coming from the operational environment. At the same time, travel intelligence (TRAVINT) consists of the intelligence product arising from the collection and analysis of a wide range of travel companies and data and information from governments. In the modern and increasingly globalised security environment, TRAVINT products constitute growing trend for protecting state border, intelligence, and internal security. The paper aims to explore the potential of leveraging TRAVINT for enhancing counterintelligence efforts and bolstering border security measures. The research methodology combines empirical analysis with a comprehensive review of the US and EU public documents and academic papers. This study is necessary, as it is essential to examine the worthiness of TRAVINT as an emerging intelligence sector. TRAVINT appears to be an extremely important data, information, and intelligence source offering the required material input to law, security, and intelligence enforcement agencies for analysis. TRAVINT and its parts, such as passenger name records (PNR) data, are used in compliance with state legislation in respect of human rights and in accordance with the needs of Intelligence networks, where excessive threats to internal and border security are implied.
Rocznik
Strony
55--67
Opis fizyczny
Bibliogr. 47 poz.
Twórcy
  • Department of Business Administration, Athens University of Economics and Business, Patision 76, 112 57, Athens, Greece
Bibliografia
  • 1. Barnea A. (2019) ‘Big data and counterintelligence in western countries’, International Journal of Intelligence and Counter Intelligence, 32(3), pp. 433–447. doi: 10.1080/08850607.2019.1605804.
  • 2. Bellanova R. and Glouftsios G. (2020) ‘Controlling the Schengen information system (SIS II): The infrastructural politics of fragility and maintenance’, Geopolitics, 27(1), pp. 160–184. doi: 10.1080/14650045.2020.1830765.
  • 3. Boylan P. (2023) ‘Alleged spy for China to stand trial in 2024’, Star Advertiser. Available at: https://.staradvertiser.com/2023/02/17/hawaii-news/alleged-spy-for-china-to-stand-trial-in-2024/ (Accessed: 27 September 2023).
  • 4. Cram C. (1993) Of moles and molehunters: A review of counterintelligence literature, 1977–92. Book Monograph. Washington, DC: Center for the Study of Intelligence.
  • 5. De Hert P. and Papakonstantinou V. (2010) ‘The EU PNR framework decision proposal: towards completion of the PNR processing scene in Europe’, Computer Law and Security Review, 26(4), pp. 368–376. doi: 10.1016/j.clsr.2010.05.008.
  • 6. Ehrman J. (2009) ‘Toward a theory of CI’, Studies in Intelligence, 53(2). Central Intelligence Agency. Available at: https://.cia.gov/static/867934afc1db19abcfcc5ced4193b676/toward-a-theory-of-ci.pdf (Accessed: 27 September 2023).
  • 7. European Commission (2023) Passenger name record (PNR). Available at: https://home-affairs.ec.europa.eu/policies/law-enforcement-cooperation/passenger-data_en (Accessed: 19 October 2023).
  • 8. European Parliament (2016) Regulation establishing a European travel information and authorisation system (ETIAS) and amending regulations (EU) No. 515/2014, (EU) 2016/399, (EU) 2016/794 and (EU) 2016/1624. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52016PC0731 (Accessed: 9 November 2023).
  • 9. European Union (2016) EU directive 2016/681.
  • 10. European Union Agency for Law Enforcement Training (CEPOL) (2022) Passenger name record (PNR) executive summary. Available at: https://.cepol.europa.eu/api/assets/Executive%20Summary%20PNR%20v2_with%20image.pdf (Accessed: 27 September 2023).
  • 11. Fernández-Rojo D. (2021) EU migration agencies: The operation and cooperation of Frontex, EASO and Europol. Cheltenham, UK: Edward Elgar.
  • 12. Frizberg D. (2023). Advance passenger information (API): Revising the rules, European Parliament. Available at: https://.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2023)747429 (Accessed: 19 October 2023).
  • 13. Frontex (2012a) Common integrated risk analysis model a comprehensive update. Warsaw: European Border and Coast Guard Agency.
  • 14. Frontex (2012b) Guidelines for risk analysis units: Structure and tools for the application of CIRAM version 2.0. Warsaw: European Border and Coast Guard Agency.
  • 15. Frontex (2013) Border control in the information age. Available at: https://frontex.europa.eu/media-centre/news/focus/border-control-in-the-information-age-udh57L (Accessed: 28 September 2023).
  • 16. Frontex (2020) Future group on travel intelligence and border management. Available at: https://.europol.europa.eu/publications-events/publications/future-group-travel-intelligence-and-border-management#downloads (Accessed: 28 September 2023).
  • 17. Glouftsios G. and Leese M. (2022) ‘Epistemic fusion: Passenger information units and the making of international security’, Review of International Studies, 49(1), pp. 125–142. doi: 10.1017/s0260210522000365.
  • 18. Hansen F. and Pettersson J. (2021) ‘Contradictory migration management? Differentiated security approaches to visa overstay and irregular border crossings in the European Union’, European Security, 31(1), pp. 117–134. doi: 10.1080/09662839.2021.1945038.
  • 19. Jeandesboz J. (2020) ‘European border policing: EUROSUR, knowledge, calculation’, Global Crime, 18(3), pp. 256–285. doi: 10.1080/17440572.2017.1347043.
  • 20. Johnson L.K. (2010) Handbook of intelligence studies. London: Routledge.
  • 21. Léonard S. (2010) ‘EU border security and migration into the European Union: Frontex and securitisation through practices’, European Security, 19(2), pp. 231–254. doi: 10.1080/09662839.2010.526937.
  • 22. Liashuk R. and Tsaruk A. (2021) ‘Experience of information and analytical activities in the field of border protection of the European Union’, in Proceedings of the International Conference on Economics, Law and Education Research (ELER 2021), Series: Advances in Economics, Business and Management Research. Dordrecht, The Netherlands: Atlantis Press. doi: 10.2991/aebmr.k.210320.032.
  • 23. Melendez V.M. (2019) ‘Counterintelligence: An asymmetric warfighting tool for the U.S. navy’, International Journal of Intelligence and CounterIntelligence, 32(4), pp. 737–769. doi: 10.1080/08850607.2019.1621108.
  • 24. Morral A., Willis H. and Brownell P. (2011) Measuring illegal border crossing between ports of entry. Santa Monica, CA: RAND.
  • 25. Namazov R. (2022) Application of advance passenger information (API) and passenger name record (PNR) security systems by using travel information. State Customs Committee of Azerbaijan and Kanazawa University of Japan. Available at: https://.border-security-report.com/wp-content/uploads/2022/07/API-PNR-Namazov-research.pdf (Accessed: 19 October 2023).
  • 26. National Counterterrorism Center. (2013) Watchlisting guidance. Available at: https://.eff.org/files/2014/07/24/2013-watchlist-guidance_1.pdf (Accessed: 27 September 2023).
  • 27. Office of Public Affairs. (2022) Former CIA officer arrested and charged with espionage. Available at: https://.justice.gov/opa/pr/former-cia-officer-arrested-and-charged-espionage (Accessed: 23 October 2023).
  • 28. Oliveira Martins B., Lidén K. and Jumbert M.G. (2022) ‘Border security and the digitalisation of sovereignty: Insights from EU borderwork’, European Security, 31(3), pp. 475–494. doi: 10.1080/09662839.2022.2101884.
  • 29. Priestley A. and Beauvais M. (2021) International experience and good practices in API/PNR, OSCE. Available at: https://.osce.org/project-coordinator-in-ukraine/510575 (Accessed: 28 September 2023).
  • 30. Priestley A. and Beauvais M. (2022) International experience and good practices in API/PNR–Project coordinator in Ukraine. Vienna: Organization for Security and Co-operation in Europe (OSCE).
  • 31. Prunckun H.W. (2019) Counterintelligence theory and practice. London: Rowman & Littlefield.
  • 32. Richelson J. (1986). Sword and shield: The Soviet intelligence and security apparatus. Philadelphia, PA: Ballinger.
  • 33. Riehle K. (2015) ‘A counterintelligence analysis typology’, American Intelligence Journal, 32(1), pp. 55–60. Available at: https://nationalmilitaryintelligence.app.box.com/v/ArchivesAIJ/file/226592331597 (Accessed: 9 November 2023).
  • 34. Romanian Parliament. (2019) IPEX|the platform for EU interparliamentary exchange. Available at: https://secure.ipex.eu/IPEXL-WEB/download/file/082dbcc568e94e7e0168eba5046a0223. (Accessed: 9 November 2023).
  • 35. Rudner M. (2014) ‘ Intelligence-led air transport security: Pre-screening for watch-lists, no-fly lists to forestall terrorist threats’, International Journal of Intelligence and CounterIntelligence, 28(1), pp. 38–63. doi: 10.1080/08850607.2014.962352.
  • 36. Shepherd A.J.K. (2022) ‘ EU counterterrorism, collective securitization, and the internal-external security nexus’, Global Affairs, 7(5), pp. 733–749. doi: 10.1080/23340460.2021.2001958.
  • 37. Shulsky A.N. and Schmitt G.J. (2009) Silent warfare: Understanding the world of Intelligence. Washington DC: Potomac Books.
  • 38. Sims J.E. and Gerber B.L. (2005) Transforming U.S. intelligence. Washington, DC: Georgetown University Press.
  • 39. Sims J.E. and Gerber B.L. (2009) Vaults, mirrors, and masks: Rediscovering U.S. counterintelligence. Washington, DC: Georgetown University Press.
  • 40. Stouder M.D. and Gallagher S. (2013) ‘ Crafting operational counterintelligence strategy: A guide for managers’, International Journal of Intelligence and CounterIntelligence, 26(3), pp. 583–596. doi: 10.1080/08850607.2013.780560.
  • 41.US Department of Homeland Security and US Customs and Border Protection. (2013) U.S. customs and border protection passenger name record (PNR) privacy policy. Washington, DC: US Department of Homeland Security.
  • 41. US Department of Homeland Security Privacy Office. (2015) A report on the use and transfer of passenger name records between the European Union and the United States. Washington DC: US Department of Homeland Security Privacy Office.
  • 42. US Department of Homeland Security Privacy Office. (2017) Privacy impact assessment update for the automated targeting system DHS/CBP/PIA-006(e). Washington DC: US Department of Homeland Security Privacy Office.
  • 43. US Department of Justice. (2020) Affidavit of FBI special agent Chris Jensen. Available at: https://.-justice.gov/d9/press-releases/attachments/2020/08/17/download_ma_complaint_.pdf. (Accessed: 27 September 2023).
  • 44. US Government Publishing Office. (2011) Intelligence sharing and terrorist travel: How DHS addresses the mission of providing security, facilitating commerce, and protecting privacy for passengers engaged in international travel. Available at: https://.govinfo.gov/content/pkg/CHRG-112hhrg73736/html/CHRG-112hhrg73736.htm (Accessed: 27 September 2023).
  • 45. Van Cleave M.K. (2007) Counterintelligence and national strategy. Washington, DC: National Defense University (NDU) Press. doi: 10.21236/ada47148.
  • 46. van Dongen T. (2010) ‘Mapping counterterrorism: A categorisation of policies and the promise of empirically based, systematic comparisons’, Critical Studies on Terrorism, 3(2), pp. 227–241. doi: 10.1080/17539150903306170.
  • 47. Wagner J. (2021). Border management in transformation: Transnational threats and security policies of European states. New York City, NY: Springer.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-0b9b8cd4-8aff-4498-bb0e-68557de470e4
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.