Author: admin

The importance of up to date software supported by providers with system controls in place that include regular reviews of user agreements, instructions and policies. Only when processes and systems are challenged will risks and points of failure be identified and improvements implemented.  The correct...

How does a Law Enforcement Agency (LEA) protect its employees from harm?  Amongst numerous activities and items, it provides secure premises, work procedures and protects information on its personnel. There is a high expectation from employees and society that the huge amount of data collected,...

All intelligence has aspects that can be called data.  This can range from locations, numbers, biometrics, names and other personal information.  Both Law Enforcement and criminal organisations rely upon the collection, storage and use of this data for many purposes.  How the various organisations keep...

Digital forensics has seen a surge in interest from both researchers and practitioners. This heightened focus is a direct response to the escalating sophistication of cyberattacks, which has made the task of gathering evidence increasingly intricate. As cybercriminals employ advanced techniques, professionals in the field...

Under the Horizon Europe Programme an important action for building the future architecture of mobile communications has started. The 5G mobile networks are facing applications no more compatible and the extreme future-looking applications needs a 6G potentials. Under this assumption EU has just funded “Distributed Artificial...

Prof. Dr. Sc. Mitko Bogdanoski, prof. Dr. Sc. Dimitar Bogatinov and MSc. Goce Stevanoski members of the Military Academy “General Mihailo Apostolski” - Skopje presented the NOTIONES project during the three-day workshop on OSINT with information technology experts in Chișinău, Moldova. (March 13-17, 2024).The workshop...

 The report “Cross-agency situation report” outlines significant threats impacting the fight against organized crime, highlighting economic crime, its geographical spread, global reach, and unlawful influence. Key vulnerabilities include the misuse of incorrect data in official records and the challenges posed by the digital and cross-border...