scholarly journals Group Picture of Soviet Assassins: The Trajectory of Stalinist Executioners from the Revolution to the Great Terror

Author(s):  
Nikita Petrov

The article deals with the practice of execution during the period of Soviet political repression. Special attention is paid to the fate of employees of the state security system who served as executioners. The issue of organising the activities of the “special group” and its place in the structure of the Central apparatus of the Cheka-MGB bodies is discussed. Patterns of career development of executioners and their professional deformation are given.

Author(s):  
Robert Gwardyński

The Police constitute a major element in the state security system. Their operation has both a national and local dimension. The Police have an impact on a local community’s security, ensuring the safety of people, their health, life, property, as well as maintaining public safety and order. This article aims to indicate the areas of the Police’s operation that result in an improvement of the residents’ safety and an increase in their sense of security.


Author(s):  
Ulia Edigareva ◽  
D. E. Morkovkin ◽  
Alexander Vlasov

State security largely depends on the economic security system and on measures taken by the state to protect sovereignty, legal rights and interests of citizens. The peculiarity of this policy is due to many factors, among them: the economic situation in the state, personnel policy, etc. The article analyzes various ways of state anti-corruption policy pursued by state authorities and local authorities.


Author(s):  
I. A. Silchenkov

The article analyzes the problems arising from the use of various cryptocurrencies as a challenge to the economic system of state security. In this regard, the threats from cryptocurrencies to traditional financial relations and possible ways of influence on the part of States aimed at combating such threats are considered.


2021 ◽  
pp. 9-21
Author(s):  
RADOSLAV GAĆINOVIĆ

In this paper author underlined the importance of judicial and inspection bodies in formation of the capacity of security of modern state. It is known that the judiciary bodies have a very important role in protection of the constitutionality and legality of the state, because successful functioning of judicial system significantly contributes to formation of the capacity of security. It is very important that within the process of their own functioning the judicial authorities cooperate with the state security system. In certain situations functioning of the judicial system must be coordinated with the functioning of the security system, because neither the court nor the prosecutor’s office can solve the problems without the facts that they may find only in cooperation with the modern state security bodies. Such cooperation is necessary also in case of prevention function, because the judiciary bodies of the modern states also have a preventive role. In addition, the inspection services also significantly contribute to raising of the security system to a higher level by supervision of proper implementation and compliance to the law by citizens, working organizations and other kind of organizations. This supervision is exercised through inspections which function on all levels and have general and special authority powers.


2020 ◽  
Vol 11 (2) ◽  
pp. 70-78
Author(s):  
Ljubo Pejanović ◽  
◽  
Jovana Ristić ◽  

Communication between institutions within the state and the necessary entities in the system, which are the subject of alignment, coordination and discussion of the problem, is the notion of quality work in developing security capacity.Building a methodology and system, i.e. the capacities of a society, and therefore also of the state, is neither an easy nor a simple task for the teams carrying out the preparation assessments, capacities and forces within the security system, i.e. the Ministry of Internal Affairs.In order to be able to properly develop and regulate the security system within the country, special conditions are needed, such as assessments, risks and capacities, which are given the task of developing a very important system within the society, as well as for cooperation, communication and participation in teamwork or tasks.Risk assessment of the above leads to reliable data and conditions, which will decide of and impose a quality and justified security system, which would meet the needs of a given society or state.


Author(s):  
A.M. Turobov ◽  
M.G. Mironyuk

How does the state security system evolve under the influence of the artificial intelligence technology? To answer this question, an empirical model is proposed. The model evaluates the state security system (by the example of the USA) using the security consistency parameter, which estimates how the state perceives threats (indicator of threats) and whether the state has the necessary capabilities to counter them (indicator of capabilities) in relation to the artificial intelligence technology. The model (as well as the conceptualization of the artificial intelligence technology in the context of the security domain) provides evidence of how security transformations occur. It serves as a tool for studying the corresponding changes and assessing the state security system. It is necessary to indicate the limitation of the study: we do not consider direct military applications in the field of automation and algorithms (artificial intelligence technology). The validation of the empirical model has been undertaken using the case of the USA (eight-time intervals are subject to analysis, namely: 1999, 2002, 2006, 2010, 2012, 2015, 2017, 2019). With the development of the technology itself, the “interest” of the state and the definition of threats, as well as the rapid growth of the capabilities of the artificial intelligence technology (coincides with the years of maximum progress in computing power and the introduction of new algorithms) are growing, and since 2012, the dynamic has been linear, since more new “discoveries” have contributed to evolutionary rather than “revolutionary” growth trajectory. The developed model is scalable. This feature may be useful in the empirical security studies: the artificial intelligence technology within the model can be replaced with other types of digital technologies (for example, big data, cloud computing or 5 g connection technologies, etc.); thus, empirical models of security consistency under the impact of other technologies can be developed. The approach proposed allows to under take cross-country comparisons with respect to specific types of digital technologies and their interactions with the security domain.


Imbizo ◽  
2017 ◽  
Vol 7 (1) ◽  
pp. 74-90
Author(s):  
Emmanuel C. Okereke

This article examines Ngugi wa Thiong’o’s perception and delineation of the state security apparatus in Petals of blood and Devil on the cross. It explores how the agents of state security, who are supposed to be neutral in the discharge of their legal duties, serve as tools used by members of the ruling class to silence political opposition in postcolonial Kenya, in order to maintain class domination. It maintains that the characters who represent the state security apparatus in independent Kenya are agents of the oppressors’ class and thus serve as anti-revolutionary agents. The study, however, recommends that the agents of state security should be re-oriented to their real duties via periodic, organised seminars. In all, it concludes that the state security apparatuses in Wa Thiong’o’s Petals of blood and Devil on the cross serve as instruments of political repression. 


Sign in / Sign up

Export Citation Format

Share Document