Legal and practical dimensions of the protection of areas, facilities and devices important for state security

2021 ◽  
Vol IV (IV) ◽  
pp. 9-26
Author(s):  
Tomasz Kośmider ◽  
Jerzy Trocha

The article discusses the legal obligations of heads of units included in the register of areas, facilities and devices subject to mandatory protection in the voivodeship. The obligation of the head of the unit to provide physical or technical protection of an object. Significant items for state security with the use of internal security services or personal and property protection agencies – that is often criticized. However, it should be remembered that the cooperation of services, guards and inspections with the private sector is necessary to obtain an appropriate level of security. In addition, practical ways to ensure the safety of areas, facilities and devices subject to mandatory protection are also presented. The current technological development does not reduce the protection of the facility only to physical protection, allowing the use of modern technical security systems in order to support the activities of specialized employees of armed security formations. Due to the above, the authors described the operation of selected technical security systems in protected facilities.

2021 ◽  
pp. 45-64
Author(s):  
Petra Molnar

AbstractPeople on the move are often left out of conversations around technological development and become guinea pigs for testing new surveillance tools before bringing them to the wider population. These experiments range from big data predictions about population movements in humanitarian crises to automated decision-making in immigration and refugee applications to AI lie detectors at European airports. The Covid-19 pandemic has seen an increase of technological solutions presented as viable ways to stop its spread. Governments’ move toward biosurveillance has increased tracking, automated drones, and other technologies that purport to manage migration. However, refugees and people crossing borders are disproportionately targeted, with far-reaching impacts on various human rights. Drawing on interviews with affected communities in Belgium and Greece in 2020, this chapter explores how technological experiments on refugees are often discriminatory, breach privacy, and endanger lives. Lack of regulation of such technological experimentation and a pre-existing opaque decision-making ecosystem creates a governance gap that leaves room for far-reaching human rights impacts in this time of exception, with private sector interest setting the agenda. Blanket technological solutions do not address the root causes of displacement, forced migration, and economic inequality – all factors exacerbating the vulnerabilities communities on the move face in these pandemic times.


2017 ◽  
Vol 4 ◽  
pp. 104-107
Author(s):  
Sławomir Bronisz ◽  
Elżbieta Miłosz

The article presents the results of research on the analysis of the possibilities of using the Moodle platform for the implementation of the education process at the engineering systems of internal security in the Lublin University of Technology. The research involved an analysis of the possibility of Moodle and computer simulation of the subject of Information Technologies.


2015 ◽  
Vol 1084 ◽  
pp. 652-654 ◽  
Author(s):  
Alexey Godovykh ◽  
Boris Stepanov

The article discusses the main issues related to the training and retraining of security services as well as those related to the design, implementation and evaluation of physical protection systems (PPS). The emphasis is on modeling the protected object and creating a "program-information environment" for the construction and evaluation of the main PPS parameters. The paper also presents the main PIE blocks.


Subject The political impact of the coronavirus outbreak in China. Significance The extreme measures the Communist Party has taken in response to the COVID-19 outbreak are partly designed to instill faith in its governing capacity among ordinary citizens, but inertia and slow decision-making at every level have revealed a gap between official rhetoric and reality. Impacts China will increasingly treat public health as a matter of state security; regulation and more involvement by senior officials will follow. The main risk to political stability is indirect, via the outbreak’s negative effect economic growth and employment. Despite signs of public outrage, protests are unlikely due to the risk of contamination and intense activity by the security services.


2015 ◽  
Vol 59 (4) ◽  
pp. 50-65 ◽  
Author(s):  
Sarah Kendzior

This article uses the example of Uzbekistan's national security services to consider how the psychic influence of a police state reveals itself online. What happens when the 'spectral double' of the police becomes a point of focus in a medium known for its transparency? I argue that although the Internet gives citizens the capability to organize and interact, it does not relieve their fears and suspicions; instead, it often intensifies them. Despite the 'transparency' that the Internet affords—and sometimes because of it—there are qualities bound up in the architecture of this medium that give rise to paranoia. Using examples from Uzbek online political discourse, I show how the Internet has fueled suspicion and fears about the state security services despite attempts to demystify and assuage them.


Author(s):  
Сергій Риндін-Баранов

The article analyzes the economic essence of such an important component for any enterprise as economic security. The importance of protecting the enterprise from all sorts of threats, as well as the need for their constant monitoring, is substantiated. The need to ensure the economic security of the enterprise is determined not only at the enterprise level, but also at the state security level. Two main approaches to the definition of the concept of "economic security" were identified, on the basis of which a definition was given of the concept of "economic security of the enterprise" in modern conditions of functioning on the Ukrainian market. The term “threats” was analyzed, on the basis of which the term “threat to the economic security of an enterprise” was defined. A classification and ranking of threats was formed depending on their nature and the degree of danger they represent. Based on the classification of threats, it was concluded that, in addition to common global threats, threats for each enterprise have certain characteristics depending on its type and nature of activity. It was concluded that the factors of formation of dangers and threats to the activities of the enterprise can be considered from different points of view, depending on the sphere of formation, mechanisms of influence and the possibility of forecasting. Based on the above definition, the causes of global threats, as well as threats at enterprises, are formed, a classification of factors that form threats is given. Given the problems of industrial enterprises in Ukraine, specific threats to industrial enterprises were examined on the basis of criteria put forward by various scientists. It was concluded that threats to the economic security of the enterprise overlap and intertwine, which leads to certain difficulties in identifying them when constructing economic security systems and identifying the subjects and objects of economic security.


Author(s):  
Konstantin Borichev ◽  
Mihail Pavlik

The article is devoted to the activities of the state security guard services of the Russian Federation in counteraction of terrorism. In particular, the main features and trends of modern terrorism are identified. The article analyzes the current legal acts in Russia that regulate activities of state security guard services, including their main tasks. The main legal definitions in the field of state security are studied. A retrospective analysis of the development of domestic special services in the field of state security was conducted. The main activities of the Federal security guard service of the Russian Federation in the fight against terrorism, as well as the powers in development and implementation of measures to prevent, detect and suppress terrorist activities, are considered. In particular, the complex of conservative, custodial, technical, operational, investigative and preventive activities, is carried out by the units of the Federal security guard service of the Russian Federation, on a permanent basis in the period of preparation and conduct of security measures in the places of permanent and temporary stay and sections of the route of state (movement) of the objects of state security to ensure the security of state security and counter the terrorist threat. On the basis of the analysis of the activities of state security services, options for increasing the efficiency of their work in the field of anti-terrorism are proposed in order to maximize the effectiveness of ensuring the security of state security objects.


2021 ◽  
pp. 59-84
Author(s):  
Jean-Michel Johnston

This chapter highlights the collaboration between individuals in state institutions and the private sector during the 1840s in Bremen, Bavaria, Prussia, and Austria. Earlier expectations for the potential of telegraphy were confronted with the sobering reality of technological development. On the one hand, the efforts of the state, scientists, and railway companies were supported by the increasingly free circulation of technical knowledge between institutions, experts, and private citizens scattered across the German ‘landscape of innovation’. This circulation is illustrated by an examination of various technical periodicals, while the example of Werner Siemens, a Prussian lieutenant posted in Berlin, is used to illustrate the social connections which also often supported these exchanges of information. On the other hand, the period also witnessed an accentuation of the tensions between and within the private sector and the state, as the latter sought to establish its own interest in obtaining the technology. This combination of necessary collaboration and disagreement caused frustrations which, by 1847, threatened to stall the process of development.


2021 ◽  
Vol 3 (9(111)) ◽  
pp. 63-83
Author(s):  
Serhii Yevseiev ◽  
Yevgen Melenti ◽  
Oleksandr Voitko ◽  
Vitalii Hrebeniuk ◽  
Anna Korchenko ◽  
...  

To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)


Sign in / Sign up

Export Citation Format

Share Document