Land Forces Academy Review
Latest Publications


TOTAL DOCUMENTS

218
(FIVE YEARS 140)

H-INDEX

2
(FIVE YEARS 1)

Published By Walter De Gruyter Gmbh

2247-840x

2021 ◽  
Vol 26 (4) ◽  
pp. 321-327
Author(s):  
Olena Shevchenko ◽  
Kira Horiacheva

Abstract The article is devoted to assessing the potential impact of the use of technologies for influencing the weather on global security. It is shown that technologies for influencing the weather, which began to be developed at the end of the 19th century, are now actively studied and applied in developed countries of the world in most cases for precipitation management. Examples of the use of such systems by the USA, China, Russia, and the United Arab Emirates are given. According to the authors, the existing methods of influencing the weather for both peaceful and potentially military purposes, and their consequences, are not well studied in the long term. Long-term use of technologies for influencing the weather can have serious negative consequences for security at the local and global level, not only for the country that uses them, but also for neighboring countries and their population. One of the ways to regulate the situation is the creation of a special international monitoring service, which will be responsible for coordinating the use of weather management technologies by states. To achieve the goals set in the article, the authors applied an interdisciplinary method of discourse analysis, since it is the most productive for studying the consequences of using technologies for influencing the weather in the modern geopolitical situation. To determine the potential consequences of the use of technologies for influencing the weather, a systematic approach was used, which made it possible to present a holistic vision of the climatic challenges of influencing the weather in the modern geopolitical situation. The use of the comparative method and the forecasting method allowed to compare the potential of different countries that own and develop technologies for influencing the weather, as well as assess the possible consequences of using technologies for influencing the weather for peaceful and military purposes.


2021 ◽  
Vol 26 (4) ◽  
pp. 299-308
Author(s):  
Mircea Udrescu ◽  
Eugen Siteanu

Abstract While emerging technologies are generally incipient technologies, still under development, whose competitive impact is expected to be quite high and may have long-term strategic significance, by replacing current technologies with the potential to become key technologies, “emerging destructive technologies”designates the set of emerging technologies that are meant to be destructive and be used as methods, systems and techniques specific to war. And, since the great powers do not seem too willing to bury the hatchett of war, but use it in all geopolitical discourses, the destructive component of emerging technologies has become a catalyst for the innovative efforts of companies and states, which leave open great prospects for success in the lucrative business. The practice of emerging technologies so far has led to a change in the paradigm of warfare for many countries, to the conduct of remote warfare, to simultaneous and rather complicated hybrid actions, to the transformation of radio and television into modern instruments of psychological warfare. Emerging technologies with a destructive role are in the process of triggering new revolutions in the field of military affairs, resulting in the privatization of quality ideas incorporated in the means of combat, but also to dominate the market competition. Emerging technologies with a destructive effect propose for political decision makers: the decrease of human density on the battlefield, a modular articulated army with the possibility of ad-hoc summoning, a modern vision of the super-soldier, robotization and miniaturization of combat technique.


2021 ◽  
Vol 26 (4) ◽  
pp. 293-298
Author(s):  
Florin Popescu ◽  
George Bucăţa ◽  
Sorin Pistol

Abstract In general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques.


2021 ◽  
Vol 26 (4) ◽  
pp. 261-268
Author(s):  
Ion Oprişor

Abstract Emerging and disruptive technologies have mostly beneficial effects, determining the progress of society and rising the standard of living. Their integration in the subsequent strategies in the fields of economy, financial, energy, defence and security, information etc. can generate positive effects for the society as a whole. On the other hand, the malicious use of new technologies will amplify the risks and threats that a technological advanced state can project on other states or an alliance. As a result, new technologies bring human development opportunities as well as challenges and security risks. Therefore, the role of the state becomes essential not only from the perspective of supporting technological innovation, but also from that of managing security risks arising from emerging areas. With regard to Romania, our country is aware of the importance of developing emerging and disruptive technologies in all domains of social life, in particular in the sectors of economy and security and defence. To address the malicious use of emerging and disruptive technologies, Romania aims at adopting complex measures based on an inter-institutional approach to enhance national resilience in domains that new technologies can affect the human activity.


2021 ◽  
Vol 26 (4) ◽  
pp. 274-281
Author(s):  
Ionuț Alin Cîrdei ◽  
Laviniu Bojor

Abstract Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.


2021 ◽  
Vol 26 (4) ◽  
pp. 348-355
Author(s):  
Alina Alexandru

Abstract New technologies have marked the beginning of the Forth Industrial Revolution era. While the advantages of new technologies for our day-to-day life are undeniable, we cannot fail to notice that emerging and disruptive technologies also imply challenges and risks for individuals, societies and countries. Moreover, in the absence of regulations and norms internationally accepted and assumed, risks associated to the misuse of new technologies tend to increase, transforming the domain into a competition arena. States and international organizations perceive the pressure to address emerging technologies. The United Nations, the United States and the European Union have defined their own strategies and policies on the new technologies with the aim at capitalizing the benefits and minimizing the risks. While different in their view, UN’s, US’ and EU’ strategies and policies offer landmarks to consider in addressing new technologies.


2021 ◽  
Vol 26 (4) ◽  
pp. 309-315
Author(s):  
Paul Tudorache ◽  
Aurelian Raţiu

Abstract As other society domains, the military one must be able to keep up with the dynamics of permanent changes and this necessity, shaping the capacity of adaptability, represents the most important criterion used to measure the military operational performance. In this regard, the present study aims to analyse one of the 4th Industrial Revolution’s consequences in the military field, as emerging and disruptive technologies (EDTs). Also, reviewing the scientific papers in the field and using an empirical research based on observation, the study will focus on clarifying the EDT concept, identifying the EDT agents in the military (NATO context) and, finally, analysing those EDTs suitable for the service of Land Forces in order to determine the potential impact in revolutionizing its combat capabilities.


2021 ◽  
Vol 26 (4) ◽  
pp. 406-417
Author(s):  
Anca Dinicu ◽  
Romana Oancea ◽  
Ghiță Bârsan

Abstract The security environment is experiencing unprecedented dynamics, absorbing and counteracting elements that generate challenges and threats, favoring aspects (apparently) beneficial to development and responding to the most unique threats that manage to have an increased impact on new areas of public interest, thus weakening national security. This paper aims to highlight the variety of effects on the various areas of the global social system that can be generated by a vital infrastructure that has become dysfunctional as a result of a cyber attack. Also, the article discusses the way in which various cyber attacks on the energy sector were orchestrated against the background of alleged rivalries between states.


2021 ◽  
Vol 26 (4) ◽  
pp. 377-382
Author(s):  
Ion Alexandru Plăviciosu

Abstract The human being, whose life has been and is conditioned by all the phenomena and characteristics of the natural environment, has searched, since ancient times, after acquiring self-awareness, to improve, for its own benefit, the interactions between it and nature. To this end, the adaptation of human fundamental needs (the need to eat, drink, procreate, meet their physiological needs, sleep, protect themselves from the weather, have a shelter) to the natural environment, recorded, in throughout history, better and better results.


2021 ◽  
Vol 26 (4) ◽  
pp. 356-362
Author(s):  
Mădălina-Ioana Bădilă ◽  
Lucian-Ionel Cioca ◽  
Ioan Virca

Abstract Vulnerability is a prevalent problem affecting both personal and organizational security. Our study represents a comprehensive assessment of a particular social security network, which seeks to examine the academic environment and to expose some improvement initiatives. The purpose is to develop a multi-element suitability analysis by overlaying existing referenced social circumstances to a PESTLE analysis. Exploring some external EDTs factors makes, it clear that new treatment instruments are being considered for the balanced security approach of an organizational culture. The research findings indicate that the approach serves as a great management tool for the heading board, highlighting its importance for regaining control over the aggressive elements that threaten the collective security. Further, our efforts adapt the excellence of the academic community to social value system by involving as a central element the corporate social responsibility. The military sector develops public and private partnerships, whereas academia and civil society develop new technologies to strengthen the military industrial and technological base.


Sign in / Sign up

Export Citation Format

Share Document