Table of Contents

  • On one approach to solving the problem of formalization and modeling of the airport security threats space

    pg(s) 152-157

    The paper examines the issue of formalization and mathematical modeling of potential dangers (hereinafter referred to as threats). Such threats occur in the external environment in relation to the object of transport infrastructure (hereinafter referred to as airport), while ensuring aviation security. The issue of formalization is manifested in the significant uncertainty of physical presentation of security threats and difficulties in choosing a class of functions that describe threats’ spread dynamics.
    The authors suggest using the heuristic approach and the format of the boundary value problem of field theory when moving from a linguistic description of the threat space to its formal representation and description. A mathematical model based on partial differential equations describing threat space is proposed. In addition to this, assumptions and limitations associated with its hypothetical representation are formulated. Modeling and results are presented in the form of threat intensity distribution on some topology of the transport infrastructure object. The results are interpreted as the initial information for modeling the airport security system.

  • Social security determinants

    pg(s) 158-162

    The article contains a description of the national security system of the Republic of Poland, in accordance with the division written in the National Security Strategy of the Republic of Poland of 2014. Particular attention was focused on the subsystem of support, including social entities. The second part presents the selected determinants of social security.

  • The examination of new-type security challanges concerning the European Union with regard to community directives of stricter gun control

    pg(s) 163-166

    The degree of need for security and the means of creating it change from era to era. Genera-tions of different eras formulate their security aspiration from different perspectives, but the protection of human life has always been brought to the forefront. This aspiration finds its expression at the individual and social levels. The individual, during the process of his so-cialisation, expresses clear expectations that the state shall satisfy his need for security as a basic demand. This is a common social objective, established between the citizen of the state and the state to make sure that security, order, and liberty be fulfilled. In recent years, the need for both individual and society security has undergone radical changes. In the EU member states and in its decision-making organisations, the strengthening of citizens’ security is a key objective. New security challenges such as international terrorism, proliferation of arms of mass destruction, unstable states, global environmental problems, the emergence and intensification of international irregular migration, have resulted in the extension of the concept of security. Following sudden and unexpected changes in the security components affecting the entire territory of the European Union concerns have arisen on the part of both individuals and societies. Increasing security challenges and risks today require more and more intensive state intervention and effort to maintain public safety and public order. Terrorist and criminal acts committed in the European Union over the past period enhanced the need for such a law enforcement system, which so far has been practically un-known, existing mostly in theoretical models. The decision-making bodies of governments facing new security challenges have applied the introduction of available legal, economic and law enforcement regulations to address emerging emergency situations. Several Mem-ber States of the European Union have adopted a number of measures and legal regulations that have not even been brought to the attention of decision-makers in recent years. These changes, which have been supported by a number of research projects, can also be seen as reform efforts that should have already been enforced by lawmakers in an earlier period, as relevant available data were available on the strengthening of the European terrorist threat and the transformation of its development dynamics. The research described in this paper, through reviewing issues of the weapons policy domain of the European Union, analyses the questions formulated by the European Council in relation to such new security challenges as the suppression of illegal acquisition of fire-arms, the increasing of security risks relating to the transport, import and export of civilian firearms in the European Union, the improvement of traceability of legally held firearms (hunting, sports, self-defense) and ensuring that deactivated firearms are rendered inopera-ble. Giving the professional analysis of the background of the directive on stricter firearms possession foreseen by the European Commission in 2015, the study seeks to highlight the need for EU action to tackle the new security challenges in the weapons possession policy.

  • Organization and conduct of military maneuvers “East 2018” in the Russian Federation

    pg(s) 167-169

    From 11 to 17 September, the military maneuvers “East 2018” took place on the territory of the Central and Far East Military Districts of the Russian Federation with more than 300,000 participants, more than 10,000 combat units and 1,000 airplanes. Representatives of the Armed Forces of China and Mongolia took part in the maneuvers. In this exercise, there was a military controversy between two contingent opponents in order to play out different options for defense forces’ behavior.

  • Types of extraordinary situations of technology and activities in exceptional situations with the release of radioactive substances

    pg(s) 170-172

    There is an analysis of the major emergencies that occur in our daily lives. Technogenic emergency situations with the release of radioactive substances, separation of dangerous chemical substances and distribution of biological substances are briefly identified. Their impact on humans and the environment is shown and what action is needed to take in the event of an emergency with the release of radioactive substances and radiation.

  • Radiological threats to the security environment

    pg(s) 173-175

    The threats to the modern security environment from radiological materials are explored. The possible scenarios for radiological impact from open and / or closed radioactive sources and nuclear weapons and the degree of potential danger are analyzed. The psychological effects of the population are examined. The role of state policy in radiological threats is stated.

  • Approach analysis to prevent steganography data flows as a corporate security breaches

    pg(s) 180-182

    Once the steganography was invented, it still remains one of the most effective ways to hide information in publicly accessed data sources. Many applications of different steganography techniques were known since WWII, but there are no yet any good approach to detect whether there is a hidden message in some data source (image etc.) while it is not expected to be found. This may also cause a fundamental security breach in corporate security systems. In the era of Facebook, Instagram and many other social networks with a huge amount of images and photos it seems obvious to use steganography applications for the purpose of security breach. A saboteur or a spy can use any image from social networks to disclose corporate sensitive data or to exchange hidden messages. That is why steganography detection should be considered as a necessary tool to prevent security breaches and sensitive data leaks. This research is focused on analysis of current approaches in problem of steganography detection. Mainly the approaches to detect steganography in images were discussed.

  • Secure big data and IoT with implementation of blockchain

    pg(s) 183-185

    BlockChain is a distributed database of records or public ledger of all time stamped transactions saved in all computers in one peer-to-peer network. It allows a secure and transparent transfer of digital goods including money and intellectual property. Bitcoin – a digital decentralized cryptocurrency, is the first application of BlockChain. The second application is an agreement called Smart contract that enables exchanging a value or assets between two owners based on a set of conditions included in the contract.

    In this paper, we analyze the possibilities for application of BlockChain in Big Data and IoT. Implementation of BlockChain in Big Data confirms that data is accurate and secure and sharing of data will become more simple. In industries like financial services, government and healthcare there is a need to combine BlockChain and Big Data because these industries have repositories full of important data. They must store and share these large amounts of data. Implementation of BlockChain technology provides security of data and ensures its integrity when shared. BlockChain technology is also seen as a way to secure the Internet of Things (IoT). Application of BlockChain in IoT enables IoT devices to participate in BlockChain transactions and invents new styles of digital interactions. This technology will provide a simple infrastructure for devices to directly and securely transfer data or money using Smart contract.

  • Distributed sensing as a new tool for fibre infrastructure protection

    pg(s) 190-192

    Distributed fibre optic sensing is well known in defence or oil industry in use as acoustic sensing. Telecommunication networks are threatened by fibre cuts mainly caused by digging activity or theft. Many network operators seeking appropriate solution for selfprotecting infrastructure system. Most commercially available solutions of distributed sensing systems allow sensing only on dedicated fibres. Sharing the same infrastructure for data transmission and sensing is, however, more advantageous. On the other hand, it is necessary to solve the possible interaction of both services and thus the interference. We have developed our own sensing systems and we have made several measurements to evaluate the suitability of the most widely used distributed sensing techniques – interferometric, reflectometry and polarization for using in existing data infrastructures on optical fibres with active data traffic.

  • Experimental development of a smart artillery and mine ordnance fuze based on Arduino microcontroller platform

    pg(s) 199-203

    Today’s battlefield is ever-changing in terms of weaponry demands and engagement criteria. Older artillery ordnance is often struggling to meet the modern battlefield demands and does not provide the operator with a wide range of capabilities. This combination of constraints coupled with the performance of conventional artillery munitions has often limited the commander’s options and decreased the effectiveness of artillery. Meeting the modern battlefield demands requires the performance and capabilities of existing ordnance to be increased. This paper researches the creation of a smart fuze that will provide increased flexibility and capabilities at a price that permits its use in tactically significant quantities as well as for training.

  • Evaluation of hit’s grouping deviation due to tribological processes in bullet-rubber chopper wheel interaction

    pg(s) 204-207

    The use of special weapons in counter-terrorist operations with fitted suppressors and the necessity of reliable target damage even while using individual ballistic armor protection details initiate the need of evaluation of hits grouping deviation. In the report is evaluated hit’s grouping deviation due to tribological processes in bullet-rubber chopper wheel interaction with scrutinizes of the experimental fire shooting data.