The activities of terrorist organizations in the international arena provide benefits of access to global financial flows, various criminal markets, offshore financial centers and banks that guarantee fast large cashless transactions, with guarantees of business and banking secrets. This often requires connecting with criminal organizations that specialize in financial and cybercrime, which is why terrorists are often associated with organized crime. The link between organized crime and terrorism is usually functional, when organized crime is put into function (financing and arming) of terrorism. At the same time, the connection can be instrumental, when terrorist groups are involved in organized crime, and vice versa – when criminal groups undertake terrorist activities. Precisely, the focus of the work will be on determining these correlations and their security implications, which we must take into account when creating effective strategies for combating organized crime and terrorism.
Security & Future
Vol. 4 (2020), Issue 3
Table of Contents
THEORETICAL FOUNDATIONS OF SECURITY
System for minimizing the negative impact of personnel on the airport’s aviation security procedurespg(s) 86-90
The problem of civil aviation safety is largely determined by the “human factor”. Transport security is a multidimensional concept that includes various security factors that are provided by aviation personnel in the relevant areas of professional activity. A particularly important factor should be considered the activities of personnel in the field of airport security. An acceptable level of airport aviation security can be achieved if the level of professional activity of the security personnel meets the established requirements. The system of requirements is implemented in a set of algorithms and procedures for personnel activities, the implementation of which is mandatory in
strict accordance with the requirements. However, the physical nature of the human component, under the strictest control, does not guarantee absolute compliance with the requirements, i.e. the professional activity of aviation personnel is not guaranteed against accidental or unintentional errors. These errors are a source of negative impact of personnel on the airport’s aviation security. In this case, it is necessary to have the means to minimize the negative impact. The paper considers some software and technical means of minimization
The report explores and analyzes the essence of the concepts of ecological security and environmental security. The main similarities and differences are emphasized. Last, but not least, the state of ecological and environmental security in genuine pandemic crisis is being discussed.
NATIONAL AND INTERNATIONAL SECURITY
This article discusses the value of mission displacement of armed, violent, and resistance groups to turn them to moderate groups who do not count on violence, the definition of mission displacement is the shift of the groups’ means to replace their ends that they pursue, such change ultimately leads to a profound change in their violent nature by discrediting their credibility. The main argument is that groups lose their appeal whenever they are subjected to mission displacement; quite a few turns to become criminal groups rather than terroristic or resistance groups. This article takes the group of Abu Nidal as a case study of how a group was affected by state sponsorship and changed its focus upon the means more than the ends. This displacement degrades the pool of social support to their cause and changes their ‘noble cause’ to an illegitimate cause.
Internet connectivity became obligatory for the business processes in each organisation and institution. Communication over the public network infrastructure like Internet brings potential threat for the means of social engineering email letters. Recognition of such letters seems to be a problem to workers. Some malware analysis of such example scam letters is made in this research paper. Impact on computer or network systems is presented.
The aim of the research is to develop a database management system for collecting, processing, storing and using information for the teaching of PhD students at a university using the high-level Python language.
Studied and researched in the process of development are the main characteristics of the most widely used database management systems. The practical aspects of the design, creation and use of databases were analysed. Has been formulated the requirements to the functional capabilities of the developed database. For the development of the web-application was used Python programming language. The database model, the user interface and a set of reports were developed. A physical data model, oriented towards the design and the development of a database management system using the Python programming language was proposed. The main risks and threats to the security of information in the web-application are characterized. Guidelines for infrastructure protection are proposed.
Some general traits of the e-cash system and a review of a compact e-cash scheme with practical and complete tracingpg(s) 107-110
The e-cash methodology has its advantages compared to other payment systems and it has brought big changes to the way business is being conducted. Money becomes an intangible item and travels electronically across the world in a widely open network that might expose it to risks. This means that secure end-to-end connections are needed and many different cryptographic algorithms are used to achieve it. In this paper we will go through the main metrics that characterize them and the main properties of the e-cash system. Finally, a review of a compact e-cash scheme with practical and complete tracing will be given.
TECHNICAL FACILITIES FOR ENSURING SECURITY
Compatibility between design of mechatronic systems for critical infrastructure security and technological readiness levelspg(s) 111-114
With a high degree of reliability we could say that modern products and systems in the field of critical infrastructure security are mechatronic, as they are complete mechanical systems with fully integrated electronics, intelligent control system and information technology. At the same time, the concept of Technology Readiness Levels has become an important project management tool that facilitates communication and common understanding between technology manufacturers and developers, customers and managers.
Defining and implementing the compatibility approach between the stages of development of mechatronic security systems of CI and TRLs is one of the possible correct ways to maintain an adequate security levels for national CI, providing prevention and counteraction against contemporary risks.
Flash-bang munitions are an integral part of the special forces’ arsenal and are often used by police and military units. Along with the development of more ‘conventional’ constructions, some innovative solutions have appeared lately, allowing significant improvement of the munitions characteristics. The aim of the present work is, presenting in sum a part of results of an extensive study of existing non-lethal means, to outline the trends in the future development of the flash-bang ammunition and systems for their delivery.
The influence of seawater depth in hydroacoustic transmission of binary numbers is experimentally investigated. The binary digits are encoded as sequences of short and long rectangular pulses of a fixed duration. The experiments are carried out in coastal waters of Bulgarian South Black Sea shelf. The transmission of numbers is experimentally compared for three different water depths: 10m, 30m and 60m, at a transmitter-receiver distance of 1500m. Increasing the water depth improved the performance leading to a larger number of correct transmissions. Hydroacoustic transmission in very shallow water is more difficult due to strong interference from reflected signals. In 60m deep water the observed transfer of binary numbers is stable and correct. Certainty of correct transmission increases with increasing water depth in shallow seawater.
Investigation of the possibilities for planning the protection of the sites from the critical infrastructure and adequate response in the event of incidents near thempg(s) 121-122
The report examines the possibilities for using new intelligent sensors, hardware and software developments and their combination in planning the protection of critical infrastructure in a dynamic environment. The processing of data, with constantly changing parameters at the scene of the incident and its forecasting over time, using current data and data from past periods.
Fiber optic sensors are increasingly widespread and used sensors in many areas of industry and defence. Sensors using fiber Bragg gratings are very accurate sensors of strain and temperature. In this paper we deal with the selection of suitable materials and structures for the implementation of optical fibers with fiber Bragg gratings. The whole process has several key stages – evaluating of adhesives on textile samples, selection of a suitable textile thickness, and design of a multilayer structure of a textile block. The resulting textile block was developed and its basic functional parameters were verified.