Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • Multi-Domain Operations – A New Approach in Warfare?

      pg(s) 78-80

      In this paper, the author studies the so-called Multi-Domain Operations, which is a relatively new term in military science. The study focuses on the origin, definition and elements of multi-domain operations. Since the terminology is developing – or at least changing – quite fast from multi-domain battle across multi-domain operations to all-domain operations besides terms like cross-domain operations/effects, this emerging process need to be studied. The paper examines if this term describes a new approach of warfare or it is an old concept in a new guise.

    • Possible approach for standard operating procedures development for intelligent security systems functioning

      pg(s) 81-84

      Standard Operating Procedures are a common guide to the organization’s activities. Their development and use are an integral part of a successful management system of an organization, as it provides staff with information on the proper per formance of a job and facilitates consistency in achieving the desired end result.
      Standard Operating Procedures describe the exact steps needed to perform the organization’s security tasks and are important both for maintaining the level of competence of the staff performing a particular job and for training new employees. To reduce errors within organisation in terms of security-related activities and the mission-critical processes is the basis of this paper.

  • NATIONAL AND INTERNATIONAL SECURITY

    • “Fort Trump” in Poland – was it possible?

      pg(s) 85-87

      The key role of the United States in Polish security policy makes the Polish authorities strive for possibly close allied relations with the US. In order to consolidate the allied bond and increase the defense and deterrence capabilities against Russia, Poland proposed building a permanent base for the US Armed Forces on its territory in the strength of a division. This project was too ambitious and for this reason it was impossible to implement in the current political and military conditions. The main reason was the concern about escalating tensions on the NATO-Russia line. There was also no inter-alliance agreement around the project, and some NATO countries openly opposed the “Fort Trump” concept. Experts were not convinced that the permanent stationing of a large group of American forces in Poland would be the most effective solution to the current threats. For these reasons, “Fort Trump” was not created, and the decisions made to increase the American military presence in Poland were much less ambitious than the proposals and expectations of the Polish authorities.

    • Preventive and protective measures against insider threats in nuclear facilities

      pg(s) 88-91

      One of the main threats to nuclear facilities can involve external or insider adversaries or both together in collusion (coop eration for an illegal or malicious purpose with another insider adversary or with an external adversary). In these case, the main effort is to prevent and protect against unauthorized removal of nuclear material and sabotage of nuclear material and facilities by insiders. This report applies to any type of nuclear facility – notably nuclear power plants, research reactors and other nuclear fuel cycle facilities – whether in design, construction, commissioning, operation, shutdown or decommissioning

    • The reasons for the next armed clash between Jews and Palestinians from April-May 2021 and the impossibility of a lasting solution to the Israeli-Palestinian conflict

      pg(s) 92-93

      A study of the preconditions for the emergence of the latest conflict between Jews and Palestinians in the context of the internal political situation in the state of Israel and who has an interest in its ignition. The Israeli-Palestinian conflict is the longest-running conflict that has ever existed in humanity and the impossibility of a lasting and sustainable settlement of the dispute, which will contribute to the stability not only of the State of Israel but also of the Middle East.

  • INFORMATION SECURITY

    • Determining the period for information security risk checks

      pg(s) 94-97

      Risk assessments are not a one-off action, but there are no formal guidelines on when and how often a risk assessment should be carried out. Changing factors affect the risk assessment parameters. The strongest influence of these changes is the probabil ity of an accident. The article describes the main parameters of a model that is built on the basis of an asset and the incident scenarios defined for it. An analysis of the changes in the probability of an accident has been made. Dependencies are derived to determine the appropr iate periods for checking the risk factors. These periods must ensure an acceptable level of risk, which is within acceptable levels for the organization.

    • Comparison of Convolutional Codes and Random Codes Based on Quasigroups for transmission in BSC

      pg(s) 98-101

      Error-correcting codes are widely used in modern coding theory, and their applications in networks and communication cannot be omitted. Together with the error detecting codes, they are the core of every possible transmission and communication. In coding theory, information theory and telecommunications, error-correcting codes are used to control errors in data which are transmitted over different communication channels. Convolutional block codes are one of the most popular error-correcting codes which are applied in many networks. On the other side, Random Codes Based on Quasigroups (RCBQ) are cryptcodes defined elsewhere. These codes provide a correction of a certain number of errors in the transmitted data and an information security in one algorithm. There are a few modifications of RCBQ, but here we will consider performances of Cut-Decoding algorithm. In this paper, we investigate and compare the bit error probability (BER) of these two codes for rate 1/4 and different values of bit-error probability in the binary symmetric channel. From the obtained experimental results, we conclude that for lower bit-error probability in the binary symmetric channel, the RCBQs are slightly better than convolutional codes. The advantage of RCBQs is that they have some cryptographic properties, but convolutional codes are faster than RCBQs.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    • Implementation of svm in clasiffaing sources of acoustic signals

      pg(s) 106-107

      The paper addresses the problem of acoustic signal classification and report the current state of the art in the field. More specifically the paper sheds light on the mathematical apparatus behind one specific method used for classification of sound sources – SVM (support vector machines). As well we propose use of histogram of oriented gradients (HOG) as features descriptor and explain how they work.

    • Combat unmanned ground vehicles: Perspectives for implementation into operational application

      pg(s) 108-111

      Combat Unmanned Ground Vehicles (UGV´s) are platforms designed for the replacement of the human element on the battlefield. Their autonomy depends on their respective level of technical development. Many armies invest varying levels of effort into the development of prototypes and solutions of UGV´s. They have various abilities and limits. Th is article uses open sources while identifying the current global state of perspectives in the short term. The authors are convinced that artificial intelligence, military robotics, and its implementation into operational structures can disrupt the process of conflict and will have a strong impact on the ratio of forces in regions throughout the world.

    • Automatic gain control in an underwater acoustic receiver

      pg(s) 112-114

      The performance of two automatic gain control circuits is compared in an underwater acoustic receiver: a low-power hardware gain control and a software-controlled gain control that disables the gain change for a predetermined time interval after a valid signal level. Binary digits “0” and “1” are transmitted using bursts of the frequencies 33kHz and 43kHz, respectively, in two modes of operation. In the first mode, each digit is sent as one frequency burst followed by a pause. In the second mode, a frequency burst is transmitted at the beginning of a clock interval. Experiments are conducted in shallow waters. The results show that the hardware gain control circuit is suitable to equal time intervals between the transmitted bursts. The software gain control circuit allows arbitrary time intervals between the transmitted bursts. Increased power consumption of the device is detected as a disadvantage of the software gain control circuit.