This article is about the strategic center of gravity of Hezbollah; Hezbollah is one of the toughest, and persistent semi-state actors. The author claims that Hezbollah’s state-sponsorship by the Islamic Republic of Iran is its strategic center of gravity (CoG). For identification, this paper starts with the definition of the CoG; lists the main possible CoGs ,and then determining the closest one to be the strategic CoG.
Journal section: NATIONAL AND INTERNATIONAL SECURITY
The summary psychological portrait of organized crime perpetrators includes a synthesized characteristic of their motivation, attitudes and values. It presents the specifics of their self-esteem, mental states and personal defences. The report analyses empirical data of organized crime individuals obtained through the Dark Triad questionnaire.
The overall psychological portrait of organized crime perpetrators is oriented towards supporting the operative-investigative, investigativejudicial and penitentiary activities with them.
A model of integrated approach for indication, analysis , correction and sustainable management under the conditions of a smoldering crisis
As Unmanned Aircraft Systems (UAS) are converging an Internet of Things-like infrastructure, always connected to the internet, cryptographic security becomes a primary concern to ensure confidential, but even more importantly tamper-proof transport of data. Another emerging problem is the high number of unregistered drone flights, with no regard towards airspace regulations. The wellestablished and standardized processes of Public Key Infrastructure (PKI) can be utilized for electronic identification of drones and associating them to the owner, while providing encryption and integrity protection of data. Nowadays various companies provide PKI for drones. This material summarizes the trends, challenges, possibilities of hardware-based on-board secure storage of secrets and describes a possible solution for government-level electronic administration of drones and owners.
Cross-border cooperation (CBC) is a unique and effective instrument of European Union that has the potential to influence on human security in a positive way. This paper analyses the role of CBC between Bulgaria and Greece in the context of human security. The analysis is focused on the Right to Life, and especially, on the right to health and social welfare. The comparative analysis represents CBC results and benefits from two programming periods: 2007-2013 and 2014-2020. The expected outcomes of cross-border projects (by 2023) are also being explored, outlining the main trends and prospects for developing the cross-border partnership.
SYSTEMIC APPROACH TO THE DEVELOPMENT OF SECURITY SYSTEMS FOR CRITICAL INFRASTRUCTURE PROTECTION AS A RESEARCH METHODOLOGY APPLIED AT THE CENTER OF COMPETENCE QUASARpg(s) 144-147
Ensuring the security of the population is one of the fundamental policies of the European Union. Various approaches are being implemented in this area, one of which is the creation of critical infrastructure security – national and European. In this regard, trough the development and operation of intelligent security systems, with a focus on critical infrastructure, is expected to improve the security of the population in EU Member States. Precisely the synergy of efforts of the scientific and industrial communities in our country for performance of specific models of security systems through the establishment and operation of centres of competence is at the core of this paper.
This work is inspired by the current problems of confronting organized crime, which in part controls illegal markets. Thus, it is also aimed at highlighting the most significant aspects of the research into illegal markets, whose knowledge enables the creation of effective strategic preferences in the fight against organized crime, whose actions have a number of negative implications for state security. Modern criminal organizations are profitable and market-oriented, and the methods of acting used are combined with the criminal and method of the operation of contemporary business organizations. The knowledge of the organization’s specifics and functioning of illegal markets enables the proper selection of methods to more efficiently counter the destructive actions of criminal organizations that control the illegal market. In fact, the destructive action of criminal organizations reflects directly on the state of security by increasing the level of corruption, the level of money laundering and the infiltration of organized crime into legal economic flows, the spread of illegal markets and the increase of the crime rate, but also the ability to generate criminal profits, increasing the economic power of criminal structures that is recursively used for influence on government holders.
THE SECURITIZATION OF CULTURAL HERITAGE PROTECTION IN INTERNATIONAL POLITICAL DISCUSSION THROUGH THE EXAMPLE OF ATTACKS OF ISIL/DAESHpg(s) 97-101
Cultural heritage often becomes a victim of armed conflicts either by collateral damage or by deliberate destruction and looting. As a consequence of the terrorist attacks of recent years – especially the large-scale and widely broadcasted iconoclastic destruction perpetrated by ISIL/Daesh in Iraq and Syria – their protection gradually became part of the international security policy agenda. Proving the symbolic significance of these attacks, they have been often claimed both as acts against the peaceful coexistence of different religions and cultures in the region and as an insult against Western civilisation and multilateral bodies which the meticulously drawn-up discourse of the terrorist group strongly underpinned. Using the securitization theory as a framework, the aim of this paper is to analyze through discursive means the reaction of different international political actors – especially France, Italy, UN and UNESCO – over the attacks of the terrorist organisation, arguing that a continuous securitization process has been taking place as regards the safeguarding of cultural heritage.
This report studies the threat for the European security posed by terrorist attacks with chemical, biological, nuclear or radiological (CBRN) materials. Latest tendencies of the problem of the last few years are being studied, and some cases broadly discussed in the media worldwide are being analyzed. Terrorists’ methodologies are being assessed, and their possibilities to obtain weapons of mass destruction. The possibility for developing an improvised explosive device with chemical substances aiming to cause damage to critical infrastructure targets which would pose a threat to the national security of the country is also considered.
It has been more than seven decades since the world’s first nuclear bomb was dropped on two Japanese cities. Since then, nine different countries have acquired nuclear weapons technology. Nuclear weapons, undoubtedly, are a hazardous power for a country. They do not only have explosive power; the power of deterrence may be more prominent than nuclear disintegration. During the Cold War era, nuclear weapons were used for deterrence effects. Two superpowers were in an endless arms race, significantly so, over these tremendous weapons. Fortunately, they were never used but deterrence was always a hot topic. However, nuclear weapons have always shown the evolution of classical geopolitics alongside the importance of today’s geopolitics which has been very much at the top of world politics since the first World War and even though countries are separated by great distances, nuclear weapons’ ranges mean that a country’s territory can be reached easily. Currently, these weapons are shaping countries’ defence policies, geopolitics strategies and their interests.
Participation in missions abroad is considered a kind of military career achievement other than military routine and familiar surroundings, which is straining both personal qualities and professional skills. This report presents a comparative analysis between participated and not participated in missions, officers, sergeants and soldiers, and how it has influenced their leadership development
As result of the analysis of the structure and consistency of the national security and cybersecurity in the national legislation the authors reach the conclusion that the national security in Bulgaria is government function and has system character in line with the complex system theory. The national security system together with the cybersecurity system have fully functionality of the complex system because beside structure, interaction and relations, the system feedbacks, as periodic reports and document review procedures that reshapes the links and relations. The processes of: control as a cycle, security risk management and capability planning are reflected in the national legislation and are prescriptive, as well.