INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment
INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment
Contributor(s): Anton Stan (Editor)
Subject(s): Politics / Political Sciences, Economy
ISSN: 2285-9896
Published by: Carol I National Defence University Publishing House
Series: STRATEGII - Sesiunea de Comunicări Științifice
- Page Count: 340
- Publication Year: 2016
- Language: English
WHAT KIND OF FUTURE ARE WE PREPARING FOR: JOINT OPERATING ENVIRONMENT (JOE) 2035
WHAT KIND OF FUTURE ARE WE PREPARING FOR: JOINT OPERATING ENVIRONMENT (JOE) 2035
(WHAT KIND OF FUTURE ARE WE PREPARING FOR: JOINT OPERATING ENVIRONMENT (JOE) 2035)
- Author(s):Florin Diaconu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:7-15
- No. of Pages:9
- Keywords:threats; risks; challenges; windows of opportunity; freedom; deterrence; exploring the future; Russia; the Western world
- Summary/Abstract:The paper briefly analyzes an official document made public, in mid-July 2016, by the U.S. Joint Chiefs of Staff. The document is called Joint Operating Environment (JOE) 2035: The Joint Force in a Contested and Disordered World and is aimed at offering some recommendations dealing with what the U.S. – and the rest of the Western world, including countries on the Eastern rim on NATO – must do in order to be better prepared for the complex threats, risks and challenges in the foreseeable future. Several major interconnected geo-strategic threats, risks and challenges in the foreseeable future are taken into account and some potentially important windows of opportunity as well. The main aim of this paper is that of depicting some politically and strategically significant consequences of the conceptual-intellectual framework JOE 2035 is so vividly and convincingly presenting.
HOW TO TURN AMERICAN MISSILES INTO RUSSIAN PROPAGANDA BULLETS? THE AMERICAN ANTI-MISSILE SHIELD FROM DEVESELU
HOW TO TURN AMERICAN MISSILES INTO RUSSIAN PROPAGANDA BULLETS? THE AMERICAN ANTI-MISSILE SHIELD FROM DEVESELU
(HOW TO TURN AMERICAN MISSILES INTO RUSSIAN PROPAGANDA BULLETS? THE AMERICAN ANTI-MISSILE SHIELD FROM DEVESELU)
- Author(s):Luminița KOHALMI
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:16-23
- No. of Pages:8
- Keywords:propaganda; informational war; anti-missiles shield; Deveselu; Putin; NATO; USA
- Summary/Abstract:While in Romania held the commissioning of one of the elements of the NATO’s antiballistic defensive shield, the propaganda machine of the Kremlin was trying to impose the idea that the capabilities installed at Deveselu by US and NATO have an offensive end, threatening the Russian Federation security. The present study is aimed at identifying the design of the informational campaign for the inauguration of the Aegis Ashore system in Roma that Russian Federation used to push its own political and military agenda in order to provide a geopolitical alternative to Atlanticism and the US domination. Media analysis show that the techniques and instruments used in the Russian propaganda campaign are dosed in such a manner that they may deem Deveselu as one of the greatest American military threat at the border of the Russian Federation. In this context, the Deveselu argument, once included in a negative psychological, emotional and aspirational horizon, can be frequently used by the Kremlin for the mobilisation of foreign and domestic publics against US and NATO.
THE EURO-ATLANTIC PARTNERSHIP RELOCATION AFTER AFGHANISTAN
THE EURO-ATLANTIC PARTNERSHIP RELOCATION AFTER AFGHANISTAN
(THE EURO-ATLANTIC PARTNERSHIP RELOCATION AFTER AFGHANISTAN)
- Author(s):Oana Mihaela Vladu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:24-29
- No. of Pages:6
- Keywords:Euro-Atlantic partnership; security of Europe; NATO; the EU; the evolution of Euro-Atlantic strategies; June 2016 NATO summit; the 2016 EU summit
- Summary/Abstract:The world is constantly changing, facing a complex range of risks that diversifies and increases continuously. In this context, we present the relocation of the Euro-Atlantic post Afghanistan as a response to the problems of an unstable Ukraine caused by an unpredictable Russia; the war in Syria which generates refugees’ flows to the EU; emergence of new terrorist threats created by ISIS in Syria and Iraq; and failure of Libya reconstruction.
IS IT POSSIBLE TO PREVENT IMMINENT TERROR ATTACKS? THE U.S. INTERVENTION CASE AGAINST KHORASAN TERROR GROUP
IS IT POSSIBLE TO PREVENT IMMINENT TERROR ATTACKS? THE U.S. INTERVENTION CASE AGAINST KHORASAN TERROR GROUP
(IS IT POSSIBLE TO PREVENT IMMINENT TERROR ATTACKS? THE U.S. INTERVENTION CASE AGAINST KHORASAN TERROR GROUP)
- Author(s):Luiza Maria Filimon
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:30-41
- No. of Pages:12
- Keywords:terrorism; imminence; terror group Khorasan; critical discourse analysis; foreign military intervention; internationalized civil war; ISIL; Syria
- Summary/Abstract:The present paper aims to analyze the context that led to the start of the American intervention in Syria, in September 2014. As a result of Iraqi forces being unable to face the armed offensive of the Islamic State (ISIL) organization coming from the civil war devastated Syria and taking into account the potential risk of a collapse of the Iraqi state, the United States and its partner nations in the region (Saudi Arabia, Bahrain, the United Arab Emirates, Jordan and Qatar) launched airstrikes against ISIL positions on 22 September 2014. In the weeks prior to the intervention, sources in the American government revealed that an even more dangerous terrorist actor was present in Syria, namely the Khorasan Group, which was allegedly plotting a series of imminent attacks against the territory of the United States. This article applies critical discourse analysis to a series of official and media positions in order to highlight that the imminence requirements posed by terror threats are met, even when the available data is inaccurate or outright missing.
BRITISH SECURITY STRATEGY POST-BREXIT
BRITISH SECURITY STRATEGY POST-BREXIT
(BRITISH SECURITY STRATEGY POST-BREXIT)
- Author(s):Oana Elena Brânda
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:42-49
- No. of Pages:8
- Keywords:Brexit; withdrawal; security; defense; EU security
- Summary/Abstract:The surprising vote on Brexit brought forward somber perspectives on the evolution of European security policies. As the United Kingdom has long been a great contributor to security policies, both within NATO and with the feeble European Union policy in the field, its future absence from the European security framework has led many to believe that the Union shall be deprived of a significant actor, one that would have helped it advance significantly. This is highly important as European Union security was in the making, aiming towards a consolidation of its stance among global actors in the field. Thus, the deprival of British military and security expertise and resources shall be strongly experienced. In a weak European Union, affected by the previous Grexit situation, with many contesting its federalist vision, and even more its utility, Brexit raised even more doubts on the future of the European construction.
THE GEOPOLITICAL CONUNDRUM IN THE MIDDLE – EAST
THE GEOPOLITICAL CONUNDRUM IN THE MIDDLE – EAST
(THE GEOPOLITICAL CONUNDRUM IN THE MIDDLE – EAST)
- Author(s):Haliru Dogondaji Bello
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:50-55
- No. of Pages:6
- Keywords:globalization; interdependence; sensitivities; geopolitical factors; oil
- Summary/Abstract:Interrelation among actors, interests and goals in the Middle-East seem to overwhelm socio-political sensitivities arising from a clash between the fundamental ideas, values and principles of the West and Islam. Perhaps islamist terrorism obtains its impetus from the complex web of intermingling factors arising from economic interdependence between the West, Islam and Russia as prompted by Globalization.This paper is to reveal the study made on geopolitical factors that dictate to interrelation in the Middle East, thereby exposing the supremacy of economic (oil) interdependence over all socio-political sensitivities arising within the region.
CURRENT GEOPOLITICAL CONTEXT, POTENTIAL IMPLICATIONS ON ROMANIA'S REGIONAL INTERESTS
CURRENT GEOPOLITICAL CONTEXT, POTENTIAL IMPLICATIONS ON ROMANIA'S REGIONAL INTERESTS
(CURRENT GEOPOLITICAL CONTEXT, POTENTIAL IMPLICATIONS ON ROMANIA'S REGIONAL INTERESTS)
- Author(s):Fănel Rădulescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:56-70
- No. of Pages:15
- Keywords:tensions; confluence; regional context; regional interests; regional pole of stability
- Summary/Abstract:The actual security environment, characterized by significant military and geopolitical tensions, affects, at least at a regional level, politico-military and economic interests of Romania. Of the general politico-military context, geographic location, the Black Sea region which had become an important confluence area among interests of the Russian Federation, regional countries and other regional and Euro-Atlantic bodies, makes Romania the eastern border of the EU and NATO. Moreover, the Russia’s unpredictable actions, Turkey's potential instability, with complex implications in the region, Eastern Mediterranean and Middle East security challenges, will lead countries of the region, as well as EU, NATO and of course US, to reconsider their positions and future action approaches. As a result, the regional context requires Romania to assume its role as pivotal country and the responsibility to protect its interests, primarily by itself, as forms of affirmation and strengthening its role as a regional pole of stability, not only in relation with the EU and NATO, but also in strategic partnership with the US.
THE CONTRIBUTION OF NATO AND EU EXPEDITIONARY MISSIONS TO STRENGTHENING SECURITY
THE CONTRIBUTION OF NATO AND EU EXPEDITIONARY MISSIONS TO STRENGTHENING SECURITY
(THE CONTRIBUTION OF NATO AND EU EXPEDITIONARY MISSIONS TO STRENGTHENING SECURITY)
- Author(s):Daniela Răpan
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:71-80
- No. of Pages:10
- Keywords:Romania; NATO; EU; security threats; expeditionary operations/missions; stability and support operations; defence diplomacy; smart means for ensuring security and defence
- Summary/Abstract:Starting from the current security threats – that are multiple, diverse, of hybrid nature – and the need to counter them through multiple means – from soft ones (diplomacy) to hard ones (military means) and smart ones (combined soft and hard means), the paper analyses, from the perspective of Romanian participation, the contribution of NATO and EU expeditionary missions to strengthening security. Moreover, the work analyses in parallel from the point of view of typology and geographical coverage, ongoing NATO and EU missions and operations, taking into account the defence diplomacy component.
RUSSIAN FEDERATION AND THE IMPLEMENTATION OF A2/AD SYSTEM IN THE BLACK SEA: RISKS AND THREATS TO ROMANIA
RUSSIAN FEDERATION AND THE IMPLEMENTATION OF A2/AD SYSTEM IN THE BLACK SEA: RISKS AND THREATS TO ROMANIA
(RUSSIAN FEDERATION AND THE IMPLEMENTATION OF A2/AD SYSTEM IN THE BLACK SEA: RISKS AND THREATS TO ROMANIA)
- Author(s):Cătălin Alin Costea
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:81-95
- No. of Pages:15
- Keywords:Russian Federation; Crimean Peninsula; Black Sea; A2/AD; Romania
- Summary/Abstract:The annexation of Crimean Peninsula has allowed Moscow to consolidate and strengthen its presence in the Black Sea, affecting the security perceptions of NATO states from the south-eastern flank. However, the NATO Summit in Warsaw showed that the Alliance grants a greater importance to north-eastern flank by disparities proposals to strengthen the Alliance's presence. Meanwhile, Russian Federation continued the militarization of the Crimean Peninsula, by implementing a local system of anti-access and anti-denial zone (A2 / AD). This article aims to analyze the consequences of implementing the A2 / AD system in Crimea and Romania's dynamic risk profile. The working hypothesis of the article is the changing balance of power in the Black Sea to the detriment of Romania's security. Major topics approached are the geopolitical importance of Crimea, implementation of A2 / AD in the peninsula, risks and threats to Romania, a topical subject treated from a new perspective, less debated in Romania.
OFFICIAL LANGUAGE, SYMBOL OF MODERN STATE
OFFICIAL LANGUAGE, SYMBOL OF MODERN STATE
(OFFICIAL LANGUAGE, SYMBOL OF MODERN STATE)
- Author(s):Marin Butuc
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:96-99
- No. of Pages:4
- Keywords:literary language; national language; culture language; national state; linguistic legislation; informational space; hybrid war
- Summary/Abstract:According to international standards, the official language of a nation state represents a part of national security. Speaking about the official language in the Republic of Moldova and its degree of functionality, unfortunately it is obvious that historical language does not correspond to the official language present in a national, sovereign and independent state. In our opinion, this situation represents not only a linguistic danger at the level of correctness of Romanian language in the Republic of Moldova, but also a danger at the level of national security, in the case when propagandistic intentions of the Russian Federation are obvious, by using a wide range of mass-media sources, aiming at the impairment of values and aspirations of state politics.According to sociolinguistic theses, two literary languages cannot coexist in a nation state, because it conducts to an impairment. Therefore, the state faces a difficult situation, determined by the fact that it is supposed to promote two different cultures, and also two different national politics – actually, it represents an enormous paradox and absurdity.This situation does not correspond to the international standards, and it is obvious the fact that we live in a state, impaired in various domains: linguistics, culture, politics and mass-media. Nowadays, the most widely used language is not the language that involves great number of speakers, but the language that is spread in the field of mass-media (for example: Russian language functionality in the majority Former Soviet Countries). It represents that kind of language that has a bigger material support for being promoted, and it also monopolizes press and audiovisual. Thereby, it is necessary to adopt a new Legislation in the Republic of Moldova in the field of linguistics, and new laws in accordance to the international standards of an official language in an independent and sovereign state.
NATIONAL AND INTERNATIONAL THREATS IN THE CONTEXT OF GLOBALISATION
NATIONAL AND INTERNATIONAL THREATS IN THE CONTEXT OF GLOBALISATION
(NATIONAL AND INTERNATIONAL THREATS IN THE CONTEXT OF GLOBALISATION)
- Author(s):Diana-Gabriela Cojocaru
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:100-108
- No. of Pages:9
- Keywords:corruption; shadow economy; terrorism; money laundering; organized crime
- Summary/Abstract:The corruption in Romania versus the international corruption is described by the means of terrorism, organized crime and money laundering. In the workshop ,,The complexity and dynamics of the security environment” I will present the three main national and international threats: terrorism, organized crime and money laundering, threats that are part of the shadow economy, present both in Romania and worldwide, but also the impact of these harmful phenomenon in society. At the same time, the purpose of the writing is to identify these threats in Romania and to bring forward the necessity of combating this harmful phenomenon, phenomenon that have social and economic reasons. Within the presentation, I insist upon the need to combat the money laundering and the terrorism, threats that are part of a complex economic cycle which is centered on corruption.
FACETS OF COMMUNICATION – FROM CRYSTALLIZING PERSONAL IDENTITY TO NATIONAL SECURITY
FACETS OF COMMUNICATION – FROM CRYSTALLIZING PERSONAL IDENTITY TO NATIONAL SECURITY
(FACETS OF COMMUNICATION – FROM CRYSTALLIZING PERSONAL IDENTITY TO NATIONAL SECURITY)
- Author(s):Ciprian Pripoae-Serbănescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:109-118
- No. of Pages:10
- Keywords:Individual identity; national security; communication; unconscious; influence; asymmetry
- Summary/Abstract:This paper documents the potential correlations between individual identity and the risks and vulnerabilities of national security placing the phenomenon of communication as the common denominator. Different aspects of individual identity are explored in order to accommodate various dimensions and definitions of national security. A special emphasis is placed on the unconscious features of different forms of communication. We insist on the social influencing facet of communication from the earliest moments of individual education to the persuasiveness of mass communication and their possible impact on national security.
CONSOLIDATING DEFENSE AND SECURITY POLICIES IN THE CURRENT SOCIETY BETWEEN DOCTRINE, IDELOGY AND SCIENTIFIC EXPERTISE
CONSOLIDATING DEFENSE AND SECURITY POLICIES IN THE CURRENT SOCIETY BETWEEN DOCTRINE, IDELOGY AND SCIENTIFIC EXPERTISE
(CONSOLIDATING DEFENSE AND SECURITY POLICIES IN THE CURRENT SOCIETY BETWEEN DOCTRINE, IDELOGY AND SCIENTIFIC EXPERTISE)
- Author(s):Tudor SÂRBU
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:119-125
- No. of Pages:7
- Keywords:strategy; scientific advice; geostrategy; research; security policies
- Summary/Abstract:By means of problem researched and exposed briefly I aim to draw attention to the role of expertise when elaborating security policies and strategies, in such a way that they can become genuine tools when managing situations that can breach security. In the knowledge-based society, the role of scientific reseach and of expertise has grown exponentially in comparison with the previous centuries.No decision when elaborating security and defense policies is based exclusively on national and geostrategic interest, especially when it comes to understanding contexts and consitions that are connected to efficiency and managing resources to reach the political targets.At the level of several governments there is a diveristy of structures and institutions founded and specialised in offering expertise in various fields of interets and each of these reflec the larger implications that cultural and traditional aspects have when presenting and perceiving the problem, especially when it comes to decision making.
DEFENSE DIPLOMACY, RULES AND ORDER IN HUMANITARIAN INTERVENTION
DEFENSE DIPLOMACY, RULES AND ORDER IN HUMANITARIAN INTERVENTION
(DEFENSE DIPLOMACY, RULES AND ORDER IN HUMANITARIAN INTERVENTION)
- Author(s):Raul TODEA
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:126-131
- No. of Pages:6
- Keywords:defense diplomacy; foreign policy; strategic community
- Summary/Abstract:One of the instruments to implement the foreign and security policy of a state is defense diplomacy.The component of defense diplomacy is aimed at indirectly using armed forces to address national security issues.The role of military commanders in theaters of operations extends to the diplomatic sphere, to serving as negotiators for the parties, which are under conflict for the conflict reconstruction stages of the post – conflict phase.The defense diplomacy concept shows a multilayered coherent development, with a visible impact on the following elements: strengthening institutions, reinforcing a strategic dialogue and exchanges in the field of information, promoting stability through cooperation and measures to boost confidence and security, improving the democratic civil control, military reform, military training1.Defense Diplomacy can have impact upon the development of the safety and security sector, as well as upon the sense of the strategic defense community, both regionally and internationally.
STREAMLINING OF DEFENCE EXPENDITURE
STREAMLINING OF DEFENCE EXPENDITURE
(STREAMLINING OF DEFENCE EXPENDITURE)
- Author(s):Konrad STAŃCZYK
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:132-140
- No. of Pages:9
- Keywords:economic security; economics of defence; streamlining of public spending; military expenditure; defence spending; long-term financial planning
- Summary/Abstract:Nowadays, it is difficult to imagine safe functioning of the state without properly equipped armed forces, and the need for implementation of the latest scientific and technological achievements to arms and military equipment calls for the necessity to expend large sums of money. This necessity arising from the need to ensure the security of the state and its citizens in a way justifies defense spending. By and large, savings in defense spending should be seen not as a direct reduction of the size of public spending on security, but as a set of methods to streamline the expenditure. The chief objective of this paper is to present the methods of streamlining of defense spending used in the Ministry of National Defense. This paper discusses the essence of planning and programming of defense spending, the need for technical modernisation of the armed forces and the idea of the reform of military economic structures.
DEMOGRAPHY AND SECURITY. GLOBAL RESHAPING IN THE XXI ST CENTURY
DEMOGRAPHY AND SECURITY. GLOBAL RESHAPING IN THE XXI ST CENTURY
(DEMOGRAPHY AND SECURITY. GLOBAL RESHAPING IN THE XXI ST CENTURY)
- Author(s):Cătălina Todor
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:141-157
- No. of Pages:17
- Keywords:relation between demography and security; challenges; opportunities; state of conflict; frailty; stability
- Summary/Abstract:The 21st century is marked by historically unprecedented demographic transformations, which have the potential to reshape the world as it is known to us today. Within this context and in accordance with the concept of security spreading on other non-military areas, the present research started from the question “Do connections of the demographic transformations with security or insecurity exist?” and aimed to identify the nature of this connection and the typologies of demographic evolutions which can offer legitimacy to such connection. As a result, the paper proceeds from analyzing the professional literature to classifying some of the most important aspects of demographic changes with possible impact on security, in its endeavor to offer a structure to the relation between demography and security. There are no certainties regarding how the future world would look like, but the analysis of demographic trends represents a research field of great actuality and importance, which may come to practitioners’ aid by means of understanding the potential security implications.
APPROACH TO MIGRATION IN THE CZECH REPUBLIC: SHOULD WE BE WORRIED?
APPROACH TO MIGRATION IN THE CZECH REPUBLIC: SHOULD WE BE WORRIED?
(APPROACH TO MIGRATION IN THE CZECH REPUBLIC: SHOULD WE BE WORRIED?)
- Author(s):Libor Frank
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:158-163
- No. of Pages:6
- Keywords:migration; demographics; public surveys; securitization; ageing
- Summary/Abstract:The paper deals with one of the hottest contemporary issues - the international mass migration, which is intensively perceived as one of the most important challenges of our times for the present and the future of the European Union. Migration is largely negatively perceived as a security threat, which threatens the stability and security of European countries. However, a closer examination of migration and its consequences shows that this simplified and almost exclusively negative stereotype of migration does not exactly reflect reality and available “hard data”. The Czech Republic’s example demonstrates how the problem of migration is perceived in general, what attitude to immigration the Czech society occupies along with its reasons. The purpose of the conference paper is to contribute to the search for answers to the question whether migration is a genuine security threat or rather the opportunity or even the necessity, which we should exploit
RADICALIZATION IN EUROPE IN THE CONTEXT OF MUSLIM IMMIGRATION
RADICALIZATION IN EUROPE IN THE CONTEXT OF MUSLIM IMMIGRATION
(RADICALIZATION IN EUROPE IN THE CONTEXT OF MUSLIM IMMIGRATION)
- Author(s):Mirela Atanasiu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:164-170
- No. of Pages:7
- Keywords:threat; security; demography; islamophobia; Islamization; Europe; extremism
- Summary/Abstract:Actual historical time witnesses acute humanitarian crises taking place in the Middle East and North Africa region particularly inhabited by Muslim Arab population. These crises have led to the exodus of the Muslim population not only in countries in the immediate neighbourhood, but also in Europe. Thus, now, European states have reached to face a real immigration crisis triggered by various reasons subsequent to demographic phenomena. One of the major consequences of Muslim immigration, in addition to the rise of Islamist terrorism in the European territory, we consider to be the radicalization trend, both of indigenous peoples and of Muslim immigrants, leading to impaired rule of European law.In the present paper, we want to present some coordinates, prerequisites and present and future consequences of radicalization perpetuating at the cost of European democratic values, such as unity in diversity.
TERRORISM – THE MAIN THREAT AGAINST EUROPEAN DEFENSE AND SECURITY
TERRORISM – THE MAIN THREAT AGAINST EUROPEAN DEFENSE AND SECURITY
(TERRORISM – THE MAIN THREAT AGAINST EUROPEAN DEFENSE AND SECURITY)
- Author(s):Ciprian Chițac
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:171-177
- No. of Pages:7
- Keywords:ISIS; EU; al-Qaeda; Europe; Security; Defense
- Summary/Abstract:The terrorist phenomenon, in its different manifestations, has always been a part of world history. The degree of alertness though, has varied greatly.Following the events of September 11, 2001, but also after the attacks in Istanbul, London, Madrid, Brussels and Paris, for the first time a non state actor has been declared a direct adversary in a military confrontation. A military campaign was launched against the al-Qaeda and its supporters from Afghanistan. A broad range of measure was introduced, regionally and globally, aiming to support state defense, and also to monitor the activity of terrorist leaders. The efficiency of such effort has seen its fruition with the death of Osama Bin Laden. Still, this victory has offered nothing more but a false sense of security, creating in the democratic world the illusion of an end to the war.The progressive development of the terrorist organization of the Islamic State in Iraq and al-Sham ( ISIS ), also known under the name of Daesh, has put once more the terrorist threat at the top of the global security agenda.
ELIMINATION OF TERRORISM SOURCES OF FINANCING - A POSSIBLE “TROJAN HORSE” IN DESTRUCTURATION OF THESE ORGANIZATIONS?
ELIMINATION OF TERRORISM SOURCES OF FINANCING
- A POSSIBLE “TROJAN HORSE” IN DESTRUCTURATION OF THESE ORGANIZATIONS?
(ELIMINATION OF TERRORISM SOURCES OF FINANCING
- A POSSIBLE “TROJAN HORSE” IN DESTRUCTURATION OF THESE ORGANIZATIONS?)
- Author(s):Silvestru – Dumitru Ilaş
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:178-183
- No. of Pages:6
- Keywords:terrorism; asymmetric threats; terrorist financing; financing sources; terrorism vulnerability
- Summary/Abstract:The twentieth century brought the world's most horrific facts of history through two world wars1. The consequences of two world wars have turned the onset of the XXI century in an enemy of modern society, democracy and progress, a recrudescent danger or even an “invisible” enemy.States faced with asymmetric threats since ancient times but in the present century they became a global risk factor. After the events on September 11 2001, the world woke up to reality, experiencing new forms and action processes specific to terrorism, being forced to re-evaluate this risk and to change their vision of global safety.Terrorism is an asymmetrical, unconventional conflict, which by its anarchic, adaptable and diffuse nature is extremely difficult to identify, manage and countered. But a weak point could be found and must be exploited to the maximum in order to destroy this plague of the modern world. This vulnerability is represented by the sources of financing the terrorism.In this paper we intend to present some coordinates of the funding sources most frequently used by terrorist organizations around the globe.
OFFSHORE CENTERS - THE LIMIT BETWEEN LEGALITY AND ILLEGALITY
OFFSHORE CENTERS - THE LIMIT BETWEEN LEGALITY AND ILLEGALITY
(OFFSHORE CENTERS - THE LIMIT BETWEEN LEGALITY AND ILLEGALITY)
- Author(s):Diana-Gabriela Cojocaru
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:184-193
- No. of Pages:10
- Keywords:tax haven,;offshore; organized crime; money laundering; and terrorism
- Summary/Abstract:As a result of the globalization, the tax heavens attracted the interest of normal citizens, and also of the theoreticians and of the practitioners. The theoreticians believe the fact that tax havens have as the main core the transcendence, while the practitioners completely discharge and refuse the idea. In the workshop ,,The complex and dynamic nature of the security environment” I will present the reasons why the world’s biggest businessmen prefer to place their money in an offshore center, which is at the edge of legality and illegality. Author's purpose is to draw the limit between tax avoidance and the concealment of illicit money. Also, the author tries to present the threats that hide behind the tax havens, threats that affect the global and national economy. The fight against this phenomenon is part of a cycle of financial economical violation which is corruption.
COMPETITIVE INTELLIGENCE AND MANAGEMENT EFFICACY
COMPETITIVE INTELLIGENCE AND MANAGEMENT EFFICACY
(COMPETITIVE INTELLIGENCE AND MANAGEMENT EFFICACY)
- Author(s):Răzvan Grigorescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:194-201
- No. of Pages:8
- Keywords:competitive intelligence management; efficacy; competitive advantage; security
FROM ECONOMIC INTELLIGENCE TO AGROINTELLIGENCE
FROM ECONOMIC INTELLIGENCE TO AGROINTELLIGENCE
(FROM ECONOMIC INTELLIGENCE TO AGROINTELLIGENCE)
- Author(s):Mădălina-Steluţa Pătrăşescu Neacşu
- Language:English
- Subject(s):Economy
- Page Range:202-206
- No. of Pages:5
- Keywords:intelligence economic; agrointelligence; knowledge agrointelligence; politics agrointelligence; Information System on Food Security (SISA)
- Summary/Abstract:The article analyses the relation between intelligence economic and agrointelligence, seen as strategical instruments for monitoring, evaluation, analyzing and disseminating information from agro-food sector. Through this multidisciplinary and multidimensional approach, the usefulness and relevance of the information integrated in producing agro-strategical knowledge (agrointelligence knowledge) is being demonstrated. The new informational architecture of food security will substantiate itself on multifunctional aspects at socio-agro-geo-economical level, because partial and fragmented information are replaced, in the new globalization paradigm, with complex and useful information of agrointelligence type.The paper suggests alternative, integrated and innovative solutions to ensuring food safety by an Information System on Food Security (SISA), the latter having the role of monitoring and managing the main challenges of agro-food sector and prevent/control food insecurity at European and global level.
MULTIPLE CONTEXTS OF DEFINING NATIONAL DEFENCE STRATEGIES. NORTHERN EUROPE’S SITUATION. IDENTIFYING REGIONAL EQUATION
MULTIPLE CONTEXTS OF DEFINING NATIONAL DEFENCE STRATEGIES. NORTHERN EUROPE’S SITUATION. IDENTIFYING REGIONAL EQUATION
(MULTIPLE CONTEXTS OF DEFINING NATIONAL DEFENCE STRATEGIES. NORTHERN EUROPE’S SITUATION. IDENTIFYING REGIONAL EQUATION)
- Author(s):Teodora Irina HRIB
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:207-213
- No. of Pages:7
- Keywords:Northern Europe; security; defence; strategy; regional; context; historical; geopolitical; geostrategic; security complex
- Summary/Abstract:This scientific paper intends to present the equation of Northern Europe, approach that requires the analysis of the multiple contexts in which the documents concerning the defence of Nordic countries were definEditura The research also takes into account the multiple interferences occurring in the relation between defence and security.As a result of scientific research, we have identified three contexts: historical, geopolitical and geostrategic. Analysis of these contexts has shown that the countries of Northern Europe are acting in the logic of a complex security, concept under consideration theorists of the Copenhagen School. In order to complete this complex of security with regional valence, the Nordic countries have chosen to be part in the security community which includes EU States and NATO Allies.The analysis of the defence and security policies of the North European states demonstrates that they were designed with the doctrinal and technological interoperability as central axis. It is the common principle of ensuring defence and security of neighbors to strengthen its own state defence and security.
MODERN WARFARE, PRODUCT OF THE DEMOCRATIC PEACE DOCTRINE
MODERN WARFARE, PRODUCT OF THE DEMOCRATIC PEACE DOCTRINE
(MODERN WARFARE, PRODUCT OF THE DEMOCRATIC PEACE DOCTRINE)
- Author(s):Constantin VASILE
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:214-221
- No. of Pages:8
- Keywords:international relations; liberalism; realism; modern warfare; democratic peace; NATO
- Summary/Abstract:The liberal peace is the most comprehensive and compelling challenge to the realist theories on hegemonic order and balance of power. Although the modern warfare is certainly a product of the democratic peace, conceptually scholars appreciate differently the contribution, as causality, of the differences between the Western and non-western cultures, positioning themselves in two camps pro and against in terms of assimilation of the concept of the state modernization with the liberal democratization. In the present scientific papers, we focus on qualitative thematic and comparative analysis of two of the most representative theories on the possible evolution of the international system, namely the liberal theory of Francis Fukuyama and Samuel Huntington's realist theory. The divergence of these two theories is determined by questioning the universality of Western culture values and the impact of the other non-western cultures may have on the evolution of mankind.
THEORETICAL APPROACHES ON CONTEMPORARY MILITARY OPERATIONS
THEORETICAL APPROACHES ON CONTEMPORARY MILITARY OPERATIONS
(THEORETICAL APPROACHES ON CONTEMPORARY
MILITARY OPERATIONS)
- Author(s):Iurii CIUBARA
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:222-226
- No. of Pages:5
- Keywords:war; operation; process; aero terrestrial battle; military conflict; phase
- Summary/Abstract:Based on the experience of military conflicts at the end of 20th century and the beginning of 21st century and on the point of view of military experts, the study aims to analyze military conflicts from the perspective of conducting military operations. In this context, there are envisaged the processes of switching from one form of warfare to another, the methods of using troops in modern military operations. Thus, there are analyzed the factors, conditions that contributed to the apparition of the term „operation”, as well as the stages of evolution of operational art.
INCREASING THE EFFICIENCY OF MAINTENANCE ACTIVITIES USING LEAN SIX SIGMA METHODOLOGY
INCREASING THE EFFICIENCY OF MAINTENANCE ACTIVITIES
USING LEAN SIX SIGMA METHODOLOGY
(INCREASING THE EFFICIENCY OF MAINTENANCE ACTIVITIES
USING LEAN SIX SIGMA METHODOLOGY)
- Author(s):Adrian Nour
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:227-234
- No. of Pages:8
- Keywords:maintenance; military equipments; metodology; concepts
- Summary/Abstract:Transformations of the industrial processes and services from recent decades have involved major changes in the concepts of maintenance equipments management. Lean and Six Sigma methodologies developed in the recent period have distinguished themselves by getting an increased economic efficiency of the industrial processes under significant budgetary restrictions. Implementing Lean Six Sigma concept has allowed the identification of some effective and sustainable solutions to reduce the costs by involving the operators in the production process in the field of the repairs and maintenance.
USING MODERN CONCEPTS OF MAINTENANCE TO IMPROVE PERFORMANCE IN MILITARY MAINTENANCE STRUCTURES
USING MODERN CONCEPTS OF MAINTENANCE TO IMPROVE PERFORMANCE IN MILITARY MAINTENANCE STRUCTURES
(USING MODERN CONCEPTS OF MAINTENANCE TO IMPROVE PERFORMANCE IN MILITARY MAINTENANCE STRUCTURES)
- Author(s):Adrian Nour
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:235-242
- No. of Pages:8
- Keywords:maintenance; repairs; military equipments; availability
- Summary/Abstract:Advanced technical systems held by modern armies currently involve the implementation of adequate solutions for repair and maintenance. Improving the performance of the military maintenance structures under limited budget requires adaptation of some solutions developed by the civil service industry in the process of maintenance of the military equipment such as Lean Six Sigma methodology, reliability centred maintenance (RCM), Condition Based Maintenance (CBM), Life Cycle Costs (LCC), System Lifecycle Management (SLCM).
EARLY WARNING SYSTEM AS A PART OF MODERN INTELLIGENCE SYSTEMS
EARLY WARNING SYSTEM AS A PART OF MODERN INTELLIGENCE SYSTEMS
(EARLY WARNING SYSTEM AS A PART OF MODERN INTELLIGENCE SYSTEMS)
- Author(s):Ihor PELESHCHUK, Taras RUSHCHAK
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:243-248
- No. of Pages:6
- Keywords:early warning system; political system; intelligence system; security; conflict; threat
- Summary/Abstract:The first and main security level of every country, political system are intelligence service. The main role of that system is to predict, analysis and preventing all threats that can appear and have destructive influence on political system. Last events on Middle East and Eastern Europe showed that modern intelligence systems can’t give full and effective image of threats. And as a result, it is quite hard, to make prognoses for the future and adjust decisions making process. So as a result modern intelligence system should be transformed and include Early Warning System of conflict, which should work as a strong annalistic center. The main task of that system is to track social climate and detect potential situations that can transform in to conflict.
THE ROLE OF OSINT IN REINVENTING INTELLIGENCE
THE ROLE OF OSINT IN REINVENTING INTELLIGENCE
(THE ROLE OF OSINT IN REINVENTING INTELLIGENCE)
- Author(s):Cristian Bărbulescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:249-255
- No. of Pages:7
- Keywords:OSINT; public intelligence; intelligence analysis; knowledge; SOCMINT
- Summary/Abstract:In the twentieth century, the "secret" set itself up as the main working tool for the intelligence agencies. The "information" was considered a valuable resource because of the difficulties involved in getting it. Currently the "open source" component of the "information" has achieved a growing role in intelligence amid accelerated growth that we experienced in technology and communications. Today, some valuable information can be identified at distance by combining all the possibilities offered by the online communication environment. Tomorrow, however, it becomes increasingly difficult to achieve this outcome given that the online environment is transformed into a place of confrontation between adversaries open to mass distortion and associated to various forms of cyber aggression.The present study aims to highlight the trends generated by the OSINT "revolution" in the security field with emphasis mainly on the features that are identified within the intelligence cycle.
PERFORMANCE-BASED BUDGETING IN THE AREA OF STATE DEFENCE
PERFORMANCE-BASED BUDGETING IN THE AREA OF STATE DEFENCE
(PERFORMANCE-BASED BUDGETING IN THE AREA OF STATE DEFENCE)
- Author(s):Lech KOŚCIELECKI
- Language:English
- Subject(s):Politics / Political Sciences, Economy
- Page Range:256-263
- No. of Pages:8
- Keywords:economic security; economics of defence; military expenditure; defence spending; long-term financial planning
- Summary/Abstract:The transition of the socio-economic system, the processes of globalization and Poland’s integration with the EU structures have had a direct impact on the Polish society transformations and changes to the management of public organizations. The purpose of this paper is to present few key factors influencing an effective implementation of the New Public Management, mainly the procedures and tools used in the department in the Ministry of National Defence in Poland. In the article a development of works and Polish experience associated with long-term financial plan for the state and task-budget have been discussed.
PREREQUISITS FOR CAPABILITIES DEVELOPMENT AND SHARING
PREREQUISITS FOR CAPABILITIES DEVELOPMENT AND SHARING
(PREREQUISITS FOR CAPABILITIES DEVELOPMENT AND SHARING)
- Author(s):Josef Melichar
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:264-272
- No. of Pages:7
- Keywords:capabilities; development; process; scenarios; modularity; risk; assessment
- Summary/Abstract:The article discuses the necessary preconditions to be achieved in order to develop capabilities suitable for sharing. It brings recent outputs of current Defence university‘s research programs focused on capabilities development and tools to support it. It portrays possibilities of applying best practices in capabilities development into national environment and looks at the best ways how to combine processes and tools to produce capabilities reflecting the nature of current and future security environment. Proposed national approach to capabilities development, as one of the outputs of current research program STRATAL, briefly described in the article, offers incentives for discussions on the capabilities development topic.
ENHANCEMENT OF DEFENCE PLANNING PROCESS– CASE STUDY CZECH REPUBLIC
ENHANCEMENT OF DEFENCE PLANNING PROCESS– CASE STUDY CZECH REPUBLIC
(ENHANCEMENT OF DEFENCE PLANNING PROCESS– CASE STUDY CZECH REPUBLIC)
- Author(s):Josef Procházka
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:273-280
- No. of Pages:8
- Keywords:defence planning; defence planning process; defence planning enhancement; defence policy; best practice
- Summary/Abstract:The paper deals with the development of defence planning process in the Czech Republic while seeking and implementing best practice in this area during more than two decades of transformation towards modern defence management. Sound business processes within the defence sector of each country or international organisation are prerequisite for effective strategic management. Defence planning process belongs between the most critical business processes, which integrates planning effort in several planning domains such as – capability development, acquisition, resources, research and development, multinational cooperation, legislation, etc. In practice it means that defence planning requires continues adaptation to the ever evolving both internal and external environment of any given organisation to ensure it remains fit for purpose. Since 1989 the Czech Republic Defence Organisation has been in process of permanent transformation, reorganisation and institutional adaptation. One can observe several remarkable phases which provided impetus also for defence planning process further improvement. The main purpose of the conference paper is to assess these efforts in pattern of institutional change. Additionally, it offers critical lessons learned and contributes to the identification of best practice in the area of defence planning among NATO allies and partners.
LOGISTICS SUPPORT’S PARTICULARITIES OF MILITARY UNITS DURING PEACETIME
LOGISTICS SUPPORT’S PARTICULARITIES OF MILITARY UNITS DURING PEACETIME
(LOGISTICS SUPPORT’S PARTICULARITIES OF MILITARY UNITS DURING PEACETIME)
- Author(s):Costel-Dorel Mînea
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:281-285
- No. of Pages:5
- Keywords:logistics; logistic support; planning; distribution; consumption
- Summary/Abstract:The logistics support of military units during peace is based on a functional logistic system where the authorities of management and logistical execution are involved in producing an efficient logistics support by using an informatic logistic system which will streamline the supply of material goods by using modern means and techniques and covering all the functional areas of military logistics during peacetime. From the point of view of ensuring an efficient and logistic support, the role of the logistic system must bound with the ordering system and at the same time, must take in account the requests of the final beneficiary (the serviceman).The person in question must wait to obtain ammunition, food, water, medical support and fuel for the battle technique in question (for the aircrafts,warships and so on). The mentioned goods are required for maintaining the conditions for life, both in peacetime and especially in times of crisis and war.
THE OPERATIONAL DETERMINING FACTORS OF AIR DEFENCE
THE OPERATIONAL DETERMINING FACTORS OF AIR DEFENCE
(THE OPERATIONAL DETERMINING FACTORS OF AIR DEFENCE)
- Author(s):Zoltán Krajnic, János CSENGERI
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:286-294
- No. of Pages:9
- Keywords:future; operational environment; air defence; air threats; asymmetric threats
- Summary/Abstract:In this paper we present an overview on the operational environment of the air defence. Basing on the fundamentals of futurology we try to sum up the trends that air defence will have to face with. We consider the asymmetric spectrum of air threats and we present a wide picture about the offensive air assets as one of the main determinants of the future operational environment of air defence.
BEHAVIORAL ISSUES SPECIFIC FOR PEOPLE PRONE TO LEAKING OF CLASSIFIED INFORMATION
BEHAVIORAL ISSUES SPECIFIC FOR PEOPLE PRONE TO LEAKING OF CLASSIFIED INFORMATION
(BEHAVIORAL ISSUES SPECIFIC FOR PEOPLE PRONE TO LEAKING OF CLASSIFIED INFORMATION)
- Author(s):Laurenţiu-Leonard LĂZĂROIU
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:295-299
- No. of Pages:5
- Keywords:classified information; security; simulated behavior; compromising information
- Summary/Abstract:Starting from the idea that technological development of the last decade has allowed both, an easier way of sending of the information, much easier by IT systems and increase the level of socialization and training of new relationships that do not require direct contact between individuals, but only one virtual contact, for intelligence structures appear as a challenge to new social realities identifying specific threats in the area of terrorism and espionage. Thus human relationships established online or subsequently mediated by appealing to modern technology, whose purpose is criminal can sometimes be successfully identified and researched by studying human behavior. More specifically, interest developments behavioral analysis of state institutions employee who has access to classified information and who is prone to compromise them. Behavioral clues, conduct specific simulated suspicion will outline and contribute to its analysis in conjunction with other specific instruments which will ultimately confirm or rule out criminal matters.
THE ROLE OF ISTAR IN IMPROVING COMMANDER’S SITUATIONAL AWARENESS
THE ROLE OF ISTAR IN IMPROVING COMMANDER’S
SITUATIONAL AWARENESS
(THE ROLE OF ISTAR IN IMPROVING COMMANDER’S
SITUATIONAL AWARENESS)
- Author(s):Anca Belega, Bogdan-Alexandru Belega, Bogdan-Constantin HACH
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:300-308
- No. of Pages:9
- Keywords:ISTAR system; situational awareness; commander decisions; intelligence; surveillance; target acquisition; reconnaissance
- Summary/Abstract:ISTAR is a grouping of information collection, processing, dissemination and communication assets designed, structured, linked and disciplined to provide situational awareness (SA), support to targeting and support to commanders in decision making. Advanced technology and capabilities enable and create opportunities to create ISTAR system as a critical role in all military operations. The biggest challenge remains the ability to synchronize both effectiveness and capabilities of the Intelligence, Surveillance, Target Acquisition and Reconnaissance (ISTAR) systems for the intended mission. The task of information sharing and integration of ISTAR systems based on its architecture framework, interoperability policies as well as some form of evaluation tools help to determine, if not ensure the overall effectiveness of such integration efforts. The paper studying the impact of situation awareness on commander’s decisions.
CYBERSECURITY – A NEW DIMENSION OF NATIONAL SECURITY?
CYBERSECURITY – A NEW DIMENSION OF NATIONAL SECURITY?
(CYBERSECURITY – A NEW DIMENSION OF NATIONAL SECURITY?)
- Author(s):Meda UDROIU
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:309-315
- No. of Pages:7
- Keywords:Cybersecurity; cyber-attacks; national security; critical infrastructure; protection cyber infrastructure
- Summary/Abstract:In the last years, cybersecurity becomes a strategic concept which is included in national security strategies. Globalization and the Internet have given new incredible powers based on continuous development of network technologies for individuals, organizations and nations. For anyone - students, soldiers, spies, propagandists, hackers and terrorists - gathering information, communications, fundraising and public relations have been digitized and revolutionized. The increase dependence of critical infrastructure on IT&C components lets cyber-attacks become lethal to existing infrastructures; and many attacks are from both state and non-state actors. In the international context in which the resurgence of terrorism is closely linked to actions of Islamist extremist hostile groups in cyberspace, the cyber security issue, as a component of national security, becomes the theme and rationale for developing specific instruments of fundamental and highly applied research.
ASPECTS ON THE LEGAL FRAMEWORK IN THE CYBER DEFENCE FIELD
ASPECTS ON THE LEGAL FRAMEWORK IN THE CYBER DEFENCE FIELD
(ASPECTS ON THE LEGAL FRAMEWORK IN THE CYBER DEFENCE FIELD)
- Author(s):Eugen Valeriu Popa
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:316-322
- No. of Pages:7
- Keywords:public good; cyberspace; cyber defence; security; international cooperation
- Summary/Abstract:On the national and transnational level, legal aspects of cyber security are mainly presented in relation to the criminal law; its main aspects are emphasized by the fragmentation of basic and procedural national criminal law, as well by the efforts for their harmonizing. The diversity of national laws is one of main reasons for vulnerabilities generated by informatics criminality phenomenon worldwide, mainly because such diversity does not allow the development of an unique legislative response to the global phenomenon. The main goal of our scientific study is to emphasize some aspects on the legal framework in the cyber defence field.
CYBER DEFENCE IN THE NORTH-ATLANTIC TREATY ORGANISATION: STRUCTURES AND TRENDS
CYBER DEFENCE IN THE NORTH-ATLANTIC TREATY ORGANISATION: STRUCTURES AND TRENDS
(CYBER DEFENCE IN THE NORTH-ATLANTIC TREATY ORGANISATION: STRUCTURES AND TRENDS)
- Author(s):Eugen Valeriu Popa
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:323-330
- No. of Pages:8
- Keywords:North-Atlantic Treaty Organization; cyber defence; structures; trends; capabilities
- Summary/Abstract:Cyber security became a matter of interest and global importance once with the globalization of communications networks, infrastructures component of information technologies, as well as economic, political and military systems increasingly using cyber systems in the decisional-making processes. Cyberspace is the new field of war that lately joined the traditional arenas of battle, meaning land, maritime, air and space. In the framework of the North-Atlantic Treaty Organization (NATO) Summit in Wales (September 4, 2014), the Enhanced NATO Policy on Cyber Defence was adopted; it rises cyber defence to the level of strategic component of NATO concept of collective defence. Starting from these aspects, our scientific initiative has as goal to present structures and main trends on cyber defence within NATO.
ROMANIA’S DOMESTIC AND FOREIGN POLICY REGARDING CYBERWAR
ROMANIA’S DOMESTIC AND FOREIGN POLICY REGARDING CYBERWAR
(ROMANIA’S DOMESTIC AND FOREIGN POLICY REGARDING CYBERWAR)
- Author(s):Bogdan-Florin TIMIŞ
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:331-337
- No. of Pages:7
- Keywords:cyberwar; cybersecurity; cyberattack; defense; strategies; legislation
- Summary/Abstract:The rapid evolution of the Internet in particular, and the virtual environment – generally – in the recent years, has propelled the issue of ensuring an accesible and functional cyber environment both to the forefront of national security of states and international organizations. The task reachable for each country or organization is to protect their own online networks against cyber attacks, cyber espionage, cyber crime and other forms of aggression in cyberspace. For the democracies that guarantee fundamental rights and freedoms, the goal is to do this while guaranteeing a free internet and protection of private live. Although Romania does not have a highly developed cyber infrastructure, the strategies adopted in the recent years, the entities created and the inclusion of cybersecurity in the cathegory of basic measures to improve the safety of the citizens, our state sends a firm response to the challenges in the virtual environment.