INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment
INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment
Contributor(s): Florian CÎRCIUMARU (Editor), Cristian Băhnăreanu (Editor)
Subject(s): Politics / Political Sciences, Social Sciences, Essay|Book Review |Scientific Life
ISSN: 2285-8318
Published by: Carol I National Defence University Publishing House
Keywords: security; state and nonstate actors; armed force and society; strategy; military organization; cyber-security;
- Page Count: 416
- Publication Year: 2017
- Language: English
STATE AND NON-STATE ACTORS ENGAGED IN HYBRID WAR
STATE AND NON-STATE ACTORS ENGAGED IN HYBRID WAR
(STATE AND NON-STATE ACTORS ENGAGED IN HYBRID WAR)
- Author(s):Dorin Ioniță
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:7-13
- No. of Pages:7
- Keywords:global security; hybrid environment; diversity technologies; comprehensive engagement;
- Summary/Abstract:The hybrid war foresees complex inter-dependencies of a historical, political, social,cultural and economic nature, which also generates a total commitment of forces and means of themost diverse, sometimes spontaneously configured for actions and effects that converge. Thediversity of participants in the hybrid actions is also due to the evolution of social mediatechnologies, making them an omnipresent tool with a full impact on every aspect of everyday life.The balance between state and non-state actors is favorably inclined towards an irregular, noninstitutionalizedcomponent that develops non-transparently in geometric progression and becomesa successful alternative to current intra-state conflicts. The disguise of involvement in the hybridwar reduces the boundary between the state and non-state concepts and becomes a goal that hasled the powerful states with very well-trained and equipped armies to set up atypical forces withspecial character and missions.
REGIONAL AND GLOBAL SECURITY’ DYNAMICS, ESSENTIAL ELEMENT FOR GEOPOLITICAL RE POSITIONING OF MAIN INTERNATIONAL ACTORS
REGIONAL AND GLOBAL SECURITY’ DYNAMICS,
ESSENTIAL ELEMENT FOR GEOPOLITICAL RE POSITIONING
OF MAIN INTERNATIONAL ACTORS
(REGIONAL AND GLOBAL SECURITY’ DYNAMICS,
ESSENTIAL ELEMENT FOR GEOPOLITICAL RE POSITIONING8
OF MAIN INTERNATIONAL ACTORS)
- Author(s):Stelian Teodorescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:14-21
- No. of Pages:8
- Keywords:multi-polar system; dynamics of security; consensus; tate actors; non-state actors; strategic readjustment; geopolitical map;
- Summary/Abstract:It has become a certainty that the world is in the process of strengthening a multipolarsystem in which the United States will continue to be a key factor in the dynamics of regionaland global security. In this context, Russia has changed its strategy with regard NATO and, inparticular, with regard US, the actions of Russian leaders being marked by the vision of"confrontation" as a priority in the decision-making process and the planning, organization andimplementation of foreign, defense and security policy.The development of regional power poles and the strengthening of different perceptions ofsecurity risks continue to generate heated polemics on the principles and mode of action to ensure apeaceful global security climate at the regional and global levels, reinforcing the perception of theimperative need for permanent strategic readjustment and thus a new geopolitical map of theworld.Keywords:
BALANCE OF POWER AFTER UKRAINE CRISIS
BALANCE OF POWER AFTER UKRAINE CRISIS
(BALANCE OF POWER AFTER UKRAINE CRISIS)
- Author(s):Levan Gegeshidze
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:22-31
- No. of Pages:10
- Keywords:balance of power, balance of threat; national security; bandwagon; Introduction
- Summary/Abstract:Based on the balance of power and balance of threats theories, the presentresearch studies the security policies of a set of European Union Member States: Poland, Balticcountries and Germany. What influence has the occupation of Crimea and hybrid war in EasternUkraine had on the foreign and security policies of those countries? The research is aimed atrevealing that the sense of threat forces countries to concentrate on their defense capabilities; onthe one hand, to strengthen their military capacities and, on the other hand, to tighten allianceswith other countries. States have such alternative, choose to balance the source of threat and not tobandwagon bigger countries. The given theory has been verified on the example of Baltic countriesand Poland.Based on the offensive realism assumptions, the research also analyses national securitypolicy and military modernization of the Russian Federation. Unlike postmodern Europe, Russianpolitical elite thinks and acts according to realism categories. NATO and EU extension towards itsborders is perceived as the threat to national interests. It is ready to use military force fordefending its interests.At the end of the research, we discuss the changes underway in internal and foreign policyof Germany since the start of the Ukrainian crisis. Despite economic interdependence, Germanyhas supported imposing of sanctions on Russia. Threats coming from Russia has forced Berlin togive up economic benefits.
RUSSIAN FEDERATION’S PROVOCATIVE BEHAVIOR IN THE AIR SPACE OF THE BLACK SEA REGION BETWEEN 2014-2017
RUSSIAN FEDERATION’S PROVOCATIVE BEHAVIOR
IN THE AIR SPACE OF THE BLACK SEA REGION
BETWEEN 2014-2017
(RUSSIAN FEDERATION’S PROVOCATIVE BEHAVIOR
IN THE AIR SPACE OF THE BLACK SEA REGION
BETWEEN 2014-2017)
- Author(s):Cătălin Alin Costea
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:32-44
- No. of Pages:13
- Keywords:Black Sea; NATO; Russian Federation; dilemma security; provocative behavior;
- Summary/Abstract:After the illegal annexation of Crimea, in March 2014, the Russian Federation started to develop a provocative behavior in the Black Sea region against the riparian states,especially towards NATO member states. Between March 2014 and September 2017, Russian Air Force attempted to enter illegally, and in some cases it succeeded, in Romanian, Bulgarian, Turkish,Georgian and Ukrainian air space. Also it limited the freedom of navigation and flight of NATO's ships and aircraft, in the Black Sea international space. Thus, this article aims to identify the main reasons which stands behind Moscow’s behavior and the impact on the region. The working hypothesis of the article is about the emerging of a security dilemma in the Black Sea region fact that creates tensions, an unsafe climate and is favoring the perpetuation of regional instability.
CAUCASIAN FROZEN CONFLICTS AND THEIR IMPACT ON NATO AND EU’S EASTERN FLANK
CAUCASIAN FROZEN CONFLICTS AND THEIR IMPACT
ON NATO AND EU’S EASTERN FLANK
(CAUCASIAN FROZEN CONFLICTS AND THEIR IMPACT
ON NATO AND EU’S EASTERN FLANK)
- Author(s):Silviu Marius Suditu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:45-51
- No. of Pages:7
- Keywords:frozen conflicts; separatist republics; security; cooperation; NATO; Russia
- Summary/Abstract:The Caucasian region is not only a bridge between Europe and Asia, but also abattlefield between the two of them. Therefore, it is not surprising that the area has been, andcontinues to be, full of conflicts. After leaving the USSR, several nationalist voices have emergedamong the former communist states, some of them striking even in the territorial integrity of thenew states. After the Kosovo War, the Russian Federation had an ace up its sleeve at thenegotiating table regarding the secessionist republics status in the Caucasus, putting an end to aperiod of international relations characterized by collaboration. Russia's aggressive intervention in2008, in the war between Georgia and the two secessionist republics on its territory, started a newreality towards the security on the NATO’s eastern flank. After the loss of Romania and Bulgaria infavor of the Western structures, Russia strengthened its power using force. So it used frozen conflicts on the former territory of the USSR, whenever the states in its geographical proximity made one more step to Europe. The Ukrainian war was the most complex issue for both NATO and the European Union to deal with, after the Cold War. Frequent conflicts and Russia's attitude in recent years, pose a real threat to regional stability in the east. That is why Western organizations,together with local actors, must address the new situation in the East, with tact and responsibility,especially under the new circumstances of unpredictability that have characterized the Caspian region over time.
ENHANCING EUROPEAN DEFENCE – EU’S WAY OF TACKLING MAJOR VULNERABILITIES?
ENHANCING EUROPEAN DEFENCE –
EU’S WAY OF TACKLING MAJOR VULNERABILITIES?
(ENHANCING EUROPEAN DEFENCE –
EU’S WAY OF TACKLING MAJOR VULNERABILITIES?)
- Author(s):Cristina Bogzeanu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:52-60
- No. of Pages:9
- Keywords:CSDP; crisis; anti-EU populism; hybrid warfare;
- Summary/Abstract:In the context of the successive overlapping crises and deepening vulnerabilities,one of the top priorities set at EU’s level is enhancing its security and defence dimension, namely CSDP. The effervescence of documents and measures undertaken in the last two years stand as aproof of the engagement of Brussels in this direction. The analysis of the present paper departs from the premise that EU experienced a similar tendency every time it faced a serious crisis with a strong impact on its security, and that most of the initiatives launched in those contexts were prone to vanishing when the crises deescalated and the consequences mitigated.This research paper approaches major vulnerabilities, which could threaten the success of the current EU initiatives in security and defence matters and, the main focus is on the political dimension. The reason for this is that, in the absence of the political will, there is no possible progress in CSDP, an inter-governmental area where states have always been reluctant in giving up sovereignty. Therefore, after a brief presentation of the progresses registered in CSDP area, the analysis turns towards the main political challenges, as well as to the external actions deepening those challenges and making it even more difficult for these initiatives to be successful.
TRANSPARENCY DEFICIT WITHIN NATO-RUSSIA RELATION – A CRITICAL COMPONENT OF THE SECURITY DILEMMA
TRANSPARENCY DEFICIT WITHIN NATO-RUSSIA RELATION –
A CRITICAL COMPONENT OF THE SECURITY DILEMMA
(TRANSPARENCY DEFICIT WITHIN NATO-RUSSIA RELATION –
A CRITICAL COMPONENT OF THE SECURITY DILEMMA)
- Author(s):Cătălina Todor
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:61-69
- No. of Pages:9
- Keywords:transparency; trust and mistrust; security dilemma; NATO-Russia Council; ZAPAD exercises;
- Summary/Abstract:In the context of a current challenged regional security environment, in which a central element is the tension amplification in NATO-Russia relation on the pattern of security dilemma, a key element is the transparency issue. The present article aims to approach the crucial role of transparency in the security dilemma both form theoretical and applied perspectives. In order to fulfill this goal, the research will use the literature analysis and the analysis of international events relevant for transparency in NATO-Russia relation. The research will address the following questions: what is the relation between transparency and the theoretical pattern of security dilemma? Is transparency a priority in NATO-Russia relation? What is the current situation regarding the level of transparency in NATO – Russia relation?
BALANCE OF POWER, A NEW VISION OF THE 21st CENTURY
BALANCE OF POWER, A NEW VISION OF THE 21st CENTURY
(BALANCE OF POWER, A NEW VISION OF THE 21st CENTURY)
- Author(s):Auraș Liviu COMAN
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:70-80
- No. of Pages:11
- Keywords:anarchy; international relations; the power of balance; belt of ruins;
- Summary/Abstract:The theoreticians in international relations have a remarkable ambiguity not only in the meaning of the balance of power but also in the expected results of operating a successful balance of power system. What is the final promise of the balance of power theory? The aim or purpose of the balance of power is not the maintenance of international peace and stability, as many critics of the theory have inaccurately affirmed. It is rather to preserve the integrity of the multi-state system, preventing any ambitious state from absorbing its neighbors. I believe that states should not trust the exaggerated power that threatens all members of the international system. The danger is when a great power manages to gain more than half of the system's total resources and thus to be in a position to subdue the rest.
THE NEW SILK ROAD: ONE BELT, ONE ROAD – A STRATEGIC POWER ASSET FOR CHINA
THE NEW SILK ROAD: ONE BELT, ONE ROAD – A STRATEGIC POWER ASSET FOR CHINA
(THE NEW SILK ROAD: ONE BELT, ONE ROAD – A STRATEGIC POWER ASSET FOR CHINA)
- Author(s):Silviu Neguţ, Marius-Cristian Neacşu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:81-88
- No. of Pages:8
- Keywords:The Silk Road; The New Silk Road; great power; global power; Eurasia; Eurasianism;
- Summary/Abstract:China, the country considered, to be the engine for the global economic growth for some time, has, seemingly surprising, initiated the project of “The New Silk Road”, which is nothing more but a small part of a well-developed plan aiming to assert the main Asian pivot as a global power. Compared to “The Old Silk Road”, which owned only a land-based path, „The New Silk Road” follows two different paths (One Belt – the road onshore, One Road – the oceangoing route), whose undeclared purpose is to commercially surround the Eurasian super continent, giving Eurasia's context being the main geopolitical and Geo strategic stake of our time. While Russia mainly focuses on the theoretical concept of the Eurasian-ism, we notice China in action, operating.The initiative surprises, not only through its geographical dimensions amplitude (tens of thousands kilometers land and sea), but also, through its financial dimension (rolling unbelievable amounts of money). A relevant argument would be the foundation of the Asian Infrastructure Investment Bank,the only bank in the world whose nomenclature includes the “infrastructure” notion, such an important and circulated element nowadays
THE TERRITORIAL CONFLICT OVER THE NORTHERN TERRITORIES/ KURIL ISLANDS AND SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY
THE TERRITORIAL CONFLICT OVER THE NORTHERN TERRITORIES/ KURIL ISLANDS AND SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY
(THE TERRITORIAL CONFLICT OVER THE NORTHERN TERRITORIES/ KURIL ISLANDS AND SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY)
- Author(s):Armine Poghosyan
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:89-96
- No. of Pages:8
- Keywords:Asia Pacific Region; Russia, Japan; the United States; People Republic of China; security system; Northern Territories/Kuril islands;
- Summary/Abstract:The paper aims to examine the Geo strategic situation in the Asia Pacific Region,the relations between the key-actors and what are the perspectives for the progression of the Russian-Japanese relations in the existing circumstances.For more than 70 years, relations between Russia and Japan have been modeled on the territorial conflict over the Northern Territories (called so by Japan) / Kuril Islands (called so by Russia) and no Peace agreement has been concluded yet. The most serious obstacle on that way has been the Japan-U.S. Security Treaty.For the Russian side, in the center of the cooperation lies the economic factor, while for the Japanese – the territorial settlement.What comes to the security issues, we encounter with more complicated situation. Here we have comparatively neutral geopolitical zone where meet the interests of the global powers such as the US, the Russian Federation, plus the regional actors
IRANIAN GRAND STRATEGY IN THE GREATER MIDDLE EAST, THE IRGC AND GENERAL QASSEM SOLEIMANI
IRANIAN GRAND STRATEGY IN THE GREATER MIDDLE EAST,
THE IRGC AND GENERAL QASSEM SOLEIMANI
(IRANIAN GRAND STRATEGY IN THE GREATER MIDDLE EAST,
THE IRGC AND GENERAL QASSEM SOLEIMANI)
- Author(s):Florin Diaconu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:97-105
- No. of Pages:9
- Keywords:Iran; grand strategic agenda; imperial tradition; Greater Middle East; Qassem Soleimani; IRGC; sphere of influence; foreign intervention;
- Summary/Abstract:Along the past few decades, starting from 1979, the Shiite Iran was continuously involved in a massive effort aimed at expanding its sphere of influence in the Greater Middle East.Such a grand strategic design is clearly combining two potent roots: a very strong imperial tradition, and the desire of the regime in Tehran to export the political change which started in Iranin 1979, and also the Shiite system of values, to larger and larger regions, even beyond the limits of the Middle East. In this effort, the Iranian Revolutionary Guards Corps (IRGC), and mainly its elites Force are continuously playing a major role. The text is exploring the IRCG’s role on the international arena, mainly by means of analyzing open sources directly dealing with significant aspect and moments of the professional career of the Quds Force commanding officer, General Qassem Soleimani.
QATAR CRISIS IN THE RECENT SECURITY CONTEXT OF THE MIDDLE EAST
QATAR CRISIS IN THE RECENT SECURITY CONTEXT OF THE MIDDLE EAST
(QATAR CRISIS IN THE RECENT SECURITY CONTEXT OF THE MIDDLE EAST)
- Author(s):Mirela Atanasiu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:106-114
- No. of Pages:9
- Keywords:crisis; Middle East; geopolitics; GCC; security; interests;
- Summary/Abstract:The Qatar crisis started in an already challenging period for the Middle East region. Thus, against the backdrop of yet-effervescent Islamist terrorism in Syria and Iraq, the evolution of Iran’s nuclear program, dictatorial regimes that are detrimental to human rights and to the interest of their own citizens, the involvement of great powers in the region in the struggle for resources and in the context of regional “pacification” , the Kurdish conflict, the ongoing crisis of the refugees, the prospect of a two-state solution to the Arab-Israeli conflict, the Qatar crisis is part of the inter-state crises triggered by the hegemonic tendencies of some states in the context of the general shift of the regional balance of power.In the following, we will present the regional context of the crisis, the chronological actions undertaken by the actors involved in the crisis and some factors and trends determining the future evolution of the Qatar crisis.
THE EFFECTS OF THE GERMAN ENERGIEWENDE PROGRAM ON THE CENTRAL EUROPEAN COUNTRIES
THE EFFECTS OF THE GERMAN ENERGIEWENDE PROGRAM
ON THE CENTRAL EUROPEAN COUNTRIES
(THE EFFECTS OF THE GERMAN ENERGIEWENDE PROGRAM
ON THE CENTRAL EUROPEAN COUNTRIES)
- Author(s):Maria Ruxandra Ursa
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:115-123
- No. of Pages:9
- Keywords:Energiewende program; Central European countries; energy security; geopolitics; renewables;
- Summary/Abstract:The aim of this article is to build a geographical analysis of political relations and possibilities related to Central European energy security, due to the German Energy Transition program. Competition for energy is constant: the availability of secure energy sources is essential for the proper functioning of the state economy. That is why energy consumption is expected to increase, because is driven by the economic growth of the emerging economies. This article analyses strategic areas of Central European countries, which are in the proximity of Germany.The energy supply, which are important for the geopolitics of Europe, are here. The study proposes some synthetic geographical and qualitative representations through the scenarios of the European energy geopolitics.
HOW COMPREHENSIVE CAN SECURITY BE? A THEORETICAL APPROACH
HOW COMPREHENSIVE CAN SECURITY BE? A THEORETICAL APPROACH
(HOW COMPREHENSIVE CAN SECURITY BE? A THEORETICAL APPROACH)
- Author(s):Alexandra SARCINSCHI
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:124-133
- No. of Pages:10
- Keywords:comprehensive security; comprehensive approach; security perception; security social representation;
- Summary/Abstract:The purpose of this paper is to answer the question of "How comprehensive can security be?" as the last decade has been marked by the abundant use of this concept with or without practical coverage. For this, I will review some of the most representative theories and strategies on the comprehensive security concept, from the national level to the one of the main international organizations in European and Euro-Atlantic area, highlighting both strengths and weaknesses of each approach. Also, I will make some recommendations on broadening not the security agenda, as it was done before, but the framework for analyzing security, as“comprehensive” being more than “broad” and having the connotation of “understanding the nature of security”.
THEORETICAL FILTER RELEVANCE IN ASSESSING THE INTERNATIONAL SECURITY ENVIRONMENT
THEORETICAL FILTER RELEVANCE IN ASSESSING THE INTERNATIONAL SECURITY ENVIRONMENT
(THEORETICAL FILTER RELEVANCE IN ASSESSING THE INTERNATIONAL SECURITY ENVIRONMENT)
- Author(s):Ioana LEUCEA
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:134-141
- No. of Pages:8
- Keywords:international system; theoretical filter; theorization; interpretative grid;
- Summary/Abstract:The article intends to uphold the idea that the assessment of the international security environment represents a very difficult and complicated task similar to the academic endeavor to conceptualize the international/global system, theoretical instruments being necessary to be developed in approaching the subject. Theoreticians of the world systems apprehend that,just like the systemic perspective is created by the analyst, the same way the assessment of the international security environment depends on an implicit or explicit assumed theoretical filter by the analyst or the security community.Just as theoreticians of the international systems notice that the systemic perspective is firstly and inevitably a theoretical artifact, the article aims to point out a series of conceptualizations of the international systems that can be used as theoretical grids in the assessment of the international security environment
THE NEXUS BETWEEN (GOOD) GOVERNANCE AND NATIONAL SECURITY
THE NEXUS BETWEEN (GOOD) GOVERNANCE AND NATIONAL SECURITY
(THE NEXUS BETWEEN (GOOD) GOVERNANCE AND NATIONAL SECURITY)
- Author(s):Ligia Ioana Niculae, Stefan Teodoru
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:142-150
- No. of Pages:9
- Keywords:governance; good governance; bad governance; national security; democratic governance;
- Summary/Abstract:The consequences of inefficient governance provided numerous negative examples overtime, highlighting that governance has a major influence on international public policy. The concept of good governance is long-standing and has begun being intensively used especially since the 1990 s. This paper brings to the forefront the nexus between good governance and national security. Knowing that this is vital to preventing crises, conflicts and maintaining a climate of peace by developing the socioeconomic conditions of the state, the purpose of this paper is to answer questions such as "What are the main characteristics influencing governance?" and "How do these characteristics influences the security of a state?"
HYBRID WARFARE – AN ANALYSIS BASED ON THE GENERAL THEORY OF WARFARE
HYBRID WARFARE – AN ANALYSIS BASED ON THE GENERAL THEORY OF WARFARE
(HYBRID WARFARE – AN ANALYSIS BASED ON THE GENERAL THEORY OF WARFARE)
- Author(s):Cristian Bărbulescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:151-161
- No. of Pages:11
- Keywords:hybrid warfare, hybrid threat; hybridity; state actor; non-state actor;
- Summary/Abstract:The way the conflict in Ukraine evolved and the consequences it generated at the regional and global level reopened the debates in the academic circles on the changes of the postmodern war physiognomy.This paper highlights the complementarity of various military literature contributions to the development of a theory of hybrid warfare and provides a useful framework for the elimination of confusion and fuzziness that persists in literature on “hybrid warfare” concept by dissociating the meanings assigned to different associated concepts (hybrid actions and hybrid threats). In essence,the comparative analysis conducted explains, from a perspective of the general theory of war, why hybrid war does not represent a new type of war, claiming the omnipresent character of hybridity in the evolutionary stages of this phenomenon
SNATCHING THE VICTORY: ISAF MISSION, 2001-2014
SNATCHING THE VICTORY: ISAF MISSION, 2001-2014
(SNATCHING THE VICTORY: ISAF MISSION, 2001-2014)
- Author(s):Giorgi Lekveishvili
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:162-170
- No. of Pages:9
- Keywords:ISAF mission; counterinsurgency; insurgency; terrorism; war on terror; Afghanistan; political elite; regime change;
- Summary/Abstract:Contemporary international security architecture depends on the ability of the western democratic countries to maintain stability. Failed and fragile states could become the sources of instability in many regions. In this regard, the power projection capabilities of the United States as the strongest democracy are essential to maintain peace and security in the world.Hence, it is important to study and analyze military campaigns which they have conducted in the recent years. The goal of the research is to explain the reasons which are hindering the achievement of a political success during military campaigns, particularly in the countries like Afghanistan. NATO-led military campaign in Afghanistan had very modest accomplishments. The puzzle is, why the US and Its Allies were unable to succeed in achieving stability in Afghanistan and why did the military campaign result in a long-lasting war. In this work, we will conduct an analysis of the ISAF mission (2001-2014) and will try to explain the reasons behind this conundrum.
MIGRATION AND THE (IN)SECURITY OF CONTEMPORARY SOCIETY
MIGRATION AND THE (IN)SECURITY OF CONTEMPORARY SOCIETY
(MIGRATION AND THE (IN)SECURITY OF CONTEMPORARY SOCIETY)
- Author(s):Magadalena Crisan
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:171-178
- No. of Pages:8
- Keywords:migration; security; benefits; risk; securitization;
- Summary/Abstract:European and neighboring countries in Europe have been experiencing an intensification of the migration phenomenon in recent years. One of the causes that has led to new migration flows are the crises and conflicts that followed the Arab Spring. Maintaining the security of societies depends on the way states and governments handle the issue of migration. The states response depends on the way migration is perceived either as a burden making states fragile, even destabilizing them, or as a long-term advantage. The states response also comes as a result of securitizing or desecuritizing migration.
ILLEGAL MIGRATION, THE GORDIAN NODE OF THE ACTUAL GEOPOLITICAL CONTEXT
ILLEGAL MIGRATION, THE GORDIAN NODE OF THE ACTUAL GEOPOLITICAL CONTEXT
(ILLEGAL MIGRATION, THE GORDIAN NODE OF THE ACTUAL GEOPOLITICAL CONTEXT)
- Author(s):Emanuel Sebastian Georgescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:179-186
- No. of Pages:8
- Keywords:illegal migration; the globalization phenomenon; Gordian node; conversion to democracy; Middle East; Africa.
- Summary/Abstract:Illegal migration has achieved paroxysmal odds in 2015, and even if the amplitude of the phenomenon has decreased it continues to incite, an already largely divided European community, at ample and heated discussions. This “Gordian node”, a real challenge forth European Union, is a direct result of the explosive mix between: the attempts of “converting to democracy”, globalization phenomenon and the increasing poverty at alarming levels in the deliberately destabilized regions of Middle East and Africa. The interests of the great powers, in order to protect Western multinationals or the race after hydrocarbon, have made vast and prosperous regions to ruin, becoming again pre-modern enclaves characterized by confusion,chaos and despair. Notions as Europe or USA are no longer causing former reverberations in the Arab world and have lost most of its advantages except some corrupt, unfair and abusive “export democracies”. These produced imbalances require a redefinition of the concept of sovereignty, and in order to stabilize the situation, the need for concessions and balance is acutely felt.
A CHANGE OF PARADIGM IN TERRORIST PRACTICES IN CONTEMPORARY ATTACKS
A CHANGE OF PARADIGM IN TERRORIST PRACTICES IN CONTEMPORARY ATTACKS
(A CHANGE OF PARADIGM IN TERRORIST PRACTICES IN CONTEMPORARY ATTACKS)
- Author(s):Oana Elena Brânda
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:187-193
- No. of Pages:7
- Keywords:terrorism; vehicular terrorism; paradigm; changes; training;
- Summary/Abstract:It is an acknowledged fact that the 9/11 attacks represented a change in the means and tactics used by terrorists in order to achieve their goals. Since then, attacks have been massive in impact and the number of victims, with perpetrators choosing to detonate themselves in crowded areas, hitting symbolic buildings and thus shattering the feelings of comfort and safety that many enjoyed. Moreover, while these attacks were massive in impression, they were also rare in occurrence. Nowadays, a new pattern has emerged, combining not so massive attacks, with more frequent ones. Additionally, the modus operandi has suffered alterations: detonations in crowded areas, but not crowded enough to provoke thousands of casualties (such as subways, buses),simultaneous detonations in multiple areas (see the Paris bombing of 2015), assassinations(Charlie Hebdo) and the latest pattern: driving vans into crowds/crowded areas.
LOW COST TERRORISM OF THE 21ST CENTURY
LOW COST TERRORISM OF THE 21ST CENTURY
(LOW COST TERRORISM OF THE 21ST CENTURY)
- Author(s):Luminita Ludmila Anica ( Cirnici)
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:194-202
- No. of Pages:9
- Keywords:terrorism; terrorist attack; low-cost terrorism; European terrorism; new terrorism; knife attack;
- Summary/Abstract:Always voluntarily, subjectively and extremely brutal, terrorism manifests itself in a multitude of forms, being the most acute form of violence after interstate conflicts and civil wars that accompanies mankind throughout history.Nowadays, there are more and more attacks that involve lower costs, the attackers choosing to cause as many victims as possible by driving into the crowd or choosing to use a knife in their bloody actions.Is the knife attack a new form of terrorism? Of course not. History has recorded a series of such acts of violent nature over the centuries, in order create fear and influence mankind, even if at the time they were not called terrorist acts.Today we are confronted with similar attacks, in which terrorists accept the idea of personal sacrifice, acting for the killing of those considered exponents of their hostile society.
INTELLIGENCE FROM OPEN SOURCES. CASE STUDY: ‘DABIQ’ MAGAZINE
INTELLIGENCE FROM OPEN SOURCES. CASE STUDY: ‘DABIQ’ MAGAZINE
(INTELLIGENCE FROM OPEN SOURCES. CASE STUDY: ‘DABIQ’ MAGAZINE)
- Author(s):Raluca Codruţa Luţai
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:203-209
- No. of Pages:7
- Keywords:Open source intelligence; ISIS; Dabiq; terrorism; mass-media;
- Summary/Abstract:Open Source Intelligence is by far one of the most useful forms of intelligence used by intelligence services in their fight against terrorism and media publications are the one of the main tools used in this activity. Terrorist organizations have learned to use mass media to spread fear among a target group to attract and mobilize supporters, or to undermine the ability of governments to secure the security of their citizens.Starting from this reasoning, large terrorist groups have over time managed the publishing aspect of their organizations. This is how Inspire, the magazine of the Al Qaeda, Azan magazine and the newest member of this list, the Dabiq magazine – ISISs publication were born.This paper aims to analyze the role that Dabiq terrorist publication has in the fight against the terrorist phenomenon. Based on the analysis of the images, the sections of the magazine, the authors, and the tune they use, we can determine the role of Open Source Intelligence in preventing and fighting against terrorism.
CAPITALIZING ON ROMANIA'S GEOGRAPHIC POSITION IN RELATION TO CURRENT POLITICAL AND MILITARY INTERESTS
CAPITALIZING ON ROMANIA'S GEOGRAPHIC POSITION IN RELATION TO CURRENT POLITICAL AND MILITARY INTERESTS
(CAPITALIZING ON ROMANIA'S GEOGRAPHIC POSITION IN RELATION TO CURRENT POLITICAL AND MILITARY INTERESTS)
- Author(s):Valentin - Claudiu Jorăscu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:210-216
- No. of Pages:7
- Keywords:security; strategy, geographic position; geopolitics; location; interests;
- Summary/Abstract:The particularities of Romania's geographic position and the geopolitical context provide both advantages and disadvantages. The advantages will be materialized in a fundamental sense only by wise human action, by strengthening the force elements under certain circumstances,while eliminating the critical inconvenience of being desired, as well as maintaining the traditional values. Political and military interests are subordinated to global national interests and lead to a common goal - a strong and credible state able to ensure the security of its citizens wherever they are.
ROMANIA’S VULNERABILITIES IN CASE OF POSSIBLE HYBRID AGGRESSION
ROMANIA’S VULNERABILITIES IN CASE OF POSSIBLE HYBRID AGGRESSION
(ROMANIA’S VULNERABILITIES IN CASE OF POSSIBLE HYBRID AGGRESSION)
- Author(s):Viorica Ionela Trîncu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:217-224
- No. of Pages:8
- Keywords:hybrid war; unconventional war; terrorism; cyber-attacks; turbulence; violent protests; propaganda war; manipulation;
- Summary/Abstract:Hybrid warfare is a form of undeclared and unconventional interstate confrontation, having an open or covered approach, carried out in a smart and effective manner on multiple plans, such as: political, military, diplomatic, economic and also in the field of: energy,finance, propaganda, media, cyber, subversive, as its aim is to attain the political objectives without the widespread use of violence and armed forces. 1 Hybrid warfare links the currently existing security concerns of the EU and NATO, which is why it should be a priority of strategic thinking in Romania, the more so as it is made visible at the eastern border of our country. By strengthening the culture of security nationwide it would be possible to reinforce the defense capability of the country in the context of the new types of vulnerabilities.
SECURITY TRANSFORMATION IN LIGHT OF THE TECHNOLOGICAL SINGULARITY HYPOTHESIS
SECURITY TRANSFORMATION IN LIGHT OF THE TECHNOLOGICAL SINGULARITY HYPOTHESIS
(SECURITY TRANSFORMATION IN LIGHT OF THE TECHNOLOGICAL SINGULARITY HYPOTHESIS)
- Author(s):Andrei Sturzu, Radu-Mihai Dincă
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:225-234
- No. of Pages:10
- Keywords:technological singularity; security, exponential evolution; logistic evolution;
- Summary/Abstract:This paper addresses the issue of security and the international security environment through the hypothesis of technological singularity. Technological development and its consequences on the future of humanity are topics that have been deeply debated over the last few years in the Western academic world. The advocates of the technological singularity hypothesis, forth most part, believe that the accelerated pace of technological development, especially in the field of artificial intelligence (AI), will lead to a period of such profound changes of society beyond which it is almost impossible to foresee what the future of humanity will look like.Analyzing a number of issues regarding the technological singularity hypothesis, I have tried to highlight the consequences of accelerated technological development on current security paradigms, as well as the military challenges that come with technological advancement.
DESIGNING AND DEVELOPING MILITARY SCENARIOS WITH THE USE OF COMPUTER APPLICATIONS
DESIGNING AND DEVELOPING MILITARY SCENARIOS WITH THE USE OF COMPUTER APPLICATIONS
(DESIGNING AND DEVELOPING MILITARY SCENARIOS WITH THE USE OF COMPUTER APPLICATIONS)
- Author(s):Dan Lucian PETRESCU
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:235-241
- No. of Pages:7
- Keywords:Micmac; Mactor; Multipol; Delphy; military scenario; prospective;
- Summary/Abstract:Creating scenario is the art of creating futures rationally. It involves imagination,it requires expertise, it demands effort and dedication and, above all, it makes use of a lot of information. When it comes with the military scenarios, the situation evolves to the next level because it addresses “a matter of vital importance to the state; a matter of life and death, the road either to survival or ruin. Hence, it is imperative that it be studied thoroughly”1. In modern days,computers serve as very important and powerful tools but their use lays on human intelligence and his ability to program them in order to achieve the success. In this article I will present some of the best solution for using computer to analyse the operational situation and generate informational products meant to create scenarios, as outstanding tools in planning the future actions
THE CZECH REPUBLIC DEFENCE STRATEGIES: A COMPARATIVE ANALYSIS AND QUALITATIVE ASSESSMENT
THE CZECH REPUBLIC DEFENCE STRATEGIES: A COMPARATIVE ANALYSIS AND QUALITATIVE ASSESSMENT
(THE CZECH REPUBLIC DEFENCE STRATEGIES: A COMPARATIVE ANALYSIS AND QUALITATIVE ASSESSMENT)
- Author(s):Josef Procházka, Ivana Chalupová
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:242-252
- No. of Pages:11
- Keywords:vision;strategy, defence policy; defence policy adaptation; security environment; armed forces; plans;
- Summary/Abstract:For almost three decades the Czech Republic (CZR) has been facing various challenges in defence stemming both from evolving strategic environment and national context.Objective of this contribution is to assess quality of key strategic level defence policy documents. In theory, strategy is one of the main strategic management instruments for addressing challenges by defining defence policy objectives (ends), outlining framework (ways) for defence provision (main principles and initiatives) and resources (means) available for their successful implementation. This paper is based on comparative analysis of selected strategic level documents in area of defence adopted by the government of the CZR since 1997. Critical findings:(1) the CZR Government adopted strategies frequently; (2) main impetus for that effort provided NATO integration, slushing resources and gradual deterioration of security environment; (3) the Strategies might be characterised rather as reactive, short-term looking concepts communicating general statements and principles, outlining mainly strategic level objectives and initiatives, not providing sufficient and stable resourcing (with exception of 2017 Strategy), not delegating responsibilities and not setting biding implementation framework. Improvement of the CZR strategies requires more political commitments to turn them in real strategic management tools and enhanced expertise of all stakeholders involved in their elaboration.
MILITARY OBJECTIVES IN ARMED CONFLICTS
MILITARY OBJECTIVES IN ARMED CONFLICTS
(MILITARY OBJECTIVES IN ARMED CONFLICTS)
- Author(s):Bogdan-Alexandru Constantin
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:253-262
- No. of Pages:10
- Keywords:military objectives; civilian objectives; war stratagems; acts of perfidy; legal targets;
- Summary/Abstract:Within the framework of this paper I will try to offer a definition of the military objectives, by showing a classification of them. I will present the military objectives encountered in International Humanitarian Law, presenting the objectives specific to land, naval and air operations. In the last part of this article I will address a subject that is causing some dissension at the theoretical and doctrinaire level, namely disguising military targets in civilian objects, focusing on differentiation of military rues of war and acts of perfidy.
MODERN CONFLICTS AND SPECIAL OPERATIONS FORCES’ EFFICIENCY IN THE NEW OPERATIONAL ENVIRONMENT
MODERN CONFLICTS AND SPECIAL OPERATIONS FORCES’ EFFICIENCY IN THE NEW OPERATIONAL ENVIRONMENT
(MODERN CONFLICTS AND SPECIAL OPERATIONS FORCES’ EFFICIENCY IN THE NEW OPERATIONAL ENVIRONMENT)
- Author(s):Daniel ROMAN, Constantin Nicolaescu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:263-270
- No. of Pages:10
- Keywords:unconventional war; special forces; counterinsurgency; security; host nation; relevant population;
- Summary/Abstract:Through a careful analysis, after defining the new operational environment as close to reality as possible, we have identified the necessity of employing strongly adaptive forces due to its permanently changing nature. Subsequently, we have made a comparison from this point of view between the conventional forces and the special operations forces, taking into account the new trends in the evolution of the global conflicts.At the end of this scientific communication, we have put forward arguments to support the idea that special operations forces are identified as necessary and effective in a regional context which is characterized by an increasing instability that tends to become normality. Special operations forces are not only efficient, they are highlighted as effective and the only ones which,with the appropriate support, are able to achieve the established strategic goal.
THE NEED TO ADAPT THE SPECIAL OPERATIONS FORCES STRUCTURE IN RESPONSE TO PRESENT AND POTENTIAL CHALLENGES
THE NEED TO ADAPT THE SPECIAL OPERATIONS FORCES STRUCTURE IN RESPONSE TO PRESENT AND POTENTIAL CHALLENGES
(THE NEED TO ADAPT THE SPECIAL OPERATIONS FORCES STRUCTURE IN RESPONSE TO PRESENT AND POTENTIAL CHALLENGES)
- Author(s):Constantin Nicolaescu, Daniel ROMAN
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:271-276
- No. of Pages:6
- Keywords:special forces: security environment; threats
- Summary/Abstract:After decoding the realities of the geo strategic environment, we have noticed the necessity of analyzing the effects of its transformations, on the forces in general and on the special operations forces in particular. The expected effects we have referred to require a series of urgent measures, some of which are already developed and implemented at the level of the alliance, which have been listed and analyzed in light of the complexity and the effectiveness of this special category of forces facing new threats and challenges.At the end of the scientific communication, based on the analysis, we tried to draw up some pertinent proposals regarding the new research areas, which by their approach will be the foundation of the future decisions at the level of performance for the organization we are part of.
SMART CITY – NEW CONCEPT IN CIVIL-MILITARY PLANNING
SMART CITY – NEW CONCEPT IN CIVIL-MILITARY PLANNING
(SMART CITY – NEW CONCEPT IN CIVIL-MILITARY PLANNING)
- Author(s):Sorina-Georgiana Rusu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:277-282
- No. of Pages:6
- Keywords:smart city; offensive city; civil-military planning; urban security; resilience;
- Summary/Abstract:Within history, armed clashes have dramatically affected the urban localities,where there were strategic objectives, but also a significant population. Nowadays, the city hasbecome a target by attacks which destroy the urban area and irreversibly affect the population.City’s resistance is in great difficulty, involving within defensive actions not only its own community,but also the international organizations whose mission is to maintain peace.In present days, the “smart city” term generates ample debates and polemics. The defense of intelligent cities should be positioned into an offensive area, based on the configuration of this new type of city.Defense actions in the smart city have to respect the particularities of the battle within urban terrain, analyzing the dimensions of the kinetic territory and taking into consideration the intensity of the aerial actions, targeting not only the actual attack, but also collecting data with drones. In this context, synergy is the essential condition for success in the civil-military planning process of a smart city.
THE IMPACT OF INNOVATIVE POLITICAL POWER ON MANAGERIAL FLEXIBILITY IN THE CONTEXT OF ECONOMIC DEVELOPMENT AND SECURITY
THE IMPACT OF INNOVATIVE POLITICAL POWER ON MANAGERIAL FLEXIBILITY IN THE CONTEXT OF ECONOMIC DEVELOPMENT AND SECURITY
(THE IMPACT OF INNOVATIVE POLITICAL POWER ON MANAGERIAL FLEXIBILITY IN THE CONTEXT OF ECONOMIC DEVELOPMENT AND SECURITY)
- Author(s):Constantin Bran
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:283-291
- No. of Pages:9
- Keywords:economic security; innovation; innovative political power; managerial flexibility; organizational flexibility; strategic management; political impact;
- Summary/Abstract:Managerial flexibility is a key factor in strategic management that facilitates the organization's rapid adaptation to environmental turmoil. Implementing managerial flexibility, both intra-and extra-organizational, can lead to risk control and mitigation and occasional benefits or progress in a developed strategy. Innovative political power is the factor that decisively influences the cultivation and manifestation of managerial flexibility at the organizational level, being able to limit or expand it, depending on the established objective.
METHODOLOGICAL FRAMEWORK FOR OPERATIONAL RISK ASSESSMENT
METHODOLOGICAL FRAMEWORK FOR OPERATIONAL RISK ASSESSMENT
(METHODOLOGICAL FRAMEWORK FOR OPERATIONAL RISK ASSESSMENT)
- Author(s):Josef Melichar
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:292-300
- No. of Pages:9
- Keywords:risk assessment; impact; probability; impact area; risk identification; risk prioritization; capability gap;
- Summary/Abstract:The article offers a methodological framework for systematic and rigorous risk assessment in an environment with high uncertainty while applying capability based planning. The article focuses on determining risks inherent to the defence planning process and offers tools and techniques suitable for implementing operational risk assessment.The Operational Risks Assessment Methodological Framework (ORAMF) represents a Framework for use of a proven protocol for writing risk statement – a “Condition-If-Then“construct. The article discusses utility of the “Common approach“ and the “Impact averse approachˮ to the risk assessment and risk rank-ordering as a basis for risk prioritization.Utilizing the ORAMF and the given protocol for producing risk statement together with the Impact averse approach to ordering risks represent a tool set for reinforcement of the defence planing.
GENERAL FRAMEWORK OF THE ROMANIAN ARMED FORCES’ TRANSFORMATION
GENERAL FRAMEWORK OF THE ROMANIAN ARMED FORCES’ TRANSFORMATION
(GENERAL FRAMEWORK OF THE ROMANIAN ARMED FORCES’ TRANSFORMATION)
- Author(s):Petru-Viorel Ene
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:301-307
- No. of Pages:7
- Keywords:army; defence; commitments; transformation; society
- Summary/Abstract:The military system and army by default, is a basic element of the social structure,being part of a complex set of interactions with other systems and subsystems in achieving specifictasks and missions.In Romania, the army is an essential institution of the state, assigned with complex missionsto defend independence, sovereignty, integrity and territorial unit of the country, securing theconstitutional democracy of country’s territory. Therefore, the basic function of the army remains the planning of the military strategy, by depressing and conducting warfare according to the Military Strategy and the Romanian state specific military policies.Once with Romania's accession to NATO and EU, its responsibilities in security and mutual defence increased, together with its duties and commitments to other security organisations,including its active presence in several international military operations.In conclusion, we are witnessing not only a vast transformation process of the Romanian Armed Forces, but also a wide openness to civil society.
THE HUMAN POTENTIAL AND THE SYNTHESIS OF FIGHTING CAPABILITIES’ OPTIMISATION
THE HUMAN POTENTIAL AND THE SYNTHESIS OF FIGHTING CAPABILITIES’ OPTIMISATION
(THE HUMAN POTENTIAL AND THE SYNTHESIS OF FIGHTING CAPABILITIES’ OPTIMISATION)
- Author(s):Lucian Grigore
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:308-315
- No. of Pages:8
- Keywords:social evolution; global equilibrium; the condition of complexity; optimisation; candidate solutions; moral force ;
- Summary/Abstract:The art of war can be linked to the whole complex of social evolutions, not only to the structuring of the models of authority, or to the influence of material interests, but also to the impact of the interests regarding the nature of identity. The evolution of the human factor and the specificity of its attributes engaged in the systemic fields, which project conflict at a cultural,religious, ideological, political, economic and military level, have important aspects that can not be separated from the theoretical and practical areas of the war.The purpose of this approach is to highlight the potential resources conjoined in the acts of war development and operation, and in particular to identify the influences, connections and mechanisms of inter-conditioning that outline the relationship between the armed power and human nature, understood as the integral resource of all other defence resources.
SPECIFIC LEGISLATIVE FRAMEWORKS FOR TRAINING AND EVALUATION IN MILITARY ORGANIZATIONS IN THE CONTEXT OF THE CURRENT SECURITY CHALLENGES
SPECIFIC LEGISLATIVE FRAMEWORKS FOR TRAINING
AND EVALUATION IN MILITARY ORGANIZATIONS IN THE CONTEXT OF THE CURRENT SECURITY CHALLENGES
(SPECIFIC LEGISLATIVE FRAMEWORKS FOR TRAINING
AND EVALUATION IN MILITARY ORGANIZATIONS IN THE CONTEXT OF THE CURRENT SECURITY CHALLENGES)
- Author(s):Gligor Vaidean, Vasile Bucinschi
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:316-324
- No. of Pages:9
- Keywords:legislative framework; training-evaluation programs; interoperability; training; military laws; military rules;
- Summary/Abstract:In this paper we want to analyze the legality and legitimacy of the operating of the Romanian Army training and evaluation system by identifying the legal framework that fundaments the functioning of the military organization. The legislative framework ensures the legality of the functioning of a system through existing rules, principles and laws and the analysis of current conflicts and threats on the security environment determines us to find new viable legislative solutions for Romanian Army forces training and evaluation.
INCREASING INTEROPERABILITY OF MILITARY STRUCTURES THROUGH TRAINING STANDARDIZATION AND LESSONS LEARNED
INCREASING INTEROPERABILITY OF MILITARY STRUCTURES
THROUGH TRAINING STANDARDIZATION AND LESSONS LEARNED
(INCREASING INTEROPERABILITY OF MILITARY STRUCTURES
THROUGH TRAINING STANDARDIZATION AND LESSONS LEARNED)
- Author(s):Gligor Vaidean, Vasile Bucinschi
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:325-334
- No. of Pages:10
- Keywords:military structures; standardization; lesson learned; interoperability; military personnel; training; individual training; collective training;
- Summary/Abstract:In this paper we present the importance of the standardization of training and lessons learned, in order to increase the interoperability of military structures. The standardization of training involves the conduct of an individual and collective training process based on common standards, and through lessons learned or past experience, military actions can be planned, in order to eliminate the challenges to current security environment. Since interoperability depicts the ability of military structures to act together and efficiently to achieve common goals, through effects of lessons learned and standardization of training, the Romanian Army will be able to carry out joint actions with all the military structures of the North Atlantic Treaty Organization
MULTINATIONAL DIVISION SOUTH-EAST HEADQUARTERS – IMPACT ON TRAINING THROUGH SIMULATION PROCESS USED BY ROMANIAN LAND FORCES UNITS
MULTINATIONAL DIVISION SOUTH-EAST HEADQUARTERS –
IMPACT ON TRAINING THROUGH SIMULATION PROCESS
USED BY ROMANIAN LAND FORCES UNITS
(MULTINATIONAL DIVISION SOUTH-EAST HEADQUARTERS –
IMPACT ON TRAINING THROUGH SIMULATION PROCESS
USED BY ROMANIAN LAND FORCES UNITS)
- Author(s):Diana-Ioana Neagoe (Zinca)
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:335-341
- No. of Pages:7
- Keywords:training; training through simulation; constructive simulation; the planning process for simulation exercises; Multinational Division South-East Headquarters
- Summary/Abstract:In the military system, the simulation represents the most important tool intraining because it can be used from tactical level to the strategic one. Military training is nothingelse but training for fight. Basically is the military’s continuous training in dealing with crisismanagement. For every state is essential to have a well trained and equipped army. This end statecan only be achieved by training in conditions as close to the reality as they can get, using theminimum of resources. If for individual training the costs of using simulated systems are notjustified, the headquarters training cannot be done using real simulation systems. Taking intoconsideration the security issues from all over the world, a real multinational exercise taking placein Romania’s territory will be perceived as a declaration of war. Nevertheless, the units,headquarters, general staff and Multinational Division South-East headquarters need to be trainedin both national and NATO exercises. Taking all those facts into consideration, the only safesolution to provide them the proper training by using limited resources, is the training throughconstructive simulation. The challenge of Multinational Division South-East Headquarters is toprove its full capability during a computer assisted exercise.
APPLICATION OF THE METHOD OF COVERING ZEROS IN DECISION-MAKING FUNDAMENTS
APPLICATION OF THE METHOD OF COVERING ZEROS
IN DECISION-MAKING FUNDAMENTS
(APPLICATION OF THE METHOD OF COVERING ZEROS
IN DECISION-MAKING FUNDAMENTS)
- Author(s):Florentina-Loredana Dragomir
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:342-347
- No. of Pages:6
- Keywords:operational research; linear programming;
- Summary/Abstract:Adopting effective, viable decisions in conducting and executing military actions implies, in the content of the diversity of situations imposed by the requirements of the modern combat space, the approach and solving of operative problems on the basis of the mathematical methods offered by the operational research, which makes quantitative data in order to make an optimal decision available to the commander and his staff.
EFFECTIVENESS OF THE USE OF FORCES AND MEANS OF FIGHTING
EFFECTIVENESS OF THE USE OF FORCES AND MEANS OF FIGHTING
(EFFECTIVENESS OF THE USE OF FORCES AND MEANS OF FIGHTING)
- Author(s):Florentina-Loredana Dragomir
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:348-352
- No. of Pages:5
- Keywords:service theory; operational research;
- Summary/Abstract:In the study of military problems, combat devices and their elements can be considered as networks or service systems and can be analyzed by the theory of expectation theory,since each element of the fighting device can be defined as a purpose and type of service to ensure it.The essential characteristic of all service systems is the random nature of the phenomena analyzed.
CONSTRUCTIVE SIMULATION FOR MEDICAL LOGISTICS IN CASE OF ANTHRAX ATTACK
CONSTRUCTIVE SIMULATION FOR MEDICAL LOGISTICS IN CASE OF ANTHRAX ATTACK
(CONSTRUCTIVE SIMULATION FOR MEDICAL LOGISTICS IN CASE OF ANTHRAX ATTACK)
- Author(s):Lucia Ionescu, Manuel Dogaru, Viorel Ordeanu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:353-359
- No. of Pages:7
- Keywords:constructive simulation; medical logistics; bioterrorist attack;
- Summary/Abstract:The analysis of the current risks and threats on the European continent requires theestablishment of an infrastructure capable of reacting quickly and effectively to a bioterrorist attack.In this context, any action aimed at increasing the reaction and response capacity in the event of abiological incident is welcome.Medical protection in regards to the attack with biological weapons is considered to be aspecific activity, which is primarily the responsibility of the military medical service. Intervention in the biological crisis must be supported by adequate medical logistics that is essential for managing the biological crisis. The training of the structures with attributions in this field, the development of viable intervention plans and their testing, require the creation of a research tool that will help to improve the intervention procedures of the specialized teams. Therefore, building an experimental model with constructive simulation can represent a very useful means of training and training for real situations.
THE ONTOLOGY OF CYBERSECURITY
THE ONTOLOGY OF CYBERSECURITY
(THE ONTOLOGY OF CYBERSECURITY)
- Author(s):Tasia Gudu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:360-366
- No. of Pages:7
- Summary/Abstract:The focus on the impact of malicious actions or cyber attacks makes of minimal significance evaluating the root causes of incidents affecting electronic communication services or determining indicators. This fact underlies the hypothesis that the ontology of cyber security is still incomplete and more investigation is needed in order to achieve the full picture. The present article aims to bring to attention an alternative system of security concepts, where cyber attacks are replaced by security incidents and where cyber security becomes network security. To do so, I will introduce three studies published by the European Union Agency for Network and Information Security(ENISA), whom outcomes contest the essence of cyber security. In the end, I will draw the conclusions to support the need to deepen the research regarding the ontology of cyber security
WORLD’S GREAT MILITARY POWERS’ STRATEGIES ON CYBER WARFARE
WORLD’S GREAT MILITARY POWERS’ STRATEGIES
ON CYBER WARFARE
(WORLD’S GREAT MILITARY POWERS’ STRATEGIES
ON CYBER WARFARE)
- Author(s):Bogdan-Florin TIMIŞ
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:367-375
- No. of Pages:9
- Keywords:strategy; cyber security; cyberspace; cyber operations;
- Summary/Abstract:With a budget of over 600 billion dollars and almost 1.5 million active employees,the US Army is considered to be the most powerful and best-equipped army in the world. Russia, on the other hand, allocates 5.4% of its gross domestic product for defense, more than any other NATO member, the armed forces being made up of 845.000 people. About China we know for certain that it has the largest army in the world, somewhere around 2.3 million combatants.The way in which the three most important military forces in the world manage cyberspace,both from the doctrinal and legislative point of view and from a practical perspective (how they responded to certain cyber aggression, tactics adopted in offensive cyber operations and the examination of authorities with attributions in cyberspace) is a source of inspiration in trying to find the "antidote" for the vulnerabilities of Romanian cyber infrastructures.
ACTUAL CYBER DEFENCE CHALLENGES FOR THE CZECH ARMED FORCES
ACTUAL CYBER DEFENCE CHALLENGES FOR THE CZECH ARMED FORCES
(ACTUAL CYBER DEFENCE CHALLENGES FOR THE CZECH ARMED FORCES)
- Author(s):Dalibor Procházka
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:376-386
- No. of Pages:11
- Keywords:Cyberspace, Cyber Security; Cyber Defence; Cyberspace Operations;
- Summary/Abstract:The paper deals with cyber threats and their implications for the Czech Ministry of Defence and the Czech Armed Forces. System causes of cyber threats, trends and the concept of cyberspace as a new war fighting domain are discussed. NATO, EU and the Czech Republic's strategic documents dealing with cyber threats and strategies are analysed from the point of view of required capabilities within the framework of roles and responsibilities of bodies dealing with cyber security and cyber defense. Required capabilities are deducted from the tasks specified from legislation, implied from NATO and EU membership, and from created strategic and operational scenarios. Based on comparison of required capabilities and current state, the paper proposes solutions for the future. The proposed solutions enable harmonization of defence in cyberspace with the defence of the Czech Republic, ensure defence of cyberspace and integrate cyber capabilities into joint conduct of operations.
SOCIETAL SECURITY THROUGH COMPETITIVE INTELLIGENCE
SOCIETAL SECURITY THROUGH COMPETITIVE INTELLIGENCE
(SOCIETAL SECURITY THROUGH COMPETITIVE INTELLIGENCE)
- Author(s):Adina MIHĂESCU
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:387-392
- No. of Pages:6
- Keywords:social security; societal threats; competitive intelligence;
- Summary/Abstract:Starting from the politologist Arnold O. Wolfers’s definition: "Security, in an objective sense, measures the absence of threats to acquired values, and in a subjective sense, the absence of fear that such values will be attacked"; we can view societal security as an idea of the human communities of survival and continuity of the collective identity and values. If security means the absence of threats, and more than that, the absence of fear, communities need predictability to manage the vulnerabilities they are facing, to overcome challenges and to resist possible threats.Therefore, it is essential to have a detailed data collection (information) process. And this activity is the competence of the Competitive Intelligence (C.I.) structures, which creates a relevant data gathering, transforming them into intelligence, and then it creates analysis and proposes solutions and pertinent approaching methods, depending on the conjuncture and facts
A DETAILED ANALYSIS OF CYBER OPERATIONS
A DETAILED ANALYSIS OF CYBER OPERATIONS
(A DETAILED ANALYSIS OF CYBER OPERATIONS)
- Author(s):Bogdan-Florin TIMIŞ
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:393-402
- No. of Pages:10
- Keywords:cyber space; cyber operations; planning; target management;
- Summary/Abstract:Discussions on the importance of the virtual environment for us, individuals,private companies, or for states or international organizations are superfluous.The presence ofvirtual reality in the daily life of humanity has already become a certainty. As a result, states havehad to rethink their national strategies, allocate additional funds and revise their policies by takinginto account this true leitmotiv of 21st century – the cyberspace.On a military level, what a few years ago seemed utopian now it is as plausible as it may benecessary: the emergence of a new category of forces in the composition of any modern army - thecyber forces. Thus, I consider that a detailed analysis of the actions in the virtual environment fromthe perspective of the types of cyber operations, their planning and deployment, the management ofthe targets in such actions, and the importance of the human being in the context is a natural step inthe attempt to understand the whole phenomenon.
COMBATING CYBERNETIC OFFENSES – A NEED FOR EUROPEAN SECURITY
COMBATING CYBERNETIC OFFENSES – A NEED FOR EUROPEAN SECURITY
(COMBATING CYBERNETIC OFFENSES – A NEED FOR EUROPEAN SECURITY)
- Author(s):Dan Besliu
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:403-409
- No. of Pages:7
- Keywords:European Cybercrime Center; Europol; partnership; cybercrime; global threat;
- Summary/Abstract:The shift from Europe to the information society is characterized by great progressin all aspects of human life: labor, education and leisure, government, industry and commerce. Newinformation and communication technologies have a revolutionary and fundamental impact on oureconomies and societies. The success of the information society is important for economic growth,competitiveness and employment opportunities in Europe and has far-reaching economic, social and legal repercussions.The European Union has already taken various measures in order to combat illicit and harmful content on the Internet, to protect intellectual property and personal data, to promote e commerce and the use of electronic signatures, as well as to enhance transaction security.The purpose of this paper is to present both the theoretical demonstration of the concept of cyber security and the identification of potential preventive measures against the various ways of penetrating the cyber space, raised in time to perfection by "virtual terrorists".
HUMINT- INTELLIGENCE COLLECTION TOOL
HUMINT- INTELLIGENCE COLLECTION TOOL
(HUMINT- INTELLIGENCE COLLECTION TOOL)
- Author(s):Adrian Ivan
- Language:English
- Subject(s):Politics / Political Sciences
- Page Range:410-414
- No. of Pages:5
- Keywords:HUMINT; intelligence; human sources; information; HUMINT operator;
- Summary/Abstract:HUMINT uses human resources as a tool and a variety of collection, passive or active methods for gathering information in accordance with commander information requirements and in conjunction with other information disciplines.The role of HUMINT' s structures is to contribute with intelligence products, obtained from human sources, in the planning, preparation and execution of military operations