{"title":"SPACE SYSTEMS – A NEW CRITICAL INFRASTRUCTURE SECTOR?","authors":"Cristian Băhnăreanu","doi":"10.53477/2668-6511-22-17","DOIUrl":"https://doi.org/10.53477/2668-6511-22-17","url":null,"abstract":"In recent years, space capabilities have become increasingly important for the proper function and development of the economy and society and for ensuring security. Space is the newest operating environment for military powers, so decision makers can no longer ignore the benefits of space systems and technologies, but also the risks and threats they may be subjected to. The paper highlights the the growing contribution of all these space systems to the functioning of most critical infrastructure sectors and assesses that they must be an independent sector of such infrastructures that need to be protected.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE CONCEPT OF MULTI-DOMAIN OPERATIONS AND ITS MULTINATIONAL UNDERSTANDING","authors":"C. Ioniță","doi":"10.53477/2668-6511-22-21","DOIUrl":"https://doi.org/10.53477/2668-6511-22-21","url":null,"abstract":"The international competition on emerging technologies rises a new and very dangerous threat for global and regional security because of the easy access to the procurament of very high-tech and sensitive defence material. The race for who will control some domains from the future operating environment is between the United States, Russia and China, but several other state and non-state actors have reconsidered their high-tech strategies, already. It is about India, Iran, Japan, Israel and the European Union as a whole, as well as transnational terrorist and organised crime organisations or multinational companies. At the same time, the last technological developments have created a huge discrepancy in the Revolution in Military Affairs (RMA), especially because of letting far behind doctrines and the organisation of military structures for combat. This anacronism is evolving with the intent of gradually replacing regular fighters and current formations in the modern battlefield with robots/androids and joint human-machines teams. As a result, it has become imperative to develop new concepts/strategies for future conflicts that brings together all elemnts of advanced technologies and coordinates their joint acions on any potential adversary, in order to achieve a total and quick victory. This material will analyse the US Army’s concept of Multidimensional Operatios and how it is understood at the Allied level.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CYBERGEOPOLITICS AND CYBERGEOSTRATEGY – EMERGING STUDY FIELDS","authors":"M. Neacșu, Ioana-Andreea Chiciuc","doi":"10.53477/2668-6511-22-18","DOIUrl":"https://doi.org/10.53477/2668-6511-22-18","url":null,"abstract":"For some time now, mankind has entered a new phase of evolution, with physical space (land, sea, air, cosmic) being doubled by the virtual one, cyberspace – the global network of interconnected information technologies – and geopolitics and geostrategy could not fail to take into account this new phase in the evolution of history, with the emergence of subfields such as cybergeopolitics and cybergeostrategy, with some authors already anticipating cybernetocracies or cyber powers. It should only be added that cyberspace can be both an environment for the 'new' power (the geopolitical logic being the same) and a weapon – the cyberweapon (the use of cyberattacks as a geostrategic tool). The aim of this study consists in identifying the main components (definition, subject matter, terminology) of the two emerging areas, namely cybergeopolitics and cybergeostrategy. The results of this qualitative research are based on the critical analysis of the specialized literature, in order to summarize the specific phenomenology and to theorize the concept of cybergeopolitics and its dervates.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMBATING PANDEMICS AND SOCIAL INTERACTION ERRORS – MOVIES VERSUS REALITY","authors":"Ioana-Flavia Drăgoianu","doi":"10.53477/2668-6511-22-05","DOIUrl":"https://doi.org/10.53477/2668-6511-22-05","url":null,"abstract":"One of the major security threats Humankind was confronted with, along several millennia, was coping with deadly viruses. In such a situation, different means of protection of the population have been ensured – medical discoveries, vaccines, and social interaction obstructions. As the creativity of man knows no bounds, different scenarios have emerged regarding combating disease whilst many scientists have designed layouts of coping with deadly viruses, using different models of infections. The goal of this paper is to analyze some of these models, through the lens of Security Studies and Political Science. Then, the discussion will shift towards social interactions and manipulating the social network. Furthermore, we will apply this model on a few selected movies, critically comparing them to the reality we are facing today. Thereby, the focus shall shift towards four well known movies: Contagion (2011), Outbreak (1995), Quarantine (2008), It comes at Night (2017) and their approach to containing and curing viruses, while also quenching the impeding chaos of dismay.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“LAZARUS” THE NORTH KOREAN HACKER GROUP","authors":"A. Gulyás","doi":"10.53477/2668-6511-22-08","DOIUrl":"https://doi.org/10.53477/2668-6511-22-08","url":null,"abstract":"The Democratic People’s Republic of Korea (DPRK) is famous for the poverty, destitution and backwardness, however in spite of these negative features it is among the most advanced cyber warfare countries. In the daily news quite often can be read about cyber-attacks against different states, media institutions or banks where the experts assume that the DPRK supported hacker group the “LAZARUS” is behind the attacks. According to the latest news the group in connection with stealing a big amount of crypto currency and money laundering got into the limelight. The state officially denies the existence of the group however cyber analysts and security experts found direct and circumstantial evidences that prove the connection between the North Korean state and the hacker group.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128443240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TERROR ATTACKS AGAINST AFRICAN HEALTH FACILITIES","authors":"János Besenyő","doi":"10.53477/2668-6511-22-07","DOIUrl":"https://doi.org/10.53477/2668-6511-22-07","url":null,"abstract":"The article is about the attacks on health facilities including hospitals, medical staff and security inside the healthcare institutions. The author first goes on to present a short introduction about the general knowledge concerning the situation of the terrorist assaults on the hospitals and the medical staff. He divides the text into several chapters, which try to comprehend the most important sides of the attacks ont he healthcare institutions. First, he starts with armed assaults on hospitals and health workers, where he describes the dangers the terrorists pose against the institutions and the personnel in them. Then he goes on to talk about the attacks by radicalized medical staff against their own personnel and patients, which presents a serious problem for the security officers. He continues with attacks by explosions, hostage taking and cyber attacks on medical facilities. At the end, the author concludes the article by giving some advises for the international community how to resolve these problems.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE ROLE OF LAW ENFORCEMENT AND PUBLIC SAFETY FORCES FACING BIOLOGICAL THREAT","authors":"Iulian-Constantin Mănăilescu","doi":"10.53477/2668-6511-22-06","DOIUrl":"https://doi.org/10.53477/2668-6511-22-06","url":null,"abstract":"The COVID-19 pandemic has shown that both state structures and citizens have not been prepared to face up a biological threat. The hesitant way in which, at first, action was taken to limit the spread of the new virus led to the emergence of situations that changed the relationship between the state and the population. The trust of a part of the citizens in the state structures has been altered, especially because of the restrictions imposed to limit the spread of the virus. Those who are in direct contact with citizens and who apply these restrictions are the law enforcement and other forces protecting public order and safety. At present, the countries of the world are in a position to think over some strategy meant to restore the confidence of their population in these forces. This distrust, along with conspiracy theories, endangers national and regional security because it is the ground for the proliferation of populism and extremism. The paper presents the sticking points of the relationship between the citizen and the law enforcement and public safety forces that a strategy at the state and regional level should solve in order to restore a level of trust at which security is ensured.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132424771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ESTIMATION OF PROBABLE HEALTH LOSSES IN BIOLOGICAL ATTACK WITH NON-CONTAGIOUS AGENTS, BY MATHEMATICAL EPIDEMIOLOGY","authors":"V. Ordeanu, L. Ionescu","doi":"10.53477/2668-6511-22-04","DOIUrl":"https://doi.org/10.53477/2668-6511-22-04","url":null,"abstract":"In the case of attack with CBRN Weapons of Mass Destruction, the use of biological warfare agents is likely to amplify the effect on the living force, in order to infect, lethal or nonlethal, as many enemy as possible. The military medical service must be able to prevent, diagnose, treat and recover all affected military and the civilian population in the area. Health losses must be recovered in their entirety. Mathematical modeling of the epidemic induced by biological attack is useful for planning the forces and means of the military medical service, for medical planning the offensive or defensive operation, logistics and human resources needed for medical support and replacement. The estimates resulting from the calculations according to the formulas recommended in the specific NATO documents allow the optimization of the medical and non-medical countermeasures for the liquidation of the consequences of the biological attack.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116517329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCIENTIFIC SECURITY AND THE BACKBONE OF THE FUTURE ROMANIAN ARMED FORCES","authors":"I. Chifu","doi":"10.53477/2668-6511-22-01","DOIUrl":"https://doi.org/10.53477/2668-6511-22-01","url":null,"abstract":"Scientific security enters the forefront of the debates related to the evolution of security and military in the future. In that respect, the backbone of the Romanian Armed Forces should move more to fields of scientific research and technological achievements with direct applications and, maybe, a proper scientific and strategic tool at the disposal of the Chief of Defense. The most important fields of research should come from strategic studies, prospective studies, new technologies and their impact, applied military and security sociology, as well as Informational Warfare and impact studies.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE MATHEMATICAL MODELING OF THE EPIDEMIC DISEASES INDUCED BY BIOLOGICAL ATTACK WITH CONTAGIOUS AGENTS","authors":"V. Ordeanu, L. Ionescu","doi":"10.53477/2668-6511-22-03","DOIUrl":"https://doi.org/10.53477/2668-6511-22-03","url":null,"abstract":"The current security context illustrated by the COVID-19 pandemic shows us that we have vulnerabilities, that there are threats and that there will be risks, including biological ones. In the field of BIO defense it is almost impossible to experiment at the general level. This can only be done on time in the laboratory, in vitro, in vivo and possibly in silico. The calculation methodology for the effects of possible attack with contagious biological warfare agents has certain assumptions and limitations. Considering that the population is homogeneous it results that the isolated groups, to which the infection it does not spread, will show an overestimation. Possible individual variations, particular diseases and asymptomatic cases are not taken into account so either an underestimation or an overestimation occurs. In the mathematical modeling of the epidemic diseases induced by biological attack with contagious agents can use the SEIRP model: Susceptible, Exposed and Infected, Infectious, Removed and Prophylaxis Efficacious Model. The study is important for medical operational planning.","PeriodicalId":379803,"journal":{"name":"STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}