Skip to main content

Security and Defense Scientific Journal - Year II, Issue 2, 2023

Table of Content:


Daniel Totev, Vladimir Statev

EFFECTS OF CONTACTLESS SUPPRESSORS ON ACCURACY IN SHOOTING

Abstract: The changes in the security environment of today are characterized by the process of globalization and its effects. Those changes often lead to crises of different scales in which the frequency of use of specialized units is rising. The operations this type of unit conducts are highly dynamic and regularly require the use of suppressed firearms. In such scenarios, the accuracy of every shot fired is of extreme importance. The article presents the results of a study including a small-scale practical experiment on the effects of shooting with and without contactless suppressors on the grouping and accuracy of shots of a popular weapon system.

Keywords: contactless suppressors, shooting, accuracy, dispersion.


Dimo Ivanov

FAMILY TERRORISM OR A CONSCIOUS CHOICE

Abstract: The article is aimed at presenting the connection between the science of psychology and the phenomenon of terrorism. It reveals the importance of personality socialization and the need for a sense of belonging. It also discloses the stages of susceptibility to radicalization at an individual level and at the level of a nuclear family in the stages of personality development. Moreover, it presents the reasons for the emergence of family terrorism and the inculcated belief that martyrdom is of high moral value. It presents martyrdom as a problem that must find its solution before many children become victims of a certain type of terrorism, be it on a religiously motivated basis.

Keywords: terrorism, family terrorism, radicalization, conscious choice, religiously motivated terrorism, personality crisis, stages of personality development, nuclear family, martyrdom.


Nuran Mahmudov

CYBER WARFARE: UNDERSTANDING THE ELEMENTS, EFFECTS, AND FUTURE TRENDS OF CYBER-ATTACKS AND DEFENCES

Abstract: This article provides a comprehensive overview of cyber warfare, including its definition, tactics, techniques, and procedures. It also examines the types of cyber-attacks, the cyber kill chain, and the impact of cyber warfare on governments, corporations, and individuals. The article explores the importance of cyber security and defense, discussing various measures and strategies for protecting against cyber-attacks. Additionally, it highlights the critical role of cyber intelligence and international cooperation in cyber security. Finally, the article concludes with predictions of future cyber threats, future trends in cyber warfare, and the role of artificial intelligence in this field. Overall, the article emphasizes the growing importance of cyber security and the need for continued research and development in the field of cyber warfare.

Keywords: cyber, cyber warfare, cyber-attack, cyber security, cyber kill chain, cyber intelligence.


Stefaniya Mircheska

THE FUTURE OF DIGITAL TWINS: CHALLENGES AND IMPLICATIONS FOR NATIONAL SECURITY

Abstract: Digital Twins (DTs) are transforming how knowledge is generated and used. A Digital Twin is a set of data and information that fully describes a potential or actual physical object, process, or system. They are used in products, systems, and processes before and after their development, creating a means for determining the feasibility of production and modes of failure. Developments in computing power, artificial intelligence, big data and other new technologies are enabling replication of large complex systems with greater fidelity and predictive power. The purpose of this research paper is to present and identify the future prospects for Digital Twin applications, to understand where and how digital twins are used today, the prospects for their future use, and the potential implications for national security.

Keywords: digital twin, definition, standardization, benefits, challenges, national security.


Asad Rustamov, Mehman Binnetov, Khamraz Gurbanov

ENSURING RELIABILITY IN UPGRADING AND MAINTAINING SPECIAL-PURPOSE RADIO-ELECTRONIC EQUIPMENT

Abstract: In the article, the issues of ensuring the reliability of the special-purpose radio-electronic means during the preventive and major repair of the carrier structural parts were considered. The principles of increasing the selection efficiency of the products entered into the military warehouses and its fundamental repair were proposed.

Keywords: special-purpose radio-electronic means, overhaul, carrier structure, reliability, efficiency evaluation, operational readiness coefficient, probability of non-failure operation.


Dimityr Nedialkov

THE POSSIBLE CHOICE

Abstract: The article analyses the negative consequences of (excessively) large income inequality and examines their direct and indirect impact on Bulgaria's national security. According to the author, income inequality can lead to economic and political instability, social tensions, unemployment, increase in crime and other destructive processes for society. Some measures are being discussed to reduce the problem of high inequality, such as changing the tax system, which unfortunately are met with tremendous resistance from the high earners and their lobbyists.

Keywords: income, inequality, poverty, risk, national security.


Mladen Mladenov

VIOLATION OR FAILURE TO FULFILL OFFICIAL DUTIES – INCRIMINATED RISK TO NATIONAL SECURITY

Abstract: The present research is limited only to the crimes under Article 282, paragraph 1, sentence one and two of the Criminal Code - violation or failure to fulfill official duties. The perpetrator can only be an official who belongs to the system and structure of the bodies of power and management in the state apparatus. This person must directly and absolutely meaningfully aim to benefit himself or others, violating imperative legal requirements required by the functions of his position. Executive acts - violation and inaction - related to official duties, must be understood as both divisible and indivisible, and both at the same time. There is a legal paradox that arises from the complexity and phenomenality of reality itself. That is, it is possible to have a breach of duty, also an omission of duty, as well as a breach and omission of duty at the same time. A special case of violation of official duties and failure to fulfill official duties is the case when the perpetrator is a judge. In this way, confidence in the judiciary is violated, legal certainty is ruined, and national security in general is subsequently torpedoed.

Keywords: crime, official, judge, legal certainty, national security.


Dimitrina Stefanova, Valentin Vasilev, Igor Britchenko

FOR THE NEW REALITIES IN MANAGEMENT AND “INFORMATION SECURITY” COMPETENCE

Abstract: The intensity of changes in recent years is truly astonishing. In such a context, the requirements for the competencies and skills of employees and managers are also intensifying in the direction of changes. On the other hand and in this connection, given the crises, today the management of information security is a necessity for any organization that considers organizational information as a valuable asset and considers it in the light of its competitive advantage. Information security is frequently associated with cyber security, a concept and field that is fast evolving on all fronts - technological, regulatory, and programmatic. From the perspective of the human factor, it corresponds to the knowledge transfer and learning abilities that are collectively referred to as "digital skills."  Human resource professional competence and expertise are crucial to the management and development of information security initiatives, making them essential to the growth of any organization.

Keywords: changes, crises, human resource management, security, competencies.


Nikola Shopov

HEALTH CARE AS A FORMATIVE FACTOR FOR NATIONAL SECURITY STABILITY

Abstract: Health care is considered an essential component and foundation of national security for a number of reasons. Although national security traditionally refers to capabilities to build military power and defend against external threats, it also encompasses the protection and well-being of a country's citizens from a wide range of dangers, including health crises. This presentation presents some key points illustrating the relationship between health care and national security. This relationship is intertwined in a number of social, economic and political determinants such as public health emergencies, economic stability, health and demographic factors, biological threats, social cohesion, global health diplomacy, military preparedness, cyber security, preventive health measures and a number of others. In conclusion, health care plays a fundamental role in national security by protecting the physical and economic well-being of the citizens, enhancing resilience in times of crisis, and contributing to international stability and cooperation. A strong health system is an essential component of a nation's overall security strategy.

Keywords: health care, national security, health security.


Tsveta Markova

ECONOMIC SECURITY IN THE CONTEXT OF INDUSTRIAL SECURITY

Abstract: In the conditions of real hostilities, in which the economy of the whole of Europe, as well as of each country individually, is being tested in the context of the post-covid situation, when the provision of military aid to belligerent countries becomes a daily routine, with more and more questions regarding the application of industrial security standards are of great practical value. Industrial security represents the emanation of all types of security: physical, documentary, personal, cryptographic, security of automated information systems and networks, which forms the legal framework for the participation of companies from the military-industrial complex in the Republic of Bulgaria, both in NATO tenders and on a bilateral basis with other countries with which Republic of Bulgaria has concluded agreements for mutual exchange and protection of classified information. If in the pre-war period and within the European Union there were trends of easing the rules and procedures, now in practice every delivery or service should guarantee national security and state sovereignty to the maximum extent.

Keywords: economic security, industrial security, types of security, military-industrial complex.


Dafinka Sidova

POLITICAL SECURITY AS A DIMENSION OF THE FREEDOM FROM FEAR IN THE CONTEXT OF HUMAN SECURITY

Abstract: This article analyses the essence of political security as a dimension of the Human Security Concept, as well as its interrelationship with freedom from fear, which is one of the three pillars of Human Security.

Keywords: political security, freedom from fear, human security, correlation.


Kostadin Bobev

AUTOMATED SYSTEMS FOR IDENTIFICATION OF PERSONS AND OBJECTS IN THE INVESTIGATION OF SERIOUS CRIMES

Abstract: Investigative and forensic actions depend to a large extent on the speed and efficiency of the processes related to the collection and examination of physical evidence and evidence. Modern technologies for the application of computer automated systems are successfully implemented in the work of the police, the prosecutor's office and the court for the identification of persons and objects that left traces at the scene of accidents. The article examines three systems that fully correspond to the European and world standards for international systems ensuring security and cooperation in the investigation of serious and cross-border crimes. For two decades now, the advantages of automated systems for the identification of persons by fingerprints, for the biological identification of persons by DNA profiles, and for the identification of firearms by marks on fired casings and bullets have been successfully realized.

Keywords: criminal investigation, identification of persons and objects, automated systems, fingerprint database, DNA profiles and spent casings and bullets.


Svetoslav Yordanov

FINANCING OF ISLAMIC STATE IN IRAQ AND SYRIA THROUGH ILLICIT TRADE OF ANTIQUITIES

Abstract: This article examines the financing of Islamic State in Iraq and Syria through illicit trade of antiquities. The paper focuses on destruction and looting of world cultural heritage sites in Iraq and Syria, trade mechanism of stolen artefacts, main routes of illicit trafficking of cultural property.

Keywords: terrorist financing, antiquities trafficking, Islamic state in Iraq and Syria, Daesh, blood antiquities.


Viola Bankova

INTERNET AND SOCIAL MEDIA – THE NEW FORM OF HUMAN TRAFFICKING

Abstract: Human trafficking violates one of society's fundamental rights and values – the personal freedom of individuals. This crime has an international character and can affect the interests of multiple countries simultaneously. With the development of the internet and social media, human trafficking has also shifted towards these platforms. The internet provides new opportunities for communication, networking, and information seeking, but it also creates new risks. In this article, we will examine the issue of human trafficking in online environments, as well as its signs and prevention measures.

Keywords: human trafficking, crime, Internet, social media, rights violation.


Svetoslav Velkov

ARTIFICIAL INTELLIGENCE CONTROL METHODS

Abstract: The present study briefly examines extremely topical issues related to artificial intelligence control methods. The author examines the reasons for concern over the lack of an effective method of control, as well as the need for such control over AI functions. In this sense, some of the known control methods are examined with their advantages and disadvantages, and the method that uses an expert system based on continuously enriching rules (knowledge graph) and ontologies is highlighted.

Keywords: artificial intelligence, control methods, expert system, knowledge graph, ontology, security.


Vesselin Dzivev, Dimitar Ginchev

CONCEPT FOR CREATING, USING AND DEVELOPING FORMATIONS OF UNMANNED AERIAL VEHICLES FOR MILITARY AND CIVIL ACTIVITIES (DESCRIPTION AND IMPLEMENTATION)

Abstract: Modern warfare is inextricably linked to the use of UAVs. They possess some weak points that make them vulnerable to the influence of the adversary. The paper proposes a concept for an AI-controlled UAV system that overcomes the shortcomings of autonomous UAVs while not significantly increasing the cost of an individual UAV. The UAV system also implements many additional functionalities.

Keywords: unmanned aerial vehicles, UAV swarm, artificial intelligence, UAV system creation and use.


Vesselin Dzivev, Dimitar Ginchev

CONCEPT FOR CREATING, USING AND DEVELOPING FORMATIONS OF UNMANNED AERIAL VEHICLES FOR MILITARY AND CIVIL ACTIVITIES (USE AND BENEFITS)

Abstract: Modern warfare is inextricably linked to the use of UAVs. They possess some weak points that make them vulnerable to the influence of the adversary. The paper proposes a concept for an AI-controlled UAV system that overcomes the shortcomings of autonomous UAVs while not significantly increasing the cost of an individual UAV. The UAV system also implements many additional functionalities.

Keywords: unmanned aerial vehicles, UAV swarm, artificial intelligence, UAV system creation and use.


Ognyan Stoichkov

CONTROL OF ELECTRONIC COMMUNICATION TO PROTECT NATIONAL SECURITY

Abstract:

The Bulgarian legislation, part of the practice of the ECHR and the Court of the EU for the processing of personal data in the sector of electronic communications and the relevant acts of the European Union, regarding the control of electronic communication for the protection of national security, have been studied.The first main problem is the need for an urgent update of our regulations, in accordance with the Decision in case C 350/21 of 17.11. 2022 for Bulgaria, with which the EU Court ruled that it does not allow national legislation that provides for the preventive general and non-selective retention of traffic data and location data, without ensuring that the individuals have been notified of this to the extent foreseen of Union law. The second problem is related to the limits and judicial control in determining national security, as a basis for control of electronic communication.

Keywords: national security, еlectronic communications, traffic data, Law on electronic communications, Court of Justice of the European Union.