Skip to main content

Security and Defense Scientific Journal - Year III, Issue 2, 2024

Table of Content:


Lyuboslav Lyubenov

DOMESTIC LEGAL MEASURES FOR INCREASING SECURITY IN THE BLACK SEA REGION

Summary: This article examines selected domestic legal measures employed by the Republic of Bulgaria to enhance security in the Black Sea region. Focusing on criminal and procedural law, it highlights how the criminalization and prosecution of offenses such as smuggling, human trafficking, and environmental crimes strengthen national and regional security. The analysis emphasizes the interplay between legal frameworks and effective enforcement, concluding that robust internal legal measures are essential for safeguarding the Black Sea as a critical geopolitical and economic hub.

Key words: national security, Black Sea, domestic legal measures.


Maurizio Geri

EU-NATO COOPERATION AND INNOVATION IN EMERGING DISRUPTIVE TECHNOLOGIES TO STOP RUSSIAN-CHINESE HYBRID WARFARE IN THE ENERGY TRANSITION

Summary: How can the EU and NATO face the future hybrid threats coming from Russia and other adversaries like China in the energy sector during the green transition? Energy security is among the most vulnerable sectors of national security, with significant potential to destabilize societies. Both the green energy and technological transitions will increase vulnerabilities of new infrastructures, supply chain and technologies in the decades to come. The West therefore will need a grand strategy, to increase resilience and capabilities investing in innovation for new technologies (so called “Emerging Disruptive Technologies”/EDTs), defending the supply and value chain of critical materials and resources, and protect the new infrastructures. A closer and more efficient cooperation between the EU and NATO in these sectors becomes fundamental, as dual use technology could help in both the technological and energy transitions and hinder new non-kinetic warfare in these areas.

Key words: Hybrid Warfare, Energy Security, Emerging Disruptive Technologies (EDTs), EU-NATO Cooperation, Supply Chain Resilience.


Vladimir Babanov

INTERNALS OF DEFENSE-IN-DEPTH STRATEGY IN CYBERSECURITY

Summary: The current paper explores the fundamentals of the defense-in-depth strategy in cybersecurity, emphasizing its importance for threat response in the dynamic security landscape. By implementing multiple layers of independent security controls across physical, technical, managerial, and operational domains, organizations can effectively mitigate risks and prevent cyberattacks. The strategy's adaptability makes it a robust framework for addressing evolving cybersecurity challenges, offering a comprehensive method of protection against a wide range of threats.

Key words: defense in depth, cybersecurity, cybersecurity controls, threats, strategy.


Stefaniya Mircheska

PERSPECTIVES FOR THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE: SECURITY DIMENSION OF ARTIFICIAL INTELLIGENCE IN THE MILITARY SECTOR

Summary: Artificial intelligence (AI) is a technology of significant military-political and strategic value. The use of artificial intelligence has become one of the main topics of public debate in recent years. This technological solution has positive results, but it turns out that it also has many hidden consequences for various fields, ranging from increasing the efficiency of industrial production to developing various applications that have the potential to be used for military purposes. Beyond its potential to increase production and efficiency, AI also brings a range of military applications and new threats. In this way, AI represents the coming revolution in military affairs that could reorient the relative distribution of power. In parallel, the new threats become even more serious when considering the high complexity of control in the spread of artificial intelligence – potential for use and increasing the risk of abuse.

Key words: strategic value of artificial intelligence in defense, prospects of AI in defense, future development trends and applications of AI.


Plamen Atanasov

ANALYSIS OF INTERESTS IN THE CONTEXT OF  SECURITY NEEDS. THE EXAMPLE OF 'CORRIDOR NO.8'

Summary: This article proposes a methodology to identify key actors within the network of interests arising from specific challenges. Drawing from Niklas Luhmann's concept, this analysis emphasizes the importance of societal connections. An example is presented regarding the development of interests related to the construction of Corridor No. 8, as a challenge to regional security in the Balkans.

Key words: security, interests, Corridor No.8, Balkans, international relationships.


Viola Bankova

THE WAR IN UKRAINE AND ITS IMPACT ON HUMAN TRAFFICKING IN THE REPUBLIC OF BULGARIA

Summary: The ongoing conflict in Ukraine has not only caused immense human suffering and geopolitical tensions but has also given rise to a complex web of consequences with far-reaching effects. This publication aims to explore the repercussions of the war in Ukraine on the incidence of human trafficking in the Republic of Bulgaria. The intersection between armed conflict and the vulnerability of populations to exploitation and trafficking requires a comprehensive examination to understand the multifaceted challenges faced by affected individuals.

Key words: human trafficking, war, Republic of Bulgaria, Ukraine, rights violation.


Ahmed Mammadov, Afiz Manafov, Mehman Binnatov, Asad Rustamov, Ruslan Hashimov

A STABILIZED FEED BLOCK WITH IMPROVED QUALITY INDICATORS

Summary: The main advantage of pulse-type voltage stabilizers is considered to be a high useful duty ratio, and such stabilizers allow both reducing and increasing the input voltage. This makes it possible to expand their application range. In order to achieve high operating parameters of radio stations or satellite communication systems, development of telecommunications equipment feeding systems is one of the important issues. In the article, the classic series connection of pulse voltage and compensated LDO-type voltage stabilizers is analyzed, a scheme with further improved quality indicators is proposed, where the high useful efficiency of the feeding circuit is ensured by the application of a pulse stabilizer (DC/DC converter). At the same time, thanks to the application of the LDO stabilizer, it allows to reduce the level of noise and distortions.

Key words: voltage stabilizers, noise level, distortion level, differential amplifier, reference voltage source.


Monika Panayotova

CALIBRATING THE STRATEGIC COMPASS FOR А NEW ERA IN EUROPEAN DEFENCE

Summary: The publication aims on the one hand to show the strategic priority for a new era in European defence in the starting mandate of the European institutions (2024-2029), and on the other hand to draw certain conclusions about the Common Security and Defence Policy (CSDP) and the need to calibrate its Strategic Compass, taking into account the "inclination and deviation" in the course towards building the European Defence Union. Emphasis is placed on the need for an exponential way of strategic thinking, taking into account AI, climate, security and defence issues as cross-cutting elements for all EU policies.

Key words: CSDP, Strategic Compass, EU Defence industry, AI, climate-defence nexus.


Valentin Vasilev, Dafinka Sidova

CHANGE MANAGEMENT IN A CRISIS CONTEXT – NEW PARADIGMS AND SOLUTIONS WITH A FOCUS ON SECURITY

Summary: This paper emphasizes one of the new managerial dilemmas – the search for balance in change management in a crisis context. It includes conceptual models related to the knowledge of crises and their dimensions, change management and new aspects, and new ideas and challenges in this research field. The authors attempt to present at a conceptual new level established in theory models of the role of changes, refracting them through the prism of crisis management and its role in security in the modern organization. Less popular change management models, particularly adaptable to crises and crisis management, are presented in a critical scientific interpretation.

Key words: crisis, changes, change management models, security.


Stanimir Iliev

THE MIGRATION PACT AS THE MAIN TOOL OF THE EUROPEAN UNION IN MIGRATION MANAGEMENT AND PROVIDING PROTECTION

Summary: This article explores the new rules governing migration and the provision of protection to foreign nationals introduced by the Spring 2024 Migration Pact. The pact introduced new procedures and mechanisms aimed at increasing trust between member states and giving greater weight to the principle of responsibility-sharing between states. With the new rules, the common European asylum system is further developed by imposing new "stricter" rules for constant control of foreigners and implementation of the set procedures without delay.

Key words: Pact on migration, a common European system for granting protection to foreign nationals.


Elitsa Petrova

POWER, INFLUENCE, AUTHORITY AND RESPECT – THE MONOPOLY RIGHT FOR OBEDIENCE OR THE POWER TO INSPIRE AND PERSUADE

Summary: The object of the present scientific study is the problem of power and influence, authority and respect, which complement or oppose each other as practical aspects of human life. The article emphasizes both their destructive and creative force and emphasizes the dilemma of which we have the right to use – the monopoly right to subjugate or the ability to attract, inspire and persuade others. The scientific methodology used is a combination of an etymological review of the considered phenomena of power, influence, authority and respect, a content analysis of the nature and concepts of the considered phenomena, a brief historical review, a meta-analysis of primary scientific data combined with a critical scientific review, and presentation of the latest scientific findings on the practices for using power, influence, authority and respect in human societies management. As a scientific result, statements and concepts of the considered phenomena from ancient times to the present have been derived and systematized, positive and negative effects accompanying the four mentioned phenomena in the social life of people and its management have been indicated.

Key words: power, influence, authority, respect.


Teodora Licheva

DIGITAL IDENTITY SECURITY

Summary: The digital age in which we live enters every sphere of our lives, changes the type and form of information. Digital identity is our digital copy, and therefore it is of utmost importance to ensure the protection of data and network devices.

Key words: security, digital identity, blockchain, e-services.


Hristo Chaushev

GENERATIVE AI AND SOCIAL MEDIA CONTENT – SECURITY COMMUNICATION CHALLENGES

Summary: Generative artificial intelligence (AI) is emerging as a significant transformative force in social media, improving personalized content creation and increasing user engagement. However, its development and uptake has focused on its benefits and facilitation, at the expense of discourse about its possible negative impact in the security sphere by generating false, misleading or provocative content on social media. NATO's approach to artificial intelligence is outlined.

Key words: generative artificial intelligence, social media, communications, NATO, security.


Teodora Licheva

DATA SECURITY RULES AND ELEMENTS

Summary: Data is the key to the success of any organization. In order to ensure the security, integrity and authenticity of information, both in the cloud and in real environments, it is necessary to introduce new strategies, elements and rules. It is imperative for organizations to meet the requirements of the modern business environment and stay one step ahead of competitive and malicious actions.

Key words: security, data, rules.


Daniela Baleva

PROTECTION OF THE CULTURAL AND HISTORIC HERITAGE IN CASE OF DISASTERS AND WAR

Summary: The paper presents the problems related to protection of the cultural and historic heritage in case of disasters and war. The main elements of this heritage and their characteristics are analyzed. An analysis is made of some aspects of the international legal framework related to the protection of the cultural heritage in case of war.

Key words: cultural and historic heritage, disasters, war.


Galya Grozdanova-Radeva

THE GUARD BRASS ORCHESTRA: A SPIRITUAL PILLAR IN THE NATIONAL SECURITY OF THE REPUBLIC OF BULGARIA

Summary: The topic of national security is not only relevant, but also vital in the modern conditions of globalisation, urbanisation and migration. The civilisational way of accomplishing this is not through the means of armaments, but rather through the respect for sovereignty and unique characteristics of each country's national identity, values, and culture.
A spiritual pillar in the national security of Bulgaria after the Liberation is the Guards Brass Orchestra. The text examines its role in shaping the image and spirit of the Bulgarian nation.

Key words: security, culture, identity, Guard Orchestra, Bulgaria.


Iliyan Angelov

TELECOMMUNICATION SERVICES PROVIDED TO COMMAND AND CONTROL AUTHORITIES FROM FIELD COMMUNICATION AND INFORMATION NODES AT COMMAND AND CONTROL POSTS

Summary: The article provides an overview of the telecommunications services provided at the field command posts in the Bulgarian army and the armed forces in general, their classification, the requirements for the quality of services, modeling of the sources of information in modern telecommunications networks.

Key words: telecommunication services, quality of services, modeling of information sources.


Krasimir Koynakov

RESEARCH OF METHODS FOR RESEARCHING ENERGY EXPENDITURES AND ENERGY INTAKE OF THE HUMAN ORGANISM

Summary: This publication presents a study of the existing computational and laboratory methods for studying the energy expenditure of the human organism, as well as the methods for determining energy intake. The article also specifies the most appropriate methods for determining the energy expenditure and energy intake of military personnel when they are placed in field conditions during their training. A universal methodology for measuring the energy consumption of military personnel during their training and combat activities is also presented.

Key words: energy expenditures, methods, military personnel, energy intake.