Table of Content:
Michael Dimitrov
OSINT TOOLS FOR REGIONAL DYNAMICS EVALUATION
Summary: This study compares the performance of two web content extraction tools, one based on computer vision (EE) and the other implementing Puppeteer (3P-IO), in the context of their ability to quantify the regional security. Using a dataset of 100 webpages, the evaluation focuses on crawl time, scrape time, precision (BLEU score), and load success rate. The results reveal significant differences: 3P-IO is faster in both crawl and scrape times, while EE achieves a 100% load success rate, ensuring reliable content retrieval. Despite similar precision, EE’s reliability is a key advantage. The study proposes a hybrid approach that combines 3P-IO’s speed and precision with EE’s reliability, activating the computer vision component only when 3P-IO’s fallback strategy fails. This approach offers a balanced solution, leveraging the strengths of both tools. The study provides valuable insights for stakeholders interested in the measurability of regional security dynamics.
Keywords: Web Content Extraction, Regional Security, Computer Vision, Headless Browsing, Scrape Time, Precision (BLEU Score), Hybrid Approach.
Gergana Varbanova
DEEPFAKE AND THE COLLAPSE OF TRUST: CHALLENGES TO CYBERSECURITY AND THE RULE OF LAW
Summary: The advancement of artificial intelligence systems and the increasing accessibility of technologies capable of rapidly and inexpensively generating synthetic content – deepfakes – with a high degree of illusory credibility pose serious challenges to cybersecurity. These developments underscore the urgent need for an adequate legal framework to protect both individual citizens' rights and national security. This protection must be achieved through the enhancement of societal and individual critical awareness in response to the growing volume of synthetic content. Deepfakes undermine trust in the authenticity of information, create conditions for reputational damage, manipulate public opinion, erode institutional authority, and complicate evidentiary procedures in judicial practice.
This study aims to analyze the cybersecurity challenges and the impact of deepfake technologies on the resilience of cyberspace. It highlights the necessity of establishing a comprehensive legal framework that reflects the dynamic nature of the increasing use of synthetic content as a tool for conducting cyberattacks.
In conclusion, the study asserts that an effective legal response should be not only restrictive and reactive but should also foster a culture of critical thinking in order to restore trust in the digital environment.
Keywords: Deepfake, Cybersecurity, Synthetic Content, Legal Framework, Epistemic Vigilance.
Erol Buyukliev
Summary: This paper examines the transformation of the global security environment in the 21st century. It puts forward the concept of a world without traditional "Great Powers," where the strategic rivalry, partnership, and confrontation among the United States, China, and Russia are reshaping the future of global security. These dynamics not only set the conditions for geopolitical change but also trigger significant strategic uncertainty. The analysis identifies key structural shifts within the global security landscape and highlights major emerging strategic trends. It defines specific parameters of the contemporary objective reality in an effort to answer the question: "Are there 'Great Powers' in the modern era, and if so, who are they?" The paper explores the evolving dynamics between leading global actors, focusing on the clash of divergent ideological principles, value systems, and strategic interests. Drawing on open and accessible sources, the study underscores the urgent need to update terminology in the fields of security, geopolitics, and international relations. The conclusions offer targeted findings and actionable recommendations for the Bulgarian national security system, aimed at enhancing its adaptability and fostering proactive measures to ensure sustainability in an increasingly unstable world.
Keywords: Great Powers, geopolitical transformation, strategic uncertainty, United States, China, Russia, conflicts.
Siyana Lutzkanova, Borislav Nikolov
DIGITAL ASSESSMENT TOOLS IN THE LEARNING PROCESS IN THE SECURITY, DEFENCE AND INTERNAL ORDER SECTORS
Summary: The trend of comprehensive digitalization, accelerated by COVID-19, requires adequate strategies for developing, implementing, and evaluating tools and practices for digitalization in more conservative and sensitive areas such as security and defense, and those regulated based on national and international criteria. The report presents digital tools for assessing knowledge developed at the Nikola Vaptsarov Naval Academy, which are used at each stage of the educational process - during admission to the educational institution, during the training itself, and during the final assessments for completing the training. For this purpose, the developed online and offline platforms can complement the existing tools and be used to assess knowledge in a candidate student campaign, as well as during training in educational institutions in the field of security, defense, and internal order.
Keywords: digital tools, knowledge assessment, electronic platform, security educational institutions.
Dimitar Nedialkov
L-39 SKYFOX – SUPPORTIVE FIGHTER-TRAINING MULTIFUNCTIONAL NEW GENERATION AIRCRAFT
Summary: The author supports the idea that the Bulgarian Air Force should optimize the system of our military aviation by finding a strategic partner in the field of the 5th generation of aviation technology, through which they can prospectively replace the decommissioned old modifications of L-39ZA, Su-25 and partly MiG -29 with a new multifunctional fighter-training aviation platform. We must rely on traditions and explore European opportunities for industrial cooperation.
Keywords: aviation, human cognition, multi-functionality, modernization, close support.
Fakhreddin Aghayev, Asad Rustamov, Mehman Binnatov, Mukhtar Azizullayev, Aliagha Sahibcanov
Summary: This research investigates the methods of radio-electronic warfare (REW) against the control and communication systems of unmanned aerial vehicles (UAVs) and analyzes the performance of their telemetry systems. The growing use of UAVs in both military and civilian applications makes it essential to prevent REW interventions targeting their communication and control systems.
The study analyzes the effects of GPS jamming, spoofing, electromagnetic pulses (EMP), cyberattacks, and artificial intelligence-based interference technologies on UAVs. REW interventions are used to disrupt UAV communication, cause loss of control, or render them functionally inoperative. In particular, blocking or falsifying GNSS signals can cause UAVs to operate with incorrect coordinates or completely lose control.
The distance-dependent changes in communication parameters such as Path Loss (PL) and Signal-to-Noise Ratio (SNR) in UAV communication systems were modeled using the Python programming language. Graphs showing the relationship between distance and Path Loss, and distance and SNR were generated using the Matplotlib library.
The diagrams indicate that high-frequency modules (XBee PRO S2C – 2.4 GHz) experience greater Path Loss and a faster decline in communication quality. In contrast, low-frequency modules (RFD900+ – 900 MHz and TBS Crossfire – 868 MHz) provide more stable communication and allow signals to propagate over longer distances.
The findings of this study show that enhancing the resilience of UAVs to REW attacks requires the use of low-frequency communication modules, implementation of anti-jamming technologies, and development of defense strategies such as adaptive frequency hopping. This research provides a scientific foundation for improving the effectiveness of UAV control and communication systems against REW interference.
Keywords: UAV, GPS, GNSS, REW, Autonomous flight mode, Electromagnetic pulse, Signal jamming, Anti-jamming technologies, Telemetry, Path Loss, Python, Matplotlib.
Pavlin Kodzahristov
THEORETICAL BASIS OF INTERNAL THREATS IN CIVIL AVIATION
Summary: The content of this article is part of a monograph on the topic "Internal Threats in Aviation Security", the publication of which is pending. It examines theoretical propositions related to internal threats in the field of aviation security. A distinction is made between the definitions of internal threats and internal dangers. The main emphasis placed by the author is the definition of internal threat in aviation security and civil aviation.
Keywords: aviation security, internal threat, motivation, measures.
Stefaniya Mircheska
THE FUTURE OF MILITARY LEADERSHIP: HOW ARTIFICIAL INTELLIGENCE IS CHANGING MILITARY CONFLICT
Summary: Military leadership has been fundamentally transformed in recent decades by the rapid advancement of technologies - especially artificial intelligence (AI) – which now actively reshapes military operations, command responsibilities, core leadership competencies, and the ethical foundations of decision-making in defense. This article explores the multifaceted impact of AI on modern warfare, with particular emphasis on its influence over leadership structures, operational planning, and strategic foresight. It examines how intelligent systems are transforming tactical responsiveness, enabling predictive decision-making, and introducing new dimensions to cyber operations and autonomous warfare. Furthermore, it addresses the ethical and legal challenges posed by lethal autonomous systems, the necessity of transparency and accountability, and the emerging need for interdisciplinary leadership models. The study argues that the future of military leadership depends on the integration of technological literacy, ethical integrity, and adaptive strategic thinking in an increasingly AI-driven security environment.
Keywords: military leadership, artificial intelligence, autonomous systems, ethical challenges, strategic transformation, future of warfare.
Teodora Licheva
SECURITY OF E-FILES WITH BLOCKCHAIN
Summary: The research examines the application of blockchain technologies in creating and managing electronic records for information security. It analyzes key advantages such as decentralization, cryptographic protection, and data transparency. Practical applications across various sectors are explored – public administration, education, healthcare, and financial sector. Technical challenges including scalability, cryptographic vulnerabilities, and access management are discussed, along with corresponding security measures. Strategies for implementing and optimizing blockchain-based electronic record systems are presented, ensuring high levels of protection and operational efficiency.
Keywords: blockchain technology, electronic records, information security, cryptographic protection, decentralized systems.
Tsvetomir Aleksov
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: OPPORTUNITIES AND RISKS
Summary: The article focuses on the trends in the use of artificial intelligence in cybersecurity and its growing impact. It highlights both the positive and negative aspects of its application and examines the regulatory frameworks related to it.
Keywords: artificial intelligence, cybersecurity, regulations, risks, development, attacks.
Desislava Mitkova
THE ROLE OF THE STATE IN SOCIAL ACTIVITIES AND THE GUARANTEE OF SOCIAL SECURITY
Summary: The article analyzes the role of the state in the social activities sector and the guarantee of social security. The research focus is directed at identifying the challenges facing state policy and the management of processes in social activities. The in-depth theoretical analysis allows for the derivation and definition of key concepts on the topic: state, social security, social policy and social activities. The main types of social activities that the state guarantees are presented, as well as the mechanisms for their management. The role of state institutions in terms of the organization and security of social activities is examined. Special attention is paid to the existing challenges facing the security of social activities in Bulgaria, including the regulatory framework, financial security and the effectiveness of state intervention. Recommendations are proposed for improving state policy in the context of contemporary social and economic challenges.
Keywords: state, social security, social policy, social activities, social services.
Svetoslav Velkov
SUSTAINABILITY AS A FACTOR FOR ECONOMIC SECURITY
Summary: Sustainability is examined as a multidimensional concept, which in an economic sense refers to the ability of economic systems to function and develop stably in the long term. A comparison is made between sustainability and resilience as related but different concepts that are often used in a similar context, especially when dealing with challenges and ensuring long-term well-being. Emphasis is placed on the fact that sustainability is becoming the “mantra of the 21st century” and an important element of modern economic theory and practice, as well as of security theory, as one of the components of economic and national security. The thesis is that sustainability not only increases the quality of life in all its dimensions, but also creates opportunities for future transformations that have the potential to contribute to the realization of economic growth, which is essential for achieving economic and national security.
Keywords: sustainability, sustainable development, resilience, economic system, economic security, national security.
Emil Krumov
THE POLITICAL INTEGRATION AND CO-OPERATION IN EUROPE AFTER THE WORLD WAR II
Summary: The end of the World War II leaves the European leaders with the necessity of dealing with their devastated countries and with finding a way of preventing another major war on the continent. “Binding our interests so tightly that war becomes materially impossible” (Rompuy, 2012) appears to be an effective solution to both problems. The economic interests do bind quickly but the convergence of the foreign policy interests takes much more time.
Keywords: European Union, European Political Cooperation, Common Foreign Policy.
Iliya Tsenov
THE CHANGING WORLD, THE USA, EUROPE AND THE CHALLENGES TO MILITARY SECURITY
Summary: Changes often occur after serious clashes of interests and values, which have accompanied human history since ancient times. The struggle for resources, markets and their redistribution is still at the heart of the conflicts in the modern world, but now - in different dimensions. The report examines attempts to resolve the pressing issues, focusing on the worst-case scenario if peaceful and diplomatic options are not found and a military solution to the problems is reached. The hope is that the experience of recent years will bring politicians to their senses, but if this does not happen, are we prepared for the consequences? By focusing on these and other issues and analyzing the processes, possible correct actions are sought in the time of increasingly complex relations between the USA, the EU and the other "big powers" in the dynamics of the changing world.
Keywords: change, challenges, military security, modernization, dynamics.
Vasil Stoynev
Summary: This study examines the challenges and strategies for managing migration flows and enhancing border security in Bulgaria and the European Union. The focus is on contemporary migration routes, the role of Bulgarian institutions, international collaborations, and long-term solutions for effectively preventing irregular migration.
Keywords: migration flows, border security, Bulgaria, European Union, migration routes.
Ani Stefanova
THE ROLE OF GEODESY IN MILITARY OPERATIONS: HISTORICAL DEVELOPMENT AND MODERN USE
Summary: Geodesy plays a key role in military strategy, evolving from early cartographic techniques to modern digital technologies. Historically, it was an integral part of the military campaigns from Roman road networks to Napoleonic Wars and modern conflicts. Today, military geodesy integrates GPS, satellite surveillance, drones, and GIS for precise mapping, navigation and infrastructure planning. Technological advances, including artificial intelligence and cyber-resilient systems continue to optimize military intelligence and strategic planning.
Keywords: geodesy, military sector, GIS, GPS, drones.
Stefko Burdzhiev
IMPACT OF NUCLEAR WEAPONS ON CROP PRODUCTION AND FOOD PRODUCTS
Summary: In the conditions of the increasingly complicated international security environment, the possibility of using one of the many means of mass destruction, their many advanced and state-of-the-art arsenals around the world, is becoming increasingly likely. An extremely great challenge for scientists today is to understand how the devastating effects of nuclear weapons affect the surrounding biological world, infrastructure, material and cultural values.
In this context, the bitter experience that the world has from the use of nuclear weapons in the last century requires us to be much more vigilant and, more importantly, far more prepared for the possible consequences of such an apocalyptic development of international relations. As the most powerful means of mass destruction, nuclear weapons, through their devastating factors, will also have a very severe impact on all agricultural production – crops, animals, food products and feed.
Keywords: nuclear weapons, damaging factors, ionizing radiation, biological effect.