Reference:
Ul'yanov M.V..
New trends in extremist and terrorist crime and measures to counter threats to national security
// Security Issues.
2023. № 2.
P. 27-34.
DOI: 10.25136/2409-7543.2023.2.41007 EDN: EFCSTG URL: https://en.nbpublish.com/library_read_article.php?id=41007
Abstract:
The author analyzes the current state of extremist and terrorist crime, as well as the main trends in the commission of individual crimes in 2022 and 2023. The choice of this time period is due to the increased threats to the national security of the Russian Federation. Attention is drawn to the indicators of crimes provided for in Articles 205, 205.2, 281, 357 of the Criminal Code of the Russian Federation. Based on the evaluation of statistical data, information about the current criminogenic situation was obtained. There was a slowdown in the growth rate of the number of public calls for extremist activity (Article 280 of the Criminal Code of the Russian Federation) and the facts of incitement to hatred or enmity (Article 282 of the Criminal Code of the Russian Federation). The intensification of terrorist and sabotage activities is stated. The materials of separate foreign studies concerning destructive activity in the information sphere are analyzed. Conclusions are drawn about the need to consider extremist and terrorist activities in the context of information warfare and the use of information weapons. With this in mind, it is proposed to take a number of measures in the field of information security. As a measure to counteract new threats to national security, the urgent need to systematize and publish information that became known during the investigation of criminal cases initiated on the facts of the genocide of the Russian-speaking population in the period from 2014 and the Soviet people during the Great Patriotic War is called. It is proposed to consider the issue of securing in Russian legislation the powers of the Security Council of the Russian Federation to declare a State carrying out terrorist activities as a sponsor of terrorism.
Keywords:
sponsor of terrorism, public danger, dynamics, genocide, state of crime, sabotage, state terrorism, extremism, factor, information security
Reference:
Bagreeva E.G., Kutsev V.V..
On the issue of mobilizing citizens to preserve traditional values
// Security Issues.
2023. № 2.
P. 57-67.
DOI: 10.25136/2409-7543.2023.2.43456 EDN: LQIZKP URL: https://en.nbpublish.com/library_read_article.php?id=43456
Abstract:
This article is devoted to the negative impact of illegal migration on the expansion of the consumption of narcotic and psychotropic substances. The analysis of the statistics of migrants involved in drug trafficking is given. The effectiveness of the legal measures taken to improve the drug situation in the country is investigated, their insufficiency is emphasized. For further analysis of the situation, the factors influencing the political risks of national security are proposed. The necessity of increased attention to illegal migration and illicit drug trafficking as unmanageable risks for the purpose of their manageability is substantiated. A statistical analysis was carried out on the problems considered in the article to substantiate the relevance of the results obtained. The scientific novelty of the article consists in the identification and analysis of four main groups of political threats of illegal migration (political-legal, economic-legal, criminal-legal, social-legal). The presented article makes it possible to understand in which cases illegal migration poses a threat to the population drug addiction and undermines country's security. It is concluded that the main dangers of uncontrolled risks are: the unknown conditions of their occurrence and the lack of effective measures to counteract them. The analysis of the current situation with migration flows made it possible to come to the conclusion that illegal migration, together with the accompanying drug addiction of citizens, should be classified as threats and risks to national security. This makes it necessary to expand the means and forces in the fight against this negative and dangerous phenomenon.
Keywords:
criminal groups, safety, narcotic substances, political risks, unmanageable risks, the rise of drug addiction, illegal migration, migration registration, shadow economy, labor migration
Reference:
Popova L.I..
Global terrorism threat: current situation and preventive measures
// Security Issues.
2021. № 2.
P. 41-53.
DOI: 10.25136/2409-7543.2021.2.34913 URL: https://en.nbpublish.com/library_read_article.php?id=34913
Abstract:
This article conducts a comprehensive analysis of the phenomenon of global terrorism threats, as well as provides scientific definition of its key elements that pose challenges to the modern systems of state and national security. The goal of this research is to examine the various aspects of manifestations of terrorism as a threat to international security, and discuss ways of countering terrorism. Relying on numerous empirical research, the author employs innovative approaches towards formulating the definitions of terrorism as a global phenomenon. The article considers the socioeconomic, regional, historical-legal, and customs aspects of modern international terrorism are considered; as well as provides research provisions on the methods for detecting terrorist threats. The article uses various approaches towards definition of the concept of terrorism, and identifies the problems of terminology. The author touches upon the question of correlation between different types of criminal activity for the organization and execution of terrorist acts; describes the trends of modern terrorism; reveals the essence, prerequisites and objectives of terrorism as a global threat. The empirical part of research is based on the secondary data. The author summarizes the results of sociological surveys; examines the characteristics and evolution of personality of a terrorist; defines the criteria for comparison of the world’s countries by the level of terrorist activity. The average index of terrorist activity for macrogeographic regions and member-states of the Eurasian Economic Union is calculated. Special attention is given to the relevant questions of financing of terrorism, classification of the sources of funds received by the terrorist organizations and allocation of these funds. The article determines the role of customs in counteracting the manifestations of terrorism, and the key measures for observance of the UN resolution. The author substantiates the use of comprehensive approach towards the methods and means of counteracting the manifestations of terrorism; and formulates recommendations on the development of concerted strategies for countering terrorism in the EAEU member-states.
Keywords:
terrorism financing, customs control, terrorism, International security, global threats, International relations, global terrorism index, terrorist, global governance, customs administration
Reference:
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
Analysis of possible adaptation of the general pattern of immune system within the systems for preventing intrusions
// Security Issues.
2020. № 4.
P. 36-46.
DOI: 10.25136/2409-7543.2020.4.33736 URL: https://en.nbpublish.com/library_read_article.php?id=33736
Abstract:
The subject of this research is the analysis of possible implementation of the mechanisms of functionality of human immune system applicable to information security systems in automated data processing systems. The objects of this research are the human immune system, information security systems, and automated data processing systems. The research is conducted on the basis of achievements of systemic-conceptual approach towards information protection in automated data processing systems, developed within the framework of the project sponsored by the Russian Foundation for Basic Research No. 19-01-00383 on creation of intelligent information protection systems based on the neural network intrusion detection systems and the mechanisms of artificial immune systems. The article reviews similarity and difference between human immune system and information security systems. Special attention is given to identification of peculiarities of functionality of the mechanisms on detection of harmful intrusions into these systems respectively. Methodological research on the topic are carried out using the achievements in the area of creation of neural network intrusion detection system, built on the basis of artificial immune mechanisms that function similar to human immune system. The main result consists in the conclusion that adaptive information security systems containing the means and mechanisms of protection and built by analogy with the human immune system, may provide successful and effective protection of information in automated data processing systems. The specificity and importance of this conclusion is substantiated by the fact that it can be implemented despite the absence of full analogy between human immune system and information security system; moreover, multiple mechanism of protection implemented in human immune system are absent in the information security system, or the other way around.
Keywords:
adaptable systems, neural systems, information protection strategies, intrusion detection systems, information security support, information protection, intelligent systems, immune system, attack detection system, software information protection
Reference:
Tikhanychev O.V..
Hybrid warfare: a new word in military art or the well forgotten new?
// Security Issues.
2020. № 1.
P. 30-43.
DOI: 10.25136/2409-7543.2020.1.30256 URL: https://en.nbpublish.com/library_read_article.php?id=30256
Abstract:
The author examines the aspect of one of the military strategies – the so-called “hybrid warfare”. Analysis is conducted on the key components of “hybrid” actions. Examination of historical allows concluding that these approaches have deep historical roots. This refers not to the classical mercenary, but namely to “hybrid” actions, when the contractor and purpose of mercenaries are hidden, and military actions are accompanied by economic confrontation and mass cyber-attacks. The author carries out component-wise analysis for understanding the nature of emergence and waging of “hybrid” warfare at different historical stages. Based on the experience of conducting warfare and armed conflicts, the conclusion is made that the threat of “hybrid” actions is extremely relevant currently and in the foreseeable future. Moreover, the author determines that other previously existing but modified with consideration of new factors of civilizational development “hybrid” approaches towards organization of inter-state confrontation may be implemented. The need to ensure readiness of the Russian Federation to parrying such threats is underlined.
Keywords:
information war, interstate confrontation, hybrid action structure, promising military concepts, features of modern warfare, soft power, economic confrontation, proxy war, hybrid wars, hybrid threats
Reference:
Tikhanychev O.V..
Cyber Intelligence as a Threat of Information Era
// Security Issues.
2019. № 2.
P. 24-33.
DOI: 10.25136/2409-7543.2019.2.26787 URL: https://en.nbpublish.com/library_read_article.php?id=26787
Abstract:
The object of the research is the process of collection information about important events and phenomena through indirect methods. The subject of the research is the methods of collecting information about objects in cyber space. In his review article Tikhanychev states that ensurance of secrecy has always been an important principle of military. However, while earlier secrecy was maintained mostly in physical space, later it was transferred to radioelectronic and other spheres. With the beginning of post-industrial era and network-centered wars, new methods of collecting information on the Internet were created which made intelligence agencies to develop relevant countermeasures. To describe such measures the author of the article has used the method of technology analysis used by intelligence Internet communities to collect information. Based on the analysis, the researcher offers countermeasures. The main conclusion of the research is that post-industrial era has brought more opportunities for government and non-government structures to collect information through open sources such as social networks, based on indirect signs of electronic devices' functioning, and others. According to the researcher, in order to counter these methods, it is necessary to switch from passive measures of data protection, processing and exchange to active principles of information protection. The researcher offers a number of short-term and long-term organizational and technical measures to ensure this principle.
Keywords:
technical measures, organizational measures, Countermeasures, methods of collecting information, intelligence Internet communities, information space, information and technical resistance, cyber intelligence, secrecy, cyber-confrontation
Reference:
Tikhanychev O.V..
Cyber Weapons Restraints as the Safety Enforcement Factor in the Networked World
// Security Issues.
2018. № 2.
P. 43-49.
DOI: 10.25136/2409-7543.2018.2.25377 URL: https://en.nbpublish.com/library_read_article.php?id=25377
Abstract:
The subject of the research is the cyber security issues. The object of the research is the features of using cyber weapons that may impact the international and national cyber security. In this review article the author clarifies existing approaches to restraining the use of such weapons. The rapid development of information technologies has resulted in new forms of interstate warfare including that against cyber space attacks. Taking this factor into account, the author of the article provides a review of cyber space security issues and clarifies relevant state security issues. To analyze the aforesaid problems, the author has used the comparative method and systems approach as well as the category approach. To make conclusions, the author has applied the synthesis method. The author states that the problem of unauthorized use of cyber weapons is a systemic one and thus cannot be solved by a state independently and without cooperation with other actors. The author suggests that in order to resolve the issue, it is necessary to apply approaches similar to those that are currently used to restrain the use of military equipment and ultimate technologies.
Keywords:
non-proliferation, cyber weapons, prevention of provocations, protection, provocations in cyber space, cyber-attacks, information warfare, international regulation, nonproliferation obligations, security of the digital society
Reference:
Dikikh A.A..
India and Pakistan: wars, conflicts, their settlement and consequences
// Security Issues.
2017. № 4.
P. 46-59.
DOI: 10.25136/2409-7543.2017.4.23694 URL: https://en.nbpublish.com/library_read_article.php?id=23694
Abstract:
The author outlines and studies the origins and reasons of wars (of 1947, 1965, 1971 and 1999) and conflicts between India and Pakistan from 1947 till the present time. The author considers the role of the UN Security Council in the settlement of armed conflicts between the countries. Among the key reasons of confrontation between the states, the author outlines the struggle for the territory of Jammu and Kashmir, religious contradictions, disputes over water resources, India’s interference in the conflict between West and East Pakistan in 1971, nuclear tests from 1974 till 1998, struggle for the Siachen Glacier from 1984 till 1987, repeated crossing of the Line of Control by Pakistani troops, etc. The research methodology is based on the historical method, comparative, structural-functional and system analysis, synthesis, induction and deduction. The author emphasizes the existing tension between the countries, caused by religious contradictions, differences in economic situation in the countries, the unsettled territorial dispute over the demarcation Line of Control, China’s influence on the Pakistani government, which aggravates the contradictions between the countries and the possibility of its reduction through the participation of the countries in the SCO.
Keywords:
armed conflict , prevention, conflict, war, Jammu and Kashmir, Pakistan, India, hostilities, military strategy, United Nations Security Council
Reference:
Shangaraev R.N..
“Mutualism” or the peculiarities of Turkey’s policy towards Russia
// Security Issues.
2017. № 1.
P. 45-54.
DOI: 10.7256/2409-7543.2017.1.21840 URL: https://en.nbpublish.com/library_read_article.php?id=21840
Abstract:
The research object is the peculiarities of the modern Turkey’s foreign policy in its historical development from Osmanism to Kemalism and Pan-Turkism, and its influence on relations with Russia. The main ideologies of the Republic of Turkey have been mixing and synthesizing for the last 20-30 years. Often it’s hard to define where Kemalism ends and Neo-Osmanism or Islamism starts, and it is the reflection of the objective process of interpenetration of the two main political elites and the establishment of a certain form of a compromise between them. The author applies the methods of political-historical and comparative analysis to define the place and role of Russia-Turkey relations on the geopolitical map of Middle East and Central Asia. The author concludes that the modern Turkey’s foreign policy can be characterized as a policy of turbulent pragmatism or as a policy of national interests as they are understood by the political leaders of the country in the particular moment and the particular political situation, when political decisions are made on the base of short-term and medium-term benefits. Despite the current crisis in bilateral Russia-Turkey relations, the fundamental parameters and strategical goals of sectoral cooperation between the countries remain.
Keywords:
Pan-Islamism, Pan-Turkism, international security, Kemalism, strategic interests, Turkey, Russia, Westernism, Syria, Middle East
Reference:
bartosh a.a..
Hybrid warfare as a possible catalyst of a global conflict
// Security Issues.
2016. № 4.
P. 41-53.
DOI: 10.7256/2409-7543.2016.4.19958 URL: https://en.nbpublish.com/library_read_article.php?id=19958
Abstract:
The research subject is the US and NATO strategy of increase of military pressure on Russia using the containment based on the combination of nuclear-missile, anti-missile and conventional weapons. The most important component of the containment strategy is the use of subversive measures of color revolutions and hybrid warfare. The author emphasizes that, in the context of the adaptive use of force, the escalation from nonviolent to military forms of struggle becomes possible due to the indistinctness of borderlines between hybrid and conventional warfare and the absence of clear criteria of definition of fundamental characteristics of these conflicts during transformation. The research methodology is based on the system, structural-functional, comparative political and military approaches, the methods of analysis, synthesis, induction and deduction. The author demonstrates the logic of formation of interrelated strategies in the form of a linkage including color revolution – hybrid warfare – conventional warfare. The author warns that military and political developments of a hybrid war can spin out of control, accidently or out of malice, thus leading to the transformation of a local conflict into a large scale military conflict with a prospect of growing into a global one. The author notes a high degree of inconsistency of the evaluations of hybrid warfare as a possible catalyst of modern large scale conflicts by scholars, military experts and politicians. It promotes the atmosphere of uncertainty in relation to the issues, crucial for the national and international security; it can lead to the misunderstanding and the wrong interpretation of the purposes of the sides of the conflict and the loss of control over the events. The author suggests to unite the specialists’ efforts aimed at the development of theoretical grounds of the new type wars, including terminology, classification, criteria of conflicts, definition of the role of military and nonviolent measures, etc. The efforts should be concentrated, probably, by means of the creation of the Centre for Modern Conflicts Research under UN auspices.
Keywords:
national security, strategy, information warfare, catalyst, conventional warfare, hybrid warfare, color revolution, problem, uncertainty, threat
Reference:
Dement'ev V.E..
The procedure of assessment of the complex information influence on the protocols of the information and telecommunications network processing
// Security Issues.
2016. № 4.
P. 54-62.
DOI: 10.7256/2409-7543.2016.4.20199 URL: https://en.nbpublish.com/library_read_article.php?id=20199
Abstract:
The author considers the approach which helps allocate the possible influences to the information and telecommunication network protocols. The author takes into account the severity of influence and the vulnerability of each information and telecommunication network protocol. The study is based on the data, obtained during experts questioning, which help acquire expert estimates of influences allocation. The procedure is aimed at forecasting the allocation of influences on the information and telecommunication network protocols with account for their role in the information exchange within the information and telecommunication network and the sequence of influence on them. Consequently, it’ll help acquire the initial data to protect the information and telecommunication network and its elements. The basic research method is the hierarchy analysis method. The procedure is based on the definition of the protocol influences danger level for the information and telecommunication network protocols. This definition is based on the physical grounds of certain influences, their peculiarities and mode according to the levels and protocols of the information and telecommunication network. The method can result in the form of protocol influences distribution between the levels and protocols of the information and telecommunication network and the sequence of influence on them.
Keywords:
dynamic coefficient of coherence, dynamic coefficient of importance, methods of forecasting, sequence of influence, matrix of allocations, Protocol influence, expert evaluation, hierarchy analysis method, allocation of influences, possibility of influence
Reference:
Alireza N..
Russia and Iran’s Nuclear Program: Geopolitical Aspects and Implications
// Security Issues.
2014. № 4.
P. 70-90.
DOI: 10.7256/2306-0417.2014.4.13203 URL: https://en.nbpublish.com/library_read_article.php?id=13203
Abstract:
The conflict between the nuclear Iran and the geopolitical plans of the West in the Middle East is one of the central topics of the world politics in recent years. The main cause of this conflict is Iran’s position as one of the central links in the system of geopolitical relations of the Middle East and Eurasia as a whole. Each of the four probable scenarios of further events around Iran’s nuclear program (1) Iran obtain nuclear weapons, 2) Iran’s capitulation, 3) War against Iran, 4) Iran’s positioning as a civil nuclear power) will have its consequences on the regional and global levels, including geopolitical consequences for Russia. As the methodological base, this article uses the systematic analysis approach and the realism apparatus, taking into account the provisions. Realization of the fourth scenario would mean a failure of the aggressive expansionist policy of the West and would fit with such long-term geopolitical interests of Russia as 1) Enhanced stability and preservation of the geopolitical status quo in the adjacent geopolitical zones of Iran and Russia, 2) Strengthening of Russia’s positions in the area as a geopolitical counterweight to the West. Three other scenarios will have negative implications for Russia. Especially if the West succeeds in making Iran capitulate, strengthening of its geopolitical influence in the area will inevitably cause Russia damage.
Keywords:
Russia, Iran’s nuclear program , geopolitical implications, West, Greater Middle East, probable scenarios, "threshold" status, USA, militry actions, balance of forces
Reference:
Chirkov D.K., Litvinov A.A., Antonov-Romanovskii G.V..
On specific features of crimes of foreign migrants in the Russian Federation
// Security Issues.
2013. № 3.
P. 189-200.
DOI: 10.7256/2306-0417.2013.3.672 URL: https://en.nbpublish.com/library_read_article.php?id=672
Abstract:
The article contains criminological characteristics of the crimes of foreign migrants, and specific features of its territorial spread. One should evaluate crimes committed by foreigners objectively without overestimating its public danger. Criminal activities level of foreigners is not above the criminal activities level of the Russian Federation according to the calculations by the authors. However, there is a number of other important parameters, showing high level of its public danger. Crimes by foreigners are closely connected with illegal migration. The threat to national security from illegal migration is strongly connected with the crimes of illegal migrants. The public danger of crimes by illegal migrants should not be underestimated. Illegal migrants constitute up to 90% among migrant criminals. There is also a connection between migrant crimes and citizenship of migrants. There is also a connection between migrant crimes and emigration directions from the neighboring states, and existence of old and new diasporas of people from these states in the Russian Federation. The new diasporas are formed by the migrant from the Central Asia. Their crime level grew abruptly in last five years (2007 to 2011). The older diasporas are formed by the citizens of other neighboring states, and the crime level among them is lowering.
Keywords:
crime markers, crime prevention, illegal migrants, new diasporas, old diasporas, national security, specific features of migration, illegal migration, diaspora influence, spread of crime