W artykule omówiono wojskowe programy kosmiczne rozwijane przez Iran, Chiny i Indie. Uwagę skoncentrowano na etapie militaryzacji i weaponizacji przestrzeni kosmicznej przez te państwa. Wskazano determinanty rozwoju programów kosmicznych oraz kształtowania się polityki kosmicznej, decydującej o zdolnościach militarnych państw regionu azjatyckiego. Jako ograniczenia wskazano międzynarodowe regulacje prawne. Przedstawiono rozwiązania techniczne oraz możliwości ich wojskowego wykorzystania. Określono również kierunki dalszych działań na rzecz rozwoju militarnego w piątej domenie walki – przestrzeni kosmicznej. Udowodniono, że prace nad narodowymi programami kosmicznymi wyraźnie wpisują się w nowy etap militaryzowania i uzbrajania przestrzeni kosmicznej. Działania te pozwalają Iranowi, Chinom i Indiom na umocnienie swego prestiżu w regionie, wpływają także na zmianę równowagi militarnej, zmniejszają bowiem potęgę supermocarstw na rzecz państw regionu azjatyckiego.
W artykule wskazano kierunki badań NATO nad nową, piątą domeną walki – przestrzenią kosmiczną. Określono kierunki rozwoju zdolności pozycjonowania, nawigacji oraz precyzyjnego wskazywania czasu, czyli tzw. zdolności PNT, a także zdefiniowano problemy związane z systemami PNT. Za ważny dla Sojuszu uznano rozwój zdolności wczesnego ostrzegania. Ma je zapewnić System Obrony Balistycznej (BMD) jako narzędzie obrony zarówno obszaru NATO, jak i przed nowymi zagrożeniami pochodzącymi z kosmosu. Ponadto określono i antycypowano kierunki aktywności NATO związane z monitorowaniem środowiska, obejmujące działania w celu zwiększania poziomu bezpieczeństwa środowiska oraz jego ochrony.
The subject of the study are space threats – Near-Earth Objects (NEO) and Potentially Hazardous Asteroids (PHA). The research methods employed in this article included the classic theoretical methods used in security sciences and a practical method – a quantitative study of social media. At present, space threat studies aim to resolve the terminological confusion related to NEOs, determine currently and potentially hazardous space objects and estimate the potential threats they could cause. Another expected result of the research is to present two literature methods for estimating NEO threats, the Palermo and Torino scales. The practical result is to evaluate public mood regarding NEO threats. Studies have shown that certain active space objects are capable of reaching the Earth's surface or impacting human-made in-space objects and devices, such as communication satellites. Should it happen, it could cause substantial social damage and destabilise state security, particularly if elements of critical infrastructure of the state were to be affected. Continuous monitoring of NEOs may play a central role in the provision of security. Furthermore, the public should be kept abreast of the threats.
This study considers signal interference as a form of non-kinetic warfare against unmanned aircraft systems (UAS). The practical purpose of this paper is to organize the theoretical knowledge and terminology concerning interference, while its cognitive purpose is to demonstrate that this recently recognized problem is a real threat to the safe use of unmanned aircraft systems. The research methods employed in this work – analysis, synthesis, abstracting and generalization – serve to determine the types of interference (i.e. primarily jamming and spoofing) and their characteristics in relation to unmanned aircraft. The paper organizes the theoretical knowledge by explaining the signal interference techniques and indicating the targets of attacks or objects of interest. Therefore, available non-kinetic energy UAS neutralization systems are analyzed with respect to their capabilities, tactical characteristics and technical specifications. Given the anticipated further development of unmanned aircraft systems technologies, signal interference carries serious implications for the safety of autonomous operation of these systems. The second important conclusion highlighted in this analysis is the absence of a legislative framework that would regulate the use of interference facilities. This gap in legal regulations implicitly permits their engagement against such crucial infrastructure as e.g. satellite devices for navigation systems – standard and critical equipment in the aviation.
The article presents research results on contemporary hypersonic resources (including hypersonic weapon) in the context of a threat to national security. The author discusses the state of research on such resources, their capabilities and development phases, as well as potential threats they can pose. The analysis has been done separately for each country in which such resources are being developed. Today, there are five of them: the United States, France, the Russian Federation, India, and the Republic of China. It is worth noting that these resources are in their different phases, from initial development concepts to objects with positive ballistic test results capable of reaching hypersonic and high-hypersonic speed. They seem to be a serious contemporary threat to national security for they are capable of carrying combat warheads, including thermonuclear and nuclear ones, and they can reach very high speed.
This volume is the result of the work of scientists from several scientific disciplines who used various methods and forecasting techniques to answer the question: What would happen if NATO and the EU weakened in the 21st century and Russia continued to influence the already strongly democratized and free-market societies in the region? It is prognostic and intended to present the results of research on the political and social perception of the surveyed nations in the face of the weakening of the EU / NATO international security structures and the constant pressure from the Russian Federation in the 21st century.Please note: The research in this book covers the period 2020-2021
<i>One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures.</i><br><br> <i>It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state.<i><br><br> <i>The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: <b>What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats?</b> The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.</i>
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other . It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national L. Ciborowski, Walka informacyjna, Adam Marszałek, Toruń, 1999, p. 187. 35security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
<i>This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country's critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country's critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is "Cricket" [Polish: "Świerszcz"] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.</i>