по
Security Issues
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Security Issues" > Contents of Issue № 02/2023
Contents of Issue № 02/2023
Internal threats and countermeasures
Ondar A.E., Mongush A.S. - Criminological characteristics of thefts committed with illegal entry into a dwelling in the Republic of Tyva pp. 1-8

DOI:
10.25136/2409-7543.2023.2.40533

EDN: RDOIAX

Abstract: This article presents the characteristic features of thefts committed with illegal entry into the homes of citizens in the Republic of Tuva. In particular, regional peculiarities of the commission of thefts involving illegal entry into the home are noted. The methods of penetration into the dwelling are considered: by breaking the door, locking devices, door lock, penetration through the window, by exposing or breaking glass, selecting a key, etc. In the course of scientific research, general scientific methods, formal legal methods, and special research methods were used. Content analysis of documents, empirical research methods, questionnaires, interviewing, analysis, synthesis, etc.   In the first scientific article, an attempt was made to analyze the criminological characteristics of thefts committed with illegal entry into a dwelling in the Republic of Tyva. The main reasons and conditions under which thefts involving illegal entry into a dwelling in the Republic of Tyva are committed are listed. The peculiarities of the personality of a criminal encroaching on someone else's property in the Republic of Tyva are studied. Conclusions are drawn based on the results of an empirical study, in particular on the basis of a survey conducted in the territorial bodies of the Ministry of Internal Affairs of Russia in the Republic of Tyva. The authors refer to statistical data from open sources of information.
Monitoring and civil control of security systems
Parshintseva L.S. - Analysis and forecasting of crime in Russia as a tool of effective public administration in the social sphere pp. 9-18

DOI:
10.25136/2409-7543.2023.2.40844

EDN: ODUKWU

Abstract: The purpose of the study is to identify the main trends and patterns of crime development in Russia in order to develop effective public administration measures aimed at improving the criminogenic situation. The object of the study is crime in the Russian Federation by categories of crimes. The subject of the study is statistical data characterizing the state and dynamics of crime in Russia. The study was conducted using statistical methods such as the method of relative values, index analysis, time series analysis and forecasting methods, in particular, adaptive methods, correlation and variance analysis methods, as well as methods of visual data analysis.    As a result of the study, an assessment of the state, structure and structural shifts in the distribution of crimes by crime categories over the past 10 years has been made, the influence of a regional factor on the variation in crime rates has been revealed, and the correlation between crime levels by crime categories and socio-economic factors such as unemployment, retail sale of alcoholic beverages per capita has been assessed, the coefficient of migration growth, the Gini coefficient, the coefficient of differentiation by income of the population. Based on the study of the behavior of time series levels of the number of registered crimes by crime categories, modeling and forecasting of indicators using adaptive methods until the end of 2023 were performed.
Informational support of national security
Bespalova N.V., Nechaev S.V. - Ensuring information security of cloud storages pp. 19-26

DOI:
10.25136/2409-7543.2023.2.40770

EDN: INXNVX

Abstract: The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data on the use of cloud technologies by corporate clients and individuals were analyzed, the main specific security problems of cloud solutions were identified, such as data storage, the use of modular infrastructure in the cloud, the vulnerability of virtual machines to malware infection, connection instability, access rights differentiation, unbalanced actions of the client and the cloud service provider.   In the course of the work, the concept of building multi-level security of cloud systems was formulated. This approach will not only increase the time spent, but also the complexity of the process of infiltration of an attacker into the system, which will increase the chances of timely recognition and prevention of various types of attacks. A solution for building a security system was proposed, which includes the following steps: choosing reliable encryption and authentication methods, using a firewall to filter traffic and prevent intrusions, ensuring data transmission over the Internet in a secure execution, using an intrusion detection and prevention system.
External threats and countermeasures
Ul'yanov M.V. - New trends in extremist and terrorist crime and measures to counter threats to national security pp. 27-34

DOI:
10.25136/2409-7543.2023.2.41007

EDN: EFCSTG

Abstract: The author analyzes the current state of extremist and terrorist crime, as well as the main trends in the commission of individual crimes in 2022 and 2023. The choice of this time period is due to the increased threats to the national security of the Russian Federation. Attention is drawn to the indicators of crimes provided for in Articles 205, 205.2, 281, 357 of the Criminal Code of the Russian Federation. Based on the evaluation of statistical data, information about the current criminogenic situation was obtained. There was a slowdown in the growth rate of the number of public calls for extremist activity (Article 280 of the Criminal Code of the Russian Federation) and the facts of incitement to hatred or enmity (Article 282 of the Criminal Code of the Russian Federation). The intensification of terrorist and sabotage activities is stated. The materials of separate foreign studies concerning destructive activity in the information sphere are analyzed. Conclusions are drawn about the need to consider extremist and terrorist activities in the context of information warfare and the use of information weapons. With this in mind, it is proposed to take a number of measures in the field of information security. As a measure to counteract new threats to national security, the urgent need to systematize and publish information that became known during the investigation of criminal cases initiated on the facts of the genocide of the Russian-speaking population in the period from 2014 and the Soviet people during the Great Patriotic War is called. It is proposed to consider the issue of securing in Russian legislation the powers of the Security Council of the Russian Federation to declare a State carrying out terrorist activities as a sponsor of terrorism.
Technologies and methodology of security systems
Degterev A.K. - The frequency of severe droughts in Crimea and their relationship with El Niño pp. 35-44

DOI:
10.25136/2409-7543.2023.2.40861

EDN: ESLAFE

Abstract: In this paper the author discusses such an urgent problem for the environmental safety of the Black Sea region as drought. The frequency of droughts lasting more than three decades in the period from April to August inclusive is considered on the basis of data on monthly precipitation and mean monthly temperatures shown from 1950 to 1999. There were seven two-month droughts and one three-month drought. The frequency of droughts in separate months is calculated. The change over the years of the maximum value of the El Niño index per episode from 1950 to 2023 is analyzed. The connection of two-month droughts with this parameter is noted. Based on the results of the study conducted in this paper, the author comes to conclusions about the regularities in the manifestation of severe droughts in the Black Sea region. In particular, it was concluded that in recent decades, strong manifestations of El Niño recur no more often than after 15 years. This makes it possible to predict episodes with an index value of more than 2.6 not earlier than 2030. It is especially noted that so far the main danger in Crimea is two-month droughts. During the considered 50 years of drought lasting more than six decades in a row in the period from April to August, there were 8 times.
Informational support of national security
Duben A.K. - Priority tasks of ensuring information security in the context of modern challenges and threats pp. 45-56

DOI:
10.25136/2409-7543.2023.2.43435

EDN: JWOTFN

Abstract: The article discusses the issues of ensuring information, digital, and cybersecurity, which is an urgent, strategic task at both the national and international levels. It is established that in the current conditions of the global crisis and geopolitical changes, new approaches to the legal regulation of information security are needed. An urgent problem has been identified not only at the national, but also at the international level. In this regard, it requires the identification of new external and internal threats in the information sphere, as well as the study and forecasting of prospects for the development of international regulation of information security. The conducted research allowed us to conclude that in the conditions of digital transformation, it is necessary to work out and strengthen scientific and legal positions regarding the development of legal support for information security. In the course of the research, the author concluded that at the present stage of development of society and the state, among the most urgent threats to national information security due to the dynamism of the information sphere, it is possible to single out such threats as illegal impact on national information resources, information and telecommunication systems and information infrastructure, including critical information structures; the use of means and methods of spreading false (fake) information for the purpose of disinformation of an indefinite circle of people using illegal methods and means, including cognitive methods of influencing the human psyche in order to disorganize and suppress the will; unauthorized interference in the national information space.
External threats and countermeasures
Bagreeva E.G., Kutsev V.V. - On the issue of mobilizing citizens to preserve traditional values pp. 57-67

DOI:
10.25136/2409-7543.2023.2.43456

EDN: LQIZKP

Abstract: This article is devoted to the negative impact of illegal migration on the expansion of the consumption of narcotic and psychotropic substances. The analysis of the statistics of migrants involved in drug trafficking is given. The effectiveness of the legal measures taken to improve the drug situation in the country is investigated, their insufficiency is emphasized. For further analysis of the situation, the factors influencing the political risks of national security are proposed. The necessity of increased attention to illegal migration and illicit drug trafficking as unmanageable risks for the purpose of their manageability is substantiated. A statistical analysis was carried out on the problems considered in the article to substantiate the relevance of the results obtained. The scientific novelty of the article consists in the identification and analysis of four main groups of political threats of illegal migration (political-legal, economic-legal, criminal-legal, social-legal). The presented article makes it possible to understand in which cases illegal migration poses a threat to the population drug addiction and undermines country's security. It is concluded that the main dangers of uncontrolled risks are: the unknown conditions of their occurrence and the lack of effective measures to counteract them. The analysis of the current situation with migration flows made it possible to come to the conclusion that illegal migration, together with the accompanying drug addiction of citizens, should be classified as threats and risks to national security. This makes it necessary to expand the means and forces in the fight against this negative and dangerous phenomenon.
Administration and maintenance of security systems
Nikolaev N.V., Nekrasov M.I., Bogachev D.G., Sokolov A.M. - On the issue of countering security threats associated with the use of weapons made of polymer materials pp. 68-81

DOI:
10.25136/2409-7543.2023.2.40642

EDN: MYJVOS

Abstract: The subject of the study is a scientific and methodological apparatus for designing systems of physical protection of objects that ensure the detection of items made of non-standard materials prohibited from being brought into the protected area. The object of the study is the process of detecting weapons made of polymer materials using special technical means. The aim of the work is to develop the scientific and methodological apparatus for designing systems of physical protection of objects in the direction of updating the models of violators due to the systematic presentation of methods of unauthorized passage of weapons made of polymer materials. The methods of system analysis are used in the work. The authors note the possibility of using 3D weapons as a new means of implementing security threats to objects. In the interests of countering such threats, research is being conducted on the introduction of terahertz (sub-terahertz) personal inspection complexes that detect objects made of non-standard materials hidden under clothing on the body of the object of inspection, as well as determining the main methods of concealed 3D weapons to create adequate models of violators necessary for the design of new and improvement of existing systems of physical protection of objects. The paper presents the characteristics and results of a comparative analysis of the main methods of concealed carrying of such weapons. In conclusion, it is noted that the identification of 3D weapons is complicated by the fact that the details can be modified to make it difficult for security personnel, operators of complexes at the inspection point and machine vision tools to recognize them. The results of the study can be used during the design of physical protection systems for objects that ensure the detection of prohibited items made of non-standard materials. The scientific novelty of the work consists in the development of a scientific and methodological apparatus for designing systems of physical protection of objects by developing intruder models that take into account the methods of concealed carrying of weapons made of polymer materials.
Technologies and methodology of security systems
Sadekov R.R. - Actual aspects of the application of psychophysiological research methods using a polygraph in the implementation of state protection measures against participants in criminal proceedings pp. 82-94

DOI:
10.25136/2409-7543.2023.2.40544

EDN: MYPAFZ

Abstract: The author in his work examines in detail the actual aspects of the use of a polygraph and other psychophysiological methods in the implementation of state protection measures against participants in criminal proceedings, taking into account Russian and foreign experience. The main problematic issues related to the use of polygraph technologies, including their advantages and possible disadvantages, are studied, and the legal aspects of the use of a polygraph by specialists are also considered, taking into account the specifics of their work in criminal proceedings of the Russian Federation. Recommendations for optimizing the use of a polygraph in the investigation of criminal cases are proposed, taking into account modern requirements for methods and fundamentals of legislation in this area, the main conclusions of the study conducted by the author are recommendations that were formulated based on the analysis of the regulatory legal framework, technologies of polygraph specialists in criminal proceedings, judicial practice, scientific opinions of practitioners and researchers in the field of application of polygraph technologies in the investigation of crimes by law enforcement agencies of various states. The author draws attention to the fact that in modern conditions there are increasing requirements for the level of training of specialists. The state attaches special importance to the quality, level, skill and professional interpretation of the results obtained during the use of the polygraph. The study highlights the fact that if authorized persons decide to conduct a polygraph examination in the framework of criminal proceedings, the procedure must be carried out in strict accordance with the legislation of the Russian Federation, in compliance with methodological and procedural requirements in this area.
Rapid response and tactics
Khamidullin R.S. - Ensuring national security in the field of drug trafficking using information and telecommunication technologies pp. 95-105

DOI:
10.25136/2409-7543.2023.2.37603

EDN: MYPBAN

Abstract: Based on scientific sources and practical experience, the article examines the issues of ensuring national security in the field of drug trafficking using IT technologies. The subject of the study is some features of the identification, disclosure and investigation of crimes related to illicit trafficking in narcotics and psychotropic substances carried out using IT technologies and the Internet. The object of the study is the social relations arising in the process of ensuring national security during the fight against drug crime on the territory of the Russian Federation. The author examines in detail such aspects of the topic as the specifics of the detection and disclosure of crimes committed in the field of drug trafficking, as well as the fixation and seizure of digital traces of crime. Special attention is paid to the use of modern technologies in countering drug trafficking using IT technologies. The main conclusions of the study are: ensuring national security in the field of drug trafficking using IT technologies is impossible without qualified employees of the relevant departments of the Ministry of Internal Affairs of Russia and providing them with modern technical means of detecting, fixing and removing digital evidentiary information; the need to identify and disseminate positive experience in combating illicit trafficking of narcotics and psychotropic substances; development and implementation of effective methods and algorithms of actions of law enforcement officers in various operational and investigative situations in practical activities to combat drug trafficking; improvement of the regulatory framework governing the organization of national security in the field of trafficking in narcotics and psychotropic substances.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.