Professional Documents
Culture Documents
PROCEEDINGS
THE 11TH INTERNATIONAL CONFERENCE
STRATEGIES XXI
TECHNOLOGIES MILITARY
APPLICATIONS, SIMULATIONS
AND RESOURCES
VOLUME 1
Scientific Editors:
Gabriel-Florin MOISESCU, Professor, PhD
Daniel DUMITRU, Professor, PhD
Sorin PNZARIU, Professor, PhD
Iulian MARTIN, Professor, PhD
SCIENTIFIC COMMITTEE
Brigadier General (ROU AF) Gabriel-Florin MOISESCU,
PhD (Carol I National Defense University, Bucharest,
Romania)
Magistrate
Lieutenant
General
Professor
Erich
CSITKOVITS, PhD (National Defense Academy, Austria)
Colonel Professor eng. Bohuslav PIKRYL, PhD
(University of Defense, Czech Republic)
Brigadier General (ret.) Professor eng. Rudolf URBAN, PhD
(University of Defense, Czech Republic)
Professor Zdenek ZEMANEK, CSc , PhD (University of
Defense, Czech Republic)
Major General Associate Professor Boguslaw PACEK, PhD
(National Defense University, Poland)
Navy
Captain
(ret.)
Associate
Professor Piotr
GAWLICZEK, PhD (National Defense University, Poland)
Colonel Professor Tadeusz SZCZUREK, Ph.D. (Military
University of Technology, Warsaw, Poland)
Brigadier General Associate Professor Dipl. Eng. Boris
URKECH, PhD (Armed Forces Academy of GMRS,
Slovakia)
Major General Professor Vuruna MLADEN, PhD (Military
Academy, Serbia)
Brigadier General Professor Slaven ZDILAR, PhD (Petar
Zrinski Defense Academy, Croatia)
Colonel Professor Mojca PEEC, PhD (Command Staff
School, Slovenia)
Brigadier General Professor Meelis KIILI, PhD (Baltic
Defense College, Estonia)
Professor Augustin MEAHER, PhD (Baltic Defense
College, Estonia)
Professor Michel RUDNIANSKI, PhD (ORT France and
International Institute of Management at CNAM)
Professor Andrs PATYI, PhD (National University for
Civil Service, Hungary)
Colonel Gabor BOLDIZSAR, PhD (National University for
Civil Service, Hungary)
Colonel Professor Laszlo KOVACS, PhD (National
University for Civil Service, Hungary)
Colonel-General (ret.) Professor Zoltan SZENES, PhD
(National University for Civil Service, Hungary)
Lieutenant Colonel Professor Christophe MIDAN, PhD
(Military School, Paris, France)
Professor Larry WATTS, PhD (USA)
Professor Radu MIHALCEA, PhD (University of Illinois,
Chicago, USA)
Colonel Associate Professor Niculae IANCU, PhD (Mihai
Viteazul National Intelligence Academy, Bucharest,
Romania)
Police Quaestor Professor Mihai BDESCU, PhD
(Alexandru Ioan CUZA Police Academy, Bucharest,
Romania)
Major-general (ret.) Professor Mihail VASILE-OZUNU,
PhD (Spiru Haret University, Romania)
Professor Adrian IVAN, PhD (Babe-Bolay University,
Cluj Napoca, Romania)
Professor George POEDE, PhD (Al.I. Cuza University,
Iai, Romania)
Profesor Emilian M. Dobrescu, PhD (The Romanian
Academy, Romania)
Professor tefan PRUN, PhD (Alexandru Ioan CUZA
Police Academy, Bucharest, Romania)
Professor George ICAL, PhD (Alexandru Ioan CUZA
Police Academy, Bucharest, Romania)
ORGANIZING COMMITTEE:
CHAIRMAN: Iulian MARTIN, Professor, PhD
VICE-CHAIRMAN: Valentin DRAGOMIRESCU, Associate
Professor, PhD
MEMBERS:
Marian STANCU, Associate Professor, PhD
Ion PURICEL, Associate Professor, PhD
Cornel MARINESCU, Professor, PhD
Octavian MIREA, Associate Professor, PhD
Costinel NIU, Associate Professor, PhD
Ioan-Constantin STAN, Associate Professor, PhD
Diana Elena UUIANU, Lecturer, PhD
Laurentiu Raducu POPESCU, PhD
Andrei ION, Lecturer, PhD
Antonio DAN-UTEU, PhD Candidate
Cristian STANCIU, PhD Candidate
Daniel ROMAN, PhD Candidate
Alexandru HERCIU, PhD Candidate
Andra Sybil TEFAN (Romania)
ADMINISTRATIVE COMMITTEE:
Ion CHIORCEA (Romania)
Laureniu GRIGORE (Romania)
Tudorel LEHACI (Romania)
Gheorghe LUCA (Romania)
Andra Sybil TEFAN (Romania)
Alexandru HERCIU (Romania)
Antonio DAN-UTEU (Romania)
Elena PLEANU (Romania)
TECHNICAL COMMITTEE:
Cristian STANCIU (Romania)
Daniel ROMAN (Romania)
Nicolae SRBU (Romania)
Maria PRIOTEASA (Romania)
Elena PLEANU (Romania)
Liliana ILIE (Romania)
Rohde &
Schwarz
Rohde & Schwarzis a very well-known manufacturer of equipment and systems for
detection, location and analysis of radio signals with applications in the following areas:
a.ointernal and external security, military and civil radio-monitoring,
b.oas well as for EW systems.
Rohde & SchwarzSIT subsidiary develops crypto products and systems necessary for:
a.othe protection of information in modern data processing and communication systems,
b.oas well as consulting and IT analysis for government authorities.
Since 2008, in Romania, Rohde & Schwarzoperates as Rohde Schwarz Romania SRL, a company
that replaces Rohde and Schwarz Representation Office and Rohde Schwarz Romania Services
SRL.
With a history of over 30 years on the Romanian market, Rohde Schwarz decided to change its
market approach to respond efficiently to customers requests in Romania.
Rohde & SchwarzRomania SRL offers to its partners also calibration services, maintenance,
repairing for the respective equipment and services and additional services such as: system
integration, installation, specialized software applications and training.
Rohde & Schwarz Romania S.R.L.
Bd. Eroii Sanitari, nr. 89, Sector 5,
Tel / Fax: +40 21 411 20 13; +40 21 410 68 46
Email: rs-romania@rohde-schwarz.com
www.rohde-schwarz.com
Capability! Delivered!
INTERACTIVE Systems & Business Consulting
(ISBC), part of INTERACTIVE group of companies
from Romania, is a defense industry leader in integrating Digital Communications and Command &
Control and Information Systems into complete C4ISR turnkey solutions, including Battle
Management Systems (integration of platforms electronics, inertial navigation, GPS, surveillance
radars, sensors and Fire Control Systems).
The most important side of ISBC is not only that ISBCisa technologies provider on behalf of
prestigious communications companies like Harris RF Communications and General Dynamics in
Romania but also ISBC isdeveloping highly integrated solutions for any type of platform around
Harris radios and various other types of equipment, sensors and fire control systems. All ISBC
provided systems are field proven and homologated with the Romanian forces and governmental
agencies, supporting Romanian forces in theaters of operations.
ISBC can offer to its partners, the best and most modern integrating solutions for C4ISR Systems,
having core communications based on any targeted radios which are appreciated around the world
armed forces.
ISBC isinvolved in large cooperation with Romanian Defence Industry and governmental officials
and agencies in providing the most modern capabilities for any battle field whether is in the air, at
sea or land conducted.
Working together we can make the future right today!
Interactive Software, part of INTERACTIVE group of companies from Romania, is an IT company
that has the core business mainly focused on defense and public safety sector. C2IS solutions and
C2 products provided by Interactive Software allow decision makers to understand the situations,
anticipate the courses of actions in critical situations and make the right decisions in a timely
manner.
Interactive Software strongly believes that delivering a successfully turnkey IT solution requires a
close cooperation with customers. Customer needs professional expertise to understand how the IT
technologies could work and Interactive Software can provide it. In the same time, in a close
cooperation with the customer, Interactive Software will understand better customer operational
environment in order to shape the technologies into a real expected solution. Together with
customer, Interactive Software can accelerate the transformation of existing systems into new ones
with maximum efficiency!
Interactive Software built an excellent reputation for innovation, high quality and broad
interoperability, implementing challenging projects, sometimes in harsh conditions. In this respect,
Interactive Software self-assumed also an important role as C2 COTS software developer.
Although the main customers are the Romanian governmental organizations, Interactive Software is
also providing C2 turnkey solutions, know-how and C2 COTS products to international customers,
according to their needs and their procurement policies.
INTERACTIVE SOFTWARE SRL
RO 16010582
J40/17522/2003
BUCURESTI,CALEA RAHOVEI,NR.266-268,CORP 60,ET.3,SECTOR 5
RON RO77 PIRB 4211 7641 6500 1000
PIRAEUS BANK
Call Center
+40 (0)21. 529.40.00
Fax:
+40 (0)21. 529.40.15
Email:
sales@romsys.ro
marketing@romsys.ro
bd@romsys.ro
TABLE OF CONTENTS
PREDICTIVE ANALYSIS IN INTELLIGENCE ANALYSIS ............................................. 13
Iulian MARTIN
LESSONS LEARNED FROM MISTAKES IN INTELLIGENCE ANALYSIS ................... 21
Valentin DRAGOMIRESCU
(HOW TO) PREPARE YOURSELF FOR AN ENGLISH TEST .......................................... 28
Diana Elena UUIANU
TO GOOGLE OR NOT TO GOOGLE (TRANSLATE)
THAT IS THE QUESTION ..................................................................................................... 36
Diana Elena UUIANU
CYBERSECURITY BY MINIMIZING ATTACK SURFACES .......................................... 42
Dan COLESNIUC
Iulian MARTIN
OPERATIONAL APPROACHES REGARDING SPECIAL OPERATIONS
FORCES AIRBORNE-COMMANDO LAND-BASED UNITS CAPABILITIES
VERSUS PARACHUTE INFANTRYS CAPABILITIES
WITHIN HOMELAND DEFENSE MAJOR OPERATIONS ............................................... 49
Ioan-Constantin STAN
Doru-Constantin TOCIL
INTEGRATION OF CYBER DEFENSE INTO THE OPERATIONAL
PLANNING PROCESS .......................................................................................................... 54
tefan-Antonio DAN-UTEU
INTELLIGENCE ANALYSTS PROFFESIONALS TRAINING
THROUGH SERIOUS GAMES SOLUTIONS ..................................................................... 60
tefan-Antonio DAN-UTEU
POSSIBLE DOCTRINE EVOLUTIONS DUE TO CURRENT CONFLICTS ..................... 70
Cristian-Octavian STANCIU
PHYSICAL AND PSYCHOLOGICAL THREATS
ON THE BATTLEFIELD ....................................................................................................... 75
Viorel CEASCAI
PSYCHOLOGICAL AND PHYSICAL FATIGUE IN COMBAT ........................................ 79
Viorel CEASCAI
PENSIONS IN EUROPE AND WORLDWIDE .................................................................... 83
Mdlina SCIPANOV
IMPLICATIONS OF IMMIGRANTS CRISIS ON THE EU BUDGET .............................. 89
Mdlina SCIPANOV
THE GERMAN ARMY JUBILEE 1955 2015 .................................................................... 94
Andra Sybil STEFAN
10
11
12
Abstract: This article focuses on predictive analysis, addressing the issues of the techniques and processes
required for such an analysis. It examines the application of data mining and Bayesian networks techniques to
intelligence analysis, presenting the importance of the crime pyramid for the law enforcement agencies and
introducing the Bayesian approach of the LEILA project regarding the serious games space.
Keywords: education, lesson, mistake, intelligence, analysis, process.
Introduction
Predictive analysis is the act of
mining historical data to forecast future
events or trends. The core element of
predictive analysis is the predictor, a
variable that can be measured for an
individual or entity to predict future
behavior. Multiple predictors are combined
in order to create a predictive model,
which, subjected to analysis, can be used
for forecasting future possible events, with
an acceptable level of reliability.
13
14
15
16
17
variables;
The third layer is made of nodes
representing observable indicators or
potential items of evidence;
hends the
nodes relating to the credibility
assessments of the evidential sources.
18
19
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
20
1. Introduction
Something can be considered a
lesson learned when the solution to a
problem identified is implemented and
known to all and the problem does not
happen again. History has shown that in
intelligence analysis, successes often
remain unknown to the general public,
while on the contrary, failures resound and
penalize the community information
analyst, even more when consequences are
disastrous and affect people's lives and the
history of nations.
I believe every intelligence product
must be rooted in a strong understanding
of the audience it is written for is a
conclusion of Martin Petersen, a retired
senior CIA Directorate Intelligence officer
and the author of a number of articles on
intelligence and intelligence analysis. After
40 years of thinking and writing about
intelligence and intelligence analysis, and
based on experiences which are drawn
from his work in the CIA, he concluded:
We all learn the craft of intelligence
analysis by doing. The lessons are iterative
and frequently opaque, and they generally
come slowly.[1] But his five fundamental
truths and six things that he learned from
21
22
23
24
25
26
[8]
27
Abstract: The idea that led to writing this paper was given to me by the countless questions I received in recent
years regarding the English test candidates need to take in order to be admitted as students at Carol I
National Defense University. Although my answer was always the methodology and the bibliography together
with a test sample are on the website of the University, this information seemed not to be enough for the eager
future candidates. So, I decided to bring more clarifications on this issue. As it was published on the webpage, in
order to join the Masters degree program, there is an eliminatory test of English that officers need to take. The
paper describes in detail an English test with multiple-choice Reading, Grammar, Vocabulary and Writing
items. It explains the mechanisms used for creating the items and provides useful tips for the future candidates,
so as to know what to expect and have a clearer picture of what and how they should prepare in order to be
successful in their endeavor.
Keywords: English test, entrance examination, useful tips.
http://www.unap.ro/ro/oferta_edu/fcsm/PROGRA
MA%20master%20FCSM.pdf
28
Reading
First of all we should mention that
the texts meant for reading have variable
lengths, but no longer than half a page.
They are authentic materials taken from
the written media or from the internet and
sometimes adjusted a little in order not to
go over the CEF B1 or STANAG 2 level.
They can be articles, adds, stories, reports,
interviews, conversations, informal or
formal letters and so on and they will
undoubtedly include some elements of
vocabulary unknown to the candidate. The
subjects will cover usual topics, everyday
life, sports, hobbies, scientific and
technical discoveries, arts, etc. Each piece
of text will be followed by several
questions and each question will be
followed by four answer choices. Just like
in the case of all the items included in this
test, there is only one correct answer. You
may be asked questions regarding the topic
of the text; the main idea of the text or of a
paragraph; specific details in the text;
synonyms for some of the terms used in
the text etc.
29
30
A) unsuccessful
B) unstated
C) unnoticed
D) unimportant
Answers:
1 C: The Tunguska Fireball passed
largely unnoticed because it happened
in a wilderness area.
2 B: The fact that no impact crater has
been found is mentioned in support of
the majority view that an asteroid
exploded before reaching the surface of
the Earth.
3 A: This less popular view is ascribed
to Drobyshevski, who suggests that the
31
Answers:
1. c
2. b
3. a
4. b
5. d
In order to prepare for this part, the same
advice is applicable as in the case of any
vocabulary test: read and listen to English
texts as much as possible; look up the
unknown words
and phrases in
dictionaries; practice on-line intermediate
vocabulary tests.
Grammar
Grammar items are diverse and
cover quite a wide range of grammar
issues, obviously, without going beyond
CEF B1 and level 2 STANAG. So, in order
to prepare for this part, you need to take
any intermediate grammar book or go on
the Internet on any grammar site and go
through the following topics:
32
Writing
The Writing part of the test is
improperly called that, since it is based
mainly on reading comprehension. You
will not be required to write anything
yourselves. However, what you will be
required to do involves knowledge of
written English with respect to the word
order in a sentence, to collocations, and to
paragraph order in a letter or article.
Thus, you may be asked to choose
from the four variants given the one
33
c. Dear Susan,
d. If it takes two weeks for the books to
get to me, it will probably take one
more week for me to send them to you.
Is this too late for you to receive the
books? Im asking because your letter
is so old.
Answers: 40 f, 41 b, 42 e, 43 c, 44 d,
45 a
The conclusion is that the English
part of the entrance examination is not so
difficult, but it is not so easy either.
Studying the textbooks given as
bibliography Prospects Intermediate,
Prospects Upper-Intermediate, and Manual
de limba englez pentru concursul de
admitere n Academia de nalte Studii
Militare is essential for passing the
exam. Also, as it was mentioned above, it
is a good idea to do as many exercises as
you can find on the Internet, of all the
types described in this paper. One final
word of advice: you should not rely on
the fact that at some point in your past
you studied English, just as you should
not rely on the fact that you have been
on various missions in theatres of
operations! If you have not practiced
English lately and usually in a constant
manner, you might find yourself in a
difficult position. So, do give the English
test the place it deserves in your
preoccupations and preparation for the
exam. This is the only way in which you
will be able to take it.
Bibliography
1
34
4
5
6
7
8
9
10
11
12
13
35
www.testden.com/
www.i-courses.org/reading-tips/
www.fluentu.com/toefl/blog/toeflreading-tips
www.study.com/academy/lesson
www.ego4u.com
www.examenglish.com
www.cambridgeenglish.org/
www.unap.ro
Abstract: Nowadays everybody uses the Internet. This is an axiomatic statement just as true as everybody
knows English. And by everybody we mean literally everybody between 18 and 65 years old, that is, people
who are one way or another studying or working in various fields. All these people use Google as search engine
for various purposes and there are few professionals who have never had contact with something written in
English via Google. Also, we are certain that many of these people have at least once attempted to translate
something from and into English using Google Translate. Results are, however, not always actually not ever up to expectations. The present paper refers to some aspects related to the art of translation and presents
arguments why Google translate should be avoided particularly in the academic research field.
Keywords: translation difficulties, Google translate, academic work.
36
37
38
39
40
Bibliography
1
4
5
6
41
Abstract: Improving cyber security knowledge, skills and capability of a nation will be essential for supporting
an open society and for protecting its vital infrastructures such as telecommunication networks, power grid
networks, industries, nancial infrastructures etc. Considering the pervasiveness of cyberspace and its relevance
in any form of economy for the present and the future, the security that a nation will be able to provide for its
cyberspace will be a measure of its independence, of its economic strength and of its capability to maintain its
wealth for the following generations. An essential component of the European Programme for Critical
Infrastructure Protection (EPCIP) is the Critical Infrastructure Warning Information Network (CIWIN). The
article underline one theory concerning to attack surface reduction. That approach will be a more secure
application environment that will increase the effectiveness of defensive measures.
Keywords: Information and Communication System, Cyberspace, Capability, Attack Surface, Protection, Secure
Application, Effectiveness.
1.
Information
systems
are
fundamental to the organizational structure
and the mechanisms of operation of
business, industry and government
institutions. However, such systems,
especially with reference to critical
infrastructure, are vulnerable to growing
violations due to interconnectivity [1].
Types of interdependence among
infrastructures became more important, so
increasing the cyber risk exposure for the
private sector and the public sector in a
national and an international context. The
importance of cyber risk is due to its
potential disastrous effects, especially
when you consider that one criteria
dening the critical infrastructure is the
analysis of the impact of any damage to the
same infrastructure. It is worth pointing
out that only some of the damage resulting
from a cyber risk can be evaluated in
economic terms (production losses,
damage to property, theft of cash, etc.),
while others are less obvious [2].
Interference
with
information
systems could result in loss of consumer
42
43
44
2.
45
i 1
qi
(2.1)
where:
n number of the independent
components analyzed;
pi - probability of success for each
element i (i=1,...,3) ;
qi - probability of failure for each
element i (i=1,...,3).
Binomial relations for calculating
the probability state (based on 2.1 formula)
are the following:
- probability state when the risks
dont affect the system components:
n
i 1
i 1
P0 pi
46
i
i i
where:
i - attacks rate that produce
dysfunctionality at the component level;
i - functional recovery rate
of components;
- state probability with i element
faulty and the others elements (n-1=3-1) in
operation:
PROBABILITY
HARDLY
FREQUENT PROBABLE OCCASIONAL
UNLIKELY
SEVERITY
EVER
VERY HIGH
IN (0,7)
IN (0,55)
IN (0,4)
R (0,24)
M (0,08)
(0,8)
CRITICAL (0,4)
IN (0,4)
IN (0,3)
H (0,2)
M (0,12)
L (0,05)
SERIOUSLY
H (0,2)
H (0,15)
M (0,1)
L (0,06)
T (0,02)
(0,2)
MINOR (0,1)
M (0,1)
M (0,1)
L (0,05)
T (0,03)
T (0,01)
NEGLIGIBLE
L (0,05)
L (0,04)
T (0,03)
T (0,02)
T (0,01)
(0,05)
Pi P0
qi
P0 i
pi
i
where:
T tolerable risk, reduced effects on
the securities objectives (values:
0,01-0,03);
L low risk, minor effects on the
securities objectives (values: 0,040,06); there is a low concern;
M medium risk, the risk can effect
the securities objectives (values:
0,07-0,12);
H high risk, the risk is
significantly, there is a high potential
for affecting the securities objectives
(values: 0,15-0,24);
IN intolerable risk, the risk is very
high and affect directly the securities
objectives (values: 0,3-0,7).
i =1,...,3
(2.3)
Pi P0
qi q j
j
P0 i
pi p j
i j
j=1,...,3 ij
i,
(2.4)
Pi P0
Conclusions
qi q j q k
j k
P0 i
pi p j pk
i j j
i, j, k = 1,...,3 i j k
(2.5)
In case of the n identical elements
(p1 = ... = p3 = p) the general term of the
binomial (p+q)n is:
Ckn qk pn-k k = 0,1,..., n
which represents (in the general
case) the state probability with k elements
47
48
Abstract: The most effective capability employment consists of SOF desired direct, and indirect effects utility, at
Joint Task Force (JTF) operational level, exploited by Joint Force Commander (JFC), that achieves major
impact over campaign/major operation endstate, in order to provide multilateral, versatile support for tactical
conventional units objectives achievements. Meanwhile, alongside SOF action arms, Parachute Infantry Units
capabilities, belong to large formations from Land Forces Service, need to be efficiently exploited by strategic,
and mostly operational leaders within different phases of the Homeland Defense Major Operations/Campaign,
as a versatile force multiplier, under JFC operational control (OPCON).
Keywords: special operations forces, Parachute Infantry, capabilities, Homeland Defense.
Col. Ioan-Constantin Stan, PhD & COL DoruConstantin TOCILA, PhD, Strategic Utility
Approaches of the Special Operations Forces
Airborne Commando Land Based Units. A
Viewpoint of Special Operations Forces Airborne
Commando Land Based Units Employment in the
Frame of Homeland Defense and NATO Collective
Missions, in The 10th International Conference
,,STRATEGIES XXI, Technologies Military
Applications, Simulations and Resources, Volume
2, (Bucharest: ,,Carol I NDU Press Centre, 2014);
49
50
51
Instead of conclusions
Considering all these previous
operational arguments as proper, and
common sense solutions for its
institutionalization, at Romanian Military
Central Decision-Making Level, we
appreciate the SOF Airborne Commando
Land-Based
Units
reorganization,
selection,
training,
and
evaluation
processes should be accelerated, while
continuing doctrinal reaffirmation and
operational concepts implementation about
its strategic value missions.
In the same time, we consider new
doctrinal Land Forces fundamentals, and
warfighting concepts displayed throughout
its Field Manuals should specifically point
out Parachute Infantry Initial Forcible Task
Units
key-capabilities,
successfully
employed by ROU Joint Forces Command
C2 at operational level, in order to
efficiently exploit its strategic and unique
advantages
as
remarkable
force
multipliers.
Summarizing, we can affirm that
reorganization
and
modernization
processes of the new SOF Airborne
Commando Land-Based Units, and
52
53
Abstract: The emergence of the cyber operational environment and its associated issues raise several challenges
across the military operational planning process. This new paradigm should be acknowledged and taken into
account by commanders and military planners in order to ensure the success of their operations. Any future
military exercise and operation must contain a cyber component, in terms of specialized personnel, specific
activities, procedures and injections, which should ensure the necessary conditions for the availability,
protection and dissemination of information required by our own forces as well as the appropriate means to
deny, degrade or disrupt the use of the adversary command and control systems or other cyber capabilities.
Keywords: operational environment, operational planning, cyber defense, command and control.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
54
and
influence
activities,
signals
intelligence, and network operations.2
At implementation level the US
doctrinal provisions are reflected in an
approach which aims the integration in the
operational planning and synchronization,
along three lines of effort, of the activities
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
55
inter-relational
and
interdependent.
Starting from this joint feature of the cyber
and electromagnetic operations, the
military planners must determine, plan and
design in a joint manner the specific
operations, ensuring their integration and
synchronization with the classical physical
operations, kinetic by nature.
Within
each
military
unit
establishment should exist a cyber staff
element responsible for the planning,
preparation, conduct and assessment of
cyber related activities and operations,
both defensive and offensive. This staff
element should ensure the achievement of
multiple and complex tasks as follows:
Develop and integrate cyber
elements and actions into exercises and
operation plans;
Support cyber policies and ensure
compliance of cyber activities with
applicable policy laws and regulations;
Plan, prepare, execute, and assess
cyber operations;
Identify and coordinate cyber
intelligence support requirements;
Integrate intelligence preparation
of the cyber environment into the
operations process;
Evaluate offensive and defensive
requirements for cyber capabilities;
Maintain
available
cyber
resources;
Identify and propose targets
within cyberspace to superior echelon for
assessment and approval;
Plan, coordinate, and evaluate
friendly cyber operations;
Implement friendly electronic and
network security measures;
Identify civilian/commercial
cyber related infrastructure capabilities
within the unit assigned area of operations.
Cyber operations should be
integrated into plans and orders through
the military decision making process. The
staff element responsible for cyber
operations should be actively involved in
all the steps of the operational planning
process (receipt of mission, mission
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
56
analysis,
course
of
action-COA
development, analysis, comparison and
approval, orders production, dissemination
and transition) as well as in preparation,
execution and assessment of the operation
phases. It should ensure also the
integration of cyber specific elements into
the intelligence preparation of the
battlefield,
targeting
process,
risk
management, and continuing activities
processes.
Taking into account the complexity
and the very dynamic nature of cyberrelated activities, the cyber staff element
need to be directly connected and work
closely with the information staff element,
operations staff element as well as with the
communication and information systems
element, in order to achieve efficient
awareness and prompt reaction to the
changing operational environment.
It is important to emphasize that a
modern armed force must possess the
necessary capabilities to conduct cyber
operations while maintaining efficiency in
the use of advantages offered by an
electromagnetic spectrum which becomes
more and more congested. This approach
has the potential to provide tactical,
operational and strategic advantages,
which traditionally have been achieved
only through violent means and physical
destruction.
However, we must be keeping in
mind that cyber operations may involve a
number of problems and challenges that
require reflection. Thus, the associated
judicial-legal issues may negatively
influence the duration of decision making
and approval cycles for the courses of
action. Also, due to the increased
interconnectivity of current information
networks, cyber operations may cause
undesired effects, difficult to predict,
effects which may spread beyond the
classic battlefield geographical limits.
Although a permanent solution and
thoroughly tested throughout history, the
use of kinetic means and methods presents
the major disadvantage of direct and
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
57
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
58
Bibliography
1. ADRP 3-0, Unified Land Operations,
Department of the Army, Washington,
DC, 16 May 2012;
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
59
Abstract: The current operational environment, caractherized by new forms of hybrid threats to security and
defense, challenges the intelligence community, raising questions about the effectiveness and efficiency of the
traditional intelligence learning paradigm. The new operational requirement for intelligence is suggesting the
need of a complex, agile and adaptive analysis approach. Intelligence analysts (IA) professionals are daily
challenged with requests for rapid and accurate assessments about different subjects of interest, in an
environment in which the rough data and information is growing exponentially, putting more pressure both on
the IA and decision makers shouders. From this perspective the training of IA professionals is paramount in
ensuring the quality of intelligence products. The IA training process should include finding and rationalizing of
evidences, integration and synthesis of data from different sources, interpretation and evaluation of constantly
changing information, providing documentation and recommendations that meet the decision maker reporting
requirements. In this general context, through a holistic learning methodology and a serious games solution, the
Law Enforcement Intelligence Learning Applications - LEILA project, developed by a consortium of seven
organizations from four EU countries and co-funded by the European Commissions 7the Framework
Programme for Research and Technological Developpment under Grant Agreement no. 608303, empowers IA
by improving their cognitive capabilities, reasoning skills and creative thinking, at individual and group level.
This paper is summarizing some of the LEILA project team findings.
Keywords: information, intelligence, cycle, analysis, cognitive bias, serious games.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
60
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
61
intuitive
explanations that requires additional
information to be confirmed or invalidated;
Predictions prospects of
future, an attempt to anticipate future
events;
Estimates
situational
assessment issued on the basis of
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
62
evaluating
the plausibility
Figure no. 2. The intelligence
analysis workflow
of
each
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
63
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
64
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
65
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
66
effective
and
innovative
Learning
Experiences, which can be deployed
flexibly among the targeted professionals
population of security domains and
industry as well as potentially beyond.
Intelligence
Analysts
and
Law
Enforcement Agents in different European
countries are trained very differently.
LEILAs Learning Experiences are
designed and deployed in order to be easy
to tailor in terms of sequence and selection
of modules, injection of additional content,
adaptation to specific schedules and
curricula, as well as most importantly
the possibility to deploy them in a
blended format combining traditional
class-room on-site workshops with online
modules learners can participate to without
having to leave their workplace.
The LEILA Learning Experiences,
and
particularly
their
individual
Components, address critical competences
which are not relevant only in the Law
Enforcement context. We assumed that
Intelligence Analysts operating in industry,
in the economy, society or in other local
and global organizations might also profit
from similar learning experiences, opening
up a potentially larger diffusion space for
the Learning Modules developed in
LEILA.
Three Learning Experiences have
been designed and being currently
developed in the context of the Project.
After an intensive design phase, conducted
in tight collaboration with domain experts,
the Projects exploitable foreground
consists of threeindependent LEILA
Learning Experiences, namely:
1. The VUCA Challenge (VUCA
stands
for
Volatility,
Uncertainty,
Complexity and Ambiguity) is an intensive
learning experience focusing on the
challenge of operating in crisis situations
where time is very limited, and intelligence
analysts need to filter effectively through
large amounts of information and
interactions in order to identify and address
a number of complex situations. It also
addresses other relevant competences
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
67
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
68
3.
4.
5.
6.
28250.f_060608_stateofart_sum.
pdf
7. Moore, D. T. (2007). Critical
Thinking and Intelligence Analysis.
at
http://www.au.af.mil/au/
awc/awcgate/dia/ndic_moore_crit_
analysis_hires.pdf
8. NATO. (2012b). JP 2-01, Joint and
National Intelligence Support to
Military Operations. at http://www.
dtic.mil/doctrine/new_pubs/jp2_01.
pdf
9. NATO. (2013). JP 2-0, Joint
Intelligence. at http://www.dtic.mil/
doctrine/new_ pubs/jp2_0.pdf
10. LEILA project webpage at
http://www.leila-project.eu/
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
69
Abstract: The new perception of the expected pace of war nowadays has a major impact on the representation
of conflict and in the formulation of doctrine in general and military doctrine, in particular. Rapid adjustment
to the current pace of the next type of war will be a key factor in military strategic success. The big actors
tend to begin a game with a preconceived notion of how fast events will take place. Such events include how fast
the opposite part can be worn down and how quickly a certain segment of the game map can be occupied
without any concerns about the costs.
Keywords: strategy, doctrine, military art, war, conflict, hybrid warfare.
70
science
development,
crystalizing
convictions, imposing options consecrated
or accepted officially and institutionally.
Contemporary doctrines, and here
we are referring to those belonging to the
military domain, have a high degree of
complexity and a comprehensive character
given especially by the dynamic changes
of the current security environment. The
approaches embraced by conceptual
thinking regarding the use and role of
force in intra- and inter-state relationships
have constantly generated military and
non-military capabilities, both stylized and
diversified, situated on high levels of
technological development, but mostly as
acts of counter-reaction for some states and
phenomena that can no longer be included
in the classical domain dictated by the
principles of armed combat.
The strategies of current conflicts,
which are closely connected to operative
art, and on the other hand, to the tactics
used, directly inter-related to the technical
capabilities of equipment and armaments,
only seldom aim at defending an enemy
and compelling him to surrender. The
purpose of the initiating party is to
demoralize the society it considers as
enemy, to destabilize social and ethnic
stability, to paralyze the economic
mechanisms ensuring its functioning, and
to do away with the fundamental and
functional institutions of the state.
Each new conflict has its distinct
parameters that necessitate specific
solutions, according to the respective
temporal and spatial circumstances and
involves cutting the Gordian knot of
well-defined and instituted reasons,
scientific techniques, and the art of
diplomacy. Judging from these ways of
reasoning
related
to
doctrines,
complementary to classical theories, by
combining the constitutive aspects of
modern conflict, hybrid theory was born,
with a dynamic, complex, and multi-lateral
composition.
In the last decade, the most
important
state actors and even
71
72
73
Bibliography
1.
2.
3.
4.
5.
74
75
Ibidem, pp.65-66
76
77
2.
3.
78
Ibidem, p. 88
Abstract: Psychological and physical stress varies in time and intensity; it varies from a moment in combat to
another, from a type of warfare to another. The undesirable effects of these demanding circumstances can be
grouped under the umbrella term of combat fatigue resulting in extremely serious consequences upon the
capacity of analysis and synthesis of decision-making factors as well as upon soldiers. A type of assiduous
physical and military training in circumstances which are similar to the modern battlefield allows the fighter to
give an adequate response to strenuous conditions and maintain his/her psychological and physical stability at
the optimal levels desired.
Keywords: psychological-physical fatigue, combat, fighter, physical effort.
79
80
Ibidem, p.70
Ibidem, p. 71
81
2.
3.
82
Abstract:Across the world, countries have reformed or are reforming their public pension system by introducing
private savings for retirement systems. Everywhere, the causes are the same: the population is aging, retired
people seem to live longer and longer, the number of contributors to social security is decreasing, the public
pension no longer ensures a reasonable rate of replacement of working income and the public pension system no
longer copes with the obligation to pay the pensions.
Keywords: private pensions, public pension, occupational pension, budget, contributions, insurance system,
annuities.
http://ec.europa.eu/economy_finance/publications/
publication15998_en.pdf
83
http://epp.eurostat.ec.europa.eu/statistics_
explained/index.php/Population_structure_and_
ageing
84
85
86
87
88
Abstract: Europe faces an immigration phenomenon from the Arab world, which it is not prepared for, neither
from an administrative nor from a moral point of view. Thus, what initially appeared to be a purely
humanitarian crisis becomes, in the light of recent information published in mass media, a possible invasion
planned by some political leaders in the Muslim world, with the aim of destabilizing the European Union.
Keywords: budget, crisis, natural resources, expenditure, Asylum and Migration Fund, The Internal Security
Fund.
89
5http://ec.europa.eu/dgs/budget/index_ro.htm
http://www.ziare.com/articles / contributions +
States + EU access: 23.09.2015
access: 2.10.2015
6
www.europa.eu access 5.10.2015
90
The
European
Commission
proposed for 2016 a 1.8 billion euro fund
to improve the situation in Africa.
If we want in the future people not
to migrate to Europe, we should contribute
to the improvement of the situation in their
countries, and this means security, food,
drinking water, health, education. The
sharp increase in the number of people
forced to flee their homes and seek refuge
to escape the violence is a test for the
European Union.
The European Union will distribute
a total of 160,000 refugees in the coming
years. The announcement was made by
European Commission President in his
speech in front of the Parliament in
Strasbourg Community. Jean Claude
Juncker says that the Schengen area of free
movement in Europe will resist the huge
pressure wave of immigrants.
The
European
Commission
proposes a temporary clause of solidarity:
if - for justified or objective reasons, such
as a natural disaster - a Member State
cannot fully or partially fulfill the
commitment to relocate the refugees, then
Global Europe:
including development aid
6%
Other, administration
6%
2%
Sustainable growth Natural Resources:
agriculture, environment
40%
46%
91
92
3.
Bibliography
7.
1.
2.
4.
5.
6.
8.
9.
93
Abstract: Being the most powerful European economy, with a high turnover in exports at international level,
Germany is conditioned and all the same interested in the social, political, but especially economical stability of
all its business partners. This is obviously one of the main reasons of its taking part in international military
actions, sustained by the international military organizations and alliances. By assuming different
responsibilities within the political and economical organizations and alliances, Germanys role increases,
transforming it into an important actor of the international security politics.
Keywords: Bundeswehr, military, Germany, Europe.
94
95
96
Wachstum,
Bildung,
Zusammenarbeit,
Koalitionsvertrag zwischen CDU, CSU und FDP,
26.10.2009, p.123.
97
98
Bibliography
1.
2.
3.
4.
5.
6.
7.
99
Abstract: Communicating is the necessary condition for people to understand each other, to work and
cooperate. English is the international language, but to speak the native language of business partners, means a
lot for the profit of the business itself. The article seeks to highlight the importance of learning a foreign
language, even if it is not a frequently spoken one: each language brings a benefit and never a loss.
Keywords: German, teaching, learning, foreign language.
http://www.dw.com/en/the-german-languagesrole-in-a-changing-world/a-2619624,
retrived
27.10.2015
100
101
102
Zweitsprache-Erwerb.
Eine
longitudinale Untersuchung zur
mndlichen Sprachkompetenz bei
Schlerinnen und Schlern nichtdeutscher Herkunftssprache (ndH)
in Berlin". In: Zeitschrift fr
Fremdsprachenforschung, 14, 2,
291-300.
3.
Chlosta,
C./
Ostermann,
T./Schroeder, C. (2003): "Die
'Durchschnittsschule'
und
ihre
Sprachen: Ergebnisse des Projekts
Spracherhebung
Essener
Grundschulen
(SPREEG)".
In:
ELISe: Essener Linguistische Skripte
- elektronisch, 3, 1, 43-139.
4.
Jeuk, S. (2003): Erste Schritte in der
Zweitsprache
Deutsch.
Ein
empirische Untersuchung zum
Zweitspracherwerb
trkischer
Migrantenkinder
in
Kindertageseinrichtungen. Freiburg
Brsg.: Fillibach.
5.
Pfaff, C. W. (1987): "Functional
Approaches to Interlanguage". In:
Pfaff, C.W. (ed.): First and Second
Language Acquisition Processes.
Cambridge: Newbury House, 81102.
6.
Pfaff, C. W. (1992): "The Issue of
Grammaticalization
in
Early
German Second Language". In:
Studies in Second Language
Acquisition, 14, 3, 273-296.
7.
uuianu, Diana-Elena, Lifelong
Learning and Foreign Language
Teachers, Sesiunea de comunicri
cu
participare
internaional,
Strategii XXI, Bucureti, 2011,
Buletinul sesiunii de comunicri
tiinifice.
Internet Links
8.
http://www.dw.com
Bibliography
1.
2.
103
Abstract: Due to increasing the pace of everyday life today, as it is increasingly dominated by national social
and economic unrest, as well as to the continous specialization on the other hand of offenders, the multiple task
of police function becomes every day more significant and more difficult. Therefore, naturally, in order to cope
as much as possible with all its duties, police need to possess a high professional capacity. Professional skills
can be gained only by serious methodological training and education in science ,,public order and safety in this
new science which is currently developing, the police science.
Keywords: public order, national security, rule of law, risk factors, human rights.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
104
15
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
105
18
24
Ibid p. 348
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
106
Economic
globalization,
liberalization of movement of goods,
services, information and people while
maintaining and deepening disparities
between continents, civilizations and
nations, caused the emergence of new
threats to modern civilization and the
crystallization of a new society and a new
type of state, specific to the high-tech era,
required also a remodeling of public order
structures.
The
democratic
regime
is
characterized both by advanced forms of
exercising the political rights of the nation
states citizens and by the civil society
control over the state apparatus; one being
able to say that democratic society is
planning and building its true doctrines and
systems of prevention and combating the
factors jeopardizing its internal stability.
The emphasis on prevention of risk
factors is one side of the internal public
order system that distinguishes a
democracy from a totalitarian regime. In a
democratic state, the prevention of and
combating actions which disturb public
order must become a political right of
responsible citizens, able to understand and
engage their own initiative in protecting
their fundamental values. In the totalitarian
state, internal security and public order do
not protect the interests of the majority
population, but of a ruling minority, which
has no interest in involving society as a
whole in defending objectives perceived as
foreign.
25
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
107
26
27
Anghel Andreescu and collective , public order Component of national security, Publisher , 1996
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
108
109
29
30
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
110
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
111
10.
11.
Bibliography
1.
2.
3.
4.
5.
6.
7.
8.
9.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
112
28.
29.
Online media:
30.
www.academia.edu.ro;
31.
www.politiaromana.ro;
32.
www.europa.eu;
33.
www.mai.gov.ro;
34.
www.mapn.ro.
This work was made possible through
financial support provided through the
Sectoral Operational Program Development
of Human Resources 2007-2013, cofinanced by the European Social Fund, in the
project POSDRU/187/1.5/S/155385, with
the title Security through knowledge
Integrated/educational
network
of
training, counseling and guidance of PhD
students for a career in research of
security, defense, public order and national
security - SECNETEDU.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
113
Abstract: Romania is going through a period of profound unrest with complex transformations and
developments that are reflected not only in the environmental policy and domestic security but also in the
regional and continental ones. The issues of risk, threats to public order and national security and vulnerability
contributing factors are not new, but the evolution and permanent transformation of society with inherent
problems, bring forward new phenomena, trends, behaviors, able to affect the public order and security of the
states. The realities of Romania reveal the need, in the system of public order, to crystallize a strategic culture
based on knowledge of the major trends drawn from the global evolution of threats to public order and safety.
Keywords: public order and safety, citizens, globalization, immigration, crime.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
114
115
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
116
2.4.
The
deepening
social
inequities and underground economy
proliferation
The two aspects can be highlighted
by a relationship of interdependence, as
follows:
amid
increasingly
sharp
differentiation among social classes and
the amplification of economic problems
for individuals, those affected tend to
procure the necessary subsistence and
other categories of goods or accepting the
services provided by them to individuals
who make a point to circumvent the law
and legal debt payment to the state for
trade, production, service delivery, etc.
In the domain of public order,
problems can arise in situations where the
relevant institutions and state security
forces intervene to restore legality and to
hold accountable those responsible. Being
satisfied with the benefits of the reduced
costs of such goods or services, citizens
can coalesce with those involved in illicit
activities, often criminals, and prevent the
staff entitled by law from applying legal
measures. Risks arise in this respect
particularly in the markets and fairs where
besides traders and those operating legally,
businessmen - under the umbrella of a
price advantage offered to buyers - harm
other traders, various companies, brands
and, last but not least, the Romanian state.
Underground economy is a pressing
problem, estimated in some open sources,
at 33% of Romanias GDP (about 50
billion).
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
117
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
118
3.
3. Conclusions
The risks, dangers and threats to
public order and stability have diversified
and some of their manifestations are
becoming increasingly hard to find in a
timeframe that allows for effective
measures to counteract.
The evolution of risks and threats is
characterized
by
an
extraordinary
dynamics, adapted to the socio-historical
conditions and changes in Romanian
society. In this context, institutions are put
in front of permanent and complex
challenges, which require response in a
realistic and flexible manner, as compared
to trends in the social environment,
especially in the field of security and order.
Currently, new trends in security and
therefore public order promote a proactive
approach to the issue in order to timely
anticipate and deter any events that may
affect the values of democracy, the
fundamental rights and freedoms of
citizens, the normal functioning of state
institutions.
4.
5.
6.
7.
8.
9.
10.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
119
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
120
Abstract: At the basis of each organizations performance, therefore the operating intelligence environment
included, the essential element to be found is communication good communication between hierarchical flows.
The quality and functionality of communication depend on the manner in which resources are used and the goals
that are met. The efficiency of organizations relies on specialized functions of the departments and individuals
and their complementariness. These basic features of organizational activity result in the need for exchange of
information between departments, between individuals, between the organization and its socio-economic
environment.
Keywords: internal communication, types of communication, communication barriers, subordination.
Introduction
Communication has an important
role in the relations between people,
therefore in society as a whole. People
interact socially, professionally and
privately. In organizations effective
communication is significant for managers
so as to perform the basic functions of
management, like planning, organizing,
leading and controlling. Communication
helps managers to perform their jobs and
responsibilities and serves as a foundation
for planning. All the essential information
must be communicated to the managers
who, in-turn, must communicate the plans
so as to implement them. Organizing also
requires effective communication with
others about their job tasks. That way, the
products of the organizations can be built
and disseminated to the beneficiaries,
which is the main purpose of the
intelligence ones. Organizations cannot
operate
without
communication.
Communication can take various forms but
all the forms involve the transfer of
information from one party to the other. In
order for the transfer of information to
qualify as communication, the recipient
must understand the meaning of the
information transferred to them. If the
recipient does not understand the meaning
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
121
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
122
Communicational barriers
in the intelligence organizations
The barriers that interfere with the
communication are diverse and can be
divided into two main categories:
barriers
to
interpersonal
communication, related to the lack of logic
in the desired message to be transmitted,
lack of clear subject that is being
discussed, requiring minimum knowledge
on the subject, a large amount of
information, too scientific or too poor,
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
123
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
124
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
125
2.
3.
Conclusions
Specific communication processes
of human resource management are
increasingly growing and communication
prospects are more promising. Internal
communication
within
intelligence
organizations is very important for the
smooth running of things, representing the
way in which its objectives are achieved.
As time passes, internal communication
derives more benefits from increased
attention. Managers devote more and more
of their time to communicating with
employees.
Organizational
communication
plays a particularly important role in the
proper functioning of activities undertaken
by its members. Internal communication of
intelligence organizations is what makes
the functioning of the organization
possible, through the activities and
processes that are undertaken within it.
Therefore human resource management
should focus on initiating numerous
studies, trainings, workshops, focus groups
etc. to establish better collaboration with
and among its employees.
4.
5.
6.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
126
Abstract: The theme of international terrorism is a matter of general interest, due to the global unpredictability
that it holds and the devastating effects that it involves. The development of terrorist organizations is based on
the principle of social networks, adopting the same components and interaction. Data analysis of terrorist
networks focuses on the actors (knots) and the relations (links) between them, taking into account the centrality
measures. An organization that acts as a network is analysed and the object of the study is the relationships
established among all the actors that are part of that network. The social actors are included in multiple network
links that are themselves embedded into other networks on multi-modal model structures.
Keywords: terrorism, social network analysis, risks, threats, national security
Introduction
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
127
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
128
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
129
As
for
the
means
of
communication and action of terrorist
organizations, the virtual environment
offers them support by rapidly adapting to
mass communication; developing their
own press agencies; making the sender
and receiver anonymous; the diversity of
means of transmitting information;
receiving material simultaneously and in
real time; management and organizational
communication measures; the rapid
coordination of fund collection and
distribution; support for executing media
operations that prejudice intelligence
services worldwide; the possibility to
make financial transfers while avoiding
traditional channels.
As a consequence of these issues,
government structures specialized in the
fight against terrorism have been put in the
situation of creating and developing
international entities that monitor the
Jihadist virtual space. The globalization of
mass communication and the 2.0 web
consolidations have been favourable for
the development of terrorist structures.
With the help of the Internet, terrorists
make use of the psychological component
of the war against the unfaithful by
inducing a feeling of insecurity that
influences the public affectively.
Integrating new technologies,
adopting modern work methods, such as
collaborative platforms (for brainstorming
useful
in
making
decisions,
disseminating tasks and methods of
operation, etc.) are all part of terrorists
current concerns.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
130
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
131
Conclusions
Terrorism is a negative universal
phenomenon due to its consequences on
all levels: victims, families that are torn
apart, bad image, loss of trust, numerous
psychological effects that impact the
development of individuals, affecting the
development of states. In contemporary
society, terrorist actions represent an
omnipresent threat to national, regional
and global security and the fight against it
represents a priority for international
organisations and intelligence services.
They can attack any state in the world
inopportunely, as the attacks thus far have
proven. The space of the proliferation of
risks associated with using social networks
is developed based on an increase in the
level of technology, the growing
dependency on interconnected components
and the need for interdependency in
electronic systems. In the area of security,
the solutions are limited and cannot ensure
the total elimination of risks, so that the
concentrated efforts of law enforcement
agencies require continuous support.
Moreover, using all aspects of
technologic evolution, the path of
Bibliography
1.
2.
3.
4.
5.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
132
6.
7.
8.
9.
10.
11.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
133
Marian BAHACIU
Marius-Sebastian BACCELA
Masters Degree Student, Carol I National Defence University
mariobanister@yahoo.com
Masters Degree Student, Carol I National Defence University
marius_baccela@yahoo.com
Abstract: In this article I will bring to attention some aspects of maritime operations assessment. Assessment of
progress in maritime operations, based on objective and subjective measurement processes of data and
information provides a useful set of tools to maritime commanders to increase the performance and effectiveness
of their actions. The paper aims to present a model of organization and functioning of an assessment structure of
a maritime command (maritime component, Maritime Operations Centre , Task Force or Task Group).
Keywords: assessment, indicatori de performan MOP, indicatori de eficacitate- MOE.
However beautiful the strategy, you
should occasionally look at the results.
Winston Churchill
2 Processes for Assessing Outcomes of Multinational Missions, Findings of Task Group HFM185, STO Techincal Report, 2012
134
135
136
137
Points of Coordination:
1. Internal:
a. Current operations;
b. Future operations;
c. Maritime planning group;
d. Information operations cell;
e. Maritime intelligence operations
center;
f. Logistics readiness center;
g. Commanders special assistants,
as required;
h. Knowledge and information
management WG;
i. Maritime air operations cell;
j. Fires element.
2. External:
a. Higher headquarters assessment
cell
b. Component
commanders
assessment cells
c. Subordinate commanders staffs
d. Other agencies, as required (other
Government agencies, NGOs,
HNs, etc.).
Inputs:
1. Commanders guidance and
intent;
2. OPLANs/OPORDs;
3. Center(s) of gravity, operational
approach, decisive points, and operational
objectives;
4. Approved operational conditions,
by phase;
5. Essential tasks;
6. Approved assumptions and
acceptable risk (to force, to mission);
7. Approved MOEs and MOPs;
8. ROE/RUF;
9. Approved CCIRs/RFIs;
10. Approved commanders decision
points;
11. Current operational situation,
including enemy reaction.
Outputs
1. Operational assessments relating
to the progression of the plan, fulfillment
of intent;
2. Operation phase transition and
force
reallocation/reprioritization
recommendations;
138
3. Operation
replanning
recommendations (branches and sequels);
4. Proximal estimations of pending
commanders
decisions,
based
on
operational conditions;
5. Risk assessment;
6. ROE/RUF/CCIR/RFI
change
recommendations;
7. Assessment
reports
and
recommendations regarding synchronization
of forces and functions to the Commander
and higher headquarters. 5
Operations
assessment
and
operational planning. Recent operations
have demonstrated the importance of
139
140
141
MOEI
1.1.2.2:
Number
of
engagements where hostile aircraft close to
X NM of coalition ships.
OPR: CTF XXX
MOEI 1.1.2.3: Number of CDCM
radars active with coalition ships within X
NM.
OPR: CTF XXX6
COA analysis provides assessment
cell the opportunity to examine in detail
how the COA can progress in connection
with the assessment plan. COA analysis
offers the chance to test the validity of
MOE, MOP and to review the assessment
plan .
Monitoring is the manner where
staffs observe and collect relevant
information, specifically that information
about the current situation that will allow
comparison to the forecasted situation
defined in the commanders guidance,
intent and concept of operations.
The staff then analyzes and
evaluates relevant information collected, to
gauge the degree of the operations
progress. Comprehensive evaluation helps
commanders determine what might be
working, what might not be working, and
what might be needed to better accomplish
the mission.
Commanders options range from
continuing the operation as planned,
executing a branch plan, reallocating
resources or making changes in priority to
creating an entirely new concept of
operations with new actions not anticipated
in original planning. Making adjustments
includes assigning new tasks to
subordinates,
reprioritizing
support,
adjusting the other plans (ISR, protection,
etc.), or modifying a course of action in
entirety.
Commanders
integrate
recommended options based on feedback
from the staff, subordinate commanders,
and other partners.
142
Conclusions
A well designed operations
assessment can improve the reliability and
quality of operations plans. The act of
describing the planned objectives in
measurable terms provides planners a
better understanding of the elements
affected by the proposed intervention
systems. It can thus reveal the
interdependencies inside the operational
environment. At the same time, it helps
prevent planning by headlines, a military
plan that contains radical statements about
the desired changes and planners are asked
to describe abstract objects (eg "security)
in specific and measurable terms.
3.
4.
5.
Bibliography
1.
2.
6.
143
Report,
2012,
available
at
https://www.cso.nato.int/pubs/rdp.asp?
RDP=STO-TR-HFM-185,
accessed
on 09.09.2015
Mushen, Emily, Schroden, Jonathan,
Are We Winning?A Brief History of
Military
Operations
Assessment,
Septembrie, 2014, available at
http://oai.dtic.mil/oai/oai?verb=getRec
ord&metadataPrefix=html&identifier=
ADA609967, accessed on 09.09.2015
Operations Assessment Manual, SMG60, General Staff, Bucharest, 2012
Navy Tactics, Techniques, and
Procedures, Maritime Operations
Center, NTTP 3-32.1, edition April
2013, Department of the Navy,
Office of the Chief of Naval
Operations
available
at
https://www.usnwc.edu/.../Maritime..
./ NTTP_3-32-1_MOC_(Apr_2013)
accessed on 09.09.2015
Navy Planning, NWP 5-01, Edition
December 2013, Department of the
Navy, Office of the Chief of Naval
Operations available at https://www.
usnwc.edu/getattachment/171afbf3a1e2-46b3-b1e9-d1fa4
b0fec5a/501_(Dec_2013)_(NWP)(Promulgated).aspx, accessed on
09.09.2015.
Abstract: Although the geostrategic conditions have changed naval priorities ,especially after the end of the
"cold war", the antisubmarine warfare still remain an important and complex issue.The antisubmarine warfare
should be deployed in accordance with the revised, new threats and the requirements of the operations area near
the coastline, as well as possibilities of submarines in these regions and methods and procedures utilized by the
forces involved in antisubmarine warfare should be adopted to the new chalange.
Keywords: submarine, target, system, integrated, coastal waters
144
145
3.
Bibliography
1.
2.
. Milan Vego, Patroling the deep - Critical antisubmarine warfare skills must be restored, pe
www.usnwc.edu/afl_, accesat n 22.09.2015
146
MINE COUNTERMEASURES
IN THE ACTUAL GEOSTRATEGIC SITUATION
Lorin CHIFOR
Emanuel UNGUREANU
Masters Degree Student Carol I National Defence University
lorin_rc@yahoo.com
Masters Degree Student Carol I National Defence University
manucu_75@yahoo.com
Abstract: During military operations of any kind, which are executed in a naval environment, use of mines by a
potential enemy can be a significant threat to the success of the overall operation, an eloquent issue in the
history of wars. It is very important that the enforceability of naval operations, airborne or otherwise, of mining
by hostile forces during a period of tension, should be considered as a threat of such operations in a conflict.
When mining occurred or enforceability mining, an effort for Mine Countermeasures was necessary, in order to
allow military vessels and their commercial allies to freely use seas and enter / stand / in ports in support of
allied forces and of the civilian population, with minimal damage or loss caused by marine mines.
Keywords: Mine Countermeasures, marine mine, mine risk, offensive, defensive forces and means,
minesweeping, mine hunting.
1. Introduction
One of the main elements of
expression of a state maritime power is his
naval power. Quantifying the naval power
of the state is given mainly by sizing
composition and naval forces. Its principal
expression results in defending its
maritime interests in the areas concerned.
For the effective exercise of naval
power and conduct of operations in the
maritime area it is necessary to establish
strategy naval / maritime concepts from
naval strategy as part of the military art
(military science). The main concepts of
the naval strategy established by the
theoreticians (the sea control, sea denial,
attack
communications,
defense
communications,
maritime
power
projection)1 remain applicable today, but
ways and means of implementing them in
practice, expressed through official
documents have been in a continuous
process of adapting to developments in
147
148
149
4. Mine countermeasures5
We use the
countermeasures.
150
acronym
MCM
for
Mine
151
152
2.
3.
4.
5.
6.
Conclusions
As in the past, mine warfare will be
extensively used by both the stronger and
the weaker sides at sea. Mines are
generally cheap. They can be produced or
acquired in large numbers. Even old mines
can be very lethal. The new smart mines
represent a growing threat for which no
6
153
Context
In our times, the rise of the global
economy and thus international trade and
maritime transport in particular, requires a
good knowledge and understanding of the
maritime domain in order to prevent any
risks and threats. Globally, Maritime
Domain is one of the important strategic
areas. As a result, the littoral states have
strategic interests on identifying and
tackling security challenges related to the
sea and maritime borders management.
While increasing marine traffic, the
threats have increased on the shipments, as
well as port facilities, coastal and oil
platforms, therefore maritime security has
become particularly important. Any
disruption of maritime traffic, even on
short term, would have a serious impact on
international trade and implicitly on the
economy of states.
Protecting maritime commerce
from attack or exploitation by pirates or
terrorists is critical to the security of the
global market. Maritime security has also a
major defense dimension because military
seaborne transport will remain crucial for
future operations.
MSA Concept
MSA is an evolving concept that
emerged from the need to improve safety
and security for US citizens after
september 2001 (9/11). Initially it started
from the concept Situation Awareness that
was used by USAF aircraft, and then it was
extended to the maritime domain.
The concept developed by US is
MDA (Maritime Domain Awareness) the effective understanding of anything
154
MDA
MDA
Plan
NATO
MDA MSA
Navy
MDA
NATO
MSA
Def.
UE
MSA
Def.
9/11
2001
2005
2006
2007
2008
2009
SA
70-80
USAF
155
Creating MSA
Creating MSA depends on the
ability to monitor maritime domain
activities so that trends could be identified
as well as differentiated anomalies. Data
should be collected, condensed and
analyzed, preferably using computing
applications in conjunction with various
sources of information so that decision
makers at stretegic/operational level can
anticipate risks and threats, and they could
take the initiative to counter them.
MSA depends on the exchange
information which is in large volumes.
Then, the resulting information must be
shared according to the beneficiary,
considering that at the MSA/MDA level
there should be protocols for protecting
classified information and/or confidential
information from the private sector.
To improve the MSA, the focus on
the diversity of data sources and the
multiple information, integrating them,
then useful information can be shared to
authorities in the field, for operational
activities.
Globally, in the Maritime Domain,
there are various sources on the data
available for MSA, such as: data from
sensors (Automatic Identification System AIS, Sat-AIS, Long Range Identification
and Tracking system - LRIT, VTS coastal
radars, surveillance and HF radars, OTH
radars, Synthetic Aperture Radar - SAR,
active and passive sonars), data from
websites ports (arrivals and movement
data), data from agencies and publications
(MMSI, Lloyd's MIU, Lloyd's Register
Fairplay), and data from other sources.
MSSIS
Maritime Safety and Security
Information
System
(MSSIS)
was
conceived by the U.S. Department of
Transportation, NATO and US Navy as an
unclassified, multinational, freely shared,
AIS network. This system was designed by
Volpe (federal agency that is part of the
US Department of Transportation, which is
financed entirely from sponsorship
projects) to develop networks to support
MDA/MSA.
This project originally started in
September 2005 through a demonstration
presented to NATO and the US Navy Sixth
Fleet (C6F) representatives, in which the
utility of AIS network was shown between
ports Rota (Spain) and Souda Bay
(Greece). In September 2006, Turkey,
Greece and Spain officially joined MSSIS,
156
BRITE
Subsequently, in March 2008, over
52 countries4 were linked to this system
including Romania, and today more than
70 countries joined MSSIS network.
Countries participating in the network
MSSIS significantly improved their
maritime safety and their economic
stability.
At the moment MSSIS is a lowcost, unclassified, near real time network
which is used to track ships as they cross
waterways in the world5; the main purpose
is to increase maritime safety and security
Volpe, http://www.volpe.dot.gov/sites/volpe.
dot.gov/files/docs/Maritime%20Safety%20%26%2
0Security%20Information%20System_Enabling%2
0Global%20Maritime%20Situational%20Awarenes
s.pdf, accessed at 28.09.2015.
5
Volpe, http://www.volpe.dot.gov/infrastructuresystems-and-technology/situational-awareness-andlogistics/maritime-safety-and,
accessed
at
28.09.2015.
157
158
Project TRITON
Project
TRITON
provides
functional services for Command and
Control of Maritime Operation. First Stage
Authorisation of Project TRITON was
granted on 27 May 20148.
TRITON will provide a set of
services required to be used through
NATO Command Structures (NCS) in
peacetime, exercises, and time of crisis
(operations) in order to provide to decision
makers the necessary information to help
them in the decision making and action.
The key capabilities to be provided
through this delivery are:
- replacement of MCCIS functionality
that
supports
operational-level
Maritime C2, MSA, and RMP;
- replacement of MSA functionality for
White Shipping currently supported by
the BRITE;
- building and dissemination of White
Picture (WP) and RMP;
- using information received from
National maritime C2 systems and
commercial maritime services to build
the WP and RMP;
- The Water Space Management and
Prevention of Mutual Interference
(WSM/PMI) segment of Maritime
Operational Planning;
- interoperability with other relevant
NATO systems and Functional
Services;
- providing Deployable Kits for Afloat
Command Platforms to operate
TRITON in standalone mode for both
domains.
From an operational perspective
TRITON as against MCCIS has many
users, a better display and visualization,
providing image for MSA (including WP,
RMP, Military Picture, Maritime Info
Management), maritime alerts, and from
the technical point of view the
infrastructure is improved.
NCIA,
https://www.ncia.nato.int/News
Room/Pages/140605-MISC_2014.aspx, accessed at
26.09.2015.
159
SCOMAR
SCOMAR11 is an operational
system of surveillance based on art
technology that enables the early detection,
12
Figure 4. SCOMAR12
tracking, recognition and identification of
vessels carrying illegal traffic to the Black
Sea. Technical support provides the
transmission in real time of information
obtained from the sensors to Command
and Control Center and the necessary
dispositions for intercepting threats and
carrying search and rescue missions.
This system will ensure ongoing
monitoring of traffic on the Black Sea, the
main objective of which is to ensure
Romanian maritime border surveillance
and European Union border surveillance.
SCOMAR is an independent
system that ensures interconnection and
access to databases of institutions of the
Black Sea, as follows: Border Police
(Ministry of Interior), RO Navy (Ministry
of Defense), the Romanian Naval
Authority (Ministry of Transport). At the
Bibliography
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11
160
Abstract: Providing material resources necessary for developing a modern army is a priority of politico-military
decision makers, in order to conduct the operations of military forces. They are especially important in
developing a modern army and a health system to meet the needs of the general population, and in particular
military personnel. In the present paper we tried to emphasize the importance of material resources in the
military health system but also the importance of health research.
Keywords: Material resources, the military health system, infrastructure, health research.
Introduction
Loosely, material resources are
determined by the development level of the
current economies of states and natural
resource consumption. The material
resources represent the totality of goods
equipment, raw materials, fuel, energy, etc.
which can be employed / used at a time, in
a well-defined purpose.
In this context, in our view,
material resource management consists of
all activities directed towards ensuring,
development, satisfaction and maintenance
of the needs of force with maximum
efficiency in order to achieve specific
objectives to fulfill its mission and needs
of employees.
Management of material resources of
administration
Conceptualizing the notion of
management of material resources
administration of a project, as theory and
practice of management, aims primarily at
the efficiency of supply, in order to avoid
delays, purchasing goods suited for an aim
pursued and time bordering.
Increasing anticipative character of
the management, reflected by emphasizing
the importance of supply management,
mainly due to pressure from the technical
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
161
Infrastructure management
in the military health system
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
162
security
management
of
people, users, those providing services,
visitors;
Actions taken to manage premises:
preventive actions: technical
controls, insurance of compliance, alarm
devices, control of risks (the accidental
stopping of the operation of certain
equipment, malfunctions, works in external
services, etc.);
maintenance
actions
/
maintenance;
assessment actions (operational
studies, audits of equipment / facilities,
etc.);
actions to ensure the quality,
safety and hygiene.
Methods of managing premises:
carrying out the activity in
suitable premises, that meet current legal
and regulatory requirements for the
provision of health services;
hospital premises management
considers conducting both under normal
conditions (routine appointments or
planning) the activity of providing health
services and the possibility of emergency
situations, of risk (total power failure, fire,
earthquake, etc.). In case of crisis a plan is
drawn up for the influx of victims and
permanence is provided 24/7.
Management of medical and nonmedical equipment:
the use of medical and nonmedical gear and appropriate equipment,
properly maintained to ensure the quality
of medical service provided;
defining the performances
associated (delivery, placing into service,
training users, maintenance and preventive
and corrective interventions);
control of the life cycle of
equipment and continuity of the servicing
through restrictions on installation,
maintenance, control and scrap;
compliance with laws, regulations
and practices relating to surveillance.
Managing
of
supplies
(pharmaceuticals and non-medical):
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
163
1.
Conclusions
2.
3.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
164
4.
5.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
165
Abstract: The need to identify solutions to ensure the highest level of resources, in the context
of budgetary constraints imposed by the economic situation of Romania, has become a
challenge for commanders of Gendarmes structures. Meeting the challenges requires
conceptualization of decision-making system notions, organizational and information system
elements, essential for an efficient management of material resources in the structures of
gendarmes and their practical implementation.
Keywords: management, material resources, gendarmes structures, decision system,
organizational system, information system.
Gendarmes structures are a police
force with military status, performing
defense and public order missions, rights
and freedoms of citizens, public and
private property, protection of state
institutions and combating terrorism, as
well as other duties stipulated by the law.
Gendarmes specificity is this duality
police force, on one hand, and military
structure, on the other hand, feature that
makes the management systems applicable
to other structures of the national defense,
public order and national security
impossible to be applied in the Romanian
Gendarmerie and requires creating their
own doctrines, concepts and models in
terms of material resources management.
The material resources are one of
the central elements of planning any
activity, as they provide material support
for tasks and missions.
Material resources management is
all the evidence, organizational and
information character elements, through
which all the processes and management
relations are possible, in achieving the
tasks of the support structures for carrying
out the Romanian Gendarmeries tasks.
166
167
168
Ibidem, p. 127.
Vasile Deac coordinator and staff,
Management, Publishing ASE, Bucharest, 2014,
p. 140.
10
11
12
169
16
170
19
171
Conclusion
Given the presented material, we
can say that the three systems - decisionmaking, organizational and information are essential elements of the management
of material resources which act
synergistically in support of leadership and
performance achievement, the specific of
Gendarmes structures comes from the fact
that at present, they are not conceptualized,
the
formalization
need
of
such
scientifically systems being more visible,
our proposals in this regard are the
following:
in order to ensure the
performance of the material resources
management in Gendarmes structures, the
decision making system must meet the
following characteristics: the decision
must have preparatory work involving a
large number of departments or
individuals in their interaction to make the
best decision possible, decision - makers
should undertake a special training in
management requirements area that should
ensure professionalization of decisionmakers and their collaboration capabilities
with the organizations experts, to develop
tools for decision-making and evaluation
of their decision must meet standards
20
172
3.
Applications,
Publishing Academy for Advanced
Military Studies, Bucharest, 2003.
Col. dr. Florin Jianu, Particularities
of the military affairs resource
management, in the Bulletin of the
5.
173
Abstract: An event or a situation which produces extreme stress exceeds the persons ability to manage it and,
afterwards, the individuals subjective experience is the one that concludes whether the event is traumatic or
not. From the therapeutic point of view, we are preoccupied with identifying both the subjects who perceive
stress as a challenge, anticipating some rewards, and those individuals who perceive stress as a failure,
anticipating loss / lack of fulfillment. The diagnosis of stressors helps us focus on the coping mechanisms which
are necessary in the stressful situations at work and in everyday life. Occupational stress overload during jobspecific activities (in army, police etc.), domestic or professional repeated abuses, victimization and
helplessness feelings, all of these can generate traumatic reactions, chronic stress and eventually depression.
Moreover, due to the chronic professional stress which creates vulnerability, employers should provide to their
employees continuous psychological assistance and intervention in order to improve satisfaction and
occupational health. Traumatic life events are associated with significant neuroendocrine stress response
changes (glucocorticoid resistance, increased CRF activity, decreased hippocampal volume), closely
paralleling the neuroendocrine features of depression and, thus, increasing the risk to develop vulnerability for
depression. On the other hand, stress is a constant presence in our lives, which affects individuals health and
safety as well as organizations welfare and national economies. This daily reality creates a constant mix of
tension, strain and discomfort, which traumatically affects physical and mental health and creates
psychological vulnerability.
Keywords: occupational stress, coping mechanisms, psychological assistance, occupational health, satisfaction
3
1
https://www.webdex.ro
http://www.samhsa.gov/traumajustice/traumadefinit
ion/definition.aspx
174
175
11
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC
3884028/
12
Post RM. Transduction of psychosocial stress
into the neurobiology of recurrent affective
disorder. American Journal of Psychiatry.
1992;149:9991010.
13
Stroud CB, Davila J, Moyer A. The relationship
between stress and depression in first onsets versus
recurrences: A meta-analytic review. Journal of
Abnormal Psychology. 2008;117:206213.
14
Mazure CM. Life stressors as risk factors in
depression. Clinical Psychology: Science and
Practice. 1998;5:291313
15
http://www.psychguides.com/guides/posttraumatic-stress-disorder-symptoms-causes-andeffects/
16
Hammen C. Stress and depression. Annual
Review of Clinical Psychology. 2005;1:293319.
176
Conclusions
Stress is constantly present in our
lives and affects the health and safety of
individuals, as well as an organizations
welfare and national economies. This
daily reality creates a constant mixture of
tension, feelings of inadequacy and
discomfort, affecting the physical and
mental
health
and
producing
psychological vulnerability. Stressful
situations during training or job-related
ones (for people working in the military,
police, gendarmerie, etc.), professional or
domestic repeated abuse, victimization
and feelings of helplessness can all result
in traumatic reactions, chronic stress and
possible depression. Given that chronic
professional stress produces vulnerability,
employers should provide staff with
assistance and continual psychological
intervention in order to improve the
degree of satisfaction and occupational
health.
Bibliography
1.
2.
https:// www.webdex.ro
http://www.samhsa.gov/traumajustic
e/traumadefinition/definition.aspx
3. Moroz,
K.J.
(2005).
The Effects of Psychological
Trauma
on
Children
and
Adolescents. Report Prepared for
the Vermont Agency of Human
Services Department of Health
Division
of
Mental
Health
Child, Adolescent and Family Unit
4. DePrince, A.P. & Freyd, J.J. (2002).
"The Harm of Trauma: Pathological
fear, shattered assumptions, or
betrayal?" In J. Kauffman (Ed.) Loss
of the Assumptive World: a theory of
17
177
13.
14.
15.
16.
17.
18.
19.
20.
178
Abstract: We are witnessing the emergence of a new geopolitical and geostrategic barrier between the North, a
wealthy and prosperous region, and the South, economically more imbalanced. We anticipate that this barrier
will not disappear; on the contrary, it will become more powerful. We are currently witnessing this ongoing
phenomenon, which is favored by the current international security environment. Romania is at the confluence
of these two major regions and is directly affected by this phenomenon. Considering these trends, the purpose of
this research is to bring in strategic models in order to identify and manage national resources for defense.
Romania will have to find international solutions regardless of possible scenarios and given the extensive
national security concept1, which represents the milestone of the National Defense Strategy 2015-2019. The first
scenario is: Romania will have to compensate the financial incapacity to allocate 2% of GDP on defense in the
near future. The second scenario: strengthening the defense investments. Regardless of these scenarios,
Romania needs strong relationships with allies and foreign partners. The European security landscape has
changed and these are long term changes. This requires a reassessment of assumptions in relation with the
Nordic countries, in order to overcome the geographical barrier and turn it into an asset that would compensate
as far as possible the economic disparity between the North and the South.
Keywords: strategy, defense, resources, management, security.
1.
http://edition.cnn.com/2015/07/02/opinions/ashford
-greece-security-implications/, accessed at August
29, 2015.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
179
North-Atlantic
Alliance,
maintaining
neutrality.
Analysing the Foreign, Defence
and Security policies of the five Nordic
European countries we notice that they act
on several levels in the current
international context. National resources
are used for defense and security through
actions meant to counter possible sabotage
against the national infrastructure and
economy, possible terrorist attacks, cyberattacks on vital sectors, infiltration /
espionage on levels of strategic decision,
pressure on policymakers through the
media or NGOs and even possible military
attacks5.
3.
Points of view on strategic
models for generating and managing
national resources
One of the theories that found
applicability in the field of defense and
security is the theory of Arthur F. Lykke
Jr., professor at the US Army War College.
According to him, resources, strategic
concepts and strategic objectives represent
the three pillars of a strategy in the military
field6 and these elements are also valid in
the case of national defense and security
strategies. These pillars are interconnected
and they need to be properly formulated,
balanced and realistic in order to have an
effective final document.
The liaison element between the
risk identification and the tracing of goals
is represented by the national resources.
Their situation must be presented in a
detailed, transparent and controllable
5
Swedens Defence Policy 2016 to 2020 http://www.government.se/governmentpolicy/defence/the-swedish-defence-bill-20162020, accessed at September 3, 2015; State
Secretary ystein Bs Speech on Norwegian
Security and Defense Policy, September, 1st , 2015
de secretarul de stat din Ministerul Aprrii, https://www.regjeringen.no/en/aktuelt/statesecretary-oystein-bos-speech-on-norwegiansecurity-and-defense-policy-at-mspo-2015-inpoland/id2438200/, accessed at September 5, 2015.
6
LYKKE, Arthur Jr, US Army War College Toward an Understanding of Military Strategy,
1989.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
180
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
181
Bibliography
Official documents and legislation
1. Political Agreement on increasing
funding for National Defense
http://www.presidency.ro/static/Acord
ul%20politic%20national%20privind%
20cresterea%20finantarii%20pentru%2
0Aparare.pdf
2. The United Nations Charter www.un.org/en/documents/charter/indx.
shtml
3. The Romanian Constitution / 2003;
4. Amending law of the Romanian
Constitution no. 429/2003;
5. The Government Program 20092012http://www.cdep.ro/pdfs/guv20091
2/ProgramGuvernare.pdf
6. The Government Program 2013-2016
http://gov.ro/fisiere/pagini_
fisiere/13-08-02-10-48-52program-deguvernare2013- 20161.pdf
9
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
182
European Council
http://epp.eurostat.ec.europa.eu/por
tal/page/portal/statistics/themes Eurostat;
www.cnn.com - CNN
www.defmin.fi/en/publications/finn
ish_security_and_defence_policy Finnish Security and Defence
Policy 2012
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
183
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
http://www.fmn.dk/eng/Pages/Fron
tpage.aspx - Ministry of Defense,
Denmark
www.gov.ro
Romanian
Government;
www.mae.ro
Ministry of
Foreign Affairs, Romania;
www.mapn.ro Ministry of
National Defense, Romania;
www.mfa.is/ - Ministry of Foreign
Affairs, Iceland;
www.nato.int NATO;
www.osce.org Organization for
Security and Co-operation in
Europe;
www.presidency.ro - Romanian
Presidency;
www.regjeringen.no Norwegian
Government;
www.regjeringen.no/en/aktuelt/stat
e-secretary-oystein-bos-speech-onnorwegian-security-and-defensepolicy-at-mspo-2015-in-
17.
18.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
184
Abstract: Information Operations are a force multiplier allowing us to obtain effects over the enemy. National
policies and strategies are those that define and create the proper frame for the execution of effective
Information Operations. Efficiency can be achieved by concerted actions on the Information Environment of all
capabilities, tools and techniques specific to Information Operations, by following certain principles and based
on a continuous and correct analysis of the information environment.
Keywords: information operations, target audience, effects, effectiveness, analysis of the information
environment.
Information operations are both a force multiplier
and an integrator and coordination mechanism that
helps to support commanders in achieving their
objectives and implicitly their forces in the
accomplishment of their assignments1.
Doctrine for Information Operations
Information1Operations
(hereinafter Info Ops) are a concept that
was defined by the national military
domain in 2006 on the S.M.G./F.O.P.
3.15. Doctrina operaiilor informaionale.
The concept was later improved with the
appearance in 2011 of the S.M.G./C.O.
10.0.,
Doctrina
operaiilor
informaionale. This doctrine that is still
relevant today represents the adapted
version of Romanian military experts of
the AJP-3.10, Allied Joint Doctrine for
Information Operations. In 2014 SMG-90
Information Operations Manual was
issued, a document that implements at
national level NATO Bi-SC, Information
Operations Reference Book.
These national documents are two
very useful tools primarily to specialists
commissioned on information operations
as well as to specialists from headquarters
and commanders. It is obvious to all these
users of the two instruments that
information operations are a set of
Ibidem, p. 13.
Robert Thompson, apud Octavian Manea, Osama:
un
Mao
n
era
www,
http://www.contributors.ro/global-europa/osamaun-mao-in-era-www/ accesat n 30 mai 2015.
3
185
186
187
188
Policy
on
189
8.
9.
10.
11.
Bibliography
12.
1.
2.
3.
4.
5.
6.
7.
C.,
Ichimescu,
Information
Operations in the current security
environment,
Strategies
XXI,
Editura Universitii Naionale de
Aprare Carol I, Bucureti,
volume 3, 2015;
C., Ichimescu, Mediul informaional
n contextul globalizrii, Tactic i
art operativ, Fore terestre,
TAOFT 2015, Editura Universitii
Naionale de Aprare Carol I,
Bucureti, 2015;
R., Thompson, apud O., Manea,
Osama: un Mao n era www,
http://www.contributors.ro/globaleuropa/osama-un-mao-in-era-www/;
The Royal Military Academy
Sandhurst, Developing Leaders. A
Sandhurst Guide, Pilot version
Easter 2012;
E., Von Manstein, Lost Victories,
Zenith Press, 2004.
190
Abstract: The paper presents some aspects regarding the history of the internal audit in the Ministry of
National Defense, respectively the setting, evolution, role and significance of the Internal Audit Directorate. It
starts from the establishment in 2000 of the internal audit department by transforming the former financial
control management structure. It identifies the evolution of the internal audit department, from the initial
approach essentially performing compliance audits, up to carrying out, with significant results, highperformance audit missions. The analysis performed takes into account a comparison between the
representative departments of internal audit at public entities in Romania. An SWOT analysis is conducted onto
the Internal Audit Directorate of the Ministry of National Defense.
Keywords: audit, Internal Audit Directorate, Ministry of National Defense, risk management, assurance,
corporate governance.
Conceptual demarcations
191
Indicators
Internal Audit5
External Audit6
Addressee
/information user
- Management of the
organization
- External
environment
Objectives
- Improving the
management of public
entities.
- Adds credibility
and reliability to
the financial
statements or to
their components;
Coverage
Responsibilities
for improvement
Imposes
- no
sanctions
As it can be seen from the table
above, making "confusions" regarding
the function of internal audit can only
be either because some people remain
dependent "on the past of internal
audit" (built on the former financial
management control structures) or
because they are not "familiar" with
this activity.
- Financial
reports; financial
reporting risks.
FMC Financial
management control7
- Management of the
organization
- Ensures the integrity
of the patrimony;
- Obeys legal
provisions and internal
regulations, incident to
economic and financial
activity;
- Enhances the
efficient use of
allocated resources.
- Economic
and
financial activities;
- accounting.
- conformity
- none; however,
there
is
an
obligation to report
problems.
- no
- yes
192
http://www.mapn.ro/structuri/dai/ organigrama.
htm, accessed on 19.08.2015;
193
11
194
1%
4%
5%
90%
Directorate
Office
Service
Department
14
195
196
14%
19%
8%
19%
11%
48%
Implemented
Partially implemented
not implemented
out of limit
197
EXTERNAL ORIGIN
(attribute of the environment)
INTERNAL ORIGIN
(attribute of the organization)
HELPFUL
HARMFUL
to achieving the objective
to achieving the objective
STRENGTHS:
WEAKNESSES:
- Valuable team of auditors, with - Limited financial resources;
significant experience in the fields of - Lack of dedicated software for the
interest, who can carry out a wide range audit activity;
of tasks;
- The perception by some managers of
- Collective assurance of the audit the internal audit as a management
competence;
financial control structure;
- the existence of internal audit - Limited use of computer network
postgraduate course at "Carol I" National INTRAMAN to collect information;
Defense University;
- Limited numbers of auditors who
- Ensuring pioneering in system and hold
internationally
recognized
performance
audit
in
Romania; certifications;
conducting such tasks every year;
- The system provides "limited"
- Providing
assurance
to
the possibility of finding out information
management regarding the carrying out about the identified dysfunctions, with
of purchasing procedures;
negative impact on the implementation
- Existence of an efficient training plan of the lessons learned at the level of
of auditors;
the audited structures;
- Carrying out mixed audit tasks together - Lack of specialized auditors in
with similar structures from other information systems.
countries;
creating
exchange
of
experience with internal audit structures
from other armies;
- Having strategic importance for the
functioning of the Romanian Army.
OPPORTUNITIES:
THREATS:
- Exploiting to the full the audit - Difficulty in attracting the staff;
capacities by the MoND management;
- Dependence in some local structures
- Making the most of the gained in some areas of activity, on "unique"
experience (maturity in the act audit);
auditors (only specialized in one area);
- Increasing system and performance - Limited staff, as compared to the
audit tasks in the fields/activities of growing need of military organization
interest;
management;
- Maximizing
the
professional - Maintaining the independence and
experience of the auditors, in order to functionality structure;
reduce the period of specific tasks;
- Starting late the activity of certifying
- Making use of IT solutions;
the internal auditors by the Central
- Introducing efficiency, effectiveness Harmonization Unit for Public Internal
and economy in the audit activity;
Audit.
- Integration / takeover in coordination
of prevention and investigation of fraud
structure, consistent with the practice of
developed countries.
- Reducing internal audit period by
- Building a valuable team of
using information technology;
auditors through attestation/certification of
- Improving the information flow;
internal auditors;
198
- Improving
the
auditors
competences which should allow them to
perform a wide range of tasks;
- Increasing its presence and
visibility within the MoND.
Even though audacious, the objectives
proposed to be implemented by 2026 are
feasible if, by that date, as I detailed
above, Internal Audit Directorate has
acquired a valuable team of internal
auditors. In our opinion, the only limits to
achieving these targets are the financial
and material resources and the open
attitude of management entities towards
the audit act.
5.
6.
7.
8.
Conclusions
9.
Instead of a conclusion, we will
realize a SWOT analysis of the Internal
Audit Directorate within the Ministry of
National Defense, which in our view can
project an overview of the audit function
in the Romanian Army, regarding the
factors that support or those which
jeopardize the achievement of specific
objectives.
Based on this analysis, we consider
that we can envisage within the vision,
other objectives that contribute mainly to
the efficiency of the internal audit activity.
10.
11.
Bibliography
1.
2.
3.
4.
12.
13.
14.
199
Government
Emergency
Ordinance no. 74/2000 on the
organization and functioning of
the Ministry of National Defense;
Government
Emergency
Ordinance no. 14/2001 on the
organization and functioning of
the Ministry of National Defense;
Methodological
Norms
on
organizing and exercising financial
management control, approved by
the Government Resolution no.
1151/2012;
The general norms for the exercise
of the internal audit activity,
approved by the Government
Decision no. 1086/201;
Internal Control/managerial Code
of public entities, approved
through the Order of the
Government General Secretariat
no. 400/2015 for approving;
IA-1, Methodological Norms on
the organization and functioning
of the internal Audit in Ministry of
National Defense, approved
through the Order of the Minister
of National Defense no. M.
81/2000;
PIA-1, Standards regarding the
activity of public internal audit in
Ministry of National Defense,
approved through the Order of the
Minister of National Defense no.
M.87/2003;
Methodological Norms regarding
the public internal audit in the
Ministry of National Defense are
applicable, approved through
Order of the Minister of National
Defense no. M.67/2014;
Ghi, Marcel, Sprncean, Mihai,
Internal audit in the public system,
Economic
Publishing
house,
Bucharest, 2006;
Public internal audit Course,
"Carol I" National Defense
University Publishing House,
Bucharest, 2012;
15.
16.
17.
18.
19.
20.
21.
22.
200
Lucian MOLDOVAN
Ph.D. candidate, Major, Chief of Training and Operations, 3rd Air Defense Battalion
"POTAISSA", Turda
luci_moldo@yahoo.com
Abstract: The volume of the air operations conducted by a hypothetical air enemy and the performance of the
new technologies have imposed a targeting process which should contain the integration and the
synchronization of the air defense structures firings with the maneuver of the defended forces, as part of the
group of activities conducted by the commander and his staff. "This involves the continuous conduct of a cycle
consisting in the following functions: decide, acquire, engage and assess- functions which, correctly applied,
provide the timely engagement of air targets with the most efficient fire system and with minimal resources."1
The targeting structure specialized in engaging air targets has the responsibility to actively participate,
alongside other structures, in the management, planning, coordination and synchronization of actions during the
operation planning, contributing with activities specific to the targeting process. The air threat targeting process
is an ongoing, dynamic and iterative process, which takes place at all levels, based on the operational
assessment and the apprehension of the situation.
Keywords: targeting, vertical component, air target, air threat, course of action.
1. Introduction
The1friendly forces, by their land,
air and sea components, use the airspace to
fulfill certain purposes that include
reconnaissance and surveillance, fire
direction, maneuver, transport and combat
control. Thus integrating the operations
conducted by the force components with
those performed by air and air defense
assets in air space defense operations
contributes to achieving and maintaining a
certain degree of control over it, the air
protection of forces, winning the
information warfare, the synchronization
of the land and naval operations with the
air operations being fundamental to the
success of operations. The land operations
are supported by the air defense forces by
reconnoitering, detecting and engaging the
air enemy. Synchronizing and integrating
the efforts of the air defense forces with
those of the combat forces are achieved
within a unique concept for conducting the
operation. Thus, in order to attain the
1
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
201
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
202
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
203
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
204
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
205
2.
3.
4.
5.
6.
7.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
206
8.
9.
10.
11.
12.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
207
Abstract: Allied joint operations have become an example for Romanian Army Forces, and in the current geopolitical context and following the Summit in Wales in September 2014 we should recognize and emphasize the
importance of such military actions that can take place even in Romania. As a result, military leaders will face a
number of challenges. Examining these challenges, command and control (C2) is one of the main tools for
success in joint and allied operations. This article highlights aspects of command and control (C2) in the allied
joint operations providing ideas and concepts to improve command and control of such operations.
Keywords: command and control, command arrangements, allied joint operations.
through
rapid
communication
of
Napoleons intentions and rationale.
Perhaps most important, the exercise of
initiative by junior officers was tolerated.
Napoleon was able to communicate very
rapidly with the Marshals because they
shared a basic operating doctrine, and he
explained his intentions as well as what he
wanted them to do. He expected them to
use their initiative and act without orders in
line with his intentions. They did. The
result was an operational tempo which left
the incredulous Prussians bewildered.[2].
Nevertheless, it should not be supposed
that this philosophy was universally
applied at all levels in the Prussian Army;
decentralisation was focused on the higher
levels of command. Notable contributions
were made by von Clausewitz and von
Moltke. In 1832, von Clausewitz published
On War, a collection of ideas that were
influenced by his experience of the
Napoleonic campaigns, notably the idea
that war is chaotic and frictional and that
this is likely to undermine pre-existing
plans and arrangements. This observation
was key in an era where military forces
were growing and subdividing into
208
Multinational
operations
are
operations conducted by forces of two or
more nations, usually undertaken within
the structure of a coalition or alliance. An
alliance is the relationship that results from
a formal agreement between two or more
nations for broad, long-term objectives that
further the common interests of the
members [3]. Joint operations are a general
term that describes military actions
conducted by joint forces or by Service
forces
employed
under
command
relationships [4]. An examination of
multinational operations illustrates that the
foundation for allied operations is based on
trust, cooperation, and cohesion. It also
reveals command and control (C2) as the
crucial primary tool needed to ensure
success in allied operations. This paper
examines the various aspects of and
challenges to command and control (C2) of
allied joint operations, and offers ideas and
concepts for facilitating this vital function
in the difficult environment of allied joint
operations.
Command of allied forces is the
most contentious and challenging aspect of
allied operations. Two contentious issues
which must be resolved are: "Who will
command the allied force'?" and, "What
authority will the commander have?
These issues create tension because all
contributors to allied forces, even in well
developed alliances, struggle with the
scope of command authority over their
forces granted to another nation's
commander. This tension is exacerbated by
the natural desire of nations to control the
employment of their own forces. It is wellknown that nations rarely relinquish
national command of their forces. As such,
forces participating in an allied joint
operation will always have at least two
distinct chains of command: a national
chain of command and an allied chain of
command. No single command structure
meets the needs of every allied command,
but there is one absolute: political
considerations will heavily influence the
ultimate shape of the command structure.
209
210
211
[5]
[6]
[7]
[8]
[9]
[10]
Bibliography
1.*** JP 3-16, Multinational Operations, July
2013,
http://www.dtic.mil/doctrine/
new_pubs/jp3_16.pdf, accessed on
14.09.2015.
2.*** AJP-01(D), Allied Joint Doctrine, 2010,
http://nso.nato.int/nso/zPublic/ap/ajp01(d).pdf accessed on 07.09.2015.
3.
Keith G. Stuart. The Evolution of
Command Approach C2 Approaches
and Organizations, 2010, http://www.
dodccrp.org/events/15th_iccrts_2010/
papers/192.pdf,
accessed
on
13.09.2015
4.*** JP3-0, Joint Operations, Aug 2011,
http://www.dtic.mil/doctrine/search.ht
ml?zoom_query=command+and+contr
ol&zoom_page=6&zoom_per_page=1
0&zoom_and=1&zoom_sort=1
accessed on 02.09.2015
5.*** AJP-3(B)/Allied Joint Doctrine for
Conduct Ops, 2011, http://nso.nato.int/
nso/zPublic/ap/ajp-3(b).pdf, accessed
on 07.09.2015
References
[1]
[2]
[3]
[4]
&zoom_and=1&zoom_sort=1 accessed on
02.09.2015
*** AJP-01(D), Allied Joint Doctrine, 2010,
p.3-4, http://nso.nato.int/nso/zPublic/ap/ajp01(d).pdf accessed on 07.09.2015
*** JP 3-16, Multinational Operations, July
2013,
http://www.dtic.mil/doctrine/new_pubs/jp3_
16.pdf, p.II-4 accessed on 14.09.2015.
General John J Pershing, My experiences in
the First World War, vol.1 (New York: Da
Capo Press 1995), 375.
Brigadier General William J Mullen III and
Lieutenant Colonel George A Higgens, US
Army, "Four Pillars of Interoperability",
Military Review (January 1992): 47.
*** AJP-01(D), Allied Joint Doctrine, 2010,
p.3-5, http://nso.nato.int/nso/zPublic/ap/ajp01(d).pdf accessed on 07.09.2015
Brigadier General William J Mullen III and
Lieutenant Colonel George A Higgens, US
Army, Four Pillars of Interoperability",
Military Review (January 1992): 47.
WEB:
6.
212
http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA404313
accessed on17.09.2015
7.
8.
9.
http://www.dodccrp.org/events/15th_ic
crts_2010/papers/192.pdf
accessed
on13.09.2015
http://nso.nato.int/nso/zPublic/ap/ajp01(d).pdf, accessed on07.09.2015
http://www.dtic.mil/doctrine/new_pubs
/jp3_16.pdf, accessed on14.09.2015
10.
11.
213
http://www.dtic.mil/doctrine/search.ht
ml?zoom_query=command+and+contr
ol&zoom_page=6&zoom_per_page=1
0&zoom_and=1&zoom_sort=1
accessed on02.09.2015
http://nso.nato.int/nso/zPublic/ap/ajp3(b).pdf, accessed on07.09.2015
214
215
the
emergence
of
unconventional
phenomena that are caused by non-state
actors and supported by the policies of the
problem-states or by a precarious
statehood.
Terrorism development, weapons
proliferation
and
organized
crime
transferred the embankment policies to a
new configuration of technologies and
military instruments. Other threats and
challenges should be: the increasing
pollution of the Black Sea, accentuation /
maintaining of the ethnic-separatist
conflicts (Transnistria, Abkhazia, Adjaria),
export of instability, promoting Islamic
fundamentalism and interests of Islamic
countries to southeastern Europe by the
existence of compact ethnic groups in
adjacent areas (Turko-Tatars of Crimea,
Gagauz of Moldavia, Turks in southeastern
Bulgaria etc).
It is to note that, in comparison
with those sources of instability from
classic landing, those ones listed above
present a special feature given by the fact
that their consequences are not confined to
a particular (political, economic, social)
level but, they are felt at all levels what
makes them be considered major sources
of instability and having repercussions on
national, regional and implicitly on global
security.
That factors that may result in risks
to regional security of the Black Sea, with
extension to the global level, should be2:
Terrorist elements and organized
crime transit to Central and Western
Europe through the Black Sea region;
Massive migration flows from
Africa to Asia and Central and Western
Europe;
Close proximity to the Caucasus
and the Balkans - areas characterized by
tensions and conflicts;
The existence of the region
historical mistrust relations between the
countries o (e.g. between Greece and
Turkey);
216
Ibidem, p. 30
217
218
Conclusions
As mentioned, the main element
that increases the geopolitical importance
of the Black Sea at the beginning of the
third millennium is to achieve the two
strategic flows: the first one is about
energy and the second is security flow. The
maritime power of littoral states also
influences the geopolitical developments in
the region and the most dynamic element
of it is navy. In this respect, Romania
wants to promote its own naval interests,
which are determined by:
its maritime power;
its bordering on sea;
sharing of maritime borders and
river length;
external supply of raw materials
on the sea lines of communication or river
communications;
exploitation of seabed and its
development prospects;
other economic activities which
are carried by sea and river shipping,
exploitation of marine resources, tourism,
shipbuilding;
promoting its image in the world
and knowledge of the presence of the
national flag on the globe;
the Euro-Atlantic involvement in
the wider Black Sea region.
Romania's maritime interests are
part of the national interests from the
economic, politic and military point of
219
Bibliography
1.
2.
3.
4.
220
Introduction
The current structures of NATO
military logistics system and of the
logistics systems from the armies of the
member states are the result of the
successive transformations of the entire
Alliance military system. The changes
were needed to ensure an efficient logistic
support of the combat forces and of the
combat support forces that had many
stages of evolution since the end of the
Cold War. Maintenance, as a logistics
functional area, had a very important role
in the change of the logistical systems of
NATO countries and it also suffered its
own transformations.
Developments in the logistics structures
of maintenance from NATO ground
forces
European
military
systems
transformations of the late twentieth and
early twenty-first century focused on
military structures of the former
communist countries and those of the
former NATO countries that have
gradually adapted to the new structures of
a larger Alliance. The logistical systems
221
222
223
224
Conclusions
The evolution of the logistics
maintenance system of ground forces
pursued the continuous adaptation to the
needs to ensure the availability of military
equipment
concurrently
with
the
transformations undergone by the combat
and support forces from all NATO
countries. Although the ground forces and
their equipment had different evolutions
in the new members of the Alliance, not
resembling what had happened in the
countries that were part of NATO before
the 90s, by successive changes and
efforts of ensuring the interoperability,
modern structures of leadership and
225
Abstract: In this paper I present a model of military making decision process as a crucial pillar in preparing,
organizing and conducting military operation. Numerous works have been recently published on the subject but
I will focus on the role of the commander in this process and how his decision and vision can influence the
outcomes of the process. Most authors address this from the military perspectives and few were concerned on
how an individual decision can influence the troops. My goal is not only to present the role of the commander
into military making decision process but also to add to that discussion a voice from the perspective of
psychology. I begin with a brief summary of the basic concepts regarding the decision process, role of
commander in it and afterwards a short analysis of how individual decision in its psychological framework that
can influence both the process and its outcomes.
Keywords: Commander, Command and Control (C2), Military Decision Making Process (MDMP).
1.
Fundamentals of Military
Decision Making Process (MDMP)
In this first part of my essay I will
present few key element of the Military
Making Decision Process which in my
opinion will support further and deeper
understanding of the commander role in
this process and how his individual
decision can affect the outcome of the
planning of military operation and also will
bring many different consequences for the
troops involved in execution of the plan.
Also, an important element which has to be
brought in the limelight is that of the
contemporary operational environment
with its characteristics. Inter alia, some can
be acknowledge as extremely influential
for decision makers, namely the
uncertainty of military operation and their
consequences (all military operations are
waged and full of uncertain conditions,
actions and results), different factors which
are beyond human control (weather, time,
moral and psychological factors, morale,
etc.), the complex ever-changing cultural
environment in which the war is carried
out, post-modern era characteristics and so
on so forth. In short, as Clausewitz said
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
226
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
227
Understanding
Judgment
Knowledge
Analysis
Information
Processing
Data
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
228
229
10
11
2.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
230
12
Accordingly,
army
doctrines
espouse commonly understood decisionmaking methods and techniques, to enable
commanders and staffs to work together
effectively. These should be treated simply
14
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
231
3.
232
16
17
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
233
18
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
234
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
235
Conclusions
24
25
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
236
7.
8.
9.
Bibliography
1.
2.
3.
4.
5.
6.
10.
11.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
237
Abstract: Military-political developments of the last decades have been marked by profound
changes in the approach to the conflict by participating actors. The fulminating dynamics of
technology development with significant effects in the equation of modern conflict, the
changes in preparing and conducting the combat and the combat power imbalance on the
parties to the conflict have led to the need to adapt the concepts and statements representing
the content of contemporary military art. In this article I intend to define the concept of hybrid
threat and to highlight the expression of this phenomenon at military art levels: strategic,
operational and tactical. In essence, the major objective of this paper is to identify and define
the effects of hybrid threat in the context of contemporary operational environment at
strategic, operational and tactical dimension, including and the causal links among them. The
proposed hypothesis is focused on the assertion that the effect of cumulated threats that
compose the hybrid threat is much greater than the cumulated effects of the same components.
In other words, the threats resultant effect is greater than the threats effects resultant. This
is the relationship of effects that contemporary military art must take into account in the
process of continuous adaptation to the realities of modern operational environment to secure
the success of current and future military actions.
Keywords: threat, hybrid, military art, military conflict, operational environment
Military art is an important branch
of military science which includes all
scientific aspects of the principles,
procedures, methods and rules for
preparing and conducting military actions
as a whole and those carried out for each
category of forces and branches
composing the military instrument, for all
forces participating in military conflict. In
essence, the military art is the specialized
field of preparing and waging armed
combat.
Besides
the
principles,
procedures, methods and rules of
preparing and waging military actions, the
military art also includes personal skills
necessary
for
commanders
and
subordinate forces to obtain and secure
success.
Since the most remote times,
military theorists have identified the fact
that military art involves two sides with a
high degree of interdependence: a
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
238
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
239
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
240
effects.
Contemporary
operational
environment displays a composite system
of actors, conditions and circumstances,
placed in a well-defined space and which
directly affects the use of military
capabilities, based on the decisions of
commanders. It includes, on one hand, all
enemy, allied or neutral forces and
systems participating in the full spectrum
of conflict, and, on the other hand, the
physical and information environment, the
factors of governance and political
decision, the level of technology, the local
resources and culture. The actors
participating in conflict fall within a wide
range of categories, from regular forces,
belonging to a state or alliance, to specific
structures of non-state actors, as well as to
governmental
or
non-governmental
organizations or groups. Adding to all
these various terrorist and/or organized
crime organizations, we complete the
picture which frames the environment for
conducting military actions. All actors,
allies or enemies, state or non-state,
regardless of technological and military
capabilities, will likely use every political,
economic, psychological, information,
military tool available to achieve their
objectives. In this context, the existing
threats are extremely varied and complex
and can be applied simultaneously,
resulting in the hybrid threat. In the
military field, the term of hybrid threat
was introduced4 to characterize the
complexity of future threats throughout
the operational environment, reflected by
the diversity of actors involved and the
weapons and technical means employed in
an innovative mix of tactics, techniques
and procedures in order to achieve the
desired goals5. Engaging in a conflict the
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
241
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
242
action.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
243
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
244
countermeasures.
In conclusion, we can say that the
hybrid threat occurs at all levels of
military art (strategic, operational and
tactical) and the ways of expression and
the consequences on a state actor are
interdependent, both those within the
same level and from one level to another,
this situation leading to exponential
amplification of the resultant effect. In
this manner, the analysis of the effect
generated by the hybrid threat proves that
it is holistic and much more serious than
the sum of the effects of threats that
compose it.
Analyzing the hybrid threat leads
to the conclusion that the spatial
dimension of the operational environment
in which these kinds of conflict are carried
out extends far beyond the area of
operations and even the theater of
operations. Depending on the environment
in which they occur, certain components
of hybrid threat and their effects can be
localized right in the geographical area of
the state/states generating the military
force, even if the area of deployment and
development of military actions is at great
distance from it. Therefore, the hybrid
operational environment, as a framework
for the conduct of modern warfare,
presents a complex geometric layout with
areas concentrated around certain
objectives considered as targets by the
enemy employing the hybrid threat. If
analyzed using conventional conflicts
laws and principles, the arrangement of
these goals may seem to be rather chaotic.
Actually, for the opponent employing the
hybrid threat, the objectives are arranged
in a network configuration, the effects
obtained by neutralizing a target being
used in attacks on other targets.
Essentially, the main goals
intended in applying the hybrid threat of a
conflict are affecting the defense
capability and the potential to engage the
military effort, which will depress the
combat power that the target actor can
generate. It is important to specify that
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
245
4.
5.
6.
7.
8.
9.
10.
11.
12.
Bibliography
13.
1.
2.
3.
14.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
246
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
247
Abstract: The economic security of a country is given the stock of resources and level of development which
must be seen in close connection with national security and national interest, economic policy promoted
interests in the medium and long term, the degree of participation international economic circuit .Economy and
finance economic potential of a country is influencing the military potential of public order and security , so
security .
Keywords: security / economic insecurity; national security objectives; the economic dimension of security;
threats, risks, vulnerabilities; strands.
Brief introduction
National Defence Strategy aims to
establish strategic steps necessary to
strengthen the credibility of Romania,
promoting continuity and predictability
that deriving from membership of NATO
and the European Union. At the same time,
necessary expansion and consolidation of
strategic partnership with the United States
and other strategic partnerships and
cooperative
relations
with
other
international actors .Strategia relate
primarily to the Constitution according to
which Romania is a national, sovereign,
independent and indivisible. Hence, there
are natural national interests, including
security, to promote and defend, by
legitimate means, the values by which the
Romanian state guarantees the existence,
identity, development and stability, under
which builds its future international
security.
Promoting
national
security
interests as shown in the National Defence
Strategy is achieved through the effort to
establish guidelines state, embodied in
national security objectives:
increase national defense aimed
at ensuring the territorial integrity ,
sovereignty and independence of Romania
and the Romanian people's security
248
249
precarious
infrastructure
250
Source: http://voiculescuadevaruldespreica.ro/ce-este-spalarea-de-bani/
financial sector.
Using bank financial systems for
money
laundering
undermine
the
individual financial institutions and
ultimately the entire financial system .
If not controlled, the money
laundering can undermine the efforts for
the existence of open and competitive
markets, affecting the development of a
251
252
4. Money laundering
Money laundering and terrorist
financing are international problems and
the effort to combat them should be global.
In the bank's internal control system are
organized risk management function,
compliance function and internal audit
function. The risk management function is
comprised of the risk control function of
each business line. These functions are
organisationally independent of each other
so as and to the business lines they monitor
and control .
To have an effective risk-based
approach the customer, the risk-based
approach should be incorporated into the
bank's internal control system
Internal control procedures in
question should contain the following, but
not limited to:
Identification
and
Risk
assessment risks of money laundering and
terrorist financing by customer, product,
service and business also risk value and
risk assessment procedure.
Minimize risk - set and use
special tools to minimize the risks and
vulnerabilities identified;
Monitoring riscurilor- adoption
of information systems for the collection,
analysis and data renewal of customer risk
profile;
Documentation and banks need
to
adopt
policies
raportareadocumentation to identify, assess and
eliminate the risk of money laundering and
terrorist financing, and that reporting, bank
management.
Banks must take measures to
prevent involvement in processes of
money laundering and terrorist financing.
Actions taken must allow their banks to
In conclusion
The collapse of the national
economy has very serious effects on all
levels, from the economic security of the
individual and his family and continuing
with diminishing economic security of the
state, the action potential and response in
case of a conflict, and gain political
vulnerability, economic, military and
social state; economic security is more
than just a component of national security.
The economic security of a country
is given the stock of resources and level of
development, which must be seen in close
connection with national security and
national
interest,
economic
policy
promoted interests in the medium and long
term, the degree of participation
international economic circuit.
Economy and finance economic
potential of a country is influencing the
military potential of public order and
security, so security.
253
254
Abstract: Security policy is based on a series of decisions and strategies through which an international
organization or a state guarantee the security of its members or citizens. The security policy must be supported
by all those involved, in order to be seen as an expression of common political interests. It is superior to all the
other policies, to the military doctrine and security strategy, which tackle security only from the perspective of
certain issues. Security policy is also different due to a much broader range of topics it covers.
Keywords: security policies, national security, freedom and security, globalization, circumstances affecting
security.
Introduction
Security is one of those concepts
having a different meaning in each
historical era and it represents a rather
complex topic which exceeds the idea of
defense by using only military means. This
term can be found not only in the
discourses of politicians and staff from
institutions of public order, defense and
national security, but also in the
vocabulary of journalists and scientists
for each of these categories the term
security having a different meaning.
It has always been regarded as
being essential for a viable society and
most people would define it as a state of
facts which protects any state or human
collectivity against any risk of external and
internal threat. Security is a complex
socio-political process maintained through
political, economic, social, information,
legal, ecological and military approaches
whose goal is the security status based on
the rule of law.
The approach of defining the
concept of security is a difficult one in the
current era, given its many dimensions and
diverse dangers of the contemporary
world. It is delineated by two variables: for
whom the beneficiary and against
whom the disruptive factor; these
variables produce tensions and strong
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
255
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
256
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
257
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
258
organization,
but
they
are
subordinate to the interests of the
hegemonic state; national interests
can be totally subjected to the
interests of the hegemonic state;
national interests are organized on
two levels of defense against the
former hegemonic state and the
coalitions organized by opponents
of the former hegemonic state;
- of survival. The fundamental
feature is defense against possible
aggressions, due to the fact that in
its area there is no political-military
alliance and the security guarantees
are vaguely supplemented by some
international security organizations;
- of member of an international
security
organization.
Its
fundamental feature is joining this
organization. From the time of
accession, that state is secured in
the conventional sense, classical
aggressions can no longer be
considered a fundamental problem,
as in that event, the state has the
support
of
the
respective
organization.
Membership to an international
security organization compels the state to a
redefinition of its entire defense strategy.
By joining this organization, the state
should assume its values and it needs to
change its security policy that ought to
become fit for the goals of the international
organization.
The security guarantees and the
power relations involved in the
membership of these organizations make
the conventional threats against that state
be limited or improbable. From the
moment of admission, one does not make a
clear distinction between national interests,
the internal means to defend them and the
interests of the international security
organization. The security policy of the
state should concentrate on aspects which
can make an important contribution to the
organization, so its policy can no longer
turn to internal considerations. Due to the
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
259
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
260
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
261
8.
9.
10.
Bibliography
11.
1.
2.
3.
4.
5.
6.
7.
12.
13.
14.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
262
Abstract: The entire transaction chain from swiping a card to a banks ability to process a transaction has now
become the main focus of cybercriminals. In order to infiltrate or gain access to this type of data exchange, they
have developed new attack vectors for delivering malicious payloads, aimed at compromising one of the parties
engaged in a transaction. Since the weakest link in the security chain is often human component, cybercriminals
often exploit human curiosity or lack of knowledge, as to infiltrate, steal, and manipulate online transactions.
Keywords: malware, cyber attack, vector of infections, financial institution, vulnerability.
1.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
263
Types of malware
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
264
16
13
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
265
22
27
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
266
31
35
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
267
3. Types of attacks
They represent methods by which
the criminals intercept, change or collect
information, differing according to the
unsecured
routers
or
improperly
configured can be compromised from a
distance, the attacker being able, besides
the diversion of some actions of those
involved in communication, to deliver
malicious data.
Although at first it may seem that
only thedomestic clients can be exposed,
this technique is used also for collecting or
intercepting the transactions of traders who
use PoS (Point-of-Sale)39 type terminals
connected to unsecured nets. In the case of
financial institutions ,if the criminal
intercepts sensitive information he then
takes the role of one of the parties engaged
in communication, and the repercussions
can become very important.
3.2. Drive-by40
These types of attacks exploit
vulnerabilities in browsers to inject and run
39
37
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
268
41
45
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
269
47
52
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
270
55
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
271
63
65
Trend
Micro
Incorporated,
Russian
Underground 101, 2012
66
Kaspersky, CarbanakAPT The Great Robbery,
February 2015
67
FORTINET 2013 CYBERCRIME REPORT,
Cybercriminals Today Mirror Legitimate Business
Processes
64
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
272
68
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
273
71
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
274
5. Conclusion
In the last decade, the vectors of
infection have been changed a lot, the
72
2.
3.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
275
4.
5.
6.
7.
8.
9.
10.
11.
2012,http://www.forbes.com/sites/a
ndygreenberg/2012/03/23/shopping
-for-zero-days-an-price-list-forhackers-secret-software-exploits/,
accessedon12.09.2015;
FORTINET 2013 CYBERCRIME
REPORT, Cybercriminals Today
Mirror
Legitimate
Business
Processes, accessedon12.09.2015
Fred Cohen, Computer Viruses
Theory
and
Experiments,
Computers and Security, vol. 6, pp.
2235, 1987, http://web.eecs.
umich.edu/~aprakash/eecs588/hand
outs/cohen-viruses.html,
accessedon26.08.2015;
George Garza, Catalogs.com, Top
10 worst computer viruses, 17th
February,
2008,
http://www.
catalogs.com/info/travelvacations/top-10-worst-computerviruses.html,accessedon26.08.2015
https://securityintelligence.com/tinb
a-trojan-sets-its-sights-on-romania/,
accessedon31.08.2015;
IBM, IBM X-Force Threat
Intelligence Quarterly, March
2015,
http://www.
essextec.com/sites/default/files/IB
M%20XForce%20Threat%20Intelli
gence%20Quarterly%20Q1_2015.p
df , accessedon31.08.2015;
Kaspersky, Carbanak APT The
Great Bank Robbery, February
2015,http://25zbkz3k00wn2tp5092
n6di7b5k.wpengine.netdnacdn.com/files/2015/02/Carbanak_A
PT_eng.pdf,
accessed
on
12.09.2015;
Mordechai Guri, Gabi Kedma,
Assaf Kachlon, Yuval Elovici,
AirHopper: Bridging the Air-Gap
between Isolated Networks and
Mobile Phones using Radio
Frequencies, 2014, http://www.
wired.com/wpcontent/uploads/2014/11/airhopper-malware-final-e141029143252-conversiongate01.pdf, accessedon12.09.2015;
Mordechai Guri, Matan Monitz,
Yisroel Mirski, Yuval Elovici,
12.
13.
14.
15.
16.
17.
18.
Covert
Signalling
Channel
between Air-Gapped Computers
using Thermal Manipulations, 26
Martie
2015,
http://arxiv.org/
ftp/arxiv/papers/1503/1503.07919.p
df, accessedon12.09.2015
PaloAlto Networks, Watering
Hole Attack on Aerospace Firm
Exploits CVE-2015-5122 to Install
IsSpace Backdoor, 20th July, 2015,
http://researchcenter.paloaltonetwo
rks.com/2015/07/watering-holeattack-on-aerospace-firm-exploitscve-2015-5122-to-install-isspacebackdoor/, accessedon26.08.2015;
RSA, DNS Poisoning Used
nBoleto Fraud, 9th February 2015,
https://blogs.rsa.com/dnspoisoning-used-boleto-fraud/,
accessed 26.08.2015;
RSA, Lions at the Watering Hole
The VOHO Affair, 20th July
2012, https://blogs.rsa.com/lionsat-the-watering-hole-the-vohoaffair/, accessedon26.08.2015;
Symantec,
Ransomware:
A
Growing Menace, 8th November
2012,http://www.symantec.com/co
ntent/en/us/enterprise/media/securit
y_response/whitepapers/ransomwar
e-a-growing-menace.pdf, accessed
on26.08.2015;
Trend Micro, How Do Threat
Actors Move Deeper Into Your
Network?, 19 February 2014,
http://aboutthreats.trendmicro.com/
cloud-content/us/entprimers/pdf/tlp_lateral_movement.
pdf, accessedon31.08.2015;
Trend
Micro
Incorporated,
Russian Underground 101, 2012,
http://www.trendmicro.com/cloudcontent/us/pdfs/securityintelligence/white-papers/wprussian-underground-101.pdf,
accessedon31.08.2015;
Trend Micro Incorporated, The
Evolution of Point-of-Sale (PoS)
Malware, 11th December, 2014,
http://www.trendmicro.com/vinfo/u
s/security/news/cybercrime-anddigital-threats/the-evolution-of-
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
276
19.
20.
21.
point-of-sale-pos-malware,
accessedon31.08.2015;
UPI, Virus strikes 15 million
PCs,
26th
January
2009,
http://www.upi.com/Top_News/20
09/01/25/Virus_strikes_15_million
_PCs/UPI-19421232924206,
accessedon26.08.2015;
Verizon, 2015 Data Breach
Investigations
Report,
2015http://www.verizonenterprise.
com/resources/reports/rp_databreach-investigation-report2015_en_xg.pdf,accessed
on26.08.2015;
Wired, 5 Key Players Nabbed in
Ukraine in $70-Million Bank Fraud
Ring,
10
January
2010,
http://www.wired.com/2010/10/zeu
s-ukraine-arrests/,
accessedon12.09.2015;
22.
ZDNet,
ILOVEYOU'
e-mail
worm invades PCs, 4th May
2000,http://web.archive.org/web/20
081227123742/http://news.zdnet.co
m/2100-9595_22107318.html?legacy=zdnn,
accessedon09.08.2015
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
277
Abstract: The information era is a phenomenon and a consequence of globalization, which generates new means
and ways to combat them. The developments in the technology of information are offering an unprecedented
increase of human abilities to access critical information that rules every area of activity. Romanian society is in
the middle of deep political, economic, social and cultural transformations. This set of changes is affecting each
of our lives. , Knowledge as such, will become a weapon of defense against risks and new vulnerabilities that
will surely appear in the next decades. In this scientific work I will summarize that the vulnerability of the cyber
information in terms of adopting a new political doctrine in Romania, the one of the information society and a
knowledge society.
Keywords: data security, vulnerability, networks, cyber security, risk.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
278
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
279
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
280
Action Plan
The first step in evaluating security
risks is to identify resources who protect
and their assessment in terms of
importance and value. Identification
methods are the most varied, from typical
risk checklists and
ending with
brainstorming. For each of the identified
resources you can simply calculate the risk
exposure as the product of probability and
risk impact.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
281
4.
5.
6.
References
9.
7.
8.
10.
Bibliography
1.
2.
3.
www.sri.ro
www.certmil.ro
Smith, Edward Allen, Effects
Based Operation: Network Centric
Warfare Applying for Peace, Crisis
and War. CCRP Publications
Distribution Center 2002.
Cebrowski,
AK,
The
Implementation of Network Centric
Warfare, US Government Printing
Office, Wasington DC, 2005, p. 4648.
Conf.
Prof.univ.dr.ing.
Gelu
Alexandrescu, LTC. Lecturer. PhD.
Ion Calin, lt. col. PhD. Costinel
Nitu, Security and Defense in the
European Union - XXI Strategies,
vol. I, Publisher National Defense
University Carol I, Bucharest,
2008, p. 9-16, 222-228, 339-347,
359-364.
Conf.
Prof.univ.dr.ing.
Gelu
Alexandrescu, LTC. Lecturer PhD.
Ion Calin, lt. col. PhD. Costinel
Nitu, Security and Defense in the
European Union - XXI Strategies,
vol. II, Publisher National Defense
University Carol I, Bucharest,
2008, p. 71-84, 244-252, 274-279.
Challenges to security and strategy
at the beginning of XXI century
(Scientific
Session
with
international participation 14-15
April 2005) Publisher National
Defense University Carol I,
Bucharest, 2005, p.142-147, 186 190.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
282
Abstract: The security issue has preoccupied humanity throughout its existence. Theoretically, the obligation to
ensure a constructive life, material and spiritual progress, emerged when man was concerned to ensure his
security, shelter or food. Without the need of human security, of prosperity and calm, all efforts made in a system
both institutional and juridical, receive a variable character, changeable depending on the risks that may arise
in the political, military, economic, or any other environment. During history, man has always felt the need of
security, stability and always was concerned to secure his food, his fortune and his own life. Therefore, towards
this reality, the only concept which can respond to these demands of security and stability - is the concept of
security.
Keywords: security, global security, security policy, security risk, collective security.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
283
https://studiidesecuritate.wordpress.com/
category/securitate-europeana/page/4/
9
Strategia Naional de Aprare a rii 2015-2019
O Romnie puternic n Europa i n lume,
Bucureti 2015, p. 6.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
284
10
11
https://studiidesecuritate.wordpress.com/category/s
ecuritate-europeana/page/4
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
285
12
http://lege5.ro/Gratuit/heztimzv/carta-alba-asecuritati-si-apararii-nationale-a-guvernului-din13052004
13
Luciana, Alexandra, Ghica, Marian, Zulean
(coord.), Politica de securitate naional: concepte,
instituii, procese, Editura Polirom, Iai, 2007, p.
39.
14
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
286
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
287
16
18
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
288
Bibliography
1.
2.
3.
4.
5.
6.
7.
8.
9.
20
10.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
289
11.
12.
13.
14.
15.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
290
291
Targeting methodology
Targeting is a combination of
intelligence functions, planning, battle
command, operational execution and
combat assessment (CA). The D3A
methodology facilitates the attack of the
right target at the right time with the most
appropriate asset. Integral to this process is
target tracking. Tracking is essential to the
detect and deliver functions. Tracking also
impacts the ability to assess a target and
implement subsequent reattack decisions.
Targeting is a continuous process that
maintains pace with the dynamics of an
ever-changing battlefield situation. In
addition to the enemy situation, the inputs
that drive this process come from higher
headquarters'
plans
and
orders.
Specifically, they are the mission, intent,
and specified/implied tasks.
Decide
The first and most important step in
the targeting process is the decide
function. Deciding the targets to be
attacked provides the overall focus and
sets priorities for intelligence collection
and attack planning. Targeting priorities
must be set for each phase or critical event
of an operation. Successful targeting is
directly related to the commander's battle
plan. Therefore, the targeting team must
understand the unit's mission. This
understanding starts with mission analysis.
Once the commander and staff complete
the mission analysis, the commander
issues the restated mission. The restated
mission is the starting point for the
targeting process.
Key to the decide function is the
intelligence preparation of the battlefield
(IPB). During this process, situational
templates and event templates are
developed and used to ascertain suspected
enemy locations and movements for
targeting purposes. IPB identifies the
enemy courses of action (COA) and
subsequent high value targets (HVT) are
identified from a target value analysis
(TVA). HVTs are those targets or assets
292
Detect
Detect is the next critical function
in the targeting process. The detect
function translates target priorities
developed during the decide function into
the ICP and TA tasking contained in the
operations order (OPORD). The G2 or S2
is the primary staff section directing the
effort to locate and identify HPTs. The
collection manager oversees this effort and
directs the tasking of acquisition assets
against appropriate targets. Since there
aren't enough assets to detect all targets,
prioritization is essential. Therefore, radar
schedules and zones are established to
support the detection effort with focus on
PIR and HPTs. It is essential that all
acquisition assets be used effectively and
efficiently. Duplication of effort must be
avoided unless it is required to confirm a
target. At the division, the analysis and
control element (ACE) manages the
collection plan to avoid duplication. The
analysis and control team (ACT) manages
the collection plan at the brigade.
HPTs must be detected in sufficient
time to synchronize their attack with the
commander's battle plan. Precise taskings
must be given to acquisition systems
designated to detect a specific target.
Mobile targets must be detected and
tracked until they are attacked. Further,
tracking of mobile targets must be planned
in sufficient detail to allow the handoff of a
target from one collection asset to another
when required. Tracking priorities are
based on the commander's concept of the
operation and targeting priorities.
Deliver
The deliver function of the
targeting process executes the target attack
guidance supporting the commander's
battle plan. The attack of targets must
satisfy the attack guidance developed
during the decide function.
Successful target attack implements
tactical and technical delivery decisions
and supporting actions. The attack of a
target starts with the review of the attack
guidance. Initially, the target to be attacked
is validated. Validation includes reviewing
the acquisition system and its associated
accuracy, time of acquisition, and target
posture. The validated target is passed to a
designated delivery unit/system for attack.
Depending upon the delivery system, other
293
Asses
Physically
assessing
effects
resulting from the application of military
force is a necessary task. Assessment is
conducted either by direct observation or
estimating damage based on the munitions
delivered, target characteristics and target
location error (TLE). Damage assessments
provide the commander with information
that expresses target damage on the basis
of overall mission accomplishment. CA is
used to determine the success of force
employment during military operations.
The requirements for CA are identified
during course of action development and
wargamed to ensure they can be executed.
CA consists of three elements:
BDA.
Munitions
effects assessment
(MEA).
Re-attack recommendation.
Results from the assess function
often require changes to plans and
decisions. This may result in the update of
several products from the decide phase.
These include:
IPB products;
HPTL;
TSS;
AGM;
Intelligence
collection plan
(ICP).
Targeting meetings
The targeting meeting is a critical
event in a unit's battle rhythm. It should be
the minimum length required to present
targeting information, situation updates,
provide recommendations and obtain
decisions. The purpose of targeting
meetings is the same regardless of the level
at which they are conducted. The major
294
Changes
to
commander's
intent;
Changes to task organization;
Planned operations;
Targeting Officer:
HPTs that have been attacked
and associated BDA;
Radar status.
Table 1 shows an agenda with the
information covered by core targeting team
members.
WHO
WHAT
S2 Representative
- Weather
- Enemy situation and decision points
- BDA for targets engaged since last meeting
- Analysis of enemy most likely and dangerous COAs
- Recommended changes to PIR
S3 Representative
Targeting Officer
EW Officer
- Brigade EW plan
295
296
Bibliography
1.
297
Cosmin DOBRESCU
Abstract: Often the first arrived and the last gone in the operating theatre, the submarine follows one principle:
Only one chance, only one attack.
Keyword:Owning the water space.
Todays
global
security
environment is characterised by volatility,
complexity and interdependencies. The
armament dynamics in the Asian Pacific
region are accelerating. The world is again
looking at conflicts provoked by
governments that question the territorial
integrity of established countries like
Ukraine. The battle for energy and raw
materials
is
underway
and
will
dramatically influence the maritime
domain. Russia for example will
strengthen its focus on the Arctic and
Atlantic regions. Two thirds of the worlds
trade uses sea lines of communication.
Safeguarding these economic lifelines is
crucial to the security and wealth of
countries in a globalized world and a
growing modern community of nations. So
the classical Anti Access/ Area Denial
scenarios are back in the theatre and the
submarine force will play an important role
in the related strategic planning.
Owning the water space
Technology roadmap
Sensor-driven developments
Short term
The tactical situation in classic
warfare scenarios is different from antipiracy threats. In asymmetric fields of
operation we are facing an unknown
298
299
300
301
302
Platform technology
One of the major size-determining
factors is the propulsion system with
associated energy storage requirements.
303
Signatures
304
Command
and Weapon Control System
The concept of the Command and
Weapon Control System provides for
efficient processing all the way from data
collection to weapon deployment. The
weapon payload is extensive and extremely
flexible.
A network of highly sensitive
acoustic sensors consists, among other
equipment, of the conformal array in the
bow which joins up laterally with the
enhanced flank array sonar (EFAS). The
rear sector is covered by the aft looking
array, while support for low frequency
detection is provided by the towed array
sonar. Underwater acoustic equipment
such as the mine and obstacle avoidance
sonar, bottom navigation sonar, underwater
telephone and broadband active operating
sonar transmit active sound waves into the
surrounding environment. Open structures
simplify the integration of all intelligence
gathering and processing sub-systems of
the integrated navigation, sensor and
weapon control system.
Awareness of the situation is
completed with data input from the surface
sensors, in particular the communication,
ESM antennas and the two optronic masts.
Altogether nine hoistable masts, of which
three are dedicated to communications,
provide a wide spectrum to cover a range
of frequencies from VLF to SFfF satellite
communication. To enable communication
even
when
deep
submerged
a
communications buoy is incorporated in
the upper deck. All analogue, digital and IP
305
Conclusion
The main advantages of nuclearpowered submarines are, without a doubt,
their air-independent propulsion, and fast
transit speed and thanks to their high
displacement, high combat strength.
Among
the
principal
virtues
of
conventional submarines are their much
lower purchase and operating costs and
their excellent shallow water capabilities
coupled with low signatures. The HDW
Class 216 submarine unites the advantages
of both types of submarine within a single
diesel-electric design. The increased transit
range, ATP range, good maneuvering
capabilities and high payload make the
design particularly attractive for navies that
operate submarines "out of area"- far from
their home bases.
Methanol reformer the next
milestone for fuel
ThyssenKrupp Marine Systems
leads the market in the field of
conventional submarines equipped with
air-independent propulsion (AIP) systems.
306
System configuration
At
the
beginning
of
the
development the requirements for the
reformer were defined. A major
requirement was operation based on the
existing and proven fuel cells operating
with pure hydrogen. Furthermore the
exhaust gas (C0 ) pressure of the reformer
should be high enough to enable the
discharge of exhaust gas into the
surrounding seawater without the need for
an additional exhaust gas compressor. Of
major importance was the overall system
efficiency.
Based on these requirements the
choice was a methanol steam reformer
system operating at elevated pressure.
Hydrogen purification is per formed with
membrane purification units. The required
thermal energy is produced in a highpressure burner, operated with oxygen.
The methanol is mixed with water,
evaporated and fed to the steam reformer.
The reforming reactor is heated by a
boiling water cycle operating between 60
and 100bar. The methanol water mixture is
converted into a hydrogen-rich gas mixture
at a temperature between 250-300 C. This
reformate gas is further processed in a gas
purification unit based on fraction of
hydrogen passes through the membrane
and can be fed directly to the fuel cell. The
rest of the reformate gas is burned with
pure oxygen in the burner, under the
addition of methanol, to provide the
required heat for the reforming process.
The only product gas from the reformer is
C0 . The H 0 in the exhaust gas is
condensed and reused internally.
The reforming reaction takes place
on a commercial catalyst with copper as
the active metal. The main reaction that
takes place is: CH OH + H 0 3H + C0
The methanol conversion rate
achieved is in principle the equilibrium
rate. Selectivity to H is very high as
secondary reactions are minimized because
the reaction temperature is relatively low,
resulting in low CO production.
307
Status of development
Reformer
development
at
ThyssenKrupp Marine Systems' Operating
Unit "Submarines" started many years ago.
ThyssenKrupp Marine Systems built a full
size functional demonstrator and operated
it for several years in their test facilities in
Kiel. The functional demonstrator was
initially set up with Commercial Off-TheShelf (COTS) components - so most of the
components were not suitable for the
submarine environment. Therefore a major
effort has been made in recent years to
redesign all components to be "submarine
suitable".
Since 2010 the reformer has been
successfully coupled with the SIEMENS
fuel cell FCM120. No difference in fuel
cell performance can be observed. The
hydrogen produced by the reformer fully
fulfils the purity requirements of the fuel
cell (99.999%). Furthermore the DC/DC
converter has been adapted to enable load
control of the entire system.
For development of the additional
peripheral systems required for the
operation of a methanol reformer,
ThyssenKrupp Marine Systems has signed
an agreement with the Spanish engineering
company SENER. While ThyssenKrupp
Marine Systems takes care of the methanol
reformer and the fuel cell system, SENER
is responsible for the exhaust gas treatment
system, the oxygen supply system and the
methanol and product water tank system.
In 2013 the methanol reformer was
coupled with the exhaust gas treatment
plant developed by SENER, showing that
the discharge of C0 into the seawater is
done without any influence on the
signature of the submarine.
In the meantime the functional
demonstrator
has
been
operated
successfully for more than 1,500 hours,
enabling the engineering team of
ThyssenKrupp
Marine
Systems
to
investigate performance and operation in
detail and to develop advanced solutions
for its submarine suitable successor.
Outlook
After the reconstruction period in
2014/2015, the series type methanol
reformer unit has been prepared for longterm tests in the shipyard test facility. The
308
309
German
Torpedo
Defence
development
Multinational NATO studies and
bi-national US-German activities in the
1980s and 1990s formed the basis for the
German Navy to develop an understanding
of torpedo defence. The realization that
conditions in home waters did not permit
sufficient
torpedo
detection
and
classification ranges for successful soft kill
torpedo defence led to the national
decision to develop a hard kill system for
310
311
debuts
FIRST GENERATION
1980s: Computer-aided software
312
THIRD GENERATION
2000s: Taking a completely
different approach
In 2001, the United States
Department of Defense launched the
largest program in history to concurrently
develop three versions of the next
generation of advanced supersonic multirole aircraft for the Air Force, Navy and
Marine Corps as well as potentially 30
allies around the world. This programme
would be led by an international coalition
with three primary partners, numerous
secondary partners and a global supply
chain of up to 600 companies. Before they
were awarded the contract, the leadership
of this programme decided that this would
require a completely different approach to
the way that they would design develop,
produce and sustain a fleet that could
ultimately approach more than 4,000
aircraft. For this programme, secure,
global, efficient
collaboration was
paramount. Automated configuration,
change and effectivity management for
each aircraft serial number was crucial.
Major modules would be assembled in
several locations and final assembly and
testing would be at sites in the United
States, Europe and Asia. Finally, the
coalition would be responsible for
sustaining the fleet while meeting stringent
new performance-based logistics metrics.
Today that coalition has an integrated
product
development
environment
composed of 30 project teams at 140 sites
in nine countries.
The IPDE for this seminal program
has become the standard for complex,
FOURTH GENERATION
2010s: PLM comes aboard
The emergence of product life cycle
management (PLM) portfolios that are
tailored to the unique challenges of
developing advanced submarines, both
nuclear and conventionally powered, are
transforming the most advanced shipyards
313
Additionally,
in-service
lifecycle
performance such as mean time between
failure, system reliability metrics and
related data will be carefully documented
for all systems and components by class
and hull number so that future fleets can
benefit from lessons learned and many
systems will not need to be re-engineered
for future classes of submarines.
Today you can make the case that
there are many major shipyards in the
world that have undergone a significant
digital transformation, at least two in each
of the major markets: Asia Pacific, the
Americas and Europe. In every instance
the shipyard was already recognized as a
world leader in specific classes of ships,
and in several cases, the shipyards were
highly diversified; for example, building a
wide variety of ships for commercial,
naval: both surface ships and submarines
and private yacht owners. But the leaders
of these shipyards recognized that they
needed to continue to innovate and
improve if they were going retain their
leadership position that resulted from the
digital transformation that is underway. It
would be safe to say that the number of
shipyards that achieve a significant
digitalization in the next decade will
double or triple worldwide as other
shipyards seek to emulate the performance
that the first seven shipyards have already
achieved.
FUTURE NOW
Tightening enterprise integration
Future IPDE solutions will enable
shipyards to more tightly integrate the
complete enterprise with particular
attention to the supply chain and service
lifecycle management, both top priorities
today. Strategic partners will continue to
collaborate and share data through a highly
secure private network with International
Organization of Standardization (ISO)
standards such as the JT data format to
enable the building of 3D multi-computeraided design (CAD) models. A cloudbased solution will offer the rest of the
supply chain access to the information and
data that they need from the master data
file to be an efficient yet virtual member of
the team. In a similar manner, service
lifecycle management will be coordinated
and managed by the lead shipyard or the
overall service provider with supply chain
members and fleet support staffs.
314
Motivation
In certain situations during
submarine operations it is necessary to
achieve maximum acceleration from silent
operation to maximum velocity or to crash
stop the boat. Manual avoidance of
cavitation is not possible during such
maneuvers, as there are multi-dimensional
interrelationships
between
propeller
characteristics, the boat's wake, diving
depth, rudder positions, angles of trim and
yaw and the resulting local inflow
conditions.
During unsteady operation, even an
experienced submarine commander has
only very restricted possibilities in order to
achieve maximum possible acceleration,
free of cavitation at the current depth, by
demanding a specific increase in
revolutions. Avoiding cavitation during the
entire maneuver can therefore empirically
only be obtained by maintaining a larger
safety margin to the estimated limits of
cavitation inception. This leads to a
considerable delay in the maneuver in
comparison with optimal performance.
315
Cavitation controller
The Cavitation Controller (CC)
serves to avoid cavitation at the propeller
during
unsteady
operation.
The
implementation of this kind of propulsion
control gives the submarine commander an
important operational advantage due to the
ability to withdraw rapidly and covertly
from a critical situation. The controller
allows the required turning rate to be
reached in a very short time while
constantly keeping the operation point
clear of cavitation inception.
Mode of operation
The method described here can
provide the submarine CIC with a mode of
operation
that
ensures
maximum
cavitation-free acceleration, allowing the
maneuver to take place very close to the
316
Availability
The practical implementation of the
CC has already taken place and has been
successfully tested. The newly developed
CC can not only be integrated on board
new submarines, it is also eminently
suitable for installation on already
commissioned submarines. This new
function can be used on submarines with
DC and Permasyn* motors.
Adjustment
The initial values for cavitation
inception originate from cavitation tests in
model scale. To adjust the CC the real
cavitation inception points for the propeller
are determined by means of the acoustic
evaluation obtained during full scale
propeller operation by the boat's on-board
hydrophones and its analysis systems. The
program used for this purpose is coupled
with the propulsion system control and it
displays the current operation points in
relation to the cavitation inception limits
determined in advance. The parameters of
the limits of cavitation inception
determined for the full-scale propeller are
then transmitted to the propulsion control
system via the same program, so that the
CC automatically adjusts the current
changes in tinning rate during boat
operation and prevents these limiting
values from being reached.
317
Voice;
MSK reception;
Military Message Handling e. g.
ACP 127, ADafP-3, STANAG 4406/ ACP
142;
HF email (STANAG 5066);
Tactical data LINK (e. g. LI 1/22
and L16);
SubNet Relay;
Automatic Link Establishment
ALE 2/3 G.
For
INMARSAT
and
SHF
SATCOM dozens of applications for
messaging and information exchange are
available and can be implemented as
individual solutions according to the
operational
requirements.
Hagenuk
Marinekommunikation supports such
communication requirements with their
SEICAM*
product
family,
which
distributes and makes all related services
available throughout the platform.
The data and audio distribution
networks are the heart of integrated
communication systems and provide the
interfaces to legacy as well as modern
equipment and can establish the necessary
communication circuits. The integration of
crypto devices divides these networks into
a Black (cyphered area) and a Red section
(plain area) and ensures that no plain
message or unencrypted voice messages
are transmitted through an external
communication line.
These communication networks
also integrate time critical applications
including those for data link services.
Tactical internal communication is realised
via Voice-over-IP (VoLP) technology.
Telephony can be realised by connecting a
conventional telephone system or by
means of a telephony service implemented
in the tactical user stations.
Applications via INMARSAT are
operated as stand-alone units to avoid a
possible breach of Red/Black separation.
Due to its bandwidth SATCOM
dominates the communication between
submarines and other units. However, with
limited availability of military SATCOM
318
319
320
nd
321
Mast family
In principle hoistable masts can be
built as telescoping or penetrating masts, as
shown in Figure 2. Depending on the
platform design and the possibilities in the
sail configuration either a bridge mast or a
hull penetrating mast is of advantage.
Conventionally for small sensorshoistable
masts are shaft guided, which means that
the sensor to be hoisted is guided within a
circular shaft. The shaft guided masts need
less space inside the submarine's sail and
can be arranged closely side by side.
If bigger and heavier sensors or
even multiple sensors are to be integrated
on one mast, a column guided construction
is the preferred solution. Column guided
masts are able to carry heavier or multiple
sensors (e.g. multiband-antenna plus HFantenna), the columns can be arranged near
to arbitrarily, provided that they are able to
cope with the loads. This allows the masts
to be arranged so that they are nested
inside the bridge fin. It must be taken into
account that the cable trunk, which is not
an integral part of the shaft guided or the
column guided mast, has to be placed near
to the respective mast.
The Gabler periscope hoisting
devices
and
optronic
masts
are
characterised by precise, easy and near to
vibration free movement at all speeds.
They have been tested in long-term
operations that have shown them to be very
reliable, while their ingenious shaping in
addition to coating with radar-absorbing
material makes them very difficult to
detect.
Gabler hoistable masts are fully
able to meet the technical and tactical
requirements of naval customers and
comply with the latest developments in
technology.
The standard mast with a
rectangular cross section can accommodate
different types of sensors during the life
cycle of a submarine or to install different
sensor types e.g. in new submarines. This
increases the overall capability of the
Modularity benefits
Depending on the quantity of
submarines in the respective fleets of the
navies worldwide the question of
modularity gains significance. Additionally
the different mission modules to be
fulfilled by the submarines will require
different sensors and capabilities on top of
their hoistable masts. Hence exchange
should be easy for the commanding officer
and the crew, so that other mast
configurations can be implemented with
other sensors in accordance with the
mission. The latest developed mast system
from Gabler gives the commanding officer
the best variety and modularity. The mast
can be exchanged in a short period of time
in the shipyard or the naval arsenal. The
new concept is also an advantage with
regard to maintenance work whenever
necessary. In case a navy decides to have a
complete set of masts as a "Repair by
Replacement" set the timeframe can be
shortened tremendously.
The CALLISTO System a
modular sensor float for deep
submerged submarine operations
The innovative CALLISTO system
developed by Gabler Maschinenbau GmbH
in cooperation with ThyssenKrupp Marine
Systems and BAALNBw comprises a
repeatedly retractable tethered antenna
float and enables submarines to
communicate from a deep submerged
position. The system can also be used as a
simple communication mast by being fitted
into the CALLISTO mast with a raised
high power multiband antenna with
antenna applications such as: uTIF/VHFLOS, UHF-Satcom, HF reception, IFF and
GPS. To use the antenna frequencies in
deep
submerged
conditions
the
CALLISTO system is released as an
optimally streamlined float from a
hoistable mast so that it ascends to the
water surface on the end of a towing cable.
The buoyant body can be released and
retrieved
repeatedly
for
different
operations. Automatic adjustment of the
322
nd
TRIPLE
M
Modular
Multipurpose Mast in a pressure proof
container
The
other
system
recently
developed by GABLER (in cooperation
with the former HDW and BAALNBw) is
the Modular Multi-purpose Mast, TRIPLE
M. The modular system is designed to
carry a range of different payloads
sensors and effectors, as shown in Figure 5
each to fulfil new or enhanced capability
requirements so that the submarine is
equipped to meet the demands of any
mission. A standardised interface enables
them to be exchanged rapidly.
TRIPLE M consists of a two stage
hoistable mast either a standard mast or a
column guided one carrying a pressureproof container in which the different
payload modules can be accommodated
323
Conclusion
Gabler with its expertise in
hoistable masts is continually working
towards better products to ensure mission
success. Hoistable masts are an extremely
significant addition to the platform of the
submarine. The innovation in the design
principle of hoistable masts like the socalled standard mast and mast types
CALLISTO and TRIPLE M shows that
hoistable masts play a central role in
enabling submarine communication and
the fulfilment of existing and future tasks.
"GABLER Masts - keep your mission
running.
Encapsulated
HARPOON
Weapon system
The Boeing Company offers the
HARPOON Block II Weapon System
(HWS) as our non-developmental solution
for the Next Generation Joint Anti-Ship
Missile for Armed Forces. The HWS has
been developed as "Total System" solution
including the missile, the command and
launch systems, and the logistics support
elements. These elements have been
developed in parallel in an integrated team
environment to ensure that the full
capabilities of the system are available as
soon as possible.
For integration onto submarines,
the HARPOON Block II submarine
launched missile combined with the
Advanced HARPOON Weapon Control
System (AHWCS) Version 2, and
associated support elements is our
324
325
Abstract: In an international environment characterized by border conflicts, this paper highlights the
development of the hybrid war after the Second World War. Hybrid war combines conventional and
unconventional, military and non-military tactics, guerrilla and terrorism. Military operations are conducted by
unmarked, well trained armed forces, and armed troops, supported in the operations area by the local
population. Additionally, they lead intense campaigns of misinformation and misleading, as well as cyberattacks. The hybrid war aims at recovering discrepancies with regard to the technical, tactical and doctrine
asymmetry, thus providing success to the actors of a hybrid war.
Keywords: hybrid war, terrorism, hostile actions, special forces, guerilla.
326
327
https://en.wikipedia.org/wiki/Ukraine;
328
329
330
10
331
16
332
333
334
5.
6.
Bibliography
1.
2.
3.
4.
7.
8.
335
Abstract: Practicing systematically and continuously physical exercises represents a basic coordinate of modern
mans existence who is aware of their usefulness. Physical and mental health are given by every persons
capacity to understand the beneficial effects on multiple levels of practicing physical exercises as well as in
every institutions capacity to support and encourage a healthy lifestyle.
Keywords: health, sports, physical exercise
336
337
mineral
substance);
acute
nervous
overexcitement a degree of exaggerated
tiredness induced by the divergence
between excessive demand and the
reduced possibilities of reaction from the
body (which appears at less trained
individuals, those that are recovering after
illness or those who want to get in shape
after a long interval of pause); neurosis of
sports physical effort called overtraining
for a long time a chronic type of
pathological tiredness (appearing because
of incorrect dosage of effort, but which can
also have as causes the frequent change of
dynamic
stereotypes
within sports
activities and agitated lifestyle having as
main characteristics the following:
exaggerated biochemical and blood vesselrelated reactions, tachycardia, delayed
cardiac
frequency,
dystonic
tense
reactions, modifications of parameters of
pulmonary ventilation, blood vessel
problems with deficiencies in thermoadjustment; the person suffering from
neurosis always complains of tiredness,
feeling that he/she has not had enough rest;
during the day any physical or intellectual
effort aggravates the capacity of
concentration and decreases the physical
and psychological efficiency); dehydration,
which may result from losing a high
quantity of water by perspiration and
inadequate hydration (not enough liquids
are drunk); exhaustion due to heat, shock
and dehydration may appear in case of
doing physical exercises in a space with
high heat and humidity; lesions due to
over-effort appear in joints or muscles;
asthma induced by physical exercise may
occur in people who have never had an
asthma attack; exhaustion may occur in
case of too much physical effort.
In conclusion, physical exercises
must be practiced in a scientific manner,
under a specialists supervision, so as to
offer benefits to the people practicing it
and not add negative effects upon the
body. The trend in competences (profiles)
that specialists in physical education and
sports have to follow is to pay special
attention to promoting health through
movement, within specialized programs,
338
2.
3.
339
Abstract: Physical training is the practical component of military physical instruction which is truly useful in the
educational process of the modern soldier. The role and the position occupied by physical training in modern
armed forces are established by its very character as being one of the main subjects of instruction of the troops.
This reality is supported by laws, rules and regulations adapted to each army as such but generally having the
same objectives and identical characteristics.
Keywords: physical training, army, soldier.
340
341
Ibidem 4, p. 55.
342
Ibidem 6, p.129.
2.
3.
4.
343
The
comprehensive
approach
involves applying a metodology that aimes
at the implementation of some shared
principles and processes of collaboration
that amplifies the perspective of good
results on long term over the domaines of
politics, security, diplomacy, economy,
justice and human rights, in the borders of
the EU and beyond it. Actors like UN and
EU play a key part in future crises
management. likewise other european
bodies and NATO must focuse on the
development of the relations between
institutions. This means more tightened
bonds and continuing cooperation at
several levels of operational strategy.
NATO has proven itself as a key part actor
in the UN and EU operations and it seems
like in the future its role will be bigger .
Generalities
The term of comprehensive
approch has been spoken in scientific
terms and has been theorized for the first
time at a NATO summit at the proposal of
some allied members coordinated by
Denmark.
Today the actors of the
international environment can apply it.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
344
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
345
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
346
http://nato.mae.ro/node/269,
7.06.2015, ora 10.00
accesat
astazi
2
Ibidem 5
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
347
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
348
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
349
2.
Conclusions
The
comprehensive
approach
includes today's international environment
actors in crisis management and conflict.
Today's security challenges require close
cooperation at both national and
international level in order to combine
civilian and military resources and
coordinating measures that are to be taken.
The effective implementation of this
comprehensive approach requires the
cooperation and contribution of all major
actors, with a shared sense of openness and
determination.
Others, such as UN and the EU are
already playing an important role in
responding to future crises. NATO must
focus on developing relationships with
these institutions above all, from the
3.
4.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
350
5.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
351
Abstract: New crises affecting global security environment and in particular the refugee crisis raised a number
of questions on how European agenda adapts in order to prevent humanitarian crisis and how Europe is
involved in crisis and conflict prevention. From this perspective a number of measures that the European Union
has taken so far are reviewed and analysed and briefly described a series of short-term effects that may appear
at the level of national states.
Keywords: refugee crisis, legitimacy, humanitarian intervention.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
352
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
353
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
354
Idem.
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
355
2.
3.
4.
5.
6.
7.
8.
9.
10.
12
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
356
Proiect cofinanat din Fondul Social European prin Programul Operaional Sectorial pentru Dezvoltarea Resurselor
Umane 2007-2013 Investete n OAMENI
357
Abstract: Only through detailed knowledge of planning elements and data communications system and its
determining factors, can one achieve the communications and IT support needed for performing the command
and control of the joint forces engaged in operation. In order to ensure the interoperability of forces
participating in such missions, in training for mission particular emphasis should be placed on training the
planning staff and the communications and IT personnel with responsibilities in planning and organizing the
communication system specific to the respective operation.
Keywords: interoperability, communication and information system, training, planning, determining factors.
doctrine,
operating
standards
and
willingness to provide information which,
in an operational environment, can cause
confusion and interoperability issues.
Once JFC establishes the specific
organization of C2 for a multinational or
joint operation, information exchange
requirements (IER) are established
together with the beginning of the
planning process of the communications
and IT system.
The
planning
requirements
include:
electromagnetic
spectrum
management, equipment compatibility,
procedural cryptographic compatibility
and information security (INFOSEC),
identification as friend or foe, as well as
data transmission protocols.
In establishing the architecture for
combined (multinational) communications
and IT system, commanders at all levels
and planners must take into account
several factors1, such as:
immediate identification of
common mission, when and with
who; adapting networks to meet the
dynamic information exchange in
358
359
360
361
2.
3.
4.
5.
6.
362
Abstract: Considering the generally recognized rule "train as well as you would fight" the new characteristics
of multinational operations within NATO impose requirements for preparing the communication and
information structures to ensure interoperability and properly accomplished responsibilities, respectively
standardized performance of activities specific to ensuring support communications for the forces engaged in
the operation.
Keywords: training, interoperability, training requirements, responsibilities, activities, communication and
information support.
363
DOD
agencies,
and
international
organizations fighting unit commanders in
theater, and when the situation requires it,
initiates corrective actions;
- assesses the effectiveness of CIS NMC National Military Command System and
commanders in combat units coordination
with USJFCOM - Joint Forces Command
United States and USSTRATCOM - US
Strategic Command of America; together
with J-3 and Director of Operational Plans
and Joint Force deployment requires or
recommends new procedures, programs or
systems to achieve enhanced capabilities;
- supports J-3 by ensuring the
augmentation of forces and means of the
CIS, in crisis or emergency;
- analyzes the CIS requirements presented
by CCDRs and ensures the consistency of
their
settlement
correlation
and
operational and logistical plans in the
short and long run, however in
coordination with J-3, Directorate for
Logistics (J-4) and Planning Department
of the Joint Staff;
- makes sure, in coordination with the J-3
and Assistant Secretary of Defense for
Networks and Integrated Intelligence
(ASD [NII]), that the lifecycle
management of joint C2 systems has the
capacity
to
provide
support
communications and the President, Office
of the Secretary Defense (OSD), Joint
Staff, services, commanders of combat
units, DOD agencies and any other entity
that may be committed in the execution of
joint operations;
- in coordination with the J-3, J-4 and
ASD (NII) / DoD CIO, provides program
management oversight and technical
systems group within the Global
Command and Control System (SCG)
Joint Support System for Global Fight
(GCSS-J) to ensure effective functioning
of the CIS for the users;
- makes recommendations on protection
of CIS Joint and multinational hostile
activities against the opponent;
- acts as the primary point of contact of
Joint Staff to print one direction and
364
365
366
drill training.
I. Ciobanu, Study on specific operational
standards in communications and computer
training. Views on the implications of actions and
information systems on the organization and
conduct of modern military action, accessed August
08,
2015,
on
http://www.cissb.ro/Revista_
comunicatiilor/2009/1/Revista.
4
5
367
in
368
Bibliography
1.
***
Romanian Army training
doctrine, 2006.
2.
*** Romanian Armed Forces
Transformation Strategy, Bucharest, 2007.
3.
*** NATO Handbook, published
by Office of Information and Press, NATO
- 1110 Brussels Belgium, 2001.
4.
*** Allied Joint Doctrine for
communication and information Systems
AJP-6, April 06, 2011.
5.
*** Joint Publication 6-0, Joint
Communications System, June 10, 2010
6.
www.nato.int
7.
www.rft.forter.ro
8.
www.mapn.ro
9.
http://www.cissb.ro
This work was made possible through
financial support provided through the
Sectoral Operational Program Development
of Human Resources 2007-2013, cofinanced by the European Social Fund, in the
project POSDRU/187/1.5/S/155385, with
the title Security through knowledge
Integrated/educational
network
of
training, counseling and guidance of PhD
students for a career in research of
security, defense, public order and national
security - SECNETEDU.
369
INDEX OF AUTHORS
STAN Ioan-Constantin, 49
COLESNIUC Dan, 42
STANCIU Cristian-Octavian, 70
DRAGOMIRESCU Valentin, 21
TOCIL Doru-Constantin, 49
371
1306/2015
C.297/2015