STRATEGIES XXI - Command and Staff College https://revista.unap.ro/index.php/XXI_FCSM <p><em>Strategies XXI - </em><em>Technologies, Military Applications, Simulation and Resources</em> is an annual international scientific conference organized and hosted by the Command and Staff College / „Carol I" National Defence University.</p> <p>The Conference is designed as a collaborative platform for dissemination of research results, ennabling research partnerships&nbsp;between the military and civilian research and education communities.&nbsp;</p> <p>Security and defence practitioners, scholars, researchers and students are invited to analyse the current and future operational environment, to present and debate potential solutions to emergent security and defence challenges.</p> "Carol I" National Defence University Publishing House en-US STRATEGIES XXI - Command and Staff College 2668-201X PARTICULARITIES REGARDING THE USE OF PLANNING METHODOLOGIES IN THE FRAMEWORK OF LAND FORCES’ MILITARY OPERATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1132 <p><strong><em>Abstract</em></strong><em>: The manifestation of different dissensions regarding the use of planning methodologies in the operations process has become a reality, both at national level and within NATO. Therefore, this research paper contributes to the theoretical clarification on defining the specific methodologies, respectively their employment in relation to the level of Land Forces military operations. Another objective of this paper is to make a comparative analysis between the design methodology, military decision making process (MDMP) and troop leading procedures (TLP), targeting the military structures within the Land Forces, and those belonging to NATO. Also, at the end, the paper highlights some perspectives of improving planning, as the primary activity which starts the operations process.</em></p> Paul TUDORACHE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 27 31 10.53477/2668-2028-21-01 REORGANIZING THE TACTICAL MILITARY STRUCTURES UNDER FORMULA OF THE BATTLE GROUPS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1133 <p><strong><em>Abstract</em></strong><em>: The accentuated dynamics of the operational environments, with direct impact on the areas of responsibilities (AOR) and areas of operations (AO), determines the need for the Land Forces to adapt operationally, having profound implications on their task organizations’ adjustment. For these reasons, the paper sets out the principles for reconfiguring the tactical structures from Land Forces under the umbrella of battle groups (BGs), to meet current and future operational challenges. Also, the main analysis is pointed at determining the organizational formulas of the BGs, configured on the battalion task organizations, suitable for full spectrum operations (FSO), imprinting the staff, as well as the combat, combat support (CS), and combat service support forces (CSS).</em></p> Paul TUDORACHE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 31 36 10.53477/2668-2028-21-02 NEW CHALLENGES REGARDING THE DEVELOPMENT AND CONFIGURATION OF THE ARMORED CAPABILITIES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1123 <p><strong><em>Abstract:</em></strong><em> A new international security paradigm in the evolution of the international environment and modern battlefield requirements implies the reconsideration of the combat large-scale operations concept. Consequently, the need to reconsider this concept generates a number of imperatives in configuring and developing tactical force structures and formations. Flexibility, versatility, operational mobility, as well as the ability to survive in the tactical field are general but mandatory requirements for those forces. Armored forces, the main striking force of the tactical units must be versatile and adaptive in order to create the premises for gaining and maintaining initiative and ultimately generate the conditions to prevail on the battlefield. New technologies, peer enemy capabilities development, but also the need to create a responsive, credible and effective force represent the references that shapes today future armored capabilities.</em></p> Claudiu Valer NISTORESCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-23 2021-07-23 17 1 37 47 10.53477/2668-2028-21-03 REMODELING OF MILITARY STRUCTURES – A STRINGENT REQUIREMENT FOR INCREASING MOBILITY AND COUNTERMOBILITY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1134 <p><strong><em>Abstract:</em></strong> <em>Modern military conflicts have proved that military actions are characterized by very rapid situational changes. Commanders and staffs must know how to react promptly to these changes and order, according to the situation, the measures to be taken, knowing that their decisions will coordinate the combat actions of the forces according to the missions received. The tendency of modern armies to increase the mobility of their troops by technological up-grades in short time, which incorporated the latest developments in science at that time, has been constantly backed up by the tendency to find the most economical and effective ways to reduce the maneuverability of opposing troops. These trends generated by the high dynamics of the current confrontation environment have practically imposed the need for the permanent remodeling of the military structures having as final goal the obtaining of the victory in the military operations/actions.</em></p> Adrian-Robert GHEORGHE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 48 54 10.53477/2668-2028-21-04 THE PHYSIOGNOMY OF MILITARY ACTIONS IN AN OPERATING ENVIRONMENT DEFINED BY HYBRID THREATS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1135 <p><strong><em>Abstract:</em></strong><em> This paper's theme comes from the necessity for an in-depth analysis of the phenomenon called "hybrid warfare" that seems to have returned today with the inducement of the crisis in Ukraine in early 2014 and the annexation of Crimea by the Russian Federation. In this sense, starting from the assuption that the hybrid threat mix has the "potential" to change the paradigm of warfare, and Romania could be the target of such approaches, we set out to understand this type of war and identify possible prevention countermeasures.</em></p> Alexandru HERCIU Vitalii BEZUHLYI Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 55 63 10.53477/2668-2028-21-05 INTERNATIONAL ACTORS’ NUCLEAR RETHORIC – A PERPETUAL DILEMMA AND VARIOUS STANCES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1136 <p><strong><em>Abstract</em></strong><em>: Actors struggle in the nuclear power games is more symbolic one, due to the fact that it is </em><em>believed that a nuclear attack nowadays is not likely to happen, since it is generally-accepted that nations cannot reliably defend against a nuclear attack by using traditional means. Therefore, the present paper aims to emphasize the role of actors’ nuclear rethoric in pursuing nuclear objectives. The document analyzes the nuclear doctrine of the first three most powerful nuclear-states, highlighting the potential of strategic communication. </em></p> Alexandru HERCIU Iulia-Alexandra COJOCARU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 64 69 10.53477/2668-2028-21-06 INFORMATION ACTIVITIES – ESSENTIAL WARFIGHTING FUNCTION IN TODAY’S MILITARY OPERATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1127 <p><strong><em>Abstract: </em></strong><em>The nature of recent military conflicts, largely unconventional, essentially involves two common features related to the type of actors involved and the methods used. If regarding the first of these, one can observe that the tendency is of metamorphosis of conflicts towards the area where state actors are forced to confront malignant non-state actors, such as terrorists or insurgents, the second refers to the methods used in such confrontations, most of them having an unconventional character, which does not comply with international conventions or the laws and principles of armed conflict, methods that have, because of the unprecedented technological development, increased in number and intensity. In this context, military forces have tried to adapt their approach to conflicts, to adjust their force structures, types of operations, but also the related procedures to try to find an optimal response in countering such behaviors. Against this background, the concept of information operations has acquired an essential importance, the use of actions subsumed to it offering the possibility of military force to create effects in the psychological dimension by influencing the target audience, with immeasurably greater results than the classical approach, with effects only in physical dimension.</em></p> George-Ion TOROI Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-26 2021-07-26 17 1 70 77 10.53477/2668-2028-21-07 THE IMPORTANCE OF MISSION ANALYSIS IN MODERN MILITARY OPERATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1128 <p><strong><em>Abstract: </em></strong><em>The complexity of today’s operational environment has a direct impact on the military instrument of power of every nation. Nowadays, conflicts have a much bigger unconventional component. This component lies in the types of actors involved and the methods used by them. Most contemporary conflicts are no longer classic confrontations between two states that use their military constituent to impose their will on the adversary. Today, the other instruments of power play an equally important role. The resolution of today's conflicts does not only require a military approach to the problem, which further complicates the mission of the military forces, as they are forced to focus on other areas outside the military. Today, non-state actors play a much more important role in armed conflicts. They often fail to comply with international conventions on armed conflict and use any means available to achieve their own goals. In addition, the unprecedented technological development of society in general, but also the unrestricted access to these types of technologies further facilitates the use of unconventional methods by malicious non-state actors in support of their own interests. Therefore, it can be seen that, nowadays, the complexity of armed conflicts has increased exponentially, and the identification and understanding of the problem, the causes of conflicts, as well as the ways to resolve it have become increasingly difficult to achieve. In this regard, I believe that the military should develop appropriate procedures to support the correct understanding of what needs to be done to achieve success and to insist on optimizing the mission analysis as part of the military operations planning process, analysis that should develop the correct understanding of the situation and should support viable future options to solve the conflict.</em></p> George-Ion TOROI Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-26 2021-07-26 17 1 78 84 10.53477/2668-2028-21-08 AMERICAN ANTI-MISSLE SHIELD, EASTERN EUROPEAN ASSET TO DISCOURAGE BALLISTIC ATTACKS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1137 <p><strong><em>Abstract: </em></strong><em>Air-missile defense is a mission of anti-aircraft missile troops known in the field as anti-missile shield. It describes an anti-ballistic area intended for research, discovery, interception and combat of surface-to-air or air-to-air missiles with ballistic trajectory. The existence of the anti-missile shield implies the creation of a security zone of allied states, institutional structures and population that can ensure their functionality and existence, deployed on an alignment (territories of several states), in order to maintain a state of normalcy and security. This defense system must include the threatened states, members of the politico-military alliance, regardless of their economic and military power. The security environment also concerns both the population of those countries and the objectives of great political, economic, strategic, critical and military infrastructure importance.</em></p> Valentin PETRESCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-10 2021-08-10 17 1 85 91 10.53477/2668-2028-21-09 GLOBALIZATION – A FORM OF MANIFESTATION OF THE HYBRID WAR https://revista.unap.ro/index.php/XXI_FCSM/article/view/1126 <p><strong><em>Abstract:</em></strong><em> The growing scale and diversity of specific events of globalization, taking place on a global scale in the first two decades of the 21st century prove indisputably that actions assimilated to the hybrid warfare have become the most significant threat to nations. Unlike conventional warfare, hybrid forms do not involve direct or declarative actions of open conflict, but rather involve complex issues that are constantly unfolding and that are constantly evolving. Like globalization, the conflict no longer has a geographical delimitation or an infrastructure component, and populations are no longer the main fighters of these conflicts. In this article I will seek to answer some questions about the phenomenon of globalization and its implications for amplifying the manifestations of hybrid warfare in the contemporary operational environment, especially those of a cyber, terrorist, climatological, biological and organized crime nature, while presenting the concerns of international actors for increasing investments in research in the armament industry, improving military intelligence and long-range capabilities, in order to use military power as a tool of intimidation in foreign policy, active involvement of forces in punishing actors on the “axis of evil”, as well as the partial recovery of old areas of influence at regional or global level.</em></p> Paul MIHAI Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-26 2021-07-26 17 1 92 100 10.53477/2668-2028-21-10 SUAV WARFARE IN THE NEXT DECADE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1138 <p><strong><em>Abstract</em></strong><em>: In this document we have focused on researching the so-called "Small Unmanned Aerial Vehicles" in order to find out what their main characteristics are and how they may affect the way we fight in the future. To achieve our goal, we have established several subjects relevant to any fighting system: design, manufacturing, tactical capabilities, logistics, recent experiences. After analyzing them we have come to a series of conclusions.</em></p> Rodríguez YAGO Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-11 2021-08-11 17 1 103 110 10.53477/2668-2028-21-11 PASSIVE RADIOLOCATION. DISTANCE ESTIMATION METHODS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1139 <p><strong><em>Abstract:</em></strong><em> The timely discovery of existing threats in the airspace is a permanent concern of the relevant military powers of this century and sensor networks have been developed in this regard, arranged over very large geographical areas in order to achieve a permanent and continuous surveillance of the areas of interest. Research conducted by the scientific community has demonstrated the potential of bistatic (passive) radar as a means of surveillance, the efforts focusing on improving receiver parameters and signal processing algorithms. An important role in these scientific approaches is played by the geodetic distance estimation methods, as well as by the diversification of technical solutions that provide the necessary support for their application and the establishment of algorithms for refining the data provided.</em></p> <p><em>&nbsp;</em></p> Pătru PÎRJOL Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-11 2021-08-11 17 1 111 118 10.53477/2668-2028-21-12 NSOF AND ROTARY-WING PLATFORMS – INTEGRATED OR JOINT? https://revista.unap.ro/index.php/XXI_FCSM/article/view/1122 <p><strong><em>Abstract: </em></strong><em>There is today a burgeoning discussion about how Romanian Naval Special Operations Forces (RNSOF) is supported in maritime operations by the conventional means of the Romanian Navy rotary-wing platforms. As part of this approach, we set out to analyze the regulatory framework for ensuring the support of naval aviation in the execution of NSOF missions. Thus, we will study the evolution of the cooperation of the ROU Navy Helicopter Group and NSOF from the perspective of regulations on cooperation, training, common standard operating procedures, references on standardization and safety in the execution of training and missions in the maritime environment.</em><em>&nbsp;This research addresses an aspect of special operations that has yet to be explained adequately.</em> <em>To achieve this goal, we will describe how these operations are conducted in NATO countries, which have integrated maritime aviation in support of naval forces for special operations in the maritime environment.</em> <em>According to the specified causes to achieve our objectives, we will search for solutions to compensate or reduce the gap between necessity and reality. Through comparative analysis and documentation on the strategies used by foreign military forces, with similar roles and missions, we will provide solutions that will cover an area that can vary from adapting procedures to establishing the need to develop certain regulations.</em> <em>Our study is addressed to persons involved or interested in the military field and special naval operations and aims to highlight the importance of developing the NSOF capacity to cooperate with integrated maritime aviation and adjusted to the requirements of the execution of special maritime operations.</em> <em>Taking these recommendations into account will increase the effectiveness of NSOF maritime operations with the support of rotary-wing platforms while ensuring the transition to a robust/ real joint NSOF capability in response to existing threats in the Black Sea.</em></p> Dan-Marian UNGUREANU Ioan MOLDOVAN Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-23 2021-07-23 17 1 119 125 10.53477/2668-2028-21-13 DIVERS' ACTIONS IN THE RIVERINE AREA https://revista.unap.ro/index.php/XXI_FCSM/article/view/1140 <p><strong><em>Abstract: </em></strong><em>This approach proposes an analysis and a presentation of divers’ actions in the riverine area in order to combat the risks and the threats which can occur there, correlated with the features and the characteristics of the environment and with the objectives of the Navy. The identification of new insights and opportunities of involving the divers in this domain through concrete, focused actions having a maximum effect in the preservation of a security climate in the riverine area is the novelty of this approach. While analyzing the actual possibilities of divers’ actions in the riverine area, this article is pleading regarding the importance of using divers in this environment and it is structured on two directions. The actions of the military divers in the riverine area contain these directions that meet the national objectives regarding maintenance or getting the control over the main economic and military objectives concomitant with the research, capture or destruction of enemy`s forces. I am addressing this approach to the specialists and to those who are interested in divers’ way of actions in the riverine environment. Divers are an especially important tool among the whole range of military actions in the riverine area. The actions taken by divers usually offer depth to the campaign and they have a significant role in preserving the riverine area.</em></p> Bogdan VOINESCU Ionel POPESCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-11 2021-08-11 17 1 126 133 10.53477/2668-2028-21-14 MARINE MAMMALS IN NAVAL OPERATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1121 <p><strong><em>Abstract: </em></strong><em>This paper aims to provide an overview how to employ marine mammals in naval operations and also to identify possibilities of involving mammals in support of the Romanian Naval Forces. The article uses domain observation and comparative analysis of how to employ marine mammals in the actions of modern fleets. For this purpose, we set out to identify the possibilities of using mammals for military scopes. Also, we will provide historical aspects of involving mammals in military activities in the Black Sea. In addition, we will offer relevant implications and perspectives regarding the use of marine mammals by the Romanian Naval Forces. The novelty of this article comes from the motivation to bring to the attention of Romanian Naval Forces the approach of employing mammals and developing research in the underwater domain based on training marine mammals. The present article is addressed especially to the master students and the personnel of the Naval Forces, and also to those who contribute to the implementation of feasible ideas at the level of the Romanian Naval Forces and intend to develop the underwater domain in order to discourage actions of a potential adversary</em></p> Ioan MOLDOVAN Dan Marian UNGUREANU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 134 140 10.53477/2668-2028-21-15 THE ECONOMIC-MILITARY IMPORTANCE OF THE BLACK SEA – NORTH SEA CORRIDOR FOR ENSURING STABILITY IN SOUTHEAST EUROPE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1111 <p><strong><em>Abstract: </em></strong><em>During history, the main channel of communication and cooperation between countries was through commerce and, consequently, through transport. Among all the transport ways, the maritime transport is the one that offers the best cost – benefits ratio. This article is addressed to all the people involved or interested in the economic and military fields and aims to highlight the importance of the Black Sea and North Sea connecting corridor in ensuring peace and stability in Europe in general and in South-Eastern Europe in special. To achieve this goal, we will review the historical conflicts among European countries for waterway control and make a descriptive analysis of the stability situation in the areas affected by them. Furthermore, using the hypothetical-deductive method, we will highlight the manner in which the connection of the Black Sea with the North Sea has influenced economic and military exchanges between riparian states and the impact on stability across European continent. At the end of the article, we will show how economic and military stability in south-eastern Europe is influenced and threatened by geopolitical changes in the wider Black Sea region and how this stability can be maintained and strengthened due to the great possibilities for economic cooperation among the countries of Western and South-Eastern Europe. The novelty of this approach is that it aims to analyze the importance of the Black Sea-North Sea channel in the context of fundamental changes in the politico-military situation in South-East Europe, generated by the expansion of the Russian Federation and the conflict between Turkey and Greece, NATO member countries.</em></p> Valentin-Costinel TOTIR Roxana ALEXANDRU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-21 2021-07-21 17 1 141 146 10.53477/2668-2028-21-16 RUSSIAN MILITARY DIVERSION – MASKIROVKA, USED IN THE BLACK SEA AREA https://revista.unap.ro/index.php/XXI_FCSM/article/view/1110 <p><strong><em>Abstract: </em></strong><em>Taking into consideration the influence this doctrine has, being used in the maritime environment, over the Black Sea riparian countries, we consider that the analysis of its effects is an element of novelty and interest. The research methods used are observation, analysis and description. At the end of this article, we attempted to identify a pattern of the methods used to implement this doctrine in the Black Sea region. To this purpose, in order to identify the doctrine’s general framework, we will take into consideration threats and risks, indications and warnings. Through this approach, we wish to address specialists, researchers and students who want to analyze these issues and develop courses of action, in order to give an optimate response, in the conditions of a maritime or riverine threat.</em></p> Roxana ALEXANDRU Valentin-Costinel TOTIR Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-21 2021-07-21 17 1 147 152 10.53477/2668-2028-21-17 THE ESSENCE OF MODERN TERRORISM AND THE DEVELOPMENT OF COMPREHENSION OF THE NATURE OF TERRORISM https://revista.unap.ro/index.php/XXI_FCSM/article/view/1107 <p><strong><em>Abstract: </em></strong><em>Terrorism as a phenomenon has a complex structure in which ideological, social, religious, ethnic, psychological and other elements are intertwined. Modern terrorism is a complex and dynamic phenomenon that successfully adapts to the political and economic situation. Effective counteraction is beyond the power of any independent specialized institution or individual country. Understanding of the concept of terrorism is linked to the analysis of the common features of modern terrorism. Based on the content of ideology and motivation, as well as the specifics of the methods of action, there are differences between terrorism based on left and right ideologies, on nationalism and separatism, and with different religious motivations.</em></p> <p>&nbsp;</p> Petar MARINOV Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-20 2021-07-20 17 1 155 161 10.53477/2668-2028-21-18 THE MODERN PROCESSES OF RADICALIZATION AND THEIR CONNECTION WITH TERRORIST ACTIVITY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1108 <p><strong><em>Abstract:</em></strong><em> In its modern manifestations, terrorism increasingly relies on synergy between different influences and approaches. This allows the impact, the effect of which significantly exceeds the mechanical sum of the effects of the individual forms and approaches.</em> <em>The main component and motivational tool of terrorism is the process of radicalization. Despite the lack of consensus on the understanding of the phenomenon of radicalization. This phenomenon is imposed as a consequence and result of increasingly complex social processes in modern and postmodern societies.</em></p> Petar MARINOV Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-20 2021-07-20 17 1 162 168 10.53477/2668-2028-21-19 LEGAL FRAMEWORK FOR DATA RETENTION IN THE RUSSIAN FEDERATION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1105 <p><strong><em>Abstract: </em></strong><em>The report examines and assesses the existing procedures for data retention to be used to combat crime and terrorism in the Russian Federation. The procedures regarding the control over data retention are presented and systematized. The existing differences between the Russian Federation and the member states of the European Union regarding the adopted legislation are described.</em></p> <p><strong><em>&nbsp;</em></strong></p> <p>&nbsp;</p> Savov ILIN Copyright (c) 2024 STRATEGIES XXI - Command and Staff College 2021-07-20 2021-07-20 17 1 169 174 10.53477/2668-2028-21-20 EUROPEAN INSTITUTIONS AND MECHANISMS FOR PROTECTION OF FUNDAMENTAL RIGHTS AND FREEDOMS OF MILITARY PERSONNEL https://revista.unap.ro/index.php/XXI_FCSM/article/view/1109 <p><strong><em>Abstract:</em></strong><em> Through international treaties, human rights have reached the pinnacle of their legitimacy, being ratified by most countries. Respecting the human rights is the legal foundation for a democratic society in which the military has a defining role. In the comprehensive approach of the European institutions, protecting and promoting the human rights of military personnel are preconditions for regional unity, stability and security. The European documents provide an integrated understanding of the concept of rights and freedoms in relation to the special status of military personnel in society, representing regulated standards of conduct. Promoting the culture of respect for the fundamental values of human rights, both in the process of military education and training, as well as in exercising their specific tasks, represents an instrument for maintaining the order, discipline and morale of the military, ensuring the effectiveness of military actions and an overwhelming factor supporting the achievement of strategic objectives.</em></p> <p><em>&nbsp;</em></p> <p>&nbsp;</p> Madălina PREDA (DAVIDOIU) Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-21 2021-07-21 17 1 175 182 10.53477/2668-2028-21-21 CURRENT THREATS TO WORLD SECURITY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1141 <p><strong><em>Abstract:</em></strong> <em>Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21<sup>st</sup> century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security<strong>.</strong></em></p> Viliam PASTOR Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-11 2021-08-11 17 1 183 189 10.53477/2668-2028-21-22 MILITARY POWER AND ITS IMPORTANCE IN MAINTAINING MILITARY BALANCE IN EASTERN EUROPE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1142 <p><strong><em>Abstract:</em></strong> <em>The frequent increasingly challenges, registered in the Eastern European security environment, require an unconventional approach due to the fact that classical typology of conflict has long become history, being replaced by the asymmetric type of conflict.</em> <em>Can European society overcome the new atypical security crises imposed by the military threat of Eastern European origin? Can the balance of military power be maintained so that Western society continues to enjoy security and democracy? These are just two legitimate questions that European states need to have a clear answer to, based on resource allocations in the military operational environment. Moreover, it is clear that security requires investments from a financial point of view and these must be continuous and at the minimum accepted level, like 2% of GDP, at the level of each NATO Member State.</em></p> Viliam PASTOR Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 190 197 10.53477/2668-2028-21-23 MISSION COMMAND – AN ESSENTIAL REQUIREMENT TO ACCOMPLISH THE MISSION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1124 <p><strong><em>Abstract:</em></strong><em> Today’s conflicts generate a complexity of requirements including command and control challenges, deployment and maneuver issues, delivering superior firepower, ensuring appropriate sustainment and protection and others. Present battlefields as much as in the past impose a different philosophy of command. Uncertainty, ambiguity and frictions are inherent in combat and commanders have to express their initiative in order to exploit fleeting opportunities and strike enemy’s vulnerabilities. Therefore, an effective command way of thinking is needed. Mission command is the philosophy of command that gives commanders the authority to manifest and exercise their initiative in conducting military operations. The key in mission command philosophy is commanders’ clear intent and subordinate commanders’ willing to act. </em></p> Claudiu Valer NISTORESCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-23 2021-07-23 17 1 198 206 10.53477/2668-2028-21-24 KEY LEADER ENGAGEMENT – CONCEPTUAL DELIMITATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1143 <p><strong><em>Abstract: </em></strong><em>In the information age, the strategic, operational and tactical levels are more interrelated than in the past, which demands a different quality of co-ordination and command and control (C2) across the levels of engagement. Today’s military operations to counter the complex challenges of the global security environment require consideration and integration of the information factor throughout all processes – analysis, planning, execution and assessment. Key Leader Engagement (KLE) is an important element of C2 that the commander can use to achieve this. These engagements can be used to shape and influence local leaders within the operations area or may also be directed toward leaders who may influence specific groups based upon military, social, religious, and traditional patterns. Military commanders and diplomats have been meeting with important local officials for decades in different countries and mission areas, but the new security challenges express the need for collaborative C2 have renewed the interest in this concept. This article is based on a literature review and my personal experience gained through ATALANTA Operation mandate, as FOPS Jn KLE. This project is the first attempt to empirically evaluate the impact of key leader engagements as part of naval operations. It gives a flavour of what KLE is and how it can be integrated in the Navy Doctrine, especially in the multinational operations where ROU Navy is frequently involved. Through this approach, I address not only the specialists, those who contribute to the development of operative and doctrinal documents, but also the ones that are continuously self-educated as part of the resilient leadership process.&nbsp; </em></p> Ionel POPESCU Bogdan VOINESCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 207 213 10.53477/2668-2028-21-25 OPERATION ORDER: CONCEPT, FORMAT AND EVOLUTION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1125 <p><strong><em>Abstract</em></strong><em>: The delivery of information from the highest command level to the execution level has always required the existence of a format that can ensure both the fluidity of information and the same language of communication for all soldiers involved in the process. This format, perfected over time, has provided the standard necessary for the development, transmission and especially understanding of the main documents specific to the planning of operations, and here I have in mind the concept, plan or different types of operation orders.</em></p> Cătălin CHIRIAC Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-23 2021-07-23 17 1 214 222 10.53477/2668-2028-21-26 PHYSICAL EDUCATION AND SPORT IN THE VISION OF INTERNATIONAL INSTITUTIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1120 <p><strong><em>Abstract: </em></strong><em>The article briefly presents the initiatives for the development of physical education and sports in the world and in Europe. It also presents the main documents that manage this field of activity in the Romanian Armed Forces. </em><em>The beneficial effects, resulting from the multidisciplinary values ​​of physical education and sports, have been known and recognized since antiquity. However, only towards the end of the twentieth century the activities in the field of physical education and sports, which target the human being as well as society as a whole, came more strongly into the attention of international institutions. Gradually, this area has been recognized for its important role in the development of human resources and interpersonal relations, in increasing the quality of life and mutual respect, in developing a sustainable economy, and in reducing corruption, crime and crime-related phenomena of international terrorism.</em></p> Marius Constantin ISTRATE Alin-Dumitru PELMUŞ Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 223 228 10.53477/2668-2028-21-27 EFFORT IN THE MILITARY PHYSICAL EDUCATION AND SPORTS TRAINING SESSION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1119 <p><strong><em>Abstract:</em></strong><em> The article analyzes the aspects related to the dynamics and direction of the effort in the military physical education and sports training session. At the same time, during the article we will present the general characteristics of the effort in physical activities, characteristics that are absolutely valid for many disciplines in the process of military training. It is also noted that the specific efforts of physical education and sports in the army are important energy consumers as they demand the somato-functional and mental response of the military. In this sense, the proper dosing and directing of the effort involves improving the body of the military at different levels, necessary for the training for fighting at performance standards.</em></p> Alin PELMUȘ Marius-Constantin ISTRATE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 229 234 10.53477/2668-2028-21-28 BIOLOGICAL REQUIREMENTS IN EFFORT AND BODY RECOVERY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1118 <p><strong><em>Abstract:</em></strong><em> During physical effort, regardless of its nature, a series of processes take place in the body that can lead to energy consumption that can unbalance homeostasis. After physical effort, the body needs a period of recovery, for the preparation of future physical efforts at optimal parameters and the creation of conditions to increase the capacity of effort, being part of the training process, with a role in creating storage conditions. To help the body be prepared to perform the next physical effort at optimal parameters, it is necessary to apply some means and methods of recovery. Recovery is natural, and can be supplemented and accelerated by guided recovery if the physical effort has led to the depletion of the energy substrate used and there is no time to be restored naturally.</em></p> Ion ANDREI Elvira Gabriela ANDREI ANDREI Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 235 238 10.53477/2668-2028-21-29 VIRTUAL LEARNING ENVIRONMENTS FOR ESL COURSES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1106 <p><strong><em>Abstract:</em></strong><em> As the time in which online teaching and learning was still an element of novelty has long been gone, virtual learning environments have to be studied thoroughly so that they will provide students not only with the necessary knowledge, but also with the proper tools to meet their learning objectives. The advancement in information technology and the access to an almost inordinate number of learning and teaching tools should have already been fructified and, as a result, not only teachers, but also learners should have already picked up the fruit of knowledge grown in the vast virtual environment of the Internet. However, as education has recently moved almost entirely online, some questions have arisen. Are the Virtual Learning Environments (VLEs) enough to offer ESL students both motivation and knowledge? Will foreign languages benefit from this growing trend or will traditional, face-to-face interaction, prove to have been more efficient? The present article will look into some of these questions and into the benefits of VLEs in the context of the Covid-19 pandemic. </em></p> Ana-Maria CHISEGA-NEGRILĂ Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-20 2021-07-20 17 1 239 243 10.53477/2668-2028-21-30 ARESIBO HORIZON 2020 EUROPEAN RESEARCH PROJECT – ENRICHED SITUATION AWARENESS FOR BORDER SURVEILLANCE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1129 <p><strong><em>Abstract.</em></strong><em> The paper aims to introduce the ARESIBO project to a greater but targeted audience and outline its main scope and achievements. ARESIBO stands for “Augmented Reality Enriched Situation awareness for Border security”. In the recent years, border security has become one of the highest political priorities in EU and needs the support of every Member State. ARESIBO project is developed under HORIZON 2020 EC Research and Innovation program and it is the joint effort of 20 participant entities from 11 countries. Scientific excellence and technological innovation are top priorities as ARESIBO enhances the current state-of-the-art through technological breakthroughs in Mobile Augmented Reality and Wearables, Robust and Secure Telecommunications, Robots swarming technique and Planning of Context-Aware Autonomous Missions, and Artificial Intelligence (AI), in order to implement user-friendly tools for border and coast guards. The system aims to improve the cognitive capabilities and the perception of border guards through intuitive user interfaces that will help them acquire an improved situation awareness by filtering the huge amount of available information from multiple sources. Ultimately, it will help them respond faster and more effectively when a critical situation occurs.</em></p> Konstantinos CHARISIS Andreas TSIGOPOULOS Spyridon KINTZIOS Vassilis PAPATAXIARHIS Copyright (c) 2024 STRATEGIES XXI - Command and Staff College 2021-07-28 2021-07-28 17 1 247 255 10.53477/2668-2028-21-31 BRINGING C2 CLOUD SOLUTIONS ON THE MILITARY FIELD https://revista.unap.ro/index.php/XXI_FCSM/article/view/1144 <p><strong><em>Abstract</em></strong><em>: There is a permanent demand from the operational military echelons to have C2 systems up and running in terms of hours from the moment of request. Even more, complementary C2 systems should be available in real time, all the time. The areas of specializations of different BOSs that a C2 system should integrate or make use of the exchanged data put a high pressure on the software architecture and the technological stack the C2 solution should be based on. We develop C2 software solutions that offer core services to military organizations, from tactical echelons to tactical-operational echelons. Deploying the same solution on several nodes is not an easy task. Maintaining, but improving with new functionalities a software solution already deployed on the field is a complex tax, requires a sophisticated logistic process, long planning and execution phases. In time, discrepancies could appear among different installed versions and is hard to maintain such configurations. Aiming to offer to Romanian Army a C2 software solution that is fast, modern, scalable, easy to deploy, capable to run online 24/24h we switched to a cloud technological stack for our C2 solution and we intend to have the same C2 base platform on all our future deployments.</em></p> Marian IVĂNESCU Mihai PALADE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 256 259 10.53477/2668-2028-21-32 LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM IMPLEMENTATION IN A MICROCONTROLLER SYSTEM https://revista.unap.ro/index.php/XXI_FCSM/article/view/1130 <p><strong><em>Abstract:</em></strong><em> With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).</em></p> Alexandru VULPE Raluca ANDREI Alexandru BRUMARU Octavian FRATU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-28 2021-07-28 17 1 260 264 10.53477/2668-2028-21-33 HONEYPOT TECHNOLOGIES FOR MALWARE DETECTION AND ANALYSIS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1145 <p><strong><em>Abstract</em></strong><em>:</em> <em>In this paper, we offer a brief summary of latest developments in honeypot technologies, used for malware detection and analysis. This includes not only honeypot software, but also methodologies to analyze captured honeypot data. As such, our focus in this work is to keep track of current developments related to traffic analysis, especially honeypot technologies, as a means of data capture and interpretation of malicious traffic. Zero-day attacks are still very hard to predict, then handle, by any security platform. Means to successfully predict an attack is of paramount importance to the world of cybersecurity. Effective network security administration depends, to a great extent, on the understanding of existing and emerging threats propagated over the web. In order to protect information systems and its users, it is of crucial importance to collect accurate, concise, high-quality information about malicious activities, for security researchers to be able to reverse-engineer, then understand and stop a malicious actor. </em></p> Dragoș DRĂGHICESCU Alexandru CARANICA Octavian FRATU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 265 271 10.53477/2668-2028-21-34 INVESTIGATING PRIVACY LEAKS IN IOS APPLICATIONS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1114 <p><strong><em>Abstract: </em></strong><em>The concern for protecting personal data has been raised many years ago and has been kept on sight ever since. People have to trust their devices and the applications they use so smartphone company survive on the market. Apple treats the security side very seriously and tries to reduce any malicious behaviour as early as possible. This is the main reason they introduced the vetting process to filter out the applications that seem suspicious and only publish legit applications on the App Store. Although the theory looks just fine, there have been multiple applications removed from the App Store because of malicious behaviours that couldn’t be found during the vetting process. In this paper we focus on finding personal data leaks through already published applications in the App Store</em><em>.</em></p> Adriana-Meda UDROIU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 272 278 10.53477/2668-2028-21-35 MALWARE PROTECTION SYSTEM ON ANDROID https://revista.unap.ro/index.php/XXI_FCSM/article/view/1115 <p><strong><em>Abstract</em></strong><em>: At the moment of writing this report (august 2018), the Android has a worldwide market share of 76.88%, being in an ascending slope since 2009, with an increase of 4.14% since the same period on last year and leaving its rival iOS far behind, at 20.38%<a href="#_ftn1" name="_ftnref1"><strong>[1]</strong></a>. Also, Google announced in 2017 that more than 2 billion users are monthly active on devices. These 2 facts make this OS the most important one on the mobile devices and not only smartphones, as nowadays even the smartwatches are using Android (named Wear) being in continuously improving the experience to be as close as the one on phones<a href="#_ftn2" name="_ftnref2"><strong>[2]</strong></a>.</em></p> <p>&nbsp;</p> <p><a href="#_ftnref1" name="_ftn1">[1]</a> Mobile Operating System Market Share Worldwide, <a href="http://gs.statcounter.com/os-market-share/mobile/worldwide">http://gs.statcounter.com/os</a><a href="http://gs.statcounter.com/os-market-share/mobile/worldwide">-</a><a href="http://gs.statcounter.com/os-market-share/mobile/worldwide">market</a><a href="http://gs.statcounter.com/os-market-share/mobile/worldwide">share/mobile/worldwide</a></p> <p><a href="#_ftnref2" name="_ftn2">[2]</a> The best Wear OS smartwatches: LG, Fossil, Huawei, Polar and more, <a href="https://www.wareable.com/smartwatches/best-android-watch">https://www. wareable.com/smartwatches/ best</a><a href="https://www.wareable.com/smartwatches/best-android-watch">-</a><a href="https://www.wareable.com/smartwatches/best-android-watch">android</a><a href="https://www.wareable.com/smartwatches/best-android-watch">-</a><a href="https://www.wareable.com/smartwatches/best-android-watch">watch</a><a href="https://www.wareable.com/smartwatches/best-android-watch">.</a></p> Adriana-Meda UDROIU Mihail DUMITRACHE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 279 286 10.53477/2668-2028-21-36 USABLE SECURITY IN BIOMETRIC AUTHENTICATION SYSTEMS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1116 <p><strong><em>Abstract</em></strong><em>: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.</em></p> Adriana-Meda UDROIU Ștefan-Antonio DAN-ȘUTEU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 287 292 10.53477/2668-2028-21-37 THE EFFECT OF COVID-19 EPIDEMIC ON DIGITALIZATION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1117 <p><strong><em>Abstract: </em></strong><em>When the COVID-19 epidemic hit Europe at the end of February 2020, most countries enforced a lock down period. In terms of public services, that means that citizens could rely only on digital services provided by the Government or local authorities. In countries with a low level of digitalization, the lock down generated a freeze of some public sectors. One of those countries was Romania, which since March 2020 has had a mixed approach to the bureaucratic challenges that were brought by COVID-19 global pandemic. In March 2020, with an almost nonexistent and underdeveloped digital infrastructure, Romania could only take emergency measure in terms of public services. More precisely, all non-urgent services were frozen or postponed while the validity date of official documents (e.g. medical certificates, identity cards) was extended. Starting with May, some public institution managed to provide some sort of digital services, though most of them do not comply with the data protection regulations</em><em>.</em></p> Adriana-Meda UDROIU Ionuț SANDU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 293 297 10.53477/2668-2028-21-38 DIGITALIZATION OF THE MODERN FIGHTING FIELD UNDER CYBER SECURITY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1112 <p><strong><em>Abstract: </em></strong><em>The digitalization of the modern battlefield is a product of technological development in the field of communications and information technology. With the digitalization of modern communication systems and information technology, malicious programs/applications have been developed that can destabilize the cyberspace infrastructure. The complexity and diversity of cyber-attacks have generated fierce competition among states to ensure supremacy of cybersecurity in cyberspace. Most cybersecurity experts appreciate that research in this relatively new field is only at the pioneering level. The future and technological evolution in the field of cybersecurity will show us that, at the moment, very little is known about how cyberspace will look and develop. Although the civilian environment has the supremacy in terms of the technological development of cyberspace, it is certain that the military environment will import new technologies and adapt them to its own requirements.</em></p> Ovidiu-Dumitru RUSU Sorin TOPOR Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-21 2021-07-21 17 1 298 302 10.53477/2668-2028-21-39 NEW PERSPECTIVES OF SIMULATION MODELING IN THE OPERATIONAL ART OF MILITARY ACTION PLANNING THROUGH SOFT SYSTEMS METHODOLOGY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1146 <p><strong><em>Abstract:</em></strong><em> The contemporary operational environment is mainly determined by the dynamics of the phenomena occurring within the connections of the societal fields. Decoding the reality and designing military actions have shifted to new coordinates of the operational art, in terms of the way the factors of influence that change the status of each societal field are jointly approached. The term societal has acquired new meanings in the context of the overconnectivity of the fundamental domains of the society which are the following: political/diplomatic, military, economic, social, medical – pandemic, infrastructural, informational, environmental and geo-strategic. The operational art of military action planning is based on decoding the operational environment and includes analyses with different level of detail depending on the approached societal field. The analyses result in different models of action of the opponent that involve organizing and reorganizing the friendly formations that will be planned to take part in operations. Deciding for or against certain options for resolving a (military) crisis situation takes place following repeated simulations until favorable results are obtained. In this article, we aimed to bring to the attention of the specialists in the field of military action planning the integrative methodology of "design thinking" the main aspects related to the impact of the dynamics of the societal domains network in the perspective of the simulated modeling in military action planning.</em></p> Daniel ROMAN Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 303 310 10.53477/2668-2028-21-40 THE INTERDISCIPLINARITY OF EFFICIENT MEDICAL EQUIPMENT ACQUISITION PROCESS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1113 <p><strong><em>Abstract: </em></strong><em>In the context of increasing healthcare demand, as a result of an aging population, and current budgetary constraints, as a result of reduced public resources, the decision to invest in efficient medical equipment is a challenge for most health facilities, constantly concerned with promoting innovative and sustainable solutions, as well as results-based ones, in order to increase the value of health technologies and the overall benefits of patients. In order to achieve the balance between safety, quality, costs and benefits and the realization of the best value of medical equipment, the decision-making process requires a multilateral evaluation of financial, clinical and social impact instruments, represented by relevant profitability, life cycle costs, results delivered and overall productivity. In the case of procurement of medical equipment, the lowest price of an economic offer is not an award criterion that strictly reflects the value or efficiency of the technology and departmental procurement structures must include in the evaluation strategies and complementary factors to the process, to add value to the medical organization.</em></p> George UDROIU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-22 2021-07-22 17 1 313 322 10.53477/2668-2028-21-41 ASPECTS REGARDING THE USE OF ARTIFICIAL INTELLIGENCE IN IMPROVING DEFENSE RESOURCE MANAGEMENT https://revista.unap.ro/index.php/XXI_FCSM/article/view/1147 <p><strong><em>Abstract:</em></strong><em> Regarding the society evolution dominated by a high-level technology, we consider this article a constructive approach. The aim of the paper is to highlight a few activities/places/spots in which competences of humans/soldiers interfere with different elements of the artificial intelligence. We deem that the technological progress in the past few years has been impressive. Nowadays, thousands of activities that were mostly or exclusively executed by people can be done faster and often with greater precision using digital systems. In this instance and considering the achievement of functional compatibility between Romanian Army and forces from NATO as being a priority, the development of the technology based on artificial intelligence is vital within the defense resource management. </em></p> Gabriela-Florina NICOARĂ Gergonia-Cristiana BOGĂȚEANU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 323 330 10.53477/2668-2028-21-42 CONSIDERATIONS REGARDING THE PERFORMANCE OF THE LOGISTIC SUPPORT OF THE SOVIET ARMY IN THE AFGHAN WAR https://revista.unap.ro/index.php/XXI_FCSM/article/view/1148 <p><strong><em>Abstract: </em></strong><em>The reasons why Soviet troops invaded Afghanistan in the 1980s became the subject of disputes, articles, or even inspiration for the books of military analysts. The interest shown around this subject extended to the Soviet military doctrine, tactics, equipment, forces design (architecture), the number of military employees, the pursued purpose, etc. In this regard, in order to identify "lessons learned" possibly useful in the field of current logistical support, this article aims to analyze, from a logistical perspective, the Soviet effort during the 9 years of military actions taken in Afghanistan.</em></p> Gabriela-Florina NICOARĂ Ionel BUCICĂ Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 331 339 10.53477/2668-2028-21-43 THE ROLE OF TAXES AND FEES IN SECURING THE STATE'S FINANCIAL RESOURCES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1149 <p><strong><em>Abstract</em></strong><em>: In this article, I set out to highlight the importance of the role of taxes and fees in the formation of budget revenues in the context of the situation generated by the SARS-CoV-2 virus and fiscal tactics adopted by European states in 2021 to combat economic imbalances caused by pandemic situation. In these conditions, I believe that the state in a market economy must be present, both in political life and in economic and social life, having as its main role the provision of public goods and services. Moreover, in order for the state to be able to fulfill its functions and attributions regarding satisfy the general requirements of the society, in special conditions, it is necessary to identify the additional finances. The largest share in the state's financial resources is held by mandatory levies, which are made through taxes and fees. Also, I believe that through this article I will make a theoretical basis that allows the development of research topics in the financial and fiscal field, starting from the risks generated in the field by the pandemic situation.</em></p> Mădălina SCIPANOV Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 340 348 10.53477/2668-2028-21-44 THE MANAGEMENT OF CRITICAL INFRASTRUCTURES KNOWLEDGE APPROACHED FROM SECURITY AND DEFENSE PERSPECTIVES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1150 <p><strong><em>Abstract</em></strong><em>: In the context of the growing interest in approaches to the resilience of the state, community or society, materialized in the expression of opinions, statements, views, academic studies or projects with viable medium and long term results, conclusions can be drawn regarding the importance of critical infrastructures in the functioning of the society and especially regarding their role in the context of military actions in the context of hybrid warfare. Briefly and from different angles, both from theory to practice and vice versa, the emphasis in this article is to highlight the main lines of effort, both theoretical and factual, necessary to be set and operationalized in order to enhance the specific knowledge of these assets, in terms of security and defense. Against this backdrop, the present approach regarding strategic resources is in fact useful to the military decision-makers from a wider functional perspective, especially in view of the current stage of the researches and studies carried out so far in this field, at national level. </em></p> Dorel BADEA Diana Elena RANF Gabriel MĂNESCU Cosmin PIELE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 351 357 10.53477/2668-2028-21-45 SYSTEMIC APPROACH FOR CRITICAL INFRASTRUCTURES, HIDDEN VULNERABILITIES OF INTERDEPENDENCIES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1151 <p><strong><em>Abstract: </em></strong><em>The growing scientific interest in the field of critical infrastructure protection has been determined by society's growing dependence on the essential services provided by these infrastructures. Critical infrastructures do not work isolated, they establish complex and dynamic networks of interdependencies. A critical infrastructure is itself a system with its own components and operating principles, a system connected to a system of systems based on multiple determinations. Critical infrastructure systems are built based on interdependent relationships between infrastructures, manifesting itself as an open system that relates to the macro-social system. Critical infrastructure systems behave dynamically and react to external stimuli represented by threats. Interdependencies between critical infrastructures generate new vulnerabilities and threats, based on the spread of effects and consequences. A comprehensive approach for critical infrastructure risks requires a systemic approach, taking into account that the interconnection of critical infrastructure objectives also involves the interconnection of threats and vulnerabilities.</em></p> Sorina-Denisa POTCOVARU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 358 363 10.53477/2668-2028-21-46 MODELING AND SIMULATION IN CRITICAL INFRASTRUCTURES PROTECTION https://revista.unap.ro/index.php/XXI_FCSM/article/view/1152 <p><strong><em>Abstract: </em></strong><em>Critical infrastructure protection is a complex field that involves using specific research methods, capturing the dynamic and complex reality in which infrastructure systems evolve. Modeling and simulation provides particular tools and approaches adapted to the field of critical infrastructure protection. A good knowledge of the methodology and using the appropriate tools can lead to improvements in the security of critical infrastructures. Creating models for infrastructures or systems facilitates research, followed by the simulation of potential events with a negative impact. The studies carried out at the intersection of the two fields open new research opportunities to improve the modeling and simulation tools and increase the resilience of critical infrastructures. The specific modeling and simulation methods find their applicability at the operator's or owners' activity for the elaboration of the security plans and their validation.</em></p> Sorina-Denisa POTCOVARU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 364 370 10.53477/2668-2028-21-47 THE ISSUE OF INFORMATION TECHNOLOGIES WITHIN CRITICAL INFRASTRUCTURES https://revista.unap.ro/index.php/XXI_FCSM/article/view/1153 <p><strong><em>Abstract</em></strong><em>: Taking into account the need for computerisation and process automation within critical infrastructures, a whole process of choosing the most appropriate software technologies is born, both in terms of security, but also in terms of costs and development opportunities. This problem is encountered by all states, but also by private companies, has favoured the creation of an environment conducive to the development of computing technologies in three directions, namely: in-house software, open-source technologies and proprietary technologies.</em> <em>The current challenge is to find medium and long-term solutions for the rapid interconnection or redesign of these three types of information technology in order to process data from government systems, in order to perform complex analyses that can meet current needs, keeping in -an equable balance of costs and security level and identifying the most effective solution.</em></p> Alexandru-Cristian SAMOILĂ Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 371 376 10.53477/2668-2028-21-48 PROTECTION OF CRITICAL INFRASTRUCTURE FROM EMERGING THREATS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1154 <p><strong><em>Abstract:</em></strong><em> Today's society is in a continuous transformation towards a digitalized society. The COVID-19 pandemic has accelerated worldwide the transition from the physical to the online environment of services provided by both public and private institutions. With a digitized society in our defense types of risks, threats and risks to critical infrastructures that support digital evolution. Thus, opponents turn their attention to new forms of asymmetric attacks to generate states of terror against states or individuals or groups of people. Thus, among the newest and most developed threats are those that use cyberterrorism, network-based warfare or attacks using technologies imported from the military such as drones carrying improvised explosive devices. Countermeasures and resilient systems must be prepared against them.</em></p> Răzvan ZMĂDU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 377 384 10.53477/2668-2028-21-49 THE HUMAN FACTOR – RESOURCE AND VULNERABILITY WITHIN THE ADMINISTRATION SECTOR https://revista.unap.ro/index.php/XXI_FCSM/article/view/1155 <p><strong><em>Abstract: </em></strong><em>The public administration represents the subsector of one of the 12 sectors with critical infrastructures in Romania, namely the Administration sector. Its role is to ensure the organization and concrete execution of the law, in order to protect the rights and freedoms of citizens. The efficiency and performance of the public administration is mainly determined by the effectiveness of the civil servant. That is why the human factor is the main resource in the administration sector, being also the most vulnerable element of this sector. The unpredictability of human resources makes measures to reduce the vulnerabilities caused by it (human resources) the most difficult to manage.</em></p> Andreea Nicoleta MANCAȘ Cosmin-Daniel NEDELCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-12 2021-08-12 17 1 385 388 10.53477/2668-2028-21-50 CRITICAL INFRASTRUCTURES AND THEIR IMPORTANCE IN MODERN SOCIETIES – PROTECTION, SAFETY, SECURITY https://revista.unap.ro/index.php/XXI_FCSM/article/view/1131 <p><strong><em>Abstract:</em></strong><em> Nowadays, the modern security environment has it foundation based on some vital pilons, that are also important for the normal functionality of the modern society. This paper will offer a new perspective on critical infrastructure protection, defining the relationships that take place freely in a modern society. The international security could be analyzed from functional (systemic) and structural points of view. From the systemic point of view, the global security is characterized by five major systems: political, economic, social (socio-demographic), cultural and ecological. From the structural point of view, besides the above systems there are other ones: military, intelligence, communications and infrastructure (the critical infrastructure, health, financial, culture, education and research). There are certain infrastructures such as: telecommunications, transports, systems of power or water supply, IT systems, diverse systems and emergency services, that are actually fundamental to a prosperous economy and therefore critical to the development of human society. Telecommunications, power systems and transport infrastructures are essential infrastructures that ensure not only the mobility, but also the adequate performance of the armed forces, which is one more reason for which these infrastructures are critical. The degree of development and resilience of national and European critical infrastructures is essential for the economic growth and for ensuring the security and welfare of society on the whole. Therefore, the modern national security, seen as a system or a structure, has been passing through a reform and modernization process in order to adapt to the challenges of the 21<sup>st </sup>Century and the requirements triggered by North Atlantic Treaty Organization and European Union memberships, and not only. In this context there is a need for some security politics and strategy which could increase the national security condition.</em></p> Georgiana-Cătălina CHIȚAC Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-07-30 2021-07-30 17 1 389 398 10.53477/2668-2028-21-51 THE IMPACT OF CRITICAL INFRASTRUCTURES ON ENVIRONMENTAL FACTORS https://revista.unap.ro/index.php/XXI_FCSM/article/view/1156 <p><strong><em>Abstract:</em></strong> <em>The usefulness of critical infrastructure is identified by the goods produced and services provided to society, with great efforts, including the protection of the environment and human health. In this article, the impact of critical infrastructures on the environment is examined from the perspective of environmental factors. Thus, the impact of critical infrastructures on the main environmental factors is examined from the perspective of air, water and soil pollution. Nowadays, the effects of environmental factors, including those produced by critical infrastructure, were seen most strongly in both climate change and the human health. This shows a series of chain reaction effects on nature, plants, animals and people around the world. The endeavor of several states and relevant organizations consists in the considerable effort to mitigate these effects.</em></p> Petrișor PĂTRAȘCU Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-13 2021-08-13 17 1 399 403 10.53477/2668-2028-21-52 EDUCATION AS A CRITICAL INFRASTRUCTURE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1157 <p><strong><em>Abstract</em></strong><em>: Education is generally considered only a social process. Complexity, importance, flexibility and social security are strong arguments in defining education as a critical infrastructure. The educational system as a formal part of education is the one analyzed and the result fully gives education the status of critical infrastructure.</em></p> Laurenţiu GRIGORE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-13 2021-08-13 17 1 404 407 10.53477/2668-2028-21-53 CRITICAL INFRASTRUCTURES AS STRATEGIC OBJECTIVES IN HYBRID WARFARE https://revista.unap.ro/index.php/XXI_FCSM/article/view/1158 <p><strong><em>Abstract: </em></strong><em>&nbsp;The current and future war is of hybrid nature, in which military actions are complementary to actions of economical, political, ideological and diplomatic nature. In this communication, I refer to the domains in which we encounter critical infrastructures and I demonstrate that these critical infrastructures are objectives of strategic importance for both the defender and the attacker.</em></p> Laurenţiu GRIGORE Copyright (c) 2021 STRATEGIES XXI - Command and Staff College 2021-08-13 2021-08-13 17 1 408 412 10.53477/2668-2028-21-54