993 resultados para Hardware IP Security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The subject matter of the analysis conducted in the text is information and anti-terrorist security of Poland, which has been presented within the context of a clash between two spheres – the state and the private sphere. Furthermore, the issues of security have been supplemented with a description of the tasks and activity of the Internal Security Agency, as well as a synthetic appraisal of a terrorist threat to Poland. The main parts of this work are concerned with: (1) the state and the private sphere, (2) " terrorism " and terrorist offences, (3) the tasks and activity of the Internal Security Agency, (4) an appraisal of a terrorist threat to Poland. Given the necessity to elaborate the research problem, the text features the following research questions: (1) To what extent does referring to a threat to security influence a limitation on rights and freedoms in Poland (with regard to the clash between the state and the private sphere)?, (2) To what extent do the tasks and activity of the Internal Security Agency influence the effectiveness of anti-terrorist security in Poland?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The text analyses Poland's internal security illustrated with the example of the tasks and activities of one of the Polish special services, the Internal Security Agency (pol. Agencja Bezpieczeństwa Wewnętrznego – ABW). Although the Internal Security Agency was established as a counter-intelligence service, the scope of its tasks and activities places it among the criminal intelligence services, which is poorly effective in terms of the eradication of crime targeted at the state's internal security. The analysis of the issues of state security in the context of the ISA's activity has been elaborated in the present text with the following research questions: (1) To what extent does the statutory scope of the ISA's tasks lower the effectiveness of the actions aimed at combating crime threatening state security? (2) To what extent does the structural pathology inside the ISA lower the effectiveness of the actions aimed at combating crime threatening state security? The text features an extensive analysis of three major issues: (1) the ISA's statutory tasks (with particular consideration of de lege lata and de lege ferenda regulations), (2) the dysfunctional character of the ISA's activity in relation to the scope of its statutory tasks, and (3) the structural pathology resulting from the 'politicisation' of the Internal Security Agency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By the end of the summer, the EU will launch new crisis management missions in the Horn of Africa, Niger and South Sudan. In this CEPS Commentary, Giovanni Faleg and Steven Blockmans question whether the new deployments will revive the EU’s persona as a global security actor. The authors point out that, without the backing of a comprehensive security strategy rationale, the EU’s re-engagement as a crisis manager that opts for small-scale operations will be seen as a continuation of its sleepwalking through a changing geostrategic landscape.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two stark reminders of the difficulties that people on the move encounter in the Mediterranean have been grabbing headlines recently: the so-called ‘left-to-die’ boat report and the ground-breaking Hirsi judgment. These two instances present the worst of both worlds: the first concerns a migrant boat that was ignored altogether, resulting in many deaths, whereas the second concerns a migrant boat being intercepted but subsequently dealt with in a way that contradicts Europe’s human rights standards. These two cases are neither isolated nor incidental. Instead they are of wider concern to the EU and reminders of structural deficiencies in Europe’s approach to people on the move in the Mediterranean. This paper identifies those cross-cutting deficiencies and proposes recommendations to correct them.