FAQ
The Internal Security Agency logo

Issue 24 (13)

2021 Next

Publication date: 2021

Licence: None

Editorial team

Editor-in-Chief Anna Przyborowska

Secretary Maria Kiszczyc

Issue content

Articles and Dissertations

Krzysztof Izak

Internal Security Review, Issue 24 (13), 2021, pp. 11 - 45

https://doi.org/10.4467/20801335PBW.21.010.13567

The 2015 immigration crisis became a driving force for movements and parties that negate the current political order, including those that do not conceal their xenophobic slogans and ideas. In retrospect, there are more and more signs that the decision to accept the uncontrolled refugee influx was more an expression of wishful thinking than a rational decision, taking into account the actual political situation. Thus, Europe finds itself in a dangerous situation with far-right movements on the one hand, and radical Islam on the other. Each of these formations legitimizes its existence and methods of operation by the existence of the other side, trying to polarize society and create a situation that will somehow force citizens to opt for one of the two options. Paradoxically, Chancellor Merkel’s decision significantly increased the risk of such a scenario, hence the perception of Islamic and right-wing extremism by the German authorities as posing an equal threat to state security. However, it was only the recent terrorist attacks in October and November 2020 in France and Germany that changed the political narrative.

Read more Next

Małgorzata Kudzin-Borkowska

Internal Security Review, Issue 24 (13), 2021, pp. 46 - 62

https://doi.org/10.4467/20801335PBW.21.009.13566

The article discusses the issues of cybersecurity in the Visegrad Group. There is a wide spectrum of information security terminology, but the conceptual category of cybersecurity has dominated strategic documents in recent years. The European Union Cyber Security Strategy of 7, March 2013, claims that cybersecurity commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. The Visegrad Group countries have developed their own cybersecurity strategies based on global models in this field. However, in these strategic documents they declare readiness for broad international cooperation, including Central European, it can be seen that each of them strives to play the role of a leader in Central Europe.

Read more Next

Rafał Wądołowski

Internal Security Review, Issue 24 (13), 2021, pp. 63 - 90

https://doi.org/10.4467/20801335PBW.21.006.13563

The article discusses the administrative regulations regarding the disclosure of secret and top-secret information in the Russian Federation. Moreover, it presents the effective penal code provisions directed against the disclosure of state secrets in Russia and the interpretation of these provisions. The author does not limit himself only to Russian constitutional, administrative and criminal regulations but gives examples of Polish corresponding laws. Additionally, in connection with the fact that criminal law provisions often contain non-specific references to other legislation, the article presents administrative acts of the protection system of public secrets. On the basis of the formulated conclusions, it was recognised that the Polish legislation lacks an individual provision penalising the fact of obtaining secret or top-secret information as a result of committing a separate unlawful act. It can be the basis to formulate postulates de lege ferenda. It should be noted that the article does not exhaust the topic, but only indicates selected issues of the protection system of state secrets in Russia. Initiated study can be used to carry out in-depth comparative research on this topic in the future.

Read more Next

Paweł Pokrzywiński

Internal Security Review, Issue 24 (13), 2021, pp. 91 - 109

https://doi.org/10.4467/20801335PBW.21.004.13561

The aim of the article is to present objectives of the Israeli Counter-Terrorism Law passed in 2016. The author examines the way of defining and combating terrorism, and the penalty measures related to criminal activity linked with it. Thus, the author shows the Israeli authorities’ perception of threat connected with terrorism. The previous counter-terrorist law is compared with the new one to demonstrate the modification of the vision of security. The article seeks to answer the question what changes and views have been implemented by the new law. To achieve those aims the author used the comparison method and an analysis of the law and the securitization theory. It allowed to state that terrorism is still regarded by Israeli politicians as the main threat for the State of Israel and its citizens. The amended law allowed for the use of many emergency measures. Overall, it exhibits a hawkish stance towards combating terrorism of parties which amended the law.

Read more Next

Paweł Gacek

Internal Security Review, Issue 24 (13), 2021, pp. 110 - 131

https://doi.org/10.4467/20801335PBW.21.005.13562

This paper was entirely devoted to the issues connected with the prohibition of membership in a political party of an officer of the Internal Security Agency and Foreign Intelligence Agency and the participation in the activities of that party or on its behalf. This prohibition was established in Article 81 (1) of the Act of 24 May 2002 of the Internal Security Agency and Foreign Intelligence Agency. Public service requires the introduction of certain restrictions on the rights of officers in relation to the rest of members of society. Political neutrality guarantees proper implementation of the tasks and aims of this formation. There was indicated that aforementioned provision of Article 81 (1) of the Act of 24 May 2002 of the Internal Security Agency and Foreign Intelligence Agency contains two independent legal norms i.e. prohibition of membership in a political party and prohibition of participation in the activities of political party or on its behalf. Attention was therefore focused on indicating the limits of these prohibitions. In this aspect, the sphere of official behavior has been demarcated. There was also underlined that these limits in question do not violate the rights and freedoms guaranteed by the Polish Constitution.

Read more Next

Daniel Mider, Ewa Aleksandra Ziemak

Internal Security Review, Issue 24 (13), 2021, pp. 132 - 172

https://doi.org/10.4467/20801335PBW.21.003.13560

Privacy Enhancing Technologies (PET) create a threat to the social order which is shown in the analysis of their ideological as well as political foundations and legal regulations that introduce restrictions on their use. Study into their actual applications in cybercriminal activity proves it too. This paper is a review with practical purpose and includes an original typology of PET. The most commonly used IT instruments that create a potential and actual threat were selected and analysed: software ensuring anonymous communication (Tor, Freenet, Linux Tails, Whonix), cryptocurrency systems enabling anonymous trade (Monero, Zcash, Dash) and an application enabling data encryption (VeraCrypt). The summary includes an attempt to extract the model attributes of privacy-enhancing technologies on the basis of previous analyses.

Read more Next

Maciej Aleksander Kędzierski

Internal Security Review, Issue 24 (13), 2021, pp. 173 - 217

https://doi.org/10.4467/20801335PBW.21.001.13558

Reverse engineering for the most part now refers to the restoration or modification of physical objects and computer programmes. A new challenge in the fight against crime is the use of reverse engineering to improve the measures of preventing and combating criminal and terrorist crime. Reversing processes through object-oriented analysis, as well as through management, logistics, financial, forensic and psychocybernetic analyses is a new outlook on improving the instruments to fight organized crime. As a result, by remedying the identified deficiencies and re-assessing the object, one will be able to get the same object but in the “enhanced”version or another object related to the analysed entity. Consequently, it will be possible to neutralize a criminal or terrorist organization more effectively and efficiently.

Read more Next

Studies and Analyses

Anna Łasińska

Internal Security Review, Issue 24 (13), 2021, pp. 221 - 249

https://doi.org/10.4467/20801335PBW.21.002.13559

Document examiners are frequently asked to determine whether or not a printout originated from a particular laser printer. The printer can rarely be identified unless some unique defects or irregularities of the printing are present on the printout. This article presents an overview of a systematic approach to characterizing and discriminating the toner of different laser printers using scanning electron microscopy. A total of twenty-one collected printouts were printed on twenty-one different Brother and Konica Minolta printing machine models. Sixteen printouts were obtained using printers with original toner cartridges while five printouts were obtained using printers with compatible cartridges. Clear criteria were established for individual assessment. Based on the SEM images and established criteria the details of topography of the toner structure were revealed. Due to this study, the differences or similarities of toners on tested printouts were determined. The SEM technique can be successfully, simply, and rapidly applied to the analysis of toners on paper documents.

Read more Next

Rafał Jurczak

Internal Security Review, Issue 24 (13), 2021, pp. 250 - 276

https://doi.org/10.4467/20801335PBW.21.007.13564

The article discusses the method of detecting triacetone triperoxide (TATP) in the form of vapours and surface traces using gas chromatography with a thermal desorption system of mass spectrometry (TD-GC/MS). The technical solutions of analytical equipment make it possible to choose one or two methods for introducing analyte vapour for identification – indirectly from the TENAX TA deposit or directly from the research objects. In addition, the use of the GERSTEL CIS element as a substance concentrator renders identification of even nano-trace amounts of TATP possible. The article presents the experimental procedure of the thermal desorption TD-GC/MS and simultaneously draws attention to physical properties of the substance determining the achievement of satisfactory results.

Read more Next

Tomasz Szczepański, Urszula Więckiewicz, Barbara Konior, Patryk Pucułek

Internal Security Review, Issue 24 (13), 2021, pp. 277 - 293

https://doi.org/10.4467/20801335PBW.21.008.13565

The article presents the results of research aimed at determining the extent to which ozone used for disinfecting rooms affects the possibility of developing fingerprints on paper using the DFO method. A sudden increase in COVID-19 cases has placed the focus on disinfection techniques for user safety. It is also becoming important to ensure the safety of parcels addressed to various recipients by inactivating pathogens, while maintaining the possibility of examination that can identify the sender, which is important from the point of view of forensics. Ozonation is a disinfection technique that has been used for many years, in particular for water treatment or in the food industry. The experiments were carried out in rooms with a cubature of approx. 20 m3 using an ozone generator available on the market. The obtained ozone gas concentration did not exceed 10 ppm. The conducted research confirmed that the traces of fingerprints left on xerographic paper placed in a room subjected to ozonation in a concentration not exceeding 10 ppm are not damaged and can be successfully developed with the DFO method.

Read more Next

Overview of the Works

Norbert Nowicki

Internal Security Review, Issue 24 (13), 2021, pp. 333 - 350

https://doi.org/10.4467/20801335PBW.21.016.13573

Normative approach to operational and reconnaissance activities in terms of illegal evidence

The issues discussed in this article refer to the normative status of operational and investigative activities in the context of the Police Act and the Code of Criminal Procedure. Namely, an attempt was made to demonstrate the conditions that affect the legal nature of surveillance, and thus the effective use of operational material in a criminal trial. For this purpose, the covert activity of the Police has been characterized by listing acceptable operational methods and defining operational and reconnaissance activities in the light of the literature on the subject. Therefore, in order to fully illustrate the issues discussed, an analysis was conducted of the legal relationship between the illegal evidence referred to in Art. 168a of the Code of Criminal Procedure and the evidence from operational and reconnaissance activities, on the example of an ordered operational control. The practical dimension of these considerations is discussed from the point of view of evidence proceedings, taking into account the procedural roles and responsibilities of the prosecutor and the court.

Read more Next

Andrzej Karaś

Internal Security Review, Issue 24 (13), 2021, pp. 351 - 371

https://doi.org/10.4467/20801335PBW.21.015.13572

Modern societies are often referred to as information societies. Thanks to the development of the Internet, virtually every person on the globe can get the information they need. This possibility is both a disadvantage and an advantage. Information is increasingly used as another kind of weapon that can be used to  achieve specific goals. However, it has long been used for military and political purposes through disinformation, propaganda and intelligence. The development of technology has only given information conflict a different form. Actions involved in information operations are aimed at exerting influence by the controlling entity on the controlled entity in order to perform an action previously assumed by the controlling entity. The purpose of this type of conflict is not to take over a given territory; they focus on the consciousness of a given society. Hence, it is necessary to consider the ways and possibilities of modelling and simulating strategic situations with incomplete knowledge, which are information operations. One of the approaches to modeling information operations is constituted by the theory of reflexive control, which at the same time describes the techniques of conducting them. The article presents the concept of reflexive control and the model built on its basis.

Read more Next

Selected Articles in English

Krzysztof Izak

Internal Security Review, Issue 24 (13), 2021, pp. 375 - 403

https://doi.org/10.4467/20801335PBW.21.017.13574

The 2015 immigration crisis became a driving force for movements and parties that negate the current political order, including those that do not conceal their xenophobic slogans and ideas. In retrospect, there are more and more signs that the decision to accept the uncontrolled refugee influx was more an expression of wishful thinking than a rational decision, taking into account the actual political situation. Thus, Europe finds itself in a dangerous situation with far-right movements on the one hand, and radical Islam on the other. Each of these formations legitimises its existence and methods of operation by the existence of the other side, trying to polarise society and create a situation that will somehow force citizens to opt for one of the two options. Paradoxically, Chancellor Merkel’s decision to admit immigrants significantly increased the risk of such a scenario, hence the perception of Islamic and right-wing extremism by the German authorities as posing an equal threat to state security. However, it was only the recent terrorist attacks in October and November 2020 in France and Germany that changed the political narrative.

Read more Next

Remigiusz Rosicki

Internal Security Review, Issue 24 (13), 2021, pp. 404 - 420

https://doi.org/10.4467/20801335PBW.21.018.13575

The objective scope of the analysis encompasses special measures used in the fight against terrorism in the context of ethical and constitutional principles attributed to a democratic state ruled by law and a liberal democracy. A practical example of a special measure used in the fight against terrorism, and presented in the text, is furnished by the content of one of the articles in the Polish Aviation Law, which was found unconstitutional in 2008. The content of this article made it possible for an administrative authority to make a decision with regard to consenting to the destruction of a civil aircraft, if it was used as a means of terrorist attack. The main purpose of the paper is to consider the acceptable scope of radical measures in the fight against terrorism, while taking into account the reinterpretation of priorities in the hierarchy of legal principles. In order to elaborate the objective scope of the analysis, the following research question is phrased: To what extent is it possible to sacrifice the well-being of the individual (dignity, rights and freedoms) for the sake of the common good (security)?

The adopted analysis methodology is based on a thought experiment consisting in the reinterpretation of ethical principles and the values of the constitutional norms in a democratic state ruled by law and a liberal democracy. With the benefit of essentialist reduction, it is posited that the two competing constitutional principles are the principle of dignity and the principle of the common good; they can be reduced to, for instance, protection of the life of an individual or of members of the community as a whole.

Read more Next