Skip to main content

Intelligence and Protection of Key (Critical) Infrastructure Objects

  • Conference paper
  • First Online:
Critical Infrastructure Protection in the Light of the Armed Conflicts (HCC 2022)

Abstract

The protection of critical infrastructure has always been one of the priorities of every state. Simply, without the normal functioning of key infrastructure facilities, the whole society and the state are prevented from normal functioning. The Russian aggression against Ukraine showed all the cruelty of war, but also the importance of the functioning of key infrastructure facilities. The merciless war and the planners of that war designated water sources, water supply, power transmission lines, hydropower plants, thermal power plants, heating plants, and nuclear power plants as the main targets. These objects were not only the target of kinetic force projection but were also attacked from the cyber zone. The role of the intelligence services in the protection of critical infrastructure facilities is irreplaceable considering the mechanisms and information that the intelligence services have at their disposal. It is also important to point out that the process of educating members of the security services and intelligence services that deal with the protection of critical infrastructure is extremely important because through this process new threats are detected that come from different sources with the application of different enforcement techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trifunović D (2019) Elements of critical infrastructure resilience. Int Exp Forum Natl Sec Fut 20:51–61

    Google Scholar 

  2. Besenyő J, Sinkó G (2022) Combating piracy strategically: analysing the successes and challenges of NATO and EU interventions off the Somali coast. South Afr J Int Affairs 29:295–309. https://doi.org/10.1080/10220461.2022.2125064

    Article  Google Scholar 

  3. Strategy of National Security, Republic of Serbia. http://www.parlament.gov.rs/upload/archive/files/lat/pdf/akta_procedura/2019/2206-19%20-%20Lat..pdf

  4. Kazansky R (2021) Trifunovic D (2021) Context of religion securitization: cases of Artsakh and Northern Ireland. Polit Relig J 15(2):405–427

    Article  Google Scholar 

  5. Todorovic B, Trifunovic D (2020) Security science as a scientific discipline: technological aspects. Sec Sci J 22:73–88

    Google Scholar 

  6. Allen J (2005) How to conduct security risk assessments. https://purplesec.us/learn/security-risk-assessment/

  7. Gábor S, János B (2021) Comparison of the secret service of Al-Shabaab, the Amniyat, and the national intelligence and security agency (Somalia). Int J Intell Counterintell 36:220–240. https://doi.org/10.1080/08850607.2021.1987143

  8. Dahl E (2023) The COVID-19 intelligence failure: why warning was not enough. Georgetown University Press, Washington, D.C.

    Google Scholar 

  9. Kar EH (2016) Twenty years of crisis: 1919–1939: an introduction to the study of international relations

    Google Scholar 

  10. Sarr (1964) It was first used by

    Google Scholar 

  11. Herz JH (1951) Political realism and political idealism. University of Chicago Press, Chicago, pp 157–180

    Google Scholar 

  12. Williams (2012) Together with terms such as “war”, “power”, “national interest” and “strategy”, the concept of security dilemma became one of the key concepts of realism and security studies during the second half of the 20th century

    Google Scholar 

  13. Hollywood J, Snyder D, McKay KN, Boon E (2004) Out of the ordinary finding hidden threats by analyzing unusual behavior. RAND, Santa Monica

    Google Scholar 

  14. https://kyivindependent.com/russia-has-damaged-more-than-700-critical-infrastructure-facilities-in-ukraine-since-feb-24/

  15. Aradu C (2010) Security that matters: critical infrastructure and objects of protection. Sec Dialog 41(5):491–514

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darko Trifunovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Trifunovic, D. (2024). Intelligence and Protection of Key (Critical) Infrastructure Objects. In: Kovács, T.A., Nyikes, Z., Berek, T., Daruka, N., Tóth, L. (eds) Critical Infrastructure Protection in the Light of the Armed Conflicts. HCC 2022. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47990-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47990-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47989-2

  • Online ISBN: 978-3-031-47990-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics