Abstract
The protection of critical infrastructure has always been one of the priorities of every state. Simply, without the normal functioning of key infrastructure facilities, the whole society and the state are prevented from normal functioning. The Russian aggression against Ukraine showed all the cruelty of war, but also the importance of the functioning of key infrastructure facilities. The merciless war and the planners of that war designated water sources, water supply, power transmission lines, hydropower plants, thermal power plants, heating plants, and nuclear power plants as the main targets. These objects were not only the target of kinetic force projection but were also attacked from the cyber zone. The role of the intelligence services in the protection of critical infrastructure facilities is irreplaceable considering the mechanisms and information that the intelligence services have at their disposal. It is also important to point out that the process of educating members of the security services and intelligence services that deal with the protection of critical infrastructure is extremely important because through this process new threats are detected that come from different sources with the application of different enforcement techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Trifunović D (2019) Elements of critical infrastructure resilience. Int Exp Forum Natl Sec Fut 20:51–61
Besenyő J, Sinkó G (2022) Combating piracy strategically: analysing the successes and challenges of NATO and EU interventions off the Somali coast. South Afr J Int Affairs 29:295–309. https://doi.org/10.1080/10220461.2022.2125064
Strategy of National Security, Republic of Serbia. http://www.parlament.gov.rs/upload/archive/files/lat/pdf/akta_procedura/2019/2206-19%20-%20Lat..pdf
Kazansky R (2021) Trifunovic D (2021) Context of religion securitization: cases of Artsakh and Northern Ireland. Polit Relig J 15(2):405–427
Todorovic B, Trifunovic D (2020) Security science as a scientific discipline: technological aspects. Sec Sci J 22:73–88
Allen J (2005) How to conduct security risk assessments. https://purplesec.us/learn/security-risk-assessment/
Gábor S, János B (2021) Comparison of the secret service of Al-Shabaab, the Amniyat, and the national intelligence and security agency (Somalia). Int J Intell Counterintell 36:220–240. https://doi.org/10.1080/08850607.2021.1987143
Dahl E (2023) The COVID-19 intelligence failure: why warning was not enough. Georgetown University Press, Washington, D.C.
Kar EH (2016) Twenty years of crisis: 1919–1939: an introduction to the study of international relations
Sarr (1964) It was first used by
Herz JH (1951) Political realism and political idealism. University of Chicago Press, Chicago, pp 157–180
Williams (2012) Together with terms such as “war”, “power”, “national interest” and “strategy”, the concept of security dilemma became one of the key concepts of realism and security studies during the second half of the 20th century
Hollywood J, Snyder D, McKay KN, Boon E (2004) Out of the ordinary finding hidden threats by analyzing unusual behavior. RAND, Santa Monica
Aradu C (2010) Security that matters: critical infrastructure and objects of protection. Sec Dialog 41(5):491–514
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Trifunovic, D. (2024). Intelligence and Protection of Key (Critical) Infrastructure Objects. In: Kovács, T.A., Nyikes, Z., Berek, T., Daruka, N., Tóth, L. (eds) Critical Infrastructure Protection in the Light of the Armed Conflicts. HCC 2022. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47990-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-47990-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47989-2
Online ISBN: 978-3-031-47990-8
eBook Packages: EngineeringEngineering (R0)