Asymetrism of internal security arranged in the marine environment
DOI:
https://doi.org/10.52934/wpz.102Keywords:
threats, asymmetry, sea, securityAbstract
Inextricably linked to the consideration of the nature of security threats after the end of the so-called the cold war is also the concept of asymmetry. Modern threats to international security are very diverse, harder to detect, and less predictable than before 1989, when the dominant threat was the possibility of the outbreak of World War III between the great powers. This term appeared for the first time in public space in 1995, due to the publication entitled “Combined fight of the US armed forces” and referred to the armed forces of the United States. It has been defined as a bilateral clash of different types of armed forces. The last decade of the last century was a time when both powers did not seek direct confrontation and maintained the so-called hot room, except so-called proxies (proxy war). From the end of the so-called In the Cold War, a significant increase in the importance of the activities of terrorist organizations and organized criminal groups can be observed. These entities, theoretically having much less potential than state entities, have a significant impact on their functioning, above all in the psychological aspect. Another, equally important factor affecting the asymmetry of the modern world is the negative effects of globalization, which result in, among others, blurring state borders, thus facilitating the activities of illegally operating entities and deepening the already distinct diversity in the standard of living, which in its essence may be a motivating factor for illegal activities in order to improve the level of existence. The notion of asymmetrical threat is related to the use by the side of the theoretically lower threat potential during the conflict, which results in the use of different, often illegal methods, techniques and means of conducting rivalry. These activities are carried out in order to maximally hinder the possibility of using the opponent’s advantage, and thereby overcome the differences in the potentials of both sides.
References
Balcerowicz B., Stare i nowe zagrożenia, „Polska Zbrojna”, nr 1, 2002.
Clark V., Sea Power 21, Proceedings, 2002.
Corless J., Hunting Goliath in the age of asymmetric warfare, nr 10, 1999.
Dyrcz Cz., Marynarka wojenna a terroryzm, „Przegląd Morski”, nr 3, 2003.
Gawliczek P., Pawłowski J., Zagrożenia asymetryczne, AON, Warszawa 2003.
Gunaratna R., The asymmetric threat from maritime terrorism, „Jane’s Navy International”,
nr 8, 2001.
Jakubczak R., Martowski R.M., Powszechna obrona terytorialna w cyberobronie i agresji
hybrydowej, Agencja Wydawnicza Jerzy Mostowski, Warszawa 2017.
Kubiak K., Wojna asymetryczna ?, „Przegląd Morski”, nr 1, 2002.
Kubiak K., Zagrożenie polskich obszarów morskich działaniami terrorystycznymi,
„Przegląd Morski”, nr 5, 2001.
Military Concept for Defence Against Terrorism – MC 472.
Rokiciński K., Stan obecny i prognozy rozwoju lekkich nawodnych sił uderzeniowych
państw morza bałtyckiego do roku 2012, Zeszyty Naukowe AMW, rok XL, nr 2.
Sadler K.-O., Seabased Asymmetric Warfare Ship. Kampfschiff zur Abwehr asymmetrischer
Bedrohungen auf See, Marineforum 2004, nr 5.
Trenkner J., Wojna asymetryczna, „Tygodnik Powszechny”, nr 1, 2001.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).