The article is devoted to the one of the most popular political crimes in the Russian Empire, which gendarmerie police investigated in the late XIX – early XX century. Lots of cases of the royal family insulting were preserved in archives. Based on these materials the author shows how serious authorities inquire into these crimes and how often it reached the courts. In the example of the Voronezh province the author emphasized how the last emperor and his administration authorities changed in this period.
The perimeter of the guarded object is the first boundary of its protection, and its safety substantially depends on the quality of the established systems of protection. This article is dedicated to the description of work, special features of use, installation and to the analysis of the positive and negative properties of different types of technical equipment for guarantee safety of the perimeter of the guarded object.
In this article we will take a look at computer forensic expertise. We will try to answer some of the questions that arise during the investigation and hindering the work process. We will consider the basic tasks and those whose solution is better not to put on this kind of expertise and talk about a variety of methods and instruments of working with HDD, Internet resources and data. We will point at some of the most common mistakes made when generating reports on the results of the expertise to help young specialists avoid such oversights. And we will denote the issues facing the modern computer forensics expertise.
The article deals with different aspects of contemporary U.S.-EU legal cooperation on home affairs. The author examines its position in terms of international law and national law, the historical and legal questions of the formation and development of interaction are also highlighted. The larger part of the article is devoted to the agreement between the USA and the EU on the processing and transfer of Financial Messaging Data from the EU to the US for the purposes of the Terrorist Finance Tracking Program. History of contemporary US - EU cooperation on home affairs is also described. The Terrorist Finance Tracking Programme (TFTP) has generated significant intelligence that has helped detect terrorist plots and trace their authors. EU-US Agreements on the exchange of financial information ensures protection of EU citizens' privacy and gives the US and EU law enforcement authorities a powerful tool in the fight against terrorism. The modern treaties between the US and the EU are studied in detail. Particular attention is paid to the competence of the executive might. The specifics of the implementation of international treaties in the US and the EU is investigated.
This article brings to light the problem of anomaly detection in the object of protection automation systems. The article illustrates the method of anomaly detection using hybrid neural network, and the performed experiment. The result of the research is software that implements the anomaly detection mechanism.