English (United Kingdom)  Russian (CIS)

«Vestnik policii» – scientific journal.

E-ISSN 2414-0880

Publication frequency – once a year.

Issued from 2014.

1 March 10, 2016

History of Police

1. Leonid V. Strakhov
The Political Police and the Investigation of Insulting the Royal Family Cases in the Late XIX – Beginning of the XX Century

Vestnik policii, 2016, Vol.(7), Is. 1, pp. 4-10.
DOI: 10.13187/vesp.2016.7.4CrossRef

The article is devoted to the one of the most popular political crimes in the Russian Empire, which gendarmerie police investigated in the late XIX – early XX century. Lots of cases of the royal family insulting were preserved in archives. Based on these materials the author shows how serious authorities inquire into these crimes and how often it reached the courts. In the example of the Voronezh province the author emphasized how the last emperor and his administration authorities changed in this period.

URL: http://ejournal21.com/journals_n/1457610298.pdf
Number of views: 1686      Download in PDF

Technical Means

2. Yuri F. Katorin
Protection of the Perimeter of the Object

Vestnik policii, 2016, Vol.(7), Is. 1, pp. 11-19.
DOI: 10.13187/vesp.2016.7.11CrossRef

The perimeter of the guarded object is the first boundary of its protection, and its safety substantially depends on the quality of the established systems of protection. This article is dedicated to the description of work, special features of use, installation and to the analysis of the positive and negative properties of different types of technical equipment for guarantee safety of the perimeter of the guarded object.

URL: http://ejournal21.com/journals_n/1457610395.pdf
Number of views: 2212      Download in PDF

3. Igor S. Pantiukhin, Diana N. Shidakova
Basics of Computer Forensics

Vestnik policii, 2016, Vol.(7), Is. 1, pp. 20-29.
DOI: 10.13187/vesp.2016.7.20CrossRef

In this article we will take a look at computer forensic expertise. We will try to answer some of the questions that arise during the investigation and hindering the work process. We will consider the basic tasks and those whose solution is better not to put on this kind of expertise and talk about a variety of methods and instruments of working with HDD, Internet resources and data. We will point at some of the most common mistakes made when generating reports on the results of the expertise to help young specialists avoid such oversights. And we will denote the issues facing the modern computer forensics expertise.

URL: http://ejournal21.com/journals_n/1457610485.pdf
Number of views: 1694      Download in PDF

Modern Security

4. Pavel N. Biriukov
On the Cooperation of the USA and the EU in the Сombating the Financing of Terrorism

Vestnik policii, 2016, Vol.(7), Is. 1, pp. 30-37.
DOI: 10.13187/vesp.2016.7.30CrossRef

The article deals with different aspects of contemporary U.S.-EU legal cooperation on home affairs. The author examines its position in terms of international law and national law, the historical and legal questions of the formation and development of interaction are also highlighted. The larger part of the article is devoted to the agreement between the USA and the EU on the processing and transfer of Financial Messaging Data from the EU to the US for the purposes of the Terrorist Finance Tracking Program. History of contemporary US - EU cooperation on home affairs is also described. The Terrorist Finance Tracking Programme (TFTP) has generated significant intelligence that has helped detect terrorist plots and trace their authors. EU-US Agreements on the exchange of financial information ensures protection of EU citizens' privacy and gives the US and EU law enforcement authorities a powerful tool in the fight against terrorism. The modern treaties between the US and the EU are studied in detail. Particular attention is paid to the competence of the executive might. The specifics of the implementation of international treaties in the US and the EU is investigated.

URL: http://ejournal21.com/journals_n/1457610662.pdf
Number of views: 1687      Download in PDF

5. Anton N. Kanev, Alexander V. Nasteka, Catherine E. Bessonova
Automation Device Authentication at «Smart Home»

Vestnik policii, 2016, Vol.(7), Is. 1, pp. 38-44.
DOI: 10.13187/vesp.2016.7.38CrossRef

This article brings to light the problem of anomaly detection in the object of protection automation systems. The article illustrates the method of anomaly detection using hybrid neural network, and the performed experiment. The result of the research is software that implements the anomaly detection mechanism.

URL: http://ejournal21.com/journals_n/1457610754.pdf
Number of views: 1756      Download in PDF

full number
URL: http://ejournal21.com/journals_n/1457610773.pdf
Number of views: 1914      Download in PDF

Home   Editorial Board   Peer-reviewing   Indexing   Publishing Ethics   Statistics   Our authors   For Authors   Contract Offer   Example   Archives   

Copyright © 2014-2021. Vestnik policii.