English (United Kingdom)  Russian (CIS)


«Vestnik policii» – scientific journal.

E-ISSN 2414-0880

Publication frequency – once a year.

Issued from 2014.

3 September 20, 2016


History of Police

1. Aleksandr F. Mitrofanov
Servicio de Vigilancia Aduanera

Vestnik policii, 2016, Vol.(9), Is. 3, pp. 91-111.
DOI: 10.13187/vesp.2016.9.91CrossRef

Abstract:
History and modern activity of the Maritime Branch of Spanish Custom Service (SVA) are described in this article. Some information about ships and boats of Service are included. The article discusses the most productive operations of the marine department of the Spanish customs surveillance service in the fight against drug trafficking and smuggling.

URL: http://ejournal21.com/journals_n/1474364236.pdf
Number of views: 1506      Download in PDF


2. Leonid V. Strakhov
Secret Agency and Directed Surveillance in the Voronezh Governorate Gendarme Service

Vestnik policii, 2016, Vol.(9), Is. 3, pp. 112-120.
DOI: 10.13187/vesp.2016.9.112CrossRef

Abstract:
The article is devoted to organization of secret agency and directed surveillance. The author shows legal fundamentals of work with informers and trackers by security service, the number of agents and their funding. The author says how specific character of Voronezh Governorate as a region with powerful agrarian disorders influenced on organization of secret agency and directed surveillance in Voronezh Governorate Gendarme Service.

URL: http://ejournal21.com/journals_n/1474364312.pdf
Number of views: 1570      Download in PDF


Technical Means

3. Yuri F. Katorin
Bank Cards and the Safety

Vestnik policii, 2016, Vol.(9), Is. 3, pp. 121-128.
DOI: 10.13187/vesp.2016.9.121CrossRef

Abstract:
This article is dedicated to questions of providing safety of cash resources, with the use of bank cards, since the financial operations of this type were since olden times the object of the increased attention from the side of individual dishonest personalities, the special features of cards with the magnetic strip and cards with the chip are described, and the enumeration of the basic tricks of criminals, used for the unsanctioned output of money, so is given, uses and servicing of bank maps are given to recommendation regarding providing of safety of operations.

URL: http://ejournal21.com/journals_n/1474364382.pdf
Number of views: 1756      Download in PDF


4. Natalya S. Ralnikovaa, Xenia A. Kudryavtseva
Application of Biometric Methods in Control System and Access Control

Vestnik policii, 2016, Vol.(9), Is. 3, pp. 129-134.
DOI: 10.13187/vesp.2016.9.129CrossRef

Abstract:
Advantages of biometric identifiers based on unique biological, physiological characteristics of the person uniquely identity has led to intense development of appropriate tools. This article analyzes the biometric methods used in monitoring systems and access control, special attention is paid to the advantages and disadvantages of each method. In the conclusion the authors come to the conclusion that it is impossible to single out the best or the worst methods, as each of them can be used depending on the task. Also, as a conclusion is an example of the use of biometric methods in the control system and access control.

URL: http://ejournal21.com/journals_n/1474364520.pdf
Number of views: 1524      Download in PDF


Modern Security

5. Artem A. Gonchar, Xenia N. Zolotareva
The Criminal-Lawful and Criminological Characteristic of Incorrect Access to the Computer Information

Vestnik policii, 2016, Vol.(9), Is. 3, pp. 135-141.
DOI: 10.13187/vesp.2016.9.135CrossRef

Abstract:
At present noticeably rises the degree of the risk of the loss of data, and also the possibility of their copying, modification, blocking. Moreover, this is not purely Russian, but world-wide tendency, in this case the perfection of computer technologies led to the appearance of new forms of crimes, in particular, to incorrect access to that guarded by the law of computer information. By its mechanism, using methods of accomplishment and concealment this crime has the specific character; it is characterized by the highest level of latency and by the low level of discoverability. This article examines some aspects of the criminal- lawful and criminological characteristic of incorrect access to the computer information.

URL: http://ejournal21.com/journals_n/1474364721.pdf
Number of views: 1546      Download in PDF


6.
full number
URL: http://ejournal21.com/journals_n/1474364757.pdf
Number of views: 1638      Download in PDF





Home   Editorial Board   Peer-reviewing   Indexing   Publishing Ethics   Statistics   Our authors   For Authors   Contract Offer   Example   Archives   


Copyright © 2014-2021. Vestnik policii.