Objectives The authors determined the following aim of this article: identifying threats generated by air terrorism as well as characterizing the forms, methods, and manners. Methods Authors used theoretical methods of research. The article presents research findings with regard to the organization and operation of security systems in civil air transport. At the article, the authors focused on air terrorism and security system in the airport. Results The presented results of the study are not limited only to the theoretical aspects of terrorism. Authors also characterize organizational and technical undertakings that have already been implemented into security systems in aviation by national and intergovernmental institutions, responsible for its protection. Conclusions Regardless of the form of air terrorism and applied means, an important issue is a fact that every attempt to intercept an aerial asset is attractive for terrorists, due to the fact that each time it causes not only damage or destruction of the machine itself and the death of passengers, but it is also a real threat to airport infrastructure, installations and urban residents. In addition, the events are accompanied by high-profile media coverage.
The aim of the research was to create such a calculation model for the air defense efficiency that will enable to determine the degree of implementation of the task by anti-aircraft defense forces in combat conditions. The innovative approach to the efficiency of air defense presented in the article focuses on the methods and algorithms enabling the assessment of the feasibility of the air defense task. In its general form, it is based on the determination of the probable number of air assault assets intended for the implementation of an air task (destruction, incapacitation, disorganization of the cover object) and the possibility of air defense sets (means) to repel an air attack. The research was conducted with the use of qualitative methods – when determining the elements of protection or tactical and technical data. The results of the presented research can be implemented in the command process in air defense.
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.