In connection with the entry into force of the Anti-terrorism Act, administrators of many production facilities are required to prepare a number of anti-terrorism procedures called anti-terrorist/AT attachment (Security plan related to facilities and equipment subject to mandatory protection in respect of terrorist threats). The article is a case study of the AT attachment implementation in several production plants belonging to one enterprise. It characterizes the strategy adopted in this company and the solutions developed in 2017-2019 in several production plants. The purpose of the article is to show why the implementation of this procedure is a challenge for the company.
The critical infrastructure (CI) has an important place in Polish security system. The article discusses legal acts and characterises the notion of critical infrastructure as an element essential for the functioning of the society. As a result of the entry into force of the Anti-terrorism Act from 10 June 2016 (Journal of Laws [Dz.U.], item 904), the current procedure of security plan acceptance was extended to include participation of the Internal Security Agency through the requirement to submit a so-called anti-terrorist attachment. The article is an analysis of the constituent parts of the document and procedures it covers. Moreover, the authors present conclusions and recommendations resulting from the analysis of AT attachments of CI facilities and other facilities subject to mandatory protection. The empirical system of reference is based on facilities located in Silesia. The authors described their experiences related to the process of preparation and acceptance of AT attachments as well as conclusions based on employee trainings conducted in workplaces where antiterrorism procedures are in force.
The goal of this paper is to analyse challenges related to protecting Polish critical infrastructure (CI) against air threats, such as UAVs, as a case study in a wider discussion on protection of critical infrastructure worldwide. The Polish legal definition of critical infrastructure and laws regarding the protection of such facilities are explained in the article in order to provide context. A review of scientific literature and open-source analysis of known air attacks on CI and the capabilities of air platforms are also included, with special attention being paid to unmanned systems. The threats themselves have been divided into two groups of scenarios: peacetime threats and crisis situations that have hybrid wartime scenarios. Depending on the scenario, the different capabilities of actors must be taken into account. Peacetime air threats include the use of commercially available drones. Those devices have limited capabilities, in terms of weaponisation, due to the limited weight of their cargo and the flight range. More advanced devices, including custom–built drones and military systems, can be supplied and used by state actors. Therefore, there are different requirements regarding protection systems. In peacetime, anti-drone systems are certainly recommended due to their capabilities and safety of use for bystanders. In more dangerous scenarios, typical military systems, including Very Short-Range Air Defence, Short-Range Air Defence and Medium Range Air Defence systems have to be employed or dedicated kinetic counter-drone systems deployed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.