<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JOBS</journal-id>
      <journal-title-group>
        <journal-title>Journal on Baltic Security</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2382-9230</issn>
      <issn pub-type="ppub">2382-9222</issn>
      <publisher>
        <publisher-name>BDC</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JOBS-12-1-JOBS-2026-002</article-id>
      <article-id pub-id-type="doi">10.57767/jobs_2026_002</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Securing Offshore Wind Farms in Poland: Legal Responsibilities, Institutional Gaps, and Hybrid Threat Resilience in the Baltic Sea: Towards an Integrated Model of Protection and Resilience</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6227-2851</contrib-id>
          <name>
            <surname>Maciata</surname>
            <given-names>Klaudia</given-names>
          </name>
          <email xlink:href="mailto:klaudia.maciata@gmail.com">klaudia.maciata@gmail.com</email>
          <xref ref-type="aff" rid="j_JOBS_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_JOBS_aff_000">War Studies University and balticseasecurity.pl. The views expressed are solely those of the author and do not represent the positions of any affiliated institution.</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume content-type="ahead-of-print">0</volume>
      <issue>0</issue>
      <fpage>28</fpage>
      <lpage>61</lpage>
      <pub-date pub-type="epub">
        <day>27</day>
        <month>04</month>
        <year>2026</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>01</day>
          <month>08</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>11</day>
          <month>09</month>
          <year>2025</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Open Access. ©</copyright-statement>
        <copyright-year>2026</copyright-year>
        <copyright-holder>Klaudia Maciata</copyright-holder>
        <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>Poland’s rapid expansion of offshore wind farms (OWFs) in the Baltic Sea elevates them to the status of critical infrastructure central to energy security. This article examines the legal responsibilities, institutional arrangements, and operational challenges in protecting OWFs against hybrid threats such as sabotage, espionage, and cyberattacks. It analyses national frameworks, EU directives (CER and NIS2), and the roles of the Navy, Border Guard, Maritime Offices, Government Centre for Security (RCB), and private operators. This work offers a responsibility matrix which highlights both institutional overlaps as well as gaps. The article concludes with recommendations for legal reforms, capability development, and inter-agency coordination to strengthen Poland’s offshore wind infrastructure.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>Offshore Wind Farms</kwd>
        <kwd>Baltic Sea Security</kwd>
        <kwd>Critical Infrastructure</kwd>
        <kwd>Hybrid Threats</kwd>
        <kwd>Poland</kwd>
      </kwd-group>
    </article-meta>
  </front>
<body>
<p><title>Introduction</title></p>
<p>Poland’s rapid offshore wind energy development has significantly increased the strategic importance of 
  OWFs in the Baltic Sea as part of the country’s energy infrastructure. These installations – offshore wind generators, 
  undersea power cables, and offshore substations – are essential for Poland’s energy security, thus attracting heightened 
  attention in the current geopolitical climate. The sabotage of the Nord Stream gas pipelines in 2022 starkly 
  demonstrated the vulnerability of undersea infrastructure and underscored the need for robust protections. 
</p>
<p>
Protecting OWFs requires a coordinated, multi-agency effort spanning physical security, cybersecurity, 
and crisis management. This article assesses how Poland assigns institutional responsibilities for OWF 
protection by analysing the roles of the Navy, Border Guard, Maritime Offices, the Government Centre for Security (RCB), 
and OWF operators while detailing institutional gaps and operational challenges through case studies of 
the Nord Stream sabotage, damage to sea cables, suspicious UAV manoeuvres, and ‘shadow fleet’ activity, 
all done in an effort to build resilience against hybrid threats in the Baltic Sea. 
</p>
<p>This article proceeds as follows: Section 1 outlines the evolving threat landscape for offshore 
  infrastructure in the Baltic Sea. Section 2 examines Poland’s national legal and policy framework 
  for critical infrastructure protection. Sections 3 and 4 analyse maritime jurisdiction, safety laws relevant 
  to OWFs, and sectoral statutes that shape security responsibilities. Section 5 maps institutional 
  roles and interdependencies, highlighting gaps via a responsibility matrix. Section 6 assesses the 
  implications of the EU Critical Entities Resilience (CER) Directive and the Network and 
  Information Security Directive (NIS2) on these frameworks. Sections 7 and 8, 
  identify implementation challenges and offers recommendations for legal, organisational, and 
  capability reforms to strengthen the resilience of Poland’s offshore wind infrastructure. 
  Finally, the conclusion synthesises implications for an integrated model of protection and resilience.
</p>

<p><title>Section 1: Threat Landscape for Offshore Infrastructure</title></p>
<p>Recent incidents in the Baltic region illustrate the escalating threats to offshore energy assets. 
  In May 2025, the Polish Navy intercepted a suspicious vessel from Russia’s ‘shadow fleet’ acting 
  unusually near the undersea power cable connecting Poland to Sweden 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_004">Erling and Strzelecki, 2025</xref>). 
  This incident is part of a broader pattern targeting Europe’s undersea infrastructure since Russia invaded Ukraine. 
  A pivotal moment occurred in September 2022 with the sabotage of the Nord Stream pipeline. 
  Strategically placed explosives were detonated causing an explosion on the Nord Stream 1 and 2 gas 
  pipelines, severely compromising energy security 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_015">Kardaś and Łoskot-Strachota, 2022</xref>). 
  Security experts indicate that such sabotage, conducted below the threshold of open conflict, 
  constitutes a form of hybrid warfare aimed at disrupting economies 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_018">Lorenz and Zaręba, 2022</xref>). 
  In the Nord Stream incident, the explosions occurred outside any nation’s territorial waters, 
  complicating response and accountability 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_018">Lorenz and Zaręba, 2022</xref>). 
  Other incidents amplified the cause for concern. Nordic countries have reported unidentified drones 
  near offshore oil and gas platforms 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_001">Adomaitis, 2022</xref>). 
  In Norway, several Russian nationals were arrested for flying drones near critical infrastructure 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_003">Edvardsen, 2022</xref>). 
  The clear takeaway is that it is essential to ensure maximum security of critical infrastructure both onshore and offshore.
</p>
<p>Poland is responding by implementing to use surveillance drones over the Baltic Sea, 
  especially after spotting a recent ‘spy vessel’ near its waters 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_016">Ledzińska, 2025</xref>). 
  In May 2025, Polish Prime Minister Donald Tusk announced a plan to strengthen Baltic Sea 
  surveillance with new drones to enhance intelligence, intelligence reconnaissance surveillance (IRS) 
  activities over the Baltic Sea to protect its vulnerable critical infrastructure (CI) 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_016">Ledzińska, 2025</xref>). 
  Meanwhile, NATO and regional allies are increasing undersea monitoring efforts, 
  such as the new ‘Baltic Sentry’ exercises using unmanned surface vessels (USV) 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_020">NATO Supreme Headquarters Allied Powers Europe, 2024</xref>). 
  The general agreement is that OWFs, along with pipelines and data cables, face both physical and cyber 
  threats in the tense environment of the Baltic Sea 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_002">Baltic Wind EU, 2025</xref>).
</p>
<p>These incidents highlight that protecting OWFs is not just a technical or corporate issue. 
  It is a matter of national security that requires clear responsibilities and teamwork among Polish stakeholders 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_002">Baltic Wind EU, 2025</xref>). 
  The following sections will outline Poland’s legal framework and the roles of key stakeholders 
  involved in securing OWFs as critical infrastructure.
</p>


<p><title>Section Two: National Legal and Policy Framework</title></p>
<p>Poland’s Crisis Management Act (CMA) 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_013">Government of Poland, 2007</xref>), 
  often called the Emergency Management Act, provides the foundation for protecting critical infrastructure. 
  It defines ‘critical infrastructure’ (CI) as systems and assets crucial to the state’s and its citizens’ security. 
  Under Article 3(2) of this Act, OWFs are classified as critical infrastructure once operational, 
  as they form part of the energy supply. This designation carries essential obligations. 
</p>
<p>Poland’s Council of Ministers has adopted a National Programme for the Protection of Critical 
  Infrastructure (NPOIK) which assigns sectoral responsibilities to various ministries. 
  First, as the Ministers of State Assets and Climate/Energy are responsible for energy, 
  their tasks include conducting risk assessments, coordinating protective measures, supporting training, 
  and approving CIP plans. Next, the RCB (Government Centre for Security) coordinates this programme 
  nationally as a hub for CI-protection. Finally, OWFs Operators must ensure adequate protection by 
  developing and implementing Critical Infrastructure Protection (CIP) plans and emergency 
  procedures that address anticipated threats.
</p>
<p>One weakness is that the NPOIK operates on an ‘unsanctioned’ basis, relying on guidelines and 
  cooperation rather than enforceable laws. Consequently, while most CI operators submit protection 
  plans for RCB review, the state has limited the ability to audit compliance or sanction negligence. 
  It was noted that as of early 2023, it is challenging to compel entities to draft CIP documents 
  due to the lack of legal instruments; compliance depends on goodwill. This situation is set to change 
  with the new EU CER Directive, which will introduce binding oversight. As noted by 
  Projekt Infrastruktura Krytyczna [Project Critical Infrastructure] 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_022">2023</xref>), 
  ‘<italic>The provisions of the CER Directive will be implemented into the Polish legal system through an 
  amendment to the Crisis Management Act. The aim of the amendments is to adapt national regulations 
  to EU requirements for the resilience of critical infrastructure and to ensure consistency of 
  actions at the national and European level</italic>’. As of today, 23 October 2025, the directive is 
  being reviewed by the Standing Committee of the Council of Ministers.
</p>
<p>In addition to the CMA, Poland’s Anti-Terrorism Law 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_014">2016</xref>) supplements CI protection 
  in high-threat scenarios. Hypothetically, should the government declare a heightened alert level (e.g. BRAVO or higher) 
  due to a terrorist threat, the Police are mandated to verify critical infrastructure security. 
  The Internal Security Agency (ABW) can also issue recommendations to reinforce certain areas. 
  In such situations, a regulation under this law authorises the Chiefs of Police, Border Guard, 
  or Military Gendarmerie to deploy armed officers to guard potential targets. In practice, if 
  intelligence suggests an imminent threat to OWFs (e.g. a sabotage plot), Polish authorities 
  can elevate the alert level and station armed security (from police or border guard units) to 
  protect the offshore wind turbines. However, as this is a reactive measure tied to officially 
  declared threat levels, it therefore does not substitute for day-to-day protective arrangements.
</p>

<p><title>Section Three: Maritime Areas and Maritime Safety Laws</title></p>
<p>Poland’s jurisdiction over OWFs in the Baltic is established by the Act on Maritime Areas (MAA) of the Republic of Poland 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_009">1991</xref>). 
  The MAA is a national regulation that implements the provisions of the United Nations Convention 
  on the Law of the Sea (UNCLOS). In line with UNCLOS, this Convention grants Poland exclusive 
  rights in its Exclusive Economic Zone (EEZ) to regulate OWF construction and operation, 
  which must occur beyond its territorial sea, specifically in the adjacent zone/EEZ. 
  Consequently, Poland’s first OWFs are situated in the contiguous zone (12 to 24 NM from shore) or further out 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_021">PGE Baltica and Ørsted, 2023</xref>). 
  This raises security concerns, as OWFs are situated in areas where Poland exercises only limited sovereignty. 
  Within its EEZ, Poland retains rights related to economic activities, the management and 
  exploitation of natural resources (such as wind and water), scientific research, environmental protection, 
  and the construction and operation of installations. In the case of OWFs, this includes the 
  establishment and use of artificial islands; however, the surrounding waters remain open to 
  international navigation. This legal framework leaves room for intelligence, surveillance, 
  and reconnaissance (ISR) activities by foreign actors – such as those conducted 
  by the so-called ‘shadow fleet’ – which cannot be fully controlled due to the principle of 
  freedom of navigation in the EEZ.
</p>
<p>Polish authorities can establish safety zones around offshore installations within the EEZ. 
  Under Article 24 of MAA, a Maritime Office Director may create a navigational exclusion zone of 
  up to 500 meters around an OWF. This 500m buffer includes the outermost turbines, allowing the 
  Maritime Office to restrict or ban navigation, fishing, diving, and other activities for safety. 
  Unauthorised entry into this zone is an administrative offence subject to a fine (up to 20 times the average monthly salary). 
  If the OWF is damaged, criminal liability under the Penal Code may apply. In summary, 
  Polish law deters intrusions through marked exclusion zones and penalties 
  to protect turbines from collisions or sabotage.
</p>
<p>Dangerous activities, such as unidentified vessels loitering, necessitate immediate enforcement. 
  However, a fault in the current system is that establishing safety zones is discretionary. 
  Analysts argue that safety zones should be mandatory for OWFs due to their critical importance. 
  Enforcement at sea depends on the state’s surveillance and response capabilities, which will be discussed later. 
</p>
<p>To ensure OWFs are built and operated safely, Poland updated its Act of Maritime Safety (MSA) 
  of the Republic of Poland in 2022. Initially enacted in 2011, the MSA was amended to introduce 
  strict certification requirements for OWF projects. Developers must obtain certificates from 
  accredited organisations at each stage – design, construction, and operational safety – confirming 
  that the wind farm meets structural integrity, fire safety, environmental, and operational standards. 
  These provisions extend the type of state supervision for vessels and oil rigs to OWFs. While technical, 
  they enhance security by ensuring the OWF is constructed to withstand harsh conditions and prevent accidents.
</p>
<p>Crucially, the 2022 amendments to the MSA also introduced new requirements directly related to 
  national security. OWF investors must now commission expert studies on: navigational safety 
  (the OWF’s impact on vessel traffic); impacts on marine emergency communication systems, 
  such as the Global Maritime Distress and Safety System (GMDSS) and Search and Rescue (SAR) networks; 
  effects on the National Maritime Safety System (KSBM); and implications on Border Guard radar, 
  monitoring, and radio-communication systems. In other words, an OWF developer must assess how the 
  wind farm might interfere with or be exploited against Poland’s maritime surveillance and rescue systems 
  before construction. For instance, large turbines could create radar blind spots or disrupt radio links; 
  these effects must be analysed and mitigated. The law also requires OWF projects to prepare rescue 
  plans for accidents (to protect offshore personnel) and oil spill response plans. 
</p>
<p>This ensures that agencies like the Navy and Border Guard review OWF plans for any adverse effects on 
  coastal defence or border surveillance. While these measures focus on minimising any adverse side 
  effects of OWFs on security systems, they embody a broader principle of close inter-agency cooperation 
  from the planning stage of OWFs to balance energy objectives with security concerns.
</p>
 

<p><title>Section 4: Additional National Laws that Shape CI Security Responsibilities</title></p>
<p><title>Energy Law</title></p>
<p>Poland’s Energy Law 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_010">1997a</xref>) 
  governs the energy sector, including licensing electricity generators. 
  Energy enterprises must ensure the continuity of supply and adhere to technical and safety regulations. 
  While it does not detail specific anti-sabotage responsibilities, compliance with this law implies OWF 
  operators must operate reliably and could be sanctioned by the Energy Regulatory Office (URE) 
  for failing to secure their facilities adequately (for instance, if a lack of security led to prolonged 
  outages violating supply obligations). The Energy Law also interacts with the Crisis Management Act in 
  that energy infrastructure is part of the state’s ‘energy security’ strategy. In practice, however, 
  the Energy Law’s role in OWF protection is indirect and essentially acts as the sectoral backdrop, 
  while the Crisis Management Act and security laws mentioned in a previous subsection impose the concrete protection requirements.
</p>


<p><title>Act on the Protection of People and Property (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_011">1997b</xref>)</title></p>
<p>This law regulates security services and mandates, in accordance with the 
  Act on the Protection of Persons and Property 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_011">Government of Poland 1997b</xref>), 
  that ‘facilities of special importance’ have physical protection plans. Specific strategic sites 
  (e.g. major power plants, ports, LNG terminals) are classified by the Ministry of 
  Interior as requiring mandatory protection by armed security, often employing either police, 
  military police, or licensed security firms. Post-9/11, airports are a prime example. However, 
  civil aviation security is tightly overseen by state inspectors with enforceable regulations. 
  For OWFs, the analogous requirement in development is their onshore substations and control 
  centres could be designated as mandatory protected facilities. Currently, under this law, an OWF 
  operator must implement a security plan that has been reviewed by the Police and the ABW, and which includes 
  an anti-terrorism annex. Indeed, Polish CI operators must draft both a physical protection plan 
  (agreed with the police) and an anti-terrorism plan (agreed with ABW) for each task. 
  These plans detail measures against intruders, sabotage devices, and response procedures under 
  various alert levels. Unfortunately, for offshore wind, implementing this is challenging as a 
  guard cannot be posted on every turbine. However, the onshore interface and any service vessels 
  can follow these regulations. Ensuring maritime assets are covered via the Border Guard or Navy 
  instead of static guards is part of ongoing policy development.
</p>

<p><title>Maritime Border Protection and Law Enforcement: The Act on the Border Guard 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_008">1990</xref>) and the Maritime Code 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_012">2001</xref>)
</title></p>
<p>These two legal frameworks outline enforcement powers at sea, empowering Border Guard 
  officers to stop, search, and detain vessels violating Polish laws. 
  According to the Act on the Border Guard 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_008">Government of Poland 1990</xref>), 
  these powers are explicitly granted to the ‘commander of a Border Guard watercraft in territorial waters, 
  raising questions about officers’ authority on piers or aircraft. Within the 12 NM territorial sea, 
  Border Guard patrol boats can enforce security zones, order vessels to stop or change course, 
  inspect them, and even divert them into port if they refuse compliance. 
  They address threats such as unauthorised entry into OWF zones, pollution, smuggling, and other violations 
  like anchoring in restricted areas. In the contiguous zone and EEZ beyond 12 NM, the Border Guard’s 
  role includes protecting Poland’s rights, though the law is unclear. 
</p>
<p>Article 14(3) of the BG Act allows Border Guard vessels to act in the EEZ to protect Poland’s rights, 
  which is interpreted to cover fisheries enforcement, customs, and environmental laws, 
  potentially including OWF protections 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_008">Government of Poland, 1990</xref>). 
  However, legal experts note that the wording regarding security incidents around OWFs is ambiguous, 
  detailing that ‘the scope of competences of the Border Guard does not cover the sea area in 
  which projects of Polish OWFs are planned or with already existing 
  critical infrastructure facilities’ 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_024">Romowicz and Niewiński, 2023</xref>). 
  They suggest explicitly mentioning the contiguous zone in the Border Guard’s authority to clarify 
  that patrols can intervene, for instance, 15 NM offshore at a wind farm, without overstepping their bounds 
  (see <xref ref-type="bibr" rid="j_jobs-2026-002_ref_023">Romowicz and Niewiński, 2021</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-002_ref_024">Romowicz and Niewiński, 2023</xref>). 
</p>
<p>In sum, Poland’s legal framework has many necessary components to secure OWFs: critical 
  infrastructure designation with protection planning; maritime regulations for exclusion zones; 
  law enforcement powers at sea; and contingency provisions for high threats. However, as the following 
  sections convey, the practical enforcement of these laws hinges on clearly defined institutional 
  roles and sufficient capabilities. Gaps between legal authority and real-world capacity pose 
  challenges that Poland is now urgently addressing.
</p>

<p><title>Section Five: Roles and Responsibilities of Key Institutions and the Responsibility Matrix</title></p>
<p>Protecting OWFs involves a number of institutions with distinct duties. 
  The major players include the Polish Navy, the Border Guard (particularly its Maritime Branch), 
  the Maritime Offices, the RCB, and the OWF operators. The following responsibility matrix highlights 
  both how roles of the various institutions complement one another but also reveals fragmentation 
  and potential challenges. After which is a series of paragraphs offering further details 
  for each specific institutions’ responsibilities. 
</p>

 
<p><italic>Table 1. Responsibility Matrix: Key Actors in OWF Protection in Poland. Institutions in first column.</italic></p>


<table-wrap id="Table1">
    <caption>
    <title>Table 1. Responsibility Matrix: Key Actors in OWF Protection in Poland. Institutions in first column.</title>
    <p></p>
    </caption>
  <table frame="box" rules="all" cellpadding="5">
    
      <tbody>
        <tr>
          <th> </th>
        <th>Responsibilities for OWF Protection</th>
        <th>Gaps / Challenges</th>
        </tr>

        <tr>
          <td>
            <bold>Polish Navy</bold>
          </td>
          <td>
            <p>Deter and defend against high-end or state-sponsored threats 
              (e.g., sabotage by hostile military or ‘grey zone’ actors).
            </p>
            <p>
              Conduct surveillance of Poland’s EEZ for suspicious vessels or activities: 
              intercept intruders beyond civilian capability.
            </p>
            <p>
              Deploy specialised units (divers, mine countermeasures, 
              naval Special Operations Forces) to respond to OWFs attacks.
            </p>
            <p>
              Provide visible presence to deter adversaries through 
              naval patrols during heightened tensions.	
            </p>  
          </td>
          <td>
            <p>
              Limited resources for constant patrolling of OWFs areas; few Navy ships available.
            </p>
            <p>
              Peacetime rules restrict use of force on civilian intruders, requiring clear law-enforcement protocols.
            </p>
            <p>
            Risk of over-reliance on Navy for tasks suited to a Coast Guard, 
            potentially diverting them from core defence missions.
            </p>
          </td>
        </tr>

        <tr>
          <td>
            <bold>Border Guard (MOSG)	</bold>
          </td>
          <td>
            <p>Monitor and patrol OWFs sites and surrounding waters on a routine basis.</p>
            <p>Enforce exclusion zones by stopping, inspecting, and removing unauthorised vessels.</p>
            <p>Act as first responder to incidents (detaining suspects, securing the area until specialised forces arrive).</p>
            <p>Coordinate with Navy and Police for joint operations and alerts (e.g., BRAVO alerts).</p>
          </td>
          <td>
            <p>Legal authority in the EEZ not clearly defined; jurisdiction gap beyond 12 NM.</p>
            <p>Significant asset shortages (ageing patrol fleet, insufficient coverage during adverse conditions or prolonged operations).</p>
            <p>Fragmented operations and parallel reporting chains slow integration with Navy and Maritime Offices.</p>
          </td>
        </tr>

        <tr>
          <td>
            <bold>Maritime Offices</bold>
          </td>
          <td>	
            <p>Issue permits for OWFs and cables with security conditions; establish 500m safety zones.</p>
            <p>Monitor traffic via coastal radar/AIS and alert enforcement agencies of violations.</p>
            <p>Enforce regulations administratively (fines, corrective orders).</p>
            <p>Coordinate maritime SAR in case of OWFs accidents.</p>
          </td>
          <td>
            <p>	Safety zones are discretionary, not mandatory; potential delays in issuance leave OWFs vulnerable.</p>
            <p>No patrol assets; rely entirely on Border Guard/Navy for physical enforcement.</p>
            <p>Separate surveillance systems reduce unified situational awareness.</p>
            <p>Overlapping authority with other agencies risks confusion in OWFs incidents.</p>
          </td>
        </tr>

          <tr>
          <td>
            <bold>RCB (Government Centre for Security)</bold>
          </td>
          <td>	
            <p>Identify OWFs as critical infrastructure and integrate operator protection plans into national strategy.</p>
            <p>Coordinate inter-agency crisis response and advise leadership during threats/incidents.</p>
            <p>Update the National CIP Programme with OWF-specific risks (e.g., drones, cyber-physical threats).</p>
            <p>Liaise internationally with EU/NATO on CI protection and threat intelligence.</p>
          </td>
          <td>	
            <p>Lack of enforcement powers; relies on cooperation rather than sanctions (gap to be closed by CER Directive).</p>
            <p>Future uncertain due to possible restructuring of civil protection law.</p>
            <p>Coordination challenges bridging civil-military and public-private divides; 
              fast information flow from operators to Navy/BG still under development.</p>
          </td>
        </tr>

          <tr>
          <td>
            <bold>OWF Operators</bold>
          </td>
          <td>
            <p>Implement physical security (surveillance, access control, tracking systems, and private security during construction).</p>
            <p>Maintain monitoring &#38; reporting systems (CCTV, radar, SCADA alarms).</p>
            <p>Train staff in emergency procedures; coordinate drills with state security services.</p>
            <p>Ensure cybersecurity compliance under NIS2 and national law (risk assessments, incident reporting, and ICS protection).</p>
          </td>
          <td>
            <p>Cannot counter armed threats; rely on state services for active defence.</p>
            <p>Limited experience with maritime security among Polish operators; need to build strong security culture.</p>
            <p>High cost of advanced security technology (anti-drone, underwater sensors) discourages 
              investment without regulatory push.</p>
            <p>Preparedness gap: few offshore facilities equipped with counter-drone systems as of 2023.</p>
          </td>
        </tr>
    </tbody>
  </table>
</table-wrap>





<p>While the Navy provides high-end deterrence and specialised response, it cannot substitute 
  for the day-to-day presence that the Border Guard should deliver. Maritime Offices establish regulatory 
  frameworks but depend on others for enforcement, creating delays and vulnerabilities. 
  The RCB integrates policy and crisis management but still lacks enforcement authority, 
  leaving oversight dependent on voluntary compliance. Finally, operators contribute crucial monitoring 
  and first-layer security, yet they lack coercive powers and face financial and technical limits. 
  Taken together, these findings confirm that Poland’s protection model remains fragmented, 
  overly reliant on informal coordination, and exposed to jurisdictional gaps – especially in the EEZ. 
  Effective resilience therefore requires stronger integration of institutional mandates and clearer lines of 
  authority to prevent duplication, delay, or neglect in moments of crisis.
</p>

<p><title>Polish Navy</title></p>
<p>The Polish Navy defends Poland’s maritime territory and contributes to NATO’s collective defence. 
  In the context of OWFs, its role is strategic: deterring and responding to high-end, state-sponsored 
  threats such as sabotage by submarines, hostile divers, or underwater drones.
</p>
<p>Key contributions include:</p>
  <list list-type="bullet">
    <list-item>
      <p>Military-grade response: The Navy is the only force capable of handling advanced maritime threats. 
        It can deploy sonar-equipped vessels, mine countermeasure units, and special forces (e.g., Formoza) 
        to secure OWFs against sophisticated attacks.</p>
    </list-item>
    <list-item>
      <p>Hybrid threat deterrence: While typically not involved in civilian policing, 
        the Navy has become more active in maritime security amid rising hybrid threats, 
        as seen in recent operations intercepting suspicious vessels near critical infrastructure.
      </p>
    </list-item>
    <list-item>
      <p>Maritime domain awareness: The Navy’s Maritime Operations Centre in Gdynia 
        coordinates with the Border Guard and NATO to monitor activity near OWFs. 
        Planned acquisitions (e.g., surveillance drones, AI systems) aim to enhance 
        persistent situational awareness.
      </p>
    </list-item>
    <list-item>
      <p>Coordination with civilian actors: While the Navy operates under the Ministry of Defence, 
        adequate OWFs protection requires protocols for cooperation with civilian agencies. 
        The Navy steps in when threats surpass Border Guard capacity, ensuring a layered defence.
      </p>
    </list-item>
  </list>


<p>Resource constraints mean the Navy cannot routinely patrol OWFs, but its presence – when deployed – 
  is a strong deterrent. It is the ultimate backstop for offshore infrastructure security, 
  bringing advanced capabilities and strategic weight when the threat environment escalates.
</p>

<p><title>Border Guard (Maritime Regional Unit)</title></p>
<p>Under the Ministry of Interior, the Polish Border Guard (Straż Graniczna) is the frontline maritime 
  law enforcement agency through its Maritime Regional Unit (MOSG) based in Gdańsk. Acting as Poland’s 
  de facto coast guard, it patrols the Baltic Sea – including the EEZ – to uphold maritime law, 
  monitor sea traffic, and respond to emergencies.
</p>
<p>In the context of OWFs, the Border Guard is the primary operational force for daily security. 
  Its patrol vessels and aircraft can monitor safety zones, intercept intruding vessels, conduct onboard inspections, 
  and respond to suspicious or hostile activity (e.g., reconnaissance or sabotage attempts). 
  In territorial waters, they have strong legal authority to stop, inspect, and redirect vessels; however, 
  their jurisdiction in the EEZ is currently more limited and needs clarification – especially for protecting critical infrastructure.
</p>
<p>Key challenges include:</p>
  <list list-type="bullet">
    <list-item>
      <p>Legal gaps: Existing law does not explicitly empower the Border Guard to protect OWFs beyond 12 NM. 
        Amendments are needed to extend authority into the contiguous zone and EEZ. 
	    </p>
    </list-item>
    <list-item>
      <p>Limited resources: The fleet is small and ageing, with limited endurance in harsh conditions. New patrol vessels and modern surveillance systems are needed. 
      </p></list-item>
    <list-item>
      <p>Protocol development: Clear procedures must define how the Border Guard should respond 
        to emerging threats at OWFs, especially beyond visual line of sight or involving divers or drones.
      </p>
    </list-item>
  </list>

<p>Despite these constraints, the Border Guard remains Poland’s key asset for persistent maritime presence, 
  enforcement, and first response around OWFs. With legal reform, fleet modernisation, and integration into a 
  future Coast Guard structure, it can become the backbone of OWF operational security.
</p>

<p><title>Maritime Offices (Maritime Administration)</title></p>
<p>Poland’s Maritime Offices (in Gdynia and Szczecin) are civil authorities under the Ministry of 
  Infrastructure responsible for maritime administration, safety, and environmental protection. 
  Regarding OWFs, they serve as the key regulatory body – not an operational force – ensuring secure and 
  lawful integration of these installations into maritime space.
</p>
<p>
Their roles include:</p>
<list list-type="bullet">
  <list-item>
    <p>Permitting and Zoning: They vet and approve OWFs sites and cable routes to avoid conflicts with navigation 
      and enforce expert safety standards early in the planning process. 
    </p>
  </list-item>
  <list-item>
    <p>Safety Zones: Maritime Offices issue ordinances establishing exclusion zones around OWFs and defining 
      permitted vessel movements. They also publish navigational warnings and enforce rules through fines. 
    </p>
  </list-item>
  <list-item>
    <p>Inspections and Sanctions: Through their inspectorates, they can investigate maritime violations, 
      order safety improvements, and impose penalties or halt operations if legal standards are breached. 
    </p>
  </list-item>
    <list-item>
      <p>Traffic Monitoring and Surveillance: They operate radar, AIS, and VTS systems that 
        track maritime traffic and detect suspicious activity, sharing intelligence with the Border Guard and Navy.
      </p>
  </list-item>
</list>

<p>However, maritime offices lack patrol assets and depend on security forces for physical enforcement, 
  creating a risk of fragmented response during incidents. Clear inter-agency protocols and real-time information 
  sharing ensure that threats – such as collisions, intrusions, or sabotage – are promptly acted upon. 
  Effectiveness of the maritime offices in maritime domain awareness hinges on seamless cooperation with 
  operational actors and unified maritime command structures, otherwise they are not effective.
</p>

<p><title>Government Centre for Security (RCB)</title></p>
<p>The Government Centre for Security (RCB) is Poland’s central civilian body for strategic crisis 
  management and critical infrastructure (CI) protection, reporting directly to the Prime Minister. 
  Its core functions include national risk assessments, inter-agency coordination, and oversight of CI 
  protection plans under the National Program for CI Protection (NPOIK). Once connected and power is 
  supplied, OWFs will fall under RCB’s oversight.
</p>
<p>For OWFs, RCB focuses on policy and preparedness rather than operations. It maintains the CI registry, 
  ensures operators submit and align their protection plans with national standards 
  (covering physical, cyber, and emergency risks), and coordinates with military and civilian agencies 
  to ensure coherence across sectors.
</p>
<p>In crisis scenarios, RCB activates national crisis teams, consolidates intelligence from various 
  services, advises top leadership, and can issue alerts (e.g., via the ‘Alert RCB’ system). 
  It also conducts training, updates standards (e.g., counter-drone measures), and raises awareness 
  among new CI sectors like offshore wind.
</p>
<p>Though influential, the RCB lacks enforcement powers, relying on cooperation rather than sanctions. 
  The EU CER Directive will likely require empowering the RCB or a successor body with supervisory and 
  enforcement authority. Experts stress that a single, empowered national coordinator like the RCB is 
  vital to avoid fragmented responsibilities and ensure adequate protection of offshore and other critical infrastructure 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_017">Loba, 2025</xref>).
</p>

<p><title>Offshore Wind Farm Operators</title></p>
<p>The operators and owners of OWFs (e.g. joint ventures involving Polish utilities and international energy firms) 
  are the infrastructure proprietors and thus bear direct responsibility for protecting their assets at 
  the operational level. Under Polish law and EU regulations, OWFs operators are considered 
  ‘critical infrastructure operators’ and (with NIS2) ‘essential entities’ in the energy sector. 
  Their responsibilities are fourfold: implementing physical security measures; developing critical 
  infrastructure protection plans; cybersecurity; as well as collaboration and information sharing. 
</p>
<p>Implementing Physical Security Measures: Operators must secure the OWF’s onshore facilities 
  (control centres, grid connection points) with fences, surveillance, and guards according to the 
  Protection of Property Act. While the offshore turbines cannot be fenced, operators can deploy 
  technological security (e.g. accessing control systems on the turbines/substation, CCTV cameras, 
  motion or vibration sensors on subsea cables, etc.). They often maintain a marine surveillance 
  system as part of the farm, with radar and camera units mounted on some turbines to detect approaching vessels. 
  Any such data can be shared live with the Border Guard. Operators also equip their maintenance 
  vessels with AIS and communications, to ensure the authorities are aware of which means of 
  transportation around OWF’s are legitimate. Essentially, the operator provides the site’s 
  first layer of security monitoring. They are also obligated to comply with any conditions set by authorities. 
  For example, if the Maritime Office says all maintenance trips must be reported 24 hours in 
  advance for security, the operator must do so.
</p>
<p>Critical Infrastructure Protection Plan: As discussed, the OWFs operator must develop a comprehensive 
  CIP plan and submit it to the authorities. This plan assesses all risks (sabotage, natural disaster, technical failure) 
  and lays out prevention, response, and recovery strategies. For sabotage scenarios, it would detail 
  coordination with naval forces, redundancy in case a substation is knocked out, etc. 
  Operators must include business continuity plans (e.g., spare parts and contingency arrangements) 
  to restore power if a turbine or cable is RCB. Sectoral ministries review these plans to ensure quality. 
  However, until CER’s influence, these were essentially recommendations. 
  Leading OWFs developers, especially international ones, will likely follow global best practices 
  (many have experience securing North Sea wind farms, which have faced similar concerns).
</p>
<p>Cybersecurity Responsibilities (NIS/NIS2): OWF installations rely on SCADA control systems 
  and communications that could be cyber targets. Under Poland’s National Cybersecurity System Act 
  (implementing the EU NIS directive), large energy operators are ‘operators of essential services’ 
  and must implement cybersecurity measures and incident reporting. NIS2, coming into force by late 2024, 
  will broaden and tighten these OWF operators will need to conduct cyber risk assessments, 
  apply state-of-the-art security controls, and report any cyber incidents (e.g. hacking attempts on turbine controls) 
  to the national services. They will also have to address supply chain cybersecurity 
  (ensuring contractors like turbine suppliers have good security). The operator thus has parallel 
  duties: keep the OT (operational technology) systems safe from hacking and keep the physical 
  infrastructure safe from intrusion. In practice, cyber and physical security converge – a cyberattack 
  might aim to cause a turbine malfunction, while a physical intruder might try to insert malware via a 
  USB port. Operators must integrate these aspects into their protection plans.
</p>
<p>Collaboration and Information Sharing: Operators must work closely with the government. 
  This includes immediately reporting suspicious activities they observe (e.g., drone sightings around turbines) 
  to the authorities. It also includes participating in joint exercises or drills. 
  For example, Polish authorities may run a simulated OWFs attack exercise; the operator should 
  cooperate by testing their emergency shutdown procedures and communications. Operators also often 
  hire private security or maintain standby contracts for additional protection if threat levels rise. 
  For instance, they could arrange with a private maritime security company to provide an escort vessel, 
  though ultimately, the law enforcement authority remains with the state.
</p>
<p>In summary, OWFs operators have a duty of care to protect their infrastructure, comply with the law, 
  and act prudently. They invest in security measures, plan for contingencies, and coordinate with state services. 
  However, they do not have sovereign powers – they cannot engage forcefully 
  with intruders beyond passive measures (private security at sea cannot, say, 
  open fire or arrest a suspect in Polish jurisdiction). Thus, their role is mainly preventative 
  and coordinative: hardening the target, monitoring it, and acting as the first notifier to state 
  authorities if something is amiss. Polish law reinforces this by obligating operators to 
  ‘ensure adequate protection’ of their CI systems and to maintain backup. Failure to do so could 
  result in penalties under the new CER regime – a significant shift from previous voluntary compliance. 
</p>
<p>It is worth noting that a glaring practical challenge for operators is the remote location of OWFs. 
  Response times by state services (Navy, BG) could be longer than on land, simply due to the significant 
  distance from shore, limited accessibility, and the reliance on specialized vessels or aircraft to reach the site.  
  Operators must account for this ‘extended reaction period’ by having enhanced detection (to give early warning) 
  and resilience (so that even if a turbine is sabotaged, the grid remains stable). 
  Polish analysts have already flagged that OWFs, once feeding the grid, could become attractive targets 
  and that their location far offshore increases the response time of security services, making them more 
  vulnerable if not specially. This calls for innovative solutions, like on-site autonomous surveillance 
  drones or acoustic sensors for underwater threats, which operators might implement in partnership with the government.
</p>

<p><title>Section Six: Impact of EU Directives: CER and NIS2</title></p>
<p>European Union initiatives significantly influence Poland’s approach to critical infrastructure protection 
  by requiring updates in physical security governance and cybersecurity. 
</p>

<p><title>Critical Entities Resilience (CER) Directive</title></p>
<p>The EU CER Directive (2022/2557) requires member states, including Poland, to strengthen the resilience of 
  critical entities across 11 energy sectors against all hazards 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_006">European Parliament and Council, 2022b</xref>). 
  For OWFs, this marks a significant shift from voluntary protection measures to enforceable obligations. 
</p>
<p>For Poland, implementing the CER Directive means they must: identify critical entities, 
  such as major OWF operators based on their role in national energy security; appoint a Competent Authority 
  (likely RCB or a successor) with powers to inspect, enforce, and sanction operators failing to meet resilience standards; 
  ensure OWF operators conduct risk assessments and develop resilience plans with an integrated multi-hazard 
  approach which covers both physical and cyber threats; implement incident reporting, obligating entities to notify authorities of major disruptions, such as sabotage or cable damage; and adopt a national CI resilience strategy by 2026, mapping risks, coordination mechanisms, and cross-sectoral dependencies.
</p>
<p>The directive also promotes international cooperation, aligning with Poland’s regional efforts, 
  such as the June 2025 Baltic MoU on infrastructure protection. CER pushes Poland to empower 
  a central CI authority, close institutional gaps, and harden OWFs against complex hybrid threats. 
  Analytically, the Directive forces Poland to transition from voluntary compliance to enforceable obligations. 
  Its success depends on whether national law creates real supervisory powers, or whether Poland continues 
  to rely on informal cooperation. If implemented robustly, CER could close long-standing accountability gaps; 
  if weakly transposed, it risks remaining trapped within another layer of paper regulation.
</p>

<p><title>NIS2 Directive</title></p>
<p>The NIS2 Directive (EU 2022/2555) strengthens cybersecurity requirements 
  for critical sectors, including energy 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_005">European Parliament and Council, 2022a</xref>). 
  EU states must transpose it – Poland included – by October 2024. Offshore wind farm (OWF) 
  operators will fall under NIS2 as ‘essential entities’, subject to strict obligations.
</p>
<p>Key requirements include: cybersecurity measures requiring OWFs operators to implement robust 
  technical and organisational controls, including incident response, supply chain security, 
  and business continuity plans; incident reporting mandating major cyber incidents to be reported to 
  national authorities within 72 hours, and the establishment of governance and oversight bodies 
  accountable for cybersecurity compliance, in cooperation with designated national authorities responsible for enforcement. 
</p>
<p>Poland could harmonise enforcement under the Ministry of Digital Affairs or a new Cybersecurity Authority. 
  NIS2 also indirectly applies to agencies like the Navy and Border Guard by obliging them to harden 
  their systems and cooperate in joint cyber-physical response scenarios. Poland’s legislative update, 
  including a revised Cybersecurity System Act, is underway. 
</p>
<p>Aligning with the CER Directive, NIS2 advances an integrated resilience model requiring digital 
  and physical safeguards. The challenge lies in implementation, coordination between authorities, 
  and ensuring operator readiness. Poland’s fast-tracked legal reforms and regional cooperation signal 
  a commitment to meeting these high standards. This creates both opportunity and burden. On one hand, 
  NIS2 strengthens resilience by aligning cyber and physical security; on the other, it imposes 
  significant compliance costs on new Polish operators still building expertise. 
  Effective implementation will require state support, sector-wide information-sharing mechanisms 
  (e.g., Information Sharing and Analysis Centre), and coordination between energy and cyber authorities. 
  Together, CER and NIS2 reshape OWFs’ protection into a binding legal duty. Their impact, however, 
  hinges on Poland’s ability to integrate EU requirements with domestic enforcement and avoid duplication across ministries.
</p>

<p><title>Section Seven: Challenges, Implementation Issues, and Recommendations</title></p>
<p>Despite significant progress in legal frameworks and strategic awareness, Poland faces multiple 
  implementation challenges in effectively securing OWFs as critical infrastructure. 
</p>

<p><title>Fragmented Coordination</title></p>
<p>Maritime security responsibilities are dispersed among several agencies – the Navy, the Border Guard, 
  the Maritime Offices, the Police, and the SAR services – often operating without a unified command structure. 
  This fragmentation can lead to operational confusion or delayed response. For instance, 
  a suspicious vessel near an OWF could be tracked simultaneously by the Navy, Border Guard, and Maritime 
  Office, with no clear lead agency.
</p>
<p>To address this, Poland must establish a Maritime Security Coordination Centre, possibly by 
  expanding the Navy’s Maritime Operations Centre that operates 24/7, integrating the Navy, 
  Border Guard, Maritime Office, and Police inputs. This centre would fuse radar/AIS feeds from all 
  sources into one picture and have direct communication links to all patrol units. It would 
  function much like a ‘coast guard command’. A logical approach is to expand the Navy’s Maritime 
  Operations Centre in Gdynia into a Joint Maritime Security Centre staffed by officers from each agency. 
  This centre would coordinate responses in real-time, eliminating delays from fragmented decision-making. 
  A single watch officer with authority can dispatch the Navy or Border Guard asset closest to an OWF 
  upon detecting a threat. Such integration addresses the current ‘fragmentation and incompatible systems’ identified. 
  It also ensures no more gaps or overlaps as agencies will act in concert, guided by a unified command. 
  The centre can also be Poland’s point of contact for international coordination (linking with NATO’s 
  Maritime Security Centre or neighbouring states’ ops rooms as needed). This would enable joint 
  situational awareness, real-time decision-making, and seamless civil-military cooperation.
</p>

<p><title>Resource Limitations</title></p>
<p>In tandem with the above, Poland should strengthen the coast guard function by reorganising and 
  reinforcing the Maritime Border Guard. The current fleet of patrol vessels is ageing and insufficient 
  for long-term offshore presence, especially in harsh Baltic conditions. Many analysts advocate 
  establishing a bona fide Polish Coast. The quickest path is to build on the existing Maritime Branch 
  of the Border Guard, expanding its resources and transferring certain Navy non-combat vessels to it. 
  The Coast Guard would be responsible for day-to-day law enforcement and security in Polish maritime areas, 
  including OWF protection, while the Navy focuses on high-end defence.
</p>
<p>Key steps would include procuring new multi-role offshore patrol vessels for the Coast Guard, 
  recruiting and training additional personnel, and explicitly updating the Border Guard Act to cover 
  EEZ infrastructure protection (as previously noted). By adding a clause to Article 14(3) extending 
  BG powers to the contiguous zone/EEZ for critical infrastructure security, Border Guard units will 
  have a clear legal footing to act around. A well-equipped Coast Guard can conduct regular patrols at wind 
  farm sites, provide armed escort to maintenance teams if threat levels are high, and quickly respond 
  to intrusions, relieving the Navy from routine tasks and allowing specialisation. Offshore Poland’s 
  Coast Guard should similarly be multi-mission: safety, security, and environmental protection around OWFs. 
</p>
<p>Poland must invest in modern offshore patrol vessels (OPVs), drones for wide-area surveillance, 
  and underwater detection systems (e.g., sonar, UUVs). Standing it up will require political will and 
  funding, but it is an investment in long-term maritime security as Poland’s blue economy 
  (wind, shipping, pipelines) grows. Innovation from domestic startups and co-financing from OWF 
  operators could accelerate capability development. Funding from EU or NATO programmes, such as 
  those dedicated to Baltic maritime security, should be leveraged where possible.
</p>

<p><title>Legal and Regulatory Gaps</title></p>
<p>Domestic legislation must catch up with strategic needs. Amendments are needed to extend 
  Border Guard jurisdiction in the EEZ and designate OWFs (and their onshore substations) as 
  facilities requiring mandatory protection. Clear legal frameworks are also needed to govern 
  military support to civilian operations at sea, especially in hybrid threat scenarios. 
</p>
<p>Poland should also enact a comprehensive Critical Infrastructure Protection Act (or amend existing laws) 
  to implement the CER directive. This act should: designate the Competent Authority by making either RCB 
  or a new ‘National Critical Infrastructure Authority’ the clear lead, grant it powers to audit and 
  sanction CI operators, and mandate regular resilience assessments by operators. It should reconcile 
  the existing Crisis Management Act with CER by updating definitions by aligning 
  ‘critical infrastructure’ with ‘critical entities’ terminology and ensuring no overlap or 
  conflict with the new Protection of People and Property Act. Specifically, it should preserve a 
  central coordination role, as it can also be problematic to scatter CI duties among multiple. 
  The law could explicitly establish an RCB 2.0 with an Inspectorate for Critical Infrastructure Resilience 
  empowered to conduct inspections at OWF facilities (onshore control centres, etc.) and impose fines or orders. 
  This will instil compliance.
</p>
<p>Poland must also finalise the NIS2 transposition. The updated National Cybersecurity System Act should clarify 
  that OWF operators are essential entities and fall under energy sector oversight (likely by the energy ministry 
  working with the cybersecurity authority). It should set out penalty frameworks for lapses and encourage 
  information-sharing by formalising an Information Sharing and Analysis Centre (ISAC) for the energy sector, 
  where OWF operators and authorities can exchange cyber threat intelligence. Since CER and NIS2 overlap on 
  aspects like risk assessment, Poland’s implementation should create synergies such as a single reporting 
  portal for incidents to both the cyber-CERT and the CI authority, to reduce duplication for operators.
</p>
<p>Additionally, Poland should update the Anti-Terrorism Act regulations to explicitly list OWFs as 
  facilities that can receive enhanced protection measures during heightened alerts. This might include 
  authorising the use of military assets (e.g. deployment of Marines or Military Police) to guard OWF 
  infrastructure if an alert level Charlie/Delta is declared for maritime terrorism risk. Given that OWFs 
  are remote, pre-arranging rapid deployment teams (e.g., a helicopter-delivered commando squad that can 
  reach an OWF platform) when an alert is up is prudent.
</p>
<p>A final legal recommendation is to revise the list of ‘mandatory protected’ facilities under the 
  Protection of People and Property Act to include onshore and offshore critical energy infrastructure. 
  For offshore, this could be worded as requiring operators to implement ‘adequate physical protection measures’ 
  subject to approval by the Police and ABW, analogous to onshore sites, although the enforcement mechanism 
  at sea differs, as direct state supervision and guarding are more complex in a maritime environment 
  and typically rely on coordination with the Border Guard or Navy rather than on-site security personnel. 
  In practice, an OWF operator might have to hire vessel patrols or install specific security systems as part 
  of mandatory protection, all coordinated with state authorities. Coordination with local authorities 
  (e.g., voivodes, maritime governors) must also be codified, as they play critical roles in initial incident response.
</p>


<p><title>Operational Readiness and Training</title></p>
<p>Security plans must be tested through realistic, multi-agency exercises simulating OWF-specific threats, 
  such as underwater sabotage or coordinated cyber-physical attacks.  Poland should implement a regular 
  schedule of multi-agency exercises focused on the security of OWFs and subsea cables. Annual scenario-based drills 
  (e.g., ‘Baltic Shield’) should simulate diverse hybrid threats – such as sabotage, 
  cyber-physical disruptions, or underwater attacks – engaging OWF operators, naval forces, police, 
  and international partners. These exercises will expose operational gaps and train personnel in complex response tasks.
</p>
<p>These should involve Formoza [Naval Special Forces], Border Guard units, police bomb squads, and OWF staff. 
  Exercises should stress-test communications, response times, and interagency protocols. The new regional 
  MoU with the Baltic states enables joint drills, which should simulate cross-border sabotage 
  scenarios to enhance interoperability.
</p>
<p>Complement this with independent red-teaming, inviting allied experts to conduct controlled cyber 
  and physical penetration tests to assess system resilience. At the strategic level, 
  run tabletop exercises involving ministries and crisis bodies to test decision-making in scenarios like 
  OWF shutdowns, repair prioritisation, and public communication. Together, these drills will 
  strengthen preparedness across operational and policy domains.
</p>
<p>Finally, continuously evaluate and update plans. Use the feedback loop from incidents elsewhere 
  (e.g. learn from what happened with the Finnish-Estonian pipeline cut in 2023, or North Sea cable cuts) 
  to adjust Polish plans. The threat landscape evolves, so a yearly review of the OWF security strategy, 
  perhaps coordinated by RCB with all stakeholders, will keep the system resilient and ready. 
  This aligns with CER’s requirement for regular risk assessments and supervision.
</p>

<p><title>Intelligence and Early Warning</title></p>
<p>Preventing sabotage requires actionable intelligence shared with operational units in time to act. 
  Intelligence agencies (ABW, The Military Counterintelligence Service (SKW)) must collaborate 
  with maritime forces and OWF operators without compromising sources. Poland should establish clear 
  procedures for threat-level escalation and response (e.g., increasing patrols based on intelligence about possible attacks). 
  EU platforms like the Critical Infrastructure Resilience Group offer opportunities for coordinated threat assessment.
</p>
<p>Poland must invest in a state-of-the-art maritime domain awareness (MDA) system covering its OWF areas. 
  This includes deploying additional sensors: high-resolution coastal radars, long-range day/night cameras, 
  and hydro-acoustic sensors to detect underwater vehicles or divers. The aim is to ensure that any 
  approaching surface or subsurface threat is detected as early as possible. Given the difficulty 
  of constant physical presence, force-multiplying technologies like drones (UAVs) and USVs should 
  be rapidly integrated. The government should expedite the purchase of long-endurance drones capable of 
  patrolling OWF as indicated in May 2025. It should also consider unmanned surface or underwater 
  vehicles that can loiter around critical sites. NATO’s ongoing experiments with drone boats 
  could be leveraged – Poland can seek to host or contribute to these capabilities for persistent OWF monitoring. 
  Additionally, equipping some wind turbines with monitoring gear (radar or sonar nodes) 
  could create a distributed sensor network. Since turbines have power and height, mounting radar/camera 
  units on a few would greatly extend coverage and help track low-signature threats. 
  The Maritime Offices or the Navy could partner with operators to install these – a form of public-private tech cooperation.
</p>
<p>Crucially, all these sensors must feed into the integrated command centre (Recommendation 9.1) 
  to share real-time data. Poland should use intelligence cues (e.g., NATO intel about suspicious vessels, 
  either USV or manned) to dynamically re-task surveillance assets to potential hot spots. 
  Given the concern that ‘if a ship turns off AIS, authorities only have a radar blip and must 
  scramble a patrol to identify it’, better sensor coverage and automated anomaly-detection software 
  (possibly with AI) should be implemented as suggested by the Naval Academy. The goal is to shorten 
  reaction times – detect, classify, and intercept a threat before it reaches a turbine or cable. 
  Funding for these upgrades could be drawn from a combination of sources: the national defence budget 
  (particularly for dual-use technologies), EU security and resilience funds, and financial 
  contributions from OWF operators – potentially as a licensing condition requiring developers 
  to co-finance designated security measures.
</p>


<p><title>Public-Private Collaboration</title></p>
<p>NIS2 and CER formalise the relationship between sectors, but building day-to-day trust 
  remains critical. OWF operators must be treated as security partners, not just regulated entities. 
  They need confidence that reporting anomalies (e.g., suspicious objects on a turbine) will not 
  lead to liability but prompt support. Encourage OWF operators to exceed minimum security 
  requirements through incentives and partnerships. For instance, the government can create a 
  co-financing programme where, if an operator invests in advanced security (like underwater drone 
  detection or extra backup power systems), the state covers part of the cost or gives regulatory credits. 
  This could be framed as part of corporate social responsibility for energy companies – 
  protecting critical infrastructure is protecting customers and the nation. 
</p>
<p>Operators should also be involved in the early design stage of security measures. Because they 
  know their systems best, their input can ensure that protective measures are practical and do not 
  overly hamper operations (security should enable resilience, not choke the business). 
  A forum or working group between OWF industry representatives and security agencies (Navy, RCB, etc.) 
  can be set up to exchange ideas and best practices regularly.
</p>
<p>Poland can also tap into its tech sector and EU research funds to develop custom solutions for 
  Baltic Sea conditions. For example, support Polish tech companies to build robust wind-farm 
  monitoring software using AI, as suggested by naval experts, which can learn standard patterns 
  of vessel movement and flag anomalies 
  (<xref ref-type="bibr" rid="j_jobs-2026-002_ref_019">Miętkiewicz, 2018</xref>). 
  Alternatively, create hardening kits for undersea cables (making them less snag-prone or easier to fix). 
  By becoming a testbed for such innovations, Poland could turn security into an exportable expertise, in 
  line with the notion of being a ‘leader in the region by developing good practices’
</p>

<p><title>Public Communication and Political Support</title></p>
<p>Finally, an often overlooked but vital part of resilience is public confidence. The government and 
  operators should maintain a clear communication strategy about OWF security. Without revealing sensitive details, 
  they should inform local communities (e.g. fishermen, port authorities, sailors) about the presence of safety 
  zones and why they matter. Restrictive measures such as exclusion zones or increased patrols must be 
  communicated effectively to maintain public and industry support. Public signage, notices, 
  and even community meetings can foster understanding that these are protected sites akin to an airport or power plant.
</p>
<p>Disinformation campaigns targeting wind energy or attempting to delegitimise security responses 
  pose an added challenge. When incidents happen or suspicious activities are noted, timely factual 
  communication can pre-empt rumour and disinformation. For example, if a drone is spotted and investigated, 
  say so publicly (once it is safe) to prevent wild theories. Emphasise positive steps: 
  Poland can highlight that it has increased patrols or caught a suspicious vessel (like in May 2025) – 
  this signals both deterrence to adversaries and reassurance to citizens/investors. 
</p>
<p>In the event of an actual attack or accident, having a prepared crisis communication plan 
  (who addresses media, what initial info to release) will be essential to maintain order and trust. 
  Strategic communication – transparent, proactive, and coordinated – is key to maintaining legitimacy 
  and resilience. This is part of psychological resilience; it deters adversaries, too, because they see 
  that sabotage will not cause panic or chaos, just a firm and managed response.
</p>

<p><title>Conclusion</title></p>
<p>In conclusion, Poland’s road to safeguarding its OWFs involves organisational reform, 
  capacity building, legal updates, and continuous vigilance. The evolving security landscape – 
  with hybrid threats blending physical and cyber elements – demands a holistic approach. 
  Poland should adopt a defence-in-depth strategy for offshore wind farm (OWF) protection, 
  combining layered measures to deter, detect, and respond to threats.
</p>
<p>Increasing Navy and Border Guard presence around OWFs, especially during high-risk periods, 
  will act as a deterrent. Implementing rotational ‘Navy policing’ patrols with Baltic allies will 
  project a persistent security presence.
</p>
<p>Creating a specialised maritime quick-reaction unit (e.g., Formoza, sappers, medics) capable of rapid 
  deployment to OWFs by sea or air in combination with regular drills will ensure a swift, coordinated 
  response in the event of sabotage attempts.
</p>
<p>Collaborating with OWF operators and the grid to ensure backup systems – extra cables, routing options, 
  spare parts, and emergency power – to minimise disruption from attacks or failures will increase essential 
  resilience and redundancy.
</p>
<p>Deploying drone and diver detection systems (RF sensors, sonar, jammers) at OWFs and on patrol 
  assets will increase threat detection in order to better counter unmanned systems. Launching a 
  pilot ‘Safe Wind Farm’ programme to field-test integrated anti-drone and anti-UUV technologies 
  will continue to develop safety and security measures.
</p>
<p>Deepening Baltic-NATO coordination and establishing a regional infrastructure threat hub will 
  support sharing real-time intelligence on maritime threats (e.g., ‘ghost fleet’), and aligning patrol 
  areas will foster continued regional and international cooperation while enhancing situational awareness and joint action.
</p>
<p>Poland can create a robust shield around its critical offshore energy assets, turning them 
  into a strategic strength rather than a vulnerability. Only through unified, innovative effort 
  can Poland ensure its offshore wind programme thrives safely under even the harshest conditions, 
  whether delivered by nature or man. Together, these steps form a layered, resilient defence architecture 
  for protecting critical offshore energy infrastructure.
</p>

<p><bold>AI Statement:</bold> No AI was used in writing this article. AI assisted programs were used, 
  specifically Grammarly, Evernote for bibliography, and Safari search engine 
</p>


</body>
<back>


<ref id="j_jobs-2026-002_ref_001">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Adomaitis</surname>
      <given-names>Nerijus.</given-names>
      (<year>2022</year>)
    </bold> 
    ‘<article-title>Norway oil safety regulator warns of threats from unidentified drones</article-title>’, 
    <italic><source>Reuters</source></italic>, [online] 26 September. 
    Available at: 
    <ext-link xlink:href="https://www.reuters.com/business/energy/norway-oil-safety-regulator-warns-threats-unidentified-drones-2022-09-26/">
      https://www.reuters.com/business/energy/norway-oil-safety-regulator-warns-threats-unidentified-drones-2022-09-26/</ext-link>. 
      (Accessed: 17 October 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_002">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Baltic Wind EU</given-names>
     (<year>2025</year>)
    </bold> 
    ‘<article-title>Baltic Sea Offshore Wind Summit: Security Takes Center Stage Amid Geopolitical Tensions</article-title>’, 
    <italic><source>Baltic Wind</source></italic>, 
    [online] 18 March. Available at: 
    <ext-link xlink:href="https://balticwind.eu/baltic-sea-offshore-wind-summit-security-takes-center-stage-amid-geopolitical-tensions/">
      https://balticwind.eu/baltic-sea-offshore-wind-summit-security-takes-center-stage-amid-geopolitical-tensions/</ext-link>. 
    (Accessed: 15 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_003">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Edvardsen</surname>, 
      <given-names>Astri.</given-names> 
      (<year>2022</year>)
    </bold>  
    ‘<article-title>Russian citizen arrested in Northern Norway for drone flights on Svalbard</article-title>’, 
    <italic><source>High North News</source></italic>, [online] 20 October. Available at: 
    <ext-link xlink:href="https://www.highnorthnews.com/en/russian-citizen-arrested-northern-norway-drone-flights-svalbard">
      https://www.highnorthnews.com/en/russian-citizen-arrested-northern-norway-drone-flights-svalbard</ext-link>. 
    (Accessed: 17 October 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_004">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Erling</surname>, 
      <given-names>Barbara</given-names>, and 
      <surname>Strzelecki</surname>, 
      <given-names>Marek</given-names>. 
      (<year>2025</year>)
      </bold> 
    ‘<article-title>Poland intervenes as Russian “shadow fleet” ship spotted near power cable</article-title>’, 
    <italic><source>Reuters</source></italic>, 
    [online] 21 May. Updated 22 May. Available at: 
    <ext-link xlink:href="https://www.reuters.com/world/europe/poland-says-russian-ship-performed-suspicious-manoeuvres-near-cable-sweden-2025-05-21/">
      https://www.reuters.com/world/europe/poland-says-russian-ship-performed-suspicious-manoeuvres-near-cable-sweden-2025-05-21/</ext-link> 
    (Accessed: 13 July 2025).
 </mixed-citation>
</ref>   

<ref id="j_jobs-2026-002_ref_005">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>European Parliament and Council</given-names> 
      (<year>2022</year>a)
    </bold> 
    ‘<italic><source>Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on 
      Measures for a High Common Level of Cybersecurity Across the Union, Amending Regulation (EU) No 910/2014 and Directive 
      (EU) 2018/1972, and Repealing Directive (EU) 2016/1148 (NIS 2 Directive)</source></italic>’. 
    Official Journal of the European Union, L333/80, [online] 27 December, 
    pp. <fpage>80</fpage>-<lpage>152</lpage>. 
    Available at: 
    <ext-link xlink:href="https://eur-lex.europa.eu/eli/dir/2022/2555/oj/eng.">
      https://eur-lex.europa.eu/eli/dir/2022/2555/oj/eng.</ext-link> 
    (Accessed: 14 July 2025).
  </mixed-citation>
</ref>


<ref id="j_jobs-2026-002_ref_006">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>European Parliament and Council</given-names> 
      (<year>2022</year>b)
    </bold> 
      ‘<italic><source>Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 
        December 2022 on the Resilience of Critical Entities and repealing Council Directive 2008/114/EC</source></italic>’. 
      Official Journal of the European Union, L333/164, [online] 27 December, 
      pp.<fpage>164</fpage>-<lpage>198</lpage>. 
      Available at: 
      <ext-link xlink:href="https://eur-lex.europa.eu/eli/dir/2022/2557/oj/eng">
        https://eur-lex.europa.eu/eli/dir/2022/2557/oj/eng
      </ext-link> 
      (Accessed: 19 March 2026).
  </mixed-citation>
</ref>


<ref id="j_jobs-2026-002_ref_008">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names> 
      (<year>1990</year>)
    </bold>  
    <italic><source>Ustawa z dnia 12 października 1990 r. o ochronie granicy państwowej</source>
        [Act of 12 October 1990 on State Border Protection],</italic>
    Dziennik Ustaw, 1990, 
    <volume>78</volume>(<issue>461</issue>). 
    Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU19900780461">
      https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU19900780461</ext-link>. 
      (Accessed: 14 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_009">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names> 
      (<year>1991</year>)
    </bold>  
    <italic><source>Ustawa z dnia 21 marca 1991 r. o obszarach morskich Rzeczypospolitej 
      Polskiej i administracji morskiej</source> 
      [Act of 21 March 1991 on the Maritime Areas of the Republic of Poland and Maritime Administration]</italic>, 
    Dziennik Ustaw, 1991, 
    <volume>32</volume>(<issue>131</issue>), art. 22-24. Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU19910320131">
        https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU19910320131
    </ext-link>. 
      (Accessed: 13 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_010">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names> 
      (<year>1997</year>a)
    </bold>
    <italic><source>Ustawa z dnia 10 kwietnia 1997 r. – Prawo energetyczne</source> 
    [Act of 10 April 1997 – Law on Energy]</italic>, 
    Dziennik Ustaw, 1997, 
    <volume>54</volume>(<issue>348</issue>).
    Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU19970540348/U/D19970348Lj.pdf">
      https://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU19970540348/U/D19970348Lj.pdf
    </ext-link>. (Accessed: 14 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_011">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names> 
      (<year>1997</year>b)</bold> 
      <italic><source>Ustawa z dnia 22 sierpnia 1997 r. o ochronie osób i mienia</source>
         [Act of 22 August 1997 on the Protection of Persons and Property]</italic>, 
      Dziennik Ustaw, 1997, 
      <volume>114</volume>(<issue>740</issue>).
      Available at: 
      <ext-link href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=wdu19971140740">
        https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=wdu19971140740
      </ext-link>. (Accessed: 14 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_012">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names> 
      (<year>2001</year>)</bold> 
      <italic><source>Ustawa z dnia 18 września 2001 r. Kodeks morski</source> 
        [Act of 18 September 2001 on Maritime Code]</italic>, 
     Dziennik Ustaw, 2001, 
    <volume>138</volume>(<issue>1545</issue>).
    Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=wdu20011381545">
      https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=wdu20011381545
    </ext-link>. (Accessed: 14 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_013">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names>
    (<year>2007</year>)
  </bold> 
    <italic><source>Ustawa z dnia 26 kwietnia 2007 r. o zarządzaniu kryzysowym</source> 
      [Act of 26 April 2007 on Crisis Management]</italic>, 
    Dziennik Ustaw, 2007, 
    <volume>89</volume>(<issue>590</issue>).
    Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20070890590">
      https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20070890590
    </ext-link>. (Accessed: 13 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_014">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>Government of Poland</given-names>

    (<year>2016</year>)
    </bold> 
    <italic><source>Ustawa z dnia 10 czerwca 2016 r. o działaniach antyterrorystycznych</source> 
      [Act of 10 June 2016 on Counter-Terrorism Measures]</italic>, 
    Dziennik Ustaw, 2016, 
    <volume>904</volume>.
    Available at: 
    <ext-link href="https://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU20160000904/T/D20160904L.pdf">
      https://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU20160000904/T/D20160904L.pdf
    </ext-link>. (Accessed: 14 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_015">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Kardaś</surname>, 
      <given-names>Szymon.</given-names>
       and 
      <surname>Łoskot-Strachota</surname>, 
      <given-names>Agata.</given-names>
    </bold>
    (<year>2022</year>) 
    <article-title>Dywersja na gazociągach Nord Stream 1 i Nord Stream 2</article-title>’ 
      [Sabotage of the Nord Stream 1 and Nord Stream 2 gas pipelines], 
    <italic><source>Ośrodek Studiów Wschodnich</source></italic>, [online] 29 September. 
    Available at: 
    <ext-link href="https://www.osw.waw.pl/pl/publikacje/analizy/2022-09-29/dywersja-na-gazociagach-nord-stream-1-i-nord-stream-2">
https://www.osw.waw.pl/pl/publikacje/analizy/2022-09-29/dywersja-na-gazociagach-nord-stream-1-i-nord-stream-2
    </ext-link>. (Accessed: 17 October 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_016">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Ledzińska</surname>, 
      <given-names>Przez Paulina</given-names>. 
      (<year>2025</year>)
    </bold>
    ‘<article-title>Premier: podjęliśmy decyzję o uruchomieniu realizacji zamówienia dronów przez Marynarkę Wojenną</article-title>’, 
    [Prime Minister: we have decided to launch the implementation of the Navy’s drone procurement], 
    <italic><source>PortalMorski</source></italic>, 
    [online] 23 May. Available at: 
    <ext-link href="https://polskamorska.pl/2025/05/23/premier-podjelismy-decyzje-o-uruchomieniu-realizacji-zamowienia-dronow-przez-marynarke-wojenna/">
        https://polskamorska.pl/2025/05/23/premier-podjelismy-decyzje-o-uruchomieniu-realizacji-zamowienia-dronow-przez-marynarke-wojenna/
     </ext-link>. (Accessed: 17 October 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_017">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Loba</surname>, 
      <given-names>Norbert</given-names>. 
      (<year>2025</year>)
    </bold> 
    ‘<article-title>The role and tasks of the state in the scope of strategic security of offshore energy, 
        including in particular offshore wind energy</article-title>’, 
    <italic><source>Bezpieczeństwo Narodowe</source></italic>, 
    <volume>46</volume>
    (<issue>1</issue>), 
    pp. <fpage>173</fpage>-<lpage>198</lpage>. 
    DOI: <ext-link href="https://doi.org/10.59800/bn/207650">
      https://doi.org/10.59800/bn/207650
    </ext-link>.
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_018">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Lorenz</surname>, 
      <given-names>Wojciech</given-names> and 
      <surname>Zaręba</surname>, 
      <given-names>Szymon.</given-names> 
      (<year>2022</year>) 
    </bold>
    ‘<article-title>Consequences of the Nord Stream 1 and 2 Gas Pipeline Explosions</article-title>’, 
    <italic><source>PISM</source></italic>, 
    [online] 125-2022, 29 September. Available at: 
    <ext-link href="https://pism.pl/publications/consequences-of-the-nord-stream-1-and-2-gas-pipeline-explosions">
      https://pism.pl/publications/consequences-of-the-nord-stream-1-and-2-gas-pipeline-explosions
    </ext-link>. (Accessed: 14 September 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_019">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Miętkiewicz</surname>, 
      <given-names>R.</given-names> 
      (<year>2018</year>)
    </bold>
    ‘<article-title>Wykorzystanie bezzałogowych jednostek nawodnych w zabezpieczeniu morskich obiektów infrastruktury krytycznej</article-title>’, 
    [Use of unmanned surface vessels in securing maritime critical infrastructure facilities]
    <publisher-loc>Gdynia</publisher-loc>:<publisher-name>Akademia Marynarki Wojennej im. Bohaterów Westerplatte</publisher-name>, 
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_020">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>NATO Supreme Headquarters Allied Powers Europe</surname> 
      (<year>2024</year>)  
    </bold> 
    <article-title>Baltic Sentry</article-title>, 
    <italic><source>NATO SHAPE</source></italic>, 
    [online] Available at: 
    <ext-link href="https://shape.nato.int/operations/operations-and-missions/baltic-sentry">
      https://shape.nato.int/operations/operations-and-missions/baltic-sentry
    </ext-link>. (Accessed: 13 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_021">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>PGE Baltica and Ørsted</given-names> 
      (<year>2023</year>)
    </bold>
      ‘<article-title>Podsumowanie Nietechniczne Morskiej Farmy Wiatrowej Baltica 2</article-title>’ 
      [Non-Technical Summary of the Baltica 2 Offshore Wind Farm], 
    <italic><source>PGE Baltica and Ørsted</source></italic>, 
    [online] Available at: 
    <ext-link href="https://pgebaltica.pl/o-spolce/kluczowe-dane-o-projektach/baltica-2">
      https://pgebaltica.pl/o-spolce/kluczowe-dane-o-projektach/baltica-2
    </ext-link>. (Accessed: 13 July 2025).
  </mixed-citation>
</ref>

<ref id="j_jobs-2026-002_ref_022">
  <mixed-citation publication-type="journal">
    <bold>
      <given-names>
        Projekt Infrastruktura Krytyczna
      </given-names> 
      (<year>2023</year>)
    </bold>
    ‘<article-title>Dyrektywa CER [CER Directive]</article-title>’, 
    <italic><source>Projekt Infrastruktura Krytyczna</source></italic>, 
    [online] Available at: 
    <ext-link href="https://projektik.eu/dyrektywa-cer/">
      https://projektik.eu/dyrektywa-cer/
    </ext-link>. (Accessed: 23 October 2025). 
  </mixed-citation>
</ref>


<ref id="j_jobs-2026-002_ref_023">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Romowicz</surname>, 
      <given-names>Mateusz.</given-names> and 
      <surname>Niewiński</surname>, 
      <given-names>Przemysław.</given-names> 
      (<year>2021</year>)</bold> 
‘<article-title>Offshore wind farms as critical infrastructure in the security system</article-title>’, 
<italic><source>MarinePoland.com</source></italic>, [online] 5 August. Available at: 
<ext-link href="https://www.marinepoland.com/shipyards-offshore-wind-farms-as-critical-infrastructure-in-the-security-system-1363">
  https://www.marinepoland.com/shipyards-offshore-wind-farms-as-critical-infrastructure-in-the-security-system-1363
</ext-link>. (Accessed: 13 July 2025).
</mixed-citation></ref>

<ref id="j_jobs-2026-002_ref_024">
  <mixed-citation publication-type="journal">
    <bold>
      <surname>Romowicz</surname>, 
      <given-names>Mateusz.</given-names> and 
      <surname>Niewiński</surname>, 
      <given-names>Przemysław.</given-names> 
      (<year>2023</year>)
    </bold>
    ‘<article-title>Poland urgently needs Coast Guard</article-title>’, 
    <italic><source>MarinePoland.com</source></italic>, [online] 6 July. Available at: 
    <ext-link href="https://www.marinepoland.com/poland-urgently-needs-coast-guard-1910">
      https://www.marinepoland.com/poland-urgently-needs-coast-guard-1910
</ext-link>. (Accessed: 13 July 2025).
</mixed-citation></ref>

</back>
</article>
