ARMED SECURITY GUARDS IN HUNGARY: HISTORICAL DEVELOPMENT, LEGAL FRAMEWORK AND OPERATIONAL CHALLENGES
Keywords:
private security, public safety, armed security guardAbstract
Purpose: The aim of this study is to present the institution of armed security guards in Hungary, outlining significant historical events, the evolution of protected assets, and tracing the development of technological support used in security.
Approach: Every country has a vested interest in protecting objects of critical importance for state operations, public welfare, irreplaceable cultural heritage, and assets vital to national defense, national security, and law enforcement. Certain sectors, such as nuclear energy and international air transport security, are governed by international regulations, though their organizational forms are determined by national legislation. Typically, police and military forces undertake these responsibilities. However, uniquely at a global scale, Hungary has established armed security guards for these purposes. The minister responsible for law enforcement, defense, and national security has the authority to mandate the protection of these assets and to require their owners or operators to finance their own security measures. Traditionally, armed security guards protect, among others, international airports, nuclear facilities, critical infrastructure vulnerable to disasters, and public utility systems essential for the population.
Previously, only the police were authorized to mandate armed security protection. Since 2011, this authority has been extended to the leaders of relevant ministries, allowing them to order security measures for organizations and facilities under their jurisdiction. This includes directives from the Minister of Defense and the Minister overseeing intelligence services. A governmental decree introduced in 2024 regulates the issuance of specialized personal and asset protection certificates, defining state requirements for explosive detection measures to protect specific facilities and events.
Findings: Expanding on this framework, there is growing demand—particularly from institutions under state responsibility—for enhanced security regulations in public and higher education institutions, healthcare facilities, and hospitals. Professional advocacy groups and academic communities propose that security could be strengthened through armed security guards.
Value: The competencies of armed security guards have expanded into areas such as corrections, border protection, and immigration detention facilities. To enhance their technical capabilities in these roles, armed security guards need broader authorization regarding the use of surveillance cameras, drones, and non-lethal weapons (tasers).
Key words: private, security, public security, armed security guard
References
Anderson, R., & Moore, T. (2006). The Economics of Information Security. Science, 314(5799), 610–613. https://doi.org/10.1126/science.1130992
Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253 (1), 1–13. https://doi.org/10.1016/j.ejor.2015.12.023
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A Review of Cyber Security Risk Assessment Methods for SCADA Systems. Computers & Security, 56, 1–27. https://doi.org/10.1016/j.cose.2015.12.004
EDPB. (2020). Guidelines 3/2019 on processing of personal data through video devices (Version 2.0). https://www.edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-32019-processing-personal-data-through-video_en
Gill, M., & Spriggs, A. (2005). Assessing the Impact of CCTV (Home Office Research Study 292). https://webarchive.nationalarchives.gov.uk/ukgwa/20110218135832/http://rds.homeoffice.gov.uk/rds/pdfs05/hors292.pdf
Hrudey, S. E., & Hrudey, E. J. (2014). Ensuring Safe Drinking Water: Learning from Recent Outbreaks in Affluent Nations. IWA Publishing. https://iwaponline.com/ebooks/book/284/Ensuring-Safe-Drinking-Water-Learning-from-Recent
Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal, 4(6), 1802–1831. https://doi.org/10.1109/JIOT.2017.2703172
IAEA. (2016). Computer Security at Nuclear Facilities (Nuclear Security Series No. 17). https://www.iaea.org/publications/8691/computer-security-at-nuclear-facilities
IAEA. (2021). Computer Security Techniques for Nuclear Facilities. https://www.iaea.org/publications/14729/computer-security-techniques-for-nuclear-facilities
Kaplan, S., & Garrick, B. J. (1981). On The Quantitative Definition of Risk. Risk Analysis, 1(1), 11–27. https://doi.org/10.1111/j.1539-6924.1981.tb01350.x
Loader, I., & Walker, N. (2007). Civilizing Security. Oxford University Press. https://global.oup.com/academic/product/civilizing-security-9780199275556
Lyon, D. (2007). Surveillance Studies: An Overview. Polity. https://www.politybooks.com/sociology-and-anthropology/surveillance-studies
NIST. (2023). SP 800-82 Rev. 3: Guide to Operational Technology (OT) Security. https://csrc.nist.gov/pubs/sp/800/82/r3/final
Piza, E. L., Welsh, B. C., Farrington, D. P., & Thomas, A. L. (2019). CCTV Surveillance for Crime Prevention: A 40-Year Systematic Review with Meta-Analysis. Criminology & Public Policy, 18(1), 135–159. https://doi.org/10.1111/1745-9133.12419
Prenzler, T., & Ronken, C. (2001). Models of Police Oversight: A Critique. Policing and Society, 11(2), 151–180. https://doi.org/10.1080/10439463.2001.9964865
Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine, 21(6), 11–25. https://doi.org/10.1109/37.969131
Walker, S. (2005). The New World of Police Accountability. Sage. https://us.sagepub.com/en-us/nam/the-new-world-of-police-accountability/book226470
Welsh, B. C., & Farrington, D. P. (2008). Effects of Closed-Circuit Television on Crime. Campbell Systematic Reviews, 4(1), 1–73. https://doi.org/10.4073/csr.2008.17
Boruzs, H. (2021). The theoretical defense capabilities of police officers, armed security guards, and personal and property guards. Security Science Review, 3(2), 105–11 1289-1290
Christián, L. (2022). Complementary policing. National University of Public Service Ludovika University Press
Finszter, G. (2010) The constitutional foundations of policing strategy, Pécs Border Guard Scientific Communications XI. Pécs, 2010. 5-24.
Felméry, Z. (2015): The role of the state and private companies in promoting public safety Nation and Security 2015/5. issue 124.125.page
Herczeg. M. (January 17, 2010). Rákosi and his followers invented it, and it still works today. https://index.hu/belfold/2010/01/17/rakosiek_kitalaltak_es_ma_is_mukodik/, downloaded on August 20, 2025.
Szigeti, L. (2022) The role and tasks of armed security guards in protecting the capital's safe drinking water supply, Ludovika University of Public Service, Security Management MA thesis
Szigeti, L. (15.04.2025) Head of the Hungarian Armed Security Guards Professional Association – presentation given at the Armed Security Guards professional conference, Balatonföldvár
Tóth, L. (2023) The role of video surveillance systems in increasing the efficiency of facility security. Military Engineer, 18(1), 99–113. https://doi.org/10.32567/hm.2023.1.8
Tóth, L. (2023). Opportunities for video surveillance systems to increase efficiency in the field of public space surveillance. PhD. Óbuda University
Tóth. L. (2024). From visible friend to invisible enemy – The price of convenience. Magyar Rendészet, 24(2). Available at: folyoirat.ludovika.hu/index.php/magyrend/article/view/7451/6032.
Vári, V., Mátyás, S., Tihanyi, M., & Krasnova, K. (2025). CCTV and Crime Prevention Effectiveness: Experience of Hungary. BRICS Law Journal, 12(1), 40–55. https://doi.org/10.21684/2412-2343-2025-12-1-40-55.
Vári, V. (2020). Civilian Control of the Police: Difficulties and Opportunities. In Particular Concerning Hungary. In: Conference Proceedings, vol. 21, 51–60.
Vári, V. (2020). The Civil Sphere, the State, and Law Enforcement. In IV. International Scientific Conference on Tourism and Security, Zalakaros, December 3, 2019. (pp. 29–40). REAL–MTAK publication.
Cloud Security Alliance. (July 1, 2024). IT OT Convergence: Enhancing Security and Efficiency [Blog post].
European Data Protection Board. (January 30, 2020). Guidelines 3/2019 on processing of personal data through video devices (Version 2.0).
International Atomic Energy Agency. (2016). Computer Security at Nuclear Facilities (Nuclear Security Series No. 17).
International Atomic Energy Agency. (2021). Computer Security Techniques for Nuclear Facilities.
National Institute of Standards and Technology. (September 2023). SP 800 82 Rev. 3: Guide to Operational Technology (OT) Security (DOI: 10.6028/NIST.SP.800 82r3).
OPSWAT & SANS Institute. (April 24, 2025). ICS/OT Cybersecurity Budgets Lag as Attacks Surge, Exposing Critical Infrastructure Risks [Report].
Act CXXXIII of 2005 on the rules governing personal and property protection and private investigation activities (Szvmt.).
Act I of 2012 on the Labor Code (Mt.).
Act II of 2012 on Misdemeanors, Misdemeanor Proceedings and the Misdemeanor Registration System (Szabs. tv.).
Act C of 2012 on the Criminal Code (Btk.) – Section 312.
Act XC of 2017 on Criminal Procedure (Be.) – Section 273.
Hungarian Armed Security Guard Association. (n. d.). The history of the ASG. (Organizational summary).
National Atomic Energy Agency (2022). FV guidelines (FV-2, FV-3, FV-4, FV-11, FV-18). https://www.oah.hu
OPSWAT: Cybersecurity (19 February 2025) What is IT/OT convergence? - OPSWAT
Act CLIX of 1997 on armed security guards, nature conservation and field guard services. https://njt.hu
Decree 27/1998 (VI. 10.) BM on the issuance of the Operating and Service Regulations for armed security guards. https://njt.hu
Government Decree 190/2011 (IX. 19.) on physical protection in the context of the use of nuclear energy. https://njt.hu
EU Directive 2022/2557 (Dec. 14, 2022) on enhancing the resilience of critical organizations
Act LXXXIV of 2024 on the resilience of critical organizations