Chapter four: Security laws and their application