• Title/Summary/Keyword: 요인테러

Search Result 72, Processing Time 0.025 seconds

How can the post-war reconstruction project be carried out in a stable manner? - terrorism prediction using a Bayesian hierarchical model (전후 재건사업을 안정적으로 진행하려면? - 베이지안 계층모형을 이용한 테러 예측)

  • Eom, Seunghyun;Jang, Woncheol
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.603-617
    • /
    • 2022
  • Following the September 11, 2001 terrorist attacks, the United States declared war on terror and invaded Afghanistan and Iraq, winning quickly. However, interest in analyzing terrorist activities has developed as a result of a significant amount of time being spent on the post-war stabilization effort, which failed to minimize the number of terrorist activities that occurred later. Based on terrorist data from 2003 to 2010, this study utilized a Bayesian hierarchical model to forecast the terrorist threat in 2011. The model depicts spatiotemporal dependence with predictors such as population and religion by autonomous district. The military commander in charge of the region can utilize the forecast value based on the our model to prevent terrorism by deploying forces efficiently.

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

An Analysis of Special Guards' Perception on Terrorism (테러리즘에 대한 특수경비원의 인식분석)

  • Kim, Hyo-Joon;Park, Heon-Young;Ahn, Byung-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.4
    • /
    • pp.273-285
    • /
    • 2011
  • This research present actual conditions on realization about safety of observable individual and country, terror countermeasure from danger of terrorism which special guards have. To achieve these purposes, 400 special guards were sampled using the convenience sampling method and collected data through questionnaire from self-administration method. the collected data are in statistics of p<.05 levels. As the result, we drew following conclusions. Special guards thought that terror might occur most in 'aircraft, rapid-transit railway, subway, and bus'. It was no difference in society demography(p>.05). In type of terror, 'bomb terror' seemed to happen most, and they recognized that biochemistry terror and factor terror, and hostage terror may happen in society demography. Purpose of terror was thought that 'political purpose' may be the biggest, and 'ideological purpose' and 'social purpose' joined the remainder. According to society demography, woman's realization about terror was higher than man in two low variables. According to age, image of terror was high in 40 more than 20. According to educational background, university graduate were higher than a high-school diploma in two low variables. According to place of work, metropolis was higher than small and medium-sized city.

A Study on Activating Police Conversational Techniques - Focusing on activation of crisis negotiation techniques - (경찰 대화기법 활성화 방안에 관한 연구 - 위기협상기법의 활성화 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.149-179
    • /
    • 2018
  • October 31, 2017, a man named Saipov who follows ISIS killed 8 people and injured nearly 20 others by driving his truck to the riverside bicycle path in Manhattan, New York, in an act of terror. June 5, 2017, the Islamic extremist Yacqub Khayre held a woman hostage in a suburb of Melbourne, Australia, before being killed by the police. Various countries around the world including the UK, France, and Germany are in war against terrorism. The terrorists change their target from hard targets such as government officials to vulnerable soft target, intensifying the public's fear, and, unlike in the past when they were organized by governments or organizations, extremists such as ISIS followers are now acting on their own in the act of terrorism. Also, as they use vehicles, pressure cooker, and other objects that can be easily found for terrorism, it is becoming more difficult for the police to prepare against terrorist attacks. Meanwhile, some terrorism researchers argue that conversational techniques (negotiation) used by the police are now of no use, as shown in the cases like 9/11 attacks in 2001 and 2016 Nice attack in France in which the suspects committed terrorist attacks without leaving enough time for the police to take action and that, therefore, tactical suppression techniques need to be developed. Therefore, this study suggested police negotiation techniques are necessary not only for terrorist attacks but also for overall police work, including handling intoxicated people at police station, and proposed ways to activate conversational techniques for police organizations.

The Counter-Terrorism Measures for International Sports Events in Korea (한국의 국제스포츠 행사에 대한 대 테러 전략)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.65-90
    • /
    • 2010
  • Recently, alarmed by the frequent international terrorism or safety accidents, the host countries of world sports events are focusing on security activities for the sake of the participants, facilities, events and competitions. They are alarmed because in case any happenings like international terrorism or safety accident, the contest itself can be criticized to be a failure as much as the international reliability of the host nation may well crash. We can see that any failure in coping with terrorism or safety matters can lead to a nation-wise crisis in the case of Indonesia where the October 12th of 2002 terrorist bomb attack in Bali damaged the image of the nation followed by the similar case in Philippine (Oct. 20th, 2002) where the same terrorist attack dramatically scared away the tourists to the nation. Korea is scheduled to hold the World Championship in Athletics in Daegu Metropolitan City in 2011. Also, it is slated to host various world sports events such as Yeosu International Exposition and Incheon Asian Games. In these contexts, this study analyzes counter-terrorism cases related with the recent international sports events that have been organized in a variety of manners in the era of globalization. This study aims to show alternatives for the safety management in these events. In other words, it is focusing on giving directions to the safety policies of the nation -which may become the future hub of north-east Asia and the world - for more perfect guard and defense, and counter-terrorism activities in all the conferences, sports events and international festivals where any private defense and guard companies are allowed to cooperate with the police force or public security agencies.

  • PDF

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

The Aspects and Prospects of Terrorist Group Activities in the Sahel Area through the Changes in the Situation in Mali (말리 내 정세분석을 통해 보는 사헬지대 테러집단 활동 양상과 시사점)

  • SangJun Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.326-333
    • /
    • 2023
  • Purpose: By analyzing how the Mali conflict has progressed over the past decade, the activities of terrorist groups in the Sahel are predicted, and their movements will have implications. Method: In addition to existing study, progress is identified through the media. Result: The Mali conflict has been sustained by the spread of ethnic conflict, Islamic extremism, and military coups. Conclusion: The influence of the international community is being weakened with the withdrawal of France and the intervention of Russia. This indicates that the Mali conflict could be prolonged.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF