• Title/Summary/Keyword: 작전효과도

Search Result 133, Processing Time 0.019 seconds

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

A Critical Review and Legislative Direction for Criminal Constitution of Piracy (해적행위의 범죄구성요건에 대한 비판적 고찰과 입법 방향)

  • Baeg, Sang-Jin
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.167-191
    • /
    • 2018
  • Despite international cooperation, piracy has not yet been eradicated in major waters around the world. From the perspective of South Korea, which is absolutely dependent on exporting and importing, it's a lifeline for us to secure safe maritime traffic so it is a situation we have to be vigilant about maritime safety and security. However, criminal law on punishment of piracy is still insufficient and legislative consideration is needed. Since pirates are regarded as enemies of humankind, all nations can punish pirates regardless of their damage. The international community has done its best in cooperation from hundreds of years ago to secure maritime trade through this universal jurisdiction and marine transportation in international waters which is an essential space for military activities, particularly in the Gulf of Aden, the advanced nations have dispatched fleets to combat maritime security threats through joint operations to crack down on Somali pirates. Even if universal jurisdiction is allowed for piracy in accordance with the International Convention on Human Rights and the United Nations Convention on the Law of the Sea, it is difficult to effectively deal with piracy if it not fully complied with a domestic legal system for this purpose or is stipulated as different from international regulations. In other words, universal jurisdiction corresponding to international norms and constitution of piracy should be defined in criminal law in accordance with criminal statutory law. If the punishment of pirates by unreasonably applying our criminal law without prejudice to such work can lead to diplomatic disputes in violation of the Universal Declaration of Human Rights or other international norms. In South Korea, there is no provision to explicitly prescribe piracy as a crime, but punish similar acts like piracy in criminal law and maritime safety law. However, there is a limit to effective piracy punishment because we are not fully involved in internationally accepted piracy. In this study, we critically examine the proposals of the constitutional elements of piracy, propose the legislative direction, and insist on the introduction of globalism to pirate sins.