• Title/Summary/Keyword: 테러리스트

Search Result 71, Processing Time 0.027 seconds

Classification of ICS abnormal behavior in terms of security (보안측면에서의 산업제어시스템 비정상 행위 분류)

  • Na, Jung-Chan;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.329-337
    • /
    • 2013
  • Cyber threats of the ICS(Industrial Control System) has been researched on the level to the threat to the network service as well as a specific system, even if the extent of damage was not intended. Although some range of "security" just include the protection of systems against the deliberate attacks of terrorists or cyber hackers, often more damage is done by carelessness, and equipment failures than by those deliberate attacks. This paper presented a taxonomy for classifying all abnormal behaviors of ICS, including deliberate attacks, inadvertent mistakes, equipment failures, and software problems. The classification criteria of ICS abnormal behaviors was selected to highlight commonalities and important features of deliberate attacks as well as inadvertent actions.

A study on develop plan for special security system (특수경비제도의 발전방안에 관한 연구)

  • Lee, Sang-Won;Park, Ju-Hyun
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.305-326
    • /
    • 2007
  • Coming to 21st century, the dangerous causes which threaten for safety of citizen's life is increasing. The national importance of facilitates which is dealing by special security officers are becoming target for enemy or terrorist. Therefore, securities in Korea are developing strongly. This study investigates for status and problem of the special security and aim to suggest the plan for development. The development of special security connects to the development of private security industry, the improvement of work environment for special security officers who are working in this ares, securing of man's ability, reality of salary, introduction of professional qualification system, reorganization of education system and the search system for preparing terror need to improve.

  • PDF

Introduction Plans of Japanese AEO System for the Trade Security and Trade Facilitation (무역의 안전과 원활화를 위한 일본기업의 AEO 제도 도입방안에 관한 연구)

  • Woo, Sung-Koo;Kim, Jae-Myeong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.263-298
    • /
    • 2010
  • The global trading system is vulnerable to terrorist exploitation while the international trade is an essential element for the economic development. Customs has a unique role in the international trade to provide increased security while ensuring facilitation of the legitimate flow of goods and the role of Customs has become more and more indispensable these days. In response to this trend, the World Customs Organization(WCO), the organization of more than 170 Customs administrations all over the world, adopted an international framework("SAFE Framework") in 2005, which includes the Authorized Economic Operator(AEO) concept, whereby a party involved in the international movement of goods would be approved by Customs as complying with the supply chain security standards, and given benefits, such as simplified Customs procedure and less Customs intervention. In this stream, the Japanese government has developed and promoted AEO Program in close cooperation with the business sector, aiming at ensuring security while facilitating legitimate trade. For that purpose, Japan Customs, as a main entity in the field of international trade, has developed comprehensive AEO program with combination of programs for importers, exporters, warehouse operators, Customs brokers and logistics operators, such as forwarders and carriers, which are consistent with the "SAFE Framework" developed by the WCO. The purpose of this paper aims to analyse the introduction plans of AEO program for the trade security and trade facilitation with Japanese AEO system.

  • PDF

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

U.S. FOIA(FREEDOM OF INFORMATION ACT) AND ACCESS TO INFORMATION AFTER 9/11 TERRORIST ATTACKS (9/11 테러 이후 강화된 미국 연방정부의 국가안보 정책이 정보자유법 (Freedom of Information Act) 및 연방 정보공개정책에 미친 영향)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.365-392
    • /
    • 2009
  • The increased concern about national security in the U.S. after the 9/11 terrorist attacks has influenced public rights of access to government information and its legal foundation, the Freedom of Information Act (FOIA). Public access to government information has been restricted at the policy level by a series of legislative and executive changes in FOIA after September 11, 2001, but the examination of statistics on FOIA implementation between fiscal years 1999 and 2004 shows that the strengthened national security measures did not have a considerable impact at the implementation level during this period. These contrasting findings might be due to the public officials' informal reaction to the criticism of the restriction on public access, bureaucratic inertia, and the use of new record categories not subject to FOIA.

  • PDF

A Study on Developing Urban Search and Rescue System in Korea (국내 도시탐색구조체계의 발전에 관한 조사연구)

  • Lee, In-Sun;Back, Min-Ho
    • 한국방재학회:학술대회논문집
    • /
    • 2010.02a
    • /
    • pp.71.1-71.1
    • /
    • 2010
  • 21C 고도의 도시화로 인하여 인구과밀화 및 초대형 초고층 건물의 비약적인 확산은 재난의 규모와 양상에 변화를 가져오며, 도시형 재난재해에 대비한 새로운 대책의 필요성을 과제로 안기고 있다. 뿐 만 아니라 지구온난화 및 뉴 테러리즘의 경향은 복합적이고 동시다발적인 재난으로 인한 다수인명피해에 대한 방호기능의 중요성과 통합재난관리 시스템의 중요성을 더욱 부각시키고 있다. 이러한 거시환경의 변화에 따라 다양화된 위험요인에 대한 체계적 대비와 효과적 대응을 위해 분야별 전문대응조직과 스페셜리스트 양성이 시급한 과제로 대두되고 있으며, 특히 재난대응단계에서 지진 등 건물붕괴로 인하여 동시다발적인 초대형 재난재해 시 효율적인 인명구조 활동의 대책으로 도시탐색구조 체계의 선진화 방안이 필요하며, 이를 위하여 소방공무원을 대상으로 실시한 의식조사 분석결과를 제시하고자 한다.

  • PDF

Trends of Simulated Reality Driven by Big Data (빅데이터 기반 모사현실 기술동향)

  • Ahn, C.W.;Paik, E.H.;Kim, K.H.;Hwang, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.5
    • /
    • pp.120-130
    • /
    • 2016
  • 21세기 디지털 사회에서는 각 개인의 연결과 상호작용이 사회 현상에 막대한 영향을 미치고 있으며, 이로 인해 사회는 더욱 복잡해지고, 순간적으로 급격한 변화가 일어나는 현상이 빈번히 발생한다. 사회 복잡성(Social Complexity)은 다수의 사회 구성원들 간의 복잡한 연결로 인해 발생하는 상호작용 패턴을 의미한다. 2011년 발생한 '아랍의 봄' 혁명, 글로벌 금융위기, 조류독감의 발생과 확산, 글로벌 기후 변화, 테러리스트들의 네트워크와 사이버 범죄의 증가 등은 복잡하게 연결된 글로벌 사회 현상으로 발생하는 복잡성의 사례들이다. 우리 사회의 안전성과 지속성을 확보하기 위해, 이러한 사회 복잡성을 그려내어, 그 속에 숨겨진 패턴을 분석하고 예측하는 기술에 대한 연구 개발이 국가적으로 필요하다. 다양한 분야의 사회적 모형을 개발하고 서로 연결하여, 복잡한 사회적 상호작용을 대규모 시뮬레이션을 통해 현상 분석과 사회경제 정책적 대응방향에 대한 통찰력을 가질 수 있는 대규모 '모사현실(Simulated Reality)' 기술 개발을 서둘러야 한다.

  • PDF

A Study of Targeted Killing, Unmanned Aerial Vehicles (무인항공기 표적살인(Targeted Killing)에 관한 고찰: 논쟁과 실행 정당성을 중심으로)

  • So, Jae-Seon;Lee, Chang-Kyu
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.53-81
    • /
    • 2017
  • Targeted killing is a modern euphemism for the assassination of an individual by a state organization or institution outside a judicial procedure or a battlefield. Targeted killing using armed drones has raised profound anxieties in legal, policy, and advocacy communities in the United States and abroad, including among UN officials. The bottom line for targeted killing supporters is that targeted killing works as part of a larger counter-terrorism strategy. Targeted killing does what it is supposed to and removes the leader of a group. And despite growing legal, moral, and ethical issues concerning targeted killing, scholars agree that drone strikes and targeted killing operations will stay. The ACLU has sued top CIA and Pentagon decision-makers to seek accountability for the unlawful killings of three U.S. citizens in Yemen last year. Also, strikes by drones are associated with serious problems such as collateral damage to ordinary citizens and friendly fire. Targeted killings by drones also involves several issues to be resolved, including suspicions that they may run counter to domestic law prohibiting assassination, the opacity concerning their definitions and military actions, and the impact of whiplash transition. Finally, targeted killing program and the need for transparency. The assembly referring to resolution invites the committee of ministers to undertake a thorough study of the lawfulness of the use of combat drones for targeted killings and if need be develop guidelines for member states on targeted killings with a special reference to those carried out by combat drones. These guidelines should reflect the states duties under international humanitarian and human rights law in particular the standards laid down in the EC on human rights as interpreted by the european court of human rights.

  • PDF

A Study on the Establishment of Anti-Drone system for the Protection of National Important Facilities (국가중요시설 방호를 위한 안티드론 시스템 구축 방안 연구)

  • Hwang, Soon-phil;Kim, Doo-hwan
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.247-257
    • /
    • 2020
  • The Purpose of this study is to present effective Anti-Drone systems to protect national important facilities against drones that are illegally used by crime groups and terrorists with malicious intents. In order to accomplish the purpose of the study, technical and policy reports regarding Anti-Drone systems, open documents from manufacturers and various research papers are reviewed, and in-depth interviews with experts were conducted. Studies have shown that it is effective to overlay and mix different detection systems so that they can improve detection rates by supplementing each other's advantages and disadvantages, and that the means of incapacitation need to acquire flexibility by using both soft-kill and hard-kill methods in accordance with operational environment for the effective usage. In other words, the establishment of an illegal drone pre-management system, mixed and overlapping detection assets, determining appropriate countermeasures, and multiple distribution of means of incapacitation. The establishment of a protection system for important national facilities through the operation of overlapping and complex anti-drone systems is the most urgent task.

The Squat Represented in The Good Terrorist: Lessing's Politics of Place (『순진한 테러리스트』에 재현된 스?하우스-레싱의 장소정치학)

  • Park, Sun Hwa
    • English & American cultural studies
    • /
    • v.14 no.1
    • /
    • pp.27-51
    • /
    • 2014
  • Doris Lessing describes a band of revolutionaries who become involved in terrorist activities far beyond their level of competence in The Good Terrorist. Alice Mellings who is from a middle-class family has organized a squat house in London and seems capable of controlling everyone around her and anything about the house. She is seemingly like a housekeeper or a breadwinner. She also likes to be on the battlefront, for instance, demonstrating, picketing and spray-painting slogans. Such is able to easily exploit the others and she increasingly becomes the leader in the house. Recently some critics have focused on the political and social roles of the protagonist who represents a voice of terrorists in the 1980s England. Based on this, The Good Terrorist is read with the concept of the subject of feminism that Gillian Rose adopts in order to show that this subject tries to avoid the exclusion of the master subject. This subject imagines spaces which are not structured through masculinist claims to exhaustiveness. Alice as the subject of feminism shows different roles; she extorts or steals money for the maintenance of the house from her affluent parents; she spends all her time cleaning, fixing, decorating the deserted house; and she looks after the official affairs related to the house with her skills and experiences. She is systematically in charge of the house and sits at the head of the table in the kitchen. But when their activities turn into disaster and their plans fail, Alice willingly decides to close down the house after ousting the members. Here in her extorted gaze it is revealed that she takes control over the working class members of the house who are unable to lead a revolution because of their own problems and thereby the working class are dominated by the middle class. That is, the place is paradoxically recreated based on class differences, which the revolutionaries try to break. By representing the deconstruction and recreation of the place through squat houses, Lessing reveals her implicit feminism in which a new place should be produced crossing the principle of the dichotomy of gender and class.