• Title/Summary/Keyword: 테러사건

Search Result 100, Processing Time 0.024 seconds

A Study on Establishing Disaster Management Plan for Central Administration Office (중앙행정기관 재난관리계획 수립에 관한 연구)

  • Kim, Mu-Jun;Kim, Kye-Hyun;Kwon, Moon-Jin
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.3
    • /
    • pp.61-69
    • /
    • 2010
  • Disasters have been diversifying and the scale of disaster has been increasing worldwide due to the global warming and urbanization. Consequently, it is essential to establish the systematic disaster management because the scale of damages has been rapidly increasing. Nowadays, the importance of the standardized disaster management have been realized internationally due to the 9.11 terror and Tsunami. Also, the activities of research and development to utilize and establish the disaster management standards have been increasing. This study mainly focused on generating an efficient operating manual to support the systematic disaster management of the central administration office based on disaster management standard in South Korea. Firstly, the activities and status of disaster management performed by the central administration office were investigated. Accordingly, libraries of work, functions, organizations, references and behavior for disaster management were designed. Then, a method to make the efficient operation manual based on the constructed libraries was presented to maximize the efficiency of disaster management. This emergency operation manual could support the systematic disaster management by defining the work, function, references and the codes of conduct. Thus, central administration office would be able to define methods and procedures from preparation to recovery through the utilization of the operation manual.

A Study on the Suppression and Punishment of International Terrorism (국제(國際)테러리즘의 억제(抑制)와 처벌(處罰)에 관한 연구(硏究) -중국민항기(中國民航機) 공중납치사건(空中拉致事件)을 중심(中心)으로-)

  • Yoh, Yeung-Moo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.87-123
    • /
    • 1989
  • The purpose of this thesis is to do a research on suppression of peacetime international terrorism and penal system of terrorists by political and economic means. International terrorism means wanton killing, hostage taking, hijacking, extortion or torture committed or threatened to be comitted against the innocent civilian in peacetime for political motives or purposes provided that international element is involved therein. This research is limited to international terrorism of political purposes in peacetime, especially, hijacking of civil aircraft. Hijacking of civil aircraft include most of international terrorism element in its criminal act and is considered to be typical of international terrorism in view of multinationality of its crews, passengers and transnational borders involved in aircraft hijacking. Civil air transportation of today is a indispensable part of international substructure, as it help connect continuously social cultural and economic network of world community by dealing with massive and swift transportation of passengers and all kinds of goods. Current frequent hijacking of civil aircraft downgrade the safety and trust of air travel by mass slaughter of passengers and massdestruction of goods and endanger indispensable substructure of world community. Considering these facts, aircraft hijacking of today poses the most serious threat and impact on world community. Therefore, among other thing, legal, political, diplomatic and economic sanctions should be imposed on aircraft hijacking. To pursue an effective research on this thesis aircraft hijacking by six Chineses on 5th May, 1983, from mainland China to Seoul, Korea, is chosen as main theme and the Republic of Korea's legal, political and diplomatic dealing and settlement of this hijacking incident along with six hijackers is reviewed to find out legal, political diplomatic means of suppression and solution of international terrorism. Research is focused on Chinese aircraft hijacking, Korea-China diplomatic negotiation, Korea's legal diplomatic handling and settlement of Tak Chang In, mastermind of aircraft hijacking and responses and position of three countries, Korea, China and Taiwan to this case is thoroughly analyzed through reviewing such materials as news reportings and comments of local and international mass media, Korea-China Memorandum, statements of governments of Korea, China and Taiwan, verdicts of courts of Korea, prosecution papers and oral argument by the defendants and lawyers and three antiaircraft hijacking conventions of Hague, Tokyo and Montreal and all the other instruments of international treaties necessary for the research. By using above-mentioned first-hand meterials as yardsticks, legal and political character of Chinese aircraft hijacking is analyzed and reviewed and close cooperation among sovereign states based on spirit of solidarity and strict observance of international treaties such as Hague, Tokyo and Montreal Conventions is suggested as a solution and suppressive means of international terrorism. The most important and indispensable factor in combating terrorism is, not to speak, the decisive and constant resolution and all-out effort of every country and close cooperation among sovereign states based on "international law of cooperation."

  • PDF

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

Existential Consciousness and the Meaning of Characters in André Malraux's Literary Works (앙드레 말로의 문학작품에 나타난 등장인물의 실존의식과 존재의미)

  • Oh, Se-jung
    • Cross-Cultural Studies
    • /
    • v.47
    • /
    • pp.191-216
    • /
    • 2017
  • Among 20th century Western ideologies (Western civilization), existentialism is a spirit of the times to restore humanity as rationality and advanced technology have driven mankind to impoverishment and death, experiencing the First and Second World War, Great Depression, Fascism and the Spanish Civil War. In his literature, $Andr{\acute{e}}$ Malraux records his existential agony of how mankind lives and faces death by questioning the fateful life and death of characters. For Malraux's characters, the absurdity of existence related to the human identity means self-examination. Malraux explores existential consciousness and actions of characters in the presence of a concept known as death relative to terror, revolution, and adventure. Malraux deftly addresses the concept of death in his literary works, and it has being emphasized as a central subject for philosophical speculation. In Les $Conqu{\acute{e}}rants$(1928), La Voie Royale(1930), La Condition Humaine (1933), L'Espoir(1937), Malraux suggested a philosophical thesis of the meaning of life through characters in tragic situations, and sought out the consciousness of being and the existential meaning through how the characters control their fate. Malraux, in such a tragic perspective of the world, portrays humanity, affirmation of life, and characters' consciousness and actions in denying death. The agony of death triggers escapist behavior such as having unpredictable instinctual desires such as gambling or smoking opium, but these are desperate struggles to flee from frustration and related to the question of one's existence. What is always emphasized with respect to Malraux's existentialism is the tragic metaphysics of the inevitable destiny of the human condition eventually leading to the question of how humans ultimately confront death. But as characters unite in times of war, revolution and adventure in the novel, such cooperative actions symbolizes a keen sense of solidarity reflecting a camaraderie that transcends individualism. Fellowship among people who voluntarily gather for the common cause of philanthropy and restoring humanity is possible because of the underlying human greatness to sacrifice for such a noble cause. Therefore, Malraux's camaraderie includes the victory of existentialism in creating a world of humanism.

Daesoonjinrihoe from both Superficial Religious Perspectives and Deep Religious Perspectives : Focused on Religious Experience (표층과 심층의 시각에서 바라본 대순진리회 - 종교적 경험의 관점에서 -)

  • Lee, Eun-hui
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.27
    • /
    • pp.245-282
    • /
    • 2016
  • Currently, the whole world is being swept away by spiritual movements seeking divinity in oneself. Yet there are terror attacks, religious disputes and other conflicts continuously taking place on larger and larger scales as well as expanding further and further throughout the world. Interreligious harmony seems like a distant ideal. What is the ultimate cause of religious conflicts? Is interreligious communication truly that difficult? Even among different cultures, said cultures' varieties of ritual expressions, and various religious doctrines, there are points of general common to be appreciated if a deep perspective is adopted. When we find the common ground and understand each other's difference, it will be easier to communicate since everyone will be learning from each other. What could serve as common ground for different religions? Many scholars speak about the state of 'oneness' that is claimed by mysticism throughout a large array of religions. This state of oneness is typically not achieved overnight, but it serves as a prospective state which is pluralistically inclusive. This "religion of enlightenment" emphasizes the process of reaching comprehensive interreligious agreement would be characterized by a deep religious perspective. If superficial religious perspectives focuses only on faith to attain blessings and engage in blind belief, then, by contrast, deep religious perspectives emphasize inner divinity, the true self, orthe higher self. The words, 'superficial religious perspective' and 'deep religious perspective' were defined for personal convenience by O Gang-nam, a scholar of comparative religion. Consequently, this classification is a relative binary concept lacking hard and fast rules with regards to distinctions. But the concept of superficial religious perspectives and deep religious perspectives has its advantage in allowing clearer and easier discussion about religions because it could embrace all aspects of religious life and the development of various religious sentiment. In this way, the terms surface religious perspectives and deep religious perspectives will be used in limited framework. I both borrow this concept and reconsider it by referring to other scholars' methods of classification. From that point, I explore and these views in relation to religious experience. How does religiosity develop, maturity of religious faith take place, deep awareness of truth reveal itself, or an attitude of open-mindedness arise? After these states are realized, is interreligious agreement possible? Most religious studies scholars point out 'religious experience.' They say people could develop their faith from superficial religious beliefs into a more mature and deeper faith through religious experience while continuously aspiring towards enlightenment and practicing their religion in daily life. This study will try to examine aspects of superficial religious perspectives and deep religious perspectives represented in each religion and also explore criticism of each religion. With this view of superficial religious perspectives and deep religious perspectives, some cases documenting the religious experience of Daesoonjinrihoe disciples will be analyzed to see how their religiosity develops from superficial religious perspectives into deep religious perspectives through certain religious experiences. The characteristics of those experiences will also be investigated.

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF