• Title/Summary/Keyword: 테러집단

Search Result 37, Processing Time 0.026 seconds

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A Study on Problems with the ROK's Bioterrorism Response System and Ways to Improve it (생물테러 대응체제의 문제점과 개선방안 연구)

  • Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.113-144
    • /
    • 2010
  • Bioterrorism is becoming more attractive to terrorist groups owing to the dramatic increase in the utility and lethality of biological weapons in line with today's cutting-edge biological science and technology. The Republic of Korea is facing both internal and external terrorist threats, as well as the possible biological warfare by North Korea. Therefore, it is essential to establish an effective bioterrorism response system in the ROK. In order to come up with the adequate response system for the ROK, an in-depth study has been conducted on the current bioterrorism response system of the U.S. whose preparedness is considered relatively adamant. As a result, the following facts have been found: (1)the legislation with regard to bioterrorism has been established or amended according to the current situation in the U.S., (2)the counter terrorism activities have been integrated with the Department of the Homeland Security as the central agency in order to maximize the national CT capacity, (3)Specific procedures and instructions to cope with bioterrorism have been made into manuals so as to enhance the working-level response capabilities. Next, the analysis on the ROK's bioterrorism response system has been performed in various categories, including the legislation system, task role distribution, cooperative relations, and resource application. It turned out that the ROK's legislation basis is relatively weak and it lacks the apparatus to integrate the bioterrorism response activities on the national level. The shortage of the adequate response facilities and resources, as well as the poor management of manpower have also emerged as problems that hinder the effective CT implementations. Through an analytical and comparative study of the U.S. and the ROK systems, this paper presents several ways to ameliorate improve the current system in the ROK as follows: (1)establish the anti-terrorism law, which would be the basic legal basis for the bioterrorism-related matters; and make revisions to the disaster-related legislation, relevant to bioterrorism response activities, (2)establish an integrated body that has a powerful authority to coordinate the relevant CT agencies; and converge the decentralized functions to maximize the overall response capacity, (3)install the laboratories with a high biosafety level and secure enough of the strategic medical stock-pile, (4)enhance the ability of the inexperienced response personnel by providing with a manual that has detailed instructions.

  • PDF

AMI 보안 취약점 점검 항목에 관한 연구

  • Kim, Sin-Kyu;Jeon, Yu-Seok;Seo, Jung-Taek
    • Review of KIISC
    • /
    • v.22 no.5
    • /
    • pp.73-78
    • /
    • 2012
  • 스마트그리드는 기존 전력망에 IT 기술을 융합한 차세대 전력망이다. 전력망에 IT 기술을 도입함으로써 운영효율이 증가하고 다양한 부가서비스가 창출되지만 반대로 사이버 보안위협은 증가하게 된다. 사이버 보안위협의 기술적 증가요인으로는 신재생에너지의 보급으로 인한 전력망 연결 접점 증가와 실시간 양방향 통신으로 인한 스마트그리드 기기 공격, 양방향 통신 프로토콜 공격 가능성 존재 등이 있다. 또한, 환경적 증가요인으로는 스마트그리드는 전력망 특성상 사고 발생시 피해 규모가 크므로, 상대국 및 테러집단에 의한 주요 공격대상이 되고 있다는 점이다. 본 논문에서는 이러한 스마트 그리드 사이버 보안위협을 사전에 차단하기 위해, 스마트그리드의 핵심 기술이라 할 수 있는 AMI의 보안 취약점을 발견할 수 있는 현실적인 취약점 점검 항목을 제시한다.

An Analysis of Terrorism against Korea to Overseas and its Implications - Focusing on the companies advancing to overseas - (한국을 대상으로 한 국제테러리즘의 분석과 시사점 - 해외진출기업을 중심으로 -)

  • Chang, Suk-Heon;Lee, Dae-Sung
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.153-179
    • /
    • 2011
  • Korea has been a victim of State supporting terrorism by North Korea even before international society realize the terrorism threats because of 9.11 in US. However, state supporting terrorism against South Korea by North Korea went along with East/West Cold War System by US and the Soviet Union. It is because socialism that Kim Il-sung who established a separate government in North Korea with the political, economic, social and military support of the Soviet Union selected as his political ideology justifies terrorism as the tool to complete the proletariat revolution. North Korea's state supporting terrorism is being operated systematically and efficiently by military of North Korea. It gives big worries to international society not only by performing terrorism against Korea but also by dispatching terrorists and exporting terrorism strategies to the third world countries. In this situation, terrorism against Korea has met a new transition point at 9${\cdot}$11 in US. As South Korea is confronting North Korea and the war has not ended but suspended, the alliance between US and Korea is more important than anything else. Because of this Korea decided to support the anti-terrorism wars against Afghanistan and Iraq of US and other western countries and send military force there. The preface of the anti-terrorism war has begun as such. On October 7, 2001, US and UK started to attack Afghanistan and Taleban government in Afghanistan was dethroned on December 7, 2001. US and western countries started a war against Iraq on March 20, 2003. On April 9, 2003 Baghdad, the capital of Iraq fell, and Saddam Hussein al-Majid al-Awja government was expelled. During the process, the terrorism threat against South Korea has expanded to Arab terrorists and terrorism organizations as well as North Korea. Consequently, although Korean government, scholars and working level public servants made discussions and tried to seek countermeasures, the damages are extending. Accordingly, terrorism against Korean companies in overseas after 9${\cdot}$11 were analyzed focusing on Nation, Region, Victimology, and Weapons used for the attacks. Especially, the trend of terrorism against the Korean companies in overseas was discussed by classifying them chronologically such as initiation and termination of anti-terrorism wars against Afghanistan and Iraq, and from the execution of Iraqi President, Saddam Hussein al-Majid al-Awja to December 2010. Through this, possible terrorism incidents after the execution of Osama bin Laden, the leader of Al-Qaeda, on May 2, 2011 were projected and proposals were made for the countermeasures.

  • PDF

The Introduction and the Application of PMSCs System on Counter-terrorism (대테러활동에 있어서 민간군사보안업(PMSCs) 제도의 도입과 활용방안)

  • Kim, Sang-Jin;Kim, Jong-Kul
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.89-98
    • /
    • 2011
  • The counter-terrorism in Korea should be approached practically divided both internally and externally. However, in reality it is impossible for the military and the police to control all the counter-terrorism. So there is a need of precaution using the partnership with private companies. But the military and the police have stressed the conservative and closed operation. Furthermore, the focus of counter-terrorism in Korea is more on expose facto treatment than prevention, so they are almost the defenseless. In order to solve this problem, we should form the private subcontractors of the counter-terrorism experts. That is the introduction and the application of PMSCs system. First, the military and the police need to change its mind set for the partnership with private companies to prepare appropriateness. Second, it should be built up infrastructure to let the hands-up workers on counter-terrorism out place. Third, it should be set up the institutions of learning to train regularly to applicate PMSCs system and to specialize. Fourth, the training of counter-terrorism should be made it mandatory about exit passengers to danger zone. Fifth, the selection of PMSCs suitable for counter-terrorism should be strict.

A Study on the Changing Factors of the Power Transition among the Gov ernments of Somalia and Terrorisms (소말리아 정부와 테러조직 간 권력구도 변화 영향요인 연구)

  • Lee, Pyo-Kyu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.137-147
    • /
    • 2021
  • The purpose of this study is to summarize the variables for making the power expansion of terrorist organizations possible by analyzing the power transitions among the Somalia governments and terrorisms. For this, I created a framework after extracting the independent variables affecting the power transition using the theories of Hans J. Morgenthau, A.F.K Organski, K.J. Holsti. On the basis of these, I analyzed the power transitions among the organizations from August 2012(the foundation of Federal government) to August 2019. According to the results, the power area of the federal government is extremely narrowed, whereas the power areas of al-Shabaab, ISIS, and neutral conflict are largely expanded. The factors in the framework were embodied as the delay of powerful federal government foundation, the shortage of national military forces, the limitation of effective use of foreign forces, the continuation of cooperation and antagonism among armed terrorist organization, sanctuary environment of terrorists using the Sharia law, advantages of force recruitment resulted from the bad economic conditions, public support suitable for the Somalia environment. All of these factors work the causes of lasting anarchy condition of the federal government of Somalia by making the settlement of conflict against terrorist organizations.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

인터넷전화의 해킹 공격과 방어 방안

  • Chun, Woo-Sung;Park, Dea-Woo
    • Review of KIISC
    • /
    • v.22 no.8
    • /
    • pp.26-30
    • /
    • 2012
  • 인터넷전화(VoIP)는 기존 인터넷망을 이용하여 통화내용을 전달한다. 따라서 일반적인 인터넷서비스가 가지고 있는 취약점을 동일하게 가지고 있다. 또한, 기존 유선전화(PSTN)와 달리 물리적인 접근 없이 원격에서 해킹을 통한 도청이 가능하며, 반국가 집단에 의한 사이버테러 감행 시 기관의 업무전산망과 전화망이 동시에 마비될 가능성이 있다. 본 논문에서는 인터넷전화 보안 위협 중에서 호 가로채기, 통화내용 도청, 서비스 오용에 대한 모의해킹을 한다. 또한 모의해킹 시나리오를 작성하고, 인터넷전화 시험센터에서 모의해킹을 통하여 발견된 취약점을 연구한다. 발견된 인터넷전화 취약점에 대한 공격방어 방안을 제시한다.