• Title/Summary/Keyword: 테러활동 예측

Search Result 9, Processing Time 0.027 seconds

How can the post-war reconstruction project be carried out in a stable manner? - terrorism prediction using a Bayesian hierarchical model (전후 재건사업을 안정적으로 진행하려면? - 베이지안 계층모형을 이용한 테러 예측)

  • Eom, Seunghyun;Jang, Woncheol
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.603-617
    • /
    • 2022
  • Following the September 11, 2001 terrorist attacks, the United States declared war on terror and invaded Afghanistan and Iraq, winning quickly. However, interest in analyzing terrorist activities has developed as a result of a significant amount of time being spent on the post-war stabilization effort, which failed to minimize the number of terrorist activities that occurred later. Based on terrorist data from 2003 to 2010, this study utilized a Bayesian hierarchical model to forecast the terrorist threat in 2011. The model depicts spatiotemporal dependence with predictors such as population and religion by autonomous district. The military commander in charge of the region can utilize the forecast value based on the our model to prevent terrorism by deploying forces efficiently.

The Applicability to Terrorism Corresponding field of Complex System (복잡계 관점의 테러대응 분야 적용가능성)

  • Kwon, Jeong-Hoon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.305-306
    • /
    • 2015
  • 본 논문은 복잡다단한 환경변화에 효과적으로 대응하기 위하여 오늘날 여러 학문 분야에서 주로 이용되고 있는 복잡계 이론의 사고와 방법론을 기반으로 테러대응을 위한 분야별 제 접근에 대하여 논하는데 그 목적이 있다. 우리는 수많은 테러조직 및 테러환경 요인들과 연결된 복잡한 시스템 속에서 활동하고 있기 때문에 이 모든 것을 이해하고 통제하며 예측하면서 대응한다는 것은 사실상 애초부터 불가능한 일일지도 모른다. 테러대응 역시 테러대응 관계 기관간, 관계 기관 전담 부서 내의 구성원들의 상호작용뿐만 아니라 넓게는 정부, 민간단체, 산업체, 학계, 언론 등 나아가서는 국가간의 이해 관계자, 국제기구 등 테러대응 분야의 다양한 조직들의 참여하에 이들의 상호작용으로 공식적, 비공식적 의사 결정을 통한 방안들을 모색하는 것이 필요할 것이다. 이에 따라 초기조건의 민감성, 프랙탈과 자기유사성, 자기 조직화, 창발, 공진화, 혼돈의 가장자리의 복잡계 이론을 통하여 테러대응 분야의 적용가능성을 은유적으로 탐색할 수 있을 것이다.

  • PDF

The Aspects and Prospects of Terrorist Group Activities in the Sahel Area through the Changes in the Situation in Mali (말리 내 정세분석을 통해 보는 사헬지대 테러집단 활동 양상과 시사점)

  • SangJun Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.326-333
    • /
    • 2023
  • Purpose: By analyzing how the Mali conflict has progressed over the past decade, the activities of terrorist groups in the Sahel are predicted, and their movements will have implications. Method: In addition to existing study, progress is identified through the media. Result: The Mali conflict has been sustained by the spread of ethnic conflict, Islamic extremism, and military coups. Conclusion: The influence of the international community is being weakened with the withdrawal of France and the intervention of Russia. This indicates that the Mali conflict could be prolonged.

Decentralization from Al-Qaida central among Salafi-jihadist groups, Boko Haram and the Islamic States (살라피 지하디스트의 탈-알카에다 중심화와 보코하람, IS에 대한 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.185-212
    • /
    • 2014
  • This research examines the decentralization of al-Qaida and other Salafi-jihadist terrorist groups, which is a subject of intense debate in the West. Especially, this study focused on investigating the status and evolution of al Qa'ida and other two Salafi-jihadist groups, Boko Haram and the Islamic States. These terrorist groups are currently considered as the most active Salafi-jihadist terrorist groups leading today's decentralization from Al-Qaida central terrorism network. This study also aims to examine the contemporary threats posed by the two extremely violent jihadist terrorist groups and these groups's terrorist networks. In order to achieve the purpose of this study, this study conducted content analyses with a wide range of documents reporting about Salafi-jihadist terrorists groups. Also this study utilized GTD data set drwan from START centner to provide descriptive analyses regarding IS and Boko Haram's activities and threats. On the basis of analyses, this study argues that recently the threats posed by core al Qaida has been severely weakened. Further, the broader Salafi-jihadist movement has become more decentralized among four tiers: first, core al Qaida in Pakistan; second, formal al Qa'ida affiliated groups that have sworn allegiance to core al Qaida; a number of Salafi-jihadist groups that have committed to establishing an extremist Islamic emirate without sworn allegiance to al Qaida; third, individual followers and networks inspired by al Qaida and other Salafi-jihadist groups. In concusion and discussion, this study highlights the need for a long-term engagement counter terrorism strategy against Salifi-jihadist terrorists groups on behalf of the peace and security of the world society.

  • PDF

Trend of National Activities about Emergency Telecommunication (국가 비상통신 관련 해외동향 분석)

  • Jeon, D.J;Kim, S.Y.;Nam, K.D.
    • Electronics and Telecommunications Trends
    • /
    • v.19 no.5 s.89
    • /
    • pp.159-169
    • /
    • 2004
  • 기상이변, 국가간 분쟁으로 인한 테러 등 재해 및 재난이 예측 불가능하게 발생하고 있으며, 피해 규모 또한 커지고 있다. 재난, 재해 등의 긴급상황 아래에서 국내 비상통신은 현장지휘통신 위주로 수행되고 있으며, 그 역할 및 범위도 매우 제한적으로 이루어지고 있다. 미국을 비롯한 세계 각국에서는 국가 재난 및 긴급상황에 대비한 다양한 재난통신 활동을 수행하고 있으며, 국가간에서도 상호 협력을 통한 기술표준을 수립하고 있다. 본 고에서는 해외의 재난통신 활동을 파악 분석함으로써 국내 재난통신 체계의 정립에 활용하고자 한다.

A Study on the Feasibility of 'Lone Wolf' Terrorists in Korea: Focusing on IS Defector Student Kim's On-Line Behavior (국내에서의 '외로운 늑대'(Lone Wolf) 테러리스트 발생 가능성에 관한 연구: IS 가담 '김 모'군의 사이버공간에서의 행적을 중심으로)

  • Youn, Bonghan;Lee, Sangjin;Lim, Jongin
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.127-150
    • /
    • 2015
  • Since 9/11 attack, internet has become a major space for terrorist activities and also emerged as the most important spot of lone wolf terrorists for acquiring tools and radicalization. The accident of student Kim's defection to IS (Islamic state) in January 2015 told us that Korea is not any more "terrorism clearance area" and leaded us to look closely into the possibility of lone wolf terrorist. In this paper, I developed a "lone wolf cyber evolution model" using various materials collected by preceding papers and interviewing investigators and terrorism experts in Korea. I analyze Kim's radicalization process using this model. And I picked and closely looked over some facilitating factors of lone wolf such as multi-cultural socialization, increase of international migrants, expansion alienation hierarchy and ideological conflicts deepening and predicted the possibility of lone wolf. Finally, this paper presents some effective policy measurements against lone wolf terrorism in Korea.

A Study on the Demand of Civil Maritime Guarder in Ports (항만 해양경비지도사 수요 예측에 관한 연구)

  • Jin, Sung-Yong;Park, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.19-24
    • /
    • 2008
  • The civil maritime guarder's roles, functions and domains are set and analyzed in order to provide the tailored security services at sea. In addition, the domain and the demand prediction of civil guarder in ports is estimated to evaluate the validity of civil maritime security system.

  • PDF

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable (해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델)

  • Park, Chan Hyun;Song, In Uk;Kim, Min Ji;Chang, Eun Hee;Heo, Jun;Kim, Hyun Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.489-498
    • /
    • 2016
  • Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF