• Title/Summary/Keyword: 폭탄테러 공격

Search Result 10, Processing Time 0.027 seconds

Geospatial analysis of terrorist bombing attacks in Afghanistan (아프가니스탄 폭탄테러공격에 관한 지리-공간 분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.261-290
    • /
    • 2012
  • Since the launch of Operation Enduring Freedom in 2001, Afghanistan has been a critical battle ground for war against global terrorism. For the last 10 years, the U.S. government and its allies and the Afghan government have put a considerable effort to crush terrorists and insurgents and at the same time to construct nationwide governance system. Yet, the noble mission still seems far from complete. Terrorist or insurgent operations in Afghanistan are still active and troublesome. Thus this subject continues to draw a considerable attention of research or investigative reports to grasp an insightful knowledge or intelligence that may allow a better handling of terrorist troubles in this war-torn nation. This study hopes to serve this purpose by providing analyzed information on terrorist bombings in Afghanistan occurred between 2004 and 2007. It adopts GIS (Geographic information System) analysis technique to uncover spatially patterned aspects of terrorist bombing attacks in Afghanistan. The specific focus of this study is to examine whether terrorists behave rationally when they decide which targets to attack. For analysis, this study will focus on examining whether characteristics of localities have certain impact on the risk of being targets of terrorist bombing attacks. To examine the hypothesis of this study, it will explore how the spatial risk of becoming targets of terrorist bombing attack interacts with cost necessary for executing a ttack paid b y terrorists; 1) by demonstrating the spatial distribution of bombing attacks in Afghanistan and 2) by estimating the distance between headquarters (or home base) of terrorists groups and the bombed target area.

  • PDF

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

Psychological Motives for Suicide Terrorism of Islamic Suicide Terrorists and Countermeasures (이슬람 자살폭탄테러범의 심리적 범행동기와 대비책)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.107-119
    • /
    • 2015
  • The key objective of terrorism is to create favorable conditions for certain political, ideological, or religious interests through deliberate social chaos and the spread of fear. Accordingly, terrorist groups rally the means and methods capable of spreading fear among the public through shocking violence. Consequently, as terrorism manifests the progress in modern civilization and the structure of international community, its concepts, means, and methods evolve organically with the progress. The characteristics of the modern terrorism include that it has evolved as a means of war against countries by non-state militant groups, and suicide terrorism is spreading like epidemic as it fits the strategies of Islamic extremist and terrorist organizations as a part of international politics based on terrorism. The humanity's efforts to eliminate the threat of terrorism led to decades of implementing premature policies of military force, but they were found ineffective and resulted in the spread of extreme threat of suicide terrorism. For prevention of suicide terrorism, the efforts must be made to dismantle the basis of suicide attacks through addressing religious alienation and antipathy against a civilization using the notions similar to treatment of pathology considering psychological motives of suicide terrorists.

A Possibility Analysis of Domestic Terrorism in South Korea by Focusing on Afghanistan under the Taliban Forces (탈레반의 아프가니스탄 장악에 따른 국내 테러 발생 가능성 분석)

  • Oh, Hangil;Ahn, Kyewon;Bae, Byunggul
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.848-863
    • /
    • 2021
  • Purpose: On August 16, 2021, the Taliban established the Taliban regime after conquering capital Kabul of the Afghan by using the strong alliance of international terrorist organizations. The Taliban carried out terrorism targeting the Korean people, including the kidnapping of Kim Seon-il in 2004, the abduction of a member of the Saemmul Church in 2007, and the attack on Korean Provincial Reconstruction Team in 2009. Therefore, this research has shown the possibility of Taliban terrorism in Korea. Method: Based on the statistical data on terrorism that occurred in Afghanistan, Taliban's various terrorist activities such as tactics, strategies, and weapons are examined. Consequently, the target facilities and the type of terrorist attacks are analyzed. Result: The Taliban are targeting the Afghan government as their main target of attack, and IS and the Taliban differ in their selection of targets for terrorism. Conclusion: From the result of this research, we recommend Korea need to reinforce the counter terrorism system in soft targets. Because If the Taliban, which has seized control of Afghanistan, and IS, which has established a worldwide terrorism network, cooperate to threaten domestic multi-use facilities with bombing, the Republic of Korea may face a terrorist crisis with insufficient resources and counter-terrorism related countermeasures.

Tracking Recent Terrorism Trends in Europe and North America (최근 북미 및 유럽지역의 테러리즘 동향연구: 2012-2017)

  • Park, Gi-Bbeum;Lee, Chang-Han;Yu, Hyo-Eun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.109-133
    • /
    • 2017
  • The purpose of this study is to provide a general trends in recent terrorism in North America and Europe over the last five years. In particular the terrorism which occurred after 2012 shows the transition in trends as terrorists attacks civilians and public places(soft target) rather than targeting national facilities or specific people. For instance, the Parris terror attack and Barcelona vehicle attack shows this changes clearly. The terrorists appeared to attack ordinary people in urban places with high population density. Although the trends are changing, there are still few studies focusing on the current situation, and most of the previous studies have focused on changing in strategies and counter-terrorism in each country after the 9.11 terror. Meanwhile, studies examining the trends of terrorism have been limited to analyzing few cases or using relatively monolithic data of Global Terrorism Data(GTD). While the types of terrorism that occur recent years including 'new terrorism' in many respects, it seems to be difficult to classify with GTD data and/or case studies. Therefore, it is necessary to construct new data that perhaps grasp the recent trend of terrorism from different perspectives. In this point of view, this Based on this, this study collects terrorism data from North America and Europe for the past five years, by using the National Intelligence Service's annual report on terrorism as a sampling framework and analyse the trends and changes. The result shows similarities in the methods of attack, and the type of weapon they used. As vehicle attacks has been raised in few years, damage area has been widen and casualties also have been increased.

  • PDF

Study on Influence Analysis of Radioactive Terror Scenarios by Weather Conditions (기상조건에 따른 방사능테러 시나리오 영향 분석)

  • Kim, Tae Woo;Jeon, Yeo Ryeong;Chang, Sunyoung;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.6
    • /
    • pp.719-725
    • /
    • 2018
  • After 9/11 attacks in the U.S, Terrorism has increased the number of unspecified casualties through multi-use facility terror attacks compared to the past. The subsequent London bombings and the self-destruction of Pakistan increased people's fear and social anxiety. As international events have been held in Korea recently, awareness and concern over radioactive terrorism and security management of radioactive materials are increasing. In this paper, we compared the results of different meteorological conditions using HotSpot Code. After creating a possible terror scenario in Korea, sources likely to be use in RDD and Dirty bomb were investigated. The meteorological condition was selected by comparing the Pasquill-Gifford stability class with the most stable condition F and the most unstable condition A. The result value of the A and F condition through simulation were shown not to cause citizens to die from acute effects due to radiological effects. The range of radioactivity is different according to the wind speed and the meteorological stability, and the degree of radioactivity dilution is different according to meteorological conditions. Analysis results are expected to be used for initial response in the event of a radioactive terrorist attack.

Proposal on for Response System to primary leaders' Terrorism (국가요인 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.61-86
    • /
    • 2006
  • Various terrorism in modern society against nation's dignitaries are constantly existing. They damage severely to the society and the nation's security, and they cause disorganizations of social and national rule orders. In order to provide the key figures' perfect protection, the threatening terroizing environment for primary leaders and the route of terrorism should be intercepted. Effective methods of these are summarized as follow. First, recent terrorism against the primary leaders are mostly assassinations, bomb attacks, and suicide bomb attacks, which terminate in a moment. Therefore, security service agents should keep in mind that protection is the best, and government's anti-terrorism agencies should develop policies and set the directions within a new paradigm to the advance anti-terrorism. Second, advance prevention activities against nation's VIP terrorism should be strengthened, such as strengthening security informational activities, constructing cooperative systems of domestic and international facilities, considering continuous system to prevent terrorism, and intensifying safety counterplans of human and material weak points. Third, international cooperative system should be set to apply economical and political sanctions to nations which support terror organizations in direct or indirect ways, and this system needs to strengthen the punishment against terrorists. Fourth, security systems to protect nation's primary leaders should complement, and developing programs for coping with the terrorism and establishing laws for anti-terrorism should be made. Also, educational training of agents who perform anti-terrorism duties should be strengthened, and scientific techniques and equipment for security should be made to protect primary leaders from terrorism.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF