• Title/Summary/Keyword: Conventional Terrorism

Search Result 9, Processing Time 0.028 seconds

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

A Study on the Analysis of the Potential FT(Financing of Terrorism) Threat Using Virtual Currencies and Its Response (가상통화를 활용한 테러자금조달 위협 분석과 국내 대응방안에 관한 연구)

  • Kang, Taeho;Cha, Jang-Hyeon;Kim, Gunin
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.9-33
    • /
    • 2020
  • This study presents aspects of the financing of terrorism using virtual-currencies. Fisrt of all, this introduces the conventional threat of the financing of terrorism and the analysis of current legal system regarding virtual-currency in South Korea. Next, the financing of terrorism cases are analyzed. With given analysis, the paper deals with its response and future extensions by technical and institutional aspects. The threats of the financing of terrorism are going higher after the appearance of virtual-currencies such as Bitcoin. There are two typical ways to use virtual-currencies by terrorist groups. One is to conduct public fund-raising in the social network system and the dark web. The other is to hack into virtual-currency exchange network in order to steal virtual currencies for developing the weapon of mass destruction. Specifically South Korea is top three country of trading virtual currencies and has been subject to virtual-currency hacking more than 10 cases. However, many countries including South Korea deal with virtual currencies as only innovative technology and means of investment, not the threats of the financing of terrorism. Under these circumstances, there a the legal contradiction. This article points this limit and absurdity. Also, it shows reasonable alternatives. All in all, given these aspects, the article proposes detailed policy directions.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Risk analysis of offshore terminals in the Caspian Sea

  • Mokhtari, Kambiz;Amanee, Jamshid
    • Ocean Systems Engineering
    • /
    • v.9 no.3
    • /
    • pp.261-285
    • /
    • 2019
  • Nowadays in offshore industry there are emerging hazards with vague property such as act of terrorism, act of war, unforeseen natural disasters such as tsunami, etc. Therefore industry professionals such as offshore energy insurers, safety engineers and risk managers in order to determine the failure rates and frequencies for the potential hazards where there is no data available, they need to use an appropriate method to overcome this difficulty. Furthermore in conventional risk based analysis models such as when using a fault tree analysis, hazards with vague properties are normally waived and ignored. In other word in previous situations only a traditional probability based fault tree analysis could be implemented. To overcome this shortcoming fuzzy set theory is applied to fault tree analysis to combine the known and unknown data in which the pre-combined result will be determined under a fuzzy environment. This has been fulfilled by integration of a generic bow-tie based risk analysis model into the risk assessment phase of the Risk Management (RM) cycles as a backbone of the phase. For this reason Fault Tree Analysis (FTA) and Event Tree Analysis (ETA) are used to analyse one of the significant risk factors associated in offshore terminals. This process will eventually help the insurers and risk managers in marine and offshore industries to investigate the potential hazards more in detail if there is vagueness. For this purpose a case study of offshore terminal while coinciding with the nature of the Caspian Sea was decided to be examined.

Modeling Technology on Free-form Surface of a New Military Personal Head using Quick Surface Method (퀵서피스기법을 이용한 신장병 두상의 자유곡면 모델링 기술)

  • Lee, Yong-Moon;Hwang, Tae-Son;Kim, Hun;Nam, Hee-Tae;Lee, Kee-Hwan;Kang, Myungchang
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.17 no.6
    • /
    • pp.170-176
    • /
    • 2018
  • Recently, weapon system requires personal protection products due to the explosion of rapid-fire explosion, which is considered to be multi threat in modernization, complication and war against terrorism. However, the conventional Korean military bullet protection helmets are not suitable for wearing convenience and combatant interoperability in terms of ergonomic. In this paper, we propose a suitable 3D Scanning method for the head, and compare the measured 3D dimension with the existing 2D measurement value to identity the reliability. Reverse engineered soldier head using the quick surface method was realized with a perfect free-form surface and satisfactory tolerance range (${\pm}0.2mm$). Through the comparison of 3D and 2D measured head dimensions, the absolute error value was 0.73 mm on average and relative error was 0.35 %, confirming the high accuracy of the 3D scan modeling. Also, quick surface method using 3D scanner is suggested a fast and accurate skill for ergonomics in obtaining the head modeling needed for military's personal bullet protection helmet design.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF