• Title/Summary/Keyword: Counter Terrorism

Search Result 87, Processing Time 0.023 seconds

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

A Study on Reality and Quality Improvement of Aviation Security Equipments Performance Certification System in Korea (항공보안장비 성능 인증제의 현실과 품질개선에 관한 연구)

  • Lee, Wonjoo;You, Sangwoo;Park, Soohong;Kim, Kyunghoon;Seol, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.2
    • /
    • pp.113-125
    • /
    • 2021
  • Purpose: This study focused on reality and quality improvement of aviation security equipment performance certification system. Methods: For this propose, we analyzed aviation security equipment performance certification system related legislations. Using analyzed data, we suggested advancement plan of aviation security equipment performance certification system. Results: In results, South Korea has been implementing aviation security performance certification system since October 2018. Parts for improvement of system are mutual certification with major countries that operate aviation security equipment performance certification systems, the spread of the defense industry's system, development of similar substances for handling explosives, and introduction of preliminary inspections. Conclusion: The research result could be used as a basic data for upgrading Korea's aviation security performance certification system.

Development Trends of Small Unmanned Ground Vehicles in Technology Leading Countries (기술 선도국의 소형 무인 지상 차량 개발 동향)

  • Ryu, Jun-Yeol;Kim, Soo-Chan;Kim, Tae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.214-220
    • /
    • 2021
  • SUGVs (Small Unmanned Ground Vehicles) are being used to conduct dangerous missions, such as EOD (explosive ordinance disposal), counter-terrorism operations, fire extinguishing and fire-fighting reconnaissance, reconnaissance of disaster areas, and surveillance of contact areas. Technology leading countries, the United States, United Kingdom, France, Germany, and Israel, have developed and operated various SUGVs for use in the military and civilian fields. The developed system was upgraded further based on additional requirements associated with data collected during the actual operation. The development trends of technology leading countries are an important indicator for the future development of SUGVs. In this study, the development trends and missions of SUGVs operating in the technology leading countries were analyzed. Based on the development trends of SUGVs in these countries, this paper discusses the features and design characteristics needed for the development of SUGVs in future military and civilian domains.

A Study of Targeted Killing, Unmanned Aerial Vehicles (무인항공기 표적살인(Targeted Killing)에 관한 고찰: 논쟁과 실행 정당성을 중심으로)

  • So, Jae-Seon;Lee, Chang-Kyu
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.53-81
    • /
    • 2017
  • Targeted killing is a modern euphemism for the assassination of an individual by a state organization or institution outside a judicial procedure or a battlefield. Targeted killing using armed drones has raised profound anxieties in legal, policy, and advocacy communities in the United States and abroad, including among UN officials. The bottom line for targeted killing supporters is that targeted killing works as part of a larger counter-terrorism strategy. Targeted killing does what it is supposed to and removes the leader of a group. And despite growing legal, moral, and ethical issues concerning targeted killing, scholars agree that drone strikes and targeted killing operations will stay. The ACLU has sued top CIA and Pentagon decision-makers to seek accountability for the unlawful killings of three U.S. citizens in Yemen last year. Also, strikes by drones are associated with serious problems such as collateral damage to ordinary citizens and friendly fire. Targeted killings by drones also involves several issues to be resolved, including suspicions that they may run counter to domestic law prohibiting assassination, the opacity concerning their definitions and military actions, and the impact of whiplash transition. Finally, targeted killing program and the need for transparency. The assembly referring to resolution invites the committee of ministers to undertake a thorough study of the lawfulness of the use of combat drones for targeted killings and if need be develop guidelines for member states on targeted killings with a special reference to those carried out by combat drones. These guidelines should reflect the states duties under international humanitarian and human rights law in particular the standards laid down in the EC on human rights as interpreted by the european court of human rights.

  • PDF

A Study on Problems with the ROK's Bioterrorism Response System and Ways to Improve it (생물테러 대응체제의 문제점과 개선방안 연구)

  • Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.113-144
    • /
    • 2010
  • Bioterrorism is becoming more attractive to terrorist groups owing to the dramatic increase in the utility and lethality of biological weapons in line with today's cutting-edge biological science and technology. The Republic of Korea is facing both internal and external terrorist threats, as well as the possible biological warfare by North Korea. Therefore, it is essential to establish an effective bioterrorism response system in the ROK. In order to come up with the adequate response system for the ROK, an in-depth study has been conducted on the current bioterrorism response system of the U.S. whose preparedness is considered relatively adamant. As a result, the following facts have been found: (1)the legislation with regard to bioterrorism has been established or amended according to the current situation in the U.S., (2)the counter terrorism activities have been integrated with the Department of the Homeland Security as the central agency in order to maximize the national CT capacity, (3)Specific procedures and instructions to cope with bioterrorism have been made into manuals so as to enhance the working-level response capabilities. Next, the analysis on the ROK's bioterrorism response system has been performed in various categories, including the legislation system, task role distribution, cooperative relations, and resource application. It turned out that the ROK's legislation basis is relatively weak and it lacks the apparatus to integrate the bioterrorism response activities on the national level. The shortage of the adequate response facilities and resources, as well as the poor management of manpower have also emerged as problems that hinder the effective CT implementations. Through an analytical and comparative study of the U.S. and the ROK systems, this paper presents several ways to ameliorate improve the current system in the ROK as follows: (1)establish the anti-terrorism law, which would be the basic legal basis for the bioterrorism-related matters; and make revisions to the disaster-related legislation, relevant to bioterrorism response activities, (2)establish an integrated body that has a powerful authority to coordinate the relevant CT agencies; and converge the decentralized functions to maximize the overall response capacity, (3)install the laboratories with a high biosafety level and secure enough of the strategic medical stock-pile, (4)enhance the ability of the inexperienced response personnel by providing with a manual that has detailed instructions.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF