• Title/Summary/Keyword: Counter-Terrorism System

Search Result 50, Processing Time 0.023 seconds

A Study on the Development Direction of Crisis Negotiations of the Police - With Focus on the Police Department Education Development Plan - (경찰 위기협상 발전 방향에 관한 연구 - 경찰 기관의 교육 발전 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.161-189
    • /
    • 2015
  • As the terrorist act inflicted on the American Ambassador to Korea, Mark Lippert on March 5, 2015, the hunting rifle case in Sejong-si in which 3 persons were killed on February 25, and the hunting rifle murder case in Hwaseong-si Namyang-dong on February 27 occurred in succession, there is growing concern that our country is no long safe from firearm violence. Internationally, there is growing concern that our country is no longer safe from international terrorist organizations such as Islamic State (IS), the Sunni Muslims fundamentalists' Islamic militia group, which an 18-year old Korean boy Kim voluntarily joined in January 2015. The police crisis negotiation of our country was established and operated to prepare for the 1988 Olympic Games mainly for counter-terrorism purposes, and due to the characteristics of the prohibition of the use of guns, not a counter-terrorism incident has occurred, so the skepticism about its existence and the development directions are actively being discussed. Our country still prefers the traditional use of force such as SWAT team to resolve crisis case, such as such as murder, terrorism, robbery, and is reinforcing tactical capabilities. However, to perform the primary mission of the police to protect the people's lives and properties, it is necessary to establish the system in which crisis negotiations are possible in the initial stages no matter what incidents may occur by expanding the education for crisis negotiations techniques which are emphasized in the advanced countries such as the United States. In this research, the police department's internal education materials and media are analyzed so that the new police officers who work hardest on the forefront can carry out the roles as basic negotiators of crisis negotiations, and the measures for the development directions of the police crisis negotiations are presented.

  • PDF

Safety and Risk Management Measures from the Private Security Industry for the Successful Hosting of an International Event (Safety and Risk Management Counter measures for Pyeongchang Winter Olympics) (국제행사의 성공적 개최를 위한 경호·경비 분야의 안전·위기관리 방안 (평창 동계올림픽 안전·위기관리 대응 방안))

  • Kim, Eun-Jung;Wang, Sug-Won
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.43-70
    • /
    • 2017
  • Terrorist organizations that take advantage of the occasion of international events are changing from targeting specified people to attacking general public, raising the anxiety of the audience and participating countries. Therefore, the host country intends to improve its status as the host by ensuring safety and crisis management at any cost. As a country with a wealth of experience of hosting international events, Korea takes the burden of the security at Pyeongchang Winter Olympics. Consequently, to successfully host this winter Olympics, the organizing committee should bear in mind that Korea is no longer a safe country regarding terrorist attacks and take countermeasures against various crimes and terrorism that may arise during the Winter Olympic Games. This study overviews various measures as follows. First, the change of counter-terrorism strategy is necessary. Second, the safety entity and safety measures for Pyeongchang Olympic Games should be established. Third, private security companies should be actively utilized. Fourth, the safety management training for private security and safety personnel should be strengthened. Lastly, it is necessary to establish a rapid and organic preemptive safety management system to cope with safety and crisis effectively at Pyeongchang Winter Olympics and other international events that will be held in the future.

  • PDF

A strategic analysis of stationary radiation portal monitors and mobile detection systems in border monitoring

  • Coogan, Ryan;Marianno, Craig;Charlton, William
    • Nuclear Engineering and Technology
    • /
    • v.52 no.3
    • /
    • pp.626-632
    • /
    • 2020
  • Radiation Portal Monitors (RPMs) are our primary border defense against nuclear smuggling, but are they still the best way to spend limited funds? The purpose of this research is to strategically compare RPM defense at the border with state-side mobile detectors. Limiting the problem to a comparison of two technologies, a decision-maker can prioritize how to best allocate resources, by reinforcing the border with stationary overt RPMs, or by investing in Mobile Radiation Detection Systems (MRDs) which are harder for an adversary to detect but may have other weaknesses. An abstract, symmetric network was studied to understand the impact of initial conditions on a network. An asymmetric network, loosely modeled on a state transportation system, is then examined for the technology that will maximally suppress the adversary's success rate. We conclude that MRDs, which have the advantage of discrete operation, outperform RPMs deployed to a border. We also conclude that MRDs maintain this strategic advantage if they operate with one-tenth the relative efficiency of their stationary counter-parts or better.

A Study on Reality and Quality Improvement of Aviation Security Equipments Performance Certification System in Korea (항공보안장비 성능 인증제의 현실과 품질개선에 관한 연구)

  • Lee, Wonjoo;You, Sangwoo;Park, Soohong;Kim, Kyunghoon;Seol, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.2
    • /
    • pp.113-125
    • /
    • 2021
  • Purpose: This study focused on reality and quality improvement of aviation security equipment performance certification system. Methods: For this propose, we analyzed aviation security equipment performance certification system related legislations. Using analyzed data, we suggested advancement plan of aviation security equipment performance certification system. Results: In results, South Korea has been implementing aviation security performance certification system since October 2018. Parts for improvement of system are mutual certification with major countries that operate aviation security equipment performance certification systems, the spread of the defense industry's system, development of similar substances for handling explosives, and introduction of preliminary inspections. Conclusion: The research result could be used as a basic data for upgrading Korea's aviation security performance certification system.

A Study on Problems with the ROK's Bioterrorism Response System and Ways to Improve it (생물테러 대응체제의 문제점과 개선방안 연구)

  • Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.113-144
    • /
    • 2010
  • Bioterrorism is becoming more attractive to terrorist groups owing to the dramatic increase in the utility and lethality of biological weapons in line with today's cutting-edge biological science and technology. The Republic of Korea is facing both internal and external terrorist threats, as well as the possible biological warfare by North Korea. Therefore, it is essential to establish an effective bioterrorism response system in the ROK. In order to come up with the adequate response system for the ROK, an in-depth study has been conducted on the current bioterrorism response system of the U.S. whose preparedness is considered relatively adamant. As a result, the following facts have been found: (1)the legislation with regard to bioterrorism has been established or amended according to the current situation in the U.S., (2)the counter terrorism activities have been integrated with the Department of the Homeland Security as the central agency in order to maximize the national CT capacity, (3)Specific procedures and instructions to cope with bioterrorism have been made into manuals so as to enhance the working-level response capabilities. Next, the analysis on the ROK's bioterrorism response system has been performed in various categories, including the legislation system, task role distribution, cooperative relations, and resource application. It turned out that the ROK's legislation basis is relatively weak and it lacks the apparatus to integrate the bioterrorism response activities on the national level. The shortage of the adequate response facilities and resources, as well as the poor management of manpower have also emerged as problems that hinder the effective CT implementations. Through an analytical and comparative study of the U.S. and the ROK systems, this paper presents several ways to ameliorate improve the current system in the ROK as follows: (1)establish the anti-terrorism law, which would be the basic legal basis for the bioterrorism-related matters; and make revisions to the disaster-related legislation, relevant to bioterrorism response activities, (2)establish an integrated body that has a powerful authority to coordinate the relevant CT agencies; and converge the decentralized functions to maximize the overall response capacity, (3)install the laboratories with a high biosafety level and secure enough of the strategic medical stock-pile, (4)enhance the ability of the inexperienced response personnel by providing with a manual that has detailed instructions.

  • PDF

Aviation Security Equipments Certification System in Korea: Suggestions for Improvement (항공보안장비 성능인증제의 고도화 방안에 관한 연구)

  • Lee, Wonjoo;Yu, Sangwoo;Park, Soohong;Kim, Kyunghoon;Ha, Dasom;Seoll, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.3
    • /
    • pp.395-408
    • /
    • 2020
  • Purpose: This study was performed for advancement of aviation security equipments certification system. Methods: We investigated aviation security equipments certification-related registrations and the latest research trends of explosive detection technologies. Based on the literature studies, we draw the critical issues of the aviation security equipment certification system and suggested improvement direction. Results: We found some inaccuracies of the definition of explosive trace detection equipments, accreditation review committee, and performance evaluation test method. These problems should be modified to suit being practical. Conclusion: The present results would be useful for basic data for modifying aviation security equipments certification systems.

Study on Foreign Military Authority Recognition Questionsets (MARQs) (해외 군당국의 감항인정의제 고찰)

  • Roh, Jin Chul;Goo, Bon Wook;Ko, Joon Soo
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.4
    • /
    • pp.105-114
    • /
    • 2016
  • The world is currently confronted with regional conflicts among nations that seek to protect their territory. The associated counter-terrorism activities and international business flows can be increased through airworthiness-recognition tasks that are related to aircraft exports, dispatch troops, and overseas bases. It is important to establish airworthiness-recognition processes between foreign military authorities to minimize the potential for sovereign national positions and responsibilities. For this study, the military airworthiness recognition between recognition partners was surveyed to secure flight safety for the development and operation of aircrafts. The analysis of the U.S. and European Military Authority Recognition Questionsets (MARQs) in this paper introduces the rules, inspection capabilities, production process, and certification of the airworthiness authority. The regulatory activities, which are required by the Korea Military Airworthiness Authority (MAA) with respect to foreign MAAs, can be reduced by the implementation of the MARQ.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

Development Trends of Small Unmanned Ground Vehicles in Technology Leading Countries (기술 선도국의 소형 무인 지상 차량 개발 동향)

  • Ryu, Jun-Yeol;Kim, Soo-Chan;Kim, Tae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.214-220
    • /
    • 2021
  • SUGVs (Small Unmanned Ground Vehicles) are being used to conduct dangerous missions, such as EOD (explosive ordinance disposal), counter-terrorism operations, fire extinguishing and fire-fighting reconnaissance, reconnaissance of disaster areas, and surveillance of contact areas. Technology leading countries, the United States, United Kingdom, France, Germany, and Israel, have developed and operated various SUGVs for use in the military and civilian fields. The developed system was upgraded further based on additional requirements associated with data collected during the actual operation. The development trends of technology leading countries are an important indicator for the future development of SUGVs. In this study, the development trends and missions of SUGVs operating in the technology leading countries were analyzed. Based on the development trends of SUGVs in these countries, this paper discusses the features and design characteristics needed for the development of SUGVs in future military and civilian domains.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF