• Title/Summary/Keyword: IS terrorism

Search Result 334, Processing Time 0.023 seconds

Analysis on the tendency of international terrorism against Koreans occurred in overseas countries (해외에서 발생한 우리국민의 국제테러리즘 피해사례 경향분석)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.69-74
    • /
    • 2015
  • Korea has established diplomatic relations with 190 countries in the world. It opened its diplomatic offices in 113 countries. Korea raised its status in international society through multinational force peace activities, national defense cooperation activity and UN peace maintenance activity for the maintenance of world peace. But there have been vio lent crimes by terrorist organizations and armed groups that try to achieve their political, religious and ideological go als greatly damaging Koreans working in overseas countries. This research studied the tendency of international terr orism against Koreans. The suggestion and conclusion are as follows. First, the study shows that armed groups and extremists have threatened and attacked Koreans in overseas countries. But there aren't enough personnel who can i mmediately and correctly analyze and respond the threats and attacks. So it is urgent to raise experts continually an d develop manuals to respond the attacks. Next, the damaging targets in overseas countries have been changed from hard targets to soft targets. There could be a limit in the restriction of basic rights of people by governmental agenc ies. So it is necessary for people to show mature civic awareness not going to a tourism-prohibited area.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

Advanced ICT abused by Terror in the 4th Industrial Revolution Era (제4차 산업혁명시대의 테러에 악용되는 첨단 정보통신기술)

  • Sim, Se-Hyeon;Eom, Jung-ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.15-23
    • /
    • 2021
  • The 4th industrial revolution technology has brought many changes not only in human life but also in the industrial field. ICT such as 5G and artificial intelligence and convergence/complex systems such as drones and robots are convenient for humans, and automation of all processes in the industrial field. However, these advanced information and communication technologies also have adverse functions. As advanced ICT was incorporated into military and terrorist weapon systems, more powerful and highly destructive weapon systems began to be developed. In particular, by applying advanced ICT to the production and use of terrorist tools, the terrorist method became more sophisticated and caused more damage. In this paper, we derive advanced ICT that can be abused according to the terror patterns in the 4th industrial revolution era, and present a method that is applied from preparation to execution of terrorism. The abuse of advanced ICT makes terrorism more stealthy and subtle, and increases its destructive power.

Conceptional Framework of Level of Protection for Facilities (시설물 방호등급 개념 설계)

  • Kee, Jung Hun;Lee, Hyun Seok;Jamot, Dongfack Guepi Clovis;Park, Jong Yil
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.3
    • /
    • pp.67-72
    • /
    • 2015
  • Although attention to terrorism has increased sharply in recent years within many countries, it is by no means a new phenomenon. Majority of these countries have limited regulations or guidelines about terrorism. LOP (Level Of Protection) can be consider as a first step. This paper seeks to present a process to determine LOP and allowable damage. LOP is determined by asset value reason why it should be based on cost. The asset value is defined as "cost induced when asset is damaged". For example, the collateral damage outside the facility should be taken in consideration in the asset value. Allowable structural damage is assigned depending on LOP.

Comparative Study on Major Nations's Related Legislation for Counter-terrorism (테러대응 관련 법제의 국가별 비교 연구)

  • Kwon, Jeong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.343-352
    • /
    • 2010
  • As a result of comparing and analyzing the related legislation of each nation, more superior legislative systems should be made to cope with a number of terrors effectively. And also it is required to devise some concrete regulations such as the following in superior legislative systems. First, because it is hard to collect information on terrorism and watch over suspects according to Communication Privacy Protection Law. More in-depth discussion into the issue of surveillance is needed for the protection of lives and property, although public concerns of privacy are a valid point of contention. Second, it is necessary to take complementary measures on immigration as surveillance, since the current Immigration Control Law has restrictions in many ways to hinder efforts to root out terrorists. Third, under the current law on financial activities, it is impossible to block influx of terror financing. Therefore it is necessary to come up with ways of making the punishment procedures. Fourth, considering that convicted terrorists get punished under the standard procedures and precedents, it is required to clearly differentiate between what the terror acts are and what terrorist groups are. Fifth, it is necessary to make use of the private security system to enhance the security system of national facilities.

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

A Method to Develop Security System through the Analysis on Dangerous Case (위해사례분석을 통한 경호제도의 발전방안)

  • Yu, Hyung-Chang;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.161-187
    • /
    • 2008
  • The purpose of this study is to suggest a development method of current Korean security system by analyzing the problems shown in the performance of security work in relation to the terrorism, which is enlarging in the word, from various aspects. In order to perform the study, the researcher considered the basic theory concerned to current Korean law concerned to security, principle and methodology of security, terror and new terrorism. The researcher performed the study by selecting qualitative case study focused on Park Geun-Hye case. Through the study, the methods to develop Korean security system are as follows. First, from the legal aspect, it is necessary to establish the law concerned to terrorism prevention and important person security. Moreover, it is necessary to search for the development of private security by revising Security Industry Act, which is a legal ground of private security. Second, it is necessary to improve and reinforce education & training program, which is not still divided in detail from the aspect of private security cultivation. Moreover, it is necessary to activate personal protection work and enlarge market through Security Industry Act and make an effort to change social recognition over security, which is devaluated in the society. From the viewpoint, national license about private security shall be adopted. The department of president security, which is a representative of official security, shall transfer the advanced technology to private security organization. Third, from the aspect of operation, the operation of security based on SCE principle, human shield principle, the nearest person's protection principle, body extension principle, linear protection principle and evacuation priority principle is required. Therefore, the priority shall be given to preventive security and thorough security plan shall be made for the operation.

  • PDF

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF