• Title/Summary/Keyword: THREAT

Search Result 2,855, Processing Time 0.026 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

"Liability of Air Carriers for Injuries Resulting from International Aviation Terrorism" (국제항공(國際航空)테러리즘으로 인한 여객손해(旅客損害)에 대한 운송인(運送人)의 책임(責任))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.47-85
    • /
    • 1989
  • The Fundamental purpose of the Warsaw Convention was to establish uniform rules applicable to international air transportation. The emphasis on the benefits of uniformity was considered important in the beginning and continues to be important to the present. If the desire for uniformity is indeed the mortar which holds the Warsaw system together then it should be possible to agree on a worldwide liability limit. This liability limit would not be so unreasonable, that it would be impossible for nations to adhere to it. It would preclude any national supplemental compensation plan or Montreal Agreement type of requirement in any jurisdiction. The differentiation of liability limits by national requirement seems to be what is occurring. There is a plethora of mandated limits and Montreal Agreement type 'voluntary' limits. It is becoming difficult to find more than a few major States where an unmodified Warsaw Convention or Hague Protocol limitation is still in effect. If this is the real world in the 1980's, then let the treaty so reflect it. Upon reviewing the Warsaw Convention, its history and the several attempts to amend it, strengths become apparent. Hijackings of international flights have given rise to a number of lawsuits by passengers to recover damages for injuries suffered. This comment is concerned with the liability of an airline for injuries to its passengers resulting from aviation terrorism. In addition, analysis is focused on current airline security measures, particularly the pre-boarding screening system, and the duty of air carriers to prevent weapons from penetrating that system. An airline has a duty to exercise a high degree of care to protect its passengers from the threat of aviation terrorism. This duty would seemingly require the airline to exercise a high degree of care to prevent any passenger from smuggling a weapon or explosive device aboard its aircraft. In the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescene to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. A finding of willful misconduct on the part of an air carrier, which is a prerequisite to imposing unlimited liability, remains a question to be determined by a jury using the definition or standard of willful misconduct prevailing in the jurisdiction of the forum court. Through the willful misconduct provision of the Warsaw Convention, air carrier face the possibility of unlimited liability for failure to implement proper preventive precautions against terrorist. Courts, therefore, should broadly construe the willful misconduct provision of the Warsaw Convention in order to find unlimited liability for passenger injuries whenever air carrier security precautions are lacking. In this way, the courts can help ensure air carrier safety and prevention against terrorist attack. Air carriers, therefore, would have an incentive to increase, impose and maintain security precautions designed to thwart such potential terrorist attacks as in the case of Korean Air Lines Flight No.858 incident having a tremendous impact on the civil aviation community. The crash of a commercial airliner, with the attending tragic loss of life and massive destruction of property, always gives rise to shock and indignation. The general opinion is that the legal system could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. I would like to remind all passengers that every discovery of the human spirit may be used for opposite ends; thus, aircraft can be used for air travel but also as targets of terrorism. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the soverign rights of the states, and the human rights of the individuals. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co-ordinated measures. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism.

  • PDF

Effect of the Early Traumatic Experience on the Mental Health of the Elderly (조기경험이 노인 정신건강에 미치는 영향)

  • Lee, Kwang-Hun;Lee, Jung-Hoon;Lee, Jong-Bum;Park, Byung-Tak;Cheung, Seung-Douk
    • Journal of Yeungnam Medical Science
    • /
    • v.7 no.2
    • /
    • pp.67-77
    • /
    • 1990
  • This study was intended to analyse the relation between the psychic traumatic experience and the psychological health of the aged. The authors carried out this study by means of the combined anxiety-depression scale(CADS) and the preadolescence traumatic experience scale(PTES) with 278 aged men and women residing in Taegu from September to October 1988. The results were as follows : 1. Based on the scores avaluated by CADS, the scores of the both groups showed that comparative group was accounted for $40.15{\pm}6.19$, while the experimental group for $57.75{\pm}6.37$, which showed significantly higher score in the experimental group(p<0.001). 2. The experimental group showed significantly higher early experience score than the comparative group in the dietary difficulty, alcoholism among family members, disunion between husband and wife, trouble between mother and children, early mother loss, parent's indifference and unwanted birth(p<0.001). 3. The experimental group showed higher early experience score than the comparative group by sex, age, marital status and grown location(p<0.001). 4. When the subjects were included in the unemployed and in the middle or low classes and their parents were engaged in agriculture and commercial business and believing in buddhism or non-religion, showed higher experience score (p<0.001).

  • PDF

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.

Critiques of 'The Endangered and Protected Wild Species List in Korea' Proposed by Korea Ministry of Environment and Listing Process - Is This the Best Process for the Current National Management of Endangered Wildlife and Plants in Korea? - (2011년 환경부 멸종위기종 등록절차 및 대상 멸종위기종 식물 목록 재고-과연 현재 국가 멸종위기종 관리가 최선의 방안인가? -)

  • Kim, Hui;Lee, Byong Cheon;Kim, Yong Shik;Chang, Chin-Sung
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.1
    • /
    • pp.7-19
    • /
    • 2012
  • After having announced legislation for threatened or endangered species on the List of Endangered and Threatened Wildlife and Plants in 2005, the Korea Ministry of Environment proposed (in June 2011) amending the list, thereby delisting or reclassifying endangered species using new quantitative criteria for two levels (I and II), as well as status reviews. The new legislation included 40 species remained in their original endangered status, but 19 species were delisted, 5 species were proposed as candidates for delisting, 29 species were given a new endangered listing, and 3 species were proposed for an endangered listing in Korea. We assessed the threatened status of 98 plants using the IUCN Red List Criteria (version 3.1) at the global level, and compared the Ministry's revised criteria with the IUCN Red List Criteria and ESA criteria used in the USA. Most species proposed by the Ministry do not qualify as threatened and one of the major difficulties found in applying IUCN Red List Criteria at the global scale was a lack of knowledge on the status of species at broader geographic scales and the perceived difficulty this causes. Under the current classification process, many endangered species, such as Abeliophyllum distichum, Leontice microrhyncha, Echinosophora koreensis, Leontopodium coreanum, Iris odaesanensis, and Corylopsis coreana at global level were excluded here. Knowledge gaps and uncertainties mean that the number of taxa at high risk of extinction may be substantially greater than is currently understood. Due to a lack of information on its taxonomic status, currently there is controversy over the Red List status of Physocarpus insularis. Also, Caragana koreana, which was an invalidly published name, should be excluded here. Although the Korea Ministry of Environment insisted this procedure was conducted by applying the modified IUCN threat categories and definitions, this evaluation has been carried out based only on subjective views and misapplication of the IUCN Red List Criteria. The current listings by the Korea Ministry of Environment should be challenged. We suggest that broad species concepts on endemic species are applied and also criteria that adequately address the proper quantitative knowledge should be used. It is suggested that the highest priorities for the Red List should be given to endemic species at least in the Korean peninsula first at global scale.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

EU's Space Code of Conduct: Right Step Forward (EU의 우주행동강령의 의미와 평가)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.211-241
    • /
    • 2012
  • The Draft International Code of Conduct for Outer Space Activities officially proposed by the European Union on the occasion of the 55th Session of the United Nations Peaceful Uses of the Outer Space last June 2012 in Vienna, Austria is to fill the lacunae of the relevant norms to be applied to the human activities in the outer space and thus has the merit our attention. The missing elements of the norms span from the prohibition of an arms race, safety and security of the space objects including the measures to reduce the space debris to the exchange of information of space activities among space-faring nations. The EU's initiatives, when implemented, cover or will eventually prepare for the forum to deal with such issues of interests of the international community. The EU's initiatives begun at the end of 2008 included the unofficial contacts with major space powers including in particular the USA of which position is believed to have been reflected in the Draft with the aim to have it adopted in 2013. Although the Code is made up of soft law rather than hard law for the subscribing countries, the USA seems to be afraid of the eventuality whereby its strategic advantages in the outer space will be affected by the prohibiting norms, possibly to be pursued by the Code from its current non-binding character, of placing weapons in the outer space. It is with this trepidation that the USA has been opposing to the adoption of the United Nations Assembly Resolutions on the prevention of an arms race in the outer space (PAROS) and in the same context to the setting-up of a working group on the arms race in the outer space in the frame of the Conference on Disarmament. China and Russia who together put forward a draft Treaty on Prevention of the Placement of Weapons in Outer Space and of the Threat or Use of Force against Outer Space Objects (PPWT) in 2008 would not feel comfortable either because the EU initiatives will steal the lime light. Consequently their reactions are understandably passive towards the Draft Code while the reaction of the USA to the PPWT was a clear cut "No". With the above background, the future of the EU Code is uncertain. Nevertheless, the purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security, all to maximize the principle of the peaceful use and exploration of the outer space is the laudable efforts on the part of EU. When the detailed negotiations will be held, some problems including the cost to be incurred by setting up an office for the clerical works could be discussed for both efficient and economic mechanism. For example, the new clerical works envisaged in the Draft Code could be discharged by the current UN OOSA (Office for Outer Space Affairs) with minimal additional resources. The EU's initiatives are another meaningful contribution following one due to it in adopting the Kyoto Protocol of 1997 to the UNFCCC (UN Framework Convention on the Climate Change) and deserve the praise from the thoughtful international community.

  • PDF

Mobility of Carbon Nanomaterials in Soil Media (토양 매질체에서 탄소나노물질의 이동성)

  • Yi, In-Geol;Kang, Jin-Kyu;Kim, Song-Bae;Kim, Hyunjung;Han, Yosep;Eom, Ig-Chun;Jo, Eunhye;Park, Sun-Young
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.36 no.8
    • /
    • pp.588-595
    • /
    • 2014
  • Carbon nanomaterials such as fullerene, carbon nanotube and graphene are representative nanomaterials and widely used in various fields. Carbon nanomaterials can be exposed to environments during their production, usage and disposal, spreading to different systems and posing a great threat to various ecological receptors. Researches are conducted in order to determine the possibility of groundwater exposure to carbon nanomaterials due to their release and passage through soils. If soils can play a significant role in limiting the transport of carbon nanomaterials, the possibility of groundwater exposure to carbon nanomaterials can be reduced greatly. This review paper presented the research works performed for the mobility of carbon nanomaterials in soil media. Also, the paper provided the factors affecting the transport of carbon nanomaterials in soil media along with the DLVO theory/colloid filtration theory/transport model, which are used to describe the transport of carbon nanomaterials in soil media. Recently, production of carbon nanomaterials and their commercial and environmental applications increase rapidly in Korea. Therefore, researches regarding the fate and transport of domestic carbon nanomaterials in soil environments should be performed in various environmental conditions.

Dilemma and Its Institutional Solutions in the Port ODA of Korea (항만분야 공적개발원조(ODA)의 딜레마 해소를 위한 제도 개선방안)

  • Kim, Bo Young;Kang, Yunho
    • Journal of Navigation and Port Research
    • /
    • v.38 no.4
    • /
    • pp.409-419
    • /
    • 2014
  • In accordance with the global age, countries in the world try to dedicate to collaboration among them through ODA (Official Development Assistance), in order to solve the-rich-get-richer and the poor-get-poorer problems among countries, to develop the developing countries' economies, and to improve their level of social welfare. Also, Korea is so active in ODA as a member of OECD, even if it is in the initial process. Nowadays, in Korea, the importance of ODA in the field of port has been brought into relief. Accordingly, the paper intends to analyze the dilemma structure of port ODA from the perspectives both of new institutionalism and Samaritan's dilemma game, and it tries to seek the improvements of ODA institutions to create effective outcomes based on the analysis. Through the analysis, dilemma structure was identified regarding the institutions of port ODA. And the results of the analysis suggested the improvements of port ODA institutions including strengthening of on-the-spot aid system, establishment of payoffs system for inducing recipient countries' efforts, and institutionalization of reliable threat. It would contribute to develop the theoretical model of ODA analysis and create effective outcomes of ODA in the field of ports.