• Title/Summary/Keyword: national homeland security

Search Result 24, Processing Time 0.025 seconds

Analysis of US policy for Homeland Security (국토안보를 위한 미국의 대응 정책 분석 : 국토안보법을 중심으로)

  • 김현수;박상서
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.39-50
    • /
    • 2003
  • Since the September 11, 2001, the United States has shift their national security policy for homeland from preventing or/and reducing foreign threats to ensuring domestic security. We learned from recent incident, 1.25 Internet Disaster, that it is urgent to establish cyber security policy for our nation. In this paper; therefore, I analyze the US homeland security policy, the Homeland Security Act of 2002 establishment, and cyber security-related part in this act.

  • PDF

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

A scheme on strengthening of R.O.K reserved force (예비전력 정예화 방안)

  • Kim, Jae-Sam
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.1-45
    • /
    • 2007
  • Reserved forces of ROKA are in charge of replacement of TOE in the wartime and mission of rear area operation. But there is institutional inertia in the law and organization oriented to fill human resources rather than take mission. We need to prepare for the investment and arrangement of reserved forces as military power that would be replaced standing forces. In this portion, to reinforce reserve forces elite, First, efficient mobilization regulations and systems are suggested. I covered a maintenance of relevant mobilization ordinances which need to legislated and approved by national assembly for wartime and development of mobilization system which might lose the appropriate time for mobilization due to complicated declaration procedures and measures to overcome the panic at the initial stage of the war and organization and employment of nationwide transportation system and mobilization center. To ensure efficient resource management and mobilization of reserve forces with a number of approximately 3 million, there's a necessity of organization for integration and conciliation. To make it real, I suggested establishing and employing the mobilization center, on first phase, employ the mobilization center focusing on homeland divisions, on second phase, it is advisable to convert to national level mobilization system and develop to central mobilization center focusing on national emergency planning committee. During peacetime, in conjunction with Mobilization Cell, mobilization center can conduct resource survey and integrate and manage mobilization resources and take charge of mobilization training of subordinate units, and during wartime, in conjunction with mobilization coordination team and Cell, can ensure the execution of mobilization. Second, Future oriented reserve forces management system such as service system of reserve forces and support system of homeland defense operations. Current service and trainings of reserve forces by the year have very low connection, as it is very complex to manage the resources and trainings, and service and training lack the equity, re-establishment of service system is required. Also in an aspect of CSS and cultivation support for reserve forces, as the scope and limitation of responsibility between the armed forces and autonomous organization is obscure, conditions to conduct actual-fighting exercises are limited. Concentrated budgetting is extremely difficult because reserve forces training fields are scattered nationwide, and facilities and equipments are rapidly getting older. To improve all these, I suggest the organization of homeland defense battalion with a unit of "City-Gun-District" and supporting the local reserve forces. Conduct unit replacement or personal replacement for those who have finished their 1 or 2 years and homeland defense operation duty for those with 3-5 years for consistency and simplification. Third, I suggest Future oriented Reserved Training(FRT) and Training Center oriented training management to establish a reliable reserve training. Reserves carry out expansion of unit, conventional combat mission, homeland defense and logistics support during wartime, and actual-fighting exercise, and disaster relief, peace keeping activities. Despite diverse activities and roles, their training condition still stays definitely poor. For these reasons, Modernization of weapons and facilities through gradual replacement and procurement is essential to enhance mobilization support system.

  • PDF

A Study on Improving Management of Substances Requiring Preparation for Accidents Facilities (사고대비물질 취급시설 관리방안 연구)

  • Kim, S.B.;Park, C.H.;Cho, M.S.;Lee, J.S.;Kim, J.M.;Noh, H.R.;Seok, G.S.
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.3
    • /
    • pp.77-82
    • /
    • 2012
  • The leakage of toxic chemicals impact seriously on human being and environment, therefore during their treatment process, a proper management system is necessary to control their toxic effect. This study was designed to suggest the management regulation that supports business managers and facilities management. There are no extra regulation to control emergency accidents and terrors in chemical facilities. Developed countries like USA operate the management standards to control the toxic chemical and facilities according to their toxicity and processes. In order to solve this problem, we have analysed the advanced nations standard methods of security in chemical plants to study the new security management regulation which helps to prevent the chemical accidents. Especially, in USA, CCPS (Center for Chemical Process Safety), SVA (Security Vulnerability Assessment) and RBPSs (Risk-Based Performance Standards) of DHS (Department of Homeland Security) were invest I gated. On the basis of the results, we have suggested the application methods of the security and safety regulation in Korea.

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.

A Method for Safety of RFID Systems

  • Karygiannis, Tom;Eydt, Bernard;Barber, Greg;Bunn, Lynn;Phillips, Ted
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.63-70
    • /
    • 2008
  • The authors, Tom Karygiannis of NIST, and Bernard Eydt, Greg Barber, Lynn Bunn, and Ted Phillips of Booz Allen Hamilton, wish to thank Steven Fick, Rick Korchak, Kate Remley, Jeff Guerrieri, Dylan Williams, Karen Scarfone, and Tim Grance of NIST, and Kenneth Waldrop and Beth Mallory of Booz Allen Hamilton. These individuals reviewed drafts of this document and contributed to its technical content. The authors would also like to express their thanks to several experts for their critical review and feedback on drafts of the publication. These experts include V.C. Kumar of Texas Instruments; Simson Garfinkel of the Naval Postgraduate School; Peter Sand of the Department of Homeland Security; Erika McCallister of MITRE; and several professionals supporting Automatic Identification Technology(AIT) program offices within the Department of Defense(DoD), especially Nicholas Tsougas, Fred Naigle, Vince Pontani, Jere Engelman, and Kathleen Smith. During the public comment period we received helpful comments from the following Federal Government agencies: the US Departments of Defense, Health and Human Services, Homeland Security, Labor, and State; the Office of the Director of National Intelligence; the Office of Management and Budget; and the General Services Administration. We also received several helpful contributions from commercial industry, including comments from EPCglobal, VeriSign, and Priway. Finally, the authors wish to thank the following individuals for their comments and assistance: Brian Tiplady, Daniel Bailey, Paul Dodd, Craig K. Harmon, William MacGregor, Ted Winograd, Russell Lange, Perry F. Wilson, John Pescatore, Ronald Dugger, Stephan Engberg, Morten Borup Harning, Matt Sexton, Brian Cute, Asterios Tsibertzopoulos, Mike Francis, Joshua Slob in, Jack Harris, and Judith Myerson.

  • PDF

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

A Study on the Need of Unified Cyber Crisis Management System:Around Comparison about Policies and Systems of USA and Korea (통합적 사이버 위기관리 체계의 필요성에 관한 연구 : 미국과 한국의 제도 및 정책 비교를 중심으로)

  • Kim, Min-Sik;Park, Sang-Don;Kwon, Hun-Yeong;Kim, Il-Hwan;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • According to Homeland Security Act of 2002, DHS in USA is comprehensively responsible for execution of protection methods on the public and private sectors against cyber attack for USA cyber crisis management. There are different laws and organizations according to the sector that is the public, the private, CII(Critical Information Infrastructure, or Non-CII in Korea. In this paper, we show the unified cyber crisis management of USA makes korea realize the importance to integration and systematization for the national cyber crisis management system.

  • PDF

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Off-axis self-reference digital holography in the visible and far-infrared region

  • Bianco, Vittorio;Paturzo, Melania;Finizio, Andrea;Ferraro, Pietro
    • ETRI Journal
    • /
    • v.41 no.1
    • /
    • pp.84-92
    • /
    • 2019
  • Recent advances in digital holography in the far-infrared region of the spectrum have demonstrated the potential use of digital holography in homeland security as a tool to observe hostile environments in which smoke, flames, and dust impair vision. However, to make this application practical, it is necessary to simplify the optical setup. Here, we show an off-axis, self-reference scheme that spills the reference beam out from the object beam itself and avoids the need for a complex interferometric arrangement. We demonstrate that this scheme allows the reconstruction of high-quality holograms of objects captured under visible as well as far-infrared light exposure. This could pave the way to the industrialization of holographic systems to enable users to see through fire. Moreover, the quantitative nature of the holographic signal is preserved. Thus, the reported results demonstrate the possibility to use this setup for optical metrology.