• Title/Summary/Keyword: terrorism response

Search Result 70, Processing Time 0.024 seconds

A Study on the improvement for response manual of chemical terror incident using the service design analysis (서비스디자인 접근법을 활용한 화학테러현장 대응매뉴얼의 개선방안 연구)

  • Ham, Seung Hee;Park, Namkwun;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.325-333
    • /
    • 2018
  • Purpose: There have been terrorist attacks all over the world, causing massive damage. In Korea, there are few cases of terrorist damage, but the lack of the on-site response experience lead to constraints on the opportunity to verify capabilities against terrorism. Therefore, in this study, the chemical terrorism on-site countermeasures is considered as a concept of service, it was possible to draw up improvement alternatives for each element by reviewing at once the interactions between the concerned organizations and citizens in the field and the utilization of the equipment and facilities in the invisible area. Results: It had been evaluated the service process of the counterpart manager from the viewpoint of the victim citizen, who is the beneficiary of the final security service. It has found out the waiting point(W.P) between the victim's civilian incident management, and the element of failure(F.P). Conclusion: In this way, comparing chemical terror incident response manuals belonged to each related organization by fusion of service design approach and scenario technique, It is expected that it will be able to find out more specific problems and to find improvement alternatives.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

A Study on Improvement Plan for Selecting Boundary Areas to Respond to Chemical Accidents and Terrorism (화학물질 사고·테러 대응을 위한 경계구역 선정 개선방안 연구)

  • Jeon, Byeong-Han;Kim, Hyun-Sub;Lee, Hyun-Seung;Park, Choon-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.60-66
    • /
    • 2020
  • This paper presents a method for improving the selection of boundary areas suitable for Korea's situation based on domestic and foreign case studies on the establishment of boundary areas to protect people and the environment from chemical substances in response to chemical accidents and chemical terrorism. Currently, various related ministries are divided into hot zones, warm zones, and cold zones in common, but in specific areas, they are used in different ways in terms of terminology utilization. Therefore, it was suggested that the boundary areas be divided into four zones: hot zone, warm zone, cold zone, and safety zone. In addition, the terms warm zone and safety zone should be re-established. The existing ERPG acute exposure standard does not take into account various exposure times. Therefore, it is unsuitable for long-term exposure, so the priority of application should be AEGL, ERPG, PAC, and IDLHs. The CARIS information provision method is classified into substances that can or cannot be diffused or classified as indoor leaks. In addition, the wind direction trust line and the ERG's initial separation distance and protective action distance are expressed together so that they can be used for accident responses.

A Study on the Design of CBRN Response Training Program in Korea Using Activity-Action Diagram Method (Activity-Action Diagram 기법을 활용한 한국형 화생방 교육훈련 프로그램 설계에 관한 연구)

  • Ham, Eun-Gu;Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.159-169
    • /
    • 2014
  • The development of science and technology to accompany the convenience of civilization but in addition to nuclear, gas, explosion, accident and spill all over the world with the possibility of a chemical or biological terrorism response efforts collectively as a response to the urgent task of a nation. In this study major economies such as the U.S. and Canada analyzed to investigate the CBRN training programs to fit the reality in Korea CBRN training programs were developed. also the development of training programs to CBRN Korean Activity-Action Diagram technique utilized by CBRN scenarios corresponding to each event needs to be taken when the Activity is defined by its detailed definition of corrective actions for the CBRN Activity to define context-sensitive actions in particular to enable the functionality of the structure in case of CBRN emergency initial response was to establish education and training programs.

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

An Analysis of the Defense Acquisition System of the Israeli Defence Forces (IDF)

  • Sang-Seung Lee;Chang-In Lee;Min-Seop Jung;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.78-82
    • /
    • 2023
  • The Israeli military's track record boasts victories in four Middle East wars and numerous counter-terrorism battles. This can be attributed to the implementation of a flexible defense acquisition system, allowing for the rapid acquisition of cutting-edge weaponry in response to ever-changing enemy vulnerabilities. If Korea were to adopt the defense acquisition system employed by the Israeli Defense Forces (IDF) it has the potential to transform into a small but strong country, mirroring the accomplishments of the IDF.

Asymmetric Terrorist Alliances: Strategic Choices of Militant Groups in Southeast Asia

  • Alexandrova, Iordanka
    • SUVANNABHUMI
    • /
    • v.11 no.1
    • /
    • pp.101-132
    • /
    • 2019
  • Why do some local rebel groups choose to form asymmetric alliances with large transnational terrorist organizations? This paper examines asymmetric terrorist alliance patterns by studying the international ties of domestic insurgencies in Southeast Asia. It uses data from Indonesia, Malaysia, the Philippines, and Thailand to construct a theory defining the determinants of the choice of alliance strategies by terrorist groups. The findings conclude that rebels with limited aims prefer to act alone out of fear of entrapment. They are cautious of becoming associated with the struggle of transnational radical groups and provoking organized response from international and regional counterterrorism authorities. Local groups are more likely to seek alliance with an established movement when they have ambitious final objectives, challenging the core interests of the target state. In this case, the benefits of training and logistic support provided by an experienced organization outweigh the costs of becoming a target for coordinated counterterrorist campaign.

  • PDF

Big Data Security Technology and Response Study (빅 데이터 보안 기술 및 대응방안 연구)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.445-451
    • /
    • 2013
  • Cyber terrorism has lately aimed at major domestic financial institutions and broadcasters. A large number of PCs have been infected, so normal service is difficult. As a result, the monetary damage was reported to be very high. It is important to recognize the importance of big data. But security and privacy efforts for big data is at a relatively low level, therefore the marketing offort is very active. This study concerns the analysis of Big Data industry and Big data security threats that are intelligent and the changes in defense technology. Big data, security countermeasures for the future are also presented.

Numerical modelling of internal blast loading on a rock tunnel

  • Zaid, Mohammad;Sadique, Md. Rehan
    • Advances in Computational Design
    • /
    • v.5 no.4
    • /
    • pp.417-443
    • /
    • 2020
  • Tunnels have been an integral part of human civilization. Due to complexity in its design and structure, the stability of underground structures under extreme loading conditions has utmost importance. Increased terrorism and geo-political conflicts have forced the engineers and researchers to study the response of underground structures, especially tunnels under blast loading. The present study has been carried out to seek the response of tunnel structures under blast load using the finite element technique. The tunnel has been considered in quartzite rock of northern India. The Mohr-Coulomb constitutive model has been adopted for the elastoplastic behaviour of rock. The rock model surrounding the tunnel has dimensions of 30 m x 30 m x 35 m. Both unlined and lined (concrete) tunnel has been studied. Concrete Damage Plasticity model has been considered for the concrete lining. Four different parameters (i.e., tunnel diameter, liners thickness, overburden depth and mass of explosive) have been varied to observe the behaviour under different condition. To carry out blast analysis, Coupled-Eulerian-Lagrangian (CEL) modelling has been adopted for modelling of TNT (Trinitrotoluene) and enclosed air. JWL (Jones-Wilkins-Lee) model has been considered for TNT explosive modelling. The paper concludes that deformations in lined tunnels follow a logarithmic pattern while in unlined tunnels an exponential pattern has been observed. The stability of the tunnel has increased with an increase in overburden depth in both lined and unlined tunnels. Furthermore, the tunnel lining thickness also has a significant effect on the stability of the tunnel, but in smaller diameter tunnel, the increase in tunnel lining thickness has not much significance. The deformations in the rock tunnel have been decreased with an increase in the diameter of the tunnel.