• Title/Summary/Keyword: terrorist attacks

Search Result 97, Processing Time 0.033 seconds

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

Perspective on Bioterrorism in the United States (미국의 생물테러대책에 관한 고찰)

  • Kang, Young-gil;Kwon, Jeong- hoon
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.10-27
    • /
    • 2009
  • The fear briefly became reality in the U.S. after 9/11, as man-made anthrax spores were found in letters and in east coast post offices on a number of occasions. Anthrax attacks must be related to the terrorist attacks of September 11. These two accidents changed the situation completely. Characteristics are summarized as belows. First, it is necessary for all countries to create each own appropriate countermeasures against bioterrorism. In addition, it is urgent to consider countermeasures focusing on bioterror characteristics that terrorists may use biological agents because they can be extremely difficult to detect and do not cause illness for several hours to several days. Otherwise, those attacks will also show the panic and very real danger posed by the release of such toxins on an unsuspecting public. Second, it is crucial to manage the result thoroughly. A biological weapon is useful to a terrorist group mainly as a method of creating mass panic and disruption to a society. Because it is not easy to predict and collect information about how terrorists utilize pathogenic microbe as well as terror measures in their activities, more realistic approach should be taken to reduce damage. Third, to expand investment in research and development is necessary. Considering advances in microbiology and genetic engineering lately, it is likely that new pathogenic microbe would be created by the enemy. For that matter, it is imperative that medical countermeasures should be devised.

  • PDF

Vehicle Ramming Terror Attacks and Physical Barriers as a Counterterrorism Policy (차량돌진테러와 물리적 방어물에 관한 연구)

  • Yun, Minwoo;Kim, Eunyoung
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.9-29
    • /
    • 2018
  • Recently, it has been frequently reported there were rapid increase of vehicle ramming attacks in the Western countries, such as Europe, United States of America, Australia, and Canada. Vehicle ramming attacks happened in Western countries specifically targeted civilians and maliciously intented to attack as many victims as possible. and resulted in significant number of casualties and wounds. Experts in terrorism analyze the increase of terrors using vehicle is largely due to the change of terror strategy of Islamic extremest groups like ISIS which encouraging would-be terrorist to use vehicles as an effective killing weapons. Accordingly, The most of countries experienced vehicle terrorist attacks began to build physical barriers including ballards, fences, and obstacles on the main shopping streets, transportation facilities, and famous crowded places and buildings in order to prevent mass killing by terrorists' vehicle ramming attack. Contrary to such swift respond to be prepared attacks using vehicle as a weapon Western countries, there are still lack of interests in preparing this type of terrorist attacks among domestic policy makers and scholars. To fulfill the research gap, this study aimed to investigate important issues regarding physical barriers in South Korea. The contributions, implications of this study and suggestions for policy implications of this study findings were discussed in results and discuss.

Estimation of Potential Population by IED(Improvised Explosive Device) in Intensive Apartment Area (아파트 밀집지역 급조폭발물 테러 발생 시 잠재피해인구 추정)

  • Lee, Kangsan;Choi, Jinmu
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.18 no.1
    • /
    • pp.76-86
    • /
    • 2015
  • In this study, we presented a method for estimating the potential population damage of the Seoul Nowon-gu area in the event of a terrorist using a vehicle improvised explosive devices (IED). Using the object-based building extraction method with orthophoto image, the area of the apartment has been determined, and the apartment's height and level were estimated based on the elevation data. Using the population estimation method based on total floor area of building, each apartment resident population was estimated, and then potential population damage at the time of terrorist attacks was estimated around the subway station through a scenario analysis. Terrorism damage using IED depends on the type of vehicle greatly because of the amount loadable explosives. Therefore, potential population damage was calculated based on the type of vehicle. In the results, the maximum potential damage population during terrorist attacks has been estimated to occur around Madeul station, Nowon-gu. The method used in this study can be used various population estimation research and disaster damage estimation.

  • PDF

Review on the Terror Network in Smart Media Era (스마트미디어 시대의 테러네트워크에 관한 고찰)

  • Lim, You Seok;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.85-93
    • /
    • 2013
  • Today, the structure of terrorist organizations in the form of a variety of network complexity are evolving. However, terrorist organization not combining randomly generated network but preferential attachment a network. So, it's research should be preceded a better understanding about the characteristics and type of terror network for a effective counter-terrorism policy of law enforcement. In addition, the appropriate response strategy have to technique establish in an era of smart media. In particular, homegrown terrorist attacks on unspecified people without boundaries of countries and regions unlike the traditional terrorism. Also, homegrown terrorism are violence and criminal activity by new various of religion, politics, philosophy. Besides the extreme members of homegrown terror networks went grow up through the evolutionary process in the age of smart media. Law enforcement agencies must identify the terrorist network at the national level. Therefore, terror networks evolving in the online space, forming a radical homegrown terror organizations have access to the network. Intelligence community track terrorist networks and to block the negative aspects of the smart media outlets should be considered.

How can the post-war reconstruction project be carried out in a stable manner? - terrorism prediction using a Bayesian hierarchical model (전후 재건사업을 안정적으로 진행하려면? - 베이지안 계층모형을 이용한 테러 예측)

  • Eom, Seunghyun;Jang, Woncheol
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.603-617
    • /
    • 2022
  • Following the September 11, 2001 terrorist attacks, the United States declared war on terror and invaded Afghanistan and Iraq, winning quickly. However, interest in analyzing terrorist activities has developed as a result of a significant amount of time being spent on the post-war stabilization effort, which failed to minimize the number of terrorist activities that occurred later. Based on terrorist data from 2003 to 2010, this study utilized a Bayesian hierarchical model to forecast the terrorist threat in 2011. The model depicts spatiotemporal dependence with predictors such as population and religion by autonomous district. The military commander in charge of the region can utilize the forecast value based on the our model to prevent terrorism by deploying forces efficiently.

A Study on the Islamic terrorism in the Southeast Asia: Its Evaluation and perspectives (동남아시아 이슬람 테러리즘 현황 및 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.549-567
    • /
    • 2007
  • In the post-Cold war world, the threat of terrorism is emerging as the most formidable challenge. The terrorist attacks including 9.11 World Trade Center attack have proved such challenge. It has become apparent that no country is safe from the scourage of terrorism. The region of the southeast Asia is no exception to this trend. The Bali bombing of 2002, killing about 200 innocent people, demonstrated that the threat environment had significantly altered. Today, local and regional groups such as Jemiah Islamiah can conduct terrorist operations as devastating as those carried out by Al Qaeda. As fighting terrorism is a complex multi-dimensional task, the responsibility for fighting terrorism must not rest with a single government. The burden must be shared by both the local governments and international communities. In addition, To prevent another bombing of the scale of Bali, countries in the region of southeast Asia must respond decisively. The purpose of this study is to examine the current situation on terrorism in the southeast Asia and to provide perspectives on future terrorism in this region. To foster the better understanding, historical survey on the terrorism in the region and local terrorist groups' network with the foreign terrorist organizations including Al Qaeda have been researched. Based on the result of the research, this paper provides a perspectives and evaluation on the future terrorism in the southeast Asia. It also provides an implications for our reference in the war against terrorism.

  • PDF

A Study on Activating Police Conversational Techniques - Focusing on activation of crisis negotiation techniques - (경찰 대화기법 활성화 방안에 관한 연구 - 위기협상기법의 활성화 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.149-179
    • /
    • 2018
  • October 31, 2017, a man named Saipov who follows ISIS killed 8 people and injured nearly 20 others by driving his truck to the riverside bicycle path in Manhattan, New York, in an act of terror. June 5, 2017, the Islamic extremist Yacqub Khayre held a woman hostage in a suburb of Melbourne, Australia, before being killed by the police. Various countries around the world including the UK, France, and Germany are in war against terrorism. The terrorists change their target from hard targets such as government officials to vulnerable soft target, intensifying the public's fear, and, unlike in the past when they were organized by governments or organizations, extremists such as ISIS followers are now acting on their own in the act of terrorism. Also, as they use vehicles, pressure cooker, and other objects that can be easily found for terrorism, it is becoming more difficult for the police to prepare against terrorist attacks. Meanwhile, some terrorism researchers argue that conversational techniques (negotiation) used by the police are now of no use, as shown in the cases like 9/11 attacks in 2001 and 2016 Nice attack in France in which the suspects committed terrorist attacks without leaving enough time for the police to take action and that, therefore, tactical suppression techniques need to be developed. Therefore, this study suggested police negotiation techniques are necessary not only for terrorist attacks but also for overall police work, including handling intoxicated people at police station, and proposed ways to activate conversational techniques for police organizations.