• Title/Summary/Keyword: terrorists

Search Result 84, Processing Time 0.029 seconds

The Work of Mourning of 9/11 in U. S. A (미국의 9/11 애도 작업에 관한 고찰 : 9/11추모관 건립과 테러와의 전쟁을 중심으로)

  • OH, bonghee
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.89-113
    • /
    • 2015
  • This paper explores the work of mourning of 9/11 in the United States, focusing on the project of building the National September 11 Memorial managed by the Lower Manhattan Development Corporation(LMDC) and the War on Terror declared by the George W. Bush administration in the wake of 9/11. This paper first looks at the project of building the Natioanl September 11 Memorial and considers what was at stake in achieving this project. It also examines the limitations of the project. This paper argues that, in spite of the efforts to mourn the victims in significant and meaningful ways, the work of mourning in the memorial project fails at least in two respects. First, the memorial project "began so soon" right after 9/11 that the victims' families were not given enough time to mourn their loved ones. Second, the project were permeated with American nationalism and patriotism, which made the 316 non-American victims of 9/11 invisible and forgotten. Then, it goes on to examine the War on Terror because the War on Terror epitomized the failure of mourning due to these causes. In his address to the nation delivered on the very day of 9/11, President George W. Bush stated that "America was targeted for the attack because we're the brightest beacon for freedom and opportunity in the world" and that the terrorists failed to threaten America into chaos. He also stated that America is in "the war against terrorism." These statements were a futile reassertion of the illusion of American invulnerability and a prohibition of mourning in favor of violent military responses to 9/11. American nationalism also underlies Bush's official naming of September 11 as "Patriot Day." The victims were sacrificed because they were at the site when terrorists attacked, which implies that their death had nothing to do with American patriotism. Naming September 11 as Patriot Day was an act of imbuing the absurdity of the victims' death with a false meaning and an act of forgetting the non-American victims. The failure of the work of mourning of 9/11 consisted in the inability to recognize human vulnerability and interdependence and the inability to mourn not only American victims but also non-American victims killed in 9/11 and the War on Terror. A meaningful and significant mourning could be possible when we realizes that all human beings are exposed to one another and their lives are interdependent on one another. September Eleventh Families for Peaceful Tomorrows well demonstrated this kind of mourning. When most Americans supported violent retaliations, Peaceful Tomorrows made pleas for nonviolent responses to 9/11. Turning their grief into action for peace, its members work "to create a safer and more peaceful world for everyone," not only for Americans. Their effort to mourn in meaningful and nonviolent ways delivers the message that a disaster like 9/11 should not happen anywhere.

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

Classification of ICS abnormal behavior in terms of security (보안측면에서의 산업제어시스템 비정상 행위 분류)

  • Na, Jung-Chan;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.329-337
    • /
    • 2013
  • Cyber threats of the ICS(Industrial Control System) has been researched on the level to the threat to the network service as well as a specific system, even if the extent of damage was not intended. Although some range of "security" just include the protection of systems against the deliberate attacks of terrorists or cyber hackers, often more damage is done by carelessness, and equipment failures than by those deliberate attacks. This paper presented a taxonomy for classifying all abnormal behaviors of ICS, including deliberate attacks, inadvertent mistakes, equipment failures, and software problems. The classification criteria of ICS abnormal behaviors was selected to highlight commonalities and important features of deliberate attacks as well as inadvertent actions.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Study on Total Fashion of Retro Trend During the US-Iraq War (미.이라크 전쟁시기에 나타난 복고풍 경향의 토탈패션 연구)

  • Seok, Eun-Kyoung;Chae, Keum-Seok
    • Journal of the Korean Society of Fashion and Beauty
    • /
    • v.3 no.3 s.3
    • /
    • pp.24-30
    • /
    • 2005
  • If one can say that 'Retro' is a revived mode of the style, which was popular in the past, it is confirmed that various complex social and cultural factors have been reflected to making the current and new mode by accepting the past style. By investigating the impact of hippie style, which was popular during the Vietnam War on cosmetics and beauty culture, and the retro-tendency NEO-Hippie style fashion phenomenon appeared at around the time of the US and Iraq War, a theoretical foundation of cosmetics and beauty culture in the 2000s was established, and periodical circulation of fashion was tried to be understood. The 9.11 terrorists' attack and US-Iraq War devastated the heart of modern people, and for this, a retro trend having a meaning to revive the past style with nostalgia of the old things started to be handled with major interests in cosmetics and beauty culture. The retro-style, which is revived in the 2000s, is not the unchanging imitation mode in the '60s and '70s during the Vietnam War, but a newly transformed type of style.

  • PDF

The Case of Novel Attack Detection using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지 사례)

  • Kim, Chun-Suk;Kang, Dae-Kwon;Euom, Ieck-Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.279-285
    • /
    • 2012
  • Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.

Prevention of Terrorism Threat and Role of Security Intelligence in New Terrorism (테러리즘 위협 예방과 경호정보의 역할)

  • Baek, Jong Kap;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.43-71
    • /
    • 2005
  • Terrorism is the use of violence, especially murder and bombing, in order to achieve political aim or to force a government to do something. Nowadays, instrument of mass destruction are smaller, cheaper, and more readily available. Cellular phones were used as timers in the attacks in Madrid last March. Hijacking an airplane is relatively inexpensive. Finally, the information revolution provides inexpensive means of communication and organization that allow groups once restricted to local and national police jurisdictions to become global. Al Qaeda is said to have established a network in fifty or more countries. These technological and ideological trends increased both the lethality and the difficulty of managing terrorism. Because of the unprecedented scale of Al Qaeda's attacks, the focus is properly on Islamic extremists. But it would be a mistake to limit our concern solely to Islamic terrorists, for that would ignore the way that technology is putting into the hands of deviant groups and individuals' destructive capabilities that were once limited primarily to governments and armies.

  • PDF

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

Simple Identification Methods for Unknown Suspicious White Powders using Microfluidic-based Platform (미세유체 기반의 플랫폼을 이용한 미지의 백색가루 간이식별 탐지방안)

  • Park, Jae Woo;Song, Jiyoung;Na, Sang Cheol;Byun, Kisik;Jeon, Noo Li
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.853-859
    • /
    • 2017
  • Terrorists always threats the global security with the possibility of using prohibited warfare, NBCs(Nuclear, Biological and Chemical Warfare). Compared to other prohibited warfares, most of biological warfare agents (BWAs) have no physical properties and time delays from spread to affect. Therefore the early detection is important to protect and decontaminate from BWAs. On the preliminary detection stage for suspicious material, most of detection kits only serve to know weather the BWAs exists or not. Due to this reason, simple field confirmation testing for suspicious substances have been used to identify materials which show negative result on detection kits. Considering the current Lab on a Chip(LOC) technologies, we suggest simple identification platform for unknown suspicious substances based on paper fluidics. We hope that our research will envision the future direction for the specific point-of-view for LOC technologies on detection strategy of BWAs.

A Study on Measures of Air Terrorism: Focused on Security (항공테러 대응에 관한 소고: 경비를 중심으로)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.10-17
    • /
    • 2012
  • The purpose of this study is to make people acknowledge the danger of the air terror and provide measures to prevent a recurrence of the accident and find required security. Also, the air terror is categorized into aircraft and airport and take steps to come up with preventive measures against the air terror by finding a countermeasure and precaution. The following steps should be checked to take precautionary measures against the air terror. major security crackdown and the need for a further security check should be conducted to prevent terrorists from boarding the aircraft, security around the airport needs to be tightened up by training the airport workers and promoting emergency situations, airport sheriffs and armed guards should be on patrol for the safety of the cabin, new measures of efficient security for in and around the airport and its facilities should be set up to tighten up security of baggage.