• Title/Summary/Keyword: terrorists

Search Result 84, Processing Time 0.025 seconds

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

A Study on the Analysis and Improvement methods of Emergency Medical Service Systems in Disaster Areas (재해현장에서의 응급의료체계에 대한 분석과 개선방안)

  • Choi, Keun Myung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.7 no.1
    • /
    • pp.65-80
    • /
    • 2003
  • Various disasters have been continuously occurred in Korea from 1990s to now. However, there is no substantial improvement against damages as compared with the past due to various reasons such as lack of fundamental recognition, ineffective response systems and widespread insensitivity to safety. More worse, new types of disasters have been frequently generated due to rapid changes in social structures and industrial development, unusual changes in weather and changes of international situations. These disasters request comprehensive countermeasures. In particular, while material damages by disasters can be recovered, the losses of precious lives cannot be recuperated in any ways. Thus, it is critical to set effective disaster medical plans. The first way to minimize damages by disasters is the prevention and the next is to set the disaster medical plans focusing on preliminarily activating the emergency medical system to rapidly rescue and take appropriate emergency medical services for casualties in the early stage when any disaster occurs. Nevertheless, no sufficient researches or references do not exist up to now. Even worse, effective emergency medical systems that play critical roles in increasing survival rates of casualties in actual disaster areas is not deployed. For the United States, the consistent countermeasure system is established in FEMA through a close cooperative system with relevant organizations for serious accidents including terrorists' attacks or natural disasters. For the emergency medical services in disasters, the disaster medical plan is set to cope with any disasters in perfect order by special area as operating the National Disaster Medical SystemESF#8 Role by FEMA. Accordingly, we need to set the extensive and integrated disaster prevention system for rapid and flexible operation against various kinds of serious accidents. This study identified overall problems in disaster control plans in Korea and suggested how to improve the emergency medical service system in disaster areas. Furthermore, it aims to prepare the basic data to set the effective emergency medical service plans when substantial casualties break out and more reasonable and systematic disaster control plans to cope with the future occurrence of serious disasters.

  • PDF

A Study on the Development of Analysis Model for Maritime Security Management (해상보안관리 분석모델 개발에 관한 연구)

  • Jeong, Woo-Lee
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.9-14
    • /
    • 2012
  • Maritime security incidents by pirates and by terrorists increase, but maritime incidents investigation models are limited to figure out the maritime security incidents. This paper provides the analysis model for maritime security incidents. To develop this analysis model, this categorizes five threat factors, the ship, the cargo type, port system, human factor, information flow system, makes the risk assessment matrix to quantify the risk related to threat factors and classifies four priority categories of risk assessment matrix. Also, this model makes from the frameworks which include a variety of security initiatives implementing in stakeholder levels like international organizations, individual governments, shipping companies, and the ship. Therefore, this paper develops the Analysis for Maritime Security Management model based on various security initiatives responding to the stakeholder levels of maritime security management and top-bottom/bottom-up decision trees, and shows the validity through verifying the real maritime security incident of M/V Petro Ranger.

A Study on the Establishment of Anti-Drone system for the Protection of National Important Facilities (국가중요시설 방호를 위한 안티드론 시스템 구축 방안 연구)

  • Hwang, Soon-phil;Kim, Doo-hwan
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.247-257
    • /
    • 2020
  • The Purpose of this study is to present effective Anti-Drone systems to protect national important facilities against drones that are illegally used by crime groups and terrorists with malicious intents. In order to accomplish the purpose of the study, technical and policy reports regarding Anti-Drone systems, open documents from manufacturers and various research papers are reviewed, and in-depth interviews with experts were conducted. Studies have shown that it is effective to overlay and mix different detection systems so that they can improve detection rates by supplementing each other's advantages and disadvantages, and that the means of incapacitation need to acquire flexibility by using both soft-kill and hard-kill methods in accordance with operational environment for the effective usage. In other words, the establishment of an illegal drone pre-management system, mixed and overlapping detection assets, determining appropriate countermeasures, and multiple distribution of means of incapacitation. The establishment of a protection system for important national facilities through the operation of overlapping and complex anti-drone systems is the most urgent task.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

Tracking the Source of Cascading Cyber Attack Traffic Using Network Traffic Analysis (네트워크 트래픽 분석을 이용한 연쇄적 사이버공격 트래픽의 발생원 추적 방법)

  • Goo, Young-Hoon;Choi, Sun-Oh;Lee, Su-Kang;Kim, Sung-Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1771-1779
    • /
    • 2016
  • In these days, the world is getting connected to the internet like a sophisticated net, such an environment gives a suitable environment for cyber attackers, so-called cyber-terrorists. As a result, a number of cyber attacks has significantly increased and researches to find cyber attack traffics in the field of network monitoring has also been proceeding. But cyber attack traffics have been appearing in new forms in every attack making it harder to monitor. This paper suggests a method of tracking down cyber attack traffic sources by defining relational information flow of traffic data from highest cascaded and grouped relational flow. The result of applying this cyber attack source tracking method to real cyber attack traffic, was found to be reliable with quality results.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

The Study on Education and Training System for the Special Security Guards' Specialization (특수경비원 전문화를 위한 교육훈련제도 개선방향)

  • Kim, Jong-Woong;Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.69-89
    • /
    • 2008
  • As year passes, terrorism is gradually increasing. Its target has becom various and arbitary, and recently, terrorists are aiming for national major facilities wich include multiplex facilities. Although special security guards took charge of its defence system from 2002, they have failed to establish its system firmly due to some institutional inertia. And 'Professionalism' appeared to be the mattter, according to the spot-probe and interviews. The purpose of this essay is to devise measures to develop sepecial security system including its specialization through investigating current educational training system. In order to attain professionalism, establishment of new proffessional school, division of current education system(into common education and full-course education), and reinforcement of substantial inspection activity should be preceded. Moreover, inspection activity should include standards for engaging instructors, establishment of compilation committee for editorial supervision, and establishment of clear educational policy. I hope the developmental measures in this essay to be speedily actualized with endeavor from police, security association, academic circles.

  • PDF

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

Study of Radiation Mapping System for Water Contamination in Water System (방사능 수치 오염 지도 작성을 위한 방사선 계측 시스템 연구)

  • Na, Teresa W.;Kim, Han Soo;Yeon, Jei Won;Lee, Rena;Ha, Jang Ho
    • Journal of Radiation Industry
    • /
    • v.5 no.2
    • /
    • pp.185-189
    • /
    • 2011
  • As nuclear industry has been developed, a various types of radiological contamination has occurred. After 9.11 terror in U.S.A., it has been concerned that terrorists' active area has been enlarged to use nuclear or radioactive substance. Recently, the most powerful earth-quake stroke, which triggered a massive tsunami in Japan and then Fukushima nuclear power plant reactor has suffered from a serious accident in history. The Fukushima reactor accident has occurred an anxiety of radiation leaks and about 170,000 people have been evacuated from the accidental area near the nuclear power plant. For these reasons, a social chaos can be occurred if radiological contamination occurs to the supply system for the drinking water. As such, the establishment of the radiation monitoring system for the city main water system is compelling for the national security. In this study, a feasibility test of radiation monitoring system which consists of unified hybrid-type radiation detectors was experimented for multi detection system by using gamma-ray imaging. The hybrid-type radiation sensors were fabricated with CsI(Tl) scintillators and photodiodes. A preamplifier and amplifier was also fabricated and assembled with the sensor in the shielding case. For the preliminary test of detection of radiological contamination in the river, multi CsI(Tl)-PIN photodiode radiation detectors and $^{137}Cs$ gamma-ray source were used. The DAQ was done by Linux based ROOT program and NI DAQ system with Labview program. The simulated contamination was assumed to be occurred at Gapcheon river in Daejeon city. Multi CsI(Tl)-PIN photodiode radiation detectors were positioned at the Gapcheon river side. Assuming that the radiological contaminations flows in the river the $^{137}Cs$ gamma-ray source has been moved and then, the contamination region was reconstructed.