• Title/Summary/Keyword: International Terrorism

Search Result 132, Processing Time 0.023 seconds

A Study on the Development Direction of Crisis Negotiations of the Police - With Focus on the Police Department Education Development Plan - (경찰 위기협상 발전 방향에 관한 연구 - 경찰 기관의 교육 발전 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.161-189
    • /
    • 2015
  • As the terrorist act inflicted on the American Ambassador to Korea, Mark Lippert on March 5, 2015, the hunting rifle case in Sejong-si in which 3 persons were killed on February 25, and the hunting rifle murder case in Hwaseong-si Namyang-dong on February 27 occurred in succession, there is growing concern that our country is no long safe from firearm violence. Internationally, there is growing concern that our country is no longer safe from international terrorist organizations such as Islamic State (IS), the Sunni Muslims fundamentalists' Islamic militia group, which an 18-year old Korean boy Kim voluntarily joined in January 2015. The police crisis negotiation of our country was established and operated to prepare for the 1988 Olympic Games mainly for counter-terrorism purposes, and due to the characteristics of the prohibition of the use of guns, not a counter-terrorism incident has occurred, so the skepticism about its existence and the development directions are actively being discussed. Our country still prefers the traditional use of force such as SWAT team to resolve crisis case, such as such as murder, terrorism, robbery, and is reinforcing tactical capabilities. However, to perform the primary mission of the police to protect the people's lives and properties, it is necessary to establish the system in which crisis negotiations are possible in the initial stages no matter what incidents may occur by expanding the education for crisis negotiations techniques which are emphasized in the advanced countries such as the United States. In this research, the police department's internal education materials and media are analyzed so that the new police officers who work hardest on the forefront can carry out the roles as basic negotiators of crisis negotiations, and the measures for the development directions of the police crisis negotiations are presented.

  • PDF

A Study on Impact of the U.S. Security Initiatives on Korean Participants in Global Supply Chain (미국물류보안규범이 우리나라의 공급망 참여자에 미치는 영향과 대응방안)

  • Huh, Eun-Sook
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.217-236
    • /
    • 2008
  • The purpose of this paper is to discuss the impact of the New Container Security Initiatives of U.S., CSI(Container Security Initiative) and C-TPAT(Customs-Trade Partnership against Terrorism). The CSI which aims to pre-screen high-risk containers in ports of loading. It is a unilateral effort that seeks to develop bi-lateral agreements between the United States and foreign countries with significant container trade volumes into the U.S. C-TPAT is a voluntary initiative to develop cooperative security relationships between the U.S. government and U.S. firms in the global supply chain. Government and Industry have already responded with proposals to create more confidence in supply chain security. These proposals call for heightened inspection and scrutiny of the goods flowing through a supply chain, increased information exchange among participants of supply chain. While government and the private sector are working together to launch new initiative to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID. The security recommendations will eventually become the requirements to be complied with by importers and their supplier extending to the carriers. It is needed that Korean shippers involved in US importer's supply chain should pay attention to the requirements and start implementing the security measures.

  • PDF

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Legislation, Co-ordination Centre and Database System to Respond Security Incidents at Sea

  • Deyi, Gao
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.155-159
    • /
    • 2004
  • The International Ship and Port Facility Security (ISPS) Code has come into force on July 7$^{th}$ 2004. It would therefore be prudent that all parties' concerned put in place, methodically, systematically and as soon as possible, all the necessary infrastructure needed to give effect to all the decisions of the Conference. But the ISPS Code doesn't have the details during implementation. For example, how to legislate, administrate\ulcorner How are the data relating to security incident saved\ulcorner So, the author will lay emphasis to expatiate on three aspects in this thesis on the basis of the fact of anti-terrorism at sea.

  • PDF

The History of Sniping Combat Scenes and Future Prospects (저격전의 역사와 미래전망)

  • Yang, Tae-Kyu
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.281-350
    • /
    • 2007
  • The purpose of this study is to survey the circumstances of sniping warfare and to prove the importance of usage of snipers. The research method was referred to the history of foreign warfares and autobiographies, articles, and testimonies of snipers. Also, various news reports were also studied to collect information. The content of this study investigates the circumstances of sniping combat scenes from its first appearance in the world's major warfares to contemporary ones. Also, the research contains the history of weapons, ammunition, rifles, and the principle of rifle shooting including ballistics. We hope this study provides ROK Army and government agencies the foundation of sniping and thereby improving the effectiveness of correspondence to international conflicts and terrorism.

  • PDF

A Sensitivity Risk Analysis for Additional Truck Turnaround Time (ATTT) by Container Inspection Stations Derived from C-TPAT and CSI.

  • Yoon, Dae-Gwun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.2
    • /
    • pp.151-157
    • /
    • 2007
  • After World Trade Center's Terror in 2001 and promulgating Maritime Transportation Security Act (MTSA, 2002) and Security and Accountability For Every Port Act (SAFE Port Act, 2006) in the United States, most of the attention on security of international transportation including marine carrier and facility has focused increasingly. Inspection stations in foreign seaport terminal including Busan, South Korea, have been installed by Container Security Initiative (CSI) and Customs Trade Partnership against Terrorism (C-TPAT). The inspection station, however, may directly and indirectly affect delay of truck turnaround time in the seaport, especially high and severe level of security. This paper was analysed a risk for the additional average delay of truck turnaround time incurring by the inspection station under the all level of security, C-TPAT and CSI. As a result of this risk analysis, the higher weighted inspection time based on raising security level, the less number of trucks to be inspected, which will derive high delay in the inspection station.

A Legal Study on the Promotion of the In-Flight Security Officers System

  • Jin, Seong Hyun;Jeon, Seung Joon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • The purpose of this study is to provide in-flight security in situations where aviation security is constantly threatened by the increase in illegal interference in aircraft and the threat of terrorism that still exists. It is to identify legal operational problems such as education and qualification of the original system and to propose improvement measures. To this end, the need for revision based on relevant laws and guidelines such as "Operation Guidelines for In-Flight Security Officers" is to be discussed based on international standards such as ICAO and Federal Air Marshal. The research method was based on interviews with SEMs such as cabin managers, which focused on ensuring the legal status of In-Flight Security Officer, establishing relationships with captains, and improving education and training.

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

Defending Multiple Terrorist Targets (대테러전략의 게임이론적 분석)

  • Lee, Sanghoon K.
    • KDI Journal of Economic Policy
    • /
    • v.35 no.3
    • /
    • pp.91-124
    • /
    • 2013
  • This paper analyzes a situation where multiple targets are exposed to a potential terrorist attack. The probability of an attack is determined endogenously in a game where a terrorist chooses the target while the targets independently determine the level of deterrence. As each target tries to divert an attack to others, the symmetric equilibrium becomes suboptimal and exhibits dispersion in the level of deterrence. The analysis shows that the first best deterrence level may be achieved when the targets can write a binding risk-sharing contract. Such a contract has limited applicability however as it suffers from a potential verification problem.

  • PDF