• Title/Summary/Keyword: Terrorist

Search Result 189, Processing Time 0.023 seconds

An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks (중계 공격을 예방하는 효율적인 RFID Distance-Bounding 프로토콜)

  • Boo, Chang-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.610-619
    • /
    • 2010
  • RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from malicious attackers. For that reason, Brands, et al. proposed a certification protocol between a certifier and a verifier based on the concept of distance-bounding, and in addition Hancke et al. introduced the concept of RFID. However, the delivery of tag IDs, one of the main RFID features, is not still available, and there are two important demerits: anonymity in the delivery of tag IDs suggested by Kim et al. and inefficiency in finding a tag ID with regard to how to check errors which may occur in the process of data exchange between readers and tags. Therefore, this study proposes a protocol that meets the requirements of tag anonymity and location untraceability, has resistance to errors which may take place in the phase of tag data exchange, and is very efficient in finding tag IDs.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

A Study on Hometown Terrorism Possibility and Measures in Multiculturalism (다문화주의에 따른 자생테러리즘의 가능성과 대책에 관한 연구)

  • Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.1-19
    • /
    • 2010
  • As the world becomes more global, entry simplification measure increases many foreigners' entry and international marriage around the low income countries of southeast Asia. Those are adding multicultural phenomena to Korean society, which has a bad influence on public order environment and leads to side effect in society. Since the 9/11 terror attacks, a sudden increase in the threat of terror has been worldwide. Besides, the threat tends toward New Terrorism and contributes to factor to social malaise in Korea. Therefore, this study examines all the possibilities of hometown terrorism by multiculturalism and suggests measures for it. To achieve this, it is required to lead the people's understanding and national participation for multiculturalism. The mature civic awareness should be given priority over any others, which means the understanding and consideration of various countries' cultures and traditions. It is also necessary to inspect the dangers of hometown terrorism. Furthermore, there should be an urgent need for an institutional device to prevent and suppress terror through a close examination of countermeasures system of terror.

  • PDF

Comparative Study on Major Nations's Related Legislation for Counter-terrorism (테러대응 관련 법제의 국가별 비교 연구)

  • Kwon, Jeong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.343-352
    • /
    • 2010
  • As a result of comparing and analyzing the related legislation of each nation, more superior legislative systems should be made to cope with a number of terrors effectively. And also it is required to devise some concrete regulations such as the following in superior legislative systems. First, because it is hard to collect information on terrorism and watch over suspects according to Communication Privacy Protection Law. More in-depth discussion into the issue of surveillance is needed for the protection of lives and property, although public concerns of privacy are a valid point of contention. Second, it is necessary to take complementary measures on immigration as surveillance, since the current Immigration Control Law has restrictions in many ways to hinder efforts to root out terrorists. Third, under the current law on financial activities, it is impossible to block influx of terror financing. Therefore it is necessary to come up with ways of making the punishment procedures. Fourth, considering that convicted terrorists get punished under the standard procedures and precedents, it is required to clearly differentiate between what the terror acts are and what terrorist groups are. Fifth, it is necessary to make use of the private security system to enhance the security system of national facilities.

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

Analysis on the tendency of international terrorism against Koreans occurred in overseas countries (해외에서 발생한 우리국민의 국제테러리즘 피해사례 경향분석)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.69-74
    • /
    • 2015
  • Korea has established diplomatic relations with 190 countries in the world. It opened its diplomatic offices in 113 countries. Korea raised its status in international society through multinational force peace activities, national defense cooperation activity and UN peace maintenance activity for the maintenance of world peace. But there have been vio lent crimes by terrorist organizations and armed groups that try to achieve their political, religious and ideological go als greatly damaging Koreans working in overseas countries. This research studied the tendency of international terr orism against Koreans. The suggestion and conclusion are as follows. First, the study shows that armed groups and extremists have threatened and attacked Koreans in overseas countries. But there aren't enough personnel who can i mmediately and correctly analyze and respond the threats and attacks. So it is urgent to raise experts continually an d develop manuals to respond the attacks. Next, the damaging targets in overseas countries have been changed from hard targets to soft targets. There could be a limit in the restriction of basic rights of people by governmental agenc ies. So it is necessary for people to show mature civic awareness not going to a tourism-prohibited area.

Explosive loading of multi storey RC buildings: Dynamic response and progressive collapse

  • Weerheijm, J.;Mediavilla, J.;van Doormaal, J.C.A.M.
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2009
  • The resilience of a city confronted with a terrorist bomb attack is the background of the paper. The resilience strongly depends on vital infrastructure and the physical protection of people. The protection buildings provide in case of an external explosion is one of the important elements in safety assessment. Besides the aspect of protection, buildings facilitate and enable many functions, e.g., offices, data storage, -handling and -transfer, energy supply, banks, shopping malls etc. When a building is damaged, the loss of functions is directly related to the location, amount of damage and the damage level. At TNO Defence, Security and Safety methods are developed to quantify the resilience of city infrastructure systems (Weerheijm et al. 2007b). In this framework, the dynamic response, damage levels and residual bearing capacity of multi-storey RC buildings is studied. The current paper addresses the aspects of dynamic response and progressive collapse, as well as the proposed method to relate the structural damage to a volume-damage parameter, which can be linked to the loss of functionality. After a general introduction to the research programme and progressive collapse, the study of the dynamic response and damage due to blast loading for a single RC element is described. Shock tube experiments on plates are used as a reference to study the possibilities of engineering methods and an explicit finite element code to quantify the response and residual bearing capacity. Next the dynamic response and progressive collapse of a multi storey RC building is studied numerically, using a number of models. Conclusions are drawn on the ability to predict initial blast damage and progressive collapse. Finally the link between the structural damage of a building and its loss of functionality is described, which is essential input for the envisaged method to quantify the resilience of city infrastructure.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Counterterrorism in the Lake Chad Basin Commission and Its Effects on Tenure

  • Gwaya, Kwalar Raymond;Ham, Myungsik
    • Korea and Global Affairs
    • /
    • v.3 no.2
    • /
    • pp.155-182
    • /
    • 2019
  • This essay examines the relationship between counterterrorism within the Lake Chad Basin Commission hereinafter referred to as LCBC and its effects on leaders' tenure in office. The countries of the LCBC, an intergovernmental institution promoting regional integration in the sub-region, established the Multinational Joint Task Force (MNJTF) primarily to maintain peace and security. In April 2012 the mandate of this structure was reinvigorated and broadened to manage the ongoing menace perpetrated by the Islamist terrorist group, Boko Haram in the sub-region. The political consequences, however, has not been identical for leaders of the member states of the LCBC participating in this counterterrorism operation. This essay primarily relies on secondary data derived from available public data sets in explaining this phenomenon. The phenomenon of leaders in Nigeria, Cameroon, Niger and Chad between 2010 and 2018 is used to examine the relationship between counterterrorism in the Lake Chad Basin Commission and its effects on political survival. Results suggest that leaders of highly democratic countries are more likely to lose office and held accountable for either perceived inaction or failure in the counterterrorism operation than their counterparts in autocratic states.

Nonlinear numerical modelling for the effects of surface explosions on buried reinforced concrete structures

  • Nagy, N.;Mohamed, M.;Boot, J.C.
    • Geomechanics and Engineering
    • /
    • v.2 no.1
    • /
    • pp.1-18
    • /
    • 2010
  • The analysis of structure response and design of buried structures subjected to dynamic destructive loads have been receiving increasing interest due to recent severe damage caused by strong earthquakes and terrorist attacks. For a comprehensive design of buried structures subjected to blast loads to be conducted, the whole system behaviour including simulation of the explosion, propagation of shock waves through the soil medium, the interaction of the soil with the buried structure and the structure response needs to be simulated in a single model. Such a model will enable more realistic simulation of the fundamental physical behaviour. This paper presents a complete model simulating the whole system using the finite element package ABAQUS/Explicit. The Arbitrary Lagrange Euler Coupling formulation is used to model the explosive charge and the soil region near the explosion to eliminate the distortion of the mesh under high deformation, while the conventional finite element method is used to model the rest of the system. The elasto-plastic Drucker-Prager Cap model is used to model the soil behaviour. The explosion process is simulated using the Jones-Wilkens-Lee equation of state. The Concrete Damage Plasticity model is used to simulate the behaviour of concrete with the reinforcement considered as an elasto-plastic material. The contact interface between soil and structure is simulated using the general Mohr-Coulomb friction concept, which allows for sliding, separation and rebound between the buried structure surface and the surrounding soil. The behaviour of the whole system is evaluated using a numerical example which shows that the proposed model is capable of producing a realistic simulation of the physical system behaviour in a smooth numerical process.