• Title/Summary/Keyword: terrorist attack

Search Result 60, Processing Time 0.031 seconds

Identifying the leaders and main conspirators of the attacks in terrorist networks

  • Abhay Kumar Rai;Sumit Kumar
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.977-990
    • /
    • 2022
  • This study proposes a novel method for identifying the primary conspirators involved in terrorist activities. To map the information related to terrorist activities, we gathered information from different sources of real cases involving terrorist attacks. We extracted useful information from available sources and then mapped them in the form of terrorist networks, and this mapping provided us with insights in these networks. Furthermore, we came up with a novel centrality measure for identifying the primary conspirators of a terrorist attack. Because the leaders of terrorist attacks usually direct conspirators to conduct terrorist activities, we designed a novel algorithm that can identify such leaders. This algorithm can identify terrorist attack leaders even if they have less connectivity in networks. We tested the effectiveness of the proposed algorithms on four real-world datasets and conducted an experimental evaluation, and the proposed algorithms could correctly identify the primary conspirators and leaders of the attacks in the four cases. To summarize, this work may provide information support for security agencies and can be helpful during the trials of the cases related to terrorist attacks.

Blast Damage Assessment to a Modern Steel Structures

  • Mestreau Eric;Baum Joseph D.;Charman Chuck;Lee Seung;Sohn Young
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.292-295
    • /
    • 2006
  • The terrorist attack of September $11^{th}$ 2001 has enforced a new examination of the response of modern steel structures, such as those found in large warehouses, auditoriums and airport terminals, to terrorist bomb attack. The effort described in this paper assesses the potential damage to such a newly designed structure form a medium-size car bomb. The structure is mostly composed of a lightweight complex beam structure with large windows and skylights piercing through a corrugated roof. The structural response to the terrorist attack requires the modelling of various physics phenomena including bomb detonation, blast wave propagation, reflections, and refractions and resulting blast impact on the structure. Hence, a fluid/structure coupled methodology is used to perform the assessment.

  • PDF

Defending Multiple Terrorist Targets (대테러전략의 게임이론적 분석)

  • Lee, Sanghoon K.
    • KDI Journal of Economic Policy
    • /
    • v.35 no.3
    • /
    • pp.91-124
    • /
    • 2013
  • This paper analyzes a situation where multiple targets are exposed to a potential terrorist attack. The probability of an attack is determined endogenously in a game where a terrorist chooses the target while the targets independently determine the level of deterrence. As each target tries to divert an attack to others, the symmetric equilibrium becomes suboptimal and exhibits dispersion in the level of deterrence. The analysis shows that the first best deterrence level may be achieved when the targets can write a binding risk-sharing contract. Such a contract has limited applicability however as it suffers from a potential verification problem.

  • PDF

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

Stock Market Response to Terrorist Attacks: An Event Study Approach

  • TAHIR, Safdar Husain;TAHIR, Furqan;SYED, Nausheen;AHMAD, Gulzar;ULLAH, Muhammad Rizwan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.31-37
    • /
    • 2020
  • The purpose of this research study is to examine the stock market's response to terrorist attacks. The study uses data of terrorist attacks in different parts of the country (Pakistan) from June 1, 2014 to May 31, 2017. The event window procedure applies to a 16-day window in which 5 days before and 10 days after the attack. In addition, several event windows have been built to test the response of the Pakistan Stock Exchange. KSE-100 index is taken as proxy of response. The total terrorist attacks are classified into four categories: attacks on law enforcement agencies, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats. The standard market model is used to estimate the abnormal return of the Pakistan Stock Exchange, which takes 252 business days each year. Furthermore, BMP test is used to check statistical significance of cumulative abnormal rate of return (CAAR). The results of this study reveal that total number of terrorist attacks and attacks on law enforcement agencies show long-term effects on Pakistan stock exchange. However, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats have little effect on the Pakistan Stock Exchange.

Geospatial analysis of terrorist bombing attacks in Afghanistan (아프가니스탄 폭탄테러공격에 관한 지리-공간 분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.261-290
    • /
    • 2012
  • Since the launch of Operation Enduring Freedom in 2001, Afghanistan has been a critical battle ground for war against global terrorism. For the last 10 years, the U.S. government and its allies and the Afghan government have put a considerable effort to crush terrorists and insurgents and at the same time to construct nationwide governance system. Yet, the noble mission still seems far from complete. Terrorist or insurgent operations in Afghanistan are still active and troublesome. Thus this subject continues to draw a considerable attention of research or investigative reports to grasp an insightful knowledge or intelligence that may allow a better handling of terrorist troubles in this war-torn nation. This study hopes to serve this purpose by providing analyzed information on terrorist bombings in Afghanistan occurred between 2004 and 2007. It adopts GIS (Geographic information System) analysis technique to uncover spatially patterned aspects of terrorist bombing attacks in Afghanistan. The specific focus of this study is to examine whether terrorists behave rationally when they decide which targets to attack. For analysis, this study will focus on examining whether characteristics of localities have certain impact on the risk of being targets of terrorist bombing attacks. To examine the hypothesis of this study, it will explore how the spatial risk of becoming targets of terrorist bombing attack interacts with cost necessary for executing a ttack paid b y terrorists; 1) by demonstrating the spatial distribution of bombing attacks in Afghanistan and 2) by estimating the distance between headquarters (or home base) of terrorists groups and the bombed target area.

  • PDF

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

k-Fragility Maximization Problem to Attack Robust Terrorist Networks

  • Thornton, Jabre L.;Kim, Donghyun;Kwon, Sung-Sik;Li, Deying;Tokuta, Alade O.
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.33-38
    • /
    • 2014
  • This paper investigates the shaping operation problem introduced by Callahan et al., namely the k-fragility maximization problem (k-FMP), whose goal is to find a subset of personals within a terrorist group such that the regeneration capability of the residual group without the personals is minimized. To improve the impact of the shaping operation, the degree centrality of the residual graph needs to be maximized. In this paper, we propose a new greedy algorithm for k-FMP. We discover some interesting discrete properties and use this to design a more thorough greedy algorithm for k-FMP. Our simulation result shows that the proposed algorithm outperforms Callahan et al.'s algorithm in terms of maximizing degree centrality. While our algorithm incurs higher running time (factor of k), given that the applications of the problem is expected to allow sufficient amount of time for thorough computation and k is expected to be much smaller than the size of input graph in reality, our algorithm has a better merit in practice.

Explosive-Terror Risk Curve by RVS (RVS에 의한 폭발물테러 위험도 곡선)

  • Do, Ki-Young;Yoon, Sung-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.13 no.3
    • /
    • pp.57-64
    • /
    • 2013
  • Since the terrorist attacks 9.11 in 2001, the public places such as subway, department stores or office buildings have become a target of terror in major public facilities. In this paper, for the prevention of terrorist attack in domestic building, the assessments of terror risk were conducted and their relationship with building heights was discussed through FEMA 455-Rapid Visual Screening(RVS). Explosive terror risk tends to increase rapidly with building heights(H<230m), showing the correlation coefficient between total risk and building heights(H<230m) is 0.93. In addition, The average of consequences is 8.47 and that of' threat is 8.95. Vulnerability is found to be 6.62 in average.