Software Security Risk Analysis Using Fuzzy Expert System

Table of contents

Software Level of Security Risk Analysis Using Fuzzy

ABSTRACT

There is wide concern on the security of software systems because many organizations depend largely on them for their day-to-day operations. Since we have not seen a software system that is completely secure, there is need to analyze and determine the security risk of emerging software systems.

This work presents a technique for analyzing software security using fuzzy expert system. The inputs to the system are suitable fuzzy sets representing linguistic values for software security goals of confidentiality, integrity and availability. The expert rules were constructed using the Mamdani fuzzy reasoning in order to adequately analyze the inputs. The defuzzication technique was done using Centroid technique. The implementation of the design is done using MATLAB fuzzy logic tool because of its ability to implement fuzzy based systems.

Using newly develop software products from three software development organizations as test cases, the results show a system that can be used to effectively analyze software security risk.

ANALYSIS AND DESIGN

The design is basically divided into four stages:

1) DESIGN OF THE LINGUISTIC VARIABLES

The inputs to the system are the values assumed for the software security goal thru confidentiality, integrity and availability. The goals are assumed to be the same weight and a particular valued is determined for each of them based on questions that are answered about the specific software.

Also the values determined for each of the input are defined as a fuzzy number instead of crisp numbers by using suitable fuzzy sets. Designing the fuzzy system requires that the different inputs (that is, confidentiality, integrity, and availability) are represented by fuzzy sets. The fuzzy sets are in turn represented by a membership function.

2) THE FUZZY SETS

The level of confidentiality is defined based on the scales of not confidential, slightly confidential, very confidential and extremely confidential. The level of integrity is also defined based on the scales very low, low, high, very high, and extra high. Also, the level of availability is also defined by the scales very low, low, high, very high and extra high. The levels defined above are based on a range definition with an assumed interval of [0 -10].

The fuzzy sets above are represented by membership functions. The corresponding membership functions for confidentiality, integrity and availability are presented in figures below [pic] The level of security risk is defined based on the scales: not secure, slightly secure, secure, very secure, and extremely secure within the range of [0- 30].

3) THE RULES OF THE FUZZY SYSTEM

Once the input and output fuzzy sets and membership functions are constructed, the rules are then formulated. The rules are formulated based on the input parameters (confidentiality, integrity, and availability) and the output i. e. level of security risk.

The levels of confidentiality, integrity, and availability are used in the antecedent of rules and the level of security risk as the consequent of rules. A fuzzy rule is conditional statement in the form: IF x is A THEN y is B. Where x and y are linguistic variables; and A and B are linguistic values determined by fuzzy sets on universe of discourses X and Y, respectively. Both the antecedent and consequent of a fuzzy rule can have multiple parts. All parts of the antecedent are calculated simultaneously and resolved in a single number and the antecedent affects all parts of the consequent equally.

Some of the rules used in the design of this fuzzy Systems are as follow:

  1. If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is Very Low) then (Security Risk is Not Secure).
  2. If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is Low) then (Security Risk is Slightly Secure).
  3. If (Confidentiality is Extremely Confidential) and (Integrity is Extra High) and (Availability is High) then (Security Risk is Slightly Secure).
  4. If (Confidentiality is Not Confidential) and (Integrity is Very Low) and (Availability is high) then (Security Risk is Extremely Secure).

The rules above were formulated using the Mamdani max-min fuzzy reasoning.

DEVELOPMENT AND IMPLEMENTATION

The linguistic variables were determined with the extent of the positive and negative responses to a well constructed security questions that are presented in form of on-line questionnaire. As it was mentioned earlier, MATLAB was used for the implementation. The linguistic inputs to the system are supplied through the graphical user interface called rule viewer.

Once the rule viewer has been opened, the input variables are supplied in the text box captioned input with each of them separated with a space.

a) THE FIS EDITOR

The fuzzy inference system editor shows a summary of the fuzzy inference system. It shows the mapping of the inputs to the system type and to the output. The names of the input variables and the processing methods for the FIS can be changed through the FIS editor.

b) THE MEMBERSHIP FUNCTION EDITOR

This can be opened from the command window by using the plotmf function but more easily through the GUI.

The membership function editor shows a plot of highlighted input or output variable along their possible ranges and against the probability of occurrence. The name and the range of a membership value can be changed, so also the range of the particular variable itself through the membership function editor.

c) THE RULE EDITOR

The rule editor can be used to add, delete or change a rule. It is also used to change the connection type and the weight of a rule.

d) THE RULE VIEWER

The text box captioned input is used to supply the three input variables needed in the system. The appropriate input corresponds to the number of YES answer in the questionnaire for each of the input variables. For example, all the input variables are 5 and the corresponding output is 13. 9, which specified at the top of the corresponding graphs. The input for each of the input variables is specified at the top of the section corresponding to them, so also the output variable.

e) THE SURFACE VIEWER

The surface viewer shown in figure 9 is a 3-D graph that shows the relationship between the inputs and the output. The output (security Risk) is represented on the Z-axis while 2 of the inputs (Confidentiality and Integrity) are on the x and y axes and the other input (Availability) is held constant. The surface viewer shows a plot of the possible ranges of the input variables against the possible ranges of the output.

4) EVALUATION

The security risk analysis system was evaluated using three newly completed software products from three different software development organizations. The output determines the security level of software under consideration. The summary of the evaluation is given in figure 11. For product A, 5 is the score for confidentiality, 5 for the integrity and 5 for the availability.

CONCLUSION AND FINDING

Thus, this work proposes a fuzzy logic-based technique for determination of level of security risk associated with software systems. Fuzzy logic is one of the major tools used for security analysis. The major goals of secure software which are used as the inputs to them system are the preservation of confidentiality (preventing unauthorized disclosure of information), preservation of integrity (preventing unauthorized alteration of information) and preservation of availability (preventing unauthorized destruction or denial of access or service to an authentic user).

It might be necessary to redesign this system in a way that it will be deployable and will be without the use of MATLAB. It might also be necessary to use an adaptive fuzzy logic technique for security risk analysis. We have been able to design a system that can be used to evaluate the security risk associated with the production of secure software systems. This will definitely help software organizations meet up with the standard requirements. A technique for assessing security of software system before final deployment has been presented.

The result of this study shows that if the software producing companies will incorporate security risk analysis into the production of software system, the issue of insecurity of software will be held to the minimum if not eliminated. This study has also revealed that if each of the software security goals can be increased to the maximum, then the level security will also be increased and the risk associated will be eliminated. Finally, security risk analysis is a path towards producing secure software and should be considered a significant activity by software development organizations.

Read more

Evaluation of Security Considerations in the Design of Public Buildings in Abuja

AN Evaluation OF SECURITY CONSIDERATIONS IN THE DESIGN OF PUBLIC BUILDINGS IN ABUJA ;

Introduction

The primary intent of edifices is to supply residents with contributing, safe, comfy, healthy and secured indoor environment to transport out different sorts of activities runing from work, survey, leisure, concern and household life to societal interactions. ( Olagide and Bello 2007 ) .

Benjamin and Lawrence, 2007 noted that in order to accomplish this intent, edifices are designed, planned, constructed and managed based on standard specifications established by government’s professionals and experts who are supposed to hold equal cognition of user’s demands and outlooks, among others. ( Webster, 1966 ) , province that security is the province of feeling of being free from fright and danger or the riddance of menaces. Security is one of the basic demands of humanity. Human security is about screening persons and communities from any signifier of force or insecurity. Human security sought to foreground new concerns about planetary security and needs to turn to a menace to human life. ( Ogboi and Eze, 2013 ) .

Harmonizing to ( Gilbert et al. ( 2003 ) as cited by Benjamin and Lawrence [ 2007 ] Terrorist onslaughts as a menace to edifices are a menace that most design codifications have non addressed in the yesteryear, and which have clearly become more of import. ( Benjamin and Lawrence, 2007 ) opines that particularly for certain types of edifices. These has become an issue that cause fright, anxiousness and concern in the heads of the populace. As edifice codifications are bing for the benefit and protection of the populace and belongingss, it seems sensible that codifications should be taken into history the perceptual experiences and frights of the general populace when planing for all jeopardies, including terrorist menaces.

Prince philips, ( 2010 ) states that the security breach by the terrorist group at the force central office and the united states office in Abuja in 2011 had thrown up assorted security issues and brought about frights in the head of populaces.

Aziza, ( 2011 ) , noted that public edifices in Nigeria today seems to hold been the focal point of terrorist onslaught. Building security and safety took on new intending on September 11, 2001. Unprecedented terrorist actions that twenty-four hours at the universe trade centre in New York City and the Pentagon in Washington. DC, made edifice proprietors and users think as they had ne’er thought before about secure and safe, they are-or aren’t-in the edifices they use every twenty-four hours. ( Anderson, 2008, as was cited by Muhammad, and Asmau S, [ 2012 ] . Architects, applied scientists, security and engineering advisers define the architect’s function in the relationship between security and edifice design.

Aziza, ( 2011 ) . Noted that constructing security considerations is non merely about put ining the latest electronic cogwheel and package bundle. Nor is it merely a consideration for constructing types with extremely specific tenancy considerations. Increasingly, edifices of all kinds are campaigners for the sort of careful security planning that proceeds hand-in-hand with the architectural design procedure. To guarantee an appropriate and cost-efficient degree of security, designers need to introduce themselves with the scope of security factors that affect the design.

Safety, menaces to edifices are addressed by constructing codifications. By Torahs, designers and other interior decorators must conform to plan and building criterions applicable to the legal power in which a undertaking is located. Mandated demands in edifice codifications are intended to protect the wellness and safety of edifice residents, firemans, and exigency forces, and to keep the structural unity of edifices in the event of fire and other inauspicious status. Although safety menaces relate to security menaces, constructing codifications do non incorporate security demands. Safety menaces, which are unwilled, consequence from natural phenomena ( e.g. Lighting inundations, hurricanes and twisters ) or through human carelessness and ignorance ( e.g. Improper usage, accidents, equipment failure, and system defects ) . Security menaces are knowing and originate in human actions. Angry persons, vandals, felons, and terrorists can transport out knowing menaces. However, heather menaces are knowing or unwilled, they may hold similar results, runing from nuisances to catastrophes of the major graduated table ( got from security and planning in the design ) .

Nimma, ( 2007 ) . Stressed that with the recent rush in panic onslaughts comes the demand to reconsider edifice design considerations to safeguard lives and belongings and minimise hazard and chance of onslaught. The easiness at which security was beaten at the United Nations edifice in Abuja raise new inquiries as to the rightness of the full composite in position of its position. Granted the edifice exhibited resilient structural unity in defying impact, it ought to be more hard to hedge security. ( Fatima, 2004 ) opines that the bombardment of Lois Edet house-Nigeria’s constabulary central office was besides an indicant that today’s design security considerations are clearly unequal. The undermentioned anti-terror constructing design considerations are recommended for composites that can be marks for panic onslaughts. There is the demand to procure edifices in Nigeria.

Since the September 11, 2011 panic onslaughts in the United States, the demand to forestall or react to Acts of the Apostless of panic has radically transformed the policing and security landscape of states. This is frequently marked by the passage of new statute law, creative activity of new security bureaus or sections, furthering inter-agency intelligence sharing and engineering proviso of new resources, development of engineerings, and intensification of bilateral and multi-lateral cooperation on policing and security. In many legal powers, nevertheless, these steps have been taken at the disbursal of cultivating the people and communities in affected parts whose support and partnerships are important in geting actionable intelligence against terrorist menaces and reacting efficaciously to the threat. Nigeria is unluckily no exclusion.

PROBLEM STATEMENT

The job of insecurity is now a major tendency all over the Earth. Insecurity affects human life and being, the construct of insecurity has normally been ascribed different readings in association with the assorted ways which it affects persons. Security considerations remain its values for investing safety.

The frequence of terrorist onslaught on edifice constructions in Nigeria in the past few old ages had become really alarming and unreassuring. Many lives and belongingss have been lost in the prostration of edifices largely in Abuja. Many belongings proprietors have developed high blood force per unit area and some have been sent to an early grave. ( Ogboi and Eze, 2013 ) .

Beland ( 2005 ) , defines insecurity as “the province of fright or anxiousness stemming from a concrete or alleged deficiency of protection” . It refers to miss or inadequate freedom from danger. This definition reflects physical insecurity which is the most seeable signifier of insecurity, and it feeds into many other signifiers of insecurity such as economic security and societal security.

AIM AND OBJECTIVES

The primary purpose of this research is to rating of security considerations in the design of public edifice. The specific aims of this research is to execute the followers

  1. To place and measure assorted security considerations in care schemes adopted for public edifices ;
  2. To find the effectivity for security considerations in public edifices ;
  3. To measure the degree of security challenge in public edifices ;
  4. To measure and measure the relevancy of security consideration in public edifices in Abuja ;

RESEARCH QUESTIONS

  1. What are the considerations for following and care schemes for public edifices?
  2. How effectual is the security consideration in public edifices?
  3. What is the degree of security challenges in public edifices?
  4. What extend is the degree of security challenges in public edifices?
  5. What is the relevancy of security considerations in public edifices in Abuja?

Boundary line

The range of this research is focused on security considerations in the design of public edifices in Abuja.

The position of Abuja as the capital metropolis of Nigeria means the metropolis is traveling to maintain edifice physical constructions and spread outing in range and size. Abuja, Nigeria’s federal capital metropolis, is a fast developing one. Abuja has a sprawling and unprecedented population growing, far more than the official figures. This is mostly due to resulting urbanisation in the metropolis following the resettlement of the federal capital from Lagos, and to the economic chances that the metropolis seems to offer. This has put tremendous force per unit area on the city’s substructure, peculiarly lodging, every bit good as other services many authorities constitutions, embassies, international bureaus and several corporate pudding stones are headquartered in Abuja. The metropolis has seen the development of major Constructions of constructions and substructures to run into up with the demands of adjustment for office, residential and recreational infinites. The research is to concentrate on some major edifices, and will ineptly look into the security consideration of cardinal bank of Nigeria and National house of assembly which are both strategic edifices in Abuja Nigeria These are indispensable elements of our economic system and life, and are hence attractive marks to terrorist groups. This research will concentrate on the protective readyings of some public countries, and provides relevant information to professionals and others who are concerned with these issues. The research will measure the handiness, external construction, stuffs and internal safety.

Significance OF STUDY

This research intends to turn to and make full in some of the spreads that approaches to security of lives and belongingss in developing a agency of safeguarding residents and edifices particularly the causes of terrorist onslaught and demo how to keep effectual security policies.

Protecting the residents and contents of a edifice from the consequences in the consequences of a natural or human assault, the concluding end of physical security design is to minimise harm to a edifice and its systems so recovery may be possible. This is, of class, a challenging undertaking because the effects of temblors, windstorms, inundations, and detonations are hard to foretell.

Joseph.A, ( 2003 ) believed that the exposures of an bing edifice can be evaluated against a menace analysis for the construction. Methods for retrofitting the edifice to turn to these exposures are so examined. Technology has provided many stuffs and techniques that make it possible, though non ever economical, to protect bing edifices against utmost duress such as bomb harm.

Methodology

The survey adopted a study research techniques, and is supported by Marshall and Rossman ( 1989 ) that aggregation of informations and analysis in a qualitative research is a coincident procedure. Random trying method was adopted for choosing the sample size utilizing a well-structured questionnaire, which was self-administered to the respondents. The secondary informations were sought through a careful hunt of different stuffs. The major beginning of information was obtained through literature study of books, studies of dailies and periodicals, authorities publications, conference documents and seminar studies among other. Descriptive analysis was employed to analyze the information gathered which was presented in a narrative. The rationalist position besides known as the scientific method is based on dependable and nonsubjective informations, mensurable experiments, trials, every bit good as statistical processs. It derives its strength from the impression that better apprehension of human experience can be gained through experiments and observations, positivist position to rating draws fundamentally on the method-based theory and focal points on developing Methodological model for verifying the internal cogency ( causality ) and external cogency ( generalisation ) of programmes, rating research is focused on the coevals of hypothesis, aggregation of quantitative informations, and utilizing the information to prove hypothesis and besides evolve theory as it is done in scientific experiments.

The chief instruments of informations aggregation were interviews, focal point group treatments, questionnaires, reappraisals, observations. Relevant secondary informations, and the rationalist orientation for the research. Most significantly hypotheses are developed through the treatment of the conceptual theoretical account and constructivist attack.

1

Read more

Nuclear terrorism

The most recent threat of Nuclear attack attempted on the United States has come from North Korea, as such the following essay will delve into North Korea’s investment in nuclear terrorism and the plan of action the United States has against such action.  There are several links that associate North Korea to different factions of terrorism.  The following paper will give detailed examples of North Korea’s interaction and support of each group.  The support of terrorism has many forms such as weapons or money and North Korea’s handing over of monetary funds and weapons will also be documented in this essay.  The resources necessary for terrorism to exist has a partner in government and North Korea is just such a partner.

The following paper will not only address the fact of terrorism affiliation between North Korea and reputed terrorist groups and countries but also that North Korea has their own terrorist group.  This fact can be found in North Korea’s treatment toward South Korea and reported assassination attempts of their presidents on several occasions.  The terrorist affiliation North Korea harbors is one that involves not only promoting terrorism through trade with notable terrorist groups but also their own participation in Afghanistan terrorist camps and the trading of weapons technologies with such groups (Graham 20-21).

North Korea is a country with a specific dichotomy between public relations.  These relations deal mainly with money.  The reason North Korea is reported to be trading with terrorists is that their funding aids in the economic growth of their country.  The support that North Korea gives to terrorist is rewarded with monetary funds from such countries as Japan, Iran, and Iraq.  This paper will organize specific examples of each country and it’s trading policy with North Korea (what items it trades for what price etc.).  The essay will also focus on how North Korea opens up trade routes covertly using bribes and coercion.

The year 2000 saw the Democratic People’s Republic of Korea (DPRK) and the United States government went through a series of terrorism talks and the future state of terrorism as well as cooperation of North Korea’s government in several documented terrorism actions.  Such actions include the 1970 hijacking of a Japanese plane bound for North Korea and the subsequent sheltering of the Japanese Communist League-Red Army Faction members or hijackers, or the safe haven North Korea provided to the terrorist who were involved in the hijack.  Also, DPRK has been suspected of selling weapons to the Moro Islamic Liberation Front, as specified by the Philippine government.

The monetary transaction was made possible through Middle East connections (Terrorism Files, 2002).  North Korea has been on the US terrorism list sin 1988 and continues to remain on that list because of its uncooperative procedures for information on terrorist after the September 11 attacks, as Secretary of State John Bolton stated, “’North Korea has a dedicated, national-level effort to achieve a biological weapons capacity and has developed and produced, and may have weaponized, biological weapons agents.

Despite the fact that its citizens are starving,” said Mr. Bolton, “the leadership in Pyongyang has spent large sums of money to acquire the resources, including a biotechnology infrastructure, capable of producing infectious agents, toxins, and other crude biological weapons. It has a variety of means at its disposal for delivering these deadly weapons.’” (North Korea and Terrorism 2002).

Another terrorism threat that North Korea poses and has been linked with is nuclear terror.  In this respect according to Pakistan and US sources (as well as Libyan) this is the current threat of North Korea:  they have been supposedly training Arab terrorists for at minimum ten years at the Kim Jung-il Political and Military University.  North Korea is also linked with Osama bin Laden in arms dealing, as Triplett (2004) states in North Korea and Nuclear Terror, of the existing relationship between North Korea and bin Laden, “This was discovered in 2000 when bin Laden financed a shipment of North Korean conventional arms to a Philippine Islamic terrorist group”.

North Korean nuclear weapons were also being used as tests by Pakistan (in 1998).  Scientists at the Los Alamos National Laboratory suspect that these tests were a conglomeration between Pakistan and North Korea in nuclear testing.  Such joint ventures are not new for North Korea and their connection with terrorism.  Nuclear weapons are just the forefront of terror that North Korea has presented to the world.

North Korea, since their cover-up in 1970 of the safe haven they provided to the airplane hijackers, have been affiliated with several terrorist groups as Triplett further states, “Recently a Japanese newspaper, citing military sources, reported Iranian military figures were seen at North Korea nuclear facilities. This leads allied intelligence to suspect the Iranians of trying to move their nuclear weapons program to North Korea, beyond the range of Israeli F-16 fighter-bombers”.

The Pakistan, and North Korean conglomeration of trading weapons is a definite terrorism group.  The weapon testing near the Afghan border in 1998 was reported to have been the testing of Korean made missiles.  Another link between Pakistan and North Korea can be found with Major General (retired) Saltan Habib, who was responsible for covert acquisitions of nuclear technologies while presiding as the defense attaché of Pakistan in Moscow, was posted as the ambassador to North Korea to ‘oversee the clandestine nuclear and missile cooperation between North Korea and Pakistan’ (Raman 2002).

As the ambassador, Habib organized the covert shipment of missiles from North Korea to Pakistan.  Not only did Habib coordinate this shipment but he also was reported to have exchanged technology from North Korea to Pakistan on weapons technologies especially those dealing with missiles and nuclear devices as Raman states, “…the training of Pakistani experts in the missile production and testing facilities of North Korea and the training of North Korean scientists in the nuclear establishments of Pakistan through Captain (retired) Shafquat Cheema, third secretary and acting head of mission in the Pakistani embassy in North Korea from 1992 to 1996”.

Pakistan’s Inter-Services Intelligence (ISI) is one in which North Korea has strong ties.  Prior to Habib’s position with North Korea it was filled by Major General Shujjat from the Baluch Regiment.  General Shujjat was not only working for the embitterment of North Korea but clandestine actions he performed were favoring ISI for five consecutive years as Raman states, “On Captain Cheema’s return to headquarters in 1996, the ISI discovered that in addition to acting as the liaison officer of the ISI with the nuclear and missile establishments in North Korea, he was also earning money from the Iranian and the Iraqi intelligence by helping them in their clandestine nuclear and missile technology and material procurement not only from North Korea, but also from Russia and the CARs”.

The limits of North Korea’s involvement in terror seem boundless.  Not only have they delivered ballistic missiles to Pakistan but also they are using very covert methods by which to trade.  The beginning of 2002 was witness to mass movements of nuclear weapons across the Karakoram Highway.  These weapons were being transported from China to Pakistan with the envoy containing spare parts and other assortments.  The transportation of this shipment however has ties with North Korea because China may have accepted this movement from Pakistan only in regards to North Korea’s wishes (Raman).

North Korea, Iran, and Iraq are infamously known as the Axis of Evil, because of their terrorist ties and promotion of illegal arms dealing.  North Korea has managed to become well versed in terrorism through biological, chemical, and nuclear means.  In 1988 North Korea or DPRK as well as Kim Jong-il were suspected (and this probability is almost certain) of committing to assassinate South Korean president Chun in Rangoon (or Yangun as it is known today).

The assassination was to take place by strategically placing bombs atop the Martyr’s Masoleum (in dedication to Aung San the founder of independent Burma).  Although president Chun was delayed in traffic and did not succumb to the bombings, “The huge blast ripped through the crowd below, killing 21 people and wounding 46. Among the dead were the Korean foreign minister, Lee Bum Suk, the economic planning minister and deputy prime minister, Suh Suk Joo, and the Minister for Commerce and Industry, Kim Dong Whie. The rest of those killed were presidential advisers, journalists, and security officials, most of them South Korean” (Wikipedia Online Encyclopedia).

In finding evidence to support North Korea has having terrorist ties, it is presumably difficult.  The suspects who were responsible for the Rangoon bombings committed suicide by detonating hand grenades.  Such suspects are common in assisination attempts and thus true evidence is difficult to come by in linking North Korea directly with terrorism in some cases.  However, the 1970 safehaven as well as arms dealing that Philippine officials attest to are some of the supporting materials that accumalte against North Korea (Graham 80-85).

In lieu of specific evidence to support terrorism affilitations from North Korea president Kim Jong-il admitted to the United States in 2000 that DPRK had willfully exported missiles abroad.  These missiles are traded to Syria and Iran in exchange for monetary compensation.  While Syria was reportedly a main buyer of missiles, Iran was said to be a primary buyer of not only ballistic missiles but technology as well (Wagner 2000).  The specific terrorism that exists in North Korea trading missiles to such countries exists in those countries’ intent for such exported ‘goods’.  In order for North Korea to stop association and trading of missiles, as Wagner states of the conference between the United States and North Korea held in July-August of 2000,

Einhorn characterized the talks as “very useful” and said that he hopes to meet again with the North Koreans in the near future. However, on July 12, Jang “clarified” that North Korea would only continue the talks if the United States compensated Pyongyang “for the political and economic losses to be incurred in case we suspend our missile program.”

During the meeting, the United States had once again rejected North Korea’s long-standing demand for $1 billion per year in return for the cessation of missile exports. “North Korea should not be receiving cash compensation for stopping what it shouldn’t be doing in the first place,” Einhorn said.

This compensation is coercion and is a type of terrorism in and of itself.  North Korea should not be given compensation pay for ending its affilitation with terrorism simply because their economy would suffer slightly from the lose of funds selling missiles etc. had given the DPRK.

North Korea has remained in close contact with different terrorist groups.  The Japanese Red Army who were given safehaven in 1970 after the plane hijacking are coherts of Middle Eastern terrorists and in this connection lies the bridge by which North Korea exports weapons (Fulford 2001).  As said prior Pakistan has a standing trade relationship with North Korea as missile buyers.

The funding for such North Korean weapons development as Fulford states, “However, cutting off one of ruler Kim Jong Il’s main sources of finance–illegal activities in Japan–might prove easier. North Korea’s government has been manufacturing large quantities of heroin, amphetamines, weapons and counterfeit U.S. dollars to finance its weapons development programs. It sells them either through criminal gangs in Japan or via Russia and China to the U.S. and Europe, the Korea experts say.” Pakistan is also a main supporter of the Afghanistan Taliban regime and terror weapons that are used by Taliban are subsequently provided by North Korea (Fulford).

Other avenues by which North Korea finds funding for weapons is through Japan’s Liberal Democratic Party.  The Party solicits succor toward North Korea in exchange for bribes as Fulford further states, “…when Japan gave 500,000 tons of rice aid to North Korea last year, politicians received kickbacks from North Korea, Lee says. “I was with a North Korean official as he phoned a Japanese member of parliament and told him a shipment of free fish had been sent to a company he owns,” he says.”

This bribe system works by committing North Korean businessmen, who reside in Japan, to a loan.  This loan, or lend, is given by a bank and is paid back directly to North Korea and Japan.  Thus, the money cannot easily be traced.  Public money is being used to generate a working arms dealing relationship between North Korea and Japan.

Public money is not the only money being used in corrupt manners:  The Japanese government aided North Korea’s atomic weapon development through its Fuji bank.  Fuji bank is one of the largest banks in the world and its involvement in the deal between North Korea and Japan was a catalyst in North Korean weapons building and trading.  Essentially Fuji paid approximately $350 million to a myriad of North Korean businesses and organizations who were prospering in Japan.  This money was given in exchange for debt collection services (Graham 61-63).

The funding for weapons development in North Korea as it is funded by Japan and public money is the key component of rising terrorism at a global scale.  Due to North Korea’s association with several aforementioned terrorists groups, global terror does exist.  North Korea’s trade of missiles to different terrorist organizations promotes multilateral trade in a negative fashion because what North Korea is truly promoting is terrorism through trade.

There also exist unofficial reports of North Korea terrorist involvement.  It has been established that North Korea has dealt ballistic missiles to countries: It gained the raw materials for the construction of these missiles from such countries as China.  These missiles are capable of delivering mass destruction in the form of biological as well as chemical warfare.  In late 2001 P’yongyang continued a type of global scavenger hunt for technologies dealing with the making of nuclear weapons.

The procurement of the necessary plutonium for at least one nuclear weapon has set the world on edge.  As the Unclassified Congress Report (2001) states, “Spent fuel rods canned in accordance with the 1994 Agreed Framework contain enough plutonium for several more weapons.”  Along this train of potential arms dealings P’yongyang laid the path to trade with Russia by signing the Defense Industry Cooperation Agreement.

Among the trading partners that North Korea has established ties with include Pakistan, Iran, Iraq, Angola, Burma, Cuba, Libya, and Syria.  Through trade with these countries North Korea is able to consistently manage its immense military operation (14% of its economic gross goes to the military despite calling in international aid to its starving people).  The trading that continues between the aforementioned countries and North Korea involves ‘arms, chemical and biological weapons materials, and even ballistic missile technology–in clear violation of the Missile Technology Control Regime. Libya, for example, recently bought 50 Rodong-1 missiles from North Korea with a range of 1,000 kilometers’ (Hwang, 2001).

Among the trading countries that North Korea has ties and the materials thar are reportedly being traded, North Korea has also been invovled with overtly selling weapons to various terrorist groups such as the Liberation Tigers of Tamil Eelam and the United Wa State Army.  The United Wa State Army is a drug affiliated Burma terrorist group residing in the golden triangle.  The golden triangle is the area between Thailand, Laos, and Burma.

Not only is North Korea coordinating trading efforts with these terrorist groups but North Korea also has been training in Afghanistan terrorist camps (Hwang).  The Deputy Director of the Central Intelligence Agency, John E. McLaughlin stated of North Korean involvement of terrorism, “North Korea’s challenge to regional and global security is magnified by two factors…first, the North’s pursuit of weapons of mass destruction and long-range missiles, and two, its readiness–and eagerness–to become missile salesman to the world” (Hwang).

Not only is North Korea associated and in league with terrorist groups by harboring hijackers and participating in terrorist camps but North Korea is a terrorist.  In 1987 North Korean agents bombed a South Korean airplane.  North Korea has continuously be involved with terrorist attacks on South Korea a reported 300 instances.  North Korea has participated in covert assassination attempts of South Korean presidents and has traversed passed South Korean borders 15 separate times (Hwang).

Not simply has North Korea been fully participatory in these incidences but as Hwang further states, “In one of the most blatant, 26 North Korean commandos in a submarine landed off the South Korean coast in September 1996; they, along with 17 South Koreans, were killed in the ensuing manhunt. Their mission is believed to have been to assassinate South Korean dignitaries”.  Therefore, North Korea guilty of fully participating in aiding terrorists through weapons and technologies and they are also delving into the leagues of terrorism by their chronic attack on South Korea (Graham 43-44).

Along the lines of defining North Korea as having terrorist groups within its borders who are North Korean Hwang states that North Korea has kidnapped an unprecedented 3,600 Korean citizens since the year 1953.  In this fact there exists relevant material to consider North Korea as having terrorist intentions and actions.  Not only has North Korea abducted Koreans but reportedly also foreigners, of which ten Japanese foreigners are the most noted.

In conclusion, North Korea is not only a country who supports terrorism through trade of weapons and technology but it is also a country which participates in terrorism through assassinations, and kidnappings.  North Korea then exists as a country spurned by monetary gain and by lines of distinction between trading partners and the uses those countries may have for nuclear weapons.

Although the above pages attest to the development of North Korea and its invovlement with terrorism it must also be noted that the United States with the advocacy of the United Nations, has established an administration of foreign policy which will attribute to the goals of nuclear disarmament.

Work Cited

Allison, Graham.  (2005).  Nuclear Terrorism, The Ultimate Preventable Catastrophe.  Owl

Books, New York.

Editorial.  North Korea and Terrorism.  2002.  (Online).  Available:            http://www.ibb.gov/editorials/09924.htm

Fulford, Benjamin.  North Korea, Another Outcropping of Terrorism.  Forbes.  September 2001.

(Online).  Available:            www2.gol.com/users/coynerhm/north_korea_another_outcropping_of_terrorism.htm

Hwang, Balbina.  North Korea Deserves to Remain on US List of Sponsors of Terrorism.

Asia and the Pacific.  November 2001.  (Online).  Available:            http://www.heritage.org/Research/AsiaandthePacific/BG1503.cfm

Raman, B.  Pakistan and the North Korea Connection.  Asia Times, October 2002.  (Online).

Available:  http://www.atimes.com/atimes/South_Asia/DJ22Df01.html.

Terrorism Files.  State-Sponsored Terrorism North Korea.  2002.  (Online).  Available:            http://www.terrorismfiles.org/countries/north_korea.html

Triplett, William C.  North Korea and Nuclear Terror.  The Washington Times.  2004.(Online).            Available:http://www.washingtontimes.com/commentary/20040406-101023-7315r.htm

Wikipedia Online Encyclopedia.  Rangoon Bombing.  (Online).  Available:            http://en.wikipedia.org/wiki/Rangoon_bombing     

Unclassified Congress Report.  2001.  (Online).  Available:            https://www.cia.gov/cia/reports/721_reports/jan_jun2001.htm#5

Wagner, Alexander.  US-North Korea Terrorism Talks Resume; North Korea Admits to

Exporting Rocket Technology.  Arms Control Association, September 2000.

(Online).  Available:  http://www.armscontrol.org/act/2000_09/nkoreasept00.asp

 

 

Read more

Managing homeland security

The US homeland security department was formed as a strategy to beef up homeland security following the enactment of the Homeland security Act of 2002.  This was in reaction to the increased terrorist attacks around the world and particularly because of the devastating September 11 terrorist attacks in 2001.  The department of Homeland security is charged with the economies responsibility of mobilizing the nation for prevention of further terrorist attacks.  This it does by providing a care unifying point for numerous organizations that ran parallel to ensuring sufficient homeland security. (Kemp, 2003).

Notably, the DHS responsibilities are exceedingly important as well as challenging.  The men and women in this department rise daily to protect the citizens of America form visions terrorist attack.  They must therefore be guided by a clear framework to direct flier actions and this is provided in the department vision and mission statement.  For instance, the vision reads preserving out freedom, protecting America …we secure our homeland.

The mission on the other hand reads “we will lead the unified national efforts to secure America.  We will prevent and deter terrorist attacks and protect against and respond to threats and hazards to the nation.  We will ensure safe and secure borders, welcome lawful immigrants and visitors and promote the free flow of commerce (www.dhs.gov.)  These strongly started missions provide a strong foundation and framework for building on the daily operations of this department.

The vision and mission of the department set out the goals of the department which are also purposeful and clear, for example to identify and understand threats, to value to most valuable asset i.e. the people of America and so on.  Clearly, the mission and vision stamens of the DHS are crucial to the operations of the department and especially the human resources.

The structure

The department of Homeland security comprises of five directors namely, The directors of National protection and programs, The directorate of science and technology, The directorate of management, The office of policy and the office of health Affairs.

The directorate of National Protection and programs is charged with the task of developing and implementing risk reduction approaches by putting in place an integrated and comprehensive view of cubing risk elements both physical and virtual.  If feel that this arm plays a crucial role since prevention is better than cure.  Risk reduction approach goes a long way to facilitating reduced terrorist attacks.

The directorate of science and Technology primarily provides the federal and state officials with the technology and capabilities they may require to stay a head in the plight against terrorism.  This is a very important function of the department because seen as it is, the terrorist techniques get sophisticate by the day and with the directorate R&D efforts, advanced technology to match or even surpass that of the terrorist gangs helps to reduce numerous attacks by detecting them early or reducing the magnitude of their effects. This I feel is very crucial to be department’s mission.

The directing for management is equally important.  This is because it ensures that the budget is properly appropriated, adequate to fund the operations of the department which no doubt must be very costly.  These funds must be well managed and this is the function of the directorate of managements.  Additionally, other components such as the human resource, expenditure of funds, IT systems management, procurement of necessary materials and so on fall under the roles of this directorate.

These functions although not directly connected to the actual capturing of terrorists contribute to the smooth running of the department. This is especially true when it comes to the human resource.  I believe it is one of the most important functions of this department which entails the right people for the job. E.g. highly qualified, possess integrity, innovative as well as patriotic.

The division of office of policy is just as pertinent as the other in the DHS. Although not well known to many, its main function is to formulate and coordinate policies within the department of homeland security.  I believe that the division in the DHS is crucial component in that it provides a focused centralized long range blue prints to the protection of the United States and its people. (Howard, James & Moore, 2005).

Also in line with the five directorates of the department of homeland security is the office of Health Affairs.  Much cannot be said about this department but of importance is the role it plays providing medical activities in instances where having medical background preparation may be called for.  Generally, this act to ensure that staff is well prepared to face challenges of a medical nature such as diseases like SARS, Bird flu and the rest which pose homeland insecurity.

The US department of homeland security works in conjunction with the independent organizations such as the US coast guard which is a branch of the military whose duty is basically to conduct search and rescue mission as well as provide security assistance of a marine nature.  This organization is the smallest of all but none the less vital in ensuring maximum possible security to the American citizens, the environment us economy or any other security interest falling in the region meantime.  This organization seems most logical because it is impossible for the DHS to work alone in providing security to the whole of American.

Not only that, division of labour or rather specialization ensures that the experts do their part to give maximum contribution to the security of America.  Beside since both organization have same mission where necessary at all times.  The other independent body that worked with the US department of security is the secret service.  This department has dual roles form providing security to correct retires of visiting leaders and conducting criminal investigations of a sensitive nature say money laundry, identity theft, computer based attacks and so on.

Contrary to what most people believe, not the agency is misplaced in working with homeland security, I feel that its pretense is crucial to beefing security within American not only to the ‘who is who’ and their families but even the citizens of American.  This is because most terrorist attacks are funded from outside sources to internally based allies.  Tracking suspicious transfers could head the agency to exposing such suspicious transaction and ultimately lead to the crime that is not so far apart form terrorism or terrorist.  When the US secret service curbs these problems, they in part also curb problems and threats of terrorism.

The five directorates are further made up smaller operate under the umbrella of the directorates.  For instance under the NPP directorates we have the offices of cyber security and communications, infrastructure protection (OIP) office of intergovernmental programs (IGP) office of Risk management and Analysis (RMA) and US Visit.

These sub-divisions under the NNP directorate expand the breath of jurisdiction and duties of the department of homeland security.  In terms increasing preparedness for unexpected attacks, reassurance to the nation providing decision makers will information that is relevant and accurate when it is needed, developing integrated approach to homeland security right form grassroots, and so on.

In my opinion, the department of homeland security is well organized, in a logical way of least.  The organization hierarchy is very clearly displayed in the deportment organization chart with the security at the top of the chart.  In support to this claim, the department has tried to be very comprehensive with almost all areas affecting security considered, for example, the legal aspects, health, financial management, technological, intelligence, citizenship, public affairs and policy and so on.

Additionally, the department appoints commissioners and directors form other agencies such as the citizenship and migration services, customs and border protection, transport security, secret service, coast guard, federal emergency management Agency (FEMA) and immigration and customs enforcements. (https://training.fema.gov/hiedu/aemrc/booksdownload/fem/)  This only goes to show how well thought out the organization of the agency is. The inclusion of the afore mentioned agencies ensures that no loopholes are left uncovered i.e. right from detection of potential threats, prevention tacking of insecurity and swift and efficient disaster management in case of terrorist attacks or natural disaster strike.

However, it is not hard to notice that one important agency is absent in the DHS organization i.e. the federal bureau of investigation.  It is alarming because these two should be closely interlinked because seen as it is they share comm. interest i.e. fighting crime, protection and conducting criminal investigations.  If they could work directly with the departments of Homeland security then perhaps the expertise on fighting insecurity and terrorist attack would be greater.

References

Department of Homeland Security. About the Department of Homeland Security

Retrieved on October 27, 2007 from World Wide Web: https://www.dhs.gov/

FEMA. Introduction to Emergency Management Textbook, FEMA Higher Education Project. Retrieved on October 27, 2007 from World Wide Web:

https://training.fema.gov/hiedu/aemrc/booksdownload/fem/

Howard, R.D., James J. & Moore J. C. (2005). Homeland Security and Terrorism: Readings and Interpretations. New York: McGraw-Hill Professional.

Kemp R.L. (2003). Homeland Security: Best Practices for Local Government

International City/County Management Association.

Read more

To What End Military Power

In an essay I read titled “To What End Military Power?” by Robert J. Art he looks at how and when force should be used. He suggests that there are four purposes of using forces: defensive, deterrent, compellent, and swaggering. Considering their usefulness today. What do you think Art means by his final quote that […]

Read more

Compensation and Security for Employees

Discussed in this paper will be how employees are categorized and at what level they are categorized at. What the goals and expectations for each level are and how they can be reached. How compensation is dispersed and awarded and how the compensation is given. This paper will also discuss what kind of compensation is […]

Read more

Gun Laws in Foreign Countries

Due to recent events occurring in America, people have been seeking out reforms in our nation’s gun laws so that they may feel safer inside their homes and inside the nation’s schools. Unlike some countries, America cannot be considered “harsh” with its gun laws, nor can it be considered weak when compared to still other […]

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp