High Tech Police Tool Up For Winter Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around the venues, in order to protect the events.

All kinds of measures are being used to prevent all forms of terrorism, to handle traffic, cyber attacks and to manage the highly anticipated visit of a large North Korean delegation, the senior police official overseeing the Winter Olympics explained in a briefing to foreign reporters in Seoul.

“The success of the Games lies in the prevention of any threat of terrorism,” said Director General Kim Gyo-tae, who heads the Pyeongchang 2018 Olympic Winter Games Police Task Force. “That is the focus of our efforts.”

In the past, North Korea has posed a deadly security risk for major sporting events in the South. In 1987, one year prior to the 1988 Seoul Summer Olympics, North Korean agents blew up a South Korean airliner in the Middle East, killing all 115 persons aboard.

“We are in coordination with global intelligence authorities, in close contact,” Kim continued. One result of this coordination is that a list of 30,000 suspects who will be prevented from entering South Korea has been drawn up.

For now, no threats have been made towards the safety of the Winter Olympics. “As of now, we have not received any information on crucial terror threats that might be executed during the Games,” Kim said.

Kim declined to speak on which military assets would be deploying alongside his police units.

Measures are being taken against airborne, vehicle-borne and cyber-attacks and also against a range of weaponry, from firearms to chemical and biological agents.

Regarding biological and chemical threats, the police are coordinating with the nation’s atomic-energy agency, disease-prevention centers and emergency services, Kim said.

As was said before, more than 10,000 officers will be deployed on duties ranging from traffic control to counter-terrorism, including “hundreds” of SWAT (Special Weapons And Tactics) and counter-terrorist officers.

Many officers will carry specialised smartphones, “Poliphones”, loaded with apps that enable vehicle license-plate scanning, fingerprint scanning, searches for missing children, information on suspects, and emergency response.

A no-fly zone, extending to a radius of 4-5 kilometers around venues and with a ceiling of 1,200 meters, will be enforced. “Our basic stance is that there will be no drones,” Kim said. Special devices will be deployed that jam drone frequencies, and units armed with special weapons will be on hand to bring down any unmanned aerial vehicles (UAVs) that bypass these measures.

Horse-borne officers will be utilised for amicable crowd control, while quick reaction units on skis and snowmobiles will be used in the mountains.

Vehicle and pedestrian checkpoints will be established around venues, which will be equipped with X-ray machines to check incoming baggage. Police foot patrols will be constant around venues and the athletes’ village.

Smart police cars, which can scan car license plates while driving, will be used to track down stolen vehicles. Locations with steep inclines, and those where people gather to wait for buses, that is, areas that are prone to vehicle-borne attacks, will be shielded with barricades.

Traffic control will be a particularly critical task given that the Lunar New Year holiday, an annual “traffic hell” during which roads nationwide are customarily jammed, falls in the middle of the Games.

With North Korea expected to attend the Games, inter-Korean negotiations on the size of the Northern team are expected shortly, one potential terrorist risk may have evaporated. “Some have said this could decrease risks of terrorism,” Kim said. “But we consider all risks; we are going to remain vigilant going forward.”

I-HLS

You Might Also Read: 

Winter Olympics Targeted:

Meet The Fancy Bears:

« Alphabet Launches A Cybersecurity Company - Chronicle
Killer Robots Will Be Ubiquitous In The US Army »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.