High Tech Police Tool Up For Winter Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around the venues, in order to protect the events.

All kinds of measures are being used to prevent all forms of terrorism, to handle traffic, cyber attacks and to manage the highly anticipated visit of a large North Korean delegation, the senior police official overseeing the Winter Olympics explained in a briefing to foreign reporters in Seoul.

“The success of the Games lies in the prevention of any threat of terrorism,” said Director General Kim Gyo-tae, who heads the Pyeongchang 2018 Olympic Winter Games Police Task Force. “That is the focus of our efforts.”

In the past, North Korea has posed a deadly security risk for major sporting events in the South. In 1987, one year prior to the 1988 Seoul Summer Olympics, North Korean agents blew up a South Korean airliner in the Middle East, killing all 115 persons aboard.

“We are in coordination with global intelligence authorities, in close contact,” Kim continued. One result of this coordination is that a list of 30,000 suspects who will be prevented from entering South Korea has been drawn up.

For now, no threats have been made towards the safety of the Winter Olympics. “As of now, we have not received any information on crucial terror threats that might be executed during the Games,” Kim said.

Kim declined to speak on which military assets would be deploying alongside his police units.

Measures are being taken against airborne, vehicle-borne and cyber-attacks and also against a range of weaponry, from firearms to chemical and biological agents.

Regarding biological and chemical threats, the police are coordinating with the nation’s atomic-energy agency, disease-prevention centers and emergency services, Kim said.

As was said before, more than 10,000 officers will be deployed on duties ranging from traffic control to counter-terrorism, including “hundreds” of SWAT (Special Weapons And Tactics) and counter-terrorist officers.

Many officers will carry specialised smartphones, “Poliphones”, loaded with apps that enable vehicle license-plate scanning, fingerprint scanning, searches for missing children, information on suspects, and emergency response.

A no-fly zone, extending to a radius of 4-5 kilometers around venues and with a ceiling of 1,200 meters, will be enforced. “Our basic stance is that there will be no drones,” Kim said. Special devices will be deployed that jam drone frequencies, and units armed with special weapons will be on hand to bring down any unmanned aerial vehicles (UAVs) that bypass these measures.

Horse-borne officers will be utilised for amicable crowd control, while quick reaction units on skis and snowmobiles will be used in the mountains.

Vehicle and pedestrian checkpoints will be established around venues, which will be equipped with X-ray machines to check incoming baggage. Police foot patrols will be constant around venues and the athletes’ village.

Smart police cars, which can scan car license plates while driving, will be used to track down stolen vehicles. Locations with steep inclines, and those where people gather to wait for buses, that is, areas that are prone to vehicle-borne attacks, will be shielded with barricades.

Traffic control will be a particularly critical task given that the Lunar New Year holiday, an annual “traffic hell” during which roads nationwide are customarily jammed, falls in the middle of the Games.

With North Korea expected to attend the Games, inter-Korean negotiations on the size of the Northern team are expected shortly, one potential terrorist risk may have evaporated. “Some have said this could decrease risks of terrorism,” Kim said. “But we consider all risks; we are going to remain vigilant going forward.”

I-HLS

You Might Also Read: 

Winter Olympics Targeted:

Meet The Fancy Bears:

« Alphabet Launches A Cybersecurity Company - Chronicle
Killer Robots Will Be Ubiquitous In The US Army »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.