High Tech Police Tool Up For Winter Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around the venues, in order to protect the events.

All kinds of measures are being used to prevent all forms of terrorism, to handle traffic, cyber attacks and to manage the highly anticipated visit of a large North Korean delegation, the senior police official overseeing the Winter Olympics explained in a briefing to foreign reporters in Seoul.

“The success of the Games lies in the prevention of any threat of terrorism,” said Director General Kim Gyo-tae, who heads the Pyeongchang 2018 Olympic Winter Games Police Task Force. “That is the focus of our efforts.”

In the past, North Korea has posed a deadly security risk for major sporting events in the South. In 1987, one year prior to the 1988 Seoul Summer Olympics, North Korean agents blew up a South Korean airliner in the Middle East, killing all 115 persons aboard.

“We are in coordination with global intelligence authorities, in close contact,” Kim continued. One result of this coordination is that a list of 30,000 suspects who will be prevented from entering South Korea has been drawn up.

For now, no threats have been made towards the safety of the Winter Olympics. “As of now, we have not received any information on crucial terror threats that might be executed during the Games,” Kim said.

Kim declined to speak on which military assets would be deploying alongside his police units.

Measures are being taken against airborne, vehicle-borne and cyber-attacks and also against a range of weaponry, from firearms to chemical and biological agents.

Regarding biological and chemical threats, the police are coordinating with the nation’s atomic-energy agency, disease-prevention centers and emergency services, Kim said.

As was said before, more than 10,000 officers will be deployed on duties ranging from traffic control to counter-terrorism, including “hundreds” of SWAT (Special Weapons And Tactics) and counter-terrorist officers.

Many officers will carry specialised smartphones, “Poliphones”, loaded with apps that enable vehicle license-plate scanning, fingerprint scanning, searches for missing children, information on suspects, and emergency response.

A no-fly zone, extending to a radius of 4-5 kilometers around venues and with a ceiling of 1,200 meters, will be enforced. “Our basic stance is that there will be no drones,” Kim said. Special devices will be deployed that jam drone frequencies, and units armed with special weapons will be on hand to bring down any unmanned aerial vehicles (UAVs) that bypass these measures.

Horse-borne officers will be utilised for amicable crowd control, while quick reaction units on skis and snowmobiles will be used in the mountains.

Vehicle and pedestrian checkpoints will be established around venues, which will be equipped with X-ray machines to check incoming baggage. Police foot patrols will be constant around venues and the athletes’ village.

Smart police cars, which can scan car license plates while driving, will be used to track down stolen vehicles. Locations with steep inclines, and those where people gather to wait for buses, that is, areas that are prone to vehicle-borne attacks, will be shielded with barricades.

Traffic control will be a particularly critical task given that the Lunar New Year holiday, an annual “traffic hell” during which roads nationwide are customarily jammed, falls in the middle of the Games.

With North Korea expected to attend the Games, inter-Korean negotiations on the size of the Northern team are expected shortly, one potential terrorist risk may have evaporated. “Some have said this could decrease risks of terrorism,” Kim said. “But we consider all risks; we are going to remain vigilant going forward.”

I-HLS

You Might Also Read: 

Winter Olympics Targeted:

Meet The Fancy Bears:

« Alphabet Launches A Cybersecurity Company - Chronicle
Killer Robots Will Be Ubiquitous In The US Army »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.