경호 위해사건 사레분석을 통한 경호제도 개선방안 연구

To achieve political and social goals, terrorism in terms of creating fear from people with their lives, freedom and heath, possessions is becoming a global threat and thus a big issue in the world today. Upon different terrorism approaches the type that tends to threat lives of country leaders differentiates with terrorism among civilians in terms that the effect can monopolize the nation's security and the administrative power in short time span. Though each nation has its own security methods and personnel the structure seems to be different from one country to another, but the main purpose remains the same allover the world The top priority of these men in arms would be to protect the "victim" at all cause and come up with a resolution to prevent harm. Thus, the security offices, to protect the victims from assassinations and terrorism, are working on developing resolutions to prevent such incidents. Each office has its own unique security programs to protect the victim and so to enclose relevant information they are keeping strict guard. But, as time progresses the methods of terrorism and assassinations are increasingly becoming diverse in their technological, scheme and party. The system should be thus carefully analyzed and monitored to be upgraded to meet the requirements to fulfill the needs in the world today. This thesis explains the basics of the security activity in general and proposes alternate methods that can meet the needs in the changing world of terrorist activities through various examples. The analysis process does not put emphasis on the detailed professional security measure but rather on the basic conduct. Also, it has it' s reference on the foreign security system rather than the local. According to the analysis of security methods so far comes to the following summary, First, the security information activity program should be promoted actively to gather and analyze before the incident occurs. This gathered information then should be shared among relevant groups. When gathering security data from other information institutes the security data gathered should be carefully inspected for authorization before use. Secondly, the security activities must include the enclosure of the client's itinerary. Most terrorism activities occur when this information has leaked out. And for the antagonist, this information becomes most important. Thus in the case of public events the schedule of the client has to be enclosed as much as possible and for the disclosed information already out, necessary precautions should be maintained ahead of time. Thirdly, preventive measures should be enforced to enhance protection of relevant information, security and safety measures for prevention of catastrophe. It is also important to discover weak spots in the security region. But as mentioned ahead a 100% prevention measure is not possible and the security protection program should be ready for all kinds of sudden changes. Fourth, in the case of close protection of the client the guard should be taken in all directions and in the case of an emergency protection should be prepared in advance in form of tentative reflex as guiding the client to a safe area first aid. In conclusion, the protecting party should always be aware that even though there may be a heavily enforced security program set, the client will always be enclosed to danger thus always tense. The antagonist always thrives for the weakest spot and searches for the easiest way to approach the victim that is why the above becomes very important. Also, even though the client has been protected the 4 nation security institutes still holds fault for letting the incident happen. The method of security studies will be bettered once the protection program evolves as the years progresses and thus in the future a more developed method will be introduced.