High Tech Police Tool Up For Winter Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around the venues, in order to protect the events.

All kinds of measures are being used to prevent all forms of terrorism, to handle traffic, cyber attacks and to manage the highly anticipated visit of a large North Korean delegation, the senior police official overseeing the Winter Olympics explained in a briefing to foreign reporters in Seoul.

“The success of the Games lies in the prevention of any threat of terrorism,” said Director General Kim Gyo-tae, who heads the Pyeongchang 2018 Olympic Winter Games Police Task Force. “That is the focus of our efforts.”

In the past, North Korea has posed a deadly security risk for major sporting events in the South. In 1987, one year prior to the 1988 Seoul Summer Olympics, North Korean agents blew up a South Korean airliner in the Middle East, killing all 115 persons aboard.

“We are in coordination with global intelligence authorities, in close contact,” Kim continued. One result of this coordination is that a list of 30,000 suspects who will be prevented from entering South Korea has been drawn up.

For now, no threats have been made towards the safety of the Winter Olympics. “As of now, we have not received any information on crucial terror threats that might be executed during the Games,” Kim said.

Kim declined to speak on which military assets would be deploying alongside his police units.

Measures are being taken against airborne, vehicle-borne and cyber-attacks and also against a range of weaponry, from firearms to chemical and biological agents.

Regarding biological and chemical threats, the police are coordinating with the nation’s atomic-energy agency, disease-prevention centers and emergency services, Kim said.

As was said before, more than 10,000 officers will be deployed on duties ranging from traffic control to counter-terrorism, including “hundreds” of SWAT (Special Weapons And Tactics) and counter-terrorist officers.

Many officers will carry specialised smartphones, “Poliphones”, loaded with apps that enable vehicle license-plate scanning, fingerprint scanning, searches for missing children, information on suspects, and emergency response.

A no-fly zone, extending to a radius of 4-5 kilometers around venues and with a ceiling of 1,200 meters, will be enforced. “Our basic stance is that there will be no drones,” Kim said. Special devices will be deployed that jam drone frequencies, and units armed with special weapons will be on hand to bring down any unmanned aerial vehicles (UAVs) that bypass these measures.

Horse-borne officers will be utilised for amicable crowd control, while quick reaction units on skis and snowmobiles will be used in the mountains.

Vehicle and pedestrian checkpoints will be established around venues, which will be equipped with X-ray machines to check incoming baggage. Police foot patrols will be constant around venues and the athletes’ village.

Smart police cars, which can scan car license plates while driving, will be used to track down stolen vehicles. Locations with steep inclines, and those where people gather to wait for buses, that is, areas that are prone to vehicle-borne attacks, will be shielded with barricades.

Traffic control will be a particularly critical task given that the Lunar New Year holiday, an annual “traffic hell” during which roads nationwide are customarily jammed, falls in the middle of the Games.

With North Korea expected to attend the Games, inter-Korean negotiations on the size of the Northern team are expected shortly, one potential terrorist risk may have evaporated. “Some have said this could decrease risks of terrorism,” Kim said. “But we consider all risks; we are going to remain vigilant going forward.”

I-HLS

You Might Also Read: 

Winter Olympics Targeted:

Meet The Fancy Bears:

« Alphabet Launches A Cybersecurity Company - Chronicle
Killer Robots Will Be Ubiquitous In The US Army »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Lookout

Lookout

Lookout takes a mobile-first approach to security and protects mobility for some of the world's largest enterprises, critical government agencies, and millions of individuals worldwide.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.