High Tech Police Tool Up For Winter Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around the venues, in order to protect the events.

All kinds of measures are being used to prevent all forms of terrorism, to handle traffic, cyber attacks and to manage the highly anticipated visit of a large North Korean delegation, the senior police official overseeing the Winter Olympics explained in a briefing to foreign reporters in Seoul.

“The success of the Games lies in the prevention of any threat of terrorism,” said Director General Kim Gyo-tae, who heads the Pyeongchang 2018 Olympic Winter Games Police Task Force. “That is the focus of our efforts.”

In the past, North Korea has posed a deadly security risk for major sporting events in the South. In 1987, one year prior to the 1988 Seoul Summer Olympics, North Korean agents blew up a South Korean airliner in the Middle East, killing all 115 persons aboard.

“We are in coordination with global intelligence authorities, in close contact,” Kim continued. One result of this coordination is that a list of 30,000 suspects who will be prevented from entering South Korea has been drawn up.

For now, no threats have been made towards the safety of the Winter Olympics. “As of now, we have not received any information on crucial terror threats that might be executed during the Games,” Kim said.

Kim declined to speak on which military assets would be deploying alongside his police units.

Measures are being taken against airborne, vehicle-borne and cyber-attacks and also against a range of weaponry, from firearms to chemical and biological agents.

Regarding biological and chemical threats, the police are coordinating with the nation’s atomic-energy agency, disease-prevention centers and emergency services, Kim said.

As was said before, more than 10,000 officers will be deployed on duties ranging from traffic control to counter-terrorism, including “hundreds” of SWAT (Special Weapons And Tactics) and counter-terrorist officers.

Many officers will carry specialised smartphones, “Poliphones”, loaded with apps that enable vehicle license-plate scanning, fingerprint scanning, searches for missing children, information on suspects, and emergency response.

A no-fly zone, extending to a radius of 4-5 kilometers around venues and with a ceiling of 1,200 meters, will be enforced. “Our basic stance is that there will be no drones,” Kim said. Special devices will be deployed that jam drone frequencies, and units armed with special weapons will be on hand to bring down any unmanned aerial vehicles (UAVs) that bypass these measures.

Horse-borne officers will be utilised for amicable crowd control, while quick reaction units on skis and snowmobiles will be used in the mountains.

Vehicle and pedestrian checkpoints will be established around venues, which will be equipped with X-ray machines to check incoming baggage. Police foot patrols will be constant around venues and the athletes’ village.

Smart police cars, which can scan car license plates while driving, will be used to track down stolen vehicles. Locations with steep inclines, and those where people gather to wait for buses, that is, areas that are prone to vehicle-borne attacks, will be shielded with barricades.

Traffic control will be a particularly critical task given that the Lunar New Year holiday, an annual “traffic hell” during which roads nationwide are customarily jammed, falls in the middle of the Games.

With North Korea expected to attend the Games, inter-Korean negotiations on the size of the Northern team are expected shortly, one potential terrorist risk may have evaporated. “Some have said this could decrease risks of terrorism,” Kim said. “But we consider all risks; we are going to remain vigilant going forward.”

I-HLS

You Might Also Read: 

Winter Olympics Targeted:

Meet The Fancy Bears:

« Alphabet Launches A Cybersecurity Company - Chronicle
Killer Robots Will Be Ubiquitous In The US Army »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies