首页 | 本学科首页   官方微博 | 高级检索  
     检索      

恐怖袭击风险减缓实例分析
引用本文:张峥,吴宗之,刘茂.恐怖袭击风险减缓实例分析[J].中国安全科学学报,2004,14(2):95-97.
作者姓名:张峥  吴宗之  刘茂
作者单位:1. 南开大学城市公共安全研究中心
2. 国家安全生产监督局安全科学技术研究中心
基金项目:“十五”国家科技攻关计划课题“城市公共安全规划与应急预案编制及其关键技术研究” (2 0 0 1BA80 3B0 1)
摘    要:为避免被安全机构监视和追踪 ,恐怖组织常常利用网络结构的优势 ,通过对被动支持者的渗透 ,以突然出现的聚集群方式发动恐怖袭击。军队、警察等传统的反恐工具在试图压制这种多源性恐怖活动时将面临更大挑战。以“东突”问题为例 ,应用物理学的渗透概念模拟特定区域恐怖袭击威胁的形成机理 ,从理论上分析了采取非破坏性手段减缓恐怖袭击风险的可行性。

关 键 词:恐怖主义  恐怖袭击  渗透  “东突”
修稿时间:2003年11月1日

A Case Study on Mitigating the Risk of Terror Attack
ZHANG Zheng,Senior Engineer WU Zong-zhi,Prof. LIU Mao,Prof..A Case Study on Mitigating the Risk of Terror Attack[J].China Safety Science Journal,2004,14(2):95-97.
Authors:ZHANG Zheng  Senior Engineer WU Zong-zhi  Prof LIU Mao  Prof
Institution:ZHANG Zheng1,Senior Engineer WU Zong-zhi2,Prof. LIU Mao1,Prof.
Abstract:Terrorists usually take advantage of alternative forms of network structure to avoid being monitored and tracked by the security services, and to operate a terror attack by sudden swarm of cluster through immergence of passive supporters. Conventional counter-terrorist forces such as military and police will face a greater challenge in trying to suppress the terrorism with multi-originated feature. East Turkistan terrorist issue is taken as a case to simulate and analyze the evolution mechanism of a given regional terror attack threat, using physical concept of percolation. The feasibility to mitigate the risk of terror attack by non-destructive measures is theoretically analyzed.
Keywords:Terrorism  Terror attack  percolation  East Turkistan
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号