• Title/Summary/Keyword: International Terrorism

Search Result 132, Processing Time 0.028 seconds

The Korea's indiscretion in maritime-terrorism and the counter plan (한국 해양테러의 실태 및 대응방안)

  • Park, Jun-seok;Park, Yu-Deuk;Kim, Gi-sang
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.79-93
    • /
    • 2007
  • With international urgence of terror situation, many methods of terror techniques and skills are appearing and more intense and threatening terror is braking out not only in the air(plane), but also in the sea(ship). Korea is surrounded by 3 sides of sea and is a proud maritime nation that should advance to foreign country through the sea because South Korea and North Korea are confronting. Korea depend on the maritime transportation, 99.7% of exporting, importing material resources. Therefore, acquisition of the marine safety has the great affect on national security and economical life. On the high tension of situation about threat and possibility of maritime terroism, the potential ways of the improvement policy for counter-tactics against big maritime terror are the following. First, we should construct clear and well-organized network for accurate information about maritime terrorism Second, we should have the information of all domestic, foreign passenger's ships Third, national important facilities such as atomic energy plant, thermo-electric power plant, shipyard need policies to manage all emergency situation Fourth, government authorities should improve tactic abilitities by competing with support and budget inside of nation as well as outside of nation. To develop big maritime terror of our country, we will have to hold cooperative training & tactics contest of big maritime terror by cooperating educational industry organization with similar institute, improve the ability of members of big terror and acquire tactics information by excavating and exchanging a new technique through tactics seminar and public hearing.

  • PDF

Theoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror - (사이버범죄에 대한 국가적 대응체계 구축의 이론적 함의 -사이버테러형 범죄를 중심으로-)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.165-171
    • /
    • 2009
  • From the late 20th century, rapidly progressing information communication technology and spreading Internet all over the world cause many reverse functions when there is a conversion into the new information society. One of them is cyber terrorism as cyber crime. Cyber terrorism gradually has had a serious problem in the national security as well as the domestic aspects. Therefore, this study looked into the present condition of cyber terrorism, discussed its prospect, and sought the efficient national countermeasure methods against cyber terrorism by comparing other countries' countermeasure systems currently.

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF

A Study on Hometown Terrorism Possibility and Measures in Multiculturalism (다문화주의에 따른 자생테러리즘의 가능성과 대책에 관한 연구)

  • Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.1-19
    • /
    • 2010
  • As the world becomes more global, entry simplification measure increases many foreigners' entry and international marriage around the low income countries of southeast Asia. Those are adding multicultural phenomena to Korean society, which has a bad influence on public order environment and leads to side effect in society. Since the 9/11 terror attacks, a sudden increase in the threat of terror has been worldwide. Besides, the threat tends toward New Terrorism and contributes to factor to social malaise in Korea. Therefore, this study examines all the possibilities of hometown terrorism by multiculturalism and suggests measures for it. To achieve this, it is required to lead the people's understanding and national participation for multiculturalism. The mature civic awareness should be given priority over any others, which means the understanding and consideration of various countries' cultures and traditions. It is also necessary to inspect the dangers of hometown terrorism. Furthermore, there should be an urgent need for an institutional device to prevent and suppress terror through a close examination of countermeasures system of terror.

  • PDF

Analysis and Prospect on the Terrorism in China: Focusing on the Xinjiang Uighur (중국의 테러리즘 분석과 그 전망: 신장 위구르족을 중심으로)

  • Lee, Dae-Sung;Kim, Tae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.218-226
    • /
    • 2014
  • China has become a G-2 Superpower country as result of rapid economic growth through the reform and opening-up in these days. It expressed its confidence by helding a few big international events, such as Bejing Olympic Games. Shanghai Expo. Though most Chinese people give their agreement and support to the government, there are serious, ill-concealed political problems behind the curtain in China. As a multi-ethnic nation, China has repeated experience of fragmentation and integration of various ethnic groups through her long history. In spite of top-level political leaders of communist party always concern the issues of separatism very sensitively, China has suffered occasional bloodshed terrorism because of erupting ethnic and religious conflicts. Especially there are many disruption and fear due to the bloodshed and terrorism by a minority race-seperatists of Uighur tribe in Xinjiang province. The Uighur in Xinjiang province is very different from major Chinese Han ethnically and culturally. Although Chinese government has presented various policies in order to suppress the Uighus's desire for seperation, they have not been able to offer a fundamental, satisfying solution. Because we, Korean people face the expansion of possibility of conflicts, such as increasing of foreign workers, multi-cultural families and extremists. At this point, I believe we can learn valuable lessons from Chinese experiences for anti-terrorism.

A Study on 2010 Beijing Convention for Antiterrorism of International Aviation - Compared Beijing Convention(2010) with Montreal Protocol - (국제항공테러방지 북경협약(2010)에 관한 연구 - 몬트리올협약과의 비교를 중심으로 -)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.79-112
    • /
    • 2010
  • The Beijing Convention of 2010 taken together effectively establishes a new broader and stronger civil aviation security framework. This adoption would significantly advance cooperation in prevent of the full range of unlawful acting relation to civil aviation and the prosecution and punishment of offenders. First, the Beijing Convention of 2010 will require parties to criminalize a number of new and emerging threats to the safety of civil aviation, including using aircraft as a weapon and organizing, directing and financing acts of terrorism. These new treaties reflect the international community's shared effort to prevent acts of terrorism against civil aviation and to prosecute and punish those who would commit them. Second, this convention will also require States to criminalize the transport of biological, chemical, nuclear weapons and related material. These provisions reflect the nexus between non-proliferation and terrorism and ensure that the international community will act to combat both. Third, this Convention shall not apply to aircraft used in military, customs or police services. As a substitute, International Humanitarian Law will be applied in a case. Moreover, the National Jurisdiction and the application of the law will be extended farther. The treaty promotes cooperation between States while emphasizing the human rights and fair treatment of terrorist suspects.

  • PDF

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

Introducing Best Model of Global Terrorism Database: The Case of START Center in the U.S. (국제테러리즘데이터베이스 구축: 미국의 START 센터의 모범사례의 소개)

  • Kim, Eun-Young;Park, Sun-Young
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.7-36
    • /
    • 2013
  • Collecting international terrorism database is a challenging task not only for criminal justice personnel but also for criminologists in comparison to the case of common types of crime database. Yet, there has been growing interests and efforts in establishing a comprehensive terrorist events data base in the world. This current study has a goal to introduce an example world terrorism database case developed by START center in the United States. The START center developed the Global Terrorism Database (GTD) on the basis of by the Pinkerton Global Intelligence Service data (PGIS) originally collected by the Pinkerton. Furthermore, The START expended the GTD by collecting data from open source terrorist event data via internet and other resources. In this study, specifically, it describes the development and the nature of the GTD in general and the data collection efforts made by the STATA until today. Finally, this study provides a sketchy of the nature of the GTD data by showing the descriptive statistical analyses and time-series analyses result illustrating distribution of the world terrorism events. The limitation, policy implications and contribution of this study discussed in this paper.

  • PDF

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF