All Articles

  • Today, national security throughout the world is expanding and deepening the scope and types of transnational threats such as terrorism, cybercrime, weapons of mass destruction, and drug offenses. In recent years, transnational national security threats have been dominated by non-state actors, such as individuals or various interest groups within a country, multinational corporations, international organizations, and terrorists. As these non-state actors transcended borders, their importance and role in the international society increased. In the past, information activities were mainly conducted at the national level, but the task of collecting and analyzing information about non-state actors was added. On the other hand, potential terrorism threats that threaten national security is different from traditional security threats in response. Traditional security threats, such as war and military threats, could be resolved to some extent by a realistic approach that focuses on alliances, balance of power, and collective security measures across countries. However, transnational security issues such as terrorism are largely out of the realistic framework of consciousness, and information security cooperation among nations can be relatively smooth because of the low possibility of a security dilemma in the case of such a transnational security threat. Transnational crimes that threaten national security are far more difficult tasks than traditional warfare with traditional sovereign states. It is not easy to capture the target of the terrorist organization easily, it carries out the war in the form of defensive rather than the attack by nature, and even if the current leader of the terrorist organization is arrested or dies, the successor appears constantly and it is very difficult to reach the final crush. In addition, the bottom of the issue of terrorism is based on the assumption of religion and conviction that most terrorist organizations are convinced of their final victory and never accept defeat, so that the war on terror is much more difficult and persistent than the war between countries. In addition, terrorism is a deadly threat to national security because terrorist organizations do not limit their targets even in case of attacks against innocent civilians. The emergence of such transnational threats further demands a close link between the national intelligence community and the law enforcement community. Thus, national intelligence also demands a statutory understanding comparable to that of law enforcement, which is the incarnation of the rule of law. Therefore, only when it is accompanied by a lawful understanding and understanding of national intelligence, it will provide permanent and constant value to national intelligence activities. It can be said that it is a way to systematically develop democracy, openness and national intelligence, but it should be done within the scope that the purpose of counterterrorism based on rule of law is not undermined.
    Keyword:National Security, National Security Crime, Terrorism, Transnational Crime, Security Dilemma
  • The reason why intelligence agencies investigating the crimes that threaten national security, such as terror-ism today, uses location tracking in its investigation is that it is the most effective way to investigate individuals, who were at the scene of crime, to identify suspects. In this case, the intelligence agency and the investigation agency will acquire the number of all mobile phones through the base station that is responsible for the area in question, and if there exist a certain phone number and a number of call records already known by the intelli-gence agency and investigation agency, information of a specific person to be responsible for the crime-related behavior, then the scope of investigation is limited to the telephone numbers of persons who have shown com-munication or conduct related to crime such as communication information that has been confirmed to stay in a nearby area for a long time or that they have also contacted other base stations related to the crime. However, location tracking using a base station will also get a minimum amount of calls for people who are not related to the crime. In some cases, the information that communicates with a particular base station is equivalent to the information that the communication was present near the base station. Therefore, even if the accuracy of the location information is low as long as the location information is obtained through base station investigation, the location information through base station investigation is strong. For these reasons, it is argued that it should be protected and should not be included in the communication confirmation data. Finally, if not included in the data confirming the communication, the protection of the level of the search warrants should be maintained, and related legislation on crimes that threaten national security, such as terror-ism, should be closely discussed and examined.
    Keyword:Location Tracking Investigation, Base Station Investigation, Communication Data, Communication Identification Data, National Security
  • The dominant religion in the Middle East is Islam. Since the 6th century, Islam was born in the Middle East and spread far into Western Europe, North Africa, and Southeast Asia. The pre-Islamic Middle East was a tribal society, not a centralized political system. Muhammad promoted the integration of the Arab nation, abolished polytheism, such as totemism and propagated monotheism. Islam has been regarded as the first principle to govern the politics and society of other peoples except the Jewish people in the Middle East. Muslims in the Middle East began to perceive threats to existing order destruction, as the expansion of Islam and the golden age declined, clashes with Christian civilization, and Western colonization of the Middle East. In particular, the peoples of this region tried to overcome the confusion of the Islamic community by experiencing the invasion of Western powers and colonial rule since the modern era. In addition, since the modern era, the birth of ethnocentric independent nations has been achieved in this region. Four nations built different national states, and in the course of the process, there was a conflict between the nations. In particular, the clash between Zionism and Arab nationalism has lasted for 70 years, and there is a general war, local conflict, and terrorism. Most Muslims want peace and social stability, but radicals called "Jihadists" are using indiscriminate and brutal means of terrorism to realize their idealistic society. The Jihadism they claim is different from the Jihadism, which most peaceful Muslims say. On the other hand, the extremist group does not disappear completely, and when the forces begin to weaken, new derivative organizations were created. is created. In recent years, IS(ISIS), which has occupied Syrian and Iraq territories and declared the state, has become more and more disintegrated, but the potential threat of terrorism is taken seriously as its members disperse to other regions.
    Keyword:Middle East, Jihad, Nationalism, IS, Salafist Terrorism
  • This study attempted to analyze the main causes of terrorist incidents. The purpose of this study is to see how it affects terrorist attacks. In particular, this study focused on Ripple Effect. The factors that can be identified before the terrorist attacks were classified as One Ripple Effect as it can detect the phenomenon before the terrorist attacks. These processes would be able to respond in a precise way to reduce terrorist damage. The result of analysis showed that ideology and poverty of the country were not the factors that raised the level of terror damage. Thus, it was confirmed that the damage was increased in the case of Ripple Effect. This was a natural consequence. However, this study could suggest that the variables constructed to identify the ripple effect were measured as identifiable factors before the terrorist attacks, so that prompt and precise responses were required under the same circumstances. This study used Global Terrorism Data(GTD) for research analysis. Data was analyzed from 2014 to 2016, and the raw data was used. In order to measure the independent variables that this study wanted to check, variables were transformed and used in analysis. The independent variables used for this analysis were Ideology, Ripple Effect, and Money Demand. In addition, the dependent variable was used as a damage that combines the wounded and Kills(including terrorists) in the event of terrorism. In the final model, the Money Demand variable was not regularized and was excluded. It is the limit of this study that the poverty of the country is to be confirmed through Money Demand. However, it is clear from the point of view that the demand for money is a proof of poverty, and that the research has proceeded. In conclusion, even in the case of terrorism based on ideology and national poverty, there should be a more precise response to the reduction of damage in the situation where Ripple Effect is predicted. The variables that make up the Ripple Effect include political objectives, message delivery, and terrorist targets. Therefore, even though we did not control many variables, it can be based on the fact that concrete action should be prepared in a situation where there is a concern about ripple effect.
    Keyword:Terrorism, Ripple Effect, Poverty, Ideology, Terrorist Damage
  • North Korea has launched a number of missile tests and developed different kinds of missiles. As you know, a ballistic missile can be used as a means for Weapons of Mass Destruction(WMD) by flying most of the flight time outside the atmosphere at high speeds. Due to its flight characteristic, it is difficult to estimate and predict the trajectory of the end-stage flight. In addition, there are technical difficulties in terms of defense. These ballistic missile threats are continuing to be developed since more than 25 countries are in possession of ballistic missiles, such as silos, transportable chemicals, biological or nuclear weapons. After the end of the Cold War, Third World states started to possess some forms of ballistic missiles. That has created a serious security threat, and in particular, the development of North Korean nuclear capabilities and WMD which are threats to Northeast Asian security. Moreover, the participation of Third World states in missile development and technology has been significantly increased. For instance, North Korea's rocket technology is reached at a certain level. And, in December 2012, the satellites of Taepodong-3, a 10,000-km-class ICBM rocket, were orbited. As a result, these threats have now become a global security threat, including to the United States and out of Northeast Asia. Through its experience in developing ballistic missiles over the last three decades, it is true that North Korea has technological limitations, such as reentry technology and miniaturization of nuclear warheads. North Korea conducted the fourth nuclear test with “test hydrogen” in January 2016 and conducted the sixth nuclear test with the “hydrogen bomb for intercontinental ballistic missile(ICBM)” in September 2017. In his 2018 New Year’s Speech, Kim Jong Un announced the “historic accomplishment of completing our nuclear capabilities.” In July and November of the same year, he “successfully” fired the ICBM tests. After all, Kim Jong Un declared "the achievement of the historical cause of the nation's nuclear armed forces and the achievement of the rocket-powered nation" to the world. In the context of this situation, we should analyze North Korea’s ballistic missiles technological level and prospect in near future. Especially, since North Korea had tried to accomplish nuclear experiment and SLBM/ICBM launch, it is very important to evaluate North Korea’s missiles technology and limitations and prospect North Korea’s next action. In order to complement technological problems, North Korea has secured continuous technology both domestically and internationally. I will make an effort to analyze North Korean technological problems. Lastly, we prospect that North Korea will cease all nuclear and ICBM testing and open to dialogue with the modes of negotiation. However, at the same time, there are some contradictions that prospect it will continue to pursue nuclear and missile capabilities by buying more time . In this context, my report will briefly assess North Korea's military behavior.
    Keyword:Missile Technology, North Korea, Ballistic Missiles, Reentry Technology, Nuclear Warhead
  • As Korea is changing into a multi-racial and multicultural society, the number of immigrants has exceeded two million people, making heterogeneous members in Korea society increase. The changes in Korean society are similar to those of the international migration phenomenon that occurs globally. The phenomenon that individuals of diverse nationalities leave their origin country affects the various institutions of origin and destination countries, playing a key role in social transformation. However, not everyone agrees with this change. There is also a movement to resist social change derived from international migration, which usually appears in the form of fundamentalism. In addition, social and economic instability is presented as a key link in the process of transforming this fundamentalism into violent extremism. It is argued that radicalization and violent extremism are root cause of recent terrorist attacks in Europe as a form of lone wolf terrorism. Even though political and religious motives are different from each case, it is remark-able to focus that radicalism and violent extremism are commonly observed in these cases as the underlying causes. Republic of Korea is not free from violent extremism spreading to Asia, making it urgent to homegrown terrorism and lone wolf terrorism. In order to prevent violent extremism, all aspects of social efforts are required. Therefore, it is appropriate to prevent violence from the economic, social and educational level as well as the law enforcement related to police activities. That is, the response to radicalism is characterized by a social and economic response to the improvement of the environment that promotes radicalization and the spread of violent extremism, in which not only the government but also religion, education, business, and civil society participate. In particular, it is pointed out that the social integration of social minority groups and vulnerable groups, which can be transformed into violent extremism with radicalism, is the most important. This article is an exploratory research for the prevention of violent extremism in the context of Korea Peninsula, reviewing on the explanatory models on violent extremism.
    Keyword:Radicalization, Violent Extremism, Terrorism, Counterterrorism, Countering Violent Extremism
  • In recent years, the world has been emphasizing the role of intelligence agencies in the field of telecommunications aimed at strengthening the response to acts that threaten national security, such as the threat of inter-national terrorism. In particular, crimes against national security such as espionage or terrorism are committed by the criminals who have been trained outside domestic territory, observing their own strict security regulations. For these reasons, investigations on communications conducted by criminals who attempt and direct is essential to investigation crime against national security. Considering legislations on telecommunication restrictions in some advanced countries, the United Kingdoms has enacted the Investigatory Powers Act(IPA 2016) to counter threats to national security and serious crimes, allowing investigative agencies, security and intelligence agencies to monitor a large scale of surveillance. The United States has implemented the CALEA, the Patriot Act, the FISA, and the ECPA, which are legally enforced by law. It is necessary to revise the important part of the domestic communication confidentiality protection law against the crimes which threatens the national security by referring to the matters concerning the communication restriction law of major countries. In the context of IoT communication, individuals, society, and the nation are linked to one fate community through the transmission and reception of packet data over the Internet. Also, telecommunications infrastructures are subject to territorial domination as tangible goods, it is necessary to understand national security as "the safekeeping of the nation as a whole".
    Keyword:National Security, Terrorism, Investigations in Telecommunication, Investigatory Agency, Intelligence Agency
  • Technological and economic development after the World War II promoted the increase of the free movement of goods, services and people, which led to globalization. Contrary to positive expectations for the globalization, it has brought negative side effects such as globalization of crime and international disorder by illegal subnational actors. The phenomenon of international disorder as a dysfunctional element in the process of globalization is expected to increase more rapidly in the future. One of these threats is transnational crime. Transnational crime refers to crimes related to two or more sovereign states, such as the subject, object, act, the benefit, and outcome of a crime. As these transnational crimes increase, closer cooperation with foreign countries is required for prevention, investigation, prosecution, trial and punishment of crime. However, it is questioned whether the traditional system of mutual legal assistance in criminal matters can be played as an effective countermeasure against transnational crimes becoming globalized and widened both quantitatively and qualitatively. Therefore, it is emphasized that the need to reorganize the existing system of mutual legal assistance in criminal matters to be effective. Based on these problems, the purpose of this study is to find ways to build international cooperation on police activities in Northeast Asia for transnational threats, focused on transnational crimes. Due to the various problems inherent in the traditional legal mutual assistance in criminal matters, actual cooperation on mutual legal assistance in criminal matters is not often achieved. Moreover, the new type of mutual legal assistance in criminal matters as bilateral treaties has not been joined in Northeast Asia, and cooperation through international criminal police organizations may concern about violation in human rights. Therefore, it is necessary to discuss how to prevent and suppress these crimes while promoting free movement of individuals and exchange and cooperation. In this article, one of these problematic situations was discussed the international cooperation plan of police activities and suggested the recommendations for improvement.
    Keyword:National Security, Transnational Threat Transnational C rime , Mutual Legal Assistance in Criminal Matters , National Security in Northeast Asia
  • In recent years, terrorist organizations and activities in the Middle East have been led by Al-Qaeda and its following terrorist organizations. However, the Islamic countries(IS), the Islamic extremist Sunni militant group, takes the lead as a new leading terrorist groups. In other words, many terrorist organizations that followed Al Qaeda are no longer under command of Al Qaeda, but tend to rely on IS organizations for financial and technical support and exchanges. The IS, which emerged as a new leader, is making radical changes such as securing terrorist organizations to take over the ideals of Islam fundamentalism and Jihad against the Western world. As the al Qaeda couldn't sustain the leading position after the death of Bin Laden, the al Qaeda lost its directions in terrorist groups. The IS declared the establishment of the Islamic State, dominating the regions in Iraq and Syrian territory. In Africa, a new terrorist organization, Boco Haram, emerged as a terrorist group in the world in April 2015, when 276 Nigerian girls were kidnapped. In a word, bin Laden who was the leader of the Islamic terrorist group in the Middle East, had died, but the activities of the new terrorist groups are even more arousing and threatening the international community. Therefore, in order to understand the trends of international terrorist organizations, it is necessary to examine the domestic and international situation in the Middle East. Dynamics in terrorist groups including al Qaeda and the IS organizations are complex and the conflicts and stances between Sunni and Shi'a have been more increasing than ever. In particular, Syrian civil war, a center of the Middle East terrorist activity, and terrorist organizations based in the region should be studied. It seems to be different for each group, but in the end, the terrorist groups share the same religious objective and are characterized mainly by each region for the construction of a united Islamic empire. Korea is also expected to be exposed to changes and activities of terrorist organizations due to the turmoil in the Middle East because many Koreans live in the Middle East such as dispatching troops to the Middle East. Thus, it is very important to take measures in advance.
    Keyword:Turmoil in Middle East, Islamic State, Al Qaeda, Dispatched Korean Military Units, Counterterrorism
  • Homegrown terrorism and lone wolf terrorism are important terms for the rapidly changing pattern of terrorist attacks since 9/11. Considering that terrorism is intended to terrorize others and spread fear and destruction, entities that terrorist groups can do as much damage as they can are selected as a target of terrorism. A recent research suggested that terrorist attacks against soft targets including business entities and private and non-governmental facilities have increased while terrorist attacks against hard targets including military and governmental facilities have decreased in general. The activities of terrorist groups have shown new trends since 9/11. First, it is changing from group-oriented activities to the distributed network by using the Internet and advanced communication technologies. They are recruiting members through the Internet and social media, teaching them how to conduct terrorist attacks, and even raising money for terrorism. Secondly, terrorist targets are changing into soft targets such as skyscrapers and public facilities since 9/11. 7/7 terrorist attacks in London, 2005 and Mumbai attacks in 2008 are typical examples of this trend. Facilities referring to soft targets are crowded with many unspecified people, which makes it important to prevent and counter terrorism at the national level because it can cause a lot of casualties and danger in case of terrorist attacks. This article introduced the discussion about soft target terrorism and examined characteristics and vulnerabilities of facilities related to mega sports event. It also tried to suggest countermeasures based on these vulnerabilities. This article is meaningful as an exploratory study introducing the terrorist target of soft target which is rarely introduced in Korea. Studies on the possibility of terrorism in Korea have mainly discussed the possibility of terrorist attacks by North Korea or international terrorism. Since South Korea is ahead of the PyeongChang Olympic Games in 2018 and has been on the list of countries for possible terrorist attacks by the IS, both hard and soft target should be considered together to prevent terrorist attacks. For these reasons, it is meaningful to introduce the discussion about soft target terrorism which can cause massive damage as Korea is ahead of the sports mega event, Pyeongchang Winter Olympic Games in 2018.
    Keyword:Soft Target Terrorism, Homegrown Terrorism, lone Wolf Terrorism, Countering Soft Target Terrorism, Target Hardening