• Title/Summary/Keyword: 테러집단

Search Result 37, Processing Time 0.023 seconds

정보전(사이버전) 대비를 위한 제언

  • 남길현
    • Review of KIISC
    • /
    • v.12 no.6
    • /
    • pp.54-57
    • /
    • 2002
  • 인터넷 인구 2천 5백만, 초고속 전산망 가입자 1천만명을 돌파하고 사회전반의 정보시스템 의존도가 더욱 심화되고 있는 현시점에서 우리나라가 선진국 대열에 동참하기 위해서는 정보화 역기능에 대한 대비책 마련이 필수적인 요소이다. 특히 국가안보와 관련된 정보전과 사이버전, 사이버테러에 대한 개념을 정립하고 군 뿐만 아니라 범국가적 대응책을 마련하여야 한다. 전문인력 양성과 국민의식 홍보, 범국가적 협력체계 구축, 정보보호 시스템 구축 및 보안관리 강화등 기본적인 추진 방안을 제시하면서 이 분야 전문가 집단인 한국정보보호학회의 역할을 강조한다.

Contextual Understanding of North Korea Nuclear Problem (북한 핵의 맥락적 이해)

  • Park, Bong-gyu
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.97-114
    • /
    • 2017
  • This article aims for searching the clue of North Korea nuke-problem by understanding it contextually. We must see this from the beginning as many trials in settling the problem have failed. North Korea nuke-problem is related to the change of international implication as well as the domestic process of its development. At first, it started from the regime survival, which evolved with the effect of learning. During the Cold War, its development had combined the principle of 'self-defense' because of Sino-Russia conflict. Particularly, its meaning varied dramatically due to the collapse of Cold War system plus the advent of post-Cold War system. North Korea nuclear program has became a global problem based on the deterioration of North Korea's security milieu and Bush administration's policy. Therefore, the area of common solution for NK nuke-problem must be found in the context of regime survival and the change of its meaning by continual convergence effort.

Études sur l'effet de l'instabilité de 'Kasserine' pour la Tunisie et son pays voisin Algérie ('카세린 주'의 불안정이 튀니지와 인접국가 알제리에 미치는 영향에 관한 연구)

  • 임기대
    • 한국프랑스학논집
    • /
    • v.101
    • /
    • pp.303-332
    • /
    • 2018
  • Une vague de protestation populaire a fait tomber en 2011 le régime autoritaire de Ben Ali en Tunisie. Rapidement, cette colère s'est emparée des rues de plusieurs pays du monde arabe. Six ans plus tard, le bilan est maigre puisque seule la Tunisie est globalement parvenue à effectuer une transition démocratique. Malgré cela, le gouvernement dominé par les islamistes de Ennahda accumule les échecs. La situation économique est catastrophique et le chômage en hausse constante. 'Kasserine', une ville située au centre-ouest de la Tunisie, est en proie à des attentats terroristes et un nid de djihadistes. En raison de cette situation, la Tunisie est ménagée par les djihadistes comme terre de prédication. Plusieurs groupes terroristes se montrent actifs et rivalisent l'un à l'autre dans cette région. La recherche du travail nous a conduit à examiner les activités des groupes terroristes et leurs concurrences, dûs à l'instabilité de Kasserine. Ils menacent non seulement la stabilité et la sécurité de la frontière de l'Algérie et la Tunisie, mais aussi des pays du Maghreb et de l'Europe. Ce qui a poussé les autorités algériennes et tunisiennes à joindre leurs efforts pour neutraliser les groupes terroristes, en établissant un plan opérationnel coordonné de sécurite. Pour Tunisie, elle ne doit pas négliger de surveiller la région isolée telle que 'Kasserine' et doit également intensifier sa coopération frontalière avec l'Algérie dans la lutte contre le terrorisme. Sinon l'insécurité et l'instabilité de la frontière entre deux pays risquent de durer longtemps.

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

U.S. FOIA(FREEDOM OF INFORMATION ACT) AND ACCESS TO INFORMATION AFTER 9/11 TERRORIST ATTACKS (9/11 테러 이후 강화된 미국 연방정부의 국가안보 정책이 정보자유법 (Freedom of Information Act) 및 연방 정보공개정책에 미친 영향)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.365-392
    • /
    • 2009
  • The increased concern about national security in the U.S. after the 9/11 terrorist attacks has influenced public rights of access to government information and its legal foundation, the Freedom of Information Act (FOIA). Public access to government information has been restricted at the policy level by a series of legislative and executive changes in FOIA after September 11, 2001, but the examination of statistics on FOIA implementation between fiscal years 1999 and 2004 shows that the strengthened national security measures did not have a considerable impact at the implementation level during this period. These contrasting findings might be due to the public officials' informal reaction to the criticism of the restriction on public access, bureaucratic inertia, and the use of new record categories not subject to FOIA.

  • PDF

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.

[Retracted] A Study on the Export Control System and its Effective Implementation Plan in Korea ([논문 철회] 한국의 전략물자 수출통제제도의 문제점과 효율적 이행방안)

  • Lee, Sang-Ok
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.353-375
    • /
    • 2011
  • Export control was first triggered by international export control system at US led COCOM in 1949. Numerous international efforts such as NPT in 1969, ZC in 1970, NSG in 1978, AG in 1985, MTCR in 1987, Wassenaar Arrangement(WA) establishment in 1995 with 1990's the fall of the Berlin Wall, have been made since. The concept of export control has been changed from weaponry and parts export control to preventing or blocking weaponry, respective goods and relevant technology from the hand of troubled regions and non-state actors as terrorist groups; and the new concept is described as Nonproliferation Control. Extent of control items is not only limited to conventional weaponry, but also includes weapons of mass destruction(WMD) and even dual use items which can be used for production, development, usage or storage. Control items include all items defined by NSG, MTCR, AG, WA, and CMC-Opec. The 9.11 terror had a strong influence on international society. Effort to prevent WMD proliferation has now become the most important issue for international security. This study aims to suggest improvement points for nonproliferation law and its effective implementation, based on problem and limitation identification along with analysis of nonproliferation law and implementation examples by type. Furthermore for the purpose of national and global security, export control system on strategic items which are considered to be a key issue in South and North Korea relationship needs to be effectively managed. Recently, North Korea's missile and nuclear tests have been criticized globally; and the global society including respective countries as China and South Korea is striving to urge export control in line with the UN resolution.

  • PDF

A Study on UAV and The Issue of Law of War (무인항공기의 발전과 국제법적 쟁점)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.3-39
    • /
    • 2011
  • People may operate unmanned aerial vehicles (UAVs or drones) thousands of miles from the drone's location. Drones were first used (like balloons) for surveillance. By 2001, the United States began arming drones with missiles and using them to strike targets during combat in Afghanistan. By mid-2010, over forty states and other entities possessed drones, many with the capability of launching missiles and dropping bombs. Each new development in military weapons technology invites assessment of the relevant international law. This Insight surveys the international law applicable to the recent innovation of weaponizing drones. In determining what international law rules govern drone use, the most salient feature is not the fact that drones are unmanned. The fact drones carry no human operator may be the most important new technological breakthrough, but the key feature for international law purposes is the type of weaponry drones carry. Whether law enforcement rules govern drone use depends on the situation and not necessarily who is operating the drone. Battlefield weapons may also be lawfully used before an armed conflict in the following situations: when initiating self-defense under Article 51 of the United Nations Charter; when authorized by the UN Security Council; when a government seeks to suppress internal armed conflict; and, perhaps, when a state is invited to assist a government in suppressing internal armed conflict. The rules governing resort to force in self-defense are found in Article 51 of the UN Charter and a number of decisions by international courts and tribunals. Commentators continue to debate whether drone technology represents the next revolution in military affairs. Regardless of the answer to that question, drones have not created a revolution in legal affairs. The current rules governing battlefield launch vehicles are adequate for regulating resort to drones. More research must be undertaken, however, to understand the psychological effects of deploying unmanned vehicles and the effects on drone operators of sustained, close visual contact with the aftermath of drone attacks.

  • PDF

Philippines 2017: Warlike Powers of Security Forces and Hedging Strategies in Foreign Relation (필리핀 2017: 호전적 내치(內治)와 줄타기 외교)

  • KIM, Dong-Yeob;JUNG, Bub Mo
    • The Southeast Asian review
    • /
    • v.28 no.2
    • /
    • pp.181-212
    • /
    • 2018
  • In 2017, the government of Duterte, in the second year of the ruling, more strongly promoted peace and order policies and expressed independent diplomacy as the chairman of ASEAN. He continued to fight against drugs and tried to increase his political legitimacy through the punishment for corrupt officials. He also declared martial law in the Mindanao region because of the dissolution of the Maute group, a Muslim terrorist organization, and strengthened counterterrorism cooperation externally. In addition, as to Communist militants, he took the initial reconciliation gesture and promoted peace negotiations, however, concluded the peace tide and started the suppression operation due to a series of bloodshed. He still has a strong drive in peace and order issues, backed up by high support rate, but it is becoming a factor of anxiety as the socioeconomically underprivileged and minority groups are increasingly alienated. As the chairman of ASEAN, Duterte has a certain distance from the United States, which is a firm ally, but has turned to increase familiarity with China and Russia, which can take substantial economic benefits. Through diversifying the external economic support and increase of tax revenue, the priority task was to establish the infrastructure. Although the Philippines, which has a high economic growth rate, has a strong expectation that it can establish a solid infrastructure, tax reforms should be successfully completed in order not to repeat the previous failures, which has traditionally increased foreign debt burden by relying on external resources. It seems that it is necessary to find the meeting point of the foreign policy of Duterte and new Korean government's New Southern Policy, and to find possible economic cooperation policies to improve Philippine infrastructure.