• Title/Summary/Keyword: Patterns of Terrorism

Search Result 12, Processing Time 0.019 seconds

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Implementation of Occupant Density and Walking Pattern Measurement for Emergency Evacuation and Safety in High-Rise Multi-Purpose Facilities

  • Lee, Myung Sik
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.4
    • /
    • pp.409-415
    • /
    • 2018
  • Recently, many countries around the world began to show interest in safety against terrorism, fire, and natural disasters. This study aimed to propose a quantitative measurement system for emergency evacuation and safety for various kinds of terrorism and fire within high-rise multi-purpose facilities, which can measure the pedestrians' ordinary walking patterns in the concourse with the highest pedestrian volume out of all the spaces within multi-story buildings, predict pedestrians' evacuation walking lines when a sudden disaster breaks out, and analyze the gait coefficient, occupant density, and evacuation behavior time.

Advanced ICT abused by Terror in the 4th Industrial Revolution Era (제4차 산업혁명시대의 테러에 악용되는 첨단 정보통신기술)

  • Sim, Se-Hyeon;Eom, Jung-ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.15-23
    • /
    • 2021
  • The 4th industrial revolution technology has brought many changes not only in human life but also in the industrial field. ICT such as 5G and artificial intelligence and convergence/complex systems such as drones and robots are convenient for humans, and automation of all processes in the industrial field. However, these advanced information and communication technologies also have adverse functions. As advanced ICT was incorporated into military and terrorist weapon systems, more powerful and highly destructive weapon systems began to be developed. In particular, by applying advanced ICT to the production and use of terrorist tools, the terrorist method became more sophisticated and caused more damage. In this paper, we derive advanced ICT that can be abused according to the terror patterns in the 4th industrial revolution era, and present a method that is applied from preparation to execution of terrorism. The abuse of advanced ICT makes terrorism more stealthy and subtle, and increases its destructive power.

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

Experimental analysis of blast loading effects on security check-post

  • Muhammed Rizvan Akram;Ali Yesilyurt
    • Structural Engineering and Mechanics
    • /
    • v.87 no.3
    • /
    • pp.273-282
    • /
    • 2023
  • Concrete construction, one of the oldest building practices, is commonly used in all parts of the world. Concrete is the primary building material for both residential and commercial constructions. The challenge of protecting the buildings, hence nation, against the attack of terrorism has raised the importance to explore the understanding of building materials against the explosion. In this research, a security check-post (reinforced concrete frame filled with plain cement concrete) has been chosen to study the behavior of structural elements under blast loading. Eight nitroglycerines-based dynamite blasts with varying amounts of explosive charge, up to 17 kg weight has been carried out at various scale distances. Pressure and acceleration time history records are measured using blast measuring instruments. Security check post after being exposed by explosive loading are photographed to view cracking/failure patterns on the structural elements. It is noted that with the increase of quantity of explosive, the dimensions of spalling and crack patterns increase on the front panels. Simple empirical analyses are conducted using ConWep and other design manuals such as UFC 3-340-02 (2008) and AASTP-1 (2010) for the purpose of comparison of blast parameters with the experimental records. The results of experimental workings are also compared with earlier researchers to check the compatibility of developed equations. It is believed that the current study presents the simple and preliminary procedure for calculating the air blast and ground shock parameters on the structures exposed to blast explosion.

Asymmetric Terrorist Alliances: Strategic Choices of Militant Groups in Southeast Asia

  • Alexandrova, Iordanka
    • SUVANNABHUMI
    • /
    • v.11 no.1
    • /
    • pp.101-132
    • /
    • 2019
  • Why do some local rebel groups choose to form asymmetric alliances with large transnational terrorist organizations? This paper examines asymmetric terrorist alliance patterns by studying the international ties of domestic insurgencies in Southeast Asia. It uses data from Indonesia, Malaysia, the Philippines, and Thailand to construct a theory defining the determinants of the choice of alliance strategies by terrorist groups. The findings conclude that rebels with limited aims prefer to act alone out of fear of entrapment. They are cautious of becoming associated with the struggle of transnational radical groups and provoking organized response from international and regional counterterrorism authorities. Local groups are more likely to seek alliance with an established movement when they have ambitious final objectives, challenging the core interests of the target state. In this case, the benefits of training and logistic support provided by an experienced organization outweigh the costs of becoming a target for coordinated counterterrorist campaign.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.