About the Journal

The world has been experiencing a large number of armed conflicts and regional disputes. In addition, crime, terrorism-related attacks, violation of border security related laws have played a threat to national security. When the terrorism issues are taken into consideration, a new type of terrorist attack, ‘lone wolf terrorism’, on the Internet and social media services has brought growing concern in countering violent extremism and radicalization that lead to terrorism. What is worse, the motives of new terrorism are so diverse that it is getting difficult to predict the next possible attacks. Religious, political, socio-economic and other factors are among those motives.

Since the Republic of Korea has participated in global counter-terrorism efforts, ISIS has pointed Korea as one of their enemies as well as the United States, France, and other Western countries. Moreover, in modern history of Korean Peninsula, North Korea has always been a threat to national security of the Republic of Korea. For these reasons, the Republic of Korea is no longer free from terrorism/related threats and terrorist attacks.

Given this situation, multi-dimensional measures in countering terrorism and threats to national security need to be taken. It is challenging but worth taking multi-dimensional approaches. The Association of Terrorism and National Security was founded to discuss the legal issues in counter-terrorism, to support the best practices around the world, and to establish the sophisticated academic research in terrorism.

As the role of law enforcement agencies gets important more than ever, the Association of Terrorism and National Security will seek how the government co-ordinates and maintains the well-organized co-operation among the agencies, and with other countries, and what strategies the law enforcement agencies should take to counter the terrorism and national security threats.

Academic Area & Scope

Area 1 Socal Science, Intedisciplinary
Area 2 Social Issue
Area 3 International Relation

Latest Articles

+ Discover more

  • North Korea is becoming more and more secretive of the cyber duties and activities that use the Internet, and the activities of espionage are becoming increasingly internationalized and intelligent in the Ministry of United Front and Ministry of National Security. For example, it is expanding the base for penetration into China, South-east Asia and Central and South America, strengthening the overseas pro-North Korean organization, and strengthening the foreign embassies. In case of investigating a violation of the National Security Act against cyber security, it is necessary to post several articles about production and distribution of the transfer document so that the unspecified number can see it. The standards of institutions are also different and depend on subjective judgments of judicial institutions. In recent years, the number of deliberations by the Korea Communications Standards Commission(KCSC) has been rapidly increasing over the past five years(2013-2017). In relation to transferring activities in the cyber space, there is a tendency that an unspecified number of people can access before past 2010, so that they can share information. Peer to Peer format in which information can be shared. In other words, cyber attacks have been placed in the key areas of the new security concept and security war, and cyber attacks that transcend national boundaries have been frequent by hostile countries or international terrorist groups, Reality supports this possibility. Therefore, in view of the changing security concept, cyber attacks are very likely to directly threaten national security, so it is important for the agency to perform security related tasks.
    Keyword:National Security, National Security Act, Cyber Crime, Cyber Terrorism, Cyber Security
  • The paradigm shift and the threat of transnational security that are facing the global security threats all over the world are causing changes in the existing intelligence environment. Especially due to the threat from North Korea's physical terrorism, cyber terrorism, ISIL, and the increase in the number of Koreans supporting it, the influx of refugees, international students and workers from Islamic countries, the possibility of terrorism in South Korea is expected to be a constant social phenomenon in the future. Considering the division of North and South Korea on the Korean Peninsula and the continuing provocations of North Korea, the subject of various terrorist attacks that threaten national security and the counterterrorism intelligence environment are areas where the precautionary aspect is emphasized. In addition, since the September 11, 2001 terrorist attacks on the United States, the global terrorist response systems of major intelligence agencies and government bodies, including the United States, France, and Germany, have been changing laws and organizations, and discusses desirable collaborative relationships. Changes in the objects of national security have diversified into religion, business, international relations, and people, including individuals, whose existing security objects were only the state, and the hierarchy in the national security system. As the military threats of the Cold War era are reduced, the national security hierarchy is individualized and diversified according to the national environment and national consensus, and according to each country's position, the economic, environmental, food and social security preferential security policy issues. In addition, threats to national security are being generated from a range of complex and diverse sources, and threats from within can be a direct security threat to the post-Cold War era if predominantly military predominance from external sources is a major security threat during the Cold War period. Individuals can also be the subject of security threats. Meanwhile, various threat agents such as terrorist organizations, international criminal organizations, drug trafficking organizations, and industrial espionage organizations are mass-producing, so it is necessary to review and thoroughly prepare national security factors.
    Keyword:Counterterrorism, Counterterrorism Intelligence, Transnational Threat, National Security, Security Threat
  • Today, the role of intelligence agencies is changing in each country due to the paradigm shift in global anti-terror intelligence activities. In the United States, the terrorist attacks on September 11, 2001 changed the functioning of Intelligence Community. The U.S. counter-terrorism policy in the international community is related to the Intelligence Community(IC) and the intelligence management through the intelligence organization that per-forms the role is set as the most important task of the intelligence society reform. In order to address the lack of cooperation between intelligence agencies, which have been pointed out as the main cause of intelligence failure since 9/11, and the difficulties in carrying out effective intelligence activities, the United States has taken the position of Director of National Intelligence(DNI). In addition, the US intelligence community is developing as an intelligence knowledge creation organization by collecting, producing, analyzing, and distributing counterterrorism intelligence scattered in numerous intelligence organizations. In other words, through effective intelligence sharing and support among the intelligence agencies, it is performing counter-terrorism intelligence activities through cooperation and coordination by the abstract giant organization called Intelligence Community rather than counter-terrorism activity by a single specific intelligence agency. The US Intelligence Community is composed of 16 intelligence organizations, excluding the Office of the Di-rector of National Intelligence. The Office of the Director of National Intelligence is leading the intelligence society. In order for the Intelligence Community to make comprehensive and active use of such intelligence resources, a consensus was formed, the Office of the Director of National Intelligence was established, huge budgets, people and work were gathered, and then the National Counterterrorism Center was established. This in-depth change of counter-terrorism intelligence agencies has a significant impact on not only the Federal Bureau of Investigation (FBI) but also the changes of federal law enforcement agencies. Finally, counterterrorism intelligence activities to defend public well-being in the United States society protect civilians and cities from terrorist attacks, are an integral part of national defense in response to terrorism, and actively respond to the attacks of potential terrorists. It can be said that it is subject of expression.
    Keyword:Intelligence Community, Intelligence Sharing, Intelligence Environment, Counterterrorism, National Security
  • Technology in the digital age has become a new battleground for countering terrorism. The Internet has no time and space constraints, and it has established a cyber space that allows free expression of opinion, exchange of thoughts, rapid speed of sharing information, and building friendship with individuals from all walks of life and the place. This feature is why terrorist organizations use the Internet to achieve their goals and spread their propaganda. For this reason, the Internet has become an effective means of communication to maintain the terror network, and the spread of social media has led to the expansion of cyberspace and the multichannels of interactive communication. As a result, security threats such as the use of the Internet for terrorist purposes has also emerged. In this article, it aims to introduce how the international community has respond to the emerging threat focusing on the terrorist use of the ICT. In particular, it aims to illustrate and discuss Asia’s effort to counter terrorist use of the ICT. The international community including the United Nations is responding to security threats such as the use of the Internet for terrorist purposes by establishing a legal and policy framework, investigating cases of Internet use for terrorism purposes and gathering information, building international cooperation, and building public-private partnership(PPP). With the advent of the Fourth Industrial Revolution, the scope of its effort has been expanded to the use of Internet and other technologies for terrorism purposes. The new type of security threat is not a single type, but the sum of a small variety of non-state actors who have relatively little influence from the traditional security perspective. In particular, the extreme terrorism based on religion has been pointed out as the most important security threat. The diversification of terrorist organization, which is characterized by new terrorism, and the worldwide spread of fear of terrorism due to informationization, developing active measures for counterterrorism is getting more and more difficult. Terrorist threats that exploit information and communication technologies in the era of globalization are growing and expanding, so a more comprehensive approach to terrorism related to the Internet and information and communications technologies is required.
    Keyword:Asia Dialogue, Terrorist Use of the Internet, UNCTED, Terrorist Use of the ICT, UN Security Council Resolution
  • Today, national security throughout the world is expanding and deepening the scope and types of transnational threats such as terrorism, cybercrime, weapons of mass destruction, and drug offenses. In recent years, transnational national security threats have been dominated by non-state actors, such as individuals or various interest groups within a country, multinational corporations, international organizations, and terrorists. As these non-state actors transcended borders, their importance and role in the international society increased. In the past, information activities were mainly conducted at the national level, but the task of collecting and analyzing information about non-state actors was added. On the other hand, potential terrorism threats that threaten national security is different from traditional security threats in response. Traditional security threats, such as war and military threats, could be resolved to some extent by a realistic approach that focuses on alliances, balance of power, and collective security measures across countries. However, transnational security issues such as terrorism are largely out of the realistic framework of consciousness, and information security cooperation among nations can be relatively smooth because of the low possibility of a security dilemma in the case of such a transnational security threat. Transnational crimes that threaten national security are far more difficult tasks than traditional warfare with traditional sovereign states. It is not easy to capture the target of the terrorist organization easily, it carries out the war in the form of defensive rather than the attack by nature, and even if the current leader of the terrorist organization is arrested or dies, the successor appears constantly and it is very difficult to reach the final crush. In addition, the bottom of the issue of terrorism is based on the assumption of religion and conviction that most terrorist organizations are convinced of their final victory and never accept defeat, so that the war on terror is much more difficult and persistent than the war between countries. In addition, terrorism is a deadly threat to national security because terrorist organizations do not limit their targets even in case of attacks against innocent civilians. The emergence of such transnational threats further demands a close link between the national intelligence community and the law enforcement community. Thus, national intelligence also demands a statutory understanding comparable to that of law enforcement, which is the incarnation of the rule of law. Therefore, only when it is accompanied by a lawful understanding and understanding of national intelligence, it will provide permanent and constant value to national intelligence activities. It can be said that it is a way to systematically develop democracy, openness and national intelligence, but it should be done within the scope that the purpose of counterterrorism based on rule of law is not undermined.
    Keyword:National Security, National Security Crime, Terrorism, Transnational Crime, Security Dilemma


SUBMISSION 5/10 11/10
REVIEW 5/20 11/20
ACCEPTED 5/25 11/25
PUBLISHED 6/30 12/30



Lee Man-jong

Howon University, South Korea
[Curriculum Vitae]

Vice President

Yun Hae-sung Korean Institute of Criminology, South Korea

Editor in Chief

Lim You-seok

Kunsan National University, South Korea
[Curriculum Vitae]


Lee Jung-duk General Affairs Halla University, South Korea
Yu Byung-hu Research Osan University, South Korea
Cho Sung-taek Intelligence Sunmoon University, South Korea
Shin Sung-shik Management Saekyung University, South Korea
Jo Dong-un Planning Korean National Police University, South Korea
Kim Hyun-woo International Osnarbruck University, Germany

Editor in Director

Back Shin-chul

University of Scranton, USA
[Curriculum Vitae]

Park Bo-ra

National Security Strategy, South Korea
[Curriculum Vitae]

Editor in Administrator

Choi Kyung-shick Bridgewater State University, USA
Chuluunbat Sharkhuu Law Enforcement University, Mongolia
Wendy Dressler Florida International University, USA
Madhuri Sharma Florida International University, USA
Mohammed Ayedh Alqahtani Florida International University, USA
Raymond D. Partin Florida International University, USA
Laura Stoelers University of Malaga, Spain
Moon Byon-gook University of Texas at San Antonio, USA
Kim Jae-hyun Korean Institute of Criminology, South Korea


2015 JUN. 30 International Society for Terrorism & National Security Established by Dr. Lim Yu-seok
DEC. 05 Inaugural General Meeting
2016 FEB. 19 International Journal of Terrorism & National Security (ISSN 2423-8376)
JUN. 30 First Journal Publication (378 Tenjinchou Kamimaruko Nakaharaku Kawasakishi Kangawhken Japan)
OCT. 11 Digital Object Identifier Enrollment (DOI)
Google Scholar
2019 MAR. 24 Journal Title Suggestion Scopus
APR. 30 I2OR
MAY. 07 ProQuest
JUN. 30 Journal Publication Change Address (2-20-7 Arakawa Arakawaku Tokyo Japan)