Comparative Study of Communication Restrictions on Crime of TERRORISM

In recent years, the world has been emphasizing the role of intelligence agencies in the field of telecommunications aimed at strengthening the response to acts that threaten national security, such as the threat of international terrorism. In particular, crimes against national security such as esp...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Terrorism & National Security , 2(2) Vol. 2; no. 2; pp. 8 - 11
Main Author Lim, Yoo-seok
Format Journal Article
LanguageEnglish
Published 동북아학술저널연합 30.12.2017
Subjects
Online AccessGet full text
ISSN2423-8376
DOI10.22471/terrorism.2017.2.2.08

Cover

Loading…
Abstract In recent years, the world has been emphasizing the role of intelligence agencies in the field of telecommunications aimed at strengthening the response to acts that threaten national security, such as the threat of international terrorism. In particular, crimes against national security such as espionage or terrorism are committed by the criminals who have been trained outside domestic territory, observing their own strict security regulations. For these reasons, investigations on communications conducted by criminals who attempt and direct is essential to investigation crime against national security. Considering legislations on telecommunication restrictions in some advanced countries, the United Kingdoms has enacted the Investigatory Powers Act(IPA 2016) to counter threats to national security and serious crimes, allowing investigative agencies, security and intelligence agencies to monitor a large scale of surveillance. The United States has implemented the CALEA, the Patriot Act, the FISA, and the ECPA, which are legally enforced by law. It is necessary to revise the important part of the domestic communication confidentiality protection law against the crimes which threatens the national security by referring to the matters concerning the communication restriction law of major countries. In the context of IoT communication, individuals, society, and the nation are linked to one fate community through the transmission and reception of packet data over the Internet. Also, telecommunications infrastructures are subject to territorial domination as tangible goods, it is necessary to understand national security as "the safekeeping of the nation as a whole". KCI Citation Count: 0
AbstractList In recent years, the world has been emphasizing the role of intelligence agencies in the field of telecommunications aimed at strengthening the response to acts that threaten national security, such as the threat of international terrorism. In particular, crimes against national security such as espionage or terrorism are committed by the criminals who have been trained outside domestic territory, observing their own strict security regulations. For these reasons, investigations on communications conducted by criminals who attempt and direct is essential to investigation crime against national security. Considering legislations on telecommunication restrictions in some advanced countries, the United Kingdoms has enacted the Investigatory Powers Act(IPA 2016) to counter threats to national security and serious crimes, allowing investigative agencies, security and intelligence agencies to monitor a large scale of surveillance. The United States has implemented the CALEA, the Patriot Act, the FISA, and the ECPA, which are legally enforced by law. It is necessary to revise the important part of the domestic communication confidentiality protection law against the crimes which threatens the national security by referring to the matters concerning the communication restriction law of major countries. In the context of IoT communication, individuals, society, and the nation are linked to one fate community through the transmission and reception of packet data over the Internet. Also, telecommunications infrastructures are subject to territorial domination as tangible goods, it is necessary to understand national security as "the safekeeping of the nation as a whole". KCI Citation Count: 0
Author Lim, Yoo-seok
Author_xml – sequence: 1
  givenname: Yoo-seok
  surname: Lim
  fullname: Lim, Yoo-seok
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002647625$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNo9UMtqwzAQ1CGFpml-ofjag9PV-iUfg0nbQErA8V3IehSR2gqSU8jfV0lLmcPszg7LMA9kNrpRE_JEYYWYV_Rl0t47b8OwQqDVCiOAzcgcc8xSllXlPVmGYHvIgGJWAM7JpnHDSXgx2W-dHKazuiTOJFEczqOVUXZj0uoweSuvc0ji3ng76Kut27Ttvt0ePh7JnRFfQS__eEG6103XvKe7_du2We9SyShNdV4orEtT972qmVY59BAPxkBZF4UAhoYpJVFKphlQlSvBZCE0YkzbV3m2IM-_b0dv-FFa7oS98afjR8_XbbfldQllUdHoLX-90rsQvDb8FGMLf-EU-K0u_l8Xv9bFMQJY9gNV9mSi
ContentType Journal Article
CorporateAuthor Gunsan University
CorporateAuthor_xml – name: Gunsan University
DBID AAYXX
CITATION
ACYCR
DOI 10.22471/terrorism.2017.2.2.08
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
EndPage 11
ExternalDocumentID oai_kci_go_kr_ARTI_9606571
10_22471_terrorism_2017_2_2_08
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
M~E
P5Y
ACYCR
ID FETCH-LOGICAL-c811-e45d296f9bbd98ed40b0c81ff06955a082f8ddc2cc8e801d4da8c5ae22123b743
ISSN 2423-8376
IngestDate Mon Apr 07 03:10:25 EDT 2025
Tue Jul 01 02:50:37 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c811-e45d296f9bbd98ed40b0c81ff06955a082f8ddc2cc8e801d4da8c5ae22123b743
OpenAccessLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002647625
PageCount 4
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_9606571
crossref_primary_10_22471_terrorism_2017_2_2_08
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-12-30
PublicationDateYYYYMMDD 2017-12-30
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-12-30
  day: 30
PublicationDecade 2010
PublicationTitle International Journal of Terrorism & National Security , 2(2)
PublicationYear 2017
Publisher 동북아학술저널연합
Publisher_xml – name: 동북아학술저널연합
SSID ssib030123502
Score 2.0144935
Snippet In recent years, the world has been emphasizing the role of intelligence agencies in the field of telecommunications aimed at strengthening the response to...
SourceID nrf
crossref
SourceType Open Website
Index Database
StartPage 8
SubjectTerms 정치외교학
Title Comparative Study of Communication Restrictions on Crime of TERRORISM
URI https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002647625
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX International Journal of Terrorism & National Security , 2017, 2(2), , pp.8-11
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8NAFB5cLl5EUXEniNep6ZhMp0eRSiuoUCvU05DMIiIkUuvFg7_dbyZLUymiEkjaSXhN8jXvfW_yFkJOmTahSPAgWXALGlnDaMJMTDHKFZxmUH5f7fOW9x-i63E8nrU69Nkl07SlPhbmlfwHVYwBV5cl-wdka6EYwGfgizUQxvpXGF82SnffV9Wh51I-3PS8q8Ffxrtlvo2XnyYAjR3eDQdlhfyKntI6eKCO1CnaLT_mOX0zJSEvZwlgeVwtwnCmTBxtonBGeVPzsQbArKHFRMMcFqrwu6KF4e84TQvsJ7mv1-h-tMWwhGJmWqrX6d8sTh0HCA_ES5K1HOnkSIbFZXCvMpB_15fi5rNXaYlzn97rg0nriypSv72os4WnNMc6lrOJbZCI0QZZL9l_cFFAuUmWTLZFeg0YAw9jkNtgDsagCWOA7x5Gd1gN4zYZXfVGl31adregSrTb1ESxZl1uu2mqu8LoKExD7LA25N04TsDMrNBaMaWEAYvQkU6EihPDHNdIwft2yEqWZ2aXBJHp8BS0IuJKwP8E4RCca6s64O5RyJI9clZdvHwtapjIn-_8HjnBPZIv6lm68uNu-5TLl4mEkzWQzumNO-39P4s9IGuz_-YhWZlO3s0RON00PfYQfwFPUEvd
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comparative+Study+of+Communication+Restrictions+on+Crime+of+TERRORISM&rft.jtitle=J-Institute&rft.au=Lim%2C+Yoo-seok&rft.date=2017-12-30&rft.issn=2423-8376&rft.volume=2&rft.issue=2&rft.spage=8&rft.epage=11&rft_id=info:doi/10.22471%2Fterrorism.2017.2.2.08&rft.externalDBID=n%2Fa&rft.externalDocID=10_22471_terrorism_2017_2_2_08
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2423-8376&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2423-8376&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2423-8376&client=summon