In lieu of an abstract, here is a brief excerpt of the content:

5 5 How to Counter “New” Terrorism Kang Choi SEARCH FOR NEW SECURITY PARADIGM IN THE POST-COLD WAR ERA One of the most distinctive characteristics of the post-Cold War era is the substantial reduction of inter-state conflicts involving massive use of physical force. On the other hand, the so-called non-conventional security threats, such as terrorism, proliferation of weapons of mass destruction (WMD), religious and ethnic conflicts, environmental degradation, drug trafficking, piracy, and organized crimes, have become more immediate security concerns. Such a transition has expanded the scope of security well beyond simple military security. In other words, we are living in an era of comprehensive security. Before these new security challenges can be met effectively and successfully, the establishment of a new security paradigm and approaches is necessary. Such new security challenges are not confined, or limited, geographically to a specific region or country. Rather they are challenges to humanity as a whole, or transnational security challenges. These challenges cannot be handled by any single nation alone, as traditional alliance structures are too rigid, slow, and reactive to cope with new security challenges. On the other hand, military responses in countering new security challenges over the past several years since the 11 September incident have Chap5.indd 59 Chap5.indd 59 1/24/07 2:08:48 PM 1/24/07 2:08:48 PM 60 Kang Choi been dominant. Furthermore, due to the progress made in science and technology, especially information, communication, and computers, the level and magnitude of damage from the actual use of force have substantially decreased. As such, the possibility of actual use of force, including frequency and form,1 is rather likely to increase. It implies that more physical means are nowadays available for the attainment of political and military objectives. Thus, we are more tempted to use force before exhausting other means. In sum, with the changes in the security environment and the emergence of new security challenges, a new security paradigm reflecting the nature and magnitude of the current and upcoming security challenges is needed. Among these new security challenges, terrorism requires immediate intellectual attention and strategic response. CHARACTERISTICS AND EFFECTS OF “NEW” TERRORISM It can be said that traditional terrorism, such as assassination and kidnapping of VIPs, hijacking of airplanes, and hostage taking, is rather limited in nature and directed towards certain specific targets. But new terrorism is quite different from traditional terrorism. The 11 September attacks were an unprecedented form of terrorism, equivalent to the level of a small-scale war. Despite our efforts to strengthen international control regimes on WMD, more nuclear material has become available. There is a growing concern that the possible connection of terrorism and WMD might cause a catastrophe tantamount to another world war. Dramatic economic and social progress renders nations unable to have full control, and vulnerable to crippling and unexpected terrorist attacks. The vulnerability stems from the growing complexity and interconnectedness of our modern societies. In particular, progress in information processing and dependence on the Internet only amplify the destructive power of terrorists, thus worsening the current situation. Simultaneously, growing technological capacity and information have resulted in more diverse and abundant opportunities to divert state-of-the-art technologies to counter the terrorists’ destructive weapons. It should be noted that the 11 September attacks were a complex form of terrorism involving the combination of hijacking and suicide bombing. This new kind of mass violence uses a high-energy vehicle (the airplane) to carry out terrorism. Progress in precision, portability, and miniaturization of weapons has brought ease-of-use and affordability to destructive means of power. Today, such technological changes make it easier to cause mass casualties and chaos at Chap5.indd 60 Chap5.indd 60 1/24/07 2:08:50 PM 1/24/07 2:08:50 PM [18.191.13.255] Project MUSE (2024-04-26 11:25 GMT) 61 How to Counter “New” Terrorism a low cost. In addition, new information technology allows terrorists and other malicious individuals to magnify their own disruptive power by sharing information on weapons and tactics globally. All nations have become wide-open targets for terrorists, who spread fear throughout the international community. Today’s terrorist attacks, unlike those in the past when a particular person was targeted, aim at indiscriminately creating mass casualties, as seen in Bali, Madrid, and London. No one is free from the threat of terrorism...

Share