Since North Korea has used terror crime as a means of unification under communism
against South Korea, South Korea has been much damaged until now. And the occurrence
possibility of terror crime by North Korean authority is now higher than any other time.
The North Korean terror crimes of Kim Il Sung era had been committed by the dictator’s
instruction with the object of securing governing fund. However, looking at the terror crimes
committed for decades during Kim Jung Il authority, it is revealed that these terror crimes
are expressed as a criminal behavior because of the conflict to accomplish the power and
economic advantage non powerful groups target. This study focused on the power conflict
in various causes of terror crimes by applying George B. Vold(1958)’s theory which explained
power conflict between groups became a factor of crime, and found the aspect by ages of
terror crime behavior by North Korean authority and responding plan to future North
Korean terror crime.
North Korean authority high-ranking officials were the Labor Party focusing on Juche
Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed
focusing on military authorities following Military First Policy at the beginning of Kim Jung
Il authority, rapid power change has been done for recent 10 years. To arrange the aspect
by times of terror crime following this power change, alienated party executives following
the support of positive military first authority by Kim Jung Il after 1995 could not object
to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime
war which happened this time was propelled by military first authority to show the power
of military authority. After 2006, conservative party union enforced censorship and inspection
on the trade business and foreign currency-earning of military authority while executing
drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible
terror crime by military authority following the pressure of conservative party.
After October, 2008, first military reign union executed the launch of Gwanmyungsung
No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham
attacking terror in order to highlight the importance and role of military authority. After
September 2010, new reign union went through severe competition between new military
authority and new mainstream and new military authority at this time executed highly
professionalized terror crime such as cyber/electronic terror unlike past military authority.
After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae
homepage of new mainstream association was the intention of Km Jung Eun to display his
ability and check and adjust the power of party/military/cabinet/ public security organ, and
he can attempt the unexpected terror crime in the future.
North Korean terror crime has continued since 1980s when Kim Jung Il’s power
succession was carried out, and the power aspect by times has rapidly changed since 1994
when Kim Il Sung died and the terror crime became intense following the power combat
between high-ranking officials and power conflict for right robbery. Now South Korea
should install the specialized department which synthesizes and analyzes the information on
North Korean high-ranking officials and reinforce the comprehensive information-collecting
system through the protection and management of North Korean defectors and secret agents
in order to determine the cause of North Korean terror crime and respond to it. And South
Korea should participate positively in the international collaboration related to North Korean
terror and make direct efforts to attract the international agreement to build the international
cooperation for the response to North Korean terror crime. Also, we should try more to
arrange the realistic countermeasure against North Korean cyber/electronic terror which was
more diversified with the expertise terror escaping from existing forcible terror through
enactment/revision of law related to cyber terror crime, organizing relevant institute and
budget, training professional manpower, and technical development.