当前位置:主页 > 社科论文 > 公安论文 >

论我国反恐机制的构建

发布时间:2018-05-16 13:23

  本文选题:恐怖主义犯罪 + 反恐机制 ; 参考:《西南政法大学》2008年硕士论文


【摘要】: 恐怖主义作为一种社会现象,已经对人类的和平和安全构成了严重的威胁,被称为20世纪的“政治瘟疫”,是“一场永无休止的地下世界大战”。特别是美国遭受的“9·11”恐怖袭击事件极大地震撼了全世界,再一次给世界各国敲响了警钟。面对这场国际恐怖主义带来的沉重灾难,世界各国迅速作出反应,采取了一系列反恐措施,加大对恐怖主义及其活动的打击力度,掀起了一股国际反恐怖主义热潮。此外,“9·11”事件将恐怖主义活动推到了一个前所未有的高峰,恐怖主义成为人类的公敌,威胁着国际社会的和平与安全。进入新世纪以来,恐怖主义有愈演愈烈的趋势,逐步向规模升级、危害加剧的方向发展。随着现代科学技术的飞速发展,恐怖分子所使用的武器也日新月异地发生着变化,频繁出新;同时,核生化武器相关技术的扩散加剧,再加上核生化恐怖活动的成本低、杀伤面积大,越来越受到恐怖分子的青睐。因此,可以预见,恐怖主义的手段将会越来越“高明”,防范控制的难度将会越来越大。 在我国西部,新疆、西藏等地的“东突”势力、“藏独”势力、“疆独”等民族分裂势力、极端宗教势力的存在,使得我国的社会稳定遭到了极大的威胁,而这种威胁正是恐怖主义犯罪的威胁。由于恐怖主义犯罪的国际化,境外“东突”势力向我国境内的渗透,以及国际恐怖主义组织的资金资助和扶持,使得我国受到的恐怖主义威胁长期存在。 为了防止恐怖主义犯罪带来巨大危害,各个国家都在积极采取防范、控制措施,制定法律、调整政策、建立专门队伍等,来预防和控制恐怖主义犯罪的蔓延,严厉打击恐怖主义犯罪。例如,美国制定了《爱国者法》、《反恐怖主义法》,英国制定了《公共紧急安全法》等反恐法律规范,日本、印度、德国也新制定或修改了本国的反恐怖法或其它相关法律,并依照法律构建了本国的反恐机制,使其能够有效运行,有效抵制恐怖主义犯罪。考虑到各种恐怖势力是人类和平与安全的共同威胁,打击恐怖主义是世界各国面临的共同任务,使得各国的反恐机制具有一定共性。因此,我们可以通过对国外反恐机制进行比较研究,找到反恐机制构建中的一些共同规律,为国内反恐机制的构建提供参考与借鉴。我国理论界应未雨绸缪,在分析恐怖主义犯罪、研究国外反恐机制的基础上,认识恐怖主义犯罪的本质,分析其成因及发展脉络,建立一套科学、完整、实用的反恐怖机制,为实务部门提供参考蓝本,以期对反恐实践工作有所指导和帮助。 本文主要分为两个部分,六个章节: 第一部分由第一章和第二章组成。 第一章——反恐机制的概述,主要是对恐怖主义犯罪的概念、恐怖主义犯罪的特征、恐怖主义犯罪的类型,以及反恐机制的体系结构做一整体介绍。本章节的目的是求从宏观上掌握恐怖主义犯罪及反恐机制的内涵和外延。 第二章——国外反恐机制的构建,作为“他山之石”,吸取国外的成功经验,同时也防止出现他们的教训。这一章节主要介绍了美国、英国、俄罗斯及印度的反恐机制建设的情况。其中,美国作为遭受恐怖主义袭击最严重的国家之一,在组建反恐部队、反恐机制建设等各个方面都有先进、可取之处,值得我们学习和借鉴。 第二部分由第三章、第四章、第五章和第六章组成,这四个章节是对第一部分第一章中反恐体系机构的扩展、细化和深入论述,详细讲解反恐机制这一系统的构成要素和体系。 第三章——我国反恐机制构建中的主体问题,从组建反恐队伍到人员选拔,以及指挥人员的确定都做了详细的阐述,以求在我国建立精良的反恐队伍。 第四章——我国反恐预防与控制机制的构建,这一章节从预防恐怖主义犯罪的重要性说开,具体分析恐怖主义犯罪产生的原因,找到其发生的根源,才能做到“有的放矢”,引入先进的分形理论预测、预防恐怖主义犯罪的发生和发展,运用社会治安综合治理的原理对社会重点地区、重点场所、重点人口进行有效控制,不给恐怖主义分子以可乘之机。 第五章——我国反恐预警机制的构建,从恐怖主义犯罪的发生瞬间起迅速组织人力控制恐怖主义犯罪,杜绝其危害性进一步扩大,从而引出反恐预案的设计,“打有准备之仗”,预想恐怖主义犯罪发生的情况,进行有针对性地布控和预案设计,各个部门应立即采取行动,以最快的速度找出处理事件最合适的方式、方法,将恐怖事件带来的灾害降低到最小程度。本章主要以爆炸类和劫持人质类恐怖主义犯罪为例论述预案的设计。 第六章——恐怖犯罪侦查打击机制,“情报是防御的前沿”,反恐侦查最重要的是恐怖主义犯罪情报的搜集,只有获得正确、精准的情报才能有效地打击恐怖主义犯罪。这一章从情报的重要性展开,论述情报的搜集手段和使用方法。在搜集和使用情报的方法上,引用了先进的情报搜集理论,“构建反恐情报链”、建立“情报全面识别系统”、“威胁分析”、“第三方规则”等。在恐怖主义犯罪的打击上,切断恐怖犯罪的资金来源,对可疑账户、可疑款项跟踪监控显得尤为重要。此外,传统的侦查方法,在恐怖主义犯罪发生之后的侦破过程中也起着不可忽视的作用,调查访问、讯问、现场勘查以及搜查等措施手段的运用,对于侦破案件起着不可估量的作用。恐怖主义犯罪分子在“穷途末路”时,会利用人质与反恐部门进行“谈判”、拿人质相要挟,因此,劫持人质的手段、方法以及注意事项应当备受关注。
[Abstract]:Terrorism, as a social phenomenon, has posed a serious threat to the peace and security of mankind. It is called the "political plague" of twentieth Century. It is "an endless world war". In particular, the "9. 11" terrorist attacks in the United States shook the world and once again struck the world. In the face of the heavy disaster caused by international terrorism, the countries of the world responded quickly, adopted a series of counter-terrorism measures, intensified their efforts to combat terrorism and its activities, and set off an international anti terrorist upsurge. In addition, the "9. 11" incident pushed terrorism to an unprecedented peak. Terrorism has become a public enemy of human beings, threatening the peace and security of the international community. Since the new century, terrorism has been growing in a growing trend, gradually upgrading to scale, and developing the direction of serious harm. With the rapid development of modern science and technology, the weapons used by terrorists have changed in a new moon. At the same time, the proliferation of nuclear, biological and chemical weapons related technology, coupled with the low cost of nuclear and chemical terrorism and large area of killing, is becoming more and more popular with terrorists. Therefore, it is foreseeable that the means of terrorism will become more and more "bright", and the difficulty of prevention and control will become more and more difficult.
In Western China, Xinjiang, Tibet and other places, the "East Turkistan" forces, the "Tibetan independence" forces, the "Xinjiang independence" and other ethnic separatists, the existence of extreme religious forces, made the social stability of our country a great threat, and this threat is a threat to terrorism. The infiltration of force into the territory of our country and the funding and support of international terrorist organizations have caused the threat of terrorism in China for a long time.
In order to prevent the great harm of terrorist crimes, all countries are actively taking precautions, controlling measures, formulating laws, adjusting policies and establishing special teams to prevent and control the spread of terrorist crimes and crack down on terrorist crimes. For example, the United States has formulated the Patriot Act, the Anti Terrorism Law, and the United Kingdom enacted < The law of the public emergency safety law, such as the anti-terrorism legal norms, Japan, India and Germany have also formulated or amended their own anti terrorist law or other relevant laws, and established their own counter-terrorism mechanism in accordance with the law so that they can operate effectively and effectively resist terrorist crimes. Considering the common threats to peace and security of human beings, the various terrorist forces are a common threat. To combat terrorism is a common task facing all the countries of the world, making the anti-terrorism mechanism of all countries common. Therefore, we can find some common laws in the construction of anti-terrorism mechanism by comparative study of foreign counter-terrorism mechanism, and provide reference and reference for the construction of counter-terrorism mechanism in China. On the basis of analyzing terrorism crime and studying foreign counter-terrorism mechanism, we can understand the essence of terrorism crime, analyze its causes and development context, establish a set of scientific, complete and practical anti terrorist mechanism, and provide reference for practical departments in order to guide and help the practice of counter-terrorism.
This article is divided into two parts, six chapters:
The first part is composed of the first and second chapters.
The first chapter, the overview of the anti-terrorism mechanism, mainly introduces the concept of terrorism crime, the characteristics of terrorism crime, the type of terrorism crime and the system structure of the anti-terrorism mechanism. The purpose of this chapter is to grasp the connotation and extension of terrorism crime and anti-terrorism mechanism from the macro level.
The second chapter, the construction of foreign counter-terrorism mechanism, as a "stone of other mountains", absorb the successful experience of foreign countries, and also prevent their lessons. This chapter mainly introduces the construction of anti-terrorism mechanism in the United States, Britain, Russia and India. The United States is one of the most serious countries that have suffered terrorist attacks, in the group. We should learn and draw lessons from building up anti-terrorism forces, building anti-terrorism mechanisms and so on.
The second part is composed of third chapters, fourth chapters, fifth chapters and sixth chapters. The four chapters are the expansion, refinement and in-depth discussion of the anti-terrorism system in the first chapter of the first chapter, and the detailed explanation of the elements and systems of the anti-terrorism mechanism.
The third chapter, the main issue in the construction of anti-terrorism mechanism in China, from the formation of anti terrorist team to personnel selection, and the determination of the commanders in detail, in order to establish a sophisticated counter-terrorism team in our country.
The fourth chapter, the construction of anti-terrorism prevention and control mechanism in our country, this chapter starts from the importance of the prevention of terrorism crime, analyzes the causes of terrorism crime and finds the root of its occurrence, so as to achieve "targeted", introduce advanced fractal theory to predict the occurrence and development of terrorism crime. With the principle of comprehensive administration of social security, we must effectively control the key areas, key places and key population of the society, and do not give the terrorists any opportunity.
The fifth chapter, the construction of our country's anti-terrorism early warning mechanism, from the moment of the terrorist crime to organize the human control of the terrorism crime quickly, to eliminate the further expansion of its harmfulness, thus leads to the design of the anti-terrorism plan, "fight for the war of preparation", and preview the situation of the crime of terrorism. In the design of the case, each department should take action immediately to find the most suitable way to deal with the event at the fastest speed, and to minimize the disaster caused by the terrorist incident. This chapter mainly discusses the design of the plan with the case of explosion and hostage taking as an example.
The sixth chapter - the attack mechanism of terrorist crime investigation, "intelligence is the frontier of defense", the most important thing in the investigation of anti terrorism investigation is the collection of terrorist criminal intelligence. Only by obtaining correct, accurate information can effectively combat terrorism crime. This chapter from the importance of intelligence, discusses the means of collecting information and the methods of use. In the method of collecting and using information, it quotes advanced information collection theory, "construction of anti terrorism intelligence chain", "intelligence comprehensive identification system", "threat analysis", "third party rules" and so on. In the attack of terrorism crime, the funds of terrorist crimes are cut off, and suspicious accounts, suspicious accounts tracking and monitoring are particularly important. In addition, the traditional methods of investigation also play an important role in the detection of terrorist crimes. The use of survey visits, interrogation, scene investigation and search and other measures play an immeasurable role in the detection of cases. The negotiations with the counter terrorism department are threatening the hostages. Therefore, the means, methods and precautions of hostage taking should be paid close attention to.

【学位授予单位】:西南政法大学
【学位级别】:硕士
【学位授予年份】:2008
【分类号】:D631

【引证文献】

相关硕士学位论文 前2条

1 许善品;论中印反恐合作[D];上海师范大学;2011年

2 吴助斌;长沙市城市反恐问题研究[D];湖南大学;2011年



本文编号:1896968

资料下载
论文发表

本文链接:https://www.wllwen.com/shekelunwen/gongan/1896968.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户77ac7***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com