21 AKIYAMA Masahiro 9.11 2001 2002 2004 1995 2004 12 1 2006 3 2005 3 2 2001 9.11 1990 3 4 9.11
5 6 7 1990 8 1 9 asymmetric threat1990 1997 QDR 10 4 asymmetric warfare
11 12 9.11 13 9.11 14 17 15 s Symmetric threat a Asymmetric threat 1 1-s 1-a 2 2-s 2-a 3 3-s 3-a 4 4-s 4-a
1648 NATO 1-s 2 16 1-a 17
18 2 1960 1970 1980 1990 19 2000 9.11 20 1
2 1 Dirty bomb 210 1 PRG- 7 illegally globalizing network 21 1983 22 23
TV 1999 2003 5 15,301 58,845 24 2
1994 25 26 2 3 2
1 CSI 27 2 28 29 MI5 30 3 TV 4 2 E 100
31 5 6 32 1
33 1 17 2004 12 10 2 http://www.defenselink.mil/advisories/advisory.aspx?advisoryid 140 2005 3 National Defense Strategy 4 3 18 pp.20-21 3 1993 1995 1998 4 Challenging the US Symmetrically and Asymmetrically: Can America be defeated? The 9th Strategic Conference, War College, 1998 5 2001 11 pp.32-42 6 1997 1 7 2002 pp.32-41 8 2002 10 pp.58-65 9 17 2004 pp.51-105 10 Quadrennial Defense Review 11 Challenging the US Symmetrically and Asymmetrically: Can America be defeated? 12 DIA 1999 2 13 Kenneth F. McKensie. Jr. The Revenge of the Melians: Asymmetric Threats and the Next QDR Institute for National Strategic Studies National Defense University 2000 14 9.11 Brian Michael Jenkins Unconquerable Nation Knowing Our Enemy, Strengthening Ourselves RAND Corporation 2006 June
152003 1 pp.26-34 16pp.36-46 17 18 1977 19 2001 pp.1-34 20 pp.209-218 1 5 2001 11 pp.57-58 21 2005 5 p.6 pp.21-24 22 U.S. Department of State Patterns of Global Terrorism 2003 23 http://www.moj.go.jp/kouan/press/060425.html 2006 24 30 1-2 2002 9 pp.13-18 25pp.28-29 26 27 Computer Security Initiative 28 U.A.S. Patriot Act 2002 29pp.44-78 30 HUMINT human intelligence 31 CyberCrime, CyberTerrorism, CyberWarfare CSIS Task Force Report USA 1998 2000 4 21 1999 8 32pp.35-38 33