• Title/Summary/Keyword: 美國國防部

Search Result 73, Processing Time 0.024 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Implications of Korea Through the Policy Analysis of AI Start-up Companies in Major Countries (주요국 AI 창업기업 정책 분석을 통한 국내 시사점 연구)

  • Kim, Dong Jin;Lee, Seong Yeob
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.2
    • /
    • pp.215-235
    • /
    • 2024
  • As artificial intelligence (AI) technology is recognized as a key technology that will determine future national competitiveness, competition for AI technology and industry promotion policies in major countries is intensifying. This study aims to present implications for domestic policy making by analyzing the policies of major countries on the start-up of AI companies, which are the basis of the AI industry ecosystem. The top four countries and the EU for the number of new investment attraction companies in the 2023 AI Index announced by the HAI Research Institute at Stanford University in the United States were selected, The United States enacted the National AI Initiative Act (NAIIA) in 2021. Through this law, The US Government is promoting continued leadership in the United States in AI R&D, developing reliable AI systems in the public and private sectors, building an AI system ecosystem across society, and strengthening DB management and access to AI policies conducted by all federal agencies. In the 14th Five-Year (2021-2025) Plan and 2035 Long-term Goals held in 2021, China has specified AI as the first of the seven strategic high-tech technologies, and is developing policies aimed at becoming the No. 1 AI global powerhouse by 2030. The UK is investing in innovative R&D companies through the 'Future Fund Breakthrough' in 2021, and is expanding related investments by preparing national strategies to leap forward as AI leaders, such as the implementation plan of the national AI strategy in 2022. Israel is supporting technology investment in start-up companies centered on the Innovation Agency, and the Innovation Agency is leading mid- to long-term investments of 2 to 15 years and regulatory reforms for new technologies. The EU is strengthening its digital innovation hub network and creating the InvestEU (European Strategic Investment Fund) and AI investment fund to support the use of AI by SMEs. This study aims to contribute to analyzing the policies of major foreign countries in making AI company start-up policies and providing a basis for Korea's strategy search. The limitations of the study are the limitations of the countries to be analyzed and the failure to attempt comparative analysis of the policy environments of the countries under the same conditions.

  • PDF

Beginning of the Meteorological Satellite: The First Meteorological Satellite TIROS (기상위성의 태동: 최초의 기상위성 TIROS)

  • Ahn, Myoung-Hwan
    • Atmosphere
    • /
    • v.22 no.4
    • /
    • pp.489-497
    • /
    • 2012
  • Recently released a top secret document explicitly shows that the early development plan for an earth observation satellite in the USA has a hidden and more important purpose for a concept of 'free space' than the scientific purpose. At that time, the hidden and secret concept imbedded within the early space development plan prevail other national policies of the USA government for purpose of the national security. Under these circumstances, it is quite reasonable to accept a possibility that the meteorological satellites which play a key role in the every area of meteorology and climatology was also born for the hidden purposes. Even it is so, it is quite amazing that the first meteorological satellite is launched in the USA despite of the facts that the major users of the meteorological satellites were not very enthusiastic with the meteorological satellite and the program was not started as a formal meteorological satellite project. This was only possible because of the external socio-political impact caused by the successful launch of the Russian Sputnik satellite and a few key policy developers who favored the meteorological satellite program. It is also interesting to note that the beginning of the first Korean meteorological satellite program was initiated by a similar socio-political influence occurred by the launch of a North Korean satellite.

Development of e-navigation shipboard technical architecture (e-navigation 선상시스템을 위한 기술적 아키텍처 개발)

  • Shim, Woo-Seong;Kim, Sun-Young;Lee, Sang-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.37 no.1
    • /
    • pp.9-14
    • /
    • 2013
  • The e-navigation has been being developed in IMO is a sort of strategy to provide user-oriented services for safe navigation and environmental protection based on the architecture and its related services complying with the user needs. At NAV $57^{th}$ meeting in 2011, the overarching e-navigation architecture was approved which represent overall relationship only between onboard and ashore elements, so more detail technical architecture for each element should be developed for implementation in view of services and systems. Considering the continuous and iterative verification of e-navigation development process required by IMO, the relationship and traceability should be took in consideration between the outcome of e-navigation process and the element of the architecture. In this paper, we have surveyed literarily the user needs, result of gap analysis and practical solutions to address them and defined the architecture elements and their relationship considering the three kinds of views of DoDAF(Architecture Framework) of US department of Defence, in result, proposed the e-navigation shipboard technical architecture.

A study of aviation leisure sport demand creation strategy (항공레저스포츠 시장창출 전략 연구)

  • Park, Jin-seo;Sim, Ga-ram;Sung, yeun-young;Kim, Mee-sook
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.181-206
    • /
    • 2015
  • Due to the increased leisure time, national income levels, and increasing the desire for new experience, interest causes increasing demand for recent aviation leisure sport. This leads to the need for a competitive foundation of the expansion of aviation leisure sports market potential. In 2014, the MOLIT(Ministry of Land, Infrastructure and Transport) created definition of sport and recreational aviation industry in the Aviation Act. The most significant change in Aviation Act related to sport and recreational aviation, it allows easier access for those wishing to participate in the joy of flight and also creating a sport and recreational aviation business market expansion. Therefore, in this paper, by analyzing the trend of foreign policy trends and domestic policies that sport and recreational aviation has been enabled, it is trying to present the activation policy proposals of sport and recreational aviation that is suitable for Korea.

Response Methods against Acts of Terrorism That Utilize Unmanned Aircraft (무인항공기 테러의 대응방안)

  • OH, Jea-Hwan
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.61-83
    • /
    • 2012
  • Al-Qaeda follower who planned to attacks the Pentagon and the Assembly by unmanned aircraft equipped with explosives was caught in the dictionary in September 2011. In addition, high-performance unmanned aerial vehicles in the United States 'sentinel' of the technology being leaked to Iran in late 2011 was an accident. Terrorist attacks on the forces used unmanned aircraft will be the day the not too distant. The purpose of this research is to provide response plans against acts of terrorism utilizing unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. Discussing in detail, this research suggests revising and newly implementing the definition and categorization of unmanned aircrafts as well as relevant punishment in current aeronautics regulations as an initial response against acts of terrorism utilizing unmanned aircrafts. This is in order to newly implement and revise current relevant regulations that inadequately address the rapidly developing and changing unmanned aircrafts which will lead to increased sense of alarm for the potential terrorists, and also to introduce a systematic tool to punish those who commit such acts by clearly establishing the grounds for punishment. Also, under the binary operating system over airspace currently implemented globally, it is impossible to identify and control the infiltration of airspace by unmanned aircrafts. Recognizing such limitations, this research suggests a combined operation of airspace for unmanned and manned aircrafts as a second way of response for acts of terrorism utilizing unmanned aircrafts. A systematic integrated operation of airspace will appropriately control unmanned/ manned aircrafts that were not previously reported or otherwise have deviated from navigation routes, and will be able to prevent terrorism attempts utilizing aircrafts beforehand.

  • PDF

Quantitatively Managed Leveling for Capability Maturity Model Integration Implementation (정량적 소프트웨어 능력성숙도모델 도입전략 및 사례)

  • Kim, Hanyoung;Lee, Wookey;Lee, James J.H.;Lee, Rich C.K.
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.335-346
    • /
    • 2013
  • With the overwhelming development of information technologies, the need for software development that can deal with diversified and complex business processes has increased dramatically. As a result, companies prefer softwares that can handle far more complex processing ability and also it should be stable as well as easier to maintain. These ambivalent requirements keep the software development organizations from assessing the quantitative abilities, so that under the support of the U.S. Department of Defense the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been developed. The CMMI upper levels for the software development companies will be evaluated to be excellent and authenticated, which drives the companies to get and maintain high levels of maturity. In this paper, a case study for a domestic software company has been exploited how to achieve CMMI level 4 and what kind of factors have been played an effective role. These issues at the domestic and international software and maintenance program, can influence the trustworthiness and marketing effects for the global market. In this paper, the company's actual case study will give clues to find out the important factors for the development and maintenance of software companies maturity levels.

A Case Study of Cognitive Warfare in the Israel-Palestinian Conflict in 2021 (2021년 이스라엘-팔레스타인 분쟁에서의 인지전 사례 연구)

  • Cho, Sang Keun;Choi, Soon Sik;Woo, Seong Ha;Kim, Ki Won;Lee, Seung Hyun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.537-542
    • /
    • 2022
  • The "cognitive warfare," which has emerged as a result of the Ukrainian-Russian war, has already existed in the previous war and is now emerging as a major aspect of the war, its meaning and influence are increasing. Recognizing the emergence and importance of cognitive warfare and understanding the meaning and characteristics of cognitive warfare must be accompanied by victory in the modern war. After Russia's alleged involvement in the U.S. presidential election in 2016 drew attention, the Israeli-Palestinian conflict in 2021 confirmed its upward influence. In particular, 'cognitive warfare' using SNS played a major role in leading the war to its advantage and maintaining the initiative by selecting clear purposes and targets such as the international community, the people, and Hamas. This new pattern of war is gradually emerging as the world is hyper connected with the advent of the Fourth Industrial Revolution. It is expected that it will play a leading role in the future battle if it clearly recognizes the main contents of the new war, "Injijeon," and has the ability and ability to actively operate it.

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.

A Study on the Peaceful Uses of Outer Space and International Law (우주의 평화적 이용에 관한 국제법 연구)

  • Kim, Han Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.273-302
    • /
    • 2015
  • The term "peaceful uses of outer space" in the 1967 Outer Space Treaty appears in official government statements and multilateral outer space related treaties. However, the examination of the state practice leads to the conclusion that this term is still without an authoritative definition. As far as the meaning of 'peaceful use' in international law is concerned the same phrases in the UN Charter, the 1963 Treaty of Banning Nuclear Weapons Tests in the Atmosphere in Outer Space and Under Water, the 1956 Statute of IAEA, the 1959 Antarctic Treaty, the 1982 UN Convention on the Law of the Sea, the 1968 Nuclear Non-Proliferation Treaty and the 1972 United Nations Conference of the Human Environment were analysed As far as the meaning of 'peaceful uses of outer space' is concerned the same phrases the 1967 Outer Space Treaty, the 1979 Moon Treaty and the 1977 Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques(ENMOD) were studied. According to Article IV of the 1967 Outer Space treaty, states shall not place in orbit around the earth any objects carrying nuclear weapons or any other kind of weapons of mass destruction, install such weapons on celestial bodies, or station such weapons in outer space in any other manner. The 1979 Agreement Governing the Activities of States on the Moon and Other Celestial Bodies repeats in Article III much of the Outer Space Treaty. This article prohibits the threat or use of force or any other hostile act on the moon and the use of the moon to commit such an act in relation to the earth or to space objects. This adds IN principle nothing to the provisions of the Outer Space Treaty relating to military space activities. The 1977 ENMOD refers to peaceful purposes in the preamble and in Article III. As far as the UN Resolutions are concerned, the 1963 Declaration of Legal Principles Governing the Activities of States in the Exp1oration and Use of Outer Space, the 1992 Principles Relevant to the Use of Nuclear Power Sources in Outer Space(NPS) were studied. And as far the Soft Laws are concerned the 2008 Draft Treaty on the Prevention of the Placement of Weapon in Outer Space and of the Threat or Use of Force against Outer Space Objects(PPWT), the 2002 Hague Code of Conduct against Ballistic Missile Prolifiration(HCoC) and 2012 Draft International Code of Conduct for Outer Space Activities(ICoC) were studied.