• Title/Summary/Keyword: 비대칭 전술

Search Result 6, Processing Time 0.02 seconds

Study on the Case of the Asymmetric War (비대칭전 주요사례 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.25-32
    • /
    • 2016
  • We can not respond asymmetric warfare effectively. The asymmetric operation is performed in asymmetric methods and means with different characteristics and functions to their enemy. And the character of the asymmetric operation have 'heterogeneity' and 'superiority' in principle. The type of asymmetric strategy is complex and diverse. Since we can classify the type of the asymmetric strategy in many different way and we must study in many ways and aspects. When we study asymmetric war previous cases from modern to ancient era, we can find that the key factors of the victory have superiority of the asymmetric strategy and discriminatory measures. The asymmetry is created when one party has to adapt to the strategic environment. If we want to secure a strategic advantage, we must take a number of case studies and countermeasures for asymmetric warfare.

An Analysis of Military Strategies in the Israel-Hamas War (2023): Asymmetric Tactics and Implications for International Politics (이스라엘-하마스 전쟁(2023)의 군사전략 분석: 비대칭 전술과 국제정치적 함의)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.389-395
    • /
    • 2024
  • This study aims to deeply analyze the military strategies and tactics used in the battles between Israel and Hamas, to understand the military approaches, technical capabilities, and their impact on the outcomes of the conflict. To achieve this, methodologies such as literature review, data analysis, and case studies were utilized. The research findings confirm that Hamas employed asymmetric tactics, such as rocket attacks and surprise attacks through underground tunnels, to counter Israel's military superiority. On the other hand, Israel responded to Hamas's attacks with the Iron Dome interception system and intelligence-gathering capabilities, but faced difficulties due to Hamas's underground tunnel network. After six months of fighting, the casualties in the Gaza Strip exceeded 30,000, and more than 1.7 million people became refugees. Israel also suffered over 1,200 deaths. Militarily, neither side achieved a decisive victory, resulting in a war of attrition. This study suggests that the Israel-Hamas war exemplifies the complexity of modern asymmetric warfare. Furthermore, it recommends that political compromise between the two sides and active mediation efforts by the international community are necessary for the peaceful resolution of the Israel-Palestine conflict.

Design and Performance Analysis of Asymmetric Time Division Multiple Access Method for Improving Response Time and Throughput in Tactical Radio Communication (전술 무선통신망의 응답시간 및 처리량 개선을 위한 비대칭 다중접속기법 설계 및 성능분석)

  • Kwon, Yong Hyeun;Cha, Joong Hyuck;Kim, Dong Seong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.361-369
    • /
    • 2018
  • This paper proposes a design of asymmetric time division multiple access method for tactical radio communication. Typical tactical radio communication has a limited execution of transmission, because uplink message requires more extended response time than downlink message. In order to solve this problem, this paper analyzes operational environment of Korean tactical radio communication and proposes an asymmetric TDMA based on it for performance of tactical communication. The simulation model is used to investigate constraints of real experiments for proving effectiveness of the proposed approach. Simulations results show that the proposed scheme outperforms the conventional scheme in terms of throughput, response time, and delay.

A Study on the Deployment Plan of Fighter Aircraft Considering the Threat of Enemy Missiles (적 미사일 위협 고려한 전투기 전력 배치방안 연구)

  • Park, Inkyun;Ha, Yonghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.47-54
    • /
    • 2020
  • North Korea has recently developed and deployed missiles with various ranges as asymmetrical forces. Among them, short-range ballistic missiles with improved accuracy are expected to aim at achieving tactical goals by hitting important military facilities in Korea with a small number of missiles. Damage to the air force airfields, one of North Korea's main targets of missiles attack, could limit the operation of air force fighters essential to gaining air superiority. Based on the attack by the short range ballistic missiles, the damage probability of military airfields was simulated. And as the one of the concepts of passive defense, the way to reduce the loss of combat power was studied through the changes of the air force squadrons deployment. As a result, the effective deployment plan could be obtained to reduce the amount of power loss compared to the current deployment.

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF