• Title/Summary/Keyword: Drone Threat

Search Result 33, Processing Time 0.023 seconds

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Counter-Drone System Evaluation Framework induced by RMA Thinking Process (군사혁신(RMA) 사고과정을 적용한 대드론체계 평가 기준(안) 정립)

  • Sang-Keun Cho;In-keun Son;Ki-Won Kim;Kang-Il Seo;Kwonil Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.277-281
    • /
    • 2023
  • Recent aggressive threats by North Korea using small drones have heavily impacted on ROK(Republic of Korea) society and it seems to be agreed that counter-drone systems are required to protect our properties. ROK government has been investigating current counter-drone systems for national important facilities. However, there is no consensus standard to evaluate the systems. This paper is to propose a counter-drone system evaluation framework which is the outcome through RMA(Revolution in Military Affairs) thinking process. The RMA thinking process is currently well-implemented in ROK army to develop future military strategy. The proposed framework has 4 categories - threat analysis of North Korea small drones, convergence of detection, tracking and neutralizing systems, integrated operations and available experts and organization - which have corresponding criteria.

A Study on the Establishment of Anti-Drone Concept and Effective Response System (안티드론 개념 정립 및 효과적인 대응체계 수립에 관한 연구)

  • Lee, Donghyuk;Kang, Wook
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.9-31
    • /
    • 2019
  • Due to the development of technology and popularization of drone, the so-called "dirty drone" that exploits drones for crimes and terrorism has become a social problem, and it is time to seriously consider the "revenge of drones." Indeed, the cases of threats posed by drones are expanding not only to threats to ground facilities, but also to aviation safety threats, more recently to large-scale events, demonstrations and crimes targeting specific personnel, and terrorism. This research clearly defined the concept of anti-drone when it emerged as a new type of social safety threat as it was abused in crime and terrorism, while response to it was not enough yet. Through this process, it was intended to present an effective anti-drones system. We analyzed the major controversial elements of anti-drone, and defined them as "comprehensive response activities at the legal, institutional and technical levels performed by law enforcement agencies, related technology and industrial entities in a way that prevents, detects, and blocks acts that violate public well-being and order, such as crimes and terrorism caused by the drones." To effectively respond to dirty drones, the authority of law enforcement agencies and the enactment of relevant laws were proposed. In the future, a comprehensive and systematic follow-up study of the anti system should be conducted.

Implications on US DoD Counter-Small Aircraft Systems Strategy (미 국방부 소형드론 대응전략과 시사점)

  • Kang-Il Seo;Sang-Keun Cho;Ki-Won Kim;In-keun Son;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.239-243
    • /
    • 2023
  • Due to recent small unmanned aircraft threats by North Korea and unsuccessful reponses, severe concerns about future national security have been being increasingly surged. Especially it is notable and unaccpetable to see that North Korea's small drones flying over capical areas over 7 hours were not efficiently detected and identified even though South Korea already recognized the threats since early 2010s. Meanwhile a US military troop operating THAAD system on Seung-Joo, South Korea successfully shot down unidentified small drone on Jan 2023. The threats caused by small unmanned aircraft is worrisome not only to South Korea, but also to international nations. This paper surveyed US DoD Strategy for countering small aircraft systems and suggest how to improve our current anti-dron systems so that small unmanned aircraft threats will be dynamically diminished or neutralized as fast as we can.

A Study on Land-cover and Sedimentary Environment Changes Before and After the 2020 Flood in the Seomjin River Chimsil Wetland (섬진강침실습지의 2020년 홍수 전·후 토지피복 및 퇴적환경 변화 연구)

  • Lee, Ye-Seul;Lim, Jeong-Cheol;Jang, Dong-Ho
    • Journal of The Geomorphological Association of Korea
    • /
    • v.28 no.4
    • /
    • pp.15-30
    • /
    • 2021
  • This study analyzed the changes in land-cover and sedimentary environment before and after flooding through drone images and sediment analysis for the Seomjin River Chimsil Wetland. The results showed that the area of some land-covers such as sand bar, grass, and trees were continuously changed. The acidity level of the sediments in the Seomjin River Chimsil Wetland was weakened gradually by flooding and EC was also decreased. The levels of organic matter, effective phosphoric acid, and CEC, however, were fluctuating depending on branches, which seems to be the result of landization as new sedimentary environment was developed and vegetation was settled after the flood. Average mean size of river sediments was found to be fine sand, and it exhibited various particle size characteristics from granule to medium silt depending on the location. As the sedimentary environment changed due to the effects of floods and typhoons, the particles were granulated or grain refined depending on the position. In the Seomjin River Chimsil Wetland, there were factors that could interfere with geomorphic development and sedimentary environment, contamination sources in and around the wetland, and natural threat factors. Therefore, in this study, a conservation and management plan was proposed to remove these threat factors and to preserve the scarcity, naturalness, and dynamics of Seomjin River Chimsil Wetland.

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Security Threat Trend based on Drone Embedded System and Network Protocol (드론 임베디드 시스템 및 네트워크 프로토콜 기반 보안위협 동향)

  • Sang-Hyeon Park;In-Su Jung;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.190-191
    • /
    • 2023
  • IoT(Internet of Things) 기술을 기반으로 한 드론은 사용자의 요청에 따라 데이터 처리, 수집, 송·수신 등에 고도화된 ICT(Information and Communications Technology) 기술을 활용하고 있다. 또한, 드론은 ICT 기술이 발전함에 따라 문화, 소방, 국방 등 다양한 분야에 적용되어 사용자에게 편의를 제공하고 있다. 그러나, 드론에 적용되는 ICT 기술과 드론에 탑재되는 기술들이 고도화됨에 따라 드론 모듈 내 펌웨어 및 무선 네트워크를 대상으로 한 보안위협이 증가하고 있다. 따라서 본 논문은 드론의 보안위협에 대응하기 위하여 드론 임베디드 시스템 및 네트워크 프로토콜을 대상으로한 최신 보안위협 동향을 분석한다.

High-Resolution Mapping Techniques for Coastal Debris Using YOLOv8 and Unmanned Aerial Vehicle (YOLOv8과 무인항공기를 활용한 고해상도 해안쓰레기 매핑)

  • Suho Bak;Heung-Min Kim;Youngmin Kim;Inji Lee;Miso Park;Tak-Young Kim;Seon Woong Jang
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.2
    • /
    • pp.151-166
    • /
    • 2024
  • Coastal debris presents a significant environmental threat globally. This research sought to improve the monitoring methods for coastal debris by employing deep learning and remote sensing technologies. To achieve this, an object detection approach utilizing the You Only Look Once (YOLO)v8 model was implemented to develop a comprehensive image dataset for 11 primary types of coastal debris in our country, proposing a protocol for the real-time detection and analysis of debris. Drone imagery was collected over Sinja Island, situated at the estuary of the Nakdong River, and analyzed using our custom YOLOv8-based analysis program to identify type-specific hotspots of coastal debris. The deployment of these mapping and analysis methodologies is anticipated to be effectively utilized in managing coastal debris.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.