• Title/Summary/Keyword: Military Intelligence Team

Search Result 12, Processing Time 0.024 seconds

Automated Course of Action Evaluation for Military Decision-Making (지휘결심을 위한 자동 방책 평가)

  • Geewon Suh;Hyungkeun Yi;Minhyuk Kim;Byungjoo Kim;Moonhyun Lee;Jaewoo Baek;Changho Suh
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.4
    • /
    • pp.437-445
    • /
    • 2024
  • In future complex and diverse battlefield situations, the existing command system faces the challenge of delayed human judgement of strategy and low objectivity. This paper proposes an artificial intelligence model that takes situation information and course of action simulation results as input and automatically assigns scores to various evaluation elements and a comprehensive score. This tool is expected to assist the commander in making decisions, reduce the time required for making judgments, and promote impartial decision-making.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

A Basic Study on the Selection of Required Operational Capability for Attack Drones of Army TIGER Units Using AHP Technique (AHP 기법을 이용한 Army TIGER 부대 공격용 드론의 작전요구성능 선정에 관한 기초 연구)

  • Jinho Lee;Seongjin Kwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.197-204
    • /
    • 2023
  • The importance of each warfighting function for Army TIGER unit attack drones is measured using the AHP technique. As a result, the importance of attack drones is high in the order of maneuver, firepower, intelligence, command/control, protection, and operation sustainment, but the importance of maneuver, firepower, and intelligence are almost similar. In addition, it is analyzed that attack drones capable of carrying out day and night missions by being equipped with an EO/IR sensor and being commanded/controlled in conjunction with the C4I system to eliminate threats with small bombs or aircraft collisions is needed. Finally, based on the results of this study, a virtual battle scenario for attack drones is proposed.

A Study on the Influencing Factors of KMS Utilization in Military Organizations by analyzing current use of KMS in Korea Air Force (공군 KMS 활용실태 실증분석을 통한 군 조직에서의 KMS 활용에 미치는 영향에 대한 연구)

  • Lim, Gyoo-Gun;Lee, Young-Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.1
    • /
    • pp.85-100
    • /
    • 2008
  • The digital economy era is a knowledge-based society. Many organizations have been establishing KMS (Knowledge Management System), and there are no exceptions in military ones. In this study, we analyze the influencing factors for KMS utilization in a military organization, which is a specialized one. For this purpose, we investigate the current status of KMS of ROKAF (Republic Of Korea Air Force), derive problems and issues, and try to find out solutions for the KMS utilization in military organizations by analyzing a survey. At first, we derive three characteristics of the military organization that affect the knowledge sharing : formalization of organization, trust of organizational culture, and top management's will. And we verified that the users, who recognize that the top management has the will for the knowledge sharing, have high recognition for the knowledge sharing and utilize KMS more than others. This study shows that it is very important for the top management to participate in the knowledge sharing voluntarily especially in the military organization.

  • PDF

Natural Selection in Artificial Intelligence: Exploring Consequences and the Imperative for Safety Regulations

  • Seokki Cha
    • Asian Journal of Innovation and Policy
    • /
    • v.12 no.2
    • /
    • pp.261-267
    • /
    • 2023
  • In the paper of 'Natural Selection Favors AIs over Humans,' Dan Hendrycks applies principles of Darwinian evolution to forecast potential trajectories of AI development. He proposes that competitive pressures within corporate and military realms could lead to AI replacing human roles and exhibiting self-interested behaviors. However, such claims carry the risk of oversimplifying the complex issues of competition and natural selection without clear criteria for judging whether AI is selfish or altruistic, necessitating a more in-depth analysis and critique. Other studies, such as ''The Threat of AI and Our Response: The AI Charter of Ethics in South Korea,' offer diverse opinions on the natural selection of artificial intelligence, examining major threats that may arise from AI, including AI's value judgment and malicious use, and emphasizing the need for immediate discussions on social solutions. Such contemplation is not merely a technical issue but also significant from an ethical standpoint, requiring thoughtful consideration of how the development of AI harmonizes with human welfare and values. It is also essential to emphasize the importance of cooperation between artificial intelligence and humans. Hendrycks's work, while speculative, is supported by historical observations of inevitable evolution given the right conditions, and it prompts deep contemplation of these issues, setting the stage for future research focused on AI safety, regulation, and ethical considerations.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Design and Performance Analysis of Common data link digital modem for surveillance UAVs (정찰용 무인기를 위한 공용데이터링크 모뎀 설계 및 성능 분석)

  • Jung, Sungjin;Kim, Younggil;Lee, Daehong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.162-168
    • /
    • 2018
  • The UAV(Unmanned Aerial Vehicle) system, including the drone of a variety of fields, which has become an issue and utilized in various fields, has begun to develop in military fields and is actively developed in the commercial field. In various types of UAV systems, which have been developed recently, the communication system that is responsible for the connection between the ground control unit and the UAVs is called the data link. Especially, common data link used in military UAVs is required stability of communication to transmit surveillance and reconnaissance intelligence information and UAV's status. In this paper, the requirement for a modem was defined to secure the communication stability of the common data link used in surveillance UAVs. And, the design of the data link modem to satisfy applicable specifications was proposed. The proposed modem design was verified through the performance measurement of the implemented systems.

Advanced Navigation Technology Development Trend as an Unmanned Vehicle Core Technology

  • Seok, Hyo-Jeong;Hwang, In Seong;Kang, Wanggu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.4
    • /
    • pp.235-242
    • /
    • 2021
  • Unmanned Aerial Vehicles (UAVs), which were used for military purposes, are gradually expanding their application fields under the influence of electrification and digitalization. Starting from the field of aerial imaging and Intelligence Surveillance and Reconnaissance (ISR) mission, nowadays the possibility of Urban Air Mobility (UAM), which transports passengers and cargo with drones, is widely under discussion. In order to occupy the rapidly growing global unmanned aerial vehicle market in advance, it is necessary to secure core technologies and develop key UAVs components based on the new technologies. In the navigation field, it is necessary to secure a precise position with guaranteed reliability and continuity, unrelated to the operating environments. The reliability and continuity should be secured in the algorithm level and in the H/W component levels also. In order to achieve this technical goal, the Ministry of Science and ICT has launched the 'Unmanned Vehicle Core Technology Research and Development Program' in 2019 to support the R&D on the unmanned vehicle technologies. In this paper, authors introduce the unmanned vehicle core technology research and development program to the related researchers. The authors summarize the backgrounds of the program and show the technological tasks and objectives on the sub-programs in the unmanned vehicle navigation program. We present the program schedules especially focused on the test and evaluation of the developed technologies and components.

A Study on the Estimation of the Proper Price of Weapon System by Performance Factors: Focused on Heli-Launched Anti-Tank Guided Missiles (성능요인에 따른 무기체계 적정가격 추정방안 연구: 헬기발사형 대전차 유도무기를 중심으로)

  • Park, Sanghyun;Kang, Eonbi;Jeon, Jeonghwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.133-143
    • /
    • 2021
  • In government procurement programs, cost estimation and analysis support funding decisions and are the basis for other major decisions, too. Such estimating and analyzing the cost of the weapon systems are crucial in execution of the defense budget. However, existing cost estimations and analyses have focused on domestic R&D projects, thus those are not valid in application to foreign weapon acquisitions. This study aims at foreign weapon systems that are acquired from Direct Commercial Sales. Because the data for price estimation of a foreign weapon is usually not available, we suggest a price estimation model based on performance factors of the weapon. In this study, the proper price of the weapon system is estimated using the parametric cost estimating model. Using the data of helicopter-launched anti-tank guided missiles worldwide, we analyze the effect of each performance factor on the weapon system price by regression analysis, and use step-wise and ridge regression analysis to remove multi-collinearity. This study hopefully contributes to more reasonable decision making on proper price of weapons.