• Title/Summary/Keyword: Military Security policy

Search Result 194, Processing Time 0.029 seconds

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A study on the transfer of discharged female soldiers to the reserve force: Focusing on the need for transfer and impact on reserve female soldiers (전역 여군의 예비역 편입에 관한 연구)

  • Jeon, Kiseok;Choi, Soonwon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.167-174
    • /
    • 2024
  • While reserve forces play a critical role in modern warfare, the primary focus on reserve forces has been on men. Women's reserve forces have received little attention. The purpose of this study is to examine the need to increase the number of women in the reserve and the impact of increasing the number of women on active duty. The reasons for the need for women in the military are the decrease in the resources of the reserve force as well as the regular force due to the decrease in population, the development of fields where women can perform missions with advantages due to the changing patterns of warfare, and the changing situation of gender equality and the increasing role of women in society. However, it is currently optional, not mandatory, for female veterans to join the Reserve. The number of cadres entering the reserve may decrease as the number of active-duty women increases. Using a 2018 estimate of 13.9 percent of women transitioning to the Reserve, 194 of the 1,402 projected transitioning women in '27 will transition to the Reserve. This leaves an estimated shortfall of 1,208 reserve officers and NCO. This suggests that the policy of increasing the number of women on active duty could have a significant impact on the reserve force in the future, and further policy research is needed.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

Testing the Convergence of Military Expenditure and Arms Imports in Northeast Asian Countries (동북아 국가의 국방비 지출 및 군수물자 수입 수렴성 검정)

  • Rhee, Hyun-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.475-487
    • /
    • 2013
  • The aim of this study is to examine an existence of mutual interdependency in terms of military expenditure and arms imports between Northeast Asian countries such as South Korea, North Korea, China, Japan, and U.S. Recently, the mood of post cold war and intensified globalization lead to be disarmament in pursuing a policy on national defence in many countries. Since potential menace to national security has been receiving more concern rather than a direct armed clash, mutual interdependency on military spending should be fully understood. For a methodological tools, ${\beta}$ and ${\sigma}$-convergences, convergence with rational expectation, and Granger causality test are employed. Empirical evidence shows that the convergences which are evaluated by ${\beta}$, ${\sigma}$, and by a model based on rational expectation are in general revealed, and differences are more sensitive to a military decision making procedures. Granger causality, however, is not being existed. To this end, it would be concluded that the Northeast Asian countries are going with a trend in the world than forming their own tendency in this region.

A Study on the Establishment of Social Cooperative for the Job Creation of discharged solider (제대군인 일자리 창출을 위한 사회적 협동조합 설립 방안 연구)

  • Koo, Young Hui;Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.149-158
    • /
    • 2018
  • Military officials in Korea are forced to change jobs early due to the retirement age after active service. Measures are needed in view of the 55% average employment rate of middle and long term soldiers during the last five years. The last government of Park Geun-hye push ahead creating of 50,000 jobs in discharged soldier with policy, but the results were not great. Therefore, it is time to drastically change the government's efforts to create large-scale jobs for discharged soldiers. It is necessary to break away from the traditional ways of expanding opportunities for employment at the academic level. So it became necessary for discharged soldiers to actively review ways to build their own organizations. For such reasons, this study presents a measure to create job through food service, Security personnel training and Manpower provision business, Special Soldier Control and Training Center Operation business, Han River Water Cleaning Project, Caring business, and delivery business by establishing their own social cooperation to create jobs for discharged soldiers.

  • PDF

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

The North Korean Nuclear problem and disarmament of Outer Space (북한 핵문제와 우주군축)

  • Noh, Dong-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.219-246
    • /
    • 2017
  • Nuclear issue is a good example showing globalization of the international regime. The history showed nuclear weapons may cause the extinction of human races when the first nuclear bombs fell down to Japan in August, 1945 and people became increasingly eager to achieve peace. Military buildup for national security is a matter of existence in the international society. However, disarmament or arms control to secure international peace and safety which is also the purpose of the Charter of the United Nations may be the most important task for us to realize peace of the mankind. Today, disarmament, together with amicable settlement of international conflicts and collective security system, is an important means to maintain and promote international peace and safety. It might be our permanent task to realize complete disarmament but, as the Preamble of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) expressed general and complete disarmament, the international society has clarified its effort for complete disarmament. Thus, taking a look into the international regime on the nuclear issue and progress related to the nuclear issue in North Korea, the study was intended to introduce the globalization of the nuclear issue, review the international effort for nuclear disarmament based on the concept of the 'common heritage of the mankind' and with respect to the United Nations Committee on the Peaceful Uses of Outer Space (COPUOS) and controls over nuclear weapons, and then evaluate the North Korean nuclear issue, which is in direct relation with South Korea and international laws, in terms of the space law and disarmament acts. The collective security system along with policies to prevent dissemination of nuclear weapons should also be emphasized and implemented to cope with the North Korean nuclear issue.

  • PDF

Research on Measures to Enhance Railroad Security Checks of Railroad Police Officers to Prevent Terrorist Attacks (철도테러 예방을 위한 철도경찰 보안검색 강화 방안 연구)

  • Gwon, Hyeon-Shik
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.157-183
    • /
    • 2016
  • Countries across the globe, including those in Europe, are waging a "war against terrorism" as international terrorist groups such as ISIS and lone-wolf terrorists have unleashed various large-scale attacks on rail infrastructure. Anti-South Korean sentiment exists in Muslim-majority countries because the nation has cooperated with the US for its military interventions in the Middle East, and ISIS has threatened to target South Korea four times since September 9, 2015. In addition, North Korea has been left isolated in the international community with its missile and nuclear tests, while further escalating inter-Korean tension and threatening to strike major facilities and attack important figures in the South. These situations imply that South Korea is no longer immune to terrorist attacks. If the nation fails to prevent or deter such terrorist attacks against rail networks, massive casualties, property damage and social confusion would be unavoidable, deteriorating national and international trust in its counter-terrorism policies. This may lead to a national crisis involving decreases in the number of tourists, dampened interest of foreign investors, and capital flight. This study aims to propose policy measures to enhance railroad security checks, based on the work of railroad police officers, for the sake of protecting citizens and public safety. The suggestions include an incremental expansion of railroad security checks; growth of the railroad police force and adjustment of their policing distribution with other police officers; enhancement of security systems across important rail networks; improvement of the Railroad Safety Act; Southeast Asia, including the corresponding strengthening of the national crackdown illegal immigrants, and plans for pre-emptive and regular cooperation among organizations related to the promotion of security checks and the prevention of terrorist attacks.

  • PDF