• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.029 seconds

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

A Critical Review of the Transfer of Presidential Security Work to the Police (대통령경호업무 경찰 이관에 대한 비판적 소고)

  • Jo, Sung-gu
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.177-194
    • /
    • 2019
  • Last year, the Moon Jae-In administration made an attempt to abolish the presidential security office overseeing the presidential security and to transfer the work to the presidential security service under the National Police Agency. Currently, all of the G7 nations maintain a security system spearheaded by the police, so the policy of transferring the presidential security to the National Police Agency may be discussed. However, it is necessary to focus on the following reality. First, the current presidential security system is consisted of the overlapping security organizations classified into (1) inner ring of the presidential security agency, (2) middle ring of the police agency, and (3) outer ring of the capital defense command. If the presidential security agency is abolished, a vacuum will result as per the principle of class. Second, for the efficient security guard of the President, currently, the presidential security agency at the Presidential Security Safety Measure Committee plays the role of coordinating the tasks. If the National Police Agency becomes the control tower of the presidential security, whether command will be available for the military and diplomatic aspects of the presidential security work should also be considered. Third, Korea is currently in a truce with North Korea, so there is a big difference in terms of the security environment with such G7 nations as the UK, Germany, France, and Japan.

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

The nature of UN support of the Korea War (유엔의 6.25전쟁 지원과 성격 -신정공세 전후 유엔의 휴전교섭 노력을 중심으로-)

  • Yang, Yong-Jo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.1-48
    • /
    • 2010
  • The purpose of this study is to examine and analyze the Untied Nations' efforts for peace on Korean peninsular after CCF's participation in Korean War. The Untied Nation tried to negotiate th peace plan between two sides from the end of 1950. Once the CCF's entry into the war had been confirmed, the war situation moved to a new phase, and the UN forces, which had guided the war in an effort to destroy the NKP A forces, and to punish North Korea, had to set up new guidelines to cope with the new situation. Accordingly, in late November, 1950, the UN forces camp, mainly the US Joint Chiefs of Staff and the United Nations Command, discussed various options, such as an expansion of the war up to the Chinese territory, a cease fire along the 38th Parallel, or a forced and inevitable evacuation. The Korean delegation to the UN insisted that "the unification of Korea should be achieved only by victory in the war. The Chinese intervention in the war is a Challenge to the UN in the same way as the North Korean invasion. The UN participation in the war was to repulse the invasion. With the same spirit we should drive back the Chinese Communists." The Korean delegation also emphasized to the friendly nations the political objective and will of unification, and that a cease fire at a threshold of unification might return us to the status quo ante bellum, and would be contrary to the Korean nation's desire. At that time, particularly, the US strongly considered the employment of nuclear weapons as one of the new strategies to cope with the Chinese invasion. The international effects of these casual remarks were realized almost at once. The British Prime Minister who had not wanted the expansion of war in the Far East, especially from the view point of the interest of NATO's security, visited Washington. so the conference had a very important meaning for the UN forces' new strategy. On the other hand, at the UN, on the 5th of December, the very day Truman and Attlee agreed to seek a cease-fire under UN auspices, a group of thirteen Asian and Arab states proposed to ask China and North Korea not to cross the 38th Parallel, and sounded out both sides about a cease fire along the 38th Parallel. The United States and the United Kingdom gave their assent, but China and North Korea gave no direct response. The CCF, who were securing the initiative of operation, were not agreeable with the proposal of the UN forces. The Untied Nation has tried to negotiate th peace plan between two sides from the December of 1950 and January of 1951. The Untied Nations' has achieved great results to negotiate for the peace plan on Korean peninsular after CCF's participation in Korean War. It's the results considering both the operation situation and political opinions.

  • PDF

A Study on Reorganization of System of Assistant Police Officer (치안보조인력 제도의 개편에 관한 연구)

  • Kim, Moon-Kwi
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.255-276
    • /
    • 2020
  • The mandatory police system, which plays a pivotal role in securing security and securing social safety as a security assistant, is expected to face difficulties in supplying the mandatory police manpower and securing absolute police manpower in the future according to the Ministry of Defense's abolition of the conversion service system. In this situation, this study intends to provide a concrete plan to replace the mandatory police officers as security assistants, recruiting contractors from civilians who are not military service resources or regular police officers, and using them for security assistance. More ultimately, this study goes beyond securing obligatory police to reduce or abolish mandatory police, which has been dealt with in previous studies. It aims to present the rescue and operation directions so that the police can provide quality public security services. In order to achieve the purpose of this study, this study 1) analyzes the current situation of police personnel, derives the necessity and justification of securing the police personnel or increasing the number of police personnel due to changes in security demand and security environment, and 2) After discussing the necessity and direction of reorganization, 3) deriving policy implications through analysis of foreign cases operating similar systems to derive specific plans for the introduction of security contractors for private contract workers in Korea. This study reviewed the specific operation plan and legal and institutional maintenance plan of private contract workers. In order to achieve these research objectives, this study 1) analyzes the current status of the police manpower and derives the necessity and justification of securing an absolute police manpower or increasing the manpower of the police in response to changes in security demand and security environment, and the current security aid system. 2) After discussing the necessity and orientation of reorganization of exinsting system of assistant police officer, 3) derive policy implications through analysis of foreign cases utilizing security aids similar to Korea, and 4) The specific operation plan and legal and institutional maintenance plan were presented. including security aids for private contract workers in Korea, from recruitment procedures to activities.

Research for Construction Cybersecurity Test and Evaluation of Weapon System (무기체계의 사이버보안 시험평가체계 구축방안 연구)

  • Lee, Ji-seop;Cha, Sung-yong;Baek, Seung-soo;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.765-774
    • /
    • 2018
  • As the IT technology develops, the military information system develops to the current IT environment for efficient operation and rapid communication, and the threat of cyber attack against the advanced weapon system using network technology is increasing simultaneously. In order to prevent and mitigate these problems, the United States has applied the cybersecurity test evaluation system from the beginning to the beginning of weapon system development. However, in Korea, the evaluation process of cyber security test is weak, and there is concern about the damage due to cyber attack. In this paper, we analyze cybersecurity test evaluation status of U.S. and domestic weapon systems and propose a solution to the problem of cybersecurity test evaluation system.

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.