• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.028 seconds

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.

An Analysis of Military Strategies in the Israel-Hamas War (2023): Asymmetric Tactics and Implications for International Politics (이스라엘-하마스 전쟁(2023)의 군사전략 분석: 비대칭 전술과 국제정치적 함의)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.389-395
    • /
    • 2024
  • This study aims to deeply analyze the military strategies and tactics used in the battles between Israel and Hamas, to understand the military approaches, technical capabilities, and their impact on the outcomes of the conflict. To achieve this, methodologies such as literature review, data analysis, and case studies were utilized. The research findings confirm that Hamas employed asymmetric tactics, such as rocket attacks and surprise attacks through underground tunnels, to counter Israel's military superiority. On the other hand, Israel responded to Hamas's attacks with the Iron Dome interception system and intelligence-gathering capabilities, but faced difficulties due to Hamas's underground tunnel network. After six months of fighting, the casualties in the Gaza Strip exceeded 30,000, and more than 1.7 million people became refugees. Israel also suffered over 1,200 deaths. Militarily, neither side achieved a decisive victory, resulting in a war of attrition. This study suggests that the Israel-Hamas war exemplifies the complexity of modern asymmetric warfare. Furthermore, it recommends that political compromise between the two sides and active mediation efforts by the international community are necessary for the peaceful resolution of the Israel-Palestine conflict.

Why Should the ROK Navy Maintain the Course toward the Construction of a Mobile Task Fleet? : From the perspectives of Capability, Doctrine, and the Organizational Identity (한국해군 기동함대 전력건설방향의 당위성: 능력, 교리, 조직정체성을 중심으로)

  • Lee, Sang-Yup
    • Strategy21
    • /
    • s.31
    • /
    • pp.85-119
    • /
    • 2013
  • This paper asks whether the Republic of Korea (ROK) Navy should continue to focus on building ocean-going naval ships when it faces the threats of North Korean provocations in littoral areas. My position is that the ROK Navy should keep pursuing ocean-going capabilities. I provide explanations why it should do so from the perspectives of three important dimensions: capability, doctrine, and organizational identity. First, I argue that the distinction between a littoral navy and an ocean-going navy is an unnecessary dichotomy. It may lead to inefficiency in national security. The military posture should be designed in a way that it can address all external threats to national security regardless of whether they are from North Korea or not. Such capability is the one that the ROK Navy has tried to acquire with the 'Blue Water Navy' initiative since the 1990s. Second, also from the perspective of lately developed military doctrines that emphasize jointness and precision strike capability, ocean-going capabilities such as the mobile task fleet program have become a must, not an option, given today's security situations on and around the Korean peninsula. Lastly, I draw attention to the fact that the 'Blue Water Navy (BWN)' initiative meant more than just capability to the ROK navy. The BWN represents the ROK navy's organizational identity that the navy has defined since the 1980s as it emphasized promoting national interest and international standing as part of its organizational essence. Furthermore, the phrase 'blue water navy' took on symbolic meanings to the people that are associated with South Korean-ness including sovereignty, national pride, standing in the world and hopes for the future. Since 1990s, many scholars and experts have made the case for the necessity of improving South Korea's naval capability based on different rationales. They emphasized the protection of Sea Lines of Communication (SLOCs), the economic value of the sea, the potential danger associated with territorial disputes over islands, and increasing naval power of neighboring countries since the end of the Cold War. This paper adds to this debate by trying to explain the matter with different factors including naval doctrines and organizational identity. Particularly, this paper constitutes a unique endeavor in that it incorporating constructivist elements (that is, identity politics) in explaining a national security matter.

  • PDF

An Analysis and Assessment on China's Maritime Security Strategy (중국 해양안보전략에 관한 분석 및 평가 - 아더 라이케의 전략 분석틀을 중심으로 -)

  • Kim, Hyun-Seung;Shin, Jin
    • Strategy21
    • /
    • s.45
    • /
    • pp.33-59
    • /
    • 2019
  • There have many research papers to see China's evolution of maritime strategy and naval modernization in terms of its naval mind-set. However, this article focuses on assessing how China uses its all sorts of maritime strength to achieve 'a building maritime great power.' The aim of the article is to introduce a new perspective to this debate by analysing China's diversified ma maritime capabilities and a new way of implementation in maritime security strategy. In recent years, China has been developing not only unpredictable maritime military capabilities but also maritime supporting forces - Coast Guard and Maritime Militia. And recently China adopted up-to-date operational concept aimed at gaining military superiority in Asia-Pacific waters. By taking salami slicing strategy, gray zone strategy and cabbage strategy, China has been trying to exercise surpassing influences in regional maritime area, also in western Pacific region. This article provides a stepping stone to comprehend the aspect of China's recent maritime strategic actions, especially in Yellow Sea. In conclusion, this article suggests some policy recommendations for countering China's coercive maritime strategy. First, Korea should make sure a strategic concept of maritime security, instead of land warfare focused strategic concept. Second, it is needed to set up suitable naval forces for actively responding to neighbor nation's offensive actions.

Comparison of responses to issues in SNS and Traditional Media using Text Mining -Focusing on the Termination of Korea-Japan General Security of Military Information Agreement(GSOMIA)- (텍스트 마이닝을 이용한 SNS와 언론의 이슈에 대한 반응 비교 -"한일군사정보보호협정(GSOMIA) 종료"를 중심으로-)

  • Lee, Su Ryeon;Choi, Eun Jung
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.277-284
    • /
    • 2020
  • Text mining is a representative method of big data analysis that extracts meaningful information from unstructured and large amounts of text data. Social media such as Twitter generates hundreds of thousands of data per second and acts as a one-person media that instantly and directly expresses public opinions and ideas. The traditional media are delivering informations, criticizing society, and forming public opinions. For this, we compare the responses of SNS with the responses of media on the issue of the termination of the Korea-Japan GSOMIA (General Security of Military Information Agreement), one of the domestic issues in the second half of 2019. Data collected from 201,728 tweets and 20,698 newspaper articles were analyzed by sentiment analysis, association keyword analysis, and cluster analysis. As a result, SNS tends to respond positively to this issue, and the media tends to react negatively. In association keyword analysis, SNS shows positive views on domestic issues such as "destruction, decision, we," while the media shows negative views on external issues such as "disappointment, regret, concern". SNS is faster and more powerful than media when studying or creating social trends and opinions, rather than the function of information delivery. This can complement the role of the media that reflects public perception.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

A Study on the Change of the Trump Administration's Alliance Policy (트럼프 행정부의 동맹정책 변화에 관한 연구)

  • Choi, Won Sang;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • For the past 66 years, the Korea-U.S. alliance has been a typical asymmetric alliance in which the U.S. supports South Korea's security during the Cold War and South Korea gives some of its policy autonomy to the U.S. But Lee Myung-bak government military alliance the 'comprehensive strategic alliance' of the character, 'value of alliance', Park Geun-hye ' a global, 'Frontier of cooperation', the government.'reciprocal, comprehensive alliance' Moon Jae-in, the government and partnerships developed with ' euroui the development of national security strategy said. The purpose of this study is to explore ways to build a reciprocal and comprehensive Korea-U.S. alliance for the development of the Korea-U.S. alliance policy in order to ensure South Korea's policy autonomy following changes in the Trump administration's alliance policy. The results of the research show the need for Korea to participate in the U.S.-led 'India-Pacific Strategy' continue diplomatic efforts for the mutual economic benefits of the two countries and strengthen public diplomacy in order to build the Korea-U.S. alliance in a reciprocal and comprehensive manner.