• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.027 seconds

Strengthening Trend of Coast Guards in Northeast Asia (동북아 해양경찰 증강 동향)

  • Yoon, Sungsoon
    • Strategy21
    • /
    • s.43
    • /
    • pp.175-199
    • /
    • 2018
  • Recent marine territorial disputes in the East China Sea and the South China Sea have come to us as a great threat. China, which has recently established the China Coast Guard and has rapidly developed maritime security forces, is trying to overcome the various conflict countries with its power. Japan is also strengthening intensively its maritime security forces. Since Korea, China, and Japan are geographically neighboring and sharing maritime space in Northeast Asia, there is no conflict between maritime jurisdiction and territorial rights among the countries. The struggle for initiative in the ocean is fierce among the three coastal nations in Northeast Asia. therefore, Korea needs more thorough preparation and response to protect the marine sovereignty. As the superpowers of China and Japan are confronted and the United States is involved in the balance of power in strategic purposes, the East Asian sea area is a place where tension and conflict environment exist. China's illegal fishing boats are constantly invading our waters, and they even threaten the lives of our police officers. The issue of delimiting maritime boundaries between Korea and China has yet to be solved, and is underway in both countries, and there is a possibility that the exploration activities of the continental shelf resources may collide as the agreement on the continental shelf will expire between Korea and Japan. On the other hand, conflicts in the maritime jurisdictions of the three countries in Korea, China and Japan are leading to the enhancement of maritime security forces to secure deterrence rather than military confrontation. In the situation where the unresolved sovereignty and jurisdiction conflicts of Korea, China and Japan continue, and the competition for the strengthening of the maritime powers of China and Japan becomes fierce, there is a urgent need for stabilization and enhancement of the maritime forces in our country. It is necessary to establish a new long-term strategy for enhancing the maritime security force and to carry out it. It is expected that the Korean Coast Guard, which once said that it was a model for the establishment of China's Coast Guard as a powerful force for the enforcement of the maritime law, firmly establishes itself as a key force to protect our oceans with the Navy and keeps our maritime sovereignty firmly.

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

The Necessity of Korea-Japan Security Cooperation in order to Overcome North Korea's Nuclear Treats: Challenge & Conquest (북한 핵위협 극복을 위한 한일 안보협력 필요성 : 도전과 극복)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.89-99
    • /
    • 2018
  • In the year 2018, South Korea faces a crucial decision with regard to reunification. Starting from inter-Korean and US-North summits held from April through June, A rough journey for North Korea's "Complete, verifiable and irreversible dismantlement" began. Although South Korea insists that North Korea's Nuclear 'CVID' is the only minimum condition in the process of peaceful reunification, North Korea and other countries who support North Korea, including China and Russia, will possibly claim that North Korea's Nuclear 'CVID' will minimize their political and military positions internationally. Despite representatives from each country agreeing to North Korea's denuclearization, it is inevitable that many challenges still need to be resolved during the process. From the perspective of the Chinese government, North Korea is not a country that stimulates international conflicts. Instead, China can utilize North Korea as their political and tactical leverage against the US in order to compete for hegemonic power in Asia. In order to reject the emerging supremacy of China and resolve uncertainties in the denuclearization agreement and implementation process, I suggest the necessity of 'Korea-Japan Security Cooperation' as a 'second alternative' to achieve the North Korea's Nuclear 'CVID'.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

Security Measures in Response to Future Warfare and Changes in the Network Environment (미래전과 네트워크 환경 변화에 따른 보안대책)

  • Donghan Oh;Kwangho Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.49-57
    • /
    • 2021
  • The 4th industrial revolution will develop the network environment of future warfare through the increase of IoT devices, individual warrior platforms, the operation of manned and unmanned weapon systems, intelligent command post. They are leading to the weapon system combined with hundreds or thousands of sensors will be used for surveillance and reconnaissance, electronic warfare, and deception operations on the battlefield. This change to the environment brings superiority in operational performance on the battlefield, but if the weapon system is exposed to the outside, it will lead to fatal results. In this paper, we analyze the network environment that is changing in the future warfare environment, focusing on the currently used network. In addition, it considers information security issues that must correspond to the evolving network technology and suggests various security measures to suggest the direction our military should take in the future.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

The Development and Expansion of Teukgongmusul focused on Security Service History (특공무술의 개발과 발전에 관한 경호사(警護史)적 함의)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.73-87
    • /
    • 2008
  • The purpose of this study is to investigate the historical progress about Teukgongmusul as bodyguard martial arts focused on security service history through the meaning of its development and expansion. This study used secret materials from presidential security service, military service headquarters and special merit unit in Korea, and also used interview materials by oral history. For the above tasks, the conclusions of this study are as follows: Firstly, consideration about the background and circumstances of Teukgongmusul when it was developed in 1970s. No.606 special merit unit's soldiers who worked in presidential security service in Korea organized Teukgongmusul. Secondly, consideration about the meanings of Teukgongmusul presented through its development and expansion process. Teukgongmusul was bodyguards' martial arts which was based on Army's martial arts in 1970s. For this reason, Teukgongmusul now has the perception as Bodyguard Martial Arts. Thirdly, consideration about the expansion process of Teukgongmusul when it was adopted in Army and presidential security service in Korea. In 1970s special merit unit was included in presidential security service in Korea where Teukgongmusul was developed. Afterward Teukgongmusul was expanded in two different ways which were Army and presidential security service in Korea. In Army Teukgongmusul was expanded by no.5 special merit brigade and was expanded by Hapkido master who was worked as martial arts instructor for presidential security service in Korea. Fourthly, the historical progress of Teukgongmusul as bodyguard martial art was influenced by the political situation.

  • PDF

The Legal Status of Military Aircraft in the High Seas

  • Kim, Han Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.201-224
    • /
    • 2017
  • The main subject of this article focused on the legal status of the military aircraft in the high seas. For this the legal status of the military aircraft, the freedom of overflight, the right of hot pursuit, the right of visit and Air Defense Identification Zone (ADIZ) were dealt. The 1944 Chicago Convention neither explicitly nor implicitly negated the customary norms affecting the legal status of military aircraft as initially codified within the 1919 Paris Convention. So the status of military aircraft was not redefined with the Chicago Convention and remains, as stated in the 1919 Paris Convention, as a norm of customary international law. The analyses on the legal status of the military aircraft in the high seas are found as follows; According to the Article 95 of the 1982 United Nations Convention on the Law of the Sea (UNCLOS) warships on the high seas have complete immunity from the jurisdiction of any State other than the flag State. We can suppose that the military aircraft in the high seas have also complete immunity from the jurisdiction of any State other than the flag State. According to the Article 111 (5) of the UNCLOS the right of hot pursuit may be exercised only by warships or military aircraft, or other ships or aircraft clearly marked and identifiable as being on government service and authorized to that effect. We can conclude that the right of hot pursuit may be exercised by military aircraft. According to the Article 110 of the UNCLOS a warship which encounters on the high seas a foreign ship, is not justified in boarding it unless there is reasonable ground for suspecting that: (a) the ship is engaged in piracy, (b) the ship is engaged in the slave trade, (c) the ship is engaged in an unauthorized broadcasting and the flag State of the warship has jurisdiction under article 109, (d) the ship is without nationality, or (e) though flying a foreign flag or refusing to show its flag, the ship is, in reality, of the same nationality as the warship. These provisions apply mutatis mutandis to military aircraft. As for Air Defence Identification Zone (ADIZ) it is established and declared unilaterally by the air force of a state for the national security. However, there are no articles dealing with it in the 1944 Chicago Convention and there are no international standards to recognize or prohibit the establishment of ADIZs. ADIZ is not interpreted as the expansion of territorial airspace.

  • PDF