• Title/Summary/Keyword: North Korean Military Strategy

Search Result 64, Processing Time 0.023 seconds

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.

Study on Consideration of Artificial Rain Technology in Aspect of National Security (국가안보측면으로서의 인공강우기술 고찰)

  • Choi, Kee-Nam;Lee, Sun-Je
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.99-106
    • /
    • 2012
  • March 11, 2010, in Japan located over East Sea of Korea, due to the strong earthquake tsunami, Fukushima Nuclear Power Plant was ceased and exploded resulting in leaking radioactive substances. Even though it was an accident happened in a nation, leaked radioactive substances were spread across the world moving along ocean currents and air current. Our nation also had terror and confusion about radioactive rain after the accident, and even though a year has been passed by after the accident, the problem on the radioactive contamination isn't solved. So to speak, nuclear accident of neighboring country is a threat to our nation but not only Japan but also Chinese ocean across the West Sea has nuclear power plants. Beside threat of nuclear accident of neighboring countries, North Korea in military confrontation is the world 3rd country holding chemical and biological weapons and can spray the biological weapons to South Korea at any time like Yeonpyeong-do bombard provocation in November, 2010. The study is the strategy confronting such threats and grafted artificial rain technology which is weather control technology. Since radioactive substances on radioactive accidents and North Korean biological weapons can differ in the density by the weather condition, only artificial rain technology can remove the threat perfectly but it is worth to try as the method to reduce damage and in the aspect of psychology. To use the artificial rain technology in the aspect of national security to acquire the public safety, research institutes such ADD should fulfill active and symbolic technology research development.

The Study of Establishing the Multi-pass Eurasian Railroads (유라시아 철도의 다중경로 구축에 관한 연구)

  • Hahm, Beom-Hee;Huh, Nam-Kyun;Hurr, Hee-Young
    • Korean Business Review
    • /
    • v.21 no.2
    • /
    • pp.137-170
    • /
    • 2008
  • This study is presenting the logistics strategy in the international logistics markets which makes competition and corporation among north-east Asian countries to establishing the multi-pass Eurasian railroads. The countries located in north-east area of Eurasia like China, Japan, Russia and Korea are paying higher costs and disutility to the transportations and communications due to repeated conflicts and confrontations causes from the politic problems. They are being used surface transportation for most of all logistics between Europe and Asia except special merchandises because of characteristic of cargo to be air, the Silk Road remains vestige only which was main logistic passage to this area since BC. So far the Trans-Siberian Railway is being used by Russia mostly as north of Eurasian transport because of difficulties of service. The Trans-China Railway built in 1992 is not accomplishing as a international logistic passages. It is expected to take a long lead time because of characteristic of resource development and poor logistic infrastructure to the countries like Uzbekistan, double landlocked country, Mongolia and Azerbaijan, the countries do not be adjacent to the sea, even they have great economic jump-up plans through the development of their own resources. The Shanghai Cooperation Organization(SCO) start to sail officially in 2001 is constructed with China, Russia, Tadzhikistan, Kyrgyzstan, Kazakhstan and Uzbekistan as regular members of 6 countries and Mongolia, India, Pakistan, Afghanistan and Iran as observers 5 countries. It is started as a military alliance to protect terror, but now, it is expended to cooperate with the traffic, transportation, trade and share of energies. The Russia is doing their best to activate TSR as a government target to developnorth area equivalently, and economic develop of far-east Siberia. And also it is agreed provisionally to improve and repair of rail road between Nahjin and Hassan to connect TSR and TKR( Trans-Korea Railroad) by Russia, North Korea and South Korea with Russian's aggressive efforts. The development plan of this area is over lapped with GTI(Greater Tumen Initiative) promoted by UNDP, and is a cooperated project by 5 countries of South Korea, Mongolia, China, Russia and North Korea, subject to review the appropriation of energy, tour, environment, rail road connection between Mongolia and China and establishing a ferry route to north-east Asia. It is Japanese situation to pay attention to Russia and China even they have been supplying large-scope of infrastructure in Mongol area without any charges, target to get East Asia Main Rail Road to connect Mongolia and Zalubino of Russia. In case of the program for the Denuclearization of North Korea is not creeping, it will be accelerated to connect the TKR and TSR, TKR and TCR by somehow attending United States, including developing program promoted by UN ESCAP. As the result, Korean peninsular will continue the central role of competition and cooperation as in the past, now and future of north-east Asia, as of geographical-economics and geographical-politics whether it is requested or not wanted by neighbor countries.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF