• Title/Summary/Keyword: 군사보안

Search Result 264, Processing Time 0.025 seconds

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Comparative Analysis of Freshwater Fish Species in Civilian Control Zone in South Korea: A Comparison between Direct Survey Results and Indirect Assessment via eDNA (우리나라 민간인통제구역 내 수계 어류에 대한 비교분석: 직접조사 결과와 eDNA를 통한 간접조사 결과 비교)

  • Soon-Jae Eum;Naeyoung Kim;Min-A Seol;Ji Young Kim
    • Korean Journal of Ichthyology
    • /
    • v.35 no.4
    • /
    • pp.224-235
    • /
    • 2023
  • South Korea is the only divided nation globally, marked by a military demarcation line establishing demilitarized and civilian control zones, ensuring national security. Consequently, these areas exhibit relatively minimal ecological disruption compared to other regions. However, the threat to safety persists due to the presence of unexploded ordnances and landmines, imposing significant constraints on ecological research. To address this, we conducted a comparative study utilizing eDNA analysis as a supplementary and alternative approach within three points of the "Road of Peace" - Inje, Yanggu, and Hwacheon courses, located within the civilian control zone. Direct surveys and indirect eDNA sampling were carried out in May, July, and September of 2022. Genetic material obtained from the samples underwent amplification, library preparation, MiSeq sequencing, and subsequent ASV generation for indirect analysis. These results were then compared with the findings of direct surveys. Our findings revealed the detection of eDNA for both observed species at the Yanggu-1 point, and for two out of four species at Yanggu-2. Hwacheon-1 displayed the detection of eDNA for one out of one observed species, whereas Hwacheon-2 yielded seven out of twelve, Hwacheon-3 showed four out of six, and all one observed species at Hwacheon-4 exhibited eDNA detection. Consequently, approximately 69% of the fish species identified through direct surveys were confirmed by indirect eDNA analysis. It is necessary to verify if certain fish species, such as the continental trout and catfish, have genetic information registered in the NCBI database. Additionally, it is believed that further marker development research utilizing different genetic sequences is essential. Given the limitations imposed by the hazardous nature of the surveyed civilian control zone, eDNA analysis proves to be a suitable supplement for fish research in the area.

Improving the Efficiency of National Defense Transportation Information System by using ITS (ITS를 활용한 국방수송정보체계 효율성 증진에 관한 연구)

  • O, Byeong-Eun;Kim, Hyeong-Jin;Son, Bong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.1 s.87
    • /
    • pp.85-94
    • /
    • 2006
  • Currently, when the military performs military operations in wartime and peace time, it is important for him to obtain repeatedly updated traffic information for security of the military supply support. The purpose of this study is to present an acquisition way of the repeatedly updated traffic information which the military is available. To achieve this Purpose, firstly, this paper finded types of traffic information which the military demanded and limitations caused by an connection of traffic information network between the military and associated government agencies. Also. grasped ITS(Intelligent Transportation systems) equipment operation by associated government agencies (Ministry Construction & Transportation, Korea Highway Corporation, Seoul Metropolitan Government, National Police Agency, Korea Institute of Construction Technology) and connection situations of traffic information network among associated government agencies. On the basis of these materials, this study presented the most efficient connection method in the field of the space and the contents of traffic information between the military and associated government agencies and ITS connection system between the military and associated government agencies was contrived. Throughout the upper processes, this paper showed a method which is available for acquiring ITS traffic information of associated government agencies. In addition to the connection method of ITS traffic information network, resolutions for the problems caused by connection of ITS network were come up with. But the more deep study for this matter is needed since resolutions for the problems of the ITS network connection, which this paper presented, were very restricted.

A Study of U.S. Coast Guard(USCG) (미 해안경비대(U. S. Coast Guard)의 고찰을 통한 한국 해양경찰의 제도적 개선방안)

  • Lee, Jae-Seung;Lee, Wan-Hee;Moon, Jun-Seop
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.443-467
    • /
    • 2013
  • The purpose of this study is to introduce United States Coast Guard (USCG) in order to suggest a direction to advance the system of Korea Coast Guard. After the effect of United Nations on the Law of the Sea in 1994, the world is facing with new era of maritime age with emergence of new maritime border 'Exclusive Economic Zone(EEZ)'. Along with new maritime era, Korea also has been facing with the conflicts caused from EEZ. Also, there is a increasing concern about maritime safety and security since people looking for maritime tourism and leisure sports are dramatically increasing in Korea. Moreover, national security matters are a big issue in Korea due to the several incidents occurred in the sea such as the attack on Yeon-Pyung Island and the sinking of Cheonan naval vessel. Arising concern on these issues in maritime space requires Korea Coast Guard to handle these effectively. However, the systematical and structural limitation of Korea Coast Guard limits the effective management of recent issues. The United States Coast Guard which is considered as one of the military force in the United States has continuously reformed and developed its system and structure to better handle the maritime safety and security issues through developing project such as the Integrated Deep Water system. Also, maritime police system and structure in the United States is different with in Korea. This study expects to suggest a way to advance the system and structure of Korea Coast Guard through examination of United States Coast Guard and comparing maritime police system and structure between Korea and the United States in order to properly deal with the maritime safety and security issues arising recently.

  • PDF

A Study on 2010 Beijing Convention for Antiterrorism of International Aviation - Compared Beijing Convention(2010) with Montreal Protocol - (국제항공테러방지 북경협약(2010)에 관한 연구 - 몬트리올협약과의 비교를 중심으로 -)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.79-112
    • /
    • 2010
  • The Beijing Convention of 2010 taken together effectively establishes a new broader and stronger civil aviation security framework. This adoption would significantly advance cooperation in prevent of the full range of unlawful acting relation to civil aviation and the prosecution and punishment of offenders. First, the Beijing Convention of 2010 will require parties to criminalize a number of new and emerging threats to the safety of civil aviation, including using aircraft as a weapon and organizing, directing and financing acts of terrorism. These new treaties reflect the international community's shared effort to prevent acts of terrorism against civil aviation and to prosecute and punish those who would commit them. Second, this convention will also require States to criminalize the transport of biological, chemical, nuclear weapons and related material. These provisions reflect the nexus between non-proliferation and terrorism and ensure that the international community will act to combat both. Third, this Convention shall not apply to aircraft used in military, customs or police services. As a substitute, International Humanitarian Law will be applied in a case. Moreover, the National Jurisdiction and the application of the law will be extended farther. The treaty promotes cooperation between States while emphasizing the human rights and fair treatment of terrorist suspects.

  • PDF

Feature Extraction using Discrete Wavelet Transform and Dynamic Time-Warped Algorithms in Wireless Sensor Networks for Barbed Wire Entanglements Surveillance (철조망 감시를 위한 무선 센서 네트워크에서 이산 웨이블릿 변환과 동적 시간 정합 알고리즘을 이용한 특징 추출)

  • Lee, Tae-Young;Cha, Dae-Hyun;Hong, Jin-Keun;Han, Kun-Hui;Hwang, Chan-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1342-1347
    • /
    • 2010
  • Various researches have been studied on WSN(wireless sensor network) for barbed wire entanglements surveillance applications such as industry facilities, security area, prison, military area, airport, etc. Currently, barbed wire entanglements surveillance is formed wire sensor network environment. Traditional wire sensor network guarantee high data transmission rate. Therefore, wire sensor network use fast fourier transform of data of high transmission rate for extraction of feature parameter. However, wireless sensor network in comparison with wire sensor network has very low data transmission rate. Therefore, wireless sensor network doesn't use fast fourier transform of wire sensor network for extraction of feature parameter. In this paper, proposed method use 1 level approximation coefficient of DTW(dynamic time-warped) algorithms based on DWT(discrete wavelet transform) for extraction of detection feature parameter and classification feature parameter for barbed wire entanglements surveillance. l level approximation coefficient have time information and frequency information of signal. Therefore, Dynamic time-warped algorithms based on discrete wavelet transform improve detection and classification of target rather than using energy of signal.

Method for Restoring the Spatial Resolution of KOMPSAT-3A MIR Image (KOMPSAT-3A 중적외선 영상의 공간해상도 복원 기법)

  • Oh, Kwan-Young;Lee, Kwang-Jae;Jung, Hyung-Sup;Park, Sung-Hwan;Kim, Jeong-Cheol
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_4
    • /
    • pp.1391-1401
    • /
    • 2019
  • The KOMPSAT-3A is a high-resolution optical satellite launched in 2015 by Korea Aerospace Research Institute (KARI). KOMPSAT-3A provides Panchromatic (PAN-0.55 m), Multispectral (MS-2.2 m), and Mid-wavelength infrared (MIROR-5.5 m) image. However, due to security or military problems, MIROR image with 5.5m spatial resolution are provided down sampled at 33 m spatial resolution (MIRrd). In this study, we propose spatial sharpening method to improve the spatial resolution of MIRrd image (33 m) using virtual High Frequency (HF) image and optimal fusion factor. Using MS image and MIRrd image, we generated virtual high resolution (5.5 m) MIRORfus image and then compared them to actual high-resolution MIROR image. The test results show that the proposed method merges the spatial resolution of MS image and the spectral information of MIRrd image efficiently.

Development Plan of Safety Management on Intelligent Robot (지능형 로봇에 대한 안전관리 발전방안)

  • Ju, Il-Yeop
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.89-119
    • /
    • 2011
  • The purpose of this study is to progress the development plan of safety management on the intelligent robot through safety analysis on the intelligent robot, major present condition of safety management on the intelligent robot, enforcement method of safety management on the intelligent robot. The following is the result of the study. First, we have to establish the provision or the special legislation to regulate the safety management of the intelligent robot substantially in the intelligent robot development and supply promotion law, the enforcement ordinance, the enforcement regulation. And, we should propel to establish the provision on the safety management of the intelligent robot in the laws related on ethics and safety. Second, we should establish the Robot Ethical Charter through the national and international agreement to give a guarantee against the safety management of the intelligent robot. Furthermore, we have to induces people's interest on the safety management of the intelligent robot through offering the public information of the Robot Ethical Charter for coexistence of human and robot and have to understand about rights of the intelligent robot. Third, the security industry and learned circles have to recognize the important effect that the intelligent robot gets in the security industry and try to grope the safety management and the application plan on the intelligent robot. Also, the security industry and learned circles should concern not only using and managing of the intelligent robot including the military robot, the security robot but also protecting human from the intelligent robot.

  • PDF

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

A Study on the case of Application of Women's Personnel in the Australian Defence Force (호주군 여성인력의 활용과 우리군에 주는 시사점)

  • In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.269-273
    • /
    • 2023
  • After participating in the Second Boer War in 1899, the Australian Army participated in world wars such as World War I, World War II, the Korean War, and the Vietnam War. To overcome the decline in the social recognition of soldiers and the continuous shortage of troops caused by the protracted war, the status and role of female personnel were expanded. The use of female manpower, which started as medical support during the Second Boer War, expanded to combat support missions such as communications, maintenance, driving, secret document management, and radar surveillance during World War II. After the Vietnam War, the Chiefs of Staff of the Australian Army, Navy and Air Force established a committee to expand women's participation in the military, improved service conditions for female personnel and supplemented regulations so that they were treated as soldiers, not women, and reached a turning point in expanding the role of female personnel in the Australian military. As a result, all combat positions, including special forces, were opened to women in 2014, and a plan was established to increase the proportion of women in each service by 2030. As a result, all combat positions, including special forces, were opened to women in 2014, and the Australian Armed Forces set a plan to increase the proportion of women by 2030. Like the Australian military, South Korea is also experiencing a demographic cliff and shortage of troops due to the continuing low birthrate problem. Through the history and current state of the use of female personnel in the Australian military, we would like to draw implications for the direction our military should go.