• Title/Summary/Keyword: 군사위협

Search Result 193, Processing Time 0.022 seconds

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

Analysis of the Causes of Israel's Failure to Deter war and Implications for Korea's Security Strategy (이스라엘의 전쟁억제 실패원인과 한국의 안보전략적 함의)

  • Il Soo Bae;Hee Tae Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.31-35
    • /
    • 2024
  • On October 7, 2023, Hamas launched a large-scale surprise attack against Israel and war broke out. On this day, in addition to supplying rockets, they directly invaded Israeli territory in multiple areas using parariders and motorcycles. Considering the security situation on the Korean Peninsula, it is meaningful to consider why Israel allowed Hamas to attack and why it failed to deter the war in advance. Deterrence can only be successful if it is supported by capability, will, communication, and credibility. Although the capability and will were sufficient, and the communication through punitive deterrence had been sufficiently communicated, the failure to deter this war was problematic in terms of credibility. In order to increase deterrence against North Korea's threat, we need to improve customized extended deterrence, convey the will of both Korea and the United States to deter, and increase credibility in deterrence capabilities and execution ability.

A Study on Countermeasures on Seabed Warfare: Focused on Submarine Cables (해저전 대응방안 연구: 해저케이블을 중심으로)

  • Cho, Seong-jin;Lim, Soohoon
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.103-128
    • /
    • 2024
  • The Nord Stream explosion and the damage to submarine cables in the Baltic Sea and Red Sea have raised interest in seabed warfare all the world. And each country is preparing response plans and strategy. However, although South Korea relies on submarine cables for most of its internet network and is vulnerable to threats from North Korea and neighboring countries, even the term Seabed Warfare is unfamiliar. This paper is the first domestic study to analyze the definition and characteristics of seabed warfare, the current status of each country, and suggest countermeasures. In order to respond to seabed warfare, I propose establishing a cooperative system based on Mini-multilateralism between countries that share an international rules-based order, and establishing governance with related domestic organizations and companies. And I propose a military response plan based on deterrence by denial and deterrence by retaliation

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.

The Analysis of Organizational Factors Affecting the Outcome of Federal FOIA Implementation for National Security (국가 안보를 위한 미국 정보 자유법 시행의 결과에 미치는 조직적 요인의 분석)

  • Kwon, Hyck-Bin
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.1-31
    • /
    • 2010
  • This article aims to identify organizational factors that influence the performance of implementation of the U.S. Freedom of Information Act (FOIA) and to investigate the strength and direction of their effects. Explanatory variables include administrative resources, organizational culture, litigation cost, and the complexity of FOIA requests. The study will analyze quantitative secondary data from official statistics of federal agencies and the 2006 Federal Human Capital Survey as well as qualitative data from semi-structured interviews of FOIA officers. The results of statistical analyses are as follows : FOIA funding significantly affects median processing time and number of requests pending. There is a significant relationship between bureaucratic culture and number of requests pending, but not between bureaucratic culture and number of requests pending. There exists a significant relationship between the cost of FOIA litigation to federal agencies and the performance of FOIA implementation. There exists a significant relationship between the complexity of FOIA requests and the performance of FOIA implementation. This study also has important implication in South Korea, which has been under a sharp confrontation with North Korea for more than 50 years. As illustrated by the conflict between people's right to know and national security during the investigation of recent Sinking of the ROKS Cheonan, efforts should be made to prepare legal and institutional mechanism for freedom of information policy which can maintain a balance between conflicting values as well as efficient information disclosure in Korea.

  • PDF

Comparative Analysis of Protective Security Units of Korea, the U.S., and Japan (한·미·일 국가원수 위기관리제도의 분석을 통한 비교 고찰과 시사점)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.67-96
    • /
    • 2014
  • Today each country in the world goes beyond the narrow concept of national security that was limited to national defense and ideology and are entering multi-dimensional global system mainly based on economic profits. Nevertheless, conflicts between nations due to religious and ideological reasons have brought unprecedentedly intense disputes Security services for head of states have been an important national mission in every era and society. However, they are becoming a main target for assassination and attacks by terrorists. Attacks on the head of state and other VIPs can cause aftermath ranging from war to conflict situation, political crisis, and economic loss. Therefore this study aims to draw insights by comparing protective security units of Korea, the U.S., and Japan which have different legal basis and sociocultural characteristics. Especially in South Korea, which faces difficult diplomatic stance due to the tension with North Korea and relationship with other countries such as the U.S., China, and Russia as well as polarization between classes, generations, regions, and ideologies, cohesion among members of society has weakened and hatred toward the head of state has been brought, which emphasizes the important of national security services. Therefore the study of protective security units and its operation by comparison between neighboring countries will be able to bring insights on the promotion of the security service.

  • PDF

Comparison of NSC system in the U.S., Japan, and the Republic of Korea (NSC(국가안전보장회의) 체제의 한미일 비교)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.29-50
    • /
    • 2013
  • With the recent global threats of terrorism as well as religious conflicts, Northeast Asian countries including South Korea, China, and Japan are experiencing particularly serious security crises as demonstrated by North Korea's threats of nuclear weapons testings and long-range missile launching as well as military provocation toward South Korea such as sinking of ROKS Cheonan and bombardment of Yeonpyeong island and the territorial dispute between China and Japan over Senkaku Islands(Diaoyu Islands). As a result, Park Geun Hye Administration of South Korea and the 2nd Abe Shinzo Cabinet of Japan, both recently established, are making efforts to improve their national security and crisis management policies. One of the key elements of such efforts is the strengthening of National Security Council(NSC) or its equivalent organization as the control tower of national security policy, modeled after the NSC of the United States. This paper compares NSC organization of Korea, the U.S., and Japan and draws policy insights focusing on the current political and national security situation South Korea is facing. Although organizational structure, function, and history of NSC of each country differs, it can be inferred from this comparison that NSC-type of organizations can play an important role as a control tower of security and emergency management policies.

  • PDF

An Analysis of the 9.11 Terror Attack News Reports on the Daily Newspapers in the U.S., Korea, and China (미국, 한국, 중국 일간지의 '9.11 테러' 뉴스보도 비교분석)

  • Yu, Sae-Kyung;Kim, Mi-Ra
    • Korean journal of communication and information
    • /
    • v.18
    • /
    • pp.165-198
    • /
    • 2002
  • By comparing and analyzing the September 11 terror attack news reports on the daily papers in the U.S., Korea, and China, this research found that national ideology and international relationship concerned have affected news report frames about international dispute matters. Both quantitative and qualitative researches identify differences in news framing. For example, after the September 11 terror attack, the most pages of the USs The New York Times and Korean Chosunilbo were covered with related articles(382 and 192 reports, respectively), whereas Chinese Inminilbo cur down to only 32 reports about the issue. Also in content, both The New York Times and Chosunilbo viewed the September 11 terror attack as evil acts which threatened world peace and justified military action against Afghanistan as inevitable revenge and justice for such evil acts, in the point of the USs official view. However, Inminilbo gave out news only based on facts in a neutral viewpoint. Moreover, regarding American military intervention, the Chinese newspapers held very different news frame from the other two by describing considerable sacrifice and pain of innocent people of Afghanistan seriously. For the story composition, daily newspapers in all three countries took the same way to report focusing on specific events with episodes.

  • PDF

Comparison of GMTI Performance Using DPCA for Various Clutters (DPCA를 이용한 지상 이동 표적 탐지에서 클러터 종류에 따른 성능 비교)

  • Lee, Myung-Jun;Lee, Seung-Jae;Kang, Byung-Soo;Ryu, Bo-Hyun;Lim, Byoung-Gyun;Oh, Tae-Bong;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.6
    • /
    • pp.487-496
    • /
    • 2017
  • Ground moving target indicator(GMTI) using syntheticaperture radar(SAR) used for finding moving targets on wide background clutter in short time is one of good ways to monitor a traffic situation or an enemy's threat. Although displaced phase center antenna (DPCA) is a real time method with low computational complexity, there have been few studies about its performance against various ground clutters. Thus, we need to analyze GMTI performance for various ground clutters in order to design a suitable DPCA detector. In this paper, simulation results show that the conventional DPCA detector produces different performance in terms of detection rate and false alarm rate. In particular, the false alarm rate of heterogeneous or extremely heterogeneous clutter from urban area is higher than one of homogeneous clutter from natural area.