• Title/Summary/Keyword: 군사위협

Search Result 193, Processing Time 0.022 seconds

How to Identify Critical Nodes of National Infrastructure Systems in Megacities (메가시티 국가기반체계의 핵심노드 식별 방법)

  • Sim, Jun Hak;Jang, chan Kyu;Park, Sung Jun;Kim, Ki Won;Cho, Sang Keun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.531-536
    • /
    • 2022
  • Megacities are emerging all over the world and gradually becoming the center of an country. Therefore, Megacities are inevitably exposed to various threats such as existing, potential, supra-national, and non-military. In particular, as seen in the recent Ukraine-Russia war, national infrastructure systems has become a major target of enemies. However, considering the size of Megacities, various types of threats, and limited resources, it is impossible to completely protect all national infrastructure systems. Therefore, wisdom is necessary to identify and protect critical nodes. The critical node is the vital point to which the national infrastructure is connected. To this end, in this study, as a method for logically and systematically identifying critical nodes, Node centrality analysis method, which is a network theory, and the Center of Gravity analysis method, which is a military theory, were presented.

A Study on the Introduction of PMCs in Korea (한국적 민간군사기업 도입방안에 대한 연구)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.45-54
    • /
    • 2014
  • After the Cold War, obligations of nation are expanded to 'Comprehensive Security' that caring citizens' safety and welfare in addition to national defense. Major nations are competing to revolutionize their army to be prepared for various threats. Major nations, including United States and United Kingdom, are tend to adopting and using PMCs eagerly. The size of PMC market estimated around 70 billion euro and growing rapidly. Korea has to adopt PMCs for building military force and operating efficiency while driving 'Military Reform 2030'. Adopting PMCs in Korea can be considered as followings reflecting security situation. So, Korean army must consider implementing and adopting PMCs in order to building army force and attaining efficiency and preparing for the N orth Korean threat and various security risks.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

Research on direction of future Korean military force establishment -focus on North Korea's nuclear threat and neighboring countries' counter military threat operation- (미래 한국군 군사력 건설방향에 대한 연구 - 북한 핵위협과 주변국 위협대비를 중심으로 -)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.11-21
    • /
    • 2014
  • South Korea should not be in subordinate position in international relationships like the past. As the status of middle power. South Korea achieves peaceful unification through overcoming North Korea's nuclear and conventional threats, and builds military power in Northeast Asia as a 'balancer'. This can firstly be achieved by constructing "attack systems triad". 'attack systems triad' can be established through integrating the C41SR as a common strategy for the purposes of preemptive deterrence and retaliatory deterrence against the dangers of the present and the future. Second, denial deterrence can be achieved by establishing "defense system triad" by combining common military power and defensive weapon system. Finally, development of independent advanced technological strategies can be achieved by building defense industry and combination of research and development through constructing "Infra triad". As for constructing and reinforcing the future of the ROK military, a unilateral principle and policy efforts to achieve the aforementioned force construction models are needed. This can only be achieved through the government's national vision to take on the role of mediator and a basis founded upon the consensus of the public.

Threat Decision Algorithm of Missile Warning Radar Using Azimuth Angular Rate (방위각 변화율을 이용한 방호용레이다 위협 판단 알고리즘)

  • Ha, Jong-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.93-101
    • /
    • 2008
  • It is difficult for a MWR(Missile Warning Radar) to perform a threat decision accurately since there is no tracking part which gives more accurate threat information to the MWR. In this paper, the threat decision algorithm is proposed using an azimuth angular rate to improve the accuracy. The azimuth angular rate is dependent upon the direction of an approaching target. The target is classified into a threat or non-threat using a boundary condition of the azimuth angular rate. The boundary condition is determined using the Monte-Carlo simulation. The performance of the proposed algorithm is evaluated using this condition at field tests of MWR. The efficiency of the proposed method for the threat decision is proved by comparing the results of field tests with the simulation results.

정보전 위협과 사례

  • 박상서;박춘식
    • Review of KIISC
    • /
    • v.12 no.6
    • /
    • pp.12-20
    • /
    • 2002
  • 미래의 분쟁은 비대칭적인 형태로 나타날 것이며, 특히 사이버공간에서 사이버수단을 이용하여 전개될 것으로 예측되고 있다. 특히, 군사 강대국들뿐만 아니라 분쟁의 주체가 되는 여러 국가들은 정보전을 새로운 국가 전력의 핵심 요소로 판단하고 관련 능력 확보에 박차를 가하고 있다. 본 고에서는 정보전 위협과 사례를 고찰함으로써 이러한 국제 상황하에서 우리가 대비하여야 할 방향을 정립하는데 도움이 되고자 한다.

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

Implications on US DoD Counter-Small Aircraft Systems Strategy (미 국방부 소형드론 대응전략과 시사점)

  • Kang-Il Seo;Sang-Keun Cho;Ki-Won Kim;In-keun Son;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.239-243
    • /
    • 2023
  • Due to recent small unmanned aircraft threats by North Korea and unsuccessful reponses, severe concerns about future national security have been being increasingly surged. Especially it is notable and unaccpetable to see that North Korea's small drones flying over capical areas over 7 hours were not efficiently detected and identified even though South Korea already recognized the threats since early 2010s. Meanwhile a US military troop operating THAAD system on Seung-Joo, South Korea successfully shot down unidentified small drone on Jan 2023. The threats caused by small unmanned aircraft is worrisome not only to South Korea, but also to international nations. This paper surveyed US DoD Strategy for countering small aircraft systems and suggest how to improve our current anti-dron systems so that small unmanned aircraft threats will be dynamically diminished or neutralized as fast as we can.