• Title/Summary/Keyword: 북한 군사

Search Result 151, Processing Time 0.028 seconds

A Comparison of Image Representation Strategies used in Propaganda Films in South and North Korea: Focused on the 1960s (남북한 선전영화의 이미지 재현 전략 비교연구: 1960년대를 중심으로)

  • Kim, Seung
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.364-371
    • /
    • 2018
  • In the 1960s, both South and North Korea needed to stabilize their regimes, and propaganda films were at the core of establishing this purpose. South Korea claimed legitimacy of a military government and called for service to fulfill the government's mission of the era, while North Korea emphasized the impeccability of their leader and the superiority of their socialist system. This study investigates image reproduction strategies used in South and North Korean propaganda films at the time under the context of domestic and foreign environments in the 1960s. First, South and North Korea portrayed their rulers as a strong leader and friendly leader, respectively, to establish legitimacy. Second, South and North Korea tried to image the same incident from different views in order to instill the spirit of age defined from their own perspectives. Third, propaganda films at the time portrayed desirable images of citizens (people) and visualized a flawless government. Authoritarian governments in South and North Korea in the 1960s facilitated the establishment of the so-called official society through propaganda films.

The Comparison and Analysis on Students' Awareness of National Security -Focus on the students of military science established college and those of military science non-established college- (대학생들의 안보의식에 대한 비교·분석 -군사학과 설치 대학과 미설치 대학 대학생들을 중심으로-)

  • Lee, Sung Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4246-4257
    • /
    • 2014
  • The aim of this study was to search for a security strategy and security education program by analyzing the security awareness of universities with and without Department of Military Science. The results of university student's security awareness revealed a normal level of recognition and differences according to region and gender. The recognition of stability of current Korean national security is normally low on average, which suggests that students feel anxiety towards national security. In addition, the North Korea provocation influence on national security has been recognized highly (score of 4.33 on average). The national security awareness of university students in the case of whether establishing a Dept. of Military Science or not showed a normal level, which revealed a score of 3.44, and differed according to region, gender and recruitment, and had a relationship with the recognition of Dept. of Military Science management. Therefore, the political consideration of security authorities is in strong demand to improve the security awareness of general university students, and have an influx of great human resources by advertising the educational contents, advantages and future career of Dept. of Military Science students.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Eurasian Naval Power on Display: Sino-Russian Naval Exercises under Presidents Xi and Putin (유라시아 지역의 해군 전력 과시: 시진핑 주석과 푸틴 대통령 체제 하에 펼쳐지는 중러 해상합동훈련)

  • Richard Weitz
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.1-53
    • /
    • 2022
  • One manifestation of the contemporary era of renewed great power competition has been the deepening relationship between China and Russia. Their strengthening military ties, notwithstanding their lack of a formal defense alliance, have been especially striking. Since China and Russia deploy two of the world's most powerful navies, their growing maritime cooperation has been one of the most significant international security developments of recent years. The Sino-Russian naval exercises, involving varying platforms and locations, have built on years of high-level personnel exchanges, large Russian weapons sales to China, the Sino-Russia Treaty of Friendship, and other forms of cooperation. Though the joint Sino-Russian naval drills began soon after Beijing and Moscow ended their Cold War confrontation, these exercises have become much more important during the last decade, essentially becoming a core pillar of their expanding defense partnership. China and Russia now conduct more naval exercises in more places and with more types of weapons systems than ever before. In the future, Chinese and Russian maritime drills will likely encompass new locations, capabilities, and partners-including possibly the Arctic, hypersonic delivery systems, and novel African, Asian, and Middle East partners-as well as continue such recent innovations as conducting joint naval patrols and combined arms maritime drills. China and Russia pursue several objectives through their bilateral naval cooperation. The Treaty of Good-Neighborliness and Friendly Cooperation Between the People's Republic of China and the Russian Federation lacks a mutual defense clause, but does provide for consultations about common threats. The naval exercises, which rehearse non-traditional along with traditional missions (e.g., counter-piracy and humanitarian relief as well as with high-end warfighting), provide a means to enhance their response to such mutual challenges through coordinated military activities. Though the exercises may not realize substantial interoperability gains regarding combat capabilities, the drills do highlight to foreign audiences the Sino-Russian capacity to project coordinated naval power globally. This messaging is important given the reliance of China and Russia on the world's oceans for trade and the two countries' maritime territorial disputes with other countries. The exercises can also improve their national military capabilities as well as help them learn more about the tactics, techniques, and procedures of each other. The rising Chinese Navy especially benefits from working with the Russian armed forces, which have more experience conducting maritime missions, particularly in combat operations involving multiple combat arms, than the People's Liberation Army (PLA). On the negative side, these exercises, by enhancing their combat capabilities, may make Chinese and Russian policymakers more willing to employ military force or run escalatory risks in confrontations with other states. All these impacts are amplified in Northeast Asia, where the Chinese and Russian navies conduct most of their joint exercises. Northeast Asia has become an area of intensifying maritime confrontations involving China and Russia against the United States and Japan, with South Korea situated uneasily between them. The growing ties between the Chinese and Russian navies have complicated South Korean-U.S. military planning, diverted resources from concentrating against North Korea, and worsened the regional security environment. Naval planners in the United States, South Korea, and Japan will increasingly need to consider scenarios involving both the Chinese and Russian navies. For example, South Korean and U.S. policymakers need to prepare for situations in which coordinated Chinese and Russian military aggression overtaxes the Pentagon, obligating the South Korean Navy to rapidly backfill for any U.S.-allied security gaps that arise on the Korean Peninsula. Potentially reinforcing Chinese and Russian naval support to North Korea in a maritime confrontation with South Korea and its allies would present another serious challenge. Building on the commitment of Japan and South Korea to strengthen security ties, future exercises involving Japan, South Korea, and the United States should expand to consider these potential contingencies.

  • PDF

Ecological Buffer Analysis of Western DMZ and Vicinity using Logistic Function Derived from TVI-Distance Curve (TVI-거리함수를 이용한 서부 DMZ 및 민통지역의 생태적 보전폭원 조사)

  • Kim, Sang-Wook
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.95-104
    • /
    • 2006
  • The DMZ is a 248km long thin green line which has various landscapes of fields, hills and mountains. This study focused on western part of DMZ and vicinity which consist of abandoned rice paddy, wetlands and fields. The main purpose of this study is to detect the vegetation vitality from the western part of MDL to DMZ vicinity and identify and quantify ecological buffer(ecotone) width adopting logistic function derived from 'Vegetation Index-distance curve' using an Landsat ETM+ image acquired on June of 2002. Green leaf vegetation was quantified to identify the ecotone buffer in western DMZ and vicinity(civilian control area: CCA) using Transformed Vegetation Index(TVI) which is one of common measurement among various indices. Vegetation measurement from Military Demarcation Line(MDL) to vicinity area was investigated at 500m intervals to 10kms of southern and northern part of western DMZ and vicinity. The Logistic function models the sigmoid curve of growth with three stages of growth of initial competition and maturity. In the TVI-distance logistic curve, the maturity is high vegetation vitality, the competition is vitality changing, and the initial is low vitality. In the TVI-distance curve, maturity area of high TVI value is core area for ecological conservation, and the competition area between inflection points can be an ecotone(ecological buffer). In case of southern part, maximum TVI value is 221.92 and minimum is 207.16, and maximum TVI of northen part is 215.32 and minimum is 188.35. That means forest devastation of north Korean part of DMZ and vicinity is severer than that of south Korea. The width of core area for ecological conservation is 2,311m, and ecotone in the southern part is 5,339m, so minimum width from MDL for ecological conservation can be computed as 7,651m. In case of Northern part, the width of core area is 1,841m, and ecotone buffer is 5,014m, so ecological conservation width can be estimated as 6,855m. In case of northen part, width of estimated core area is less than that of DMZ width, which means ecological disturbance is very severe in northern part of western DMZ.

  • PDF

Nuclear Weapons and Extended Deterrence in the U.S.-ROK Alliance (핵무기와 한·미 핵 확장억제 능력)

  • Huntley, Wade L.
    • Strategy21
    • /
    • s.34
    • /
    • pp.236-261
    • /
    • 2014
  • The future role of nuclear extended deterrence in the security alliance between the United States and the Republic of Korea is currently a central concern. The gradually lessening role of reliance on nuclear weapons in US security policies broadly, combined with increasing North Korean nuclear capabilities and belligerence, raise fresh questions about the sufficiency of the "nuclear umbrella" as a pillar of the US-ROK defense posture. This article addresses the current and future role of nuclear extended deterrence in Korea in this dynamic context. The article reviews the longstanding trend toward reducing the overall size of the US nuclear arsenal, and assesses developments in US-ROK outlooks toward extended deterrence in response to the Obama administration's nuclear policies and North Korea's recent smaller-scale aggressions. The analysis finds that the challenges of deterrence credibility and allied reassurance are difficult and long-term. The analysis explains how these challenges emerge less from a shrinking US numerical arsenal size than from the sufficiency of specific nuclear and non-nuclear capabilities to meet emerging smaller-scale threats. The analysis also highlights the importance of broader strategic and political interaction in sustaining allied confidence in any joint security posture. The evaluation concludes that a strong US-ROK alliance relationship can be maintained while the size of the US nuclear arsenal continues to decline, in part because nuclear weapons in any deployment configuration are relatively ineffective means for deterring smaller-scale aggression. Nevertheless, continuing adjustment of the US-ROK extended deterrence posture to the evolving, complex and uncertain Korean peninsula security environment will remain an ongoing challenge. Finally, the article encourages further examination of the potential specific role ROK maritime forces might serve in enhancing deterrence of smaller-scale threats while minimizing risks of conflict escalation.

Study on the Guarding System in the latter "Choson" era (조선후기 호위제도의 고찰)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.229-241
    • /
    • 2008
  • he guarding system of the "Choson" era is completed by the Gyeongguk-daejeon(an administrative canon) at the kings "Sejong" and "Yejong", and it is supplemented at the King "Seongjong". "Geum-gun" is composed of "Naegeum-wi", "Gyeombok-sa", "Wirim-wi" and "Jeongro-wi" in the period before the Japanese Aggression of Korea in 1952, and in the period after the aggression war, the organization of the "Geum-gun" is changed repeatedly according to circumstances in the period after the aggression. They("Geum-gun") devote themselves to the protection of kings and the capital defense in the first period of the "Choson" era. The most important change of the "Geum-gun" is the practice of five military units system, three military units of them, "Hunryeon-dogam", "Eoyeong-cheong" and "Geumwi-yeong", take charge of the guard of kings and the capital defense, and "Chongyung-cheong" and "Sueo-cheong" take charge of the defense of the outer areas of the capital region with key positions located at "Namhan-sanseong" and "Bukhan-sanseong"(mountain fortress Walls). The function of the "Geum-gun" is extended through the aggressions, therefore the number of soldiers is increased greatly. The guarding system for the country and its royal family is frequently changed according to the improvement of the people's position with themselves-awakening and their understanding of realities. The reorganization of the "Geum-gun" including "Howi-cheong", "Geumgun-cheong", "Sukwi-so" and "Jangyong-yeong" is unavoidable to strengthen the royal rights that are weaken by deposing the king "Injo". The standing of the existing organizations is changed many times with financial problems. The enthronement of the king "Jeongjo" is a great epoch in the change of the guarding system.

  • PDF

The Policy of China toward Asia (중국의 대 아시아 정책)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.63-67
    • /
    • 2017
  • With the rise of China, the power and hegemony is moving to China in East Asia. The foreign policy of the China government is directly or indirectly affecting Korea, neighboring countries and the world. China is advocating a new international policy, a new security system, silk road policy and a new paradigm. China is a newly emerging powerful nation in Asia, and it is clear that China has the economic power to reestablish the Asian order and take over the hegemony. In addition, we want to run the world supremacy with the United States in political, economic, military and diplomatic sectors. In order to overcome the crisis of the Korean peninsula, which is being triggered by North Korea's nuclear and missile development, we are in the position to do our best to cooperate with Korea, the United States and Japan and further improve relations with China. In this study, I analyzed the policy of Southeast Asia and China macroscopically.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.