• Title/Summary/Keyword: Maritime security agency

Search Result 17, Processing Time 0.023 seconds

Validation of underwater explosion response analysis for airbag inflator using a fluid-structure interaction algorithm

  • Lee, Sang-Gab;Lee, Jae-Seok;Chung, Hyun;Na, Yangsup;Park, Kyung-Hoon
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.988-995
    • /
    • 2020
  • Air gun shock systems are commonly used as alternative explosion energy sources for underwater explosion (UNDEX) shock tests owing to their low cost and environmental impact. The airbag inflator of automotive airbag systems is also very useful to generate extremely rapid underwater gas release in labscale tests. To overcome the restrictions on the very small computational time step owing to the very fine fluid mesh around the nozzle hole in the explicit integration algorithm, and also the absence of a commercial solver and software for gas UNDEX of airbag inflator, an idealized airbag inflator and fluid mesh modeling technique was developed using nozzle holes of relatively large size and several small TNT charges instead of gas inside the airbag inflator. The objective of this study is to validate the results of an UNDEX response analysis of one and two idealized airbag inflators by comparison with the results of shock tests in a small water tank. This comparison was performed using the multi-material Arbitrary Lagrangian-Eulerian formulation and fluid-structure interaction algorithm. The number, size, vertical distance from the nozzle outlet, detonation velocity, and lighting times of small TNT charges were determined. Through mesh size convergence tests, the UNDEX response analysis and idealized airbag inflator modeling were validated.

A Study on Piracy Matters and Introduction of the Privately Contracted Armed Security Personnel on Board Ships (해적사건 대응을 위한 무장경비원제도 도입방안에 관한 연구)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.293-326
    • /
    • 2014
  • Piracy is a worldwide issue, but the deteriorating security situation in the seas off Somalia, the Gulf of Aden and the wider Western Indian Ocean between 2005 and 2012 and in the increasing number of attacks in the Gulf of Guinea are a major problem. The depth of concern for the problem internationally is amply demonstrated by the levels of co-operation and coordination among naval and other forces from several countries that have assembled in the west Indian Ocean region and the Gulf of Aden to escort ships carrying humanitarian aid to Somalia and to protect vulnerable shipping. Notwithstanding this unprecedented effort, the vast sea area in which the pirates now operate makes it difficult to patrol and monitor effectively, particularly with the limited resources available. More resources, in the form of naval vessels and aircraft, are needed and at every opportunity the IMO encourages Member Governments to make greater efforts to provide the additional naval, aerial surveillance and other resources needed through every means possible. IMO provide interim guidance and recommendations to be taken into account when considering the use of PCASP(privately contracted armed security personnel) if and when a flag State determines that such a measure would be lawful and, following a full risk assessment, appropriate. The interim guidance and recommendations of IMO are not intended to endorse or institutionalize the use of armed guards. Therefore, they do not represent any fundamental change of policy by the Organization in this regard. It is for each flag State, individually, to decide whether or not PCASP should be authorized for use on board ships flying their flag. If a flag State decides to permit this practice, it is up to that State to determine the conditions under which authorization will be granted. Therefore, Korea should be introduced rationally PCASP for safe shipping. PCASP on board ships is much the same to special guard personnel of security services industry act. Act plan of Oceans and fisheries ministry on PCASP collides with special guard personnel system of National Police Agency. Rather than new law making, PCASP regukations have to be included in security services industry act. Management Agency of PCASP is to not Oceans and fisheries ministry, but Central Headquarters Korea Coast Guard of Public Safety and Security Ministry because of specialty and closely connection.

  • PDF

Occurrence of Modern Planktonic Foraminiferal Species and their Seasonal Variations around Jeju Island, Korea (제주근해에 출현하는 현생 부유성 유공충 종과 계절변화)

  • Hyun, Sangmin;Kimoto, Katsunori;Cho, Sung-Hwan
    • Ocean and Polar Research
    • /
    • v.35 no.2
    • /
    • pp.181-191
    • /
    • 2013
  • To investigate the occurrence of modern living planktonic foraminiferal species and their seasonal variations around Jeju Island, we conducted planktonic foraminiferal sampling at KIOST's regular sampling sites during 16 months. In total seven genus and 16 modern planktonic foraminiferal species were identified with six dominant species. Dominant species were Gloigerinoides sacculifer, Globigerinoides ruber, Globigerina bulloides, Noegloboquadrina dutertrei, Pulleniatina obliquiloculata, and Globorotalia inflata. Most of the species were characterized as being typical subtropical species and showed seasonal variations and/or intermittent occurrence from season to season. The occurrence of living foraminifera revealed a strong relationship with water temperature, but not with salinity. Species succession seems to occur along with water temperature changes. Some patch distribution and water temperature dependences appear to be significant since there is a high degree of variation in the occurrence patterns of species and standing stock. More detailed quantitative study is necessary to confirm the species diversity and seasonal variations of planktonic foraminifera and related ocean environmental changes.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

A Study on the Police-related Emergency Reporting (경찰 관련 긴급신고에 관한 연구)

  • Lee, Kang-Hoon
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.357-386
    • /
    • 2014
  • The Purpose of this study is to search for ways to improve the police-related emergency reporting service through the analysis of its actual condition - focusing 112 emergency reporting & 122 emergency reporting. For this purpose, the main data related to police-related emergency reporting required for inspection of the administration conducted by the National Assembly in 2013 is utilized. The actual condition of the police-related emergency reporting service is examined in 3 aspects - the number of reported cases by reporting type, the number of police response, and the average arrival time. The principal analysis results of the actual condition revealed that 112 emergency reporting is increasing and 122 emergency reporting oscillates between increases and decreases in the total number of reported cases, the number of non-emergency reporting is increasing in both 112 and 122 reported cases, the number of prank call is high in 122 reported cases, the rate of other agency transmit($122{\rightarrow}112$) is higher than 12% in 122 reported cases, and the number of police response and the average arrival time are decreasing in 112 reported cases. To improve the police-related emergency reporting, based on the above actual condition, the followings are required: to operate dualistic police-related response; to publicize a police-related reporting service; to take stern measures against false report; to make continuous improvement of the police-related emergency reporting system.

  • PDF

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF