• Title/Summary/Keyword: Traditional Warfare

Search Result 20, Processing Time 0.023 seconds

A Study of Cognitive Warfare and Ethical Issues: Focusing on Just War Theory (인지전과 윤리적 문제에 대한 연구: 정의전쟁론을 중심으로)

  • Sangsu Kim;Youngsam Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.451-459
    • /
    • 2023
  • The purpose of this paper is to show the limitations of Just War Theory in evaluating ethical issues that can be raised in cognitive warfare, which is emerging as a new area of war. To this end, we will provide the background of cognitive warfare, derive the features of cognitive warfare based on conceptual analysis of cognitive warfare, and clarify the differences between cognitive warfare and traditional warfare. Afterwards, we will turn the discussion and take a look at the background and areas of Just War Theory as a theory that evaluates comprehensive ethical issues related to war. Then, we will elaborate what Just War Theory is and apply the ethical judgment criteria presented in the three areas of this theory, jus ad bellum, jus in bello, and jus post bellum, to cognitive warfare. Finally, we will evaluate the appropriateness of ethical judgment in cognitive warfare by applying criteria for each area and specify the limitations, thereby showing that Just War Theory has limitations as an ethical judgment criteria in cognitive warfare.

A Study on the Justification of Moral Responsibility in Hybrid Warfare: Focused on a Critical Evaluation of Jus In Bello (하이브리드 전쟁에서 도덕적 책임의 정당화에 관한연구: Jus In Bello에 대한 비판적 고찰을 중심으로)

  • Sangsu Kim;Hyunyoung Moon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.57-63
    • /
    • 2023
  • The purpose of this paper is to analyze the aspects of hybrid warfare and show the limits of jus in bello, a principle that evaluates the moral responsibility of the agents. As a theory of the morality of war presented in traditional warfare, the just war theory has been widely accepted. In particular, jus in bello offers the criteria of moral legitimacy regarding the actions of individuals participating in or involved in war. However, hybrid warfare, in which various aspects of warfare operate in a complex way, has obvious differences compared to traditional warfare, and this difference causes difficulties in determining the moral evaluation and attribution of responsibility for actions in war. In order to appropriately resolve the moral problems arising from hybrid warfare, it is necessary to clarify what the limitations of existing moral justification theories are. To this end, in this paper, we will first present a conceptual understanding of hybrid warfare, specify the differences from traditional warfare, and then show the limits of its application in hybrid warfare in light of the three principles that compose jus in bello.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF

Naval Warfare and the Development of the Weapon System in History (역사속 해전과 무기체계 발달양상)

  • Kim, Jeong-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.144-150
    • /
    • 2013
  • From ancient times to the present day, naval warfare in history is deeply connected with the rise and fall of countries. This study examines which countries won wars by tracing naval warfare that they had carried out. Seven Cases are traced for the analysis including the battle of Salamis and the Poeni War in the ancient period, the battle of Calais in the medieval and modern periods, the Russo-Japanese War in the modern period, and the Falklands War in the present age. The results show three fundamental characteristics. First, countries that won naval warfare were armed with the state-of-the-art weapon systems and conducted joint operations effectively. Second, countries that fought in the usual ways were defeated by challengers. Third, countries such as Athens, Rome, Britain and the United States ascended to the hegemony by winning major naval warfare and then commanding or controlling the sea at their own free will. Countries defeated in these naval warfare, however, descended to the weak powers. In general, countries that won warfare have a tendency to make light of defeated countries, not to introduce new weapon systems from abroad, and to stick to their traditional ways of fighting. These lessons indicate that the ROK military needs to continue the development of new weapon systems at peacetime. In addition, they show that it needs to focus more on the articulation of military doctrines and training systems so that warriors on the battlefield can fight better.

  • PDF

A Study on Performance Improvement of Electroic Warfare Direction Finding System in Muiti Radio Environment (다중 전파 환경에서의 전자전 방향탐지 시스템 성능향상에 관한 연구)

  • Choi, Sun-ho;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.206-209
    • /
    • 2016
  • High end commercial communication system, such as contemporary mobile technology (CDMA, LTE, Wi-FI, etc.) and extension of frequency band, may affect the performance of the shipborne electronic support measurement system in modern battle field. In this paper, we suggest a way to improve the performance of electronic warfare system based on direction finding algorithm simulation after discussing the limits of traditional system.

  • PDF

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5685-5700
    • /
    • 2018
  • Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF