• Title/Summary/Keyword: Wartime security

Search Result 33, Processing Time 0.019 seconds

The Importance of Military Security -Mainly focused on the Battle of Gaeseong, the early part of the Korean War- (전투사례로 본 군사보안의 중요성 연구 - 6.25 전쟁 초기, 개성일대 전투를 중심으로-)

  • Kim, Gyu-Nam;Lee, Hyun-Hee
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.51-58
    • /
    • 2016
  • "History is a mirror" means that we should be prepared for the threats of enemies through learning from repeating history. Currently South Korea is facing various provocations, including North Korea's nuclear weapons and missile s. For the protection of the life and property of its people, South Korea should regard North Korea as a main enemy and be fully prepared for the threats. The Korean War was a war between well-prepared North Korea and ill-prepa red South Korea. After Liberation, North Korean army incorporated the Chinese Communist army, placed battle equi pment with the support of the Soviet army, and finished corps-level training while South Korea at that time did not finish battalion-level training. In wartime and peacetime, an army should improve military security by concealing its own information and find its enemy's information. North Korea carefully prepared for the war, collecting information about the organization, deployment and operation of the South Korean army. South Korean army failed to cope with it and had hard times in its early battles. In this paper, I will emphasize the importance of military security, focusing on the Battle of Gaeseong, the early part of the Korean War.

Analysis of Key Factors in Operational Control Transition Resolution using Analytic Hierarchy Process (AHP) (계층적 분석방법(AHP)을 적용한 전시작전통제권 전환의 주요 결정요인 분석)

  • Park, Sang-Jung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.153-163
    • /
    • 2011
  • This study analyzes the military and political factors that influenced the Participatory Government's resolution in Wartime Operational Control (OPCON) Transition. The research on key factors in OPCON transition firstly implemented literature research and then increased feasibility through additional use of AHP. The analysis results showed that there was a negative effect for Korean Peninsular Defense in the 'ROK-US Alliance Asymmetry' area, a positive effect to increase ROK-led Capability of Theater Operation in the 'ROK and U.S. Alliance Interdependence' area and a positive effect for Invocation of ROK Self-Defense Power in the 'Interests of Participatory Government's Liberal Regime' area respectively. After applying AHP, "ROK exercise of Self-defense" in the 'Interests of Participatory Government's Liberal Regime' area received the highest assessment, while the "Increasement of North Korea's Threat" in the 'ROK-US Alliance Asymmetry' area received the lowest assessment. This study is meaningful in that it analyzed the key military and political factors in the Participatory Government's resolution of Wartime OPCON Transition using AHP.

Securing COSPAS-SARSAT Search-and-Rescue Signal with Galileo System (갈릴레오 시스템과 연동한 COSPAS-SARSAT 탐색구조 신호 보안)

  • Cho, Taenam;Baek, Yoojin;Kim, Jaehyun;Lee, Sanguk;Ahn, Woo-Geun
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.117-126
    • /
    • 2014
  • The COSPAS-SARSAT Search-and-Rescue System detects and locates emergency beacons activated by aircraft, ships and individuals. In particular, when this system is used in wartime and the signal is leaked to the enemy, it can cause the loss of the rescuers and the survivors. This paper proposes an improved method which protects the COSPAS-SARSAT search-and-rescue signal itself from being disclosed during its operation. In addition, there is presented a new protocol which maintains the stabilized security status between survivors and rescuers, using the Galileo/SAR return link.

Criminal and Legal Countermeasures against Cybercrime in the Conditions of Martial Law

  • Nataliia, Veselovska;Serhii, Krushynskyi;Oleh, Kravchuk;Olеksandr, Punda;Ivan, Piskun
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.85-90
    • /
    • 2022
  • The article is devoted to the consideration of the features of the application of criminal and legal countermeasures against cybercrime in the conditions of martial law. While conducting this research, we found an opportunity to formulate the author's recommendations for solving the most complex law enforcement problems, as well as to propose changes to the Criminal Code of Ukraine aimed at eliminating the flaws of the analyzed Law, the adoption of which will contribute to the achievement of higher efficiency of the relevant criminal law prescriptions. It is argued that the removal of the previously existing in the footnote of Art. 361 of the Criminal Code of a fundamentally important caveat regarding the fact that when assessing "significant damage", the mentioned property equivalent was to be taken into account only when such damage consisted in causing material damage, which led to a significant and unjustified narrowing of the scope of potential application of Part 4 of Article 361 of the Criminal Code.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

An Analysis of Decision Making Factor by Delphi and DEMATEL Model for Decision Support Information System development -Wartime Operational Control Transition approach- (의사결정 지원 정보시스템 개발을 위한 Delphi-DEMATEL모델에 의한 의사결정 요인분석 -전작권 전환 사례를 중심으로-)

  • Park, Sangjung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.47-58
    • /
    • 2012
  • This study selects political and military decision factors of Participatory Government's Wartime Operational Control(OPCON) Transition and analyzes, both quantitatively and qualitatively, the effects and relations between those factors. Previous research utilizing the Analytic Hierarchy Process(AHP) selected their decision factors based on academic data and field experience, requiring more objective analysis of the factors. For this study, we conducted a survey among security subject matter experts(SME) both online and offline. The results show that OPCON transition's decision factors were to 'recover military sovereignty', 'set the conditions for peaceful reunification' and 'improve ROK image through enhancing national power' which differs little from the previous AHP method studies. It also showed that 'recover military sovereignty' and 'set the conditions for peaceful reunification' had no relationship to each other and that the key factor that decided the OPCON Transition was actually 'recover military sovereignty' which represents the interest of the liberal party in ROK. This study finds its meaning by analyzing the decision factors of Participartory Government's OPCON Transition thorugh Delphi and DEMATEL method.

The Main Methodological Positions of Educational Institutions in the System of Educational Work of the Modern Information Space

  • Shumiatska, Oleksandra;Palamar, Nataliia;Bilyk, Ruslana;Yakymenko, Svitlana;Yakovenko, Serhii;Tsybulko, Liudmyla;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.272-278
    • /
    • 2022
  • The article proves the idea that the protection and development of Ukraine as an independent, sovereign state requires the education of a patriot citizen who is able to live and work in a democracy, ensure the unity of Ukraine, feel constant responsibility for himself, his people, the country, and strive to make a real contribution to reform processes, especially in unstable, wartime. The main goal of educational institutions in the system of educational work of the modern information space is revealed. The tasks of patriotic education of the individual are presented. The content of patriotic education at the wartime stage and the main characteristics of the content of patriotism are substantiated. The main methodological positions that are taken into account in the construction of the structure and dynamics of the formation of civil responsibility of the individual are highlighted. The structure of civic responsibility as an integral system of the modern information space is drawn, which includes three subsystems that characterize the natural, social and systemic qualities of citizenship, interconnected hierarchically and synergistically. The components of the structural part of the model of civil culture of the individual in the modern information space are analyzed.Modern modernization of the education system in the modern information space, which has led to the emergence of a new type of Educational Institutions, requires the search for new pedagogical technologies that can ensure the formation of a patriotic citizen with an active civic position, which involves not only mastering students' knowledge about the rights and obligations of citizens, convincing them of the expediency of democratic transformations of society, the formation of high moral and strong-willed, patriotic qualities and feelings, but also identifying motivated civic actions, actions that are necessary during martial law in Ukraine.

A Study on the Integrated Capability Framework for Capability Based Force Structure (능력기반전력구조를 위한 통합능력프레임워크 연구)

  • Park, Sang-Gun;Lee, Tae-Gong;Lim, Nam-Kyu;Son, Hyun-Sik;Kim, Han-Wook
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.2
    • /
    • pp.39-52
    • /
    • 2010
  • DoD makes efforts to develop Capability-Based Force Structure through NCW and requirements. MND makes efforts to develop capability based force development and management for dynamic security environment and wartime command and control, however it seems to be very difficult to develop Capability-Based Force Structure without the concept and development method of integrated capability. The purpose of this paper is to make "An Integrated Capability Framework of Capability Based Force Structure" which presents integral capability of Enterprise. This framework contains the concept of force operation and force development view based on defense force life cycle.

Beauty in White Make-up Powder (白粉) Advertisements in the 1920s and 1930s -Aesthetic Expression in the Era of Modern Cosmetics Advertisement- (1920~1930년대의 백분(白粉)광고에 나타난 미(美) -근대 화장광고시대의 미적 표현-)

  • Baek, Ju Hyun;Chae, Keum Seok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.2
    • /
    • pp.255-273
    • /
    • 2019
  • Perceptions of beauty change and are shared with others in the media of emotional words. In the modern age, a mix of traditional and modern make-up cultures has changed the standards of beauty. Therefore, an analysis using emotional words (an image that consumers have for certain subjects) and an image scale that intuitively shows them can be an important means for understanding changes in the "beauty of the time". This paper considered changes in typical aesthetic characteristics that women pursued through make-up by analyzing emotional words in white make-up powder advertisement texts from the 1920s through the 1930s. Imported modern technologies changed cosmetic manufacturing techniques and advertising methods to create a momentum that changed women's make-up culture from light to heavy make-up or from white to color make-up. Such changes have led to changes in the perception of beauty and were expressed through sensitive vocabularies such as pure, new, fresh, lofty, lively, healthy, and cheery. Such changes reflect social aspects such as women's aspirations for high status, pursuit of security, or women's roles under the wartime regime to show a change from beauty with an attribute of [+cool] to that of [+soft].