• Title/Summary/Keyword: asymmetric warfare

Search Result 10, Processing Time 0.025 seconds

Study on the Case of the Asymmetric War (비대칭전 주요사례 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.25-32
    • /
    • 2016
  • We can not respond asymmetric warfare effectively. The asymmetric operation is performed in asymmetric methods and means with different characteristics and functions to their enemy. And the character of the asymmetric operation have 'heterogeneity' and 'superiority' in principle. The type of asymmetric strategy is complex and diverse. Since we can classify the type of the asymmetric strategy in many different way and we must study in many ways and aspects. When we study asymmetric war previous cases from modern to ancient era, we can find that the key factors of the victory have superiority of the asymmetric strategy and discriminatory measures. The asymmetry is created when one party has to adapt to the strategic environment. If we want to secure a strategic advantage, we must take a number of case studies and countermeasures for asymmetric warfare.

Future Warfare for Hyper Connected Era (초 연결시대의 미래전 양상)

  • Lee, Chang-In;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.99-103
    • /
    • 2020
  • The warfare caused a dramatic change when new technology was introduced to the battlefield or when the technology was matured to change the concept of operation. Thus, the rapid development of science since the 19th century is also rapidly changing the aspect and speed of war, and the recent speed of change is making it more difficult to predict future warfare than in the past In particular, in the past, it was difficult to predict the future warfare based on the latest science and technology, because it was difficult to spread and seize advanced science and technology. But global human exchange, technology hijacking by internet, and developing of asymmetric skills and methods caused more complex to technology based warfare prediction. In other words, the nature and principles of war, together with the development of science and technology, should be considered togther to predict future warfare. Therefore this study is based on the thory and principles of war and the latest science and technology to predict the future warfare situation that the military will face.

Recommendations on Design and Analysis of Protective Structures (방호 구조물 설계 및 해석의 문제점과 해결방안)

  • Krauthammer, Theodor;Park, Jong Yil
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.683-689
    • /
    • 2013
  • Defending society against rapidly evolving types of warfare, such as asymmetric warfare, will remain a challenge, at least through the first half of the 21st century. Technology will continue to play a major role in these efforts, and society must develop appropriate innovative theoretical, numerical, and experimental approaches that will lead to a wide range of solutions. This paper is aimed at highlighting challenges that must be overcome to achieve the required objectives.

An Analysis of Military Strategies in the Israel-Hamas War (2023): Asymmetric Tactics and Implications for International Politics (이스라엘-하마스 전쟁(2023)의 군사전략 분석: 비대칭 전술과 국제정치적 함의)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.389-395
    • /
    • 2024
  • This study aims to deeply analyze the military strategies and tactics used in the battles between Israel and Hamas, to understand the military approaches, technical capabilities, and their impact on the outcomes of the conflict. To achieve this, methodologies such as literature review, data analysis, and case studies were utilized. The research findings confirm that Hamas employed asymmetric tactics, such as rocket attacks and surprise attacks through underground tunnels, to counter Israel's military superiority. On the other hand, Israel responded to Hamas's attacks with the Iron Dome interception system and intelligence-gathering capabilities, but faced difficulties due to Hamas's underground tunnel network. After six months of fighting, the casualties in the Gaza Strip exceeded 30,000, and more than 1.7 million people became refugees. Israel also suffered over 1,200 deaths. Militarily, neither side achieved a decisive victory, resulting in a war of attrition. This study suggests that the Israel-Hamas war exemplifies the complexity of modern asymmetric warfare. Furthermore, it recommends that political compromise between the two sides and active mediation efforts by the international community are necessary for the peaceful resolution of the Israel-Palestine conflict.

Design and Implementation of Command and Control Systems for Soldiers using Smart Phone (스마트폰을 활용한 개인 병사용 지휘 통제 시스템 설계 및 구현)

  • Cho, Joon-Young;Lim, Man-Yeob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.30-38
    • /
    • 2011
  • The modern warfare needs sharing tactical situation and Command and Control(C2) capacity. Lately, developing of C2 System for Soldiers has dramatically increased according to increase of asymmetric state of hostilities like a guerilla war or a street-to-street fighting. In this paper, we explain the concepts of C2 System for Soldiers and Smart Phone. We describe the proposed system composed of HMD equipment, Smart Phone, and exclusive software. This system provides that Soldiers have C2 capacity and share the image of a visual field. It also offers efficient military power disposition and understanding tactical situation in operations.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

The Changes in the Future War Patterns and ROK's Response (미래 전쟁양상의 변화와 한국의 대응)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.115-152
    • /
    • 2017
  • This paper is to analyse the changes in the future war patterns and ROK's response. To this end the paper is composed of 5 chapters titled instruction; concept, characteristics, types, and evolution of war; changes in the war patterns of the future; Korea's response strategies for the future war. Truth can be immutable, but everything else changes. War has begun with human history, and today there are still wars in places all over the world. As ages change from agricultural society to industrial society to knowledge and information society, aspects(patterns) of war have also changed. Future warfare includes the 5th dimensional war(in the ground, the sea, the air, the universe, the cyber), the network-centric, the precision strike, the rapid maneuver, the non-gunpowder, the non-lethal, the unmanned robot, the informational & cyber, the asymmetric, the non-linear, and the parallel etc. In response to these changes in the pattern of wars, the ROK military should seek (1)to build a future-oriented military force, (2)to continuously develop military innovation and preparedness, and (3)to develop and establish a paradigm for acquiring the power of technology. A Roman strategist, Vegetius said, "If you wish peace, prepare for war." This is a universally accepted maxim in international society today. We must never forget that peace we desire is given when we have the will and ability to keep.

A study on the Development Direction of Unmanned Systems for Subterranean Operations for the Special Operations Teams (특수작전팀의 지하작전용 무인체계 발전방향 연구)

  • Sang-Keun Cho;Jong-Hoon Kim;Sung-Jun Park;Bum-June Kwon;Ga-Ram Jeong;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.307-312
    • /
    • 2023
  • North Korea has already been using underground space for military purposes for decades, and is currently developing it as a key base for operating asymmetric forces. Accordingly, the special operations teams need fighting methods, weapon systems, and organizational structures to carry out subterranean operations. This paper presents an unmanned system platform for subterranean operations that combines tilt-rotor type drones, high-tech sensors, communication repeaters, and small robots, and a system that can be operated by special operation teams. Based on this, the survivability of the special operations teams can be strengthened and operational utility can be maximized. Afterwards, if Special Warfare Command collects collective intelligence based on the ideas related to subterranean operations presented in this paper and further develops these, it will be possible to drive subterranean operations doctrines, weapon systems, and organizational structures optimized for the battlefield on the Korean Theater of Operations in the near future.

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.