• Title/Summary/Keyword: conventional war

Search Result 52, Processing Time 0.019 seconds

Analysis of Military Capability Balance on the Korean Peninsula Using the Net Assessment Methodology With a Focus on South and North Korean Naval Forces (Surface Combatants) (총괄평가 방법론을 활용한 한반도 군사력 균형분석 - 남·북한 해군력(수상함)을 중심으로 -)

  • Han, Jung-kyeong
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.61-96
    • /
    • 2023
  • Amidst the ongoing instability and military tensions between North and South Korea, it is essential for us to comprehend and assess North Korea's military capabilities, while preparing for potential contingencies through military reinforcement. However, to conduct a comprehensive analysis of the military balance on the Korean Peninsula, it is imperative to move beyond simplistic quantitative comparisons of combat capabilities and embrace a broader perspective, which includes qualitative comparisons of military strength, operational capabilities, and a nation's ability to wage war. To address this need, this study employs the method of "Net Assessment" to evaluate the relative combat power of South and North Korean conventional naval forces, with a particular focus on surface combatants. This evaluation involves both quantitative and qualitative comparisons of military assets (personnel and equipment) and intangible factors (naval strategies, geography, etc.). By conducting a holistic assessment, the research aims to identify and analyze strategic asymmetries that may exist between the two navies.

  • PDF

Development of multi-media multi-path Optimization Network Technology Using RNN Algorithm (RNN 알고리즘을 이용한 다매체 다중경로 최적화 네트워크 기술 개발)

  • Pokki Park;Youngdong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.95-104
    • /
    • 2024
  • The performance capability of the future battlefield depends on whether the next-generation technology of the Fourth Industrial Revolution, called ABCMS (AI, Bigdata, Cloud, Mobile, Security), can be applied to secure innovative defense capabilities It is no exaggeration to say. In addition, the future military operation environment is rapidly changing into a net work-oriented war (NCW) in which all weapon systems mutually share battlefield information and operate in real-time within a single integrated information and communication network based on the network and is expanding to the scope of operation of the manned and unmanned complex combat system. In particular, communication networks responsible for high-speed and hyperconnectivity require high viability and efficiency in power operation based on multi-tier (defense mobile, satellite, M/W, wired) networks for the connection of multiple combat elements and smooth distribution of information. From this point of view, this study is different from conventional single-media, single-path transmission with fixed specifications, It is an artificial intelligence-based transmission technology using RNN (Recurrent Neural Networks) algorithm and load distribution during traffic congestion using available communication wired and wireless infrastructure multimedia simultaneously and It is the development of MMMP-Multi-Media Multi-Path adaptive network technology.

The Analysis of the U.S. Navy Surface Forces Strategy and the implications to Republic of Korea Navy (미(美) 해군 수상함부대 전략 평가 및 한국 해군에게 주는 시사점)

  • Kim, Hyun-Seung
    • Strategy21
    • /
    • s.41
    • /
    • pp.52-84
    • /
    • 2017
  • After finishing Cold War, the U.S. Navy's ability to Sea control has been gradually eroded last 15-20 years. The global security environment demands that the surface Navy rededicate itself to sea control, as a new group of potential adversaries is working to deny U.S. navy command of the sea. China has been increasing their sea denial capability, such as extended anti-surface cruise missile and anti-surface ballistic missile. To cope with this situation, the U.S. Naval Surface Forces Command has announced Surface Forces Strategy: Return to Sea Control. It is a new operating and organizing concept for the U.S. surface fleet called 'distributed lethality'. Under distributed lethality, offensive weapons such as new ASCMs are to be distributed more widely across all types of Navy surface ships, and new operational concept for Navy surface fleet's capability for attacking enemy ships and make it less possible for an enemy to cripple the U.S. fleet by concentrating its attack on a few very high-value Navy surface ships. By increasing the lethality of the surface ships and distributing them across wide areas, the Navy forces potential adversaries to not only consider the threat from our carrier-based aircraft and submarines, but they now consider the threat form all of those surface ships. This idea of using the distributed lethality template to generate surface action groups and adaptive force package and to start thinking about to increase the lethal efficacy of these ships. The U.S. Navy believes distributed lethality increases the Navy's sea control capability and expands U.S. conventional deterrence. Funding new weapons and renovated operating concept to field a more lethal and distributed force will enable us to establish sea control, even in contested area. The U.S. Navy's Surface Forces Strategy provides some useful implications for The ROK Navy. First the ROK Navy need to reconsider sea control mission. securing sea control and exploiting sea control are in a close connection. However, recently the ROK Navy only focuses on exploiting sea control, for instance land attack mission. the ROK Navy is required to reinvigorate sea control mission, such as anti-surface warfare and anti-air warfare. Second, the ROK Navy must seek the way to improve its warfighting capability. It can be achieved by developing high-edge weapons and designing renewed operating concept and embraced new weapon's extended capabilities.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The Records and Archives Administrative Reform in China in 1930s (1930년대 중국 문서당안 행정개혁론의 이해)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.276-322
    • /
    • 2004
  • Historical interest in China in 1930s has been mostly focused on political characteristic of the National Government(國民政府) which was established by the KMT(中國國民黨) as a result of national unification. It is certain that China had a chance to construct a modern country by the establishment of the very unified revolutionary government. But, it was the time of expanding national crises that threatened the existence of the country such as the Manchurian Incident and the Chinese-Japanese War as well as the chaos of the domestic situation, too. So it has a good reason to examine the characteristic and pattern of the response of the political powers of those days. But, as shown in the recent studies, the manifestation method of political power by the revolutionary regime catches our attention through the understanding of internal operating system. Though this writing started from the fact that the Nationalist Government executed the administrative reform which aimed at "administrative efficiency" in the middle of 1930s, but it put stress on the seriousness of the problem and its solution rather than political background or results. "Committee on Administrative Efficiency(行政效率委員會)", the center of administrative reform movement which was established in 1934, examined the plan to execute the reform through legislation by the Executive Council(行政院) on the basis of the results of relevant studies. They claimed that the construction of a modern country should be performed by not political revolution anymore but by gradual improvement and daily reform, and that the operation of the government should become modern, scientific and efficient. There were many fields of administrative reform subjects, but especially, the field of records and archives adminstration(文書檔案行政) was studied intensively from the initial stage because that subject had already been discussed intensively. They recognized that records and archives were the basic tool of work performance and general activity but an inefficient field in spite of many input staff members, and most of all, archival reform bring about less conflicts than the fields of finance, organization and personnel. When it comes to the field of records adminstration, the key subjects that records should be written simply, the process of record treatment should be clear and the delay of that should be prevented were already presented in a records administrative meeting in 1922. That is, the unified law about record management was not established, so each government organization followed a conventional custom or performed independent improvement. It was through the other records administrative workshop of the Nationalist Government in 1933 when the new trend was appeared as the unified system improvement. They decided to unify the format of official records, to use marker and section, to unify the registration of receipt records and dispatch records and to strengthen the examination of records treatment. But, the method of records treatment was not unified yet, so the key point of records administrative reform was to establish a unified and standard record management system for preventing repetition by simplifying the treatment procedure and for intensive treatment by exclusive organizations. From the foundation of the Republic of China to 1930s, there was not big change in the field of archives administration, and archives management methods were prescribed differently even in the same section as well as same department. Therefore, the point at issue was to centralize scattered management systems that were performed in each section, to establish unified standard about filing and retention period allowance and to improve searching system through classification and proper number allowance. Especially, the problem was that each number system and classification system bring about different result due to dual operation of record registration and archives registration, and that strict management through mutual contrast, searching and application are impossible. Besides, various problems such as filing tools, arrangement method, preservation facilities & equipment, lending service and use method were raised also. In the process this study for the system improvement of records and archives management, they recognized that records and archives are the identical thing and reached to create a successive management method of records and archives called "Records and Archives Chain Management Method(文書檔案連鎖法)" as a potential alternative. Several principles that records and archives management should be performed unitedly in each organization by the general record recipient section and the general archives section under the principle of task centralization, a consistent classification system should be used by classification method decided in advance according to organizational constitution and work functions and an identical number system should be used in the process of record management stage and archive management stage by using a card-type register were established. Though, this "Records and Archives Chain Management Method" was developed to the stage of test application in several organizations, but it was not adopted as a regular system and discontinued. That was because the administrative reform of the Nationalist Government was discontinued by the outbreak of the Chinese-Japanese War. Even though the administrative reform in the middle of 1930s didn't produce practical results but merely an experimentation, it was verified that the reform against tradition and custom conducted by the Nationalist Government that aimed for the construction of a modern country was not only a field of politics, but on the other hand, the weak basis of the government operation became the obstacle to the realization of the political power of the revolutionary regime. Though the subject of records and archives administrative reform was postponed to the future, it should be understood that the consciousness of modern records and archives administration and overall studies began through this examination of administrative reform.

A Study for Historical Consideration of "The Golden Age" of Chinese Comics -Focusing on and - (중국만화의 "황금시기"에 관한 역사적 고찰 -<왕 선생>, <삼모 유랑기> 중심으로-)

  • Jin, Li-Na
    • Cartoon and Animation Studies
    • /
    • s.34
    • /
    • pp.197-217
    • /
    • 2014
  • The 1920s and 1930s ushered in "the golden age" of Chinese comics when the comics flourished. Satirical cartoons in modern Chinese comics were popular due to emotional instability and war caused by foreign powers. Among many popular comics, this paper analyzes in the 1920s and in the 1930s which were made into films and dramas. Chapter Two shows that China in the Republican era of China expanded its consumer culture into some sectors like films, novels, magazines and fashion in the 1920s and 1930s. However, more than any other things, this chapter considers from the historical perspective "the golden age" of comics including comic magazine in the 1930s and a history of comic magazines that gained popularity with conventional and common story. Chapter Three explains that social satire cartoons were in vogue since the May Fourth Movement and anti-imperialistic and semi-feudalistic stories in the 1920s were realized in life. It also says that comics that describes the negative sides of its society were popular. Ye QianYu, a cartoonist, portrayed many facets of Shanghai through : the daily life of the middle and lower classes, bureaucratic corruption and sympathy for the working class. drawn by Zhang LePing describes the unfair social system between the bourgeoisie and the proletariat and the gap between the rich and poor through the main character, the powerless and poor orphan. and lampooned the reality of its time in an objective, witty and humorous way in terms of ethics and economy respectively. The researcher chooses to study and which are very familiar to us, because good cartoons, animations and movies stimulate the feelings about our surroundings.

A scheme on strengthening of R.O.K reserved force (예비전력 정예화 방안)

  • Kim, Jae-Sam
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.1-45
    • /
    • 2007
  • Reserved forces of ROKA are in charge of replacement of TOE in the wartime and mission of rear area operation. But there is institutional inertia in the law and organization oriented to fill human resources rather than take mission. We need to prepare for the investment and arrangement of reserved forces as military power that would be replaced standing forces. In this portion, to reinforce reserve forces elite, First, efficient mobilization regulations and systems are suggested. I covered a maintenance of relevant mobilization ordinances which need to legislated and approved by national assembly for wartime and development of mobilization system which might lose the appropriate time for mobilization due to complicated declaration procedures and measures to overcome the panic at the initial stage of the war and organization and employment of nationwide transportation system and mobilization center. To ensure efficient resource management and mobilization of reserve forces with a number of approximately 3 million, there's a necessity of organization for integration and conciliation. To make it real, I suggested establishing and employing the mobilization center, on first phase, employ the mobilization center focusing on homeland divisions, on second phase, it is advisable to convert to national level mobilization system and develop to central mobilization center focusing on national emergency planning committee. During peacetime, in conjunction with Mobilization Cell, mobilization center can conduct resource survey and integrate and manage mobilization resources and take charge of mobilization training of subordinate units, and during wartime, in conjunction with mobilization coordination team and Cell, can ensure the execution of mobilization. Second, Future oriented reserve forces management system such as service system of reserve forces and support system of homeland defense operations. Current service and trainings of reserve forces by the year have very low connection, as it is very complex to manage the resources and trainings, and service and training lack the equity, re-establishment of service system is required. Also in an aspect of CSS and cultivation support for reserve forces, as the scope and limitation of responsibility between the armed forces and autonomous organization is obscure, conditions to conduct actual-fighting exercises are limited. Concentrated budgetting is extremely difficult because reserve forces training fields are scattered nationwide, and facilities and equipments are rapidly getting older. To improve all these, I suggest the organization of homeland defense battalion with a unit of "City-Gun-District" and supporting the local reserve forces. Conduct unit replacement or personal replacement for those who have finished their 1 or 2 years and homeland defense operation duty for those with 3-5 years for consistency and simplification. Third, I suggest Future oriented Reserved Training(FRT) and Training Center oriented training management to establish a reliable reserve training. Reserves carry out expansion of unit, conventional combat mission, homeland defense and logistics support during wartime, and actual-fighting exercise, and disaster relief, peace keeping activities. Despite diverse activities and roles, their training condition still stays definitely poor. For these reasons, Modernization of weapons and facilities through gradual replacement and procurement is essential to enhance mobilization support system.

  • PDF

The Future of Countermobility Capability with a Literature Analysis from FASCAM to Terrain Shaping Obstacle(TSO) (미래 대기동 작전 능력의 발전방안 연구 -살포식지뢰(FASCAM)로부터 지형 조성 장애물(TSO) 전력을 중심으로-)

  • Park, Byoung-Ho;Sim, Jaeseong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.291-298
    • /
    • 2021
  • In this study, the future of countermobility capability is presented by analyzing the status of the countermobility obstacles focusing on the history of landmines and munitions. The conventional landmine was forbidden globally by the CCW and Ottawa Treaty because it caused civilian damage after the war. Because the inhumanity of those mines had been acknowledged, shatterable mines with a self-destruct (SD) function and M93 "HORNET" anti-tank munition with enhanced sensors have been fielded. In 2016, the Obama administration announced a policy that banned all antipersonnel landmines, leaving a considerable gap in the countermobility capability. To deal with these problems, the developments of "SAVO" and the SLEP program of Volcano mines were conducted. In the sense of a long-term approach, the countermobility obstacles, including mines, were chosen as fundamental forces for Multi-Domain Operations and were improved to Terrain Shaping Obstacles (TSO). TSO has improved sensors and mobility kill capabilities and features an enhanced remote control over each munition on the battlefield through a network established with satellite communication. The combined arms countermobility might be fully capable until 2050 if the TSO program can be completed successfully.

A Dilemma of Kyrgyzstan Goes Through the Process of Nation-Building: National Security Problems and Independent National Defense Capability (국가건설과정에서 키르기스스탄의 국가안보와 자주국방의 딜레마)

  • Kim, Seun Rae
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.4
    • /
    • pp.27-52
    • /
    • 2011
  • The regions of Central Asia have each acquired an elevated strategic importance in the new security paradigm of post-September 1lth. Comprised of five states, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan, Central Asia's newly enhanced strategic importance stems from several other factors, ranging from trans-national threats posed by Islamic extremism, drug production and trafficking, to the geopolitical threats inherent in the region's location as a crossroads between Russia, Southwest Asia and China. Although the U.S. military presence in the region began before September 11th, the region became an important platform for the projection of U.S. military power against the Taliban in neighboring Afghanistan. The analysis goes on to warn that 'with US troops already in place to varying extents in Central Asian states, it becomes particularly important to understand the faultlines, geography, and other challenges this part of the world presents'. The Kyrgyz military remains an embryonic force with a weak chain of command, the ground force built to Cold War standards, and an almost total lack of air capabilities. Training, discipline and desertion - at over 10 per cent, the highest among the Central Asian republics - continue to present major problems for the creation of combat-effective armed forces. Kyrgyzstan has a declared policy of national defence and independence without the use of non-conventional weapons. Kyrgyzstan participates in the regional security structures, such as the Collective Security Treaty Organisation (CSTO) and the Shanghai Co-operation Organisation (SCO) but, in security matters at least, it is dependent upon Russian support. The armed forces are poorly trained and ill-equipped to fulfil an effective counter-insurgency or counter-terrorist role. The task of rebuilding is much bigger, and so are the stakes - the integrity and sovereignty of the Kyrgyz state. Only democratization, the fight against corruption, reforms in the military and educational sectors and strategic initiatives promoting internal economic integration and national cohesion hold the key to Kyrgyzstan's lasting future

South Korea's Defense Industry Development Strategy - Focusing on Technology Protection Policy - (한국의 방위산업 발전전략 연구 - 기술보호정책을 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.83-93
    • /
    • 2024
  • As the paradigm of the global defense industry changes due to the Russia-Ukraine war, Korea's cutting-edge conventional weapons systems are attracting attention from around the world. In 2023, Korea ranked 9th in world arms exports, and is pursuing innovation in the defense industry with the goal of becoming the world's 4th largest defense exporter by 2027. The defense industry is a national strategic industry that requires a long period of time and a large budget, and defense technology is a core technology that has a great impact on the advancement of defense and the national economy. Over the past five years, Korea has suffered economic losses worth approximately 25 trillion won due to the outflow of cutting-edge technology overseas, and there is an urgent need for institutional improvement to prevent the outflow of defense technology. Therefore, this study presented Korea's defense industry development strategy by examining the laws and systems that the three key players in the Indo-Pacific region, the United States, China, and Japan, are promoting to protect defense industry technology. To foster the defense industry as a promising future industry in Korea, it is necessary to respond to the fast-evolving pace of development of advanced science and technology in connection with securing technological sovereignty and protect defense technology, which is a key technology of the country, by improving related laws and systems.