• Title/Summary/Keyword: military space activity

Search Result 9, Processing Time 0.029 seconds

Space Development and Law in Asia (아시아의 우주개발과 우주법)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.349-384
    • /
    • 2013
  • The Sputnik 1 launching in 1957 made the world recognize the necessity of international regulations on space development and activities in outer space. The United Nations established COPUOS the very next year, and adopted the mandate to examine legal issues concerning the peaceful uses of outer space. At the time, the military sector of the U.S.A. and the Soviet Union were in charge of the space development and they were not welcomed to discuss the prohibition of the military uses of outer space at the legal section in the COPUOS. Although both countries had common interests in securing the freedom of military uses in outer space. As the social and economic benefits derived from space activities have become more apparent, civil expenditures on space activities have continued to increase in several countries. Virtually all new spacefaring states explicitly place a priority on space-based applications to support social and economic development. Such space applications as satellite navigation and Earth imaging are core elements of almost every existing civil space program. Likewise, Moon exploration continues to be a priority for such established spacefaring states as China, Russia, India, and Japan. Recently, Companies that manufacture satellites and ground equipment have also seen significant growth. On 25 February 2012 China successfully launched the eleventh satellite for its indigenous global navigation and positioning satellite system, Beidou. Civil space activities began to grow in China when they were allocated to the China Great Wall Industry Corporation in 1986. China Aerospace Corporation was established in 1993, followed by the development of the China National Space Administration. In Japan civil space was initially coordinated by the National Space Activities Council formed in 1960. Most of the work was performed by the Institute of Space and Aeronautical Science of the University of Tokyo, the National Aerospace Laboratory, and, most importantly, the National Space Development Agency. In 2003 all this work was assumed by the Japanese Aerospace Exploration Agency(JAXA). Japan eases restrictions on military space development. On 20 June 2012 Japan passed the Partial Revision of the Cabinet Establishment Act, which restructured the authority to regulate Japanese space policy and budget, including the governance of the JAXA. Under this legislation, the Space Activities Commission of the Ministry of Education, Culture, Sports, Science, and Technology, which was responsible for the development of Japanese space program, will be abolished. Regulation of space policy and budget will be handed over to the Space Strategy Headquarter formed under the Prime Minister's Cabinet. Space Strategy will be supported by a Consultative Policy Commission as an academics and independent observers. By revoking Article 4 (Objectives of the Agency) of a law that previously governed JAXA and mandated the development of space programs for "peaceful purposes only," the new legislation demonstrates consistency with Article 2 of the 2008 Basic Space Law. In conformity with the principles laid down in the 1967 Outer Space Treaty JAXA is now free to pursue the non-aggressive military use of space. New legislation is the culmination of a decade-long process that sought ways to "leverage Japan's space development programs and technologies for security purposes, to bolster the nation's defenses in the face of increased tensions in East Asia." In this connection it would also be very important and necessary to create an Asian Space Agency(ASA) for strengthening cooperation within the Asian space community towards joint undertakings.

  • PDF

A Systematic Construction Process of 3D Database for Realtime Virtual Simulation of Transportation Equipments (수송장비의 실시간 가상 시뮬레이션을 위한 3차원 데이터베이스의 체계적인 구축 프로세스)

  • Kim, Bo-Hyun
    • IE interfaces
    • /
    • v.16 no.2
    • /
    • pp.258-267
    • /
    • 2003
  • Recently, virtual reality technologies have been rapidly developed and realtime virtual simulation methods have been extensively employed for several application areas such as game, sports, manufacturing, military, and so on. A 3D database in realtime virtual simulation plays a key role because it makes users feel reality in virtual space. In a application view of 3D database, a systematic construction approach is required to reduce its construction time and increase its quality. However, many researches have been mostly focused on realtime graphic issues and its key technologies. In virtual simulation of transportation equipments, this paper proposes a systematic construction process of 3D database consisting of four stages as follows: 1) determine the activity space of a equipment, 2) collect data related to 3D database construction, 3) make a 3-dimensional modeling strategy, and 4) generate and evaluate a 3D model. This paper also introduces a new procedure of 3D environment modeling, which summarizes and expands our modeling experiences, to be used as a modeling guide.

System Safety Application for the Weapon System (무기체계 시스템안전 적용방안)

  • Park, Suncheol;Kim, Jinsung;Jin, Jonghoon;Yoon, Donghwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.106-112
    • /
    • 2021
  • In the early 1960s, US Air Force lost missile launch bases during ICBM development by a defect in the missile design and operation plan. U.S. DoD realized the limitation of the existing accident prevention method. Therefore, the weapon development required system safety activity, and procurement projects of U.S. DoD applied MIL-STD-882(System Safety). Development projects of U.S. DoD more emphasized the importance of system safety after the space shuttle Challenger exploded in 1986. Currently, Airworthiness certification for military aircraft uses system safety to minimize accidents. The domestic defense aviation R&D projects also use the system safety for the airworthiness certification. However, non-aviation weapon R&D projects rarely applied system safety. This paper presents a system safety application method for domestic weapon R&D projects by studying the U.S. military standards/organizations and domestic defense aviation projects.

Development of Wireless Real-Time Gas Detector System for Chemical Protection Performance Test of Personal Protective Equipment (화생방 보호의 성능평가를 위한 무선 실시간 가스 검출기 개발)

  • Kah, Dong-Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.294-301
    • /
    • 2020
  • Man-In-Simulant Test(MIST) provides a test method to evaluate chemical protective equipments such as protective garments, gloves, footwear and gas mask. The MIST chamber is built to control concentration of chemical vapor that has a activity space for two persons. Non-toxic methyl-salicylate(MeS) is used to simulate chemical agent vapor. We carried out to measure inward leakage MeS vapors by using passive adsorbent dosimeter(PAD) which are placed on the skin at specific locations of the body while man is activity according to the standard procedure in MIST chamber. But more time is required for PADs and there is concern of contamination in PADs by recovering after experiment. Therefore detector for measuring in real time is necessary. In order to analyze in real time the contamination of the personal protective equipment inside the chemical environment, we have developed a wireless real-time gas detector. The detector consists of 8 gas-sensors and 1 control-board. The control-board includes a CPU for processing a signal, a power supply unit for biasing the sensor and Bluetooth-chipset for transmission of signals to external PC. All signals from gas-sensors are converted into digital signals simultaneously in the control-board. These digital signals are stored in external PC via Bluetooth wireless communication. The experiment is performed by using protective equipment worn on manikin. The detector is mounted inside protective equipment which is capable of providing a real-time monitoring inward leakage MeS vapor. Developed detector is demonstrated the feasibility as real-time detector for MIST.

Hemeroby Mapping and its Application in Open Space Planning -The Case of Daegu Metropolitan City- (Hemeroby 도면작성과 녹지계획에서의 활용 -대구시를 사례로-)

  • 나정화
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.2
    • /
    • pp.32-41
    • /
    • 2001
  • The purpose of this study is to assess naturalness of each and use type for Daegu and provide the basic data for urban green space planning. The results are as follows: 1) As a result of periodic analysis, It is known that in the 1400´s that the rate of a-/oligo-/meso-hemeroby was over 90% of that area, in which naturalness was very high. By the 2020´s, the population will increase to about 3,500,000 and the occupation rae of meat-and poly-hemeroby, where naturalness is very low, is expected to increase rapidly. 2) The recent land uses of Daegu are divided ito 17 types. In the survey of a occupation rate of each land use type, a forest are occupies 48.8% of the entire area. The military installation zone is lowest with 0.07%. 3) Investigation of a dominant hemeroby grade in each land use type showed that the urban complex area in characterized by meta-hemeroby : and the space for pavement and building construction where naturalness is lowest. On the other hand, oligo-hemeroby that is worth being preserved was surveyed to be dominant in woodlands and natural forests. 4) In the analysis of hemeroby mapping in the process of a green space planning, it is clear that hemeroby will be used a s a tool that assesses the suitability for recreation activity of each sample case. For example, it enables a poly-hemeroby region to be utilized as a near-natural recreation area including $\beta$-and $\alpha$-euhemeroby region in Daegu. Besides, hemeroby can provide basic data to make a value judgement of each sample case with a view to preservation of nature.

  • PDF

"Legal Study on Boundary between Airspace and Outer Space" (영공(領空)과 우주공간(宇宙空間)의 한계(限界)에 관한 법적(法的) 고찰(考察))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.2
    • /
    • pp.31-67
    • /
    • 1990
  • One of the first issues which arose in the evolution of air law was the determination of the vertical limits of airspace over private property. In 1959 the UN in its Ad Hoc Committee on the Peaceful Uses of Outer Space, started to give attention to the question of the meaning of the term "outer space". Discussions in the United Nations regarding the delimitation issue were often divided between those in favour of a functional approach ("functionalists"), and those seeking the delineation of a boundary ("spatialists"). The functionalists, backed initially by both major space powers, which viewed any boundary as possibly restricting their access to space(Whether for peaceful or military purposes), won the first rounds, starting with the 1959 Report of the Ad Hoc Committee on the Peaceful Uses of Outer Space which did not consider that the topic called for priority consideration. In 1966, however, the spatialists, were able to place the issue on the agenda of the Outer Sapce Committee pursuant to Resolution 2222 (xxx1). However, the spatialists were not able to present a common position since there existed a variety of propositions for delineation of a boundary. Over the years, the funtionalists have seemed to be losing ground. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It is therefore to be welcomed that there is clear evidence of a growing recognition of the defect inherent to such an approach and that a spatial approach to the problem is gaining support both by a growing number of States as well as by publicists. The search for a solution of the problem of demarcating the two different legal regimes governing the space above the Earth has undoubtedly been facilitated, and a number of countries, among them Argentina, Belgium, France, Italy and Mexico have already advocated the acceptance of the lower boundary of outer space at a height of 100km. The adoption of the principle of sovereignty at that height does not mean that States would not be allowed to take protective measures against space activities above that height which constitute a threat to their security. A parallel can be drawn with the defence of the State's security on the high seas. Measures taken by States in their own protection on the high seas outside the territorial waters-provided that they are proportionate to the danger-are not considered to infringe the principle of international law. The most important issue in this context relates to the problem of a right of passage for space craft through foreign air space in order to reach outer space. In the reports to former ILA Conferences an explanation was given of the reasons why no customary rule of freedom of passage for aircraft through foreign territorial air space could as yet be said to exist. It was suggested, however, that though the essential elements for the creation of a rule of customary international law allowing such passage were still lacking, developments apperaed to point to a steady growth of a feeling of necessity for such a rule. A definite treaty solution of the demarcation problem would require further study which should be carried out by the UN Outer Space Committee in close co-operation with other interested international organizations, including ICAO. If a limit between air space and outer space were established, air space would automatically come under the regime of the Chicago Convention alone. The use of the word "recognize" in Art. I of chicago convention is an acknowledgement of sovereignty over airspace existing as a general principle of law, the binding force of which exists independently of the Convention. Further it is important to note that the Aricle recognizes this sovereignty, as existing for every state, holding it immaterial whether the state is or is not a contracting state. The functional criteria having been created by reference to either the nature of activity or the nature of the space object, the next hurdle would be to provide methods of verification. With regard to the question of international verification the establishment of an International Satelite Monitoring Agency is required. The path towards the successful delimitation of outer space from territorial space is doubtless narrow and stony but the establishment of a precise legal framework, consonant with the basic principles of international law, for the future activities of states in outer space will, it is still believed, remove a source of potentially dangerous conflicts between states, and furthermore afford some safeguard of the rights and interests of non-space powers which otherwise are likely to be eroded by incipient customs based on at present almost complete freedom of action of the space powers.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Suggestion for the Enhancement of Military Supplies via Segregation of Defense Quality Management System (국방 분야 품질경영시스템 세분화를 통한 군수품 품질향상 방안)

  • Ju, Jin-Chun;Kim, Sung-kon;Lee, Jong-chan;Ahn, Nam-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.251-261
    • /
    • 2016
  • Recently, many weapon related quality issues have arisen in the armed forces, such as failures of K-21 Infantry Fighting Vehicles, K-9 self-propelled mounts, and grenade explosion during boot training. Since all of the issues are repetitive phenomena, we examined the defense quality management system and identified the possible solutions for it. Since the government quality assurance agency performs their quality assurance activity using the system evaluation technique, we first reviewed the regulations related to the defense quality management system. Then, we benchmarked some other advanced quality management systems. We suggested two types of defense quality management system, one for small (in terms of the amount of the contract) competitive contracts and the other for large private contracts. For the first one, we adopted the framework of MIL-I-45208 (Inspection System Requirement), while for the second one, we adopted the framework of NATO AQAP 2310 (Quality Management System Requirements for Aviation, Space and Defense Suppliers).

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.