In order to build a hyper-connected and super-intelligence-based environment, ROK Army is prioritizing the establishment of an intelligent command and control system that will lead the combat performance function by establishing an integrated database-oriented artificial intelligence-based environment and satellite-oriented multi-layer communication system.
Building an AI-based environment centered on an integrated database
To improve the Army's complex interlocking structure, the system-specific databases are standardized to integrate data from all systems into one database. In addition, a cloud is built to collect and store data produced by various C4I systems, information system and war game systems in a single integrated database to establish an artificial intelligence operating environment based on big data
The step of promoting artificial intelligence-based environment follows
- (Step 1) Prepare policies and system for establishing an artificial intelligence base environment by FY21
- (Step 2) Establish an artificial intelligence-based system across ROK Army through the establishment of cloud and intergrated DB in FY22~30
- (Step 3) Advancing artificial intelligence-based environment and artificial intelligence application system
Building Hyper-Connected and Hyper-Intelligent Networks
In order to establish a communication support system necessary for multi-area operations, the current ground-centered communication node system is developed into a multi-layer communication system in which satellite, aerial, and ground nodes are integrated.
In addition, portable communication device in the form of mobile communication that is easy to carry and operate is developed to establish a mobile-based mobile communication network that integrates radios and mobile devices.
-
The present (ground node center)
-
The future(Satellite·Aerial node center)
In addition, terminals such as phone, radio, satellite terminals, tactical multifunction terminals(TMFT), and battalion-level combat command systems(B2CS) used in the integrated network are developed in the form of hyper-connecting terminals to enable transmission and reception of mutual calls and data.
By developing an encryption solution that can integrate and operate commercial networks and tactical networks, ROK Army is promoting the establishment of an infrastructure that can utilize commercial networks such as 5G and disaster safety communication networks.
Establishment of intelligent command and control system to lead combat capability
The Army Command Control System(ACCS) is being established, consisting of a command decision system, system of each function, and a combat command system to practically command and control the highly deadly Army TIGER unit.
Future command facilities are ensured mobility through modularization, automation and lightweighting and will have protection, camouflage and noise-cancellation capabilities to improve viability and improve reliability through network connection and improving internal configuration and components(equipment materials).
An optimized command control organization and personnel are organized in accordance with the development of command control means and methods such as AI-based C4I system, activated command post, and integrated network.
Enhanced security for hyper-connected networks
In order to prepare security polices and systems for the introduction and acceptance of new technologies, security instruction and regulations for the use of advanced information and communication core technologies are revised, and various encryption equipment needs to be met to ensure hyper-connected network
Efforts will be made to develop a military-only security system with enhanced security. In order to provide various security system that can be used by level and grade of security requirements, a military-only security system will be developed and a defense security verification system that can apply private commercial encryption technologies such as quantum cryptography and blockchain to the military will be implemented.
Empowering Cyber Threat Response
Building a cyber operational command and control system that can automatically collect and analyze cyber threat information on combat field networks, defense networks and Internet networks to visualize cyber situation, share and spreading them in real-time and track and respond to cyber threats.
In addition, an artificial intelligence(AI)-based vaccine system will be established to detect unidentified intrusion that can be bypassed and avoided in real time. We are also striving to establish a 'Cyber intrusion detection and recovery system' that can stably use the system by self-diagnosing and recovering errors in case of cyber-attacks.
For the aspect of training human resources, the standard for professional human resources required for cyber operation are set. In addition, we will provide in-group education and external professional consignment education, and will promote the establishment of an LVC-based(1) cyber training center that can conduct cyber attack and defense training and post-analysis under a simulated environment similar to the actual C4I environment and the latest hacking techniques.
- LVC(Live Simulation), Hypothetical conspiracy(Virtual Simulation), Wargame simulation(Constructive Simulation)