SOUTH KOREA ON THE PATH BECOMING AN AI POWERHOUSE
A strong and clear announcement regarding artificial intelligence (AI) was made by president Moon Jae-in during the DEVIEW 2019 Conference held at COEX Convention Centre (Seoul). By proposing a new ‘artificial intelligence national strategy’ this year, the president’s government is striving to take lead in the global AI sector. In addition, as a response to the fourth industrial revolution, Moon’s administration has already assigned 1.7 trillion won (US$1.4 billion) for the coming year’s data, network, and AI sectors. This ambitious investment is clearly the president’s efforts to make South Korea the powerhouse of AI.
SECURITY MARKET IN SOUTH KOREA
THE CONVERGENCE OF PHYSICAL AND CYBER SECURITY
The demand for security convergence is on the rise as 4th Industrial Revolution factors such as Smart Factories, Smart Cities, and 5G commercialization urges communities to form a more connected society. This concept of a more connected society also applies to physical and cyber security, which makes the boundary between those two even harder to define. The South Korean government is planning to create the world’s first ‘5G Plus Strategy’, which introduces and develops the ten essential strategies as well as the demonstration of the five main services of the 5G technology. This shows the government’s strong will in obtaining global competitiveness through this advanced technology.
The development of AI, Deep-learning technology, Big Data, IoT, and ICT all contribute to the convergence of physical and cyber security, where AI and Intelligent surveillance are the main sectors. Intelligent surveillance systems made its appearance in 2010, using movement and rule-set based pattern analysis. However, the system’s reliability was often very low with false positives. The video analysis error rate reached up to 28.2%, in which the system was incapable of adapting to various environmental changes. Despite its shortcomings, the system is now improving rapidly as deep-learning technologies continue to evolve. A good example of this is the face recognition system, which is now almost as accurate as the human eye, at the accuracy rate of 95%.
However, as the hyperconnected society draws near, their defence system against cyber attacks is also being enhanced. Starting off with the commercialization of 5G technology, concrete actions are being taken in order to form a new security infrastructure. Oh Yong-soo, Director of Cyber Security Policy Bureau, at the Ministry of Science and ICT, points out that “Cyber attacks are threatening the real world, in which information, communication, and network-based attacks are paralyzing systems, extorting personal information, and reaching the stage where even wrecking the economy is possible”. Furthermore, cyber security threats are now being expanded into a new 5G technology-based industry, causing harm to one’s life and safety, as well as the economy at large.
Korea takes the lead in the world’s security convergence trend, enhancing the security of the converging industry
The Korean government had laid the groundwork for the converging industry’s security enhancement as well. Along with security guidelines developed for each field of the converging industries, a master plan for a continuous security enhancement, IoT, and converging industries was also carried out. Furthermore, a test-bed for IoT, IoT product security test and its certifications are also being provided. In particular, the government decided to provide development opportunities for the five main areas -①Smart Factory ②Autonomous Vehicle ③Smart City ④Digital Healthcare ⑤Immersive Content.
Smart City- Both ‘Hacking’ and ‘Security’ must be considered
A CCTV’s surveillance has become a very important resource in the 4th Industrial Revolution, where a CCTV Integrated Control Centre can be referred to as the ‘library’ of all relevant data. Video data analysis and reprocessing can both be used to provide services to Smart Factories and Smart Cities. As many are already aware, CCTV surveillance data has become an indispensable factor for constructing Smart Cities. However, not can CCTVs solely be used for surveillance, but by applying ICT, the entire city can stay connected- traffic, facility information, security-disaster monitoring and prevention can all be managed by one integrated management system. However, this integrated management system is currently not yet completed as it is in the process of searching for the common boundary between the market’s demand and technical competence.
The concept of physical and cyber security intelligent surveillance
The concept of physical and cyber security intelligent surveillance are both similar in a way that they react to threats by using big data analysis in real-time. In physical security, it is defined as categorising atypical and typical data or collecting the status metadata and IoT data in order to generate an outcome through deep learning. Intelligent surveillance in cyber security refers to the collection of data from each information security system and perceiving threats, through correlation analysis of various events and improving its responsiveness.
An intelligent surveillance increases the control efficiency of both physical and cyber security, which assists the controller to fulfil his tasks. Although physical and cyber security are currently divided into two separate systems, experiencing both from the same platform might be possible in a hyper connected society.
‘Selective surveillance’- A downsized but advanced intelligent surveillance system
Amongst various attempts, the one which catches the eye is the ‘Selecting surveillance’- the subcategory of the intelligent surveillance system. Since the number of CCTVs being installed in local governments is on the rise and it is becoming more difficult for the controllers to control the countless number of events, it is crucial to introduce an AI based solution in order to reduce the loss of life and property as well as to provide a more reliable security service.
In a Smart City, its ICT based network is formed throughout the entire area. To construct the city’s safety net, the effective control and quick response between all CCTVs and their smartification are crucial. As a result, the country’s CCTV Integrated Control Centre is becoming a place for AI based ‘Selective surveillance’, in which the integration of AI face recognition in surveillance is found.
The video surveillance sector, which is the core of the 4th Industrial Revolution, aims to provide intelligent video security sensor service by merging with biometric identity solutions. The service plans to target single person households and the aging population, substantialising a welfare centred safe and secure society, with crime and disaster prevention and swift responsiveness. Furthermore, the unification of smart homes, building management and, financial services may result in a new profitable industry. Depending on the importance of video surveillance systems, video security and cyber security may also be integrated.
A GLIMPSE INTO THE 2020 KOREAN SECURITY MARKET
According to the 2019/2020 Security Market Analysis by BOANNEWS and SECURITYWORLD, the Korean security industry’s market growth in the year 2020 looks positive.
The 2019 ASEAN-Republic of KOREA Commemorative Summit, which took place last month, has elevated our expectations for expanding our business into the ASEAN market. Next year looks much more vigorous, in which the converged physical and cyber security takes the lead in developing a new field. This will be supported by the advancement of 4th Industrial Revolution technologies such as AI, Deep learning, Big Data, IoT, and ICT.
2020 Video Surveillance Market
Despite the threats from China, this year’s establishment of CCTV Integrated Control Centre and the 5 connected services of the integrated Smart City platform, as well as the development of 5G automatic driving, and all other surveillance system and applications of data, will play a huge role in contributing to a more energetic 2020.
2020 Biometrics Market
In 2019, facial recognition technology was applied to various areas and its development was brought into the spotlight. On the other hand, fingerprint and iris recognition systems made continuous attempts in order to survive in the security market, where market growth and overseas expansion was the target for many. The biometrics market looked positive in the year 2019 and will remain so in 2020 as well.
2020 Access Control Market
Despite the withering the economy, Korean access market in 2019 was able to obtain various fingerprint and iris recognition competence as well as new integrated security solutions. Therefore, the access control market, along with the biometrics identity solutions are expected to gain more vitality in the year 2020.
2020 Integrated Security Market
The main headline of this year’s integrated security service market is without doubt Smart Cities and the utilization of 5G technology. On April 4th, South Korea’s three main mobile carriers (SK Telecom, KT, LG U+) released 5G smart phones, proclaiming the official start of 5G technology services.
2020 will indeed be a hectic year for the integrated platform of Smart Cities, the five interlocked services responsible for the establishment of the social safety net (① 112 Police- Emergency video surveillance support ②112 Emergency dispatch support ③119 Emergency dispatch support ④ Disaster safety support ⑤Social minorities), and the integrated security service market. The service provided will be a much more diversified one with numerous exploitations and support.
2020 Information Security Market
The Korean Information Security Market in the year 2020 looks positive in general. The whole world is showing great interest for information security, where consolidating laws related to information security and its organizations, will affect the industry’s development immensely. In addition, information security was announced as one of the government’s Top 10 targets regarding 5G Technology and the market is looking forward to its developments in 2020.
TEN IT STRATEGIES OF THE YEAR 2020
According to Brian Burke, Research VP at Gartner, the keyword for 2020 Technology Trend is ‘People-centric’. Since it was always our role to keep up with technology, humans now becoming the centre of technology strategy is indeed a huge turning point in its advancement, where research on technology’s impact on the society will be the key issue.
What would happen if machine learning, packaged software, and automation tools were to be united? According to Gartner, ‘Hyperautomation is the answer. This year, Robotic Process Automation (RPA) was the most discussed topic. Although RPA is recognized as the root of hyperautomation trend, this does not necessarily mean that hyperautomation is merely an advancement of RPA.
The term ‘Multiexperience’ became widely known through numerous interactive platforms, in which Alexa, Siri, Cortana, and Google Assistant are examples of such. Virtual Reality (VR), Augmented Reality (AR), Mixed Reality (MR) is also considered as multiexperiences, where communication with the digital world takes place.
Burke explains that the advancement of technology centred on such users does not mean that humans have to be aware of the civilization of technology, but the exact opposite. In other words, changing the aim and purpose is now not our responsibility but the machine’s’.
3. The Popularization of Professionalism
The kernel of the upcoming technology strategy is that it has to be simple and easy to use, where specific knowledge, skills, nor work abilities are necessary. Burke notes that an era where anyone can easily use machine learning and applications for increasing sales efficiency and in-depth market analysis is drawing near.
To support such status quo, the ‘no-code model’ is an appropriate example. The ‘no-code model’ is as written, a platform or a development methodology for creating application software through configuration and graphical user interfaces instead of computer programming. However, such development is not always a good sign. Gartner warns how Shadow IT now has more chances of expanding its territory as more become familiarized with IT technologies. Shadow IT is an information technology system used within organizations, where unapproved tools can be used without any restrictions. Freedom can be its advantage, but on the other hand, control and security within the organization becomes unstable and weak.
4. Human Augmentation
Human Augmentation tries to achieve human abilities with the help of medicine or technology. According to Burke, an era where planning and developing actual humans instead of ‘for’ them, is drawing near. Physical or surgical procedures, external tools, and implants are all examples of human augmentation. Smart glasses, contact lenses, RFID implant for easier building access and POS, are all examples of human augmentation. Moreover, technologies such as CRISPR, which has the ability to operate some parts of the DNA along with cognitive augmentation, all belong to the human augmentation technology.
5. Transparency and Tracking possibility
Burke explains how people distrust the current technology and how this not only applies to specific users, but to the society in general. For example, if a bank notifies the customer that his requested loan has been denied, a detailed explanation about the denial is necessary. On the other hand, many would find it hard to accept, if such results were based on an AI algorithm.
Due to the advancement of technologies concerning mistrust (IoT, facial recognition, biased algorithm, fake news, and deepfake), transparency, tracking, and regaining trust is absolutely necessary.
6. Empowered Edge
Adding computing power to empowered edge tools will enable the organization to reach its full potential. Gartner explains how dealing with traffic and local computer processing might diminish latency and permit high autonomy for edge computers.
7. Distributed Cloud
‘The hybrid cloud service, which is a mixture of private and public cloud services, still remains as a difficult problem to solve. However, a part of it can be solved through distributed cloud services.’ – Brian Burke
Distributed cloud which Gartner defines, is distributing the public cloud service to various other cloud platforms (micro-clouds) and keeping the centralized cloud responsible for operation, governance, update, and service improvement. This concept of centralized cloud service being distributed is indeed a big change, where significant changes in the cloud computing history will take place. Around the year 2024, cloud service platforms will most likely be distributed ones, offering users more flexible services.
8. Autonomous things
Most people would think of cars when they hear the word ‘autonomous’. However, Gartner explains that it is not just merely about cars. Burke points out that autonomous cars, autonomous drones, autonomous robots, autonomous planes, are all autonomous things and that they have been invented and are being developed for the same cause.
Many would relate autonomous things to Internet of Things (AI), but the significant difference is that autonomous things are linked with Collective Intelligence. The ability of interacting, learning, and receiving data solely amongst each other without our support, is the biggest advantage of autonomous things. In other words, robots assembling equipments or algorithms analyzing customers’ data are now able to create new values.
9. Practical Blockchain
To be honest, many are sparing their words regarding Blockchain. At the beginning of the year, there were many predictions and expectations regarding Blockchain. However, there still has not been an extensive use of Blockchain this year. Although Blockchain still has chances to develop, Burke explains how Blockchain technology is currently insufficient for extensive use and that it must gain social Blockchain is not a ‘must’ for enterprises, but it is a technology worth considering.
10. Artificial Intelligence Security
Security is always about the attacker and defender both possessing armaments. Now it is more about how both sides have artificial intelligence in their hands and the future does not look bright. Gartner states that by the year 2020, 30% of all cyber attacks will be related to AI. Polluting the AI training data, stealing the AI model, and inserting hostile samples, are examples of such attacks.
1) The pollution of training data is deliberately training AI for particular results. According to Burke, Microsoft’s ChatBot ‘Tay’ is a good example, where Twitter has taught Tay to only say offensive racist comments.
2) The extortion of AI model is sending the same queries numerous times to the existing model in order to find out how the model arrives at its conclusion, instead of developing new AI models. Such an act can be dangerous if the AI algorithm has been successfully duplicated.
3) The insertion of hostile sample attack is the insertion of inaccurate or irrational samples, which disrupts the learning process. For example, if an inaccurate information such as ‘red light=pass’ is inserted into the algorithm of autonomous vehicles, deadly accidents are inevitable.
Burke is not only worried about the four points above, but the fact that there are countless more attacks on AI. The biggest concern is that we still do not know how to act against these attacks. ‘Many claim that their weapon has been fortified with the aid of AI, but this might not always be the case.’- Brian Burke.
SECON 2020 is the biggest professional B2B security event as well as a comprehensive security platform, which helps to expand your business through extensive network and robust meetings with distributors, SIs, installers, retailers and influencers playing at distribution and procurement market in Asia. Celebrating its 20th anniversary, SECON has grown to become the leading tradeshow for international companies to introduce their products to the Asian and Korean markets. With support from influential Korean security groups of the SECON organising committee, SECON is a renowned must-attend exhibition for the whole security, fire and safety sector ranging from manufacturers to end-users. For more information regarding the event, please visit www.seconexpo.com