Destroying the Ring-Fence: Cyber Stability in Wider International Security Calculus

Size: px
Start display at page:

Download "Destroying the Ring-Fence: Cyber Stability in Wider International Security Calculus"

Transcription

1 Destroying the Ring-Fence: Cyber Stability in Wider International Security Calculus Introduction When the ring-fence around your pasture gets broken, your cattle may wander outside, or predators may get in. Neither is a good thing. Imagine States as cattle: They roam around a well-defined pasture, called the international security system. Multiple instruments of international law -- bilateral agreements as well as multilateral norms, rules, principles and procedures to which states adhere form the ring-fence surrounding that pasture. Now, the ring-fence has been broken. The ram that tore it down is cyber technology. Two things are happening as a consequence: First, states wander outside. They begin exploring the world beyond the fence, in this case cyberspace. They find it confusing, even irritating. In the words of U.S. settler and pioneer Ebenezer Bryce: A hell of a place to lose a cow (Bryce was describing the canyon later named in his honor). Second, predators are getting in criminals and terrorists. A New Challenge to the International Security system Numerous states are pursuing military cyber-capabilities. In many instances, these are defensive; in others they may be offensive, but limited to supporting traditional military operations. Often, we do not know. The United Nations Institute for Disarmament Research, in its most recent Cyber Index, found on the basis of publicly available information that there were 114 national cyber security programs world-wide. According to this index, forty-seven states have cyber-security programs that give some role to the armed forces. Cyber capabilities are not limited to great military powers. This sets them apart from traditional military capabilities. They even transcend the established lines of state-centered warfare: A private actor be it a legitimate business, a 1

2 criminal, or a terrorist cannot usually obtain, train and use weapons of war. In the electronic world, private hackers developing malware are a fact of life; their services are easily for hire by anybody who pays. Stories of how criminals are using the internet for their purposes have become commonplace. It is no coincidence that the first international convention designed to address cyberspace is the 2001 Budapest Cybercrime Convention. The step from common crime to politically motivated acts, even terrorism, is not far. We know that Al Qaida is skillfully using the internet as a propaganda and recruitment tool. We cannot exclude that terrorist groups will try to go the next mile and use the net for cyber-terrorism Cyber stability is affecting international security calculus. An exclusive, all-out cyber-war has not happened, but as part of conflicts, hostile cyber action has been taken: 2007 against Estonia; 2008 against Georgia, 2010 against Iran, 2013 against South Korea, at other times when we did not even notice. In the context of the Syrian war, denial-of-service attacks have been reported against U.S. news outlets and financial institutions. Cyber action is not limited to cyber space. It can cross domains and create real damage in the physical world. The Stuxnet virus resulted in the destruction of centrifuges; one might also think of a virus disrupting a country s power supply, which would have tremendous physical consequences in any advanced industrial society. Cyber Capabilities and International Security Calculus Traditional political-military strategies predate the existence of a global information and communications network, used almost universally and upon which much of the world economy relies. Cyber capabilities do not fit into these strategies. However, it would be risky to ignore this new reality, along the lines of French Marshal Ferdinand Foch, who famously remarked in 1911: «Les avions sont des jouets intéressants, mais n ont aucune utilité militaire.» During the Cold War, the opposing parties built their defense on the idea that the best defense is to deter an enemy state from attacking. This is not an entirely new thought the Romans had the proverb Si vis pacem para 2

3 bellum, and the same idea is present also in earlier works, such as Plato's Nomoi. There is a corollary: In the event of a failure of deterrence, an adversary should be denied the success of his or her action. Deterrence and denial require that the consequences of any attack be clearly and credibly communicated to any potential adversary. This is next to impossible in cyberspace: Actors may not be known; they do not even have to be states. Perpetrators show great skill in hiding behind multiple screens. Uncertainty about the origin of hostile cyber-action is a characteristic of cyber-incidents. This makes it impossible to threaten negative consequences of such action, and to do so with any degree of credibility. Under such circumstances, deterrence does not work. Denial raising the cost of an attack so as to make a success worthless is difficult, if not impossible in a field where technology is rapidly advancing. With processing speeds doubling roughly every eighteen months, today s impenetrable protection quickly becomes an insufficient shield. If political-military strategies fail to account for cyber capabilities, so does traditional arms control: The 1968 Nuclear Non-Proliferation Treaty differentiates between five nuclear powers and those signatory states that do not have nuclear weapons. By comparison, it would be foolish to negotiate an arms control or even disarmament treaty for cyber-weapons, given the potentially unlimited number of actors that can procure computer malware. The difficulties of defining a Cyber Weapon in the first place need no mention. Cyber Conflict Scenarios What are the scenarios for cyber conflict? I would like to sketch three. Each of them leads to a distinct set of questions and conclusions. The scenarios are (1) all-out cyber-war, (2) the limited use of cyber capabilities as part of a larger warfighting effort, and (3) an international military crisis developing from a cyber-action. 3

4 1. All-out cyber war. The idea may hold some attraction that a cyber-attack could cripple a country s military force, economy and communication, defeating it without a shot. Could this be a humane war? Even if this was the case and this is up for debate all-out cyber war seems unlikely at present. Andrew Lewis, who studies cyber issues for the Center for Strategic and International Studies, has argued convincingly: "A full-blown, no-holds-barred cyber-attack against critical infrastructure and networks might be able to reproduce the damage wrought by Hurricane Katrina, with crucial services knocked out and regional economic activity severely curtailed. While Katrina brought immense suffering and hardship, it did not degrade U.S. military capabilities and would not have led to a U.S. defeat. Multiple, simultaneous Katrinas would still not guarantee victory and could risk being seen as an existential threat that would justify a harsh kinetic response." (James Andrew Lewis, Cyber Attacks, Real or Imagined, and Cyber War, Center for Strategic and International Studies, 2011). The term cyber war is inadequate. It conjures a misleading picture of the threat situation in cyberspace, and of the possible countermeasures. Cyber war implies an extensive, existential threat to a state solely through targeted attacks by other states on computer systems and IT networks, or through other actions in cyberspace. For the foreseeable future, cyberspace will not be the exclusive environment of any conflict that might be qualified as war(-fare). Nevertheless, it would be unwise to exclude the possibility that someone might attempt all-out cyber war. Anticipating such an eventuality, important questions arise: Is a state authorized, under international law, to respond to hostile cyber action by the use of force? Is there a threshold? The United Nations Charter says, in Article 51, that states have the right to self-defense in the event of an armed attack. But is hostile cyber-action an armed attack? In Germany s opinion, this depends on its scale and effects: If a state finds itself the target of a cyber-operation with effects comparable to an armed attack, it may exercise its right of self-defense. 4

5 2. Limited use of cyber capabilities as part of a larger warfighting effort A more likely scenario seems to be the limited use of cyber capabilities as part of a larger warfighting effort. Cyber-attacks in combination with conventional means of conflict can pose a major threat, for which we must prepare. All countries today rely on modern information and communication technology (ICT), albeit to a varying extent. Even where the military duplicates civilian infrastructure, e.g. by using its own communications network without link to the internet, ICT plays a role: In the internet of things, Web 3.0, machines rely on ICT to work. And even if a military should forego such machines, proceeding, e.g. without satellite communication and GPS, the underlying civilian economy can no longer be expected to work without using modern ICT. This is why cyber action must be expected to form part of any future warfighting effort. As part of a larger war effort, the effect of cyber capabilities on international security calculus is limited. Nevertheless, this realization leads to questions which beg discussion: Are there cyber acts that would be unacceptable under international law? I am thinking of action that could have important negative consequences on the civilian population, such as attacks on certain critical infrastructure, nuclear power plants or hospitals. They might well be inadmissible under the general rules of international law aimed at protecting civilians from the indiscriminate effects of weapons and combatants from unnecessary suffering. The two scenarios presented so far illustrate that we need to engage in an international discussion on the norms and principles of responsible state behavior in cyber space, including on the conduct of cyber warfare. Agreed international rules, principles and norms will help enhance transparency and predictability of state behavior in cyberspace. The Tallinn Manual, presented 15 March 2013, was a valuable step in this direction. However, the Tallinn Manual is neither universally accepted, nor is it an official document: It is an expression of opinions by a group of independent experts, acting solely in their personal capacity. To establish a universal understanding of the norms and principles of responsible state behavior in cyber space, we need to turn to the United 5

6 Nations. The last group of Group of Governmental Experts on Developments in the Field of Information and Telecommunications (GGE) has done important work in this direction. Its June 2013 report to the UN Secretary General has made clear that international law, and in particular the UN Charter, is applicable to cyber space and is essential to maintaining peace and stability and promoting an open, secure, peaceful and accessible ICT environment. At the same time, the GGE found that state sovereignty and international norms and principles that flow from sovereignty apply to State conduct of ICT-related activities, and to their jurisdiction over ICT infrastructure within their territory. It was a good decision by the General Assembly, in its resolution A/C.1/68/L.37 of 27 December 2013, to mandate a new GGE to study, with a view to promoting common understandings, existing and potential threats in the ICT sphere and possible cooperative measures to address them, including norms, rules or principles of responsible behavior of states and how international law applies to the use of ICT by states. Any discussion on the norms and principles of responsible state behavior in cyber space must be based on the understanding that international law, and in particular the UN Charter, is applicable to the ICT environment. An important consequence that follows from the premise that existing law represents the appropriate framework for activity in cyberspace is that individuals enjoy the same universal human rights offline as online. This includes the freedom of expression -- including the freedom to seek and impart information --, the freedom of assembly and association, and the right to privacy, as the UN General Assembly unanimously confirmed in December Military crisis developing from cyber incident. The dependence of the modern world on ICT carries the danger that cyber incidents may escalate into real-life conflict. Consider the following scenario: A country is in a tense political situation. Relations with a neighboring state are strained. All of a sudden, the main telephone and internet provider becomes victim to a software bug. Nobody can make phone calls, there are no s. With electronic communications down, the banking system collapses. News web-sites cannot be reached, there are no mass media. Government, economy and also security services are paralyzed. The situation deteriorates: Trains run 6

7 no longer, airplanes cannot fly, the power grid collapses, and sanitation breaks down. Hospitals have no water or lights, food distribution collapses, security services are incommunicado All because of a little, hard-to-detect software bug. Who planted this bug? For what reason? Suspicions run high that the less friendly neighbor perpetrated a cyber-attack. The danger of escalation is evident. The realization that cyber action may easily escalate into a military crisis illustrates the need for confidence and security-building measures. Regional organizations may play a special role in this context: They bring together those states that are most likely to have difficult relations. It is far more likely that two neighbors share a dispute over a border area, the delineation of a sea border, or the use of natural resources than that two faraway countries are in conflict. Regional organizations provide a forum for such neighbors to talk, and, ideally, to resolve their grievances. This is especially valuable regarding cyber action during crises or conflict. Since the perpetrators of hostile cyber action are difficult to identify, a state that is victim to such action has to guess who is responsible. Chances are that suspicions will fall on a neighbor with whom relations are strained. If, on the other hand, relations are relaxed and mechanisms exist to resolve any incipient disputes, the danger of escalating tensions over a hostile cyber act is much reduced. The OSCE has recently made important progress on this front. In December 2013, the OSCE Council of Ministers has approved a first set of confidencebuilding measures. Participating States have agreed, inter alia, on the following voluntary steps: Providing their national views on various aspects of national and transnational threats to and in the use of Information and Communication Technologies; Facilitating co-operation among the competent national bodies and exchanging information; Holding consultations in order to reduce the risks of misperception, and of possible emergence of political or military tension or conflict that may stem from the use of Information and Communication Technologies; 7

8 Sharing information on measures that they have taken to ensure an open, interoperable, secure, and reliable Internet, and on their national organization; strategies; policies and programs; Using the OSCE as a platform for dialogue, exchange of best practices, awareness-raising and information on capacity-building; Nominating contact points; and Providing a list of relevant national terminology. OSCE Participating States have agreed that they will, at the level of designated national experts, meet at least three times each year, to discuss information exchanged and explore appropriate development of CBMs. The OSCE may serve as a model for other regional organizations. Germany is already engaging with other regional organizations, such as UNASUR and the ARF, supporting their work on enhancing cyber stability. We are looking forward to deepening and widening this engagement. This is also in response to the UN GGE recommendation, in its June 2013 report, to support regional, multilateral and international capacity building efforts to secure ICT use and ICT infrastructures. Conclusion Cyber capabilities have broken the ring-fence of international security. It needs to be mended. While all-out cyber-war seems unlikely at present, the limited use of cyber capabilities as part of a larger warfighting effort is a reality. The United Nations is the right forum to foster a discussion on the norms and principles of responsible state behavior in cyber space, including the use of cyber means during conflict. Agreed international rules, principles and norms will help enhance transparency and predictability. To account for the danger of military crisis developing from cyber incidents, confidence and security building measures are important. Regional organizations, such as the OSCE, can and should play an important role in this regard. 8

9 In the words of J.R.R. Tolkien: The world is full enough of hurts and mischances without wars to multiply them. When Tolkien wrote these words, he was no thinking of a ring-fence, and certainly not of cyber conflict. But although the writer was thinking of an entirely different ring, his words hold true. 9

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA APPROVED by the order No. V-252 of the Minister of National Defence of the Republic of Lithuania, 17 March 2016 THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA 2 TABLE OF CONTENTS I CHAPTER. General

More information

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018 NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne

More information

9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967

9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967 DOCTRINES AND STRATEGIES OF THE ALLIANCE 79 9. Guidance to the NATO Military Authorities from the Defence Planning Committee 1967 GUIDANCE TO THE NATO MILITARY AUTHORITIES In the preparation of force proposals

More information

Annex 1. Guidelines for international arms transfers in the context of General Assembly resolution 46/36 H of 6 December 1991

Annex 1. Guidelines for international arms transfers in the context of General Assembly resolution 46/36 H of 6 December 1991 I. Introduction Annex 1 Guidelines for international arms transfers in the context of General Assembly resolution 46/36 H of 6 December 1991 1. Arms transfers are a deeply entrenched phenomenon of contemporary

More information

SUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES. for FY 2011 and beyond

SUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES. for FY 2011 and beyond (Provisional Translation) SUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES for FY 2011 and beyond Approved by the Security Council and the Cabinet on December 17, 2010 I. NDPG s Objective II. Basic Principles

More information

ALLIANCE MARITIME STRATEGY

ALLIANCE MARITIME STRATEGY ALLIANCE MARITIME STRATEGY I. INTRODUCTION 1. The evolving international situation of the 21 st century heralds new levels of interdependence between states, international organisations and non-governmental

More information

Bridging the Security Divide

Bridging the Security Divide Bridging the Security Divide Jody R. Westby, Esq. World Federation of Scientists 43 nd Session August 21, 2010 The Security Divide 1.97 billion people Internet users and 233 countries & territories Systems

More information

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

The State Defence Concept Executive Summary

The State Defence Concept Executive Summary The State Defence Concept Executive Summary 1 The State Defence Concept outlines the fundamental strategic principles of national defence, mid-term and long-term priorities and measures both in peacetime

More information

CONSOLIDATED NATIONAL NUCLEAR SECURITY REPORT

CONSOLIDATED NATIONAL NUCLEAR SECURITY REPORT CONSOLIDATED NATIONAL NUCLEAR SECURITY REPORT This reporting guide is meant to assist states, as necessary, with reporting on their nuclear security activities and meeting the reporting requirements of

More information

MINISTRY OF DEFENCE REPUBLIC OF LATVIA. The State Defence Concept

MINISTRY OF DEFENCE REPUBLIC OF LATVIA. The State Defence Concept MINISTRY OF DEFENCE REPUBLIC OF LATVIA The State Defence Concept Confirmed by the Cabinet of Ministers of the Republic of Latvia on 20 April 2012 Approved by the Saeima (Parliament) on 10 May 2012 The

More information

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional

More information

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive

More information

NATO UNCLASSIFIED. 6 January 2016 MC 0472/1 (Final)

NATO UNCLASSIFIED. 6 January 2016 MC 0472/1 (Final) 6 January 2016 MC 0472/1 (Final) SEE DISTRIBUTION FINAL DECISION ON MC 0472/1 MC CONCEPT FOR COUNTER-TERRORISM 1. On 21 Dec 15, under the silence procedure, the Council approved the new Military Concept

More information

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing

More information

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee Cyber Strategy & Policy: International Law Dimensions Written Testimony Before the Senate Armed Services Committee Matthew C. Waxman Liviu Librescu Professor of Law, Columbia Law School Co-Chair, Columbia

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005-

NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005- (Provisional Translation) NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005- Approved by the Security Council and the Cabinet on December 10, 2004 I. Purpose II. Security Environment Surrounding Japan III.

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

The New Roles of the Armed Forces, and Its Desirable Disposition

The New Roles of the Armed Forces, and Its Desirable Disposition The New Roles of the Armed Forces, and Its Desirable Disposition MG YOSHIKAWA Hirotoshi Vice President National Institute for Defense Studies Japan The New Roles of the Armed Forces, and Its Desirable

More information

2. Deterring the use of nuclear. 4. Maintaining information superiority. 5. Anticipating intelligent systems

2. Deterring the use of nuclear. 4. Maintaining information superiority. 5. Anticipating intelligent systems SEVEN DEFENSE PRIORITIES FOR THE NEW ADMINISTRATION Report of the Defense Science Board DECEMBER 2016 This report summarizes the main findings and recommendations of reports published by the Defense Science

More information

Global Vigilance, Global Reach, Global Power for America

Global Vigilance, Global Reach, Global Power for America Global Vigilance, Global Reach, Global Power for America The World s Greatest Air Force Powered by Airmen, Fueled by Innovation Gen Mark A. Welsh III, USAF The Air Force has been certainly among the most

More information

Chapter 4 The Iranian Threat

Chapter 4 The Iranian Threat Chapter 4 The Iranian Threat From supporting terrorism and the Assad regime in Syria to its pursuit of nuclear arms, Iran poses the greatest threat to American interests in the Middle East. Through a policy

More information

A/55/116. General Assembly. United Nations. General and complete disarmament: Missiles. Contents. Report of the Secretary-General

A/55/116. General Assembly. United Nations. General and complete disarmament: Missiles. Contents. Report of the Secretary-General United Nations General Assembly Distr.: General 6 July 2000 Original: English A/55/116 Fifty-fifth session Item 74 (h) of the preliminary list* General and complete disarmament: Missiles Report of the

More information

The Role of Exercises in Training the Nation's Cyber First-Responders

The Role of Exercises in Training the Nation's Cyber First-Responders Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of Exercises in Training the Nation's

More information

It is now commonplace to hear or read about the urgent need for fresh thinking

It is now commonplace to hear or read about the urgent need for fresh thinking Deterrence in Professional Military Education Paul I. Bernstein * It is now commonplace to hear or read about the urgent need for fresh thinking on deterrence and for rebuilding the intellectual and analytic

More information

I. Description of Operations Financed:

I. Description of Operations Financed: I. Description of Operations Financed: Coalition Support Funds (CSF): CSF reimburses key cooperating nations for support to U.S. military operations and procurement and provision of specialized training,

More information

US-Russian Nuclear Disarmament: Current Record and Possible Further Steps 1. Russian Deputy Foreign Minister Sergei Ryabkov

US-Russian Nuclear Disarmament: Current Record and Possible Further Steps 1. Russian Deputy Foreign Minister Sergei Ryabkov US-Russian Nuclear Disarmament: Current Record and Possible Further Steps 1 Russian Deputy Foreign Minister Sergei Ryabkov Nuclear disarmament is getting higher and higher on international agenda. The

More information

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy.

In order to cross the walls of the city, not a single act of violence was needed. All that was needed was the good faith and naivety of the enemy. Speech by the Chief of Defence of the Armed Forces of the Netherlands, Admiral Rob Bauer, at the International Operational Cyber Symposium on October 26 th 2017, Amsterdam Note: check against delivery!

More information

Arms Control and Disarmament Policies: Political Debates in Switzerland

Arms Control and Disarmament Policies: Political Debates in Switzerland Swiss Day, UN Fellowship Programme Berne, August 30, 2013 Arms Control and Disarmament Policies: Political Debates in Switzerland Dr. Dr. h. c. Barbara Haering President GICHD Council of Foundation The

More information

Headline Goal approved by General Affairs and External Relations Council on 17 May 2004 endorsed by the European Council of 17 and 18 June 2004

Headline Goal approved by General Affairs and External Relations Council on 17 May 2004 endorsed by the European Council of 17 and 18 June 2004 Headline Goal 2010 approved by General Affairs and External Relations Council on 17 May 2004 endorsed by the European Council of 17 and 18 June 2004 A. The 2010 Headline Goal 1. The European Union is a

More information

UNIDIR RESOURCES IDEAS FOR PEACE AND SECURITY. Practical Steps towards Transparency of Nuclear Arsenals January Introduction

UNIDIR RESOURCES IDEAS FOR PEACE AND SECURITY. Practical Steps towards Transparency of Nuclear Arsenals January Introduction IDEAS FOR PEACE AND SECURITY UNIDIR RESOURCES Practical Steps towards Transparency of Nuclear Arsenals January 2012 Pavel Podvig WMD Programme Lead, UNIDIR Introduction Nuclear disarmament is one the key

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

Why Japan Should Support No First Use

Why Japan Should Support No First Use Why Japan Should Support No First Use Last year, the New York Times and the Washington Post reported that President Obama was considering ruling out the first-use of nuclear weapons, as one of several

More information

2017 Washington Model Organization of American States General Assembly. Crisis Scenario Resolution. General Committee

2017 Washington Model Organization of American States General Assembly. Crisis Scenario Resolution. General Committee 2017 Washington Model Organization of American States General Assembly Crisis Scenario Resolution General Committee CREATING A TEAM OF IAEA EXPERT INVESTIGATORS TO REVIEW THE USE OF NUCLEAR TECHNOLOGIES

More information

DPKO Senior Leadership Induction Programme (SLIP) January 2009, United Nations Headquarters, New York

DPKO Senior Leadership Induction Programme (SLIP) January 2009, United Nations Headquarters, New York DPKO Senior Leadership Induction Programme (SLIP) 19-23 January 2009, United Nations Headquarters, New York Presentation by Ms. Patricia O Brien Under-Secretary-General for Legal Affairs, The Legal Counsel

More information

Reconsidering Deterrence in Cyberspace October 2013 James A. Lewis, Center for Strategic and International Studies 1

Reconsidering Deterrence in Cyberspace October 2013 James A. Lewis, Center for Strategic and International Studies 1 Reconsidering Deterrence in Cyberspace October 2013 James A. Lewis, Center for Strategic and International Studies 1 The paradox for cyber deterrence is that while the U.S. has the most advanced cyber

More information

COE-DAT Course Catalog. Introduction

COE-DAT Course Catalog. Introduction Introduction The Centre of Excellence Defence Against Terrorism (COE-DAT) is pleased to present the Course Catalog, containing a complete listing of courses and educational programs conducted by COE-DAT.

More information

Methodology The assessment portion of the Index of U.S.

Methodology The assessment portion of the Index of U.S. Methodology The assessment portion of the Index of U.S. Military Strength is composed of three major sections that address America s military power, the operating environments within or through which it

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

Overview of Safeguards, Security, and Treaty Verification

Overview of Safeguards, Security, and Treaty Verification Photos placed in horizontal position with even amount of white space between photos and header Overview of Safeguards, Security, and Treaty Verification Matthew R. Sternat, Ph.D. Sandia National Laboratories

More information

Army Operating Concept

Army Operating Concept Army Operating Concept American Military Power is Joint Power The Army both depends on and supports air and naval forces across the land, air, maritime, space and cyberspace domains. As of: 14 NOV 2014

More information

The National Military Strategy of the United States of America

The National Military Strategy of the United States of America The National Military Strategy of the United States of America A Strategy for Today; A Vision for Tomorrow 2004 ii The National Military Strategy of the United States of America A Strategy for Today; A

More information

How Everything Became War and the Military Became Everything: Tales from the Pentagon Rosa Brooks New York: Simon & Schuster, 2016, 448 pp.

How Everything Became War and the Military Became Everything: Tales from the Pentagon Rosa Brooks New York: Simon & Schuster, 2016, 448 pp. How Everything Became War and the Military Became Everything: Tales from the Pentagon Rosa Brooks New York: Simon & Schuster, 2016, 448 pp. On October 7, 2001, the United States launched Operation Enduring

More information

Section 6. South Asia

Section 6. South Asia Section 6. South Asia 1. India 1. General Situation India is surrounded by many countries and has long coastlines totaling 7,600km. The country has the world s second largest population of more than one

More information

The Nuclear Powers and Disarmament Prospects and Possibilities 1. William F. Burns

The Nuclear Powers and Disarmament Prospects and Possibilities 1. William F. Burns Nuclear Disarmament, Non-Proliferation and Development Pontifical Academy of Sciences, Scripta Varia 115, Vatican City 2010 www.pas.va/content/dam/accademia/pdf/sv115/sv115-burns.pdf The Nuclear Powers

More information

International Nonproliferation Regimes after the Cold War

International Nonproliferation Regimes after the Cold War The Sixth Beijing ISODARCO Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China International Nonproliferation Regimes after the Cold War China Institute for International Strategic Studies

More information

1

1 Understanding Iran s Nuclear Issue Why has the Security Council ordered Iran to stop enrichment? Because the technology used to enrich uranium to the level needed for nuclear power can also be used to

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

UNCLASSIFIED. Unclassified

UNCLASSIFIED. Unclassified Clinton Administration 1993 - National security space activities shall contribute to US national security by: - supporting right of self-defense of US, allies and friends - deterring, warning, and defending

More information

Applying Jus Ad Bellum in Cyberspace Barnett 0. Applying Jus Ad Bellum in Cyberspace: The Use of Force, Armed Attacks, and the Right of Self-Defence

Applying Jus Ad Bellum in Cyberspace Barnett 0. Applying Jus Ad Bellum in Cyberspace: The Use of Force, Armed Attacks, and the Right of Self-Defence Applying Jus Ad Bellum in Cyberspace Barnett 0 Applying Jus Ad Bellum in Cyberspace: The Use of Force, Armed Attacks, and the Right of Self-Defence Sophie Barnett Paper Presented at the University of Toronto

More information

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in 1 This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in the JCIDS process is CJCSI 3010.02, entitled Joint Operations

More information

Big data in Healthcare what role for the EU? Learnings and recommendations from the European Health Parliament

Big data in Healthcare what role for the EU? Learnings and recommendations from the European Health Parliament Big data in Healthcare what role for the EU? Learnings and recommendations from the European Health Parliament Today the European Union (EU) is faced with several changes that may affect the sustainability

More information

ARMS CONTROL, EXPORT REGIMES, AND MULTILATERAL COOPERATION

ARMS CONTROL, EXPORT REGIMES, AND MULTILATERAL COOPERATION Chapter Twelve ARMS CONTROL, EXPORT REGIMES, AND MULTILATERAL COOPERATION Lynn E. Davis In the past, arms control, export regimes, and multilateral cooperation have promoted U.S. security as well as global

More information

Africa & nuclear weapons. An introduction to the issue of nuclear weapons in Africa

Africa & nuclear weapons. An introduction to the issue of nuclear weapons in Africa Africa & nuclear weapons An introduction to the issue of nuclear weapons in Africa Status in Africa Became a nuclear weapon free zone (NWFZ) in July 2009, with the Treaty of Pelindaba Currently no African

More information

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings

USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings USCYBERCOM 2018 Cyberspace Strategy Symposium Proceedings Preface US Cyber Command hosted its inaugural Cyberspace Strategy Symposium at National Defense University on February 15, 2018. This day-long

More information

United Nations Security Council Resolution 1540: Voluntary National Implementation Action Plans

United Nations Security Council Resolution 1540: Voluntary National Implementation Action Plans United Nations Security Council Resolution 1540: Voluntary National Implementation Action Plans Dana Perkins, PhD 1540 Committee Expert Armenia National Roundtable on Implementation of Resolution 1540

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem by Kevin L. Stafford Introduction President Barrack Obama s signing of Presidential Policy Directive 8 (PPD-8),

More information

National Security & Public Affairs

National Security & Public Affairs You are in the process of becoming a spokesperson for the Department of Defense. To be successful in this field you need to understand the Department s philosophy concerning release of information, and

More information

SECTION 4 IRAQ S WEAPONS OF MASS DESTRUCTION

SECTION 4 IRAQ S WEAPONS OF MASS DESTRUCTION SECTION 4 IRAQ S WEAPONS OF MASS DESTRUCTION Introduction 1. Section 4 addresses: how the Joint Intelligence Committee s (JIC) Assessments of Iraq s chemical, biological, nuclear and ballistic missile

More information

Impact of Proliferation of WMD on Security

Impact of Proliferation of WMD on Security ECNDT 2006 - We.3.5.1 Impact of Proliferation of WMD on Security Zvonko OREHOVEC, Polytechnic College Velika Gorica, Croatia Abstract. There is almost no international scientific, expert, political or

More information

A/56/136. General Assembly. United Nations. Missiles. Contents. Report of the Secretary-General

A/56/136. General Assembly. United Nations. Missiles. Contents. Report of the Secretary-General United Nations General Assembly Distr.: General 5 July 2001 English Original: Arabic/English/ Russian/Spanish A/56/136 Fifty-sixth session Item 86 (d) of the preliminary list* Contents Missiles Report

More information

Annex X. Co-chairmen's Report ARF-ISG on CBMs Defense Officials' Dialogue

Annex X. Co-chairmen's Report ARF-ISG on CBMs Defense Officials' Dialogue Annex X Co-chairmen's Report ARF-ISG on CBMs Defense Officials' Dialogue CO-CHAIRMEN'S REPORT ARF-ISG ON CBMs DEFENSE OFFICIALS' DIALOGUE INTRODUCTION Phnom Penh, 26 October 2004 1. The First Defense Officials'

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

Montessori Model United Nations. First Committee Disarmament and International Security

Montessori Model United Nations. First Committee Disarmament and International Security Montessori Model United Nations A/C.1/11/BG-97.B General Assembly Eleventh Session Distr.: Upper Elementary XX September 2016 Original: English First Committee Disarmament and International Security This

More information

AIR FORCE CYBER COMMAND STRATEGIC VISION

AIR FORCE CYBER COMMAND STRATEGIC VISION AIR FORCE CYBER COMMAND STRATEGIC VISION Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated

More information

WEAPONS TREATIES AND OTHER INTERNATIONAL ACTS SERIES Agreement Between the UNITED STATES OF AMERICA and ROMANIA

WEAPONS TREATIES AND OTHER INTERNATIONAL ACTS SERIES Agreement Between the UNITED STATES OF AMERICA and ROMANIA TREATIES AND OTHER INTERNATIONAL ACTS SERIES 11-1223 WEAPONS Agreement Between the UNITED STATES OF AMERICA and ROMANIA Signed at Washington September 13, 2011 with Attachment NOTE BY THE DEPARTMENT OF

More information

Strategic Deterrence for the Future

Strategic Deterrence for the Future Strategic Deterrence for the Future Adm Cecil D. Haney, USN Our nation s investment in effective and credible strategic forces has helped protect our country for nearly seven decades. That proud legacy

More information

Chapter 17: Foreign Policy and National Defense Section 3

Chapter 17: Foreign Policy and National Defense Section 3 Chapter 17: Foreign Policy and National Defense Section 3 Objectives 1. Summarize American foreign policy from independence through World War I. 2. Show how the two World Wars affected America s traditional

More information

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace 24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace Maj Gen Chris Wedge Weggeman Commander OVERALL CLASSIFICATION OF THIS BRIEFING IS Our Journey Today Cyber IN War A little bit about Air Forces

More information

Information Operations

Information Operations Information Operations Air Force Doctrine Document 2 5 5 August 1998 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE DOCTRINE DOCUMENT 2 5 5 AUGUST 1998 OPR: HQ AFDC/DR (Maj Stephen L. Meyer, USAF)

More information

provocation of North Korea

provocation of North Korea provocation of North Korea History Final project Jaehun.Jeong Title : Provocation of North Korea : Korean war, Nuclear threat, Missile threat, recent happening in South Korea North Korea regime has been

More information

A FUTURE MARITIME CONFLICT

A FUTURE MARITIME CONFLICT Chapter Two A FUTURE MARITIME CONFLICT The conflict hypothesized involves a small island country facing a large hostile neighboring nation determined to annex the island. The fact that the primary attack

More information

AMERICA S ARMY: THE STRENGTH OF THE NATION Army G-3/5/7. AS OF: August 2010 HQDA G-35 (DAMO-SSD)

AMERICA S ARMY: THE STRENGTH OF THE NATION Army G-3/5/7. AS OF: August 2010 HQDA G-35 (DAMO-SSD) 1 Objectives Area of Application Signatories Background Major Provisions Current Issues 2 Curtail nuclear warhead modernization by prohibiting countries from conducting nuclear tests where the primary

More information

IRAQI NATIONAL REPORTS 2010 FOR SMALL ARMS

IRAQI NATIONAL REPORTS 2010 FOR SMALL ARMS IRAQI NATIONAL REPORTS 2010 FOR SMALL ARMS Iraqi small arms reprts 2010 Provided. Mr. Kofi Annan, Secretary General of the United Nations Review Conference on prevention of trafficking of others project

More information

Does President Trump have the authority to totally destroy North Korea?

Does President Trump have the authority to totally destroy North Korea? Does President Trump have the authority to totally destroy North Korea? Prof. Robert F. Turner Distinguished Fellow Center for National Security Law University of Virginia School of Law Initial Thoughts

More information

Introduction The United States has played a leading role in transforming the international system over the past sixty-five years. Working with like-minded nations, the United States has created a safer,

More information

October 13th, Foreword

October 13th, Foreword An agreement regarding the temporary U.S. presence in Iraq and its activities and withdrawal from Iraq, between the United States and the Iraqi government October 13th, 2008 Foreword Iraq and the U.S.,

More information

COUNCIL DECISION 2014/913/CFSP

COUNCIL DECISION 2014/913/CFSP L 360/44 COUNCIL DECISION 2014/913/CFSP of 15 December 2014 in support of the Hague Code of Conduct and ballistic missile non-proliferation in the framework of the implementation of the EU Strategy against

More information

Su S rface Force Strategy Return to Sea Control

Su S rface Force Strategy Return to Sea Control S Surface urface F orce SReturn trategy to Sea Control Surface Force Strategy Return to Sea Control Preface WWII SHIPS GO HERE We are entering a new age of Seapower. A quarter-century of global maritime

More information

Introduction. A Challenging Global Security Environment

Introduction. A Challenging Global Security Environment Introduction The United States has played a leading role in transforming the international system over the past sixty-five years. Working with like-minded nations, the United States has created a safer,

More information

Air-Sea Battle & Technology Development

Air-Sea Battle & Technology Development Headquarters U.S. Air Force Air-Sea Battle & Technology Development Col Gantt AF/A5XS 20 Mar 12 1 Agenda Background & Scope Definitions ASB Concept Overview ASB Central Idea: Networked, Integrated, Attack-in-Depth

More information

Building a Deterrence Policy Against Strategic Information Warfare

Building a Deterrence Policy Against Strategic Information Warfare Building a Deterrence Policy Against Strategic Information Warfare Geoffrey S. French, Veridian 10455 White Granite Drive, Suite 400 Oakton, Virginia 22124 geoff.french@veridian.com Abstract As the United

More information

We Produce the Future

We Produce the Future We Produce the Future Think Tank Presentation Space Weaponization A Blended Approach to Nuclear Deterrence Capt Joey Aguilo Space Acquisitions Program Manager Capt Samuel Backes Cyberspace Operations Officer

More information

This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the

This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the February, 2017 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions,

More information

Steven Pifer on the China-U.S.-Russia Triangle and Strategy on Nuclear Arms Control

Steven Pifer on the China-U.S.-Russia Triangle and Strategy on Nuclear Arms Control Steven Pifer on the China-U.S.-Russia Triangle and Strategy on Nuclear Arms Control (approximate reconstruction of Pifer s July 13 talk) Nuclear arms control has long been thought of in bilateral terms,

More information

Role and Modernization Trends of China s Second Artillery

Role and Modernization Trends of China s Second Artillery Role and Modernization Trends of China s Second Artillery Speaker: Dr. Roshan Khanijo, Senior Research Fellow, United Services Institution of India Chair: M V Rappai, Honorary Fellow, ICS 14 October 2015

More information

International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons

International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons Preamble States, Noting that in the United Nations Programme of Action

More information

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan 1 Nuclear Weapons 1 The United States, the former Soviet Union, the United Kingdom, France, and China. France and China signed the NPT in 1992. 2 Article 6 of the NPT sets out the obligation of signatory

More information

Question of non-proliferation of nuclear weapons and of weapons of mass destruction MUNISH 11

Question of non-proliferation of nuclear weapons and of weapons of mass destruction MUNISH 11 Research Report Security Council Question of non-proliferation of nuclear weapons and of weapons of mass destruction MUNISH 11 Please think about the environment and do not print this research report unless

More information

The 19th edition of the Army s capstone operational doctrine

The 19th edition of the Army s capstone operational doctrine 1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:

More information

Military Radar Applications

Military Radar Applications Military Radar Applications The Concept of the Operational Military Radar The need arises during the times of the hostilities on the tactical, operational and strategic levels. General importance defensive

More information

Adopted by the Security Council at its 4987th meeting, on 8 June 2004

Adopted by the Security Council at its 4987th meeting, on 8 June 2004 United Nations S/RES/1546 (2004) Security Council Distr.: General 8 June 2004 Resolution 1546 (2004) Adopted by the Security Council at its 4987th meeting, on 8 June 2004 The Security Council, Welcoming

More information

WEST POINT CYBER INITIATIVES

WEST POINT CYBER INITIATIVES CYBER INITIATIVES A PRESSING NEED Our nation and our military are at a critical juncture. Cyberspace operations are a critical part of war fighting, and cyber warriors seek direct engagement with humans

More information

NATIONAL INSTITUTE FOR PUBLIC POLICY. National Missile Defense: Why? And Why Now?

NATIONAL INSTITUTE FOR PUBLIC POLICY. National Missile Defense: Why? And Why Now? NATIONAL INSTITUTE FOR PUBLIC POLICY National Missile Defense: Why? And Why Now? By Dr. Keith B. Payne President, National Institute for Public Policy Adjunct Professor, Georgetown University Distributed

More information

Nuclear Forces: Restore the Primacy of Deterrence

Nuclear Forces: Restore the Primacy of Deterrence December 2016 Nuclear Forces: Restore the Primacy of Deterrence Thomas Karako Overview U.S. nuclear deterrent forces have long been the foundation of U.S. national security and the highest priority of

More information

LAB4-W12: Nation Under Attack: Live Cyber- Exercise

LAB4-W12: Nation Under Attack: Live Cyber- Exercise LAB4-W12: Nation Under Attack: Live Cyber- Exercise A sophisticated cyberattack is in progress against the United States. Multiple industries are impacted and things are about to get much worse. How will

More information

SEEKING A RESPONSIVE NUCLEAR WEAPONS INFRASTRUCTURE AND STOCKPILE TRANSFORMATION. John R. Harvey National Nuclear Security Administration

SEEKING A RESPONSIVE NUCLEAR WEAPONS INFRASTRUCTURE AND STOCKPILE TRANSFORMATION. John R. Harvey National Nuclear Security Administration SEEKING A RESPONSIVE NUCLEAR WEAPONS INFRASTRUCTURE AND STOCKPILE TRANSFORMATION John R. Harvey National Nuclear Security Administration Presented to the National Academy of Sciences Symposium on: Post-Cold

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))

More information