LAB4-W12: Nation Under Attack: Live Cyber- Exercise
|
|
- Norman Mathews
- 6 years ago
- Views:
Transcription
1 LAB4-W12: Nation Under Attack: Live Cyber- Exercise A sophisticated cyberattack is in progress against the United States. Multiple industries are impacted and things are about to get much worse. How will government and industry work together with international partners to face the challenge and respond to an adaptive and innovative adversary? Facilitators: Dmitri Alperovitch Co-Founder and Chief Technology Officer, Crowdstrike Non-Resident Senior Fellow, Atlantic Council Jason Healey Senior Research Scholar, Columbia University SIPA Non-Resident Senior Fellow, Atlantic Council With Beau Woods Deputy Director, Cyber Statecraft Initiative, Atlantic Council
2 Overview For the third installment of the RSA Conference s Live Cyber Exercise: Responding to A National Crisis wargame, four tables of participants representing different segments responded to a scenario exploring a disruption of the 2020 US elections by North Korea. The group included senior US government officials from the Department of State, Department of Defense, White House, and Department of Justice, as well as industry cybersecurity executives and experts. The event was organized by Dmitri Alperovitch, Co-Founder and Chief Technology Officer (CTO) at CrowdStrike as well as a Nonresident Senior Fellow at the Atlantic Council think tank, and Jason Healey, also a Nonresident Senior Fellow at the Atlantic Council and a Senior Research Scholar at Columbia University. Beau Woods, the Deputy Director of the Atlantic Council s Cyber Statecraft Initiative, helped to moderate the event. Scenario Summary The live cyber-exercise explored the consequences of a repeat of the 2016 elections to give participants the chance to respond against a hypothetical attempt in 2020 by the North Koreans to impact US elections. Four groups were involved in simulating responses during the wargame: US government team of current and former officials Private-sector team with executives from cybersecurity and critical infrastructure companies, vendors, and platform companies Media team of prominent journalists Adversary team made up of cybersecurity executives and former officials playing the role of the North Koreans to bring another level of interactivity to the wargame During the simulation: 1. By 2020, there have been numerous election hacks around the world, not just in the United States, but also Germany, France, and South Korea. In response to North Korean nuclear weapons, the United States and South Korea re-introduce nuclear weapons to the peninsula. 2. The US political parties are again hacked with massive amounts of data and s deleted. The Intelligence Community has a high degree of confidence that North Korea is responsible for the incidents. 3. A never-before-heard-from hacktivist group declares that they were the hackers behind the hacks and starts contacting media pitching them the hacked materials, though many look doctored. 4. The private sector identifies intrusions into voting-machine companies, both in the United States and other OECD nations. It is not known if the intruders have been able to affect production code. 5. Finally, the North Koreans confirm they were responsible. 2
3 Lessons Learned The teams representing the US government and the media drove the response to the scenario. Both demonstrated a keenness to demonstrate lessons learned from the 2016 elections. The US government team was willing to rapidly escalate as the scenario progressed, as it was only a few months until the election, and the North Korean attempts at sabotage were growing increasingly brazen and the Intelligence Community had quite high confidence in their attribution. The media team was exceedingly cautious in using any of the leaked document, since some were clearly doctored. This also helped prevent them being manipulated away from focusing on the main story of adversaries attempting to sabotage an election. Through the exercise, it was clear there are robust, existing processes and organizations to respond to major attacks. 3
4 SESSION ID: LAB4-W12 Nation Under Attack: Live Cyber-Exercise 1 Dmitri Alperovitch Co-Founder and CTO, CrowdStrike Senior Fellow, Atlantic Jason Healey Senior Fellow, Atlantic Council Senior Research Scholar, Columbia
5 Exercise-Based Learning Cyber 9/12 Part conference, part exercise Some play, some observe: all learn Third lab at RSAC USA Two labs at RSA Abu Dhabi 2
6 Part of Cyber 9/12 Series
7 Four Teams FIX TOMORROW Government: You are playing the role of a policy committee reporting to the NSC. Key questions: What is the impact of the attacks? How should the nation use its levers of power to succeed in the cyber crisis forced upon it? Cybersecurity: You are playing the role of volunteers and cybersecurity companies called in to help the affected organizations. Key questions: What is the impact of the attacks and what steps can non-states take? What are the next steps to mitigate this attack and prepare for what might be next? Media: You are playing the role of the media Key questions What is the impact on people s opinions from the incident? How do the facts and analysis get reported accurately and convincingly? What is the media s role? Adversary: You are playing the role of the adversary nation or non-state group which is using cyber power against the United States Key questions: What next step might an intelligent adversary pursue to advance its interests, in line with its traditional means and culture?
8 Role of Observers Different than a normal RSAC session: listen, learn, think of questions Moderators will collect questions to ask Chatham House rule: Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed
9 Today s Learning Lab 4pm: Group assembles 4:10pm: Welcome and introduction 4:15pm: First inject and discussion within groups 4:30pm: Brief recommendations 4:45pm: Second inject and discussion within groups 5pm: Brief recommendations 5:15pm: Third inject and discussion within groups 5:30pm: Brief recommendations 5:40pm: General discussion on the results of the simulation and concluding remarks 6pm: Conclude, commence socializing in earnest
10 SCENARIO - Inject Zero It is now March 2019
11 SCENARIO Scenesetter (1) North Korea successfully tested an ICBM clearly capable of reaching the west coast of the United States with a nuclear warhead. Kim Jong Un boasts that California could be a sea of fire at his command. He also appears at tests of submarine-launched nuclear-tipped missiles. US and South Korean governments respond by re-introducing tactical nuclear weapons to the US airbases in the peninsula, ramping up advanced missile defenses in the south, and instituting a naval blockade against the North. North Korean mouthpieces are clear this will lead to war. A Japanese minister mentioned in passing that the country should consider its own nuclear force and there was little public outcry. China has been growing in strength and constantly testing the United States, Japan, Australia and the smaller ASEAN nations through provocations in the South China Sea and elsewhere. The One Belt - One Road initiative has continued to gain strength. Chinese cyber espionage is again at a very high tempo, though mostly focused on political and military (not significantly commercial) intelligence. There has not been any major Sino-US falling out, though the US re-introduction of nuclear weapons to South Korea (and possible Japanese inventory) go against a specific red line of Xi Jinping. Iran has returned to disruptive cyber attacks with a vengeance after the collapse of the JCPOA nuclear deal and US military campaigns to raid Iranian flagged vessels possibly carrying contraband and the apparently targeted killings of Revolutionary Guard leadership in Yemen. In the aftermath, the Revolutionary Guard came away with significant new funding and standing as the new Supreme Leader has long been associated with their goals. Both Israel and the US administration have threatened to use nuclear weapons against the Islamic Republic if Iran were to use (or, depending on the wording of the threat, even to field) their own nuclear weapons. Russia has continued to force its belligerence on Western Europe, with focused attempts to de-stabilize the Baltic states, Georgia and Poland, all of which have some degree of Russian-funded groups causing a range of mischief (and often violence). The US administration re-imposed sanctions on Russia after a falling out with Putin in late 2017 after declaring Putin had not lived up to his end of a new grand bargains. Relations between the Russian and American presidents are bleak. Islamic State is no more, though a dozen smaller groups are vying for influence in the hinterlands of Syria and Iraq. Al Qaeda remains a threat, but mostly focused on a major catastrophic attack.
12 FIRST ROUND - BRIEF ASSESSMENT AND RECOMMENDATIONS
13 SECOND ROUND - BRIEF ASSESSMENT AND RECOMMENDATIONS
14 THIRD ROUND - BRIEF ASSESSMENT AND RECOMMENDATIONS
15 Please Remember! Chatham House rule: Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed
16 DISCUSSION AND CONCLUSION
American Public Attitudes toward North Korea s Nuclear and Missile Programs
American Public Attitudes toward North Korea s Nuclear and Missile Programs Presented at a panel on Confronting North Korea s nuclear and missile programs: American and Japanese views of threats and options
More informationNational Defense University. Institute for National Strategic Studies
National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents
More informationSS.7.C.4.3 Describe examples of how the United States has dealt with international conflicts.
SS.7.C.4.3 Benchmark Clarification 1: Students will identify specific examples of international conflicts in which the United States has been involved. The United States Constitution grants specific powers
More informationWhy Japan Should Support No First Use
Why Japan Should Support No First Use Last year, the New York Times and the Washington Post reported that President Obama was considering ruling out the first-use of nuclear weapons, as one of several
More information2 Articles on Just Published State Department Country Reports on
2 Articles on Just Published State Department Country Reports on Terrorism 2017 Worldwide terrorist attacks decreased by 23 percent in 2017 THE HILL BY JOHN BOWDEN 09/19/18 N i l i l i a l k. a t h a Nathan
More informationMay 8, 2018 NATIONAL SECURITY PRESIDENTIAL MEMORANDUM/NSPM-11
May 8, 2018 NATIONAL SECURITY PRESIDENTIAL MEMORANDUM/NSPM-11 MEMORANDUM FOR THE SECRETARY OF STATE THE SECRETARY OF THE TREASURY THE SECRETARY OF DEFENSE THE ATTORNEY GENERAL THE SECRETARY OF ENERGY THE
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More information1
Understanding Iran s Nuclear Issue Why has the Security Council ordered Iran to stop enrichment? Because the technology used to enrich uranium to the level needed for nuclear power can also be used to
More informationA Global History of the Nuclear Arms Race
SUB Hamburg A/602564 A Global History of the Nuclear Arms Race Weapons, Strategy, and Politics Volume 1 RICHARD DEAN BURNS AND JOSEPH M. SIRACUSA Praeger Security International Q PRAEGER AN IMPRINT OF
More informationSteven Pifer on the China-U.S.-Russia Triangle and Strategy on Nuclear Arms Control
Steven Pifer on the China-U.S.-Russia Triangle and Strategy on Nuclear Arms Control (approximate reconstruction of Pifer s July 13 talk) Nuclear arms control has long been thought of in bilateral terms,
More informationSACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018
NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne
More information1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan
1 Nuclear Weapons 1 The United States, the former Soviet Union, the United Kingdom, France, and China. France and China signed the NPT in 1992. 2 Article 6 of the NPT sets out the obligation of signatory
More informationThe Iran Nuclear Deal: Where we are and our options going forward
The Iran Nuclear Deal: Where we are and our options going forward Frank von Hippel, Senior Research Physicist and Professor of Public and International Affairs emeritus Program on Science and Global Security,
More informationⅠ Introduction Ⅱ Positioning of cyber domain in cross-domain operation. Ⅲ Cyber domain seen in China's strategy. Ⅳ Approach to Cyber Domain in Japan
1 DISCLAIMER The views, opinions, and proposals provided in this presentation are solely of the briefer s own and thus shall not be construed as official positions of either the Stimson Center or the Government
More informationMontessori Model United Nations. Distr.: Middle School Twelfth Session XX March First Committee Disarmament and International Security
Background Montessori Model United Nations General Assembly Distr.: Middle School Twelfth Session XX March 2017 Original: English First Committee Disarmament and International Security This committee aims
More informationSUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES. for FY 2011 and beyond
(Provisional Translation) SUMMARY OF NATIONAL DEFENSE PROGRAM GUIDELINES for FY 2011 and beyond Approved by the Security Council and the Cabinet on December 17, 2010 I. NDPG s Objective II. Basic Principles
More informationNorth Korea's Nuclear Programme and Ballistic Missile Capabilities: An Assessment
INSTITUTE OF STRATEGIC STUDIES web: www.issi.org.pk phone: +92-920-4423, 24 fax: +92-920-4658 Issue Brief North Korea's Nuclear Programme and Ballistic Missile Capabilities: An Assessment June 16, 2017
More informationIran Nuclear Deal: The Limits of Diplomatic Niceties
Iran Nuclear Deal: The Limits of Diplomatic Niceties Nov. 1, 2017 Public statements don t guarantee a change in policy. By Jacob L. Shapiro Though the rhetoric around the Iran nuclear deal has at times
More informationChapter 17: Foreign Policy and National Defense Section 3
Chapter 17: Foreign Policy and National Defense Section 3 Objectives 1. Summarize American foreign policy from independence through World War I. 2. Show how the two World Wars affected America s traditional
More informationChapter 4 The Iranian Threat
Chapter 4 The Iranian Threat From supporting terrorism and the Assad regime in Syria to its pursuit of nuclear arms, Iran poses the greatest threat to American interests in the Middle East. Through a policy
More informationMontessori Model United Nations. Distr.: Upper Elementary Twelfth Session XX March First Committee Disarmament and International Security
Background Montessori Model United Nations General Assembly Distr.: Upper Elementary Twelfth Session XX March 2017 Original: English First Committee Disarmament and International Security This committee
More informationGREAT DECISIONS WEEK 8 NUCLEAR SECURITY
GREAT DECISIONS WEEK 8 NUCLEAR SECURITY Acronyms, abbreviations and such IAEA International Atomic Energy Agency ICBM Intercontinental Ballistic Missile NPT Non-Proliferation of Nuclear Weapons Treaty
More informationU.S. Nuclear Policy and World Nuclear Situation
U.S. Nuclear Policy and World Nuclear Situation Presentation by Hans M. Kristensen (consultant, Natural Resources Defense Council) Phone: (202) 513-6249 / 289-6868 Website: http://www.nukestrat.com To
More informationNUCLEAR ARMS CONTROL: THE END OF HISTORY?
NUCLEAR ARMS CONTROL: THE END OF HISTORY? Dr. Alexei Arbatov Chairman of the Carnegie Moscow Center s Nonproliferation Program Head of the Center for International Security at the Institute of World Economy
More informationIntelligence Preparation of the Information and Communications Environment
Intelligence Preparation of the Information and Communications Environment By Jeffrey Carr While the Joint Intelligence Preparation of the Operational Environment (JIPOE) is for offensive purposes, this
More informationCHINA TURKEY MISSILE DEFENCE COOPERATION
CHINA TURKEY MISSILE DEFENCE COOPERATION Debalina Ghoshal Associate Fellow, CAPS An interesting development in recent times has been the nascent talks of missile defence cooperation between China and Turkey.
More informationNATO s Ballistic Missile Defense Plans a game changer? February 22, 2011
UNIDIR/IFSH Presentation Geneva, Palais des Nations NATO s Ballistic Missile Defense Plans a game changer? February 22, 2011 Götz Neuneck, Hans Christian Gils, Christian Alwardt IFSH, University of Hamburg
More informationTowards a European Non-Proliferation Strategy. May 23, 2003, Paris
Gustav LINDSTRÖM Burkard SCHMITT IINSTITUTE NOTE Towards a European Non-Proliferation Strategy May 23, 2003, Paris The seminar focused on three proliferation dimensions: missile technology proliferation,
More informationPOLICY, NATIONAL SECURITY, AND THE ROAD AHEAD
POLICY, NATIONAL SECURITY, AND THE ROAD AHEAD BARRY R. McCAFFREY GENERAL, USA (RETIRED) 211 N. Union Street, Suite 100 Alexandria, VA 22314 b.r.mccaffrey@att.net 206-283-0345 1 of 13 BIOGRAPHY OF GENERAL
More informationA New World. The Cold War - Part 2
A New World The Cold War - Part 2 Table of Contents The First Hot War The Cold War World An Unwinnable Race The First Hot War Korea Korean War The Korean War: 1950-1953 After WWII, Korea was divided under
More informationPrepared Statement of GEN (Ret) Keith B. Alexander*
Prepared Statement of GEN (Ret) Keith B. Alexander * on Cyber Warfare Today: Preparing for 21st Century Challenges in an Information-Enabled Society before the House Armed Services Committee April 11,
More informationMontessori Model United Nations. First Committee Disarmament and International Security
Montessori Model United Nations A/C.1/11/BG-97.B General Assembly Eleventh Session Distr.: Upper Elementary XX September 2016 Original: English First Committee Disarmament and International Security This
More informationCourse Assistants and staff
IGA-240: CYBER AND INFORMATION OPERATIONS: TECHNOLOGY, POLICY AND THE LAW Fall 2017/18, T/Th 8:45 10:00am L230 Instructor Eric Rosenbach eric_rosenbach@hks.harvard.edu L-362 Course Assistants and staff
More informationUS Nuclear Policy: A Mixed Message
US Nuclear Policy: A Mixed Message Hans M. Kristensen* The Monthly Komei (Japan) June 2013 Four years ago, a newly elected President Barack Obama reenergized the international arms control community with
More informationOverview. Section 1 Trends in the International Community. Overview
Part I Security Environment Surrounding Japan Part I Security Environment Surrounding Japan Section 1 Trends in the International Community The security environment surrounding Japan has become increasingly
More informationForeign Policy and Homeland Security
Foreign Policy and Homeland Security 1 Outline Background Marshall Plan and NATO United Nations Military build-up and nuclear weapons Intelligence agencies and the Iraq war Foreign aid Select issues in
More informationNATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005-
(Provisional Translation) NATIONAL DEFENSE PROGRAM GUIDELINES, FY 2005- Approved by the Security Council and the Cabinet on December 10, 2004 I. Purpose II. Security Environment Surrounding Japan III.
More informationThe Cold War Conflicts
Name: The Cold War Conflicts United States vs. Soviet Union (U.S.S.R.) Contrast Compare Contrast Cold War: United Nations: Formed in 1945 because many nations wanted to promote The Marshall Plan: UN: United
More informationJane's Defence Weekly. Rearming Russia. [Content preview Subscribe to IHS Jane s Defence Weekly for full article]
Jane's Defence Weekly Rearming Russia [Content preview Subscribe to IHS Jane s Defence Weekly for full article] Russia's rearmament ambitions envisage the replacement of some 70% of its old equipment by
More informationASSESSMENT REPORT. The Iranian Nuclear Program: a Final Agreement
ASSESSMENT REPORT The Iranian Nuclear Program: a Final Agreement Policy Analysis Unit - ACRPS July 2015 The Iranian Nuclear Program: a Final Agreement Series: Assessment Report Policy Analysis Unit ACRPS
More informationAn Interview with Gen John E. Hyten
Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible
More information1 Introduction to ITC-26. Introduction to the ITC and DEPO. October 24 November 11, 2016 Albuquerque, New Mexico, USA Greg Baum
Introduction to the ITC and DEPO October 24 November 11, 2016 Albuquerque, New Mexico, USA Greg Baum L2 Learning Objectives After completing this module, you should be able to: Recognize the basic goal
More informationForeign Policy and National Defense. Chapter 22
Foreign Policy and National Defense Chapter 22 Historical Perspective 1 st 150 years of U.S. existence Emphasis on Domestic Affairs vs. Foreign Affairs Foreign Policy The strategies and goals that guide
More informationStatement and Recommendations of the Co-Chairs of the 3 rd Panel on Peace and Security of Northeast Asia (PSNA) Workshop
Statement and Recommendations of the Co-Chairs of the 3 rd Panel on Peace and Security of Northeast Asia (PSNA) Workshop Moscow, May 31- June 1 st, 2018 Sponsored by the Research Center for Nuclear Weapons
More informationStrategic Deterrence for the Future
Strategic Deterrence for the Future Adm Cecil D. Haney, USN Our nation s investment in effective and credible strategic forces has helped protect our country for nearly seven decades. That proud legacy
More informationWhat if the Obama Administration Changes US Nuclear Policy? Potential Effects on the Strategic Nuclear War Plan
What if the Obama Administration Changes US Nuclear Policy? Potential Effects on the Strategic Nuclear War Plan Hans M. Kristensen hkristensen@fas.org 202-454-4695 Presentation to "Building Up or Breaking
More informationNorth Korean Nuclear and Missile Programs and Capabilities
North Korean Nuclear and Missile Programs and Capabilities National Security Agency 6 June 2001 Steve Fetter University of Maryland Origins DPRK nuclear and missile programs began in mid-60s, given higher
More informationSSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W.
SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W. Bush, and Obama administrations. a. Analyze challenges faced by recent presidents
More informationCyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee
Cyber Strategy & Policy: International Law Dimensions Written Testimony Before the Senate Armed Services Committee Matthew C. Waxman Liviu Librescu Professor of Law, Columbia Law School Co-Chair, Columbia
More informationWe Produce the Future
We Produce the Future Think Tank Presentation Space Weaponization A Blended Approach to Nuclear Deterrence Capt Joey Aguilo Space Acquisitions Program Manager Capt Samuel Backes Cyberspace Operations Officer
More informationNUCLEAR ARMS CONTROL: CHALLENGES AND OPPORTUNITIES IN Steven Pifer Senior Fellow Director, Arms Control Initiative October 10, 2012
NUCLEAR ARMS CONTROL: CHALLENGES AND OPPORTUNITIES IN 2013 Steven Pifer Senior Fellow Director, Arms Control Initiative October 10, 2012 Lecture Outline How further nuclear arms reductions and arms control
More informationCAPT Jody Grady, USN USCYBERCOM LNO to USPACOM
1 CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM The overall classification of this briefing is: Classified By: jhgrady Derived From: USCYBERCOM SCG Dated: 20150415 2 3 4 Organizational Structure Commander
More informationImportance of Export Control & Japan s Export Control
Importance of Export Control & Japan s Export Control November 2014 Table of Contents 1. Importance of Export Control 2. International Export Control Regimes 3. Japan s Export Control 2 1. Importance of
More informationUnit Six: Canada Matures: Growth in the Post-War Period ( )
Unit Six: Canada Matures: Growth in the Post-War Period (1945-1970) 6.4: Canada s role on the international stage: emergence as a middle power, involvement in international organizations Meeting the Aliens
More informationStatement of Vice Admiral Albert H. Konetzni, Jr. USN (Retired) Before the Projection Forces Subcommittee of the House Armed Services Committee
Statement of Vice Admiral Albert H. Konetzni, Jr. USN (Retired) Before the Projection Forces Subcommittee of the House Armed Services Committee Chairman Bartlett and members of the committee, thank you
More informationActivity: Persian Gulf War. Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur?
Activity: Persian Gulf War Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur? DESERT STORM PERSIAN GULF WAR (1990-91) WHAT ABOUT KUWAIT S GEOGRAPHICAL LOCATION
More informationSIMULEX November 13-14, The Fletcher School, Tufts University. Crisis in the Western Pacific/East Asia Region
SIMULEX November 13-14, 2015 -- The Fletcher School, Tufts University Crisis in the Western Pacific/East Asia Region Scenario Background It is April 2017. The Middle East remains in turmoil with further
More informationNuclear Forces: Restore the Primacy of Deterrence
December 2016 Nuclear Forces: Restore the Primacy of Deterrence Thomas Karako Overview U.S. nuclear deterrent forces have long been the foundation of U.S. national security and the highest priority of
More informationTHAAD and the Military Balance in Asia
Fitzpatrick THAAD and the Military Balance in Asia THAAD and the Military Balance in Asia An Interview with Mark Fitzpatrick On July 8, 2016, the United States and South Korea announced a decision to deploy
More informationIssue 16-04B (No. 707) March 22, THAAD 2. CHINA S CORE KOREA POLICY 3. UN SANCTIONS WHICH ONE NEXT? 5.
1 Issue 16-04B (No. 707) March 22, 2016 1. THAAD 2. CHINA S CORE KOREA POLICY 3. UN SANCTIONS 2016 4. WHICH ONE NEXT? 5. EAGLE HUNTING 1. THAAD 2 THAAD carries no warhead. It is a purely defensive system.
More informationPolicy Responses to Nuclear Threats: Nuclear Posturing After the Cold War
Policy Responses to Nuclear Threats: Nuclear Posturing After the Cold War Hans M. Kristensen Director, Nuclear Information Project Federation of American Scientists Presented to Global Threat Lecture Series
More informationGreat Decisions Paying for U.S. global engagement and the military. Aaron Karp, 13 January 2018
Great Decisions 2018 Paying for U.S. global engagement and the military Aaron Karp, 13 January 2018 I. Funding America s four militaries not as equal as they look Times Square Strategy wears a dollar sign*
More informationCHAPTER 18 SECTION 2: THE COLD WAR HEATS UP
CHAPTER 18 SECTION 2: THE COLD WAR HEATS UP CHINA S CIVIL WAR ENDS FROM 1945 THROUGH 1949 AMERICA SENT SUPPORT TO CHIANG KAI-SHEK S NATIONALIST CAUSE WHY? BECAUSE THEY WERE FIGHTING COMMUNISTS!! THE REALITY
More informationWorld History
4.2.1 TERMS (k) Uniting for Peace Resolution: U.N. resolution that gave the General Assembly power to deal with issues of international aggression if the Security Council is deadlocked. Veto: The right
More informationUnited States Russia United Kingdom France China 450 Minuteman III: SS-18: 54 SS-19: 30 SS-25: 90 SS-27: 78 RS-24: 72
1 Number of Nuclear Warheads Arsenals by Country and Their Major Means of Delivery Missiles ICBM (Intercontinental Ballistic Missiles) IRBM MRBM SLBM (Submarine Launched Ballistic Missiles) Submarines
More informationReaffirming the Utility of Nuclear Weapons
Reaffirming the Utility of Nuclear Weapons Bradley A. Thayer and Thomas M. Skypek 2013 Bradley A. Thayer and Thomas M. Skypek A defining aspect of the present period in international politics is the lack
More informationChapter 20 Section 1 Mobilizing for War. Click on a hyperlink to view the corresponding slides.
Chapter 20 Section 1 Mobilizing for War Click on a hyperlink to view the corresponding slides. Click the Speaker button to listen to the audio again. Chapter Objectives Section 1: Mobilizing for War Explain
More informationRole and Modernization Trends of China s Second Artillery
Role and Modernization Trends of China s Second Artillery Speaker: Dr. Roshan Khanijo, Senior Research Fellow, United Services Institution of India Chair: M V Rappai, Honorary Fellow, ICS 14 October 2015
More informationExecutive Summary The United States maintains a military
Executive Summary The United States maintains a military force primarily to protect the homeland from attack and to protect its interests abroad. There are secondary uses for example, to assist civil authorities
More informationThis report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the
February, 2017 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions,
More informationThe Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July
The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,
More informationSimulation - The conflict between North Korea and the U.S.
Simulation - The conflict between North Korea and the U.S. The simulation schedule 10:00-10:30 Gathering 10:30-10:45 Opening remarks and instructions 10:45-12:45 Working groups 12:45-13:45 Presentations
More informationprovocation of North Korea
provocation of North Korea History Final project Jaehun.Jeong Title : Provocation of North Korea : Korean war, Nuclear threat, Missile threat, recent happening in South Korea North Korea regime has been
More informationThe Logic of American Nuclear Strategy: Why Strategic Superiority Matters
The Logic of American Nuclear Strategy: Why Strategic Superiority Matters Matthew Kroenig Associate Professor of Government and Foreign Service Georgetown University Senior Fellow Scowcroft Center on Strategy
More informationU.S. Nuclear Strategy After the 2010 Nuclear Posture Review
U.S. Nuclear Strategy After the 2010 Nuclear Posture Review Hans M. Kristensen Director, Nuclear Information Project Federation of American Scientists Presentation to Alternative Approaches to Future U.S.
More informationIssue Briefs. The UN Sanctions' Impact on Iran's Military
Issue Briefs Issue Brief - Volume 1, Number 7, June 11, 2010 Note chart below on Russian and Chinese Equipment Subject to U.N. Sanctions One of the most significant aspects of the latest round of UN Security
More informationINSS Insight No. 459, August 29, 2013 US Military Intervention in Syria: The Broad Strategic Purpose, Beyond Punitive Action
, August 29, 2013 Amos Yadlin and Avner Golov Until the publication of reports that Bashar Assad s army carried out a large attack using chemical weapons in an eastern suburb of Damascus, Washington had
More informationMoving Beyond Missile Defense and Space Weapons (MBMDS)
Introduction Moving Beyond Missile Defense and Space Weapons (MBMDS) INTERIM PROGRESS REPORT May 1, 2017 In the summer of 2016 INES organized an International working group to study the serious consequences
More informationElectronic Warfare and Satellites Challenges in Assuring Space Capabilities
Electronic Warfare and Satellites Challenges in Assuring Space Capabilities Brian Weeden Technical Advisor Secure World Foundation Takeaways Space capabilities play an increasingly important role in national
More informationGuided Notes. Chapter 21; the Cold War Begins. Section 1:
Guided Notes Chapter 21; the Cold War Begins Section 1: A Clash of Interests (pages 654 655) A. After War, the United and the Union became, leading to an of and that from about to known as the. B. were
More informationIran's Military Forces and Warfighting Capabilities
A/486952 Iran's Military Forces and Warfighting Capabilities The Threat in the Northern Gulf Anthony H. Cordesman and Martin Kleiber Published in cooperation with the Center for Strategic and International
More informationChapter 2: The Nuclear Age
Chapter 2: The Nuclear Age President Truman and the Bomb Hiroshima August 6, 1945 Nagasaki August 9, 1945 Reasons for the Atomic Bombs Save American Lives End the war with Japan Revenge for Pearl Harbor
More informationOrigins of the Cold War
Origins of the Cold War Development of the Cold War The Cold War (1945-91) was one of perception where neither side fully understood the intentions and ambitions of the other. This led to mistrust and
More information1. The number of known arms producers has doubled after the end of the cold war.
1. The number of known arms producers has doubled after the end of the cold war. 2. The present arms technology market is a buyers market where a range of modern as well as outdated defense technologies
More informationChapter 17: Foreign Policy and National Defense Section 1
Chapter 17: Foreign Policy and National Defense Section 1 Isolationism to Internationalism For nearly 150 years U.S. foreign relations were based on isolationism, as U.S. leaders refused to get widely
More informationIndefensible Missile Defense
Indefensible Missile Defense Yousaf M. Butt, Scientific Consultant, FAS & Scientist-in-Residence, Monterey Institute ybutt@fas.or Big Picture Issues - BMD roadblock to Arms Control, space security and
More informationAssessing Technologies using Campaign Analysis and War Gaming: The Warfare Innovation Continuum at NPS
Assessing Technologies using Campaign Analysis and War Gaming: The Warfare Innovation Continuum at NPS Professor of Practice Jeff Kline, Operations Research Captain, USN (ret) Naval Postgraduate School
More informationOHIO Replacement. Meeting America s Enduring Requirement for Sea-Based Strategic Deterrence
OHIO Replacement Meeting America s Enduring Requirement for Sea-Based Strategic Deterrence 1 Why Recapitalize Our SSBN Force? As long as these weapons exist, the United States will maintain a safe, secure,
More information1. INSPECTIONS AND VERIFICATION Inspectors must be permitted unimpeded access to suspect sites.
As negotiators close in on a nuclear agreement Iran, Congress must press American diplomats to insist on a good deal that eliminates every Iranian pathway to a nuclear weapon. To accomplish this goal,
More informationRethinking the Foundations of the National Security Strategy and the QDR Seminar Series 20 May 2009 Dr. Lewis A. Dunn
Rethinking the Foundations of the National Security Strategy and the QDR Seminar Series 20 May 2009 Dr. Lewis A. Dunn Science Applications International Corporation 21 st Century Deterrence Challenges
More informationThe best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,
The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen, Marines, and Civilians who serve each day and are either involved in war, preparing for war, or executing
More informationThe Korean Peninsula situation after the UN resolution 2270 Wang Junsheng
The Korean Peninsula situation after the UN resolution 2270 Wang Junsheng National Institute of International Strategy, Chinese Academy of Social Sciences (CASS). Ⅰ. Why China supports the UN resolution
More informationOrigins of the Cold War
Origins of the Cold War Development of the Cold War The Cold War (1945-91) was one of perception where neither side fully understood the intentions and ambitions of the other. This led to mistrust and
More informationSection 4 Outer Space and Security
Section 4 Outer Space and Security 1 Outer Space and Security Nearly 60 years have passed since a satellite was launched into outer space for the first time in the history of mankind. In recent years,
More informationPerspectives on the 2013 Budget Request and President Obama s Guidance on the Future of the U.S. Nuclear Weapons Program
Perspectives on the 2013 Budget Request and President Obama s Guidance on the Future of the U.S. Nuclear Weapons Program Hans M. Kristensen Director, Nuclear Information Project Federation of American
More informationNuclear Disarmament Weapons Stockpiles
Nuclear Disarmament Weapons Stockpiles Country Strategic Nuclear Forces Delivery System Strategic Nuclear Forces Non Strategic Nuclear Forces Operational Non deployed Last update: August 2011 Total Nuclear
More informationTerms. Administration Outlook. The Setting Massive Retaliation ( ) Eisenhower State of the Union Address (2/53)
Terms 1952-1959 Bomber Gap ICBM BMEWS Missile Gap Sputnik CENTO U2 DIA Disarmament The Nuclearization of U.S. National Security Policy Arms control hardening sites Open Skies SLBM Gaither Report First
More informationArmy Experimentation
Soldiers stack on a wall during live fire certification training at Grafenwoehr Army base, 17 June 2014. (Capt. John Farmer) Army Experimentation Developing the Army of the Future Army 2020 Van Brewer,
More informationCh 25-4 The Korean War
Ch 25-4 The Korean War The Main Idea Cold War tensions finally erupted in a shooting war in 1950. The United States confronted a difficult challenge defending freedom halfway around the world. Content
More informationIt is now commonplace to hear or read about the urgent need for fresh thinking
Deterrence in Professional Military Education Paul I. Bernstein * It is now commonplace to hear or read about the urgent need for fresh thinking on deterrence and for rebuilding the intellectual and analytic
More information