Cyber Warfare and Challenges for the U.S.-ROK Alliance by Dr
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Political Performance and the War on Terror
The Shock and Awe of the Real: Political Performance and the War on Terror by Matthew Jones A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Centre for Drama, Theatre and Performance Studies University of Toronto © Copyright by Matt Jones 2020 The Shock and Awe of the Real: Political Performance and the War on Terror Matt Jones Doctor of Philosophy Centre for Drama, Theatre and Performance Studies University of Toronto 2020 Abstract This dissertation offers a transnational study of theatre and performance that responded to the recent conflicts in Iraq, Afghanistan, Syria, and beyond. Looking at work by artists primarily from Arab and Middle Eastern diasporas working in the US, UK, Canada, and Europe, the study examines how modes of performance in live art, documentary theatre, and participatory performance respond to and comment on the power imbalances, racial formations, and political injustices of these conflicts. Many of these performances are characterized by a deliberate blurring of the distinctions between performance and reality. This has meant that playwrights crafted scripts from the real words of soldiers instead of writing plays; performance artists harmed their real bodies, replicating the violence of war; actors performed in public space; and media artists used new technology to connect audiences to real warzones. This embrace of the real contrasts with postmodern suspicion of hyper-reality—which characterized much political performance in the 1990s—and marks a shift in understandings of the relationship between performance and the real. These strategies allowed artists to contend with the way that war today is also a multimedia attack on the way that reality is constructed and perceived. -
DPRK Nuclear Weapons Capability 2021
DPRK nuclear weapons capability 【Overview】 The nuclear and missile capabilities of the Democratic People's Republic of Korea (North Korea) continue to become enhanced but there are varying estimates regarding their strengths. For example, RAND Corporation, a U.S. think tank, and the South Korean Asan Institute for Policy Studies predicted that in an April 2021 report that in 2020 North Korea had between 67 and 116 warheads, and that this amount would increase to reach between 151 and 242 in 2027 (Bennett, Bruce W. et.al 2021). Elsewhere, Dr. Siegfried Hecker of Stanford University said in an April 30, 2021 interview with the 38 North site, which analyzes North Korea, that “20 to 60 is possible, with the most likely number being 45,” (38 North 2021). Few nations have made any official pronouncements, but the U.S. Defense Intelligence Agency (DIA) estimates the maximum size of the North Korean arsenal currently to be 60 warheads (Nikitin, Mary Beth D. & Ryder, Samuel D. 2021). In addition, in October 2018 the South Korean Minister of Unification, Cho Myoung-gyon, said that the Ministry’s Intelligence and Analysis Office believed North Korea had between 20 and 60 warheads (Kim, Hyng-jin 2018). Our estimate here of the North Korean stockpile, as of June 2021, is 40 warheads. North Korea, with its research facility in Nyeongbyeon as the hub, continues to produce plutonium and highly enriched uranium (HEU), and fissile materials for nuclear weapons (Nikitin, Mary Beth D. & Ryder, Samuel D. 2021、International Atomic Energy Agency 2021、United Nations Security Council 2021). The International Panel on Fissile Materials (IPFM) estimated in 2020 that the current amount of weapons-grade plutonium owned by North Korea was 40kg (International Panel on Fissile Materials 2021). -
Operation Iraqi Freedom
Operation Iraqi Freedom: A First-Blush Assessment Andrew F. Krepinevich 1730 Rhode Island Avenue, NW, Suite 912 Washington, DC 20036 Operation Iraqi Freedom: A First-Blush Assessment by Andrew F. Krepinevich Center for Strategic and Budgetary Assessments 2003 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS The Center for Strategic and Budgetary Assessments is an independent public policy research institute established to promote innovative thinking about defense planning and investment strategies for the 21st century. CSBA’s analytic-based research makes clear the inextricable link between defense strategies and budgets in fostering a more effective and efficient defense, and the need to transform the US military in light of the emerging military revolution. CSBA is directed by Dr. Andrew F. Krepinevich and funded by foundation, corporate and individual grants and contributions, and government contracts. 1730 Rhode Island Ave., NW Suite 912 Washington, DC 20036 (202) 331-7990 http://www.csbaonline.org ACKNOWLEDGMENTS The author would like to thank Steven Kosiak, Robert Martinage, Michael Vickers and Barry Watts, who reviewed several drafts of this report. Their comments and suggestions proved invaluable. Critical research assistance was provided by Todd Lowery. His support in chasing down numerous sources and confirming critical facts proved indispensable. Alane Kochems did a fine job editing and proofing the final report draft, while Alise Frye graciously helped craft the report’s executive summary. I am most grateful for their encouragement and support. Naturally, however, the opinions, conclusions and recommendations in this report are the sole responsibility of the author. CONTENTS EXECUTIVE SUMMARY .......................................................................................................... I I. INTRODUCTION ........................................................................................................ 1 II. STRATEGIC IMPLICATIONS ........................................................................................ -
2016 8Th International Conference on Cyber Conflict: Cyber Power
2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government. -
Asymmetric War: a Conceptual Understanding
Asymmetric War: A Conceptual Understanding M R Sudhir The conventional army loses if it does not win. The guerrilla wins if he does not lose. - Henry Kissinger, 1969 The term asymmetric war is a product of the revolution in military affairs (RMA). It can be taken as fresh jargon to distinguish the modern variant from traditional partisan and guerrilla war conducted by irregular bands using unconventional methods. In short, it is nothing new; only the cosmopolitan veneer is so. Since the Indian Army has vast experience dating to the pre- independence period in combating this form of warfare, there is no major cause for concern in being confronted with yet another outbreak of asymmetric warfare within the country or a new Americanism from military schools and think-tanks of a perplexed superpower. While understanding the term asymmetric war, an attempt is made here to see it in the Indian context, and to recommend measures to combat the same. Understanding Asymmetric War Definition The definition of ‘asymmetric warfare’ is best borrowed from the US from where the term has originated. The 1999 Joint Strategy Review specifically defines “asymmetry as something done to military forces to undermine their conventional military strength.” Asymmetric approaches are attempts to circumvent or undermine military strength while exploiting their weaknesses, using methods that differ significantly from the expected method of operations. Colonel M R Sudhir is Commanding Officer of an Engineer Regiment. 58 CLAWS Journal z Summer 2008 ASYMMETRIC WAR: A CONCEPTUAL UNDERSTANDING Such approaches generally seek a major psychological impact, such as shock or confusion that affects an opponent’s initiative, freedom of action, or will. -
Cyber Warfare a “Nuclear Option”?
CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam. -
North Korea: a Chronology of Events from 2016 to 2020
North Korea: A Chronology of Events from 2016 to 2020 May 5, 2020 Congressional Research Service https://crsreports.congress.gov R46349 North Korea: A Chronology of Events from 2016 to 2020 Contents Introduction ..................................................................................................................................... 1 Chronology ...................................................................................................................................... 3 1994 ........................................................................................................................................... 3 1998 ........................................................................................................................................... 3 2003 ........................................................................................................................................... 4 2005 ........................................................................................................................................... 4 2006 ........................................................................................................................................... 4 2007 ........................................................................................................................................... 5 2009 ........................................................................................................................................... 5 2011 .......................................................................................................................................... -
The Washington Times
The Washington Times www.washingtontimes.com Using cues of the past By Arnaud de Borchgrave Published May 10, 2005 From bleeding heart liberals to coldhearted conservative realists, everyone professed shock and awe when Russia's President Vladimir Putin called the breakup of the Soviet Union the greatest geopolitical catastrophe of the 20th century. Yet it was a statement of the obvious. Because that's precisely what it was. No empire in history had collapsed so suddenly and so completely. Millions of Russian citizens found themselves stranded in both the inner empire (the Baltic States and other former Soviet republics) and outer dominion (East Europe, Angola, Cuba, Vietnam), not to mention client states (Libya, Syria, North Korea). The world balance of power, maintained by MAD (Mutual Assured Destruction), was dispelled with the fall of the Berlin Wall. A defeated Soviet army was forced to withdraw from Afghanistan in 1989, and later that year from East Germany and the other former East European satellites. For the satraps in the Kremlin, it was an unmitigated disaster. Millions more at home were out of work and on the dole -- but there was no dole. Armaments plants ground to a halt and nuclear engineers and scientists struggled to survive on $200 a month or less. Russia's nuclear storage depots guarded by security personnel that had not been paid in months. Anything and everything was for sale -- or plunder. Organized crime gangs teamed up with former KGB operatives who used their knowledge of financial conduits abroad to literally plunder the country. Some $220 billion in gold, diamonds, precious metals and other assets moved abroad between 1990 and 1995. -
Unpacking a US Decision to Engage North Korea: What It Entails and What It Could Achieve
Unpacking a US Decision to Engage North Korea: What it Entails and What it Could Achieve Carla Freeman Mel Gurtov April 2018 38 NORTH SPECIAL REPORT About the Authors Carla P. Freeman is Director of the Foreign Policy Institute and Associate Research Professor in China Studies at the School of Advanced International Studies, Johns Hopkins University. She is also Editor-in-Chief of Asian Perspective. Her publications include the edited volume, China and North Korea: Strategic and Policy Perspectives from a Changing China (Palgrave Macmillan, 2015). Mel Gurtov is Professor Emeritus of Political Science at Portland State University and Senior Editor of Asian Perspective. His latest book is Engaging Adversaries: Peacemaking and Diplomacy in the Human Interest (Rowman & Littlefield, 2018). Unpacking a US Decision to Engage North Korea: What it Entails and What it Could Achieve Carla Freeman and Mel Gurtov April 2018 A Third Way? In a report published last January in 38 North, “Unpacking a US Decision to Use Force Against North Korea: Issues, Options, and Consequences,” Robert Jervis assesses the efficacy of using force against North Korea. Jervis cautions against assuming that superior US military and economic capabilities guarantee success in denuclearizing the North. He also underscores the uncertainties attendant to even the limited use of force: actors beyond the United States-North Korea binary will influence outcomes, and how North Korea itself will respond is unpredictable. It would be a mistake, Jervis observes, to “attribute the failure only to a lack of American willingness to be tougher.” Although Jervis’ analysis draws on lessons probably familiar to any US military commander, the White House—notwithstanding the possibility of a Trump-Kim summit meeting in the near future—has surely not abandoned the idea of using the “military option” to force North Korea to cease work on its nuclear arsenal. -
Iran'in Siber Güvenlik Stratejisinin Saldiri Ve
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334583513 İRAN’IN SİBER GÜVENLİK STRATEJİSİNİN SALDIRI VE SAVUNMA KAPASİTESİ BAKIMINDAN ANALİZİ Article in Turkish Studies - Social Sciences · January 2019 DOI: 10.29228/TurkishStudies.22799 CITATIONS READS 0 225 1 author: Ali Burak Darıcılı 35 PUBLICATIONS 21 CITATIONS SEE PROFILE All content following this page was uploaded by Ali Burak Darıcılı on 25 July 2019. The user has requested enhancement of the downloaded file. Turkish Studies Social Sciences Volume 14 Issue 3, 2019, p. 409-425 DOI: 10.29228/TurkishStudies.22799 ISSN: 2667-5617 Skopje/MACEDONIA-Ankara/TURKEY Research Article / Araştırma Makalesi A r t i c l e I n f o / M a k a l e B i l g i s i Received/Geliş: 04.02.2019 Accepted/Kabul: 10.06.2019 Report Dates/Rapor Tarihleri: Referee 1 (15.03.2019)-Referee 2 (11.03.2019)- Referee 3 (18.03.2019) This article was checked by iThenticate. ANALYSIS OF IRAN'S CYBER SECURITY STRATEGY WITH REGARD TO THE ATTACK AND THE DEFENSE CAPACITY Ali Burak DARICILI ABSTRACT The Stuxnet Virus was released in June 2010 and has affected Iran's nuclear facilities in Bushehr and Natanz. It was claimed that the United States of America (USA) and Israel secret services together have a role in the planning of this cyber-attack. Following this cover activity, also known as Operation Olympic Games in the literature, Iran considered the need to take serious measures in the field of cyber security and aimed to reach an effective cyber security capacity in cyber space with the investments made in 2010. -
Situation in the Republic of Korea
Situation in the Republic of Korea Article 5 Report June 2014 www.icc-cpi.int Table of Contents I. EXECUTIVE SUMMARY ....................................................................................................................3 II. INTRODUCTION.................................................................................................................................9 III. CONTEXTUAL BACKGROUND...................................................................................................10 IV. PROCEDURAL HISTORY...............................................................................................................11 V. PRELIMINARY JURISDICTIONAL ISSUES ..................................................................................11 A. Territorial and Temporal Jurisdiction ......................................................................................11 B. Personal Jurisdiction ...................................................................................................................12 VI. LEGAL ANALYSIS – JURISDICTION RATIONE MATERIAE ................................................12 A. The Existence of an Armed Conflict .........................................................................................12 B. The Sinking of the South Korean Warship Cheonan on 26 March 2010..............................14 C. The Shelling of the South Korean Island Yeonpyeong on 23 November 2010 ...................17 1. War crimes of attacking civilians or civilian objects (Articles 8(2)(b)(i) or (ii)) .....................17 -
Andrew Futter Nuclear Weapons .Indd
# 56 VALDAI PAPERS September 2016 www.valdaiclub.com NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY Andrew Futter About the author: Andrew Futter Senior Lecturer in International Politics, Department of Politics and International Relations, University of Leicester ; Fellow of the UK Higher Education Academy The views and opinions expressed in this Paper are those of the author and do not represent the views of the Valdai Discussion Club, unless explicitly stated otherwise. NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY The safe, secure and reliable management of nuclear weapons has always been a complex and complicated business, plagued by uncertainty and risks. But these challenges are being magnified and aggravated by new cyber tools, dynamics and capabilities, and from the threat posed by hackers seeking to gain access to, or interfere with, nuclear systems. The challenge is myriad in its scope, and ranges from the safe, secure and reliable nuclear C2, through fresh problems for information security, proliferation, and the safeguarding of highly sensitive nuclear secrets, to new complications for strategic deterrence and escalation, and the emergence of a cyber-nuclear security dilemma. While cyber threats may not currently undermine or supersede the role of nuclear weapons as the ultimate symbol of national security, increased uncertainty about the integrity and security of these systems raises questions for nuclear force management, thinking and strategy for all nuclear-armed states. The cyber challenge is nuanced and subtle, complicating and obfuscating the intrinsic difficulties of nuclear C2 and nuclear strategy rather than fundamentally transforming them.