In Strategic Latency and World Power: How Technology

Total Page:16

File Type:pdf, Size:1020Kb

In Strategic Latency and World Power: How Technology i Strategic Latency and World Power: How Technology Is Changing Our Concepts of Security Edited by Zachary Davis, Lawrence Livermore National Laboratory Michael Nacht, University of California, Berkeley Ronald Lehman, Lawrence Livermore National Laboratory Published by Lawrence Livermore National Laboratory Center for Global Security Research, L-189 7000 East Avenue Livermore, CA 94550 Copyright 2014 Lawrence Livermore National Laboratory. The entire contents of this publication are protected by copyright. All rights reserved ISBN: 978-0-9960966-0-7 About the cover: The cover is a frieze painted by Giulio Parigi around 1600, from the Galleria degli Uffizi in Florence, Italy, depicting the legendary use of a system of mirrors designed by Archimedes to focus sunlight intended to burn up Roman ships invading the Greek city-state of Syracuse in 213 B.C. While the military history of Archimedes' directed energy weapon remains in question, the painting illustrates how technological innovation translates into strategic latency. To download the ebook: See cgsr.llnl.gov ii Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the U.S. Department of Energy, National Nuclear Security Administration under Contract DE-AC52- 07NA27344. This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-652195 iii Acknowledgements The idea for this book came from a meeting of the minds between Ron Lehman and Larry Gershwin, who are the godfathers of strategic latency. They had been thinking on parallel tracks about the accelerating pace of technological progress and its implications for national security. Separately, they had probed government, industry, and academia to assess the technologies with the highest potential to bring revolutionary change. Both had assembled a cadre of experts to track and analyze strategic latency. I attended that initial meeting as one of Ron’s acolytes and was introduced to Larry’s deputy Frank Gac, who became my partner in developing the concepts and applications behind strategic latency. We found our third collaborator in Michael Nacht, who had recently returned to the University of California, Berkeley, after leading the government’s reviews of nuclear and cyber policies in his capacity as assistant secretary of defense. Michael, a highly respected scholar, took our ideas to a whole new level. Although researchers have different names for what we call strategic latency, such as technological surprise, emerging and disruptive technologies, a community of like-minded experts scattered throughout government agencies, think tanks, academia, national laboratories, and the private sector share a belief in the transformative power of emerging technologies—for better and for worse. This group of technical and policy analysts provided the intellectual fuel for the series of workshops that culminated in this book. The members of this diverse group are united in their belief in the need for a concerted national effort to meet the challenges of strategic latency. We hope this book amplifies their message about the need for the U.S. to sustain its global competitiveness in science and technology. Managers at Lawrence Livermore and Los Alamos national laboratories and the National Intelligence Council gave us enough rope to either hang ourselves or successfully lash together a coherent story from a disparate collection of people and ideas. We hope we have achieved the latter. Z program director Nils Carlson at Lawrence Livermore, himself a former Gershwin deputy, consistently encouraged our efforts. Deputy national intelligence officer Rhonda Anderson provided many examples of latent technologies, Brian Shaw from National Intelligence University was ahead of us at every turn, and Tom Tierney at Los Alamos worked hard to keep government agencies up to speed. Steve Black and his deputies at the Department of Energy’s Office of Intelligence do their utmost to support research into latency issues. Center for Global Security Research (CGSR) Director Bruce Goodwin and his deputy Mona Dreicer made it possible to bring the manuscript to completion. Sandra Maldonado kept the trains and planes running on time, Paris Althouse added firepower in the late innings, and CGSR fellows Jonathan Pearl, Bob Smolen, Eileen Vergino, Bob Schock, and Don Prosnitz aided and abetted the latency project, while Bob Joseph and Neil Joeck kept us (more or less) tethered to reality. The journal Orbis took a leap of faith by publishing my initial article on strategic latency in its winter 2012 issue. My students at the Naval Postgraduate School in Monterey brought their military experience to bear on the prospects for technological change in the ways of modern warfare. Fate smiled on us when Lawrence Livermore science writer Katie Walter agreed to edit the volume. Her discerning eye for language, expansive technical knowledge, patience, and enthusiasm provided the glue that turned a bunch of interesting papers into a coherent book. The central place of uncertainty in this endeavor increases the likelihood that errors and misunderstandings will emerge at some point. Since I am the one who coaxed the authors out on this limb, it is I who must take responsibility for any and all mistakes. — Zachary Davis iv Foreword Strategic latency: What does this mean? That was the question we asked ourselves when Ron Lehman and Zachary Davis requested a meeting with us in November 2009. They promptly explained, “Strategic latency refers to the inherent capacity of science and technology to produce game-changing threats to our national security. .The potential for a technology to cause harm is often ‘latent’ until an adversary uses it for military purposes.” Thus began a multiyear journey working together to further define, explore, and explain what strategic latency means to an intelligence officer, a warfighter, an entrepreneur, a scientist, an economist, and others. This book is a grand endeavor that represents an important milestone along that journey, a journey which is ongoing. Nonetheless, we use this foreword to provide a snapshot. We start by asking the question again: What is strategic latency? By choice, our answer is framed by science and technology because history shows us the combination brings change. With that in mind, our response is: Strategic latency refers to the inherent potential for technologies to bring about significant shifts in the military or economic balance of power. Such potential may remain unexploited or even unrecognized, and thus latent, until a combination of factors coalesce to produce a powerful capability. This list of contributing factors can be extensive but generally three rise to the top: national security, economics, and human welfare. Note that the ultimate result is a shift in power. Thus, one must understand the many manifestations of power to have a thorough appreciation for the role of strategic latency. It is for this reason the book begins with an introduction entitled, “What Is Power?” The authors then embark on an elaboration of strategic latency, including drawing lessons from the history of nuclear proliferation. This introduction is followed by an insightful investigation of current-day technology case studies, with a focus on lasers, cyber, and additive manufacturing. The final chapter of the book is devoted to case studies of various countries, in which the authors engaged experts to provide a thought-provoking sampling across the innovation spectrum, in the form of Turkey, Brazil, Republic of Korea, Russia, Japan, and China. Why is the concept of strategic latency important? Many of us would like to predict the future. Knowledge of the future would enable us to prepare or even avoid some problems. At a national level, such problems might consist of military conflict, a pandemic, or economic disruption. Strategic latency, framed in science and technology, can give us insights and thus options for the future. Those insights can foster innovation, help mitigate vulnerabilities, or catalyze a new application of existing technology. Strategic latency is not the end-all as one attempts to predict disruptive technology and emerging threats. However, it is a valuable tool, and perhaps an overarching philosophy for attacking the problem. The authors are to be commended in taking this first step at capturing this philosophy in book form. —Lawrence K. Gershwin and Frank D. Gac1 1 Lawrence Gershwin is with the Office of the Director of National Intelligence and Frank Gac is with Los Alamos National Laboratory. v Table of Contents
Recommended publications
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Nuclear Deterrence in the Information Age?
    SUMMER 2012 Vol. 6, No. 2 Commentary Our Brick Moon William H. Gerstenmaier Chasing Its Tail: Nuclear Deterrence in the Information Age? Stephen J. Cimbala Fiscal Fetters: The Economic Imperatives of National Security in a Time of Austerity Mark Duckenfield Summer 2012 Summer US Extended Deterrence: How Much Strategic Force Is Too Little? David J. Trachtenberg The Common Sense of Small Nuclear Arsenals James Wood Forsyth Jr. Forging an Indian Partnership Capt Craig H. Neuman II, USAF Chief of Staff, US Air Force Gen Norton A. Schwartz Mission Statement Commander, Air Education and Training Command Strategic Studies Quarterly (SSQ) is the senior United States Air Force– Gen Edward A. Rice Jr. sponsored journal fostering intellectual enrichment for national and Commander and President, Air University international security professionals. SSQ provides a forum for critically Lt Gen David S. Fadok examining, informing, and debating national and international security Director, Air Force Research Institute matters. Contributions to SSQ will explore strategic issues of current and Gen John A. Shaud, PhD, USAF, Retired continuing interest to the US Air Force, the larger defense community, and our international partners. Editorial Staff Col W. Michael Guillot, USAF, Retired, Editor CAPT Jerry L. Gantt, USNR, Retired, Content Editor Disclaimer Nedra O. Looney, Prepress Production Manager Betty R. Littlejohn, Editorial Assistant The views and opinions expressed or implied in the SSQ are those of the Sherry C. Terrell, Editorial Assistant authors and should not be construed as carrying the official sanction of Daniel M. Armstrong, Illustrator the United States Air Force, the Department of Defense, Air Education Editorial Advisors and Training Command, Air University, or other agencies or depart- Gen John A.
    [Show full text]
  • The Cio's Guide to Quantum Computing
    THE CIO’S GUIDE TO QUANTUM COMPUTING November 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING TABLE OF CONTENTS 3 Introduction 3 Quantum computers are coming. Get ready for them to change everything 10 Research: Quantum computing will impact the enterprise, despite being misunderstood 12 What is quantum computing? Understanding the how, why and when of quantum computers 23 Quantum computing has arrived, but we still don’t really know what to do with it 26 CIO Jury: How quantum computing will affect the enterprise 28 Quantum computing: Five ways you can get involved 31 Quantum computers could soon reveal all of our secrets. The race is on to stop that happening 36 8 companies leading in quantum computing endeavors in 2020 41 What classic software developers need to know about quantum computing 50 Quantum computing meets cloud computing: D-Wave says its 5,000-qubit system is ready for business 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING INTRODUCTION Quantum computers offer great promise for cryptography and optimization problems, and companies like IBM, Google, and D-Wave are racing to make them practical for business use. This special feature from TechRepublic and ZDNet explores what quantum computers will and won’t be able to do and the challenges we still face. QUANTUM COMPUTERS ARE COMING. GET READY FOR THEM TO CHANGE EVERYTHING Quantum computers are not yet creating business value, but CIOs should nonetheless lose no time in getting involved. BY DAPHNE LEPRINCE-RINGUET/ZDNET Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
    [Show full text]
  • A Player's Guide Part 1
    A Player’s Guide Effective: 9/20/2010 Items labeled with a are available exclusively through Print-and-Play Any page references refer to the HeroClix 2010 Core Rulebook Part 1 – Clarifications Section 1: Rulebook 3 Section 2: Powers and Abilities 5 Section 3: Abilities 9 Section 4: Characters and Special Powers 11 Section 5: Special Characters 19 Section 6: Team Abilities 21 Section 7: Alternate Team Abilities 23 Section 8: Objects 25 Section 9: Maps 27 Part 2 – Current Wordings Section 10: Powers 29 Section 11: Abilities 33 Section 12: Characters and Special Powers 35 Section 13: Team Abilities 71 Section 14: Alternate Team Abilities 75 Section 15: Objects 77 Section 16: Maps 79 How To Use This Document This document is divided into two parts. The first part details every clarification that has been made in Heroclix for all game elements. These 40 pages are the minimal requirements for being up to date on all Heroclix rulings. Part two is a reference guide for players and judges who often need to know the latest text of any given game element. Any modification listed in part two is also listed in part one; however, in part two the modifications will be shown as fully completed elements of game text. [This page is intentionally left blank] Section 1 Rulebook at the time that the player gives the character an action or General otherwise uses the feat.‖ Characters that are removed from the battle map and placed Many figures have been published with rules detailing their on feat cards are not affected by Battlefield Conditions.
    [Show full text]
  • Threat, Authoritarianism, and Depictions of Crime, Law, and Order in Batman Films Brandon Bosch University of Nebraska-Lincoln, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Sociology Department, Faculty Publications Sociology, Department of 4-2-2016 “Why So Serious?” Threat, Authoritarianism, and Depictions of Crime, Law, and Order in Batman Films Brandon Bosch University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/sociologyfacpub Part of the Criminal Law Commons, Criminology Commons, Family, Life Course, and Society Commons, Public Affairs, Public Policy and Public Administration Commons, and the Social Control, Law, Crime, and Deviance Commons Bosch, Brandon, "“Why So Serious?” Threat, Authoritarianism, and Depictions of Crime, Law, and Order in Batman Films" (2016). Sociology Department, Faculty Publications. 287. http://digitalcommons.unl.edu/sociologyfacpub/287 This Article is brought to you for free and open access by the Sociology, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Sociology Department, Faculty Publications by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. VOLUME 17, ISSUE 1, PAGES 37–54 (2016) Criminology, Criminal Justice Law, & Society E-ISSN 2332-886X Available online at https://scholasticahq.com/criminology-criminal-justice-law-society/ “Why So Serious?” Threat, Authoritarianism, and Depictions of Crime, Law, and Order in Batman Films Brandon Bosch University of Nebraska-Lincoln A B S T R A C T A N D A R T I C L E I N F O R M A T I O N Drawing on research on authoritarianism, this study analyzes the relationship between levels of threat in society and representations of crime, law, and order in mass media, with a particular emphasis on the superhero genre.
    [Show full text]
  • Platinum Sponsor
    We like to thank the Department of Biotechnology (Government of India) for financial support. We like to thank our sponsors for financial support: Platinum Sponsor: Gold Sponsor: Silver Sponsors: And Program Date Venue Timings Title OF MUSIC, MATH AND MEASUREMENT LH1 6pm M.W. Linscheid, Humbold Universitaet Berlin, Germany Dining Mixer 23/08 7pm Complex Concert by Ananth Menon Quartet Dining 8pm Dinner Complex LH1 9:00am Tutorial I MASS SPECTROMETRIC ESSENTIALS IN OMICS RESEARCH D.Schwudke LH1 9:30am Session I / Proteomics (Chair D. Schwud ke) MASS SPECTROMETRIC IDENTIFICATION OF A NOVEL TRANS- SPLICING EVENT IN GIARDIA LAMBLIA HEAT SHOCK PROTEIN 90 U.S. Tatu, IISC Bangalore, India REVISITING PROTEOMICS OF GLIOMAS: DIFFERENTIAL MEMBRANE PROTEINS AND MOLECULAR INSIGHTS R. Sirdeshmukh, IOB Bangalore, India NEW HIGH SELECTIVITY WORKFLOWS FOR TARGETED QUANTITATIVE PROTEOMICS 24/08 M. Cafazzo, AB Sciex, US Break ABSOLUTE QUANTIFICATION OF PROTEINS AND PEPTIDES - USE OF METAL CODING AND LC/MS WITH ICP AND ELECTROSPRAY M.W. Linscheid, Humbold Universitaet Berlin, Germany MATERNAL VITAMIN B12 DEFICIENCY INDUCED ALTERATION IN PROTEIN EXPRESSION IN RAT OFFSPRING S. Sengupta, IGIB New Dehli, India CLINICAL PROTEOMICS OF EYE DISEASES K. Dharmalingam, Madurai Kamaraj University, India Dining 1pm Lunch Complex Ope n 2pm Poster Session I Deck Date Venue Timings Title LH1 4pm Session II / Lipidomics (Chair S. Hebbar ) TOWARDS THE COMPLETE STRUCTURE ELUCIDATION OF COMPLEX LIPIDS BY MASS SPECTROMETRY: NOVEL APPROACHES TO ION ACTIVATION S. Blanksby et al., University of Wollongong, Australia LIPIDOMICS AT THE HIGH MASS RESOLUTION A. Shevchenko, MPI-CBG Dresden, Germany STRATEGIES FOR IMAGING BIOMOLECULES BY TOF-SIMS AND MALDI-TOF/TOF MASS SPECTROMETRY O.
    [Show full text]
  • Monday Evening Television
    DIARIES AJAMA P THE ERNEST & FRANK WORTH Y MAR FRIENDS BETWEEN BIZARRO OOP ALLEY LEE EDISON OF MIND BRILLIANT Monday Evening Television 6:00 6:30 7:00 7:30 8:00 8:30 9:00 9:30 10:00 10:30 11:00 11:30 12:00 2 News at 6:00pm Entertainment To- Kevin Can Wait: Man With a 2 Broke Girls (N) The Odd Couple: I Scorpion: Bat Poop Crazy. The team 2 News at (10:37) The Late Show With Stephen (11:39) The Late Late Show With KUTV (N) (CC) night (N) (s) (CC) Hallow-We-Ain’t- Plan (N) (s) (CC) (s) (CC) (TV14) Kid, You Not. (N) investigates a bat population. (N) (s) 10:00pm (N) (CC) Colbert: Ruth Wilson; J.B. Smoove. James Corden: Harry Connick Jr.; Home. (N) (TVPG) (TVPG) (TVPG) (CC) (TV14) (N) (s) (TVPG) Alice Eve. (N) (s) (CC) (TV14) ABC 4 Utah News Inside Edition (N) Dancing With the Stars: Halloween-themed routines. (N Same-day Tape) (s) (9:01) All Access Nashville: Celebrat- ABC 4 Utah News (10:35) Jimmy Kimmel Live (N) (s) (11:37) Nightline (12:07) Access KTVX at 6pm (N) (s) (CC) (TVPG) (CC) (TVPG) ing the CMA Awards With Robin at 10pm (N) (CC) (TV14) (N) (CC) (TVG) Hollywood (N) (s) Roberts (N) (s) (CC) (CC) (TVPG) KSL 5 News at 6p KSL 5 News at The Voice: The Knockouts, Part 3. Artists perform for the coaches. (N) (s) (9:01) Timeless: The Alamo. The KSL 5 News at 10 (10:34) The Tonight Show Starring (11:37) Late Night With Seth Meyers: KSL (N) (CC) 6:30p (CC) (CC) (TVPG) team is stranded inside the Alamo.
    [Show full text]
  • ASNE “A Vision of Directed Energy Weapons in the Future”
    A Vision for Directed Energy and Electric Weapons In the Current and Future Navy Captain David H. Kiel, USN Commander Michael Ziv, USN Commander Frederick Marcell USN (Ret) Introduction In this paper, we present an overview of potential Surface Navy Directed Energy and Electric Weapon (DE&EW) technologies being specifically developed to take advantage of the US Navy’s “All Electric Warship”. An all electric warship armed with such weapons will have a new toolset and sufficient flexibility to meet combat scenarios ranging from defeating near-peer competitors, to countering new disruptive technologies and countering asymmetric threats. This flexibility derives from the inherently deep magazines and simple, short logistics tails, scalable effects, minimal amounts of explosives carried aboard and low life cycle and per-shot costs. All DE&EW weaponry discussed herein could become integral to naval systems in the period between 2010 and 2025. Adversaries Identified in the National Military Strategy The 2004 National Military Strategy identifies an array of potential adversaries capable of threatening the United States using methods beyond traditional military capabilities. While naval forces must retain their current advantage in traditional capabilities, the future national security environment is postulated to contain new challenges characterized as disruptive, irregular and catastrophic. To meet these challenges a broad array of new military capabilities will require continuous improvement to maintain US dominance. The disruptive challenge implies the development by an adversary of a breakthrough technology that supplants a US advantage. An irregular challenge includes a variety of unconventional methods such as terrorism and insurgency that challenge dominant US conventional power.
    [Show full text]
  • Chapter 2 HISTORY and DEVELOPMENT of MILITARY LASERS
    History and Development of Military Lasers Chapter 2 HISTORY AND DEVELOPMENT OF MILITARY LASERS JACK B. KELLER, JR* INTRODUCTION INVENTING THE LASER MILITARIZING THE LASER SEARCHING FOR HIGH-ENERGY LASER WEAPONS SEARCHING FOR LOW-ENERGY LASER WEAPONS RETURNING TO HIGHER ENERGIES SUMMARY *Lieutenant Colonel, US Army (Retired); formerly, Foreign Science Information Officer, US Army Medical Research Detachment-Walter Reed Army Institute of Research, 7965 Dave Erwin Drive, Brooks City-Base, Texas 78235 25 Biomedical Implications of Military Laser Exposure INTRODUCTION This chapter will examine the history of the laser, Military advantage is greatest when details are con- from theory to demonstration, for its impact upon the US cealed from real or potential adversaries (eg, through military. In the field of military science, there was early classification). Classification can remain in place long recognition that lasers can be visually and cutaneously after a program is aborted, if warranted to conceal hazardous to military personnel—hazards documented technological details or pathways not obvious or easily in detail elsewhere in this volume—and that such hazards deduced but that may be relevant to future develop- must be mitigated to ensure military personnel safety ments. Thus, many details regarding developmental and mission success. At odds with this recognition was military laser systems cannot be made public; their the desire to harness the laser’s potential application to a descriptions here are necessarily vague. wide spectrum of military tasks. This chapter focuses on Once fielded, system details usually, but not always, the history and development of laser systems that, when become public. Laser systems identified here represent used, necessitate highly specialized biomedical research various evolutionary states of the art in laser technol- as described throughout this volume.
    [Show full text]
  • AKDENİZ ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ Abdullah
    AKDENİZ ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ Abdullah KÜTÜK DEMOKRATİK HUKUK DEVLETİ ve HÜKÜMET SİSTEMLERİ PERSPEKTİFİNDEN TÜRK ANAYASAL TARİHİNDE CUMHURBAŞKANLIĞI Kamu Hukuku Ana Bilim Dalı Yüksek Lisans Tezi Antalya, 2012 AKDENİZ ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ Abdullah KÜTÜK DEMOKRATİK HUKUK DEVLETİ ve HÜKÜMET SİSTEMLERİ PERSPEKTİFİNDEN TÜRK ANAYASAL TARİHİNDE CUMHURBAŞKANLIĞI Danışman Yrd. Doç. Dr. İbrahim Uğur ESGÜN Kamu Hukuku Ana Bilim Dalı Yüksek Lisans Tezi Antalya, 2012 Akdeniz Universitesi Sosyal Bilimler Enstitiisii MiidiiLrltiliine, Abdullah KUTOK'ffn bu gahgmasr jtirimiz tarafindan Kamu Huhrku Ana Bilim Dah Yiiksek Lisans Programt tezi olarak kabul edilmigtir. Baekan()q4rprc^tl) i ttq* tu6[]N hJ.a"q.o.. Yy-- Ar"rJ ro&U Uye(Brnlqneer) ' VrJ'O'c'&-' 1J"'li',l- YTLNAL uy" ' wJ.Drc,.bf ' ?kit.^.ef 9\{"-'{"'"; rezBaelrg: be,^-Vr-h\- "Xrir* bQ,hh vq T-rsr'vrdz C'^t'*$"!'"$ P<rs5ekh(.'oAen f:-fu' A^^"Y/>^t Onay : Yukandaki imzalann, adr gegen 6$etim iiyelerine ait oldulunu onaylanm. Tez Savunma Tarlrri Ut.tOAtzotz MezuniyetTarihi :l*6.tZOtZ Prof.Dr. Mehmet $EN Miidiir İ Ç İ N D E K İ L E R K I S A L T M A L A R L İ S T E S İ .................................................................................. iv Ö Z E T ..................................................................................................................................... vi S U M M A R Y ....................................................................................................................... vii G İ R İ Ş ....................................................................................................................................
    [Show full text]
  • Assuring South Korea and Japan As the Role and Number of U.S. Nuclear Weapons Are Reduced
    Assuring South Korea and Japan as the Role and Number of U.S. Nuclear Weapons are Reduced Michael H. Keifer, Project Manager Advanced Systems and Concepts Office Defense Threat Reduction Agency Prepared by Kurt Guthe Thomas Scheber National Institute for Public Policy January 2011 The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government. This report is approved for public release; distribution is unlimited. Defense Threat Reduction Agency Advanced Systems and Concepts Office Report Number ASCO 2011 003 Contract Number MIPR 10-2621M The mission of the Defense Threat Reduction Agency (DTRA) is to safeguard America and its allies from weapons of mass destruction (chemical, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate, and counter the threat, and mitigate its effects. The Advanced Systems and Concepts Office (ASCO) supports this mission by providing long-term rolling horizon perspectives to help DTRA leadership identify, plan, and persuasively communicate what is needed in the near term to achieve the longer-term goals inherent in the agency’s mission. ASCO also emphasizes the identification, integration, and further development of leading strategic thinking and analysis on the most intractable problems related to combating weapons of mass destruction. For further information on this project, or on ASCO’s broader research program, please contact: Defense Threat Reduction Agency Advanced Systems and Concepts Office 8725 John J. Kingman Road Ft. Belvoir, VA 22060-6201 [email protected] Table of Contents Introduction......................................................................................................................
    [Show full text]
  • Schedule of Investments November 30, 2020 (Unaudited)
    GOLDMAN SACHS EQUAL WEIGHT U.S. LARGE CAP EQUITY ETF Schedule of Investments November 30, 2020 (Unaudited) Shares Description Value Shares Description Value Common Stocks – 99.8% Common Stocks – (continued) Communication Services – 5.3% Consumer Discretionary – (continued) 10,210 Activision Blizzard, Inc. $ 811,491 11,013 D.R. Horton, Inc. $ 820,468 462 Alphabet, Inc., Class A* 810,533 20,791 DraftKings, Inc., Class A*(a) 1,088,617 462 Alphabet, Inc., Class C* 813,462 16,903 eBay, Inc. 852,418 28,271 Altice USA, Inc., Class A* 958,952 5,977 Etsy, Inc.* 960,504 29,863 AT&T, Inc. 858,561 8,123 Expedia Group, Inc. 1,011,232 434 Cable One, Inc. 859,611 104,432 Ford Motor Co. 948,243 92,741 CenturyLink, Inc. 969,143 7,293 Garmin Ltd. 851,531 1,275 Charter Communications, Inc., Class A* 831,287 22,939 General Motors Co. 1,005,646 18,388 Comcast Corp., Class A 923,813 8,360 Genuine Parts Co. 822,373 6,474 Electronic Arts, Inc.* 827,053 9,720 Hasbro, Inc. 904,252 2,847 Facebook, Inc., Class A* 788,534 8,497 Hilton Worldwide Holdings, Inc. 880,544 6,248 IAC/InterActiveCorp* 887,153 2,853 Home Depot, Inc. (The) 791,451 5,448 Liberty Broadband Corp., Class C* 857,243 15,994 Las Vegas Sands Corp. 891,026 6,389 Match Group, Inc.* 889,413 10,319 Lennar Corp., Class A 782,799 1,623 Netflix, Inc.* 796,406 4,798 Lowe’s Cos., Inc. 747,624 17,002 Omnicom Group, Inc.
    [Show full text]