Suche senden
Hochladen
The Day After: Preparing to Respond to National Cyber Crises
•
0 gefällt mir
•
313 views
J
Joe Billingsley
Folgen
Originally published with the Atlantic Council.
Weniger lesen
Mehr lesen
Regierungs- und gemeinnützige Organisationen
Melden
Teilen
Melden
Teilen
1 von 7
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
3. DaVinci\'s Horse Part 3
3. DaVinci\'s Horse Part 3
Ed Beakley
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
LeAnn Rhodes
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
CODE BLUE
NY VOST Response to the Second Avenue Building Collapse, East Village, NYC
NY VOST Response to the Second Avenue Building Collapse, East Village, NYC
Joanna Lane
Snowden-final-report-for-publication
Snowden-final-report-for-publication
Zarte Siempre
Understanding Systemic Cyber Risk
Understanding Systemic Cyber Risk
Kirstjen Nielsen
Communicationsand marketingplan summerandfall_2004
Communicationsand marketingplan summerandfall_2004
Tawana Jacobs, APR
Second marcomm plan for The Security Demographic: Population and Civil Confli...
Second marcomm plan for The Security Demographic: Population and Civil Confli...
Tawana Jacobs, APR
Empfohlen
3. DaVinci\'s Horse Part 3
3. DaVinci\'s Horse Part 3
Ed Beakley
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
LeAnn Rhodes
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
[CB20] Is Dis-information more attractive than True-information? : Reduce the...
CODE BLUE
NY VOST Response to the Second Avenue Building Collapse, East Village, NYC
NY VOST Response to the Second Avenue Building Collapse, East Village, NYC
Joanna Lane
Snowden-final-report-for-publication
Snowden-final-report-for-publication
Zarte Siempre
Understanding Systemic Cyber Risk
Understanding Systemic Cyber Risk
Kirstjen Nielsen
Communicationsand marketingplan summerandfall_2004
Communicationsand marketingplan summerandfall_2004
Tawana Jacobs, APR
Second marcomm plan for The Security Demographic: Population and Civil Confli...
Second marcomm plan for The Security Demographic: Population and Civil Confli...
Tawana Jacobs, APR
Cyber security issue part b
Cyber security issue part b
www.StudentsAssignmentHelp.com
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
Connie Uthoff
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Thomas Ewert
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
StevenShepherd15
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
felipaser7p
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
Chikere Uchegbu
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
simisterchristen
CIP Report
CIP Report
Jordan B. Davies
Cyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General Information
atlanticcouncil
Hsl Capstone Project J
Hsl Capstone Project J
jlevy
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
tawnyataylor528
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
David Sweigert
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
KTN
Cyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_general
atlanticcouncil
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Internet Law Center
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
alanfhall8953
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Mark Raduenzel
Education Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docx
SALU18
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
Jason Strickland
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Sareena Khatun
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
NAP Global Network
Weitere ähnliche Inhalte
Ähnlich wie The Day After: Preparing to Respond to National Cyber Crises
Cyber security issue part b
Cyber security issue part b
www.StudentsAssignmentHelp.com
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
Connie Uthoff
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Thomas Ewert
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
StevenShepherd15
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
felipaser7p
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
Chikere Uchegbu
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
simisterchristen
CIP Report
CIP Report
Jordan B. Davies
Cyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General Information
atlanticcouncil
Hsl Capstone Project J
Hsl Capstone Project J
jlevy
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
tawnyataylor528
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
David Sweigert
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
KTN
Cyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_general
atlanticcouncil
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Internet Law Center
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
alanfhall8953
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Mark Raduenzel
Education Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docx
SALU18
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
Jason Strickland
Ähnlich wie The Day After: Preparing to Respond to National Cyber Crises
(20)
Cyber security issue part b
Cyber security issue part b
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
CIP Report
CIP Report
Cyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General Information
Hsl Capstone Project J
Hsl Capstone Project J
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Cyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_general
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Education Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docx
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
Kürzlich hochgeladen
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Sareena Khatun
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
NAP Global Network
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
NAP Global Network
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
piyushsinghrajput913
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Delhi Call girls
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
ScottMeyers35
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
Christina Parmionova
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Scalabrini Institute for Human Mobility in Africa
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Monica Sydney
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
Social Samosa
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
NAP Global Network
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
SERUDS INDIA
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Menggugurkan Kandungan 087776558899
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Global Network
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
arandianics
31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.
Christina Parmionova
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
Christina Parmionova
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
Christina Parmionova
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Just Energy Transition in Coal Regions Knowledge Hub
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
Partito democratico
Kürzlich hochgeladen
(20)
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
The Day After: Preparing to Respond to National Cyber Crises
1.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 1/7 The Day After: Preparing to Respond to National Cyber Crises By J.L. Billingsley Given that all entities are susceptible to being hacked, how will (not would) a federal government like that of the United States respond to the potential compromise of a critical asset like the Global Positioning System (GPS)? For the fourth year in a row, the Atlantic Council has been at the forefront of proactively tackling such cyberrelated national security policy challenges by hosting the Cyber 9/12 Student Challenge. The Military Cyber Professionals Association (MCPA) and its members were honored to recently conclude its second year of direct support to the event. Having served as a reviewer, presenter, and judge at the event, here are some reasons why I look forward to the event’s continued growth. Influencing policy takes time. This event scenario charges each team of four to present policy response options to the National Security Council (NSC). Any national level crisis response requires a reallocation of available resources (money, personnel, intelligence assets, etc.), if not lengthy requests for more resources before Congress. Given the hierarchical nature of policy making and resource allocation within the US government, each echelon involved exacts a delay in responsiveness by applying their own decisionmaking processes. The result is what some in military circles refer to as an elongated “flash to bang time” that increases the risk of failing to achieve the desired response objectives. Simulations, tabletop exercises (TTX), and/or Rehearsal of Concept (ROC) Drills are well known and effective ways to help identify the actions, structures, or capabilities needed to be better poised to respond to the realities of operating in an increasingly dangerous cyberspace environment. While the building of entities like US Cyber Command (USCC) and the National Cybersecurity Center of Excellence (NCCoE) are good examples of national efforts to optimize responses to anticipated challenges, one must consider the dimension of time. While USCC was officially established about seven years ago (not counting a probably lengthy staffing process preceding the final decision and public announcement), its subordinate Cyber Mission Force (CMF) is still years away from being fully built out and ready to effectively serve in its intended role. Anybody who has ever built a team of any type, be it in little league baseball or in Silicon Valley startups, understands that assembling the pieces (personnel, real,
2.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 2/7 estate, equipment, etc.) is only the first step in a long process of making that team effective. The Cyber 9/12 Student Challenge serves as just the type of exercise that gets policy wonks, technologists, and the elusive cyberwonk hybrid to think seriously about such issues and produce innovative solutions well before they are needed. Presentation by team from the US Military Academy at West PointDiversity really matters. This event is exceptionally inclusive, welcoming teams from the Ivy League, completely online schools, military academies, historically black universities, Middle America, and the coasts. The sharp undergraduate competitors, sometimes including teenagers, gave many midcareer graduate students some serious competition. While this article focuses on the American branch of the competition, the Atlantic Council’s Europeanbased competition includes teams from places such as the United Arab Emirates. Such diversity of perspective is not only a good idea, but it is necessary to harvest the best concepts from a greater pool of brainpower. Leveraging insights from science, like the Strength of Weak Ties argument, we can better understand how inclusive events like this draw upon the ideas of groups that may have otherwise never come into contact with one another. Ideas then emerge that can help better inform policy, since there is such a thirst for fresh approaches within the hallowed halls of Congress, the White House, and beyond. We need to remember that the population of personnel within our national security apparatus that are
3.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 3/7 readin to a wide range of nationallevel capabilities (which may have been developed over years of substantial taxpayer investments) is necessarily small, since risk of disclosure (intended or not) increases with each individual. That small population is made further miniscule when considering how many of them actually understand those existing capabilities from a technical grounding and from what is sometimes referred to as “the art of the possible” (requiring years of prior education and experience). Short of actually being readin to such capabilities and knowing the ins and outs of the NSC, this competition incentivizes a broad array of students to consider such scenarios before they find themselves in a position to offer real world solutions. This competition gamifies the process of learning about what may otherwise be seen as somewhat intimidating material. I, and many others, can attest to the real world returns on previous investments made in academia. The beauty of this being a competition for students is that it gives the competitors a level of freedom and time to think about what the correct response should be, instead of being forced to make a quick recommendation in a more operationallyfocused environment surrounded by personnel that value decisiveness and who may have little understanding of technology. Efforts such as the Cyber 9/12 Student Challenge ultimately grow the currently finite pool of personnel that are fluent in the ways of cyberspace, as well as national security policy.
4.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 4/7 Retired Major General John Davis (left) and J. L. Billingsley (right) recognize the “best military team” We are among friends. The widespread support for this event by members of the MCPA is a point of pride in the American military cyber community, as well as clear evidence that the event is consistent with the noble ideals of the MCPA. A sense of great comfort came over me as I took the podium at American University’s School of International Service to congratulate the competition’s “Best Military Team,” since I was surrounded by supportive colleagues, new and old. For example, Major General John Davis (Ret.) not only served as a VIP judge in the final rounds of the event and awarded the “Best Military Team” the Order of Thor medal, he is also a member of the MCPA Board of Advisors and has played a critical role in the organization’s ongoing success. Jay Healey, also an MCPA Advisor, this year served as coach of the team from Columbia University’s School of International and Public Affairs. It was under his leadership as Director of the Atlantic Council’s Cyber Statecraft Initiative that the Cyber 9/12 Student Challenge was first developed.
5.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 5/7 Spectators and judges, including MCPA Chief of Staff Sana Saleh, listen to a presentation Other team coaches included very active MCPA members. For example, the coaches from Air University (Dr. Pano Yannakogeorgos) and Harvard University (Dr. Michael Sulmeyer) have been involved in the production of the MCPA’s peerreviewed journal, Military Cyber Affairs. Two coaches from National Defense University (Dr. Carl Horn and Dr. Alex Crowther) have both played active roles in MCPA outreach activities in our nation’s capital. Compounding the honor of serving as a judge alongside the biggest names in the cyber policy world, other MCPA members served as fellow judges, including Sana Saleh (MCPA Chief of Staff) and Dr. Aaron Brantly (Army Cyber Institute Policy Fellow).
6.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 6/7 Presentation by team from the US Naval Academy at Annapolis With the increased participation of teams from military affiliated schools (including the academies at West Point and Annapolis), this was the first year that the event organizers invited the MCPA to recognize the best military team. True to MCPA traditions, the winners (from Air University) were awarded the coveted Order of Thor medal. This medal is used to recognize excellence in the American military cyber community. The mythological warrior Thor, who adorns the medal, wields the hammer – a tool with the power to both build and destroy, which are characteristics shared by cyberspace.
7.
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises http://www.atlanticcouncil.org/events/pastevents/thedayafterpreparingtorespondtonationalcybercrises 7/7 The winning team from Air University wearing the Order of Thor medal, joined by Jay Healey, retired General Norton Schwartz, and other colleagues Through the Cyber 9/12 Student Challenge, the Atlantic Council has made a true contribution to raising the level of the discussions surrounding cyber conflict. It is increasing the pool of those who have invested real effort in understanding both the relevant technological and policy environments. When considering the ancient truism that people fear what they do not understand, and (as Yoda teaches) fear ultimately leads to suffering, this event may actually lower the risk of unnecessary conflicts. For all the reasons discussed above and more, I look forward to the continued growth of this important effort. J. L. Billingsley is Founder of the MCPA, Advisor of the Cyber Security Forum Initiative, Fellow at the Center for Network Innovation and Experimentation, PhD student at the Naval Postgraduate School Information Sciences Department, a graduate of programs at both the Army and Naval War Colleges, and serves as an officer in the US Army. The views and opinions expressed above are those of the author and are not those of the USG, US Army, or any other organization. All images are courtesy of the Atlantic Council photographer, Nuri Jeon. COUNCIL IN THE NEWS April 7, 2016
Jetzt herunterladen