North Korea’s military “uses tactics based on former Soviet or current Russian doctrine, Chinese developments, lessons learned, and observation of recent military actions,” according to a new US Army manual on the subject.
“While North Korea maintains large amounts of military equipment, much of it is outdated making it quantitatively superior to most armies but qualitatively inferior,” the new manual said. See North Korean Tactics, Army Techniques Publication (ATP) 7-100.2, 24 July 2020.
But North Korea has proved resourceful in other areas, including offensive cyber warfare.
“The primary organization responsible for computer warfare in North Korea is Bureau 121, which fielded at least 1,000 elite hackers in 2010 who focused on other countries’ computer systems. This number is likely much higher now” and includes “cyberspace teams [deployed] in foreign countries.”
And not least of all, “The country’s possession of a nuclear arsenal and its pursuit of missile technology are attempts to ensure that external powers do not interfere with its internal affairs for fear of a nuclear reprisal,” the Army manual said.
“North Korea is constantly adapting and evolving its capabilities,” the Army said.
FAS today released permitting policy recommendations to improve talent and technology in the federal permitting process. These recommendations will address the sometimes years-long bottlenecks that prevent implementation of crucial projects, from energy to transportation.
The United States faces urgent challenges related to aging infrastructure, vulnerable energy systems, and economic competitiveness. But the permitting workforce is unprepared to implement changes. Here’s how they can improve.
S.325 would establish a clear, sustained federal governance structure for extreme heat by bringing all responsible agencies together to coordinate planning, preparedness, and response, a key recommendation of FAS’ 2025 Heat Policy Agenda.
In an industry with such high fixed costs, the Chinese state’s subsidization gives such firms a great advantage and imperils U.S. competitiveness and national security. To curtail Chinese legacy chip dominance, the United States should weaponize its monopoly on electronic design automation software.