Transcript Document
Scenario
A devastating cyber attack has been launched
against the United States, injecting viruses that
have effectively shut down the U.S. power grid
and debilitated the economy. The geographical
source of the attack is North Korea, yet it is
highly suspected that the originator of the
attack is China. How will the United States
respond? But there is moreā¦
Scenario Cont.
China did not order the attack. The attack was
conducted by a third party, non-state actor
(TBD). China and the third party are the only
ones who know this fact.
The Teams and Their Problems
1. United States: Seeks justice for attack yet is uncertain who is responsible. Every sub-group has
conflicting opinions.
A.
The Government (NSC, Press Secretary): Responsible for collecting data and making
decisions as to the appropriate response for the attack. Convinced that the attack is a
Chinese state-sponsored event. The conduct of press conferences.
B.
The People (Congress, Press, Citizens): Responsible for questioning the actions of the
government (keeping them in check). Positions include armed conflict, cyber retaliation,
and none of the above.
2. China: Does not want to be retaliated against yet does not want to look weak in front of allies/
adversaries. They know that they are not responsible for the attack.
A.
Politburo: Responsible for managing the responses of the United States. Knows who is
responsible for the attack.
B.
Foreign Minister: Responsible for liaison between China and the United States.
C.
Central Military Committee: Military decision-making body of China.
3. North Korea: Balances Chinese support with US threats of military retaliation. Thinks China is not
behind the attack yet does not want to be attacked by the United States.
4. UN/ Japan/ South Korea: Responsible for managing their interests with the US and China. Want to
find a solution to the problem that does not hurt their interests.
5. White Cell: Backside support.
Recommended Teams (Number of PAX per position).
1. US
A. The Government
National Security Council
-President
-Vice President
-Secretary of State
-Secretary of defense
-National Security Advisor
-Secretary of the Treasury
-Chairman of the JCS
-Director of National Intelligence
-Asst. for Economic Policy
-Director CIA
-Attorney General
-Press Secretary (Serves as liaison between the
"Government" and "The People".
B. The People
-Congress
-Press
-Citizens
2. CHINA
A. Politburo
B. Foreign Minister
C. Central Military Commission
-Chairman of State CMC
-Chairman of Political CMC
3. North Korea
US Allies (all together in one group?)
4. UN (6)
5. Japan (2)
6. South Korea (2)
7. White Cell
Optional
8. Non-State Actor who initiated the attack.
Play
-All teams will be given special instructions which will outline the parameters of their
sentiments, best-case outcomes, and goals. For instance, China's goals include
convincing the US that they are not responsible and avoiding retaliation for an action
which they are not responsible. NATO's ultimate goal is to avoid conflict, etc.
-Play will take the form of planning for feasible options for retaliation (kinetic vs. nonkinetic) for both the US and China. Plans are discussed in a series of internal meetings
within the teams and in meetings between the groups.
-Face to face diplomatic discussions between the countries and the sub-groups of the
United States. No written products are required although they may be utilized.
-Can result in all out war, a peaceful negotiation, US domestic rebellion, or somewhere
or nowhere in between.
-Not about the technical aspect of a cyber attack- Incorporates crisis planning at a
strategic level, negotiations, problem-solving, conflict resolution, and introduces
players to a feasible problem that may take place in the near future.
Questions?