North Korea's Cyber Operations

North Korea's Cyber Operations

Author: Jenny Jun

Publisher: Rowman & Littlefield

ISBN: 9781442259034

Category: Political Science

Page: 106

View: 621

Get eBOOK →
This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

Confronting an "Axis of Cyber"?

Confronting an

Author: Fabio Rugge

Publisher: Ledizioni

ISBN: 9788867058679

Category: Political Science

Page: 180

View: 582

Get eBOOK →
The new US National Cyber Strategy points to Russia, China, North Korea and Iran as the main international actors responsible for launching malicious cyber and information warfare campaigns against Western interests and democratic processes. Washington made clear its intention of scaling the response to the magnitude of the threat, while actively pursuing the goal of an open, secure and global Internet. The first Report of the ISPI Center on Cybersecurity focuses on the behaviour of these “usual suspects”, investigates the security risks implicit in the mounting international confrontation in cyberspace, and highlights the current irreconcilable political cleavage between these four countries and the West in their respective approaches “in and around” cyberspace.

North Korea's Cyber Proxy Warfare

North Korea's Cyber Proxy Warfare

Author: Donghui Park

Publisher:

ISBN: OCLC:1114634036

Category:

Page: 306

View: 577

Get eBOOK →
North Korea has been viewed as the world's most reclusive, repressive, and isolated country for the last 70 years. However, contrary to its undeveloped image, since the late 2000s, several governments, mainly the U.S. and South Korea, as well as global private cybersecurity companies, have attributed some of the massive and complicated cyberattacks to the North Korean regime. Even, since 2014, the U.S. Intelligence Community's annual report, Worldwide Threat Assessment of the U.S. Intelligence Community, has stated that North Korea is one of the four primary nation-state actors in cyberspace who threaten the national security of the United States and its allies, along with Russia, China, and Iran. This paradox prompts the central question of this dissertation: why and how did North Korea become a world-class cyber-threat actor? This dissertation is composed of three independent, but thematically-linked empirical studies, replying to the central question. The first study (chapter 2) seeks to bridge the gap between North Korea's undeveloped image and cyber reality. It contends that contrary to its image as a backward country, North Korea has sufficient IT infrastructure and human capital to conduct hostile cyberoperations against the outside world in order to attain its national goals. The second study (chapter 3) is an empirical analysis of North Korea's cyber strategy. It argues that North Korea's cyber-proxy-warfare strategy enables its cyber-warriors to accomplish aggressive cyber-missions while North Korean hackers keep a distance from their state sponsor, North Korea. The last study (Chapter 4) seeks to understand the influence of North Korea's cyber uncertainty on regional and world security dynamics. It illustrates that through the North Korea case, the impact of cyber buildup can be seen as the same as that of conventional military buildup. When combined, these three studies provide insight into the central question of this dissertation about why and how North Korea became a world-class cyber-threat actor. The Kim dictator family has understood the importance and impact of developing cybercapacity for their survival in security and military areas. North Korea has started to conduct massive and complicated cyberoperations through a proxy-warfare strategy which enables the state to deny its responsibility for those operations. Sufficient IT human capital from state-led intensive education systems is at the core of North Korea0́9s aggressive cyberoperations; this, in turn, threatens the national security of other countries and changes regional security dynamics.

Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity

Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity

Author: Journal of Law and Cyber Warfare

Publisher: Lulu.com

ISBN: 9781312794917

Category: Computer security

Page: 141

View: 430

Get eBOOK →
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.

North Korean Strategic Strategy

North Korean Strategic Strategy

Author: Jennifer J. Erlendson

Publisher:

ISBN: OCLC:841487903

Category: Cyberterrorism

Page: 168

View: 229

Get eBOOK →
Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.' technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.' reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004. Although NK is the likely culprit in the attacks, there is no forensic evidence to definitively identify NK as the attacker. Keywords: Cybersecurity, Professor Draz, North Korea, Kim Jong Un, Kim Jong Il, Cyber

Cyberwarfare

Cyberwarfare

Author: Kristan Stoddart

Publisher: Springer Nature

ISBN: 9783030972998

Category: Social Science

Page: 550

View: 108

Get eBOOK →
This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).

North Korea's Foreign Policy

North Korea's Foreign Policy

Author: Scott Snyder

Publisher: Rowman & Littlefield

ISBN: 9781538160312

Category: Korea (North)

Page: 305

View: 971

Get eBOOK →
Bringing together a wide range of distinguished scholars, this book provides a comprehensive analysis of Kim Jong Un's foreign policy strategy and its global impact, following a decade under Kim Jong Un's rule and his audacious plan to make North Korea a strong and powerful state through both economic reforms and nuclear and missile testing.

People's Army: The Military Power of North Korea

People's Army: The Military Power of North Korea

Author: Andrew Scobell

Publisher: e-artnow

ISBN: EAN:4064066398750

Category: Political Science

Page: 299

View: 817

Get eBOOK →
North Korea is a country of paradoxes and contradictions. Although it remains an economic basket case that cannot feed and clothe its own people, it nevertheless possesses one of the world's largest armed forces. This book provides the facts regarding the true force of North Korean Army and gives an assessment of its capability to harm the United States._x000D_ North Korea's Military Threat_x000D_ Conventional Forces_x000D_ Unconventional Forces_x000D_ Overall Conclusions_x000D_ The North Korean Ballistic Missile Program_x000D_ DPRK National Strategy and Motivations_x000D_ Historical Background of DPRK Missile Development_x000D_ Institutional Setting_x000D_ Conclusion_x000D_ U.S. Government Policy Toward North Korea_x000D_ Countering the North Korean Threat (New Steps in U.S. Policy)_x000D_ Pressuring North Korea (Evaluating Options)_x000D_ President Donald Trump on Current Crisis on the Korean Peninsula_x000D_ A Message to the Congress of the United States on the Continuation of the National Emergency with Respect to North Korea_x000D_ Continuation of the National Emergency with Respect to North Korea_x000D_ Statement from the President on North Korea's Second ICBM Launch_x000D_ Statement by President Donald J. Trump on North Korea_x000D_ About the Authors

Bytes, Bombs, and Spies

Bytes, Bombs, and Spies

Author: Herbert Lin

Publisher: Brookings Institution Press

ISBN: 9780815735489

Category: Political Science

Page: 440

View: 672

Get eBOOK →
“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.

Cyber Warfare: A Documentary and Reference Guide

Cyber Warfare: A Documentary and Reference Guide

Author: Paul J. Springer

Publisher: ABC-CLIO

ISBN: 9781440872792

Category: History

Page: 357

View: 911

Get eBOOK →
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the United States is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. Covers in detail one of the defining forms of conflict of the 21st century—cyber warfare will significantly impact virtually every American citizen over the next two decades Provides more than 90 primary source documents and matching analysis, allowing readers to investigate the underpinnings of cyber warfare Enables readers to see the development of different concepts of cyber warfare through its chronological organization Reflects the deep knowledge of an editor who is a noted expert in cyber warfare and has taught for the United States Air Force for more than a decade

THE TRUE FORCE OF NORTH KOREA: Military, Weapons of Mass Destruction and Ballistic Missiles, Including Reaction of the U.S. Government to the Korean Military Threat

THE TRUE FORCE OF NORTH KOREA: Military, Weapons of Mass Destruction and Ballistic Missiles, Including Reaction of the U.S. Government to the Korean Military Threat

Author: Andrew Scobell

Publisher: e-artnow

ISBN: 9788026879961

Category: History

Page: 300

View: 439

Get eBOOK →
North Korea is a country of paradoxes and contradictions. Although it remains an economic basket case that cannot feed and clothe its own people, it nevertheless possesses one of the world's largest armed forces. Whether measured in terms of the total number of personnel in uniform, numbers of special operations soldiers, the size of its submarine fleet, quantity of ballistic missiles in its arsenal, or its substantial weapons of mass destruction programs, Pyongyang is a major military power. Content: North Korea's Military Threat Conventional Forces Unconventional Forces Overall Conclusions The North Korean Ballistic Missile Program DPRK National Strategy and Motivations Historical Background of DPRK Missile Development Institutional Setting Conclusion U.S. Government Policy Toward North Korea Countering the North Korean Threat (New Steps in U.S. Policy) Pressuring North Korea (Evaluating Options) President Donald Trump on Current Crisis on the Korean Peninsula A Message to the Congress of the United States on the Continuation of the National Emergency with Respect to North Korea Continuation of the National Emergency with Respect to North Korea Statement from the President on North Korea's Second ICBM Launch Statement by President Donald J. Trump on North Korea About the Authors

An Assessment of North Korean Threats and Vulnerabilities in Cyberspace

An Assessment of North Korean Threats and Vulnerabilities in Cyberspace

Author: Jeremiah Adam Van Rossum

Publisher:

ISBN: OCLC:1050333316

Category: Cyber intelligence (Computer security)

Page: 202

View: 268

Get eBOOK →
This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by denying and disrupting the use of cyberspace by covert cyber units outside of North Korea, as well as by enabling and ensuring the less monitored and less controlled use of cyberspace by civilians inside of North Korea.