North Korea's Cyber Operations

North Korea's Cyber Operations
Author: Jenny Jun
Publisher: Rowman & Littlefield
Total Pages: 106
Release: 2016-01-11
Genre: Political Science
ISBN: 1442259035

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.

Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity

Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity
Author: Journal of Law and Cyber Warfare
Publisher: Lulu.com
Total Pages: 141
Release: 2014-12-30
Genre: Law
ISBN: 1312794917

The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.

Confronting an "Axis of Cyber"?

Confronting an
Author: Fabio Rugge
Publisher: Ledizioni
Total Pages: 181
Release: 2018-10-24
Genre: Political Science
ISBN: 8867058673

The new US National Cyber Strategy points to Russia, China, North Korea and Iran as the main international actors responsible for launching malicious cyber and information warfare campaigns against Western interests and democratic processes. Washington made clear its intention of scaling the response to the magnitude of the threat, while actively pursuing the goal of an open, secure and global Internet. The first Report of the ISPI Center on Cybersecurity focuses on the behaviour of these “usual suspects”, investigates the security risks implicit in the mounting international confrontation in cyberspace, and highlights the current irreconcilable political cleavage between these four countries and the West in their respective approaches “in and around” cyberspace.

Bytes, Bombs, and Spies

Bytes, Bombs, and Spies
Author: Herbert Lin
Publisher: Brookings Institution Press
Total Pages: 440
Release: 2019-01-15
Genre: Political Science
ISBN: 0815735480

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.

North Korea's Cyber Proxy Warfare

North Korea's Cyber Proxy Warfare
Author: Donghui Park
Publisher:
Total Pages: 306
Release: 2019
Genre:
ISBN:

North Korea has been viewed as the world's most reclusive, repressive, and isolated country for the last 70 years. However, contrary to its undeveloped image, since the late 2000s, several governments, mainly the U.S. and South Korea, as well as global private cybersecurity companies, have attributed some of the massive and complicated cyberattacks to the North Korean regime. Even, since 2014, the U.S. Intelligence Community's annual report, Worldwide Threat Assessment of the U.S. Intelligence Community, has stated that North Korea is one of the four primary nation-state actors in cyberspace who threaten the national security of the United States and its allies, along with Russia, China, and Iran. This paradox prompts the central question of this dissertation: why and how did North Korea become a world-class cyber-threat actor? This dissertation is composed of three independent, but thematically-linked empirical studies, replying to the central question. The first study (chapter 2) seeks to bridge the gap between North Korea's undeveloped image and cyber reality. It contends that contrary to its image as a backward country, North Korea has sufficient IT infrastructure and human capital to conduct hostile cyberoperations against the outside world in order to attain its national goals. The second study (chapter 3) is an empirical analysis of North Korea's cyber strategy. It argues that North Korea's cyber-proxy-warfare strategy enables its cyber-warriors to accomplish aggressive cyber-missions while North Korean hackers keep a distance from their state sponsor, North Korea. The last study (Chapter 4) seeks to understand the influence of North Korea's cyber uncertainty on regional and world security dynamics. It illustrates that through the North Korea case, the impact of cyber buildup can be seen as the same as that of conventional military buildup. When combined, these three studies provide insight into the central question of this dissertation about why and how North Korea became a world-class cyber-threat actor. The Kim dictator family has understood the importance and impact of developing cybercapacity for their survival in security and military areas. North Korea has started to conduct massive and complicated cyberoperations through a proxy-warfare strategy which enables the state to deny its responsibility for those operations. Sufficient IT human capital from state-led intensive education systems is at the core of North Korea0́9s aggressive cyberoperations; this, in turn, threatens the national security of other countries and changes regional security dynamics.

North Korean Strategic Strategy

North Korean Strategic Strategy
Author: Jennifer J. Erlendson
Publisher:
Total Pages: 168
Release: 2013
Genre: Cyberterrorism
ISBN:

Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.' technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.' reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004. Although NK is the likely culprit in the attacks, there is no forensic evidence to definitively identify NK as the attacker. Keywords: Cybersecurity, Professor Draz, North Korea, Kim Jong Un, Kim Jong Il, Cyber

The Lazarus Heist

The Lazarus Heist
Author: Geoff White
Publisher: National Geographic Books
Total Pages: 0
Release: 2022-09-27
Genre: True Crime
ISBN: 024155425X

BASED ON THE NO 1 HIT PODCAST 'The Lazarus Heist' 'You'll never see North Korea the same way again' Oliver Bullough, author of Moneyland 'One of the most incredible cyber-espionage stories I've ever heard, told by one of the UK's best tech journalists' Jamie Bartlett, author of The Missing Crypto Queen 'Pacy and eye-popping, this book shows us what happens when the world of Barbara Demick's Nothing to Envy meets the world of Misha Glenny's McMafia' - Tom Burgis, author of Kleptopia Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image. In this staggering, global investigation, award-winning journalist Geoff White examines how the hackers have harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries. It's not just money they're after. The Lazarus Group's tactics have been used to threaten democracies, gag North Korea's critics and destabilize global peace. From the bustling streets of Dhaka, to the glamorous studios of Hollywood, to the glittering casinos of Macau and the secretive dynastic court of Pyongyang, this shocking story uncovers the secret world of the Lazarus Group, their victims and the people who have tried - and ultimately, so far failed - to stop them. 'Madly intriguing' Guardian 'Cyber warfare and criminal hacking has never been more pertinent. This a must read to understand the threats currently facing all of us globally' Annie Machon, author of Spies, Lies and Whistleblowers

The Hacker and the State

The Hacker and the State
Author: Ben Buchanan
Publisher: Harvard University Press
Total Pages: 433
Release: 2020-02-25
Genre: Political Science
ISBN: 0674245989

“A must-read...It reveals important truths.” —Vint Cerf, Internet pioneer “One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” —Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. “A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.” —Jonathan Freedland, New York Review of Books “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.” —General David Petraeus, former Director of the CIA “Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’” —Richard Harknett, former Scholar-in-Residence at United States Cyber Command

When Norms Fail

When Norms Fail
Author: U. S. Military
Publisher: Independently Published
Total Pages: 80
Release: 2019-02
Genre: History
ISBN: 9781795618588

With the increased reliance on information technology across society, nation states have begun to integrate cyber capabilities into their power projection strategies. While nation states use these increased cyber capabilities in attempts to wield greater influence in statecraft, cyber tools have not lived up to the hype of the great equalizer some claim it to be. To illustrate, this paper reviews select malicious cyber actions by North Korea in an effort to analyze the effectiveness of cyber as a form of statecraft for weaker states and potential deterrence responses by victims of such malign actions.Powerful states already use cyber in attempts to coerce and deter actions by other states. Russia is perhaps the most active in this respect. Moscow's actions against Estonia in 2007 and Georgia in 2008 were obvious efforts at coercion and deterrence. In the Georgia case, cyber efforts were accompanied by military force, while Russia paired its cyberattacks with economic actions against Estonia. Both were of limited success in helping Moscow achieve its objectives but support Martin Libicki's finding that cyber is most effective as a support function for other elements of warfare, or state power. More recently, Russia has been suspected of using cyberspace to interfere with the democratic process of U.S. and European elections in violation of sovereignty norms.While much has been written regarding great nation use of cyber for statecraft, less has been written about the use of cyber by weak and developing nations. This paper will examine notable cyber actions by North Korea to influence international actors and achieve national objectives. North Korean actions will further be compared against models of deterrence and coercion to determine the level of success achieved and concludes with suggestions for U.S. cyber policy as it relates to cyber deterrence. I will demonstrate that cyber can be an effective tool of statecraft for a nation if it can maintain escalation dominance.Pyongyang has launched numerous cyberattacks since 2009, with some estimates claiming North Korea perpetrates as many as 250 million cyberattacks per day against South Korean online entities. Given the lack of Internet access to the general population, this activity indicates Pyongyang understands the importance of cyber as an asymmetric alternative and has invested heavily in its cyber warfare proficiency. With an aging military infrastructure and limited sources of national power, the DPRK has used cyber in an effort to exert pressure on stronger, more capable adversaries and retain its global relevance.

The Hermit Kingdom Goes Online

The Hermit Kingdom Goes Online
Author: Bernhard Seliger
Publisher: McFarland
Total Pages: 24
Release: 2014-04-04
Genre: Social Science
ISBN: 1476617708

This study gives a comprehensive overview of the development of the Internet in North Korea, and discusses related applications, challenges and opportunities. It argues that North Korea can no longer ignore the Internet, neither as a chance to further its intentions, e.g., in cyber warfare, national self-representation and business, nor as a threat due to the greater availability of knowledge in the country. This McFarland E-Single originally appeared in the Spring 2014 issue of North Korean Review (ISSN 1551-2789). The first academic journal in North America or Europe to focus exclusively on North Korea, NKR is published twice each year. Subscriptions and back issues are available directly from McFarland.