North Korea's Cyber Proxy Warfare


Book Description

North Korea has been viewed as the world's most reclusive, repressive, and isolated country for the last 70 years. However, contrary to its undeveloped image, since the late 2000s, several governments, mainly the U.S. and South Korea, as well as global private cybersecurity companies, have attributed some of the massive and complicated cyberattacks to the North Korean regime. Even, since 2014, the U.S. Intelligence Community's annual report, Worldwide Threat Assessment of the U.S. Intelligence Community, has stated that North Korea is one of the four primary nation-state actors in cyberspace who threaten the national security of the United States and its allies, along with Russia, China, and Iran. This paradox prompts the central question of this dissertation: why and how did North Korea become a world-class cyber-threat actor? This dissertation is composed of three independent, but thematically-linked empirical studies, replying to the central question. The first study (chapter 2) seeks to bridge the gap between North Korea's undeveloped image and cyber reality. It contends that contrary to its image as a backward country, North Korea has sufficient IT infrastructure and human capital to conduct hostile cyberoperations against the outside world in order to attain its national goals. The second study (chapter 3) is an empirical analysis of North Korea's cyber strategy. It argues that North Korea's cyber-proxy-warfare strategy enables its cyber-warriors to accomplish aggressive cyber-missions while North Korean hackers keep a distance from their state sponsor, North Korea. The last study (Chapter 4) seeks to understand the influence of North Korea's cyber uncertainty on regional and world security dynamics. It illustrates that through the North Korea case, the impact of cyber buildup can be seen as the same as that of conventional military buildup. When combined, these three studies provide insight into the central question of this dissertation about why and how North Korea became a world-class cyber-threat actor. The Kim dictator family has understood the importance and impact of developing cybercapacity for their survival in security and military areas. North Korea has started to conduct massive and complicated cyberoperations through a proxy-warfare strategy which enables the state to deny its responsibility for those operations. Sufficient IT human capital from state-led intensive education systems is at the core of North Korea0́9s aggressive cyberoperations; this, in turn, threatens the national security of other countries and changes regional security dynamics.




North Korea's Cyber Operations


Book Description

This report presents an open source analysis of North Korea’s cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea’s cyber strategy. The authors then provide an assessment of North Korea’s cyber operations capabilities by examining the organizational structure, history, and functions of North Korea’s cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.




Confronting an "Axis of Cyber"?


Book Description

The new US National Cyber Strategy points to Russia, China, North Korea and Iran as the main international actors responsible for launching malicious cyber and information warfare campaigns against Western interests and democratic processes. Washington made clear its intention of scaling the response to the magnitude of the threat, while actively pursuing the goal of an open, secure and global Internet. The first Report of the ISPI Center on Cybersecurity focuses on the behaviour of these “usual suspects”, investigates the security risks implicit in the mounting international confrontation in cyberspace, and highlights the current irreconcilable political cleavage between these four countries and the West in their respective approaches “in and around” cyberspace.




Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity


Book Description

The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.




North Korean Strategic Strategy


Book Description

Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.' technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.' reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004. Although NK is the likely culprit in the attacks, there is no forensic evidence to definitively identify NK as the attacker. Keywords: Cybersecurity, Professor Draz, North Korea, Kim Jong Un, Kim Jong Il, Cyber




Cyber Mercenaries


Book Description

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.




The Lazarus Heist


Book Description

BASED ON THE NO 1 HIT PODCAST 'The Lazarus Heist' 'You'll never see North Korea the same way again' Oliver Bullough, author of Moneyland 'One of the most incredible cyber-espionage stories I've ever heard, told by one of the UK's best tech journalists' Jamie Bartlett, author of The Missing Crypto Queen 'Pacy and eye-popping, this book shows us what happens when the world of Barbara Demick's Nothing to Envy meets the world of Misha Glenny's McMafia' - Tom Burgis, author of Kleptopia Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image. In this staggering, global investigation, award-winning journalist Geoff White examines how the hackers have harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries. It's not just money they're after. The Lazarus Group's tactics have been used to threaten democracies, gag North Korea's critics and destabilize global peace. From the bustling streets of Dhaka, to the glamorous studios of Hollywood, to the glittering casinos of Macau and the secretive dynastic court of Pyongyang, this shocking story uncovers the secret world of the Lazarus Group, their victims and the people who have tried - and ultimately, so far failed - to stop them. 'Madly intriguing' Guardian 'Cyber warfare and criminal hacking has never been more pertinent. This a must read to understand the threats currently facing all of us globally' Annie Machon, author of Spies, Lies and Whistleblowers




Guns, Guerillas, and the Great Leader


Book Description

Far from always having been an isolated nation and a pariah state in the international community, North Korea exercised significant influence among Third World nations during the Cold War era. With one foot in the socialist Second World and the other in the anticolonial Third World, North Korea occupied a unique position as both a postcolonial nation and a Soviet client state, and sent advisors to assist African liberation movements, trained anti-imperialist guerilla fighters, and completed building projects in developing countries. State-run media coverage of events in the Third World shaped the worldview of many North Koreans and helped them imagine a unified anti-imperialist front that stretched from the boulevards of Pyongyang to the streets of the Gaza Strip and the beaches of Cuba. This book tells the story of North Korea's transformation in the Third World from model developmental state to reckless terrorist nation, and how Pyongyang's actions, both in the Third World and on the Korean peninsula, ultimately backfired against the Kim family regime's foreign policy goals. Based on multinational and multi-archival research, this book examines the intersection of North Korea's domestic and foreign policies and the ways in which North Korea's developmental model appealed to the decolonizing world.




The Art of Cyberwarfare


Book Description

A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of: North Korea’s series of cyber attacks against financial institutions, which resulted in billions of dollars stolen The world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomware Recent cyber attacks aimed at disrupting or influencing national elections globally The book’s second part walks through how defenders can track and attribute future attacks. You’ll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts.




Proxy War


Book Description

Drawn into a conflict in a country far away from An Arath, our adventurers battle against humans in the service of evil. Strong allies are found… but will they remain victorious when deadlier supernatural enemies are discovered? Will victories on new battlefields prove decisive, or are the conflicts merely a distraction, hiding a greater plan? Discover a world ruled by sorceresses and join them in their struggle to make the world a better place. Who'll ultimately decide the fate of the world—and what will that future look like?