North Korean Strategic Strategy: Combining Conventional Warfare with The
Total Page:16
File Type:pdf, Size:1020Kb
NORTH KOREAN STRATEGIC STRATEGY: COMBINING CONVENTIONAL WARFARE WITH THE ASYMMETRICAL EFFECTS OF CYBER WARFARE By Jennifer J. Erlendson A Capstone Project Submitted to the Faculty of Utica College March, 2013 In Partial Fulfillment of the Requirement for the Degree Master of Science – Cybersecurity – Intelligence and Forensics © Copyright 2013 by Jennifer J. Erlendson All Rights Reserved ii Abstract Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.’technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.’ reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004. Although NK is the likely culprit in the attacks, there is no forensic evidence to definitively identify NK as the attacker. iii Acknowledgments First and foremost, I would like to thank my family and friends for their patience and encouragement while I pursued this goal. I would also like to thank my coworkers who were always willing to provide their expertise, assistance, and humor when needed. A special thank you to Professor Draz, for his time, patience, and mentorship; he made getting through the Capstone project possible. And finally, thank you to Professor Nichols and Professor Giordano for developing a fun and challenging Cybersecurity program. iv Table of Contents Abstract .......................................................................................................................................... iii Acknowledgments.......................................................................................................................... iv Table of Contents ............................................................................................................................ v List of Illustrative Materials .......................................................................................................... vii Definition of the Problem ........................................................................................................... 1 Purpose Statement ................................................................................................................... 1 Justifying the Problem ................................................................................................................ 2 KJI ........................................................................................................................................... 2 KJU. ........................................................................................................................................ 3 Technology Dependency ........................................................................................................ 7 New Battlefield ....................................................................................................................... 8 Act of War............................................................................................................................... 9 Economic Impact .................................................................................................................. 11 Cyber Law ............................................................................................................................. 13 Knowledge Deficiencies ........................................................................................................... 14 Closed Society ...................................................................................................................... 14 Denial and Deception ............................................................................................................ 14 Open source information....................................................................................................... 15 KJU ....................................................................................................................................... 15 Defining the Audience .............................................................................................................. 16 Literature Review.......................................................................................................................... 16 NK Infrastructure ...................................................................................................................... 16 Telephones ............................................................................................................................ 16 Cell phones............................................................................................................................ 17 Fiber Optic Cable .................................................................................................................. 17 Satellite Communications ..................................................................................................... 19 Intranet-Internet .................................................................................................................... 19 NK Education........................................................................................................................ 21 Primary – High School.......................................................................................................... 21 Mirim College ....................................................................................................................... 22 KCC ...................................................................................................................................... 22 NK Military Cyber Units. ......................................................................................................... 23 RGB ...................................................................................................................................... 23 Office 91 ............................................................................................................................... 24 Unit 121 ................................................................................................................................ 24 Unit 110 ................................................................................................................................ 24 Unit 35 .................................................................................................................................. 25 Unit 204 ................................................................................................................................ 25 Import Restrictions & Funding ................................................................................................. 26 COCOM ................................................................................................................................ 26 Wassenaar Arrangement ....................................................................................................... 26 Division 39 ............................................................................................................................ 27 Silibank ................................................................................................................................. 28 Software Exports ................................................................................................................... 28 v Virtual ‘Farming.’ ................................................................................................................. 29 Computer Network Operations ................................................................................................. 30 CNE....................................................................................................................................... 30 CNA ...................................................................................................................................... 31 Suspected NK Cyber Attacks.................................................................................................... 32 August 2004 .......................................................................................................................... 32 June 2005 .............................................................................................................................. 32 July