CEEISA) and the International Studies Association (ISA) 23Rd-25Th June 2016
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
South Korea Section 3
DEFENSE WHITE PAPER Message from the Minister of National Defense The year 2010 marked the 60th anniversary of the outbreak of the Korean War. Since the end of the war, the Republic of Korea has made such great strides and its economy now ranks among the 10-plus largest economies in the world. Out of the ashes of the war, it has risen from an aid recipient to a donor nation. Korea’s economic miracle rests on the strength and commitment of the ROK military. However, the threat of war and persistent security concerns remain undiminished on the Korean Peninsula. North Korea is threatening peace with its recent surprise attack against the ROK Ship CheonanDQGLWV¿ULQJRIDUWLOOHU\DW<HRQS\HRQJ Island. The series of illegitimate armed provocations by the North have left a fragile peace on the Korean Peninsula. Transnational and non-military threats coupled with potential conflicts among Northeast Asian countries add another element that further jeopardizes the Korean Peninsula’s security. To handle security threats, the ROK military has instituted its Defense Vision to foster an ‘Advanced Elite Military,’ which will realize the said Vision. As part of the efforts, the ROK military complemented the Defense Reform Basic Plan and has UHYDPSHGLWVZHDSRQSURFXUHPHQWDQGDFTXLVLWLRQV\VWHP,QDGGLWLRQLWKDVUHYDPSHGWKHHGXFDWLRQDOV\VWHPIRURI¿FHUVZKLOH strengthening the current training system by extending the basic training period and by taking other measures. The military has also endeavored to invigorate the defense industry as an exporter so the defense economy may develop as a new growth engine for the entire Korean economy. To reduce any possible inconveniences that Koreans may experience, the military has reformed its defense rules and regulations to ease the standards necessary to designate a Military Installation Protection Zone. -
North Korea's Artillery Attack on Yeonpyeongdo: Responses and Implications
IDSA Issue Brief IDSIDSAA ISSUEISSUE BRIEFBRIEF1 North Korea’s Artillery Attack on Yeonpyeongdo: Responses and Implications Rajaram Panda Rajaram Panda is Senior Fellow at the Institute for Defence Studies and Analyses, New Delhi November 30, 2010 Summary Both the revelation of a highly refined capacity for uranium enrichment and the shelling of South Korean military positions amply demonstrate Pyongyang’s preparedness to push the crisis to the extremes. If the South too reacts with similar measures, it would be a recipe for disaster. True, the process of leadership succession could have been the key factor behind the North’s belligerence but crossing of the threshold of tolerance by either party would not be the right choice. If it is true that the senior Kim in failing health has lost some of his earlier influence over the military, the shelling and newly revealed enrichment capacity are not the right reasons for resumption of the stalled SPT, though new “disarmament- for-aid deals have the potential to alleviate the North’s food shortages and reserve currency woes.” There has to be some balance between means and objectives of the strategy to be adopted vis-a-vis North Korea. The SPT has not proved successful. Can North Korea’s nuclear ambitions be curtailed through diplomacy? Past experience does not suggest that it can be the case. North Korea’s Artillery Attack on Yeonpyeongdo: Response and Implications 2 Thoughe the Korean War ended 60 years ago, the spectre of a repeat threatens the peninsula again. North Korea is again bullying its way into the headlines. -
The Evolution of North Korean Cyber Threats
The Evolution of North Korean Cyber Threats 2019-03 Chong Woo Kim, Senior Fellow The Asan Institute for Policy Studies Carolina Polito1 University of Bologna 2019.02.19 Introduction In North Korea, only a few people are allowed access to Kwangmyong, the national intranet service, as global internet access is restricted to a group of selected people, and the country has one of the weakest internet infrastructures in the world.2 Nonetheless, North Korea is a formidable cyber power, standing alongside major players like the United States, China, Russia, the United Kingdom, Israel and Iran.3 North Korea has been increasing resources to enhance and expand its cyber capabilities, as testified by the intensification of the regime-sponsored attacks that the world has witnessed in the last 10 years. Amongst the most blatant offensive cyber-attacks allegedly linked to hacker groups close to North Korea are the Sony Pictures attack, the WannaCry attack, and the DarkSeoul attack, despite the North’s constant denial of any involvement with these attacks or the damage suffered by them. North Korea’s cyber army consists of approximately 7,000 hackers,4 performing a wide range of activities including theft, denial of service (DDoS), espionage and sabotage. 5 These types of operations have proved to be very useful as part of North Korea’s asymmetric strategy towards the ROK-U.S. Combined Forces Command. Cyber operations are low-cost and low-risk, allowing North Korea to counter countries which have highly computer-dependent infrastructure, with little fear of retaliation. Due to their low-intensity, these attacks often lie beneath the threshold of an armed attack, reducing the risk of escalating the conflict to an unaffordable level. -
An Assessment of North Korean Threats and Vulnerabilities in Cyberspace
BearWorks MSU Graduate Theses Fall 2017 An Assessment of North Korean Threats and Vulnerabilities in Cyberspace Jeremiah van Rossum Missouri State University, [email protected] As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation van Rossum, Jeremiah, "An Assessment of North Korean Threats and Vulnerabilities in Cyberspace" (2017). MSU Graduate Theses. 3212. https://bearworks.missouristate.edu/theses/3212 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE A Master’s Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Jeremiah Adam van Rossum December 2017 Copyright 2017 by Jeremiah Adam van Rossum ii AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE Defense and Strategic Studies Missouri State University, December 2017 Master of Science Jeremiah Adam van Rossum ABSTRACT This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. -
04 Yong Seok Chang DOI.Indd
Asian Journal of Peacebuilding Vol. 3 No. 1 (2015): 65-85 doi: 10.18588/201505.000036 Research Article Revisiting Korea’s Northern Limit Line and Proposed Special Zone for Peace and Cooperation Yong Seok Chang This article examines the prospects for the realization of the agreement signed at the 2007 inter-Korean summit to transform the conflict-susceptible Northern Limit Line (NLL) in the West Sea into a border area where South and North Korea jointly promote peace and prosperity. To realize this agreement the two Koreas must integrate new ideas and plans by viewing the NLL as a space of common benefit rather than a line of military confrontation. The establishment of the West Sea Special Zone for Peace and Cooperation focuses on security and economic issues. Implementation of the agreement requires particular attention to development of a comprehensive plan, including promotion of ecological, environmental, historical, and cultural assets, as well as inter-Korean fishery cooperation. Keywords West Sea, Northern Limit Line (NLL), border area, peace settlement, common prosperity, regional cooperation Introduction The Northern Limit Line (NLL) in the West Sea (also called the Yellow Sea) and its surrounding areas has been a symbol of the precarious peace on the Korean Peninsula since the Korean War ended in 1953. Recurrent skirmishes between the naval forces of the two Koreas over the NLL have escalated tensions on the entire Korean Peninsula. The peace and stability of Northeast Asia would come under threat if the United States, an ally of South Korea (officially the Republic of Korea), were to become actively involved in this dispute. -
South Korea: Defense White Paper 2010
DEFENSE WHITE PAPER Message from the Minister of National Defense The year 2010 marked the 60th anniversary of the outbreak of the Korean War. Since the end of the war, the Republic of Korea has made such great strides and its economy now ranks among the 10-plus largest economies in the world. Out of the ashes of the war, it has risen from an aid recipient to a donor nation. Korea’s economic miracle rests on the strength and commitment of the ROK military. However, the threat of war and persistent security concerns remain undiminished on the Korean Peninsula. North Korea is threatening peace with its recent surprise attack against the ROK Ship CheonanDQGLWV¿ULQJRIDUWLOOHU\DW<HRQS\HRQJ Island. The series of illegitimate armed provocations by the North have left a fragile peace on the Korean Peninsula. Transnational and non-military threats coupled with potential conflicts among Northeast Asian countries add another element that further jeopardizes the Korean Peninsula’s security. To handle security threats, the ROK military has instituted its Defense Vision to foster an ‘Advanced Elite Military,’ which will realize the said Vision. As part of the efforts, the ROK military complemented the Defense Reform Basic Plan and has UHYDPSHGLWVZHDSRQSURFXUHPHQWDQGDFTXLVLWLRQV\VWHP,QDGGLWLRQLWKDVUHYDPSHGWKHHGXFDWLRQDOV\VWHPIRURI¿FHUVZKLOH strengthening the current training system by extending the basic training period and by taking other measures. The military has also endeavored to invigorate the defense industry as an exporter so the defense economy may develop as a new growth engine for the entire Korean economy. To reduce any possible inconveniences that Koreans may experience, the military has reformed its defense rules and regulations to ease the standards necessary to designate a Military Installation Protection Zone. -
Blas, Zach. 2016. Contra-Internet. E-Flux Journal, 74, ISSN 2164-1625
Blas, Zach. 2016. Contra-Internet. e-flux journal, 74, ISSN 2164-1625 [Article] https://research.gold.ac.uk/id/eprint/18595/ The version presented here may differ from the published, performed or presented work. Please go to the persistent GRO record above for more information. If you believe that any material held in the repository infringes copyright law, please contact the Repository Team at Goldsmiths, University of London via the following email address: [email protected]. The item will be removed from the repository while any claim is being investigated. For more information, please contact the GRO team: [email protected] Zach Blas 1 of 5 e-flux journal #74 (2016) CONTRA-INTERNET 1. Killing the Internet On January 28th, 2011, only a few days after protests had broken out in Egypt demanding the overthrow of then President Hosni Mubarak, the Egyptian government terminated national access to the internet. This state-sponsored shutdown became known as flipping the internet’s“kill switch.” Intentions motivating the killing of the internet in Egypt were to block protestors from coordinating with one another and the dissemination of any media about the uprising, especially to those outside of the country. Peculiarly, it is a death that only lasted five days, as internet access was soon reinstated. More precisely, the internet kill switch unfolded as a series of political demands and technical operations. Egyptian Internet Service Providers, such as Telecom Egypt, Raya, and Link Egypt, were ordered to cancel their routing services, which had the effect of stymying internet connectivity through these major companies. -
Monday, November 28, 2016 the Opening of the North Korean Mind Pyongyang Versus the Digital Underground Jieun Baek
12/2/2016 The Opening of the North Korean Mind Home > The Opening of the North Korean Mind Monday, November 28, 2016 The Opening of the North Korean Mind Pyongyang Versus the Digital Underground Jieun Baek JIEUN BAEK is the author of North Korea’s Hidden Revolution: How the Information Underground Is Transforming a Closed Society (Yale University Press, 2016), from which this essay is adapted. From 2014 to 2016, she was a Fellow at the Belfer Center for Science and International Affairs at Harvard University. Follow her on Twitter @JieunBaek1. On a cold, clear night in September 2014, a man I’ll call Ahn walked up to the edge of the Tumen River on the Chinese side of the heavily guarded border between China and North Korea. At its narrowest points, the Tumen measures a little over 150 feet wide, and Ahn could easily see the North Korean side from where he stood. In two bags, he was carrying 100 USB drives filled with films, television shows, music, and ebooks from around the world. Almost anywhere else, such material would be considered completely innocuous. At this border, however, it constitutes highly illicit, dangerous contraband. In the totalitarian state of North Korea, citizens are allowed to see and hear only those media products created or sanctioned by the government. Pyongyang considers foreign information of any kind a threat and expends great effort keeping it out. The regime’s primary fear is that exposure to words, images, and sounds from the outside world could make North Koreans disillusioned with the state of affairs in their own country, which could lead them to desire—or even demand—change. -
Inter-Korean Normalization
Inter-Korean Normalization The NAPSNet Policy Forum provides expert analysis of contemporary peace and security issues in Northeast Asia. As always, we invite your responses to this report and hope you will take the opportunity to participate in discussion of the analysis. 1 Recommended Citation Haksoon Paik, "Inter-Korean Normalization", NAPSNet Policy Forum, February 05, 2013, https://nautilus.org/napsnet/napsnet-policy-forum/inter-korean-normalization/ by Haksoon Paik February 5th, 2013 This report was originally presented at the New Approach to Security in Northeast Asia: Breaking the Gridlock workshop held on October 9th and 10th, 2012 in Washington, DC. All of the papers and presentations given at the workshop are available here, along with the full agenda, participant list and a workshop photo gallery. Click here to download a pdf of this report. Nautilus invites your contributions to this forum, including any responses to this report. CONTENTS I. Introduction II. Report by Haksoon Paik III. Nautilus invites your responses I. Introduction In this concise report Haksoon Paik lists the current state of key issues preventing inter-Korean normalization, including the lack of national reconciliation, the continued threat of war and the persistent North Korean nuclear weapons program. He also provides a brief overview of the South Korean position on a Northeast Asian Nuclear Weapons Free Zone. Haksoon Paik is currently the director of Inter-Korean Relations Studies Program and the director of the Center for North Korean Studies at the Sejong Institute in Korea. The views expressed in this report do not necessarily reflect the official policy or position of the Nautilus Institute. -
The Dprk As an Example of the Potential Utility of Internet Sanctions
\\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 1 31-MAR-08 10:18 USING INTERNET “BORDERS” TO COERCE OR PUNISH: THE DPRK AS AN EXAMPLE OF THE POTENTIAL UTILITY OF INTERNET SANCTIONS BENJAMIN BROCKMAN-HAW E * INTRODUCTION ................................................... 163 R I. BACKGROUND INFORMATION .............................. 166 R A. Escalation ............................................. 167 R B. The Internet in North Korea ........................... 173 R II. SANCTIONS ................................................ 181 R A. General Information ................................... 182 R B. Telecommunications Sanctions Already Considered .... 184 R C. Multilateral Sanctions In Place Against the DPRK ..... 187 R III. THE UTILITY OF INTERNET SANCTIONS .................... 187 R A. Obtaining a desired result through the imposition of Internet sanctions ...................................... 187 R B. The Benefits and Costs of Imposing Internet Sanctions . 198 R C. General Concerns Associated with the Use of Internet Sanctions .............................................. 200 R 1. International Human Rights ....................... 200 R 2. Internet sanctions could harm regime opponents . 203 R 3. Internet sanctions could impair the ability of UN operations and NGO’s to function within the target country ..................................... 204 R IV. CONCLUSION .............................................. 205 R INTRODUCTION Speech is civilization itself. The word. preserves contact—it is silence which isolates. - Thomas Mann1 * J.D. Candidate 2008, Boston University School of Law. This article is dedicated to the memory of Dr. Robert Brockman, a man who surveyed this new world with the eyes of an old soul. 1 THOMAS MANN, THE MAGIC MOUNTAIN (1924) quoted in CHARLES R. BURGER & JAMES J. BRADAC, LANGUAGE AND SOCIAL KNOWLEDGE 112 (Edward Arnold Publishers Ltd. 1982). 163 \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 2 31-MAR-08 10:18 164 BOSTON UNIVERSITY INTERNATIONAL LAW JOURNAL [Vol. -
"Kim Jong Un, Uranium, and the Artillery Barrage: How to Think Strategically About North Korea?"
"Kim Jong Un, Uranium, and the Artillery Barrage: How to Think Strategically about North Korea?" By Narushige Michishita Narushige Michishita is an associate professor of the Security and International Studies Program at the National Graduate Institute for Policy Studies (GRIPS) in Tokyo. A specialist in strategic and Japan/Korea studies, he is author of North Korea’s Military-Diplomatic Campaigns, 1966- 2008 (London: Routledge, 2009). He may be reached at [email protected]. Escalating Situation and North Korea’s Intentions The North Koreans have taken important and provocative steps to escalate the situation. First, they revealed that they had completed a uranium enrichment facility with 2,000 centrifuges and had begun construction of a 25 to 30 megawatt-electric experimental light-water reactor in Nyongbyon.i Then, they shelled Yeonpyeongdo - a South Korean offshore island in the Yellow Sea - causing military and civilian casualties.ii Outrageous as they are, North Korea’s recent actions are perfectly consistent with its past actions and its objectives. North Korea’s central objective is to force Washington to start talks with Pyongyang with the aim of improving relations between the two countries. Actually, North Korea declared that it would begin enriching uranium and that it had decided to build its own light water reactors in June 2009. In November 2010, the North Koreans simply delivered what they had already declared they would. In any case, now that they have demonstrated their possession of the uranium enrichment program, it is on the table to be negotiated. Regarding the heightened tension in the Yellow Sea, in January 2009 the general staff of the Korean People’s Army warned that it would take measures to defend the “military demarcation line” in the Yellow Sea, which it had unilaterally established in 1999, if South Korean vessels continued to violate North Korea’s “territorial waters.” It also predicted that the “illegal” Northern Limit Line-a quasi-maritime borderline to separate the North and the South-would disappear. -
Digital Methods for Circumventing UN Sanctions a Case Study of the Democratic People’S Republic of Korea’S Cyber Force
Compliance & Capacity Skills International, LLC Sanctions Practitioners 12 July 2019 Compliance Trainers Digital Methods for Circumventing UN Sanctions A Case Study of the Democratic People’s Republic of Korea’s Cyber Force By Ashley Taylor Introduction The cyber sphere is a new frontline in the implementation and circumvention of UN sanctions. Because the Internet provides a virtual space for instantaneous communication and transaction, it inherently opens cheaper and unregulated avenues for rogue actors to violate international norms. Illicit uses of digital technologies outpace the advancements of licit technologists, who generally do not prioritize international security in their business. The Democratic People’s Republic of Korea (DPRK) in particular has become increasingly adept at employing digital tools to circumvent sanctions. They have developed digital techniques to generate revenues to fund their illegal proliferation efforts, gain intelligence and technical know- how, and harm the business and reputation of their foreign adversaries, including to disrupt those that monitor the implementation of the DPRK sanctions regime adopted with UN resolution 1718 in October 2006. Kim Jong-un recently boasted that “cyber warfare, along with nuclear weapons and missiles, is an ‘all-purpose sword’ that guarantees our military’s capability to strike relentlessly."1 A North Korean military defector has reported that the cyber force is viewed as the strongest weapon in the “Secret War”2 and its members are considered part of the elite, being one of few well-paid positions. Where will they go from here? Evidence suggests that North Korean state actors and non-state proxies are increasingly making use of new anonymizing technologies like cryptocurrencies, the dark web, encryption, and advanced hard-to-detect cyberattacks.