North Korea's Cyber Operations: Strategy and Responses

Total Page:16

File Type:pdf, Size:1020Kb

North Korea's Cyber Operations: Strategy and Responses DECEMBER 2015 1616 Rhode Island Avenue NW Washington, DC 20036 202-887-0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Lanham, MD 20706 301- 459- 3366 | www.rowman.com North Korea’s Cover photo: Scott LaFoy Cyber Operations Strategy and Responses A Report of the CSIS Korea Chair AUTHORS Jenny Jun Scott LaFoy Ethan Sohn ISBN 978-1-4422-5902-7 PROJECT DIRECTORS 1616 Rhode Island Avenue NW Victor D. Cha Washington,Ë|xHSLEOCy259027z DC 20036v*:+:!:+:! 202-887-0200 | www.csis.org James A. Lewis Blank North Korea’s Cyber Operations Strategy and Responses AUTHORS Jenny Jun Scott LaFoy Ethan Sohn PROJECT DIRECTORS Victor D. Cha James A. Lewis A Report of the CSIS K orea Chair December 2015 Lanham • Boulder • New York • London 594-63946_ch00_3P.indd 1 12/16/15 8:20 PM About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organ ization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analy sis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in November 2015. Former U.S. deputy secretary of defense John J. Hamre has served as the Center’s president and chief executive officer since 2000. CSIS does not take specific policy positions; accordingly, all views expressed herein should be understood to be solely those of the author(s). © 2015 by the Center for Strategic and International Studies. All rights reserved. ISBN: 978-1-4422-5902-7 (pb); 978-1-4422-5903-4 (eBook) Center for Strategic & International Studies Rowman & Littlefield 1616 Rhode Island Ave nue, NW 4501 Forbes Boulevard Washington, DC 20036 Lanham, MD 2 0706 202-887-0200 | www . csis . org 301 - 459 - 3366 | www . rowman . com 594-63946_ch00_3P.indd 2 12/16/15 8:20 PM Contents Preface iv Acknowl edgments vi Abbreviations vii Introduction 1 Purpose, Scope, and Methods 1 A Note on Open- Source Reporting on DPRK 2 Executive Summary 4 1. Strategic Context 11 DPRK Military and Po liti cal Strategy 11 Strategic Use of Cyberspace 17 DPRK Cyber Strategy 26 2r . O g a n i z a t i o n 3 5 Reconnaissance General Bureau 35 General Staff Department of the Korean People’s Army 45 Technology and Industrial Base 52 3. ­Future Trends and Policy Recommendations 60 Future Trends 60 Policy Objectives 63 Recommendations for the United States 64 Recommendations for the U.S.- ROK Alliance 72 Appendix. Disruptive Cyber Operations Commonly Associated with North Korea 79 Bibliography 80 About the Project Directors and Authors 96 | III 594-63946_ch00_3P.indd 3 12/16/15 8:20 PM Preface he impetus for this study was the cyber attack against South Korean banks and media T agencies in March 2013. The subsequent cyber attack against Sony Pictures Entertain- ment in November 2014 made our research efforts directly relevant to the U.S. policy debate on cyber conflicts. The U.S. government’s designation of North Korea as the re- sponsible party for the act, which released sensitive files and communications from Sony, was a surprise to many in the cybersecurity field and in theK orea expert community as few had estimated the Demo cratic People’s Republic of Korea (DPRK) to be capable of such activity. We started to look into the issue and found quickly that there was very little open- source and unclassified information about North Korean cyber operations. There had been occasional studies done by scholars and industry, but the lit er a ture was sparse at best. Our initial conversations found the lack of any single go-to source primer about what we know about these North Korean capabilities. This revelation led us to consider a one- year study that would comb the open- source lit er a ture, conduct inter- views, and perform field research to get a better understanding of North Korean cyber operations. The research team, consisting of the primary authors on this report, Jenny Jun, Scott LaFoy, and Ethan Sohn, had the right combination of cybersecurity, North Korea, and international security expertise to undertake the work. At CSIS my colleague James Lewis, director and se nior fellow in the Strategic Technologies Program, agreed to serve along with me as se nior authors and advisers for the proj ect. The caveat with any study on North Korea is that one does research with very little information. There are no websites that can be easily accessed of North Korean origin; no studies of their cyber strategy; and no experts that one can easily access. North Korea is considered one of the hardest intelligence targets in the world. Through our concerted efforts, this study offers one of the first primers in En glish on the strategy b ehind North K orea’s cyber operations; the institutions within the DPRK government that are associated with t hese operations; and a study of North Korea’s tech- nology base. We learned a great deal in completing the study, and learned quickly of its interest to the public and private sector when we released the executive summary for the study in September 2015. IV | 594-63946_ch00_3P.indd 4 12/16/15 8:20 PM We would like to thank the current and former CSIS K orea Chair staff, including Sang Jun Lee and Ellen Kim, the Strategic Technologies Program office, and the CSIS Publications Office for their tireless work on this proj ect. We hope that you will find the research and analy sis in this study useful. Victor Cha Se nior Adviser and Korea Chair CSIS N ORTH KOREA’S CyBER OPERATIONS | v 594-63946_ch00_3P.indd 5 12/16/15 8:20 PM Acknowl edgments he primary authors would like to express deep gratitude for those who made this T proj ect pos si ble, through their hard work, patience, and support. This proj ect would never have been pos si ble without Dr. Victor Cha, who encouraged an extended study of the topic, generously agreed to provide institutional support for the proj ect, provided constant guidance throughout numerous revisions and overhaul of the content, and, most impor- tantly, sparked our interest on North Korean issues years ago as a mentor. We also thank Dr. James Lewis for offering his extensive expertise and insight into this topic throughout the proj ect. We thank and acknowledge the efforts of staff of the CSIS Korea Chair, especially Ellen Kim, Sang Jun Lee, Marie DuMond, Andy Lim, and Lisa Collins, who provided extensive assistance to our proj ect and made sure that all components of the proj ect progressed seamlessly. We would also express deep gratitude to our interviewees, including Joseph Bermudez Jr., Catherine Lotrionte, Lim Jong-in, Kim Heung- kwang, yoo Dong- yeul, Choi Sang- myung, as well as many others who wish to remain anonymous. They shared their extensive knowledge and insight, which was vital to the creation of this publication. We also thank interns Min- hyung Kang and Min- jeong Lee for their hard work and time dedi- cated to this proj ect. Jenny Jun, Scott LaFoy, and Ethan Sohn vi | 594-63946_ch00_3P.indd 6 12/16/15 8:20 PM Abbreviations APCERT Asia Pacific Computer Emergency Response Team APEC Asia- Pacific Economic Cooperation APEC- TEL APEC Telecommunications and Information Working Group ASEAN Association of Southeast Asian Nations C4ISR command, control, communications, computers, intelligence, surveillance, and reconnaissance CBM confidence building mea sure CERT computer emergency response team CNE computer network exploitation CNO computer network operations CSIRT computer security incident response team DDoS distributed denial of ser vice DMZ demilitarized zone DNI director of national intelligence DPRK Demo cratic Pe ople’s Republic of K orea (North Korea) ECCM electronic c ounter- countermeasure EO executive order EW electronic warfare GPS global positioning system GSD General Staff Department of the Korean Pe ople’s Army (North Korea) IP Internet protocol ISO/OSI International Standards Or ga ni za tion/Open Systems Interconnection IT information technology ITU- IMPACT International Telecommunication Union– International Multilateral Partnership Against Cyber Threats KCC K orea Computer Center (North K orea) KPA Korean Pe ople’s Army (North Korea) KPTC K orea Posts and Telecommunications Corporation (North Korea) KWP Korean Worker’s Party (North K orea) MND Ministry of National Defense (South K orea) MPAF Ministry of Pe ople’s Armed Forces (North K orea) MSS Ministry of State Security (North K orea) NDC National Defence Commission (North Korea) NIS National Intelligence Ser vice (South K orea) |II V 594-63946_ch00_3P.indd 7 12/16/15 8:20 PM NKIS North Korea Intellectuals Solidarity PIC Pyongyang Informatics Center (North Korea) PLA People’s Liberation Army PLC programmable logic controller R&D research and development RGB Reconnaissance General Bureau (North Korea) ROK Republic of Korea (South Korea) SCADA supervisory control and data acquisition TCP/IP transmission control protocol/Internet protocol TTPs tactics, techniques, and procedures UN GGE United Nations Group of Government Experts WMD weapons of mass destruction v III | JENNy JUN, SCOTT LAFOy, and ETHAN SOHN 594-63946_ch00_3P.indd 8 12/16/15 8:20 PM Introduction Purpose, Scope, and Methods PURSE PO This report aims to provide a comprehensive overview of North Korea’s cyber strategy and operations based on open- source lit er a ture.
Recommended publications
  • Çœÿ人實ŢƑ秀 Ç”Μ视Ț‚Ç›® ĸ²È¡Œ
    真人實境秀 电视节目 串行 å§​ 底è€æ​ ¿​ https://zh.listvote.com/lists/tv/programs/%E5%8D%A7%E5%BA%95%E8%80%81%E6%9D%BF-488318/actors 快樂星期天 https://zh.listvote.com/lists/tv/programs/%E5%BF%AB%E6%A8%82%E6%98%9F%E6%9C%9F%E5%A4%A9-625720/actors 貴婦的真實生活 https://zh.listvote.com/lists/tv/programs/%E8%B2%B4%E5%A9%A6%E7%9A%84%E7%9C%9F%E5%AF%A6%E7%94%9F%E6%B4%BB-2590440/actors MTVå´©æ½°é‚Šç·£ https://zh.listvote.com/lists/tv/programs/mtv%E5%B4%A9%E6%BD%B0%E9%82%8A%E7%B7%A3-861604/actors 明星金é˜​ https://zh.listvote.com/lists/tv/programs/%E6%98%8E%E6%98%9F%E9%87%91%E9%90%98-11253747/actors è¬​ ä¸é​ ¸​ 一 https://zh.listvote.com/lists/tv/programs/%E8%90%AC%E4%B8%AD%E9%81%B8%E4%B8%80-3472091/actors 挑战åƒ​ 曲 https://zh.listvote.com/lists/tv/programs/%E6%8C%91%E6%88%98%E5%8D%83%E6%9B%B2-16180866/actors DERO密室éŠ​ 戲大脫逃 https://zh.listvote.com/lists/tv/programs/dero%E5%AF%86%E5%AE%A4%E9%81%8A%E6%88%B2%E5%A4%A7%E8%84%AB%E9%80%83-5354439/actors 泰國新é¢​ å”​ https://zh.listvote.com/lists/tv/programs/%E6%B3%B0%E5%9C%8B%E6%96%B0%E9%9D%A2%E5%AD%94-18193392/actors å°​ 尼之音 https://zh.listvote.com/lists/tv/programs/%E5%8D%B0%E5%B0%BC%E4%B9%8B%E9%9F%B3-7772995/actors K-pop star:明星é¸​ 拔賽 https://zh.listvote.com/lists/tv/programs/k-pop-star%EF%BC%9A%E6%98%8E%E6%98%9F%E9%81%B8%E6%8B%94%E8%B3%BD-13565420/actors 鑽石求åƒ​ é‡‘ä¹‹å¤©å ‚ç‰ˆ https://zh.listvote.com/lists/tv/programs/%E9%91%BD%E7%9F%B3%E6%B1%82%E5%8D%83%E9%87%91%E4%B9%8B%E5%A4%A9%E5%A0%82%E7%89%88-17514443/actors Hello Baby https://zh.listvote.com/lists/tv/programs/hello-baby-5369167/actors 冲浪女å©​ https://zh.listvote.com/lists/tv/programs/%E5%86%B2%E6%B5%AA%E5%A5%B3%E5%AD%A9-7645859/actors çµ‚æ¥µæ ¼é¬¥æˆ°å£«ï¼šé‡é​ ‡ç​ ´š https://zh.listvote.com/lists/tv/programs/%E7%B5%82%E6%A5%B5%E6%A0%BC%E9%AC%A5%E6%88%B0%E5%A3%AB%EF%BC%9A%E9%87%8D%E9%87%8F%E7%B4%9A-3287776/actors äº²çˆ±çš„Â·å®¢æ ˆ https://zh.listvote.com/lists/tv/programs/%E4%BA%B2%E7%88%B1%E7%9A%84%C2%B7%E5%AE%A2%E6%A0%88-39619341/actors 终æžæ​ ¼æ–—:约安娜队 vs.
    [Show full text]
  • Record of North Korea's Major Conventional Provocations Since
    May 25, 2010 Record of North Korea’s Major Conventional Provocations since 1960s Complied by the Office of the Korea Chair, CSIS Please note that the conventional provocations we listed herein only include major armed conflicts, military/espionage incursions, border infractions, acts of terrorism including sabotage bombings and political assassinations since the 1960s that resulted in casualties in order to analyze the significance of the attack on the Cheonan and loss of military personnel. This list excludes any North Korean verbal threats and instigation, kidnapping as well as the country’s missile launches and nuclear tests. January 21, 1968 Blue House Raid A North Korean armed guerrilla unit crossed the Demilitarized Zone into South Korea and, in disguise of South Korean military and civilians, attempted to infiltrate the Blue House to assassinate South Korean President Park Chung-hee. The assassination attempt was foiled, and in the process of pursuing commandos escaping back to North Korea, a significant number of South Korean police and soldiers were killed and wounded, allegedly as many as 68 and 66, respectively. Six American casualties were also reported. ROK Response: All 31 North Korean infiltrators were hunted down and killed except Kim Shin-Jo. After the raid, South Korea swiftly moved to strengthen the national defense by establishing the ROK Reserve Forces and defense industry and installing iron fencing along the military demarcation line. January 23, 1968 USS Pueblo Seizure The U.S. navy intelligence ship Pueblo on its mission near the coast of North Korea was captured in international waters by North Korea. Out of 83 crewmen, one died and 82 men were held prisoners for 11 months.
    [Show full text]
  • Korea's Mistake on China's ADIZ Controversy
    Korea’s Mistake on China’s ADIZ Controversy By Dr. Victor Cha December 2, 2013 Victor Cha is a senior adviser and the inaugural holder of the Korea Chair at the Center for Strategic and International Studies. He is also director of Asian studies and holds the D.S. Song-KF Chair in the Department of Government and School of Foreign Service at Georgetown University. From 2004 to 2007, he served as director for Asian affairs at the White House on the National Security Council (NSC), where he was responsible primarily for Japan, the Korean peninsula, Australia/New Zealand, and Pacific Island nation affairs. Dr. Cha was also the deputy head of delegation for the United States at the Six-Party Talks in Beijing and received two Outstanding Service Commendations during his tenure at the NSC. He is the award-winning author of Alignment Despite Antagonism: The United States- Korea-Japan Security Triangle (Stanford University Press, 1999), winner of the 2000 Ohira Book Prize; Nuclear North Korea: A Debate on Engagement Strategies, with Dave Kang (Columbia University Press, 2004); Beyond the Final Score: The Politics of Sport in Asia (Columbia University Press, 2009); and The Impossible State: North Korea, Past and Future (Ecco, 2012. Dr. Cha holds a B.A., an M.I.A., and a Ph.D. from Columbia University, as well as an M.A. from Oxford University. The Republic of Korea appropriately protested China’s November 23 announcement of the creation of the East China Sea Air Defense Identification Zone (ADIZ) through foreign ministry and defense ministry channels last week.
    [Show full text]
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Birth and Evolution of Korean Reality Show Formats
    Georgia State University ScholarWorks @ Georgia State University Film, Media & Theatre Dissertations School of Film, Media & Theatre Spring 5-6-2019 Dynamics of a Periphery TV Industry: Birth and Evolution of Korean Reality Show Formats Soo keung Jung [email protected] Follow this and additional works at: https://scholarworks.gsu.edu/fmt_dissertations Recommended Citation Jung, Soo keung, "Dynamics of a Periphery TV Industry: Birth and Evolution of Korean Reality Show Formats." Dissertation, Georgia State University, 2019. https://scholarworks.gsu.edu/fmt_dissertations/7 This Dissertation is brought to you for free and open access by the School of Film, Media & Theatre at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Film, Media & Theatre Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. DYNAMICS OF A PERIPHERY TV INDUSTRY: BIRTH AND EVOLUTION OF KOREAN REALITY SHOW FORMATS by SOOKEUNG JUNG Under the Direction of Ethan Tussey and Sharon Shahaf, PhD ABSTRACT Television format, a tradable program package, has allowed Korean television the new opportunity to be recognized globally. The booming transnational production of Korean reality formats have transformed the production culture, aesthetics and structure of the local television. This study, using a historical and practical approach to the evolution of the Korean reality formats, examines the dynamic relations between producer, industry and text in the
    [Show full text]
  • In Pueblo's Wake
    IN PUEBLO’S WAKE: FLAWED LEADERSHIP AND THE ROLE OF JUCHE IN THE CAPTURE OF THE USS PUEBLO by JAMES A. DUERMEYER Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS IN U.S. HISTORY THE UNIVERSITY OF TEXAS AT ARLINGTON December 2016 Copyright © by James Duermeyer 2016 All Rights Reserved Acknowledgements My sincere thanks to my professor and friend, Dr. Joyce Goldberg, who has guided me in my search for the detailed and obscure facts that make a thesis more interesting to read and scholarly in content. Her advice has helped me to dig just a bit deeper than my original ideas and produce a more professional paper. Thank you, Dr. Goldberg. I also wish to thank my wife, Janet, for her patience, her editing, and sage advice. She has always been extremely supportive in my quest for the masters degree and was my source of encouragement through three years of study. Thank you, Janet. October 21, 2016 ii Abstract IN PUEBLO’S WAKE: FLAWED LEADERSHIP AND THE ROLE OF JUCHE IN THE CAPTURE OF THE USS PUEBLO James Duermeyer, MA, U.S. History The University of Texas at Arlington, 2016 Supervising Professor: Joyce Goldberg On January 23, 1968, North Korea attacked and seized an American Navy spy ship, the USS Pueblo. In the process, one American sailor was mortally wounded and another ten crew members were injured, including the ship’s commanding officer. The crew was held for eleven months in a North Korea prison.
    [Show full text]
  • The Evolution of North Korean Cyber Threats
    The Evolution of North Korean Cyber Threats 2019-03 Chong Woo Kim, Senior Fellow The Asan Institute for Policy Studies Carolina Polito1 University of Bologna 2019.02.19 Introduction In North Korea, only a few people are allowed access to Kwangmyong, the national intranet service, as global internet access is restricted to a group of selected people, and the country has one of the weakest internet infrastructures in the world.2 Nonetheless, North Korea is a formidable cyber power, standing alongside major players like the United States, China, Russia, the United Kingdom, Israel and Iran.3 North Korea has been increasing resources to enhance and expand its cyber capabilities, as testified by the intensification of the regime-sponsored attacks that the world has witnessed in the last 10 years. Amongst the most blatant offensive cyber-attacks allegedly linked to hacker groups close to North Korea are the Sony Pictures attack, the WannaCry attack, and the DarkSeoul attack, despite the North’s constant denial of any involvement with these attacks or the damage suffered by them. North Korea’s cyber army consists of approximately 7,000 hackers,4 performing a wide range of activities including theft, denial of service (DDoS), espionage and sabotage. 5 These types of operations have proved to be very useful as part of North Korea’s asymmetric strategy towards the ROK-U.S. Combined Forces Command. Cyber operations are low-cost and low-risk, allowing North Korea to counter countries which have highly computer-dependent infrastructure, with little fear of retaliation. Due to their low-intensity, these attacks often lie beneath the threshold of an armed attack, reducing the risk of escalating the conflict to an unaffordable level.
    [Show full text]
  • Obama's North Korea Conundrum
    Victor D. Cha What Do They Really Want?: Obama’s North Korea Conundrum We remained deadlocked over a particular clause in the document. Our counterparts across the table demanded language that we thought to be unacceptable. Yet, in an effort to move the already faltering negotiations forward, we agreed to send the language back to Washington overnight for approval. This was the fourth round of the Six-Party Talks in September 2005. The talks had been suspended previously for well over a year, and the Bush administration, in its second term, was reengaging in a way that the first term had not. At issue was the Democratic People’s Republic of Korea’s (DPRK) demand that we put into writing a statement of U.S. non-hostile intent. The clause in question stipulated that the United States ‘‘has no intention to attack or invade the DPRK with nuclear or conventional weapons.’’1 To my surprise, the language came back the next morning having been approved in Washington. When we came back to the negotiation session at the Diaoyutai State Guest House with the accepted language, the Russians asked the Chinese chair for a recess from the deputy head of delegations drafting session. During the recess, they held a bilateral meeting with the North Koreans. In this meeting, they told the North, according to my Russian counterpart on their delegation, ‘‘The Americans are serious. You see this [clause]? This is called a negative security assurance. We tried to get this from them throughout the Cold War and were unsuccessful.’’ The author is the inaugural holder of the Korea Chair at CSIS, and adjunct senior fellow at the Pacific Council in Los Angeles.
    [Show full text]
  • Wrth2016intradiosuppl2 A16
    This file is a supplement to the 2016 edition of World Radio TV Handbook, and summarises the changes to the schedules printed in the book resulting from the implementation of the 2016 “A” season schedules. Contact details and other information about the stations shown in this file can be found in the International Radio section of WRTH 2016. If you haven’t yet got your copy, the book can be ordered from Amazon, your nearest bookstore or directly from our website at www.wrth.com/_shop WRTH INTERNATIONAL RADIO SCHEDULES - MAY 2016 Notes for the International Radio section Country abbreviation codes are shown after the country name. The three-letter codes after each frequency are transmitter site codes. These, and the Area/Country codes in the Area column, can be decoded by referring to the tables in the at the end of the file. Where a frequency has an asterisk ( *) etc. after it, see the ‘ KEY ’ section at the end of the sched - ule entry. The following symbols are used throughout this section: † = Irregular transmissions/broadcasts; ‡ = Inactive at editorial deadline; ± = variable frequency; + = DRM (Digital Radio Mondiale) transmission. ALASKA (ALS) ANGOLA (AGL) KNLS INTERNATIONAL (Rlg) ANGOLAN NATIONAL RADIO (Pub) kHz: 7355, 9655, 9920, 11765, 11870 kHz: 945 Summer Schedule 2016 Summer Schedule 2016 Chinese Days Area kHz English Days Area kHz 0800-1200 daily EAs 9655nls 2200-2300 daily SAf 945mul 1300-1400 daily EAs 9655nls, 9920nls French Days Area kHz 1400-1500 daily EAs 7355nls 2100-2200 daily SAf 945mul English Days Area kHz Lingala
    [Show full text]
  • 3 DX MAGAZINE No. 2
    2 - 2004 All times mentioned in this DX MAGAZINE are UTC - Alle Zeiten in diesem DX MAGAZINE sind UTC Staff of WORLDWIDE DX CLUB: PRESIDENT AND CHIEF EDITOR ..C WWDXC Headquarters, Michael Bethge, Postfach 12 14, D-61282 Bad Homburg, Germany B daytime +49-6102-2861, B evening/weekend +49-6172-390918 F +49-6102-800999 V E-Mail: [email protected] BROADCASTING NEWS EDITOR . C Dr. Jürgen Kubiak, Goltzstrasse 19, D-10781 Berlin, Germany E-Mail: [email protected] LOGBOOK EDITOR .............C Ashok Kumar Bose, Apt. #421, 3420 Morning Star Drive, Mississauga, ON, L4T 1X9, Canada V E-Mail: [email protected] QSL CORNER EDITOR ..........C Richard Lemke, 60 Butterfield Crescent, St. Albert, Alberta, T8N 2W7, Canada V E-Mail: [email protected] TOP NEWS EDITOR (Internet) ....C Wolfgang Büschel, Hoffeld, Sprollstrasse 87, D-70597 Stuttgart, Germany V E-Mail: [email protected] TREASURER & SECRETARY .....C Karin Bethge, Urseler Strasse 18, D-61348 Bad Homburg, Germany NEWCOMER SERVICE OF AGDX . C Hobby-Beratung, c/o AGDX, Postfach 12 14, D-61282 Bad Homburg, Germany (please enclose return postage) Each of the editors mentioned above is self-responsible for the contents of his composed column. Furthermore, we cannot be responsible for the contents of advertisements published in DX MAGAZINE. We have no fixed deadlines. Contributions may be sent either to WWDXC Headquarters or directly to our editors at any time. If you send your contributions to WWDXC Headquarters, please do not forget to write all contributions for the different sections on separate sheets of paper, so that we are able to distribute them to the competent section editors.
    [Show full text]
  • An Assessment of North Korean Threats and Vulnerabilities in Cyberspace
    BearWorks MSU Graduate Theses Fall 2017 An Assessment of North Korean Threats and Vulnerabilities in Cyberspace Jeremiah van Rossum Missouri State University, [email protected] As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation van Rossum, Jeremiah, "An Assessment of North Korean Threats and Vulnerabilities in Cyberspace" (2017). MSU Graduate Theses. 3212. https://bearworks.missouristate.edu/theses/3212 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE A Master’s Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Jeremiah Adam van Rossum December 2017 Copyright 2017 by Jeremiah Adam van Rossum ii AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE Defense and Strategic Studies Missouri State University, December 2017 Master of Science Jeremiah Adam van Rossum ABSTRACT This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these.
    [Show full text]
  • Threatscape of the US Election
    Gage Mele Threatscape of the US Election Overview of the mainstream highlighting the importance of The cyber attacks targeting political elections is in full free, fair, transparent, and credible elections to the swing as the 115th United States midterm elections preservation of democratic societies. However, what grow closer. The exploitation of vulnerabilities and can arguably be observed as the first large-scale direct cyber attacks targeting election-related entities election meddling operation took place in 2014 are somewhat expected; however, a different form when Russian-attributed threat actors targeted the of cyber attack has the potential to have a disruptive Ukrainian Presidential election. This can be viewed as impact to the elections: disinformation campaigns. the beginning of election cyber attacks because since The use of disinformation tactics in today’s social that time, it is difficult to go through election cycles media-obsessed society is the most prominent threat around the globe, particularly presidential elections, to the democratic process. This form of attack is at without hearing or seeing the possibility of Russian a significant and troublesome level that the average and other state-sponsored or threat group activity. voter may not be fully aware of. The presence and Fast-forward to the US 2018 midterm election, and overall use of social media on a global scale allows one would be hard-pressed to avoid seeing security the sharing of information at astounding speeds, and researchers and media outlets discuss threats posed threat actors can take advantage of this data sharing to nation’s election infrastructure. A wide range to propagate false narratives and influence the of threat actors pose a risk to the elections from masses.
    [Show full text]