Abstract
In this paper, we argue that the two Koreas’ intentions and actions on the cyber front point toward the possibility that they have engaged in cyber warfare against each other. From South Korea’s standpoint, a key concern has been North Korea’s advanced cyber warfare capabilities and alleged involvement of its substantial workforce in the Internet’s dark side activities. These issues need to be looked at the backdrop of the North’s nuclear and ballistic missile capabilities. This paper draws principally upon theories and concepts from military strategy and warfare to examine the contexts, mechanisms, and processes associated with the cyber warfare in the Korean peninsula. We also compare the two Koreas in terms of various forms of asymmetries in cyber warfare and cyber attacks. Also highlighted in the paper are South Korea’s recent initiatives and actions to enhance cyber-offense and cyber-defense capabilities.
Similar content being viewed by others
Notes
According to a defector from the Electronic Warfare Unit of the KPA, over 30,000 people in KPA may be engaged in cyber attacks against foreign targets (Yoon, 2011).
The first department focuses on gathering foreign intelligence and anti-communist, anti-terror, and anti-espionage efforts remain within the second department’s purview.
References
Agence France-Presse (2011). South Korea to open cyber warfare school. http://gadgets.ndtv.com/others/news/south-korea-to-open-cyber-warfare-school-225865. Accessed 28 March 2014.
Agence France-Presse (2014). S. Korea detects suspected N. Korea hacking attempt. http://www.globalpost.com/dispatch/news/afp/140327/s-korea-detects-suspected-n-korea-hacking-attempt. Accessed 28 March 2014.
Alabaster, J. (2012). Japanese defense panel: cyber attacks can be basis for military self-defense. <http://www.pcworld.com/article/262010/japanese_defense_panel_cyber_attacks_can_be_basis_for_military_self_defense.html>. Accessed at 4 October 2013.
Arrirang News (2013). Defense Ministry to establish cyber policy department, www.arirang.co.kr/News/News_View.asp?nseq=145526. Accessed 28 March 2014.
bbc.com (2014). South Korea to develop Stuxnet-like cyberweapons. http://www.bbc.com/news/technology-26287527. Accessed 28 March 2014
Bechtol, B. E. (2013). South Korea: responding to the North Korean threat, American Enterprise Institute. http://www.aei.org/outlook/foreign-and-defense-policy/defense/south-korea-responding-to-the-north-korean-threat/. Accessed 28 March 2014.
beSUCCESS (2013). South Korea cyber security concerns go far beyond financial industry. http://e27.co/south-korea-cyber-security-concerns-go-far-beyond-financial-industry/. Accessed 28 March 2014.
Boyle, J. (2014). South Korea’s strange cyberwar admission. 2 March http://www.bbc.com/news/world-asia-26330816. Accessed 28 March 2014.
Boynton, R. S. (2011). North Korea’s digital underground, February 24, http://www.theatlantic.com/magazine/archive/2011/04/north-koreas-digital-underground/308414/. Accessed 28 March 2014.
businesskorea.co.kr (2013). Strengthened cyber security: Korea and US lay institutional foundation for cooperation in cyber security. http://www.businesskorea.co.kr/article/1601/strengthened-cyber-security-korea-and-us-lay-institutional-foundation-cooperation-cyber. Accessed 28 March 2014.
Chen, C., Ko, K., & Lee, J. (2010). North Korea’s Internet strategy and its political implications, The Pacific Review, 23 (5), 649–670.
chosun.com (2011). Seoul’s makeshift answer to N. Korean Jamming Attacks. http://english.chosun.com/site/data/html_dir/2011/09/23/2011092300630.html. Accessed 28 March 2014.
chosun.com (2013a). N. Korea ‘confident’ in cyber warfare capabilities. http://english.chosun.com/si, te/data/html_dir/2013/04/08/2013040801313.html. Accessed 28 March 2014.
chosun.com (2013b). KSTN. Korea boosting cyber warfare capabilities. http://english.chosun.com/site/data/html_dir/2013/11/05/2013110501790.html. Accessed 28 March 2014.
Clark, D. D., & Landau, S. (2011). Untangling attribution, Harvard National Security Journal, 2 (2), 25–40.
Clayton, M. (2013), In cyberarms race, North Korea emerging as a power, not a pushover. http://www.csmonitor.com/World/Security-Watch/2013/1019/In-cyberarms-race-North-Korea-emerging-as-a-power-not-a-pushover. Accessed 28 March 2014.
Cobb, A. (1999). Electronic gallipoli? Australian Journal of International Affairs 53 (2):133–149.
Corbin, K. (2013). Iran is a more volatile cyber threat to U.S. than China or Russia, CIO, March 21, http://www.cio.com/article/2387362/government/iran-is-a-more-volatile-cyber-threat-to-u-s--than-china-or-russia.html. Accessed 28 March 2014.
Drennan, W. M. (2003). North Korea’s non-military threats. East Asia: An International Quarterly, 20 (2), 48–59.
economist.com. (2010). War in the fifth domain: are the mouse and keyboard the new weapons of conflict? http://www.economist.com/node/16478792. Accessed 28 March 2014.
economist.com. (2011). North Korean computer hackers: black hats for hire. http://www.economist.com/blogs/banyan/2011/08/north-korean-computer-hackers. Accessed 28 March 2014.
Eun-jung, K. (2013). S. Korean military to prepare with U.S. for cyber warfare scenarios. http://english.yonhapnews.co.kr/national/2013/04/01/20/0301000000AEN20130401004000315F.HTML. Accessed 28 March 2014.
Eun-jung, K. (2014). S. Korea pushes to develop offensive cyber warfare tools, February 19, http://english.yonhapnews.co.kr/national/2014/02/19/3/0301000000AEN20140219003100315F.html. Accessed 28 March 2014.
Fildes, J. (2010). Stuxnet worm “targeted high-value Iranian assets”. Retrieved from http://www.bbc.co.uk/news/technology-11388018. Accessed 28 March 2014.
Firn, M. (2013). North Korea builds online troll army of 3,000. http://www.telegraph.co.uk/news/worldnews/asia/northkorea/10239283/North-Korea-builds-online-troll-army-of-3000.html. Accessed 28 March 2014.
Fisher, M. (2013). North Korea may have secretly engineered computer games to launch mass cyber attack. http://www.washingtonpost.com/blogs/worldviews/wp/2013/10/23/north-korea-may-have-secretly-engineered-popular-computer-games-to-launch-mass-cyber-attack/. Accessed 28 March 2014.
Gartzke, E. (2013). The myth of cyber war: bringing war in cyberspace back down to earth, International Security, 38 (2), 41–73.
globalpost.com. (2013), Damage from N.K. cyber attacks estimated at 860 bln won: lawmaker. http://www.globalpost.com/dispatch/news/yonhap-news-agency/131015/damage-nk-cyber-attacks-estimated-at-860-bln-won-lawmaker. Accessed 28 March 2014.
Greenwood, R., Hinings, C. R. (1993). Understanding strategic change: the contribution of archetypes. Academy of Management Journal, 36, 1052–1081.
Gross, G. (2013). Experts: Iran and North Korea are looming cyberthreats to U.S, CIO. March 20, 10. Accessed 28 March 2014. http://www.computerworld.com/s/article/9237759/Experts_Iran_and_North_Korea_are_looming_cyberthreats_to_U.S.
Habib, B. (2011). North Korea’s nuclear weapons programme and the maintenance of the Songun system, The Pacific Review, 24 (1), 43–64.
Haveman, H. A. (1992). Between a rock and a hard place: organizational change and performance under conditions of fundamental environmental transformation. Administrative Science Quarterly, 37, 48–75.
Hern, A. (2013). North Korean ‘cyber warfare’ said to have cost South Korea £500 m. http://www.theguardian.com/world/2013/oct/16/north-korean-cyber-warfare-south-korea. Accessed 28 March 2014.
Hickey, W. (2012). Cyber war: North Korea is getting dangerously good at knocking out networks. http://www.businessinsider.com/cyber-war-north-korea-is-getting-dangerously-good-at-knocking-out-networks-2012-6. Accessed 28 March 2014.
Hirshleifer, J. (1998). The bioeconomic causes of war. Managerial and Decision Economics, 19 (7/8), 457–466.
Ho, S. (2004). Haven for hackers, Foreign Policy, November/December, 145.
Hudson, J. (2013a). A total cyber blackout in North Korea would affect about 1,000 citizens. http://blog.foreignpolicy.com/posts/2013/03/15/a_total_cyber_blackout_in_north_korea_would_affect_about_1000_citizens#sthash.oU9LzCvV.dpbs. Accessed 28 March 2014.
Hudson, J. (2013b). 7 things North Korea is really good at. http://www.foreignpolicy.com/articles/2013/04/29/7_things_north_korea_is_really_good_at#sthash.psVqvAU2.dpbs. Accessed 28 March 2014.
Kaempfer W.H., & Lowenberg, A.D. (1988). The theory of international economic sanctions: a public choice approach, American Economic Review, 78 (4),786-793.
Keck, Z. (2014). S. Korea seeks cyber weapons to target North Korea’s nukes. http://thediplomat.com/2014/02/s-korea-seeks-cyber-weapons-to-target-north-koreas-nukes/. Accessed 28 March 2014
Kim, D. (2012). The Republic of Korea’s counter-asymmetric strategy. Naval War College Review, 65 (1), 55–74
Koo, S. (2013). Cyber security in South Korea: the threat within. http://thediplomat.com/2013/08/cyber-security-in-south-korea-the-threat-within/. Accessed 28 March 2014.
koreaittimes.com (2013). Responses to cyber threats and future tasks—IPAK seminar, July 11th. http://www.koreaittimes.com/story/30252/responses-cyber-threats-and-future-tasks-%E2%80%93-ipak-seminar. Accessed 28 March 2014.
koreatimes.co.kr (2012). Korea, US mull regular cyber warfare drills. http://www.koreatimes.co.kr/www/news/nation/2013/07/205_119780.html. Accessed 28 March 2014
Kovacs, E. (2012). Navigation affected after North Korea launched GPS jamming attack. http://news.softpedia.com/news/Navigation-Affected-After-North-Korea-Launches-GPS-Jamming-Attack-268714.shtml. Accessed 28 March 2014.
Kshetri, N. (2005). ICTs, strategic asymmetry and national security, Journal of International Management, 11 (4), 563–580.
Kshetri, N. (2010). The global cyber-crime industry: economic, institutional and strategic perspectives, Springer-Verlag: Heidelberg.
Kshetri, N. (2013a). Reliability, validity, comparability and practical utility of cybercrime-related data, metrics, and information, Information, 4 (1), 117–123.
Kshetri, N. (2013b). Cybercrime and Cybersecurity in the Global South, Palgrave Macmillan: Houndmills, Basingstoke, U.K.
Kshetri, N. (2014). Japan’s changing cyber security landscape, IEEE Computer, 47 (1), 83–86
Kwon, Y. (2011), Cyber-attacks add to North Korean arsenal. www.atimes.com/atimes/Korea/MC17Dg01.html Accessed 28 March 2014.
Kwony (2013). North Korea’s vast cyber warfare army. http://cybersecurity.mit.edu/2013/09/north-koreas-vast-cyber-warfare-army/. Accessed 28 March 2014.
Lant, T. K., & Mezias, S. J. (1992). An organizational learning model of convergence and reorientation. Organization Science, 3, 47–71.
Lee, D. (2012). North Korea: On the net in world’s most secretive nation. http://www.bbc.co.uk/news/technology-20445632. Accessed 28 March 2014.
Lee, Y. (2013). North Korea cyber warfare: hacking ‘warriors’ being trained in teams. http://www.huffingtonpost.com/2013/03/24/north-korea-cyber-warfare-warriors-trained-teams_n_2943907.html Accessed 28 March 2014.
Levitt, B., & March, J. G. (1988). Organizational learning. Annual Review of Sociology, 14, 319–340.
MacKinnon, R. (2010). Hermit hackers. http://www.foreignpolicy.com/articles/2005/01/05/hermit_hackers. Accessed 28 March 2014.
Masters, J. (2011). Confronting the cyber threat, Council on foreign relations. http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577. Accessed 28 March 2014.
McGee, J. (2011). The difficulties of assessing North Korea’s cyber strategy. https://csis.org/blog/difficulties-assessing-north-koreas-cyber-strategy. Accessed 28 March 2014.
McWilliams, B. (2003). North Korea’s school for hackers. http://www.wired.com/politics/law/news/2003/06/59043?currentPage=all. Accessed 28 March 2014.
Metz, S. (2001). Strategic asymmetry, Military Review. July-August, 23–31.
Metz, S., & Johnson, D. V. II., (2001). Asymmetry and U.S. military strategy: definition, background, and strategic concepts, Carlisle Barracks, PA.: US Army War College, Strategic Studies Institute, January.
Miller, O. (2006). North Korea’s hidden history. http://www.isj.org.uk/?id=166. Accessed 28 March 2014.
Minji, L. (2013). S. Korea to set up GPS jamming surveillance system. www.globalpost.com/dispatch/news/asianet/130410/s-korea-set-gps-jamming-surveillance-system. Accessed 28 March 2014.
Naylor, R. T. (2005). The rise and fall of the underground economy, Brown Journal of World Affairs, 11 (2), 131–143.
Newman, K. L. (2000). Organizational transformation during institutional upheaval. Academy of Management Review, 25, 602–619.
Olsen, K. (2009). South Korea websites under renewed attack: state official. http://www.huffingtonpost.com/2009/07/09/south-korea-websites-unde_n_228464.html. Accessed 28 March 2014.
Ong, R. (2008). South Korea and China’s security objectives in East Asia, Asia-Pacific Review. 15 (2), 102–119
Panda, A. (2014). Pentagon North Korea report for 2013: unimpressive hardware, focus on cyber attacks. http://thediplomat.com/2014/03/pentagon-north-korea-report-for-2013-unimpressive-hardware-focus-on-cyber-attacks/. Accessed 28 March 2014.
Pfanner, E. (2013). Google jousts with wired South Korea over quirky Internet rules. http://www.nytimes.com/2013/10/14/business/international/google-jousts-with-south-koreas-piecemeal-internet-rules.html?_r=1&. Accessed 28 March 2014.
Raska, M. (2014). Cyberwars on the Korean Peninsula, 22 April, http://www.aljazeera.com/indepth/opinion/2014/04/cyberwars-korean-peninsula-2014422531782925.html. Accessed 28 March 2014.
Royle, T. (1990). A dictionary of military quotations, New York: Simon & Schuster.
Sang-ho, S. (2012). S. Korea strives to bolster cyber combat capabilities. http://www.koreaherald.com/common_prog/newsprint.php?ud=20120610000219&dt=2. Accessed 28 March 2014.
Sang-Hun, C. (2011). Seoul warns of latest North Korean threat: an army of online gaming hackers. http://www.nytimes.com/2011/08/05/world/asia/05korea.html?_r=4&. Accessed 28 March 2014.
Sang-Hun, C. (2013). South Korean officials accused of political meddling http://www.nytimes.com/2013/12/20/world/asia/south-korean-cyberwarfare-unit-accused-of-political-meddling.html. Accessed 28 March 2014.
Schearf, D. (2013). North Korea’s ‘world class’ cyber attacks coming from China. http://www.voanews.com/content/north-koreas-world-class-cyber-attacks-coming-from-china/1795349.html. Accessed 28 March 2014.
Shackelford, S. J. (2009). From nuclear war to net war: analogizing cyber attacks in international law. Berkeley Journal of International Law, 27 (1), 192–251.
Tae-gyu, K. (2013). Spy agency ups capabilities against cyber attacks, Korea Times. www.koreatimes.co.kr/www/news/nation/2013/04/116_133851.html. Accessed 28 March 2014.
The Economist. (2008). Marching off to cyber war. 389 (8609), 20, December 8. http://www.economist.com/node/12673385. Accessed 28 March 2014.
Ulsch, M. (2013). The axis of cyber evil: a North Korean case of cyber espionage. http://www.hstoday.us/blogs/critical-issues-in-national-cybersecurity/blog/the-axis-of-cyber-evil-a-north-korean-case-of-cyber-espionage/3072be3aacf419cc494e3910a62107b2.html. Accessed 28 March 2014.
United Nations (2014). National accounts main aggregate database, http://unstats.un.org/unsd/snaama/resCountry.asp. Accessed 28 March 2014.
Vlahos, K. B. (2014). Special report: the cyber war threat from North Korea. http://www.foxnews.com/tech/2014/02/14/cyberwar-experts-question-north-korea-cyber-capabilities/. Accessed 28 March 2014.
Waterman, S. (2012). North Korean jamming of GPS shows system’s weakness, Washington Times. www.washingtontimes.com/news/2012/aug/23/north-korean-jamming-gps-shows-systems-weakness. Accessed 28 March 2014.
Weick, K. E. (1979). The social psychology of organizing (2nd ed.). Reading: Addison-Wesley.
Yonhap, (2013). Seoul needs to counter N. Korea’s cyber espionage capabilities: defense chief, www.globalpost.com/dispatch/news/yonhap-news-agency/130620/seoul-needs-counter-n-koreas-cyber-espionage-capabilities-de. Accessed 28 March 2014.
Yoon, S. (2011). North Korea recruits hackers at school, 20 June. http://www.aljazeera.com/indepth/features/2011/06/201162081543573839.html. Accessed 28 March 2014.
Acknowledgment
Two anonymous East Asia reviewers’ comments on an earlier version helped to improve the paper substantially.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kshetri, N. Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses. East Asia 31, 183–201 (2014). https://doi.org/10.1007/s12140-014-9215-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12140-014-9215-1