Skip to main content
Log in

Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses

  • Published:
East Asia Aims and scope Submit manuscript

Abstract

In this paper, we argue that the two Koreas’ intentions and actions on the cyber front point toward the possibility that they have engaged in cyber warfare against each other. From South Korea’s standpoint, a key concern has been North Korea’s advanced cyber warfare capabilities and alleged involvement of its substantial workforce in the Internet’s dark side activities. These issues need to be looked at the backdrop of the North’s nuclear and ballistic missile capabilities. This paper draws principally upon theories and concepts from military strategy and warfare to examine the contexts, mechanisms, and processes associated with the cyber warfare in the Korean peninsula. We also compare the two Koreas in terms of various forms of asymmetries in cyber warfare and cyber attacks. Also highlighted in the paper are South Korea’s recent initiatives and actions to enhance cyber-offense and cyber-defense capabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. According to a defector from the Electronic Warfare Unit of the KPA, over 30,000 people in KPA may be engaged in cyber attacks against foreign targets (Yoon, 2011).

  2. The first department focuses on gathering foreign intelligence and anti-communist, anti-terror, and anti-espionage efforts remain within the second department’s purview.

References

  1. Agence France-Presse (2011). South Korea to open cyber warfare school. http://gadgets.ndtv.com/others/news/south-korea-to-open-cyber-warfare-school-225865. Accessed 28 March 2014.

  2. Agence France-Presse (2014). S. Korea detects suspected N. Korea hacking attempt. http://www.globalpost.com/dispatch/news/afp/140327/s-korea-detects-suspected-n-korea-hacking-attempt. Accessed 28 March 2014.

  3. Alabaster, J. (2012). Japanese defense panel: cyber attacks can be basis for military self-defense. <http://www.pcworld.com/article/262010/japanese_defense_panel_cyber_attacks_can_be_basis_for_military_self_defense.html>. Accessed at 4 October 2013.

  4. Arrirang News (2013). Defense Ministry to establish cyber policy department, www.arirang.co.kr/News/News_View.asp?nseq=145526. Accessed 28 March 2014.

  5. bbc.com (2014). South Korea to develop Stuxnet-like cyberweapons. http://www.bbc.com/news/technology-26287527. Accessed 28 March 2014

  6. Bechtol, B. E. (2013). South Korea: responding to the North Korean threat, American Enterprise Institute. http://www.aei.org/outlook/foreign-and-defense-policy/defense/south-korea-responding-to-the-north-korean-threat/. Accessed 28 March 2014.

  7. beSUCCESS (2013). South Korea cyber security concerns go far beyond financial industry. http://e27.co/south-korea-cyber-security-concerns-go-far-beyond-financial-industry/. Accessed 28 March 2014.

  8. Boyle, J. (2014). South Korea’s strange cyberwar admission. 2 March http://www.bbc.com/news/world-asia-26330816. Accessed 28 March 2014.

  9. Boynton, R. S. (2011). North Korea’s digital underground, February 24, http://www.theatlantic.com/magazine/archive/2011/04/north-koreas-digital-underground/308414/. Accessed 28 March 2014.

  10. businesskorea.co.kr (2013). Strengthened cyber security: Korea and US lay institutional foundation for cooperation in cyber security. http://www.businesskorea.co.kr/article/1601/strengthened-cyber-security-korea-and-us-lay-institutional-foundation-cooperation-cyber. Accessed 28 March 2014.

  11. Chen, C., Ko, K., & Lee, J. (2010). North Korea’s Internet strategy and its political implications, The Pacific Review, 23 (5), 649–670.

    Article  Google Scholar 

  12. chosun.com (2011). Seoul’s makeshift answer to N. Korean Jamming Attacks. http://english.chosun.com/site/data/html_dir/2011/09/23/2011092300630.html. Accessed 28 March 2014.

  13. chosun.com (2013a). N. Korea ‘confident’ in cyber warfare capabilities. http://english.chosun.com/si, te/data/html_dir/2013/04/08/2013040801313.html. Accessed 28 March 2014.

  14. chosun.com (2013b). KSTN. Korea boosting cyber warfare capabilities. http://english.chosun.com/site/data/html_dir/2013/11/05/2013110501790.html. Accessed 28 March 2014.

  15. Clark, D. D., & Landau, S. (2011). Untangling attribution, Harvard National Security Journal, 2 (2), 25–40.

    Google Scholar 

  16. Clayton, M. (2013), In cyberarms race, North Korea emerging as a power, not a pushover. http://www.csmonitor.com/World/Security-Watch/2013/1019/In-cyberarms-race-North-Korea-emerging-as-a-power-not-a-pushover. Accessed 28 March 2014.

  17. Cobb, A. (1999). Electronic gallipoli? Australian Journal of International Affairs 53 (2):133–149.

    Article  Google Scholar 

  18. Corbin, K. (2013). Iran is a more volatile cyber threat to U.S. than China or Russia, CIO, March 21, http://www.cio.com/article/2387362/government/iran-is-a-more-volatile-cyber-threat-to-u-s--than-china-or-russia.html. Accessed 28 March 2014.

  19. Drennan, W. M. (2003). North Korea’s non-military threats. East Asia: An International Quarterly, 20 (2), 48–59.

    Article  Google Scholar 

  20. economist.com. (2010). War in the fifth domain: are the mouse and keyboard the new weapons of conflict? http://www.economist.com/node/16478792. Accessed 28 March 2014.

  21. economist.com. (2011). North Korean computer hackers: black hats for hire. http://www.economist.com/blogs/banyan/2011/08/north-korean-computer-hackers. Accessed 28 March 2014.

  22. Eun-jung, K. (2013). S. Korean military to prepare with U.S. for cyber warfare scenarios. http://english.yonhapnews.co.kr/national/2013/04/01/20/0301000000AEN20130401004000315F.HTML. Accessed 28 March 2014.

  23. Eun-jung, K. (2014). S. Korea pushes to develop offensive cyber warfare tools, February 19, http://english.yonhapnews.co.kr/national/2014/02/19/3/0301000000AEN20140219003100315F.html. Accessed 28 March 2014.

  24. Fildes, J. (2010). Stuxnet worm “targeted high-value Iranian assets”. Retrieved from http://www.bbc.co.uk/news/technology-11388018. Accessed 28 March 2014.

  25. Firn, M. (2013). North Korea builds online troll army of 3,000. http://www.telegraph.co.uk/news/worldnews/asia/northkorea/10239283/North-Korea-builds-online-troll-army-of-3000.html. Accessed 28 March 2014.

  26. Fisher, M. (2013). North Korea may have secretly engineered computer games to launch mass cyber attack. http://www.washingtonpost.com/blogs/worldviews/wp/2013/10/23/north-korea-may-have-secretly-engineered-popular-computer-games-to-launch-mass-cyber-attack/. Accessed 28 March 2014.

  27. Gartzke, E. (2013). The myth of cyber war: bringing war in cyberspace back down to earth, International Security, 38 (2), 41–73.

    Article  Google Scholar 

  28. globalpost.com. (2013), Damage from N.K. cyber attacks estimated at 860 bln won: lawmaker. http://www.globalpost.com/dispatch/news/yonhap-news-agency/131015/damage-nk-cyber-attacks-estimated-at-860-bln-won-lawmaker. Accessed 28 March 2014.

  29. Greenwood, R., Hinings, C. R. (1993). Understanding strategic change: the contribution of archetypes. Academy of Management Journal, 36, 1052–1081.

    Article  Google Scholar 

  30. Gross, G. (2013). Experts: Iran and North Korea are looming cyberthreats to U.S, CIO. March 20, 10. Accessed 28 March 2014. http://www.computerworld.com/s/article/9237759/Experts_Iran_and_North_Korea_are_looming_cyberthreats_to_U.S.

  31. Habib, B. (2011). North Korea’s nuclear weapons programme and the maintenance of the Songun system, The Pacific Review, 24 (1), 43–64.

    Article  Google Scholar 

  32. Haveman, H. A. (1992). Between a rock and a hard place: organizational change and performance under conditions of fundamental environmental transformation. Administrative Science Quarterly, 37, 48–75.

    Article  Google Scholar 

  33. Hern, A. (2013). North Korean ‘cyber warfare’ said to have cost South Korea £500 m. http://www.theguardian.com/world/2013/oct/16/north-korean-cyber-warfare-south-korea. Accessed 28 March 2014.

  34. Hickey, W. (2012). Cyber war: North Korea is getting dangerously good at knocking out networks. http://www.businessinsider.com/cyber-war-north-korea-is-getting-dangerously-good-at-knocking-out-networks-2012-6. Accessed 28 March 2014.

  35. Hirshleifer, J. (1998). The bioeconomic causes of war. Managerial and Decision Economics, 19 (7/8), 457–466.

    Article  Google Scholar 

  36. Ho, S. (2004). Haven for hackers, Foreign Policy, November/December, 145.

  37. Hudson, J. (2013a). A total cyber blackout in North Korea would affect about 1,000 citizens. http://blog.foreignpolicy.com/posts/2013/03/15/a_total_cyber_blackout_in_north_korea_would_affect_about_1000_citizens#sthash.oU9LzCvV.dpbs. Accessed 28 March 2014.

  38. Hudson, J. (2013b). 7 things North Korea is really good at. http://www.foreignpolicy.com/articles/2013/04/29/7_things_north_korea_is_really_good_at#sthash.psVqvAU2.dpbs. Accessed 28 March 2014.

  39. Kaempfer W.H., & Lowenberg, A.D. (1988). The theory of international economic sanctions: a public choice approach, American Economic Review, 78 (4),786-793.

    Google Scholar 

  40. Keck, Z. (2014). S. Korea seeks cyber weapons to target North Korea’s nukes. http://thediplomat.com/2014/02/s-korea-seeks-cyber-weapons-to-target-north-koreas-nukes/. Accessed 28 March 2014

  41. Kim, D. (2012). The Republic of Korea’s counter-asymmetric strategy. Naval War College Review, 65 (1), 55–74

    Google Scholar 

  42. Koo, S. (2013). Cyber security in South Korea: the threat within. http://thediplomat.com/2013/08/cyber-security-in-south-korea-the-threat-within/. Accessed 28 March 2014.

  43. koreaittimes.com (2013). Responses to cyber threats and future tasks—IPAK seminar, July 11th. http://www.koreaittimes.com/story/30252/responses-cyber-threats-and-future-tasks-%E2%80%93-ipak-seminar. Accessed 28 March 2014.

  44. koreatimes.co.kr (2012). Korea, US mull regular cyber warfare drills. http://www.koreatimes.co.kr/www/news/nation/2013/07/205_119780.html. Accessed 28 March 2014

  45. Kovacs, E. (2012). Navigation affected after North Korea launched GPS jamming attack. http://news.softpedia.com/news/Navigation-Affected-After-North-Korea-Launches-GPS-Jamming-Attack-268714.shtml. Accessed 28 March 2014.

  46. Kshetri, N. (2005). ICTs, strategic asymmetry and national security, Journal of International Management, 11 (4), 563580.

    Article  Google Scholar 

  47. Kshetri, N. (2010). The global cyber-crime industry: economic, institutional and strategic perspectives, Springer-Verlag: Heidelberg.

    Book  Google Scholar 

  48. Kshetri, N. (2013a). Reliability, validity, comparability and practical utility of cybercrime-related data, metrics, and information, Information, 4 (1), 117–123.

    Article  Google Scholar 

  49. Kshetri, N. (2013b). Cybercrime and Cybersecurity in the Global South, Palgrave Macmillan: Houndmills, Basingstoke, U.K.

  50. Kshetri, N. (2014). Japan’s changing cyber security landscape, IEEE Computer, 47 (1), 83–86

    Article  Google Scholar 

  51. Kwon, Y. (2011), Cyber-attacks add to North Korean arsenal. www.atimes.com/atimes/Korea/MC17Dg01.html Accessed 28 March 2014.

  52. Kwony (2013). North Korea’s vast cyber warfare army. http://cybersecurity.mit.edu/2013/09/north-koreas-vast-cyber-warfare-army/. Accessed 28 March 2014.

  53. Lant, T. K., & Mezias, S. J. (1992). An organizational learning model of convergence and reorientation. Organization Science, 3, 47–71.

    Article  Google Scholar 

  54. Lee, D. (2012). North Korea: On the net in world’s most secretive nation. http://www.bbc.co.uk/news/technology-20445632. Accessed 28 March 2014.

  55. Lee, Y. (2013). North Korea cyber warfare: hacking ‘warriors’ being trained in teams. http://www.huffingtonpost.com/2013/03/24/north-korea-cyber-warfare-warriors-trained-teams_n_2943907.html Accessed 28 March 2014.

  56. Levitt, B., & March, J. G. (1988). Organizational learning. Annual Review of Sociology, 14, 319–340.

    Article  Google Scholar 

  57. MacKinnon, R. (2010). Hermit hackers. http://www.foreignpolicy.com/articles/2005/01/05/hermit_hackers. Accessed 28 March 2014.

  58. Masters, J. (2011). Confronting the cyber threat, Council on foreign relations. http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577. Accessed 28 March 2014.

  59. McGee, J. (2011). The difficulties of assessing North Korea’s cyber strategy. https://csis.org/blog/difficulties-assessing-north-koreas-cyber-strategy. Accessed 28 March 2014.

  60. McWilliams, B. (2003). North Korea’s school for hackers. http://www.wired.com/politics/law/news/2003/06/59043?currentPage=all. Accessed 28 March 2014.

  61. Metz, S. (2001). Strategic asymmetry, Military Review. July-August, 23–31.

  62. Metz, S., & Johnson, D. V. II., (2001). Asymmetry and U.S. military strategy: definition, background, and strategic concepts, Carlisle Barracks, PA.: US Army War College, Strategic Studies Institute, January.

  63. Miller, O. (2006). North Korea’s hidden history. http://www.isj.org.uk/?id=166. Accessed 28 March 2014.

  64. Minji, L. (2013). S. Korea to set up GPS jamming surveillance system. www.globalpost.com/dispatch/news/asianet/130410/s-korea-set-gps-jamming-surveillance-system. Accessed 28 March 2014.

  65. Naylor, R. T. (2005). The rise and fall of the underground economy, Brown Journal of World Affairs, 11 (2), 131–143.

    Google Scholar 

  66. Newman, K. L. (2000). Organizational transformation during institutional upheaval. Academy of Management Review, 25, 602–619.

    Google Scholar 

  67. Olsen, K. (2009). South Korea websites under renewed attack: state official. http://www.huffingtonpost.com/2009/07/09/south-korea-websites-unde_n_228464.html. Accessed 28 March 2014.

  68. Ong, R. (2008). South Korea and China’s security objectives in East Asia, Asia-Pacific Review. 15 (2), 102–119

    Article  Google Scholar 

  69. Panda, A. (2014). Pentagon North Korea report for 2013: unimpressive hardware, focus on cyber attacks. http://thediplomat.com/2014/03/pentagon-north-korea-report-for-2013-unimpressive-hardware-focus-on-cyber-attacks/. Accessed 28 March 2014.

  70. Pfanner, E. (2013). Google jousts with wired South Korea over quirky Internet rules. http://www.nytimes.com/2013/10/14/business/international/google-jousts-with-south-koreas-piecemeal-internet-rules.html?_r=1&. Accessed 28 March 2014.

  71. Raska, M. (2014). Cyberwars on the Korean Peninsula, 22 April, http://www.aljazeera.com/indepth/opinion/2014/04/cyberwars-korean-peninsula-2014422531782925.html. Accessed 28 March 2014.

  72. Royle, T. (1990). A dictionary of military quotations, New York: Simon & Schuster.

    Google Scholar 

  73. Sang-ho, S. (2012). S. Korea strives to bolster cyber combat capabilities. http://www.koreaherald.com/common_prog/newsprint.php?ud=20120610000219&dt=2. Accessed 28 March 2014.

  74. Sang-Hun, C. (2011). Seoul warns of latest North Korean threat: an army of online gaming hackers. http://www.nytimes.com/2011/08/05/world/asia/05korea.html?_r=4&. Accessed 28 March 2014.

  75. Sang-Hun, C. (2013). South Korean officials accused of political meddling http://www.nytimes.com/2013/12/20/world/asia/south-korean-cyberwarfare-unit-accused-of-political-meddling.html. Accessed 28 March 2014.

  76. Schearf, D. (2013). North Korea’s ‘world class’ cyber attacks coming from China. http://www.voanews.com/content/north-koreas-world-class-cyber-attacks-coming-from-china/1795349.html. Accessed 28 March 2014.

  77. Shackelford, S. J. (2009). From nuclear war to net war: analogizing cyber attacks in international law. Berkeley Journal of International Law, 27 (1), 192–251.

    Google Scholar 

  78. Tae-gyu, K. (2013). Spy agency ups capabilities against cyber attacks, Korea Times. www.koreatimes.co.kr/www/news/nation/2013/04/116_133851.html. Accessed 28 March 2014.

  79. The Economist. (2008). Marching off to cyber war. 389 (8609), 20, December 8. http://www.economist.com/node/12673385. Accessed 28 March 2014.

  80. Ulsch, M. (2013). The axis of cyber evil: a North Korean case of cyber espionage. http://www.hstoday.us/blogs/critical-issues-in-national-cybersecurity/blog/the-axis-of-cyber-evil-a-north-korean-case-of-cyber-espionage/3072be3aacf419cc494e3910a62107b2.html. Accessed 28 March 2014.

  81. United Nations (2014). National accounts main aggregate database, http://unstats.un.org/unsd/snaama/resCountry.asp. Accessed 28 March 2014.

  82. Vlahos, K. B. (2014). Special report: the cyber war threat from North Korea. http://www.foxnews.com/tech/2014/02/14/cyberwar-experts-question-north-korea-cyber-capabilities/. Accessed 28 March 2014.

  83. Waterman, S. (2012). North Korean jamming of GPS shows system’s weakness, Washington Times. www.washingtontimes.com/news/2012/aug/23/north-korean-jamming-gps-shows-systems-weakness. Accessed 28 March 2014.

  84. Weick, K. E. (1979). The social psychology of organizing (2nd ed.). Reading: Addison-Wesley.

    Google Scholar 

  85. Yonhap, (2013). Seoul needs to counter N. Korea’s cyber espionage capabilities: defense chief, www.globalpost.com/dispatch/news/yonhap-news-agency/130620/seoul-needs-counter-n-koreas-cyber-espionage-capabilities-de. Accessed 28 March 2014.

  86. Yoon, S. (2011). North Korea recruits hackers at school, 20 June. http://www.aljazeera.com/indepth/features/2011/06/201162081543573839.html. Accessed 28 March 2014.

Download references

Acknowledgment

Two anonymous East Asia reviewers’ comments on an earlier version helped to improve the paper substantially.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nir Kshetri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kshetri, N. Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses. East Asia 31, 183–201 (2014). https://doi.org/10.1007/s12140-014-9215-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12140-014-9215-1

Keywords

Navigation