Understanding North Korea’s Cyber Operations.
Kim, Donghyeon.
2018
- Submitted in partial fulfillment of the degree Master of Arts in Law and Diplomacy at the Fletcher School of Law and Diplomacy. Abstract: It is almost a daily routine to read in newspaper about North Korean hacking. The most renowned case is Sony Pictures Entertainment cyberattack on the eve of releasing The Interview. However, Sony Pictures Entertainment seems to be the beginning of North Korean ... read moreactivities in cyberspace. Pyongyang hacks e-mails and defense ministry’s internal networks, steals military operation plan jointly devised by allies, and robs financial institutions with limited success. What is North Korea doing in cyberspace? Is Pyongyang acting irrationally in cyberspace, as it seems to be in non-cyberspace? What is Pyongyang’s goals and objectives in its cyber operations? And how should we address increasing North Korean threat? The paper argues that North Korean cyber hacks are consistent with its greater strategy to secure regime survival by protecting legitimacy of Kim regime, boosting economy by any means and provoking to advance conventional deterrence against its adversaries.read less
- ID:
- g732dn31j
- Component ID:
- tufts:sd.0000835
- To Cite:
- TARC Citation Guide EndNote
- Usage:
- Detailed Rights