This document discusses asymmetric balancing in cyber warfare and its implications for power dynamics in the Asia-Pacific region. It begins by introducing the shifting balance of power as China rises economically and militarily. It then discusses how the development of cyber warfare has created a new domain that is dominated by the US, allowing for asymmetric means of conflict that could reshape traditional security. The document defines key cyber warfare terms and compares conventional vs cyber warfare, noting how offense has an advantage over defense in the cyber domain due to lower costs and complexity of attacks. It explores how these dynamics may impact regional power structures.
17. Hill 17
California.
What network and cyber capabilities the DPRK does currently possess have been
41
placed at the full disposal of a dedicated 3000 personnel cyber warfare unit within Office 121.
42
According to a North Korean hacker who defected in 2007, the entire cyber operations
staff of the combined DPRK central government and armed forces stands at or around 30,000
personnel.
Hackers that comprise this unit are drawn from across the country and trained from
43
as young as age 10 at the Mangyongdae Schoolchildren’s Palace
and later at the DPRK’s top
44
universities, including the Pyongyang Automation University (formerly Mirim University) which
employs Russian professors from the Funze Military Academy to train approximately 100
worldclass hackers a year for the North Korean military.
Other universities send promising
45
hackers abroad to hone their skills in more technologically advanced environments.
46
The DPRK has been accused of intruding into water and drainage systems, penetrating
U.S. and ROK government agencies, stock exchange websites, news media, and financial
institutions. Given the attribution problems associated with cyber warfare, confirmation of
attackers’ origins can be difficult, and Pyongyang generally denies responsibility. In July of
2009, DPRK hackers launched a massive DDOS campaign against U.S. and South Korean
government and financial sector websites. While no information was stolen, the attacks did
41
Ibid. 27.
42
Sunny Lee, “U.S. Strategy toward North Korea’s Cyber Terrorism,” (paper presented at the 2011
Dupont Summit, Carnegie Institution for Science, Washington, D.C. Dec. 2, 2011). 8, 11.
43
“N.Korea Trains Up Hacker Squad,” The Chosunilbo, Mar. 8, 2011.
http://english.chosun.com/site/data/html_dir/2011/03/08/2011030800611.html.
44
Hear, Williams, and Mahncke, ibid.
45
S. Lee, ibid., 8.
46
Jeremy Laurence, “North Korea Hacker Threat Grows as Cyber Unit Grows: Defector,” Reuters, Jun.
1, 2011. http://www.reuters.com/article/2011/06/01/uskoreanorthhackersidUSTRE7501U420110601.
18. Hill 18
expose critical vulnerabilities in both nations’ cyber defenses.
In 2010, the North attempted to
47
disrupt the G20 Summit in Seoul by attacking the city’s water and drainage systems.
In May
48
2011, DPRKbased hackers penetrated and shut down the credit card and ATM services of the
Nonghyup bank for over a week.
On March 20, 2013, amidst the latest round of escalation on
49
the Korean Peninsula, DPRK hackers shut down the networks of three of the South’s major
banks and its three largest TV broadcasters. They were then able to target and corrupt operating
systems connected to the network with a new sophisticated malware.
The ROK Defense
50
Ministry elected to establish a new department to oversee new cyber deterrence policies in
response.
51
As the DPRK cyber threat grows, it may eventually be considered more dangerous than
the country’s nuclear weapons program. The North’s current nuclear stockpile is small, their
launching capabilities limited, and thanks to the threat of a massive nuclear retaliation,
considered by many to be a mere deterrent. But without the possibility of deterrence or the threat
of retaliation, a large scale North Korean cyber attack could potentially cause catastrophic
damage to the critical infrastructure of the United States. While they have yet to cause serious or
47
“U.S. Eyes N. Korea for ‘Massive’ Cyber Attacks,” MSNBC.com, July, 9, 2009.
http://www.msnbc.msn.com/id/31789294/ns/technology_and_sciencesecurity/t/useyesnkoreamassive
cyberattacks/#.UMuTOGP3U5.
48
Hear, Williams, and Mahncke, ibid., 9.
49
Laurence, ibid.
50
Mihoko Matsubara, “Lessons from the CyberAttacks on South Korea,” The Japan Times. March 26,
2013.
http://www.japantimes.co.jp/opinion/2013/03/26/commentary/lessonsfromthecyberattacksonsouthk
orea/#.UZJyvLW872t.
51
Kim Eunjung, “Defense Ministry to Establish Cyber Policy Department,” Yonhap News Agency. April
2, 2013.
http://english.yonhapnews.co.kr/techscience/2013/04/02/0601000000AEN20130402005300315.HTML.
20. Hill 20
having created thousands of advanced computer viruses primarily targeting the PRC.
Most
54
recently, the budget for fiscal year 2013 allocates funding for the establishment of an
experimental facility for simulated cyber warfare.
55
The Republic of Korea
The Republic of Korea, one of the world’s most wired countries, established the Korean
Information Security Agency (KISA) in 1996 to develop reactionary capabilities to respond and
recover from cyber attacks.
Following the DPRK’s DDOS campaign July of 2009, however,
56
the Ministry of National Defense consolidated computing and data centers into the Consolidated
Defense Information Data Center to establish “networkcentric defense information systems,”
with the passage of the Defense Informatization Act on February 4, 2010.
With U.S.
57
assistance, the ROK also launched a Cyber Warfare Command in early 2010. Current cyber
forces consist of 1000 personnel but are under consideration for significant expansion.
Also in
58
2010, South Korea began holding ROKUS Information Assurance Working Group Meetings
and participating in semiannual DODsponsored International Cyber Defense Workshops.
In
59
2012 these two allies began holding U.S.ROK Cyber Policy Consultations to “strengthen
54
Mulvenon, ibid. 157161.
55
Thanya Kunakornpaiboonsiri, “Taiwan to Beef Up Cyber Warfare Unit: Report,” FutureGov, Sept. 5,
2012. http://www.futuregov.asia/articles/2012/sep/05/taiwanbeefcyberwarfareunitreport/.
56
Jeffrey Carr, Inside Cyber Warfare: Mapping the Cyber Underworld, (Sebastopol: O’Reilly, 2012).
258.
57
“2010 Defense White Paper,” Ministry of National Defense, Republic of Korea, Mar. 31, 2011.
158163.
58
Kim Eunjung, “S. Korea to Upgrade Preparedness against North’s Cyber, Nuclear Attacks,” Yonhap
News Agency, Aug. 29, 2012.
http://english.yonhapnews.co.kr/national/2012/08/29/18/0301000000AEN20120829008600315F.HTML.
59
Ibid., 165