- The Strategist - https://aspistrategist.ru -
Kim Jong-un assassinates ‘The Interview’
Posted By Hayley Channer on December 22, 2014 @ 12:15
[1]North Korea has delivered a major blow to freedom of expression in the US and emboldened Internet hackers everywhere by successfully coercing Sony Pictures into axing the release of its new film, The Interview. The movie, which is about a plot to assassinate Kim Jong-un (and looks terrible [2]), was due to premiere on Christmas Day but now won’t be shown in theatres. The decision was made in response to a massive malware attack on Sony, claimed to be [3] the most damaging cyber attack ever on an American company and included threats of 9/11-magnitude violence on cinemagoers.
The attack, which the FBI has linked to North Korea [4], has been called an ‘act of war’ [5] by Senator John McCain and labeled ‘cybervandalism [6]’ by President Barack Obama. In response to the attack, the US is considering putting North Korea back on the list of state sponsors of terrorism while Republicans are calling for a restoration of sanctions lifted under the Bush Administration. So, what else can be done? A number of responses have been proposed, including prevention and punishment.
On the prevention side, cyber security experts and North Korea analysts have recommended that businesses fortify their Internet security [7] through encrypting data and creating stronger passwords and safeguards as well as making an IT security team a vital component of their organisations [8] (which Sony didn’t do).
On the punishment side, while the Obama Administration mulls over a ‘proportional response’ [9], former NSA research scientist and cyber security expert Dave Aitel suggests [10] the US consider changing the law around cyber attacks so that, when appropriate, they would be considered terrorist acts and the groups behind them terrorists. According to Aitel, that would ‘set in motion a wider range of legal authority, US government/military resources, and international options’. The problem with that approach, however, is distinguishing between cyber crime and cyber terrorism, not to mention the lag in lawmaking behind the rapidly evolving cyber threat. Aitel mentions other offensive options for the US, including launching its own cyber attack against North Korea and shutting down what little Internet access Pyongyang has [11]. But he concedes that tit-for-tat cyber attacks might lead to escalation.
Without doubt, American and other companies should be better equipped to deal with cyber attacks and North Korea should face punishment in order to dissuade it from future attacks. But neither will do much to address the underlying problem: when you have a regime that’s motivated by a desire for survival at the expense of all else, prevention and punishment mightn’t be enough. What you need is a new policy.
The current US policy of ‘strategic patience [12]’ is clearly defunct, but unfortunately the prospects of the US adopting a new policy on North Korea now are extremely unlikely: Obama has just reopened full diplomatic relations with Cuba [13] and may not want to weather further criticism or appear weak by doing something similar with North Korea. Moreover, Obama has only two years left in office and is already committed to addressing the expanding ISIL threat. He lacks time and energy, and engaging North Korea this late in his presidency would probably bear little fruit (North Korea would likely just wait him out).
What about North Korea’s somewhat reluctant bodyguard [14] China? While China is perhaps less concerned than the US over North Korea’s hacking activities, Pyongyang is an increasing burden on and embarrassment to Beijing. China’s longstanding policy has been to protect North Korea but it has major opportunity through the UN to adjust this policy and begin applying pressure to Pyongyang.
As a consequence of the February 2014 UN report into human rights in North Korea, UN Security Council members are poised to vote on whether to refer North Korea to the International Criminal Court. China faces the embarrassment of vetoing the move [15], thus tacitly approving North Korea’s human rights violations at a time when it wants to be considered a responsible global power. Another outcome—although less likely—would be for Beijing to abstain from voting, leaving it to Russia to veto the decision: the result would be the same—a North Korea sheltered from scrutiny—but with the added benefit of signaling to Pyongyang that China’s support is contingent on good behaviour. Unfortunately, both of these potential outcomes would miss a gift-wrapped opportunity to pressure North Korea into reforming. Few, if any, expect China to support the resolution.
Missing out on The Interview isn’t a big deal; failing to reassess our policies on North Korea, is. This case reinforces what South Korea has known for some time—from within its own walls, North Korea can reach out and touch groups in other countries, cause damage worth millions of dollars, harm reputations and threaten democratic values, all with little fear of retribution. That’s the real challenge. As well as addressing weaknesses in our cyber security and punishing the perpetrators, let’s not forget that if we don’t attack the root of the problem, the tree will still grow.
Hayley Channer [16] is an analyst at ASPI. Edited image courtesy of Flickr user thierry ehrmann [17].
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /kim-jong-un-assassinates-the-interview/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/12/KJU3.png
[2] and looks terrible: https://www.youtube.com/watch?v=DkJA1rb8Nxo
[3] claimed to be: http://www.businessinsider.com/the-north-korea-linked-sony-hack-may-be-costlier-ever-for-a-us-company-2014-12?IR=T
[4] FBI has linked to North Korea: http://www.theguardian.com/us-news/2014/dec/19/north-korea-responsible-sony-hack-us-official
[5] ‘act of war’: http://www.theguardian.com/us-news/2014/dec/19/obama-sony-the-interview-mistake-north-korea
[6] cybervandalism: http://www.theguardian.com/us-news/2014/dec/21/obama-us-north-korea-state-terror-list-sony-hack
[7] fortify their Internet security: http://www.dw.de/what-could-lead-north-korea-to-hack-sony-pictures/a-18140165
[8] making an IT security team a vital component of their organisations: http://blogs.piie.com/nk/?p=13714
[9] ‘proportional response’: http://www.bbc.com/news/world-us-canada-30555997
[10] Dave Aitel suggests: http://www.businessinsider.com.au/sony-hack-should-be-considered-an-act-of-war-2014-12
[11] what little Internet access Pyongyang has: http://qz.com/315969/in-north-korea-kids-dont-even-know-the-internet-exists-so-how-did-it-pull-off-the-sony-hack/
[12] strategic patience: http://www.stripes.com/news/us-strategic-patience-policy-toward-north-korea-not-working-analysts-say-1.313414
[13] full diplomatic relations with Cuba: http://www.nytimes.com/2014/12/18/world/americas/us-cuba-relations.html?_r=0
[14] reluctant bodyguard: http://www.nknews.org/2014/10/inside-china-north-korea-relations-what-the-experts-think/
[15] China faces the embarrassment of vetoing the move: http://thediplomat.com/2014/12/with-north-korea-in-world-spotlight-what-can-china-do/
[16] Hayley Channer: https://www.aspistrategist.ru/about-aspi/aspi-staff/analysts/hayley-channer
[17] thierry ehrmann: https://www.flickr.com/photos/home_of_chaos/8660459308
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.