{"id":4475,"date":"2013-03-13T10:30:09","date_gmt":"2013-03-13T00:30:09","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=4475"},"modified":"2013-03-14T12:00:39","modified_gmt":"2013-03-14T02:00:39","slug":"information-warfare-on-the-korean-peninsula","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/","title":{"rendered":"Information warfare on the Korean peninsula"},"content":{"rendered":"
\"DPRK<\/a><\/figure>\n

Over the last decade, security dilemmas on the Korean peninsula have become progressively more \u2018hybrid\u2019 and multi-faceted. Traditional conventional threats, scenarios and contingencies linked to high intensity conventional wars, have been converging with a range of asymmetric and non-linear security challenges, including nuclear threats, ballistic missiles, and increasingly information and cyber warfare. According to General James Thurman, commander of US forces in South Korea, North Korea has acquired \u2018significant\u2019 IW-related military capabilities. This is an attempt to explore the idea of asymmetric negation, probing any vulnerabilities of the US\u2013ROK alliance. Now, that means more than just nuclear weapons. In addition to its nuclear and ballistic missile programs, these also include hacking, encryption, and virus insertion capabilities.<\/p>\n

In this context, information and cyber warfare is becoming a part of the ongoing conflict on the Korean Peninsula, and its threats and risks are continuously challenging traditional defence strategies and operational concepts of the US\u2013ROK alliance.<\/p>\n

I argue that we really are in a new regime of information warfare in Korea, where both North and South Korea are engaged at three levels of information conflict simultaneously: (1) a war for<\/em> information to obtain information and intelligence about each other\u2019s means, capabilities, and strategies; (2) a war against<\/em> information aimed at protecting their information systems, while disrupting or destroying the other side\u2019s information infrastructure; and (3) a war through<\/em> information reflected in the misinformation and deception operations to shape their broader internal and external strategic narratives.<\/p>\n

In the first category of war\u00a0for<\/em>\u00a0information, for example, one of the most sophisticated attacks occurred in November 2009, when South Korean National Intelligence Service and the Defence Security Command reported that a suspected North Korean hacker unit operating under the North Korean Army General Staff\u2019s Reconnaissance Bureau\u00a0intercepted confidential defence strategy plans<\/a>, including plans detailing US\u2013ROK responses to potential North Korean provocations. The incident happened as an officer with the ROK\u2013US\u00a0Combined Forces Command used an unsecured USB memory stick plugged into his PC<\/a>\u00a0while switching from a highly secure private intranet to the public Internet. While the\u00a0plan\u00a0is currently under review\u00a0with the ROK military planning to take over the war time operational control from the United States Forces Korea in 2015, its compromise\u00a0raises\u00a0questions\u00a0to what extent\u00a0North Korea\u00a0could\u00a0access and potentially disrupt selected\u00a0US\u2013ROK operational plans in times of war or crisis.<\/p>\n

In the same year,\u00a0North Korean hackers reportedly stole information from the South Korean Chemical Accidents Response Information System\u00a0(CARIS)\u00a0after infiltrating the ROK Third Army headquarters’ computer network and using a password<\/a>\u00a0to access CARIS’s Center for Chemical Safety Management.\u00a0North Korea\u2019s overseas-intelligence gathering unit under the State Security Agency (SSA) is also believed to\u00a0increasingly rely on information warfare techniques for cyber-espionage<\/a>\u00a0to access information, steal sensitive data, and monitor foreign communications.<\/p>\n

In the category of war\u00a0against<\/em>\u00a0information, North Korea has attempted to disrupt South Korea\u2019s highly developed digital information infrastructure using cyber attacks to shut down major websites, disrupt online services of major banks, and probe South Korea\u2019s readiness to mitigate cyber-attacks. Most cited cases in this tier include the 2009\u00a0distributed denial-of-service (DDoS) attacks against four dozen targets in South Korea and the United States<\/a>,\u00a0and the \u2018Ten Days of Rain\u2019<\/a>; the 2011 DDoS attacks on South Korean government websites and the network of the\u00a0US\u00a0Forces Korea (USFK).<\/p>\n

Interestingly, they seem to have been \u2018testing the fence.\u2019 According to\u00a0analysis by McAfee Labs<\/a>\u00a0(PDF), the combination of clearly defined targets, highly destructive malware code, multiple encryption algorithms, and multi-tiered botnet architecture preconfigured for specific duration, has led to a conclusion that the attack was set up by North Korea to test and observe how rapidly the attack would be discovered, reverse engineered, and mitigated. At the end of the\u00a0\u2018Ten Days of Rain\u2019\u00a0DDoS attacks, the botnets were configured to self-destruct.<\/p>\n

Finally, in the category of war\u00a0through<\/em>\u00a0information,\u00a0North Korea has relied on information warfare to alter the perceptions of its strategic plans.\u00a0For example, prior to the rocket launch in December 2012, the DPRK announced several days before the launch that there were technical problems, and were observed byUS\u00a0satellites taking apart the three-stage rocket, and removing the parts from the launch pad.\u00a0North Korea, however, launched the rocket without any delay, catching\u00a0US\u2013ROK military and intelligence agencies off-guard. Subsequent\u00a0reports indicate<\/a>\u00a0that North Korea manipulated the launch so that\u00a0US\u00a0intelligence satellites would not be overhead.<\/p>\n

At the same time, however,\u00a0US\u2013ROK forces have also engaged in a war through information\u2014particularly focusing on psychological operations.\u00a0Following the sinking of the Cheonan warship and subsequent shelling of Yeonpyeong Island in 2010, the South Korean military established a new psyops unit to diffuse news and information into North Korea\u2014whether through radio transmissions, balloon leaflets, DVDs, and possibly USB memory sticks.\u00a0Since then, it has sent thousands of leaflets and transmitted broadcast into North Korea\u00a0using mobile broadcast vehicles and six relay stations<\/a>. While its effects on North Korean society are difficult to ascertain,\u00a0North Korea has previously threatened to fire across the heavily fortified border to stop such campaigns.<\/p>\n

With changing strategic realities on the Korean Peninsula, information warfare has important ramifications for the\u00a0US\u2013ROK defence strategy. While we don\u2019t really know how disruptive a well-orchestrated North Korean IW campaign could be against the US\u2013ROK alliance forces, we saw in 2007 and 2008 how effective Russian efforts were against targets in Estonia and Georgia. In the intervening five years the world, and with it alliance forces and South Korean society more generally, have become even more dependent on networks and the data they carry. Conversely, the capability of the US and its allies are likely to be steadily increasing. You can bet that the topic of IW is being actively thought about on both sides of the 38th parallel.<\/p>\n

Michael Raska is a research fellow at the Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University. Image courtesy of Flickr user Joseph A Ferris III<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Over the last decade, security dilemmas on the Korean peninsula have become progressively more \u2018hybrid\u2019 and multi-faceted. Traditional conventional threats, scenarios and contingencies linked to high intensity conventional wars, have been converging with a range …<\/p>\n","protected":false},"author":99,"featured_media":4481,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[95,381,86,211,31],"class_list":["post-4475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber-security","tag-information-warfare","tag-north-korea","tag-south-korea","tag-united-states"],"acf":[],"yoast_head":"\nInformation warfare on the Korean peninsula | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information warfare on the Korean peninsula | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Over the last decade, security dilemmas on the Korean peninsula have become progressively more \u2018hybrid\u2019 and multi-faceted. Traditional conventional threats, scenarios and contingencies linked to high intensity conventional wars, have been converging with a range ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-13T00:30:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-03-14T02:00:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Raska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Raska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"DPRK propaganda poster\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/\",\"name\":\"Information warfare on the Korean peninsula | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#primaryimage\"},\"datePublished\":\"2013-03-13T00:30:09+00:00\",\"dateModified\":\"2013-03-14T02:00:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a7dc5f7c7e798b0daf8da6ec8b835acc\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information warfare on the Korean peninsula\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a7dc5f7c7e798b0daf8da6ec8b835acc\",\"name\":\"Michael Raska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0271aeb2abe1fd328e5844c17aa1e2ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0271aeb2abe1fd328e5844c17aa1e2ef?s=96&d=mm&r=g\",\"caption\":\"Michael Raska\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-raska\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information warfare on the Korean peninsula | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/","og_locale":"en_US","og_type":"article","og_title":"Information warfare on the Korean peninsula | The Strategist","og_description":"Over the last decade, security dilemmas on the Korean peninsula have become progressively more \u2018hybrid\u2019 and multi-faceted. Traditional conventional threats, scenarios and contingencies linked to high intensity conventional wars, have been converging with a range ...","og_url":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-03-13T00:30:09+00:00","article_modified_time":"2013-03-14T02:00:39+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg","type":"image\/jpeg"}],"author":"Michael Raska","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Raska","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/6975754952_9342925be4_z.jpg","width":640,"height":427,"caption":"DPRK propaganda poster"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/","url":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/","name":"Information warfare on the Korean peninsula | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#primaryimage"},"datePublished":"2013-03-13T00:30:09+00:00","dateModified":"2013-03-14T02:00:39+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a7dc5f7c7e798b0daf8da6ec8b835acc"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/information-warfare-on-the-korean-peninsula\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Information warfare on the Korean peninsula"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a7dc5f7c7e798b0daf8da6ec8b835acc","name":"Michael Raska","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0271aeb2abe1fd328e5844c17aa1e2ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0271aeb2abe1fd328e5844c17aa1e2ef?s=96&d=mm&r=g","caption":"Michael Raska"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-raska\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4475"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/99"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=4475"}],"version-history":[{"count":8,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4475\/revisions"}],"predecessor-version":[{"id":4546,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4475\/revisions\/4546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/4481"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=4475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=4475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=4475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}