Topic: Cyberwar

JSIS Cybersecurity Report: How Should the Tech Industry Address Terrorist Use of Its Products?

August 8, 2016

Posted by: jlbeyer

Twitter black and white

Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.

North Korea Cyber Attacks: A New Asymmetrical Military Strategy

June 28, 2016

Posted by: jlbeyer

North_Korea_Flag

North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.

China-Russia Cybersecurity Cooperation: Working Towards Cyber-Sovereignty

June 21, 2016

Posted by: jlbeyer

Chinese_keyboard_Mac_Closeup

The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.

Cybersecurity Spotlight: South Korea

January 12, 2016

Posted by: jlbeyer

Since the end of the Cold War, there has been an ideological confrontation in the Korean Peninsula between communist North Korea and democratic South Korea. As South Korea has embraced