Topic: Cyberwar

JSIS Cybersecurity Report: How Should the Tech Industry Address Terrorist Use of Its Products?

August 8, 2016

Posted by: Jessica Beyer

Twitter black and white

Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.

North Korea Cyber Attacks: A New Asymmetrical Military Strategy

June 28, 2016

Posted by: Jessica Beyer

North_Korea_Flag

North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.