March 19, 2019
Posted by: Jeremy D Pritchard
In 2018, the GRG program conducted an extensive review of current cybersecurity and election security practices around the world for Microsoft’s Digital Democracy Project. The multi-sectioned report included country and
December 31, 2018
Posted by: Michael Walstrom
On December 10, 2018, a Jackson School Global Research Group of students and faculty assembled near the Husky Union Building before driving to Microsoft HQ in Redmond. Their task: Provide members of
February 9, 2018
Posted by: dpal
Jackson School Doctoral Candidate Donghui Park, who researches cyberwar and non-state actors, has been quoted in an article in a French publication about North Korean hackers using new and sophisticated tactics
January 24, 2018
Posted by: dpal
Cybersecurity Postdoctoral Fellow and Lecturer Jessica Beyer and Ph.D. Candidate Donghui Park‘s analysis published by Reuters in December 2017 has been quoted in an article on North Korean cyber attacks
December 21, 2017
Posted by: Monique Thormann
Cybersecurity Postdoctoral Fellow and Lecturer Jessica Beyer and Ph.D. Candidate Donghui Park, who researches cyberwar and non-state actors, analyze the potential for North Korea to destroy critical infrastructure without a nuclear weapon, which has
December 1, 2017
Posted by: Monique Thormann
In their article “Russia Is Now Providing North Korea With Internet: What That Could Mean For Cyber Warfare“, Matthew Newton and Donghui Park, both Jackson School graduate students and Jackson
October 11, 2017
Posted by: Jessica Beyer
On December 23, 2015, the control centers of three Ukrainian electricity distribution companies were remotely accessed. Taking control of the facilities’ SCADA systems, malicious actors opened breakers at some 30
August 11, 2017
Posted by: Monique Thormann
What does the Pacific Northwest offer in innovation and collaboration on global cybersecurity policy? Enough for the D.C.-based Woodrow Wilson Center for International Scholars to partner with the Jackson School
February 7, 2017
Posted by: Jessica Beyer
The U.S. and South Korea have a long history of security cooperation and share a common enemy in North Korea. However, existing measures do not adequately address cybersecurity threats from North Korea.
June 28, 2016
Posted by: Jessica Beyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.