{"id":88774,"date":"2017-03-20T12:00:35","date_gmt":"2017-03-20T12:00:35","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=88774"},"modified":"2017-03-16T15:31:42","modified_gmt":"2017-03-16T15:31:42","slug":"north-korea-the-cyberwar-of-all-against-all","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/03\/north-korea-the-cyberwar-of-all-against-all\/","title":{"rendered":"North Korea: The Cyberwar of All against All"},"content":{"rendered":"<div id=\"attachment_88775\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/Hacker-Security-Binary-Hack-Internet-Www-Code-1446193-722x481-invisible.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-88775\" class=\"wp-image-88775\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/Hacker-Security-Binary-Hack-Internet-Www-Code-1446193-722x481-invisible.jpg\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/Hacker-Security-Binary-Hack-Internet-Www-Code-1446193-722x481-invisible.jpg 722w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/Hacker-Security-Binary-Hack-Internet-Www-Code-1446193-722x481-invisible-300x200.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-88775\" class=\"wp-caption-text\">Courtesy of Max Pixel<\/p><\/div>\n<p style=\"padding-left: 30px;\"><em>They hack us. We hack them. It&#8217;s a recipe for catastrophe.<\/em><\/p>\n<p><em>14 Mar 2017 &#8211; <\/em>The political theorist Thomas Hobbes warned in the 17<sup>th<\/sup> century that without the modern state and its sovereign control of territory, humanity would slip back into a state of nature in which violence was uncontrolled and ever-present. \u201cA war of all against all\u201d would break out, he wrote, in which neighbor would turn against neighbor. States would continue to fight one another, but a measure of stability would reign at the level of society.<\/p>\n<p>Today, without any international authority to regulate cyberspace, a war of all against all has indeed broken out. Each day there are new headlines about a hacking scandal, a cyberattack against a bank or government institution, or even more serious offensive actions.<\/p>\n<p>The United States pioneered this kind of warfare when, during the administration of George W. Bush, it inserted malware into the Iranian nuclear complex that destroyed centrifuges and set back the program. More recently, the United States was on the receiving end of cyberwarfare when hackers, probably at the behest of the Russian government, stole material from the Democratic Party, arranged for its release prior to the 2016 presidential elections, and influenced the outcome in favor of Donald Trump.<\/p>\n<p>The latest revelations of cyberware, however, involve North Korea. <em>The New York Times<\/em> <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/03\/04\/world\/asia\/north-korea-missile-program-sabotage.html?action=click&amp;contentCollection=Times%20Insider&amp;module=RelatedCoverage&amp;region=EndOfArticle&amp;pgtype=article\" >published an article<\/a> on March 4 claiming that at least some of the many mishaps and failures associated with North Korea\u2019s missile program were the result of a secret U.S. program to thwart launches through electronic means.<\/p>\n<p>This was not, in fact, the first admission that the United States had targeted North Korea through cyberspace. In late 2014, North Korea stood accused of hacking into Sony Pictures to discredit the film company around the time of its release of <em>The Interview<\/em>, which mocked Kim Jong Un. At the same time, however, came <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2015\/01\/19\/world\/asia\/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?_r=0\" >the revelation<\/a> that the United States had been hacking into North Korea as early as 2010 and had installed malware that enabled tracking of some of North Korea\u2019s activities.<\/p>\n<p>As I wrote\u00a0<a target=\"_blank\" href=\"http:\/\/english.hani.co.kr\/arti\/english_edition\/e_editorial\/675204.html\" >at the time<\/a>, \u201cThe Sony hack has been held up as an example of North Korea\u2019s specialty: asymmetrical warfare. It usually relies on the weapons of the weak against strong adversaries like the United States. But there was a dangerous symmetry lurking in the cyberworld all along. Spyware, it seems, is everywhere.\u201d<\/p>\n<p>The latest information about U.S. attempts to disrupt North Korea\u2019s nuclear program carries with it several very important implications.<\/p>\n<p>First, the Obama administration launched the initiative because it recognized that traditional missile defense was ineffectual. \u201cFlight tests of interceptors based in Alaska and California had an overall\u00a0failure rate\u00a0of 56 percent, under near-perfect conditions,\u201d <em>The New York Times<\/em> noted. \u201cPrivately, many experts warned the system would fare worse in real combat.\u201d<\/p>\n<p>Second, the cyberwarfare against North Korea has also basically failed. Despite the numerous failed tests, Pyongyang managed to put together a series of successful launches over the last year, including three medium-range rockets.<\/p>\n<p>Third, cyberspace has become an increasingly dangerous place. Countries have developed the capacity not only to disrupt military operations but also to sabotage civilian infrastructure and paralyze an economy, as South Korea <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/03\/21\/world\/asia\/south-korea-computer-network-crashes.html\" >discovered<\/a> in 2013 when an attack brought down several banks and broadcasters. This kind of warfare doesn\u2019t have any international rules of engagement, like the Geneva Conventions or what the United Nations has developed over the years.<\/p>\n<p>Although Trump as candidate promised a new policy toward North Korea, his administration has so far responded to North Korea\u2019s nuclear program with more of the same. It has said that all options are on the table. It is moving forward with deployment of the THAAD missile defense system in South Korea. It has sent reassurances of support to Tokyo and Seoul. It is considering more sanctions and as well as placing North Korea back on the list of state sponsors of terrorism. It is waiting for China to do something.<\/p>\n<p>What Trump hasn\u2019t done, however, is learn any lessons from the previous administration\u2019s cyberwarfare experiment. Missile defense doesn\u2019t work. The insertion of malware is only a temporary fix. The Obama administration at least showed that it could learn from its own failures by translating these lessons into a nuclear deal with Iran that has actually dealt with a potential proliferation threat through international cooperation.<\/p>\n<p>It\u2019s time for the United States to apply the same lessons to North Korea. Negotiations and verifiable agreements are far more effective than threats and efforts at disruption.<\/p>\n<p>And before cyberattacks truly spill out of control and the international community descends into a war of all against all, Washington should sit down with other countries to hammer out <a target=\"_blank\" href=\"https:\/\/circlesandsquares.asia\/2016\/12\/30\/meeting-the-great-data-challenge-the-case-for-a-constitution-of-information-in-global-asia-january-2017\/\" >some rules of conduct<\/a>. Otherwise, North Korea\u2019s nuclear program will be the least of our problems.<\/p>\n<p>___________________________________<\/p>\n<p style=\"padding-left: 30px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/John-Feffer-150x150.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-88777\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/03\/John-Feffer-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>John Feffer is the director of Foreign Policy In Focus\u00a0and the author of the dystopian novel <\/em><a target=\"_blank\" href=\"https:\/\/www.amazon.com\/Splinterlands-John-Feffer\/dp\/1608467244\/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=\" >Splinterlands<\/a><em>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/fpif.org\/north-korea-the-cyberwar-of-all-against-all\/\" >Go to Original \u2013 fpif.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>They hack us. We hack them. It&#8217;s a recipe for catastrophe. The U.S. pioneered this kind of warfare when it inserted malware into the Iranian nuclear complex that destroyed centrifuges and set back the program. The latest revelations of cyberware involve North Korea. At least some of the many mishaps and failures associated with their missile program were the result of a secret U.S. program to thwart launches through electronic means.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[],"class_list":["post-88774","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/88774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=88774"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/88774\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=88774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=88774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=88774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}