Published February 14, 2014
WASHINGTON – North Korea’s effort to build a cyberarmy that can conduct a string of attacks on neighboring states has experts asking some key questions:
Is Pyongyang gearing up for a cyberassault on the United States?
Does it have the capability?
“They do have the capability, obviously,” says Alexandre Mansourov, a visiting scholar at the U.S.-Korea Institute at the Johns Hopkins School of Advanced International Studies. “But I don’t think they have the intention.”
But not everyone is so unsure. Like the Cold War in the 1950s and ’60s, cyberwarfare is becoming an arms race. Many nations, including the United States, are building up their offensive and defensive capabilities amid an increase of espionage and a proliferation of attacks on public and private computer networks.
Experts say the number of attacks on South Korea over the last five years looks more like a coordinated war than the work of random hackers. This has some officials in the U.S. girding for a broader fight.
“We should never underestimate Pyongyang's willingness to engage in dangerous and provocative behavior to extract more aid and concessions from the international community,” Rep. Mike Rogers (R-Mich.), chairman of the House Select Committee on Intelligence, said in a statement to FoxNews.com.
“North Korea is certainly not the most capable nation-state threat actor today, but even relatively minor cyberplayers can sometimes find vulnerabilities in complicated civilian architectures and cause significant disruptions."
While no one knows exactly what North Korea has up its sleeve, a number of hackers who have defected, as well as the increasingly sophisticated attacks on South Korea, suggest that its leader, Kim Jong-un, isn’t limiting his muscle-flexing to nuclear tests in the Pacific.
A history of cyber-violence
According to reports beginning in 2010, North Korea has been training thousands of top computer science students to be sophisticated cyberwarriors. Some experts, like Professor Lee Dong-hoon of the Korea University Graduate School of Information Security, estimate that Pyongyang has been pouring money into cyberwarfare since the 1980s.
The proof is in the attacks, of course, though it is difficult to pin down the responsible parties:
Gen. James Thurman, commander of U.S. forces in South Korea, told Congress in 2012 that "the newest addition to the North Korean asymmetric arsenal is a growing cyberwarfare capability,” in which North Korea “employs sophisticated computer hackers trained to launch cyberinfiltration and cyberattacks" against South Korea and the U.S.
Observers say the alleged North Korean attacks are launched from servers all over the world in order to avoid detection.
“It’s all untraceable,” Mansourov said. “But there is a presumption of guilt -- I think it's a valid presumption.”
Jarno Limnéll, director of cybersecurity at Finland-based Stonesoft Corp. (part of the McAfee cybersecurity company), said that while it is “hard to know what cyber-capabilities your enemies or even your friends have, [this is] something [North Korea] has taken very seriously … and what they are saying quite publicly is they have several thousand men and women working on a daily basis on cyber. They want to give a very clear impression that they are a strong player in this field.”
Accusations fly worldwide
For its part, Pyongyang has accused South Korea and the U.S. of launching similar attacks against North Korea. Last March, around the time of the attacks on banks and broadcasters in Seoul, North Korean offices said an online attack took down the servers at Loxley Pacific Co., the broadband provider for the North.
Mansourov said there is a “Cold War situation going on,” a tit-for-tat between the North and South. And it’s not limited to the Korean Peninsula:
China has accused the U.S. of cybersnooping, and the U.S. has accused China not only of spying, but of launching expensive cyberattacks against public and private networks in the U.S.
Meanwhile, Israel and the U.S. were widely fingered for launching the Stuxnet virus that crippled Iran's nuclear program in 2010.
“It’s effectively an arms race,” said C. Matthew Curtin, founder of the computer security consulting firm Interhack and author of Brute Force: Cracking the Data Encryption Standard.
“We need to assume that hostile nation states -- even non-state actors like al Qaeda -- have offensive cyber-capabilities, and we need to be in a position to render their capabilities moot."
He said the best way to confront cyberthreats is to secure domestic networks and force other countries to spend more money to get to us. “Then it becomes like the [Cold War-era] Soviet Union, where they will eventually have nothing left to spend,” he said.
Rogers still hopes to see the Cyber Intelligence Sharing and Protection Act (CISPA), which the House passed in April, succeed in the Senate and be signed into law by President Obama. It would allow greater information sharing between the government and private companies to prevent and respond to cyberattacks. But critics say it will give the government greater ability to monitor citizens’ Internet communications.
“It’s not a black-and-white issue,” said Curtin, who noted that “nothing is free” and that breaking down these “barriers” of information will require ordinary citizens to give up some privacy.
But the threat is real, he said, whether it comes from North Korea or Iran.
"If someone was trying to shut down our power grid when there is a huge polar vortex blowing through the country, that would have a serious impact on us,” he said.