Source: National Cyber Security – Produced By Gregory Evans On July 15, 2010, 38 North held a workshop that gathered together experts from the U.S., South Korea, Europe, China and Japan, to discuss the latest developments regarding North Korea, both internal and external, with the goal of identifying future research priorities. We…
Internal Developments in North Korea: Succession
Source: National Cyber Security – Produced By Gregory Evans On July 15, 2010, 38 North held a workshop that gathered together experts from the U.S., South Korea, Europe, China and Japan, to discuss the latest developments regarding North Korea, both internal and external, with the goal of identifying future research priorities….
Speak Loudly and Carry a Small Stick: The North Korean Cyber Menace
Source: National Cyber Security – Produced By Gregory Evans We often see reports of troubling and sophisticated North Korean capabilities to wage cyber warfare. Although cyber exploits, usually against South Korean targets, are routinely attributed to the North, there is much suspicion and concern, but little hard evidence. Estimates of…
What do Fox News and North Korea Have in Common?
Source: National Cyber Security – Produced By Gregory Evans Greta Van Susteren of Fox News and Pyongyang seem to be in agreement, or at least to share assumptions about the puppet-puppetmaster nature of the U.S.-ROK relationship. ”Why won’t South Korea back us 100%? We don’t need 95%, we need 100%”…
When Dynastic Successions Work: North Korea Takes Cues from the Middle East
Source: National Cyber Security – Produced By Gregory Evans North Korea is in the throes of a generational triple play: passing power to the son of the son of founder Kim Il Sung. How successful that transition will be remains to be seen. In seeking to enthrone Kim Jong Un,…
The Future of the North Korean Regime: A Conversation with James Church and Jennifer Lind
Source: National Cyber Security – Produced By Gregory Evans 38 North recently talked with author James Church, and Jennifer Lind (Assistant Professor of Government, Dartmouth College) about the future of North Korea. 38 North: In the 1990s there was a flurry of speculation that North Korea would collapse. We saw…
North Korea’s Nuclear Test Site: Limited Activity Continues; Tunnel Excavation Resumes
Source: National Cyber Security – Produced By Gregory Evans A 38 North exclusive with analysis by Jack Liu. Summary New commercial satellite imagery of North Korea’s Punggye-ri nuclear test site from April 19 shows limited vehicle and equipment activity at the North Portal and Main Support Area as well as…
US General says : North Korean hackers among world’s best
North Korea’s asymmetric warfare potential is being bolstered by one of the world’s best and most organised cyber attack capabilities, according to the Army general nominated to command United States forces in South Korea. “This is an area of growth,” Army General Vincent Brooks told the Senate Armed Services Committee…
North Carolina high school reportedly opens indoor shooting range
Members of the Army Junior Reserve Officer Training Corps program at a North Carolina high school reportedly will be able to practice shooting at the school’s indoor range. WRAL reported the Smithfield-Selma High School JROTC opened its 1,200 square-foot, six-lane, indoor shooting range last week. The program paid for constructions…
North Korea’s Large Rocket Engine Test: A Significant Step Forward for Pyongyang’s ICBM Program
Source: National Cyber Security – Produced By Gregory Evans Summary North Korea’s April 9 test of a large liquid-fuel engine is a disturbing development that not only highlights the growing threat posed by Pyongyang but should also put to rest, once and for all, all claims that the North’s WMD…