Source: National Cyber Security – Produced By Gregory Evans A recent op-ed by Sung-Yoon Lee and Joshua Stanton highlights what should happen in dealing with North Korea. Unfortunately, for this long-time practitioner in the field of nonproliferation sanctions, it also highlights what cannot happen—or at least what cannot happen at…
North Korea Drones On: Redeux
Source: National Cyber Security – Produced By Gregory Evans This article is an updated version of “North Korea Drones On” by Joseph S. Bermudez Jr., published on 38 North on July 1, 2014. The recent revelation that a North Korean unmanned aerial vehicle (UAV, sometimes called drone) crossed south of…
North Korea’s Yongbyon Nuclear Facility: Slow Progress at the Experimental Light Water Reactor
Source: National Cyber Security – Produced By Gregory Evans A 38 North exclusive with analysis by William Mugford. Summary Recent commercial satellite imagery of the Yongbyon Nuclear Scientific Research Center has revealed new developments over the past six months, most recently in January 2016, suggesting that North Korea’s Experimental Light…
Sanctions’ Role in Dealing with the North Korean Problem
Source: National Cyber Security – Produced By Gregory Evans For almost a decade, sanctions have been the principal coercive instrument available to the United States and the international community in trying to deal with North Korea’s nuclear weapons and long-range ballistic missile programs. As bilateral and multilateral negotiating tracks with…
Seoul seeks hacker troops to fend off North Korean cyberattacks
Source: National Cyber Security – Produced By Gregory Evans A new army of South Korean soldiers was intently focused on fending off the enemy attack. Where were they coming from? What tactics were they using? And how best to neutralize them? The attackers were probably North Korean — that’s a…
South Korea seeks hackers to defend against North Korean cyberattacks
Source: National Cyber Security – Produced By Gregory Evans A new army of South Korean soldiers was intently focused on fending off the enemy attack. Where were they coming from? What tactics were they using? And how best to neutralize them? The attackers were probably North Korean – that’s a…
FiDi & North Beach Crime Roundup: Hat Thieves, Skateboard Assault
Source: National Cyber Security – Produced By Gregory Evans In this week’s SFPD Central Station newsletter, Capt. David Lazar thanks the department for providing 10 new officers, which help with the extra territory added with redistricting. He also warns people to watch out for common crimes, including cell phone grabs,…
Cyber leads risks for insurers in North America, Bermuda
Source: National Cyber Security – Produced By Gregory Evans Cyber risk is the top risk faced by insurers in North America and Bermuda, according to a survey released Wednesday by London-based think tank Centre for the Study of Financial Innovation. The survey, “Insurance Banana Skins: The CSFI Survey of Risks…
We Spoke To A North Korean Defector Who Trained With Its Hackers — What He Said Is Pretty Scary Read more: http://www.businessinsider.com/north-korean-defector-jang-se-yul-trained-with-hackers-2014-12#ixzz3Mw6LRx8J
Whether North Korea was responsible for the Sony hack or not, the consensus is that North Korea has some of the best hackers in the world. There have been some reports recently about North Korea’s special cyber warfare unit, known […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…