th the e sh shadow se sector
play

TH THE E SH SHADOW SE SECTOR North Koreas Commercial IT Networks - PowerPoint PPT Presentation

TH THE E SH SHADOW SE SECTOR North Koreas Commercial IT Networks Andrea Berger Shea Cotton Cameron Trainer North Korean Cyber and IT Companies: An Overview Nor orth th Kor orean Cyber St Strategy Emphasis on asymmetric


  1. TH THE E SH SHADOW SE SECTOR North Korea’s Commercial IT Networks Andrea Berger Shea Cotton Cameron Trainer

  2. North Korean Cyber and IT Companies: An Overview

  3. Nor orth th Kor orean Cyber St Strategy • Emphasis on asymmetric capabilities in general strategy. • Low-risk, and low-cost approach to: • Disruption • Power projection • Coercion • Intelligence collection • Revenue generation • Where does the commercial IT sector fit in?

  4. Ris isk Ex Exposure 1) Government-to-government deals 2) DPRK front companies selling directly to customers 3) DPRK companies plugging indirectly into supply chains

  5. Government-to-Government Contracts

  6. Source: Equatorial Guinea Inter (Disclaimer: not verified)

  7. DPRK Companies Selling Directly

  8. DPRK Companies Selling Indirectly

  9. Trends and Remaining Questions

  10. Trends • Wide range of products/services, but emerging specialization in IT security, biometric identification. • Sale of algorithms? • More general NK companies getting involved in IT sector. • Seeming use of freelancer platforms.

  11. Key Questions • Is North Korea using its presence in the commercial IT sector for strategic or tactical aims other than revenue generation? • How does that activity intersect with its seeming preference for targeting the private sector through hacking, malware etc? • Do the organizations active in this space connect to one part of the North Korean system, or more? How do they relate?

  12. Thank You Andrea Be Berger: aber erger@miis.edu Shea ea Cot Cotton: scotton@miis.edu Cam Cameron Trainer: ct ctrainer@miis.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend