TH THE E SH SHADOW SE SECTOR North Koreas Commercial IT Networks - - PowerPoint PPT Presentation

th the e sh shadow se sector
SMART_READER_LITE
LIVE PREVIEW

TH THE E SH SHADOW SE SECTOR North Koreas Commercial IT Networks - - PowerPoint PPT Presentation

TH THE E SH SHADOW SE SECTOR North Koreas Commercial IT Networks Andrea Berger Shea Cotton Cameron Trainer North Korean Cyber and IT Companies: An Overview Nor orth th Kor orean Cyber St Strategy Emphasis on asymmetric


slide-1
SLIDE 1

TH THE E SH SHADOW SE SECTOR

North Korea’s Commercial IT Networks

Andrea Berger Shea Cotton Cameron Trainer

slide-2
SLIDE 2
slide-3
SLIDE 3

North Korean Cyber and IT Companies: An Overview

slide-4
SLIDE 4

Nor

  • rth

th Kor

  • rean Cyber St

Strategy

  • Emphasis on asymmetric capabilities in general strategy.
  • Low-risk, and low-cost approach to:
  • Disruption
  • Power projection
  • Coercion
  • Intelligence collection
  • Revenue generation
  • Where does the commercial IT sector fit in?
slide-5
SLIDE 5

Ris isk Ex Exposure

1) Government-to-government deals 2) DPRK front companies selling directly to customers 3) DPRK companies plugging indirectly into supply chains

slide-6
SLIDE 6

Government-to-Government Contracts

slide-7
SLIDE 7

Source: Equatorial Guinea Inter (Disclaimer: not verified)

slide-8
SLIDE 8

DPRK Companies Selling Directly

slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14

DPRK Companies Selling Indirectly

slide-15
SLIDE 15
slide-16
SLIDE 16
slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22

Trends and Remaining Questions

slide-23
SLIDE 23

Trends

  • Wide range of products/services, but emerging specialization in IT

security, biometric identification.

  • Sale of algorithms?
  • More general NK companies getting involved in IT sector.
  • Seeming use of freelancer platforms.
slide-24
SLIDE 24

Key Questions

  • Is North Korea using its presence in the commercial IT sector for

strategic or tactical aims other than revenue generation?

  • How does that activity intersect with its seeming preference for

targeting the private sector through hacking, malware etc?

  • Do the organizations active in this space connect to one part of the

North Korean system, or more? How do they relate?

slide-25
SLIDE 25

Thank You

Andrea Be Berger: aber erger@miis.edu Shea ea Cot Cotton: scotton@miis.edu Cam Cameron Trainer: ct ctrainer@miis.edu