Post #1 Dennis This is a summary of Bruce Schneier’s “Did North Korea Really Attack Sony?” posted at https://www.schneier.com/blog/archives/2014/12/did_north_korea.html on 24 Dec 2014. The article details Schneier’s skepticism of the FBI’s attribution of the Sony attack to North Korea. While it is an older article, I found it interesting because I did not closely follow the attack at the time, and in my head just had a vague connection between “Sony hack” and “North Korea.” The evidence the FBI presented, at least publicly, for their attribution basically came down to the fact that North Korean networks were used, Korean language was used in the code (but not necessarily the North Korean dialect), and reuse of code from previous attacks attributed to North Korea. However, this is all circumstantial at best, and can fit into many possible narratives of what could have happened. Schneier details several possibilities: (1) This is an official North Korean operation, as the FBI said. (2) This is the work of North Korean nationals. This is supported by the reuse of code, evidence for someone less well supported than a state actor. Or, perhaps the attack was started by a national and later co-opted into an official operation. (3) Hackers who had no knowledge of the North Korea/ Sony connection hacked Sony, and used later media speculation as cover. (4) An insider leaked documents. This, he thinks, is unlikely, given that an insider would not have needed all of the tools the hackers used. (5) Something else entirely happened. The most interesting point in the article to me, however, is the strong motivation by multiple parties for quick over-confidence in attributing the attack. The US intelligence community would want to at least act as if they had quickly identified the source as part of a deterrence strategy: others are less likely to carry out similar attacks if they fear getting caught. Sony would also appreciate North Korea being fingered. If linked to a hostile act by a foreign state, it may reduce their liability in lawsuits related to the attack and release of information. Post #2 Abdulelah In this week`s discussion, I choose to discuss an article titled “The US Turning Up the Heat on North Korea’s Cyber Threat Operations,” published in the Dark Reading website in September 2019. The report can be retrieved from https://www.darkreading.com/attacks-breaches/usturning-up-the-heat-on-north-koreas-cyber-threat-operations/d/d-id/1335819 The article reports on the US government’s move to slap sanctions on three North Korean cyber groups in attempts to stop hacking activity. The three accused North Korean groups are linked to working for the Reconnaissance General Bureau. The primary objective linked with the three cyber threat groups is to perpetuate nuclear and military goals on behalf of the government (Vijayan, 2019). The article questions the impacts of the sanction and its effectiveness on deterrence, considering the groups aren`t based in the US. The author notes that stopping the groups from breaking the law will be futile since the group’s motivation is to violate the law. The article also highlights that North Korea`s cyber capabilities have continuously improved and involves innovative initiatives and tools (Vijayan, 2019. The author concludes by recommending the establishment of relationships that might cause better changes rather than sanctions since they are futile for countries like China and Russia. The view connects with the assertion noted by Lewis (2010), that the primary objective of nations` boosting their cyber capabilities is to develop powers to control cyber opponents. The virtue that the three accused groups highlighted in the article aren`t based in the US makes it difficult to employ deterrence strategies. This provides benefits to the North Koreans to conduct an attack without being identified. The ability and focus to develop elite programs for skilled hackers, as noted by Lewis (2010), improves a nation`s cyber capabilities. The North Korean cyber strategy matches the peace and military strategy of launching low-intensity operations that have minimal disruption. In the event a war erupts, the North Korean cyber strategy manipulates other state’s vulnerabilities (Jun, LaFoy, and Sohn, 2016). Therefore, cyber deterrence policies in global systems are critical. The global cyber deterrence policies will present the vision and requirement of building effective strategies of cyber deterrence. The laws may ensure respect for another state`s laws, politics, and cultural traditions of other nations (Nagorski, 2010). However, in establishing the deterrence strategies, individual countries need to develop internal deterrence ways to avoid manipulation by other nations. References Jun, J., LaFoy, S., & Sohn, E. (2016). North Korea’s cyber operations: Strategy and responses. Retrieved from file:///C:/Users/user/Downloads/20191105003453nkoreacyberops%20(1).pdf Lewis, J. A. (2010). Speak Loudly and Carry a Small Stick: The North Korean Cyber Menace. 38 North, 7. Nagorski, A. (Ed.). (2010). Global Cyber Deterrence: Views from China, the US, Russia, India, and Norway. EastWest Institute. Vijayan, J. (2019, September 16). The US Turning Up the Heat on North Korea’s Cyber Threat Operations. Dark Reading. Retrieved from https://www.darkreading.com/attacksKoreas-cyber-threat-operations/d/d- breaches/us-turning- up-the-heat-on-north- id/1335819.
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER
Why Choose Us?
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How It Works
- Click on the “Place Your Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the “PAPER DETAILS” section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.
About AcademicWritersBay.com
AcademicWritersBay.com is an easy-to-use and reliable service that is ready to assist you with your papers 24/7/ 365days a year. 99% of our customers are happy with their papers. Our team is efficient and will always tackle your essay needs comprehensively assuring you of excellent results. Feel free to ask them anything concerning your essay demands or Order.
AcademicWritersBay.com is a private company that offers academic support and assistance to students at all levels. Our mission is to provide proficient and high quality academic services to our highly esteemed clients. AcademicWritersBay.com is equipped with competent and proficient writers to tackle all types of your academic needs, and provide you with excellent results. Most of our writers are holders of master’s degrees or PhDs, which is an surety of excellent results to our clients. We provide assistance to students all over the world.
We provide high quality term papers, research papers, essays, proposals, theses and many others. At AcademicWritersBay.com, you can be sure of excellent grades in your assignments and final exams.


