recentpopularlog in

jerryking : north_korea   38

The U.S. Is Ceding the Pacific to China
March 3, 2019 | WSJ | By Mark Helprin.

While Washington’s focus is elsewhere, Beijing plays the long game—that means preparing for war.

The only effective leverage on China, and by extension North Korea—which otherwise will retain nuclear weapons whether overtly or covertly but certainly—is to alter the correlation of military forces in the Western Pacific, and indeed in the world, so that it no longer moves rapidly and inevitably in China’s favor, which is what China cares about, the essence of its policy, its central proposition. Though with some effort the U.S. is perfectly capable of embarking upon this strategy, it has not. It seems we lack the awareness, political will, intelligence, probity, discipline, leadership, and habit of mind to do so.
America_in_Decline?  Asia_Pacific  balance_of_power  China  China_rising  geopolitics  hard_power  long-term  long-range  maritime  Mark_Helprin  North_Korea  nuclear  PACOM  political_geography  political_will  rivalries  South_China_Sea  strategic_geography  submarines  trade_wars  U.S.  U.S._Navy  USMC  U.S.-China_relations  Xi_Jinping  zero-sum_games 
march 2019 by jerryking
Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons - The New York Times
By NICOLE PERLROTH and DAVID E. SANGER JUNE 28, 2017

The Petya ransomware attack....was built on cyberweapons (i.e. hacking tools that exploited vulnerabilities in Microsoft software) stolen from the NSA in 2016 by Shadow Brokers and made public in April 2017. Now those weapons are being deployed against various U.S. partners include the United Kingdom and Ukraine.....there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands..... the government “employs a disciplined, high-level interagency decision-making process for disclosure of known vulnerabilities” in software, “unlike any other country in the world.”....Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States.

“Whether it’s North Korea, Russia, China, Iran or ISIS, almost all of the flash points out there now involve a cyber element,” Leon E. Panetta, the former defense secretary and Central Intelligence Agency chief.....viruses can suddenly mutate into other areas you didn’t intend, more and more,” Mr. Panetta said. “That’s the threat we’re going to face in the near future.”..... ransomware that recently gained the most attention in the Ukraine attack is believed to have been a smoke screen for a deeper assault aimed at destroying victims’ computers entirely. .....Mr. Panetta was among the officials warning years ago of a “cyber Pearl Harbor” that could bring down the American power grid. But he and others never imagined that those same enemies might use the N.S.A.’s own cyberweapons.....rogue actors actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,”.....So long as flaws in computer code exist to create openings for digital weapons and spy tools, security experts say, the N.S.A. is not likely to stop hoarding software vulnerabilities any time soon.
adversaries  CIA  computer_viruses  cyberattacks  cyberthreats  cyberweapons  David_Sanger  exploits  hackers  Leon_Panetta  malware  NSA  North_Korea  Pentagon  power_grid  ransomware  rogue_actors  security_&_intelligence  SecDef  vulnerabilities 
june 2017 by jerryking
U.S. Strategy to Hobble North Korea Was Hidden in Plain Sight - The New York Times
By WILLIAM J. BROAD and DAVID E. SANGERMARCH 4, 2017
Continue reading the main storyShare This Page
Share
Tweet
Email
More
containment  security_&_intelligence  North_Korea  covert_operations 
march 2017 by jerryking
U.S. Cyber Command Chief on What Threats to Fear the Most - WSJ
June 19, 2016 | WSJ |

But the types of threats that we worry most about today that are new are adversaries taking full control of our networks, losing control of our networks, having a hacker appear to be a trusted user......MS. BLUMENSTEIN: Extraordinary investments are required now for cybersecurity. But looked at another way, there’s an extraordinary cost to getting it wrong.

I was talking to one of the CFOs out there who said, “Can you ask, what is the estimated loss?” Is there a total number? Or do you just know specific incidences?

On the military side, you can imagine the difficulty that would cause a commander, if he didn’t trust his own network or his data.
adversaries  cyber_security  cyber_warfare  threats  North_Korea  ISIS  network_risk  capabilities  Russia  China  Sony  data  Pentagon  U.S._Cyber_Command  cyberattacks 
june 2016 by jerryking
Holman Jenkins: Sony Lesson: Don’t Get Hacked - WSJ
By HOLMAN W. JENKINS, JR.
Dec. 19, 2014

What we want to know, the FBI is unlikely to find out: What exactly North Korea’s role was and how it may have stimulated others to act on its behalf. North Korean hackers stand on the shoulders of giants—Russian content thieves, Chinese business-secret spies, the politically minded hacktivsts who’ve been strafing Sony for a decade. Hacking is a swarm effort. Participants often don’t even know each other’s real names and nationalities. Don’t be surprised if hacker networks are also full of U.S. agents working for various government departments. Arrests might not have been made in the PlayStation case if a key participant hadn’t been an FBI informant....How Sony’s data security, given this history, could have been so third-rate is a mystery for a future business-school case study....
Holman_Jenkins  lessons_learned  hackers  cyber_security  North_Korea  cyber_warfare  Sony  vulnerabilities  blackmail  cyberattacks 
december 2014 by jerryking
North Korea: How Can the U.S. Respond to Sony Hack Attack? - WSJ
Dec. 20, 2014 | WSJ | By JONATHAN CHENG And JEYUP S. KWAAK.

SEOUL—U.S. President Barack Obama ’s warning on Friday of punitive action against North Korea following the cyberattack on Sony Pictures Entertainment raises a sticky question: what can the world’s leading military and economic power do to an isolated country that has successfully resisted decades worth of attempts to rein in its hostility?...However, engaging in any kind of cyber tit-for-tat with North Korea could undermine trust in the security of online banking and shopping services,
North_Korea  cyber_security  cyber_warfare  Sony  retaliation  sanctions  blacklists  economic_warfare  money_laundering  hackers  punitive  retribution  undermining_of_trust  cyberattacks 
december 2014 by jerryking
Holman Jenkins: Sony vs. North Korea - WSJ
By HOLMAN W. JENKINS, JR.
Dec. 9, 2014

In the cyberwar that’s coming, firewalls and antivirus software won’t be sufficient. Companies need business models that are robust against cyberattack. Sony’s isn’t, quite apart from the usual complaints now pouring forth from employees about poor workaday data security. (Excel files containing salary data apparently weren’t even password-protected.)
North_Korea  Sony  cyber_security  data_breaches  cyber_warfare  cyberattacks 
december 2014 by jerryking
Aiming Financial Weapons From Treasury War Room - NYTimes.com
By ANNIE LOWREYJUNE 3, 2014

“The United States needs to remain involved in the world, but does not necessarily need to remain involved just through military power,” said David S. Cohen, Treasury’s under secretary for terrorism and financial intelligence, who is sometimes described within the administration as President Obama’s favorite combatant commander. “There are other ways of projecting U.S. power that are consequential.”

Mr. Cohen oversees the obscure Office of Foreign Assets Control, the engine that creates and administers the steadily increasing number of financial sanctions. They are a policy tool once considered largely ineffectual but are now used against a wide range of actors, from Iran’s revolutionary guard to Mexican drug traffickers to cronies of President Vladimir V. Putin of Russia....Sanctions have also become a central policy lever with Iran, Syria, South Sudan and North Korea — as well as drug cartels, arms traders and terrorists. In no small part, their swelling number is because of their improved potency, analysts said: Today’s sanctions tend to be “smart,” narrow rather than broad, and designed to pressure elites rather than squeezing average citizens....Legal changes during the Bill Clinton and George W. Bush administrations bolstered the tool. Analysts started focusing on travel bans and asset freezes, rather than whole-country or whole-industry sanctions. The interconnectedness of the global economy has also made sanctions stronger.

“We’re very nuanced about how to use the tool and, I think, very thoughtful about it,”
Iran  geopolitics  U.S.Treasury_Department  statecraft  21st._century  travel_bans  asset_freezes  sanctions  North_Korea  interconnections  economic_warfare  economic_policy  specificity  hard_power  rogue_actors  policy_tools  potency  global_economy 
june 2014 by jerryking
Overseas Hot Spots Could Entangle Obama - WSJ.com
April 1, 2013, 1:26 p.m. ET

Overseas Hot Spots Could Entangle Obama

By GERALD F. SEIB
Like this columnist
U.S.foreign_policy  threats  security_&_intelligence  Iran  Syria  North_Korea  Obama  hotspots 
april 2013 by jerryking
Shadow of the past
July 24, 2004 | G&M |

A quarter of the resolutions centre on the pinprick state of Israel, not to mention 90 per cent of the discussions. Hellhoìes and regimes iike Syria. Egypt, Sudan` Iran, Russia, China and North Korea rarely come under discussion. How could they? They are the honoured delegates - some of them are even Security Council members - who, as you sayv are using Israel as their "favourite punching bag."
anti-Israel  UN  letters_to_the_editor  Zimbabwe  North_Korea  hypocrisy 
march 2013 by jerryking
Dictator's Death Stokes Fears - WSJ.com
DECEMBER 20, 2011 | WSJ | By EVAN RAMSTAD And JAY SOLOMON.
Dictator's Death Stokes Fears
North_Korea 
february 2012 by jerryking
Plus ça change in North Korea - The Globe and Mail
derek burney
From Tuesday's Globe and Mail
Published Tuesday, Dec. 20, 2011
North_Korea  succession  Derek_Burney 
december 2011 by jerryking
Kim Jong Eun: Portrait of New Leader Takes Shape - WSJ.com
DECEMBER 20, 2011 | WSJ | By ADAM ENTOUS and SIOBHAN GORMAN in Washington and JAEYEON WOO in Seoul.

Portrait of New Leader Takes Shape
U.S. Officials Describe Kim Jong Eun, Elusive Inheritor of the Kim Family's Dictatorship, as Sadistic and Unpredictable
North_Korea  Kim_Jong_Eun  political_psychology 
december 2011 by jerryking
China, Japan Regard Shift With Unease - WSJ.com
DECEMBER 20, 2011 | WSJ | By JEREMY PAGE in Beijing and CHESTER DAWSON in Tokyo. China, Japan Regard Shift With Unease
North_Korea  China  Japan 
december 2011 by jerryking
North Korea Seals Chinese Border - WSJ.com
DECEMBER 21, 2011 | WSJ | By JEREMY PAGE in Tumen, China, and JAEYEON WOO in Seoul.

North Korea Seals Chinese Border
Price of Chrysanthemums Rises at Crossing Points as State Workers Are Called Back for Kim's Funeral
North_Korea  China  crossborder 
december 2011 by jerryking
Melanie Kirkpatrick: North Korea, the World's Most Repressive State - WSJ.com
DECEMBER 20, 2011 | WSJ | By MELANIE KIRKPATRICK

The World's Most Repressive State
President George W. Bush famously told journalist Bob Woodward, 'I loathe Kim Jong Il.'
North_Korea  Kim_Jong_Il  op-ed 
december 2011 by jerryking
Review & Outlook: Breaking the Kim Dynasty - WSJ.com
DECEMBER 20, 2011| WSJ | Editorial.

Moments of transition are also when a syndicate like the one that rules North Korea may face internal leadership disputes. It's possible that as the Kim gene pool gets shallower, the young Kim may not be able to maintain control the way his father and grandfather did. The West can exploit this tension by staying united in isolating the regime until it changes.

The wrong approach is to believe the regime will change with another round of cash and other carrots. In recent days Washington and Seoul have been tempting the North back to the six-party talks on denuclearization with offers of humanitarian food aid. But the lesson of the past 20 years is that this helps the regime by giving it currency or other aid to pay off its members and by enhancing its international stature.

The Clinton Administration tried and failed with its Agreed Framework of 1994, and the Bush Administration tried and failed in its second term with Condoleezza Rice's ploy to remove North Korea from the U.S. list of state sponsors of terror. North Korea pocketed everything, lied about dismantling its nuclear plans, and kept on proliferating. A replay might enhance Kim Jong Eun's stature inside the regime.

Dictatorships tend to split when they are under economic and diplomatic pressure
dynasties  editorials  North_Korea  Kim_Jong_Il  gene_pool  deaths  dictatorships  Kim_Jong_Eun  succession  nepotism  transitions 
december 2011 by jerryking
John Bolton: 'The Great Successor' - WSJ.com
DECEMBER 20, 2011
'The Great Successor'
There's no guarantee that the North Korean military will accept another hereditary ruler.

By JOHN BOLTON
John_Bolton  North_Korea  U.S.  succession  dynasties  op-eds  Kim_Jong_Il  deaths  dictatorships  Kim_Jong_Eun 
december 2011 by jerryking
In Kim Jong-il Death, an Extensive Intelligence Failure - NYTimes.com
By MARK LANDLER and CHOE SANG-HUN
Published: December 19, 2011

“We have clear plans about what to do if North Korea attacks, but not if the North Korean regime unravels,” said Michael J. Green, a former Asia adviser in the Bush administration. “Every time you do these scenarios, one of the first objectives is trying to find out what’s going on inside North Korea.”

In many countries, that would involve intercepting phone calls between government officials or peering down from spy satellites. And indeed, American spy planes and satellites scan the country. Highly sensitive antennas along the border between South and North Korea pick up electronic signals. South Korean intelligence officials interview thousands of North Koreans who defect to the South each year.

And yet remarkably little is known about the inner workings of the North Korean government. Pyongyang, officials said, keeps sensitive information limited to a small circle of officials, who do not talk.
security_&_intelligence  failure  North_Korea  South_Korea  U.S.  SIGINT  scenario-planning  contingency_planning  eavesdropping 
december 2011 by jerryking
America's new role in the Pacific - Foreign policy -
Oct 4, 2011 | Salon.com | By John Feffer
Can the U.S. adjust to the military and economic rise of Northeast Asia?
U.S.foreign_policy  China  North_Korea  Asia_Pacific  maritime  China_rising 
october 2011 by jerryking
Pyongyang Tests China's Patience - WSJ.com
NOVEMBER 26, 2010 | WSJ | By JEREMY PAGE And JASON DEAN
North_Korea  China 
november 2010 by jerryking
: Why We're Always Fooled by North Korea - WSJ.com
NOVEMBER 24, 2010 | Wall Street Journal | Michael J. Green
and William Tobey. The analysts who predicted North Korea's latest
nuclear breakthrough were denigrated and ignored.
North_Korea  U.S.foreign_policy  tyrants  repression 
november 2010 by jerryking
North Korea and Kim Jong Il: Will the Regime Collapse? - WSJ.com
MARCH 26, 2010 | Wall Street Journal | by y B.R. MYERS. If the regime collapses, will the rest of the world be ready?
North_Korea  collapse-anxiety  contingency_planning  societal_collapse 
march 2010 by jerryking

Copy this bookmark:





to read