Articles & Multimedia
Showing 1-20 of 50 Publications
-
Sanctions, Cyber, and Crypto: How Pyongyang Can Exploit the War in Ukraine
If Russian forces completely isolate Donetsk and Luhansk from the rest of Ukraine, North Korea could expand its sanctions evasions campaigns in eastern Europe....
By Jason Bartlett
-
Mapping Major Milestones in the Evolution of North Korea’s Cyber Program
Understanding the evolution of North Korea’s offensive cyber program can provide countries like South Korea and the United States with valuable information that can help impro...
By Jason Bartlett
-
Domestic and Global Political Impacts of K-Pop: BoA, BTS, and Beyond
K-Pop has had a profound impact on domestic and foreign politics, demonstrating its importance for South Korean diplomacy....
By Jason Bartlett
-
Why North Korea is the Greatest State-Sponsored Threat to the Financial Services Sector
Pyongyang is acutely aware of growing financial trends abroad and how best to exploit them to its benefit....
By Jason Bartlett
-
North Korea’s Hacking Army
They’ve stolen billions of dollars. Is the U.S. ready to crack down? Jason Bartlett, research associate in the Energy, Economics, and Security Program at the Center for a New ...
By Jason Bartlett
-
Pyongyang Pays South Korean Citizens in Crypto to Sell Military Secrets
Cryptocurrency is not only a financial asset to steal and launder, but also a lucrative tool to help fund global espionage and recruit foreign agents....
By Jason Bartlett
-
U.S. Actively Tracks North Korea's Illegal Cyber Activities
The US is more aggressively tracking North Korea's illegal cyber activities. The U.S. government added four cryptocurrency wallets linked to the North Korean hacking group Laz...
By Jason Bartlett
-
TRM Talks North Korea and CNAS Report
We know that North Korea has taken to the digital battlefield and that cryptocurrency is the target. But what can we learn from the report about the ways in which DPRK cybercr...
By Jason Bartlett
-
Loyalty for Luxury: How the Kim Family Buys Support From North Korean Elites
The Kim family will likely continue to use a mix of fear tactics and gift giving to secure loyalty from the elite class....
By Jason Bartlett
-
How to follow North Korean hackers
The rate by which cryptocurrency and blockchain technology evolves continues to far outpace the rate by which national governments and international institutions are able to r...
By Jason Bartlett
-
How to Strengthen South Korea-US Cooperation on Combatting Cyber-enabled Financial Crime
The United States and South Korea each possess unique strengths in combating the rise of cyber-enabled financial crime, but their true joint potential is largely untapped....
By Jason Bartlett
-
You Get a Sanction, and You, and You
Economic sanctions are really hard to do right. They have to be precisely gamed out, or they can backfire in any number of ways. They’re often hard to get rid of. And, more of...
By Jason Bartlett
-
Sharper: Blockchain
The rapid innovation of cryptocurrency technology beyond the current regulatory framework within the space has urged U.S. policymakers to advance their understanding of blockc...
By Anna Pederson & Jason Bartlett
-
Understanding the Strengths and Vulnerabilities of North Korean Hackers
Pyongyang continues to defy miscalculated expectations regarding its cyber capabilities by successfully employing a series of sophisticated cyberattacks that target new and de...
By Jason Bartlett
-
Five Ways to Improve Sanctions Coordination Between the U.S. Government and Humanitarian Aid Groups
Current sanctions programs still pose significant obstacles to the facilitation of life-saving humanitarian aid in heavily sanctioned countries....
By Jason Bartlett
-
South Korea’s Constant Struggle With Digital Sex Crimes
Banning pornography websites will only help diversify the methods by which illicit actors create new ways to access explicit material through unregulated mediums...
By Jason Bartlett
-
How North Korea Might Exploit New Video Games for Crypto
The online gaming industry has a history of illicit actors exploiting its networks and user base to conduct and facilitate cyber-enabled financial crime....
By Jason Bartlett
-
Another Security Breach at the Inter-Korean Border Reinforces Concerns Over South Korea’s Ability to Protect Itself
The fact that an individual can enter and exit the “most heavily fortified border in the world” without capture raises serious concerns regarding South Korea’s ability to adeq...
By Jason Bartlett
-
What Will North Korean Cybercrime Look Like in 2022?
North Korean hackers will likely continue to employ more phishing campaigns in the future while tailoring their level of obfuscation based on the target’s sophistication....
By Jason Bartlett
-
North Korea Plans to Dig Deep Into Renewable Energy Alternatives
North Korea will likely invest more capital and resources into developing renewable energy facilities, while still relying on key trading partners like China to keep its econo...
By Jason Bartlett