The Military / Nuclear Weapons
- Military Resources listNorth Korean Economy Watch source list for information on the military,
- North Korea’s Nuclear Weapons and Missile Programs(Congressional Research Service). Reports covering 2019-2023.
- North Korea's Cruise-Missile ChallengeIISS -- International Institute for Strategic Studies
- Military and Security Developments Involving the Democratic People's Republic of Korea Reports (to Congress) from Federal Depository Library Program Electronic Collection (FDLP/EC) Archive, covering armed forces, nuclear weapons, defense and military policy, operational readiness. In archive: 2012, 2013-14, 2015, 2017.
- Countering the North Korean Threat: New Steps in U.S. PolicyHearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Fifteenth Congress, first session, February 7, 2017
- The Persistent Threat of North Korea and Developing an Effective U.S. ResponseHearing before Senate Subcommittee on East Asia, the Pacific and International Cybersecurity Policy of the Committee on Foreign Relations, Sept. 28, 2016
Kim Jong Un and the Bomb: Survival and Deterrence in North Korea by
Publication Date: 2020 (New York, NY : Oxford University Press)"Internal regime propaganda has called North Korea's nuclear forces the country's "treasured sword," underscoring the cherished place of these weapons in national strategy. Fiercely committed to self-reliance, Kim remains determined to avoid unilateral disarmament.On the Brink: Trump, Kim, and the Threat of Nuclear War by Former Pentagon insider and Korean security expert Van Jackson traces the origins of the first American nuclear crisis in the post-Cold War era, and explains the fragile, highly unpredictable way that it ended. Grounded in security studies and informed analysis of the US response to North Korea's increasing nuclear threat, Trump's aggressive rhetoric is analysed in the context of prior US policy failures, the geopolitics of East Asia, North Korean strategic culture and the acceleration of its nuclear programme.
Call Number: E183.8.K7 J32 2019Publication Date: 2018 (Cambridge, United Kingdom ; New York, NY : Cambridge University Press)Talking to North Korea: Ending the Nuclear Standoff by This insider's account blasts apart the myths which paint North Korea as a rogue state run by a mad leader. Informed by extraordinary access to the country's leadership, Glyn Ford investigates the regime from the inside, providing game-changing insights. Acknowledging that North Korea is a deeply flawed and barbaric state, he nonetheless shows that sections of the leadership are desperate to modernize and end their isolation. Ford...provides a road map to avert the looming threat of a war.
Call Number: DS935 .F67 2018Publication Date: 2018 (London : Pluto Press)Origins of the North Korean Garrison State by This book draws on North Korean documents and North Korean veterans' testimonies, and demonstrates how the Korean People's Army and the Korean War shaped North Korea into a closed, militarized and xenophobic garrison state....a culture of victimization was established among North Koreans which allowed Kim Il Sung to use this to build and maintain the garrison state. youth and lower classes in North Korea considered the Korean People's Army as a positive opportunity for upward social mobility. and.. became the core supporters of the North Korean regime today. This work illustrates how the North Korean regime has garnered popular support for the continuation of a militarized state, despite the great hardships the people are suffering.
Call Number: UA853.K5 K56 2018Publication Date: 2018 (Abingdon, Oxon ; New York, NY : Routledge, an imprint of the Taylor & Francis Group)Nuclear North Korea: a Debate on Engagement Strategies by Nuclear North Korea was first published in 2003 ...and promptly became a landmark of an ongoing debate in academic and policy circles about whether to engage or contain North Korea. Fifteen years later, as North Korea tests intercontinental ballistic missiles and the U.S. president refers to Kim Jong-un as "Rocket Man," [the book] remains an essential guide to the difficult choices we face. Coming from different perspectives--the authors together present authoritative analysis of one of the world's thorniest challenges. They refute a number of misconceptions and challenge the faulty thinking that surrounds the discussion of North Korea, particularly the idea that North Korea is an irrational actor.
Call Number: UA853.K7 C445 2018Publication Date: 2018 (New York : Columbia University Press) revised and updated edition.North Korean Military Proliferation in the Middle East and Africa by [The author] analyzes relevant North Korean military capabilities, what arms the nation provides, and to whom, how it skirts its sanctions, and how North Korea's activities can best be contained. He traces illicit networks that lead to state and nonstate actors in the Middle East and throughout Africa. The potential proliferation of nuclear and chemical weapons technology and the vehicles that carry it, including ballistic missiles and artillery, represent a broader threat than the leadership in Pyongyang. Including training and infrastructure support, North Korea's profits may range into the billions of dollars, all concealed in illicit networks and front companies ....
Call Number: JZ6009.K7 B43 2018 (In Olin Library)Publication Date: 2018 ( Lexington, Kentucky : The University Press of Kentucky)North Korea and Nuclear Weapons: Entering the New Era of Deterrence by North Korea is perilously close to developing strategic nuclear weapons capable of hitting the United States and its East Asian allies. Since their first nuclear test in 2006, North Korea has struggled to perfect the required delivery systems. Kim Jong-un's regime now appears to be close, however. [The contributors]contend that the time to prevent North Korea from achieving this capability is virtually over; scholars and policymakers must turn their attention to how to deter a nuclear North Korea. The United States, South Korea, and Japan must also come to terms with the fact that North Korea will be able to deter them with its nuclear arsenal. long-range targets with nuclear weapons? How will and should the United States, South Korea, Japan, and China respond, and what will this mean for regional stability in the short term and long term?
Call Number: U264.5.K7 N825 2017Publication Date: 2017 (Washington, DC : Georgetown University Press)North Korea's Military-Diplomatic Campaigns, 1966-2008 by This book examines North Korea's nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea's military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang's consistent, calculated use of military tools to advance strategic objectives vis a vis its adversaries.
Call Number: UA 853 K5 M53 2010Publication Date: 2009 (London, New York: Routledge)- North Korea's Military Threat: Pyongyang's Conventional Forces, Weapons of Mass Destruction, and Ballistic Missiles by Covers military forces -- KPA, Special Purpose Forces and Special Operations Force of the KPA; nuclear, biological, chemical WMD's, ballistic missiles. Extensive references. #4 of series "Demystifying North Korea"Call Number: DS 935.55 S362 2007. Also full-text online: click on titlePublication Date: 2007 (Carlisle, PA: Strategic Studies Institute, U.S. Army War College
SP's Military Yearbook Detailed armaments and military capacities of world's countries, in the Regional Balance section of the volume. Includes North Korea, with brief essay updating military security and details, where available, of navy, air force, army and armaments.
Call Number: U10.I39 M64Publication Date: 1965 to most current (New Delhi : Guide Publications)
Cyber Operations
"Cyberwarfare is an all-purpose sword that guarantees the North Korean People’s Armed Forces ruthless striking capability, along with nuclear weapons and missiles.” – Kim Jong-Un, 2013 (IEEE 2019 Conference paper, "The All-Purpose Sword")
- How Are Cyberattacks Fueling North Korea’s Nuclear Ambitions?CSIS (Center for Strategic & International Studies) July 2024 report on cyberattacks by hacker group APT45 (Advanced Persistent Threat 45, Andariel) on US defense and military industries, stealing designs & classified info . Efforts by US and foreign private and government agencies to counter attacks.
- Crypto Country: North Korea’s Targeting of CryptocurrencyInsikt Group (Recorded Future) Nov. 2023 intelligence report on successful, sophisticated cyberattacks, stealing billions in cryptocurrency. Full PDF report can be downloaded.
- North Korean Cyber Activity(Dept. of Health & Human Services, Cybersecurity Program.) March 2021 report including brief outline of DPRK's "national interests;" timeline of activities 2020-2021; overview of 9 known cyber (APT) groups and analysis of each, from Hidden Cobra to Bureau 325. List of References (bibliography).
- North Korea's Illicit Cyber Operations: What Can Be Done?38 North essay by Stephanie Kleine-Ahlbrandt, Feb. 2020, on steps needed to combat cyberattacks on different entities.
- The All-Purpose Sword: North Korea's Cyber Operations and Strategies2019 11th International Conference on Cyber Conflict, report by Ji Young Kong, Kyoung Gon Kim and Jong In Lim.
- North Korean Cyber Capabilities: In BriefAug. 2017 Congressional Research Service report on scope & capability of N.K. cyber ops.; organization of N.K. the ops.; debate over their cyber capabilities; and case studies of several suspected attacks.
- North Korea Cyber Attacks: A New Asymmetrical Military StrategyJune 2016 report by Donghui Park, Henry M. Jackson School of International Studies, U. of Washington. "For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability."
The Lazarus Heist: from Hollywood to High Finance : Inside North Korea's Global Cyber War by In 2014, Sony Pictures was hacked, with thousands of computers wiped and the personal data of hundreds of employees released online carried out by the Lazarus Group, a shadowy consortium of hackers working on behalf of the North Korean state. The group has grown into one of the most effective criminal enterprises on the planet - it is estimated they have stolen over $150 million dollars and almost $2bn million in cryptocurrency from financial institutions worldwide, from the United States, to Ecuador to the Philippines, and infamously bringing the British Health Service to a halt in 2018. Investigative journalist Geoff White examines how the North Korean regime has harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries.
Call Number: HV6773 .W45 2022Publication Date: 2022 ( [London], UK : Penguin Business)North Korea's Cyber Operations: Strategy and Responses by This report presents an open source analysis of North Korea's cyber operations capabilities and its strategic implications for the United States and South Korea. The first chapter examining North Korea's cyber strategy. The authors then provide an assessment of North Korea's cyber operations capabilities by examining the organizational structure, history, and functions of North Korea's cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.
Call Number: U163 .J86 2015 +Publication Date: 2015 (Washington, DC : Center for Strategic & International Studies ; Lanham, Maryland : Rowman & Littlefield)The Black Box: Demystifying the Study of Korean Unification and North Korea by Using innovative research methods from data scraping to ethnography, including microsurveys of ordinary North Koreans, Cha unearths a trove of new information. Through these pioneering findings, and incorporating his experiences as a White House official negotiating with North Korean interlocutors and traveling to North Korea ...Cha explores the regime's core tendencies, its policies toward the U.S.-South Korea alliance, cybersecurity threats, the potential for economic development, the growth of a nascent civil society, and pathways toward Korean unification, among other topics. Chapter 3 covers Technology and Cybersecurity, including hacking operations since 2014.
Call Number: DS917.444 .C238 2024Publication Date: 2024 ( New York : Columbia University Press)