참고문헌
- Associated Press, "Kim Jong Un inspects new submarine, wants North Korea's military bolstered," Associated Press, 23 July 2019, https://www.nbcnews.com/news/world/kim-jong-un-inspects-new-submarine-wants-north-korea-s-n1032711.
- Bartlett, Jason, "Why Is North Korea So Good at Cybercrime?" The Diplomat, 13 November 2020. https://thediplomat.com/2020/11/why-is-north-korea-so-good-at-cybercrime/.
- Bartlett, Jason, "Exposing the Financial Footprints of North Korea's Hackers," CNAS, 18 November 2020, https://www.cnas.org/publications/reports/exposing-the-financial-footprints-of-north-koreas-hackers; "Report of the Panel of Exports Established Pursuant to Resolution 1874 (2009)" (S/2020/840).
- Buzo, Adrian, The Guerilla Dynasty: Politics and Leadership in North Korea, New York: Routledge, 2018.
- Brewster, Thomas, "North Korean Hackers Accused Of 'Biggest Cryptocurrency Theft Of 2020'-Their Heists Are Now Worth $1.75 Billion," Forbes, 9 February 2021, https://www.forbes.com/sites/thomasbrewster/2021/02/09/north-korean-hackers-accused-of-biggest-cryptocurrency-theft-of-2020-their-heists-are-now-worth-175-billion/?sh=412fa5d75b0b.
- Byun, Duk-Kun, "Pompeo says N. Korea a greater threat than Russia in cyber security," Yonhap, 15 December 2020, https://en.yna.co.kr/view/AEN20201215000200325.
- Chainanalysis, "Lazarus Group Pulled Off 2020's Biggest Exchange Hack and Appears to be Exploring New Money Laundering Options," Chainalysis, 9 February 2021, https://blog.chainalysis.com/reports/lazarus-group-kucoin-exchange-hack.
- Choi, Haejin, "North Korea hacked Daewoo Shipbuilding, took warship blueprints: South Korea lawmaker," Reuters, 13 October 2017, https://www.reuters.com/article/us-northkorea-missiles-cybercrime/north-korea-hacked-daewoo-shipbuilding-took-warship-blueprints-southkorea-lawmaker-idUSKBN1D00EX.
- Choe, Sang-hun, "North Korean Leader Stresses Need for Strong Military," The New York Times, 15 April 2012, https://www.nytimes.com/2012/04/16/world/asia/kim-jong-un-north-korean-leader-talks-of-military-superiority-in-first-public-speech.html.
- CISO MAG, "North Korea hacked Daewoo Shipbuilding, took warship blueprints: South Korea lawmaker," CISO MAG, 1 November 2017, https://cisomag.eccouncil.org/north-korea-hacked-daewooshipbuilding-took-warship-blueprints-south-korea-lawmaker/.
- De, Nikhilesh, "DOJ Charges 3 North Korean Hackers With Stealing $100M+ From Crypto Firms," Coindesk.com, February 17, 2021, https://www.coindesk.com/doj-charges-3-north-korean-hackers-with-stealing-100m-from-crypto-exchanges.
- Geller, Eric, "North Korean hackers are 'the world's leading bank robbers,' U.S. charges," POLITICO, February 17, 2021, https://www.politico.com/news/2021/02/17/us-charges-north-korean-hackers-wannacry-sony-469406.
- Hellenic Shipping News, "Daewoo Shipbuilding & Marine Engineering Exposed to North Korean Hacking Attacks," Hellenic Shipping News, 23 June 2021, https://www.hellenicshippingnews.com/daewoo-shipbuilding-marine-engineering-exposed-to-north-korean-hacking-attacks/.
- Hodge, Nathan, "Putin 'pleased' with Kim summit, and will inform US on talks," CNN, 25 April 2019, https://www.cnn.com/asia/live-news/kim-jong-un-vladimir-putin-summit-intl/index.html.
- Hung, Chang-tai, Mao's New World: Political Culture in the Early People's Republic, Ithaca and London: Cornell University Press, 2011.
- Insikt Group, "Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite," Recorded Future, 25 October 2018, https://www.recordedfuture.com/north-korea-internet-usage/.
- Jeong, Gu-Yeon and Ki-Tae Lee, "Kwahakkisulbalchon'gwa puk'anui saeroun wihyop: saibo wihyopkwa muin'gi ch'imt'u," Korea Institute for National Unification Research Series (April 2016).
- Joo, Jeong Tae, "N. Korean soldiers study Kim Il Sung-style guerrilla warfare," Daily NK, 3 January 2020, https://www.dailynk.com/english/n-korean-soldiers-study-kim-il-sung-style-guerrilla-warfare/.
- Jun, Jenny, Scott LaFoy, and Ethan Sohn, "North Korea's Cyber Operations: Strategy and Responses," CSIS Special Report, December 2015, https://www.csis.org/analysis/north-korea%E2%80%99s-cyber-operations.
- Koettl, Christopher, "How Illicit Oil Is Smuggled Into North Korea With China's Help," New York Times, 24 March 2021, https://www.nytimes.com/2021/03/24/world/asia/tankers-north-korea-china.html.
- Kong, Ji-Young, Lim Jong In and Kim Kyoung Gon, "The All-Purpose Sword: North Korea's Cyber Operations and Strategies," 11th International Conference on Cyber Conflict (CyCon), 2019, https://ieeexplore.ieee.org/document/8756954?signout=success.
- Lankov, Andrei, "Is Byungjin Policy Failing? Kim Jong Un's Unannounced Reform and its Chances of Success," Korean Journal of Defense Analysis Vol. 29, No. 1 (2017), 25-45. https://doi.org/10.22883/KJDA.2017.29.1.002
- Larsen, Morten Soendergaard, "While North Korean Missiles Sit in Storage, Their Hackers Go Rampant," Foreign Policy, 15 March 2021, https://foreignpolicy.com/2021/03/15/north-korea-missiles-cyberattack-hacker-armies-crime/.
- Lee, Jeong-ho, "North Korean trade with biggest partner China dives 48 per cent amid sanctions," South China Morning Post, 19 July 2019, https://www.scmp.com/news/china/diplomacy/article/3019348/north-korean-trade-biggest-partner-china-dives-48-cent-amid.
- Leyden, John, "Beyond Lazarus: North Korean cyber-threat groups become top-tier, 'reckless' adversaries," The Daily Swig, 12 May 2021, https://portswigger.net/daily-swig/beyond-lazarus-north-korean-cyber-threat-groups-become-top-tier-reckless-adversaries.
- Mangan, Dan. "North Korean hackers charged in massive cryptocurrency theft scheme," CNBC, 17 February 2021, https://www.cnbc.com/2021/02/17/north-korean-hackers-charged-in-massive-cryptocurrency-theft-scheme.html.
- Maza, Cristina, "North Korea Regime Is Making Money From Cryptocurrency Scam That Offered Users Ownership of Ships: Report," Newsweek, October 25, 2018, https://www.newsweek.com/north-korea-cryptocurrency-scam-kim-jong-un-1188020.
- McMillan, Robert and Aruna Viswanatha, "North Korea Turning to Cryptocurrency Schemes in Global Heists, U.S. Says," Wall Street Journal, 17 February 2021, https://www.wsj.com/articles/u-s-authorities-charge-north-koreans-in-long-running-hacking-scheme-11613581358.
- Miller, Steve, "Where Did North Korea's Cyber Army Come From?," VOA, 20 November 2018, https://www.voanews.com/east-asia-pacific/where-did-north-koreas-cyber-army-come.
- Nazario, Jose, "Politically Motivated Denial of Service Attacks," in The Virtual Battlefield: Perspectives on Cyber Warfare, edited by Christian Czosseck and Kenneth Geers, Washington, D.C: IOS Press, 2010.
- Park, Donghui, "North Korea Cyber Attacks: A New Asymmetrical Military Strategy," The Henry M. Jackson School of International Studies Blog, University of Washington Report, 28 June 2016, https://jsis.washington.edu/news/north-korea-cyber-attacks-new-asymmetrical-military-strategy/.
- Reuters, "Senior U.S. official accuses China of aiding North Korea cyber thefts," Reuters, 22 October 2020, https://www.reuters.com/article/us-usa-northkorea-china/senior-u-s-official-accuses-china-of-aiding-north-korea-cyber-thefts-idUSKBN2772RX.
- Riley, Tonya, "The Cybersecurity 202: Investigations into Russian, North Korean hackers are shaping Biden's foreign policy," The Washington Post, 18 February 2021, https://www.washingtonpost.com/politics/2021/02/18/cybersecurity-202-investigations-into-russian-north-korean-hackers-are-shaping-biden-foreign-policy-anne-neuberger-cybersecurity-biden-administration-cybersecurity/.
- Ripley, Will, "North Korean defector: 'Bureau 121' hackers operating in China," CNN, 7 January 2015, https://edition.cnn.com/2015/01/06/asia/north-korea-hackers-shenyang/index.html.
- Roth, Richard and Joshua Berlinger, "North Korean hackers stole more than $300 million to pay for nuclear weapons, says confidential UN report," CNN, 9 February 2021, https://www.cnn.com/2021/02/08/asia/north-korea-united-nations-report-intl-hnk/index.html.
- Shin, Chang-Hoon, "Puk'anui saibo konggyokkwa wihyobe taehan uriui taeung 2014nyon 11wol SONY sagonui kyohun," Asan Research Institute Research Brief (6 April 2015).
- Snyder, Scott A., "The Motivations Behind North Korea's Pursuit of Simultaneous Economic and Nuclear Development," Council on Foreign Relations Blog, 20 November 2013, https://www.cfr.org/blog/motivations-behind-north-koreas-pursuit-simultaneous-economic-and-nuclear-development.
- Strnad, Grazyna, "Is North Korea's Byungjin Policy in Crisis?," The National Interest, 27 June 2021, https://nationalinterest.org/blog/korea-watch/north-korea%E2%80%99s-byungjin-policy-crisis-188649.
- Tan, Er-Win, "Byungjin and the Sources of Pyongyang's Paranoia," International Journal of Korean Unification Studies Vol. 28, No. 2 (2019), 97-128. https://doi.org/10.33728/ijkus.2019.28.2.004
- Tarakanov, Dmitry, "Kimsuky APT: Operation's possible North Korean links uncovered," SecureList By Kaspersky, September 11, 2013, https://securelist.com/kimsuky-apt-operations-possible-north-korean-links-uncovered/57335/.
- The Guardian, "China and North Korea hail 'immortal and invincible' friendship," The Guardian, 6 October 2019, https://www.theguardian.com/world/2019/oct/06/china-and-north-korea-hail-immortal-and-invincible-friendship.
- The Guardian, "Kim Jong-un calls US 'biggest enemy' and says nuclear submarine plans 'complete'," The Guardian, 8 January 2021, https://www.theguardian.com/world/2021/jan/09/kim-jong-un-calls-us-biggest-enemy-and-says-nuclear-submarine-plans-complete.
- The Japan Times, "Shadowy North Korean IT group believed hiding out in Russian Far East: sources," The Japan Times, 18 February 2018, https://www.japantimes.co.jp/news/2018/02/18/world/politics-diplomacy-world/shadowy-north-korean-group-believed-hiding-russian-far-east-sources/.
- The Maritime Executive, "South Korea Probes Possible Hack of DSME Computers," The Maritime Executive, 21 June 2021, https://www.maritime-executive.com/article/south-korea-probes-possible-hack-of-dsme-computers.
- The US Department of Justice, "Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe," 17 February 2021, https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and
- United Nations, "United Nations Report of the Panel of Experts established pursuant to resolution 1874, 30 August 2019," https://undocs.org/S/2019/691.
- Van Der Werff Emily and Timothy B. Lee, "The 2014 Sony hacks, explained," Vox, 3 June 2015, https://www.vox.com/2015/1/20/18089084/sony-hack-north-korea.
- Wada, Haruki, Kim Il Sung gwa Manju Hangil Chonjaeng, Seoul: Changbi, 1992.
- Ward, Alex, "Kim Jong Un made a surprise visit to China. It's mostly about Trump," Vox, 9 January 2019, https://www.vox.com/2019/1/8/18173792/north-korea-kim-trump-china-nuclear.
- Williams, Martyn, "Russia Provides New Internet Connection to North Korea," 38 North, 1 October 2017, https://www.38north.org/2017/10/mwilliams100117/.
- Yun, Wan-Jun and Dong-Yeon Jung, "North Korean hackers withdraw from their hub in Shenyang," Dong-A Ilbo, 11 January 2018, https://www.donga.com/en/article/all/20180111/1186969/1/North-Korean-hackers-withdraw-from-their-hub-in-Shenyang.