As states and populations around the world have become increasingly interconnected and dependent on digitized technologies and cyberspace, threat actors have been aggressively exploiting these changes to their own advantage. Of particular concern to academics, cyber experts and national security practitioners in the West, has been the rapid proliferation of damaging and disruptive cyber attacks carried out by state-actors -particularly authoritarian regimes -and their proxies. Despite global cyber attacks rising year by year, in terms of both frequency and level of technological ability, available data suggests most of the world's major cyber attacks are carried out by a relatively small handful of states. Furthermore, it appears as though these states tend to favour certain types of cyber attacks over others. This observation leads to the central research question of this dissertation: why do certain types of authoritarian regimes tend to favour certain types of cyber attacks over others? Taking a deductive approach, and drawing from existing theories on authoritarian legitimation and cyber conflict, I have developed a needs-based theory of authoritarian behaviour in cyberspace. More specifically, I suggest that different types of authoritarian regimes will use different cyber strategies to fulfil or service the process, strategy, or outcome they need most to maintain domestic support and legitimacy.
CHAPTER FIVE
Bitcoin toBombs: North Korea's Cyber Strategy and the Preservation of Kim Jong-Un 5.1 Introduction 127 5.2 Background: Juche, Cyberspace, and the Origins of North Korea's Cyber Power 130