North Korea's Criminal Hackers

Total Page:16

File Type:pdf, Size:1020Kb

North Korea's Criminal Hackers OPTIV THREAT ACTOR INTEL SERIES #2 NORTH KOREA’S CRIMINAL HACKERS Courtney Falk, Aamil Karimi OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 1 The Optiv Threat Actor Intel report is a who’s who primer of threat actors across the globe intended to educate readers. The report provides a synopsis of the threat actor, their history and their motivators for easier understanding. Information in the report is a combination of intelligence gathered from public, third- party sources and Optiv’s Global Threat Intelligence Center (gTIC). INTENT OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 2 INTRODUCTION The Democratic People’s Republic of Korea (DPRK) is unique among nation-states in the way that it combines sanctioned cyber capabilities with cyber-crime. This report looks at the ways that North Korea uses its nation-state assets to commit common crimes. The key question: will the criminal activities of a nation such as North Korea have follow-on repercussions in the event of either a political collapse or reformation? Many modern nation-states have built a cyber-focused military force. Every such cyber force has a defensive component; it implements network and endpoint security measures in order to protect the nation’s resources. Some cyber forces are built to include an offensive component that is able to reach out across the wire and interfere with the functioning of another nation. As with cyber forces, most nations now have their own cyber-criminals, who are technologically skilled yet unemployed/underemployed citizens who want to make more money using their computers to take from others. How the nation-state addresses the cyber-criminal element is a useful way to categorize them. On one extreme are liberal Western nations such as the United States where cyber-crime is just crime by another name. These cyber-criminals are not welcome to participate in most aspects of the nation’s functioning. Moving towards the other end of the spectrum are nations like Russia, China, and Iran. These nations have indigenous cyber-criminal undergrounds, but the government harnesses the skills and resources of the cyber-criminals to prosecute the nation’s policy. By hook or by crook, these criminals follow instructions and tasks given to them by government minders. Sometimes the instructions include the requirement to only target victims outside of the nation they themselves are in. At the farthest end of the government-crime spectrum is North Korea. North Korea has both offensive and defensive cyber capabilities. What makes North Korea unique is not that they harness cyber-criminals, but rather they train their own forces to be criminals. OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 3 A SOCIO-POLITICAL ANALYSIS OF NORTH KOREA POLITICAL North Korea is a single-party hereditary dictatorship. The nation was founded upon communist ideals by Kim Il-Sung. His son, Kim Jong-Il, took control after his death. The 2011 death of Kim Jong-Il resulted in the transfer of power to his third son, Kim Jong-Un. He is both the Supreme Leader and the Chairman of the Workers’ Party of Korea (WPK). North Korean line of succession (l-r): Kim Il-Sung, Kim Jong-Il, Kim Jong-Un MILITARY The Korean People’s Army (KPA) is one of largest and most powerful organizations in the North Korean government. The KPA claims to be able to mobilize over 5 million personnel, which would account for one quarter of the North Korean population. Stated spending on the military was 15% of GDP, but analysts speculate that it may be twice that. As a reference point, the United States spends 3.5% of GDP on its military. The spending does not necessarily produce results. The North Korean air force has more aircraft than the combined air forces of South Korea and the United States on the Korean Peninsula. However, these 1980s-vintage aircraft are outdated and flown by pilots with less flight hours than their southern counterparts (Hackett & Fitzpatrick, 2018). North Korea has existed in a perpetual state of war since its 1950 attempt to invade its southern neighbor. While an armistice was signed in 1953, there still is no signed peace treaty. The border at the 38th parallel, known as the demilitarized zone (DMZ), is one of the most highly militarized in the world. OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 4 ECONOMIC North Korea practices a philosophy known as “Juche,” or radical self-reliance. One of the products of this philosophy is Vinylon, a fabric made from limestone (Park & Pearson, 2018). This was a pragmatic response to a lack of raw fibrous material such as cotton. Not to be satisfied with a technological achievement alone, North Korea produced an animated Vinylon Man propaganda series to trumpet their ideological victory. But in reality, sizeable portions of the North Korean population are starving at any given time with the famine that began in 1994 known as The March of Suffering. The military is given priority when it comes to the distribution of food, but estimates of famine-related fatalities vary from one quarter million to more than three million citizens. Source Metric North Korea South Korea Top Rated Country Population 25,248,140 51,181,299 n/a GDP (PPP) $1,400 $39,400 n/a Corruption Transparency New Perceptions Index 174th of 183 54th of 183 International Zealand 2017 ICT Development ITU Not included 2nd of 176 Iceland Index 2017 Global World Economic Competitive Not included 26th of 137 Switzerland Forum Index (2017–2018) Portland Soft Power 30 Not included 20th of 30 United Kingdom Reporters With- 2018 World Press out 180th of 180 Norway Freedom Index 43rd of 180 Borders SOCIAL The family is the core social unit in North Korea. Families are rewarded or punished as a unit. Politically-linked families are allowed to live in the capital, Pyongyang, and receive goods and services not available to the bulk of the country. If a person is arrested and imprisoned for political crimes, their entire family may be imprisoned along with them. Up to three generations of a family might be sent to a camp for political prisoners. There, they are essentially slave labor for the government. BACKGROUND AND CONTEXT BACKGROUND OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 5 INFRASTRUCTURE Infrastructure in North Korea is poor to non-existent especially outside Pyongyang. Nighttime satellite imagery of the Korean Peninsula show bright swathes of artificial light in South Korea and China with darkness abruptly beginning at the DMZ in the south and the Yalu River in the north. Another example of the poor North Korean infrastructure is the Ryugyong Hotel in downtown Pyongyang. The construction project began in 1987 but was suspended for two decades due to lack of funding, leaving a concrete skeleton on display. Since 2012, the façade of the building was completed, enclosing the space in glass and steel. But the interior remains unfinished. North Korea INFORMATION Analyzing the accessibility of the Internet in North Korea is a difficult task. North Korea doesn’t appear in the NGO Freedom House, Freedom on the Net report (2016), or the ICT index (International Telecommunications Union, 2017). The DPRK exerts tights control over Internet access. Some North Koreans have access to Kwangmong, which is the name given to the walled garden Internet available in the DPRK (Fisher, 2015). Internet backbone support is delivered by internet service providers based in Russia and China. Since 2009, North Korean Internet access relies on Star Joint Venture Co., a joint business venture between North Korean government-owned Post and Telecommunications Corporation and Thailand-based Loxley Pacific. Until recently, nearly all of North Korea’s internet traffic, including Star Joint Venture’s, was dependent on and routed through China-based China Unicom. In October 2017, researchers from Dyn Research and 38 North observed route announcements to several known North Korean IP ranges coming from Russian Internet carrier and service provider Transtelecom (Chirgwin, 2017). Russian Internet support and redundancy came at a time when Chinese and North Korean diplomacy began to falter as a more aggressive North Korean regime isolated itself further from the rest of the world, prompting China to pull diplomatic and economic initiatives out of North Korea. This shift is assessed to have allowed Russia to continue to further its own interests by aligning itself closer with North Korea as China was reducing its footprint. OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 6 CONTROLS ON DISSENT The kinds of hacker groups that arose organically in liberal Western democracies such as Cult of the Dead Cow, l0pht Heavy Industries, or the Chaos Computer Club would be quashed by DPRK authorities. State control of media is absolute in North Korea. As a protest measure, South Korea groups have taken to loading digitized TV shows, music, and movies on USB thumb drives, attaching them to balloons, and letting them drift north across the border (Halvorssen & Lloyd, 2014). Even elite regime members are not immune from purges. Jang Sung-Taek, uncle of Kim Jong-Un and high-ranking member of the WPK, was arrested in December 2013 and subsequently executed. Jang’s images were edited out in a Stalinist-style purge. His arrest was reported to be for a number of counter-revolutionary failings, but was also a political tool for Kim to consolidate control. The punishment for politically-motivated crime in North Korea is imprisonment of the accused and three generations of his/her family (Bureau of Democracy, Human Rights and Labor, 2017). The draconian punishments meted out by the North Korean government only stem the flow of defections to a limited degree.
Recommended publications
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Vp01 16¢63뼉 Olor
    Discontinuance of Publication To our readers, First and foremost, I, as the president of Yonhap News Agency, would like to give our readers many thanks for the deep interest shown in our Vantage Point magazine for many years. With your great interest and encouragement, Yonhap has done its utmost to make Vantage Point, South Korea's sole North Korea-only monthly in English, a quality magazine over the years. However, Yonhap has very regrettably decided to discontinue the publication of the maga- zine, making the January issue in 2016 its last. This discontinuance, however, will never mean weakening Yonhap’s North Korea news ser- vice. On the contrary, Yonhap, as a leading news agency in South Korea, has the grave obligation to play a part in helping materialize the Korean people’s ardent wish for the reunification of the Korean Peninsula by providing our readers at home and abroad with accurate news on the reality of the communist North and the South Korean government’s North Korea policy. Hence, Yonhap promises to continuously meet our Vantage Point readers’ keen interest in and high demand for stories on Korean Peninsula issues by providing you with a quicker, fairer, more accurate and stronger North Korean news service via its Web page (www.yonhapnews.co.kr). I would like to express my deep appreciation to our faithful readers once again, and hope you will continuously maintain interest in Korean issues down the road. Best regards, Park No-hwang President-publisher Yonhap News Agency 폐간사 독자여러분들에게, 우선 그동안 연합뉴스 Vantage Point를 애독해주신 독자 여러분들에게 깊은 감사의 말씀을 드립니다 그동안 연합뉴스는 독자 여러분들의 높은 관심과 격려 속에서 한국의 유일한 북한 전문 영문월간지인 Vantage Point를 품격있는 잡지로 만들기 위해 최선 을 다해왔습니다.
    [Show full text]
  • "Splinternet" – Danger for Our Citizens, Businesses and Society?
    "Splinternet" – Danger for our citizens, businesses and society? Once upon a time, there was the World Wide Web (www). Just as it was invented by Sir Tim Berners-Lee. John Perry Barlow wrote the "Declaration of the Independence of Cyberspace" in 1996. The Internet was a great promise of freedom. It worked like a continuation of the Gutenberg invention, the printing press: the Internet gave a voice to all citizens whose views and attitudes were suppressed by the media and elites. This had and has great political consequences. 30 years later the opinion about the internet changed: It was thought that monopoly companies like Google, Facebook, etc. control Big Data and Artificial Intelligence, and therefore control us. However, politics followed suit and began to regulate. The concern now is that the state will disenfranchise citizens and restrict companies. There is a fear of new totalitarian regimes. And in this situation, the Internet ("splinternet") is increasingly fragmented. National "Internet" networks are emerging. States treat the Internet as an extension of their national territory. The most recent example is Russia, where Kremlin laws ensure that national Internet traffic goes through state nodes and the state has the right to shut down the global Internet: a sort of digital Iron Curtain. The champion of the national Internet is China. The state monitors and controls Internet content, blocks foreign services and companies (like Facebook) and replaces them with national services and companies that are in line with the Communist Party. The "Great Firewall" is successful. The number of states imitating China's Internet policy is growing: Iran, North Korea, Cuba, Turkey, Saudi Arabia, but also Thailand and Vietnam etc.
    [Show full text]
  • The Dprk As an Example of the Potential Utility of Internet Sanctions
    \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 1 31-MAR-08 10:18 USING INTERNET “BORDERS” TO COERCE OR PUNISH: THE DPRK AS AN EXAMPLE OF THE POTENTIAL UTILITY OF INTERNET SANCTIONS BENJAMIN BROCKMAN-HAW E * INTRODUCTION ................................................... 163 R I. BACKGROUND INFORMATION .............................. 166 R A. Escalation ............................................. 167 R B. The Internet in North Korea ........................... 173 R II. SANCTIONS ................................................ 181 R A. General Information ................................... 182 R B. Telecommunications Sanctions Already Considered .... 184 R C. Multilateral Sanctions In Place Against the DPRK ..... 187 R III. THE UTILITY OF INTERNET SANCTIONS .................... 187 R A. Obtaining a desired result through the imposition of Internet sanctions ...................................... 187 R B. The Benefits and Costs of Imposing Internet Sanctions . 198 R C. General Concerns Associated with the Use of Internet Sanctions .............................................. 200 R 1. International Human Rights ....................... 200 R 2. Internet sanctions could harm regime opponents . 203 R 3. Internet sanctions could impair the ability of UN operations and NGO’s to function within the target country ..................................... 204 R IV. CONCLUSION .............................................. 205 R INTRODUCTION Speech is civilization itself. The word. preserves contact—it is silence which isolates. - Thomas Mann1 * J.D. Candidate 2008, Boston University School of Law. This article is dedicated to the memory of Dr. Robert Brockman, a man who surveyed this new world with the eyes of an old soul. 1 THOMAS MANN, THE MAGIC MOUNTAIN (1924) quoted in CHARLES R. BURGER & JAMES J. BRADAC, LANGUAGE AND SOCIAL KNOWLEDGE 112 (Edward Arnold Publishers Ltd. 1982). 163 \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 2 31-MAR-08 10:18 164 BOSTON UNIVERSITY INTERNATIONAL LAW JOURNAL [Vol.
    [Show full text]
  • ENSURING a FUTURE for DETECTING INTERNET DISRUPTIONS a Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns
    ENSURING A FUTURE FOR DETECTING INTERNET DISRUPTIONS A Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns JUNE 2017 Acknowledgements About New America Thank you to the following for their contributions to this New America is committed to renewing American politics, work: Collin Anderson, Seamus Tuohy, Liz Woolery, Georgia prosperity, and purpose in the Digital Age. We generate big Bullen, and Enrique Piracés. ideas, bridge the gap between technology and policy, and curate broad public conversation. We combine the best of a policy research institute, technology laboratory, public Thank you also to the members of the internet forum, media platform, and a venture capital fund for measurement community who took the time to participate ideas. We are a distinctive community of thinkers, writers, in this research. researchers, technologists, and community activists who believe deeply in the possibility of American renewal. Find out more at newamerica.org/our-story. About OTI The Open Technology Institute (OTI) works at the intersection of technology and policy to ensure that every community has equitable access to digital technology and its benefits. We promote universal access to communications technologies that are both open and secure, using a multidisciplinary approach that brings together advocates, researchers, organizers, and innovators. Find out more at www.newamerica.org/oti. OPEN TECHNOLOGY INSTITUTE Contents Executive Summary 2 Introduction 4 Overview of the State of Shutdown Measurement 10 Introduction to Recommendations 15 Recommendations 18 Conclusion 31 Appendices 32 Notes 43 OPEN TECHNOLOGY INSTITUTE EXECUTIVE SUMMARY When it comes to the internet, we live in a world of of researchers that study internet censorship, contradictions.
    [Show full text]
  • I Why Hasn't North Korea Collapsed?
    Why Hasn’t North Korea Collapsed? Rational Choices in East Asia By Eric Dean Tesar i Chapter 1 Introduction There are enough places in this world where war is only moments away from breaking out, but there is only one place that calls the attention of the world’s largest powers to such a small set of circumstances that can decide the fate of an entire region. The Democratic People’s Republic of Korea is just such a place. Ruled by a single person with nuclear capabilities and a provocative style, North Korea is a focal point for East Asian affairs. It is China’s communist brother, but also an economic investment and a military buffer zone to the Western powers. For South Korea, it is long lost family but also a direct threat to their security, be it social, economic, or military. The provocations of North Korea have constructed a unique relationship with the rest of East Asia, one that begs the question of why there is support in the form of economic aid and agreements despite an overwhelming distrust, and unity despite the variety of interests. It is in this region that we see states that have produced some of the greatest advances in technology, while there are others that are more cut off from the outside than almost anywhere else in the world. This dynamic has not always been the case. Before there was North and South Korea, the country was one. The people were family and the only real difference was geographical. Today, the story has taken a much more dramatic course.
    [Show full text]
  • Sony's Nightmare Before Christmas: the 2014 North Korean Cyber
    SONY’S NIGHTMARE BEFORE CHRISTMAS The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace National SecurityResearch Report Note Antonio DeSimone | Nicholas Horton NSR_11x17_Cover_Sony_v6.indd 1 11/20/17 4:09 PM SONY’S NIGHTMARE BEFORE CHRISTMAS The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace Antonio DeSimone Nicholas Horton Copyright © 2017 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved. NSAD-R-17-045 SONY’S NIGHTMARE BEFORE CHRISTMas iii Contents Figures ................................................................................................................................................................................................ v Tables .................................................................................................................................................................................................. v Summary .........................................................................................................................................................................................vii Timeline of Events ....................................................................................................................................................2 Sony, The Interview, and the Attack ......................................................................................................................2 The Cybersecurity Industry Responds ..................................................................................................................7
    [Show full text]
  • Chinese Cyber Diplomacy in a New Era of Uncertainty 3
    A HOOVER INSTITUTION ESSAY Chinese Cyber Diplomacy in a New Era of Uncertainty ADAM SEGAL Aegis Paper Series No. 1703 After initially taking a relatively defensive, reactive position on the global governance of cyberspace, China under President Xi Jinping has adopted a more activist cyber diplomacy. This foreign policy has three primary goals: limit the threat that the Internet and the flow of information may pose to domestic stability and regime legitimacy; shape cyberspace to extend Beijing’s political, military, and economic influence; and counter US advantages in cyberspace while increasing China’s room to maneuver. In effect, Beijing is pursuing a parallel track of managing state-to-state interactions along with efforts to generate international norms that reinforce and support domestic controls on information and data. National Security, Technology, and Law and Technology, Security, National Like its efforts in more traditional areas of foreign policy, Chinese cyber diplomacy is rooted in noninterference in internal affairs, equal participation, development assistance and capacity building, and support for the United Nations and other multilateral institutions.1 The linchpin of China’s efforts is the idea of cyber (or Internet) sovereignty. As described by President Xi at the 2015 World Internet Conference in Wuzhen, cyber sovereignty means “respecting each country’s right to choose its own Internet development path, its own Internet management model, [and] its own public policies on the Internet.” The first principle listed in
    [Show full text]
  • 2015 7Th International Conference on Cyber Conflict: Architectures in Cyberspace
    2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 26-29 MAY 2015, TALLINN, ESTONIA 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: ARCHITECTURES IN CYBERSPACE Copyright © 2015 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1526N-PRT ISBN (print): 978-9949-9544-2-1 ISBN (pdf): 978-9949-9544-3-8 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M. Maybaum, A.M. Osula, L. Lindström (Eds.) 2015 © NATO CCD COE Publications PrinteD copies of THIS publication are AVAILABLE from: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Government Strategies for Addressing Online Opposition with an Application to Russia
    Turning the Virtual Tables: Government Strategies for Addressing Online Opposition with an Application to Russia Sergey Sanovich, Denis Stukal, and Joshua A. Tucker On December 3, 2014, the Russian news website Meduza.io reported that the 100th mirror of another Russian news website, Grani.ru, had been banned by the Russian Federal Service for Supervision of Communications, Information Technology, and Mass Media (Roskomnadzor). Grani.ru was a popular news website with extensive coverage of opposition activity and alternative opinions. It was blocked in the spring of 2014, at the height of Russian-Ukrainian conflict, using a technical system developed by Roskomnadzor to block content deemed as extremist, as permitted under a Russian law that was adopted just two months earlier. Meduza.io itself was a new Russian media outlet, established in the neighboring Baltic state of Latvia by Galina Timchenko, who had been dismissed as the editor-in-chief of the most popular Russian news website Lenta.ru over coverage of the Russian-Ukrainian conflict and moved to Latvia along with most of Lenta.ru’s editorial staff. Around the same time, one of the most popular political blogs in Russia, belonging to the Russian opposition leader Alexey Navalny, was also permanently banned on the LiveJournal platform and, in early 2015, authorities began to crack down on its mirrors too. While one might expect this sort of response in Russia today, it has not always been this way. As late as 2010, a report of the Internet in Russian Society program at the Berkman Klein Center for Internet and Society at Harvard University noted that “the political blogosphere appears to remain a free and open space for Russians of all political stripes to discuss politics, criticize or support government, fight corrupt practices and officials, and to mobilize others around political and social causes.”1 Moreover, as recently as 2009, then President Dmitry Medvedev opened his own blog on LiveJournal and subsequently established a presence on Twitter and Facebook, as did many of his aides.
    [Show full text]
  • Information Technology Progress in North Korea and Its Prospects
    100 Hyung-Seog Lee ☯ CHAPTER 5 Information Technology Progress in North Korea and Its Prospects Hyung-Seog Lee North Korea’s IT Policy Since its announcement of the Third Economic Plan (1987- 1993), North Korea has focused its resources in enhancing the role of science and technology, especially computer science, in its national economy. The North Korean government declared the 21st century as the IT era. North Korean leaders came to realize that their ultimate objective of building a powerful and prosperous nation could not be achieved without the introduction of information technologies in the people’s economy. That is why the Workers’ Party of Korea recently announced a new slogan urging everyone to “focus on science and technology in building a powerful and prosperous nation,” while emphasizing that the development of the IT sector should pave the way for industrial recovery in the overall economy in the North. However, North Korea’s IT industry is in poor condition due to the collapse of the world socialist economic system in the 1990s, its international isolation, lingering economic difficulties, and technology export controls imposed on the DPRK by the advanced Bytes and Bullets in Korea 101 Western states. Together with Iran and Sudan, North Korea is classified as a rogue state to which exports of advanced computers are prohibited. As a result, North Korea is cut off from the rest of the world and cannot acquire advanced IT products from the West. Domestically, North Korea actively promotes the IT industry as a key government policy. But it restricts the development of technologies that may lead to information liberalization among its residents, which may threaten the regime itself.
    [Show full text]
  • Mapping Communication Research Concerning North Korea: a Systematic Review (2000–2019)
    International Journal of Communication 14(2020), 1308–1330 1932–8036/20200005 Mapping Communication Research Concerning North Korea: A Systematic Review (2000–2019) SOOMIN SEO1 Temple University, USA SEUNGAHN NAH University of Oregon, USA Although North Korea is increasingly in the limelight of international news, a systematic review has yet to offer an accumulated body of knowledge regarding North Korea and its related communication scholarship. This study assesses the current state of research on media and communication in, around, and about North Korea from 2000 to June 2019. It examines a total of 85 research articles published in 57 journals. Overall, it finds an explosion in research after 2009. Findings reveal that research overwhelmingly deals with content analysis of Western media coverage, which indicates a strong influence of Cold War binaries. Findings also show that North Korea’s media environment has been moving toward more openness and better connectivity. Ultimately, this study finds a need for more comparative research to examine not only content, but also audience and producers—to include those inside North Korea, for which innovative, interdisciplinary approaches are called for. Keywords: global media, North Korea, research agenda, systematic review Scholarly interest in North Korea is a relatively new phenomenon. Up until the 1980s, academic and journalistic writings about the country, long known as a “hermit regime,” were largely lacking. There was little interest to begin with, North Korea being a small, Easternmost country among communist countries. It did not help that North Korea had been difficult to access—its government and its people. Since the 1990s, however, major changes in international politics have taken place, with rising tensions surrounding North Korea’s nuclear and military developments, rapprochement between the two Koreas, and Kim Jong-il’s reform drive, as well as mass defection of North Koreans amid growing concerns about the country’s human rights record.
    [Show full text]