DPRK Business Monthly Volume 1, No
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Republic of Kim
Ovid quate nulpa num entis mincto volup- taque labo. Itatum utem. Laboris ea nonse- quia demolupta dolumqui dolut alibus etusam Wong Maye-E AP A submarine-launched “Pukguksong” missile is displayed in Kim Il Sung Square in Pyongyang, REPUBLIC OF KIM ASSOCIATED PRESS STAFF STORY X 1 June 1, 2017 Wong Maye-E AP Missiles believed to be the Pukguksong 2 are displayed in Kim Il Sung Square in Pyongyang, North Korea. The Pukguksong 2 uses solid fuel, which means it can be hidden and ready for rapid launch. A new balance of terror: Why North Korea clings to its nukes By ERIC TALMADGE Associated Press PYONGYANG, North Korea (AP) — Early one winter morning, Kim Jong Un stood at a remote observation post overlooking a valley of rice paddies near the Chinese border. The North Korean leader beamed with delight as he watched four extended range Scud missiles roar of their mobile launchers, comparing the sight to a team of acrobats performing in unison. Minutes later the projectiles splashed into the sea of the Japanese coast, 1,000 kilometers (620 miles) from where https://apnews.com/f3cdf8f726084d13b33f09a5bd1845d0/A-new-balance-of-terror:-Why-North-Korea-clings-to-its-nukes Republic of Kim > ASSOCIATED PRESS p. 1 of 8 he was standing. It was an unprecedented event. North Korea had just run its frst simulated nuclear attack on an American military base. This scene from March 6, described in government propaganda, shows how the North’s seemingly crazy, suicidal nuclear program is neither crazy nor suicidal. Rather, this is North Korea’s very deliberate strategy to ensure the survival of its ruling regime. -
Thank You, Father Kim Il Sung” Is the First Phrase North Korean Parents Are Instructed to Teach to Their Children
“THANK YOU FATHER KIM ILLL SUNG”:”:”: Eyewitness Accounts of Severe Violations of Freedom of Thought, Conscience, and Religion in North Korea PPPREPARED BYYY: DAVID HAWK Cover Photo by CNN NOVEMBER 2005 UNITED STATES COMMISSION ON INTERNATIONAL RELIGIOUS FREEDOM Michael Cromartie Chair Felice D. Gaer Vice Chair Nina Shea Vice Chair Preeta D. Bansal Archbishop Charles J. Chaput Khaled Abou El Fadl Dr. Richard D. Land Dr. Elizabeth H. Prodromou Bishop Ricardo Ramirez Ambassador John V. Hanford, III, ex officio Joseph R. Crapa Executive Diretor NORTH KOREA STUDY TEAM David Hawk Author and Lead Researcher Jae Chun Won Research Manager Byoung Lo (Philo) Kim Research Advisor United States Commission on International Religious Freedom Staff Tad Stahnke, Deputy Director for Policy David Dettoni, Deputy Director for Outreach Anne Johnson, Director of Communications Christy Klaasen, Director of Government Affairs Carmelita Hines, Director of Administration Patricia Carley, Associate Director for Policy Mark Hetfield, Director, International Refugee Issues Eileen Sullivan, Deputy Director for Communications Dwight Bashir, Senior Policy Analyst Robert C. Blitt, Legal Policy Analyst Catherine Cosman, Senior Policy Analyst Deborah DuCre, Receptionist Scott Flipse, Senior Policy Analyst Mindy Larmore, Policy Analyst Jacquelin Mitchell, Executive Assistant Tina Ramirez, Research Assistant Allison Salyer, Government Affairs Assistant Stephen R. Snow, Senior Policy Analyst Acknowledgements The U.S. Commission on International Religious Freedom expresses its deep gratitude to the former North Koreans now residing in South Korea who took the time to relay to the Commission their perspectives on the situation in the Democratic People’s Republic of Korea and their experiences in North Korea prior to fleeing to China. -
ASIAN Athletics 2 0 1 7 R a N K I N G S
ASIAN athletics 2 0 1 7 R a n k i n g s compiled by: Heinrich Hubbeling - ASIAN AA Statistician – C o n t e n t s Page 1 Table of Contents/Abbreviations for countries 2 - 3 Introduction/Details 4 - 9 Asian Continental Records 10 - 60 2017 Rankings – Men events 60 Name changes (to Women´s Rankings) 61 - 108 2017 Rankings – Women events 109 – 111 Asian athletes in 2017 World lists 112 Additions/Corrections to 2016 Rankings 113 - 114 Contacts for other publications etc. ============================================================== Abbreviations for countries (as used in this booklet) AFG - Afghanistan KGZ - Kyrghizstan PLE - Palestine BAN - Bangladesh KOR - Korea (South) PRK - D P R Korea BHU - Bhutan KSA - Saudi Arabia QAT - Qatar BRN - Bahrain KUW - Kuwait SGP - Singapore BRU - Brunei LAO - Laos SRI - Sri Lanka CAM - Cambodia LBN - Lebanon SYR - Syria CHN - China MAC - Macau THA - Thailand HKG - Hongkong MAS - Malaysia TJK - Tajikistan INA - Indonesia MDV - Maldives TKM - Turkmenistan IND - India MGL - Mongolia TLS - East Timor IRI - Iran MYA - Myanmar TPE - Chinese Taipei IRQ - Iraq NEP - Nepal UAE - United Arab E. JOR - Jordan OMA - Oman UZB - Uzbekistan JPN - Japan PAK - Pakistan VIE - Vietnam KAZ - Kazakhstan PHI - Philippines YEM - Yemen ============================================================== Cover Photo: MUTAZ ESSA BARSHIM -World Athlet of the Year 2017 -World Champion 2017 -World 2017 leader with 2.40 m (achieved twice) -undefeated during the 2017 season 1 I n t r o d u c t i o n With this booklet I present my 29th consecutive edition of Asian athletics statistics. As in the previous years I am very grateful to the ASIAN ATHLETICS ASSOCIATION and its secretary and treasurer, Mr Maurice Nicholas as well as to Mrs Regina Long; without their support I would not have been able to realise this project. -
Christmas in North Korea
Christmas in North Korea Christmas in North Korea By Adnan I. Qureshi With contributions from Talha Jilani Asad Alamgir Guven Uzun Suleman Khan Christmas in North Korea By Adnan I. Qureshi This book first published 2020 Cambridge Scholars Publishing Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2020 by Adnan I. Qureshi All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-5275-5054-0 ISBN (13): 978-1-5275-5054-4 TABLE OF CONTENTS Contributors .............................................................................................. x Preface ...................................................................................................... xi 1. The Journey to North Korea ............................................................... 1 1.1. Introduction to the Korean Peninsula 1.2. Tour to North Korea 1.3. Introduction to The Pyongyang Times 1.4. Arrival at Pyongyang International Airport 2. Brief History ........................................................................................ 32 2.1. The ‘Three Kingdom’ and ‘Later Three Kingdom’ periods 2.2. Goryeo kingdom 2.3. Joseon kingdom 2.4. Japanese occupation 2.5. Complete Japanese control 2.6. Post-Japanese occupation 2.7. The Korean War 3. Contemporary North Korea .............................................................. 58 3.1. The first communist dynasty and its challenges 3.2. The changing face of the communist economic structure 3.3. Nuclear power 3.4. Rocket technology 3.5. Life amidst sanctions 3.6. Mineral resources 3.7. Mutual defense treaties 3.8. Governmental structure of North Korea 3.9. -
Ein Wilder Ritt Distributionen
09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren. -
Technology Overview New Features Backupedge
Technology Overview - BackupEDGE™ Introduction to the New Features in BackupEDGE 3.x Technology Overview BackupEDGE has a long history of providing reliable data protection for New Features many thousands of users. As operating systems, storage devices and BackupEDGE 3.x usage needs and tendencies have changed over the years, it has continuously met the challenge of providing inexpensive, stable backup and disaster recovery on a variety of UNIX and Linux platforms. Clients routinely find new and clever ways to utilize products. Storage devices have taken on new and exciting features, and incredible capacities. Products designed years ago had built-in limits that were thought to be beyond comprehension. Today, these limits are routinely exceeded. The need for data security is even more apparent. We’re constantly asking our To continue to meet the evolving needs of our clients, we are always clients what tools our asking what features of our products they find most useful, what products need to serve them improvements we can make, and what new requirements they have. better. We’ve used this knowledge to map out new product strategies designed to anticipate the needs of the next generation of users, systems and storage products. This has resulted in the creation of BackupEDGE 3.x, with a combination of internal improvements, new features and enhanced infrastructure designed to become the backbone of a new generation of storage software. Summary of Major Changes and Additions BackupEDGE 3.x features include: • Improvements to partition sizing, UEFI table cleanup after DR, and SharpDrive debugging (03.04.01 build 3). • Support for Rocky Linux 8.4 and AlmaLinux 8.4 (03.04.01 build 2). -
Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices
Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices Niklaus Schiess ERNW GmbH Abstract pressive regimes like China [14], Iran [7] or Turkey [6] are using national telecommunication networks as an in- Modern devices like PCs and tablet PCs enable users strument to interfere with information flows within their to consume a wide range of media like videos, audio country and even across borders [13]. In the case of and documents. Introducing such devices in repressive North Korea, which is considered one of the most repres- regimes like North Korea [10] (officially Democratic sive states [11], where typical users only get access to a People’s Republic of Korea, DPRK) contradicts the ob- nationwide intranet that is entirely controlled by the gov- jective of controlling and suppressing information within ernment. Full Internet access, without any governmental the country and particularly information imported from regulations and restrictions of the consumable content, is the outside world. This can be generalized as any in- only possible for a chosen few [12]. formation that has not been reviewed and approved by the government. This paper is an effort to evaluate the technical challenges that arise while enabling users to 1.1 Motivation consume or create potentially unwanted media and an- Although network-level control over media distribution alyzes two media-controlling mechanisms developed by can be effective even on a nationwide scale, the effec- North Korean government organizations. The analysis tiveness is limited in a technical less advanced environ- covers implementations found in Red Star OS, a Linux- ment like North Korea today [11]. -
Cornell International Affairs Review
ISSN 2156-0536 C ORNELL I NTERNAT I ONAL A ffA I RS R E vi EW VOLUME V | ISSUE I | FALL 2011 When Should the US Intervene? The Cornell International Affairs Review is a student-run organization aiming to provide an Criteria for Intervention in Weak Countries international, intergenerational, and interdisciplinary approach to foreign affairs. Robert Keohane, Professor of International Affairs Woodrow Wilson School of Public and International Affairs, Princeton University Letter from Tunisia Founded in 2006, the CIAR is proud to provide the Cornell community with a semesterly Elyès Jouini, Professor and Vice-President, Université Paris-Dauphine review, bringing together views from students, professors, and policymakers on the current Former Minister for the Economic and Social Reforms, Tunisian Transition Government events shaping our world. Empowering Women in the Chinese Capitalist Factory System Sara Akl, University of Virginia, 2013 It is our firm belief that true knowledge stems not just from textbooks and lectures but from The Problems with American Exceptionalism engaging with others. Thus, the CIAR strongly emphasizes cooperation and dialogue amongst Timothy Borjian, University of California, Berkeley, 2012 all our members, both on Cornell’s campus and beyond. The Evolution of Revolution: Social Media in the Modern Middle East and its Policy Implications Taylor Bossung, Indiana University, 2012 Brazil’s China Challenge Carlos Sucre, MA Candidate, George Washington University Information Technology and Control in the DPRK Robert Duffley, Georgetown University, 2013 The Illusion of US Isolationism Eugenio Lilli, King’s College, London, Postgraduate Researcher, Teaching Fellow at the Defense Studies Department, UK Joint Services Command and Staff College Militarization of Aid and its Implications for Colombia Ian King, U.S. -
Digital Trenches
Martyn Williams H R N K Attack Mirae Wi-Fi Family Medicine Healthy Food Korean Basics Handbook Medicinal Recipes Picture Memory I Can Be My Travel Weather 2.0 Matching Competition Gifted Too Companion ! Agricultural Stone Magnolia Escpe from Mount Baekdu Weather Remover ERRORTelevision the Labyrinth Series 1.25 Foreign apps not permitted. Report to your nearest inminban leader. Business Number Practical App Store E-Bookstore Apps Tower Beauty Skills 2.0 Chosun Great Chosun Global News KCNA Battle of Cuisine Dictionary of Wisdom Terms DIGITAL TRENCHES North Korea’s Information Counter-Offensive DIGITAL TRENCHES North Korea’s Information Counter-Offensive Copyright © 2019 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 www.hrnk.org Print ISBN: 978-0-9995358-7-5 Digital ISBN: 978-0-9995358-8-2 Library of Congress Control Number: 2019919723 Cover translations by Julie Kim, HRNK Research Intern. BOARD OF DIRECTORS Gordon Flake, Co-Chair Katrina Lantos Swett, Co-Chair John Despres, -
A (Potentially Sickening) Game of Chicken
North Korea-South Korea Relations: A (Potentially Sickening) Game of Chicken Scott Snyder, Senior Associate Pacific Forum CSIS/The Asia Foundation The inter-Korean relationship – like every other relationship with North Korea following the DPRK’s Feb. 10 announcement to indefinitely suspend participation in the Six-Party Talks – remains on hold this quarter. Although there is no chance to speak with North Korea officially in either a multilateral or bilateral setting, there are lots of opportunities in South Korea to talk about how to fashion more opportunities to pursue one-sided reconciliation with the North. There is also lots of self-criticism about how South Korea can be a better partner to its brothers in Pyongyang, despite ample evidence that brothers in Pyongyang are unwilling to provide support or even to take simple actions that might lead to more South Korean largesse. This quarter, Pyongyang’s begrudging attitude toward South Korean assistance was evident in its reaction to South Korean offers of help during the Avian flu emergency in North Korea, its refusal to accept some types of assistance in the Kaesong Industrial Zone, and its demand that South Korea expand its annual donation of fertilizer to the DPRK from 200,000 tons to 500,000 tons. Who’s Chicken? Since the inter-Korean summit, South Korea has been North Korea’s “911.” In an emergency, Seoul is always the first responder. The problem, as demonstrated in April 2004 following the Ryongchon explosion, is that North Korea still turns to Seoul only as a last resort after taking help from the international community and anyone else who will respond. -
DPRK April Itinerary 2014
North Korea: Beyond the Bamboo Curtain April 11 – 22, 2014 • April 11: Beijing Holiday Inn Express Beijing Dongzhimen 7 PM Meet in the hotel lobbies for group transportation to local restaurant (traditional Beijing cuisine). • April 12: Beijing - Pyongyang 10:45 AM meet in the hotel lobby for transfer to the Beijing International Airport. DPRK visas will be handed out at this time. Departure from Beijing (PEK) terminal 2 Flight #JS152 at 1 PM – Arrive in Pyongyang at 4 PM The guides from the KISTC (Korean International Sport Travel Company) will meet the group after the immigration procedure On the way to the Yanggakdo International Hotel we will stop to see the Arch of Triumph. Welcome dinner and Kaeson Amusement Park • April 13: Pyongyang – Mount Myohyang Drive to Mount Myohyang Take a brief hike up the mountain. Visit the International Friendship Exhibition that houses gifts given to the Kim leaders. Enjoy the Mountain View over tea/coffee. Visit the ancient Buddhist Pohyon Temple and return to Pyongyang • April 14: Pyongyang – Nampho - Pyongyang Drive to the western port city of Nampho Stop at the West Sea Barrage, an impressive system of dams built in five years across a 8-kilometer section of rough sea. Visit to the Chongsanri Cooperative Farm, where we will be able to meet a farm caretaker and discuss with him about DPRK's agricultural sector and developments in agricultural policies. In the afternoon return to Pyongyang for a walking tour of Pyongyang along the Kim Il Sung square and the Taedong River Promenade. Dinner on the river • April 15: Kim Il Sung Birthday Celebrations in Pyongyang Start the day with a viewing at the Kumsusan Palace of the Sun, which houses the preserved bodies of late leaders Kim Il Sung and Kim Jong Il (formal dress is required for this event). -
VBI Vulnerabilities Portfolio
VBI Vulnerabilities Portfolio October 28, 2013 <[email protected]> http://www.vulnbroker.com/ CONFIDENTIAL VBI Vulnerabilities Portfolio Contents 1 Foreword 6 1.1 Document Formatting.................................... 6 1.2 Properties and Definitions.................................. 6 1.2.1 Vulnerability Properties............................ 6 1.2.2 Vulnerability Test Matrix........................... 8 1.2.3 Exploit Properties............................... 8 2 Adobe Systems Incorporated 12 2.1 Flash Player......................................... 12 VBI-12-033 Adobe Flash Player Client-side Remote Code Execution........... 12 2.2 Photoshop CS6....................................... 15 VBI-13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 15 3 Apple, Inc. 17 3.1 iOS.............................................. 17 VBI-12-036 Apple iOS Remote Forced Access-Point Association............. 17 VBI-12-037 Apple iOS Remote Forced Firmware Update Avoidance........... 18 4 ASUS 21 4.1 BIOS Device Driver..................................... 21 VBI-13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 22 5 AVAST Software a.s. 24 5.1 avast! Anti-Virus...................................... 24 October 28, 2013 CONFIDENTIAL Page 1 of 120 VBI Vulnerabilities Portfolio VBI-13-005 avast! Local Information Disclosure..................... 24 VBI-13-010 avast! Anti-Virus Local Privilege Escalation................. 26 6 Barracuda Networks, Inc. 28 6.1 Web Filter.......................................... 28 VBI-13-000