Education and Development in North Korea: the Push for a “Science-Based Economy” Under Kim Jong Un Gianluca Spezza
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Digital Trenches
Martyn Williams H R N K Attack Mirae Wi-Fi Family Medicine Healthy Food Korean Basics Handbook Medicinal Recipes Picture Memory I Can Be My Travel Weather 2.0 Matching Competition Gifted Too Companion ! Agricultural Stone Magnolia Escpe from Mount Baekdu Weather Remover ERRORTelevision the Labyrinth Series 1.25 Foreign apps not permitted. Report to your nearest inminban leader. Business Number Practical App Store E-Bookstore Apps Tower Beauty Skills 2.0 Chosun Great Chosun Global News KCNA Battle of Cuisine Dictionary of Wisdom Terms DIGITAL TRENCHES North Korea’s Information Counter-Offensive DIGITAL TRENCHES North Korea’s Information Counter-Offensive Copyright © 2019 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 www.hrnk.org Print ISBN: 978-0-9995358-7-5 Digital ISBN: 978-0-9995358-8-2 Library of Congress Control Number: 2019919723 Cover translations by Julie Kim, HRNK Research Intern. BOARD OF DIRECTORS Gordon Flake, Co-Chair Katrina Lantos Swett, Co-Chair John Despres, -
The Koreas and the Policy/Culture Nexus
Two States, One Nation: The Koreas and the Policy/Culture Nexus Jacqueline Willis Institute for Culture and Society University of Western Sydney A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy. © 2013 Acknowledgements I would like to especially thank my principal supervisor Professor James Arvanitakis for the unfailing guidance, encouragement and support he has given me throughout my candidature. His academic expertise, enthusiasm and assuring presence have provided the motivation, confidence and direction needed to complete this intellectually stimulating, though sometimes daunting task. I gratefully acknowledge and extend immeasurable thanks for his mentorship, editorship and invaluable feedback, without which this thesis could not have been written. I would also like to acknowledge the input of my co-supervisor Professor Brett Neilson, whose expert knowledge and recommendations have proven invaluable to the development and completion of this thesis. Special thanks and acknowledgement must also be given to Shin Yoon Ju for providing Korean-English translations, as well as to Brian J. McMorrow, Grete Howard, Eric Testroete, Chris Wood, Raymond Cunningham and fellow Korea researcher, Christopher Richardson, for generously allowing me to use and reproduce their personal photographs. Thanks too to those affiliated with the Institute for Culture and Society at the University of Western Sydney, for their committed nurturing of my academic development and ambitions over the course of my doctoral enrolment. Finally, I would like to extend gratitude to my family, friends and colleagues for always encouraging me in my academic endeavours. Their patience, unwavering support and steadfast faith in my ability have been powerful incentives, driving and sustaining me in my scholarly pursuits. -
North Korea Security Briefing
Companion report HP Security Briefing Episode 16, August 2014 Profiling an enigma: The mystery of North Korea’s cyber threat landscape HP Security Research Table of Contents Introduction .................................................................................................................................................... 3 Research roadblocks ...................................................................................................................................... 4 Ideological and political context .................................................................................................................... 5 Juche and Songun ...................................................................................................................................... 5 Tension and change on the Korean Peninsula .......................................................................................... 8 North Korean cyber capabilities and limitations ......................................................................................... 10 North Korean infrastructure.................................................................................................................... 10 An analysis of developments in North Korean cyberspace since 2010 .................................................. 14 North Korean cyber war and intelligence structure ................................................................................ 21 North Korean cyber and intelligence organizational chart .................................................................... -
Its Strengths and Potential Areas for North-South Cooperation
STI Policy Review_Vol. 7, No. 1 Science and Technology of North Korea: Its Strengths and Potential Areas for North-South Cooperation Jongweon Pak* & John G. Lee** Abstract This study examines the technical level of North Korea’s S&T and identifies areas for potential North–South cooperation. First, North Korean media is analyzed for situations and trends from 2010 to 2015. Despite some commendable achievements, North Korean S&T remains lacking in basic science and commercializa- tion potential. Despite an awareness of the importance of international cooperation, North Korea is ham- pered by international sanctions and their own caution, consequently concentrating their efforts on China. Details of their cooperation reflect their interests and needs to a certain extent, although their collaborations were mainly in the form of meetings and conferences rather than active joint research. To assess the poten- tial areas of cooperation with South Korea, this study also draws on interviews with NGOs and professionals working with North Korea. The country’s present situation is analyzed and some practical examples of pos- sible cooperation is suggested. North Korea has the potential to expand its cooperation not only with South Korea but with many other countries. North Korea also promisingly expresses interest in cooperation. Keywords Science & Technology (S&T), cooperation, North Korea, NGO * Professor, School of Biological and Chemical Engineering, Yanbian University of Science and Technology, Yanji, Jilin, China, yustpjw@ hanmail.net ** Board member, Yong Sung Technical Institute, Yanji, Jilin, China, [email protected] 110 1. INTRODUCTION Despite having maintained its foundational Juche1 (“self-reliance”) ideology, North Korea has realized economic problems cannot be solved without international cooperation, and conceptual- ized Juche accordingly. -
Victorious Great Patriotic War Commemorative Medal
KOREA TODAY No. 3, 2015 51 http://www.naenara.com.kp Victorious Great Patriotic War Commemorative Medal Chairman Kim Jong Il received the Victorious Great Patriotic War Commemorative Medal from a military delegation of the former Soviet Union in August 1985. 52 KOREA TODAY No. 3, 2015 KOREA TODAY Monthly Journal (705) Printed in English, Russian and Chinese C O N T E N T S Fresh Image of Korea ·········································································································· 3 His Cares ·························································································································· 6 For Effective Use of Water Resources ···················································································· 7 For Fresh Environment ······································································································· 8 Preservation and Propagation of Rare Bird Goshawk ······························································· 9 Visit to Ogasan Nature Reserve ···························································································10 Korea’s Wealth—Revolutionary Spirit of Paektu ····································································13 On the occasion of the 70th founding anniversary of the Workers’ Party of Korea Society for Rallying Comrades and October 10········································································14 KOREA TODAY No. 3, 2015 1 For the liberation of the country The Korean People’s Revolutionary Army ··································15 -
KOREA TODAY No
KOREA TODAY No. 2, 2013 51 http://www.naenara.com.kp Silver craftwork A gift presented to Chairman Kim Jong Il by the Popular Front of the Workers, Peasants and Students of Peru in February 2002. 52 KOREA TODAY No. 2, 2013 KOREA TODAY Monthly Journal (680) Printed in English, Russian and Chinese C O N T E N T S The Greatest Exploit ············································································································3 Not Merely for Today But for Tomorrow ·················································································· 6 Anecdotes Related to His Birthday ························································································· 8 He Cannot Be Called Other Than the Sun ··············································································· 9 Venlo World Horticultural Expo and Kimjongilia·····································································11 Anecdotes of Care for People·································································································12 One Family ························································································································14 “Let Us Bring About a Radical Turn in the Building of an Economic Giant With the Same Spirit and Mettle as Were Displayed in Conquering Space!” ·······································15 KOREA TODAY No. 2, 2013 1 Out of Patriotism ·····································································17 Sunchon Shoe Leather Factory···················································19 -
Compromising Connectivity Information Dynamics Between the State and Society in a Digitizing North Korea
compromising connectivity information dynamics between the state and society in a digitizing north korea nat kretchun catherine lee seamus tuohy table of contents 1 the continuing evolution of the north korean information environment 4 general media environment 4 sources of information 6 media and communications devices 8 traditional broadcast media 8 television 9 radio 17 digital media 17 content 18 non-networked systems 18 devices 24 government control of media in the kim jong un era 25 bribery 26 the bureaucratic specialization of media control 27 group 118 27 group 109 29 official content 32 mobile phones 32 legal mobile phones in north korea 34 profiles of mobile phone users 38 mobile phones as communication devices 40 mobile phones as media devices InterMedia 44 mobile software–based censorship and the signature system 47 broader mobile phone censorship and surveillance mechanisms 50 software-based censorship and surveillance beyond mobile devices 50 automated censorship 51 tamper resistance 52 surveillance and tracking mechanisms 53 contradictions in digital censorship and surveillance efforts 55 digitally networked spaces 55 intranet and internet 55 development of the internet in north korea 56 general population: the north korean intranet 56 elite access: internet beyond the intranet, albeit limited 58 hyper elite access: full unbridled internet 58 regime’s internet strategy going forward 60 connections to the outside world: chinese mobile phones and cross-border business 60 chinese mobile phones 62 defector links 64 person-to-person -
Astudy on the Incapacitation Mechanism Model of the Juchist
A STUDY ON THE INCAPACITATION MECHANISM MODEL OF THE JUCHIST AND MARXIST-LENINIST ARTICLES AGAINST THE CORE IMPLEMENTATION MECHANISM MODEL OF THE FUNDAMENTAL RIGHTS ARTICLES IN THE NORTH KOREAN CONSTITUTION: NORTH KOREA’S VIOLATIONS OF FUNDAMENTAL RIGHTS AND INTERNATIONAL HUMAN RIGHTS TREATIES By Woo-Suk Jun Submitted to the School of Law, University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Juridical Science (S.J.D.) _________________________________________ Professor David J. Gottlieb (Chairperson) _________________________________________ Professor Jean K. Gilles Phillips (Member) _________________________________________ Ambassador (Ret.) David F. Lambertson (Member) _________________________________________ Professor Elizabeth S. Cateforis (Member) Date Defended: March 13, 2014 The Dissertation Committee for Woo-Suk Jun certifies that this is the approved version of the following dissertation: A STUDY ON THE INCAPACITATION MECHANISM MODEL OF THE JUCHIST AND MARXIST-LENINIST ARTICLES AGAINST THE CORE IMPLEMENTATION MECHANISM MODEL OF THE FUNDAMENTAL RIGHTS ARTICLES IN THE NORTH KOREAN CONSTITUTION: NORTH KOREA’S VIOLATIONS OF FUNDAMENTAL RIGHTS AND INTERNATIONAL HUMAN RIGHTS TREATIES _________________________________________ Professor David J. Gottlieb (Chairperson) Date approved: _________________________ ii ABSTRACT In this dissertation, I systematically study whether the arguments of the North Korean government regarding its protection of domestic human rights and its adherence to international -
DEVELOPING a RELIABLE METHODOLOGY for ASSESSING the COMPUTER NETWORK OPERATIONS THREAT of NORTH KOREA By
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DEVELOPING A RELIABLE METHODOLOGY FOR ASSESSING THE COMPUTER NETWORK OPERATIONS THREAT OF NORTH KOREA by Christopher Brown September 2004 Thesis Advisor: Dorothy Denning Second Reader: Joanne Kim Approved for release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2004 Master’s Thesis 4. TITLE AND SUBTITLE: Developing a Reliable Methodology for Assessing 5. FUNDING NUMBERS the Computer Network Operations Threat of North Korea. 6. AUTHOR(S) Christopher Brown 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT Monterey, CA 93943-5000 NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES: The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. -
North Korea on the Cusp of Digital Transformation
The Nautilus Institute www.nautilus.org North Korea on the Cusp of Digital Transformation Alexandre Y. Mansourov, Ph.D. Introduction North Korea has an underdeveloped telecommunications sector, but its government now demonstrates increasing interest in catching up with the modern IT development trends, and its population reveals insatiable demand for more robust and extensive telecommunications services. As a laggard in the global digital revolution, Pyongyang enjoys key advantages of backwardness – dramatic savings on initial R&D costs in the IT sector, the opportunity to leap-frog from exclusive reliance on obsolete and scarce landlines (which carry traditional telephone traffic for a meager 1.1 million customers in a country of 24.5 million people) to world-class 3G mobile communications, which gained almost 700,000 users in less than three years of operation, as well as some access, albeit restricted, to the leading open source IT technologies, software, hardware, and multimedia content. Its telecommunications market is still very small, stove-piped, non- competitive, and highly regulated by the oppressive government placing a premium on regime security as opposed to consumer demand and the developing tastes of its population. The North Korean regime, obsessed with secrecy and control, severely restricts and strictly monitors the access of its population to international TV and radio broadcasting, Internet, email, and telephone services. On the other hand, Pyongyang mobilized its limited resources to develop and push out the pro-government propaganda content via a handful of rather sophisticated official websites (see Appendix 1) and popular social networking sites (SNS) like domestic uriminzokkiri.com and foreign-based Tweeter (http://twitter.com/uriminzok), Facebook, Flickr (http://www.flickr.com/photos/uriminzokkiri), and YouTube (http://www.youtube.com/user/uriminzokkiri), in order to portray a positive image of the country and leadership and promote its political and economic interests abroad. -
State Ideology and Language Policy in North Korea
STATE IDEOLOGY AND LANGUAGE POLICY IN NORTH KOREA: AN ANALYSIS OF NORTH KOREA’S PUBLIC DISCOURSE A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN EAST ASIAN LANGUAGES AND LITERATURES (KOREAN) DECEMBER 2018 By Jae Sun Lee Dissertation Committee: Ho-min Sohn, Chairperson Mee-Jeong Park Mary Shin Kim Sang Yee Cheon William O’Grady ACKNOWLEDGMENTS Throughout my academic journey, I have learned that my work is not mine alone but is indebted to so many others, including those researchers who have preceded, inspired and taught me. I would like to thank all the people who have helped and supported my studies. Among them, I would like to express my special gratitude to Dr. Ho-min Sohn for serving as my dissertation chair, continuing even after his retirement. This study was initiated by his advice, when I took his sociolinguistics course as a graduate student largely ignorant of the language policy field. Since then, this study has grown and developed through his guidance. I also feel honored and grateful for the invaluable service and professional counsel of all my committee members, as well as for the University of Hawaiʻi faculty members and graduate students who have encouraged and helped guide my research. I consider myself very fortunate to have been able to access the North Korean public discourse data that undergirded this study, data that is not easy to find. For this, I offer my thanks to the librarians of Hamilton Library at the University of Hawaiʻi at Mānoa who have built the North Korean collection there. -
Red Star 3.0 Download Iso Red Star 3.0 Download Iso
red star 3.0 download iso Red star 3.0 download iso. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d1e4c50c0a16a7 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Red star 3.0 download iso. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d1e4c6cb3713ba • Your IP : 188.246.226.140 • Performance & security by Cloudflare.