Current Status of Software Research and Development in North Korea
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
PARK JIN HYOK, Also Known As ("Aka") "Jin Hyok Park," Aka "Pak Jin Hek," Case Fl·J 18 - 1 4 79
AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the RLED Central District of California CLERK U.S. DIS RICT United States ofAmerica JUN - 8 ?018 [ --- .. ~- ·~".... ~-~,..,. v. CENT\:y'\ l i\:,: ffl1G1 OF__ CAUFORN! BY .·-. ....-~- - ____D=E--..... PARK JIN HYOK, also known as ("aka") "Jin Hyok Park," aka "Pak Jin Hek," Case fl·J 18 - 1 4 79 Defendant. CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best ofmy knowledge and belief. Beginning no later than September 2, 2014 and continuing through at least August 3, 2017, in the county ofLos Angeles in the Central District of California, the defendant violated: Code Section Offense Description 18 U.S.C. § 371 Conspiracy 18 u.s.c. § 1349 Conspiracy to Commit Wire Fraud This criminal complaint is based on these facts: Please see attached affidavit. IBJ Continued on the attached sheet. Isl Complainant's signature Nathan P. Shields, Special Agent, FBI Printed name and title Sworn to before ~e and signed in my presence. Date: ROZELLA A OLIVER Judge's signature City and state: Los Angeles, California Hon. Rozella A. Oliver, U.S. Magistrate Judge Printed name and title -:"'~~ ,4G'L--- A-SA AUSAs: Stephanie S. Christensen, x3756; Anthony J. Lewis, x1786; & Anil J. Antony, x6579 REC: Detention Contents I. INTRODUCTION .....................................................................................1 II. PURPOSE OF AFFIDAVIT ......................................................................1 III. SUMMARY................................................................................................3 -
Study Series 21-03 (0824).Hwp
Study Series 21-03 North Korea’s College and University and Higher Education System in an ‘Era of Knowledge Economy’ Jeong-ah Cho Choon Geun Lee Hyun-suk Oum Study Series 21-03 North Korea’s College and University and Higher Education System in an ‘Era of Knowledge Economy’ Jeong-ah Cho Choon Geun Lee Hyun-suk Oum North Korea’s College and University and Higher Education System in an ‘Era of Knowledge Economy’ Printed August 2021 Published August 2021 Published by Korea Institute for National Unification (KINU) Publisher Yu-hwan Koh, President Editor Yeowon Lim, Research Associate Registration number No.2-2361 (April 23, 1997) Address 217 Banpo-daero(Banpo-dong), Seocho-gu, Seoul 06578, Korea Telephone (82-2) 2023-8208 Fax (82-2) 2023-8298 Homepage http://www.kinu.or.kr Design Seilfocus (82-2) 2275-6894 Print Seilfocus (82-2) 2275-6894 ISBN 979-11-6589-046-9 93340 : Not for sale Copyright ⓒ Korea Institute for National Unification, 2021 All KINU publications are available for purchase at all major bookstores in Korea. Also available at the Government Printing Office Sales Center Store (82-2) 734-6818; Office (82-2) 394-0337 North Korea’s College and University and Higher Education System in an ‘Era of Knowledge Economy’ This English translation is an abbreviated and edited version of Jeong-ah Cho et al., North Korea’s College and University and Higher Education System in an ‘Era of Knowledge Economy (Seoul: Korea Institute for National Unification, 2020). The analysis, comments, and opinions presented in this paper are those of the authors and do not necessarily represent the views of the Korea Institute for National Unification. -
Bytes and Bullets in Korea 71 Labor
70 Peter Hayes ☯ CHAPTER 4 DPRK Information Strategy – Does It Exist? Peter Hayes Introduction This chapter will demonstrate that Kim Jong Il has always had an information sector strategy, but it failed. As two cautionary tales about DPRK hardware and software ventures will show, the DPRK IT-sector technological strategy today is not new. Its origins and antecedents stretch back two decades—indeed, to the time that Kim Jong Il ascended to power under his father’s tutelage. Along the way, the chapter will show that COCOM restrictions and U.S. sanctions on dual-capable technology transfer were largely ineffective in the IT sector for the whole period of its nuclear-weapons program. But the author also argues that the DPRK IT capacity has been isolated from the rest of the economy and relegated to a minor aspect of an early heavy-industrial structure dominated by metal-bending, crude-chemical processing, and rock-breaking and construction by mobilized mass Bytes and Bullets in Korea 71 labor. This outcome was due partly to the specific IT strategy selected by the DPRK leadership and partly to the reluctance of DPRK industrial management to adopt automation technology and software in various sectors. Thus, the strategy failed to create a dynamic economy stimulated by information technology. Consequently, the DPRK finds itself as one of the least network-ready and most isolated societies on the planet. In light of these lessons, the author suggests that the international community and the DPRK leadership should explore three niche-network opportunities in the early transitional period before the DPRK embarks on a structural adjustment. -
The Dprk As an Example of the Potential Utility of Internet Sanctions
\\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 1 31-MAR-08 10:18 USING INTERNET “BORDERS” TO COERCE OR PUNISH: THE DPRK AS AN EXAMPLE OF THE POTENTIAL UTILITY OF INTERNET SANCTIONS BENJAMIN BROCKMAN-HAW E * INTRODUCTION ................................................... 163 R I. BACKGROUND INFORMATION .............................. 166 R A. Escalation ............................................. 167 R B. The Internet in North Korea ........................... 173 R II. SANCTIONS ................................................ 181 R A. General Information ................................... 182 R B. Telecommunications Sanctions Already Considered .... 184 R C. Multilateral Sanctions In Place Against the DPRK ..... 187 R III. THE UTILITY OF INTERNET SANCTIONS .................... 187 R A. Obtaining a desired result through the imposition of Internet sanctions ...................................... 187 R B. The Benefits and Costs of Imposing Internet Sanctions . 198 R C. General Concerns Associated with the Use of Internet Sanctions .............................................. 200 R 1. International Human Rights ....................... 200 R 2. Internet sanctions could harm regime opponents . 203 R 3. Internet sanctions could impair the ability of UN operations and NGO’s to function within the target country ..................................... 204 R IV. CONCLUSION .............................................. 205 R INTRODUCTION Speech is civilization itself. The word. preserves contact—it is silence which isolates. - Thomas Mann1 * J.D. Candidate 2008, Boston University School of Law. This article is dedicated to the memory of Dr. Robert Brockman, a man who surveyed this new world with the eyes of an old soul. 1 THOMAS MANN, THE MAGIC MOUNTAIN (1924) quoted in CHARLES R. BURGER & JAMES J. BRADAC, LANGUAGE AND SOCIAL KNOWLEDGE 112 (Edward Arnold Publishers Ltd. 1982). 163 \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 2 31-MAR-08 10:18 164 BOSTON UNIVERSITY INTERNATIONAL LAW JOURNAL [Vol. -
STATEMENT UPR Pre-Session 33 on the Democratic People's Republic
STATEMENT UPR Pre-Session 33 on the Democratic People’s Republic of Korea (DPRK) Geneva, April 5, 2019 Delivered by: The Committee for Human Rights in North Korea (HRNK) 1- Presentation of the Organization HRNK is the leading U.S.-based bipartisan, non-governmental organization (NGO) in the field of DPRK human rights research and advocacy. Our mission is to focus international attention on human rights abuses in the DPRK and advocate for an improvement in the lives of 25 million DPRK citizens. Since its establishment in 2001, HRNK has played an intellectual leadership role in DPRK human rights issues by publishing over thirty-five major reports. HRNK was granted UN consultative status on April 17, 2018 by the 54-member UN Economic and Social Council (ECOSOC). On October 4, 2018, HRNK submitted our findings to the UPR of the DPRK. Based on our research, the following trends have defined the human rights situation in the DPRK over the past seven years: an intensive crackdown on attempted escape from the country leading to a higher number of prisoners in detention; a closure of prison camps near the border with China while camps inland were expanded; satellite imagery analysis revealing secure perimeters inside these detention facilities with watch towers seemingly located to provide overlapping fields of fire to prevent escapes; a disproportionate repression of women (800 out of 1000 women at Camp No. 12 were forcibly repatriated); and an aggressive purge of senior officials. 2- National consultation for the drafting of the national report Although HRNK would welcome consultation and in-country access to assess the human rights situation, the DPRK government displays a consistently antagonistic attitude towards our organization. -
1:14-Mc-00648-UNA Document 7 Filed 07/29/14 Page 1 of 3
Case 1:14-mc-00648-UNA Document 7 Filed 07/29/14 Page 1 of 3 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Ruth Calderon-Cardona, et al., ) ) Plaintiffs, ) ) v. ) CIVIL ACTION NO. 14-mc-648 ) Democratic People's Republic of Korea, et ) HEARING REQUEST al., ) ) Defendants. ) ) ) INTERNET CORPORATION FOR ASSIGNED NAME AND NUMBERS’ MOTION TO QUASH WRIT OF ATTACHMENT The Internet Corporation for Assigned Names and Numbers (“ICANN”), a non-party, by counsel, respectfully moves this Court to quash the Writ of Attachment on Judgment Other Than Wages, Salary And Commissions (“Writ of Attachment”) issued by Plaintiffs in the above- entitled action, for the reasons set forth in ICANN’s accompanying Memorandum.1 Furthermore, ICANN, in accordance with Local Civil Rule 78.1, requests that an oral hearing be scheduled to inform the Court’s ruling on the Motion. 1 Plaintiffs issued to ICANN, and ICANN is moving to quash, writs of attachment in seven actions: (1) Rubin, et al. v. Islamic Republic of Iran, et al., Case No. 01-1655-RMU; (2) Haim, et al. v. Islamic Republic of Iran, et al., Case No. 02-1811-RCL; (3) Haim, et al. v. Islamic Republic of Iran, et al., Case No. 08-520-RCL; (4) Stern, et al. v. Islamic Republic of Iran, et al., Case No. 00-2602-RCL; (5) Weinstein, et al. v. Islamic Republic of Iran, et al., Case No. 00- 2601-RCL; (6) Wyatt, et al. v. Syrian Arab Republic, et al., Case No. 08-502-RCL; and (7) Calderon-Cardona, et al. -
Generic Top-Level Domains (Gtld)
An essential pillar for any business is its brand. Brand presence on the Web is a key factor in a business appearing in Internet searches and being found by existing and prospective customers. For small business owners, the essential ingredients for building a strong brand are: o A memorable business name o brand identity elements: o domain name o logo o email address o business card o social Web presence ( Linkedin, Facebook, Twitter, et Generic Top-Level Domains (gTLD) The following table represents the generic top-level domains (i.e. including .com, .org, etc). Domain Purpose / Sponsoring Organization Generic top-level domain .COM VeriSign Global Registry Services Generic top-level domain .INFO Afilias Limited Generic top-level domain .NET VeriSign Global Registry Services Generic top-level domain .ORG Public Interest Registry (PIR) Generic-Restricted Top-Level Domains Generic-restricted top-level domain names are similar to the generic top-level domains, only eligibility is intended to be restricted and ascertained more stringently. Domain Purpose / Sponsoring Organization Restricted for Business .BIZ NeuStar, Inc. Reserved for individuals .NAME The Global Name Registry Ltd. Restricted to credentialed professionals and related entities .PRO Registry Services Corporation dba RegistryPro Sponsored Top-Level Domains (sTLD) These domains are proposed and sponsored by private agencies or organizations that establish and enforce rules restricting the eligibility to use the TLD. IANA also groups sTLDs with the generic top-level domains. Domain Purpose / Sponsoring Organization Reserved for members of the air-transport industry .AERO Societe Internationale de Telecommunications Aeronautique S.C. (SITA SC) Restricted to the Pan-Asia and Asia Pacific community .ASIA DotAsia Organization Ltd. -
VBI Vulnerabilities Portfolio
VBI Vulnerabilities Portfolio October 28, 2013 <[email protected]> http://www.vulnbroker.com/ CONFIDENTIAL VBI Vulnerabilities Portfolio Contents 1 Foreword 6 1.1 Document Formatting.................................... 6 1.2 Properties and Definitions.................................. 6 1.2.1 Vulnerability Properties............................ 6 1.2.2 Vulnerability Test Matrix........................... 8 1.2.3 Exploit Properties............................... 8 2 Adobe Systems Incorporated 12 2.1 Flash Player......................................... 12 VBI-12-033 Adobe Flash Player Client-side Remote Code Execution........... 12 2.2 Photoshop CS6....................................... 15 VBI-13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 15 3 Apple, Inc. 17 3.1 iOS.............................................. 17 VBI-12-036 Apple iOS Remote Forced Access-Point Association............. 17 VBI-12-037 Apple iOS Remote Forced Firmware Update Avoidance........... 18 4 ASUS 21 4.1 BIOS Device Driver..................................... 21 VBI-13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 22 5 AVAST Software a.s. 24 5.1 avast! Anti-Virus...................................... 24 October 28, 2013 CONFIDENTIAL Page 1 of 120 VBI Vulnerabilities Portfolio VBI-13-005 avast! Local Information Disclosure..................... 24 VBI-13-010 avast! Anti-Virus Local Privilege Escalation................. 26 6 Barracuda Networks, Inc. 28 6.1 Web Filter.......................................... 28 VBI-13-000 -
North Korea Security Briefing
Companion report HP Security Briefing Episode 16, August 2014 Profiling an enigma: The mystery of North Korea’s cyber threat landscape HP Security Research Table of Contents Introduction .................................................................................................................................................... 3 Research roadblocks ...................................................................................................................................... 4 Ideological and political context .................................................................................................................... 5 Juche and Songun ...................................................................................................................................... 5 Tension and change on the Korean Peninsula .......................................................................................... 8 North Korean cyber capabilities and limitations ......................................................................................... 10 North Korean infrastructure.................................................................................................................... 10 An analysis of developments in North Korean cyberspace since 2010 .................................................. 14 North Korean cyber war and intelligence structure ................................................................................ 21 North Korean cyber and intelligence organizational chart .................................................................... -
North Korean Strategic Strategy: Combining Conventional Warfare with The
NORTH KOREAN STRATEGIC STRATEGY: COMBINING CONVENTIONAL WARFARE WITH THE ASYMMETRICAL EFFECTS OF CYBER WARFARE By Jennifer J. Erlendson A Capstone Project Submitted to the Faculty of Utica College March, 2013 In Partial Fulfillment of the Requirement for the Degree Master of Science – Cybersecurity – Intelligence and Forensics © Copyright 2013 by Jennifer J. Erlendson All Rights Reserved ii Abstract Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.’technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.’ reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004. -
North Korean Leadership Dynamics and Decision-Making Under Kim Jong-Un a Second Year Assessment
North Korean Leadership Dynamics and Decision-making under Kim Jong-un A Second Year Assessment Ken E. Gause Cleared for public release COP-2014-U-006988-Final March 2014 Strategic Studies is a division of CNA. This directorate conducts analyses of security policy, regional analyses, studies of political-military issues, and strategy and force assessments. CNA Strategic Studies is part of the glob- al community of strategic studies institutes and in fact collaborates with many of them. On the ground experience is a hallmark of our regional work. Our specialists combine in-country experience, language skills, and the use of local primary-source data to produce empirically based work. All of our analysts have advanced degrees, and virtually all have lived and worked abroad. Similarly, our strategists and military/naval operations experts have either active duty experience or have served as field analysts with operating Navy and Marine Corps commands. They are skilled at anticipating the “prob- lem after next” as well as determining measures of effectiveness to assess ongoing initiatives. A particular strength is bringing empirical methods to the evaluation of peace-time engagement and shaping activities. The Strategic Studies Division’s charter is global. In particular, our analysts have proven expertise in the follow- ing areas: The full range of Asian security issues The full range of Middle East related security issues, especially Iran and the Arabian Gulf Maritime strategy Insurgency and stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa, especially the Gulf of Guinea Latin America The world’s most important navies Deterrence, arms control, missile defense and WMD proliferation The Strategic Studies Division is led by Dr. -
Korea Computer Center
Sanction catalogue 170.106.35.76 02.10.2021 12:41:16 KOREA COMPUTER CENTER List Type Entity List name SDN (OFAC) Programs (1) DPRK3 Names (4) Last name/Name KOREA COMPUTER CENTER Full name/Name KOREA COMPUTER CENTER Type Name Last name/Name CHOSON COMPUTER CENTER Full name/Name CHOSON COMPUTER CENTER Type Alias Quality Strong Last name/Name KOREA COMPUTER COMPANY Full name/Name KOREA COMPUTER COMPANY Type Alias Quality Strong Last name/Name CHUNG SUN COMPUTER CENTER Full name/Name CHUNG SUN COMPUTER CENTER Type Alias Quality Strong Addresses (6) Country China Full address China Country Germany Full address Germany Country Syria Full address Syria Country India Full address India Country United Arab Emirates Full address United Arab Emirates City Pyongyang Country North Korea Full address Pyongyang, Korea, North Identification documents (2) Type Secondary sanctions risk:: North Korea Sanctions Regulations, sections 510.201 and 510.210 Type Transactions Prohibited For Persons Owned or Controlled By U.S. Financial Institutions:: North Korea Sanctions Regulations section 510.214 Updated: 02.10.2021. 05:15 The Sanction catalog includes Latvian, United Nations, European Union, United Kingdom and Office of Foreign Assets Control subjects included in sanction list. © Lursoft IT 1997-2021 Lursoft is the re-user of information from the Enterprise Register of Latvia. The user is obliged to observe the Copyright law, Personal Data Processing Law requirements and Terms of Use of the Lursoft system. The user is forbidden to use any automatic systems or equipment (robots) in order to access the system without a written approval from Lursoft.