A Peek Inside North Korea's Intranet

Total Page:16

File Type:pdf, Size:1020Kb

A Peek Inside North Korea's Intranet « At least two satellites ready to fly, scientists tell CNN Lee Hyeon-seo lifts lid on brutality of life in North Korea » A peek inside North Korea’s intranet Not much is known about North Korea’s intranet — the Internet-like system that links up libraries, universities and other organizations throughout the country but goes no further than the country’s borders. Few foreigners get a chance to access it and delve into the websites and services it offers, but thanks to sharp-eyed Aram Pan and his DPRK360 Facebook page, we now know a little more. The Singaporean photographer spotted this poster on the wall of the e-library in Rason in the country’s north east. It details some of the sites available from computers in the facility. A poster showing intranet addresses used in North Korea, posted by Aram Pan on DPRK360. One of the most noticeable things is that the website addresses are in a numeric format. Computers use these numbers, called IP (Internet protocol) addresses, to route traffic. To make addresses easier to remember for humans, domain names were invented, but computers still take those and convert them to a numeric address uing DNS (domain name system). DNS appears to be in use in North Korea. The North Korean Samjiyon tablet PC had several default bookmarks in its web browser that used domain names. But in many photographs from libraries and other institutions, desktop browsers appear to be using numeric address. This could be because DNS is only available on part of the network, or it could be because the numbers are actually easier for people to type in. If you don’t have much experience with the roman alphabet and a computer keyboard, typing a short string of numbers is probably easier. The second thing to notice is the addresses themselves. While the IP address system was designed so that every computer on the Internet has a unique address and is internationally accessible, the North Korean addresses exist in gaps in the IP address system that are reserved for local networks. These are used on private networks and aren’t accessible from the Internet, so don’t bother clicking the links. They won’t work. North Korea’s intranet is, in effect, very similar to a corporate network but on a national scale. The third observation I have from this list is how much it looks like the Internet in the early 1990s. Back then, before commercial interests flooded the web and millions of people came online, most of the sites were from universities, government research institutes and public organizations. Here’s the table. Kwangmyong http://10.41.1.2 Central Information Agency for Science and Technology (Azalea) http://10.76.12.2 (Trailblazer) http://10.208.0.34 Naenara http://10.76.1.11 Naenara Information Center Namsan http://192.168.1.101 Grand People’s Study House Risang (Ideal) http://10.15.15.8 Kim Chaek University of Science and Technology Achim (Morning) http://172.16.34.100 21 Information 21 http://10.21.1.22 Pyongyang Informatics Center Science & Technology Electronic Exhibition Center http://192.168.10.10 3 Three Revolution Exhibition Center Gidung http://10.205.1.5 Chongjin Metal and Mining University Manbang http://10.61.61.3 Korean Central Television New Century http://10.41.1.10 (CIAST) Bangyong http://10.41.50.3 Raeil http://10.66.1.3 Invention http://10.41.50.9 Klacksae (Woodpecker) http://10.240.100.11 Kim Il Sung University Information Center Hanmaum (One Mind) http://10.76.1.20 Osan Information Center North Pole Star http://10.76.1.2 National Network Information Center Woods of Korea http://10.76.1.18 - Jihyang http://10.208.1.2 Hamhung Chemical University Rungna http://172.16.4.200 / Rungna Progam Center Flight http://10.15.15.5 Kim Chaek University of Science and Technology Rodong Sinmun http://10.10.3.100 Rodong Sinmun Life http://10.65.3.2 Medical Science Information Center Ocean http://10.17.1.5 Ministry of Land & Maritime Transportation Chollima http://172.16.11.23 Central Information & Communication Agency If you can help with providing, updating or correcting and of the translations, please email me. Related posts: 1. A closer look at the e-learning system 2. Kim Jong Il calls for computer network expansion 3. Anonymous claims hack of North Korean servers Aram Pan, DPRK 360, Kwangmyong, Share Print This entry was posted by Martyn Williams on July 6, 2015 at 08:00, and is filed under Internet, this Intranet. Follow any responses to this post through RSS 2.0. You can leave a response or article post! trackback from your own site. COMMENTS (1) TRACKBACKS (1) RELATED POSTS #1 written by Felix Abt about 2 weeks ago EXCLUSIVE: HOW DID WE USE NORTH KOREA’S INTRANET FOR COMMERCIAL PURPOSES? The answer is in the book “A Capitalist in North Korea: My Seven Years in the Hermit Kingdom” http://northkoreacapitalist.tumblr.com Name (required) E-mail (required, will not be published) Website Submit Comment NEW BOOKS ADVERTISEMENT SEARCH Search EVERYTHING Analysis (64) General News (30) Satellite images (23) Business (12) Internet (178) Censorship (38) Intranet (7) Social media (22) Websites (74) Media (159) Culture (5) Newspapers (10) Radio (66) Television (49) Resources (19) Radio Schedules (16) Web directory (1) Security (116) Electronic warfare (18) Hacking (75) Military (25) Space (48) Technology (85) Computer Hardware (38) General Technology (18) Medical (1) Software (19) Telecom (56) Cellular (49) Copyright © 2015 North Korea Tech - Mystique theme by digitalnature | Powered by WordPress.
Recommended publications
  • Surviving Through the Post-Cold War Era: the Evolution of Foreign Policy in North Korea
    UC Berkeley Berkeley Undergraduate Journal Title Surviving Through The Post-Cold War Era: The Evolution of Foreign Policy In North Korea Permalink https://escholarship.org/uc/item/4nj1x91n Journal Berkeley Undergraduate Journal, 21(2) ISSN 1099-5331 Author Yee, Samuel Publication Date 2008 DOI 10.5070/B3212007665 Peer reviewed|Undergraduate eScholarship.org Powered by the California Digital Library University of California Introduction “When the establishment of ‘diplomatic relations’ with south Korea by the Soviet Union is viewed from another angle, no matter what their subjective intentions may be, it, in the final analysis, cannot be construed otherwise than openly joining the United States in its basic strategy aimed at freezing the division of Korea into ‘two Koreas,’ isolating us internationally and guiding us to ‘opening’ and thus overthrowing the socialist system in our country [….] However, our people will march forward, full of confidence in victory, without vacillation in any wind, under the unfurled banner of the Juche1 idea and defend their socialist position as an impregnable fortress.” 2 The Rodong Sinmun article quoted above was published in October 5, 1990, and was written as a response to the establishment of diplomatic relations between the Soviet Union, a critical ally for the North Korean regime, and South Korea, its archrival. The North Korean government’s main reactions to the changes taking place in the international environment during this time are illustrated clearly in this passage: fear of increased isolation, apprehension of external threats, and resistance to reform. The transformation of the international situation between the years of 1989 and 1992 presented a daunting challenge for the already struggling North Korean government.
    [Show full text]
  • An Assessment of North Korean Threats and Vulnerabilities in Cyberspace
    BearWorks MSU Graduate Theses Fall 2017 An Assessment of North Korean Threats and Vulnerabilities in Cyberspace Jeremiah van Rossum Missouri State University, [email protected] As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation van Rossum, Jeremiah, "An Assessment of North Korean Threats and Vulnerabilities in Cyberspace" (2017). MSU Graduate Theses. 3212. https://bearworks.missouristate.edu/theses/3212 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE A Master’s Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Jeremiah Adam van Rossum December 2017 Copyright 2017 by Jeremiah Adam van Rossum ii AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE Defense and Strategic Studies Missouri State University, December 2017 Master of Science Jeremiah Adam van Rossum ABSTRACT This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these.
    [Show full text]
  • Digital Trenches
    Martyn Williams H R N K Attack Mirae Wi-Fi Family Medicine Healthy Food Korean Basics Handbook Medicinal Recipes Picture Memory I Can Be My Travel Weather 2.0 Matching Competition Gifted Too Companion ! Agricultural Stone Magnolia Escpe from Mount Baekdu Weather Remover ERRORTelevision the Labyrinth Series 1.25 Foreign apps not permitted. Report to your nearest inminban leader. Business Number Practical App Store E-Bookstore Apps Tower Beauty Skills 2.0 Chosun Great Chosun Global News KCNA Battle of Cuisine Dictionary of Wisdom Terms DIGITAL TRENCHES North Korea’s Information Counter-Offensive DIGITAL TRENCHES North Korea’s Information Counter-Offensive Copyright © 2019 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 www.hrnk.org Print ISBN: 978-0-9995358-7-5 Digital ISBN: 978-0-9995358-8-2 Library of Congress Control Number: 2019919723 Cover translations by Julie Kim, HRNK Research Intern. BOARD OF DIRECTORS Gordon Flake, Co-Chair Katrina Lantos Swett, Co-Chair John Despres,
    [Show full text]
  • North Korea's SA
    JUNE 1, 2020 North Korea’s Strategic Situational Awareness Capabilities A Country Primer BY JASON ARTERBURN Executive Summary North Korea’s developing strategic situational awareness (SA) capabilities incorporate technologies that could introduce new risks in a conflict or crisis on the Korean Peninsula. North Korea possesses multifaceted command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems that support a range of provocative asymmetric operations, including but not limited to GPS jamming, communications spoofing, cyberespionage, and cyberattacks. 1 While North Korea has rapidly developed its domestic telecommunications infrastructure and advanced computing capability in recent years, its systems continue to face technical and operational limitations that may constrain North Korea’s SA in engagements across the spectrum of conflict. This report synthesizes publicly available information on North Korea’s C4ISR systems and capabilities in order to consider how technology could affect escalatory dynamics or crisis stability during conflict in East Asia. The author prioritized primary sources from North Korean institutions or companies, official reports from governments, technical reports from specialist research firms, and articles from English-, Korean-, and Chinese-language media.2 Wherever possible, the author also attempted to corroborate information across multiple sources in different languages. Because the public domain contains little information on North Korea’s C4ISR equipment,
    [Show full text]
  • Militaristic Propaganda in the DPRK the Heritage of Songun-Politics in the Rodong-Sinmun Under Kim Jong-Un
    University of Twente Faculty of Behavioural, Management & Social Sciences 1st Supervisor: Dr. Minna van Gerven-Haanpaa Westfälische Wilhelms-Universität Münster Institut für Politikwissenschaft 2nd Supervisor: Björn Goldstein, M.A. Militaristic propaganda in the DPRK The heritage of Songun-Politics in the Rodong-Sinmun under Kim Jong-Un Julian Muhs Matr.- Nr.: 384990 B.A. & B.Sc Schorlemerstraße 4 StudentID; s1610325 Public Administration 48143 Münster (Westf.) (Special Emphasis on European Studies) 004915141901095 [email protected] Date: 21st of September.2015 Table of Contents 1. Introduction ..................................................................................................................................... 1 2. Theoretical Framework ................................................................................................................... 3 3.1. North Korean Ideology from Marxism-Leninism to Juche ........................................................... 3 3.2. Press Theory between Marxism-Leninism and Juche .................................................................. 8 3. Methodology ................................................................................................................................. 13 3.1. Selection of Articles .................................................................................................................... 17 4. Analysis: Military propaganda in the Rodong-Sinmun .................................................................. 19 4.1. Category-system
    [Show full text]
  • Chapter 3 Formation and Evolution of Kim Jong Un's “Nuclear Doctrine
    37 Chapter 3 Formation and Evolution of Kim Jong Un’s “Nuclear Doctrine”: The Current State of North Korea’s “Minimum Deterrence” in Comparison Hideya Kurata I. Preface – Components of “Minimum Deterrence” The government statement of the Democratic People’s Republic of Korea (DPRK, North Korea), released on January 6, 2016, after testing what it claimed to be a “hydrogen bomb,” said that North Korea “will neither be the first to use nuclear weapons… as already declared as long as the hostile forces for aggression do not encroach upon its sovereignty.”1 “…as already declared” here refers to the phrase, the DPRK would “never use nuclear weapons first” emphasis added),2 used in a statement by the North Korean Foreign Ministry on October 3, 2006, that gave notice of its upcoming first nuclear test. This may be taken as an unconditional commitment to “no first use (NFU)” of nuclear weapons by North Korea. At the same time, this indicated North Korea’s potential nuclear posture under the assumption that its nuclear capability is inferior to that of the United States and falls short of mutual assured destruction (MAD) and North Korea is inferior to the combined conventional forces of the United States and South Korea. North Korea has never comprehensively unveiled its nuclear posture before, but it is closer to “minimum deterrence.” This belongs to the simple category of nuclear deterrence, but this posture represents the second-strike capability that can survive the first strike by a hostile country even when it is in an inferior positon in nuclear force, with its core factor being making a hostile country think twice about making the first strike.
    [Show full text]
  • Current Affairs in North Korea, 2010-2017: a Collection of Research Notes
    235 Current Affairs in North Korea, 2010-2017: A Collection of Research Notes Rudiger Frank Abstract Starting with the public introduction of Kim Jong-un to the public in autumn of 2010 and ending with observations of consumerism in February 2017, this collection of 16 short research notes that were originally published at 38North discusses some of the most crucial issues, aside from the nuclear problem, that dominated the field of North Korean Studies in the past decade. Left in their original form, these short articles show the consistency of major North Korean policies as much as the development of our understanding of the new leader and his approach. Topics covered include the question of succession, economic statistics, new ideological trends such as pyŏngjin, techno- logical developments including a review of the North Korean tablet computer Samjiyŏn, the Korean unification issue, special economic zones, foreign trade, parliamentary elections and the first ever Party congress since 1980. Keywords: North Korea, DPRK, 38North Frank, Rudiger. “Current Affairs in North Korea, 2010-2017: A Collection of Research Notes” In Vienna Journal of East Asian Studies, Volume 9, eds. Rudiger Frank, Ina Hein, Lukas Pokorny, and Agnes Schick-Chen. Vienna: Praesens Verlag, 2017, pp. 235–350. https://doi.org/10.2478/vjeas-2017-0008 236 Vienna Journal of East Asian Studies Hu Jintao, Deng Xiaoping or another Mao Zedong? Power Restruc- turing in North Korea Date of original publication: 5 October 2010 URL: http://38north.org/2010/10/1451 “Finally,” one is tempted to say. The years of speculation and half-baked news from dubious sources are over.
    [Show full text]
  • North Korea: U.S. Relations, Nuclear Diplomacy, and Internal Situation Emma Chanlett-Avery, Coordinator Specialist in Asian Affairs
    North Korea: U.S. Relations, Nuclear Diplomacy, and Internal Situation Emma Chanlett-Avery, Coordinator Specialist in Asian Affairs Ian E. Rinehart Analyst in Asian Affairs Mary Beth D. Nikitin Specialist in Nonproliferation January 15, 2016 Congressional Research Service 7-5700 www.crs.gov R41259 Summary North Korea has presented one of the most vexing and persistent problems in U.S. foreign policy in the post-Cold War period. The United States has never had formal diplomatic relations with the Democratic People’s Republic of Korea (the official name for North Korea), although since 2000 contact at a lower level has ebbed and flowed. Negotiations over North Korea’s nuclear weapons program have occupied the past three U.S. administrations, even as some analysts anticipated a collapse of the isolated authoritarian regime. North Korea has been the recipient of over $1 billion in U.S. aid (though none since 2009) and the target of dozens of U.S. sanctions. Negotiations over North Korea’s nuclear weapons program began in the early 1990s under the Clinton Administration. As U.S. policy toward Pyongyang evolved through the 2000s, the negotiations moved from a bilateral format to the multilateral Six-Party Talks (made up of China, Japan, Russia, North Korea, South Korea, and the United States). Although the talks reached some key agreements that laid out deals for aid and recognition to North Korea in exchange for denuclearization, major problems with implementation persisted. The talks have been suspended throughout the Obama Administration. As diplomacy remains stalled, North Korea continues to develop its nuclear and missile programs in the absence of any agreement it considers binding.
    [Show full text]
  • North Korea Security Briefing
    Companion report HP Security Briefing Episode 16, August 2014 Profiling an enigma: The mystery of North Korea’s cyber threat landscape HP Security Research Table of Contents Introduction .................................................................................................................................................... 3 Research roadblocks ...................................................................................................................................... 4 Ideological and political context .................................................................................................................... 5 Juche and Songun ...................................................................................................................................... 5 Tension and change on the Korean Peninsula .......................................................................................... 8 North Korean cyber capabilities and limitations ......................................................................................... 10 North Korean infrastructure.................................................................................................................... 10 An analysis of developments in North Korean cyberspace since 2010 .................................................. 14 North Korean cyber war and intelligence structure ................................................................................ 21 North Korean cyber and intelligence organizational chart ....................................................................
    [Show full text]
  • North Korean Strategic Strategy: Combining Conventional Warfare with The
    NORTH KOREAN STRATEGIC STRATEGY: COMBINING CONVENTIONAL WARFARE WITH THE ASYMMETRICAL EFFECTS OF CYBER WARFARE By Jennifer J. Erlendson A Capstone Project Submitted to the Faculty of Utica College March, 2013 In Partial Fulfillment of the Requirement for the Degree Master of Science – Cybersecurity – Intelligence and Forensics © Copyright 2013 by Jennifer J. Erlendson All Rights Reserved ii Abstract Emerging technologies play a huge role in security imbalances between nation states. Therefore, combining the asymmetrical effects of cyberattacks with conventional warfare can be a force multiplier; targeting critical infrastructure, public services, and communication systems. Cyber warfare is a relatively inexpensive capability which can even the playing field between nations. Because of the difficulty of assessing attribution, it provides plausible deniability for the attacker. Kim Jong Il (KJI) studied the 2003 Gulf War operational successes of the United States (U.S.) and the United Kingdom (U.K.), noting the importance of high-tech weapons and information superiority. KJI realized the only way to compete with the U.S.’technology and information superiority was through asymmetric warfare. During the years that followed, the U.S. continued to strengthen its conventional warfare capabilities and expand its technological dominance, while North Korea (NK) sought an asymmetrical advantage. KJI identified the U.S.’ reliance on information technology as a weakness and determined it could be countered through cyber warfare. Since that time, there have been reports indicating a NK cyber force of 300-3000 soldiers; some of which may be operating out of China. Very little is known about their education, training, or sophistication; however, the Republic of Korea (ROK) has accused NK of carrying out cyber-attacks against the ROK and the U.S since 2004.
    [Show full text]
  • Present Scenario of South-East Asian Countries’ Newspapers to Cater Local Scientific Issues Through the Regional Languages: an Epistemological Case Study
    International Journal of Research in Advance Engineering, (IJRAE) Vol. 3, Issue 1, Jan-Feb-2017, Available at: www.knowledgecuddle.com/index.php/IJRAE Present Scenario of South-East Asian Countries’ Newspapers to Cater Local Scientific Issues through the Regional Languages: An Epistemological Case Study Prof. (Dr.) Tapati Basu1, Ratul Datta (Ph.D. Research Scholar)2 12Department of Journalism and Mass Communication, University of Calcutta, 1Senate House, 87/1, College Street, Kolkata-700 073, 2Govt Gazetted Officer, Information & Cultural Affairs Department, Govt of West Bengal, Writers’ Buildings, W.B., Kolkata-700 001, India [email protected], [email protected] Abstract: This paper contains the background of the need of the study of growing interest in local scientific issues in regional languages newspapers. Mass communication of scientific issues at local level through regional newspapers is more or less same in the South-east Asian countries, particularly in India, Thailand, Afghanistan and Pakistan. For years, mass communication through regional newspapers had been believed the most important engine for social changes, and hence this study becomes very important. Obviously the questions arise, what about the regional and local newspapers which are published regionally from those countries of South-east Asia? Is there sufficient translator in the media houses who have thorough knowledge of local language and jargons? How far those translated news is correct and not distorted? English language was taken at one hand and Dari for Afghanistan, Bangla for Bangladesh, Hindi for India, Bahasa for Indonesia, Urdu for Pakistan, Thai for Thailand, Mandarin for China, Korean for South and North Korea, Russian for Russia on the other hand.
    [Show full text]
  • CELL PHONES in NORTH KOREA Has North Korea Entered the Telecommunications Revolution?
    CELL PHONES IN NORTH KOREA Has North Korea Entered the Telecommunications Revolution? Yonho Kim ABOUT THE AUTHOR Yonho Kim is a Staff Reporter for Voice of America’s Korea Service where he covers the North Korean economy, North Korea’s illicit activities, and economic sanctions against North Korea. He has been with VOA since 2008, covering a number of important developments in both US-DPRK and US-ROK relations. He has received a “Superior Accomplishment Award,” from the East Asia Pacific Division Director of the VOA. Prior to joining VOA, Mr. Kim was a broadcaster for Radio Free Asia’s Korea Service, focused on developments in and around North Korea and US-ROK alliance issues. He has also served as a columnist for The Pressian, reporting on developments on the Korean peninsula. From 2001-03, Mr. Kim was the Assistant Director of The Atlantic Council’s Program on Korea in Transition, where he conducted in-depth research on South Korean domestic politics and oversaw program outreach to US government and media interested in foreign policy. Mr. Kim has worked for Intellibridge Corporation as a freelance consultant and for the Hyundai Oil Refinery Co. Ltd. as a Foreign Exchange Dealer. From 1995-98, he was a researcher at the Hyundai Economic Research Institute in Seoul, focused on the international economy and foreign investment strategies. Mr. Kim holds a B.A. and M.A. in International Relations from Seoul National University and an M.A. in International Relations and International Economics from the Paul H. Nitze School of Advanced International Studies, Johns Hopkins University.
    [Show full text]