Cornell International Affairs Review
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Nkorea's Twitter Account Hacked Amid Tension (Update) 4 April 2013, by Youkyung Lee
NKorea's Twitter account hacked amid tension (Update) 4 April 2013, by Youkyung Lee Hackers apparently broke into at least two of North sanctions against its nuclear program and joint Korea's government-run online sites Thursday, as military drills between the U.S. and South Korea. tensions rose on the Korean Peninsula. North and South have fired claims of cyberattacks The North's Uriminzokkiri Twitter and Flickr at each other recently. Last month computers froze accounts stopped sending out content typical of at six major South Korean companies—three banks that posted by the regime in Pyongyang, such as and three television networks—and North Korea's photos of North's leader Kim Jong Un meeting with Internet shut down. military officials. Meanwhile, the website for the U.S. forces Instead, a picture posted Thursday on the North's stationed in South Korea has been closed since Flickr site shows Kim's face with a pig-like snout Tuesday and their public affairs office said Friday and a drawing of Mickey Mouse on his chest. that the problem does not have to do with any Underneath, the text reads: "Threatening world hacking. peace with ICBMs and Nuclear weapons/Wasting money while his people starve to death." "Initial assessments indicate it is the result of an internal server issue," it said on the website without Another posting says "We are Anonymous" in elaboration. white letters against a black background. Anonymous is a name of a hacker activist group. A Copyright 2013 The Associated Press. All rights statement purporting to come from the attackers reserved. -
UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05771047 Date: 08/31/2015 RELEASE in PART B6 From: Sent: To
UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05771047 Date: 08/31/2015 RELEASE IN PART B6 From: PIR <preines Sent: Monday, August 16, 2010 11:48 PM To: Cc: Huma Abedin; CDM; Jake Sullivan Subject: "minister in a skirt" http://mobile.nytimes.com/a rticle?a=644869 North Korea Takes to Twitter and YouTube By CHOE SANG-HUN The New York Times August 17, 2010 SEOUL, South Korea - North Korea has taken its propaganda war against South Korea and the United States to a new frontier: YouTube and Twitter. In the last month, North Korea has posted a series of video clips on YouTube brimming with satire and vitriol against leaders in South Korea and the United States. In one clip, it called Secretary of State Hillary Rodham Clinton a "minister in a skirt" and Secretary of Defense Robert M. Gates a "war maniac," while depicting the South Korean defense minister, Kim Tae-young, as a "servile dog" that likes to be patted by "its American master." Such language used to be standard in North Korea's cold-war-era propaganda. Its revival is testimony to the increased chill in relations between the Koreas in recent months. In the past week, North Korea also began operating a Twitter account under the name uriminzok, or "our nation." Both the Twitter and YouTube accounts are owned by a user named "uriminzokkiri." The Web site www.uriminzokkiri.com is run by the Committee for the Peaceful Reunification of Korea, a propaganda agency in Pyongyang. Lee Jong-joo, a spokeswoman for the Unification Ministry in Seoul, said, "It is clear that these accounts carry the same propaganda as the North's official news media, but we have not been able to find out who operates them." The two Koreas agreed to stop their psychological war after their first summit meeting in 2000. -
Family, Mobile Phones, and Money: Contemporary Practices of Unification on the Korean Peninsula Sandra Fahy 82 | Joint U.S.-Korea Academic Studies
81 Family, Mobile Phones, and Money: Contemporary Practices of Unification on the Korean Peninsula Sandra Fahy 82 | Joint U.S.-Korea Academic Studies Moving from the powerful and abstract construct of ethnic homogeneity as bearing the promise for unification, this chapter instead considers family unity, facilitated by the quotidian and ubiquitous tools of mobile phones and money, as a force with a demonstrated record showing contemporary practices of unification on the peninsula. From the “small unification” (jageun tongil) where North Korean defectors pay brokers to bring family out, to the transmission of voice through the technology of mobile phones illegally smuggled from China, this paper explores practices of unification presently manifesting on the Korean Peninsula. National identity on both sides of the peninsula is usually linked with ethnic homogeneity, the ultimate idea of Koreanness present in both Koreas and throughout Korean history. Ethnic homogeneity is linked with nationalism, and while it is evoked as the rationale for unification it has not had that result, and did not prevent the ideological nationalism that divided the ethnos in the Korean War.1 The construction of ethnic homogeneity evokes the idea that all Koreans are one brethren (dongpo)—an image of one large, genetically related extended family. However, fissures in this ideal highlight the strength of genetic family ties.2 Moving from the powerful and abstract construct of ethnic homogeneity as bearing the promise for unification, this chapter instead considers family unity, facilitated by the quotidian and ubiquitous tools of mobile phones and money, as a force with a demonstrated record showing “acts of unification” on the peninsula. -
Ein Wilder Ritt Distributionen
09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren. -
Technology Overview New Features Backupedge
Technology Overview - BackupEDGE™ Introduction to the New Features in BackupEDGE 3.x Technology Overview BackupEDGE has a long history of providing reliable data protection for New Features many thousands of users. As operating systems, storage devices and BackupEDGE 3.x usage needs and tendencies have changed over the years, it has continuously met the challenge of providing inexpensive, stable backup and disaster recovery on a variety of UNIX and Linux platforms. Clients routinely find new and clever ways to utilize products. Storage devices have taken on new and exciting features, and incredible capacities. Products designed years ago had built-in limits that were thought to be beyond comprehension. Today, these limits are routinely exceeded. The need for data security is even more apparent. We’re constantly asking our To continue to meet the evolving needs of our clients, we are always clients what tools our asking what features of our products they find most useful, what products need to serve them improvements we can make, and what new requirements they have. better. We’ve used this knowledge to map out new product strategies designed to anticipate the needs of the next generation of users, systems and storage products. This has resulted in the creation of BackupEDGE 3.x, with a combination of internal improvements, new features and enhanced infrastructure designed to become the backbone of a new generation of storage software. Summary of Major Changes and Additions BackupEDGE 3.x features include: • Improvements to partition sizing, UEFI table cleanup after DR, and SharpDrive debugging (03.04.01 build 3). • Support for Rocky Linux 8.4 and AlmaLinux 8.4 (03.04.01 build 2). -
Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices
Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices Niklaus Schiess ERNW GmbH Abstract pressive regimes like China [14], Iran [7] or Turkey [6] are using national telecommunication networks as an in- Modern devices like PCs and tablet PCs enable users strument to interfere with information flows within their to consume a wide range of media like videos, audio country and even across borders [13]. In the case of and documents. Introducing such devices in repressive North Korea, which is considered one of the most repres- regimes like North Korea [10] (officially Democratic sive states [11], where typical users only get access to a People’s Republic of Korea, DPRK) contradicts the ob- nationwide intranet that is entirely controlled by the gov- jective of controlling and suppressing information within ernment. Full Internet access, without any governmental the country and particularly information imported from regulations and restrictions of the consumable content, is the outside world. This can be generalized as any in- only possible for a chosen few [12]. formation that has not been reviewed and approved by the government. This paper is an effort to evaluate the technical challenges that arise while enabling users to 1.1 Motivation consume or create potentially unwanted media and an- Although network-level control over media distribution alyzes two media-controlling mechanisms developed by can be effective even on a nationwide scale, the effec- North Korean government organizations. The analysis tiveness is limited in a technical less advanced environ- covers implementations found in Red Star OS, a Linux- ment like North Korea today [11]. -
Digital Trenches
Martyn Williams H R N K Attack Mirae Wi-Fi Family Medicine Healthy Food Korean Basics Handbook Medicinal Recipes Picture Memory I Can Be My Travel Weather 2.0 Matching Competition Gifted Too Companion ! Agricultural Stone Magnolia Escpe from Mount Baekdu Weather Remover ERRORTelevision the Labyrinth Series 1.25 Foreign apps not permitted. Report to your nearest inminban leader. Business Number Practical App Store E-Bookstore Apps Tower Beauty Skills 2.0 Chosun Great Chosun Global News KCNA Battle of Cuisine Dictionary of Wisdom Terms DIGITAL TRENCHES North Korea’s Information Counter-Offensive DIGITAL TRENCHES North Korea’s Information Counter-Offensive Copyright © 2019 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 www.hrnk.org Print ISBN: 978-0-9995358-7-5 Digital ISBN: 978-0-9995358-8-2 Library of Congress Control Number: 2019919723 Cover translations by Julie Kim, HRNK Research Intern. BOARD OF DIRECTORS Gordon Flake, Co-Chair Katrina Lantos Swett, Co-Chair John Despres, -
University of West Bohemia in Pilsen Faculty of Philosophy and Arts
University of West Bohemia in Pilsen Faculty of Philosophy and Arts Dissertation Thesis Democratic People’s Republic of Korea in International Politics Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach Plzeň 2016 Lenka Caisová University of West Bohemia in Pilsen Faculty of Philosophy and Arts Department of Politics and International Relations Study Programme Political Science Field of Study International Relations Dissertation Thesis Democratic People’s Republic of Korea in International Politics Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach Lenka Caisová Supervisor: doc. PhDr. Šárka Cabadová-Waisová, Ph.D. Department of Politics and International Relations University of West Bohemia in Pilsen Sworn Statement I hereby claim I made this dissertation thesis (topic: Democratic People’s Republic of Korea in International Politics ; subtopic: Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach ) together with enclosed codebook by myself whereas I used the sources as stated in the Bibliography only. In certain parts of this thesis I use extracts of articles I published before. In Chapter 1 and 2, I use selected parts of my article named “ Severní Korea v mezinárodních vztazích: jak uchopovat severokorejskou zahraniční politiku? ” which was published in Acta FF 7, no. 3 in 2014. In Chapter 4, I use my article named “Analysis of the U.S. Foreign Policy towards North Korea: Comparison of the Post-Cold War Presidents” which was published in Acta FF no. 3, 2014 and article named “ Poskytovatelé humanitární a rozvojové pomoci do Korejské lidově demokratické republiky ” published in journal Mezinárodní vztahy 49, no. -
VBI Vulnerabilities Portfolio
VBI Vulnerabilities Portfolio October 28, 2013 <[email protected]> http://www.vulnbroker.com/ CONFIDENTIAL VBI Vulnerabilities Portfolio Contents 1 Foreword 6 1.1 Document Formatting.................................... 6 1.2 Properties and Definitions.................................. 6 1.2.1 Vulnerability Properties............................ 6 1.2.2 Vulnerability Test Matrix........................... 8 1.2.3 Exploit Properties............................... 8 2 Adobe Systems Incorporated 12 2.1 Flash Player......................................... 12 VBI-12-033 Adobe Flash Player Client-side Remote Code Execution........... 12 2.2 Photoshop CS6....................................... 15 VBI-13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 15 3 Apple, Inc. 17 3.1 iOS.............................................. 17 VBI-12-036 Apple iOS Remote Forced Access-Point Association............. 17 VBI-12-037 Apple iOS Remote Forced Firmware Update Avoidance........... 18 4 ASUS 21 4.1 BIOS Device Driver..................................... 21 VBI-13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 22 5 AVAST Software a.s. 24 5.1 avast! Anti-Virus...................................... 24 October 28, 2013 CONFIDENTIAL Page 1 of 120 VBI Vulnerabilities Portfolio VBI-13-005 avast! Local Information Disclosure..................... 24 VBI-13-010 avast! Anti-Virus Local Privilege Escalation................. 26 6 Barracuda Networks, Inc. 28 6.1 Web Filter.......................................... 28 VBI-13-000 -
A Case Study of the Cyber-Terror Attack on the Korea Hydro & Nuclear Power Co., Ltd
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 2, Feb. 2016 857 Copyright ⓒ2016 KSII The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. Kyung-bok Lee1 and Jong-in Lim1 1Graduate School of Information Security, Korea University Seoul, Republic of Korea [e-mail: [email protected], [email protected]] *Corresponding author: Jong-in Lim Received August 14, 2015; revised October 6, 2015; revised November 3, 2015; revised December 4, 2015; accepted December 20, 2015; published February 29, 2016 Abstract Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. -
North Korea Security Briefing
Companion report HP Security Briefing Episode 16, August 2014 Profiling an enigma: The mystery of North Korea’s cyber threat landscape HP Security Research Table of Contents Introduction .................................................................................................................................................... 3 Research roadblocks ...................................................................................................................................... 4 Ideological and political context .................................................................................................................... 5 Juche and Songun ...................................................................................................................................... 5 Tension and change on the Korean Peninsula .......................................................................................... 8 North Korean cyber capabilities and limitations ......................................................................................... 10 North Korean infrastructure.................................................................................................................... 10 An analysis of developments in North Korean cyberspace since 2010 .................................................. 14 North Korean cyber war and intelligence structure ................................................................................ 21 North Korean cyber and intelligence organizational chart .................................................................... -
Discrepant Kisses: the Reception and Remediation of North Korean Children’S Performances Circulated on Social Media
Discrepant Kisses: The Reception and Remediation of North Korean Children’s Performances Circulated on Social Media DONNA LEE KWON Abstract This article explores the burgeoning realm of videos uploaded on YouTube generated from content produced in North Korea otherwise known as the DPRK (Democratic People’s Republic of Korea). Through state-sanctioned and individual channels, thousands of videos of North Korean music and dance have been uploaded, some resulting in over 57 million hits on YouTube. Taking a cue from this fascination, I employ digital ethnography to investigate the online reception and remediation of North Korean children’s performances alongside their online comments on YouTube. I also draw from fieldwork conducted in North Korea in 2007. Theories that espouse the democratic participatory effects of social media platforms do not apply in North Korea where most of the uploaded material is produced and controlled by the state. Given this, I argue that North Korea’s engagement with social media is marked by a profound disjuncture where the majority of videos portray ideological North Korean subjects in an online context where very few North Korean citizens are able to engage with this material as social media. I analyze how this disjuncture plays out as international users respond to and remediate these videos in various ways or by creating mash-ups that subvert their original ideological content. A young North Korean girl in a red, babydoll dress sings a song called “Kiss” (Ppo-ppo) [figure 1].1 Another girl, this time in white, extolls the virtues of the “King Potato” (Wang Kamja). Five North Korean boys and girls—noticeably dwarfed by their guitars—perform a song called “Our Kindergarten Teacher” (Yuch’iwŏn uri sŏnsaengnim) garnering over 57 million views on YouTube.2 All three of these memorable children’s performances have become subject to intense online reception and have generated various creative and discrepant remediations.