Hackers Attack N. Korea News Website 4 April 2013

Total Page:16

File Type:pdf, Size:1020Kb

Hackers Attack N. Korea News Website 4 April 2013 Hackers attack N. Korea news website 4 April 2013 videos excoriating the United States and including images like the White House framed in the crosshairs of a sniper's rifle sight. Thursday's attack came amid soaring military tensions on the Korean peninsula with Pyongyang, Seoul and Washington engaged in a bout of high- stakes brinkmanship. It also followed a major cyber attack that crashed the computer networks at South Korean TV broadcasters and banks last month and was widely blamed on North Korean hackers. A scene from the four-minute video titled "A Short, Three- Day War", shown in an image grab taken on March 22, (c) 2013 AFP 2013 from North Korea's official website, Uriminzokkiri.com. Activist hackers appeared Thursday to have infiltrated North Korea's official news website and its accompanying Twitter and Flickr feeds, posting unflattering images of leader Kim Jong-Un. The China-based website of Uriminzokkiri, which distributes news and propaganda from the North's state media, was inaccessible and its companion feeds attacked and defaced. On Twitter, the Uriminzokkiri account's profile photo was changed to one of a couple dancing the Tango, and a series of tweets read "Hacked" and "Tango Down". The male dancer was wearing a Guy Fawkes mask—a trademark of the "Anonymous" hacktivist group. The website's Flickr page showed a number of images, including one which simply read "We Are Anonymous" and a mock-up "Wanted" poster featuring Kim with a pig's nose and ears and a Mickey Mouse tattoo on his chest. Uriminzokkiri is best known for posting propaganda 1 / 2 APA citation: Hackers attack N. Korea news website (2013, April 4) retrieved 2 October 2021 from https://phys.org/news/2013-04-hackers-korea-news-website.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. 2 / 2 Powered by TCPDF (www.tcpdf.org).
Recommended publications
  • Nkorea's Twitter Account Hacked Amid Tension (Update) 4 April 2013, by Youkyung Lee
    NKorea's Twitter account hacked amid tension (Update) 4 April 2013, by Youkyung Lee Hackers apparently broke into at least two of North sanctions against its nuclear program and joint Korea's government-run online sites Thursday, as military drills between the U.S. and South Korea. tensions rose on the Korean Peninsula. North and South have fired claims of cyberattacks The North's Uriminzokkiri Twitter and Flickr at each other recently. Last month computers froze accounts stopped sending out content typical of at six major South Korean companies—three banks that posted by the regime in Pyongyang, such as and three television networks—and North Korea's photos of North's leader Kim Jong Un meeting with Internet shut down. military officials. Meanwhile, the website for the U.S. forces Instead, a picture posted Thursday on the North's stationed in South Korea has been closed since Flickr site shows Kim's face with a pig-like snout Tuesday and their public affairs office said Friday and a drawing of Mickey Mouse on his chest. that the problem does not have to do with any Underneath, the text reads: "Threatening world hacking. peace with ICBMs and Nuclear weapons/Wasting money while his people starve to death." "Initial assessments indicate it is the result of an internal server issue," it said on the website without Another posting says "We are Anonymous" in elaboration. white letters against a black background. Anonymous is a name of a hacker activist group. A Copyright 2013 The Associated Press. All rights statement purporting to come from the attackers reserved.
    [Show full text]
  • UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05771047 Date: 08/31/2015 RELEASE in PART B6 From: Sent: To
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05771047 Date: 08/31/2015 RELEASE IN PART B6 From: PIR <preines Sent: Monday, August 16, 2010 11:48 PM To: Cc: Huma Abedin; CDM; Jake Sullivan Subject: "minister in a skirt" http://mobile.nytimes.com/a rticle?a=644869 North Korea Takes to Twitter and YouTube By CHOE SANG-HUN The New York Times August 17, 2010 SEOUL, South Korea - North Korea has taken its propaganda war against South Korea and the United States to a new frontier: YouTube and Twitter. In the last month, North Korea has posted a series of video clips on YouTube brimming with satire and vitriol against leaders in South Korea and the United States. In one clip, it called Secretary of State Hillary Rodham Clinton a "minister in a skirt" and Secretary of Defense Robert M. Gates a "war maniac," while depicting the South Korean defense minister, Kim Tae-young, as a "servile dog" that likes to be patted by "its American master." Such language used to be standard in North Korea's cold-war-era propaganda. Its revival is testimony to the increased chill in relations between the Koreas in recent months. In the past week, North Korea also began operating a Twitter account under the name uriminzok, or "our nation." Both the Twitter and YouTube accounts are owned by a user named "uriminzokkiri." The Web site www.uriminzokkiri.com is run by the Committee for the Peaceful Reunification of Korea, a propaganda agency in Pyongyang. Lee Jong-joo, a spokeswoman for the Unification Ministry in Seoul, said, "It is clear that these accounts carry the same propaganda as the North's official news media, but we have not been able to find out who operates them." The two Koreas agreed to stop their psychological war after their first summit meeting in 2000.
    [Show full text]
  • Family, Mobile Phones, and Money: Contemporary Practices of Unification on the Korean Peninsula Sandra Fahy 82 | Joint U.S.-Korea Academic Studies
    81 Family, Mobile Phones, and Money: Contemporary Practices of Unification on the Korean Peninsula Sandra Fahy 82 | Joint U.S.-Korea Academic Studies Moving from the powerful and abstract construct of ethnic homogeneity as bearing the promise for unification, this chapter instead considers family unity, facilitated by the quotidian and ubiquitous tools of mobile phones and money, as a force with a demonstrated record showing contemporary practices of unification on the peninsula. From the “small unification” (jageun tongil) where North Korean defectors pay brokers to bring family out, to the transmission of voice through the technology of mobile phones illegally smuggled from China, this paper explores practices of unification presently manifesting on the Korean Peninsula. National identity on both sides of the peninsula is usually linked with ethnic homogeneity, the ultimate idea of Koreanness present in both Koreas and throughout Korean history. Ethnic homogeneity is linked with nationalism, and while it is evoked as the rationale for unification it has not had that result, and did not prevent the ideological nationalism that divided the ethnos in the Korean War.1 The construction of ethnic homogeneity evokes the idea that all Koreans are one brethren (dongpo)—an image of one large, genetically related extended family. However, fissures in this ideal highlight the strength of genetic family ties.2 Moving from the powerful and abstract construct of ethnic homogeneity as bearing the promise for unification, this chapter instead considers family unity, facilitated by the quotidian and ubiquitous tools of mobile phones and money, as a force with a demonstrated record showing “acts of unification” on the peninsula.
    [Show full text]
  • Cornell International Affairs Review
    ISSN 2156-0536 C ORNELL I NTERNAT I ONAL A ffA I RS R E vi EW VOLUME V | ISSUE I | FALL 2011 When Should the US Intervene? The Cornell International Affairs Review is a student-run organization aiming to provide an Criteria for Intervention in Weak Countries international, intergenerational, and interdisciplinary approach to foreign affairs. Robert Keohane, Professor of International Affairs Woodrow Wilson School of Public and International Affairs, Princeton University Letter from Tunisia Founded in 2006, the CIAR is proud to provide the Cornell community with a semesterly Elyès Jouini, Professor and Vice-President, Université Paris-Dauphine review, bringing together views from students, professors, and policymakers on the current Former Minister for the Economic and Social Reforms, Tunisian Transition Government events shaping our world. Empowering Women in the Chinese Capitalist Factory System Sara Akl, University of Virginia, 2013 It is our firm belief that true knowledge stems not just from textbooks and lectures but from The Problems with American Exceptionalism engaging with others. Thus, the CIAR strongly emphasizes cooperation and dialogue amongst Timothy Borjian, University of California, Berkeley, 2012 all our members, both on Cornell’s campus and beyond. The Evolution of Revolution: Social Media in the Modern Middle East and its Policy Implications Taylor Bossung, Indiana University, 2012 Brazil’s China Challenge Carlos Sucre, MA Candidate, George Washington University Information Technology and Control in the DPRK Robert Duffley, Georgetown University, 2013 The Illusion of US Isolationism Eugenio Lilli, King’s College, London, Postgraduate Researcher, Teaching Fellow at the Defense Studies Department, UK Joint Services Command and Staff College Militarization of Aid and its Implications for Colombia Ian King, U.S.
    [Show full text]
  • Digital Trenches
    Martyn Williams H R N K Attack Mirae Wi-Fi Family Medicine Healthy Food Korean Basics Handbook Medicinal Recipes Picture Memory I Can Be My Travel Weather 2.0 Matching Competition Gifted Too Companion ! Agricultural Stone Magnolia Escpe from Mount Baekdu Weather Remover ERRORTelevision the Labyrinth Series 1.25 Foreign apps not permitted. Report to your nearest inminban leader. Business Number Practical App Store E-Bookstore Apps Tower Beauty Skills 2.0 Chosun Great Chosun Global News KCNA Battle of Cuisine Dictionary of Wisdom Terms DIGITAL TRENCHES North Korea’s Information Counter-Offensive DIGITAL TRENCHES North Korea’s Information Counter-Offensive Copyright © 2019 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 www.hrnk.org Print ISBN: 978-0-9995358-7-5 Digital ISBN: 978-0-9995358-8-2 Library of Congress Control Number: 2019919723 Cover translations by Julie Kim, HRNK Research Intern. BOARD OF DIRECTORS Gordon Flake, Co-Chair Katrina Lantos Swett, Co-Chair John Despres,
    [Show full text]
  • University of West Bohemia in Pilsen Faculty of Philosophy and Arts
    University of West Bohemia in Pilsen Faculty of Philosophy and Arts Dissertation Thesis Democratic People’s Republic of Korea in International Politics Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach Plzeň 2016 Lenka Caisová University of West Bohemia in Pilsen Faculty of Philosophy and Arts Department of Politics and International Relations Study Programme Political Science Field of Study International Relations Dissertation Thesis Democratic People’s Republic of Korea in International Politics Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach Lenka Caisová Supervisor: doc. PhDr. Šárka Cabadová-Waisová, Ph.D. Department of Politics and International Relations University of West Bohemia in Pilsen Sworn Statement I hereby claim I made this dissertation thesis (topic: Democratic People’s Republic of Korea in International Politics ; subtopic: Analysis of the Changes of North Korean Foreign Policy between 1994 and 2015 Using the Role Theoretic Approach ) together with enclosed codebook by myself whereas I used the sources as stated in the Bibliography only. In certain parts of this thesis I use extracts of articles I published before. In Chapter 1 and 2, I use selected parts of my article named “ Severní Korea v mezinárodních vztazích: jak uchopovat severokorejskou zahraniční politiku? ” which was published in Acta FF 7, no. 3 in 2014. In Chapter 4, I use my article named “Analysis of the U.S. Foreign Policy towards North Korea: Comparison of the Post-Cold War Presidents” which was published in Acta FF no. 3, 2014 and article named “ Poskytovatelé humanitární a rozvojové pomoci do Korejské lidově demokratické republiky ” published in journal Mezinárodní vztahy 49, no.
    [Show full text]
  • A Case Study of the Cyber-Terror Attack on the Korea Hydro & Nuclear Power Co., Ltd
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 2, Feb. 2016 857 Copyright ⓒ2016 KSII The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. Kyung-bok Lee1 and Jong-in Lim1 1Graduate School of Information Security, Korea University Seoul, Republic of Korea [e-mail: [email protected], [email protected]] *Corresponding author: Jong-in Lim Received August 14, 2015; revised October 6, 2015; revised November 3, 2015; revised December 4, 2015; accepted December 20, 2015; published February 29, 2016 Abstract Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration.
    [Show full text]
  • North Korea Security Briefing
    Companion report HP Security Briefing Episode 16, August 2014 Profiling an enigma: The mystery of North Korea’s cyber threat landscape HP Security Research Table of Contents Introduction .................................................................................................................................................... 3 Research roadblocks ...................................................................................................................................... 4 Ideological and political context .................................................................................................................... 5 Juche and Songun ...................................................................................................................................... 5 Tension and change on the Korean Peninsula .......................................................................................... 8 North Korean cyber capabilities and limitations ......................................................................................... 10 North Korean infrastructure.................................................................................................................... 10 An analysis of developments in North Korean cyberspace since 2010 .................................................. 14 North Korean cyber war and intelligence structure ................................................................................ 21 North Korean cyber and intelligence organizational chart ....................................................................
    [Show full text]
  • Discrepant Kisses: the Reception and Remediation of North Korean Children’S Performances Circulated on Social Media
    Discrepant Kisses: The Reception and Remediation of North Korean Children’s Performances Circulated on Social Media DONNA LEE KWON Abstract This article explores the burgeoning realm of videos uploaded on YouTube generated from content produced in North Korea otherwise known as the DPRK (Democratic People’s Republic of Korea). Through state-sanctioned and individual channels, thousands of videos of North Korean music and dance have been uploaded, some resulting in over 57 million hits on YouTube. Taking a cue from this fascination, I employ digital ethnography to investigate the online reception and remediation of North Korean children’s performances alongside their online comments on YouTube. I also draw from fieldwork conducted in North Korea in 2007. Theories that espouse the democratic participatory effects of social media platforms do not apply in North Korea where most of the uploaded material is produced and controlled by the state. Given this, I argue that North Korea’s engagement with social media is marked by a profound disjuncture where the majority of videos portray ideological North Korean subjects in an online context where very few North Korean citizens are able to engage with this material as social media. I analyze how this disjuncture plays out as international users respond to and remediate these videos in various ways or by creating mash-ups that subvert their original ideological content. A young North Korean girl in a red, babydoll dress sings a song called “Kiss” (Ppo-ppo) [figure 1].1 Another girl, this time in white, extolls the virtues of the “King Potato” (Wang Kamja). Five North Korean boys and girls—noticeably dwarfed by their guitars—perform a song called “Our Kindergarten Teacher” (Yuch’iwŏn uri sŏnsaengnim) garnering over 57 million views on YouTube.2 All three of these memorable children’s performances have become subject to intense online reception and have generated various creative and discrepant remediations.
    [Show full text]
  • North Korean House of Cards Leadership Dynamics Under Kim Jong-Un
    North Korean House of Cards Leadership Dynamics Under Kim Jong-un Ken E. Gause H R N K North Korean House of Cards Leadership Dynamics under Kim Jong-un Ken E. Gause H R N K Committee for Human Rights in North Korea Copyright © 2015 Committee for Human Rights in North Korea Printed in the United States of America All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior permission of the Committee for Human Rights in North Korea, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. Committee for Human Rights in North Korea 1001 Connecticut Avenue, NW, Suite 435 Washington, DC 20036 P: (202) 499-7970 ISBN: 9780985648053 Library of Congress Control Number: 2015954268 BOARD OF DIRECTORS Gordon Flake (Co-Chair) Chief Executive Officer, Perth USAsia Centre, The University of Western Australia Co-author, Paved with Good Intentions: The NGO Experience in North Korea Katrina Lantos Swett (Co-Chair) President and CEO, Lantos Foundation for Human Rights and Justice John Despres (Co-Vice Chair) Consultant on International Financial & Strategic Affairs Suzanne Scholte (Co-Vice Chair) President, Defense Forum Foundation Seoul Peace Prize Laureate Helen-Louise Hunter (Secretary) Attorney Author, Kim II-Song’s North Korea Kevin C. McCann (Treasurer) General Counsel, StrataScale, Inc., Counsel to SHI International
    [Show full text]
  • Its Strengths and Potential Areas for North-South Cooperation
    STI Policy Review_Vol. 7, No. 1 Science and Technology of North Korea: Its Strengths and Potential Areas for North-South Cooperation Jongweon Pak* & John G. Lee** Abstract This study examines the technical level of North Korea’s S&T and identifies areas for potential North–South cooperation. First, North Korean media is analyzed for situations and trends from 2010 to 2015. Despite some commendable achievements, North Korean S&T remains lacking in basic science and commercializa- tion potential. Despite an awareness of the importance of international cooperation, North Korea is ham- pered by international sanctions and their own caution, consequently concentrating their efforts on China. Details of their cooperation reflect their interests and needs to a certain extent, although their collaborations were mainly in the form of meetings and conferences rather than active joint research. To assess the poten- tial areas of cooperation with South Korea, this study also draws on interviews with NGOs and professionals working with North Korea. The country’s present situation is analyzed and some practical examples of pos- sible cooperation is suggested. North Korea has the potential to expand its cooperation not only with South Korea but with many other countries. North Korea also promisingly expresses interest in cooperation. Keywords Science & Technology (S&T), cooperation, North Korea, NGO * Professor, School of Biological and Chemical Engineering, Yanbian University of Science and Technology, Yanji, Jilin, China, yustpjw@ hanmail.net ** Board member, Yong Sung Technical Institute, Yanji, Jilin, China, [email protected] 110 1. INTRODUCTION Despite having maintained its foundational Juche1 (“self-reliance”) ideology, North Korea has realized economic problems cannot be solved without international cooperation, and conceptual- ized Juche accordingly.
    [Show full text]
  • Handbook for Korean Studies Librarianship Outside of Korea Published by the National Library of Korea
    2014 Editorial Board Members: Copy Editors: Erica S. Chang Philip Melzer Mikyung Kang Nancy Sack Miree Ku Yunah Sung Hyokyoung Yi Handbook for Korean Studies Librarianship Outside of Korea Published by the National Library of Korea The National Library of Korea 201, Banpo-daero, Seocho-gu, Seoul, Korea, 137-702 Tel: 82-2-590-6325 Fax: 82-2-590-6329 www.nl.go.kr © 2014 Committee on Korean Materials, CEAL retains copyright for all written materials that are original with this volume. ISBN 979-11-5687-075-3 93020 Handbook for Korean Studies Librarianship Outside of Korea Table of Contents Foreword Ellen Hammond ······················· 1 Preface Miree Ku ································ 3 Chapter 1. Introduction Yunah Sung ···························· 5 Chapter 2. Acquisitions and Collection Development 2.1. Introduction Mikyung Kang·························· 7 2.2. Collection Development Hana Kim ······························· 9 2.2.1 Korean Studies ······································································· 9 2.2.2 Introduction: Area Studies and Korean Studies ································· 9 2.2.3 East Asian Collections in North America: the Historical Overview ········ 10 2.2.4 Collection Development and Management ···································· 11 2.2.4.1 Collection Development Policy ··········································· 12 2.2.4.2 Developing Collections ···················································· 13 2.2.4.3 Selection Criteria ···························································· 13 2.2.4.4
    [Show full text]