North Korea: Life in Cultural Isolation

Total Page:16

File Type:pdf, Size:1020Kb

North Korea: Life in Cultural Isolation Home News Sport Weather Shop Earth Travel Home Video World US & Canada UK Business Tech Science ADVERTISEMENT Magazine North Korea: Life in cultural isolation 20 December 2011 Magazine Share It's one of the most closed and In today's secretive nations on Earth. But in the Magazine last 18 months, two BBC journalists have witnessed some of the more Kim Il-sung died but is still the president Little girls smiling widely and dancing in perfect formation, little boys in smart red Team America suits and painted faces singing praises to star the country's Great Leader. It started off faintly charming. But with mask-like faces and rigid grins, even children become rather sinister. More children are employed to sweep the ◾ On Twitter, it wasn't steps leading up to the 60ft bronze statue the nuclear threat or of the Great Leader, which dominates the regional instability Pyongyang. that was uppermost in people's minds after Kim Il-sung died 16 years ago but he's still Jong-il's death the country's president, and there are ◾ Instead, the 2004 more than 500 statues of him. comedy film Team America: World Police "He's immortal," a 24-year-old-guide was trending, meaning explained. "We don't believe he passed it was one of the most away." mentioned tweets The film, by the Sue Lloyd Roberts, May 2010 ◾ creators of South Park, features Thunderbirds- The bizarre world of North Korea style puppets and starred Kim Jong-il as Those who leave the country find it an evil dictator with hard to adjust limited English No wonder the 3,000 or so North Koreans who escape this, the most isolated and secretive country in the world, and arrive in South Korea every year feel as though they have landed on another planet. South Koreans can use their mobile phones to pay in the supermarket, there are more and faster broadband connections per person than in any other country in the world and, if you are feeling frivolous, there are cameras and touchscreen keyboards along the main shopping streets to allow you to send a photo to a friend. All new arrivals from North Korea spend months in special government schools to learn how to cope with the 21st Century. Sue Lloyd Roberts, June 2010 No-one has access to the internet North Korean TV only broadcasts hagiographies of the two leaders and Platform shoes pictures celebrating the country's army, and rainbows model farms, model villages etc. Our minders had probably never seen any other kinds of news item or documentary about their country or the rest of the world. They were not allowed to, and they could ◾ Jong-il assumed power not, because no-one has access to the after his father's death internet in North Korea. ◾ Had 30 years of Instead, the North Koreans have a special preparation for office internal intranet which I was shown at ◾ Wore platform shoes to Pyongyang University. appear taller A postgraduate metallurgy student who ◾ Loved food and drink spoke good English explained that he could not compare his research with a ◾ During a train journey across Russia, fellow student in say, London or Los reportedly had live Angeles, because the system would not lobsters airlifted in let him. ◾ Officially, he was born But, he added brightly, "the Dear leader in a log cabin has kindly put all we need to know on our ◾ The event was intranet system". reportedly marked by a double rainbow and a Sue Lloyd Roberts, June 2010 bright star in the sky Pavements are scrubbed clean by hand Obituary: Kim Jong- il North Korea is about as isolated from the rest of the world as it is possible to be. There are few visitors and most of those are restricted to looking around a few chosen spots in Pyongyang. Isolation has allowed the North Koreans to develop a way of living seldom seen elsewhere. People cut the roadside grass with scissors, a time-consuming act, and wash the city pavements with scrubbing brushes and cloths, items usually reserved for the home. The city is drab and colourless and there are few new buildings going up. Michael Bristow, October 2010 North Korea: Where pavements are washed by hand The country's leaders have special flowers Politics is everywhere in North Korea - even in the flowers. The country's leader Kim Jong-il and his father, the North's founder Kim Il-sung, both have flowers named after them. There is currently an exhibition in central Pyongyang showcasing the two blooms, called the "Kimjongilia" and the "Kimilsungia". It was a holiday in North The two blooms are called Korea on Monday, and "Kimjongilia" and "Kimilsungia" hundreds of people - soldiers, couples and families with children - wandered around the exhibition centre. Many had their photographs taken in front of the flowers. It is a measure of the devotion some people show towards the only two men to have ruled this secretive communist state. I was given another glimpse of that respect from Pak Mi-gyong, an English-speaking guide at the floral exhibition. I asked to take her picture in front of a giant portrait of the two Mr Kims that hung at one end of the main hall. She warned me that when taking a photograph I must be careful and include the men's whole bodies in the frame. "They are our leaders and we respect them from the bottom of our hearts. We don't allow other people to cut the pictures of them," she said, a little angrily. Michael Bristow, October 2010 Share this story About sharing In today's Magazine Sweden's mystery illness 26 October 2017 The couple roped together in life, and in the 'death zone' 25 October 2017 I met a homeless addict and recognised my childhood friend 24 October 2017 'I was glad when my husband had affairs' .
Recommended publications
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Vp01 16¢63뼉 Olor
    Discontinuance of Publication To our readers, First and foremost, I, as the president of Yonhap News Agency, would like to give our readers many thanks for the deep interest shown in our Vantage Point magazine for many years. With your great interest and encouragement, Yonhap has done its utmost to make Vantage Point, South Korea's sole North Korea-only monthly in English, a quality magazine over the years. However, Yonhap has very regrettably decided to discontinue the publication of the maga- zine, making the January issue in 2016 its last. This discontinuance, however, will never mean weakening Yonhap’s North Korea news ser- vice. On the contrary, Yonhap, as a leading news agency in South Korea, has the grave obligation to play a part in helping materialize the Korean people’s ardent wish for the reunification of the Korean Peninsula by providing our readers at home and abroad with accurate news on the reality of the communist North and the South Korean government’s North Korea policy. Hence, Yonhap promises to continuously meet our Vantage Point readers’ keen interest in and high demand for stories on Korean Peninsula issues by providing you with a quicker, fairer, more accurate and stronger North Korean news service via its Web page (www.yonhapnews.co.kr). I would like to express my deep appreciation to our faithful readers once again, and hope you will continuously maintain interest in Korean issues down the road. Best regards, Park No-hwang President-publisher Yonhap News Agency 폐간사 독자여러분들에게, 우선 그동안 연합뉴스 Vantage Point를 애독해주신 독자 여러분들에게 깊은 감사의 말씀을 드립니다 그동안 연합뉴스는 독자 여러분들의 높은 관심과 격려 속에서 한국의 유일한 북한 전문 영문월간지인 Vantage Point를 품격있는 잡지로 만들기 위해 최선 을 다해왔습니다.
    [Show full text]
  • "Splinternet" – Danger for Our Citizens, Businesses and Society?
    "Splinternet" – Danger for our citizens, businesses and society? Once upon a time, there was the World Wide Web (www). Just as it was invented by Sir Tim Berners-Lee. John Perry Barlow wrote the "Declaration of the Independence of Cyberspace" in 1996. The Internet was a great promise of freedom. It worked like a continuation of the Gutenberg invention, the printing press: the Internet gave a voice to all citizens whose views and attitudes were suppressed by the media and elites. This had and has great political consequences. 30 years later the opinion about the internet changed: It was thought that monopoly companies like Google, Facebook, etc. control Big Data and Artificial Intelligence, and therefore control us. However, politics followed suit and began to regulate. The concern now is that the state will disenfranchise citizens and restrict companies. There is a fear of new totalitarian regimes. And in this situation, the Internet ("splinternet") is increasingly fragmented. National "Internet" networks are emerging. States treat the Internet as an extension of their national territory. The most recent example is Russia, where Kremlin laws ensure that national Internet traffic goes through state nodes and the state has the right to shut down the global Internet: a sort of digital Iron Curtain. The champion of the national Internet is China. The state monitors and controls Internet content, blocks foreign services and companies (like Facebook) and replaces them with national services and companies that are in line with the Communist Party. The "Great Firewall" is successful. The number of states imitating China's Internet policy is growing: Iran, North Korea, Cuba, Turkey, Saudi Arabia, but also Thailand and Vietnam etc.
    [Show full text]
  • The Dprk As an Example of the Potential Utility of Internet Sanctions
    \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 1 31-MAR-08 10:18 USING INTERNET “BORDERS” TO COERCE OR PUNISH: THE DPRK AS AN EXAMPLE OF THE POTENTIAL UTILITY OF INTERNET SANCTIONS BENJAMIN BROCKMAN-HAW E * INTRODUCTION ................................................... 163 R I. BACKGROUND INFORMATION .............................. 166 R A. Escalation ............................................. 167 R B. The Internet in North Korea ........................... 173 R II. SANCTIONS ................................................ 181 R A. General Information ................................... 182 R B. Telecommunications Sanctions Already Considered .... 184 R C. Multilateral Sanctions In Place Against the DPRK ..... 187 R III. THE UTILITY OF INTERNET SANCTIONS .................... 187 R A. Obtaining a desired result through the imposition of Internet sanctions ...................................... 187 R B. The Benefits and Costs of Imposing Internet Sanctions . 198 R C. General Concerns Associated with the Use of Internet Sanctions .............................................. 200 R 1. International Human Rights ....................... 200 R 2. Internet sanctions could harm regime opponents . 203 R 3. Internet sanctions could impair the ability of UN operations and NGO’s to function within the target country ..................................... 204 R IV. CONCLUSION .............................................. 205 R INTRODUCTION Speech is civilization itself. The word. preserves contact—it is silence which isolates. - Thomas Mann1 * J.D. Candidate 2008, Boston University School of Law. This article is dedicated to the memory of Dr. Robert Brockman, a man who surveyed this new world with the eyes of an old soul. 1 THOMAS MANN, THE MAGIC MOUNTAIN (1924) quoted in CHARLES R. BURGER & JAMES J. BRADAC, LANGUAGE AND SOCIAL KNOWLEDGE 112 (Edward Arnold Publishers Ltd. 1982). 163 \\server05\productn\B\BIN\25-1\BIN104.txt unknown Seq: 2 31-MAR-08 10:18 164 BOSTON UNIVERSITY INTERNATIONAL LAW JOURNAL [Vol.
    [Show full text]
  • KCNA File No. 21
    SINO-NK.COM KOREAN CENTRAL NEWS AGENCY FILE NO. 20 27 July 2012 –7 August 2012 Analysis: Despite the steady start to the week, KCNA coverage of China unexpectedly dropped off in the later half of the week, with five consecutive days of no reporting on China. Of the 13 stories that were published, 8 of them were on topics relating to the diplomatic ties shared between China and the DPRK. Amid various delegation visits, banquets, and formal receptions, two stories focused on Chinese newspapers praising developments in North Korean society from a fertilizer complex to the increased economic success of the country, saying, “the people's living standard has further improved under the guidance of the Workers' Party of Korea and the DPRK government.” With the majority of focus on China stories this week being on exulting strong diplomatic ties, KCNA continues to remind the world of its ties with China, and more importantly, of China’s continued allegiance to the DPRK as the tensions in the region continue. The drop-off in coverage may suggest that KCNA is satisfied with its portrayal of the Sino-North Korean relationship, resulting in more attention and more publications relating to denouncing the US, Japan, and South Korea as their cooperation continues in the area. Another related story, though not necessarily of diplomatic focus was the story, Victory in Fatherland Liberation War Is Common Victory of DPRK, China. In this story, KCNA gives a glorious account of the strength of the two countries, and their “miracle” victory over US imperialism, but more importantly that their cooperation was and is to mutual benefit.
    [Show full text]
  • ENSURING a FUTURE for DETECTING INTERNET DISRUPTIONS a Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns
    ENSURING A FUTURE FOR DETECTING INTERNET DISRUPTIONS A Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns JUNE 2017 Acknowledgements About New America Thank you to the following for their contributions to this New America is committed to renewing American politics, work: Collin Anderson, Seamus Tuohy, Liz Woolery, Georgia prosperity, and purpose in the Digital Age. We generate big Bullen, and Enrique Piracés. ideas, bridge the gap between technology and policy, and curate broad public conversation. We combine the best of a policy research institute, technology laboratory, public Thank you also to the members of the internet forum, media platform, and a venture capital fund for measurement community who took the time to participate ideas. We are a distinctive community of thinkers, writers, in this research. researchers, technologists, and community activists who believe deeply in the possibility of American renewal. Find out more at newamerica.org/our-story. About OTI The Open Technology Institute (OTI) works at the intersection of technology and policy to ensure that every community has equitable access to digital technology and its benefits. We promote universal access to communications technologies that are both open and secure, using a multidisciplinary approach that brings together advocates, researchers, organizers, and innovators. Find out more at www.newamerica.org/oti. OPEN TECHNOLOGY INSTITUTE Contents Executive Summary 2 Introduction 4 Overview of the State of Shutdown Measurement 10 Introduction to Recommendations 15 Recommendations 18 Conclusion 31 Appendices 32 Notes 43 OPEN TECHNOLOGY INSTITUTE EXECUTIVE SUMMARY When it comes to the internet, we live in a world of of researchers that study internet censorship, contradictions.
    [Show full text]
  • I Why Hasn't North Korea Collapsed?
    Why Hasn’t North Korea Collapsed? Rational Choices in East Asia By Eric Dean Tesar i Chapter 1 Introduction There are enough places in this world where war is only moments away from breaking out, but there is only one place that calls the attention of the world’s largest powers to such a small set of circumstances that can decide the fate of an entire region. The Democratic People’s Republic of Korea is just such a place. Ruled by a single person with nuclear capabilities and a provocative style, North Korea is a focal point for East Asian affairs. It is China’s communist brother, but also an economic investment and a military buffer zone to the Western powers. For South Korea, it is long lost family but also a direct threat to their security, be it social, economic, or military. The provocations of North Korea have constructed a unique relationship with the rest of East Asia, one that begs the question of why there is support in the form of economic aid and agreements despite an overwhelming distrust, and unity despite the variety of interests. It is in this region that we see states that have produced some of the greatest advances in technology, while there are others that are more cut off from the outside than almost anywhere else in the world. This dynamic has not always been the case. Before there was North and South Korea, the country was one. The people were family and the only real difference was geographical. Today, the story has taken a much more dramatic course.
    [Show full text]
  • Encyclopedia of Kimilsungia
    1 Preface Love of flower is a noble trait peculiar to man. Flower brings fragrance, emotion and beauty to people. That is why they love it, and hope to live beautifully and pure-heartedly like it. At the same time, they express their wish and desire, happiness and hope by means of it, and want to bring their life into full bloom, picturing themselves in it. Kimilsungia, which was named by Sukarno, the first President of the Republic of Indonesia, reflecting the desire of the progressive people of the world, is loved by mankind not only because it is beautiful but also it is symbolic of the greatness of President Kim Il Sung. The editorial board issues Encyclopedia of Kimilsungia in reflection of the unanimous will of the Korean people and the world’s progressive people who are desirous to bloom Kimilsungia more beautifully and propagate it more widely on the occasion of the centenary of the birth of President Kim Il Sung. The book introduces in detail how Kimilsungia came into being in the world, its propagation, Kimilsungia festivals and exhibitions held in Korea and foreign countries every year, events held on the occasion of the anniversary of the naming of the flower, and its biological features and cultivating techniques the Korean botanists and growers have studied and perfected. And edited in the book are the typical literary works depicting Kimilsungia and some of gift plants presented to President Kim Il Sung by foreign countries. In addition, common knowledge of flower is compiled. The editorial board hopes this book will be a help to the flower lovers and people of other countries of the world who are eager to know and grow Kimilsungia.
    [Show full text]
  • PLANT SCIENCE Bulletin Fall 2011 Volume 57 Number 3
    PLANT SCIENCE Bulletin Fall 2011 Volume 57 Number 3 Botany in Action! Service project volunteers at Botany 2011....... page 125 In This Issue.............. Dr. Ann Hirsch receives prestigious Science, sharing, symposia, and more... BSA welcomes new staff BSA Merit Award ................. page 82 BSA President Steve Weller’s address at member.......page 91 the close of Botany 2011 ...........page 85 From the Editor PLANT SCIENCE It’s the end of summer and many of us are trying BULLETIN to shift gears in preparation for another academic Editorial Committee year. It’s a good time to reflect back on summer activities and consider what we can incorporate Volume 57 into our classes to excite our students about botany. Jenny Archibald The Society itself provides some good examples, (2011) some of which we highlight in this issue. First and Department of Ecology foremost is to recognize outstanding accomplish- & Evolutionary Biology ment at all levels, from the BSA’s Merit Award to The University of Kansas outstanding presentations by graduate students in Lawrence, KS 66045 [email protected] individual sections. As demonstrated in President Weller’s address, the Society continues to promote Root Gorelick excellence in botanical research through the AJB, (2012) and we continue to extend support and encour- Department of Biology & agement to fellow societies throughout the world, School of Mathematics & such as our Brazilian friends (who will be hosting Statistics Carleton University the next Latin American Botanical Congress). Our Ottawa, Ontario discipline is thriving. Canada, K1H 5N1 Also in this issue are two articles, one long and one [email protected] brief, that provide interesting historical perspectives on plants in society.
    [Show full text]
  • North Korea's Criminal Hackers
    OPTIV THREAT ACTOR INTEL SERIES #2 NORTH KOREA’S CRIMINAL HACKERS Courtney Falk, Aamil Karimi OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 1 The Optiv Threat Actor Intel report is a who’s who primer of threat actors across the globe intended to educate readers. The report provides a synopsis of the threat actor, their history and their motivators for easier understanding. Information in the report is a combination of intelligence gathered from public, third- party sources and Optiv’s Global Threat Intelligence Center (gTIC). INTENT OPTIV THREAT ACTOR INTEL SERIES #2 | NORTH KOREA’S CRIMINAL HACKERS 2 INTRODUCTION The Democratic People’s Republic of Korea (DPRK) is unique among nation-states in the way that it combines sanctioned cyber capabilities with cyber-crime. This report looks at the ways that North Korea uses its nation-state assets to commit common crimes. The key question: will the criminal activities of a nation such as North Korea have follow-on repercussions in the event of either a political collapse or reformation? Many modern nation-states have built a cyber-focused military force. Every such cyber force has a defensive component; it implements network and endpoint security measures in order to protect the nation’s resources. Some cyber forces are built to include an offensive component that is able to reach out across the wire and interfere with the functioning of another nation. As with cyber forces, most nations now have their own cyber-criminals, who are technologically skilled yet unemployed/underemployed citizens who want to make more money using their computers to take from others.
    [Show full text]
  • Tongsin No 03 February 2014 Copy
    Tongsin | 통신 Korean Central News Agency and Rodong Sinmun on China № 03 , February 2014 March 2014 Edited by Morgan Potts with research assistance from Vikram Jones Introduction by Morgan Potts Tongsin | 통신 is a monthly summary of DPRK state news relevant to China, contextualized and analyzed by Sino-NK. Here we examine both the KCNA and Rodong Sinmun for their content relating to China, Chinese politics, cultural exchanges with China, and economic engagement between the mouth and the teeth. February was an eventful month for the DPRK: the US-ROK war games Key Resolve/Foal Eagle commenced, the United Nations Human Rights Council released a report on crimes against humanity in North Korea, north-south family reunions took place, and Kim Jong-il’s birthday was celebrated as the Day of Shining Star. The state media paid much attention to North Korean groups in China, such as the General Association of Koreans in China and the Youth Federation of Korean Nationals in China, both of whom condemned the US-ROK military exercises as “sycophantic confrontation rackets”. Meetings between the Chinese Foreign Ministry and the DPRK foreign ministry were reported as stressing the desire for stability on the peninsula, dependent on a response from South Korea regarding the DPRK “proposal” that the war games cease. On this condition, the DPRK is apparently interested in renewing the Six Party Talks. The narrative of the state media puts the responsibility of regional stability and improved North-South relations squarely on the ROK. As the war games continue as planned, the DPRK and allegedly Koreans abroad condemn them, citing the exercises as destructive during an otherwise peaceful moment between the two Koreas.
    [Show full text]
  • Sony's Nightmare Before Christmas: the 2014 North Korean Cyber
    SONY’S NIGHTMARE BEFORE CHRISTMAS The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace National SecurityResearch Report Note Antonio DeSimone | Nicholas Horton NSR_11x17_Cover_Sony_v6.indd 1 11/20/17 4:09 PM SONY’S NIGHTMARE BEFORE CHRISTMAS The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace Antonio DeSimone Nicholas Horton Copyright © 2017 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved. NSAD-R-17-045 SONY’S NIGHTMARE BEFORE CHRISTMas iii Contents Figures ................................................................................................................................................................................................ v Tables .................................................................................................................................................................................................. v Summary .........................................................................................................................................................................................vii Timeline of Events ....................................................................................................................................................2 Sony, The Interview, and the Attack ......................................................................................................................2 The Cybersecurity Industry Responds ..................................................................................................................7
    [Show full text]