Author Archives: Scott

New North Korean Propaganda Posters Added

New images, with translations and explanations, added to the North Korean Propaganda Posters page both here on the site, and in the much larger Facebook album.

Death of Kim Il-sung in 1994


The unlikeliest of images – a tall Kim Jong-il has rushed to the main public square overlooking Pyongyang to comfort the masses, distraught at the death of Kim Il-sung (in 1994). The younger Kim was, by nearly all accounts, quite reclusive, disliking the limelight and public appearances – making this one of the oddest, most unbelievable of NK propaganda posters.
Share

2009-2013 Internet attacks on South Korea part of ongoing cyber espionage campaign – McAfee Labs

McAfee, the Internet security company owned by Intel, has a research lab that just put out a report covering four years of hacking attacks aimed at South Korea. What previously appeared to be isolated attacks on media, banks, and government websites, many of them detailed here and in the report, are instead part of an ongoing 2009-2013 espionage campaign targeting military forces in South Korea in order to extract classified information. Targets included information on U.S. military forces and their operations in the South.

Image courtesy McAfee Labs

Image courtesy McAfee Labs



Through examining the evolving code used in the attacks, McAfee Labs found the attacks on South Korean banks, media, universities, elections, government, and other websites shared common source code, one encryption password, similar use of IRC botnets, consistent terminology, and a target set of military keywords. The report, on page 22, even lists the (somewhat poorly translated) Korean keywords used to target military operations in South Korea, including by U.S. forces.

Share

Read more ...

Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power

[Book Review] The author, David Sanger, appears to have better access to classified information than most gov’t intel analysts; he certainly has better access to policy makers and strategists. The coverage of cyber operations, especially Stuxnet and Olympic Games, is the most powerful and revealing section of the book – given that Sanger was at the forefront of breaking these stories in the media, hardly a surprise.

Share

Read more ...

UNESCO adds North Korea, Iranian sites to Heritage List

UNESCO added a group of sites in and around Kaesong, North Korea to the World Heritage List yesterday, citing their importance to “the transition from Buddhism to neo-Confucianism in East Asia and to the assimilation of the cultural spiritual and political values of the states that existed prior to Korea’s unification under the Koryo Dynasty.”

I’ve visited the area in and around the sites and will post a few photos below.

nk-koryomuseum
The Koryo Museum, located on the grounds of a palace complex just outside Kaesong.

 
Share

Read more ...

South Korea hit with cyber attacks on major banks, media outlets … again; North Korea blamed … again

UPDATE (10 April): The South made its preliminary case today that a North Korean espionage agency was behind the 20 March cyber attacks. According to the South’s report, the North began preparing for the attack last June, with systems testing beginning in late February. Of the 76 types of malicious code used in the attack, 30 were similar to previous attacks by the North, and 22 of 49 IP addresses overlapped with previous addresses used during cyber attacks traced to the North since 2009.

Graph courtesy Yonhap News

Graph courtesy Yonhap News



UPDATE (22 March): The South’s communications commission issued an update today declaring the cyber attack started from an IP address at a domestic bank (Nonghyup), not a Chinese address, as they reported yesterday. Meaning, aside from an irritated China and embarrassed Korean bureaucrats, that the attack erupted from a domestic source. How the code was placed on that server, by whom, and how it spread is still under investigation – an investigation likely to be much more circumspect in placing blame during future announcements.

Share

Read more ...


  • Israeli soldiers tricked into installing malware by Hamas agents posing as women https://t.co/Vqh4mNJQ69 - posted on 17/02/2020

  • Used to work for a similar project at Georgetown; interesting research, useful results: https://t.co/mua5FSUkNk - posted on 06/02/2020

  • Instagram will be the new front-line in the misinformation wars https://t.co/K4CFAToOCR - posted on 02/01/2020

  • In strategic Djibouti, a microcosm of China’s growing foothold in Africa https://t.co/gqIUJuhtu5 - posted on 30/12/2019

Ads from Google

  • One Year Fixed Term Program Officer, Information Program job in London, United Kingdom
    One Year Fixed Term Program Officer, Information Program. London. Posting Date: 02/18/2020. Deadline: 02/24/2020 Do you want to help make the world a better place with your ability to think strategically about opportunities for change in the field o...
  • Program Officer, Early Childhood Program job in London, United Kingdom
    Program Officer, Early Childhood Program. London. Posting Date: 02/18/2020. Deadline: 03/03/2020 Do you want to help make the world a better place with your experience of strengthening early childhood development systems and services for marginalise...
  • Senior Financial Analyst job in New York, New York
    Senior Financial Analyst. New York. Posting Date: 02/18/2020. Deadline: 03/09/2020 Do you want to help make the world a better place with your with your sharp analytical/quantitative and technical abilities? We're seeking a Senior Financial Analyst ...
  • Research Advisor job in Brussels, Belgium
    Position in the organisation and purpose of function: As a member of VVOB’s programme operations, the research advisor will work closely with the senior education advisors and the monitoring and evaluation (M&E) advisor at head office, and with ...