Author Archives: Scott

New North Korean Propaganda Posters Added

New images, with translations and explanations, added to the North Korean Propaganda Posters page both here on the site, and in the much larger Facebook album.

Death of Kim Il-sung in 1994


The unlikeliest of images – a tall Kim Jong-il has rushed to the main public square overlooking Pyongyang to comfort the masses, distraught at the death of Kim Il-sung (in 1994). The younger Kim was, by nearly all accounts, quite reclusive, disliking the limelight and public appearances – making this one of the oddest, most unbelievable of NK propaganda posters.
Share

2009-2013 Internet attacks on South Korea part of ongoing cyber espionage campaign – McAfee Labs

McAfee, the Internet security company owned by Intel, has a research lab that just put out a report covering four years of hacking attacks aimed at South Korea. What previously appeared to be isolated attacks on media, banks, and government websites, many of them detailed here and in the report, are instead part of an ongoing 2009-2013 espionage campaign targeting military forces in South Korea in order to extract classified information. Targets included information on U.S. military forces and their operations in the South.

Image courtesy McAfee Labs

Image courtesy McAfee Labs



Through examining the evolving code used in the attacks, McAfee Labs found the attacks on South Korean banks, media, universities, elections, government, and other websites shared common source code, one encryption password, similar use of IRC botnets, consistent terminology, and a target set of military keywords. The report, on page 22, even lists the (somewhat poorly translated) Korean keywords used to target military operations in South Korea, including by U.S. forces.

Share

Read more ...

Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power

[Book Review] The author, David Sanger, appears to have better access to classified information than most gov’t intel analysts; he certainly has better access to policy makers and strategists. The coverage of cyber operations, especially Stuxnet and Olympic Games, is the most powerful and revealing section of the book – given that Sanger was at the forefront of breaking these stories in the media, hardly a surprise.

Share

Read more ...

UNESCO adds North Korea, Iranian sites to Heritage List

UNESCO added a group of sites in and around Kaesong, North Korea to the World Heritage List yesterday, citing their importance to “the transition from Buddhism to neo-Confucianism in East Asia and to the assimilation of the cultural spiritual and political values of the states that existed prior to Korea’s unification under the Koryo Dynasty.”

I’ve visited the area in and around the sites and will post a few photos below.

nk-koryomuseum
The Koryo Museum, located on the grounds of a palace complex just outside Kaesong.

 
Share

Read more ...

South Korea hit with cyber attacks on major banks, media outlets … again; North Korea blamed … again

UPDATE (10 April): The South made its preliminary case today that a North Korean espionage agency was behind the 20 March cyber attacks. According to the South’s report, the North began preparing for the attack last June, with systems testing beginning in late February. Of the 76 types of malicious code used in the attack, 30 were similar to previous attacks by the North, and 22 of 49 IP addresses overlapped with previous addresses used during cyber attacks traced to the North since 2009.

Graph courtesy Yonhap News

Graph courtesy Yonhap News



UPDATE (22 March): The South’s communications commission issued an update today declaring the cyber attack started from an IP address at a domestic bank (Nonghyup), not a Chinese address, as they reported yesterday. Meaning, aside from an irritated China and embarrassed Korean bureaucrats, that the attack erupted from a domestic source. How the code was placed on that server, by whom, and how it spread is still under investigation – an investigation likely to be much more circumspect in placing blame during future announcements.

Share

Read more ...


  • Group says Iran hackers hunt nuke workers, US https://t.co/OrAOHEfi5n - posted on 13/12/2018

  • Satellites may connect the entire world to the internet - with little or no control from national regulators https://t.co/b5GbrtC0WK - posted on 10/12/2018

  • Wrote about this years ago. Doubt current expansion plans will help ... There’s an easier way to board trains, so w… https://t.co/aA4ZH0zkNR - posted on 03/12/2018

  • Using Time-Lapse Satellite Imagery To Detect Infrastructure Changes: Case-Studies via Myanmar, Nigeria and the Sout… https://t.co/3FcSdtq9EJ - posted on 25/11/2018

Ads from Google

  • Investment Principal, Economic Advancement Program job in London, United Kingdom
    Investment Principal, Economic Advancement Program, Economic Advancement Program, London, Deadline: 01/20/2019The mission of the Economic Advancement Program (EAP) is to increase economic opportunity for the marginalized in ways that promote inclusive,...
  • Executive Assistant, Executive Office job in New York, New York
    Executive Assistant, Executive Office, Executive Office, New York, Deadline: 01/16/2019The Executive Office comprises the President, Vice President, Chief Integration Officer, Special Advisors, Presidential Fellows, and supporting staff. We build relat...
  • Herbert Scoville Jr. Peace Fellow job in Washington, D.C.
    The Herbert Scoville Jr. Peace Fellowship provides full-time six to nine-month fellowships for recent college and graduate school alumni to work on international peace and security issues with one of more than two dozen participating public-interest or...
  • Deputy Chief of Party - Libya job in Tunis, Tunisia
    The Deputy Chief of Party (DCOP) supports and collaborates with the Chief of Party (COP) and Senior Technical Advisor (STA) to coordinate field office activities and administration, and manage the IFES Libya offices in Tunis and Tripoli. S/he will also...