#AceNewsServices – NORTH KOREA:Editors Post:Dec.28 – Recently l posted news and reported on the cyber-hacks and attacks on Sony Pictures and how it has put North Korea’s cyberwarfare program in the spotlight.
Though what do we really know about the internal workings of the country, as not much is known, other than snippets of information have come out over the years, often through defectors and intelligence leaks.Here’s a summary of what we know:The Cyber Units of North Korea’s governing structure is split between the Workers’ Party of Korea (WPK) and the National Defence Commission (NDC).North Korea’s main cyber-operations run under the Reconnaissance General Bureau (RGB), which itself falls under the Ministry of People’s Armed Forces that is in turn part of the NDC. The RGB has been operational for years in traditional espionage and clandestine operations and formed two cyber-divisions several years ago called Unit 121 and Office 91.
In 2004, Unit 121 was said to have gained access to 33 of the 80 wireless communications networks used by the South Korean military. The attack coincided with the timing of a military exercise held with U.S. military forces.
North Korea likes to launch its cyber attacks on important dates. On the Fourth of July in 2009, North Korea launched an attack, which included a denial-of-service operation against media and government websites in South Korea and the U.S. The attack included malware that wipes data from the hard drives of targeted machines. A similar attack was carried out by what researchers at Symantec have branded the “DarkSeoul gang,” thought to be working for North Korea, which attacked South Korean banks and TV networks in 2011 and 2013. The attacks in 2013 froze ATM networks in South Korea and prevented people from taking money out of their accounts. They also coincided with North Korea’s cutting of the official communications link between it and South Korea. Further cyber attacks since then have often coincided with the anniversary of the start of the Korean War and other notable dates.
North Korea sees on-line games as a theater of cyber warfare operations. In 2011, South Korean police arrested five people and accused them of collaborating with operators in North Korea. They were alleged to have used “auto-players” in the on-line game Lineage to level up in the game and then use its in-game marketplace to obtain real money. In 2013, the South Korean government said hackers from North Korea released malware that infected 100,000 computers which were then hijacked and used to launch a distributed denial of service attack on computers at the Inchon Airport. It had little effect, but the attack was considered a “clever tactic” for using an online game as what military planners call a “force multiplier.”
North Korea also has the ability to jam signals from GPS satellites and to inject false coordinates into GPS signals. It demonstrated this capability during joint U.S.-South Korean military exercises in 2011.
North Korean hackers get some of their training in China and in Russia. In 2012, North
Korea also signed an agreement with Iran to cooperate in combating “common enemies in cyberspace.” One motivating factor for their alliance was the appearance of Stuxnet, a cyber weapon created by the U.S. and Israel and used to attack Iran’s nuclear research facilities.
So concluding the next battle will not be fought with conventional military hardware but computer controlled drones, cyber-machines and computer software, all geared to create massive infrastructure damage on countries economies. So as the power of the pound, dollar and euro will decline, the power of control over peoples lives will evolve, as news and social media, take greater and greater control over our everyday lives.
The next war will not be of ‘ guts and glory ‘ or men of honour ‘ fighting for a worthy cause ‘ but of little men with big ideas sitting in ivory towers ‘ Playing at being God ‘ but as with all little men who are really ‘children at heart ‘, there is a stronger and more ‘ Powerful Father ‘ who has watched over us and waits until all things have past, before he comes.
Then NO computer or Cyberattack be it hacker or not will stop his coming, because by then it will be truly too late, because as with life every ‘ Second Counts’ and before you can say it – it will have surely happened and it will be history.