Source: National Cyber Security – Produced By Gregory Evans North Korea has an image in the international community of being one of the most secretive and guarded countries in the world right now under the leadership of Kim Jong Un. Gambling is illegal in North Korea but the government allows…
North Korea Said it is Willing to Talk about Denuclearization…But No One Noticed
Source: National Cyber Security – Produced By Gregory Evans There was a train wreck last week, but not a lot of people noticed, swooning as they were over the July 6 announcement that the US Department of Treasury had designated Kim Jong Un by name on a new list of…
North Korea: High-Level of Activity at Nuclear Test Site Portal but Purpose is Unclear
Source: National Cyber Security – Produced By Gregory Evans A 38 North exclusive with analysis by Joseph S. Bermudez Jr. Summary Recent commercial satellite imagery indicates a high-level of activity at North Korea’s Punggye-ri Nuclear Test Site, specifically at the North Portal area where the DPRK conducted its 2013 and…
North Korea Still Faces Significant Challenges in Developing a Sea-Launched Missile: Expert
Source: National Cyber Security – Produced By Gregory Evans North Korea conducted what appeared to be another test of a submarine-launched ballistic missile (SLBM) off the east coast on Saturday, according to South Korea’s Joint Chiefs of Staff and a report by Seoul’s Yonhap News Agency. The missile was reportedly…
6,000 strong North Korean hacker army collects $866 million per year
Source: National Cyber Security – Produced By Gregory Evans Experts in South Korea estimate that North Korea’s hacker army numbers more than 6,000 people and earns $866 million US per year through online gambling websites and cyber espionage. Officials at a South Korean information security conference yesterday warned that North…
Book Review: “North Korea’s Juche Myth”
Source: National Cyber Security – Produced By Gregory Evans North Korea’s Juche Myth By B. R. Myers. Busan: Sthele Press, August 2015. 289 pp. Analysts often invoke North Korea’s Juche ideology of “self-reliance” to explain everything from the country’s personality cult to its military belligerence. Some portray Juche as a…
North Korea’s Military Partnerships Under Threat?
Source: National Cyber Security – Produced By Gregory Evans The latest UN sanctions on the Democratic People’s Republic of Korea (DPRK) have locked the two Koreas in a war for influence on far-flung battlegrounds, from the Middle East to Africa to Latin America. Seoul, however, could inadvertently minimize any future…
Trapped in No-Man’s-Land: The Future of US Policy Toward North Korea
Source: National Cyber Security – Produced By Gregory Evans US policy toward North Korea has reached a dead end. Built upon a foundation of dubious assumptions, the Obama administration’s approach—whether called “strategic patience” or by some other name—has failed to achieve any progress toward US objectives in the region and…
Transport and energy groups targeted by North Korean hackers
Source: National Cyber Security – Produced By Gregory Evans Transport firm Hanjin Group and energy giant SK were among the 140,000 computers at 160 South Korean firms hacked by North Korea, police in Seoul revealed yesterday. North Korean hackers have stolen around 42,000 documents from South Korean firms in a…
North Korean hackers stole US fighter jet blueprints
Source: National Cyber Security – Produced By Gregory Evans As part of a years-long cyber attack, North Korean hackers have allegedly stolen 42,000 materials from South Korean organizations and government agencies, including blueprints for F-15 fighter jet wings. The hacking began in 2014 and was first detected in February, according…