MIL InfoWar: North Korea's Hackers Rival CIA, Expert Warns

Discussion in 'On Topic' started by Peyomp, Jun 4, 2005.

  1. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    N. Korea's Hackers Rival CIA, Expert Warns

    N. Korean Military Hackers Conduct War in Cyberspace
    A defense expert warned Thursday that North Korea’s small army of computer hackers has capacity equal that of the U.S. CIA. He said North Korea also operates some 39 bugging and surveillance posts from where it eavesdrops on communication and signals from all across South Korea.

    Dr. Byeon Jae-jeong of the Defense Ministry's Agency for Defense Development (ADD) made the claims in a presentation for the 2005 Defense Information Protection Conference, held at Korea University under the joint auspices of the Defense Security Command, Korea University and Korea Information Security Agency.

    In a lecture on Defense Ministry responses to information warfare, Byeon said, "Simulations on North Korea's information warfare capabilities reveal that Pyongyang could damage the command and control center of U.S. Pacific Command and the power grid of the U.S. mainland."

    Byeon said Pyongyang employs 500-600 hackers who are tasked with hacking into computer networks and disabling enemy command and communication systems. North Korea researches hacking techniques at Mirim Automation College, a five-year school that has been turning out about 100 cyber warfare specialists a year since 1981.

    The defense expert said Pyongyang conducts cyber warfare through the Internet servers of many countries including the U.S. and picks up signals from across South Korea from its surveillance posts. Korea's powerful neighbors China, Japan and Russia are also strengthening their information warfare capabilities, he said, citing China’s creation of a 100-man computer virus unit in 1997 and a hacking unit in 1999.

    ([email protected] )


    How many of you military boys are 31337? :mamoru:
     
  2. brackac

    brackac Fuck all of this. OT Supporter

    Joined:
    Jul 16, 2001
    Messages:
    105,381
    Likes Received:
    165
    One properly placed bomb solves that.
     
  3. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    Not if the worms are already unleashed on the networks.
     
  4. Sammo

    Sammo New Member

    Joined:
    Jan 5, 2005
    Messages:
    43,376
    Likes Received:
    0
    Location:
    Southern Canada
    I was always wondering how able the U.S. military was in "hacking" and "cyberspace", at least compared to countries like China or North Korea.

    Hopefully the U.S. still has some capable people under their belt for this sort of thing.
     
  5. Ranger-AO

    Ranger-AO I'm here for the Taliban party. Moderator

    Joined:
    Nov 23, 2004
    Messages:
    34,662
    Likes Received:
    150
    Location:
    the places in between
    I don't think the military maintains a large cadre of elite hackers. I think that's more along the lines of the CIA, NSA, and other 3-letter organizations.

    Peyomp - do you have a link to that story?
     
  6. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    Yeah, if you have text to a story, just paste the first line in google, or google news and you got it. I forgot to post the link on this one.

    And actually, I know there is a military organization that does this stuff... I just can't remember what its called or who runs it. If you want, I can research it. My aim is to draw more computer dorks in here, to broaden appeal.
     
  7. Ranger-AO

    Ranger-AO I'm here for the Taliban party. Moderator

    Joined:
    Nov 23, 2004
    Messages:
    34,662
    Likes Received:
    150
    Location:
    the places in between
    Providing a link to a source is a common courtesy. Not providing a link, especially in a politically charged thread, always brings up a red flag to me. I am not going to go searching for a source in every thread Peyomp creates.
     
  8. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    Peyomp is quite curteous in that he provides a link in every article he curteously posts. Peyomp forgot in this one. Peyomp now curteously points out that in this case, posting a quetion for a source took just as much time as finding it would have. :big grin:
     
  9. Ranger-AO

    Ranger-AO I'm here for the Taliban party. Moderator

    Joined:
    Nov 23, 2004
    Messages:
    34,662
    Likes Received:
    150
    Location:
    the places in between
    Don't get your panties in a twist. :mamoru:

    And I've asked for links in a couple of your posts. :fawk:
     
  10. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
  11. Soren

    Soren OT Supporter

    Joined:
    Oct 9, 2002
    Messages:
    37,552
    Likes Received:
    5
    how can north korea's hackers rival the CIA?

    north korea is cut off from the world. I mean, just in terms of stuff the CIA (or any american with a PC) has access to in terms of material... please.
     
  12. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    I'm not sure the article is credible but:

    1) They do have the internet in N.K. and if they made for instance a worm that exploited every known security hole known to the open community... it would be a real pain in the ass. They could released it over dialup.

    2) They can infiltrate the south, and work from there.

    3) The CIA probably doesn't do much hacking.

    4) The hackers wouldnt' be cut off from the world... they'd be right up to date like good script kiddies.
     
  13. Ranger-AO

    Ranger-AO I'm here for the Taliban party. Moderator

    Joined:
    Nov 23, 2004
    Messages:
    34,662
    Likes Received:
    150
    Location:
    the places in between
    :ugh:
     
  14. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    I'm surprised at you,sir. NSA. Know what that stands for? They do foriegn electronic surveillance. The CIA does the human source stuff, and the interpretting of the gathered intelligence.

    As to attack capability, its the military. Which the article I pointed out talks about.

    Don't they go over this in basic? :ugh:

    :bigthumb:
     
  15. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    Yessir... I was being silly.
     
  16. Fearan

    Fearan Guest

    Why isn't a communist state allowed to have some kickass hackers? If the U.S. is opening itself up to attacks due to insecure networks, well that really isn't NKs fault?
     
  17. Peyomp

    Peyomp New Member

    Joined:
    Jan 11, 2002
    Messages:
    14,017
    Likes Received:
    0
    They are allowed. Its just interesting because potentially, they could disrupt the American economy for some days/weeks, while engaging in other terrorist/nuclear war activities. It becomes even more interesting, the more the world comes to depend on the internet.

    We can have an overwhelmingly dominant army... but we're still vulnerable is our stock exchange can be haxored. What would happen to America if 50% of all hard drives got wiped tomorrow?
     

Share This Page