Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Government Security The Military Your Rights Online

North Korea Training "Cyberwarriors" Abroad 128

jfruhlinger writes "A North Korean defector claims that the secretive totalitarian state is nurturing a team of "cyberwarriors," identifying young people with computer skills and sending them abroad to learn the latest hacking techniques, while lavishing privileges on their families at home to keep them loyal. This could lead to an escalation in tensions, especially given that the US military believes that cyberattacks from foreign countries constitute acts of war."
This discussion has been archived. No new comments can be posted.

North Korea Training "Cyberwarriors" Abroad

Comments Filter:
  • "acts of war" (Score:5, Insightful)

    by nurb432 ( 527695 ) on Wednesday June 01, 2011 @09:24PM (#36315484) Homepage Journal

    Well, if its state sponsored, i have to agree. An attack on a countries infrastructure is still war.

    • by jhoegl ( 638955 )
      Yeah... much like our "Y2K" problems in the 1990s.

      Could Cyber wars launch nukes?
      (Waits to see this on news stations everywhere)
    • Re:"acts of war" (Score:4, Insightful)

      by Chicken_Kickers ( 1062164 ) on Wednesday June 01, 2011 @10:26PM (#36315824)

      Yes, and remember citizens, if They do it, it is an act of war but if We do it, then it is cybersecurity and intelligence gathering.

      Seriously, at this point, any country not training or hiring CyberWarriors(TM) is behind the times. Except of course American media likes to be jingoistic and xenophobic, what else is new?

      • by Thing 1 ( 178996 )
        A few days ago, for the first time in my life ever, I heard an ad recruiting for the CIA on the radio. Yes, I am seriously thinking it might be time to get out, like early 1930's Germany...
    • by X.25 ( 255792 )

      Well, if its state sponsored, i have to agree. An attack on a countries infrastructure is still war.

      So, USA is in war with Pakistan for quite some time now?

    • Damn, I'm tired of holding my bladder... my popcorn could use a re-fill too. When this act of War is over, can we please have an intermission?

      Or... Wouldn't you prefer a nice game of chess?

    • by Xest ( 935314 )

      The issue is it lowers the barrier to starting a war, which may mean more wars.

      If a kid in say, Iran hacks into some US infrastructure off his own back and causes damage then with the US' venemous hate of the country, is it sensible that they then fire back with conventional weapons such as a cruise missile? Isn't that a dangerous precedent for escalation?

      Do you draw the line at whether it's state sponsored? what about when you get politicians crying state sponsorship and pushing for war when it's not?

      Hones

    • I highly doubt a man pedaling a stationary bike powering an Atari is an act of war.

    • by forrie ( 695122 )

      Based on the criteria, we'd be "at war" with nearly every modern Internet-connected government in the world.

  • The US has already got their cyber warriors in training for this. They are using the highly sophisticate program/simulation game called "Homefront"
    • Re:Don't worry (Score:5, Insightful)

      by TubeSteak ( 669689 ) on Wednesday June 01, 2011 @10:21PM (#36315788) Journal

      The US has already got their cyber warriors in training for this. They are using the highly sophisticate program/simulation game called "Homefront"

      Unfortunately for the USA, 'cyber war' is another form of asymmetrical warfare where the USA's massive budget can't help them.
      Hacker teams require relatively little in the way of resources, while allowing weak militaries to punch far above their weight.
      Worse, a country like North Korea has minimal internet exposure compared to the USA's massive reliance on the internet.

      • I'm guessing you've never heard of the game "Homefront" [homefront-game.com] about how North Korea invades the US.
      • Then the sooner we are attacked the sooner we build an immune response. Viruses and malware begat resistance by coercing countermeasures.

        What we need, and it's not "nice", is an attack that does real damage and takes down enough systems to force attention.

    • by mjwx ( 966435 )

      The US has already got their cyber warriors in training for this.

      Whenever I see the word "cyberwarrior" I tend to think "battleship". In the prelude to WWI European powers spent what would equate to tens of billions of today's pounds building battleships that were veritable floating fortresses meant to control the seas giving a decisive advantage. Battleships that spent most of WWI in dock.

      For all the talk, battleships did nothing. It wasn't until generals started thinking "how do I get around this problem" as opposed to "how many men do I have to throw at the enemy

      • by elucido ( 870205 ) *

        Cutting cables? You obviously don't know what the hell you are talking about if you don't consider the entire electromagnetic spectrum.

        If cables are cut, radiowaves, light waves, microwaves or any other mechanism can be used.

        • by mjwx ( 966435 )

          Cutting cables? You obviously don't know what the hell you are talking about if you don't consider the entire electromagnetic spectrum.

          If you think we connect vital systems by wireless you clearly don't know what the hell you're talking about.

          As soon as any threat presents itself, you simply cut off vital systems from the network. Air gap wins.

          You need to get over your raging hard on for the word "cyber warrior" and come back to reality. If transmissions cannot be secured, we'll do it the old fashio

          • by elucido ( 870205 ) *

            Cutting cables? You obviously don't know what the hell you are talking about if you don't consider the entire electromagnetic spectrum.

            If you think we connect vital systems by wireless you clearly don't know what the hell you're talking about.

            As soon as any threat presents itself, you simply cut off vital systems from the network. Air gap wins.

            You need to get over your raging hard on for the word "cyber warrior" and come back to reality. If transmissions cannot be secured, we'll do it the old fashioned way, never underestimate the bandwidth of cpl noname with a case of USB drives handcuffed to his wrist.

            Preparing for the "Cyber war" is utterly useless in an age where we cant afford the existing military pork barrel projects. Everything a "Cyber Command" does is already covered under existing cryptography units.

            The room would have to be sound proof, light proof, emissions proof, as would all the computers in that room. The air gap would be completely useless if the room leaks emissions. Also the electricity use would have to be masked in such a way so that it cannot be analyzed.

            I'm not saying I know all the precautions that the government is taking, I'm saying just disconnecting a computer from the network by cutting the cable is not enough. Any emissions leak at all will leak information which could be analyzed b

        • If cables are cut, radiowaves, light waves, microwaves or any other mechanism can be used.

          Each of these technologies requires a base station, a point of ingress into an internal network. You cant simply just beam a microwave signal into nowhere. If a country wanted to cut itself off from the internet, it would be quite easy as you can simply shut down the transmitters and outgoing routers.

          Where did you learn about wide area networking?

          Or wireless, I'm yet to see a wireless technology that did not re

          • by elucido ( 870205 ) *

            If cables are cut, radiowaves, light waves, microwaves or any other mechanism can be used.

            Each of these technologies requires a base station, a point of ingress into an internal network. You cant simply just beam a microwave signal into nowhere. If a country wanted to cut itself off from the internet, it would be quite easy as you can simply shut down the transmitters and outgoing routers.

            Where did you learn about wide area networking?

            Or wireless, I'm yet to see a wireless technology that did not require a receiver. That would a physical bit of hardware that can be shut down, well, physically.

            Countries like Thailand and China already control all the points of interconnect for data, it wouldn't be hard for the US or UK to completely isolate themselves if the need arises (they simply have more points of interconnect to send troops to). But what is more likely is that vital infrastructure is simply removed from the public grid. An air gap can easily be gated by a human. When Mil.net 1 wants to send something to Mil.net 2, the data can be loaded onto USB key, a Pvt simply moves this from the private USB slot to the public USB slot where it can be transmitted (or just carries the key over manually).

            Seriously, what do they teach people about network security these days.

            Learn about Tempest. Just because you aren't connected to the internet it doesn't mean your computers on the network are properly shielded and wont produce emissions which can easily be intercepted. Intercepted emissions in the form of light, sound, radiation, the flow of electricity, all of this can be intercepted to give an adversary an accurate picture of whats going on inside the computer.

    • A cyber team would need botnets. Good computers. Expensive software.
      Little in the way of resources? You can't even crack passwords without a decently powered computer or series of computers to do it.

      Yes you might be able to do it with a PS3 and sure it's cheaper to pay for cyber warriors than for airforce pilots or something like that, but it's cheaper on paper than it will be in practice.

      Finally it depends on the kind of attack. Not every attack requires a lot of money or resources. The expense would come

  • They are doing a war act and the universities if they are us should be ad risk of losing alot I say start at must give up all clams / must pay off any student loan debt and maybe even not being accredited any more. The people sent from there need to go into POW better then gitmo but with the risk of going to place like that if they don't give up there intel.
    • They are doing a war act and the universities if they are us should be ad risk of losing alot

      So universities shouldn't accept students from Korea? Or China?

  • by Geoffrey.landis ( 926948 ) on Wednesday June 01, 2011 @09:40PM (#36315576) Homepage

    So, the totalitarian state with a complete control of the news sends its best and most idealistic young men outside the country, to learn about the internet, with the idea that they will go back home and use their knowledge to destroy the foreign enemies.

    A fiendish plan. How could it possibly go wrong?

    • by lennier ( 44736 )

      A fiendish plan. How could it possibly go wrong?

      All those new Farmville and Mafia Wars players? I think the Internet is unprepared for an attack of that magnitude.

    • by Anonymous Coward

      Nothing, because they know if they defect or otherwise do wrong by the state then their families will be put in forced labor camps, 3 generations worth.

    • What could go wrong? Try to find someone who has lived in Korea, esp. rural area. People who can be very devoted to their principals. Family being held just in case.
    • LoL! I wonder how many post on /.?
    • I know your comment is supposed to be funny, but on the serious side I doubt these youngsters would turn on the NK regime. They're so thoroughly brainwashed they're far more likely to remain loyal to the bitter end.

    • Can't; not with their family held hostage.

    • Who says that people with programming skills necessarily represent the "best" and most idealistic of their young men? Isn't that a tad biased?
      Oh right, this is Slashdot.
  • Defector says something host country wants to hear
    Who would of thought such a thing would happen? . .
    • Defector says something host country wants to hear

      Who would of thought such a thing would happen?.

      You apparently. Only accurate information is useful. And, of course, I'm sure it would never occur to you that the information would be cross-checked? That's what I figured.....

      • Your lack of cynicism is awe inspiring
        Which story would sell more papers "North Koreans get scholarship to study computing abroad" or "North Korean CyberWarriors being train abroad"
        Only information that agrees with a predetermined position is useful (in politics anyway)
        Case in point, the information from defectors that formed the Iraqi National Congress.
        All the information was in complete disagreement with the UN weapons Inspections - Guess which group was denigrated?
        yep the one that disagreed with t
      • Accurate information is everything. Unfortunately, the British and US intelligence agencies pushed for war based on such wonderful intelligence like some poor chaps university essay, hearsay and outright lies.

        I wonder if the costly embarrassment that was the Iraq invasion could have been avoided if actual cross-checking had taken place...

        • by gtall ( 79522 )

          Actually, the U.S. Intelligence agencies pushed AGAINST war on the grounds they didn't trust the intelligence. It was the Bush administration that twisted it to promote the war. Geeze, at least get your history straight.

          • I'd love to see any actual evidence supporting your "version" of events, because thats not what I've seen - the US intelligence agencies were falling over themselves trying to supply supporting evidence to the Bush administration.

  • by betterunixthanunix ( 980855 ) on Wednesday June 01, 2011 @09:53PM (#36315670)
    Who do they think these guys are going to learn from? Most of the "hacker underground" just wants some lulz or quick and easy cash these days. If the North Koreans think they are going to get their spies in touch with the Stuxnet authors, they have another thing coming.
    • by Guppy ( 12314 )

      Who do they think these guys are going to learn from? Most of the "hacker underground" just wants some lulz or quick and easy cash these days.

      Given North Korea's perpetual shortage of hard currency, this last part may very well be exactly what they're looking for.

    • They'll probably recruit from the underground. Since the underground needs cash, North Korea would probably just offer cash for code.
      Then they'll read the code, learn to write their own code, and thats how they'll learn.

      The Stuxnet authors? You think they are the only skilled programmers? They are the skilled programmers recognized by the government, probably with clearance, but not the only skilled programmers. The North Korens can target game developers and find programmers with an equal level of skill if

  • Meanwhile, back on the home front, applicants for the US Air Force's Cyber Command are redirected to a website with no working links for which to submit their resume, ask questions, or express their interest in any meaningful way. Those who spend hours on the phone trying to track down a recruiter who actually knows the requirements will eventually be told they don't qualify because of age, their eyesight is too bad, or that a (deceased) member of their family was involved in anti-war protesting fifty years
    • by gmuslera ( 3436 ) *
      If those are obstacles for you then you are not qualified.
      • If those are obstacles for you then you are not qualified.

        Until recently, being gay made you not qualified. Do you think every barrier to entry is justified, or is it just possible that our military is being inflexible and depriving themselves of talent because of it?

        A person's age, sex, sexual orientation, poor eyesight, or even disability isn't a hinderance in this line of work: all that is required is a brain and a way of getting information in and out of it. Every asset the military deprives themselves of because of their ass-backwards recruitment policy is an

      • Of course. The entrance exam is breaking into the relevant server, and adding your name to the list of applicants.

  • by blind biker ( 1066130 ) on Wednesday June 01, 2011 @10:00PM (#36315698) Journal

    If you think the psychopathic dictators in North Korea use carrots to keep expats loyal, you're crazy. Their families are held hostage - to the extreme. These expats know full well that, should they fail to return, their families will be moved to one of many NK concentration camps [bbc.co.uk] (best scenario) or just summarily executed (more likely).

    • And remember kids, the places outside the prison camps are the "garden spots" of North Korea [globalsecurity.org], with a much better night life, and day life, or any life at all, for that matter.

  • So......do they actually let their families have electricity for a few hours a day? Maybe even give them a bit of rice every now and then?
    • They are not put to a prison camp. If their offspring defects, that privilege is revoked.
    • I doubt these North Koreans have a better choice. They either serve North Korea and their families get privileges or they don't an their families get tortured or killed.

      Since nobody knows exactly what goes on in North Korea, the privilege could be allowing them to stay alive.

  • If the Internet is going to be a theater of future conflicts, then isn't it sensible for *all* countries to have some aptitude in the area? Has the US sworn off having any "cyberwarriors" of its own? Or is there really going to be one set of rules for the US and another set of rules for the rest of the world?
    • by emt377 ( 610337 )

      If the Internet is going to be a theater of future conflicts, then isn't it sensible for *all* countries to have some aptitude in the area? Has the US sworn off having any "cyberwarriors" of its own? Or is there really going to be one set of rules for the US and another set of rules for the rest of the world?

      All countries have them, at least any first and second world, and those in the third world with the resources. Clearly if you're going to attack a country you want to lead with a disruption of their infrastructure and media. It doesn't matter if you hit a refinery with a cruise missile or shut down its computers - the result is the same, and it'll serve the same purpose.

      • The Second World were Communist Bloc countries, there is only one of those left, Cuba.

        Vietnam, Eastern Europe, the People's Republic of China, Mongolia, even Albania have moved on economically and politically.

  • If you haven't noticed yet, these people can get really good at anything they set their mind to. They have crazy work ethic, they can work themselves to death. Of course there is not much to do in North Korea other than work and sleep. And having your family hold hostage probably helps too. You do know how they identify the potential hackers? They pick them from geek forums like this.
  • Sounds like kim jun ill might have done a bit of frank herbert reading. Isn't that how the emperor kept the sardaukar loyal? by telling them that it was a test all along and that they were the best of the best, then lavish perks on them.

  • "Act of War" (Score:5, Insightful)

    by savi ( 142689 ) on Wednesday June 01, 2011 @10:43PM (#36315966)

    except when such cyber warfare is directed at Iran by a join Israel/U.S. operation. Then it's just ... uh. Definitely not war.

    • The US and Iran have been engaged in open and proxy warfare since the US Embassy Hostage Crisis in 1979. Then the Persian Gulf and Operation Preying Mantis while Iran backed Hezbollah and had the Revolutionary Guards fighting the US and France in Lebanon.

      Iran and Israel have had openly hostile relations since 1979.

      US bombing Iranian naval units, Iran blowing up embassies in Lebanon, Iran arming Hezbollah to attack Israel or Israel committing industrial sabotage against Iran, it all stems from the Islamic Re

    • More or less "cyberwarfare" is espionage. Yes, espionage can be a justification to start a war, but more often than not it'll be a diplomatic incident where everyone adversely affected pretends that they're a doe eye innocent with no spies of their own, and it's really just everyone having a good laugh at country X getting their hand caught in the cookie jar.
    • "Act of War" except when such cyber warfare is directed at Iran by a join Israel/U.S. operation. Then it's just ... uh. Definitely not war

      So, your thinking is what? That poor, peaceful Iran is being picked on? That the mean old US and Israel started a war on blameless Iran? Apart from the fact that you are speculating about the source of Stuxnet, the outrage is purely imaginary. If anything, Iran is lucky things aren't worse for it given its reckless, murderous behavior.

      Israel Seizes Cargo Ship Carrying Tons of Iranian Weapons Bound For Hamas in Gaza [liveleak.com]

      Hezbollah's stockpile bigger, deadlier [latimes.com]

      In the 2006 war, Hezbollah fired thousands of rock

  • We're technically still at war with North Korea, at least they still think we are. We're really going to get them now...
    • Actually, the state of war is officially recognized. The Korean War has not yet officially ended - while a cease-fire and an armistice were signed, a peace treaty has not, and neither side has withdrawn their declaration of war. And, as the numerous infiltration tunnels violated Article 1, Paragraphs 7-9 of the Korean Armistice Agreement, and the Yeonpyeong shelling violated Article 2, Paragraph 12, you could argue that even the armistice has been abrogated, and that a full state of war legally exists.
  • Cyberwarrior is the most ridiculous piece of psy-op, misinformation the public is bombarded with. A Cyberwarrior is no more a "Warrior" than my tea-cup poodle is a "Guard" dog. We do need skilled computer scientist, information security specialist, cryptologist, and cryptanalyst to fight against those who would stage attacks against freedom loving internet enthusiasts. But "Warriors" they are not. If you don't agree with me, then you don't agree with the dictionary either....I have no love for North Kor
    • by sco08y ( 615665 )

      Cyberwarrior is the most ridiculous piece of psy-op, misinformation the public is bombarded with. A Cyberwarrior is no more a "Warrior" than my tea-cup poodle is a "Guard" dog.

      My late grandmother actually had a tiny little poodle that successfully drove off a home invader. Not sure if it was quite teacup-sized, but it definitely earned the title guard dog.

      We do need skilled computer scientist, information security specialist, cryptologist, and cryptanalyst to fight against those who would stage attacks against freedom loving internet enthusiasts. But "Warriors" they are not. If you don't agree with me, then you don't agree with the dictionary either....I have no love for North Korea but they are only trying to protect themselves from the (US Government and Israel) which the evidence points to them as the aggressors in the Iranian Nuclear Power Plant computer virus...

      At least in the Army, the term "warrior" now tends to mean someone who is anything but. After all, everyone who actually does fight has a term for them, I was in the Cavalry, and we're all scouts or cavalry troopers or, sometimes, avatars of awesomeness, the infantry are grunts, infants, special folk, the artillery are arty, gun

      • by elucido ( 870205 ) *

        Disagree.

        A cyber warrior is as much of a warrior as a pilot or a sniper. Sure a pilot or a sniper doesn't necessarily take as much or the same kind of risk as the guy kicking in doors, but a sniper can be counter sniped. A pilot can be shot to pieces.

        A hacker can be hacked, and disappeared by counter intelligence.

        • by sco08y ( 615665 )

          Disagree.

          A cyber warrior is as much of a warrior as a pilot or a sniper. Sure a pilot or a sniper doesn't necessarily take as much or the same kind of risk as the guy kicking in doors, but a sniper can be counter sniped. A pilot can be shot to pieces.

          I didn't actually address the question of whether they were warriors or not. My point was more that the term, which was already fairly archaic, has become a meaningless buzzword.

          When there's an engagement, you generally have the combat units and everyone else. The combat units rehearse battle drills and plans and such, and everyone else's job is to get out of the way. No doubt, the support personnel shoot back when they have to, they take big risks, and their service is perfectly honorable. But their role i

          • by elucido ( 870205 ) *

            I didn't actually address the question of whether they were warriors or not. My point was more that the term, which was already fairly archaic, has become a meaningless buzzword.

            When there's an engagement, you generally have the combat units and everyone else. The combat units rehearse battle drills and plans and such, and everyone else's job is to get out of the way. No doubt, the support personnel shoot back when they have to, they take big risks, and their service is perfectly honorable. But their role is not combat oriented, and it's wrongheaded to conflate the two

            That is my point. I don't consider cyber warriors "support personnel" in an information war, I consider them to be the main unit. In these new kinds of war which don't involve conventional weapons it's pointless to think of the hacker as the support personnel. In a conventional war where you are dealing with conventional weaponry, the hackers would be the ones to disrupt enemy communication. In an unconventional war the hackers may be the main units leading the revolution, civil war, etc. They also will be

    • That is a good question. Nobody actually defines what a cyber warrior is. I assume it's any hacker or former hacker who helps the feds.

      The government needs to decide what a cyber warrior is and what their mission is. That being said anyone who risks their life and who fights in war is either a soldier or a warrior. Hackers get killed, hackers risk their lives, so they are warriors as much as anybody else, but they are information warriors.

  • In Dictatorship of North Korea : You Hack Government!

  • Also, North Korea is developing nuclear weapons. This could lead to an escalation of tensions, given that the US military believes that nuclear attacks constitute acts of war.
  • ...they should do that with some economists, and maybe try to feed their people.
  • "This could lead to an escalation in tensions, especially given that the US military believes that cyberattacks from foreign countries constitute acts of war."

    *cough CHINA cough*
  • Of course they have to send computer students to study computers in places where computers exist.
  • north korea the best korea

news: gotcha

Working...