North Korean Leader Has His Own Cellular Network

kim-jong-un-smartphone.jpg

Kim Jong Un and other high-ranking officials in North Korea have their own cellular network to help keep their conversations secure, according to a former telecommunications engineer who worked in the country. 

The network was built to keep their conversations off the public cellular network and is a result of sanctions that prevent encryption technologies from being exported to the country, said Ahmed El-Noamany, a former senior technical director at North Korean cellular network Koryolink in an interview published on Thursday by the NK News website.

Koryolink is a joint venture between Egypt's Orascom Telecom and Media Technology (OTMT) and the North Korean government. It launched a 3G cellular network in 2009 that has gone on to attract around 2.5 million subscriptions -- about 10 percent of North Korea's population.
"They have another network for the VIPs that is totally separated from everything … a 3G network that is not accessible to normal users," El-Noamany told NK News.

The engineer, who worked in North Korea from 2011 to late 2013, said the network was built this way because sanctions prevented the export of encryption technology to North Korea. To overcome this, the country built a separate network.
"This is a special network which has its own things -- own algorithms, own operating system, own everything," he said.
His comments add somewhat to the mystery surrounding North Korea's complex telecommunications system.
The country runs a two-tier network with most subscribers only able to make and receive calls from domestic numbers. At the second tier, which includes lines at places like foreign embassies, international connectivity is offered but domestic calls are blocked.

The system is part of North Korea's strict controls that attempt to prevent information coming into the country from overseas. Both the fixed-line and cellular networks have the same two-tier structure. From cellphones, a network search inside Pyongyang reveals two networks, said Kazuteru Tamura, a Japanese journalist who has spent time investigating the system.
One network is accessible from cell phones with local SIM cards and the other from phones with SIM cards sold to tourists and foreign residents. Observers have assumed the two networks were all that were available in the country, and El-Noamany's comments question that assumption.

Recently, a competing cellular operator owned by the North Korean government began competing with Koryolink. It's unknown how or if the new network is related to that private government network mentioned in the interview.
North Korea maintains one of the strictest policies of control on information and people of any country on the planet. Most citizens are unable to travel overseas and even domestic travel is heavily restricted, with permission needed to enter the capital city of Pyongyang. Thousands of North Koreans have risked death to escape the country.

NK News: http://bit.ly/1KnM2A5

Computerworld: http://bit.ly/1Y846UX

« Five Months After the OPM Attack.
Iran and Saudi Marching To Cyber War! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.