North Korean Leader Has His Own Cellular Network

kim-jong-un-smartphone.jpg

Kim Jong Un and other high-ranking officials in North Korea have their own cellular network to help keep their conversations secure, according to a former telecommunications engineer who worked in the country. 

The network was built to keep their conversations off the public cellular network and is a result of sanctions that prevent encryption technologies from being exported to the country, said Ahmed El-Noamany, a former senior technical director at North Korean cellular network Koryolink in an interview published on Thursday by the NK News website.

Koryolink is a joint venture between Egypt's Orascom Telecom and Media Technology (OTMT) and the North Korean government. It launched a 3G cellular network in 2009 that has gone on to attract around 2.5 million subscriptions -- about 10 percent of North Korea's population.
"They have another network for the VIPs that is totally separated from everything … a 3G network that is not accessible to normal users," El-Noamany told NK News.

The engineer, who worked in North Korea from 2011 to late 2013, said the network was built this way because sanctions prevented the export of encryption technology to North Korea. To overcome this, the country built a separate network.
"This is a special network which has its own things -- own algorithms, own operating system, own everything," he said.
His comments add somewhat to the mystery surrounding North Korea's complex telecommunications system.
The country runs a two-tier network with most subscribers only able to make and receive calls from domestic numbers. At the second tier, which includes lines at places like foreign embassies, international connectivity is offered but domestic calls are blocked.

The system is part of North Korea's strict controls that attempt to prevent information coming into the country from overseas. Both the fixed-line and cellular networks have the same two-tier structure. From cellphones, a network search inside Pyongyang reveals two networks, said Kazuteru Tamura, a Japanese journalist who has spent time investigating the system.
One network is accessible from cell phones with local SIM cards and the other from phones with SIM cards sold to tourists and foreign residents. Observers have assumed the two networks were all that were available in the country, and El-Noamany's comments question that assumption.

Recently, a competing cellular operator owned by the North Korean government began competing with Koryolink. It's unknown how or if the new network is related to that private government network mentioned in the interview.
North Korea maintains one of the strictest policies of control on information and people of any country on the planet. Most citizens are unable to travel overseas and even domestic travel is heavily restricted, with permission needed to enter the capital city of Pyongyang. Thousands of North Koreans have risked death to escape the country.

NK News: http://bit.ly/1KnM2A5

Computerworld: http://bit.ly/1Y846UX

« Five Months After the OPM Attack.
Iran and Saudi Marching To Cyber War! »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

Lightpath

Lightpath

Lightpath is revolutionizing how organizations connect to their digital destinations by combining our next-generation network with our next-generation customer service.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

SoteriaSec

SoteriaSec

SoteriaSec is a premier cybersecurity firm providing comprehensive digital forensics and incident response services.