North Korean Leader Has His Own Cellular Network

kim-jong-un-smartphone.jpg

Kim Jong Un and other high-ranking officials in North Korea have their own cellular network to help keep their conversations secure, according to a former telecommunications engineer who worked in the country. 

The network was built to keep their conversations off the public cellular network and is a result of sanctions that prevent encryption technologies from being exported to the country, said Ahmed El-Noamany, a former senior technical director at North Korean cellular network Koryolink in an interview published on Thursday by the NK News website.

Koryolink is a joint venture between Egypt's Orascom Telecom and Media Technology (OTMT) and the North Korean government. It launched a 3G cellular network in 2009 that has gone on to attract around 2.5 million subscriptions -- about 10 percent of North Korea's population.
"They have another network for the VIPs that is totally separated from everything … a 3G network that is not accessible to normal users," El-Noamany told NK News.

The engineer, who worked in North Korea from 2011 to late 2013, said the network was built this way because sanctions prevented the export of encryption technology to North Korea. To overcome this, the country built a separate network.
"This is a special network which has its own things -- own algorithms, own operating system, own everything," he said.
His comments add somewhat to the mystery surrounding North Korea's complex telecommunications system.
The country runs a two-tier network with most subscribers only able to make and receive calls from domestic numbers. At the second tier, which includes lines at places like foreign embassies, international connectivity is offered but domestic calls are blocked.

The system is part of North Korea's strict controls that attempt to prevent information coming into the country from overseas. Both the fixed-line and cellular networks have the same two-tier structure. From cellphones, a network search inside Pyongyang reveals two networks, said Kazuteru Tamura, a Japanese journalist who has spent time investigating the system.
One network is accessible from cell phones with local SIM cards and the other from phones with SIM cards sold to tourists and foreign residents. Observers have assumed the two networks were all that were available in the country, and El-Noamany's comments question that assumption.

Recently, a competing cellular operator owned by the North Korean government began competing with Koryolink. It's unknown how or if the new network is related to that private government network mentioned in the interview.
North Korea maintains one of the strictest policies of control on information and people of any country on the planet. Most citizens are unable to travel overseas and even domestic travel is heavily restricted, with permission needed to enter the capital city of Pyongyang. Thousands of North Koreans have risked death to escape the country.

NK News: http://bit.ly/1KnM2A5

Computerworld: http://bit.ly/1Y846UX

« Five Months After the OPM Attack.
Iran and Saudi Marching To Cyber War! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.