North Korean Leader Has His Own Cellular Network

kim-jong-un-smartphone.jpg

Kim Jong Un and other high-ranking officials in North Korea have their own cellular network to help keep their conversations secure, according to a former telecommunications engineer who worked in the country. 

The network was built to keep their conversations off the public cellular network and is a result of sanctions that prevent encryption technologies from being exported to the country, said Ahmed El-Noamany, a former senior technical director at North Korean cellular network Koryolink in an interview published on Thursday by the NK News website.

Koryolink is a joint venture between Egypt's Orascom Telecom and Media Technology (OTMT) and the North Korean government. It launched a 3G cellular network in 2009 that has gone on to attract around 2.5 million subscriptions -- about 10 percent of North Korea's population.
"They have another network for the VIPs that is totally separated from everything … a 3G network that is not accessible to normal users," El-Noamany told NK News.

The engineer, who worked in North Korea from 2011 to late 2013, said the network was built this way because sanctions prevented the export of encryption technology to North Korea. To overcome this, the country built a separate network.
"This is a special network which has its own things -- own algorithms, own operating system, own everything," he said.
His comments add somewhat to the mystery surrounding North Korea's complex telecommunications system.
The country runs a two-tier network with most subscribers only able to make and receive calls from domestic numbers. At the second tier, which includes lines at places like foreign embassies, international connectivity is offered but domestic calls are blocked.

The system is part of North Korea's strict controls that attempt to prevent information coming into the country from overseas. Both the fixed-line and cellular networks have the same two-tier structure. From cellphones, a network search inside Pyongyang reveals two networks, said Kazuteru Tamura, a Japanese journalist who has spent time investigating the system.
One network is accessible from cell phones with local SIM cards and the other from phones with SIM cards sold to tourists and foreign residents. Observers have assumed the two networks were all that were available in the country, and El-Noamany's comments question that assumption.

Recently, a competing cellular operator owned by the North Korean government began competing with Koryolink. It's unknown how or if the new network is related to that private government network mentioned in the interview.
North Korea maintains one of the strictest policies of control on information and people of any country on the planet. Most citizens are unable to travel overseas and even domestic travel is heavily restricted, with permission needed to enter the capital city of Pyongyang. Thousands of North Koreans have risked death to escape the country.

NK News: http://bit.ly/1KnM2A5

Computerworld: http://bit.ly/1Y846UX

« Five Months After the OPM Attack.
Iran and Saudi Marching To Cyber War! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.