WHAT IS GENOCIDE? Worldwide slavery, internment and work camps, slave labor, concentration and death camps. Sex trafficking and worldwide sexual slavery. Not since the Holocaust has there been so many "little schools" and concentration camps in outlying areas of the world. In Alaska, there's a place near railroads where jobs for the military "were" planned for a million bed mental facility. Be serious about opposing things; join us if you can!
Thursday, May 28, 2015
What if somebody controls say, nuclear weapons firing devices via computer?
North Korean hackers are capable of attacks that could destroy critical infrastructure and even kill people, a high-profile defector has warned.
Speaking exclusively to BBC Click, Prof Kim Heung-Kwang said the country had around 6,000 trained military hackers.
The warning follows last year's Sony Pictures hack - an attack attributed to North Korea.
Korean technology expert Martyn Williams stressed the threat was only "theoretical".
Prof Kim has called for international organisations to step in to prevent North Korea launching more severe attacks.
For 20 years Prof Kim taught computer science at Hamheung Computer Technology University, before escaping the country in 2004.
While Prof Kim did not teach hacking techniques, his former students have gone on to form North Korea's notorious hacking unit Bureau 121.
The bureau, which is widely believed to operate out of China, has been credited for numerous hacks.
Many of the attacks are said to have been aimed specifically at South Korean infrastructure, such as power plants and banks.
Speaking at a location just outside the South Korean capital, Prof Kim told the BBC he has regular contact with key figures within the country who have intimate knowledge of the military's cyber operation.
"The size of the cyber-attack agency has increased significantly, and now has approximately 6,000 people," he said.
He estimated that between 10% to 20% of the regime's military budget is being spent on online operations.
"The reason North Korea has been harassing other countries is to demonstrate that North Korea has cyber war capacity," he added.
"Their cyber-attacks could have similar impacts as military attacks, killing people and destroying cities."
Speaking more specifically, Prof Kim said North Korea was building its own malware based on Stuxnet - a hack attack, widely attributed to the US and Israel, which struck Iranian nuclear centrifuges before being discovered in 2010.
"[A Stuxnet-style attack] designed to destroy a city has been prepared by North Korea and is a feasible threat," Prof Kim said.
Earlier this year, the South Korean government blamed North Korea for a hack on the country's Hydro and Nuclear Power Plant.
"Although the nuclear plant was not compromised by the attack, if the computer system controlling the nuclear reactor was compromised, the consequences could be unimaginably severe and cause extensive casualties," Prof Kim said.
Martyn Williams is a journalist who follows closely the development of technology in North Korea.
He told the BBC: "I think it's important to underline that this is theoretical and possible from non-North Korean hackers too.
"It's conceivable that hackers would try something and lives could be at risk.
He noted an attack in 2003 on South Korean broadcasters, which he said was "an attempt to throw the country into confusion".
"If TV had gone off air and then ATMs stopped working, people might have panicked."
'Off the internet'
Prof Kim has called on international organisations to take action over North Korea's cyber-activity.
"We need to collect the evidence of North Korea's cyber terrorism and report them to UN Human Rights Council and other UN agencies," he told the BBC.
"If North Korea continues to cause damage in this way, an organisation such as Icann should ban North Korea."
Icann - the Internet Corporation for Assigned Names and Numbers - manages the distribution of domain name including .com and .net.
It could, theoretically, shut down the use of North Korea's domain, .kp.
In a statement, Icann said its powers in this regard were limited.
"Icann does not have the power, nor remit, to ban countries from having a presence on or access to the Internet," said Duncan Burns, its head of communications.
"Icann's primary role is the coordination of the internet's unique identifiers to ensure the stability, security and resiliency of the internet.
"We rely on law enforcement and governmental regulatory agencies to police reported illegal activity."
Furthermore, disabling .kp would have minimal effect if, as is widely believed, much of North Korea's hacking force conducts its operations outside of the country.
Other measures, such as sanctions imposed by the US in the wake of the Sony Pictures hack, might have a greater impact.
But Prof Kim added: "This issue can't be solved by one or two countries.
"The international community needs to pay attention to North Korea's attempts to destroy the internet."
I am on the Internet as an affordable, Amazon and NYT bestselling ghostwriter, copyeditor and proofreader of books, and have performed many other types of freelance and contracted writing jobs. I usually take credit as the “editor” when I ghostwrite for an author, and my fees are often lower than standard rates for most professional ghosts, rewriters, book coaches, copyeditors, manuscript formatters and proofreaders.
Please Google: Ghost Writer, Inc. at www.rainbowriting.com . We do affordable freelance ghostwriting, copyediting, proofreading, analysis and professional formatting for books, memoirs and screenplays, and we do other writing-related services for reasonable prices. Recently, we are offering lyrics and music ghost writing, and a wider range of editing services. GWI’s partners do full scale marketing, promotions, sales and publication services. We may be able to arrange a TV show, film, video or movie to be made from your book, and we can arrange professional services that present and pitch your work to major TV and film industry executives.