North Korea Hackers Steal War Plans, Kim Jong-Un Assassination Details

While tensions with North Korea have receded in recent weeks, and especially following the latest uneventful weekend, when markets were on edge that Kim could try another missile test launch to celebrate the country's national holiday, this could reverse following news from the BBC that North Korea hackers have reportedly stolen a large cache of military documents from South Korea, including a plan to assassinate North Korea's leader Kim Jong-un.

According to South Korean lawmaker Rhee Cheol-hee - a member of South Korea's ruling party who sits on its parliament's defence committee - the compromised documents, which were stolen from the country's defense ministry, include wartime contingency plans created by the US and South Korea, and also include reports to the allies' senior commanders. Plans for the South's special forces are also said to have been accessed, along with information on significant power plants and military facilities in the South.

Rhee also said some 235 gigabytes of military documents had been stolen from the Defence Integrated Data Centre, and that 80% of them have yet to be identified.

Just like in the case of Equifax, the breach itself took place long ago, with South Korea waiting over a year to disclose the full details of the the hack which took place in September last year. In May, South Korea said a large amount of data had been stolen and that North Korea may have instigated the cyber attack - but gave no details of what was taken. The South Korean defence ministry has so far refused to comment about the allegation, while North Korea denied the claim.

According to South Korea's Yonhap news agency reports that Seoul has been subject to a barrage of cyber attacks by its communist neighbour in recent years, with many targeting government websites and facilities. According to long-running media reports, which have yet to be confirmed with hard evidence however, the isolated, backward state is believed to have specially-trained hackers based overseas, including in China.

One thing that's certain, is that tews that Pyongyang is "likely to have accessed the Seoul-Washington plans for all-out war" in the Koreas will do nothing to soothe tensions between the US and North Korea. The two nations have been at verbal loggerheads over the North's nuclear activities, with the US pressing for a halt to missile tests and Pyongyang vowing to continue them.

Meanwhile, away from cyber war, Pyongyang has been far more aggressive in the realm of unconventional warfare, and the North recently claimed to have successfully tested a miniaturised hydrogen bomb, which could be loaded onto a long-range missile. In a speech at the UN in September, US President Donald Trump threatened to destroy North Korea if it menaced the US or its allies, and said its leader "is on a suicide mission".

Kim responded with a rare televized statement, vowing to "tame the mentally deranged US dotard with fire". Trump's latest comment took the form of a cryptic tweet at the weekend, where he warned that "only one thing will work" in dealing with North Korea, after years of talks had proved fruitless. He did not elaborate further.


Slack Jack YUNOSELL Tue, 10/10/2017 - 18:43 Permalink

Engdahl says Kim Jong Un is false opposition.

Engdahl says that Kim Jong Un lived in Switzerland from 1991 until 2000. He attended the Liebefeld Steinhölzli school in Köniz near Bern. The strongest hint that Kim Jong Un is a "Pentagon" puppet and not a communist (Chinese) puppet is that he had China's best friend in Pyongyang, Jang Sung-taek, executed. He also ordered the systematic execution of all other members of Jang's family including children and grandchildren (and others that were considered too close to China).

Other hints are that he is usefully (to the US) provocative and doesn't seem to listen to China.

Engdahl also thinks North Korea is an Pentagon Vassal State, but it seems more likely that Kim Jong Un is indeed a "Pentagon" man but that North Korea is (i.e., will be treated as) an enemy state.…

Remember: The first rule for fighting a (real) war is to place your own puppet as the leader of the enemy.

Also, one should not forget that Trump, Obama, Bush and Clinton are all Jews.

And as an example of how real wars are fought,....

Proof that Adolf Hitler was a double agent.

It seems pretty weird when you first read it, but its clearly true.

In reply to by YUNOSELL

lew1024 Slack Jack Tue, 10/10/2017 - 22:34 Permalink

I upvoted you for the first half of the comment. Engdahl is reality-based, except for thinking the Tianamen Square massacre didn't happen. I had a Chinese gf for a while who was a physician in a nearby hospital.  She wouldn't say how many, but said the hospital was filled with bodies. Otherwise, Engdahl's is a reasonable argument, and the CIA would not have passed up the opportunity to influence Kim at some point in his life.If nothing else, depend on it, NK's exports of crystal meth pass through the CIA, an obvious benefit and excusable as a means of influencing Kim. Also, NK doesn't have the economy or number of people needed to develop a couple of generations of ICBMs, fission and fusion bombs in several versions, maintain a 2million person army with half of the population in some military formation, submarines and ... simultaneously. Who is helping NK? One strongly suspects Israel is one of those suppliers as they have been for every other country in the world, thus another input to keep the MIC well-supplied with a bellicose midget enemy.Would have downvoted for the 2nd, had I read it first. Not reality based.

In reply to by Slack Jack

researchfix Cynicles II Tue, 10/10/2017 - 13:52 Permalink

I think he has a right to have his own hairstyle. And I am quite disappointed that it is such a big theme here. Not quite a proof of a forum of people of intellect. But maybe proof of a big group of users here, who are afraid of the Eurasian development (= yankees out of Asia) which will bring their lifestyle down to reality for lack of plastic and paper credit. And now downvotes pls, I want to know if I hit the button.

In reply to by Cynicles II

PT IH8OBAMA Tue, 10/10/2017 - 14:15 Permalink

North Korean Hackers???  How do we know it wasn't Russian Hackers?  Is it still too early for Syrian Hackers and Iranian Hackers?  Damn!  I must have skipped ahead a couple of pages in the play book.Alternative Headline:  "US IT Security 'Experts' Are A Bunch Of Dumbasses."Alternative Alternative Headline:  "We Can't Be Bothered Hiring A Decent Script Writer For Our Theatre (or perhaps all the good ones have scruples)."

In reply to by IH8OBAMA

PT PT Tue, 10/10/2017 - 14:18 Permalink

So if the US IT Security "Experts" can't stop hackers, does that mean that Public Key Encryption does not work?How safe is all the electronic money in the world?Or are they just trying to create some "plausible deniability" (I use that phrase VERY loosely) for all the crimes they are about to commit?

In reply to by PT

lew1024 PT Tue, 10/10/2017 - 22:57 Permalink

No, there are 3 classes of weaknesses.First is configuration, allowing packets through firewalls and ports open on computers. That allows attacking more of the total software 'surface', and things normally hidden aren't as well tested.Second is software bugs.  It isn't possible to eliminate them, and there are methods to exploit some of the many classes of bugs, e.g. buffer overflows.Third is passwords.  Most of the security protocols and password access mechanisms use standard hashes and one of the half-dozen ciphers. All of the ciphers are small enough to be unrolled in pipelined hardware so that many passwords can be tested against an ecrypted file. It is often possible to tell which cipher is used from encrypted files.This explains the math of testing passwords, sounds hopeless, right?  But it is the big weakness, the one that NSA exploits. Snowden told Poitras to assume that NSA can test 1T passwords / second against her encrypted files., the crypto.  Current codes are unbreakable, which is why NSA wants you to use a small subset of them.  If you do, they can attack the password : people aren’t good at passwords, and NSA can apply 1 trillion passwords a second to your document via their high performance decryption hardware.  Do you have the slightest idea how pitiful your imagination is compared to 1 trillion?  1 trillion is 10,000 variations of each item in all dictionary words and all the place names and all scientific and technical terms and jargon and all the scraps of poetry people remember and use in their passwords for each of ~25 languages.  It might take 10 seconds to cover the world’s 250 major languages.  Clever passwords likely aren’t.QED : NSA cannot read traffic or encrypted storage contents if sender and receiver manage their network and cryptographic security well.  Doing that is discipline and detail, much of which can be automated.This for good passwords, but the fact is, nearly nobody uses good passwords, meaning NSA reads any files it wants from civilians. Serious systems don't generate the key from passwords, so it is unlikely they get much of that traffic.…, they have specialized computers to work back up the logic tree, what every bit in the encrypted file must mean about the key, given the probability of a particular bit at that location in files from that source. Academic researchers often find weaknesses in ciphers already known to professionals, so I would not use any standard cipher, if I were being serious about crypto.

In reply to by PT

shizzledizzle NugginFuts Tue, 10/10/2017 - 13:23 Permalink

Depends, I was watching a program a while back about how NORAD decided not to upgrade the missile bases because the technology is obsolite. Old 12" floppy disks and basicly VIC20 level processors... The upside is no one is going to plug a USB drive in and infect the system and it doesn't really have any external connections (I.E. internet). Obsolite becomes a security feature. So long as it still functions why open the door to hackers?

In reply to by NugginFuts

rejected GeezerGeek Tue, 10/10/2017 - 14:33 Permalink

Yes,,, Saddam tried to challenge chicken hawk baby Bush to a dual to settle things in a manly way. LOL. Of course baby Bush being the pussy he is declined and sent in the military. And somehow Americans were proud and held their heads high that the American military was able to defeat a 4th rate power. Now with North Korea there's a lot of bravado bark from the US and it's South Korean and Japanese colonies,,, but no bite as yet.Yes, Absolutely no doubt the exceptional demockracy can win, if that's what you want to call it,  a Nuke exchange with North Korea but there's pretty good odds that a heavy price will have to be payed. Millions may likely die. Never know,,, Kim might even get lucky and bag a US city.

In reply to by GeezerGeek

CRM114 Snaffew Tue, 10/10/2017 - 13:50 Permalink

'tis if it keeps hiring contractors instead of full time staff on full benefits. The UK MoD is already lacking a clue and a paddle.You see, the thing about the meek, spouse, two kids and a dog middle class is that they do their job properly and go home, and they are a bit more expensive than  zero hours contract labor/illegal immigrant slaves - until you get betrayed, let down, f#cked over or otherwise ruined by the latter. In the long run, good middle-class workers are cheaper.

In reply to by Snaffew

Edward Morbius Tue, 10/10/2017 - 13:10 Permalink

You can consider anything that is available on the Internet or connected to it somehow to be compromised. Just pull the fucking plug out of the wall and bada bing bada boom, the problem goes away.