Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hackers use N. Korean tweets to call for uprising
#1
I wonder who was responsible for this?

Answers on a postcard addressed to an address in Virginia please...

Hackers use N. Korean tweets to call for uprising

Quote:By Chico Harlan
Sunday, January 9, 2011
BEIJING - Apparently breached by hackers, North Korea's official Twitter account on Saturday described leader Kim Jong Il and heir apparent Kim Jong Eun as sworn enemies and called for an uprising to remove them from power.

By the time the micro-blogging mischief was over, the North Korean tweets had ranted to its 10,000-plus Twitter followers about profligate nuclear weapons spending and lavish Kim Jong Il drinking parties - hosted "while 3 million people are starving and freezing to death." A video also had been posted on North Korea's official YouTube channel that showed a caricature of Kim Jong Eun driving in a luxury sports car, running over women and children on the side of the road.

Because North Korea permits Internet access only to its most privileged citizens, the cyber attack caused minimal, if any, damage to the propaganda-built personality cult of the Dear Leader, whom Pyongyang, on un-hacked days, describes as a "a general sent from heaven." But for those who operate North Korea's growing social media efforts, the attack is likely to cause embarrassment, as it coincided with the birthday of the chosen successor, Kim Jong Eun.

Although it remains uncertain who coordinated the breach, South Korean citizen media Web sites and the South's Yonhap news agency attributed the scheme to South Korean hackers.

One tweet from Saturday, as translated by Yonhap, read: "Let's create a new world by rooting out our people's sworn enemy Kim Jong Il and his son Kim Jong Eun!"

Hours after the attack, the Twitter messages were still available from Pyongyang's account, @Uriminzok. But a related state-sponsored Web site, http://www.uriminzokkiri.com - the closest thing North Korea has to a home page - was out of commission.

Pyongyang maintains fierce control over information, but experts say the government devotes substantial resources to IT training, and the South Korean Defense Ministry has warned of the North's network of sophisticated hackers.

The North Korean government dove into the social media world last summer, creating state-sanctioned accounts on Twitter and, temporarily, Facebook. It tends to use the Web to denounce South Korean and U.S. policies and to praise its leadership.

Washington reacted largely with amusement at the time, with State Department spokesman P.J. Crowley tweeting, "The North Korean government has joined Twitter, but is it prepared to allow its citizens to be connected as well?" But Seoul takes a hard stance against pro-Communist materials, blocking most North Korean Web sites and threatening jail for those who break around the firewall. Soon, in South Korea, Pyongyang's social media sites were blocked as well.

The online battle between the neighbors comes as Pyongyang has appealed for lowered tensions and reconciliation. On Saturday, it asked for bilateral dialogue within the next month, requesting "unconditional and early" talks.

South Korea rejected a similar offer last week, skeptical of the North's intentions. Officials in Seoul have asked that the North promise good behavior - perhaps apologizing for previous provocations - before the sides talk.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Call of Duty Director: US Troops Should Occupy Public Schools Tracy Riddle 3 3,290 06-10-2014, 10:25 AM
Last Post: Magda Hassan
  Hackers take down IAEA server Magda Hassan 1 2,563 29-11-2012, 09:22 PM
Last Post: Peter Lemkin
  Five Dead at Korean Christian College shooting, Oakland, CA Lauren Johnson 1 2,787 03-04-2012, 05:50 AM
Last Post: Peter Lemkin
  Hackers expose defence and intelligence officials in US and UK Magda Hassan 1 3,036 09-01-2012, 11:44 AM
Last Post: Peter Lemkin
  “Care, Custody & Dominion”, or “I’ll have my IG call Your IG” Ed Jewett 1 2,775 27-10-2011, 04:30 AM
Last Post: Ed Jewett
  Hackers steal SSL certificates for CIA, MI6, Mossad Magda Hassan 1 3,507 06-09-2011, 09:22 AM
Last Post: Peter Lemkin
  Georgian North Korean arms transport plane part of CIA sting operation Magda Hassan 0 3,389 24-12-2009, 12:09 PM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)