Information Technology and Control in the DPRK

By Robert Duffley
Cornell International Affairs Review
2011, Vol. 5 No. 1 | pg. 2/2 |

In the mobile phones sector, the scenario is much the same. South Korean unification minister Um Jong-Sik cited in 2010 that the North currently had an estimated 450,000 cell phone users.17 As documented above, these phones are limited to use within the country and can only access the domestic intranet. However, their popularity and the industry’s rapid growth (the number of Korean cell phone users rose 50% from 2009-2010)18 demonstrate that, again, there is a definite demand for, and growing familiarity with, these communications products.

Importantly, it is this familiarity that holds daunting possibilities for the regime’s future security. These technologies were originally allowed because they were restricted to DPRK-only use, with no possibility for connection to the opposite world. These restrictions work – there is no way to reconfigure a Koryolink phone to dial internationally or to connect to the Internet from within Kwang Myong. But because these products are simulacra of products popular in the outside world, their operation is almost identical. If someone familiar with the workings of a Red Star computer were granted access to, say, a Chinese or South Korean computer, he would be familiar enough with the technology that he could work it. By the same token, anyone with mobile phone know-how honed by practice with domestic products would also be quite prepared to use foreign phones with unrestricted capabilities. With 450,000 cell phone users in the country at the time of writing, this familiarity would be hard to stamp out even if the regime changed its mind.

As use expands, it is experience with these products and not their Juche manifestations that marks IT’s biggest threat to the Korean regime. These risks have already been realized in several cases. Most prominently, North Korean informers have recently come to use their domestic phone knowledge to send information via Chinese cell phones, which have no Jucheinspired restrictions. Smuggled at great risk through the North Korea-China border, the phones operate on prepaid SIM cards capable of calling and texting defectors working to collect information from China. When used near the Chinese border, these phones are even said to be able to receive Chinese internet signals.19 Information from the users of these cell phones has been revealing and important. According to one New York Times article, news from these informants constituted the first information about North Korean outrage over the currency reevaluation enacted in 2009.20

Students working in the Grand People’s Study House.

Students working in the Grand People’s Study House.

Before cell phones, there were indeed defectors who came to China or the South bearing important information about happenings in the DPRK. But the two-way properties of the internet, with informers in the country reporting to defectors on the outside, is a truly revolutionary development.

In previous cases, defectors could only provide what information they could bring with them when they exited the country, and returning as a spy was almost completely out of the question. Now, however, thanks to this technology, these networks have constant updates from within the country, which can continue indefinitely. It is estimated that as many as 1,000 of these smuggled phones are currently in use within the DPRK.21 The reports come from individuals not likely to have any special knowledge about or access to North Korea’s gravest threats to the outside, such as its nuclear program or the question of Kim Jong-Il’s successor, but the mere presence of reports from within the country is a major change from only a few years prior.

The regime is aware of these threats. Smuggling across the Chinese border has been a problem before the rise of cell phones, but this new commodity has prompted speculation and the implementation of policies that appear anticipate a crackdown. In the wake of the recent revolutions in Egypt and Tunisia, in which cell phones and internet technology played an unquestionably vital role, North Korea’s leaders were visibly concerned. Just after the revolutions broke out, Pyongyang required both institutions and households to report on how many tech devices they owned. This drive included computers and cell phones but extended even to USB flash drives and MP3 players.22

This measure indicates a great deal about North Korea’s own technological selfawareness. First of all, it is certain that such devices exist outside the highest levels of government. The inclusion of flash drives and MP3 players indicates a consumer sophistication beyond that of most analyses, which, as noted above, hold to the outdated idea that technology has almost no footing in modern North Korean society. Though it is foolish to assume that anyone outside the Pyongyang and Nanpo wealthy has access to an MP3 player, it is interesting that anyone at all should have access to these devices. Are they a gift of the beneficent and omnipotent Worker’s Party, or the first black market trickles of a powerful economic sector into an economically isolated society?

Even more importantly, this recent measure to register technology is a huge departure from policies of just seven years ago. In 2004, the government’s response to a bomb blast along train tracks that missed Kim Jong-Il was much more extreme. A cell phone was found among the rubble, and the regime promptly banned all cell phones within the country’s borders, including those carried in by diplomats.23 It is speculated that the regime suspected the bombers of using cell phones to coordinate or even detonate the blast. This reaction reveals a fundamental shift in policy in recent years motivated by a deepening integration of these technologies into North Korean society.

This technology has taken a substantial hold in North Korean consumer markets – to the point that the regime cannot easily change its mind and go backwards. In fact, given growth rates for the past years, it is safe to assume that North Korean consumers will expect increasingly attainable telecommunications products. If the state does not cooperate with these demands, it has been shown that determined citizens will turn to the black market despite harsh penalties, and these products from China do represent a substantial danger to the regime’s information control.

The two-way properties of the internet, with informers in the country reporting to defectors on the outside, is a truly revolutionary development.

Future analyses of the domestic situation in North Korea must embrace and investigate further the notion that North Korea is no longer a total information blackout: there are pinpoints of access, even if they are guarded and small. No longer will it be accurate to depict the DPRK as having no interest in connecting with the outside world.

For governments and organizations working from the outside to improve human rights in North Korea and defuse a possibly explosive collapse of the regime, these connections should be monitored closely. Policy-wise, these organizations should continue existing campaigns to provide information to North Korea’s citizens, but the beginnings of internet access in North Korea offer a key opportunity for change: existing methods of floating in AM radios or brochures into the country have proved to be the most effective way to get these resources into the reclusive country, but they have also proved to be dangerous.

If average citizens come upon these parcels or leaflets by chance, they are automatically placed in grave danger of being caught with the devices, or even of being punished for simply having seen them. These offenses have repeatedly proved punishable by transport to a labor camp or death. The recent appearance of North Korean IP flags on international news sites shows that there are individuals in North Korea looking for information on the outside. Concentrating on novel ways to target information to these individuals, who are already looking for it though conscious of the danger, is perhaps a safer and more advantageous strategy made possible by this technology.

In other spheres, governments should find new and meaningful ways to support projects for continued IT development in the DPRK. The Hermit Kingdom has showed it is at least interested in progress in this sector, and IT development has been a key method of new and constructive discourse. The most prominent example is the recent opening of the Pyongyang University of Science and Technology. The project was spearheaded by a Christian group, but the US State Department was deeply involved in funding and overseeing the program’s development, including oversight of individual class syllabi.

Any projects like this, that increase North Korean exposure to information from the outside, should be viewed as key opportunities for discourse. PUST’s prominent advantage is that it grants the internet as an educational tool to 160 of North Korea’s brightest students. Through one investment, the outside world now has 160 possible contacts – not in fields of intelligence or espionage, but in the fields of outside knowledge, perhaps even included lightly censored current events. That is a high return for any single investment.

In conclusion, both investors and governments should insist to the regime that increases in communicative potential are a valuable resource, regardless of their use. These sales pitches can easily be accompanied by small policy carrots that convince the regime that it stands to profit from wider access to world communication. The fruits of these connections will likely come naturally once they are established, so the current focus should be on establishing new connections, rather than on manipulating existing ones.

Given its many anomalies (students and faculty from multiple nations, full web access), it is possible that these strategies are already beginning to be effective at PUST. The university doesn’t fit clearly into the Juche facsimile structure observed primarily between 2000 and 2010, with the university’s openings. With the freedoms it delivers, and the international partnerships central to its existence, the university is no facsimile.

Kim Jong Il has proved nothing if not mercurial, but at the moment, the university represents a genuine academic foothold in the ascent to widened DPRK web access. With no degrees awarded yet, the university has not had any tangible effects, either with respect to economic or civil advancement. Its opening, however, realized in October 2010 after seven years of delay, shows that the DPRK may be edging into a new approach to IT and out of a Juche-based system in use for the past decade whose contours are only just beginning to become clear.


Endnotes

  1. United States Central Intelligence Agency. “Hermit Surfers of P’yongyang: North Korea and the Internet.” Studies in Intelligence. 48:1 (2004). Web. 28 April 2011. .
  2. Ibid.
  3. “N. Korea’s Kim Jong Il: Learn to use a computer, or be a fool” USA Today. 25 December 2003. Web. 10 May 2011. .
  4. Stone, Richard. “The Ultimate, Exclusive LAN.” Science. 305:5691 (2004). Web. 28 April 2011. .
  5. «Uriminzokkiri.» North Korea Tech. Web. 10 May 2011. .
  6. “Curbs likely after N. Korean cellphone use surges” AFP. 12 April 2011. Web. 12 May 2011. .
  7. «The North Korean Website List.» North Korea Tech. Web. 10 May 2011. .
  8. This blog entry, with screenshots of “Red Star OS” can be found at < http://ashen-rus.livejournal.com/4300.html>.
  9. “North Korean Red Star operating system details emerge” BBC News. 6 April 2010. Web. 12 May 2011.
  10. “Pyongyang schools geniuses for tomorrow’s high-tech world” Financial Times Online. 31 October 2005. Web. 28 April 2011. < http://www.ft.com/intl/ cms/s/0/48a7a8bc-49b2-11da-8686-0000779e2340.html#axzz1MLsyiCyM>.
  11. “North Korean computer game goes on sale in South Korea” Sydney Morning Herald. 7 September 2006. 13 May 2011. .
  12. Russell, Mark. “Uniting the Two Koreas, in Animated Films at Least” New York Times. 31 August 2005. Web. 12 May 2011.
  13. “North Korea and the Internet: Weird but Wired” The Economist. 1 February 2007. Web. 25 April 2011. .
  14. Ibid.
  15. Ibid.
  16. “Propaganda between the Koreas: All-out battle of the bands” The Economist. 6 October 2010. Web. 10 May 2011. .
  17. Rawnsley, Adam. “Smartphone Fever Hits North Korea; Kim Looks for Cure” WIRED. 13 April 2011. Web. 28 April 2011. .
  18. Ibid.
  19. Choe, Sang-Hun. “North Koreans Use Cell Phones to Bare Secrets” New York Times. 28 March 2010. Web. 28 April 2011. .
  20. Ibid.
  21. “North Korea Open Radio prompts wonder about riches over border” The Korea Herald. 8 April 2010. Web. 10 May 2011. .
  22. “N.K. tightens IT gadget control to block outside info” The Korea Herald. 1 April 2011. Web. 10 May 2011. .
  23. “World Briefings” New York Times. 4 June 2004. Web. 10 May 2011. .

Photos courtesy of:

  • http://commons.wikimedia.org/wiki/File:North_Korea-Pyongyang-04.jpg
  • http://commons.wikimedia.org/wiki/File:North_Korea-Pyongyang-Grand_People%27s_Study_House-01.jpg
  • http://commons.wikimedia.org/wiki/File:North_Korea-Pyongyang-Computer_class_at_a_school-01.jpg
  • http://commons.wikimedia.org/wiki/File:US_Navy_080717-N-5961C-006_A_Democratic_People%27s_Republic_of_Korea_guard_peers_out_from_ behind_a_granite_pillar_in_North_Korea_to_study_the_movements_of_Sailors_from_the_Ronald_Reagan_Carrier_Strike_Group_during_a_tour_of_ the_K.jpg

Suggested Reading from Inquiries Journal

As early as 1978 the Henley Center identified that household interactions were becoming increasingly ‘cellular’ rather than ‘nuclear’2; that is increasingly family interaction as a unit was becoming far less regular and more divided – combined with the diversification of TV channels it was recognized that the growth in individualism would require new marketing strategies which in turn shifted from the promotion of universal... MORE»
Advertisement
This article uses two decision-making theories – rational choice theory and prospect theory – to examine China’s resolution to intervene militarily in the Korean War. I argue that Chairman Mao Zedong was in a domain of loss both domestically and internationally when the U.N. Command crossed the 38 Parallel and... MORE»
The balance of terror created by the presence of weapons of mass destruction (WMDs) on the Korean peninsula has escalated the sense of uncertainty in East Asia, jeopardizing both the region’s security and progress towards political and economic cooperation. The persistent efforts of North Korea in the development of nuclear... MORE»
South Korea, also known as the Republic of Korea (ROK), is a remarkable country in many ways. It survived the Korean War, supported by American military assistance. It successfully transitioned to democracy after nearly 40 years of authoritarian government. South Korea now boasts a strong economy that joined the trillion-dollar... MORE»
Submit to Inquiries Journal, Get a Decision in 10-Days

Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.

Representing the work of students from hundreds of institutions around the globe, Inquiries Journal's large database of academic articles is completely free. Learn more | Blog | Submit

Follow IJ

Latest in International Affairs

2022, Vol. 14 No. 04
With over 10 million stateless people globally, statelessness has increasingly become a pressing issue in international law. The production of statelessness occurs across multiple lines including technical loopholes, state succession, and discriminatory... Read Article »
2021, Vol. 13 No. 09
The COVID-19 crisis has exacerbated current global challenges. However, this article argues that this time of crisis can also be a unique opportunity for the existing global economic institutions - G20, WTO, IMF, and World Bank (WB) - to make the... Read Article »
2021, Vol. 13 No. 02
On January 1st, 1959, a small band of Cuban rebels shocked the world, overthrowing the American-backed dictator Fulgencio Batista. These rebels were especially known for their guerrilla tactics and their leaders, such as Fidel Castro and Ernesto... Read Article »
2021, Vol. 13 No. 01
Israel has increased the nation’s security presence around the Gaza Strip and in the West Bank. Here, the research project analyzes how transaction costs resulting from Israeli security policy impact the output of manufacturing activities... Read Article »
2020, Vol. 12 No. 09
The necessity of international relief is unending as new crises continue to emerge across the world. International aid plays a crucial role in shaping how affected communities rebuild after a crisis. However, humanitarian aid often results in a... Read Article »
2019, Vol. 11 No. 10
This article aims to present the biopiracy of traditional knowledge from India by the United States, which has occurred directly through the use of patent law and indirectly through economic power and cultural imperialism. Throughout this essay,... Read Article »
2018, Vol. 10 No. 10
After joining the European Union (EU) and the North Atlantic Treaty Organization (NATO) in 2004, Estonians felt secure and in charge of their future. However, following the 2007 Bronze Horseman incident in the Estonian capital of Tallinn which included... Read Article »

What are you looking for?

FROM OUR BLOG

How to Select a Graduate Research Advisor
Finding Balance in Graduate School
The Career Value of the Humanities & Liberal Arts