North Korean Leader Has His Own Cellular Network

kim-jong-un-smartphone.jpg

Kim Jong Un and other high-ranking officials in North Korea have their own cellular network to help keep their conversations secure, according to a former telecommunications engineer who worked in the country. 

The network was built to keep their conversations off the public cellular network and is a result of sanctions that prevent encryption technologies from being exported to the country, said Ahmed El-Noamany, a former senior technical director at North Korean cellular network Koryolink in an interview published on Thursday by the NK News website.

Koryolink is a joint venture between Egypt's Orascom Telecom and Media Technology (OTMT) and the North Korean government. It launched a 3G cellular network in 2009 that has gone on to attract around 2.5 million subscriptions -- about 10 percent of North Korea's population.
"They have another network for the VIPs that is totally separated from everything … a 3G network that is not accessible to normal users," El-Noamany told NK News.

The engineer, who worked in North Korea from 2011 to late 2013, said the network was built this way because sanctions prevented the export of encryption technology to North Korea. To overcome this, the country built a separate network.
"This is a special network which has its own things -- own algorithms, own operating system, own everything," he said.
His comments add somewhat to the mystery surrounding North Korea's complex telecommunications system.
The country runs a two-tier network with most subscribers only able to make and receive calls from domestic numbers. At the second tier, which includes lines at places like foreign embassies, international connectivity is offered but domestic calls are blocked.

The system is part of North Korea's strict controls that attempt to prevent information coming into the country from overseas. Both the fixed-line and cellular networks have the same two-tier structure. From cellphones, a network search inside Pyongyang reveals two networks, said Kazuteru Tamura, a Japanese journalist who has spent time investigating the system.
One network is accessible from cell phones with local SIM cards and the other from phones with SIM cards sold to tourists and foreign residents. Observers have assumed the two networks were all that were available in the country, and El-Noamany's comments question that assumption.

Recently, a competing cellular operator owned by the North Korean government began competing with Koryolink. It's unknown how or if the new network is related to that private government network mentioned in the interview.
North Korea maintains one of the strictest policies of control on information and people of any country on the planet. Most citizens are unable to travel overseas and even domestic travel is heavily restricted, with permission needed to enter the capital city of Pyongyang. Thousands of North Koreans have risked death to escape the country.

NK News: http://bit.ly/1KnM2A5

Computerworld: http://bit.ly/1Y846UX

« Five Months After the OPM Attack.
Iran and Saudi Marching To Cyber War! »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.