North Koreans Study Bitcoin

North Korean engagement with bitcoin and crypto-currency appears to be growing, with recent reports indicating that university students are now able to access courses on cryptocurrency.

Reports indicate that Pyongyang University (pictured) which is perceived to be the breeding ground for North Korea’s hackers by much of the international community, is now offering courses on crypto-currencies.

Despite mounting accusations that the North Korean administration has been actively stealing and mining bitcoins, the existence of the course is being cited as “the first hard evidence” of North Korea’s increasing fascination with crypto-currency by media. 

Priscilla Moriuchi, director of strategic threat development at CIA and Google-backed security intelligence firm, Recorded Future, has stated that, “There should be no mistaking this course as a benevolent academic exchange; everything in North Korea is carefully evaluated and managed by the regime.”

Earlier this month, Federico Tenga, founder of bitcoin startup, Chainside, visited Pyongyang with the purpose of teaching over three dozen of the country’s top students about bitcoin and blockchain technology. The visit was arranged after Tenga contacted the sole foreign-funded school in North Korea, the Pyongyang University of Science and Technology, offering to give a presentation on bitcoin at an upcoming finance conference scheduled to take place on the campus. 

The conference, however, was canceled following President Donald Trump’s ban on US citizens traveling to the Hermit Kingdom, leading to Pyongyang University contacting Mr. Tenga to invite him to teach the crypto-currency course on campus.
Mr. Tenga spent a week in total at Pyongyang University, delivering five 90 minute lectures to a group of approximately 40 students aged between 20 and 25. Mr. Tenga also gave an additional seminar to the university’s faculty members.
Mr. Tenga reported that although most students spoke excellent English, were knowledgeable of the world outside of North Korea’s borders and had independently heard of bitcoin, their understanding of bitcoin’s fundamentals such as the processes underpinning mining and trading was extremely lacking coming into the course. Surprising many, Mr. Tenga returned from North Korea skeptical of the regime’s cryptocurrency capabilities. 

Contradicting a July report by Recorded Future that claimed that bitcoin mining is taking place in North Korea, Mr. Tenga stated his skepticism surrounding the suggestion that the Hermit Kingdom is engaging in bitcoin mining. “I was running a full bitcoin node while I was there, so maybe people monitoring North Korean Internet think that somebody was mining that way, but I wasn’t,” Tenga said.

Recorded Future have responded to Mr. Tenga’s assertions, with Priscilla Moriuchi stating that “The university was allowed to offer this course, bring in a foreign expert, and educate North Korean students because the government and senior leaders realised the value of bitcoin and cryptocurrency as a generator of funds for the regime and allowed it.” Whilst the Pyongyang University of Science and Technology has not discussed its cryptocurrency course with western media, a university spokesman has told NK News, “Our teaching is intended to assist the DPRK by building capacity that enables effective development and benefits for the people of the DPRK… We are acutely aware of sanctions issues and the risks of misuse or misappropriation of resources and know-how and take care to avoid any sensitive or proscribed areas.”

Earlier this year, US cybersecurity firm, Fireeye, accused North Korea of using spear phishing and dispersed malware to attack three South Korean crypto-currency exchanges. 

Luke McNamara of Fireeye has told media that economic sanctions were presumed to be the dominant motivation behind North Korean engagement with crypto-currency, stating that the regime “probably sees it as a very low-cost solution to bring in hard cash.”

Bitcoin.com:

You Might Also Read:

Here Comes China’s Crypto-Currency:

N Korea Targets S Korea’s Bitcoin Exchange:

Would Killing Bitcoin End Ransomware?:

 

« China Intends To Be An AI Superpower
More Businesses Could Use Machine Learning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.