North Korea's 'Paranoid' Computer Operating System

North Korea’s homegrown computer operating system mirrors its political one – marked by a high degree of paranoia and invasive snooping on users, according to two German researchers.

Their investigation, the deepest yet into the country’s Red Star OS, illustrates the challenges Pyongyang faces in trying to embrace the benefits of computing and the Internet while keeping a tight grip on ideas and culture.

The operating system is not just the pale copy of western ones that many have assumed, said Florian Grunow and Niklaus Schiess of the German IT security company ERNW, who downloaded the software from a website outside North Korea and explored the code in detail.

“[The late leader] Kim Jong-il said North Korea should develop a system of their own. This is what they’ve done,” Gunrow told the Chaos Communication congress in Hamburg recently.

North Korea, whose rudimentary Intranet system does not connect to the world wide web, but allows access to state media and some officially approved sites, has been developing its own operating system for more than a decade.

This latest version, written around 2013, is based on a version of Linux called Fedora and has eschewed the previous version’s Windows XP feel for Apple’s OSX – perhaps a nod to the country’s leader Kim Jong-un who, like his father, has been photographed near Macs.

But under the bonnet there’s a lot that is unique, including its own version of encrypting files. “This is a full blown operation system where they control most of the code,” Grunow said. The researchers say this suggests North Korea wants to avoid any code that might be compromised by intelligence agencies.

“Maybe this is a bit fear-driven,” Grunow said. “They may want to be independent of other operating systems because they fear back doors,” which might allow others to spy on them.

Grunow and Schiess said they had no way of knowing how many computers were running the software. Private computer use is on the rise in North Korea, but visitors to the country say most machines still use Windows XP, now nearly 15 years old.

The Red Star operating system makes it very hard for anyone to tamper with it. If a user makes any changes to core functions, like trying to disable its antivirus checker or firewall, the computer will display an error message or reboot itself.

Red Star also addresses a more pressing concern - cracking down on the growing underground exchange of foreign movies, music and writing.
Illegal media is usually passed person-to-person in North Korea using USB sticks and microSD cards, making it hard for the government to track where they come from.

Red Star tackles this by tagging, or watermarking, every document or media file on a computer or on any USB stick connected to it. That means that all files can be traced. “It’s definitely privacy invading. It’s not transparent to the user,” Grunow said. “It’s done stealthily and touches files you haven’t even opened.”

Nat Kretchun, an authority on the spread of foreign media in North Korea, said such efforts reflected Pyongyang’s realisation that it needs “new ways to update their surveillance and security procedures to respond to new types of technology and new sources of information”.

There is no sign in the operating system of the kinds of cyber-attack capability North Korea has been accused of, the researchers say.
“It really looks like they’ve just tried to build an operating system for them, and give the user a basic set of applications,” Grunow said. That includes a Korean word processor, a calendar and an app for composing and transcribing music.

North Korea is not the only country to try to develop a bespoke operating system. Cuba has National Nova, and China, Russia and others have also tried to build their own.

Guardianhttp://bit.ly/1mZDyH6

« Fighting Cybercrime As The World Goes Digital
China Passes Controversial Counter-terrorism Law »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.