Feeds

NORKS build TROLL ARMY to tear down S Korean surfers

No we're not too hungry to concentrate on posting propaganda...

Using blade systems to cut costs and sharpen efficiencies

North Korea has tasked 200 agents with the job of posting negative comments online, often using stolen online identities, in a bid to undermine the morale of their neighbours in the South.

The brigade of NORK trolls is part of a brigade of 3,000 cyber warriors and hackers that make up the Reconnaissance General Bureau information warfare force, according to the Police Policy Institute.

Ryu Dong-ryul of the Police Policy Institute said, "The North has established a team of online trolls at the United Front Department and the Reconnaissance General Bureau."

About 200 agents post derogatory comments on South Korean portals using assumed identities stolen from South Koreans, the Chosun Ilbo newspaper reports.

The South Korean thinktank reckons other members of the NORK cyber army are building malware and launching hacker attacks while the trolls are posting comments with links to N Korea propaganda sites designed to sway public opinion in favour of Pyongyang.

North Korean agents posted more than 27,000 propaganda messages designed to turn people against the South during 2011 alone, the institute estimates. In 2012 this figure increased and more than 41,000 messages were posted, delegates at a seminar in Seoul earlier this week were told. Objectives of the campaign include getting unblock access to pro-North Korean sites for surfers visiting from the South.

North Korea is the prime suspect in destructive malware attacks against the computer networks of banks and TV stations earlier this year, the latest in a series of attacks. Cyber assaults included attempts to knock targeted sites offline have been going on within the Korean peninsular for some years. Ordinary North Korean citizens have only heavily regulated access to government controlled websites through local cybercafes.

The hermit kingdom does maintain various portals and propaganda outlets, some of which are hosted in China, such as Uriminzokkiri.

Using agents of the state in a propaganda offensive fought on social media sites and consumer portals is an unusual tactic but it's not restricted to North Korea. As previously reported, cadres of the Iranian Revolutionary Guards include similar digital propaganda units.

Lim Jong-in of Korea University estimates 30,000 North Koreans are engaged in cyber and psychological warfare against South Korea, a group swelled every year by another 300 personnel "trained in the dark arts", as Chosun Ilbo catchily describes it.

This hoard of cyber-ninja Death Eaters are arrayed against a much smaller South Korean force that is growing by only 30 personnel a year. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.