This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/news/technology-32925495

The article has changed 3 times. There is an RSS feed of changes available.

Version 0 Version 1
North Korean hackers 'could kill', warns key defector North Korean hackers 'could kill', warns key defector
(about 14 hours later)
North Korean hackers are capable of attacks that could destroy critical infrastructure and even kill people, a high-profile defector has warned.North Korean hackers are capable of attacks that could destroy critical infrastructure and even kill people, a high-profile defector has warned.
Speaking exclusively to BBC Click, Prof Kim Heung-Kwang said the country had around 6,000 trained military hackers.Speaking exclusively to BBC Click, Prof Kim Heung-Kwang said the country had around 6,000 trained military hackers.
The warning follows last year's Sony Pictures hack - an attack attributed to North Korea.The warning follows last year's Sony Pictures hack - an attack attributed to North Korea.
Korean technology expert Martyn Williams stressed the threat was only "theoretical".Korean technology expert Martyn Williams stressed the threat was only "theoretical".
Prof Kim has called for international organisations to step in to prevent North Korea launching more severe attacks.Prof Kim has called for international organisations to step in to prevent North Korea launching more severe attacks.
Military attackMilitary attack
For 20 years Prof Kim taught computer science at Hamheung Computer Technology University, before escaping the country in 2004.For 20 years Prof Kim taught computer science at Hamheung Computer Technology University, before escaping the country in 2004.
While Prof Kim did not teach hacking techniques, his former students have gone on to form North Korea's notorious hacking unit Bureau 121.While Prof Kim did not teach hacking techniques, his former students have gone on to form North Korea's notorious hacking unit Bureau 121.
The bureau, which is widely believed to operate out of China, has been credited for numerous hacks.The bureau, which is widely believed to operate out of China, has been credited for numerous hacks.
Many of the attacks are said to have been aimed specifically at South Korean infrastructure, such as power plants and banks.Many of the attacks are said to have been aimed specifically at South Korean infrastructure, such as power plants and banks.
Speaking at a location just outside the South Korean capital, Prof Kim told the BBC he has regular contact with key figures within the country who have intimate knowledge of the military's cyber operation.Speaking at a location just outside the South Korean capital, Prof Kim told the BBC he has regular contact with key figures within the country who have intimate knowledge of the military's cyber operation.
"The size of the cyber-attack agency has increased significantly, and now has approximately 6,000 people," he said."The size of the cyber-attack agency has increased significantly, and now has approximately 6,000 people," he said.
He estimated that between 10% to 20% of the regime's military budget is being spent on online operations.He estimated that between 10% to 20% of the regime's military budget is being spent on online operations.
"The reason North Korea has been harassing other countries is to demonstrate that North Korea has cyber war capacity," he added."The reason North Korea has been harassing other countries is to demonstrate that North Korea has cyber war capacity," he added.
"Their cyber-attacks could have similar impacts as military attacks, killing people and destroying cities.""Their cyber-attacks could have similar impacts as military attacks, killing people and destroying cities."
Stuxnet cloneStuxnet clone
Speaking more specifically, Prof Kim said North Korea was building its own malware based on Stuxnet - a hack attack, widely attributed to the US and Israel, which struck Iranian nuclear centrifuges before being discovered in 2010.Speaking more specifically, Prof Kim said North Korea was building its own malware based on Stuxnet - a hack attack, widely attributed to the US and Israel, which struck Iranian nuclear centrifuges before being discovered in 2010.
"[A Stuxnet-style attack] designed to destroy a city has been prepared by North Korea and is a feasible threat," Prof Kim said."[A Stuxnet-style attack] designed to destroy a city has been prepared by North Korea and is a feasible threat," Prof Kim said.
Earlier this year, the South Korean government blamed North Korea for a hack on the country's Hydro and Nuclear Power Plant.Earlier this year, the South Korean government blamed North Korea for a hack on the country's Hydro and Nuclear Power Plant.
"Although the nuclear plant was not compromised by the attack, if the computer system controlling the nuclear reactor was compromised, the consequences could be unimaginably severe and cause extensive casualties," Prof Kim said."Although the nuclear plant was not compromised by the attack, if the computer system controlling the nuclear reactor was compromised, the consequences could be unimaginably severe and cause extensive casualties," Prof Kim said.
Martyn Williams is a journalist who follows closely the development of technology in North Korea.Martyn Williams is a journalist who follows closely the development of technology in North Korea.
He told the BBC: "I think it's important to underline that this is theoretical and possible from non-North Korean hackers too.He told the BBC: "I think it's important to underline that this is theoretical and possible from non-North Korean hackers too.
"It's conceivable that hackers would try something and lives could be at risk."It's conceivable that hackers would try something and lives could be at risk.
He noted an attack in 2003 on South Korean broadcasters, which he said was "an attempt to throw the country into confusion". He noted an attack in 2013 on South Korean broadcasters, which he said was "an attempt to throw the country into confusion".
"If TV had gone off air and then ATMs stopped working, people might have panicked.""If TV had gone off air and then ATMs stopped working, people might have panicked."
Inside Bureau 121Inside Bureau 121
When it comes to cyber-attacks, few groups are as notorious as North Korea's Bureau 121, which has operated since the late nineties.When it comes to cyber-attacks, few groups are as notorious as North Korea's Bureau 121, which has operated since the late nineties.
Most security researchers agree that the group operates out of China. Specifically, in the basement of a restaurant, rated highly on TripAdvisor for its tremendous Korean food.Most security researchers agree that the group operates out of China. Specifically, in the basement of a restaurant, rated highly on TripAdvisor for its tremendous Korean food.
Prof Kim gave several Bureau 121 members their first taste of computer science.Prof Kim gave several Bureau 121 members their first taste of computer science.
While he didn't teach hacking techniques, Prof Kim gave the students knowledge of the ins-and-outs of computing, networks and data transfer.While he didn't teach hacking techniques, Prof Kim gave the students knowledge of the ins-and-outs of computing, networks and data transfer.
The very best students were later plucked from his course by the military and given further, more specialist training in cyber security.The very best students were later plucked from his course by the military and given further, more specialist training in cyber security.
Prof Kim told the BBC he feels saddened that some of the great, "bright" minds he nurtured had their potential channelled "not into improving our internet culture, but to terrorise other people using the internet".Prof Kim told the BBC he feels saddened that some of the great, "bright" minds he nurtured had their potential channelled "not into improving our internet culture, but to terrorise other people using the internet".
But he conceded that his former students probably enjoyed their task, and took pride in "accomplishing Kim Jong-un's orders as a cyber warrior".But he conceded that his former students probably enjoyed their task, and took pride in "accomplishing Kim Jong-un's orders as a cyber warrior".
'Off the internet''Off the internet'
Prof Kim has called on international organisations to take action over North Korea's cyber-activity.Prof Kim has called on international organisations to take action over North Korea's cyber-activity.
"We need to collect the evidence of North Korea's cyber terrorism and report them to UN Human Rights Council and other UN agencies," he told the BBC."We need to collect the evidence of North Korea's cyber terrorism and report them to UN Human Rights Council and other UN agencies," he told the BBC.
"If North Korea continues to cause damage in this way, an organisation such as Icann should ban North Korea.""If North Korea continues to cause damage in this way, an organisation such as Icann should ban North Korea."
Icann - the Internet Corporation for Assigned Names and Numbers - manages the distribution of domain name including .com and .net.Icann - the Internet Corporation for Assigned Names and Numbers - manages the distribution of domain name including .com and .net.
It could, theoretically, shut down the use of North Korea's domain, .kp.It could, theoretically, shut down the use of North Korea's domain, .kp.
In a statement, Icann said its powers in this regard were limited.In a statement, Icann said its powers in this regard were limited.
"Icann does not have the power, nor remit, to ban countries from having a presence on or access to the Internet," said Duncan Burns, its head of communications."Icann does not have the power, nor remit, to ban countries from having a presence on or access to the Internet," said Duncan Burns, its head of communications.
"Icann's primary role is the coordination of the internet's unique identifiers to ensure the stability, security and resiliency of the internet."Icann's primary role is the coordination of the internet's unique identifiers to ensure the stability, security and resiliency of the internet.
"We rely on law enforcement and governmental regulatory agencies to police reported illegal activity.""We rely on law enforcement and governmental regulatory agencies to police reported illegal activity."
Furthermore, disabling .kp would have minimal effect if, as is widely believed, much of North Korea's hacking force conducts its operations outside of the country.Furthermore, disabling .kp would have minimal effect if, as is widely believed, much of North Korea's hacking force conducts its operations outside of the country.
Other measures, such as sanctions imposed by the US in the wake of the Sony Pictures hack, might have a greater impact.Other measures, such as sanctions imposed by the US in the wake of the Sony Pictures hack, might have a greater impact.
But Prof Kim added: "This issue can't be solved by one or two countries.But Prof Kim added: "This issue can't be solved by one or two countries.
"The international community needs to pay attention to North Korea's attempts to destroy the internet.""The international community needs to pay attention to North Korea's attempts to destroy the internet."
Follow Dave Lee on Twitter @DaveLeeBBCFollow Dave Lee on Twitter @DaveLeeBBC