The DMZ War

1953 to Today

Could US POWs Be Alive in North Korea? Check Out Our Book
Cyberwarfare Capabilities. North Korea 
probably has a military computer network 
operations (CNO) capability. Implicated 
in several cyber attacks ranging from 
computer network exploitation (CNE) to 
distributed denial of service (DDoS) 
attacks since 2009, the North Korean 
regime may view CNO as an appealing 
platform from which to collect 
intelligence. 
• According to a ROK newspaper, 
Seoul’s Central Prosecutor’s office 
attributed to North Korea a CNO 
activity on the ROK’s National 
Agricultural Cooperative Federation 
(Nonghyup Bank) servers in April 2011. 
Through remote execution, actors 

North Korea Cyber Attack Capability

 

"Cyberwarfare Capabilities. North Korea probably has a military computer network operations (CNO) capability. Implicated in several cyber attacks ranging from computer network exploitation (CNE) to distributed denial of service (DDoS) attacks since 2009, the North Korean regime may view CNO as an appealing platform from which to collect intelligence.


• According to a ROK newspaper, Seoul’s Central Prosecutor’s office attributed to North Korea a CNO activity on the ROK’s National Agricultural Cooperative Federation (Nonghyup Bank) servers in April 2011. Through remote execution, actorsrendered the bank’s online services inaccessible and deleted numerous files concerning customer bank accounts while removing all evidence of CNO activity in the bank’s servers.
 
• In the years spanning 2009-2011, North Korea was allegedly responsible for conducting a series of distributed denial of service (DDoS) attacks against ROK commercial, government and military websites, rendering them inaccessible.Technical attribution of cyberspace operations remains challenging due to the internet’s decentralized architecture and inherent anonymity. Given North Korea’s bleak economic outlook, CNO may be seen as a cost-effective way to modernize some North Korean military capabilities. As a result of North Korea’s historical isolation from outside communications and influence, it is likely to employ Internet infrastructure from third-party nations." (Military and Security Developments Involving the Democratic People’s Republic of Korea, US Department of Defense, 2012)

Check Out Two of the Best Novels About Service in the "Z"

They Will Bring Back Memories

(See Good DMZ Movies Below)

Great for Families/Friends Who Want to Know What It Was Like

↓ 











Hello world!

Welcome to your blog. This is your first post. Edit or delete it, then start blogging!

 The DMZ War book and Web site are the inside story on the mission to prevent North Korean invasion and infiltration of the Korean Demilitarized Zone from 1953 until today-- and the men and women of the US military who accomplished it. The DMZ War includes insider stories; declassified reports, film and pictures; and all sorts of other stuff of interest to those who "ran the Z,' served anywhere in/around the RoK, or have an interest in North Korea, the Cold War, espionage, special operations and intelligence.

We Launch Soon

Want to Get an Email When We Do? Sign Up Above for an Update 
Want to Suggest We Cover Your Story or Unit?
Email Us Below
(This site is run by a DMZ veteran -- we'll only use your address for this purpose and not provide it to anyone else.)

Suggest a Story

Distraught Villager Restrained
Trying to Eat Heart from Dead NK Soldier
Seven Members of this Man's Family Killed by NK Team