Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 1 April 2013

The phones and the iMac of Kim Jong-un

Posted on 12:59 by Unknown
Last week, North Korea said that it entered a "state of war" with neighboring South Korea. According to a report from the state-run Korean Central News Agency (KCNA) this includes a threat to "dissolve" the United States mainland too.

On Friday, March 29, KCNA also released some pictures of the North Korean leader Kim Jong-un, giving a rare look at some of his communications equipment:


North Korean leader Kim Jong-un presides over an urgent operation meeting
at the Supreme Command in Pyongyang, March 29, 2013.
(Photo: KCNA through Reuters)

Quite surprisingly we see that at the right side of the table, there's an aluminum unibody iMac computer (with a corded keybord and mouse). This computer is made by the American manufacturer Apple and is an iconic capitalist lifestyle item.

If this isn't a fake remake, it's a bit strange that we see this computer here, because there's a full US embargo for exporting products to North Korea. Probably the iMac came in from China, the only ally of the communist republic.

The whole arrangement looks very much like propaganda, and we can doubt whether the iMac is very functional: with a close look we can see that the yellow ethernet cable lies disconnected next to it.

At the left side of the table there are three white telephone sets (no red one!). These phones seem to be the same as the one we can see in the picture below, which looks like a quite ordinary office phone:


Kim Jong-un smoking a cigaratte in an empty looking launch control center,
after Pyongyang successfully launched a satellite into space

Earlier in March, North Korea already disconnected various hotlines with South Korea. One hotline, which is maintained by the international Red Cross and runs through the truce village of Panmunjom, was cut off on March 11. This also happened with another hotline, which connects to the US-led United Nations Command at the border.

On March 27, North Korea also cut off a military hotline with South Korea, that allows cross-border travel to the jointly run Kaesong industrial complex in the North. This hotline, which actually consists of four telephone lines, is used to communicate about the daily cross-border traffic of about 900 workers and cargo traveling back and forth to the Kaesong complex.

Now there is still one active hotline left (consisting of three phone lines), linking the civil aviation authorities of North and South Korea.


Sources and Links
- Reconstruction: North Korean Photo Reveals ‘U.S. Mainland Strike Plan’
- Article about North Korea Cuts Off the Remaining Military Hot Lines With South Korea
- Article in Dutch: Kim Jong-Un plant wereldoorlog op verouderde iMac

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Apple, North Korea | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ▼  April (40)
      • KGB Hotel Listening Post Now a Tourist Museum
      • Spybuster Tip # 523: Twitter Password Security Test
      • FutureWatch: Trojan Horse Wi-Fi's and More - In Yo...
      • How to Bug an Entire Country - Drop Poop & Rocks
      • Interesting Security Technologies - Sunpass Bug & ...
      • Spouse Spying Increase Seen By 92% of Divorce Atto...
      • Latest in Government Work Clothes - Immunity Suits
      • Spy Stories Behind "Peggy Sue" and "Winnie the Pooh"
      • Verizon's Tilt-Shift-Focus on Espionage
      • New Book - "Eavesdropping, Surveillance and Espion...
      • Detecting and Preventing Eavesdropping - U.S. Gove...
      • Interesting Question About Jamming Bugs & SpyCams
      • How Obama's BlackBerry got secured
      • Sand Sized Gyroscopes to Track You Anywhere
      • Pentagon’s Spies Pimp Their Phones
      • Top Wi-Fi Routers Easy to Hack, Says Study
      • DoD Inspector General v. Army Commercial Mobile De...
      • If you travel with a cell phone, tablet and/or lap...
      • Sen. Mitch McConnell's "Bug" - Recorded Acoustical...
      • FREE Security "Green" Papers on Laptop, Mobile Pho...
      • ... thus, giving new meaning to a bright idea!
      • Small Business Espionage Attacks Up 42%
      • McConnell's Suspected Bugger Has Hand Out
      • The Schizo Illinois Eavesdropping Law
      • RFID Tracks Jewelry Popularity
      • There is a Magazine for Everything... Even Penetra...
      • Campaign Headquarters Bugged - FBI Investigating
      • Shodan - The Scary Search Engine
      • Free - Computer Security Tools Book
      • Son Bugs Mom (yawn)... with a Wiretap!
      • Canadian Technical Security Conference (CTSC) - Ap...
      • Burglar Used SpyCams to Case High-Income Homes
      • New Italian Cocktail "The Gepetto" - Thwarted by S...
      • The Era of Women Spies is Returning
      • Amazing Drone Footage - Just for fun - Enjoy Your ...
      • Apple's iMessage has DEA Tongue Tied
      • Security Consultant Alert - IAPSC Annual Conferenc...
      • AppSec USA 2013 is Coming to NYC
      • Blue Bugging - An old topic and growing problem
      • The phones and the iMac of Kim Jong-un
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile