Stuxnet V. 1 Success V. 2 North Korea Failed

Iran wasn’t the only country that had its nuclear ambitions targeted by a sneaky US cyberattack. It turns out the American government also tried to take down North Korea’s nuclear programs with the Stuxnet worm five years ago, Reuters reports. But there was one major difference: That attack ultimately flamed out. While the US managed to get Stuxnet into Iran’s nuclear facilities (reportedly by hacking suppliers), which ultimately led to the destruction of more than a thousand uranium enriching centrifuges, it never managed to get it into North Korea’s core systems. It turns out having an extremely isolated network worked in North Korea’s favor. That’s particularly ironic since Stuxnet quickly made its way out of Iran and wreaked havoc across the web.

The operation began in tandem with the now-famous Stuxnet attack that sabotaged Iran’s nuclear program in 2009 and 2010 by destroying a thousand or more centrifuges that were enriching uranium. Reuters and others have reported that the Iran attack was a joint effort by U.S. and Israeli forces.
According to one U.S. intelligence source, Stuxnet’s developers produced a related virus that would be activated when it encountered Korean-language settings on an infected machine.
But U.S. agents could not access the core machines that ran Pyongyang’s nuclear weapons program, said another source, a former high-ranking intelligence official who was briefed on the program.
The official said the National Security Agency-led campaign was stymied by North Korea’s utter secrecy, as well as the extreme isolation of its communications systems. A third source, also previously with U.S. intelligence, said he had heard about the failed cyber attack but did not know details.
North Korea has some of the most isolated communications networks in the world. Just owning a computer requires police permission, and the open Internet is unknown except to a tiny elite. The country has one main conduit for Internet connections to the outside world, through China.
In contrast, Iranians surfed the Net broadly and had interactions with companies from around the globe.


A spokeswoman for the NSA declined to comment for this story. The spy agency has previously declined to comment on the Stuxnet attack against Iran.
The United States has launched many cyber espionage campaigns, but North Korea is only the second country, after Iran, that the NSA is now known to have targeted with software designed to destroy equipment.
Washington has long expressed concerns about Pyongyang’s nuclear program, which it says breaches international agreements. North Korea has been hit with sanctions because of its nuclear and missile tests, moves that Pyongyang sees as an attack on its sovereign right to defend itself.
U.S. Secretary of State John Kerry said last week that Washington and Beijing were discussing imposing further sanctions on North Korea, which he said was “not even close” to taking steps to end its nuclear program.

Experts in nuclear programs said there are similarities between North Korea and Iran’s operations, and the two countries continue to collaborate on military technology.
Both countries use a system with P-2 centrifuges, obtained by Pakistani nuclear scientist A.Q. Khan, who is regarded as the father of Islamabad’s nuclear bomb, they said.
Like Iran, North Korea probably directs its centrifuges with control software developed by Siemens AG that runs on Microsoft Corp’s Windows operating system, the experts said. Stuxnet took advantage of vulnerabilities in both the Siemens and Microsoft programs.
Because of the overlap between North Korea and Iran’s nuclear programs, the NSA would not have had to tinker much with Stuxnet to make it capable of destroying centrifuges in North Korea, if it could be deployed there.
Despite modest differences between the programs, “Stuxnet can deal with both of them. But you still need to get it in,” said Olli Heinonen, senior fellow at Harvard University’s Belfer Center for Science and International Affairs and former deputy director general of the International Atomic Energy Agency.
NSA Director Keith Alexander said North Korea’s strict limitations on Internet access and human travel make it one of a few nations “who can race out and do damage with relative impunity” since reprisals in cyberspace are so challenging.
When asked about Stuxnet, Alexander said he could not comment on any offensive actions taken during his time at the spy agency.
David Albright, founder of the Institute for Science and International Security and an authority on North Korea’s nuclear program, said U.S. cyber agents probably tried to get to North Korea by compromising technology suppliers from Iran, Pakistan or China.
“There was likely an attempt” to sabotage the North Korean program with software, said Albright, who has frequently written and testified on the country’s nuclear ambitions.

The Stuxnet campaign against Iran, code-named Olympic Games, was discovered in 2010. It remains unclear how the virus was introduced to the Iranian nuclear facility in Natanz, which was not connected to the Internet.
According to cybersecurity experts, Stuxnet was found inside industrial companies in Iran that were tied to the nuclear effort. As for how Stuxnet got there, a leading theory is that it was deposited by a sophisticated espionage program developed by a team closely allied to Stuxnet’s authors, dubbed the Equation Group by researchers at Kaspersky Lab.
The U.S. effort got that far in North Korea as well. Though no versions of Stuxnet have been reported as being discovered in local computers, Kaspersky Lab analyst Costin Raiu said that a piece of software related to Stuxnet had turned up in North Korea.
Kaspersky had previously reported that the software, digitally signed with one of the same stolen certificates that had been used to install Stuxnet, had been submitted to malware analysis site VirusTotal from an electronic address in China. But Raiu told Reuters his contacts had assured him that it originated in North Korea, where it infected a computer in March or April 2010.
Some experts said that even if a Stuxnet attack against North Korea had succeeded, it might not have had that big an impact on its nuclear weapons program. Iran’s nuclear sites were well known, whereas North Korea probably has at least one other facility beyond the known Yongbyon nuclear complex, former officials and inspectors said.
In addition, North Korea likely has plutonium, which does not require a cumbersome enrichment process depending on the cascading centrifuges that were a fat target for Stuxnet, they said.
Jim Lewis, an advisor to the U.S. government on cybersecurity issues and a senior fellow at the Center for Strategic and International Studies, said there are limitations to cyber offense.
A cyber attack “is not something you can release and be sure of the results,” Lewis said.

 

Meanwhile, Mexico Still Corrupt

You hear very little about the corruption, the massacres and the crimes in Mexico mostly because the cartels and criminals have killed or bought off the media. Once in a while some items are passed on for publication. Do you ever wonder what the president of Mexico is doing? Do you wonder if the United States or the United Nations pays attention to Mexico?

Mexico is a failed state, examples below.

US Banks Close Branches Along Mexico Border to Prevent Money Laundering

Major US banks have recently closed branches along the southern border with Mexico in an attempt to crack down on money laundering, a reflection of the ease with which Mexican drug traffickers can legitimize illicit proceeds north of the border.

In recent months, major banks such J.P. Morgan and Bank of America have closed their branches in the border town of Nogales, Arizona, reported The Wall Street Journal. Other banks, including Wells Fargo and Chase, have reportedly closed hundreds of customer accounts, many of which belonged to Mexican nationals.

The anti-money laundering measures come amid tightening regulations stipulating that banks can be hit with stiff fines if they fail to adequately monitor suspicious accounts, reported National Public Radio.

Banks on the Mexican side of the border have also recently stepped up their efforts to combat money laundering operations. Some Mexican banks have started refusing to accept US dollars, according to The Associated Press.

InSight Crime Analysis

US banks have real reason to fear criminal networks will use their financial services to launder money. Arizona has previously been singled out as a principal money laundering destination for Mexican drug cartels, and bank executives told The Wall Street Journal that Southern California and the Rio Grande Valley in Texas are also high-risk border areas. As evidenced by the recent decisions, in some cases it is easier for banks to simply close accounts and branches rather than attempting to keep criminals from using their financial services.

 

Several high-profile cases point to the ability of Mexican drug traffickers to legalize their illicit funds via the US banking system. In 2010, Wachovia (which is now Wells Fargo) reached an agreement with the US government after prosecutors found that at least $110 million in drug proceeds had been laundered through the bank. In 2012, the Federal Bureau of Investigation (FBI) also uncovered a scheme in which Mexico‘s Zetas cartel laundered money through a horse racing enterprise by using Bank of America accounts.

In addition, the decisions by major banks to close their border branches suggest that putting pressure on banks — rather than going after individuals or criminal networks — may be the most effective way to combat money laundering. A recent legal decision, in which a conviction was overturned in the Zetas horse racing case, demonstrates just how difficult it can be for prosecutors to go after the money launderers themselves.

The case of 43 the missing/dead students:

He said three alleged gang members claimed the students were handed over to them by police.

They said some were already asphyxiated and they shot the others dead, before setting fire to all the bodies.

A total of 43 students went missing after clashing with police on 26 September in the town of Iguala.

A spokesman for their families said they would not accept they were dead until it had been officially confirmed by Argentine forensic scientists working on the case.

Bags found near river

The suspects from the Guerreros Unidos drug gang were recently arrested in connection with the disappearances.

Relatives of the missing said they had been told that six bags of unidentified human remains had been found along a river near where the students vanished.

There was this case in 2013 in Mexico:

MEXICO CITY — He admitted being a salaried killer for a drug cartel, the kind of assassin who preferred slashing his victims’ throats.

On Tuesday, after serving three years behind bars, he was released from a Mexican detention center and was on his way to the United States — where he would soon live as a free man.

Or, rather, a free boy.

The killer, Edgar Jimenez Lugo, known to Mexican crime reporters as “El Ponchis,” is 17 years old. He was 11 when he killed his first victim, and he was 14 when he was arrested, in December 2010, at the Cuernavaca airport, along with luggage containing two handguns and packets of cocaine.

Back then, Jimenez’s tender age transformed him into a media phenomenon, one that shocked Mexico, and the world, into recognizing the extent to which the country’s brutal drug war was consuming its young. And now it is one of the reasons why Jimenez — who claims to have killed four people at an age before most kids get their learner’s permit to drive — will soon be mingling with the residents of San Antonio.

Under the laws at the time in the Mexican state of Morelos, where he was prosecuted, Jimenez could be sentenced to a maximum of only three years of incarceration because he was a minor. A judge ordered him released Tuesday, a few days before his three years were up.

And because he is a U.S. citizen, born in San Diego, he has every right to return to his home country.

“Apparently he’s paid his debt for whatever crimes he was convicted of [in Mexico], and I’m not aware of any charges the U.S., federal or state, has against him,” Michelle Lee, an FBI special agent based in San Antonio, said Tuesday. “The situation with him is really no different than any other U.S. national who commits a crime, completes their sentence and is released.”

Jimenez, who had lived, and killed, in Jiutepec, a town near the popular resort city of Cuernavaca, was on a plane headed to San Antonio, where he has family, Jorge Vicente Messeguer Guillen, the Morelos government secretary, said in a TV interview.

Once in San Antonio, Messeguer said, Jimenez would be sent to what he referred to as a “support center” but would not be locked up.

Graco Ramirez, the Morelos governor, said in a separate TV interview that Jimenez’s rehabilitation in the Mexican penal system had been “notable.” He also said that Jimenez had to leave Mexico because his life might be in danger.

U.S. State Department officials would not elaborate on what Jimenez’s living arrangements would be when he arrived in Texas. Nor did they clarify what Messeguer meant by a “support center.”

“We are aware of Edgar Lugo’s upcoming release by the Mexican authorities following completion of his sentence,” a spokesman for the U.S. Embassy in Mexico City said in a statement Tuesday. “We are closely coordinating with our Mexican counterparts and appropriate authorities in the United States regarding Edgar Lugo’s release.

“Due to privacy considerations, we do not publicly discuss details of matters involving U.S. citizens,” he said.

Jimenez’s case is far from unique. In February, a 13-year-old boy was arrested in the state of Zacatecas along with a group of gunmen. The boy, identified as Armando, confessed to participating in at least 10 slayings. He was freed because the state criminal code does not prosecute minors younger than 14. A month later, the boy and his mother were found slain along with four other people.

In 2011, a 15-year-old who went by the name Erick was arrested and said he worked for the same group that Jimenez did, participating with other teenagers in kidnappings and drug dealing. He was sentenced to two years and eight months in prison.

Follow the Nukes, Money and Death(s) to Putin?

Putin clamps down on troop-death data

Rule may hide ‘secret war’ in Ukraine

Putin signed an order Thursday making the deaths of Russian troops lost during “special operations” a secret, amending a previous decree that limited such secrecy to deaths of soldiers in wartime. Some watchers can see only one plausible reason for the change: Russia is gearing up for another military push into Ukraine.

“We’re in a pre-war situation. Right now, there’s going to be another campaign in Ukraine,” said Pavel Felgenhauer, a military analyst based in Moscow, who added that Russia was being secret about losses because “we’re fighting a secret war.” Read much more here.

Embedded image permalink

Who Took Moldovos Millions ~ The Crooks or the Kremlin

On the eve of a national election in tiny Moldova last November, $450 million — equal to 10 percent of the Eastern European country’s entire annual gross domestic product — went missing. So far, no one knows where it went.

Much was at stake in the election. Last June, Moldova’s pro-Europe government signed an association agreement with the European Union. Pro-Russia opponents favored partnership with Moscow’s Eurasian Economic Union instead. The incumbents barely won. Moscow signaled its displeasure with the EU agreement by placing an embargo on the import of Moldovan fruits, vegetables and wine.

Earlier this month, approximately 10,000 Moldovans marched in the streets of the capital, Chisinau, shouting, “Down with the thieves!” and “We want the billions back!”

Kroll, the international risk consultancy, had been engaged to do an initial private investigation. The parliament’s speaker posted this from their report: “There appears to have a deliberate plan to gain control of each of the banks and subsequently manipulate transactions to gain access to credit, whilst giving the appearance to the contrary.” Yet, the National Anti-corruption Center of Moldova claimed the report was based on rumors that leaked to local media. Read more here.

Oppose Putin?

Putin opponent near death in suspected poisoning

An outspoken opponent of Russian President Vladimir Putin was near death Friday from an apparent poisoning just three months after his close political ally was gunned down near the Kremlin, and supporters want him evacuated to Europe or Israel to determine what sickened him.

Vladimir Kara-Murza Jr., who has long been based in Washington, was in a hotel in Moscow when he suddenly lost consciousness May 26 and was hospitalized with what his wife called “symptoms of poisoning.” The 33-year-old is a coordinator for Open Russia, a nongovernmental organization which on the previous day released a documentary film accusing close Putin crony and Chechen strongman Ramzan Kadyrov of human rights abuses including torture and murder.

“Doctors have just confirmed that he was poisoned,” Andrei Bystrov, an opposition activist and friend of the Kara-Murza family, told The Telegraph. “As to what with, they can’t say yet. It could be anything.”

Kara-Murza, a dual Russian-British citizen, was a close associate of opposition leader Boris Nemtsov, who was assassinated in February.

“I am deeply concerned about the mysterious illness of Vladimir Kara-Murza, especially given the recent murder of Boris Nemtsov and the number of Putin’s opponents who have been poisoned,” Rep. Chris Smith, R-N.J., said in a statement

Kara-Murza’s family was trying to get him evacuated to Europe or Israel for toxicology tests after hemodialysis failed to stop complete kidney failure. Read more here.

Nuclear Aggression

NATO Leader Sees Dangerous Trend in Russia’s Nuclear Activities

Russia’s recent use of nuclear rhetoric, exercises and operations are deeply troubling. As are concerns regarding its compliance with the Intermediate Nuclear Forces Treaty.

President Putin’s admission that he considered putting Russia’s nuclear forces on alert while Russia was annexing Crimea is but one example.

Russia has also significantly increased the scale, number and range of provocative flights by nuclear-capable bombers across much of the globe. From Japan to Gibraltar. From Crete to California. And from the Baltic Sea to the Black Sea.

Russian officials announced plans to base modern nuclear-capable missile systems in Kaliningrad. And they claim that Russia has the right to deploy nuclear forces to Crimea.

 

U.S. Declares Cuba Normal Despite Terror History

As you read this short notice, consider that now that relations with Cuba have been formally normalized, will the next step be to turn Guantanamo over to Cuba and terminate the lease, which was designed in perpetuity?

Kerry signed the order on Cuba today placing Cuba back to a pre-Cold War status. Only 3 countries left that carry the distinction of a state sponsor of terror .

The step comes as officials from the countries continue to hash out details of restoring full diplomatic relations, including opening embassies in Washington and Havana and returning ambassadors to the two countries. Friday’s removal of Cuba from the terrorism list had been a key Cuban demand.

President Barack Obama recommended to Congress last month that Cuba be removed from the U.S. list, triggering a 45-day congressional notification period.

State Sponsors of Terrorism

 

Countries determined by the Secretary of State to have repeatedly provided support for acts of international terrorism are designated pursuant to three laws: section 6(j) of the Export Administration Act, section 40 of the Arms Export Control Act, and section 620A of the Foreign Assistance Act. Taken together, the four main categories of sanctions resulting from designation under these authorities include restrictions on U.S. foreign assistance; a ban on defense exports and sales; certain controls over exports of dual use items; and miscellaneous financial and other restrictions.

Designation under the above-referenced authorities also implicates other sanctions laws that penalize persons and countries engaging in certain trade with state sponsors. Currently there are three countries designated under these authorities: Iran, Sudan, and Syria.

Country Designation Date
Iran January 19, 1984
Sudan August 12, 1993
Syria December 29, 1979

Recommendation to Rescind Cuba’s Designation as a State Sponsor of Terrorism

(Apr. 14): In December 2014, as a critical component of establishing a new direction for U.S.–Cuba relations, the President directed the State Department to launch a review of Cuba’s designation as a State Sponsor of Terrorism and provide a report to him within six months. Last week, the State Department submitted a report to the White House recommending, based on the facts and the statutory standard, that President Obama rescind Cuba’s designation as a State Sponsor of Terrorism.

Country Reports on Terrorism


U.S. law requires the Secretary of State to provide Congress, by April 30 of each year, a full and complete report on terrorism with regard to those countries and groups meeting criteria set forth in the legislation. This annual report is entitled Country Reports on Terrorism. Beginning with the report for 2004, it replaced the previously published Patterns of Global Terrorism.

The U.S. State Department keeps a summary and classification on countries. To read further on those go here.

North Korea Iran Nuclear and Cyber-weapons

North Korea allegedly helping Iran build nuclear weapon

The National Council of Resistance of Iran (NCRI), which exposed the existence of a key Iranian nuclear weapons facility in 2002 and significant, illicit Iranian nuclear weapons developments since then, said this was the third visit to Iran in 2015 by a North Korean delegation.

Also, citing confidential information from sources inside Iran’s Islamic Revolutionary Guard Corps (IRGC), the Ministry of Defense (MoD), research and aerospace agencies, NCRI said in a statement another group of North Korean nuclear weapons experts is slated to return to Iran in June.

*** During the P5+1 talks with Iran on their nuclear program the elephant in the room has been North Korea, a rogue state that has been in full collaboration with Iran. Meanwhile, North Korea has a cyber-army capable of the same kind of destruction as any nuclear weapon or ICBMs.

Missile Army

North Korean nuclear, missile experts visit Iran-dissidents

An exiled Iranian opposition group said on Thursday that a delegation of North Korean nuclear and missile experts visited a military site near Tehran in April amid talks between world powers and Iran over its nuclear program.

The dissident National Council of Resistance of Iran (NCRI) exposed Iran’s uranium enrichment plant at Natanz and a heavy water facility at Arak in 2002. Analysts say it has a mixed record and a clear political agenda.

Iran says allegations that is trying to develop a nuclear weapons capability are baseless and circulated by its enemies.

Iran and six world powers are trying to meet a self-imposed June 30 deadline to reach a comprehensive deal restricting its nuclear work. Issues remaining include monitoring measures to ensure it cannot pursue a clandestine nuclear weapons program.

Citing information from sources inside Iran, including within Iran’s Revolutionary Guards Corps, the Paris-based NCRI said a seven-person North Korean Defense Ministry team was in Iran during the last week of April. This was the third time in 2015 that North Koreans had been to Iran and a nine-person delegation was due to return in June, it said.

 

“The delegates included nuclear experts, nuclear warhead experts and experts in various elements of ballistic missiles including guidance systems,” the NCRI said.

The Iranian embassy in France dismissed the report.

“Such fabricated reports are being published as we get closer to final stages of the talks and also because there is a high chance of reaching a final deal,” Iran’s state website IRIB quoted an unnamed Paris-based Iranian diplomat as saying.

In Washington, the State Department said it was examining the claims but had been unable to confirm them.

“These allegations, we’re taking them seriously,” State Department spokesman Jeff Rathke told reporters. “We have not been able to verify them thus far.”

There have previously been unconfirmed reports of cooperation between the two countries on ballistic missiles, but nothing specific in the nuclear field.

The U.N. Panel of Experts which monitors compliance with sanctions on North Korea has reported in the past that Pyongyang and Tehran have regularly exchanged ballistic missile technology in violation of U.N. sanctions.

SECRECY

The NCRI said the North Korean delegation was taken secretly to the Imam Khomenei complex, a site east of Tehran controlled by the Defense Ministry. It gave detailed accounts of locations and who the officials met.

It said the delegation dealt with the Center for Research and Design of New Aerospace Technology, a unit of nuclear weaponization research, and a planning center called the Organization of Defensive Innovation and Research, which is under U.S. sanctions.

Reuters could not independently verify the allegations.

“Tehran has shown no interest in giving up its drive to nuclear weapons. The weaponization program is continuing and they have not slowed down the process,” NCRI spokesman Shahin Gobadi said.

U.N. watchdog the IAEA, which for years has investigated alleged nuclear arms research by Tehran, declined to comment. North Korean officials were not available for comment.

Several Western officials said they were not aware of a North Korean delegation traveling to Iran recently.

A Western diplomat said there had been proven military cooperation between Iran and North Korea in the past.

North Korean and Iranian officials meet in the course of general diplomacy. On April 23, Kim Yong Nam, North Korea’s ceremonial head of state and Iran’s president held a rare meeting on the sidelines of the Asian-African summit in Jakarta.

Cyber-Army

North Korean hackers ‘could kill’, warns key defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and even kill people, a high-profile defector has warned.

Speaking exclusively to BBC Click, Prof Kim Heung-Kwang said the country had around 6,000 trained military hackers.

The warning follows last year’s Sony Pictures hack – an attack attributed to North Korea.

Korean technology expert Martyn Williams stressed the threat was only “theoretical”.

Prof Kim has called for international organisations to step in to prevent North Korea launching more severe attacks.

Military attack

For 20 years Prof Kim taught computer science at Hamheung Computer Technology University, before escaping the country in 2004.

While Prof Kim did not teach hacking techniques, his former students have gone on to form North Korea’s notorious hacking unit Bureau 121.

The bureau, which is widely believed to operate out of China, has been credited for numerous hacks.

Many of the attacks are said to have been aimed specifically at South Korean infrastructure, such as power plants and banks.

Speaking at a location just outside the South Korean capital, Prof Kim told the BBC he has regular contact with key figures within the country who have intimate knowledge of the military’s cyber operation.

“The size of the cyber-attack agency has increased significantly, and now has approximately 6,000 people,” he said.

He estimated that between 10% to 20% of the regime’s military budget is being spent on online operations.

“The reason North Korea has been harassing other countries is to demonstrate that North Korea has cyber war capacity,” he added.

“Their cyber-attacks could have similar impacts as military attacks, killing people and destroying cities.”

Stuxnet clone

Speaking more specifically, Prof Kim said North Korea was building its own malware based on Stuxnet – a hack attack, widely attributed to the US and Israel, which struck Iranian nuclear centrifuges before being discovered in 2010.

“[A Stuxnet-style attack] designed to destroy a city has been prepared by North Korea and is a feasible threat,” Prof Kim said.

Earlier this year, the South Korean government blamed North Korea for a hack on the country’s Hydro and Nuclear Power Plant.

“Although the nuclear plant was not compromised by the attack, if the computer system controlling the nuclear reactor was compromised, the consequences could be unimaginably severe and cause extensive casualties,” Prof Kim said.

Martyn Williams is a journalist who follows closely the development of technology in North Korea.

He told the BBC: “I think it’s important to underline that this is theoretical and possible from non-North Korean hackers too.

“It’s conceivable that hackers would try something and lives could be at risk.

He noted an attack in 2003 on South Korean broadcasters, which he said was “an attempt to throw the country into confusion”.

“If TV had gone off air and then ATMs stopped working, people might have panicked.”

Inside Bureau 121

When it comes to cyber-attacks, few groups are as notorious as North Korea’s Bureau 121, which has operated since the late nineties.

Most security researchers agree that the group operates out of China. Specifically, in the basement of a restaurant, rated highly on TripAdvisor for its tremendous Korean food.

Prof Kim gave several Bureau 121 members their first taste of computer science.

While he didn’t teach hacking techniques, Prof Kim gave the students knowledge of the ins-and-outs of computing, networks and data transfer.

The very best students were later plucked from his course by the military and given further, more specialist training in cyber security.

Prof Kim told the BBC he feels saddened that some of the great, “bright” minds he nurtured had their potential channelled “not into improving our internet culture, but to terrorise other people using the internet”.

But he conceded that his former students probably enjoyed their task, and took pride in “accomplishing Kim Jong-un’s orders as a cyber warrior”.

‘Off the internet’

Prof Kim has called on international organisations to take action over North Korea’s cyber-activity.

“We need to collect the evidence of North Korea’s cyber terrorism and report them to UN Human Rights Council and other UN agencies,” he told the BBC.

“If North Korea continues to cause damage in this way, an organisation such as Icann should ban North Korea.”

Icann – the Internet Corporation for Assigned Names and Numbers – manages the distribution of domain name including .com and .net.

It could, theoretically, shut down the use of North Korea’s domain, .kp.

In a statement, Icann said its powers in this regard were limited.

“Icann does not have the power, nor remit, to ban countries from having a presence on or access to the Internet,” said Duncan Burns, its head of communications.

“Icann’s primary role is the coordination of the internet’s unique identifiers to ensure the stability, security and resiliency of the internet.

“We rely on law enforcement and governmental regulatory agencies to police reported illegal activity.”

Furthermore, disabling .kp would have minimal effect if, as is widely believed, much of North Korea’s hacking force conducts its operations outside of the country.

Other measures, such as sanctions imposed by the US in the wake of the Sony Pictures hack, might have a greater impact.

But Prof Kim added: “This issue can’t be solved by one or two countries.

“The international community needs to pay attention to North Korea’s attempts to destroy the internet.”