Verified Document

North Korean Intelligence Collection Methods Research Paper

North Korea Info Collection Over the many decades that it has had a dictatorial regime, North Korea has attempted to use a number of different approaches to gain access to the vital information it believes it needs to counter the forces of its warring enemy, South Korea. Even so on just about every level it is assumed that North Korea is quite far behind in its abilities to compete effectively in the challenge to confront or spy on other nations that it doesn't like or distrusts -- including the United States.

For the most part, North Korea funnels its strategies regarding the capturing of information through its military and spy networks (Pike, 2011). However, it has also begin using other more contemporary methods of information gathering and monitoring, including adjusting their military systems to facilitate better control and provocation strategies. This is thought to be occurring because of the country's awareness that it has to begin more seriously using cyber warfare and cellular tactics. The nation, through its leader, is very familiar with the emerging importance of technologies, but seems constrained by the approaches they can use and the options available. It has been said that Kim Jong-Il believes that those who do not appreciate technological capabilities are among the world's three main groups of fools, followed closely by smokers and people who do not appreciate music (Breitbart, 2009). This awareness must confront the fact that even South Korea is much more advanced in the way that it actively encourages Internet access and connectivity (Dies, 2011).

Over the course of many decades, North Korea has relied upon secretive...

Even U.S. military analyses acknowledge that with between 60,000 and 100,000 operatives North Korea has the largest spy network in the world. This level of military authority is laced with the purposes of power, control and intimidation, even when it is used for gathering intelligence information or raw provocation. The true purposes of this can be seen through recent moves by North Korean military leadership to consolidate and refine their levels of control and responsibility such that spying capabilities are more spread out across the armed forces.
Relatively recent information collection efforts based in the military use a number of operational and tactical methods. Since the 1950s to at least 2002, there have been dozens of examples of ways that they have threated to turn the "seas into fire" through military attacks and threats, even if they were publicly presented as being for other purposes or lied about. Many of their efforts have really been to infiltrate South Korean operations or to otherwise get trained personnel into that country. One notable example of this can be seen in a submarine incident that occurred in 1996 when a North Korean submarine was caught attempting to engage in a full-scale espionage plot (Dies, 2011). Military personnel went to shore and others were on the ship dressed in South Korean uniforms. After several efforts by the North Koreans to retrieve their soldiers once their mission had been uncovered, some of their men were either killed or committed suicide so they could not…

Sources used in this document:
REFERENCES

Associated Press (2009). N. Korea reshuffles key spy agencies. Hindustan Times. Viewable at http://www.hindustantimes.com/world-news/RestOfAsia/NKorea-reshuffles-key-spy-agencies-Report/Article1-409400.aspx.

Breitbart (2009). N. Korea operating cyber warfare unit. Viewable at http://www.breitbart.com/article.php?id=D97VRISG0.

Dies, H. (2011). North Korean Special Operations Forces: 1996 Kangnung submarine infiltration. Viewable at http://findarticles.com/p/articles/mi_m0IBS/is_4_30/ai_n13822276/.

Jin, H.Y. (2007). NSC's Detection of Cell Phone Usage is Strengthening. Inside North Korea. Viewable at http://www.dailynk.com/english/read.php?cataId=nk01500&num=2792.
Pike, J. (2011). Reconnaissance Bureau. FAS Intelligence Research Program. Viewable at http://fas.org/irp/world/dprk/rb/index.html.
Cite this Document:
Copy Bibliography Citation

Related Documents

North Korean Intelligence
Words: 1118 Length: 4 Document Type: Essay

North Korean Intelligence: Throughout its history, North Korea has continued to harass South Korea for as long as these countries have been separated by imaginary line and roadblocks. Since the country invasion upon South Korea in June 1950, North Korea has been a thorn in the daily lives of South Koreans. North Korea has been able to maintain such relations because of intelligence collection capabilities on the Korean Peninsula. The Democratic

United States Persuade North Korea
Words: 1568 Length: 4 Document Type: Research Proposal

The fundamentals of exchange theory are illustrated at Appendix a. This approach to analyzing the current situation in North Korea will help add to the existing body of knowledge by developing fresh insights into the possible motivating factors that have characterized North Korea's negotiations with the West in general and the United States in particular in the past and will help address the hypothesis to be tested which is

The Effect of Integration on Ci Humint Collection Women in Combat
Words: 20308 Length: 20 Document Type: Essay

Women in Combat: The Effect of Integration on CI/HUMINT Collection The Effect of Integration on CI/HUMINT Collection: Women in Combat Key Words: #Combat # Integration # CI/HUMINT The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Recently, the Pentagon announced its plan to open up all ground combat roles that had previously been closed to

The Effect of Integration on Ci Humint Collection Women in Combat
Words: 20780 Length: 70 Document Type: Essay

Women in Combat: The Effect of Integration on CI/HUMINT Collection The Effect of Integration on CI/HUMINT Collection: Women in Combat Key Words: #Combat # Integration # CI/HUMINT The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Recently, the Pentagon announced its plan to open up all ground combat roles that had previously been closed to

Predominantly Latino Gangs, Mara Salvatrucha
Words: 17380 Length: 40 Document Type: Thesis

Government Since gang-related crimes fall within the jurisdiction of state, this research will give an insight on the need to find solutions that increasingly include all levels of government. Congress needs to pass legislation that will change immigration enforcement laws and make more aliens deportable. In addition, the federal government should take a more active participation in helping local and state jurisdictions develop anti-gang responses. The local, state and federal governments

Benefits of Integration in the Ci Humint Community
Words: 20134 Length: 5 Document Type: Essay

Integration in the CI/HUMINT Community An Analysis of the Benefits of Integration in the CI/HUMINT Community and Strategies for Effective Implementation Shea Larson The success of any counterinsurgency operation depends largely on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Several years back, the U.S. Armed Forces opened up opportunities for women to occupy specific positions in counterintelligence/human intelligence (CI/HUMINT) discipline. However,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now