Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Reconnaissance General Bureau

From Wikipedia, the free encyclopedia
North Korean intelligence agency
Reconnaissance General Bureau
정찰총국
Intelligence agency overview
Formed2009
PrecedingIntelligence agency
Minister responsible
  • Ri Chang-ho
Parent departmentGeneral Staff Department of the Korean People's Army (partially)
Reconnaissance General Bureau
Hangul
정찰총국
Hanja
偵察總局
Revised RomanizationJeongchal Chongguk
McCune–ReischauerChŏngch'al Ch'ongguk

TheReconnaissance General Bureau (Korean정찰총국;RGB), part of theGeneral Staff Department, is aNorth Koreanintelligence agency that manages the state'sclandestine operations.[1] Most of their operations have a specific focus on Japan, South Korea, and the United States.[2] It was established in 2009.[2][3]

The RGB is regarded as North Korea's primary intelligence and clandestine operations organ.[4] Although its original missions have traditionally focused on clandestine operations such as commando raids, infiltrations and disruptions, the RGB has since come to control most of the known North Korean cyber capabilities, mainly underBureau 121 or its speculated successor, theCyber Warfare Guidance Bureau.[4]

It was headed at one time byKim Yong-chol as the first head of the RGB.[5][6]

History

[edit]

It is the direct successor of theGeneral Staff Department of the Korean People's Army'sReconnaissance Bureau (Korean:정찰국)[7] (which was responsible for several North Korean acts of espionage such as the1996 Gangneung submarine infiltration incident[8]). In addition, two former offices of theCentral Committee of the Workers' Party of Korea (WPK) were moved into the Reconnaissance General Bureau, namely the WPK's External Investigations and Intelligence Department (Korean:조선로동당 대외정보조사부), also known as Office 35, and the WPK's Operations Department, which was responsible for kidnapping foreign nationals during theCold War.[9][3][10]

The RGB was established in 2009 to consolidate various intelligence and special operations agencies of the North Korean government, meaning that units previously tasked with "political warfare, foreign intelligence, propaganda, subversion, kidnapping, special operations, and assassinations" were merged into one single organization.[11]

In August 2010, an RGB agent posing as a defector was caught by South Korean police for planning to assassinateHwang Jang-yop, who had defected from North Korea in 1997. The previous month two North Korean spies had been imprisoned for plotting to murder Hwang.[12] North Korea denied involvement, but the later defector "Kim Kuk-song" said that he had personally directed the July 2010 operation.[13] "Kim" also said "I can tell you that North Korean operatives are playing an active role in various civil society organisations as well as important institutions in South Korea.".[13]

A defector, a former senior colonel known by the pseudonym Kim Kuk-song, whose identity has been verified by theBBC, had a senior position in the RGB until 2014, and revealed much information about the Bureau's activities in a 2021 interview with the BBC.[13]

On October 31, 2017, two suspects were arrested byPublic Security police in Beijing in an attempt to assassinateKim Han-sol.[14] They were part of a seven-man team sent by the RGB.[15]

On November 12, 2021, an alleged RGB agent led an operation in Japan to illegally obtain foreign currency to shore up the North Korean economy by ordering two South Korean nationals to conduct a business that was against their official status of residence.[16]

On February 15, 2022, an upcoming UN report mentions that the RGB is involved in running several service-related industries throughout Cambodia.[17]

Cyberwarfare operational role

[edit]

The foundations for North Korean cyber operations were built in the 1990s, after North Korean computer scientists returned from travel abroad proposing to use the Internet as a means to spy on enemies and attack militarily superior opponents such as the United States and South Korea. Subsequently, students were sent abroad to China to participate in top computer science programs.[18]

The cyberwarfare unit was elevated to top priority in 2003 following theUS invasion of Iraq.[18]

Organization

[edit]

The structure of the RGB is as follows as of 2021:[1][19]

DepartmentMandate
First DepartmentTraining and technical assistance
Second DepartmentMilitary intelligence
Third DepartmentSignals intelligence and computer hacking
Fifth DepartmentKnown as Bureau 35, deals with foreign intelligence, including South Korea. Suspected of conducting the assassination plot on Kim Jong-nam
Sixth DepartmentMilitary contacts/policy guidelines
Seventh DepartmentLogistics
Department 53Runs theremote worker infiltration scheme[20]
Bureau 121[21][22]RGB's main cyberwarfare unit. Said to be placed under its control after 2013.[23]

Command

[edit]

Reconnaissance missions are also partially overseen by theGeneral Staff Department (GSD) of theKorean People's Army (KPA). As of 2014, experts argued that "North Korea does not seem to have yet organized these units into an overarching Cyber Command."[11]

The RGB appears to report directly to theNational Defence Commission, as well asKim Jong Un as the supreme commander of the KPA.[11]

Methods

[edit]

Until 2017, many North Korean spies were arrested in South Korea. But far fewer were arrested in the following years, apparently as the North started using new technologies rather than old-fashioned spying. In particular, high-profile defectors warned that Pyongyang had created a body of 6,000 skilledhackers.[13]

North Korean remote worker infiltration scheme

[edit]
Main article:North Korean remote worker infiltration scheme

The Reconnaissance General Bureau's department 53[24] has been involved in recruiting and training operatives for North Korea's large-scale remote worker infiltration scheme, which emerged around 2014 and significantly expanded during the COVID-19 pandemic. The RGB recruits top graduates from prestigious institutions such asKim Chaek University of Technology and theUniversity of Sciences in Pyongsong, training them in hacking techniques and foreign languages before deploying them as remote workers in Western companies under stolen identities. These operatives primarily target IT roles at US and European companies, using AI-enhanced interviews and deepfake technology to pass hiring processes, with individual workers earning an average of $300,000 annually that is funneled back to fund North Korea's weapons programs. The scheme has affected nearly every Fortune 500 company, generating millions in revenue while also enabling data theft and malware installation.[25]

See also

[edit]

References

[edit]
  1. ^abLankov, Andrei (1 May 2017)."On the Great Leader's Secret Service: North Korea's intelligence agencies".NK News. Korea Risk Group. Archived fromthe original on 31 July 2018.
  2. ^ab"Kim Jong-nam: Who in North Korea could organise a VX murder?".BBC News. 24 February 2017. Retrieved13 May 2017.
  3. ^abJun, Jenny; LaFoy, Scott; Sohn, Ethan (2015).North Korea's Cyber Operations: Strategy and Responses.Center for Strategic and International Studies report. Lanham, Maryland: Rowman & Littlefield. p. 39.ISBN 978-1-4422-5903-4.
  4. ^ab"North Korea's Cyber Operations: Strategy and Responses"(PDF).Center for Strategic and International Studies. Archived fromthe original(PDF) on 25 October 2019. Retrieved16 October 2017.
  5. ^"North Korea Is Sending Military Hardliner Kim Yong Chol to the Olympic Closing Ceremony. Here's What to Know".Time. Retrieved3 March 2018.
  6. ^"N Korea to send general to Olympics".BBC News. 22 February 2018. Retrieved3 March 2018.
  7. ^"38 North Special Report: A New Emphasis on Operations Against South Korea?"(PDF).38 North.
  8. ^"In 1996, a Dead North Korean Spy Submarine (Armed with Commandos) Nearly Started a War". Center for the National Interest. 13 March 2017.
  9. ^Gause, Ken E. (2006).North Korean Civil-military Trends: Military-first Politics to a Point.Carlisle Barracks, Pennsylvania: Strategic Studies Institute, U.S. Army War College. p. 28.ISBN 978-1-58487-257-3.
  10. ^Gause, Ken E. (2013). "The Role and Influence of the Party Apparatus". In Park, Kyung-ae; Snyder, Scott (eds.).North Korea in Transition: Politics, Economy, and Society.Rowman & Littlefield. pp. 19–46.ISBN 978-1442218123.
  11. ^abc"The Organization of Cyber Operations in North Korea"(PDF).Center for Strategic and International Studies. Archived fromthe original(PDF) on 30 June 2019. Retrieved16 October 2017.
  12. ^"S Korea arrests 'N Korean agent'".Al Jazeera. 20 October 2010.
  13. ^abcdBicker, Laura (11 October 2021)."Drugs, arms, and terror: A high-profile defector on Kim's North Korea".BBC News.The BBC cannot independently verify [Kim Kuk-song's] claims, but we have managed to verify his identity and, where possible, found corroborating evidence for his allegations.
  14. ^Ryall, Julian (30 October 2017)."China 'detains North Korean assassins seeking Kim Jong-un's dissident nephew Kim Han-sol'".The Daily Telegraph. Retrieved7 September 2018.
  15. ^"Chinese police foil assassination plot on Jong Nam's son".Free Malaysia Today. 31 October 2017. Retrieved7 September 2018.
  16. ^"2 South Koreans nabbed in Japan part of North Korea cash operation: Sources". Archived fromthe original on 12 November 2021.
  17. ^"North Korean spy ran hotels, casinos and travel agency in Cambodia: UN report".NK News. Archived fromthe original on 15 February 2022. Retrieved22 February 2022.
  18. ^abSanger, David E.; Kirkpatrick, David D.; Perlroth, Nicole (15 October 2017)."The World Once Laughed at North Korean Cyberpower. No More".The New York Times.ISSN 0362-4331. Retrieved16 October 2017.
  19. ^Ji Young, Kong; Jong In, Lim; Kyoung Gon, Kim.The All-Purpose Sword: North Korea's Cyber Operations and Strategies(PDF).2019 11th International Conference on Cyber Conflict: Silent Battle (Report). NATO.
  20. ^Otto, Greg (16 January 2025)."Treasury sanctions North Korea over remote IT worker schemes".CyberScoop. Retrieved11 June 2025.
  21. ^"FDD | Kim Jong Un's 'All-Purpose Sword'". 3 October 2018.
  22. ^"North Korean Cyber Activity"(PDF). 25 March 2021. Archived fromthe original(PDF) on 3 May 2021.
  23. ^"Not Found".{{cite web}}:Missing or empty|url= (help)
  24. ^Otto, Greg (16 January 2025)."Treasury sanctions North Korea over remote IT worker schemes".CyberScoop. Retrieved11 June 2025.
  25. ^"North Korea Stole Your Tech Job".Wired. 2025. Retrieved10 June 2025.
Active forces
Paramilitary and reserve forces
Senior leadership
History
Foreign
intelligence
Domestic
intelligence
Military
intelligence
Signals
intelligence
Imagery
intelligence
Financial
intelligence
Criminal
intelligence
Intelligence
community
Intelligence
alliances
Defunct
agencies
Related
topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Reconnaissance_General_Bureau&oldid=1298139505"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp