Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

On July 4 this year, timed to coincide with America’s Independence Day, North Korea launched its first intercontinental ballistic missile. It was a gift, said leader Kim Jong Un, for the “American Bastards” on their national holiday. 

He encouraged the military to "frequently send big and small gift packages”, and this call was heeded, with the longest-range test launched a month later. It was capable, in theory, of reaching Los Angeles, Denver or Chicago.

President Donald Trump’s response so far has been to challenge China to do more to rein in its neighbour. Recently, he changed tack and promised to meet any more threats from the hermit kingdom with “fire and fury like the world has never seen”. 

The problem? Outright nuclear war would be devastating for both sides. Then again, neither leader is known for backing down. So what’s the alternative?

North Korea’s missile tests are about a show of strength, and the ultimate show of strength is a long-range nuclear missile. But what the North reportedly lacks is the technological accuracy and the ability to shrink that nuclear power to fit into a warhead. These are things that will come with time.  But what if progress could be slowed, or even halted, using cyber warfare? According to a New York Times report published in March, the Obama administration spent years ramping up its cyber sabotage, with suggestions that it was responsible for an 88 per cent failure rate of mid-range missile tests in North Korea. 

So can the US simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

The short answer, is no but...
“What you can achieve through cyber means is a little unclear because so little of North Korea’s critical infrastructure is online,” says Tim Stevens, lecturer in global security at King’s College London. As a result of how North Korea is connected to the rest of the world, many of its military units are likely based outside of the country in China and Southeast Asia, Stevens says. 

It doesn’t matter if US intelligence shows that attacks are originating from within those countries, he adds. “What are you going to do? Wade in somewhere and arrest these people or get them arrested by the host country? That’s not going to happen. So it’s a good ploy on the part of North Korea.”

Wired

You Might Also Read: 

Cyber Attacks Against Korean Missile Launches:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

« Learning About ISIS Intentions Using Open Source Intelligence
Nazi Website Taken Over By Anonymous »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.