Cyber Attacks Against Korean Missile Launches

Former President Barack Obama wasn't impressed by the United States' missile defense systems. They constantly missed incoming blasts in practice attacks, to say nothing of how they might fare in the face of an actual assault. 

Obama was thinking about North Korea and its leader, Kim Jong-un, who's often going on about developing a nuclear warhead that can be fired atop an intercontinental ballistic missile.

If this ever happened, US defenses may well not be able to stop it. So - Obama ramped up American cyber-attacks on North Korean computer networks

About three years ago, North Korean missiles sputtered during launch attempts. Some unraveled just after takeoff. The switch in tactics may have added years before North Korean nuclear weapons will have range enough to reach the US. 

But the report also reminds us that North Korea has recently launched several successful missile tests, and says that though the cyber-attacks seem to have been effective, they are ultimately just a stalling tactic.

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise. 

Obama told Trump that North Korea may pose the single biggest challenge to his administration, and that may have to do with the limited range of defense mechanisms the White House will have at its disposal. 

Trump could try to beef up what Obama has done already, meaning greater and more ferocious cyber assaults. He could launch airstrikes against North Korean nuclear facilities, though it's far from certain that such an assault would destroy all that it needs to in order to erase the country's nuclear capabilities. 

He could try talking with North Korea about maybe not continuing to develop nuclear weapons while saber-rattling in the direction of the US. 

He could perhaps speak with the Chinese government about telling their much smaller neighbors, "hey, stop this, or we will not trade with you." 

But Trump's railed against China since the beginning of his campaign, and he's so far been short (and even bullying) toward foreign government officials from Australia to Mexico. 

North Korea has a habit of leading several news cycles per year in the United States, and 2017 should be no exception, especially since Kim is reportedly at least highly suspicious of US efforts to mess with his country's missile launches. 

He ordered an investigation into the matter toward the end of last year and, coincidentally or not, recently had several security officials executed by anti-aircraft weapons. 

Mashable:

You Might Also Read:

US Has A Secret Cyberwar Going Against North Korea:

Cyberwarfare: Borders Offer No Defense:

Did N. Korea Hack S. Korea’s Key Defense Contractor?:

Was North Korea Behind The IoT  DDoS Attack?:

Stuxnet, Secrecy & The New Era of Cyber War:

 

« FBI’s International Framework On Encrypted Data Access
The Next Big Conflict Will Turn On Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.