Cyber Attacks Against Korean Missile Launches

Former President Barack Obama wasn't impressed by the United States' missile defense systems. They constantly missed incoming blasts in practice attacks, to say nothing of how they might fare in the face of an actual assault. 

Obama was thinking about North Korea and its leader, Kim Jong-un, who's often going on about developing a nuclear warhead that can be fired atop an intercontinental ballistic missile.

If this ever happened, US defenses may well not be able to stop it. So - Obama ramped up American cyber-attacks on North Korean computer networks

About three years ago, North Korean missiles sputtered during launch attempts. Some unraveled just after takeoff. The switch in tactics may have added years before North Korean nuclear weapons will have range enough to reach the US. 

But the report also reminds us that North Korea has recently launched several successful missile tests, and says that though the cyber-attacks seem to have been effective, they are ultimately just a stalling tactic.

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise. 

Obama told Trump that North Korea may pose the single biggest challenge to his administration, and that may have to do with the limited range of defense mechanisms the White House will have at its disposal. 

Trump could try to beef up what Obama has done already, meaning greater and more ferocious cyber assaults. He could launch airstrikes against North Korean nuclear facilities, though it's far from certain that such an assault would destroy all that it needs to in order to erase the country's nuclear capabilities. 

He could try talking with North Korea about maybe not continuing to develop nuclear weapons while saber-rattling in the direction of the US. 

He could perhaps speak with the Chinese government about telling their much smaller neighbors, "hey, stop this, or we will not trade with you." 

But Trump's railed against China since the beginning of his campaign, and he's so far been short (and even bullying) toward foreign government officials from Australia to Mexico. 

North Korea has a habit of leading several news cycles per year in the United States, and 2017 should be no exception, especially since Kim is reportedly at least highly suspicious of US efforts to mess with his country's missile launches. 

He ordered an investigation into the matter toward the end of last year and, coincidentally or not, recently had several security officials executed by anti-aircraft weapons. 

Mashable:

You Might Also Read:

US Has A Secret Cyberwar Going Against North Korea:

Cyberwarfare: Borders Offer No Defense:

Did N. Korea Hack S. Korea’s Key Defense Contractor?:

Was North Korea Behind The IoT  DDoS Attack?:

Stuxnet, Secrecy & The New Era of Cyber War:

 

« FBI’s International Framework On Encrypted Data Access
The Next Big Conflict Will Turn On Artificial Intelligence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.