Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Over the past months, with increasing alarm, world leaders have analysed every option in the battle to halt Kim Jong-un and his nuclear ambitions.

But after his latest military exercise, another strategy is being discussed: cyber-warfare. Just days ago, UK  Prime Minister Theresa May refused four times to rule out whether our Government would employ such covert techniques to attack and sabotage North Korea’s computer networks by using viruses.

Her caginess is, of course, understandable. When dealing with maverick dictators such as Kim Jong-un, it makes no sense to tell the world what cards you hold, or indeed, whether you are considering playing them.

However, what is the reality of Britain’s cyber-warfare capabilities? Is the Government really capable of mounting sophisticated electronic attacks that could cripple Kim’s nuclear missile programme? How exactly would we do it? And who else would be doing it?

Naturally, the world of state-operated cyber-warfare is highly secret. But it is possible to make some educated suppositions about what we and the Americans are capable of, and to make a reasonable assessment about whether we could use cyber-warfare against Kim. Although experts are divided about many specific issues, they agree on one thing, cyber-warfare against the North Koreans is already taking place.

Three years ago, President Obama ordered Pentagon officials to step up such attacks on North Korea’s missile programme to sabotage test launches in the moment after lift-off. It was not long before a number of Kim’s military rockets exploded, veered off course, disintegrated in midair and plunged into the sea.

Such operations are undoubtedly being masterminded by America’s clandestine Office of Tailored Access Operations, or TAO, which is part of the National Security Agency (NSA).

Much of what is known about it comes from the documents stolen by renegade former NSA contractor Edward Snowden. 
With several hundred employees, many being the most elite computer hackers on the planet, TAO is thought to have already carried out successful cyber-attacks that have gathered intelligence from North Korea.

What is unclear is whether British agencies such as GCHQ in Cheltenham, or the various units that comprise the military’s Joint Forces Cyber Group, have been assisting with these attacks. ‘We have to assume that the UK has been assisting in some way,’ says Dr Andrew Futter, of the University of Leicester. ‘There are certainly links with GCHQ and the NSA, and Britain is one of the foremost cyber-powers in the world.’

If we assume that Britain and the US are working together to cripple North Korea’s nuclear missile programme, how are they doing it?

The most important thing to bear in mind is that hacking into Kim’s missile facilities is certainly not like hacking a bank or email account. For a start, as the most secretive and isolated state in the world, North Korea is scarcely connected to the Internet, which means that few, if any, of its computers and networks are accessible. Ironically enough, the secretive country’s backwardness is an advantage.

The North Koreans do not use the same technology as the rest of the world,’ says Conor Deane-McKenna, a researcher in cyber-warfare at Birmingham University. ‘Much of it is older and outdated, which means that it can’t even connect to the internet. And there’s no doubt that every computer and person associated with the missile programme won’t be online.’
Thus Korean military teams will physically visit the location of the target network, and connect some form of hardware – such as a USB stick or a laptop – so TAO, for example, can gain access remotely.

This method is thought to have been successfully used by the Americans and the Israelis against Iran’s Natanz nuclear facility in 2012 and 2013, during which a computer ‘worm’ was responsible for crippling scores of uranium enrichment centrifuges.
However, to work against the North Koreans, a human agent would have to be involved.

Of course, if the real world were like Hollywood, that agent would gain access to the regime’s missile programme computers, plug in a memory stick, and watch with satisfaction as Kim’s missiles blew up on their launch pads. Although that may still happen, it’s most likely that there are much more mundane techniques being used. These may involve nearby ships from the US Navy or Royal Navy.

Indeed, the American military has a huge presence in the area – with an estimated 40,000 personnel in Japan and 35,000 in South Korea, while using the island of Guam as a ‘permanent aircraft carrier’.

Reports suggest there are more US military personnel in Japan than in any other country. According to Department of Defense data, they are stationed across 112 bases. Headquartered in Japan, the Seventh Fleet is the largest of the US Navy’s deployed sea forces, with up to 70 ships and submarines, 140 aircraft and about 20,000 sailors in the Indian Ocean and the Pacific. The USS Ronald Reagan, a nuclear-powered aircraft supercarrier, is permanently deployed in Japan, as the fleet’s flagship carrier. 

Dr Futter concedes that this infrastructure could be being used for cyber-warfare. ‘After all,’ he says, ‘it has long been suspected that the Israelis managed to cripple the Syrians’ air defence radar with some sort of drone, so it’s not implausible a ship could be used.’

Some have speculated that the relatively high failure rate of North Korea’s missiles means the Americans or the British have hacked into their systems and sabotaged their efforts.

In any case, cyber-warfare works on two levels. Not only is it a potent weapon, but its very existence gives the enemy a crisis of confidence. ‘You need to think of it as psychological warfare,’ says Dr Futter. ‘You use it to sow the seeds of doubt.
‘So whenever something goes wrong with a missile, the North Koreans are worried whether it is a problem with their engineering, or whether they have actually been cyber-attacked.’

It’s for this reason that Theresa May did not rule out the use of cyber-warfare.

Considering the expertise of the Pentagon and GCHQ, this is surely not a bluff. Indeed, security experts say the public would be shocked to learn the extent of details such organisations can find about the most personal aspects of our daily lives.
Meanwhile, Kim Jong-un and his generals are trying to keep one step ahead – and have their own cyber-boffins trying to sabotage America’s infrastructure.

Earlier this year, a report on cyber vulnerabilities commissioned by the Pentagon warned that North Korea might acquire the ability to cripple the American power grid.

What is certain is that global power is no longer based on economic and military might (even with Pyongyang’s display of hydrogen bomb technology), but on having better cyber experts than your enemies. 

 

Ein News

How Worried Should We Be About a Nuclear War With North Korea?:

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

 

« Will GDPR Protect Privacy Or Just Lead To More Hacks?
How Dangerous Is ISIS In The Cyber Domain? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.