Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

On July 4 this year, timed to coincide with America’s Independence Day, North Korea launched its first intercontinental ballistic missile. It was a gift, said leader Kim Jong Un, for the “American Bastards” on their national holiday. 

He encouraged the military to "frequently send big and small gift packages”, and this call was heeded, with the longest-range test launched a month later. It was capable, in theory, of reaching Los Angeles, Denver or Chicago.

President Donald Trump’s response so far has been to challenge China to do more to rein in its neighbour. Recently, he changed tack and promised to meet any more threats from the hermit kingdom with “fire and fury like the world has never seen”. 

The problem? Outright nuclear war would be devastating for both sides. Then again, neither leader is known for backing down. So what’s the alternative?

North Korea’s missile tests are about a show of strength, and the ultimate show of strength is a long-range nuclear missile. But what the North reportedly lacks is the technological accuracy and the ability to shrink that nuclear power to fit into a warhead. These are things that will come with time.  But what if progress could be slowed, or even halted, using cyber warfare? According to a New York Times report published in March, the Obama administration spent years ramping up its cyber sabotage, with suggestions that it was responsible for an 88 per cent failure rate of mid-range missile tests in North Korea. 

So can the US simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

The short answer, is no but...
“What you can achieve through cyber means is a little unclear because so little of North Korea’s critical infrastructure is online,” says Tim Stevens, lecturer in global security at King’s College London. As a result of how North Korea is connected to the rest of the world, many of its military units are likely based outside of the country in China and Southeast Asia, Stevens says. 

It doesn’t matter if US intelligence shows that attacks are originating from within those countries, he adds. “What are you going to do? Wade in somewhere and arrest these people or get them arrested by the host country? That’s not going to happen. So it’s a good ploy on the part of North Korea.”

Wired

You Might Also Read: 

Cyber Attacks Against Korean Missile Launches:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

« Learning About ISIS Intentions Using Open Source Intelligence
Nazi Website Taken Over By Anonymous »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.