Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

On July 4 this year, timed to coincide with America’s Independence Day, North Korea launched its first intercontinental ballistic missile. It was a gift, said leader Kim Jong Un, for the “American Bastards” on their national holiday. 

He encouraged the military to "frequently send big and small gift packages”, and this call was heeded, with the longest-range test launched a month later. It was capable, in theory, of reaching Los Angeles, Denver or Chicago.

President Donald Trump’s response so far has been to challenge China to do more to rein in its neighbour. Recently, he changed tack and promised to meet any more threats from the hermit kingdom with “fire and fury like the world has never seen”. 

The problem? Outright nuclear war would be devastating for both sides. Then again, neither leader is known for backing down. So what’s the alternative?

North Korea’s missile tests are about a show of strength, and the ultimate show of strength is a long-range nuclear missile. But what the North reportedly lacks is the technological accuracy and the ability to shrink that nuclear power to fit into a warhead. These are things that will come with time.  But what if progress could be slowed, or even halted, using cyber warfare? According to a New York Times report published in March, the Obama administration spent years ramping up its cyber sabotage, with suggestions that it was responsible for an 88 per cent failure rate of mid-range missile tests in North Korea. 

So can the US simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

The short answer, is no but...
“What you can achieve through cyber means is a little unclear because so little of North Korea’s critical infrastructure is online,” says Tim Stevens, lecturer in global security at King’s College London. As a result of how North Korea is connected to the rest of the world, many of its military units are likely based outside of the country in China and Southeast Asia, Stevens says. 

It doesn’t matter if US intelligence shows that attacks are originating from within those countries, he adds. “What are you going to do? Wade in somewhere and arrest these people or get them arrested by the host country? That’s not going to happen. So it’s a good ploy on the part of North Korea.”

Wired

You Might Also Read: 

Cyber Attacks Against Korean Missile Launches:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

« Learning About ISIS Intentions Using Open Source Intelligence
Nazi Website Taken Over By Anonymous »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a non-profit corporation focused on identifying, mitigating, and neutralizing cyber crime threats globally.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

National Information & Communication Security Taskforce (NICST) - Taiwan

National Information & Communication Security Taskforce (NICST) - Taiwan

National Information & Communication Security Taskforce (NICST) is responsible for coordination and policy making of information and communication security in Taiwan.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.