Cyber Attacks Against Korean Missile Launches

Former President Barack Obama wasn't impressed by the United States' missile defense systems. They constantly missed incoming blasts in practice attacks, to say nothing of how they might fare in the face of an actual assault. 

Obama was thinking about North Korea and its leader, Kim Jong-un, who's often going on about developing a nuclear warhead that can be fired atop an intercontinental ballistic missile.

If this ever happened, US defenses may well not be able to stop it. So - Obama ramped up American cyber-attacks on North Korean computer networks

About three years ago, North Korean missiles sputtered during launch attempts. Some unraveled just after takeoff. The switch in tactics may have added years before North Korean nuclear weapons will have range enough to reach the US. 

But the report also reminds us that North Korea has recently launched several successful missile tests, and says that though the cyber-attacks seem to have been effective, they are ultimately just a stalling tactic.

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise. 

Obama told Trump that North Korea may pose the single biggest challenge to his administration, and that may have to do with the limited range of defense mechanisms the White House will have at its disposal. 

Trump could try to beef up what Obama has done already, meaning greater and more ferocious cyber assaults. He could launch airstrikes against North Korean nuclear facilities, though it's far from certain that such an assault would destroy all that it needs to in order to erase the country's nuclear capabilities. 

He could try talking with North Korea about maybe not continuing to develop nuclear weapons while saber-rattling in the direction of the US. 

He could perhaps speak with the Chinese government about telling their much smaller neighbors, "hey, stop this, or we will not trade with you." 

But Trump's railed against China since the beginning of his campaign, and he's so far been short (and even bullying) toward foreign government officials from Australia to Mexico. 

North Korea has a habit of leading several news cycles per year in the United States, and 2017 should be no exception, especially since Kim is reportedly at least highly suspicious of US efforts to mess with his country's missile launches. 

He ordered an investigation into the matter toward the end of last year and, coincidentally or not, recently had several security officials executed by anti-aircraft weapons. 

Mashable:

You Might Also Read:

US Has A Secret Cyberwar Going Against North Korea:

Cyberwarfare: Borders Offer No Defense:

Did N. Korea Hack S. Korea’s Key Defense Contractor?:

Was North Korea Behind The IoT  DDoS Attack?:

Stuxnet, Secrecy & The New Era of Cyber War:

 

« FBI’s International Framework On Encrypted Data Access
The Next Big Conflict Will Turn On Artificial Intelligence »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Total Cyber-Sec

Total Cyber-Sec

Total Cyber-Sec is a company specialized in providing Professional Information Security and Cybersecurity Services.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.