Cyber Attacks Against Korean Missile Launches

Former President Barack Obama wasn't impressed by the United States' missile defense systems. They constantly missed incoming blasts in practice attacks, to say nothing of how they might fare in the face of an actual assault. 

Obama was thinking about North Korea and its leader, Kim Jong-un, who's often going on about developing a nuclear warhead that can be fired atop an intercontinental ballistic missile.

If this ever happened, US defenses may well not be able to stop it. So - Obama ramped up American cyber-attacks on North Korean computer networks

About three years ago, North Korean missiles sputtered during launch attempts. Some unraveled just after takeoff. The switch in tactics may have added years before North Korean nuclear weapons will have range enough to reach the US. 

But the report also reminds us that North Korea has recently launched several successful missile tests, and says that though the cyber-attacks seem to have been effective, they are ultimately just a stalling tactic.

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise. 

Obama told Trump that North Korea may pose the single biggest challenge to his administration, and that may have to do with the limited range of defense mechanisms the White House will have at its disposal. 

Trump could try to beef up what Obama has done already, meaning greater and more ferocious cyber assaults. He could launch airstrikes against North Korean nuclear facilities, though it's far from certain that such an assault would destroy all that it needs to in order to erase the country's nuclear capabilities. 

He could try talking with North Korea about maybe not continuing to develop nuclear weapons while saber-rattling in the direction of the US. 

He could perhaps speak with the Chinese government about telling their much smaller neighbors, "hey, stop this, or we will not trade with you." 

But Trump's railed against China since the beginning of his campaign, and he's so far been short (and even bullying) toward foreign government officials from Australia to Mexico. 

North Korea has a habit of leading several news cycles per year in the United States, and 2017 should be no exception, especially since Kim is reportedly at least highly suspicious of US efforts to mess with his country's missile launches. 

He ordered an investigation into the matter toward the end of last year and, coincidentally or not, recently had several security officials executed by anti-aircraft weapons. 

Mashable:

You Might Also Read:

US Has A Secret Cyberwar Going Against North Korea:

Cyberwarfare: Borders Offer No Defense:

Did N. Korea Hack S. Korea’s Key Defense Contractor?:

Was North Korea Behind The IoT  DDoS Attack?:

Stuxnet, Secrecy & The New Era of Cyber War:

 

« FBI’s International Framework On Encrypted Data Access
The Next Big Conflict Will Turn On Artificial Intelligence »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Centre for the Protection of National Infrastructure (CPNI) - UK

Centre for the Protection of National Infrastructure (CPNI) - UK

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.