Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Over the past months, with increasing alarm, world leaders have analysed every option in the battle to halt Kim Jong-un and his nuclear ambitions.

But after his latest military exercise, another strategy is being discussed: cyber-warfare. Just days ago, UK  Prime Minister Theresa May refused four times to rule out whether our Government would employ such covert techniques to attack and sabotage North Korea’s computer networks by using viruses.

Her caginess is, of course, understandable. When dealing with maverick dictators such as Kim Jong-un, it makes no sense to tell the world what cards you hold, or indeed, whether you are considering playing them.

However, what is the reality of Britain’s cyber-warfare capabilities? Is the Government really capable of mounting sophisticated electronic attacks that could cripple Kim’s nuclear missile programme? How exactly would we do it? And who else would be doing it?

Naturally, the world of state-operated cyber-warfare is highly secret. But it is possible to make some educated suppositions about what we and the Americans are capable of, and to make a reasonable assessment about whether we could use cyber-warfare against Kim. Although experts are divided about many specific issues, they agree on one thing, cyber-warfare against the North Koreans is already taking place.

Three years ago, President Obama ordered Pentagon officials to step up such attacks on North Korea’s missile programme to sabotage test launches in the moment after lift-off. It was not long before a number of Kim’s military rockets exploded, veered off course, disintegrated in midair and plunged into the sea.

Such operations are undoubtedly being masterminded by America’s clandestine Office of Tailored Access Operations, or TAO, which is part of the National Security Agency (NSA).

Much of what is known about it comes from the documents stolen by renegade former NSA contractor Edward Snowden. 
With several hundred employees, many being the most elite computer hackers on the planet, TAO is thought to have already carried out successful cyber-attacks that have gathered intelligence from North Korea.

What is unclear is whether British agencies such as GCHQ in Cheltenham, or the various units that comprise the military’s Joint Forces Cyber Group, have been assisting with these attacks. ‘We have to assume that the UK has been assisting in some way,’ says Dr Andrew Futter, of the University of Leicester. ‘There are certainly links with GCHQ and the NSA, and Britain is one of the foremost cyber-powers in the world.’

If we assume that Britain and the US are working together to cripple North Korea’s nuclear missile programme, how are they doing it?

The most important thing to bear in mind is that hacking into Kim’s missile facilities is certainly not like hacking a bank or email account. For a start, as the most secretive and isolated state in the world, North Korea is scarcely connected to the Internet, which means that few, if any, of its computers and networks are accessible. Ironically enough, the secretive country’s backwardness is an advantage.

The North Koreans do not use the same technology as the rest of the world,’ says Conor Deane-McKenna, a researcher in cyber-warfare at Birmingham University. ‘Much of it is older and outdated, which means that it can’t even connect to the internet. And there’s no doubt that every computer and person associated with the missile programme won’t be online.’
Thus Korean military teams will physically visit the location of the target network, and connect some form of hardware – such as a USB stick or a laptop – so TAO, for example, can gain access remotely.

This method is thought to have been successfully used by the Americans and the Israelis against Iran’s Natanz nuclear facility in 2012 and 2013, during which a computer ‘worm’ was responsible for crippling scores of uranium enrichment centrifuges.
However, to work against the North Koreans, a human agent would have to be involved.

Of course, if the real world were like Hollywood, that agent would gain access to the regime’s missile programme computers, plug in a memory stick, and watch with satisfaction as Kim’s missiles blew up on their launch pads. Although that may still happen, it’s most likely that there are much more mundane techniques being used. These may involve nearby ships from the US Navy or Royal Navy.

Indeed, the American military has a huge presence in the area – with an estimated 40,000 personnel in Japan and 35,000 in South Korea, while using the island of Guam as a ‘permanent aircraft carrier’.

Reports suggest there are more US military personnel in Japan than in any other country. According to Department of Defense data, they are stationed across 112 bases. Headquartered in Japan, the Seventh Fleet is the largest of the US Navy’s deployed sea forces, with up to 70 ships and submarines, 140 aircraft and about 20,000 sailors in the Indian Ocean and the Pacific. The USS Ronald Reagan, a nuclear-powered aircraft supercarrier, is permanently deployed in Japan, as the fleet’s flagship carrier. 

Dr Futter concedes that this infrastructure could be being used for cyber-warfare. ‘After all,’ he says, ‘it has long been suspected that the Israelis managed to cripple the Syrians’ air defence radar with some sort of drone, so it’s not implausible a ship could be used.’

Some have speculated that the relatively high failure rate of North Korea’s missiles means the Americans or the British have hacked into their systems and sabotaged their efforts.

In any case, cyber-warfare works on two levels. Not only is it a potent weapon, but its very existence gives the enemy a crisis of confidence. ‘You need to think of it as psychological warfare,’ says Dr Futter. ‘You use it to sow the seeds of doubt.
‘So whenever something goes wrong with a missile, the North Koreans are worried whether it is a problem with their engineering, or whether they have actually been cyber-attacked.’

It’s for this reason that Theresa May did not rule out the use of cyber-warfare.

Considering the expertise of the Pentagon and GCHQ, this is surely not a bluff. Indeed, security experts say the public would be shocked to learn the extent of details such organisations can find about the most personal aspects of our daily lives.
Meanwhile, Kim Jong-un and his generals are trying to keep one step ahead – and have their own cyber-boffins trying to sabotage America’s infrastructure.

Earlier this year, a report on cyber vulnerabilities commissioned by the Pentagon warned that North Korea might acquire the ability to cripple the American power grid.

What is certain is that global power is no longer based on economic and military might (even with Pyongyang’s display of hydrogen bomb technology), but on having better cyber experts than your enemies. 

 

Ein News

How Worried Should We Be About a Nuclear War With North Korea?:

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?:

 

« Will GDPR Protect Privacy Or Just Lead To More Hacks?
How Dangerous Is ISIS In The Cyber Domain? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.