Home / Software & Service News / US hopes cyberattacks will stall North Korea’s missile program

US hopes cyberattacks will stall North Korea’s missile program

The US might not have had much success with cyberattacks against North Korea’s nuclear program, but that apparently hasn’t stopped officials from further efforts… not that they’re having much success. The New York Times has learned that then-President Obama ordered escalated cyberwarfare against North Korea in 2014 a bid to thwart its plans for intercontinental ballistic missiles. However, it’s not clear that this strategy has worked — and there may be problems if it does.

The newspaper understands that Obama pushed both intelligence agencies and the military to “pull out all the stops” on cyberwarfare efforts to wreck missiles either before they launch or in the first seconds afterward. While evidence shows that North Korean missiles started floundering at a very high rate (the mid-range Musudan missile has an 88 percent failure rate) soon after, it’s not certain how much of that was due to American efforts versus the inherent riskiness of the missile designs. The US effort “accented the failures,” according to the Times, but the launch rate has improved lately — and proper intercontinental missile tests might not be far off, if you believe North Korean leader Kim Jong-un.

A large part of this comes from the natures of both the country and its missile efforts. North Korea is notoriously isolated from the internet (not to mention computing technology as a whole), and its missile systems are both mobile and shuffled around to confuse enemies. It’s not so simple as slipping malware into the computers at a fixed location, like with the Stuxnet attack against Iran — you need to find out where and when a launch will take place.

President Trump hasn’t signaled if or how his administration might change this approach. Everything is still on the table, according to the Times. However, it might not want to press much harder. If a digital campaign is successful, it might give China, Russia and other nuclear-armed nations tacit permission to attack American nuclear launch systems. A belligerent country might be more tempted to launch a nuke if it knows that the US can’t respond in kind.

Source: New York Times

Click Here For Original Source Of The Article

About Ms. A. C. Kennedy

Ms. A. C. Kennedy
My name is Ms A C Kennedy and I am a Health practitioner and Consultant by day and a serial blogger by night. I luv family, life and learning new things. I especially luv learning how to improve my business. I also luv helping and sharing my information with others. Don't forget to ask me anything!

Check Also

Windows 10 included password manager with huge security hole

There's a good reason why security analysts get nervous about bundled third-party software: it can introduce vulnerabilities that the companies can't control. And Microsoft, unfortunately, has learned that the hard way. Google researcher Tavis Ormandy discovered that a Windows 10 image came bundled with a third-party password manager, Keeper, which came with a glaring browser plugin flaw -- a malicious website could steal passwords. Ormandy's copy was an MSDN image meant for developers, but Reddit users noted that they received the vulnerable copy of Keeper after clean reinstalls of regular copies and even a brand new laptop.

A Microsoft spokesperson told Ars Technica that the Keeper team had patched the exploit (in response to Ormandy's private disclosure), so it shouldn't be an issue if your software is up to date. Also, you were only exposed if you enabled the plugin.

However, the very existence of the hole has still raised a concern: are Microsoft's security tests as thorough for third-party apps as its own software? The company has declined to comment, but that kind of screening may prove crucial if Microsoft is going to maintain the trust of Windows users. It doesn't matter how secure Microsoft's code is if a bundled app undermines everything.

Source: Monorail, Tavis Ormandy (Twitter)