Military invasion. Sending in a hit squad. Tougher sanctions. Over the past months, with increasing alarm, world leaders have analysed every option in the battle to halt Kim Jong-un and his nuclear ambitions.
But after his latest military exercise, another strategy is being discussed: cyber-warfare.
Just days ago, Theresa May refused four times to rule out whether our Government would employ such covert techniques to attack and sabotage North Korea’s computer networks by using viruses.
Her caginess is, of course, understandable. When dealing with maverick dictators such as Kim Jong-un, it makes no sense to tell the world what cards you hold, or indeed, whether you are considering playing them.
When dealing with maverick dictators such as Kim Jong-un, it makes no sense to tell the world what cards you hold, or indeed, whether you are considering playing them
But after his latest military exercise, another strategy is being discussed: cyber-warfare
However, what is the reality of Britain’s cyber-warfare capabilities? Is the Government really capable of mounting sophisticated electronic attacks that could cripple Kim’s nuclear missile programme? How exactly would we do it? And who else would be doing it?
Naturally, the world of state-operated cyber-warfare is highly secret.
But it is possible to make some educated suppositions about what we and the Americans are capable of, and to make a reasonable assessment about whether we could use cyber-warfare against Kim.
Although experts are divided about many specific issues, they agree on one thing – cyber-warfare against the North Koreans is already taking place.
Three years ago, President Obama ordered Pentagon officials to step up such attacks on North Korea’s missile programme to sabotage test launches in the moment after lift-off. It was not long before a number of Kim’s military rockets exploded, veered off course, disintegrated in midair and plunged into the sea.
Such operations are undoubtedly being masterminded by America’s clandestine Office of Tailored Access Operations – or TAO – which is part of the National Security Agency (NSA).
Much of what is known about it comes from the documents stolen by renegade former NSA contractor Edward Snowden, and disgracefully made public – putting at risk the undercover work of spies.
What is unclear is whether British agencies such as GCHQ in Cheltenham (pictured), or the various units that comprise the military’s Joint Forces Cyber Group, have been assisting with these attacks
With several hundred employees, many being the most elite computer hackers on the planet, TAO is thought to have already carried out successful cyber-attacks that have gathered intelligence from North Korea.
What is unclear is whether British agencies such as GCHQ in Cheltenham, or the various units that comprise the military’s Joint Forces Cyber Group, have been assisting with these attacks.
‘We have to assume that the UK has been assisting in some way,’ says Dr Andrew Futter, of the University of Leicester. ‘There are certainly links with GCHQ and the NSA, and Britain is one of the foremost cyber-powers in the world.’
If we assume that Britain and the US are working together to cripple North Korea’s nuclear missile programme, how are they doing it?
The most important thing to bear in mind is that hacking into Kim’s missile facilities is certainly not like hacking a bank or email account. For a start, as the most secretive and isolated state in the world, North Korea is scarcely connected to the internet, which means that few, if any, of its computers and networks are accessible.
And ironically enough, the secretive country’s backwardness is an advantage.
‘The North Koreans do not use the same technology as the rest of the world,’ says Conor Deane-McKenna, a researcher in cyber-warfare at Birmingham University. ‘Much of it is older and outdated, which means that it can’t even connect to the internet. And there’s no doubt that every computer and person associated with the missile programme won’t be online.’
Thus Korean military teams will physically visit the location of the target network, and connect some form of hardware – such as a USB stick or a laptop – so TAO, for example, can gain access remotely.
This method is thought to have been successfully used by the Americans and the Israelis against Iran’s Natanz nuclear facility in 2012 and 2013, during which a computer ‘worm’ was responsible for crippling scores of uranium enrichment centrifuges.
However, to work against the North Koreans, a human agent would have to be involved.
Of course, if the real world were like Hollywood, that agent would gain access to the regime’s missile programme computers, plug in a memory stick, and watch with satisfaction as Kim’s missiles blew up on their launch pads.
Although that may still happen, it’s most likely that there are much more mundane techniques being used.
These may involve nearby ships from the US Navy or Royal Navy.
The American military has a huge presence in the area – with an estimated 40,000 personnel in Japan and 35,000 in South Korea, while using the island of Guam as a ‘permanent aircraft carrier’. Pictured: US Navy ships and planes off GUam
Indeed, the American military has a huge presence in the area – with an estimated 40,000 personnel in Japan and 35,000 in South Korea, while using the island of Guam as a ‘permanent aircraft carrier’.
Reports suggest there are more US military personnel in Japan than in any other country. According to Department of Defense data, they are stationed across 112 bases.
Headquartered in Japan, the Seventh Fleet is the largest of the US Navy’s deployed sea forces, with up to 70 ships and submarines, 140 aircraft and about 20,000 sailors in the Indian Ocean and the Pacific.
The USS Ronald Reagan, a nuclear-powered aircraft supercarrier, is permanently deployed in Japan, as the fleet’s flagship carrier.
Dr Futter concedes that this infrastructure could be being used for cyber-warfare.
‘After all,’ he says, ‘it has long been suspected that the Israelis managed to cripple the Syrians’ air defence radar with some sort of drone, so it’s not implausible a ship could be used.’
Some have speculated that the relatively high failure rate of North Korea’s missiles means the Americans or the British have hacked into their systems and sabotaged their efforts.
In any case, cyber-warfare works on two levels. Not only is it a potent weapon, but its very existence gives the enemy a crisis of confidence.
‘You need to think of it as psychological warfare,’ says Dr Futter. ‘You use it to sow the seeds of doubt.
‘So whenever something goes wrong with a missile, the North Koreans are worried whether it is a problem with their engineering, or whether they have actually been cyber-attacked.’
It’s for this reason that Theresa May did not rule out the use of cyber-warfare.
Considering the expertise of the Pentagon and GCHQ, this is surely not a bluff. Indeed, security experts say the public would be shocked to learn the extent of details such organisations can find about the most personal aspects of our daily lives.
Meanwhile, Kim Jong-un and his generals are trying to keep one step ahead – and have their own cyber-boffins trying to sabotage America’s infrastructure.
Earlier this year, a report on cyber vulnerabilities commissioned by the Pentagon warned that North Korea might acquire the ability to cripple the American power grid.
What is certain is that global power is no longer based on economic and military might (even with Pyongyang’s display of hydrogen bomb technology), but on having better cyber experts than your enemies.