North Korean Nuclear Launch ‘Unlikely’ During Obama’s Trip to Asia

This Jan. 23. 2013 satellite image provided by GeoEye shows North Korea's Punggye-ri nuclear test facility where underground nuclear tests were conducted in 2006 and 2009.

GeoEye Satellite Image/AP

AA Font size + Print

This Jan. 23. 2013 satellite image provided by GeoEye shows North Korea's Punggye-ri nuclear test facility where underground nuclear tests were conducted in 2006 and 2009.

Recent imagery of one of Pyongyang's testing grounds isn't enough to convince analysts North Korea will pull the trigger this time. By Global Security Newswire

New satellite images suggest North Korea would not be ready to conduct a nuclear test before U.S. President Obama leaves the region this week.

Space-based surveillance photographs taken as recently as April 19 show an uptick in activity at the North’s Punggye-ri testing grounds compared to early March, according to a Tuesday analysis by the expert website 38 North. That has led to some media conjecture that Pyongyang intends to carry out its fourth atomic test while Obama visits South Korea on Friday and Saturday.

The 38 North analysis acknowledges “that may be possible but appears unlikely,” based on a reading of the commercial satellite images and takeaways from previous atomic detonations by the North.

Recent operations at Punggye-ri have not reached the high level of intensity — in terms of  vehicle, personnel and equipment movement — that occurred in the weeks prior to past detonations,” said 38 North, which is a project of the U.S.-Korea Institute at Johns Hopkins University. “Moreover, other possible indicators … such as communications vans and a satellite dish intended to transmit pre-test data, have not been spotted.”

According to the analysis, there is a chance the increased activity is related to maintenance work made possible by improved weather conditions.

Pyongyang has repeated threats in recent weeks that it is prepared to carry out a “new” kind of nuclear test, which might allude to a different form of device or multiple trial blasts.

South Korean President Park Geun-hye, in a Wednesday phone conversation with Chinese President Xi Jinping, urged him to work harder to persuade Pyongyang not to carry out another nuclear test,  Agence France-Presse reported.

However, the Kim Jong Un regime on Wednesday blasted Park’s lobbying efforts, the Yonhap News Agency reported.

Seoul “should not even dream that we will be coaxed into laying down our nuclear” weapon efforts by words alone, Pyongyang’s Committee for the Peaceful Reunification of Korea said in a statement.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.