Is This the Nuclear Facility Pyongyang Has Been Waiting For?

A May 16, 2012, file photo of the Yongbyon nuclear facility in North Korea.

GeoEye/AP

AA Font size + Print

A May 16, 2012, file photo of the Yongbyon nuclear facility in North Korea.

An experimental, light-water nuclear reactor years in the making could provide the regime as many as 6 nuclear warheads per year. By Global Security Newswire

North Korea’s capacity to produce nuclear warheads could get a big boost when a new reactor becomes operational, the Yonhap News Agency reports.

For several years, Pyongyang has been constructing an experimental light-water nuclear reactor at its Yongbyon atomic complex. The North is thought to be almost finished erecting the facility. Once adequate nuclear fuel supplies are available, experts estimate that the process for making the reactor operational will take between 9 and 12 months.

Charles Ferguson, president of the Federation of American Scientists, in an interview with Yonhap published on Sunday said the reactor had the potential to generate enough plutonium annually to fuel 5-6 nuclear warheads.

If the reactor is run at high power, and there are no mishaps with its operation, “they could probably make 30-40 kilograms just from that reactor” each year, he said.

Other independent experts have estimated the reactor could generate enough fissile material annually to produce between 1-4 nuclear weapons.

Approximately 6-7 kilograms of plutonium is needed to fuel one warhead, specialists say.

Ferguson said North Korea might use a nearby uranium enrichment plant to produce low-enriched uranium for fuel assemblies for the experimental reactor instead of directly using the facility to produce warhead-grade uranium.

It depends on how frequently they refuel the reactor,” the U.S. nuclear specialist said. “They can take spent, radiated fuel out of the reactor quickly within a couple of months, then the plutonium coming out is more weapons grade.”

An older Soviet-era graphite reactor that North Korea recently reactivated is thought capable ofproducing 6 kilograms each year.

Meanwhile, North Korean ruler Kim Jong Un recently warned that Seoul would “regret bitterly” perceived hostile actions toward Pyongyang, Kyodo News reported on Saturday.

Kim was reported by regime-controlled media to have issued the threat when he oversaw a military land invasion exercise. He was responding to South Korean live-fire drills that took place in late June in the Yellow Sea near a disputed maritime border.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.