North Korea as the Greatest Threat to the United States Research Paper

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The aggressive and illegal development of ballistic missiles and nuclear weapons makes North Korea the greatest threat to the United States. Moreover, the diplomatic tension between these nations is not helping the already escalated situation. A potential nuclear electromagnetic pulse (EMP) attack by North Korea would spell a doomsday scenario in the US. According to the United States of America Department of the Army (2014), North Korea might be able to develop or acquire an EMP enabled nuke and attack the US.1 Moreover, its side effects could last for at least three years. This weapon also has the capability of shutting down the US power grid. Thus, a successfully launched EMP nuke by North Korea into the US would rewind the American time machine to the eighteenth century in a matter of milliseconds.

In the last three years, North Korea has tested a series of intercontinental ballistic missiles and a miniaturized hydrogen bomb. If this weapon was successfully launched into the US, especially in a high altitude region, it would destroy most of the technological networks and cause an imaginable crisis. For instance, a complete shutdown of power, communication, and the Internet for an unknown period of time would make America lose its current strategic position as the world peace leader.2 This means that the daily activities of Americans would stop as supplies and communication would be cut. In addition, direct and indirect impacts could actually affect up to 80% of the US population.

The current BMD systems of the US are not programmed to be effective in defending even a small ICBM approaching the border from the Southern Polar region. Unfortunately, North Korea’s trial weapons and satellites are launched in this direction. Although the US communication systems are EMP-hardened, it will not be sufficient to detect and intercept a hydrogen bomb launched from the southern region.3 For instance, if North Korea attacks the US with blackout bombs, which work by dispersing graphite filaments that are carbon treated over a power grid, it will weaken America’s strategic security position.

The North Korea’s cyber power is a threat to the US financial systems and internet security. The increasing cyber-attacks by trained and government-backed hackers from North Korea present real threats of unknown proportion. Over the years, Pyongyang’s administration has been aggressive in developing a secret cyber program that is believed to be capable of unleashing global havoc and hit America the most. For instance, if North Korea succeeds in developing a program that could intercept the US communication systems, it could release classified information on sensitive security operations and arsenal.4 A potential cyber-attack from North Korea could hold for ransom large swathes of private and state-owned communication and financial infrastructures in the US. At present, any major cyber-attack in the US territory is a grave technical exposure that it might not quickly recover from since most systems are wired to the Internet.

In summary, the excessive focus on development of nuclear, hydrogen, black bombs and other ballistic warheads by North Korea is a threat to the strategic US security leadership position. Moreover, Pyongyang’s secret cyber program has a potential of a high magnitude cyber-attack of the US’s financial power and other infrastructures. These attacks would seriously compromise the US homeland security.

Bibliography

The Air University. “Student Text 22-2: Writing and Speaking Skills for Leaders at the Organizational Level”. The Air University.org, Web.

United States Government US Army. Training Circular TC 7-100 Hybrid Threat November 2010. Washington: CreateSpace Independent Publishing Platform, 2012.

United States of America Department of the Army. “Win in a Complex World”. TRADOC Pamphlet 525-3-1, Web.

US Army. “FM 3-0 Operations (October 2017).” US Army.org, 2017. Web.

Footnotes

  1. United States of America Department of the Army, “Win in a Complex World”, TRADOC Pamphlet 525-3-1, Web.
  2. The Air University, “Student Text 22-2: Writing and Speaking Skills for Leaders at the Organizational Level,” The Air University.org, Web.
  3. United States Government US Army, Training Circular TC 7-100 Hybrid Threat November 2010 (Washington: CreateSpace Independent Publishing Platform, 2012), 45.
  4. US Army, “FM 3-0 Operations (October 2017),” US Army.org, Web.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, December 10). North Korea as the Greatest Threat to the United States. https://ivypanda.com/essays/north-korea-as-the-greatest-threat-to-the-united-states/

Work Cited

"North Korea as the Greatest Threat to the United States." IvyPanda, 10 Dec. 2020, ivypanda.com/essays/north-korea-as-the-greatest-threat-to-the-united-states/.

References

IvyPanda. (2020) 'North Korea as the Greatest Threat to the United States'. 10 December.

References

IvyPanda. 2020. "North Korea as the Greatest Threat to the United States." December 10, 2020. https://ivypanda.com/essays/north-korea-as-the-greatest-threat-to-the-united-states/.

1. IvyPanda. "North Korea as the Greatest Threat to the United States." December 10, 2020. https://ivypanda.com/essays/north-korea-as-the-greatest-threat-to-the-united-states/.


Bibliography


IvyPanda. "North Korea as the Greatest Threat to the United States." December 10, 2020. https://ivypanda.com/essays/north-korea-as-the-greatest-threat-to-the-united-states/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1