recommended reading

North Korea's very unpopular rocket is almost ready for lift off

In this Nov. 23, 2012 photo, North Korean soldiers vow to retaliate against any South Korean military action during a rally in South Hwanghae Province.

In this Nov. 23, 2012 photo, North Korean soldiers vow to retaliate against any South Korean military action during a rally in South Hwanghae Province. // Jon Chol Jin/AP

Scattered reports from South Korea say that its neighbors north of the 38th parallel have finished assembling a long-range rocket and are enthusiastically prepping the launch pad. North Korea intends to send this rocket to space, against the wishes of pretty much every other nation on Earth. But North Koreans are not bothered by these Earthly inconveniences. They're sending a rocket to space! They hope so anyways. 

Nobody was entirely sure how serious North Korea was about this rocket launch until Monday evening, when satellite images showed workers scampering around the launch pad. Now, North Korea's statements about following through with the launch between December 10 and December 22 seem pretty realistic. The South Korean news agencyYonha reports, "The North is now expected to install support equipment, such as radar, cameras and measuring before fueling the rocket." Meanwhile, all three stages of the long-range rocket have been assembled, and fueling is expected to happen this weekend.

Read more at The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.