16 April, 2017. 17:34
ERROL PARKER | Editor-at-large | Contact
Having just made it out of the hermit kingdom alive, a local spy has taken time out of his afternoon to speak with The Advocate about his holiday-turned-espionage mission in North Korea last week.
Arriving in Pyongyang last Monday, Josiah Bournemouth* said he entered the country using a tourist visa, which almost anybody can apply for provided they pass a stringent vetting process.
“From there it was easy,” he said.
“I just had to slip away in the night and find a computer that I could upload a virus onto, which was designed to infect the guidance and fuel management computer of the missile set to be launched earlier this weekend. By the way things turned out, it looks like it worked.”
Though the 30-odd-year-old can’t reveal the specifics of what he did or who he works for, Bournemouth said he enjoys holidaying in Betoota after missions, where he can lay low and find some peace.”
“I only had to slit one throat this time, which is nice. The computer was easy enough to find. It was in the hotel I was staying at. Just slipped out and plugged the flash drive in. A night watchman caught me in the act, so yeah, he’s dead now. But other than that, quite a smooth operation.”
However, it’s not the first time a Western power has used this method to remotely damage a weapons system.
The Stuxnet computer worm that targets industrial control systems that are used to monitor and control large-scale industrial facilities like power plants, dams, waste processing systems and similar operations.
It was used to destroy a nuclear centrifuge in Iran in 2010, causing an international incident.
More to come.