
North Korea denies warship was severely damaged as full investigation underway on its failed launch
SEOUL, South Korea (AP) — North Korea is seeking to arrest those responsible for the failed launch of its second naval destroyer, as it denied the warship suffered major damage — a claim quickly met with outside skepticism.
A statement from North Korea on its handling of the botched launch came after leader
Kim Jong Un
expressed fury over an incident that he said was caused by criminal negligence. The the main military committee said Friday that those responsible would be held responsible for an 'unpardonable criminal act.'
Satellite imagery on the site showed vessel lying on its side and draped in blue covers, with parts of it submerged. North Korea says it'll take about 10 days to repair its damage, but outside observers question that timeframe because damage to the ship appeared much worse than what North Korea claims.
Here is what you need to know about the failed ship launch:
How much damage was there to the ship
North Korea's state news agency, KCNA, said Friday that the severity of the damage to the 5,000-ton-class destroyer was 'not serious' as it cancelled an earlier assessment that the bottom of the hull had been left with holes.
It said the hull on the starboard side was scratched and some seawater had flowed into the stern section. But it said it'll take a total of 10 days to pump up the seawater, set the ship upright and fix the scratches.
It's almost impossible to verify the assessment because of the extremely secretive nature of North Korea. It has a history of manipulating or covering up military-related setbacks, policy fiascoes and other mishaps, though it has periodically acknowledged some in recent years.
Lee Illwoo, an expert with the Korea Defense Network in South Korea, said the North Korean warship likely suffered much worse damage, including the flooding of its engine room located in the stern section, and holes in the starboard. He said North Korea could simply set the ship upright, paint it and claim the ship has been launched, but that repairs could take more than a year as the replacement of an engine requires cutting the hull.
Why the ship's launch failed
According to the North Korean account, the destroyer was damaged when a transport cradle on the ship's stern detached early during a launch ceremony at the northeastern port of Chongjin on Wednesday.
Moon Keun-sik, a navy expert who teaches at Seoul's Hanyang University, said North Korean workers are probably not familiar with launching a 5,000-ton-class warship, which is nearly three times heavier than its existing main navy ships.
Observers say North Korea tried to launch the destroyer sideways, a method it has never used for warships, although it has previously employed it with big cargo and passenger ships.
Compared with those non-military vessels, Lee sad it would be more difficult to maintain balance with the destroyer because it's equipped with heavy weapons systems. He suspected North Korean scientists and workers likely did not factor that in.
How Kim has reacted
The damaged ship is assessed as the same class as
North Korea's first destroyer
, launched with great fanfare last month with a floating dry dock at a western shipyard. It is North Korea's biggest and most advanced warship to date, and Kim called its construction 'a breakthrough' in modernizing North Korea's naval forces to cope with what he calls U.S.-led security threats.
Subsequently, a failure to launch the second destroyer was an embarrassment for Kim. But by disclosing it to both internally and externally, Kim could be trying to show his resolve in modernizing naval forces and boost discipline at home. He ordered officials to thoroughly investigate the case and repair the warship before a high-level ruling Workers' Party meeting in late June.
North Korea said Friday the country's Central Military Commission summoned Hong Kil Ho, manager of the Chongjin shipyard, as it begun its investigation of the failed launch.
'No matter how good the state of the warship is, the fact that the accident is an unpardonable criminal act remains unchanged, and those responsible for it can never evade their responsibility for the crime,' the commission said, according to state media.
Kim Dong-yub, a professor at the University of North Korean Studies in Seoul, said North Korea appears to be using the failed launch as a chance to strengthen the ruling party's control over science and technological sectors.
Lee Choon Geun, an honorary research fellow at South Korea's Science and Technology Policy Institute, said that North Korea's handling of the damaged warship could have long-term consequences for its defense science sector, especially if military scientists face harsh punishment.
'If scientists are held severely accountable, I would say the future of North Korea's defense science doesn't look very bright, as it would be a sign that political responsibility is being prioritized over technical accountability,' Lee wrote on Facebook.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

38 minutes ago
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON -- WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'


Hamilton Spectator
42 minutes ago
- Hamilton Spectator
Iran claims without evidence that it took Israeli nuclear files
DUBAI, United Arab Emirates (AP) — Iran's intelligence minister claimed without offering evidence Sunday that Tehran seized an 'important treasury' of information regarding Israel's nuclear program, ahead of a week in which the Islamic Republic likely will face new diplomatic pressure over its own program. The remarks by Esmail Khatib follow Iranian state television claiming Saturday that Iranian intelligence officials seized documents, again without any evidence. Israel, whose undeclared atomic weapons program makes it the only country in the Mideast with nuclear bombs, has not acknowledged any such Iranian operation targeting it — though there have been arrests of Israelis allegedly spying for Tehran amid the Israel-Hamas war in the Gaza Strip . Iran, meanwhile, will likely face censure this week from the Board of Governors at the International Atomic Energy Agency over longstanding questions about its program. Iran has also signaled it will reject a proposal from the United States after five rounds of negotiations over its nuclear program — setting the stage for that long-running crisis to potentially spike as well. 'Treasury' of secrets claim comes without evidence Responding to questions from an Iranian state TV reporter Sunday after a Cabinet meeting, Khatib said members of the Intelligence Ministry 'achieved an important treasury of strategic, operational and scientific intelligence of the Zionist regime and it was transferred into the country with God's help.' He claimed thousands of pages of documents had been obtained and insisted they would be made public soon. Among them were documents related to the U.S., Europe and other countries, he claimed, obtained through 'infiltration' and 'access to the sources.' He did not elaborate on the methods used. However, Khatib, a Shiite cleric, was sanctioned by the U.S. Treasury in 2022 over directing 'cyber espionage and ransomware attacks in support of Iran's political goals.' For Iran, the claim may be designed to show the public that the theocracy was able to respond to a 2018 Israeli operation that spirited out what Prime Minister Benjamin Netanyahu described as a 'half ton' of documents related to Iran's program. That Israeli announcement came just before President Donald Trump in his first term unilaterally withdrew America from Iran's 2015 nuclear deal with world powers, which greatly limited its program in exchange for the lifting of economic sanctions. Announcement ahead of IAEA board vote, as US talks waver This week, Western nations are expect to go before the IAEA's Board of Governors with a proposal to find Iran in noncompliance with the United Nations' nuclear watchdog. It could be the first time in decades — and likely would kick the issue to the U.N. Security Council. That could see one of the Western countries involved in the 2015 nuclear deal invoke the so-called 'snapback' of U.N. sanctions on the Islamic Republic. The authority to reestablish those sanctions by the complaint of any member of the original 2015 nuclear deal expires in October — putting the West on a clock to exert pressure on Tehran over its program before losing that power. Iran now enriches uranium up to 60% purity — a short, technical step away from weapons-grade levels of 90%. Tehran has enough highly enriched uranium to build multiple atomic bombs should it choose to do so. Without a deal with the U.S., Iran's long-ailing economy could enter a freefall that could worsen the simmering unrest at home. Israel or the U.S. might carry out long-threatened airstrikes targeting Iranian nuclear facilities. Experts fear Tehran in response could decide to fully end its cooperation with the IAEA and rush toward a bomb. ___ Associated Press writer Nasser Karimi in Tehran, Iran, contributed to this report. ___ The Associated Press receives support for nuclear security coverage from the Carnegie Corporation of New York and Outrider Foundation . The AP is solely responsible for all content. ___ Additional AP coverage of the nuclear landscape: Error! Sorry, there was an error processing your request. There was a problem with the recaptcha. Please try again. You may unsubscribe at any time. By signing up, you agree to our terms of use and privacy policy . This site is protected by reCAPTCHA and the Google privacy policy and terms of service apply. Want more of the latest from us? Sign up for more at our newsletter page .


The Hill
an hour ago
- The Hill
Iran claims without evidence that it took Israeli nuclear files
DUBAI, United Arab Emirates (AP) — Iran's intelligence minister claimed without offering evidence Sunday that Tehran seized an 'important treasury' of information regarding Israel's nuclear program, ahead of a week in which the Islamic Republic likely will face new diplomatic pressure over its own program. The remarks by Esmail Khatib follow Iranian state television claiming Saturday that Iranian intelligence officials seized documents, again without any evidence. Israel, whose undeclared atomic weapons program makes it the only country in the Mideast with nuclear bombs, has not acknowledged any such Iranian operation targeting it — though there have been arrests of Israelis allegedly spying for Tehran amid the Israel-Hamas war in the Gaza Strip. Iran, meanwhile, will likely face censure this week from the Board of Governors at the International Atomic Energy Agency over longstanding questions about its program. Iran has also signaled it will reject a proposal from the United States after five rounds of negotiations over its nuclear program — setting the stage for that long-running crisis to potentially spike as well. Responding to questions from an Iranian state TV reporter Sunday after a Cabinet meeting, Khatib said members of the Intelligence Ministry 'achieved an important treasury of strategic, operational and scientific intelligence of the Zionist regime and it was transferred into the country with God's help.' He claimed thousands of pages of documents had been obtained and insisted they would be made public soon. Among them were documents related to the U.S., Europe and other countries, he claimed, obtained through 'infiltration' and 'access to the sources.' He did not elaborate on the methods used. However, Khatib, a Shiite cleric, was sanctioned by the U.S. Treasury in 2022 over directing 'cyber espionage and ransomware attacks in support of Iran's political goals.' For Iran, the claim may be designed to show the public that the theocracy was able to respond to a 2018 Israeli operation that spirited out what Prime Minister Benjamin Netanyahu described as a 'half ton' of documents related to Iran's program. That Israeli announcement came just before President Donald Trump in his first term unilaterally withdrew America from Iran's 2015 nuclear deal with world powers, which greatly limited its program in exchange for the lifting of economic sanctions. This week, Western nations are expect to go before the IAEA's Board of Governors with a proposal to find Iran in noncompliance with the United Nations' nuclear watchdog. It could be the first time in decades — and likely would kick the issue to the U.N. Security Council. That could see one of the Western countries involved in the 2015 nuclear deal invoke the so-called 'snapback' of U.N. sanctions on the Islamic Republic. The authority to reestablish those sanctions by the complaint of any member of the original 2015 nuclear deal expires in October — putting the West on a clock to exert pressure on Tehran over its program before losing that power. Iran now enriches uranium up to 60% purity — a short, technical step away from weapons-grade levels of 90%. Tehran has enough highly enriched uranium to build multiple atomic bombs should it choose to do so. Without a deal with the U.S., Iran's long-ailing economy could enter a freefall that could worsen the simmering unrest at home. Israel or the U.S. might carry out long-threatened airstrikes targeting Iranian nuclear facilities. Experts fear Tehran in response could decide to fully end its cooperation with the IAEA and rush toward a bomb. ___ Associated Press writer Nasser Karimi in Tehran, Iran, contributed to this report. ___ The Associated Press receives support for nuclear security coverage from the Carnegie Corporation of New York and Outrider Foundation. The AP is solely responsible for all content. ___ Additional AP coverage of the nuclear landscape: