US Conducts Computer War Games in Response to North Korea Missile Launch

The United States military and Pacific allies have conducted air drills over the Korean peninsula in conjunction with computer simulations just days after North Korea added tension to already stressed relations by the firing a missile over Japan and then a hydrogen-nuclear bomb test.

The air drills involved two supersonic US B-1B bombers and four US health F-35B jets alongside South Korean and Japanese fighter jets. The exercise, which brought nuclear capable bombers over the Korean peninsula, came at the tail end of annual joint US-South Korea military exercises.

“North Korea’s actions are a threat to our allies, partners, and homeland. And, their destabilising actions will be met accordingly,” US General Terrence J O’Shaughnessy, the commander of Pacific Air Forces, said during an unscheduled visit to Japan.

“This complex mission clearly demonstrates our solidarity with our allies, and underscores the broadening cooperation to defend against this common regional threat. Our forward deployed force will be the first to the fight, ready to deliver a lethal response at moment’s notice if our nation calls.”

North Korea has been flagrantly displaying its progress on its quest to develop weapons systems capable of launching a nuclear-tipped missile capable of hitting the US, and has recently threatened Guam, a US territory.

Before the missile test over Japan, intelligence had indicated that the country was capable of producing miniaturised nuclear warheads that could be put in missiles, and North Korea had repeatedly tested long-range inter-continental ballistic missiles.

“The US imperialists and the South Korean puppet forces do not hide their bellicose nature, claiming that the exercises are to ‘counter’ the DPRK’s ballistic rocket launches and nuclear weapons development,” North Korea’s KCNA news agency said, referring to the acronym for the Democratic People’s Republic of Korea, the official name for the country.

“But the wild military acts of the enemies are nothing but the rash act of those taken aback by the intermediate-to-long range strategic ballistic rocket launching drill conducted by the army of the DPRK as the first military operation in the Pacific,” the news agency continued.

North Korea’s open development of warheads that could threaten the US have led to an increasingly strained relationship between Washington and Pyongyang, two capitals that had anything but a good relationship before.

As a result, President Donald Trump has threatened that North Korea would face “fire and fury” if it continued to threaten the US, and indicated that the US military was ready with military options if the aggression continues. Donald Trump has also condemned North Korea’s latest nuclear test as the biggest foreign policy challenge faced by his administration deepened overnight.

Mr Trump has since then made clear that he is at least considering a military response to North Korea’s missiles, however it is uncertain if there is strong support for action like that in his administration. Since the aggression began, the US has imposed sanctions on North Korea, impacting a significant portion of the country’s economy.

The President said recently that “talking is not the answer” to the conflict with North Korea, but his Defence secretary, Jim Mattis, told reporters just hours later that the US had not run out of diplomatic options for dealing with the Korean adversary.

“We are near out of diplomatic solutions,” Mr Mattis said. “We continue to work together, and the minister and I share a responsibility to provide the protection of our nations, our populations, and our interests.”

Independent:     Guardian

You Might Also Read:

Will Cyber Warfare Remove Kim From N. Korea?:

How Worried Should We Be About a Nuclear War With North Korea?:
 

 

« Disastrous Equifax Breach Exposes 44% Of The US Population
Millions of Instagram Users Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Cofrac

Cofrac

Cofrac is the national accreditation body for France. The directory of members provides details of organisations offering certification services for ISO 27001.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.