US Conducts Computer War Games in Response to North Korea Missile Launch

The United States military and Pacific allies have conducted air drills over the Korean peninsula in conjunction with computer simulations just days after North Korea added tension to already stressed relations by the firing a missile over Japan and then a hydrogen-nuclear bomb test.

The air drills involved two supersonic US B-1B bombers and four US health F-35B jets alongside South Korean and Japanese fighter jets. The exercise, which brought nuclear capable bombers over the Korean peninsula, came at the tail end of annual joint US-South Korea military exercises.

“North Korea’s actions are a threat to our allies, partners, and homeland. And, their destabilising actions will be met accordingly,” US General Terrence J O’Shaughnessy, the commander of Pacific Air Forces, said during an unscheduled visit to Japan.

“This complex mission clearly demonstrates our solidarity with our allies, and underscores the broadening cooperation to defend against this common regional threat. Our forward deployed force will be the first to the fight, ready to deliver a lethal response at moment’s notice if our nation calls.”

North Korea has been flagrantly displaying its progress on its quest to develop weapons systems capable of launching a nuclear-tipped missile capable of hitting the US, and has recently threatened Guam, a US territory.

Before the missile test over Japan, intelligence had indicated that the country was capable of producing miniaturised nuclear warheads that could be put in missiles, and North Korea had repeatedly tested long-range inter-continental ballistic missiles.

“The US imperialists and the South Korean puppet forces do not hide their bellicose nature, claiming that the exercises are to ‘counter’ the DPRK’s ballistic rocket launches and nuclear weapons development,” North Korea’s KCNA news agency said, referring to the acronym for the Democratic People’s Republic of Korea, the official name for the country.

“But the wild military acts of the enemies are nothing but the rash act of those taken aback by the intermediate-to-long range strategic ballistic rocket launching drill conducted by the army of the DPRK as the first military operation in the Pacific,” the news agency continued.

North Korea’s open development of warheads that could threaten the US have led to an increasingly strained relationship between Washington and Pyongyang, two capitals that had anything but a good relationship before.

As a result, President Donald Trump has threatened that North Korea would face “fire and fury” if it continued to threaten the US, and indicated that the US military was ready with military options if the aggression continues. Donald Trump has also condemned North Korea’s latest nuclear test as the biggest foreign policy challenge faced by his administration deepened overnight.

Mr Trump has since then made clear that he is at least considering a military response to North Korea’s missiles, however it is uncertain if there is strong support for action like that in his administration. Since the aggression began, the US has imposed sanctions on North Korea, impacting a significant portion of the country’s economy.

The President said recently that “talking is not the answer” to the conflict with North Korea, but his Defence secretary, Jim Mattis, told reporters just hours later that the US had not run out of diplomatic options for dealing with the Korean adversary.

“We are near out of diplomatic solutions,” Mr Mattis said. “We continue to work together, and the minister and I share a responsibility to provide the protection of our nations, our populations, and our interests.”

Independent:     Guardian

You Might Also Read:

Will Cyber Warfare Remove Kim From N. Korea?:

How Worried Should We Be About a Nuclear War With North Korea?:
 

 

« Disastrous Equifax Breach Exposes 44% Of The US Population
Millions of Instagram Users Hacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.

Seezo

Seezo

Seezo leverages Gen AI to make world-class AppSec accessible to every engineering team.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.