US Conducts Computer War Games in Response to North Korea Missile Launch

The United States military and Pacific allies have conducted air drills over the Korean peninsula in conjunction with computer simulations just days after North Korea added tension to already stressed relations by the firing a missile over Japan and then a hydrogen-nuclear bomb test.

The air drills involved two supersonic US B-1B bombers and four US health F-35B jets alongside South Korean and Japanese fighter jets. The exercise, which brought nuclear capable bombers over the Korean peninsula, came at the tail end of annual joint US-South Korea military exercises.

“North Korea’s actions are a threat to our allies, partners, and homeland. And, their destabilising actions will be met accordingly,” US General Terrence J O’Shaughnessy, the commander of Pacific Air Forces, said during an unscheduled visit to Japan.

“This complex mission clearly demonstrates our solidarity with our allies, and underscores the broadening cooperation to defend against this common regional threat. Our forward deployed force will be the first to the fight, ready to deliver a lethal response at moment’s notice if our nation calls.”

North Korea has been flagrantly displaying its progress on its quest to develop weapons systems capable of launching a nuclear-tipped missile capable of hitting the US, and has recently threatened Guam, a US territory.

Before the missile test over Japan, intelligence had indicated that the country was capable of producing miniaturised nuclear warheads that could be put in missiles, and North Korea had repeatedly tested long-range inter-continental ballistic missiles.

“The US imperialists and the South Korean puppet forces do not hide their bellicose nature, claiming that the exercises are to ‘counter’ the DPRK’s ballistic rocket launches and nuclear weapons development,” North Korea’s KCNA news agency said, referring to the acronym for the Democratic People’s Republic of Korea, the official name for the country.

“But the wild military acts of the enemies are nothing but the rash act of those taken aback by the intermediate-to-long range strategic ballistic rocket launching drill conducted by the army of the DPRK as the first military operation in the Pacific,” the news agency continued.

North Korea’s open development of warheads that could threaten the US have led to an increasingly strained relationship between Washington and Pyongyang, two capitals that had anything but a good relationship before.

As a result, President Donald Trump has threatened that North Korea would face “fire and fury” if it continued to threaten the US, and indicated that the US military was ready with military options if the aggression continues. Donald Trump has also condemned North Korea’s latest nuclear test as the biggest foreign policy challenge faced by his administration deepened overnight.

Mr Trump has since then made clear that he is at least considering a military response to North Korea’s missiles, however it is uncertain if there is strong support for action like that in his administration. Since the aggression began, the US has imposed sanctions on North Korea, impacting a significant portion of the country’s economy.

The President said recently that “talking is not the answer” to the conflict with North Korea, but his Defence secretary, Jim Mattis, told reporters just hours later that the US had not run out of diplomatic options for dealing with the Korean adversary.

“We are near out of diplomatic solutions,” Mr Mattis said. “We continue to work together, and the minister and I share a responsibility to provide the protection of our nations, our populations, and our interests.”

Independent:     Guardian

You Might Also Read:

Will Cyber Warfare Remove Kim From N. Korea?:

How Worried Should We Be About a Nuclear War With North Korea?:
 

 

« Disastrous Equifax Breach Exposes 44% Of The US Population
Millions of Instagram Users Hacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.