US Conducts Computer War Games in Response to North Korea Missile Launch

The United States military and Pacific allies have conducted air drills over the Korean peninsula in conjunction with computer simulations just days after North Korea added tension to already stressed relations by the firing a missile over Japan and then a hydrogen-nuclear bomb test.

The air drills involved two supersonic US B-1B bombers and four US health F-35B jets alongside South Korean and Japanese fighter jets. The exercise, which brought nuclear capable bombers over the Korean peninsula, came at the tail end of annual joint US-South Korea military exercises.

“North Korea’s actions are a threat to our allies, partners, and homeland. And, their destabilising actions will be met accordingly,” US General Terrence J O’Shaughnessy, the commander of Pacific Air Forces, said during an unscheduled visit to Japan.

“This complex mission clearly demonstrates our solidarity with our allies, and underscores the broadening cooperation to defend against this common regional threat. Our forward deployed force will be the first to the fight, ready to deliver a lethal response at moment’s notice if our nation calls.”

North Korea has been flagrantly displaying its progress on its quest to develop weapons systems capable of launching a nuclear-tipped missile capable of hitting the US, and has recently threatened Guam, a US territory.

Before the missile test over Japan, intelligence had indicated that the country was capable of producing miniaturised nuclear warheads that could be put in missiles, and North Korea had repeatedly tested long-range inter-continental ballistic missiles.

“The US imperialists and the South Korean puppet forces do not hide their bellicose nature, claiming that the exercises are to ‘counter’ the DPRK’s ballistic rocket launches and nuclear weapons development,” North Korea’s KCNA news agency said, referring to the acronym for the Democratic People’s Republic of Korea, the official name for the country.

“But the wild military acts of the enemies are nothing but the rash act of those taken aback by the intermediate-to-long range strategic ballistic rocket launching drill conducted by the army of the DPRK as the first military operation in the Pacific,” the news agency continued.

North Korea’s open development of warheads that could threaten the US have led to an increasingly strained relationship between Washington and Pyongyang, two capitals that had anything but a good relationship before.

As a result, President Donald Trump has threatened that North Korea would face “fire and fury” if it continued to threaten the US, and indicated that the US military was ready with military options if the aggression continues. Donald Trump has also condemned North Korea’s latest nuclear test as the biggest foreign policy challenge faced by his administration deepened overnight.

Mr Trump has since then made clear that he is at least considering a military response to North Korea’s missiles, however it is uncertain if there is strong support for action like that in his administration. Since the aggression began, the US has imposed sanctions on North Korea, impacting a significant portion of the country’s economy.

The President said recently that “talking is not the answer” to the conflict with North Korea, but his Defence secretary, Jim Mattis, told reporters just hours later that the US had not run out of diplomatic options for dealing with the Korean adversary.

“We are near out of diplomatic solutions,” Mr Mattis said. “We continue to work together, and the minister and I share a responsibility to provide the protection of our nations, our populations, and our interests.”

Independent:     Guardian

You Might Also Read:

Will Cyber Warfare Remove Kim From N. Korea?:

How Worried Should We Be About a Nuclear War With North Korea?:
 

 

« Disastrous Equifax Breach Exposes 44% Of The US Population
Millions of Instagram Users Hacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

National Cybersecurity Office - Japan

National Cybersecurity Office - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.