US Conducts Computer War Games in Response to North Korea Missile Launch

The United States military and Pacific allies have conducted air drills over the Korean peninsula in conjunction with computer simulations just days after North Korea added tension to already stressed relations by the firing a missile over Japan and then a hydrogen-nuclear bomb test.

The air drills involved two supersonic US B-1B bombers and four US health F-35B jets alongside South Korean and Japanese fighter jets. The exercise, which brought nuclear capable bombers over the Korean peninsula, came at the tail end of annual joint US-South Korea military exercises.

“North Korea’s actions are a threat to our allies, partners, and homeland. And, their destabilising actions will be met accordingly,” US General Terrence J O’Shaughnessy, the commander of Pacific Air Forces, said during an unscheduled visit to Japan.

“This complex mission clearly demonstrates our solidarity with our allies, and underscores the broadening cooperation to defend against this common regional threat. Our forward deployed force will be the first to the fight, ready to deliver a lethal response at moment’s notice if our nation calls.”

North Korea has been flagrantly displaying its progress on its quest to develop weapons systems capable of launching a nuclear-tipped missile capable of hitting the US, and has recently threatened Guam, a US territory.

Before the missile test over Japan, intelligence had indicated that the country was capable of producing miniaturised nuclear warheads that could be put in missiles, and North Korea had repeatedly tested long-range inter-continental ballistic missiles.

“The US imperialists and the South Korean puppet forces do not hide their bellicose nature, claiming that the exercises are to ‘counter’ the DPRK’s ballistic rocket launches and nuclear weapons development,” North Korea’s KCNA news agency said, referring to the acronym for the Democratic People’s Republic of Korea, the official name for the country.

“But the wild military acts of the enemies are nothing but the rash act of those taken aback by the intermediate-to-long range strategic ballistic rocket launching drill conducted by the army of the DPRK as the first military operation in the Pacific,” the news agency continued.

North Korea’s open development of warheads that could threaten the US have led to an increasingly strained relationship between Washington and Pyongyang, two capitals that had anything but a good relationship before.

As a result, President Donald Trump has threatened that North Korea would face “fire and fury” if it continued to threaten the US, and indicated that the US military was ready with military options if the aggression continues. Donald Trump has also condemned North Korea’s latest nuclear test as the biggest foreign policy challenge faced by his administration deepened overnight.

Mr Trump has since then made clear that he is at least considering a military response to North Korea’s missiles, however it is uncertain if there is strong support for action like that in his administration. Since the aggression began, the US has imposed sanctions on North Korea, impacting a significant portion of the country’s economy.

The President said recently that “talking is not the answer” to the conflict with North Korea, but his Defence secretary, Jim Mattis, told reporters just hours later that the US had not run out of diplomatic options for dealing with the Korean adversary.

“We are near out of diplomatic solutions,” Mr Mattis said. “We continue to work together, and the minister and I share a responsibility to provide the protection of our nations, our populations, and our interests.”

Independent:     Guardian

You Might Also Read:

Will Cyber Warfare Remove Kim From N. Korea?:

How Worried Should We Be About a Nuclear War With North Korea?:
 

 

« Disastrous Equifax Breach Exposes 44% Of The US Population
Millions of Instagram Users Hacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Cybersecurity & Infrastructure Security Agency (CISA) - USA

Cybersecurity & Infrastructure Security Agency (CISA) - USA

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.

Synergetika

Synergetika

Synergetika is a leading pure-play Privileged Access Management (PAM) consultancy and systems integrator.