Saturday November 17, 2018
Home Lead Story North Korea w...

North Korea warns US to Not Misread Peace Overtures as Weakness

North Korea has warned the United States not to misread its overtures of peace as a sign of weakness, as U.S. President Donald Trump and North Korean leader Kim Jong Un prepare to hold their first-ever summit.

0
//
But the North Korean spokesman said Sunday that movement of U.S. military assets in the region and talk of human rights violations also have hurt the peace process.
North Korea and US agitation, VOA
Republish
Reprint

North Korea has warned the United States not to misread its overtures of peace as a sign of weakness, as U.S. President Donald Trump and North Korean leader Kim Jong Un prepare to hold their first-ever summit.

“The U.S. is deliberately provoking the DPRK at the time when the situation on the Korean Peninsula is moving toward peace and reconciliation,” a Foreign Ministry spokesman told North Korean state media Sunday. DPRK — the Democratic People’s Republic of Korea — is the North’s formal name.

The official was referring to U.S. claims that Trump’s policy of maximum political pressure and sanctions are what drove the North to the negotiating table.

The criticism comes weeks before the U.S.-North Korea summit planned for later this month or early June, and after last month’s historic meeting between Kim and South Korean President Moon Jae-in.

Read also: Israel Warns Iran, Hints Towards a War in Middle East

At that meeting, Kim promised to work toward a denuclearized Korean Peninsula and to move North Korea’s clocks ahead by 30 minutes to correspond with the South Korean time zone, a pledge he fulfilled Saturday.

Beware of moving ‘back to square one’

But the North Korean spokesman said Sunday that movement of U.S. military assets in the region and talk of human rights violations also have hurt the peace process.

The official was referring to U.S. claims that Trump's policy of maximum political pressure and sanctions are what drove the North to the negotiating table.
US President, Wikimedia Commons

“This act cannot be construed otherwise than a dangerous attempt to ruin the hard-won atmosphere of dialogue and bring the situation back to square one,” he said.

Trump has indicated that the date and place of the summit have been chosen, and said he believes the Demilitarized Zone that divides the Koreas might be a good venue. Singapore was also believed to be a potential site.

Before Trump meets with Kim, Washington is hoping to gain the release of three Korean Americans accused of anti-state activities. Trump hinted that the release of Kim Dong Chul, Kim Hak Song and Tony Kim was in the offing.

There was no sign of an imminent release, though the men had reportedly been moved to the North Korean capital.

The White House, meanwhile, has announced a separate meeting between Trump and Moon at the White House on May 22 to “continue their close coordination on developments regarding the Korean Peninsula.” (VOA)

Click here for reuse options!
Copyright 2018 NewsGram

Next Story

Heavy Cyber Attacks From Russia, US, China In India

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

0
cloudhopper,cyber attacks
A man holds a laptop computer as cyber code is projected on him in this illustration picture. VOA

India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.

According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.

Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.

cyber attacks
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. Pixabay

Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.

On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.

F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.

“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

Cryptocurrency, cyber attacks
Experts: Cyber attacks Growing Increasingly Sophisticated. Pixabay

“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.

To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.

“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.

Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).

Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.

Also Read: U.S. Government Warns People Against China-Linked Hacking Group

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

They enable F-Secure to collect the latest malware samples or shell scripts and new hacking techniques.

The research data is then processed to further benefit F-Secure customers via product enhancements and threat intelligence reports. (IANS)