Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

China’s cyberwarfare forces were outlined for the first time in a Chinese military paper. The PLA, (People’s Liberation Army), cyberwar force has three elements, including a cadre of dedicated military specialists devoted to network warfare that conduct cyberattacks and defense.
    
Other forces include teams of specialists working in civilian intelligence, police and security organs who conduct military cyber-operations. Last are units outside government that will be mobilized for network warfare.
    
The Pentagon is moving ahead with plans to deploy a high-powered missile defense system in its South Korean ally that China calls a threat to its security.
    
Although preliminary talks are underway, the US-South Korea joint working group has not yet met to discuss the THAAD issue, Navy Cmdr. Bill Urban said. No timeline on a potential deployment has been established, the commander added.

A Pentagon official said the weapons system can be rapidly deployed and that the only impediment is reaching a quick agreement. “The deployment can be done in two weeks or 20 months,” said one military official familiar with the plans. The entire package can be delivered in 17 flights aboard C-17 cargo jets.
    
The official said Osan Air Base, the main US military air base in the country, is the most likely deployment site. The base is about 40 miles south of Seoul.
    
One THAAD battery will be dispatched. It will include 24 anti-missile interceptors, three truck-mounted launchers and the high-powered AN/TPY-2 X-band radar.
    
Compared with the Patriot PAC-3 missile defenses in South Korea, THAAD has greater range and capability, including the ability to shoot down incoming short-, medium- and intermediate-range missiles.
    
The addition of THAAD will provide what the commander of U.S. forces in South Korea, Gen. Curtis Scaparrotti, said is an extra layer of missile defense protection.
    
“North Korea continues to develop their nuclear weapons and ballistic missile programs, and it is the responsibility of our alliance to maintain a strong defense against those threats,” he said in a statement. “THAAD can add an important capability in a layered and effective missile defense.”
    
The four-star general requested the system in 2014, but Seoul balked from the deployment in response to pressure from China, which views THAAD as a threat to its missile forces. The South Koreans, however, changed course and agreed to the missiles following the recent North Korean underground nuclear test and subsequent test of a long-range TD-2 missile.

Ein News: 

« Ex CIA Director: Keep America Safe, Embrace Drone Warfare
Giant Financial Hacking Prosecution Expands »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.