Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

China’s cyberwarfare forces were outlined for the first time in a Chinese military paper. The PLA, (People’s Liberation Army), cyberwar force has three elements, including a cadre of dedicated military specialists devoted to network warfare that conduct cyberattacks and defense.
    
Other forces include teams of specialists working in civilian intelligence, police and security organs who conduct military cyber-operations. Last are units outside government that will be mobilized for network warfare.
    
The Pentagon is moving ahead with plans to deploy a high-powered missile defense system in its South Korean ally that China calls a threat to its security.
    
Although preliminary talks are underway, the US-South Korea joint working group has not yet met to discuss the THAAD issue, Navy Cmdr. Bill Urban said. No timeline on a potential deployment has been established, the commander added.

A Pentagon official said the weapons system can be rapidly deployed and that the only impediment is reaching a quick agreement. “The deployment can be done in two weeks or 20 months,” said one military official familiar with the plans. The entire package can be delivered in 17 flights aboard C-17 cargo jets.
    
The official said Osan Air Base, the main US military air base in the country, is the most likely deployment site. The base is about 40 miles south of Seoul.
    
One THAAD battery will be dispatched. It will include 24 anti-missile interceptors, three truck-mounted launchers and the high-powered AN/TPY-2 X-band radar.
    
Compared with the Patriot PAC-3 missile defenses in South Korea, THAAD has greater range and capability, including the ability to shoot down incoming short-, medium- and intermediate-range missiles.
    
The addition of THAAD will provide what the commander of U.S. forces in South Korea, Gen. Curtis Scaparrotti, said is an extra layer of missile defense protection.
    
“North Korea continues to develop their nuclear weapons and ballistic missile programs, and it is the responsibility of our alliance to maintain a strong defense against those threats,” he said in a statement. “THAAD can add an important capability in a layered and effective missile defense.”
    
The four-star general requested the system in 2014, but Seoul balked from the deployment in response to pressure from China, which views THAAD as a threat to its missile forces. The South Koreans, however, changed course and agreed to the missiles following the recent North Korean underground nuclear test and subsequent test of a long-range TD-2 missile.

Ein News: 

« Ex CIA Director: Keep America Safe, Embrace Drone Warfare
Giant Financial Hacking Prosecution Expands »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.