Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

China’s cyberwarfare forces were outlined for the first time in a Chinese military paper. The PLA, (People’s Liberation Army), cyberwar force has three elements, including a cadre of dedicated military specialists devoted to network warfare that conduct cyberattacks and defense.
    
Other forces include teams of specialists working in civilian intelligence, police and security organs who conduct military cyber-operations. Last are units outside government that will be mobilized for network warfare.
    
The Pentagon is moving ahead with plans to deploy a high-powered missile defense system in its South Korean ally that China calls a threat to its security.
    
Although preliminary talks are underway, the US-South Korea joint working group has not yet met to discuss the THAAD issue, Navy Cmdr. Bill Urban said. No timeline on a potential deployment has been established, the commander added.

A Pentagon official said the weapons system can be rapidly deployed and that the only impediment is reaching a quick agreement. “The deployment can be done in two weeks or 20 months,” said one military official familiar with the plans. The entire package can be delivered in 17 flights aboard C-17 cargo jets.
    
The official said Osan Air Base, the main US military air base in the country, is the most likely deployment site. The base is about 40 miles south of Seoul.
    
One THAAD battery will be dispatched. It will include 24 anti-missile interceptors, three truck-mounted launchers and the high-powered AN/TPY-2 X-band radar.
    
Compared with the Patriot PAC-3 missile defenses in South Korea, THAAD has greater range and capability, including the ability to shoot down incoming short-, medium- and intermediate-range missiles.
    
The addition of THAAD will provide what the commander of U.S. forces in South Korea, Gen. Curtis Scaparrotti, said is an extra layer of missile defense protection.
    
“North Korea continues to develop their nuclear weapons and ballistic missile programs, and it is the responsibility of our alliance to maintain a strong defense against those threats,” he said in a statement. “THAAD can add an important capability in a layered and effective missile defense.”
    
The four-star general requested the system in 2014, but Seoul balked from the deployment in response to pressure from China, which views THAAD as a threat to its missile forces. The South Koreans, however, changed course and agreed to the missiles following the recent North Korean underground nuclear test and subsequent test of a long-range TD-2 missile.

Ein News: 

« Ex CIA Director: Keep America Safe, Embrace Drone Warfare
Giant Financial Hacking Prosecution Expands »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.