Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

China’s cyberwarfare forces were outlined for the first time in a Chinese military paper. The PLA, (People’s Liberation Army), cyberwar force has three elements, including a cadre of dedicated military specialists devoted to network warfare that conduct cyberattacks and defense.
    
Other forces include teams of specialists working in civilian intelligence, police and security organs who conduct military cyber-operations. Last are units outside government that will be mobilized for network warfare.
    
The Pentagon is moving ahead with plans to deploy a high-powered missile defense system in its South Korean ally that China calls a threat to its security.
    
Although preliminary talks are underway, the US-South Korea joint working group has not yet met to discuss the THAAD issue, Navy Cmdr. Bill Urban said. No timeline on a potential deployment has been established, the commander added.

A Pentagon official said the weapons system can be rapidly deployed and that the only impediment is reaching a quick agreement. “The deployment can be done in two weeks or 20 months,” said one military official familiar with the plans. The entire package can be delivered in 17 flights aboard C-17 cargo jets.
    
The official said Osan Air Base, the main US military air base in the country, is the most likely deployment site. The base is about 40 miles south of Seoul.
    
One THAAD battery will be dispatched. It will include 24 anti-missile interceptors, three truck-mounted launchers and the high-powered AN/TPY-2 X-band radar.
    
Compared with the Patriot PAC-3 missile defenses in South Korea, THAAD has greater range and capability, including the ability to shoot down incoming short-, medium- and intermediate-range missiles.
    
The addition of THAAD will provide what the commander of U.S. forces in South Korea, Gen. Curtis Scaparrotti, said is an extra layer of missile defense protection.
    
“North Korea continues to develop their nuclear weapons and ballistic missile programs, and it is the responsibility of our alliance to maintain a strong defense against those threats,” he said in a statement. “THAAD can add an important capability in a layered and effective missile defense.”
    
The four-star general requested the system in 2014, but Seoul balked from the deployment in response to pressure from China, which views THAAD as a threat to its missile forces. The South Koreans, however, changed course and agreed to the missiles following the recent North Korean underground nuclear test and subsequent test of a long-range TD-2 missile.

Ein News: 

« Ex CIA Director: Keep America Safe, Embrace Drone Warfare
Giant Financial Hacking Prosecution Expands »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.