Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

China’s cyberwarfare forces were outlined for the first time in a Chinese military paper. The PLA, (People’s Liberation Army), cyberwar force has three elements, including a cadre of dedicated military specialists devoted to network warfare that conduct cyberattacks and defense.
    
Other forces include teams of specialists working in civilian intelligence, police and security organs who conduct military cyber-operations. Last are units outside government that will be mobilized for network warfare.
    
The Pentagon is moving ahead with plans to deploy a high-powered missile defense system in its South Korean ally that China calls a threat to its security.
    
Although preliminary talks are underway, the US-South Korea joint working group has not yet met to discuss the THAAD issue, Navy Cmdr. Bill Urban said. No timeline on a potential deployment has been established, the commander added.

A Pentagon official said the weapons system can be rapidly deployed and that the only impediment is reaching a quick agreement. “The deployment can be done in two weeks or 20 months,” said one military official familiar with the plans. The entire package can be delivered in 17 flights aboard C-17 cargo jets.
    
The official said Osan Air Base, the main US military air base in the country, is the most likely deployment site. The base is about 40 miles south of Seoul.
    
One THAAD battery will be dispatched. It will include 24 anti-missile interceptors, three truck-mounted launchers and the high-powered AN/TPY-2 X-band radar.
    
Compared with the Patriot PAC-3 missile defenses in South Korea, THAAD has greater range and capability, including the ability to shoot down incoming short-, medium- and intermediate-range missiles.
    
The addition of THAAD will provide what the commander of U.S. forces in South Korea, Gen. Curtis Scaparrotti, said is an extra layer of missile defense protection.
    
“North Korea continues to develop their nuclear weapons and ballistic missile programs, and it is the responsibility of our alliance to maintain a strong defense against those threats,” he said in a statement. “THAAD can add an important capability in a layered and effective missile defense.”
    
The four-star general requested the system in 2014, but Seoul balked from the deployment in response to pressure from China, which views THAAD as a threat to its missile forces. The South Koreans, however, changed course and agreed to the missiles following the recent North Korean underground nuclear test and subsequent test of a long-range TD-2 missile.

Ein News: 

« Ex CIA Director: Keep America Safe, Embrace Drone Warfare
Giant Financial Hacking Prosecution Expands »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

IQ Solutions

IQ Solutions

IQ Solutions is a Digital Integrator and an ICT Services Provider, focusing on innovative Cyber Secured ICT managed solutions tailored to the needs of the Maritime Industry.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.