Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book The Shenandoah Valley Campaign: March -November 1864: Grant, Lincoln, Sheridan, Meade, Monocacy, Baltimore and Ohio Railroad, Cedar Creek, Lt. General Jubal A. Early, McCausland by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force C-130 Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book Future Counterland Operations: Common Lessons from Three Conflicts - Persian Gulf War Desert Storm, Allied Force NATO in Yugoslavia, Enduring Freedom Afghanistan, Value of ISR, Power of Innovation by Progressive Management
Cover of the book NASA Report: Sleep on Earth and in Space: Risk Factors, Health and Performance Outcomes, and Countermeasures - Workshop on Lessons Learned from ISS Space Station and Shuttle Human Flights by Progressive Management
Cover of the book The DSCA Corps: Bridging the Gap Between the Profession of Arms and Domestic Operations - Defense Support to Civil Authorities Case Study of Hurricane Sandy and Cascadia Rising Earthquake Exercise by Progressive Management
Cover of the book 21st Century Geothermal Energy: A History of Geothermal Energy Research and Development in the United States - Volume 3 - Reservoir Engineering 1976-2006 by Progressive Management
Cover of the book 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Pistol Marksmanship Marine Corps Reference Publication (MCRP) 3-01B by Progressive Management
Cover of the book 21st Century FEMA Study Course: The Professional in Emergency Management (IS-513) - FEMA Organization and History, Disaster Assistance, Mitigation, Exercises, USFA by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: River-Crossing Operations - FM 90-13 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Human Missions to Mars: Comprehensive Collection of NASA Plans, Proposals, Current Thinking and Ongoing Research on Manned Mars Exploration, Robotic Precursors, Science Goals, Design Reference Mission by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Marine Rifle Squad Marine Corps Field Manual - FMFM 6-5 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Russia's Homegrown Insurgency: Jihad in the North Caucasus - Salafi Islamist Terrorism Challenge, Caucasus Emirate (CE), Chechen Insurgency, Putin Policy, Ethnic Circassian and Akhaz fighters by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Weapons of Mass Destruction (WMD) Civil Support Team Operations - Field Manual 3-11.22 - Threats, Delivery Systems (Professional Format Series) by Progressive Management
Cover of the book 21st Century Essential Guide to Bed Bugs: Identification, Prevention, Control, and Eradication, Practical Information about Pesticides and Bedbugs, Public Health Policy and Medical Implications by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy