Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book 21st Century U.S. Military Documents: Air Force E-9A Range Control Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book Transformation Dilemma: Air Force Special Operations Command and the Role in the Future of the Air Force and Special Operations - Simulators, CV-22, MC-130, MC-X, AFSOC Simulation Systems by Progressive Management
Cover of the book The Cold War and Beyond: Chronology of the United States Air Force, 1947-1997 - Aviation and Space Milestones of the First Fifty Years of the USAF by Progressive Management
Cover of the book When You Get a Job to Do, Do It: The Airpower Leadership of Lt. General William H. Tunner - The Underappreciated Contributions to Airlift, World War II and Cold War, Hump and Berlin Airlift Operations by Progressive Management
Cover of the book VA Health Care: Actions Needed to Prevent Sexual Assaults and Other Safety Incidents - 2011 Government Accountability Office (GAO) Report by Progressive Management
Cover of the book The Decisiveness of the Battle of Midway: Implications of the World War II Battle in the Context of the Pacific War and Strategic Decision Making by the Allies and the Japanese by Progressive Management
Cover of the book NASA Report: International Space Station (ISS) Benefits for Humanity, 2nd Edition - Human Health, Earth Observation, Disaster Response, Technology, Global Education, Economic Development of Space by Progressive Management
Cover of the book U.S. Air Force Aerospace Mishap Reports: Accident Investigation Boards for Incidents Involving the TARS Tethered Aerostat Radar System in 2011 and 2012 by Progressive Management
Cover of the book The Dorian Files Revealed: A Compendium of the NRO's Manned Orbiting Laboratory (NRO) Documents, Photoreconnaissance, Spy in the Sky, Blue Gemini, Air Force Space Station, Dyna-Soar, Apollo Study by Progressive Management
Cover of the book Lessons from the Normandy Invasion of World War II: Staff Development, Deception Operations, and Force Projection - Complexity of Planning, Sluggish Progress, Signals Intelligence and SHAEF Staff by Progressive Management
Cover of the book The Rules of Defeat: The Impact of Aerial Rules of Engagement (ROE) on USAF Operations in North Vietnam, 1965-1968, Effect on Commanders and Aircrews, Rolling Thunder Bombing Mission Effectiveness by Progressive Management
Cover of the book Assessing the Cannabis Legalization Debate: Lessons Learned From the Colorado and Washington Experiment - Marijuana and Pot Drug Trafficking, Controlled Substances Act, Drug Policy and War, Crime Data by Progressive Management
Cover of the book Campaigns in Mississippi and Tennessee: February - December 1864 - The U.S. Army Campaigns of the Civil War - Meridian, General Sherman, Forrest, Washburn, Lee, Fort Pillow Massacre, Johnsonville Raid by Progressive Management
Cover of the book Media-Enabled Insurgency as a Revolution in Military Affairs: Iraq Enemy Using Attacks to Erode American Will to Fight, Cultural and Legal Factors Preventing Military from Influencing Populations by Progressive Management
Cover of the book Navy Cold War Communication Context: Resources Associated With the Navy's Communication Program, 1946-1989 - Equipment and Facility Histories, Radio, Wireless, Vietnam, Satellite, Receivers, Radars by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy