Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book Eritrea in Perspective: Orientation Guide and Tigrinya Cultural Orientation: Geography, History, Economy, Abyssinia, al-Shabaab, Land of Punt, Asmara, Nakfa, Ethiopia, Mengistu, Derg, Jabarti, Assab by Progressive Management
Cover of the book Coercive Nuclear Campaigns in the 21st Century: Understanding Adversary Incentives and Options for Nuclear Escalation - Posing Four Grim Options, Plausibility of Conquest, U.S. Nuclear Forces by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Army In Multinational Operations Field Manual - FM 100-8 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Countering the al-Shabaab Insurgency in Somalia: Lessons for U.S. Special Operations Forces - Mogadishu, Somali Terrorism, al-Qaeda, Relations with Ethiopia and Kenya by Progressive Management
Cover of the book Commander's Guide to Support Operations Among Weaponized Displaced Persons, Refugees, and Evacuees, Purposeful Introduction of Biologically Infected Persons or CBRNE Casualties, WMD Threat at Camps by Progressive Management
Cover of the book 21st Century Textbooks of Military Medicine - War Psychiatry: Combat Stress, Postcombat Reentry, Traumatic Brain Injury, PTSD, Prisoners of War, NBC Casualties (Emergency War Surgery Series) by Progressive Management
Cover of the book Flying and Fighting in Cyberspace: Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding by Progressive Management
Cover of the book Deepwater Horizon Gulf of Mexico Oil Spill: 2011 U.S. Coast Guard Report of the Investigation into the Explosion, Fire, and Sinking aboard the Mobile Offshore Drilling Unit (April 20, 2010) by Progressive Management
Cover of the book The Influence of the Catholic Church on the Eisenhower Administration's Decision to Directly Intervene in Vietnam: Soviet Communist Containment, South Vietnamese Policy, Indochina, Southeast Asia by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Prostate Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Emergency Medical Services (EMS) Recruitment and Retention Manual - Guidebook for Managers and Recruiters of Volunteer and Career Personnel, Leadership, Stress Management, Marketing by Progressive Management
Cover of the book Vulnerability of the United States Railroad System to Terrorist Attacks: Risks to Amtrak Passenger Trains, Tank Cars, Cyber Attacks, Historic Lac-Megantic Oil Train Derailment, Screening Measures by Progressive Management
Cover of the book Mach 3+: NASA/USAF YF-12 Flight Research, 1969-1979, Lockheed Blackbird Spyplanes as NASA/USAF Research Platforms (NASA SP-2001-4525) by Progressive Management
Cover of the book Air Force Reports on the Cause of F-22 Raptor Unexplained Physiological Incidents, Hypoxia, and Aircraft Oxygen Generation Systems (OBOGS), Air Force and Navy AOG Systems by Progressive Management
Cover of the book Phases of Violent Extremism: Targeting the Evolution of Al-Shabaab - Terrorism in Somalia and the Horn of Africa, Islamic Extremism, Kidnap for Ransom, Non-State Actors, Deterrence and Culture by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy