Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book The Dragon Lady Meets The Challenge: The U-2 in Desert Storm - Behind the Invasion, Sensors, Command and Control, Desert Shield, Assessing U-2 Performance, Olympic Flare Missions by Progressive Management
Cover of the book Strategic Genius: What Traits Make a Great Military Leader? Gerhard Scharnhorst and William Slim as Examples, Elements of Courageous and Compelling Leaders, Ecology of Ideas for Cooperative Leadership by Progressive Management
Cover of the book Introduction to the United States Air Force: Extensive History of the Aircraft, Missiles, Satellites, Leaders, Heroes, Battles, Fighter Aces of the USAF from World War I to the 21st Century by Progressive Management
Cover of the book Pre-Emption and Precedent: The Significance of Iraq (1981) and Syria (2007) for an Israeli Response to an Iranian Nuclear Threat - Osirak Reactor, Covert Actions, Air Strike, IAEA, U.S. Relations by Progressive Management
Cover of the book NASA and the Environment: The Case of Ozone Depletion (NASA SP-2005-4538) by Progressive Management
Cover of the book On Mars: Exploration of the Red Planet 1958-1978 (NASA SP-4212) - Comprehensive Official History of the Viking Program and Man's First Successful Landing on Mars, Voyager and Mariner Programs by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #4 Firefighting (IS-804) - NRF, Forest Service, Hotshot Crews, Wildland Fires, Structural Fires, National Interagency Fire Center (NIFC) by Progressive Management
Cover of the book Steadfast and Courageous: FEAF (Far East Air Forces) Bomber Command and the Air War in Korea, 1950-1953 - Bombing Operations with B-29 Superfortress, Strategic Air Command (SAC), Okinawa Base by Progressive Management
Cover of the book Complete Guide to Weather Satellites: NOAA Polar and Geostationary Satellites, GOES, POES, JPSS, DMSP, Potential Critical Gaps in Data, Program History, Military and Earth Observation, Forecasting by Progressive Management
Cover of the book Beyond Horizons: A Half Century of Air Force Space Leadership, Military Space Programs, Sputnik through the Age of Apollo and the Gulf War by Progressive Management
Cover of the book Nationalism: The Media, State, and Public in the Senkaku / Diaoyu Dispute - East China Sea Islands, China and Japan, Sino-Japan Relations, Kurils, Nansha, Spratly, Dokdo, Takeshima, Rhetoric, Trends by Progressive Management
Cover of the book Drug Trafficking in West Africa: Impact on U.S. National Security Interests - Cocaine, Heroin, Amphetamine from Transnational Criminal Organizations (TCOs) to End Users Around the World by Progressive Management
Cover of the book Chinese Military: Federal Strategic Perspective Reports - Military Transparency, PLA's Role in Elite Politics, Out of Area Naval Operations, China's Quest for Advanced Military Aviation Technologies by Progressive Management
Cover of the book Is the Army Developing Strategic Leaders? Case Studies of General George Marshall, William Westmoreland, and Eric Shinseki, World-class Warriors, Army Doctrine, Laws and Officer Grade Limitation Act by Progressive Management
Cover of the book Militancy in Pakistan: A Schizophrenic Problem - Taliban, Pashtun, War on Terror, Durand Line, Musharraf, Benazir Bhutto, Zia Al-Huq, India, Ayub Khan, Zulfikar Bhutto by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy