Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book 21st Century NBC Reference Series: Explosives Safety Manual - Operational Safety, Remote Operations, Storms and Static Electricity, Explosive Dust, High Explosives by Progressive Management
Cover of the book Coercion for Hire: A Theory of Indirect Coercion - Four Historical Cases, Indonesia, Italy, Chile, Hezbollah, Surrogate Targeting, Covert/Overt Balance, Role of Positive Inducements, Political Warfare by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Legal Support to the Operational Army (FM 1-04) - Concepts of Army Doctrine, Requirements in the Modular Force, Core Legal Disciplines (Professional Format Series) by Progressive Management
Cover of the book Complete Guide to the Olmsted Locks and Dam on the Ohio River: Controversial In-the-Wet Construction Method, Inland Waterways Navigation Dams, Equipment, Designs, Financing by Progressive Management
Cover of the book A Fit, Fighting Force: The Air Force Nursing Services Chronology - Highlights and Turning Points, From World War II and Its Aftermath to the New Century by Progressive Management
Cover of the book The Rise of Air Mobility and Its Generals: Airlift, Air Refueling, and Aeromedical-Evacuation Missions, Mahan and the Purpose of Airpower, Geopolitical Changes, Support of Iraq and Afghanistan Wars by Progressive Management
Cover of the book The Nature of Russia's Threat to NATO's Enhanced Forward Presence in the Baltic States: Comprehensive Analysis of Russian Military Forces, Strategy, and Recent Performance in Ukraine and Syria by Progressive Management
Cover of the book Army Unmanned Aircraft System Operations (FMI 3-04.155) - Improved-Gnat (I-Gnat) (RQ-1L), Hunter (RQ-5/MQ-5), Shadow (RQ-7), Raven (RQ-11) - Joint Operations, Targeting, Reconnaissance by Progressive Management
Cover of the book Eisenhower: Military Assistance Policies During the Eisenhower Administration - Shaped by World Events, Reorganization Around Findings of Draper Committee, Five Regional Policies by Progressive Management
Cover of the book Insurgents to Presidents: Contemporary Civil-Military Relations in Brazil, El Salvador, and Uruguay - Iron Lady Dilma Rousseff, Comandate Gonzalez, Sanchez Ceren Legacy, Pepe the Revolutionary, Mujica by Progressive Management
Cover of the book The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program - Iraq War and Operation Iraqi Freedom, Anbar, Al Sahawa, Albu-Nimr Tribe in Hit, al-Qaeda Terrorism, Al Qaim, Sheikh Sattar by Progressive Management
Cover of the book Mao Tse-Tung and Operational Art During the Chinese Civil War: Red Army, Chiang Kai-shek and the Nationalist Army, Communists in Peking by Progressive Management
Cover of the book On Celestial Wings: Navigators of the First Global Air Force - First Army Air Corps Navigational Class, Clark Field Attack, Corregidor, B-29 Super Fortress, FDR Presidential Airplane, Bataan by Progressive Management
Cover of the book Promises of Political Dialogue: Changes in Myanmar's Ceasefire Process - President Thein Sein and the Border Guard Forces (BGF), Nationwide Ceasefire Agreement (NCA) with Tatmadaw National Military by Progressive Management
Cover of the book Impact of Foreign Ownership on the Civil Reserve Air Fleet (CRAF) - Augmenting Military Airlift by Commercial Air Carriers in Emergencies, Criticality, USTRANSCOM Requirements, Restrictions, Concerns by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy