Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
8Activity
×
0 of .
Results for:
No results containing your search query
P. 1
China Spy 20091022

China Spy 20091022

Ratings: (0)|Views: 1,072|Likes:
Published by debgage

More info:

Published by: debgage on Oct 23, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/15/2013

pdf

text

original

 
Capability of the People’s Republic of China toConduct Cyber Warfare and Computer NetworkExploitation
Prepared forThe US-China Economic and Security Review Commission
Project Manager
Steve DeWeese 703.556.1086 steve.deweese@ngc.com
Principal Author
Bryan Krekel
Subject Matter Experts
George BakosChristopher BarnettNorthrop Grumman CorporationInformation Systems Sector7575 Colshire DriveMcLean, VA 22102October 9, 2009
 
US-China Economic and Security Review CommissionReport on the Capability of the People’s Republic of China toConduct Cyber Warfare and Computer Network Exploitation
2
 
US-China Economic and Security Review CommissionReport on the Capability of the People’s Republic of China toConduct Cyber Warfare and Computer Network Exploitation
3
Table of Contents
Scope Note ................................................................................................ 4
 
Executive Summary ................................................................................... 6
 
Chinese Computer Network Operations Strategy .................................... 10
 
Chinese Computer Network Operations During Conflict .......................... 23
 
Key Entities in Chinese Computer Network Operations ........................... 30
 
Cyber-Espionage ..................................................................................... 51
 
Operational Profile of An Advanced Cyber Intrusion ................................ 59
 
Timeline of Significant Chinese Related Cyber Events 1999-Present ...... 67
 
Chronology of Alleged Chinese Computer Network Exploitation EventsTargeting US and Foreign Networks ........................................................ 68
 
Commonly Used Acronyms ...................................................................... 75
 
Glossary of Technical Terms .................................................................... 76
 
Bibliography ............................................................................................. 82
 

Activity (8)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
purianjubala liked this
terencebctan liked this
Shekhverm liked this
Oxony20 liked this
Oxony20 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->