Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
3Activity
×
0 of .
Results for:
No results containing your search query
P. 1
USCC Report - Occupying the Information High Ground

USCC Report - Occupying the Information High Ground

Ratings: (0)|Views: 6,645|Likes:
Published by Silendo

More info:

Published by: Silendo on Mar 08, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

03/08/2012

pdf

text

original

 
 
Occupying the Information HighGround:
Chinese Capabilities for Computer Network Operations and Cyber Espionage 
Prepared for the U.S.-China Economic andSecurity Review Commissionby Northrop Grumman CorpBryan KrekelPatton AdamsGeorge BakosMarch 7, 2012
 
 
2
Contents
Acronyms ................................................................................................................................................... 3Scope Note ................................................................................................................................................. 6Executive Summary .................................................................................................................................... 8Information Warfare: Doctrine, Strategy, and Training .......................................................................... 14Blue Force IW Units Enhancing Training Realism ............................................................................ 23Chinese Wartime Use of Computer Network Operations ....................................................................... 27A Chinese CNO Campaign ................................................................................................................ 33CNO Targeting Case Study ............................................................................................................... 37Diversionary Attacks ........................................................................................................................ 40Key Entities in Chinese Information Warfare Operations and Research ................................................. 44State-Sponsored Computer Network Operations Research in Chinese Academia ................................. 55Chinese Telecommunications R&D
 
 
3
Acronyms
3G Third Generation3PLA
PLA General Staff Department’s Third Department
 4G Fourth Generation4PLA
PLA General Staff Department’s Fourth Department
 AEW&C Airborne Early Warning and ControlAMC Air Mobility CommandAMS Academy of Military SciencesAOR Area of ResponsibilityARMS Air Refueling Management SystemASIC Application-Specific Integrated CircuitBEOL Back End of LineBIOS Basic Input/Output SystemBSS Business Supporting SystemBUPT Beijing University of Posts and TelecommunicationsC2 Command and ControlC4ISR Command, Control, Communications, Computers, Intelligence,Surveillance, and ReconnaissanceCATT China Academy of Telecommunications TechnologyCCA Wuhan Communications Command AcademyCDMACode Division Multiple AccessCEME Complex Electromagnetic EnvironmentsCETC China Electronic Technology CorporationCMC Central Military CommissionCMIPD Civil-Military Integration Promotion DepartmentCMOS Complementary Metal-Oxide SemiconductorCNA Computer Network AttackCND Computer Network DefenseCNE Computer Network ExploitationCNO Computer Network OperationsCOCOM Combatant CommandCOMINT Communications IntelligenceCONUS Continental United StatesCOSTIND Commission of Science, Technology and Industry for National DefenseCOTS Commercial Off-the-Shelf CVV2 Card Verification ValueDARPA Defense Advanced Research Projects AgencyDNS Domain Name ServiceDOS Denial of ServiceECM Electronic Countermeasures

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->