Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Chinese Capabilities for Computer Network Operations and Cyber Espionage

Chinese Capabilities for Computer Network Operations and Cyber Espionage

Ratings: (0)|Views: 117|Likes:
Published by Gaetano Zappulla
The present study is intended to be a detailed follow up and expansion upon a 2009 assessment prepared for the U.S.-China Economic and Security Review Commission of China’s evolving computer network operations capabilities and network intrusion incidents attributed to China. Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests
The present study is intended to be a detailed follow up and expansion upon a 2009 assessment prepared for the U.S.-China Economic and Security Review Commission of China’s evolving computer network operations capabilities and network intrusion incidents attributed to China. Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests

More info:

Published by: Gaetano Zappulla on Mar 26, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/26/2012

pdf

text

original

 
 
Occupying the Information HighGround:
Chinese Capabilities for Computer Network Operations and Cyber Espionage 
Prepared for the U.S.-China Economic andSecurity Review Commissionby Northrop Grumman CorpBryan KrekelPatton AdamsGeorge BakosMarch 7, 2012
 
 
2
Disclaimer:This research report was prepared at the request of the Commission to support itsdeliberations. Posting of the Report to the Commission's website is intended to promotegreater public understanding of the issues addressed by the Commission in its ongoingassessment of U.S.- China economic relations and their implications for U.S. security, asmandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarilyimply an endorsement by the Commission or any individual Commissioner of the views orconclusions expressed in this commissioned research report.
 
 
 
3
Contents
Acronyms ................................................................................................................................................... 4Scope Note ................................................................................................................................................. 7Executive Summary .................................................................................................................................... 9Information Warfare: Doctrine, Strategy, and Training .......................................................................... 15Blue Force IW Units Enhancing Training Realism ............................................................................ 24Chinese Wartime Use of Computer Network Operations ....................................................................... 28A Chinese CNO Campaign ................................................................................................................ 34CNO Targeting Case Study ............................................................................................................... 38Diversionary Attacks ........................................................................................................................ 41Key Entities in Chinese Information Warfare Operations and Research ................................................. 45State-Sponsored Computer Network Operations Research in Chinese Academia ................................. 56Chinese Telecommunications R&D

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->