Professional Documents
Culture Documents
Fundamentals of The Chinese Cyber Warfare Threat
Fundamentals of The Chinese Cyber Warfare Threat
Warfare
LTCOL (RET)William Hagestad II
MSc Security Technologies
MSc Management of Technology
www.red-dragonrising.com
hagestadwt@red-dragonrising.com
Red-DragonRising.com
21st Century
Chinese Cyber
Warfare
ISBN:9781849283342
Red-DragonRising.com
1.Credit where credit is due.
2.Current Cyber News.
3.Peoples Republic of China
Informization
4.Unrestricted Warfarewar
without limits
5.Chinese Cyber Threat history
6.Conclusions
Red-DragonRising.com
Red-DragonRising.com
Red-DragonRising.com
Red-DragonRising.com
Who is China?
Red-DragonRising.com
1.The Peoples Liberation Army (PLA) is pursuing the means to seize and occupy the information high
ground;
2.The rapid development of a comprehensive C4ISR (Command, Control, Computers,
Communications, Information, Surveillance & Reconnaiscance) infrastructure, is a focus of PLA efforts
currently underway;
3.PLA is trying to unify disparate information systems to enable coordination between geographically dispersed
units in order to attain near total situational awareness of the battlespace while limiting an
adversarys ability to do the same;
4.PLA is trying to reach information dominance early and using it to enable and support other PLA
operations throughout a conflict;
5.Tactical level employment of computer network attack (CNA) tools used with sufficient precision
can achieve dramatic strategic outcomes with the potential to alter a campaign &, conversely, as
the PLA deploys more sophisticated information systems growing increasingly reliant upon them
for successful military operations, it must also protect itself from the same network vulnerabilities
as its high-tech adversaries;
6.PLA is augmenting its developing computer network operations (CNO) capabilities by relying on
inputs from Chinas commercial IT industry, academia, and civilian and military research
institutions;
7.Huawei, Zhongxing (ZTE), and Datang maintain relationships with the PRC government;
In summary - recent developments in Chinese computer network operations applications & research
and development point to a nation fully engaged in leveraging all available resources to create a
diverse, technically advanced ability to operate in cyberspace as another means of meeting military
and civilian goals for national development.
Chinese Methodology?
Chinese web bots performing
reconnaissance, gathering info on web
content;
PRC bots so intrusive, servers scanned
IOT determine servers purpose and
functions
Majority of Internet traffic from the Peoples
Republic of China, and included both.
Hits on servers (short pings on new servers);
and,
Detailed examination looking for ports or access
points
Red-DragonRising.com
Chinese
motivation?
Fear of foreigners.
Self-preservation and,
Hegemony ( )..
Information Warfare (IW)
To achieve victory we must as far
as possible make the enemy blind
and deaf by sealing his eyes and
ears, and drive his commanders to
distraction by creating confusion
in their minds.
Mao Tse-Tung
Red-DragonRising.com
Official Statement of
Chinese IW
19 JUL 2010 (PLA daily) ordered by
, 2009;
[Online] Available
at:
http://www.thedarkvisitor.com/category/uncategorized/
Red-DragonRising.com
Red-DragonRising.com
Information Dominance..
Precise attack vectors of
8 - Pillars of Chinese
Warfare
(
8 Principles
of )
"beyond-limits combined war
in Unrestricted Warfare
1) Omni directionality
2) Synchrony
3) Limited objectives
4) Unlimited measures
5) Asymmetry
6) Minimal consumption
7) Multidimensional coordination
8) Adjustment and control of the entire process
Unrestricted Warfare, Qiao Liang and Wang Xiangsui, Beijing: PLA Literature and Arts Publishing House, February 1999
(Simplified Mandarin Chinese version)
Tell me more
about these
Chinese
hackers.
Red-DragonRising.com
- CPC
Codified cyber warfare in 2010
protect national infrastructure from
external cyber threats President Hu
Jin tao
President Hus successor Xi Jin ping .
CPC + PLA x
information technology
superiority = Chinas
Red-DragonRising.com
- PLA
500 BC Sun-Tzus Art of War basis
Sun Pings Military Methods
1995 - Major General Wang Pufeng
founding father of Chinese
Information Warfare (IW)
1999 - War Without Limits
PLAAF Senior Colonels Qiao Liang &
Wang Xiangsui
2002 - PLA's IW strategy
spearheaded by Major General Dai
Red-DragonRising.com
State Owned Enterprises
China Telecom owned by the CPC,
operated by the PLA
Huawei owned by former PLA officer
direct links to the PLA however NOT the CPC
ZTE based in Shenzhen, Guangdong
Province
China Petroleum & Chemical Corp
SinoChem
China National Petroleum Corp
China National Pharmaceutical Group
Red-DragonRising.com
- Hacktivists
Originally supported by CPC & PLA
Now uncontrollable.Golden Shield Project
Red-DragonRising.com
Red-DragonRising.com
Chinese Perspective.
16 AUG 2011 - Peoples Tribune Magazine( )
publishes several articles
Four are very troublesome for the U.S.
A Sovereign Country Must Have Strong Defense by
Min Dahong, director of the Network & Digital Media
Research Office @ China Academy of Social Sciences;
Americas Pandoras Box Cyber Strategy Confuses th
e World
by Shen Yi - Fudan Universitys Department of
International Politics;
Cyber
Power Shuffles the Cards: How China Can Overtake t
he Competition
by Tang Lan, Institute of Information
and Social
http://www.rmlt.com.cn/qikan/201
Red-DragonRising.com
1-08-16/
Conclusions
1)
Hegemony drives use information warfare in the cyber realm;
2)
Cyber-warfare is state sponsored; yet direct attribution is an illusion.
3)
Peoples Liberation Army plans cyber-warfare defensively & offensively;
4)
Cultural, economic, historical & linguistic thread drives Chinese cyber-warfare;
5)
The CPC, although advocating citizen hacking, can no longer control it;
6)
Commercial enterprises worldwide are permeable to Chinese cyber hacking in all its form &
methods Nortel Case Study;
7)
Chinese written malware, RATs, Botnets are undiscoverable.
8)
Mandarin Chinese (complex and simple) is an exceptional form of cryptographynot to
mention Classical / Literary Chinese.
9)
All commercial IPS are ineffective against Chinese based attacks;
10)
Peoples Republic of China cyber-warfare threat is serious & will only become much
worse..
11)
Diplomatic initiatives with a show of U.S. military force in ASIA PAConly option?
Red-DragonRising.com
Who
What/Why
How
BS = Business
Strategy
CS = Corporate
Strategy
IS = Innovation
Strategy
When
Cost
GS = Government
Strategy
US Dept of
Commerce
International
Undersecreta
ry
What are
most likely
targets of
economic
espionage
Immediately,
then quarterly
Minimal
BS, CS & GS
Educate
employees
about
possibility of
data
exfiltration
Business &
Corporate
leadership
Chief Security
Officers
Awareness
of
persistent
threat of
economical
cyber war
Design educational
awareness programs to
address identifying,
reporting and
mitigating foreign
information exfiltration
threats
Immediately,
then monthly
Nominal
BS, CS & IS
Create a
universal
defense-indepth policy
ICW security
software &
hardware
manufacturer
s
Protect
critical
Design a defense-ininfrastructur depth standard that
e against
protects Critical
Chinese
Economic & National
Cyber
Infrastructure
ThreatsRed-DragonRising.com
Immediately,
then ongoing
Nominal
to very
expensi
ve
References
1) Cyber Silhouettes: Shadows Over
Information Operations, Timothy Thomas,
Foreign Military Studies Office (FSMO), Fort
Leavenworth, Kansas
2) Decoding the Virtual Dragon, Timothy Thomas,
Foreign Military Studies Office (FSMO), Fort
Leavenworth, Kansas
3) The Chinese Peoples Liberation Army
Signals Intelligence and Cyber
Reconnaissance Infrastructure, Mark A. Stokes,
Jenny Lin and L.C. Russell Hsiao, Project 2049
Institute
Red-DragonRising.com
21st Century
Chinese Cyber
Warfare
Available :
ISBN:9781849283342
Red-DragonRising.com
Red-DragonRising.com