Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370093519
Publisher: Progressive Management Publication: October 4, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370093519
Publisher: Progressive Management
Publication: October 4, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. In 2013, Mandiant published a report linking one People's Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship.
Defense reports suggest there is a strong correlation between China's virtual exfiltration of modern U.S. technology and the PLA's rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China's overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA's modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis's conclusion that cyber espionage is not the critical component driving forward PLA modernization.
CHAPTER I - INTRODUCTION * A. MAJOR RESEARCH QUESTION AND FINDINGS * B. SIGNIFICANCE * C. LITERATURE REVIEW * D. POTENTIAL EXPLANATIONS AND RESEARCH DESIGN * E. THESIS ORGANIZATION * CHAPTER II - DEFINING KEY CYBER TERMS * A. TRADITIONAL ESPIONAGE VERSUS CYBER ESPIONAGE * B. UNDER CYBER WARFARE'S UMBRELLA: COMPARING THE SPECTRUM OF CYBER APPLICATIONS * C. CATEGORIZATIONS OF CYBER ACTORS: HACKER GROUPS AND INDIVIDUALS * 1. Advanced Persistent Threats * 2. Cyber and Information Warfare Militias * 3. The Underground Hacking Economy * 4. Individual Hackers as Hactivists, Patriotic Hackers, White-Hat Hackers, and Cyberterrorists * D. INFORMATIONIZATION * CHAPTER III - PLA MODERNIZATION MEETS INFORMATIONIZATION * A. THE FIRST WAVE: PLA MODERNIZATION FROM 1978-1988 * B. THE SECOND WAVE: PLA MODERNIZATION FROM 1989-1996 * C. THE THIRD WAVE: PLA MODERNIZATION FROM 1997-2003 * 1. Defense White Papers as Doctrinal Guidance for PLA Modernization * 2. International Events Thrusting forward Modernization Efforts * 3. Adopting a Modern Chinese Cyber Strategy * a. The Chinese Academy of Military Sciences' Cyber Experimentation * b. Document 27 Emerges as the Blueprint for China's Cyber Strategy * 4. Physical Modernization Developments

More books from Progressive Management

Cover of the book U.S. Marine Corps Civic Action Effort in Vietnam, March 1965: March 1966 - Fascinating Historic Document About Civilian Aid and Support Programs Early in the Vietnam War, III Marine Amphibious Force by Progressive Management
Cover of the book 21st Century FEMA Study Course: Fundamentals of Emergency Management (IS-230.a) - Integrated EMS, Incident Management, Case Studies, Prevention, Preparedness, Response, Recovery, Mitigation by Progressive Management
Cover of the book The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police in Kunduz Province, and the Janjaweed in Sudan - Militia Histories by Progressive Management
Cover of the book Dancing with the Dragon: U.S.-China Engagement Policy - Mutual Distrust, Asia-Pacific Geopolitics, Appeasement and Rebalancing, History and Culture, People's Republic of China's (PRC) Perspective by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 14 Official NASA Mission Reports and Press Kit - 1971 Third Lunar Landing - Astronauts Shepard, Roosa, and Mitchell by Progressive Management
Cover of the book Complete Guide to the 1963 JFK Assassination: The Full Text of Three Major Reports - Warren Commission, House Select Committee, Assassination Records Review Board - President Kennedy by Progressive Management
Cover of the book Introduction to Defense Acquisition Management (Tenth Edition) - How DoD Does Business, Program Management, Policy, Resource Allocation Process, Weapon Systems by Progressive Management
Cover of the book Revision of Career Marksmanship Training Requirements for the United States Marine Corps: Annual Rifle Qualifications, Refocus Resources to Advanced Marksmanship, Score Keeping, Filling Quotas by Progressive Management
Cover of the book A History of Sea-Air Aviation: Wings Over The Ocean - Chronicling the History of Sea-Air Flight Operations, Early Aviation History, World War II Naval Aviation, Chanute, Curtiss, Lindbergh by Progressive Management
Cover of the book The Washington Navy Yard: An Illustrated History - War of 1812, Supporting the New Navy, Civil War Era, World War I and II, Presidential Yacht, Naval Museum, Naval Ordnance Nerve Center by Progressive Management
Cover of the book The Lost Art of Air Superiority: U.S. Pursuit Aviation, 1919 to 1941 - Battle with the Bombers, Defending Pursuit, Preparation for War, World War II, P-40 Tommy Hawk, Major General Arnold, Air Corps by Progressive Management
Cover of the book Ready Seapower: A History of the U.S. Seventh Fleet - MacArthur's Navy, Korean War, Arabian Gulf to Mount Pinatubo, Terrorists and Pirates by Progressive Management
Cover of the book Wind Tunnels of NASA: History of Their Contribution to Flight Science from the Wright Brothers to the Shuttle, Current NASA Facilities for Aircraft and Spacecraft Tests by Progressive Management
Cover of the book A Field Guide for USAID Democracy and Governance Officers: Assistance to Civilian Law Enforcement in Developing Countries - Police, Policing Styles, Community-Based Policing, Corruption, Use-of-Force by Progressive Management
Cover of the book Scotland's Potential Independence: Defense Implications for Britain, NATO, and the United States - UK's Nuclear Weapons Deterrence Posture with Trident Submarine-Launched Ballistic Missiles by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy