Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
Details
Material Type: | Document, Government publication, National government publication, Internet resource |
---|---|
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Bryan A Krekel; Patton Adams; George Bakos; Northrop Grumman Corporation,; U.S.-China Economic and Security Review Commission, |
OCLC Number: | 779781577 |
Notes: | "Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp." "March 7, 2012." |
Description: | 1 online resource (136 pages) |
Contents: | Acronyms. -- Scope note. -- Executive summary. --Information warfare: doctrine, strategy, and training. -- Chinese wartime use of computer network operations. -- Key entities in Chinese information warfare operations and research. -- State-sponsored computer network operations research in Chinese academia. -- Chinese telecommunications R & D -- state and commercial cooperation pushing industry growth. -- U.S. telecommunications supply chain vulnerabilities. -- A comparative analysis of criminal vs. state-sponsored network exploitation. -- Collaboration of U.S. and Chinese information security firms: risks and reality. -- Conclusion.-- Glossary of technical terms. -- Bibliography. |
Responsibility: | Bryan Krekel, Patton Adams, George Bakos. |
Abstract:
Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms.
Reviews
User-contributed reviews
Add a review and share your thoughts with other readers.
Be the first.
Add a review and share your thoughts with other readers.
Be the first.


Tags
Add tags for "Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage".
Be the first.
Similar Items
Related Subjects:(22)
- China. -- Zhongguo ren min jie fang jun. -- Information technology.
- Cyberspace -- Government policy -- China.
- Computer crimes -- China.
- Cyberterrorism -- China.
- Information warfare -- China.
- Internet in espionage -- China.
- Telecommunication -- Research -- China.
- Cyberespace -- Politique gouvernementale -- Chine.
- Criminalité informatique -- Chine.
- Cyberterrorisme -- Chine.
- Guerre de l'information -- Chine.
- Internet dans l'espionnage -- Chine.
- Télécommunications -- Recherche -- Chine.
- China. -- Zhongguo ren min jie fang jun.
- Computer crimes.
- Cyberspace -- Government policy.
- Cyberterrorism.
- Information technology.
- Information warfare.
- Internet in espionage.
- Telecommunication -- Research.
- China.