Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Print Material
Author Krekel, Bryan A., author.

Title Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / Bryan Krekel, Patton Adams, George Bakos.

Publication Info. [Washington, D.C.] : U.S.-China Economic and Security Review Administration, 2012.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 3.2:C 44/OC 1    ---  Available
Description 1 online resource (136 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note "Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp."
"March 7, 2012."
Bibliography Includes bibliographical references (pages 118-136).
Contents Acronyms. -- Scope note. -- Executive summary. --Information warfare: doctrine, strategy, and training. -- Chinese wartime use of computer network operations. -- Key entities in Chinese information warfare operations and research. -- State-sponsored computer network operations research in Chinese academia. -- Chinese telecommunications R & D -- state and commercial cooperation pushing industry growth. -- U.S. telecommunications supply chain vulnerabilities. -- A comparative analysis of criminal vs. state-sponsored network exploitation. -- Collaboration of U.S. and Chinese information security firms: risks and reality. -- Conclusion.-- Glossary of technical terms. -- Bibliography.
Summary Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms.
Note Description based on online resource, PDF version; title from cover (USCC, viewed Jan. 6, 2021).
Subject China. Zhongguo ren min jie fang jun. -- Information technology.
Cyberspace -- Government policy -- China.
Computer crimes -- China.
Cyberterrorism -- China.
Information warfare -- China.
Internet in espionage -- China.
Telecommunication -- Research -- China.
China. Zhongguo ren min jie fang jun. (OCoLC)fst00535717
Computer crimes. (OCoLC)fst00872063
Cyberspace -- Government policy. (OCoLC)fst00885796
Cyberterrorism. (OCoLC)fst00885802
Information technology. (OCoLC)fst00973089
Information warfare. (OCoLC)fst00973186
Internet in espionage. (OCoLC)fst01739358
Telecommunication -- Research. (OCoLC)fst01145926
China. (OCoLC)fst01206073
Added Author Adams, Patton, author.
Bakos, George, author.
Northrop Grumman Corporation, researcher.
U.S.-China Economic and Security Review Commission, sponsoring body.
Gpo Item No. 1089-A-11 (online)
Sudoc No. Y 3.2:C 44/OC 1

 
    
Available items only