Description |
1 online resource (136 pages) |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Note |
"Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp." |
|
"March 7, 2012." |
Bibliography |
Includes bibliographical references (pages 118-136). |
Contents |
Acronyms. -- Scope note. -- Executive summary. --Information warfare: doctrine, strategy, and training. -- Chinese wartime use of computer network operations. -- Key entities in Chinese information warfare operations and research. -- State-sponsored computer network operations research in Chinese academia. -- Chinese telecommunications R & D -- state and commercial cooperation pushing industry growth. -- U.S. telecommunications supply chain vulnerabilities. -- A comparative analysis of criminal vs. state-sponsored network exploitation. -- Collaboration of U.S. and Chinese information security firms: risks and reality. -- Conclusion.-- Glossary of technical terms. -- Bibliography. |
Summary |
Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms. |
Note |
Description based on online resource, PDF version; title from cover (USCC, viewed Jan. 6, 2021). |
Subject |
China. Zhongguo ren min jie fang jun. -- Information technology.
|
|
Cyberspace -- Government policy -- China.
|
|
Computer crimes -- China.
|
|
Cyberterrorism -- China.
|
|
Information warfare -- China.
|
|
Internet in espionage -- China.
|
|
Telecommunication -- Research -- China.
|
|
China. Zhongguo ren min jie fang jun. (OCoLC)fst00535717
|
|
Computer crimes. (OCoLC)fst00872063
|
|
Cyberspace -- Government policy.
(OCoLC)fst00885796
|
|
Cyberterrorism. (OCoLC)fst00885802
|
|
Information technology. (OCoLC)fst00973089
|
|
Information warfare. (OCoLC)fst00973186
|
|
Internet in espionage. (OCoLC)fst01739358
|
|
Telecommunication -- Research. (OCoLC)fst01145926
|
|
China. (OCoLC)fst01206073
|
Added Author |
Adams, Patton, author.
|
|
Bakos, George, author.
|
|
Northrop Grumman Corporation, researcher.
|
|
U.S.-China Economic and Security Review Commission, sponsoring body.
|
Gpo Item No. |
1089-A-11 (online) |
Sudoc No. |
Y 3.2:C 44/OC 1 |
|