Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

Rating: 
Amazon Price: $9.99 (as of December 15, 2019 20:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The government of the People's Republic of China (PRC) is a decade into a sweeping military modernization program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defense posture. This modernization effort, known as
informationization, is guided by the doctrine of fighting "Local War Under
Informationized Conditions," which refers to the PLA's ongoing effort to develop a fully networked architecture capable of coordinating military operations on land, in air, at sea, in space and across the electromagnetic spectrum.

China is likely using its maturing computer network exploitation capability to support intelligence collection against the US Government and industry by conducting a long term, sophisticated, computer network exploitation campaign. The problem is characterized by disciplined, standardized operations, sophisticated techniques, access to high-end software development resources, a deep knowledge of the targeted networks, and an ability to sustain activities inside targeted networks, sometimes over a period of months.

The depth of resources necessary to sustain the scope of computer network exploitation targeting the US and many countries around the world coupled with the extremely focused targeting of defense engineering data, US military operational information, and China-related policy information is beyond the capabilities or profile of virtually all organized cybercriminal enterprises and is difficult at best without some type of state-sponsorship.

Product Details

  • File Size: 582 KB
  • Print Length: 118 pages
  • Simultaneous Device Usage: Unlimited
  • Publication Date: August 4, 2011
  • Sold by:  Amazon Digital Services LLC
  • Language: English
  • ASIN: B005G4YC5Y
  • Text-to-Speech: Enabled
  • X-Ray: Not Enabled
  • Word Wise: Enabled
  • Lending: Enabled
  • Enhanced Typesetting: Not Enabled