21st Century Chinese Cyberwarfare  
Author(s): Bill Hagestad
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849283342
Pages: 349

PAPERBACK

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849283342 Price: INR 5494.00
Add to cart Buy Now
This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.
Rating
Description
This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.
Table of contents
  • Cover
  • Title
  • Copyright
  • Foreword
  • Preface
  • About The Author
  • Acknowledgements
  • Contents
  • Introduction
  • Glossary
    • Cyberwarfare Definitions
    • Types of Hacker
    • Information Warfare Elements
  • Chapter 1: The Chinese Cyberthreat
    • Statistics of the Cyberwarfare Threat
    • Statistics of the Chinese Cyberwarfare Threat
    • Conclusions about the Chinese Cyberthreat
  • Chapter 2: Evolution of Chinese Cyberwarfare
    • Overview of the Attackers
    • Communist Party of China (CPC)
    • People’s Liberation Army (PLA)
    • State-owned Enterprises (SOE)
    • Civilian Hackers (Hacktivists)
    • Motivation of the People’s Republic of China
    • History & Origins of Information Warfare in the People’s Republic of China
    • An Overview of Chinese Cyberwarfare
    • China’s “Cyber Command”
  • Chapter 3: Chinese Unrestricted Warfare
    • War Without Limits
    • Eight Principles of Chinese Unrestricted Warfare
    • The Challenge of Information Warfare
  • Chapter 4: Principles of Warfare - West versus East
    • Warfare - Mapping East to West
    • “On War” - Carl Von Clausewitz 1780-1831 A.D
    • “The Art of War” - Sun Tzu 544 - 496 B.C
    • Principles of Chinese Cyberwarfare
    • The PLA’s
    • Chinese Information War Theory and Implementation
  • Chapter 5: Nature of Information Warfare
  • Chapter 6: Chinese Cyberwarfare Doctrines
    • Chinese Cyberwarfare Doctrinal Development
    • The “Three Warfares” concept
    • Assassin’s Mace Programs
    • Major General Dai Qingmin’s Cyberwar
    • Conclusions
    • Rules of Engagement: PLA’s Information Dominance
  • Chapter 7: China’s SIGINT Capabilities
    • The PLA SIGINT ground stations
    • Chinese PLA Electronic warfare
  • Chapter 8: Chinese IW Capabilities
    • Assessing China’s IW Capabilities
  • Chapter 9: The Chinese IW Organizational Structure
    • Key PLA Departments: Integrated Network Electronic Warfare
    • Technical Reconnaissance Bureaus (TRB)
    • Military Branch Technical Reconnaissance Bureaus (MB TRB)
    • Second Artillery Corps (SAC)
    • Military Region (MR TRB)
    • Shényáng Military Region
    • General Staff Department Fourth Department
    • PLA Information Warfare Militia Units
    • Ministry of State Security
    • (MID) Second Department - Intelligence
    • (MID) Third Department - Intelligence
    • Eleventh Bureau - Electronic Computers Bureau
    • PLA Information Engineering University
  • Chapter 10: Chinese Commercial Enterprises
    • The PRC’s Economic Leadership
    • What is a Chinese State-owned Enterprise (SOE)?
    • China’s SOEs
    • Western Perspectives on Chinese SOEs
    • China and Africa
    • Chinese Telecommunications Companies in Africa
    • Rare Earth Minerals (REM)
    • Network Security & Chinese Telco Manufacturers
    • Conclusions about Chinese SOEs & the Cyberthreat
  • Chapter 11: Commercial Objectives of Chinese Cyberattacks
    • China: industry infiltration or data exfiltration?
    • Commercial Victims of Chinese Cyberattacks?
    • “Operation Ghost Net”
    • “Shadows in the Cloud”
    • “Operation Aurora”
    • Google, Inc
    • “Night Dragon”
    • Multi-National Energy Companies
    • “Operation Shady RAT”
    • Apple®
    • Healthcare and Pharmaceutical Products
    • International Governments
    • Germany
    • France
    • United Kingdom
    • Conclusions
  • Chapter 12: Chinese Civilian Hackers
    • Chinese Cybermilitias
    • Chinese Cybersecurity Professionals
  • Chapter 13: The Chinese Cyberthreat: Conclusions
    • Computer Security Reference Materials
    • Conclusions
    • Recommendations for Next Steps
    • Cybertargeting: People’s Republic of China
    • Short-term moves
    • Long-term moves
  • Appendix A: China & the Internet – A history
    • Development of the Internet & Usage Statistics in the People’s Republic of China
    • Basic Principles & Practices of Chinese Internet Admin
    • Chinese Internet Regulatory Organizations
    • Important Timeline of Internet Censorship & Content Control in China
    • China’s Golden Shield
    • Green Dam
  • Appendix B: Chinese Cyberactivism in the Spotlight
    • History of Chinese Cyberwarfare Attacks
  • Appendix C: China’s Informization Campaign
  • Appendix D: General Wang Pufeng’s Challenge of Information Warfare
  • Appendix E: “Through the Night of the Lantern”
  • Appendix F: Chinese Hacker Website Resources
  • Appendix G: Huawei’s Statement on Establishing a Global Cybersecurity Assurance System
  • Appendix H: PLA’s National Defense University and China’s Cyberwar Preparations
  • ITG Resources
  • Bibliography
User Reviews
Rating