SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Red-DragonRising.com©
中
華
人
民
共
和
國
網
絡
代
碼
衝
突...

中国人民共和国
信息戰
Red Dragon Rising –
China Challenges:
People's Republic of China use of Computers &
Networks as a Strategic Weapon
02 MARCH 2014
LTCOL (RET) William Hagestad II
MSc Security Technologies
MSc Management of Technology
www.red-dragonrising.com
hagestadwt@red-dragonrising.com
Red-DragonRising.com©
Red-DragonRising.com©
The Middle Kingdom….

Red-DragonRising.com©
籠恐龍

籠恐龍…Caged Dinosuars
Red-DragonRising.com©
“21st Century Chinese
Cyber Warfare”
“二十一世紀中國網絡戰”

取締中華人民共和國

Red-DragonRising.com©

ISBN: 9781849283342
http://www.amazon.com/Operation-Middle-Kingdom-Computers-Networksebook/dp/B00GTVFJOQ/
Red-DragonRising.com©

ISBN: 978-1482577105
http://www.amazon.com/Chinese-Information-Warfare-DoctrineDevelopment-ebook/dp/B00GWO12LO/
Red-DragonRising.com©

ISBN: 978-1493771974
http://www.amazon.com/Chinas-Plans-Winning-InformationConfrontation/dp/1496080874/

Red-DragonRising.com©

ISBN: 978-1496080875
Red-DragonRising.com©
Red-DragonRising.com©
Is China Really the Enemy?

Red-DragonRising.com©
Cyber Adversary Taxonomy
Cyber Threat

Motive

Targets of
Opportunity

Methodologies

Capabilities

Nation States ~
Peace Time

Economic,
Military,
National
Secrets,
Political

Commercial Enterprises,
Intelligence, National Defense,
Governments, National
Infrastructure

Military & Intel
specific cyber
doctrine, hacktivists

Asymmetric use of
the cyber domain
short of kinetic

Nation States ~
War Time

Economic,
Military,
Political

Commercial Enterprises,
Intelligence, National Defense,
Governments, National
Infrastructure

Military & Intel
specific cyber
doctrine, hacktivists

Asymmetric use of
the cyber domain
including kinetic

Political

Infrastructure, Extortion and
Political Processes

Combination of
advanced persistent
threats (APT)

Developing – will
be a concern in
2012

Cyber Terrorists &
Insurgents
Cyber Criminals –
Grey & Black
Markets

Financial

Criminal
Organizations – RBS

Financial

Rogue
Organizations –
Anonymous,
LulzSec

Financial
Military,
National
Secrets,
Political

Intellectual Property Theft,
Fraud, Theft, Scams, Hijacked
Network & Computer
Resources, Cyber Crime for
Hire

Exploits, Malware
Botnets, Worms &
Trojans

Cell-based
structure as an APT

Use of above with
distinct planning

Highly
professional,
dangerous

Intellectual Property Theft,
Direct & Indirect pressure on
OGA Resources

Organic hacking
capabilities
unsurpassed

Organized yet decentralized

Red-DragonRising.com©
The Middle Kingdom

Red-DragonRising.com©
中國人民解放軍
1949 Information Warfare
(IW)

毛泽东 Mao Tse-Tung
Red-DragonRising.com©
Chinese View…

16 AUGUST
2011
Red-DragonRising.com©
Chinese Perspective….
 16 AUGUST 2011 – People’s Tribune Magazine - (人民论坛杂志) publishes
several articles…
 4 are very problematic for the United States….
– “A Sovereign Country Must Have Strong Defense” by Min Dahong, director
of the Network & Digital Media Research Office @ China Academy of
Social Sciences;
– “America’s ‘Pandora’s Box’ Cyber Strategy Confuses the World” by Shen Yi Fudan University’s Department of International Politics;
– “Cyber Power ‘Shuffles the Cards’: How China Can Overtake the
Competition” by Tang Lan, Institute of Information and Social
Development Studies at the China Institute of Contemporary International
Relations; and
– “How to Construct China’s Cyber Defenses” by Liu Zengliang, from the PLA
National Defense University
Red-DragonRising.com©

http://www.rmlt.com.cn/qikan/2011-08-16/
Red-DragonRising.com©

http://www.chinasmack.com/2010/more/cannons-englishteacher-seduction-june-9th-jihad.html
誰是中國?

Red-DragonRising.com©
中國黑客….
4 Groups…Official & Unofficial….

第一…中國共產黨
(CPC)
第二…人民解放军
(PLA)
第三… 中國國有企業
(SOE)
第四個…中國黑客 (Hacktivists)
Red-DragonRising.com©
中國共產黨 - CPC
► Codified cyber warfare in 2010…

• In response to US Cyber Command 6 months earlier…

► Official Edict: “protect national infrastructure from
external cyber threats” – President Hu Jin tao
► President Hu’s successor Xi Jin ping ….
Motivations:
• Maintain & Retain Chinese Dream…
• Ensure China’s Sovereignty…
• Control Freedom of Search…
• Ensure stable transition of Communist Regime…

Red-DragonRising.com©
Chinese Information and
Cyber Warfare
Government Intent
Golden Shield…Filter the Chinese Internet
o Designed 1998
o Operational NOV 2003
o CISCO powered – cost $ 800M USD
o China’s Ministry of Public Security (MPS) operates….

Green Dam….1 July 2009…new PC’s must have
Chinese Government Spyware….

Military Focus
Civilian Dimension
http://www.certmag.com/read.php?in=3906
http://www.e-ir.info/2010/04/13/chinese-information-and-cyber-warfare/
http://www.zdnet.com/blog/government/china-demands-new-pcs-carryspyware/4906

Red-DragonRising.com©
人民解放军- PLA
► 500 BC Sun-Tzu’s Art of War – basis
► Sun Ping’s Military Methods
► 1995 - Major General Wang Pufeng –
Founding father of Chinese Information
Warfare (IW)
► 1999 - War Without Limits – PLAAF Senior Colonel’s
Qiao Liang & Wang Xiangsui
► 2002 - PLA's IW strategy spearheaded by Major
General Dai Qingmin Integrated Network-Electronic Warfare (INEW)

Red-DragonRising.com©
信息支持(保證)基地
19 JUL 2010 Cyber Base….
Official Mission…Protect the national infrastructure of
the People’s Republic of China…

Established 6 Months AFTER U.S. says “we are taking military approach to Internet…”

Red-DragonRising.com©
Official Statement of Chinese IW
20 JUL 2010 – ‘ordered by President Hu
Jintao to handle cyber threats as China
enters the information age, & strengthen
the nation's cyber-infrastructure’
General Staff Directorate’s (GSD) Cyber Warfare
‘Princelings’…
General Zhang Qinsheng 章沁生
General Chen Bingde 陈炳德
漢族…Han Chinese
General Ma Xiaotian 马晓天
Communist…
Technologists…
Vice Admiral Sun Jianguo 孙建国
PLA Leaders…. &
Major General Hou Shu sen 侯树森

中國人
Red-DragonRising.com©
目前中國網絡戰的戰術
China’s “Goal is to achieve a strategic
objective…over adversaries…”
“You have to meet my political conditions
or your government will be toppled, or
you promise to meet some of my political
conditions.”
• Major General Hu Xiaofeng, Deputy Director for the
National Defense University Department of
Information Warfare and Training Command
• Professor Meng Xiangqing, National Defense
University Institute for Strategic Studies

黑暗訪問者, 2009; [Online] Available at: http://www.thedarkvisitor.com/category/uncategorized/
Red-DragonRising.com©
黑客 - Hacktivists
 Originally supported by CPC & PLA
•
•
•
•

Now uncontrollable….Golden Shield Project?
Comment Group…
Elderwood Gang…
Use of known Chinese malware for commercial purposes
now…

 Reinforce PRC’s nationalism via the web
•
•
•
•

Taiwan, the renegade Chinese Province
Punishing Japan for WWII war crimes, Daiyu Islands
Confronting Philippines, Oil near Huangyuan
Codera’s anti-Chinese web rhetoric

 Capability to carry out Chinese State Policies
without attribution….

Red-DragonRising.com©
很多 年華 中國 Cyber Activity






1995 – Chinese General MG Wang Pu Feng describes attacking via Internet
1997 – “War Beyond Limits” (Unrestricted Warfare) is written by 2 Senior Chinese Colonels
2001 China warns of massive hack attacks
2002 - “informatization”信息化 campaign begins Chinese Communist Party (CCP) General Secretary and Central
Military Commission (CMC) Chairman Jiang Zemin, a speech before the 16th Party Congress
2003 - Titan Rain泰坦雨 US DoD & Government websites targeted
2004 – Japan targeted by Chinese over disputed Daiyu Islands
2007 – GhostNet 幽灵网 Global CnC network with IP addresses in People’s Republic of China
2008 – Byzantine Hades - targeted cyber operations against the U.S. government using social engineering and
malicious attachments and links in e-mail messages.
2008 - MI5 writes to more than 300 senior executives at banks, accountants and legal firms warning them - the
Chinese army is using Internet spyware to steal confidential information
2009 - Operation Aurora 操作极光 International Energy Industry targeted
2009 – Night Dragon夜龙 Global multinationals attacked via Internet
2010 – Article - Should we be afraid of Chinese hackers?...Or lost cyber war?
2011 -US needs to get better at preventing foreign access to advanced technology
- GAO watchdogs find holes in high-tech access, licensing rules
2011 – Chinese military CCTv-7 demonstrates GUI Hacking of University of Alabama
2011 – Office of the National Counterintelligence Executive (ONCIX) Report indicates both China & Russia target IP
2011 – Operation Shady RAT FIVE year campaign of economic & intelligence data exfiltration
2012 – “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage”





2012 – Chinese Technology Policy & Cyber Offensive Operations - April
2012 – China & Philippines engage in mutual cyber attacks over Scarborough Shoals – April
2012 – “US & China must work to avoid cyber conflict” DefSec Panetta



















NORTHRUP GRUMMAN March 7, 2012

2012 – Chinese Hackers hack White Nuclear Secrets Network
2012 – US House Intelligence cites Huawei & ZTE as threats to National Security
2013 – Shanghai Jaiotong University tied to PLA hacking unit
Red-DragonRising.com©
0

結束狀態

1)
2)
3)
4)
5)

Cyber-espionage is state sponsored; yet direct attribution is an illusion….
中華人民共和國 plans cyber-espionage – defensively & offensively;
Cultural, economic, historical & linguistic threads中國 cyber-espionage;
中國, although advocating citizen hacking, no longer controls it;
Commercial enterprises worldwide are permeable to中國cyber hacking in all
form & methods;
6) 中國malware, RATs, Botnets are undiscoverable….
7) Mandarin Chinese (complex and simple) are an exceptional form of
cryptography…
8) All Western InfoSec Technology are ineffective against中國 attacks;
9) Companies cannot defend adequately from the various alleged Chinese
information warfare threats of Next Generation Warfare;
10) Offensive Cyber Capabilities must be developed…..protect your IP & Network
11)中華人民共和國 cyber-espionage threat serious & only become much
worse…..

Red-DragonRising.com©
.

DO NOT become a
Chinese Cyber Espionage
case study in my slide deck!

中國國有企業
Red-DragonRising.com©
“21st Century Chinese
Cyber Warfare”

“二十一世紀中國
網絡戰”
Available :

ISBN: 9781849283342
Red-DragonRising.com©
Red-DragonRising.com©
謝謝您
謝謝您的時間今天
有沒有問題?
Red-DragonRising.com©
你會說中國普通話... ...嗎?
看
看
發
生
了
什
麼
事
!

Red-DragonRising.com©
跟隨紅龍
Red-DragonRising #RedDragon1949
http://www.linkedin.com/in/billhagestad
Red-dragonrising.com

Red-DragonRising.com©

Más contenido relacionado

La actualidad más candente

Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paperMarioEliseo3
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Planbfuesz
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Mark Raduenzel
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиPositive Hack Days
 

La actualidad más candente (20)

Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Cyber war
Cyber warCyber war
Cyber war
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
 

Similar a Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014

Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 

Similar a Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014 (20)

Ht f42
Ht f42Ht f42
Ht f42
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Exp r35
Exp r35Exp r35
Exp r35
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Take Down
Take DownTake Down
Take Down
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 

Más de Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Bill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Bill Hagestad II
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军Bill Hagestad II
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015 Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparisonBill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Bill Hagestad II
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoSBill Hagestad II
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionBill Hagestad II
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites listBill Hagestad II
 

Más de Bill Hagestad II (16)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014

  • 2. 中 華 人 民 共 和 國 網 絡 代 碼 衝 突... 中国人民共和国 信息戰 Red Dragon Rising – China Challenges: People's Republic of China use of Computers & Networks as a Strategic Weapon 02 MARCH 2014 LTCOL (RET) William Hagestad II MSc Security Technologies MSc Management of Technology www.red-dragonrising.com hagestadwt@red-dragonrising.com Red-DragonRising.com©
  • 6. “21st Century Chinese Cyber Warfare” “二十一世紀中國網絡戰” 取締中華人民共和國 Red-DragonRising.com© ISBN: 9781849283342
  • 12. Is China Really the Enemy? Red-DragonRising.com©
  • 13. Cyber Adversary Taxonomy Cyber Threat Motive Targets of Opportunity Methodologies Capabilities Nation States ~ Peace Time Economic, Military, National Secrets, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain short of kinetic Nation States ~ War Time Economic, Military, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain including kinetic Political Infrastructure, Extortion and Political Processes Combination of advanced persistent threats (APT) Developing – will be a concern in 2012 Cyber Terrorists & Insurgents Cyber Criminals – Grey & Black Markets Financial Criminal Organizations – RBS Financial Rogue Organizations – Anonymous, LulzSec Financial Military, National Secrets, Political Intellectual Property Theft, Fraud, Theft, Scams, Hijacked Network & Computer Resources, Cyber Crime for Hire Exploits, Malware Botnets, Worms & Trojans Cell-based structure as an APT Use of above with distinct planning Highly professional, dangerous Intellectual Property Theft, Direct & Indirect pressure on OGA Resources Organic hacking capabilities unsurpassed Organized yet decentralized Red-DragonRising.com©
  • 17. Chinese Perspective….  16 AUGUST 2011 – People’s Tribune Magazine - (人民论坛杂志) publishes several articles…  4 are very problematic for the United States…. – “A Sovereign Country Must Have Strong Defense” by Min Dahong, director of the Network & Digital Media Research Office @ China Academy of Social Sciences; – “America’s ‘Pandora’s Box’ Cyber Strategy Confuses the World” by Shen Yi Fudan University’s Department of International Politics; – “Cyber Power ‘Shuffles the Cards’: How China Can Overtake the Competition” by Tang Lan, Institute of Information and Social Development Studies at the China Institute of Contemporary International Relations; and – “How to Construct China’s Cyber Defenses” by Liu Zengliang, from the PLA National Defense University Red-DragonRising.com© http://www.rmlt.com.cn/qikan/2011-08-16/
  • 20. 中國黑客…. 4 Groups…Official & Unofficial…. 第一…中國共產黨 (CPC) 第二…人民解放军 (PLA) 第三… 中國國有企業 (SOE) 第四個…中國黑客 (Hacktivists) Red-DragonRising.com©
  • 21. 中國共產黨 - CPC ► Codified cyber warfare in 2010… • In response to US Cyber Command 6 months earlier… ► Official Edict: “protect national infrastructure from external cyber threats” – President Hu Jin tao ► President Hu’s successor Xi Jin ping …. Motivations: • Maintain & Retain Chinese Dream… • Ensure China’s Sovereignty… • Control Freedom of Search… • Ensure stable transition of Communist Regime… Red-DragonRising.com©
  • 22. Chinese Information and Cyber Warfare Government Intent Golden Shield…Filter the Chinese Internet o Designed 1998 o Operational NOV 2003 o CISCO powered – cost $ 800M USD o China’s Ministry of Public Security (MPS) operates…. Green Dam….1 July 2009…new PC’s must have Chinese Government Spyware…. Military Focus Civilian Dimension http://www.certmag.com/read.php?in=3906 http://www.e-ir.info/2010/04/13/chinese-information-and-cyber-warfare/ http://www.zdnet.com/blog/government/china-demands-new-pcs-carryspyware/4906 Red-DragonRising.com©
  • 23. 人民解放军- PLA ► 500 BC Sun-Tzu’s Art of War – basis ► Sun Ping’s Military Methods ► 1995 - Major General Wang Pufeng – Founding father of Chinese Information Warfare (IW) ► 1999 - War Without Limits – PLAAF Senior Colonel’s Qiao Liang & Wang Xiangsui ► 2002 - PLA's IW strategy spearheaded by Major General Dai Qingmin Integrated Network-Electronic Warfare (INEW) Red-DragonRising.com©
  • 24. 信息支持(保證)基地 19 JUL 2010 Cyber Base…. Official Mission…Protect the national infrastructure of the People’s Republic of China… Established 6 Months AFTER U.S. says “we are taking military approach to Internet…” Red-DragonRising.com©
  • 25. Official Statement of Chinese IW 20 JUL 2010 – ‘ordered by President Hu Jintao to handle cyber threats as China enters the information age, & strengthen the nation's cyber-infrastructure’ General Staff Directorate’s (GSD) Cyber Warfare ‘Princelings’… General Zhang Qinsheng 章沁生 General Chen Bingde 陈炳德 漢族…Han Chinese General Ma Xiaotian 马晓天 Communist… Technologists… Vice Admiral Sun Jianguo 孙建国 PLA Leaders…. & Major General Hou Shu sen 侯树森 中國人 Red-DragonRising.com©
  • 26. 目前中國網絡戰的戰術 China’s “Goal is to achieve a strategic objective…over adversaries…” “You have to meet my political conditions or your government will be toppled, or you promise to meet some of my political conditions.” • Major General Hu Xiaofeng, Deputy Director for the National Defense University Department of Information Warfare and Training Command • Professor Meng Xiangqing, National Defense University Institute for Strategic Studies 黑暗訪問者, 2009; [Online] Available at: http://www.thedarkvisitor.com/category/uncategorized/ Red-DragonRising.com©
  • 27. 黑客 - Hacktivists  Originally supported by CPC & PLA • • • • Now uncontrollable….Golden Shield Project? Comment Group… Elderwood Gang… Use of known Chinese malware for commercial purposes now…  Reinforce PRC’s nationalism via the web • • • • Taiwan, the renegade Chinese Province Punishing Japan for WWII war crimes, Daiyu Islands Confronting Philippines, Oil near Huangyuan Codera’s anti-Chinese web rhetoric  Capability to carry out Chinese State Policies without attribution…. Red-DragonRising.com©
  • 28. 很多 年華 中國 Cyber Activity     1995 – Chinese General MG Wang Pu Feng describes attacking via Internet 1997 – “War Beyond Limits” (Unrestricted Warfare) is written by 2 Senior Chinese Colonels 2001 China warns of massive hack attacks 2002 - “informatization”信息化 campaign begins Chinese Communist Party (CCP) General Secretary and Central Military Commission (CMC) Chairman Jiang Zemin, a speech before the 16th Party Congress 2003 - Titan Rain泰坦雨 US DoD & Government websites targeted 2004 – Japan targeted by Chinese over disputed Daiyu Islands 2007 – GhostNet 幽灵网 Global CnC network with IP addresses in People’s Republic of China 2008 – Byzantine Hades - targeted cyber operations against the U.S. government using social engineering and malicious attachments and links in e-mail messages. 2008 - MI5 writes to more than 300 senior executives at banks, accountants and legal firms warning them - the Chinese army is using Internet spyware to steal confidential information 2009 - Operation Aurora 操作极光 International Energy Industry targeted 2009 – Night Dragon夜龙 Global multinationals attacked via Internet 2010 – Article - Should we be afraid of Chinese hackers?...Or lost cyber war? 2011 -US needs to get better at preventing foreign access to advanced technology - GAO watchdogs find holes in high-tech access, licensing rules 2011 – Chinese military CCTv-7 demonstrates GUI Hacking of University of Alabama 2011 – Office of the National Counterintelligence Executive (ONCIX) Report indicates both China & Russia target IP 2011 – Operation Shady RAT FIVE year campaign of economic & intelligence data exfiltration 2012 – “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage”    2012 – Chinese Technology Policy & Cyber Offensive Operations - April 2012 – China & Philippines engage in mutual cyber attacks over Scarborough Shoals – April 2012 – “US & China must work to avoid cyber conflict” DefSec Panetta                 NORTHRUP GRUMMAN March 7, 2012 2012 – Chinese Hackers hack White Nuclear Secrets Network 2012 – US House Intelligence cites Huawei & ZTE as threats to National Security 2013 – Shanghai Jaiotong University tied to PLA hacking unit Red-DragonRising.com©
  • 29. 0 結束狀態 1) 2) 3) 4) 5) Cyber-espionage is state sponsored; yet direct attribution is an illusion…. 中華人民共和國 plans cyber-espionage – defensively & offensively; Cultural, economic, historical & linguistic threads中國 cyber-espionage; 中國, although advocating citizen hacking, no longer controls it; Commercial enterprises worldwide are permeable to中國cyber hacking in all form & methods; 6) 中國malware, RATs, Botnets are undiscoverable…. 7) Mandarin Chinese (complex and simple) are an exceptional form of cryptography… 8) All Western InfoSec Technology are ineffective against中國 attacks; 9) Companies cannot defend adequately from the various alleged Chinese information warfare threats of Next Generation Warfare; 10) Offensive Cyber Capabilities must be developed…..protect your IP & Network 11)中華人民共和國 cyber-espionage threat serious & only become much worse….. Red-DragonRising.com©
  • 30. . DO NOT become a Chinese Cyber Espionage case study in my slide deck! 中國國有企業 Red-DragonRising.com©
  • 31. “21st Century Chinese Cyber Warfare” “二十一世紀中國 網絡戰” Available : ISBN: 9781849283342 Red-DragonRising.com©