12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

116 7. WHY CYBER ESPIONAGE IS A KEY COMPONENT OF CHINESE STRATEGYrelied on the use of botnets. However, locating the command and control (C&C) servers ofthese botnets—typically located in mainland China—was relatively easy for investiga<strong>to</strong>rs.The successor <strong>to</strong> “Gh0stNet” became known as the “Shadow Network” and leveraged an innovativeC&C structure that included the use of social media sites and obfuscated serversmaking it more difficult <strong>to</strong> pinpoint. Finally, in late 2009, “Operation Aurora,” which involvedthe mass exfiltration of sensitive intellectual properties from major corporations, mostnotably Google, illustrates a high degree of sophistication, because it entailed multiple techniquesincluding previously unheard of vulnerabilities b in Web browsers.The chapter is organized as follows: first, we present a brief description of the writings ofChinese military thinkers on cyber espionage. After laying out the conceptual base of Chinesethinking on cyber war, we will attempt <strong>to</strong> identify some of the prominent Chinese cyber warriors.This is followed by a discussion of “Titan Rain” and a case study of an early cyberexfiltration incident described by Northrop Grumman in a presentation <strong>to</strong> the U.S.-ChinaEconomic Security Review Commission. Though Northrop Grumman does not disclose certaindetails of the attack (i.e., the company which was attacked or the exact date in which i<strong>to</strong>ccurred), it does provide good insight in<strong>to</strong> some of the earlier Chinese cyber espionage operations.We then go on <strong>to</strong> discuss “Gh0stNet” and the “Shadow Network.” This is followedby an example for intellectual property theft during “Operation Aurora.” The chapter closeswith a description of the more recent Chinese-attributed espionage operation using the“Sykipot” malware where cutting-edge techniques are used <strong>to</strong> steal information on the nextgeneration of U.S. unmanned aerial vehicles (UAVs).WHY CYBER ESPIONAGE IS IMPORTANT TO CHINA:A LOOK AT CHINESE CYBER DOCTRINETwo Examples on Chinese Strategic ThoughtPerhaps, the most striking aspect of Chinese cyber doctrine is how it seems radically differentfrom Western thought. This section outlines two examples on how Chinese and Westernthought on strategy contrast. These examples were originally presented by COL EdwardSobiesk, head of the Information Technology Program at West Point, in a 2003 SANS Institutepaper. 2In the first example, we compare two classic board games—the Western game of chess andthe game of Go, which originated in China more than 2500 years ago. 3 Over the course of achess game, the players conduct a war of attrition by capturing the opponent’s pieces with theultimate goal of capturing or cornering the opponent’s king. In Go, on the other hand, eachplayer starts at an empty board and, at each turn, attempts <strong>to</strong> conquer parts of the game spacewith colored s<strong>to</strong>nes. Note that in chess the destruction of a player’s opponent is required <strong>to</strong>win. Conversely, in Go, a player’s opponent is more of an obstacle <strong>to</strong> vic<strong>to</strong>ry. In many ways,the writings of Chinese military thinkers highlight these two ideas. With regard <strong>to</strong> the firstidea, it may be preferable <strong>to</strong> focus on conquering parts of the cyber-playing field, rather thandirectly confronting the enemy. With respect <strong>to</strong> the second, it may be preferable <strong>to</strong> find waysb Such vulnerabilities are known as “zero-day” exploits.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!