12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LEVERAGING RESOURCES BEYOND THE MILITARY: THE CYBER WARRIORS OF CHINA121warfare in the late 1990s sought <strong>to</strong> adapt Chinese military organizations, doctrine, and trainingfor this new form of warfare. Second, Chinese cyber warriors have developed bot<strong>to</strong>m-up.Like many countries, China was home <strong>to</strong> several communities of hackers. Over the course ofthe first decade of the twenty-first century, leaders in the Chinese military identified some ofthe more talented groups. Since China also developed antihacking laws during this period,the general trend was that the members of these groups became integrated in<strong>to</strong> legitimateentities—including computer security companies, consulting firms, and academia. These entities,in turn, forged close relationships with the Chinese government and military.INEW and <strong>Cyber</strong> in the PLAThe general information warfare (IW) strategy in use by the PLA is known as IntegratedNetwork Electronic <strong>Warfare</strong> (INEW). 15 This strategy was originally outlined in a book byGeneral Dai Qingmin in 1999 known as On Information <strong>Warfare</strong>. This integration of cyber operations<strong>to</strong> traditional information warfare assets is a key component of the INEW strategy.INEW relies on simultaneous application of both electronic warfare and cyber operations <strong>to</strong>overwhelm an adversary’s command, control, communication, computers, intelligence, surveillance,and reconnaissance (C4ISR). Hence, the mission of key pieces of cyber warfare (cyberattack, cyber espionage, and cyber defense)—are assigned <strong>to</strong> elements of the PLA GeneralStaff traditionally given similar roles in electronic warfare.According <strong>to</strong> a 2009 Northrop Grumman report <strong>to</strong> the US-China Economic and SecurityReview Commission, the General Staff of the PLA is divided in<strong>to</strong> several departments. INEWgenerally assigns offensive tasks (cyber attack and more conventional electronic counter measures(ECM)) <strong>to</strong> the 4th Department—which has traditionally played a large role in offensive informationwarfare. Notably, General Dai Qingmin was promoted <strong>to</strong> the head of the 4thDepartment in 2000—perhaps an indication that the PLA intended <strong>to</strong> adopt his vision of INEW.Defensive and intelligence tasks—specifically cyber defense and cyber espionage are assigned <strong>to</strong>the 3rd Department—which traditionally focused on signal intelligence (SIGINT). It is thoughtthat the 3rd Department is the headquarters for the Technical Reconnaissance Bureaus, whosenormal mission is SIGINT collection. In the late 1990s, several of these Bureaus received awardsrelating<strong>to</strong>research in informationwarfare. Someanalystsbelieve this indicatestheir rolein cyberoperations. 16To augment the information warfare specialists in the 3rd and 4th GSDs, the Chinese havealso established information warfare militia units. 17 These militias can be thought of as a “cybernational guard” as they consist largely of personnel from the commercial informationtechnology (IT) and academia. Open source reporting indicates that these units have been createdfrom 2003 <strong>to</strong> 2008 in Guangzhou, Tianjin, Henan, and Ningxia provinces. There is evenevidence that some of these militia received specific wartime tasks—most of which appear <strong>to</strong>be focused on cyber attack.The Chinese Hacker Community: From Black Hat <strong>to</strong> White HatFrom 1999 <strong>to</strong> 2004, the Chinese hacker community, thought <strong>to</strong> consist of several thousandhackers, gained no<strong>to</strong>riety for several high-profile pro-PRC attacks. These included cyber attacksagainst Indonesia, Taiwan, and the United States in response <strong>to</strong> political incidents.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!