12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LEVERAGING RESOURCES BEYOND THE MILITARY: THE CYBER WARRIORS OF CHINA123targeting, and deception. Regarding C2, hacktivist operations can quickly grow in<strong>to</strong> a selfsustainingoperation, making such a movement easily uncontrollable by the PLA. INEW’sfocus on precision targeting and operational discipline (which we shall note in some of thecase studies later in the chapter) is also difficult <strong>to</strong> foster in a hacktivist movement. Finally,as hacktivism is inherently public, operational security becomes extremely difficult, makingdeception and plausible deniability hard <strong>to</strong> implement.With the PRC cracking down on hacking not condoned by the government and withhacktivism not fitting in<strong>to</strong> the PLA strategy, what becomes of the Chinese hackers who wereactive in the early 2000s? It turns out that the PRC and PLA were able <strong>to</strong> leverage this pool oftalent, but in a more controlled manner. This was accomplished by many key members of thehacker community making the transition from “black hat” (unsupervised, extragovernmental,or illegal hacking) <strong>to</strong> “white hat” (“ethical” hacking normal in the form of “security consulting”).There were two ways in which this occurred, one of which saw many hacker groups reinventingthemselves as computer security firms—often seeking a relationship with the government. Thechart below lists some hacker groups from the late 1990s/early 2000s that later became securityfirms that established a relationship with the Chinese government (Table 7.1). 20The second way in which the PRC encouraged members of the Chinese hacker community<strong>to</strong> turn “white hat” was through direct recruiting of skilled hackers. For example, according <strong>to</strong>Northrop Grumman’s report in 2007 and 2008, a user known as “City_93” posted job announcementsfor the Ministry of Public Security’s First Research Institute on two of the mostwell-established hacker forums. d Not only has the PRC attempted <strong>to</strong> recruit hacking talentbut the PLA has succeeded in doing so as well. In 2005, they allegedly held a series of regionalhacker competitions—most likely <strong>to</strong> identify and recruit hacker talent. 21In another example of the black hat-<strong>to</strong>-white hat transition, Peng Yinan, alleged cofounderof the Chinese hacking group Javaphile, is believed <strong>to</strong> be currently conducting research onbehalf of the Chinese government. Based on the analysis by American security specialist ScottHenderson, Peng Yinan (under the screen name “CoolSwallow”) is thought <strong>to</strong> have led theJavaphile hacking group <strong>to</strong> conduct a large-scale attack against the White House in response<strong>to</strong> the accidental bombing of the Chinese embassy in Serbia by the United States in 1999. 22Yinan surfaced in 2008 when he published, under his own name, two academic articles oncyber espionage techniques. In the publications, he along with other former Javaphile members,was listed as researchers under the Shanghai Jiao<strong>to</strong>ng University’s Information SecurityTABLE 7.1Chinese Hacker Groups and Corresponding Security FirmsHacker groupGreen Army AllianceXConPatriot Hackers-Black Eagle BaseSecurity firmNSFocusXFocusBlack Eagle Honker Base aa The Black Eagle Honker Base is not a security firm, but rather an informal group that reformed 6 months after the Patriot Hackers—Black EagleBase was shut down. The group then released a statement espousing that the group was now partaking in efforts <strong>to</strong> train individuals from the stateand work <strong>to</strong> improve the PRC’s network security industry.d The hacker forums <strong>to</strong> where the job announcement were found were EvilOctal.com and XFocus.net.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!