PLA Roles:
Name of formal information warfare strategy?
Integrated Network Electronic Warfare
What is the Five Year Plan?
2011-2015
What is the Blue Army?
May 2011, small group with highly developed skills.
China Goals
Political: economic and technological superiority
Political: Ensure there is one political voice
Military: Disable enemy communication; eliminate enemies’ ability to obtain, control, and use information.
China Doctrine
President Hu Jintao official proclamation that PLA is to conduct cyber warfare in name of Chinese self-preservation.
Role of State
Largely considered to be state-sponsored hacking
Role of Universities
state-controlled universities “recruit” individuals and give training. Universities such as Science and Engineering University is tied to military.
People’s Liberation Army (PLA)
Military Centers associated with cyber attacks:
State Sponsored (actors in):
Role of State-owned Enterprises
- Cyber espionage used to gain economic advantage
Role of Hacktivists & 4 types of operations
China History: Earliest
date back as far as 2001; doctrine goes back into 1990s.
China History: 2002
global energy industry attacked
China History: 2006
Air Force was tracking several individuals / groups.
China History: 2010
Establishment of Chinese Cyber Command
Titan Rain
Nov 1 2004 - Dec 14 2005
Source: Guangdong province of China
Targets: US government systems
- US DISA, Naval Ocean Systems Center, US Army Space and Strategic Defense, US Army Information Systems Engineering Command.
State-owned Enterprises: the numbers
Lenovo purchased by IBM in May 2005.
PLA & Hactivists
PLA using hacker community for clandestine attacks
Hactivist Toolsets
Advanced Persistent Threat
Cloppert’s Kill Chain
2009 Desire to break chain as far to the left as possible. Defensive / protective measures vs clean-up costs - Reconnaissance - Weaponization - Delivery - Exploitation - C2 - Exfiltration
-> not effective for all characteristics of life cycle. (btw C2 & exfil lots of activity)
Modified Kill Chain
APT Group One
Tin Snake