Verified Document

Persistent Threat Historical Background Of Research Paper

According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has reached its peak. Both the Europeans and the U.S. agree that the expansion of the Chinese military is more than "worrisome."

Another article posted on November 16, 2007 by the Washington Post claims that spying by China in the United States is the biggest threat keeping American technologies secret. Advances by the Chinese military are catching U.S. intelligence officials by surprise. It has also been suggested that the U.S. Department of Defense could inadvertently outsource the manufacturing of key weapons and military equipment to China. China is attempting to reverse its move into free markets by setting up state-owned enterprises and control over the 12 major industries, which include oil, telecommunications, shipping, automobiles, steel and information technology.

The PLA has developed a strategy called "Integrated Network Electronic Warfare," which is said to be guiding employment of CNO, as well as related warfare information tools. The strategy consists of the implementation of network warfare tools and electronic warfare weapons against enemy information systems. One of the main goals of the PLA is to achieve information dominance at both the strategic and the campaign levels. This statement is according to the Science of Military Strategy and the Science of Campaigns. It is important that the PLA make the transition from a mechanized force to an information force in order to win local wars against the enemy using a greater technological advantage, such as the United States. A strong warfare capability to control an enemy's access to its own technology is extremely important to winning.

PLA Information Warfare Planning

In order to effectively fight a technology war, it is important that one has the ability accurately access the likely impact on the adversary of a CNA strike on any given asset. This type of assessment is dependent on various network dependencies. In other words, have a good handle on the center of operations and choose targets in sequence to strike. Organize the enemy's weaknesses and arrange to take down these weaknesses one-by-one. This requires knowledge of their entire operational system and procedures. Mission planners should have a clear understanding of enemy network dependencies in order to break their line of defense. The CNA will also have a clear understanding of cultural and military sensitivities surrounding an attack.

Chinese Computer Network Operations During Conflict

PLA Commanders have CNO available during times of conflict even though the PLA rarely discusses CNO. CNO can be compared to missiles or air power. It is important to understand how the CNO could be used in support of larger campaigns. To do this, one must understand CNO in proper context. The strategy of CNO is simple: denying an enemy access to information systems, which are critical for combat operations and analysis of enemy weak points.

Chinese military leaders are typically influenced by their culture and traditional strategies, they have shown a willingness to use great force and strength in situations where the PRC was considered weaker. In some cases, conflict will be less costly at a later date in conditions that are less favorable to China. This logic seems unusual to Western cultures, but it reflects the ever changing strategic conditions. Both PLA and PRC leaders use this same logic and strategic planning, particularly in weapons planning.

The PLA uses CNO with EW weapons as a joint campaign capability. CNO is used for obtaining information, while providing opportunities for air, ground and naval forces to act upon. In a military crisis between China and the U.S., the CNO would most likely be used in order to make repeated attacks against the U.S. Department of Defense. These types of attacks are typically used to gather and degrade U.S. information and support systems so that the PLA may achieve their overall objectives. Both CNO and IW weapons may help delay the U.S. military weapon response without requiring direct combat with U.S. forces, which are far more superior.

The Logistics of Networks and Databases in a Conflict

In assessing U.S. campaigns of Iraq (Desert Storm and Operation Iraq Freedom), weak points can be identified in force deployment and logistics. On the flipside, defeating the U.S. logistics systems will not likely help defeat the U.S. military, but these types of disruptions will help buy the PLA (or attacker, whoever they may be) time. Time is important in battle and can be very beneficial to an enemy's defeat or winning.

Of interest regarding...

Maintaining effective movement control during times of major mobilization can be extremely difficult and complex by nature. Major delays can be created by causing disruption to information systems at key nodes with an emphasis on shipping terminals and airports. This would cause the affected destination to stop production.
If the PLA can compromise just one weak password by logging in or exploiting SQL injection vulnerabilities, many logistics databases could easily be compromised with what is considered to be relatively easy access. By having continual access to NIPRNET using CNA techniques, as well as to logistics information, which support the TPFDD for different war plans, this would allow the PLA to put together a detailed intelligence picture of the intended U.S. force deployment.

The basic PLA strategy against NIPRNET logistics is likely very simple. It is speculated that it is a combination of attacks on specific network segments, which do not authenticate common Internet traffic through a proxy server, before leaving the network. By doing this, they will be able to operate much more freely within the network. An attacker in this type of situation can connect to a remote C2 node to download additional tools and can infiltrate data without the requirement of having valid user credentials.

There have been reports of China attacking U.S. networks in the past. These reports suggest that the individuals operating these procedures specifically target the competence to identify specific users within a unit or an organization, based on particular job functions or presumed access to information. If an attacker is able to penetrate or exploit legitimate user credentials, the attacker will be able to review file directories while potentially targeting specific files to alter, but this is all dependent on specific mission requirements and the U.S. INFOCON levels. These attackers can also access passive monitoring information for network traffic, which would be used for intelligence collection purposes. The utilization of these machines and strategies during times of peace may enable attackers to prepare a reserve of compromised machines, which would be used during crisis.

Chinese CNO operators probably possess the technical sophistication to build and upload rootkit, while converting remote access software and creating deep persistent access to whatever host is compromised. This makes their detection extremely difficult if not nearly impossible. Logistics support provided to operational units as a result of what is referred to as an "upstream" attack on the networks of civilian contractors has the potential for a greater impact, while being potentially easier against the smaller companies that usually lack sufficient resources or the expertise for sophisticated network security and monitoring. Many of these vulnerabilities, which I have outlined above, could be minimized if the network were to use a proxy server, implement firewalls, block proxy access without valid user identification and prevent user credentials from being exposed to the attackers.

Another way Chinese CNO operators may compromise the U.S. is by uploading invalid information (or false records) without the U.S. knowing, or by corrupting current user files and records in an attempt for possible intentional detection. Discovering this type of file corruption would generate the manpower and an intense resource review of targeted unit's database records, as well as other files, which would in turn, create very costly operational delays. If this type of attack was made against several large or critical supply nodes, there would be a significant impact.

If NIPRNET-based logistics database became compromised and files were uploaded or current files were exploited, it would require that PLA operators compromise a computer on the targeted LAN, while being able to operate the user's credentials. This capability has been observed in previous U.S. network intrusion attempts. These types of past compromises or attack attempts can be attributed to China in many instances.

If this type of attack were to be detected, there may be a greater impact on U.S. forces regarding the perception management and psychological operations. This would have a greater impact than if there was an attack made on more localized targets or to redirect supplies. There is actually only a limited number of compromises, which may be required to have any kind of impact on the U.S. operations. If information security concerns were to…

Sources used in this document:
Resources

1. Article: online

Kim Zetter (February 3, 2010). Threat Level: Privacy, Crime and Security Online

Report Details Hacks Targeting Google, Others, (1), 1. http://www.wired.com/threatlevel/2010/02/apt-hacks/

2. Article Publication: online and hardcopy
Cyber Crime: a clear and present danger, combating the fastest growing cyber security threat, (2), 16. http://gcn.com/whitepapers/2010/02/cyber-threat-intelligence/asset.aspx?tc=assetpg?tc=assetpg&returnkey=iuEFSD7b0zVdvtACcsLmsVNiOl1vPIug
Roads and Crossroads of Internet History, (1), Undefined. http://www.netvalley.com/intval/07262/main.htm?sdf=1
Roads and Crossroads of Internet History, (1), Undefined. http://www.netvalley.com/intval_intr.html
Investigating Your National Security, (1), Undefined. http://worldthreats.com
New Product Development Team Intelligence: Antecedents and Consequences, Volume 45, Issue 4, (3), Pages 221-226. http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VD0-4S9R87D-2&_user=10&_coverDate=06%2F30%2F2008&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1274826032&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=c1a888ef559e67673de772016bf66443
Economic Warfare, (1), 2 http://comintelca.wordpress.com/2010/01/15/chinese-hackers-pose-a-growing-threat-to-u-s-firms/
The Conservative Caucus: Excerpted from Howard Phillips Issues & Strategy Bulletin of January 15, 2010, (1), Undefined http://www.conservativeusa.org/redchina-missile.htm
Los Angeles Times, (1), 3 http://articles.latimes.com/2010/jan/15/business/la-fi-google-china15-2010jan15
The Hill: Hilicon Valley, (1), 4 http://thehill.com/blogs/hillicon-valley/technology/75857-google-threat-intensifies-trade-tensions
Defense News, (1), 3 http://www.defensenews.com/story.php?c=SEA&s=TOP&i=4385464
The Gertz File, (1), 3 http://www.gertzfile.com/gertzfile/wires.html
The Toronto Star, (1), 2 http://www.mahbubani.net/articles/TorontoStar.pdf
The Washington Post, (2), 3 http://www.washingtonpost.com/wp-dyn/content/article/2007/11/15/AR2007111501099.html
The U.S. Department of Defense, (Undefined), 50 http://www.defense.gov/pubs/pdfs/070523-China-Military-Power-final.pdf
Bill Gertz (March 24, 2010). Cyber-attack on U.S. firms, Google traced to Chinese The Washington Times, (1), 3 http://www.washingtontimes.com/news/2010/mar/24/cyber-attack-on-us-firms-google-traced-to-chinese/
Global Intelligence Working Group (Undefined). National Criminal Intelligence Sharing Plan Global Intelligence Working Group, (Undefined), Undefined http://www.it.ojp.gov/documents/ncisp/
China's National Defense (2004). The Security Situation China's National Defense in 2004, (Undefined), 2 http://english.peopledaily.com.cn/whitepaper/defense2004/defense2004(1).html
Chinese Military Academies -- Naval University of Engineering (2007). National University of Defense Technology, (Undefined), 2 http://english.chinamil.com.cn/site2/special-reports/2007-06/26/content_858557.htm
People's Daily (1999). China Establishes New Military Schools People's Daily, (Undefined), 1 http://english.peopledaily.com.cn/english/199907/03/enc_19990703001001_TopNews.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Children, Grief, and Attachment Theory
Words: 22384 Length: 75 Document Type: Term Paper

Figure 1 portrays three of the scenes 20/20 presented March 15, 2010. Figure 1: Heather, Rachel, and Unnamed Girl in 20/20 Program (adapted from Stossel, 2010). Statement of the Problem For any individual, the death of a family member, friend, parent or sibling may often be overwhelming. For adolescents, the death of person close to them may prove much more traumatic as it can disrupt adolescent development. Diana Mahoney (2008), with the

Palliative Care
Words: 21397 Length: 70 Document Type: Ghost Writing

Hisory of Palliatve Care Palliative Care Palliative Care Methods Palliative care entails assisting patients get through pain caused by different diseases. The patient may be ailing from any diseases, be it curable or untreatable. Even patient who are sick and almost passing away will need this care. Palliative care has characteristics that differentiate it to hospice care. The key role for palliative care is to help in improving the existence of someone and

Marketing and Economics Agricultural
Words: 18779 Length: 68 Document Type: Term Paper

Origins, History of the IMF The International Monetary Fund was first conceived between July 1-22, 1944, at the United Nations Monetary and Financial Conference in Bretton Woods, New Hampshire. The conference was attended by representatives of 45 nations, which were called together in order to plan and lay the groundwork for a cooperative economic framework to solve global financial crises before they occur. One key reason for the conference was to

Computer Crimes
Words: 2422 Length: 9 Document Type: Essay

Essay Topic Examples 1. The Evolution and Impact of Computer Viruses on Cybersecurity: This essay explores the history of computer viruses, detailing their progression from simple self-replicating programs to complex malware that can cause significant damage to digital infrastructure, steal sensitive data, and compromise personal information. It discusses the impacts on individuals, businesses, and governments, and the growing importance of robust cybersecurity measures. 2. Cyber Fraud and Its Effect on the Global Economy: The

Achievement Gap "Go Into Any
Words: 8980 Length: 20 Document Type: Research Proposal

The achievement gap also may ultimately negatively affect the U.S. As it may cause the nation to become less competitive in the increasingly global communities (What is the…, 2009). In addition, research indicates that the achievement gap contributes to students who more likely grow up to be unemployed, incarcerated, and poor. Consequently, a quality education proves critical for Black children (Elder, ¶ 3). Causes Contributing to Achievement Gap Causes contributing to

Crucible by Arthur Miller Whether
Words: 1027 Length: 3 Document Type: Term Paper

However, using today's less rigid religious standards make the outcome of the trials seem ridiculous and completely unjust. Today, most people do not consider witchcraft a reality, and so, basing a court decision on the confession of bewitched young women seems almost ludicrous. As critic Bloom maintains, "Today's audience cannot take the possibility of witchcraft seriously; the implication for us is that no enlightened citizen of any age would

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now