1 of 17

Slide Notes

DownloadGo Live

Cyberwarfare

Published on Nov 18, 2015

No Description

PRESENTATION OUTLINE

Cyberwarfare

by Bodhi Stanberry

1949

“We (the Chinese people) have stood up.”

power

“Chinese leaders routinely emphasize the goal of reaching critical economic and military benchmarks by 2020.”

“Despite its desire to project an image of a developing country engaged in a peaceful development strategy, China’s efforts to defend national sovereignty and territorial integrity (underpinned by growing economic and military capabilities) have occasionally manifested in assertive rhetoric and behavior that generate concerns about its intentions.”

pentagon

Over 24 Critical Weapons Systems Programs Stolen
Photo by mindfrieze

f-35 joint strike fighter weapons systems

“appear[s] to be attributable directly to the Chinese government and military”
Photo by Rennett Stowe

Existential Attacks

Corporations

Intellectual Property Theft

“the greatest transfer of wealth in history.”

-Keith Alexander (Director of the National Security Agency)

Mandiant

Chinese government caught red-handed 

Advanced persistent threat group 1

Unit 61398

EITHER....

"A secret, resourced organization full of mainland Chinese speakers with direct access to Shanghai-based telecommunications infrastructure is engaged in a multi-year, enterprise scale computer espionage campaign right outside of Unit 61398’s gates, performing tasks similar to Unit 61398’s known mission."

OR...


"APT1 is Unit 61398."

STRENGTHEN YOUR DEFENSES

Calmes, Jackie, and Steven Lee Myers. "Obama and Xi Tackle Cybersecurity as Talks Begin in California." The New York Times. The New York Times, 07 June 2013. Web. Jan.-Feb. 2014.

Cheek, Timothy. Mao Zedong and China's Revolutions: A Brief History with Documents. Boston: Bedford/St. Martin's, 2002. Print.

Exposing One of China's Cyber Espionage Units. Rep. Mandiant, 18 Feb. 2013. Web. Jan.-Feb. 2014.

Photo by Kent Wang

Nakashima, Ellen. "Confidential Report Lists U.S. Weapons System Designs Compromised by Chinese Cyberspies." Washington Post. The Washington Post, 28 May 2013. Web. Jan. 2014.

Ovsey, Dan. "Recourse for Intellectual-Property Theft in China Is Improving, but New Risks Are Emerging." Financial Post. N.p., 19 Feb. 2014. Web. 21 Feb. 2014.

Riley, Michael A., and Ashlee Vance. "China Corporate Espionage Boom Knocks Wind Out of U.S. Companies." Bloomberg.com. Bloomberg, 15 Mar. 2012. Web. 08 Mar. 2014.

Photo by pedrosimoes7

Sanger, David E., David Barboza, and Nicole Perlroth. "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." The New York Times. The New York Times, 18 Feb. 2013. Web. 10 Feb. 2014.

Simonite, Tom. "Virtually a Reality." MIT Technology Review. N.p., 27 Feb. 2013. Web. Jan. 2014.

Timberg, Craig, and Ellen Nakashima. "Chinese Cyberspies Have Hacked Most Washington Institutions, Experts Say." Washington Post. The Washington Post, 21 Feb. 2013. Web. 08 Feb. 2014.

Photo by Kent Wang

United States. Department of Defense. Secretary of Defense. Military and Security Developments Involving the People's Republic of China 2013. N.p.: n.p., n.d. Print.

United States. Department of Defense. The Under Secretary of Defense for Acquisition, Technology, and Logistics. Resilient Military Systems and the Advanced Cyber Threat. N.p.: n.p., n.d. Print..

United States. The National Bureau of Asian Research. The Commission on the Theft of American Intellectual Property. The IP Commission Report. N.p.: n.p., n.d. Print.