PRESENTATION OUTLINE
“Despite its desire to project an image of a developing country engaged in a peaceful development strategy, China’s efforts to defend national sovereignty and territorial integrity (underpinned by growing economic and military capabilities) have occasionally manifested in assertive rhetoric and behavior that generate concerns about its intentions.”
f-35 joint strike fighter weapons systems
“the greatest transfer of wealth in history.”
Advanced persistent threat group 1
EITHER....
"A secret, resourced organization full of mainland Chinese speakers with direct access to Shanghai-based telecommunications infrastructure is engaged in a multi-year, enterprise scale computer espionage campaign right outside of Unit 61398’s gates, performing tasks similar to Unit 61398’s known mission."
OR...
"APT1 is Unit 61398."
Calmes, Jackie, and Steven Lee Myers. "Obama and Xi Tackle Cybersecurity as Talks Begin in California." The New York Times. The New York Times, 07 June 2013. Web. Jan.-Feb. 2014.
Cheek, Timothy. Mao Zedong and China's Revolutions: A Brief History with Documents. Boston: Bedford/St. Martin's, 2002. Print.
Exposing One of China's Cyber Espionage Units. Rep. Mandiant, 18 Feb. 2013. Web. Jan.-Feb. 2014.
Nakashima, Ellen. "Confidential Report Lists U.S. Weapons System Designs Compromised by Chinese Cyberspies." Washington Post. The Washington Post, 28 May 2013. Web. Jan. 2014.
Ovsey, Dan. "Recourse for Intellectual-Property Theft in China Is Improving, but New Risks Are Emerging." Financial Post. N.p., 19 Feb. 2014. Web. 21 Feb. 2014.
Riley, Michael A., and Ashlee Vance. "China Corporate Espionage Boom Knocks Wind Out of U.S. Companies." Bloomberg.com. Bloomberg, 15 Mar. 2012. Web. 08 Mar. 2014.
Sanger, David E., David Barboza, and Nicole Perlroth. "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." The New York Times. The New York Times, 18 Feb. 2013. Web. 10 Feb. 2014.
Simonite, Tom. "Virtually a Reality." MIT Technology Review. N.p., 27 Feb. 2013. Web. Jan. 2014.
Timberg, Craig, and Ellen Nakashima. "Chinese Cyberspies Have Hacked Most Washington Institutions, Experts Say." Washington Post. The Washington Post, 21 Feb. 2013. Web. 08 Feb. 2014.
United States. Department of Defense. Secretary of Defense. Military and Security Developments Involving the People's Republic of China 2013. N.p.: n.p., n.d. Print.
United States. Department of Defense. The Under Secretary of Defense for Acquisition, Technology, and Logistics. Resilient Military Systems and the Advanced Cyber Threat. N.p.: n.p., n.d. Print..
United States. The National Bureau of Asian Research. The Commission on the Theft of American Intellectual Property. The IP Commission Report. N.p.: n.p., n.d. Print.