Cybersecurity Threats The Red Dragon Rising Understanding and Assessing the Chinese Cyber Threat



Similar documents
Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Research Note Engaging in Cyber Warfare

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

China s Economic Espionage

China s Perceptions of Cybersecurity

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

IRIS Report Commercial Espionage: The Threat from Chinese Cyber Attacks Executive Summary

Cyber Security Ultimately Is Military Security

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

The 2 nd AOPA International Flight Training Exhibition (2014)

Trends Concerning Cyberspace

Cyber-Intelligence and Cyber-Espionage

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Introduction to Cybersecurity Overview. October 2014

United States Cyber Security in the 21st Century

White Paper: Cyber Hawk or Digital Dove

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Confrontation or Collaboration?

Integrated Network Electronic Warfare: China's New Concept of Information Warfare

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

UN Emergency Summit on Cyber Security Topic Abstract

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Top 5 Data Breaches in 2014

BIOGRAPHICAL DETAILS OF DIRECTORS AND SENIOR MANAGEMENT

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

The main object of my research is :

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

U. S. Attorney Office Northern District of Texas March 2013

VIENNA MODEL UNITED NATIONS CLUB

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Train Like You Will Fight

Viewpoint: Implementing Japan s New Cyber Security Strategy*

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

the Council of Councils initiative

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Promoting a cyber security culture and demand compliance with minimum security standards;

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

NATO & Cyber Conflict: Background & Challenges

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Cyber defence in the EU Preparing for cyber warfare?

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

SCADA Security Training

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Harmful Interference into Satellite Telecommunications by Cyber Attack

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

CYBER SECURITY IN INDIA

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

Threat Intelligence: Friend of the Enterprise

Executive Director Centre for Cyber Victim Counselling /

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

GRADUATE INSTITUTE OF INTERNATIONAL AFFAIRS AND STRATEGIC STUDIES

Data Breach Response Planning: Laying the Right Foundation

Foreign Affairs and National Security

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

Predictive Cyber Defense A Strategic Thought Paper

working group on foreign policy and grand strategy

PENETRATION TESTING GUIDE. 1

Cybersecurity. Canisius College

Trends and Tactics in Cyber- Terrorism

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

SolarWinds Federal Cybersecurity Survey Summary Report

EY Cyber Security Hacktics Center of Excellence

National Cyber Security Strategy of Afghanistan (NCSA)

Hybrid Warfare & Cyber Defence

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Identifying Cyber Risks and How they Impact Your Business

Malware. Stopping cyberattacks. Sponsored by

An Overview of Large US Military Cybersecurity Organizations

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

The Chinese Language and Language Planning in China. By Na Liu, Center for Applied Linguistics

EC-Council. Certified Ethical Hacker. Program Brochure

Hearing date: 15 June Dennis F. Poindexter. Testimony before the U.S.-China Economic and Security Review Commission

Transcription:

Cybersecurity Threats The Red Dragon Rising Understanding and Assessing the Chinese Cyber Threat William Hagestad II Lieutenant Colonel (RET) USMCR www.red-dragonrising.com

21 st Century Chinese Cyber Warfare Today s presentation is an appetizer of the content which will be included in a new book titled 21 st Century Chinese Cyber Warfare Published by IT Governance, London, UK In January 2012

Presentation Agenda Learning objectives Statement of the Issue Origins of Chinese Information Warfare (IW) People s Liberation Army Organization History of Chinese IW Conclusions

Learning Objectives Understanding Chinese warfare history and culture that influence today s reality Chinese Communist Party cyber initiatives that threaten your organization People s Liberation Army (PLA) information warfare capabilities What you can expect to face in the next decade

What s the Issue? Threat of cyber attacks against; Corporations; Research institutes; Militaries; International organizations; and, Governments But not the 中 国 人 民 共 和 国 why?

How are the Chinese doing it? Calculated, precise use of hacking methodologies to gain unauthorized access to a network; Via brute force attacks, Distributed Denial of Service (DDoS); Trojans, viruses and malware; or a combination of both methods also known as a. Advanced Persistent Threat (APT)

So, who is behind these cyber attacks? The People s Republic of China for starters.. 中 国 人 民 共 和 国 But it cannot be there is no evidence pointing to the Chinese Government. Who are the attackers then? 1) Yes, the government! 2) The People s Liberation Army (PLA) 3) State Owned Enterprises 4) Hacktivists

However.Current Events! Slip-Up in Chinese Military TV Show Reveals More Than Intended ¹ Chinese Military Slips Up And Broadcasts Cyberwar Campaign Against U.S. Targets ² ¹ Matthew Robertson & Helena Zhu, 2011. Slip-Up in Chinese Military TV Show Reveals More Than Intended Piece shows cyber warfare against US entities[online]. Available at: http://www.theepochtimes.com/n2/china-news/slip-up-in-chinese-military-tvshow-reveals-more-than-intended-60619.html ² Robert Johnson, Chinese Military Slips Up And Broadcasts CyberwarCampaign Against U.S. Targets [Online]. Available at: http://www.businessinsider.com/chinese-military-cyberwar--us-targets-2011-8

Now the Smoking Mouse A Six second screenshot on Chinese Television PLA propaganda + unedited TV = proof positive! 6-seconds of fame for the PLA demonstrating organic hacking software capability Falun Gong Censorship Hacked IP @ University of Birmingham, AL

What is the Chinese motivation? Fear of 外 国 人 foreigners. Self-preservation and, Hegemony ( 霸 权 )..what? A perfect description of the Communist Party of China (CPC)..implied power of the Chinese state subordinates every element of modern Chinese Society including threats of religion Falun Gong..

It cannot be that simple? Other reasons for PRC motivated cyberattacks. Frenzied Chinese economy Strategic advantage over regional and international affairs CPC mandated 2010 PLA mission statement.1995!

数 字 中 国 的 崛 起! The Rise of Digital China. Significant educational Internet connectivity since 1987 Centuries old warfare doctrine Sun Tzu s Art of War. 孙 子 的 战 争 艺 术 Net Centric Warfare Chinese style..

Tell me more about these Chinese hackers. Who are they? Communist Party of China (CPC) People s Liberation Army (PLA) State Owned Enterprises (SOE) Civilian Hackers (Hacktivists)

中 国 共 产 党 -CPC Communist Party of China codified cyber warfare in 2010 protect national infrastructure from external cyber threats President Hu Jin tao President Hu s successor Xi Jin ping. CPC + PLA x information technology superiority = China s worldwide dominance

人 民 解 放 军 -PLA Sun Tzu s The Art of War 孙 子 的 战 争 艺 术 500B.C. 1995 -Father of Chinese Information Warfare Major General Wang Pu feng February 1999 Unrestricted Warfare QiaoLiang and Wang Xiangsui-Beijing: PLA Literature and Arts Publishing House, February 1999

国 有 企 业 -State Owned Enterprises China Telecom owned by the CPC, operated by the PLA Huawei owned by former PLA officer direct links to the PLA however NOT the CPC ZTE based in Shenzhen, Guangdong China Petroleum & Chemical Corp SinoChem China National Petroleum Corp China National Pharmaceutical Group

Hacktivists Originally supported by CPC & PLA Reinforce the PRC s nationalism via the web Taiwan, the renegade Chinese Province - Punishing Japan for WWII war crimes - Codera s anti-chinese web rhetoric

Origins of Chinese IW Sun-Tzu s Art of War basis Sun Ping s Military Methods Major General Wang Pufeng founding father of Chinese Information Warfare (IW) PLA's IW strategy spearheaded by Major General Dai Qingmin, War Without Limits Senior Colonel s Qiao Liang & Wang Xiangsui

Official Statement of Chinese IW 20 JUL 2010 ordered by President Hu Jintao to handle cyber threats as China enters the information age, and to strengthen the nation's cyber-infrastructure ³ The Cyber Warfare Princelings General Zhang Qinsheng 章 沁 生 General Chen Bingde 陈 炳 德 General Ma Xiaotian 马 晓 天 Vice Admiral Sun Jianguo 孙 建 国 Major General HouShusen 侯 树 森 ³ PLA Daily, July 20, 2010; [Online] Available at: http://english.peopledaily.com.cn/200007/21/eng20000721_46068.html

Current Tacticians Major General Hu Xiaofeng, Deputy Director for the National Defense University Department of Information Warfare and Training Command Professor MengXiangqing, National Defense University Institute for Strategic Studies goal is to achieve a strategic objective You have to meet my political conditions or your government will be toppled, or you promise to meet some of my political conditions. ⁴ ⁴ The Dark Visitor, 2010; [Online] Available at: http://www.thedarkvisitor.com/category/uncategorized/

Chinese Cyber Warfare History May 03, 2001 China warns of massive hack attacks ¹ 2002 - informatization 信 息 化 Chinese Communist Party (CCP) General Secretary and Central Military Commission (CMC) Chairman Jiang Zemin, a speech before the 16th Party Congress ² 2007 GhostNet 幽 灵 网 2007 -Titan Rain 泰 坦 雨 2008-Asian web surfers top for time spent online ³ 2009-Operation Aurora 操 作 极 光 2009 Night Dragon 夜 龙 2010 - Should we be afraid of Chinese hackers?...or lost cyber war⁴ 2011-US needs to get better at preventing foreign access to advanced technology -GAO watchdogs find holes in high-tech access, licensing rules ⁵ ¹ http://articles.cnn.com/2001-05-03/world/china.hack_1_cyber-war-chinese-cyber-chinese-hackers?_s=pm:asiapcf accessed 2001-07-15 ²http://www.defense.gov/pubs/pdfs/2010_CMPR_Final.pdf accessed 2010-11-28 ³http://www.zdnet.co.uk/news/networking/2008/12/01/asian-web-surfers-top-for-time-spent-online-39568096/ accessed 2008-12-14 ⁴https://www.infosecisland.com/blogview/3895-Should-we-be-afraid-of-Chinese-hackers-Or-lost-cyber-war-Part-II-.html accessed 2011-03-21 ⁵ http://www.networkworld.com/community/blog/us-needs-get-better-preventing-foreign-access?source=nwwnle_nlt_security_identity_2011-03-09

Conclusions Conclusions include the following; 1) The hegemony of the People s Republic of China drives the intent to use information warfare in the cyber realm; 2) The use of cyber-warfare is state sponsored; 3) The People s Liberation Army has a unit assigned to carry out cyber-warfare, known as the Blue Army 4) There is a significant cultural, economic, historical and linguistic thread throughout the decade plus history of Chinese cyber-warfare; 5) The CPC, although advocating citizen hacking, can no longer control it; 6) Commercial enterprises worldwide are permeable to Chinese cyber hacking in all its form and methods; 7) Similarly, and in particular, the United States Department of Defense cannot defend itself adequately from the various alleged Chinese information warfare threats in the 5 th domain of warfare; 8) The composite alleged People s Republic of China cyber-warfare threat is serious and will only become much worse.. 9) Diplomatic initiatives should be seriously considered in tandem with a show of U.S. military force in ASIA PAC

Who owns the US?

伟 大 的 中 国 防 火 墙 The Great Firewall of China No one gets out, and no one gets in..

你 會 說 中 國 普 通 話...... 嗎? 看 看 發 生 了 什 麼 事!

謝 謝 您 謝 謝 您 的 時 間 今 天 有 沒 有 問 題?

Event Description The Chinese Cyber Threat is becoming synonymous with the Advanced Persistent Threat (APT). Your reality is, or will be very soon, learning how to operate in a compromised state, always vigilant to ferret out the stealthy intruder. The InfoSec professional needs to have a working knowledge of the threat community they are facing in order to accuratelyassess the risk and advise senior leaders on the proper course of action. This briefing will provide you with the information necessary to assess the risk posed to your organization by the Rising Red Dragon. The People s Republic of China, also known as the Middle Kingdom, has a very developed and mature information warfare capability. This fifth dimension of warfare is also known as a cyber warfare capability and includes such acronyms as computer network attack (CNA), computer network exploit (CNE) and computer network vulnerability (CNV). During this presentation of the Chinese Cyber Warfare phenomena, attendees will receive an introduction to Chinese Warfare, Culture and History. A rapid progression towards the recent decades long development of informatization of Sun Tzu s ancient warfare methodologies will be mapped to Western military principles of war. Present day Communist Party of China (CPC) cyber initiatives, the People s Liberation Army (PLA) information warfare capabilities and organization will be analyzed. The introduction of civilian hacktivists and Chinese corporations into the inculcation of the cyber realm and what it all means to the outside world. Attendees should consider attending this Chinese Cyber Warfare presentation to better understand the facts vs. the folklore about China and her rather developed cyber and information warfare capabilities.