Department of Defense Announces First Strategy for Operating In

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Volume 10, Issue 27 July 22, 2011 Department of Defense Announces First Strategy for Operating in Cyberspace The Department of Defense released today the DoD Strategy for Operating in Cyberspace (DSOC). By Aliya Sternstein, nextgov It is the first DoD unified strategy for cyberspace and officially encapsulates a new way forward for DoD‘s military, intelligence and business operations. ―It is critical to strengthen our cyber capabilities to address the cyber threats we‘re facing,‖ said Secretary of Defense Leon E. Panetta. ―I view this as an area in which we‘re going to confront increasing threats in the future and think we have to be better prepared to deal with the growing cyber challenges that will face the nation.‖ Reliable access to cyberspace is critical to U.S. national security, public safety and economic well-being. Cyber threats continue to grow in scope and severity on a daily basis. More than 60,000 new malicious software programs or variations are identified every day threatening our security, our economy and our citizens. ―The cyber threats we face are urgent, sometimes uncertain and potentially devastating as adversaries constantly search for vulnerabilities,‖ said Deputy Secretary of Defense William J. Lynn III. ―Our infrastructure, logistics network and business systems are heavily computerized. With 15,000 networks and more than seven million computing devices, DoD continues to be a target in cyberspace for malicious activity.‖ The DoD and other governmental agencies have taken steps to anticipate, mitigate and deter these threats. Last year, DoD established U.S. Cyber Command to direct the day-to-day activities that operate and defend DoD information networks. DoD Figure of the week also deepened and strengthened coordination with the Department of Homeland Security to secure critical networks as evidenced by the recent DoD-DHS Memorandum of Agreement. 2 x ―Strong partnerships with other U.S. government departments and agencies, the A KLAS report finds that the number private sector and foreign nations are crucial,‖ said Lynn. ―Our success in cyberspace of functioning health information depends on a robust public/private partnership. The defense of the military will exchanges in the US has more than matter little unless our civilian critical infrastructure is also able to withstand doubled since last year, with the attacks.‖ growth in private-sector exchanges surpassing the increase in public More at http://www.defense.gov/releases/release.aspx?releaseid=14651 exchanges. Volume 10, Issue 27 July 22, 2011 Page 2 Privacy and Security U.S. and Russia: Expanding the ―Reset‖ to Cyberspace reduce the risk of misperception and inadvertent crisis. It‘s a prime example of the ―Reset‖ in U.S.-Russia relations taking By Howard A. Schmidt, The White House on a new and important dimension. Many are familiar with our work on behalf of the President to reduce cybersecurity vulnerabilities, such as hardening Both the U.S. and Russia are committed to tackling common government systems and building public awareness about cybersecurity threats while at the same time reducing the cybersecurity for end-users. chances a misunderstood incident could negatively affect our relationship. But what you don‘t always hear about are our efforts to reduce the overall risk to our national networks through active We‘re actively working on doing so in numerous diplomacy and international technical collaboration. Both are key efforts for realizing the President‘s International Strategy ways: through regular exchanges of information on technical for Cyberspace (pdf) released in May. threats to both sides like botnets; by better understanding each other‘s military views on operating in cyberspace; and by Risk reduction is crucially important to our relationship with establishing 24/7 systems allowing us to communicate about Russia, where we continue regular policy coordination at the cybersecurity issues via our existing and highly successful highest levels, including on issues related to cybersecurity. crisis prevention communications links between our two capitals. We plan to have all three mechanisms established by Just last month we hosted a Russian delegation, led by my year‘s end. counterpart, Russian National Security Council Deputy Secretary Nikolay Klimashin, for another round of in-depth Through progress like this, our countries are leading the way in discussions here in Washington. developing pro-active bi-lateral measures that use cyberspace to more broadly enhance our national, and international Joined by senior officials from across the U.S. and Russian security. governments, our goal was to continue building mutual confidence in our two governments‘ activities in cyberspace to More at http://1.usa.gov/pLe4uo Tech IPOs Grapple with Privacy ―These companies realize that they need to be really upfront with what they are doing with data.‖ By Cecilia Kang, Reuters Daily deals site Groupon recently changed its privacy policies For social media start-ups, going public these days involves to collect more subscriber information and share that data more than sprucing up business and financial models. with partners. Ahead of its stock listing, it told its 83 million Also showing up in the blogs and securities filings of users about the changes in a recent e-mail. companies such as Groupon, LinkedIn, Pandora and Zynga is a Gamemaker Zynga, creator of Farmville, recently made a game new consideration: privacy. out of its privacy policy to lure users to understand how their These social networking firms after all are in the business of data is being used. The company learned first-hand about the data — collecting, sharing and sometime selling user importance of privacy policy disclosures after it was sued for information for targeted ads. They want to signal to investors allegedly sharing information about Facebook users. that they have a plan to make money from the trove of Right after it went public, professional social network LinkedIn information they have on users. announced in its blog that it would allow advertisers to publish So as federal lawmakers contemplate new online privacy laws when its users recommend products. Nearly all the firms that and regulators take up investigations of consumer protection have gone public so far or are gearing up for their IPOs have violations, this year‘s flood of social networking IPOs are listed online privacy enforcement and laws as a potential risk looking anew at how those activities in Washington, D.C., to future business. could affect their stock market prospects. Online real estate service Zillow, which will list its shares on ―Privacy is now finally and appropriately being seen as a the Nasdaq this Wednesday, listed potential Internet privacy compliance risk that is real and needs attention,‖ said Lisa laws as a risk factor to its business. Sotto, head of the privacy practice of law firm Hunton& Williams. More at http://wapo.st/nbamrJ Volume 10, Issue 27 July 22, 2011 Page 3 Information Sharing PM-ISE Releases the 2011 ISE Annual Report to the Congress By Vince Beiser, Miller-McCune The PM-ISE has officially released its 2011 ISE Annual Report to the Congress and we are proud of the information sharing success stories featured in the Report – stories that describe the outstanding accomplishments of our mission partners across the federal, state, local, and tribal governments, the private sector, and foreign allies. The Annual Report is required by law to provide the Congress ―a progress report on the extent to which the ISE has been implemented.‖ The Report highlights major ISE activities since July 2010 and is organized around five themes: Strengthening Management and Oversight - The Annual Report describes the work of the Information Sharing and Access Interagency Policy Committee (ISA IPC) and its sub- committees and working groups; of particular note, the Report highlights how these bodies expanded to include representatives of non-federal organizations and are reaching out to engage the private sector in developing the ISE, as well. Improving Information Sharing Activities - Among the state, local, and tribal law enforcement officers and analysts to many activities presented, the Report describes how the more easily access a rich variety of data services provided by Nationwide Suspicious Activity Reporting Initiative has made Assured Sensitive but Unclassified (SBU) networks. substantial progress toward streamlining reporting and analysis within fusion centers by implementing new standards, The Report also describes similar efforts for classified policies, and processes. information sharing. Another notable interagency effort involved the Baseline Enhancing Privacy, Civil Rights, and Civil Liberties Capabilities Assessment, during which federal, state, and local Protections - Balancing the need for national security with officials completed the first nationwide, in-depth assessment the need to protect privacy and civil liberties, the Report of fusion centers to baseline their capabilities. provides information on policies and training activities designed to enhance these protections. Establishing Standards for Responsible Information Sharing and Protection - Standards are critical to powering These are only a few of the activities that are helping the nation the ISE, and so the Report describes the efforts by the PM-ISE, build a robust information sharing environment. its mission partners, and standards organizations to identify And, while the Annual Report is primarily focused on
Recommended publications
  • Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism

    Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism

    Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 3 Conference: Expanding the Frontiers of Intelligence Education Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 1-9 Recommended Citation Adkins, Gary. "Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism." Journal of Strategic Security 6, no. 3 Suppl. (2013): 1-9. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 3 Adkins: Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins Introduction The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has become a great asset to both businesses and private citizens. However, there is a dark side to the age we live in as it allows terrorist groups to communicate, plan, fund, recruit, and spread their message to the world. Given the relative anonymity the Internet provides, many law enforcement and security agencies investigations are hindered in not only locating would be terrorists but also in disrupting their operations.
  • Malware to Crimeware

    Malware to Crimeware

    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer

    The Question of State Sponsored Cyber Terrorism and Espionage Student Officer

    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
  • Trend Micro Deep Discovery Advisor 2.95 Administrator's Guide

    Trend Micro Deep Discovery Advisor 2.95 Administrator's Guide

    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/deep-discovery-advisor.aspx Trend Micro, the Trend Micro t-ball logo, InterScan, and ScanMail are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2013 Trend Micro Incorporated. All rights reserved. Document Part No.: APEM25797/121119 Release Date: January 2013 Patents pending The user documentation for Trend Micro Deep Discovery Advisor introduces the main features of the software and installation instructions for your production environment. Read through it before installing or using the software. Detailed information about how to use specific features within the software are available in the online help file and the online Knowledge Base at Trend Micro’s website. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Preface Preface ..............................................................................................................
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks

    WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks

    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
  • KOOBFACE: Inside a Crimeware Network

    KOOBFACE: Inside a Crimeware Network

    JR04-2010 KOOBFACE: Inside a Crimeware Network By NART VILLENEUVE with a foreword by Ron Deibert and Rafal Rohozinski November 12, 2010 WEB VERSION. Also found here: INFOWAR http://www.infowar-monitor.net/koobface MONITOR JR04-2010 Koobface: Inside a Crimeware Network - FOREWORD I Foreword There is an episode of Star Trek in which Captain Kirk and Spock are confronted by their evil doppelgängers who are identical in every way except for their more nefarious, diabolical character. The social networking community Facebook has just such an evil doppelgänger, and it is called Koobface. Ever since the Internet emerged from the world of academia and into the world-of-the-rest-of-us, its growth trajectory has been shadowed by the emergence of a grey economy that has thrived on the opportunities for enrichment that an open, globally connected infrastructure has made possible. In the early years, cybercrime was clumsy, consisting mostly of extortion rackets that leveraged blunt computer network attacks against online casinos or pornography sites to extract funds from frustrated owners. Over time, it has become more sophisticated, more precise: like muggings morphing into rare art theft. The tools of the trade have been increasingly refined, levering ingenuous and constantly evolving malicious software (or malware) with tens of thousands of silently infected computers to hide tracks and steal credentials, like credit card data and passwords, from millions of unsuspecting individuals. It has become one of the world economy’s largest growth sectors—Russian, Chinese, and Israeli gangs are now joined by upstarts from Brazil, Thailand, and Nigeria—all of whom recognize that in the globally connected world, cyberspace offers stealthy and instant means for enrichment.
  • GHOSTNET April 2016 Sreepriya Chalakkal

    GHOSTNET April 2016 Sreepriya Chalakkal

    STUDYOFGHOSTNET April 2016 sreepriya chalakkal 1 Introduction 4 2contentsHistory 5 2.1 Tibet-China conflict . 5 2.2 Cyber attack on Tibet . 5 3 Target and Motivation 6 4 Attack Strategy 7 5 Operation 8 5.1 Client and server design . 8 5.2 Dissecting the Ghost suite . 10 5.3 GhostRAT Network communication . 11 6 Detection Avoidance 11 7 Countermeasures 12 7.1 Field investigation . 12 7.2 Defense techniques . 12 7.3 Protection against APTs . 12 8 Conclusion 13 9 Bibiliography 14 Figure 1 The conflict region of Tibet . 6 Figurelist of2 figuresThe GhostNet Client . 9 Figure 3 GhostRAT capabilities . 10 Figure 4 GhostRAT components . 11 Figure 5 Detection with stream analysis . 13 1 My sincere thanks to Professor Karsten Bsufka and guide Leily Bah- namacknowledgement for all their support and encouragement. Leily Bahnam helped with giving valuable suggestions for my presentation. She also re- viewed my report and taught important lessons on scientific writing. Professor Karsten Bsufka helped with giving direction on different research areas in autonomous security. He also helped with provid- ing interesting reading materials that invoked in me more interest in the subject. It was a joyful experience to read about advanced persis- tent threats in general and also getting into the details of GhostNet. Having completed the seminar, I am motivated to study more about advanced persistent threats and botnets. I also realise the intricacies and details that needs to be taken care of while writing a scientific report. 2 The report discusses the history, motivation, operation and detection ofabstract an advanced persistent threat (APT) called GhostNet.
  • America's Cyber Future Security and Prosperity in the Information

    America's Cyber Future Security and Prosperity in the Information

    America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co-chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp Acknowledgments The authors would like to thank the more than 200 people who generously contributed their time and expertise to this proj- ect. We are especially indebted to our co-chairs Bob Kahn, Mike McConnell, Joe Nye and Peter Schwartz for their tremendous support and guidance over the past year. We also thank our contributing authors for producing such insightful essays. We are particularly grateful to the many people who reviewed drafts of the papers included in this volume, including Irv Lachow, James Mulvenon, Charles Dunlap, Eric Rosenbach, Jeff Lord, Tom Gjelten, Greg Rattray, David Asher, Jeff Pryce, Andrew Lewman, Daniel Calingeart, David Gross, Nova Daly and several anonymous reviewers. In addition, we wish to thank the dozens of dedicated professionals in the U.S. government, armed services and private sector who candidly shared their perspectives. We also thank Global Business Network for hosting a workshop in San Francisco in February 2011, as well as the many technologists and other experts who attended. Peter Schwartz, David Babington and Audrey Plonk deserve special recognition for making the workshop a success.
  • Cyber Attribution: Technical and Legal Approaches and Challenges

    Cyber Attribution: Technical and Legal Approaches and Challenges

    DRAFT: PLEASE DO NOT QUOTE OR CITE WITHOUT PERMISSION 1 Cyber attribution: technical and legal approaches and challenges Nicholas Tsagourias Michael D Farrell University of Sheffield Georgia Institute of Technology Sheffield, UK Atlanta, USA [email protected] [email protected] Introduction Attribution describes the process of assigning a particular act to its source not necessarily in the sense of its physical perpetrator but more importantly in the sense of its mastermind. Attribution is important because it forms the basis of appropriate and effective technical, political and legal determinations and underpins technical, political and legal action and responsibility. In the cyber context, attribution has often been presented as a challenge because of the anonymity cyberspace affords, the possibility of spoofing, the multi-stage nature of cyber attacks, and the indiscriminate nature of cyber tools. To this, one should add the required human and technical resources, the lengthy time scales, and the associated investigatory demands. State to state attribution is treated with even more trepidation since the aforementioned problems are magnified whereas attribution or misattribution can engender serious consequences. Things, however, are changing. In the period 2007 to 2018, there have been more than twenty examples of high profile attribution claims of nation-state cyber attacks.1 These include attributions made by governments, civil society, and industry. One of the first public, high-profile instances of a large-scale cyberattack from a nation-state was the DDoS attack against the Estonian government, banks, and news agencies in 2007. The Prime Minister of Estonia, Andrus Ansip, attributed the attacks to Russia.2 This attribution received public criticism from Finnish security company F-secure,3 and was 1 The term cyber attack is used here to describe malicious cyber operations in general 2 Anderson, Nate.
  • Netcat, Superscan, Winscan

    Netcat, Superscan, Winscan

    IEEE Globecom 2011 Information Warfare Tom Chen Swansea University Wales, UK [email protected] Outline • Background - Definitions; actors; targets; historical cases • Attack techniques - Reconnaissance; intrusions; stealth; persistent control; DDoS • Defense techniques - Deterrence; prevention; detection; attribution; intrusion tolerance; self healing • Open research issues • Conclusions and future directions TC/Globecom2011/12-9-11 p. 2 Background TC/Globecom2011/12-9-11 p. 3 Section Outline • Definitions • Actors • Targets • Historical cases TC/Globecom2011/12-9-11 p. 4 Definitions • Info. warfare (or cyber warfare): military or political conflicts between nations carried out through computer networks - Actions to adversely affect enemy’s info. and info. systems while defending own - Information is both target and means for gaining advantage (in support of military/political goals) - Definitions vary, e.g., U.S. DoD defines broadly: “operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions” TC/Globecom2011/12-9-11 p. 5 DoD Definitions Info. Operations Broad (info. warfare) definition Psychological Military Operations Computer Electronic operations deception security network warfare Propaganda Weapon hiding, Classified operations Radio Examples: leaflets target decoys info. (CNO) jamming *Definition here Computer Computer Computer network network network exploitation/ attack (CNA) defense (CND) espionage (CNE) DDoS, Firewalls, Backdoors, malware IDS data theft TC/Globecom2011/12-9-11 p. 6 Recognition as Warfare Domain • U.S. DoD Strategy for Operating in Cyberspace (July 2011) recognizes cyberspace as 5th operational domain (with sea, air, land, space) “Potential U.S.
  • Sherlock Holmes and the Case of the Advanced Persistent Threat

    Sherlock Holmes and the Case of the Advanced Persistent Threat

    Sherlock Holmes and The Case of the Advanced Persistent Threat Ari Juels Ting-Fang Yen RSA Laboratories RSA Laboratories Cambridge, MA, USA Cambridge, MA, USA [email protected] [email protected] Abstract works. Opening the attachment or clicking on an An Advanced Persistent Threat (APT) is a tar- embedded link causes the employee’s computer to geted attack against a high-value asset or a physical become infected. system. Drawing from analogies in the Sherlock Holmes 2. Command-and-control (C2): A backdoor is in- stories of Sir Arthur Conan Doyle, we illustrate poten- stalled on the compromised machine that opens tial strategies of deception and evasion available in this it to remote control. setting, and caution against overly narrow characteri- zation of APTs. 3. Lateral movement: Given a foothold in the tar- geted organization, the attacker uses stolen cre- Keywords dentials, elevated privileges, or exploitation of soft- Advanced Persistent Threats, Sherlock Holmes ware vulnerabilities to access other internal ma- 1. Introduction chines hosting high-value assets. An Advanced Persistent Threat (APT), in indus- try terminology, is a sophisticated, targeted attack against 4. Data exfiltration: The attacker exfiltrates the as- a computing system containing a high-value asset or sets to external sites under the attackers’ control. controlling a physical system. APTs often require formidable Intermediary hosts inside the organization may resources, expertise, and operational orchestration. Na- serve to gather the targeted data, which is often tion states are the most aggressive perpetrators. compressed and encrypted for concealment. Over the past few years, the media have disclosed several successful APTs directed against high-profile It has become common to view this series of steps targets.
  • The Rise of China's Hacking Culture: Defining Chinese Hackers

    The Rise of China's Hacking Culture: Defining Chinese Hackers

    California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of aduateGr Studies 6-2016 The Rise of China's Hacking Culture: Defining Chinese Hackers William Howlett IV California State University - San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd Part of the Asian Studies Commons, Criminology and Criminal Justice Commons, International Relations Commons, Politics and Social Change Commons, and the Science and Technology Studies Commons Recommended Citation Howlett, William IV, "The Rise of China's Hacking Culture: Defining Chinese Hackers" (2016). Electronic Theses, Projects, and Dissertations. 383. https://scholarworks.lib.csusb.edu/etd/383 This Thesis is brought to you for free and open access by the Office of aduateGr Studies at CSUSB ScholarWorks. It has been accepted for inclusion in Electronic Theses, Projects, and Dissertations by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Arts in Social Sciences and Globalization by William Sedgwick Howlett June 2016 THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino by William Sedgwick Howlett June 2016 Approved by: Cherstin Lyon, Committee Chair, Social Sciences and Globalization Jeremy Murray, Committee Member, History Jose Munoz, Committee Member, Sociology © 2016 William Sedgwick Howlett ABSTRACT China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade.