Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 02 December 2020

The Chinese People’s Liberation Army Computer Network Operations Infrastructure

The Chinese People’s Liberation Army Computer Network Operations Infrastructure

(p.163) Chapter 7 The Chinese People’s Liberation Army Computer Network Operations Infrastructure
China and Cybersecurity

Mark A. Stokes

Oxford University Press

Chinese cyber espionage constitutes an advanced persistent threat (APT)—an intrusion above and beyond traditional cybercrime—to US national and economic security. Groups operating from PRC territory are believed to be waging a coordinated cyber espionage campaign targeting US government, industrial, media, and think tank computer networks. A dozen of these groups have been identified and linked with the PLA, and others are connected with universities and information security enterprises. The largest and most active of these groups may operate from Beijing and Shanghai. This assessment posits that the General Staff Department, Third Department (3/PLA) manages a complex cyber reconnaissance infrastructure that exploits vulnerable computer networks around the world, while also ensuring the integrity of classified networks within China. Which organization within the PLA has responsibility for computer network attack (vice exploitation) remains an open question.

Keywords:   espionage, advanced persistent threat, computer network exploitation, computer network attack, People’s Liberation Army, cybersecurity, China, signals intelligence, cyberwarfare

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .