Chinese cyber espionage: a complementary method to aid PLA modernization
Ellis, Jamie M.
Huntley, Wade L.
Twomey, Christopher R.
MetadataShow full item record
In 2013, Mandiant published a report linking one People’s Liberation Army (PLA) unit to the virtual exploitation of 11 modern U.S. military platforms. In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies. This thesis examines trends in Chinese cyber espionage, PLA modernization, and PLA acquisitions methods to determine—from only open-source information—if the categories are related and, if so, the nature of the relationship. Defense reports suggest there is a strong correlation between China’s virtual exfiltration of modern U.S. technology and the PLA’s rapid advancement; cyber espionage is the principal driver for PLA modernization. This thesis asks: Does cyber espionage really play a central role in PLA modernization, or does it simply complement alternate procurement methods? This thesis draws from case studies of China’s overt acquisitions, indigenous research, and physical espionage operations to demonstrate that the majority of the PLA’s modernized military platforms were developed from non-cyber acquisition methods. These studies support this thesis’s conclusion that cyber espionage is not the critical component driving forward PLA modernization.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Competing with Intelligence: New Directions in China's Quest for Intangible Property and Implications for Homeland Security Slate, Robert (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2009-01-00);The United States faces a growing national security threat from Chinese corporations that employ robust competitive intelligence (CI) programs to enhance illegal company- or government-directed espionage and intellectual ...
Kihara, Stacy A. (Monterey, California: Naval Postgraduate School, 2014-12);The growing evidence of Chinese government complicity in commercial cyber espionage and theft of intellectual property, costing the United States billions of dollars, has blurred the distinction between the geopolitical ...
New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking Festa, James P. (Monterey, California. Naval Postgraduate School, 2012-12);Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were ...