The Next War
Select one of the studies presented in Case Studies I (Week 6 Lesson) or Case Studies II
(Week 7 Lesson) Course Notes or another case of your choosing with instructor approval.
Using the references provided and other available open source material, write a 5-8 page
analysis paper providing more details of the attack and addressing the following:
a. Victim, attacker, and probable motivation for the attack.
b. Nature and sophistication of the attack.
c. What was the desired outcome of the attack ?
d. How successful was it ?
e. How effective were the attackers in covering their tracks ?
f. How did the victim respond ?
Use Chicago Turabian citation style and format.
Week 6
Case Studies I
Scope: Examine and evaluate various state sponsored capabilities based on reported
cyber attacks. This week we’ll focus on the People’s Republic of China (PRC).
Objectives:
1. Recognize the value of integrating cyber warfare with political and military strategy.
2. Appreciate the difficulty in positively identifying attackers and the degree of state sponsorship.
Required Reading:
(a) Cyber War: Chapter 6
(b) Bryan Krekel, Capability of the People’s Republic of China to Conduct Cyber Warfare and
Computer Network Exploitation, prepared by Northrop Grumman for The US-China Economic
and Security Review Commission, Oct. 2009,
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA509000&Location=U2&doc=GetTRDoc.pdf
(c) Timothy L. Thomas, “Google Confronts China’s “Three Warfares”,” U.S. Army War College
Parameters (Summer 2010): pages 101-113,
http://www.carlisle.army.mil/USAWC/parameters/Articles/2010summer/Thomas.pdf
(d) Thornbaugh, “The Invasion of the Chinese Cyberspies,” Time, August 29, 2005,
http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html
(e) Larry Wortzel, China’s Approach to Cyber Operations: Implications for the United States,
Testimony before the Committee on Foreign Affairs House of Representatives, Mar. 10, 2010,
http://www.internationalrelations.house.gov/111/wor031010.pdf
Video
Chinese State Media Reveals PLA’s Cyber Attack Efforts
Web sites to explore
(a) The Dark Visitor – Inside the World of Chinese Hackers. Former Army Intelligence Officer
Scott Henderson’s site tracking PRC cyber activities
http://www.thedarkvisitor.com/
120119
2
(b) Center for Strategic and International Studies
Selected Bibliography for Cyber Security
http://csis.org/files/publication/110909_Cybersecurity_Bibliography.pdf
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!