Chinese Military Cyber SA Special Edition ~ 1330Z23AUG2013

Good Morning Fans – it’s Friday;

Today’s Cyber SA is a special edition highlighting historical and very recent cyber military doctrine developments in the People’s Republic of China (中國人民共和國 ) military, the People’s Liberation Army (PLA)中國人民解放軍…

Enjoy this special edition…and while you do, ask yourself the question about why your over priced ‘cyber’ intel vendor didn’t show you these items yet…the fire them and contact the Red Dragon ~ 紅龍 @ MicroSolved…

Enjoy!

Chang Wanquan: Hacker actions never supported by Chinese military – People’s Daily Online
http://english.peopledaily.com.cn/90786/8373519.html
今日利剑在手 明日缚住苍龙…
解放军画报…- Beijing Military Region to strengthen information technology division of qualified personnel
“Today, tomorrow, sword in hand defeats the restrained Black Dragon…”
http://www.plapic.com.cn/txt/201308b/20130807B.htm

Network Management Center of Nanjing Military Region Chen Yande - 南京军区某部网管中心 陈彦德
http://chn.chinamil.com.cn/xwpdxw/jskjxw/2011-07/28/content_4611103.htm
Unidirectional optical transmission cast “network shield”…单向光传输铸“网 盾”■新疆军区某部维修科科长 吴国龙
http://chn.chinamil.com.cn/xwpdxw/jskjxw/2011-07/21/content_4555913.htm
U.S. Department of Defense released the first copies of “cyberspace Action Strategy”
美国防部发布首份《网络空间行动战略》
http://chn.chinamil.com.cn/xwpdxw/2011-07/15/content_4487744.htm
中國人民解放軍信 息战争网 络战…Chinese Military Information Warfare & Network Warfare circa…2008
http://www.chinamil.com.cn/site1/jstppd/2008-02/18/content_1127942.htm
In People’s Republic of China, ‘defaming cultural icons’ online can land you in jail | TechHive
http://www.techhive.com/article/2047103/china-arrests-two-for-using-the-internet-to-defame-cultural-icon.html
Western defense firms refuse Chinese buyers to deter copycats
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000117
US Snubs Russia, People’s Republic of China Doesn’t
http://thediplomat.com/china-power/us-snubs-russia-china-doesnt/
Airsea Battle VS Offshore Control: Can the US Blockade the People’s Republic of China?
http://thediplomat.com/the-naval-diplomat/2013/08/19/airsea-battle-vs-offshore-control-can-the-us-blockade-china/

Content-Based Mobile Edge Networking (CBMEN)
http://www.darpa.mil/Our_Work/STO/Programs/Content-Based_Mobile_Edge_Networking_(CBMEN).aspx

Anatomy of a brute force attack – how important is password complexity?
http://nakedsecurity.sophos.com/2013/08/16/anatomy-of-a-brute-force-attack-how-important-is-password-complexity/

DDoS Attacks Used As Cover For Other Crimes – The Akamai Blog
https://blogs.akamai.com/2013/08/new-deputy-under-secretary-for-cybersecurity.html?

Semper Fi,

謝謝
紅龍