5. Sun Szu on spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
8. Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
9. Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
10. Thomas Makes a Point “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
15. One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed. “ I had accessed a Chinese server that was involved in the compromises. And during that access I discovered a file on that server entitled 1.txt. That file contained an internal port scan or an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
16. Backhacking . "I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised," Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
17. Sandia's Response "We don't care about any of this. We only care about Sandia computers. Stop what you're doing. Stop whatever you are doing." Shawn's immediate supervisor
18. Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
19. Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft: Meeting in the stacks of the University Be careful when working with geeks!