A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


China’s Hackers and Cyber Sovereignty - Lieutenant Colonel Bill Hagestad II Cyphercon 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

China’s Hackers and Cyber Sovereignty
Lieutenant Colonel Bill Hagestad II

Cyphercon 2016

Lieutenant Colonel Bill Hagestad II is an internationally recognized & respected authority on the People’s Republic of China’s use of computer and information network systems as a weapon. He speaks both domestically and internationally on strategic information security threats" while focused primarily on the Chinese Cyber Threat he also has provided classified briefings on Iran, North Korea and Russia. In 2012, Bill’s first book “21stCentury Chinese Cyber Warfare” debuted. In 2013 he published another seminal work about the People’s Republic of China’s Cyber Activities “Operation Middle Kingdom: China’s Use of Computers & Networks as a Weapon System”. In 2014, Bill published both “Chinese Information Warfare Doctrine Development 1994" 2014”; and, “China’s Plans for Winning Information Confrontation: Important Chinese Information Warfare Articles ????? Information Confrontation”. Based upon recent field experience within the People’s Republic, Bill published “Chinese Cyber Crime” in August 2015, a view into the Chinese hacking underworld, now available on Amazon.com. Bill provides current cyber intelligence threat assessments to international commercial organizations, defense, and intelligence (OGA) and law enforcement entities. His formal education includes a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese, University of Minnesota. He earned a Master of Science in Military Strategy from the US Marine Corps Command & Staff College in 2002. He holds a Master of Science in Security Technologies from the College of Science & Engineering, University of Minnesota and a Master of Science in the Management of Technology from the Technological Leadership Institute, University of Minnesota.

Back to Cyphercon 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast