CHINESE The internet MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.


109 views
Uploaded on:
Category: Medical / Health
Description
CHINESE The internet MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010 List of chapters (18 Parts) THE Unavoidable Web WAR Fights FOR Web CONTROL Hostile AND Protective Web WARS THE Web WILL Decide Triumph IN FUTURE WARS Risky VIRTUAL REALITY
Transcripts
Slide 1

CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010

Slide 4

TABLE OF CONTENTS (18 CHAPTERS) THE INEVITABLE INTERNET WAR BATTLES FOR INTERNET CONTROL OFFENSIVE AND DEFENSIVE INTERNET WARS THE INTERNET WILL DETERMINE VICTORY IN FUTURE WARS DANGEROUS VIRTUAL REALITY FINANCIAL WARS IN THE INTERNET WORLD

Slide 5

RMA War with the target of growing domain has as of now essentially pulled back from the phase of history, and even war with the goal of battling for characteristic assets is presently offering approach to war with the goal of controlling the stream of money related capital .

Slide 6

China Looks at Cyberspace History—the Art of War and bundles of electrons Comprehensive national force changes as per new technology—which impacts military affairs—gaining the activity an essential Laws and regulations are not quite the same as ours—ask Google!

Slide 7

Stratagem (EBO?) is intended to delude adversary procedures of discernment, considering, feeling and will; utilization of bundles of electrons as stratagems

Slide 9

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE

Slide 10

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSIVE AS IMPORTANT AS DEFENSIVE

Slide 11

Network Warfare Deterrence Liberation Army Daily, March 2007 To counterbalance system fighting discouragement of the nation holding data system authority, we not just need to pay consideration on raising our hostile operations capacities in system fighting additionally our guarded abilities. We ought to attempt unremitting endeavors to look for such a preemptive open door through creating system innovation and frameworks.

Slide 12

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSIVE AS IMPORTANT AS DEFENSIVE

Slide 13

Dai—Direct IW Computer system surveillance is the essential for seizing triumph in fighting. It serves to pick helpful minutes, places, and measures for assault.

Slide 14

Methods Focus on gathering specialized parameters and particular properties of all classifications of data weapon frameworks and electronic data items

Slide 16

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE

Slide 17

“A successful armed force first wins and afterward looks for the fight to come. A vanquished armed force first fights and after that looks for victory.” Sun Tzu, The Art of War

Slide 18

Shi (Strategic Advantage) According to the Chinese Tao Hanzhang, Chinese General: shi is “the deliberately worthwhile stance before a fight that empowers it to have an adaptable, portable, and alterable position amid a campaign.”

Slide 19

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE

Slide 20

http://googleblog.blogspot.com/2010/01/new-way to deal with china.html Mid-Dec Chinese digital assault brought on the robbery of licensed innovation from Google. 20 different organizations from fund, innovation, and the media and concoction segments were comparatively focused on. An essential objective of the assailants was to get to Gmail records of Chinese human rights activists.

Slide 21

CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND “ELECTRONIC SHI ” RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDE—COLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE

Slide 22

The issue of data and system security, which goes with the advancement of informationization and the ascent of data fighting, is an issue of innovation, however most importantly else it is an issue of procedure. Translating Information Security

Slide 27

CHINA DOESN’T DO PMESII-PT Strategic/target environment War building and control/framework damage War versus non-war activities; blends of military activities

Slide 28

CHINA DOESN’T DO PMESII-PT Strategic/target environment War designing and control/framework harm War versus non-war activities; mixes of military activities

Slide 29

Shen at Lanzhou Military force was figured by including the quantity of divisions, air ship, and bearers. Presently we must figure intangibles too, for example, registering capacity, interchanges ability and unwavering quality, and continuous reconnaissance. “An ounce of silicon”may be more powerful than a “ton of radium.”

Slide 30

CHINA DOESN’T DO PMESII-PT Strategic/target environment War building and control/framework harm War versus non-war activities; blends of military activities

Slide 31

War Engineering, Issue 3, 2007 in Zhongguo Junshi Kexue A strategy for frameworks designing that studies, plans, tests, controls, and assesses war frameworks taking into account data innovation.

Slide 32

Hu Xiaofeng (cont.) War designing takes all of war space and time into thought and in addition legislative issues, military issues, financial aspects, and discretion to get the best results generally speaking. Despite the circumstance, one must accomplish powerful control of war frameworks to increase constant control of the course of operations. The way to triumph relies on upon making developments, which means making asymmetries fit as a fiddle of fighting, strategies for operations, and in war systems and preparing routines. At exactly that point is war control conceivable.

Slide 33

CHINA DOESN’T DO PMESII-PT Strategic/target environment War building and control/framework damage War versus non-war activities; mixes of military activities

Slide 34

Other Military Actions… Sichuan Earthquake—a non-war military action that was an informatized fighting practice session Combinations and deadly mixed drink mixtures— the book Unrestricted War and 24 systems for struggle (monetary, discretionary, data, electronic, bar, and so forth.)

Slide 35

Expansion of Culture through Digital Means China must make a move to “propel China’s society industry and media industry past China’s fringes with an end goal to assume control over the worldwide society market” Simulate social fights to figure out how to utilize the media viably Increased forcefulness of Chinese understudies in no less than one US college

Slide 37

ARE THEY PLAYING RUGBY WHILE WE PLAY FOOTBALL? HOW WELL ARE WE SCOUTING THE OTHER TEAMS? CHINA VERSUS THE U.S.

Slide 38

Timothy Lee Thomas Foreign Military Studies Office (FMS

Recommended
View more...