CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010
Slide 4TABLE OF CONTENTS (18 CHAPTERS) THE INEVITABLE INTERNET WAR BATTLES FOR INTERNET CONTROL OFFENSIVE AND DEFENSIVE INTERNET WARS THE INTERNET WILL DETERMINE VICTORY IN FUTURE WARS DANGEROUS VIRTUAL REALITY FINANCIAL WARS IN THE INTERNET WORLD
Slide 5RMA War with the target of growing domain has as of now essentially pulled back from the phase of history, and even war with the goal of battling for characteristic assets is presently offering approach to war with the goal of controlling the stream of money related capital .
Slide 6China Looks at Cyberspace Historyâthe Art of War and bundles of electrons Comprehensive national force changes as per new technologyâwhich impacts military affairsâgaining the activity an essential Laws and regulations are not quite the same as oursâask Google!
Slide 7Stratagem (EBO?) is intended to delude adversary procedures of discernment, considering, feeling and will; utilization of bundles of electrons as stratagems
Slide 9CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE
Slide 10CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSIVE AS IMPORTANT AS DEFENSIVE
Slide 11Network Warfare Deterrence Liberation Army Daily, March 2007 To counterbalance system fighting discouragement of the nation holding data system authority, we not just need to pay consideration on raising our hostile operations capacities in system fighting additionally our guarded abilities. We ought to attempt unremitting endeavors to look for such a preemptive open door through creating system innovation and frameworks.
Slide 12CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSIVE AS IMPORTANT AS DEFENSIVE
Slide 13DaiâDirect IW Computer system surveillance is the essential for seizing triumph in fighting. It serves to pick helpful minutes, places, and measures for assault.
Slide 14Methods Focus on gathering specialized parameters and particular properties of all classifications of data weapon frameworks and electronic data items
Slide 16CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE
Slide 17âA successful armed force first wins and afterward looks for the fight to come. A vanquished armed force first fights and after that looks for victory.â Sun Tzu, The Art of War
Slide 18Shi (Strategic Advantage) According to the Chinese Tao Hanzhang, Chinese General: shi is âthe deliberately worthwhile stance before a fight that empowers it to have an adaptable, portable, and alterable position amid a campaign.â
Slide 19CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Destinations WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE
Slide 20http://googleblog.blogspot.com/2010/01/new-way to deal with china.html Mid-Dec Chinese digital assault brought on the robbery of licensed innovation from Google. 20 different organizations from fund, innovation, and the media and concoction segments were comparatively focused on. An essential objective of the assailants was to get to Gmail records of Chinese human rights activists.
Slide 21CHINESE INTERNET STRATEGY SEEK PREEMPTION COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY CHINESE STRATAGEMS AND âELECTRONIC SHI â RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. Locales WORLDWIDEâCOLLECT TECHNICAL PARAMETERS OFFENSE AS IMPORTANT AS DEFENSE
Slide 22The issue of data and system security, which goes with the advancement of informationization and the ascent of data fighting, is an issue of innovation, however most importantly else it is an issue of procedure. Translating Information Security
Slide 27CHINA DOESNâT DO PMESII-PT Strategic/target environment War building and control/framework damage War versus non-war activities; blends of military activities
Slide 28CHINA DOESNâT DO PMESII-PT Strategic/target environment War designing and control/framework harm War versus non-war activities; mixes of military activities
Slide 29Shen at Lanzhou Military force was figured by including the quantity of divisions, air ship, and bearers. Presently we must figure intangibles too, for example, registering capacity, interchanges ability and unwavering quality, and continuous reconnaissance. âAn ounce of siliconâmay be more powerful than a âton of radium.â
Slide 30CHINA DOESNâT DO PMESII-PT Strategic/target environment War building and control/framework harm War versus non-war activities; blends of military activities
Slide 31War Engineering, Issue 3, 2007 in Zhongguo Junshi Kexue A strategy for frameworks designing that studies, plans, tests, controls, and assesses war frameworks taking into account data innovation.
Slide 32Hu Xiaofeng (cont.) War designing takes all of war space and time into thought and in addition legislative issues, military issues, financial aspects, and discretion to get the best results generally speaking. Despite the circumstance, one must accomplish powerful control of war frameworks to increase constant control of the course of operations. The way to triumph relies on upon making developments, which means making asymmetries fit as a fiddle of fighting, strategies for operations, and in war systems and preparing routines. At exactly that point is war control conceivable.
Slide 33CHINA DOESNâT DO PMESII-PT Strategic/target environment War building and control/framework damage War versus non-war activities; mixes of military activities
Slide 34Other Military Actions⦠Sichuan Earthquakeâa non-war military action that was an informatized fighting practice session Combinations and deadly mixed drink mixturesâ the book Unrestricted War and 24 systems for struggle (monetary, discretionary, data, electronic, bar, and so forth.)
Slide 35Expansion of Culture through Digital Means China must make a move to âpropel Chinaâs society industry and media industry past Chinaâs fringes with an end goal to assume control over the worldwide society marketâ Simulate social fights to figure out how to utilize the media viably Increased forcefulness of Chinese understudies in no less than one US college
Slide 37ARE THEY PLAYING RUGBY WHILE WE PLAY FOOTBALL? HOW WELL ARE WE SCOUTING THE OTHER TEAMS? CHINA VERSUS THE U.S.
Slide 38Timothy Lee Thomas Foreign Military Studies Office (FMS