Tim-Thomas_chinaDCjan2010final - 40th IFPA

advertisement
CHINESE
CYBERSPACE
MR. TIMOTHY L. THOMAS
FMSO, JANUARY 2010
TABLE OF CONTENTS
(18 CHAPTERS)
•
•
•
•
•
•
THE INEVITABLE INTERNET WAR
BATTLES FOR INTERNET CONTROL
OFFENSIVE AND DEFENSIVE INTERNET WARS
THE INTERNET WILL DETERMINE VICTORY IN
FUTURE WARS
DANGEROUS VIRTUAL REALITY
FINANCIAL WARS IN THE INTERNET WORLD
RMA
•
War with the objective
of expanding territory
has already basically
withdrawn from the
stage of history, and
even war with the
objective of fighting for
natural resources is
now giving way to war
with the objective of
controlling the flow of
financial capital.
China Looks at Cyberspace
•
•
•
History—the Art of War and packets
of electrons
Comprehensive national power
changes in accordance with new
technology—which influences
military affairs—gaining the initiative
a prerequisite
Laws and regulations are different
than ours—ask Google!
Stratagem (EBO?) is designed to
mislead enemy processes of
perception, thinking, emotion and
will; use of packets of electrons as
stratagems
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSE AS IMPORTANT AS DEFENSE
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSIVE AS IMPORTANT AS DEFENSIVE
Network Warfare Deterrence
Liberation Army Daily, March 2007
•
To offset network warfare deterrence of the country
holding information network hegemony, we not only
need to pay attention to raising our offensive
operations capabilities in network warfare but also
our defensive capabilities. We should make
unremitting efforts to seek such a preemptive
opportunity through developing network technology
and systems.
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSIVE AS IMPORTANT AS DEFENSIVE
Dai—Direct IW
•
Computer network
reconnaissance is
the prerequisite for
seizing victory in
warfare. It helps to
choose opportune
moments, places,
and measures for
attack.
Methods
•
Focus on collecting
technical
parameters and
specific properties
of all categories of
information weapon
systems and
electronic
information
products
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSE AS IMPORTANT AS DEFENSE
“A victorious army first wins and then
seeks battle. A defeated army first battles
and then seeks victory.”
Sun Tzu, The Art of War
Shi (Strategic Advantage) According
to the Chinese
•
Tao Hanzhang, Chinese General: shi
is “the strategically advantageous
posture before a battle that enables it
to have a flexible, mobile, and
changeable position during a
campaign.”
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSE AS IMPORTANT AS DEFENSE
http://googleblog.blogspot.com/2010/
01/new-approach-to-china.html
•
Mid-Dec Chinese cyber attack caused the
theft of intellectual property from Google.
20 other companies from finance,
technology, and the media and chemical
sectors were similarly targeted. A primary
goal of the attackers was to access Gmail
accounts of Chinese human rights
activists.
CHINESE INTERNET STRATEGY
•
•
•
•
•
SEEK PREEMPTION
COMPUTER RECONNAISSANCE A PREREQUISITE
TO VICTORY
CHINESE STRATAGEMS AND “ELECTRONIC SHI”
RECONNAISSANCE OF BANKS, INDUSTRY,
MILITARY, ETC. SITES WORLDWIDE—COLLECT
TECHNICAL PARAMETERS
OFFENSE AS IMPORTANT AS DEFENSE
Deciphering
Information Security
•
The issue of
information and
network security,
which accompanies
the development of
informationization
and the rise of
information warfare,
is an issue of
technology, but
above all else it is an
issue of strategy.
CHINA DOESN’T DO
PMESII-PT
- Strategic/objective environment
- War engineering and control/system
sabotage
- War versus non-war actions;
combinations of military actions
CHINA DOESN’T DO
PMESII-PT
- Strategic/objective environment
- War engineering and control/system
sabotage
- War versus non-war actions;
combinations of military actions
Shen at Lanzhou
•
Military power was calculated
by adding the number of
divisions, aircraft, and carriers.
Now we must figure intangibles
as well, such as computing
capability, communications
capability and reliability, and
real-time surveillance. “An
ounce of silicon”may be more
potent than a “ton of radium.”
CHINA DOESN’T DO
PMESII-PT
- Strategic/objective environment
- War engineering and control/system
sabotage
- War versus non-war actions;
combinations of military actions
War Engineering,
Issue 3, 2007 in
Zhongguo Junshi
Kexue
A method of systems
engineering that
studies, designs,
tests, controls, and
evaluates war
systems based on
information
technology.
Hu Xiaofeng (cont.)
•
•
War engineering takes all of war space and time into
consideration as well as politics, military affairs,
economics, and diplomacy to obtain the best results
overall. Regardless of the situation, one must
achieve effective control of war systems to gain
real-time control of the course of operations.
The path to victory depends on making innovations,
which means creating asymmetries in the shape of
warfare, methods of operations, and in war methods
and training methods. Only then is war control
possible.
CHINA DOESN’T DO
PMESII-PT
- Strategic/objective environment
- War engineering and control/system
sabotage
- War versus non-war actions;
combinations of military actions
Other Military Actions…
•
•
Sichuan Earthquake—a non-war
military activity that was an
informatized warfare practice session
Combinations and lethal cocktail
mixtures— the book Unrestricted War
and 24 methods of conflict (economic,
diplomatic, information, electronic,
blockade, etc.)
Expansion of Culture via Digital
Means
•
•
•
China must take action to “propel China’s
culture industry and media industry beyond
China’s borders in an effort to take over the
international culture market”
Simulate cultural battles to learn how to use
the media effectively
Increased aggressiveness of Chinese
students in at least one US university
CHINA VERSUS THE U.S.
• ARE THEY PLAYING RUGBY WHILE
•
WE PLAY FOOTBALL?
HOW WELL ARE WE SCOUTING
THE OTHER TEAMS?
Timothy Lee Thomas
Foreign Military Studies Office (FMSO)
Phone: 913-684-5957
Fax: 913-684-5960
Tim.l.thomas@us.army.mil
http://fmso.leavenworth.army.mil
Download