Information Security News mailing list archives
Like Adding Wings to the Tiger: Chinese Information War Theory and Practice
From: William Knowles <wk () C4I ORG>
Date: Wed, 6 Dec 2000 00:46:42 -0600
http://call.army.mil/call/fmso/fmsopubs/issues/chinaiw.htm by: Mr. Timothy L. Thomas , Foreign Military Studies Office, Fort Leavenworth, KS. Introduction During the past five years, numerous Chinese military and civilian scholars published significant articles or longer works on information war (IW) and related issues (networking, information theory, simulations, etc.). An analysis of their works yields several interesting results.[1] First, the Chinese feel a compelling need to develop a specific Chinese IW theory. This theory must be in accordance with Chinese culture, the economic and military situation in the country, the perceived threat, and Chinese military philosophy and terminology. Second, Chinese IW theory is strongly influenced by Chinese military art. China is quickly integrating IW theory into its Peoples War concept, for example, a development ignored in the West but one with far-reaching strategic and operational implications. It is also considering the development of an independent net force branch of service (to supplement the navy, army and air force), and potentially looking at applying the 36 stratagems of war to IW methods. Third, Chinese military science dictates that IW be divided into sub-elements very different from those studied in the United States. These include the forms, nature, features, distinctions, principles, types, circles, and levels of IW. These subdivisions are similar to Russias IW methodology, and result in diverse IW definitions and discussions as compared with those in the West . While a theory of IW with Chinese characteristics is developing, turning theory into practice has proven more difficult. This is not unusual since China is still developing the civilian and military infrastructure to support their philosophy.[2] This article will highlight key aspects of the Chinese specific approach to IW. It will begin by discussing how the information age has affected Chinas attitude toward warfare and the specific Chinese historical factors affecting this interpretation. Next, Chinese IW definitions will be discussed, and the training courses and organizational structures to teach IW will be investigated. Finally, an examination will be made of Chinas interpretation of IW activities during the fight for Kosovo, and the most recent training exercises in its military regions that try to turn theory into reality. IW with Chinese Characteristics How has the information age affected Chinas attitude toward warfare? It is fair to say that the major change was a reevaluation of how to evaluate and conduct warfare. China realized that it couldnt threaten countries as a superpower might do with its current nuclear force, but something it can do with its IW force. For example, China can theoretically threaten U.S. financial stability through peacetime IW. Electrons lie at the heart of not only IW but also the worldwide economic boom associated with stock markets and e-commerce. The characteristics of information (global reach, speed of light transmission, nonlinear effects, inexhaustibility, multiple access, etc.) control the material and energy of warfare in a way that nuclear weapons cannot.[3] IW attempts to beat the enemy in terms of promptness, correctness, and sustainability,[4] and electrons are capable of reaching out and touching someone a long way away. It thus makes complete sense to put a significant effort into developing an information-based capability in both the civilian and military sense.
From the Chinese point of view, IW is like adding wings to a tiger,
making the latter more combat worthy than ever before. Recent reports of hacker attacks on U.S. labs indicate that China is moving from theory to practice in security matters as well. The Washington Times reported on 3 August 2000 that hackers suspected of working for a Chinese government institute broke into a Los Alamos computer system and took large amounts of sensitive but unclassified information. Los Alamos spokesman Jim Danneskiold stated that an enormous amount of Chinese activity hitting our green, open sites occurs continuously.[5] Targets of Chinese IW include information sources, channels, and destinations,[6] and C4I and electronic warfare assets. First attack objectives, some note, will be the computer networking system linking political, economic and military installations of a country as well as society in general; and the ability to control decision-making to hinder coordinated actions. This requires that both cognitive and information systems are hit.[7] This IW focus implies that not just soldiers will conduct warfare in the future, but civilians too. Some Chinese theorists have recommended organizing network special warfare detachments and computer experts to form a shock brigade of network warriors to accomplish this task. They will look for critical nodes and control centers on networks, and sabotage them.[8] Thus both computer experts and soldiers, a reflection of Chinas changing attitude, may conduct warfare. IW has also forced Chinese experts to reconsider how to compute the correlation of forces. The Chinese believe that military strength can no longer be calculated using the number of armored divisions, air force wings, and aircraft carrier battle groups. In the information age, invisible forces such as computing capabilities, communications capacity, and system reliability must also be studied.[9] [...] *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Like Adding Wings to the Tiger: Chinese Information War Theory and Practice William Knowles (Dec 06)