CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

38
CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010

Transcript of CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Page 1: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE CYBERSPACE

MR. TIMOTHY L. THOMAS

FMSO, JANUARY 2010

Page 2: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 3: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 4: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

TABLE OF CONTENTS (18 CHAPTERS)

• THE INEVITABLE INTERNET WAR

• BATTLES FOR INTERNET CONTROL

• OFFENSIVE AND DEFENSIVE INTERNET WARS

• THE INTERNET WILL DETERMINE VICTORY IN FUTURE WARS

• DANGEROUS VIRTUAL REALITY

• FINANCIAL WARS IN THE INTERNET WORLD

Page 5: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

• War with the objective of expanding territory has already basically withdrawn from the stage of history, and even war with the objective of fighting for natural resources is now giving way to war with the objective of controlling the flow of financial capital.

RMA

Page 6: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

China Looks at Cyberspace

• History—the Art of War and packets of electrons

• Comprehensive national power changes in accordance with new technology—which influences military affairs—gaining the initiative a prerequisite

• Laws and regulations are different than ours—ask Google!

Page 7: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Stratagem (EBO?) is designed to mislead enemy processes of

perception, thinking, emotion and will; use of packets of electrons as

stratagems

Page 8: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 9: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSE AS IMPORTANT AS DEFENSE

Page 10: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSIVE AS IMPORTANT AS DEFENSIVE

Page 11: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Network Warfare DeterrenceLiberation Army Daily, March 2007

• To offset network warfare deterrence of the country holding information network hegemony, we not only need to pay attention to raising our offensive operations capabilities in network warfare but also our defensive capabilities. We should make unremitting efforts to seek such a preemptive opportunity through developing network technology and systems.

Page 12: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSIVE AS IMPORTANT AS DEFENSIVE

Page 13: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

• Computer network reconnaissance is the prerequisite for seizing victory in warfare. It helps to choose opportune moments, places, and measures for attack.

Dai—Direct IW

Page 14: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

• Focus on collecting technical parameters and specific properties of all categories of information weapon systems and electronic information products

Methods

Page 15: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 16: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSE AS IMPORTANT AS DEFENSE

Page 17: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

“A victorious army first wins and then seeks battle. A defeated army first battles

and then seeks victory.” Sun Tzu, The Art of War

Page 18: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Shi (Strategic Advantage) According to the Chinese

• Tao Hanzhang, Chinese General: shi is “the strategically advantageous posture before a battle that enables it to have a flexible, mobile, and changeable position during a campaign.”

Page 19: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSE AS IMPORTANT AS DEFENSE

Page 20: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

• Mid-Dec Chinese cyber attack caused the theft of intellectual property from Google. 20 other companies from finance, technology, and the media and chemical sectors were similarly targeted. A primary goal of the attackers was to access Gmail accounts of Chinese human rights activists.

Page 21: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINESE INTERNET STRATEGY

• SEEK PREEMPTION

• COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

• CHINESE STRATAGEMS AND “ELECTRONIC SHI”

• RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

• OFFENSE AS IMPORTANT AS DEFENSE

Page 22: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Deciphering Information Security

• The issue of information and network security, which accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

Page 23: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 24: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 25: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 26: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 27: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINA DOESN’T DO PMESII-PT

- Strategic/objective environment- War engineering and control/system sabotage- War versus non-war actions; combinations of military actions

Page 28: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINA DOESN’T DO PMESII-PT

- Strategic/objective environment- War engineering and control/system sabotage- War versus non-war actions; combinations of military actions

Page 29: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Shen at Lanzhou

• Military power was calculated by adding the number of divisions, aircraft, and carriers. Now we must figure intangibles as well, such as computing capability, communications capability and reliability, and real-time surveillance. “An ounce of silicon”may be more potent than a “ton of radium.”

Page 30: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINA DOESN’T DO PMESII-PT

- Strategic/objective environment- War engineering and control/system sabotage- War versus non-war actions; combinations of military actions

Page 31: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

War Engineering, Issue 3, 2007 in

Zhongguo Junshi Kexue

War Engineering, Issue 3, 2007 in

Zhongguo Junshi Kexue

A method of systems engineering that studies, designs, tests, controls, and evaluates war systems based on information technology.

Page 32: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Hu Xiaofeng (cont.)

• War engineering takes all of war space and time into consideration as well as politics, military affairs, economics, and diplomacy to obtain the best results overall. Regardless of the situation, one must achieve effective control of war systems to gain real-time control of the course of operations.

• The path to victory depends on making innovations, which means creating asymmetries in the shape of warfare, methods of operations, and in war methods and training methods. Only then is war control possible.

Page 33: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINA DOESN’T DO PMESII-PT

- Strategic/objective environment- War engineering and control/system sabotage- War versus non-war actions; combinations of military actions

Page 34: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Other Military Actions…

• Sichuan Earthquake—a non-war military activity that was an informatized warfare practice session

• Combinations and lethal cocktail mixtures— the book Unrestricted War and 24 methods of conflict (economic, diplomatic, information, electronic, blockade, etc.)

Page 35: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Expansion of Culture via Digital Means

• China must take action to “propel China’s culture industry and media industry beyond China’s borders in an effort to take over the international culture market”

• Simulate cultural battles to learn how to use the media effectively

• Increased aggressiveness of Chinese students in at least one US university

Page 36: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.
Page 37: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

CHINA VERSUS THE U.S.

• ARE THEY PLAYING RUGBY WHILE WE PLAY FOOTBALL?

• HOW WELL ARE WE SCOUTING THE OTHER TEAMS?

Page 38: CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010.

Timothy Lee Thomas

Foreign Military Studies Office (FMSO)

Phone: 913-684-5957

Fax: 913-684-5960

[email protected]

http://fmso.leavenworth.army.mil

Timothy Lee Thomas

Foreign Military Studies Office (FMSO)

Phone: 913-684-5957

Fax: 913-684-5960

[email protected]

http://fmso.leavenworth.army.mil