Cyber Dragon


Book Description

This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower—currently the world's second largest economy—with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically.




21st Century Chinese Cyberwarfare


Book Description

21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated. The objective of the book is to present the salient information regarding the use of cyber warfare doctrine by the People's Republic of China to promote its own interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.




Information War


Book Description

The struggle to control information will be at the heart of a U.S-China military competition Much of the talk about intensifying confrontation between the United States and China has ignored the question of how modern technology will be wielded in a rising conflict. This ground-breaking book by an expert in technology and national security argues that the two contemporary superpowers will base their security competition primarily on the fight to dominate information and perception. One of the crucial questions facing each country is how it will attack the adversary's information architecture while protecting its own. How each country chooses to employ information countermeasures will, in large measure, determine the amount of friction and uncertainty in the conflict between them. Artificial intelligence will lie at the heart of this information-based war. But the adaptation of AI algorithms into operational systems will take time, and of course will be subject to countermeasures developed by a very sophisticated adversary using disruption and deception. To determine how China will approach the conflict, this book reviews recent Chinese research into sensing, communications, and artificial intelligence. Chinese officials and experts carefully studied U.S. dominance of the information field during and after the cold war with the Soviet Union and are now employing the lessons they learned into their own county's mounting challenge to United States. This book will interest military officials, defense industry managers, policy experts in academic think tanks, and students of national security. It provides a sober view of how artificial intelligence will be turned against itself in the new information war.




China's Strategic Support Force


Book Description

In late 2015, the People's Liberation Army (PLA) initiated reforms that have brought dramatic changes to its structure, model of warfighting, and organizational culture, including the creation of a Strategic Support Force (SSF) that centralizes most PLA space, cyber, electronic, and psychological warfare capabilities. The reforms come at an inflection point as the PLA seeks to pivot from land-based territorial defense to extended power projection to protect Chinese interests in the "strategic frontiers" of space, cyberspace, and the far seas. Understanding the new strategic roles of the SSF is essential to understanding how the PLA plans to fight and win informationized wars and how it will conduct information operations.




Unrestricted Warfare


Book Description

Three years before the September 11 bombing of the World Trade Center-a Chinese military manual called Unrestricted Warfare touted such an attack-suggesting it would be difficult for the U.S. military to cope with. The events of September ll were not a random act perpetrated by independent agents. The doctrine of total war outlined in Unrestricted Warfare clearly demonstrates that the People's Republic of China is preparing to confront the United States and our allies by conducting "asymmetrical" or multidimensional attack on almost every aspect of our social, economic and political life.




China and Cybersecurity


Book Description

"Examines cyberspace threats and policies from the vantage points of China and the U.S"--




Chinese Views of Future Warfare


Book Description

An introduction to the works of authoritative and innovative Chinese authors whose writings focus on the future of the Chinese military. These carefully selected, representative essays make Chinese military thinking more accessible to western readers. It reveals, for example, China's keen interest in the Revolution in military affairs. This volume is an important starting point for understanding China's future military modernization. "Must reading for every executive of every Western firm doing business in China." "Readers will be impressed by China's ambitions in space, information warfare, stealth, and robots, in future warfare." Photos.




Tyrants on Twitter


Book Description

A look inside the weaponization of social media, and an innovative proposal for protecting Western democracies from information warfare. When Facebook, Twitter, YouTube, and Instagram were first introduced to the public, their mission was simple: they were designed to help people become more connected to each other. Social media became a thriving digital space by giving its users the freedom to share whatever they wanted with their friends and followers. Unfortunately, these same digital tools are also easy to manipulate. As exemplified by Russia's interference in the 2016 U.S. presidential election, authoritarian states can exploit social media to interfere with democratic governance in open societies. Tyrants on Twitter is the first detailed analysis of how Chinese and Russian agents weaponize Facebook, Instagram, Twitter, and YouTube to subvert the liberal international order. In addition to examining the 2016 U.S. election, David L. Sloss explores Russia's use of foreign influence operations to threaten democracies in Europe, as well as China's use of social media and other digital tools to meddle in Western democracies and buttress autocratic rulers around the world. Sloss calls for cooperation among democratic governments to create a new transnational system for regulating social media to protect Western democracies from information warfare. Drawing on his professional experience as an arms control negotiator, he outlines a novel system of transnational governance that Western democracies can enforce by harmonizing their domestic regulations. And drawing on his academic expertise in constitutional law, he explains why that system—if implemented by legislation in the United States—would be constitutionally defensible, despite likely First Amendment objections. With its critical examination of information warfare and its proposal for practical legislative solutions to fight back, this book is essential reading in a time when disinformation campaigns threaten to undermine democracy.




Ancient Chinese Warfare


Book Description

The history of China is a history of warfare. Rarely in its 3,000-year existence has the country not been beset by war, rebellion, or raids. Warfare was a primary source of innovation, social evolution, and material progress in the Legendary Era, Hsia dynasty, and Shang dynasty -- indeed, war was the force that formed the first cohesive Chinese empire, setting China on a trajectory of state building and aggressive activity that continues to this day. In Ancient Chinese Warfare, a preeminent expert on Chinese military history uses recently recovered documents and archaeological findings to construct a comprehensive guide to the developing technologies, strategies, and logistics of ancient Chinese militarism. The result is a definitive look at the tools and methods that won wars and shaped culture in ancient China.




The Chinese People's Liberation Army and Information Warfare


Book Description

On November 23, 2013, China's Ministry of National Defense spokesman announced that a new air defense intercept zone (ADIZ) will be established by the government to include the Diaoyu, or Senkaku Islands. Sovereignty over these islands is disputed by Japan, China, and Taiwan. The new ADIZ also included a submerged rock that falls inside overlapping Exclusive Economic Zones (EEZ) claimed by China, Japan, and South Korea. Pundits and policy analysts quickly engaged in a broad debate about whether China's expanded ADIZ is designed to create tension in Asia, or is part of a broader plan to impose a new definition of China's territorial space in the Asia-Pacific region. Meanwhile, to deal with cyber penetrations attributed to the Chinese People's Liberation Army (PLA), the U.S. Departments of Justice, Homeland Security, and State are devising new means to protect intellectual property and secrets from the PLA's computer network operations.