You are on page 1of 3

Chinese Military Cyber Capabilities Development

2012-4-27
Since 2005, the number of Chinese troops for the invasion of the US network activities more and more. These
network intrusion activities may gather intelligence for the US military system for activities, or to find weaknesses in
the US network, or implanted in the US network virus. Thus, once the Sino-US conflict, the Chinese army can in a
dominant position immediately.
If these intrusions are carried out attacks against the US system, then the US military network system will malfunction
or destroyed. On the facts, the computer network reconnaissance activities are in line with the traditional Chinese a
strategy that "victory to win the soldiers then Qiuzhan, while defeated warriors go to war and then win." Through
network reconnaissance operations before finding the enemy's weaknesses fits this strategy.
This paper described the network support Chinese army launched a military invasion theory, especially on China's
military strategy to carry out appointments electronic warfare and computer network to enable patriotic hackers and
other activities. This paper also reviews the Chinese military network intrusion activities in recent years, and look at
the military's most famous theory who offered public comment on information warfare.
Chinese troops continue to enrich theory based on practice. Computer network warfare becomes part of the Chinese
army in peacetime strategic activities. The purpose of the US military invasion of the activities of deep concern, it is a
reconnaissance activity, or to the Trojan virus implanted into the US military and its allies in the network system,
resulting in paralysis or wartime destruction of these systems. With the outside world understanding the development
of information warfare, the Chinese army, China's intentions in terms of network intrusion into question US military
and its allies.
Network warfare units
While the outside world do not know the Chinese army to carry out the real cause of network intrusion action, but
some books or articles published by the army gives some explanation. Chinese military application of information
technology and information technology are the armed forces constitute a huge impact on military technology,
especially in the United States against Iraq affected by the use of technology. The impact of technology on Chinese
military theory is that Chinese army believes that a country only in the information war to seize the initiative in
advance, or to establish information superiority or information control, it could win the war, which requires prior
combat to carry out reconnaissance and intelligence gathering activities, the foundation for network forces.
Chinese military has been pursuing "active defense" strategy, that is, not the first attack others, but once attacked,
fight back immediately. Over the past few years with the advent of the Internet, some changes occurred in this
strategy. A lot of information disclosure describes a Chinese army troops and their offensive cyber warfare cyber
warfare operations. Chinese military openly acknowledged the need for offensive cyber warfare, reflecting its great
extent to break the traditional military thinking. In addition, Chinese military openly stated that the US military is
dependent on computer systems require a great weakness of the study. If the Chinese military to weaken the US
military on information warfare has the advantage, then it must study this weakness. In order to understand the
evolution of Chinese troops from defense to attack thinking thinking, the author in 1999 began the development of
information warfare will be described.
Development of network attack strategy
1999. Military theorists who about 10 years ago, began to discuss the information on offensive operations, Zhu
Wenquan and Anson 1999 coauthored an "information war" with one chapter devoted narrative "to carry out preemptive strikes in disguise." The authors point out the need to carry out pre-emptive strikes to destroy enemy forces

attacked computer. Pre-emptive attacks, including network reconnaissance activities related to C4I systems to collect
enemys performance, purpose, structure of information systems, and electronic warfare and weapons systems. The
authors noted that from a broader sense, the computer information is part of the computer information
reconnaissance attacks. They pointed out that: In order to carry out reconnaissance computer, you can use the
computer information network established in peacetime, and with different identities to access the network to carry
out reconnaissance activities. You can use computer experts strength, especially the strength hackers, computer
perform reconnaissance missions. Use hackers obtain military information is a very effective way from your computer
network. Should be familiar with network protocols and network intelligence accumulated.
The authors noted that the Chinese army has established a small computer offensive and defensive combat troops to
the implementation of network attacks. Forces conducted training courses, including how to design and organize
activities viruses, how to infiltrate the enemy's computer networks. Attacking forces must continue to study and
analyze the enemy's intentions. They must also be able to determine the location of the enemy's computer control
center.
November 1999, "Liberation Army Daily" published an article that China may need to set up an independent army
Original Mandarin Chinese:
2005

1999

1999101999

C4I

199911
Original Source http://51gt.com/news/wap.aspx?nid=13031&cid=15

You might also like