text
stringlengths 4
429
|
---|
asymmetry, emerging technology security risks, globalization, and the enhanced vulnerability |
of commercial targets as opposed to direct military targets (Malone 2008; Almeida 2006). |
Combination |
To be militarily successful in this new era will require the ability to combine operations. |
Combining weapons has been used throughout military history. Horses, armour, stirrups, and |
swords are not as effective when used individually. Their combination can create synergy, |
where the combined strength is greater than the individual parts. During the Gulf War, the |
US combined the old A-10 ground attack aircraft with the new Apache helicopter to create a |
lethal union |
(Qiao and Wang 1999). By dropping leaflets and publicizing video of |
precision strike weaponry, the US combined PSYOPS and media warfare as well. The US |
has pursued additional combinations of traditional and non-traditional attack methods. |
During the 1979 Iran Hostage Crisis, the US initially tried traditional military force, but when |
this attempt failed they froze Iran |
s foreign assets, imposed an arms embargo, supported Iraq |
with weaponry and training, and began diplomatic negotiations. When all these channels |
were used together, the crisis finally came to an end. The Americans have also employed |
non-traditional attacks against non-traditional enemies. For example, they used hacking |
methods to search for and cut off the bank accounts of Osama Bin Laden in various states |
(Musharbash 2008; Vallence 2008). |
China has demonstrated its commitment to such combinations. It seeks to develop military |
modernization and economic growth in tandem, with an emphasis on science and technology. |
China |
s 2006 defence white paper puts forth a goal to |
work for close coordination between |
military struggle and political, economic, diplomatic, cultural and legal endeavours |
, using |
strategies and tactics in a comprehensive way. . . |
Also noted is the importance of taking |
part in international organizations, such as ASEAN+Three, the Shanghai Cooperation |
Organization, WTO, IMF, and the International Olympic Committee. These open up |
diplomacy, aid in soft power, and give China a voice in determining the legal framework of a |
globalized world (Ikenberry 2008; China's National Defense in 2006). |
To learn how to conduct cyber security, the Chinese must have a full understanding of how |
attacks are conducted; therefore they will learn offence along with the defence - the two are |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
inseparable. China has repeatedly stated its goal of military modernization, and cyber |
warfare is where modern militaries are headed. However, cyber warfare would unlikely be |
used alone. It could be used simultaneously with a traditional attack, perhaps as a first blow |
to take an opponent off guard, or in tandem with multiple non-traditional attacks, such as |
PSYOPS and economic operations, or variants of each. Additional combined tactics that will |
be discussed in the following sections include cyber attack, cyber reconnaissance, and market |
dominance. |
Internal Security |
As seen with the lack of division between the PLA and PAP, the Chinese defence white |
paper |
s stated goal of developing the military and economy in tandem, and with the blurring |
of lines in Unrestricted Warfare, China cannot ignore the full spectrum of impact that |
Information Communication Technologies (ICT) will have, including that within its borders. |
China |
s internet population has risen to 210 million people (Anick 2008; Bridis 2008). And, |
as of 2007, China possessed over 500 million mobile phones. China has become a world |
leader in the communications industry, and 3G and 4G technology are increasing the ability |
for mobile phones to supplant a personal computer for online activities. On the one hand ICT |
supports economic, scientific, and technology development; on the other it creates a nontraditional security threat. |
Social networking services can be used as a tool to further nationalistic goals. These goals |
may include the spread of political ideology, propaganda, and disinformation. As seen with |
the US Information Operations Roadmap, PSYOPS are an integral component of cyber |
warfare. Operatives can sway audiences by presenting well thought out arguments or by |
altering opposing views; they may also manipulate democratized news by artificially inflating |
votes using scripts (Cuban 2008). Recent informationization military courses offered at |
Wuhan University include |
An introduction to US and Taiwanese social information |
systems |
suggesting that China has already recognized the benefits of utilizing social |
networking externally (China |
s Proliferation Practices, and the Development of Its Cyber and |
Space Warfare Capabilities 2008). |
Additionally, online users are increasingly volunteering to enter large amounts of personal |
data, which can, and has been, used for prosecutions (Use of Social Network Websites in |
Investigations 2008; WFTV 2008; Layer 8 2007). Users do so to enjoy the social service it |
provides, either not realizing, or unconcerned, that the government is simultaneously gaining |
access to a self-imposed Big Brother. Not only can China use this information to its benefit, |
but also it must secure it from being used by an adversary, such as its use for identifying |
potential espionage and subversive assets. In terms of stemming anti-government agendas, |
state agencies censor blogs, bulletin boards, email, and forums. Internet Service Providers |
(ISPs) often take it upon themselves to censor users, because they are held legally responsible |
for any customer who violates the law. Internet caf |
s are required to keep detailed records of |
their customers. In addition, |
every Chinese person who signs up for internet service must |
register with his or her local police department within 30 days |
(China and Internet |
Censorship 2006). |
As China |
s economy continues to grow, personal electronic devices are becoming more |
accessible to Chinese citizens. Products such as personal computers, high speed internet |
connections, mp3 players, large hard drives for storage, gaming systems, and advanced |
mobile phones fuel a desire for more software and entertainment. This will enhance |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
international criticism of Chinese copyright infringements and it will make it difficult for |
China to prevent the spread of Western culture (French 2006; People |
s Daily Online 2006; |
Pirates of the Orient 2006). Increased connectivity also increases the capability of people to |
conduct subversive activities that endanger state security. This may include, |
Signing online |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.