text
stringlengths
4
429
asymmetry, emerging technology security risks, globalization, and the enhanced vulnerability
of commercial targets as opposed to direct military targets (Malone 2008; Almeida 2006).
Combination
To be militarily successful in this new era will require the ability to combine operations.
Combining weapons has been used throughout military history. Horses, armour, stirrups, and
swords are not as effective when used individually. Their combination can create synergy,
where the combined strength is greater than the individual parts. During the Gulf War, the
US combined the old A-10 ground attack aircraft with the new Apache helicopter to create a
lethal union
(Qiao and Wang 1999). By dropping leaflets and publicizing video of
precision strike weaponry, the US combined PSYOPS and media warfare as well. The US
has pursued additional combinations of traditional and non-traditional attack methods.
During the 1979 Iran Hostage Crisis, the US initially tried traditional military force, but when
this attempt failed they froze Iran
s foreign assets, imposed an arms embargo, supported Iraq
with weaponry and training, and began diplomatic negotiations. When all these channels
were used together, the crisis finally came to an end. The Americans have also employed
non-traditional attacks against non-traditional enemies. For example, they used hacking
methods to search for and cut off the bank accounts of Osama Bin Laden in various states
(Musharbash 2008; Vallence 2008).
China has demonstrated its commitment to such combinations. It seeks to develop military
modernization and economic growth in tandem, with an emphasis on science and technology.
China
s 2006 defence white paper puts forth a goal to
work for close coordination between
military struggle and political, economic, diplomatic, cultural and legal endeavours
, using
strategies and tactics in a comprehensive way. . .
Also noted is the importance of taking
part in international organizations, such as ASEAN+Three, the Shanghai Cooperation
Organization, WTO, IMF, and the International Olympic Committee. These open up
diplomacy, aid in soft power, and give China a voice in determining the legal framework of a
globalized world (Ikenberry 2008; China's National Defense in 2006).
To learn how to conduct cyber security, the Chinese must have a full understanding of how
attacks are conducted; therefore they will learn offence along with the defence - the two are
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
inseparable. China has repeatedly stated its goal of military modernization, and cyber
warfare is where modern militaries are headed. However, cyber warfare would unlikely be
used alone. It could be used simultaneously with a traditional attack, perhaps as a first blow
to take an opponent off guard, or in tandem with multiple non-traditional attacks, such as
PSYOPS and economic operations, or variants of each. Additional combined tactics that will
be discussed in the following sections include cyber attack, cyber reconnaissance, and market
dominance.
Internal Security
As seen with the lack of division between the PLA and PAP, the Chinese defence white
paper
s stated goal of developing the military and economy in tandem, and with the blurring
of lines in Unrestricted Warfare, China cannot ignore the full spectrum of impact that
Information Communication Technologies (ICT) will have, including that within its borders.
China
s internet population has risen to 210 million people (Anick 2008; Bridis 2008). And,
as of 2007, China possessed over 500 million mobile phones. China has become a world
leader in the communications industry, and 3G and 4G technology are increasing the ability
for mobile phones to supplant a personal computer for online activities. On the one hand ICT
supports economic, scientific, and technology development; on the other it creates a nontraditional security threat.
Social networking services can be used as a tool to further nationalistic goals. These goals
may include the spread of political ideology, propaganda, and disinformation. As seen with
the US Information Operations Roadmap, PSYOPS are an integral component of cyber
warfare. Operatives can sway audiences by presenting well thought out arguments or by
altering opposing views; they may also manipulate democratized news by artificially inflating
votes using scripts (Cuban 2008). Recent informationization military courses offered at
Wuhan University include
An introduction to US and Taiwanese social information
systems
suggesting that China has already recognized the benefits of utilizing social
networking externally (China
s Proliferation Practices, and the Development of Its Cyber and
Space Warfare Capabilities 2008).
Additionally, online users are increasingly volunteering to enter large amounts of personal
data, which can, and has been, used for prosecutions (Use of Social Network Websites in
Investigations 2008; WFTV 2008; Layer 8 2007). Users do so to enjoy the social service it
provides, either not realizing, or unconcerned, that the government is simultaneously gaining
access to a self-imposed Big Brother. Not only can China use this information to its benefit,
but also it must secure it from being used by an adversary, such as its use for identifying
potential espionage and subversive assets. In terms of stemming anti-government agendas,
state agencies censor blogs, bulletin boards, email, and forums. Internet Service Providers
(ISPs) often take it upon themselves to censor users, because they are held legally responsible
for any customer who violates the law. Internet caf
s are required to keep detailed records of
their customers. In addition,
every Chinese person who signs up for internet service must
register with his or her local police department within 30 days
(China and Internet
Censorship 2006).
As China
s economy continues to grow, personal electronic devices are becoming more
accessible to Chinese citizens. Products such as personal computers, high speed internet
connections, mp3 players, large hard drives for storage, gaming systems, and advanced
mobile phones fuel a desire for more software and entertainment. This will enhance
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80
Copyright
2008 Jason Fritz
international criticism of Chinese copyright infringements and it will make it difficult for
China to prevent the spread of Western culture (French 2006; People
s Daily Online 2006;
Pirates of the Orient 2006). Increased connectivity also increases the capability of people to
conduct subversive activities that endanger state security. This may include,
Signing online