Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Chinese Military Cyber Capabilities Development
中国军队网络战能力
2012-4-27
Since 2005, the number of Chinese troops for the invas...
attacked computer. Pre-emptive attacks, including network reconnaissance activities related to C4I systems to collect
enem...
1999年11月,《解放军报》发表文章指出中国军队可能需要组建一个独立
Original Source http://51gt.com/news/wap.aspx?nid=13031&cid=15
Upcoming SlideShare
Loading in …5
×
Upcoming SlideShare
Red Dragon's CYBER Security RSS Feed .docx version
Next
Download to read offline and view in fullscreen.

0

Share

Download to read offline

Chinese Military Cyber Capabilities Development 中国军队网络战能力

Download to read offline

Chinese Military Cyber Capabilities Development 中国军队网络战能力

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Chinese Military Cyber Capabilities Development 中国军队网络战能力

  1. 1. Chinese Military Cyber Capabilities Development 中国军队网络战能力 2012-4-27 Since 2005, the number of Chinese troops for the invasion of the US network activities more and more. These network intrusion activities may gather intelligence for the US military system for activities, or to find weaknesses in the US network, or implanted in the US network virus. Thus, once the Sino-US conflict, the Chinese army can in a dominant position immediately. If these intrusions are carried out attacks against the US system, then the US military network system will malfunction or destroyed. On the facts, the computer network reconnaissance activities are in line with the traditional Chinese a strategy that "victory to win the soldiers then Qiuzhan, while defeated warriors go to war and then win." Through network reconnaissance operations before finding the enemy's weaknesses fits this strategy. This paper described the network support Chinese army launched a military invasion theory, especially on China's military strategy to carry out appointments electronic warfare and computer network to enable patriotic hackers and other activities. This paper also reviews the Chinese military network intrusion activities in recent years, and look at the military's most famous theory who offered public comment on information warfare. Chinese troops continue to enrich theory based on practice. Computer network warfare becomes part of the Chinese army in peacetime strategic activities. The purpose of the US military invasion of the activities of deep concern, it is a reconnaissance activity, or to the Trojan virus implanted into the US military and its allies in the network system, resulting in paralysis or wartime destruction of these systems. With the outside world understanding the development of information warfare, the Chinese army, China's intentions in terms of network intrusion into question US military and its allies. Network warfare units While the outside world do not know the Chinese army to carry out the real cause of network intrusion action, but some books or articles published by the army gives some explanation. Chinese military application of information technology and information technology are the armed forces constitute a huge impact on military technology, especially in the United States against Iraq affected by the use of technology. The impact of technology on Chinese military theory is that Chinese army believes that a country only in the information war to seize the initiative in advance, or to establish information superiority or information control, it could win the war, which requires prior combat to carry out reconnaissance and intelligence gathering activities, the foundation for network forces. Chinese military has been pursuing "active defense" strategy, that is, not the first attack others, but once attacked, fight back immediately. Over the past few years with the advent of the Internet, some changes occurred in this strategy. A lot of information disclosure describes a Chinese army troops and their offensive cyber warfare cyber warfare operations. Chinese military openly acknowledged the need for offensive cyber warfare, reflecting its great extent to break the traditional military thinking. In addition, Chinese military openly stated that the US military is dependent on computer systems require a great weakness of the study. If the Chinese military to weaken the US military on information warfare has the advantage, then it must study this weakness. In order to understand the evolution of Chinese troops from defense to attack thinking thinking, the author in 1999 began the development of information warfare will be described. Development of network attack strategy 1999. Military theorists who about 10 years ago, began to discuss the information on offensive operations, Zhu Wenquan and Anson 1999 coauthored an "information war" with one chapter devoted narrative "to carry out pre- emptive strikes in disguise." The authors point out the need to carry out pre-emptive strikes to destroy enemy forces
  2. 2. attacked computer. Pre-emptive attacks, including network reconnaissance activities related to C4I systems to collect enemy’s performance, purpose, structure of information systems, and electronic warfare and weapons systems. The authors noted that from a broader sense, the computer information is part of the computer information reconnaissance attacks. They pointed out that: In order to carry out reconnaissance computer, you can use the computer information network established in peacetime, and with different identities to access the network to carry out reconnaissance activities. You can use computer experts strength, especially the strength hackers, computer perform reconnaissance missions. Use hackers obtain military information is a very effective way from your computer network. Should be familiar with network protocols and network intelligence accumulated. The authors noted that the Chinese army has established a small computer offensive and defensive combat troops to the implementation of network attacks. Forces conducted training courses, including how to design and organize activities viruses, how to infiltrate the enemy's computer networks. Attacking forces must continue to study and analyze the enemy's intentions. They must also be able to determine the location of the enemy's computer control center. November 1999, "Liberation Army Daily" published an article that China may need to set up an independent army Original Mandarin Chinese: 2005年以来,中国军队针对美国网络系统的入侵活动的次数越来越多。这些网络入侵活动可能为针对美军事系统的情 报搜集活动,或是寻找美军网络系统的弱点,或是在美军网络系统植入病毒。这样,一旦中美发生冲突,中国军队能够 立即处于优势地位。 如果这些入侵活动是对美军系统开展的攻击行动,那么美军网络系统就会发生故障或被毁坏。实事上,这些计算机网络 侦察活动是是符合中国传统的一个谋略,即“胜兵先胜而后求战,败兵先战而后求胜”。通过网络侦察活动在作战行动之 前寻找敌人的弱点正好符合这个战略。 本文主要说明支撑中国军队发动网络入侵行动的军事理论,特别是介绍了中国军队任用电子谋略开展计算机网络作 战和启用爱国骇客等活动。本文还回顾了中国军队近年的网络入侵活动,并审视军队中最有名的理论人士所提供的对信 息战的公开评论。 中国军队不断根据实践丰富理论。计算机网络战成为中国军队在和平时期开展的战略活动的一部分。美军对中军队 的入侵活动的目的深表担忧,它是一种侦察活动,还是为了将木马等病毒植入到美军及其盟军的网络系统中,从而在战 时使这些系统瘫痪或毁坏。随着外界深入了解中国军队的信息战发展情况,中国的在网络入侵方面的意图引起美军及其 盟军的质疑。 网络战部队 外界虽然不清楚中国军队开展网络入侵行动的真正原因,但是军队所出版的一些著作或文章给出了一些解释。中国 军队应用信息新技术及军队开展信息化建设都是技术对军事的构成的巨大影响,特别是受美国针对伊拉克所使用技术的 影响。这些技术对中国军事理论的影响是,中国军队认为,一个国家只有在信息战中事先夺取了主动权,或是建立起信 息优势或信息控制,才可能取得战争的胜利,这就需要在作战之前就开展侦察和情报搜集活动,为网络部队使用奠定基 础。 中国军队一直奉行“积极防御”战略,即不首先攻击别人,但一旦遭到攻击,就会立即还击。过去几年里随着网络的 出现,这个战略发生了一定的变化。大量公开的资料描述了中国军队的网络战部队及其进攻性网络战行动。中国军队公 开承认需要开展进攻性网络战,这反映出其极大程度地突破了传统的军事思想。此外,中国军队公开声称,美军依赖计 算机系统是一个很大的需要研究的弱点。如果中国军队削弱美军在信息战上所具有的优势,那么它就必须研究这个弱点 。为了解中国军队从防御思维向进攻思维的演变,作者从1999年信息战发展情况开始予以说明。 网络进攻战略的发展 1999年。军队理论界人士约在10年前就开始讨论信息进攻行动,1999年朱文泉与陈太一合著的《信息作战》利用 一个章节的篇幅叙述“开展伪装的先发制人攻击”。作者指出开展先发制人攻击需要摧毁敌人计算机攻击部队。先发制人 攻击活动包括网络侦察活动,搜集敌人有关C4I系统的性能、目的、系统结构的信息,以及电子战和武器系统。作者指 出,从更广泛的意义上来说,计算机信息侦察是计算机信息攻击的一部分。他们指出:为了开展计算机侦察,可以利用 在和平时期建立的计算机信息网络,并且以不同的身份访问网络开展侦察活动。可以借用计算机专家的力量,特别是骇 客的力量,执行计算机侦察任务。使用骇客从计算机网络中获得军事信息是一种非常有效的方式。应该熟悉网络协议并 积累网络情报。 作者指出,中国军队建立了小规模计算机进攻和防御对抗部队,以实施网络攻击行动。部队所开展的训练科目包括 如何设计和组织病毒入侵活动,如何渗透至敌人的计算机网络。进攻部队必须不断研究和分析敌人的意图。他们也必须 能够去伪存真,确定敌人的计算机控制中心的位置。
  3. 3. 1999年11月,《解放军报》发表文章指出中国军队可能需要组建一个独立 Original Source http://51gt.com/news/wap.aspx?nid=13031&cid=15

Chinese Military Cyber Capabilities Development 中国军队网络战能力

Views

Total views

620

On Slideshare

0

From embeds

0

Number of embeds

4

Actions

Downloads

10

Shares

0

Comments

0

Likes

0

×