SlideShare a Scribd company logo
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
Future of Chinese Cyber Warfare
By William T. Hagestad II
The future of Chinese Cyber Warfare is monumental and is comprised of several factors that are
both very international and far reaching in their strategic implications. The international aspects
of Chinese Cyber Warfare in the next millennium are based upon the facts and history of
China’s experience with the West. The strategic and tactical aspects of future cyber actions by
the Chinese are beyond the comprehension of most technologists; and during “Future of
Chinese Cyber Warfare” a scan of what lies ahead in the Chinese cyber realm will be discussed.
It seems that whenever we scan the headlines these days the terms China and hacking are
synonymous. The dilemma is that nefarious cyber activity that China is accused of is mainly
coming from the United States of America. The People’s Republic of China on the other side of
the world denies the hacking allegations as erroneous and so the it goes, repetitive charges of
hacking by one country against another in an endless infinite loop of delusion and missed
opportunity for reconciliation by both nation states. It would seem then that the United States
has 100% internet Protocol (IP) address proof of these cyber-attacks from China. Yet when the
US Government and its various law enforcement, intelligence and secretive agencies are
pushed for facts and evidence, none can be produced and the default always seems to be “Well
that’s classified information and you do not have a need to know”.
Tactical Chinese Responses
China it would seem has tired of living by the Western rules of the cyber-road.
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
One of the watershed moments was when secrets revealed by the ex-Booz-Allen-Hamilton
contractor at the US National Security Agency saw the light of day. China perceiving all
American technology products as being compromised by the NSA began to close its technical
borders. Many Western technology companies, primarily United States technical firms have
been taken off of Chinese procurement lists. Chinese government offices and state owned
enterprises (SOEs) such as bank and telecommunications providers are prohibited from
purchasing global brands such as Cisco Systems, International Business Machines (IBM) and
Microsoft.1
The beginning of the end for China was the US Federal Bureau of Investigation (F-B-I) placing
five People’s Liberation Army Officers on Most Wanted posters for intellectual property (IP)
theft on May 19th
, 2014 in the Western District of Pennsylvania (WDPA).2
By equating, actively
serving Chinese Military Officers with International terrorists, the shame and inaccuracies were
a bit much for the Chinese Government to bear and thus the strategic technical shots were
fired. In February of 2015 the Central Government of China announced the ban of many
Western information security products including notably Apple and Cisco Systems, Citrix
Systems and McAfee.3
The Chinese press announced that “U.S. official accused China of military
personnel engaged in cyber espionage“,美国正式指控中国军方人员从事网络间谍活动”.4
1
“Spying scandal hits US tech companies in China”. (2013). South China Morning Post. (Internet) Accessed:
http://www.scmp.com/business/companies/article/1356534/spying-scandal-hits-us-tech-companies-china
2
“U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial
Advantage”. United States Department of Justice. (2014). (Internet). Accessed: http://www.justice.gov/opa/pr/us-charges-five-chinese-military-
hackers-cyber-espionage-against-us-corporations-and-labor
3
“Apple, Cisco gear off Beijing's shopping list in surveillance fears”. South China Morning Post. (2015). Internet. Accessed:
http://www.scmp.com/news/china/article/1723484/apple-cisco-gear-beijings-shopping-list-surveillance-fears
4
““U.S. official accused China of military personnel engaged in cyber espionage“,美国正式指控中国军方人员从事网络间谍活动
”.”ChinaCity.be. (2014) Internet. Accessed: http://www.chinacity2.be/uncategorized/4616/
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
In April of 2014, China announced that it would implement network security review of foreign
technology companies ,“中国宣布将对外国科技公司实施网络安全审查”.5
This of course
came in response to observations that US technology companies were ““US wrestling network
security U.S. corporate interests quagmire trap” – “中美角力網絡安全 美企陷利益泥沼”.6
In a purely Chinese move there was no mention of the FBI’s “Most Wanted” gaffe, rather China
simply executed upon an economic move, banning Western technology for use in Chinese
Government offices and networks. Essentially Chinese Officials can no longer source from these
Western technology companies – and thus the Chinese way of dealing with such Western
impudence and false accusations of hacking includes a purge by 2020 of most if not all foreign
technology relying instead on its own indigenous innovations for government, read state and
military uses.7
The date of this announcement by the outgoing Chinese President Hu Jintao on 8 November
2012 was monumental. Besides the number eight being auspicious in Chinese numerology and
superstition, this was also the day on which the new President of the People’s Republic of
China, Xi Jinping became the new leader of Asia’s largest communist nation. One of Hu Jintao’s
most notable proclamations to the People’s Liberation Army was: “"We should attach great
importance to maritime, space and cyberspace security. We should make active planning for
the use of military forces in peacetime, expand and intensify military preparedness, and
5
“China's banking sector to foreign technology companies to resist new rules Network Security”. (20141).Chinese New York Times. Internet.
Accessed:
http://chinadigitaltimes.net/chinese/2015/01/%E7%BA%BD%E7%BA%A6%E6%97%B6%E6%8A%A5%EF%BD%9C%E5%A4%96%E5%9B%BD%
E7%A7%91%E6%8A%80%E5%85%AC%E5%8F%B8%E6%8A%B5%E5%88%B6%E4%B8%AD%E5%9B%BD%E9%93%B6%E8%A1%8C%E4%B8%9A
%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8/
6
“中美角力網絡安全 美企陷利益泥沼”. (2014). Singpao. Internet. Accessed: http://www.singpao.com/cj/zh/201405/t20140526_509397.html
7
“China to speed up full military IT application: Hu”. Xinhua News. (2012). Internet. Accessed:
http://news.xinhuanet.com/english/special/18cpcnc/2012-11/08/c_131959900.htm
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
enhance the capability to accomplish a wide range of military tasks, the most important of
which is to win local war in an information age,".8
For the Chinese Armed Forces, this was the outgoing president’s commander’s intent – the
informization tasking for the PLA was several-fold. The most important statements are below:
“…train a new type of high-caliber military personnel in large numbers, intensively carry out
military training under computerized conditions, and enhance integrated combat capability
based on extensive IT application…”;
“…implement the military strategy of active defense for the new period, and enhance military
strategic guidance as the times so require”;
…strengthen national defense aim to safeguard China's sovereignty, security and territorial
integrity and ensure its peaceful development…“;
“…enhance the capability to accomplish a wide range of military tasks, the most important of
which is to win local war in an information age…“;9
During March of 2013, which was also the 86th
Anniversary of the founding of the People’s
Liberation Army, discussions arose discussing guarding the Chinese ‘motherland’ and her
frontiers traditionally with kinetic weaponry such as bombs had progressed beyond what a seen
enemy might possess. The PLA went on to discuss the security provocations in the cyber realm
primarily from the United States. During an anniversary report, called the “18 Report” PLA
officials and officers alike paid particular attention to China’s need for “10
8
Ibid.
9
Ibid.
10
“Chinese Military Projects Globally: PLA & New Equipment Development -中国军队项目世界第一:惊曝解放军最新装备发展
”JunShi.XiLu.com. (2013. Internet. Accessed: http://junshi.xilu.com/20130802/news_44_379586_2.html
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
The “18 Report” further indicated that the quality of US Military cyber weapons was improving
and thus posing a significant and growing threat to China’s national security. In that, cyberspace
is a basic sign of the information age, it is becoming a new strategic areas affecting national
security and development has become the penetration, impact and even decide other
important battle space. The state attaches great importance to the development of the world's
major military network, network warfare units under construction; improve network warfare
capabilities, competition intensified around cyberspace right to development, ownership,
control, and China in cyberspace faced with many real and potential threats.11
The “18 Report” went on to discuss and prioritize Chinese military weapons research and
innovation specifically noting that China’s future cyber wars would be in the cyber realm. PLA
units tasked with generating this future cyber combat capability included the People’s
Liberation Army Navy (PLAN), Air Force (PLLAN) and the Second Artillery Force.12
The PLA noted with understanding that the areas of sea, space, cyberspace security situation,
strengthening maritime, space, cyberspace security research, are necessary areas of China’s
national security sovereignty. Efficient and capable construction of a cyber-power and the
necessary means to provide strong strategic support to safeguard all of China’s national
interests. The “18 Report” also specifically tasked all of the PLA with a comprehensive
construction of a modern military system with Chinese characteristics, promoting the
revolution in military affairs with Chinese characteristics.13
11
Ibid.
12
Ibid.
13
Ibid.
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
The “18 Report” went on to emphasize a total fighting force, adjusting and optimizing the PLA’s
structure, “improve the institutional mechanisms conducive to joint operations, promote
operational elements fusion integration, accelerate the formation of capable, joint, more
energy, efficient information military system.”14
Adjust and optimize the structure of combat forces, primarily focus on strengthening the Navy,
Air Force, Second Artillery Force, and accelerate the construction of new combat information
operations forces, military and aerospace, and promote the overall transformation of the Army,
optimizing the internal structure and composition of forces branches.
In favor of joint operations and improve institutional mechanisms, mainly focus on improving
conditions at the PLA Information joint operational capabilities, establish and improve joint
operational command system, the joint training system, the joint security system. Promote
integration integrated operational elements, mainly the use of information systems to
reconnaissance, command and control, firepower elements integrated, comprehensive
support, etc., to maximize the overall effectiveness of combat system. Build a military system,
the Chinese armed forces will face profound changes, military power will have a qualitative
leap, national security will be more solid and reliable protection.
Notable Chinese strategic technology moves seen during December 2014 as SOEs in
northeastern China replaced Microsoft’s operating system with the Chinese homegrown Linux
version based on Free BSD called NeoKylin. Additional tactical replacement of Western
technology came about as many of China’s banks replaced IBM servers with Chinese –made
14
Ibid.
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
hardware manufactured by China’s Inspur Group.15
This is an interesting report by Bloomberg
however it may be true – there is some Chinese tactical and strategic gamesmanship behind the
local choice of China’s Inspur. During August of 2014 IBM was hailed as a Western company
worthy of doing business in the People’s Republic of China after the government ban when it
was disclosed that IBM would help China's Inspur to design servers, IBM将帮助竞争对手浪潮
国际设计服务器.16
Thus, the People’s Republic of China, in response to hacking allegations by the United States
and subsequent criminal charges against its military officers has responded in accurate Chinese
fashion – placing Western technology on a “do-not-buy” list as a measure of response for the
aforementioned accusations. These strategic moves in consonance with the revelations that
there are indeed American spy organization backdoors embedded in US technology products
have given the Chinese a capability for winning economically in the first round of a 21st
century
cyber war with the United States.
Future Chinese Cyber Warfare Strategic Developments
China’s Great Cannon
China under the current Communist regime is quick to learn from the downfall of previous
Chinese dynasties. The Communist Party of China (CPC) has been very aware of what happens
amongst the Chinese populace once they become disenchanted with current leadership
direction and policies – since Mao Tse tung in 1949 unpopular leaders of China such as Chiang
15
“China Said to Plan Sweeping Shift From Foreign Technology to Own”. Bloomberg. (2014). Internet. Accessed:
http://www.bloomberg.com/news/articles/2014-12-17/china-said-to-plan-sweeping-shift-from-foreign-technology-to-own
16
“IBM将帮助竞争对手浪潮国际设计服务器” Tech @ QQ.com. (2014). Internet. Accessed: http://tech.qq.com/a/20140823/001945.htm
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
Kai Shek have been overthrown, routed and replaced. In order to maintain current regime
hegemony inside China, China’s cyber security initiatives as of late, March 2015, focused
outwards in an attempt to block and edit global website who Communist leaders regarded as
anti-Chinese. Thus, the concept of securing the Communist ideology went from controlling
internal Chinese dissent to the Internet in the Western world. American-based Greatfire.org
was the victim of a Chinese based Distributed Denial of Service (DDoS) attack in late March
2015. The reason for this DDoS attack was an attempt by Greatfire.org to make available
blocked, nay, banned content in the People’s Republic of China available to Chinese Netziens.
Examples of Greatfire.org’s efforts to educate censored Chinese include the creation of
websites such as the China Digital Times, A Chinese Reuters website and Freeweibo.com which
Greatfire has itself created as a poke in the eye of Chinese censors who have censured Chinese
run Weibo.cn.com. In the last example, perhaps the Greatfire efforts of re-posting edited and
removed content from Sina’s Weibo was too much for the 50,000 Chinese Internet censors. As
a result, China may have used this Western named cyber weapon, the “Great Cannon” to curtail
and fend off more of Greatfire’s unblocking efforts.17
China’s Great Cannon when operated has the ability to technically hijack unsuspecting Internet
browsers and redirect millions Internet users’ traffic in an aggressive cyber offensive on
websites which are blocked by China. China’s use of the Great Cannon is a deliberate offensive
strategy in an otherwise defensively framed cyber public awareness campaign. Indeed now,
China’s Internet censorship efforts have shifted from defensive anti-Communist rhetoric
17
“Breaking Through China's Great Firewall”. (2015). (Internet). Accessed: http://www.bloomberg.com/bw/articles/2014-03-20/secretive-web-
activists-give-chinese-a-way-around-censorship
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
content control to an overt attempt at aggressive use of Western Internet sites against free
Internet organizations such as Gretfire.org. “The operational deployment of the Great Cannon
represents a significant escalation in state-level information control: the normalization of
widespread use of an attack tool to enforce censorship by weaponizing users.”18
Besides the regular desire to free content for average Chinese in China, perhaps another reason
for the undue cyber-affection by China’s Great Cannon is the fact that Greatfire.org openly
funded by a United States Government entity. This nepotistic US organization or Other
Governmental Agency (OGA), called Open Technology Fund (OTF). According to Open
Technology Fund’s website, https://www.opentechfund.org/project/greatfire-expanding-
collateral-freedom , the “Greatfire - Expanding Collateral Freedom” project has received a total
of $ 114,000.00 in US Government funding.19
Besides perhaps the US Government backed
efforts of Greatfire.org, more precisely the Communist Chinese take exception with the
initiatives undertaken by the Internet freedom organization – these include; Restrictive Internet
filtering by technical methods (IP blocking, DNS filtering, TCP RST, DPI, etc.), Government
practices that hold intermediaries (social networks or ISPs) liable for user content, Prohibitive
cost to access the Internet, Policies, laws, or directives that increase surveillance, censorship,
and punishment; and, Localized or nationwide communications shut down or throttling
(Blackouts).20
The DDoS attack method creates a frenzy of information packets destined for a particular IP
address or website. The cyber attacker floods the target website with requests to its server,
18
“China’s Great Cannon”. Open Technology Fund. (2015), (Internet). Accessed: https://www.opentechfund.org/article/chinas-great-cannon
19
“Greatfire - Expanding Collateral Freedom”. Open technology Fund. (2015). (Internet). Accessed:
https://www.opentechfund.org/project/greatfire-expanding-collateral-freedom
20
Ibid.
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
slowing or even crashing the server and driving up maintenance costs. Greatfire.org reported
on the 19th
of March that the DDoS attacks started the 17th
of March and peaked when
Greatfire.org began "receiving up to 2.6 billion requests per hour, which is about 2,500 times
more than normal levels."21
Thus, one the People’s Republic of China’s latest strategic cyber weapons, the Great Cannon
has been successful in turning the West’s own open Internet against itself. The technical details
are unique in that 22
Cooperation’s With Foreign Military not aligned with the United States
Asian Infrastructure Investment Bank (AIIB)
China’s financial strategy for future cyber warfare has materialized in the form of its own
regional funding apparatus, soon to be globally recognized> This unanimous recognition may
have come sooner than anticipated for China as on the 12th
of March 2015 the United Kingdom
has recognized its financial legitimacy and applied as founding member. In total 46 countries
from Australia, to Russia, South Korea, Kuwait and many other counties have signed up as
founding members as of the 28th
of March 2015.23
China-led AIIB has several initiatives in financially supporting strategic (and global) nation state
infrastructure projects such as railways, ports, highways, energy, electricity and
21
Anti-censorship activist site Greatfire.org under DDoS attack, bandwidth costs skyrocket”. Tech In Asia. (2015). (Internet). Accessed:
https://www.techinasia.com/anticensorship-activist-site-greatfireorg-ddos-attack-bandwidth-costs-skyrocket/
22
‘Ideological security is of the utmost concern': Meet ‘The Great Cannon,’ China’s latest cyber weapon” National Post. (2015). (Internet).
Accessed: http://news.nationalpost.com/news/world/ideological-security-is-of-the-utmost-concern-meet-the-great-cannon-chinas-latest-
cyberweapon
23
What do we know about AIIB”. China Daily – European Edition. (2015). (Internet). Accessed: http://europe.chinadaily.com.cn/business/2015-
04/01/content_19971275.htm
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
telecommunications.24
According to AAIB’s website it gives the world and prospective members
an idea what its focus is supposed to contribute global economic recovery;
“The AIIB, a modern knowledge-based institution, will focus on the development of
infrastructure and other productive sectors in Asia, including energy and power,
transportation and telecommunications, rural infrastructure and agriculture
development, water supply and sanitation, environmental protection, urban
development and logistics, etc. The operational strategy and priority areas of
engagement may be revised or further refined by its governing boards in the future as
circumstances may warrant.
AIIB will complement and cooperate with the existing MDBs to jointly address the
daunting infrastructure needs in Asia. The Bank’s openness and inclusiveness reflect its
multilateral nature. AIIB welcomes all regional and non-regional countries, developing
and developed countries, that seek to contribute to Asian infrastructure development
and regional connectivity.”25
Headquartered in Beijing, People’s Republic of China, the current secretary-general of the AIIB
is Jin Liqun. He’s a former chairman of the Chinese state owned enterprise (SOE) China
International Capital Corporation. He also has experience with the Asia Development Bank.26
One of the most interesting projects that AIIB is seen as possibly contributing to is the deep
water Pakistan port of Gwadar27
, although China has claimed that the $46 Billion USD needed
24
Ibid.
25
“About Us”. THE ASIAN INFRASTRUCTURE INVESTMENT BANK”. (2015). (Internet). Accessed: http://www.aiibank.org/html/aboutus/AIIB/
26
Ibid, Chain Daily European Edition.
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
for the Pakistani port reconstruction and maintenance will not come from AIIB funding
sources.28
China’s future cyber warfare capabilities thus need not always be technical advantages over
nation states it does not ally itself with. In the case of the AIIB, the United States says it won’t
join, rather using the deployment of military in the very same AIIB countries and choosing to
knock on local residents doors with weapon systems in hand rather than a checkbook as the
People’s Republic of China has so adroitly shown with the formation of the AIIB.
Forming a “No-Hack” Agreement with the Russian Federation
During May 2015 both the Russian Federation and the People’s Republic of China decided on
their own form of global cyber hegemony by agreeing in a 12-page document not to hack each
other; the document itself is appropriately titled “Russian-Chinese intergovernmental
agreement on cooperation in ensuring international information security”.29
According to the
international security agreement written in Russian, both countries” agreed to exchange
information between law enforcement agencies, exchange technologies and ensure security of
information infrastructure.”30
The Russian Ministry of Foreign Affairs (MFA) issued a much more official and perhaps specific
statement ensuring what it is calling ensuring international information security (IIS). The MFA
Official Statement is worth reading and in its brief entirety it is inserted below:
27
“Gwadar port: Southern starting point of China-Pakistan Economic Corridor”. People’s Daily Online. (2015). (Internet). Accessed:
http://en.people.cn/n/2015/0514/c98649-8892217.html
28
“China says AIIB won't be used for $46 billion Pakistan deal”. Reuters. (2015). (Internet). Accessed:
http://in.reuters.com/article/2015/04/17/china-pakistan-idINKBN0N80RQ20150417
29
“Signing a Russian-Chinese intergovernmental agreement on cooperation in ensuring international information security”. Russian
Government Official Website. (2015). (Internet). Accessed: http://government.ru/en/docs/17952/
30
China – Russian Security Agreement. (2015). (Internet). Accessed: https://www.documentcloud.org/documents/2076545-
5amaccs7mslxgbff1ua785wwmwcabdjw.html
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
“On May 8, during the visit of President of the People's Republic of China Xi Jinping to Russia,
the foreign ministers of Russia and China signed, in the presence of the Heads of State, the
bilateral intergovernmental Agreement on Cooperation to Ensure International Information
Security (IIS).
“The Agreement takes Russian-Chinese cooperation in the sphere of IIS to an entirely
new level. It reflects the similar strategic approaches of Russia and China to IIS, and is
concerned with practical application and joint efforts to resolve specific tasks of national
and international information security. Essentially, the Agreement creates a legal
framework for starting a dialogue between the relevant departments in our two
countries on all IIS issues.
The main focus is on joint response to the most serious threats in this sphere, including
countering the use of information and communication technology (ICT) to commit
violations of generally recognised principles of international law, such as interference in
the internal affairs of states, undermining sovereignty or political and economic
stability, and inciting ethnic or religious conflict.
The priorities of Russian-Chinese cooperation also include preventing the use of ICT for
terrorist or other illegal purposes.
In practical terms, the Agreement involves information sharing on existing and potential
risks and threats in IIS, working together to improve the international legal framework
for cooperation in this area, and developing and implementing necessary joint
confidence-building measures, among others.
Other important areas of cooperation mentioned in the document include conducting
joint research on issues related to supporting IIS, joint training of specialists in this
sphere, exchanges of undergraduate and postgraduate students and professors, as well
as maintaining contacts at the expert level in various formats.
With respect to supporting IIS, the document confirms the sovereign right of the states
to formulate and implement their respective state policies on issues related to the
Internet, including cybersecurity, and emphasises the need for the full
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
internationalisation of Internet governance and for a guarantee of the equal rights of
states to participate in this process.
The Agreement will allow our countries to deepen IIS cooperation within international
organisations and forums, including the UN, the International Telecommunication
Union, the SCO, BRICS, and the ASEAN Regional Forum on Security.
In order to implement the Agreement, Russia and China will maintain a regular bilateral
dialogue on IIS issues, including interdepartmental consultations.”31
Thus, in a manner that is more Russian than Chinese, the Chinese have adroitly been able to
official ally themselves with the best hacking nation on the planet in an agreement which
prevents either country from violating the other’s cyber sovereignty. China has effectively
placed the United States on notice that it is willing to cooperate in cyberspace with countries
such as Russia and prevent further nefariousness in the Internet space – while the United States
militarizes cyber with Cyber Command, China and Russia agree to international Internet
Security best practices.
Response to the US Military Offensive Cyber Weapons Capabilities
April 24th
2015 the US Department of Defense announces a summary of cyber weapons
capabilities aimed at countries who would attach the US homeland. The Chinese viewed this
military announcement as one of a direct threat to China’s cyber sovereignty. The US military
three main tasks are security, counter-attack, deterrence.
“One cyber-strategy (sic) is to protect the United States own network security. Summary of the
new offensive cyber-strategy stipulates that the Department of Defense must destroy the
internal network Attacker based upon the background evidence. The second cyber-strategy
31
“ Press release on signing the Agreement between the Government of the Russian Federation and the Government of the People's Republic of
China on Cooperation to Ensure International Information Security”. 897-08-05-2015”. The Ministry of Foreign Affairs of the Russian Federation.
(2015). (Internet). Accessed: http://www.mid.ru/brp_4.nsf/0/EDC236DC70D18CA443257E440060B11B
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
(sic)is to counter a major cyberattack. Once the US military counter-attack, we must make the
enemy "paralyzed." The new strategy that will strengthen the network-related intelligence
gathering capabilities attack, proposed to further cooperation with US allies in the Asia-Pacific
region, increased military options in cyberspace. The third is to deter a major cyberattack.
Increase in cyber-attacks is required to pay the cost, while the President to provide
comprehensive, involving all government agencies to fight back a variety of network solutions,
as well as diplomatic and military options to deter potential enemies.”32
China then views the United States Department of Defense further militarization of cyberspace
into a binary battlefield with abject disdain and perhaps even fear. The fear is borne of the fact
that the Pentagon has said that it will now indeed use kinetic force on nation states it proves
have hacked the United States infrastructure. The Chinese must be thinking that indeed the
America is hell-bent on attacking and invading every country, but then again the Communist
Chinese boys and girls must be chuckling as the acknowledge that the United Sates seems to be
at war with everyone already.
Interestingly the Chinese have also used America’s global war on terror logic against itself when
it comes to Chinese cyber-sovereignty. The Chinese, in November 2014, made statements
asking the United States to exhibit more respect for China’s cyber hegemony after the Chinese
had banned ceratin American technology products over fears of rampant cyber-surveillance by
32
“US Security Strategy released a new version cyber warfare offensive capabilities exposed SUMMARY Network -美军发布新版网络安全战略
概要 露出网络战獠牙”. China Daily.com. (2015) . Internet. Accessed: http://www.chinadaily.com.cn/hqgj/jryw/2015-04-
24/content_13597520.html
Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising
America’s National Security Agency. Chinese newspapers stated the popular voice very clearly;
“Respect the sovereignty of China’s network security”33
United States President Barack Obama openly criticized the new Chinese Cyber Security Bill
banning certain American technology companies stating that America will not do business with
China. China’s response was not very polite, on the one hand they expressed that they, the
Chinese had no respect for Obama’s opinions and on the other were more direct in their
criticism o f his meddling in Chinese internal affairs; “中方回应“奥巴马要求中国修改反恐法草
案”, China's Response to Obama is not very polite, Obama wants China to change anti-terror
laws.”34
China’s draft anti-terrorism law requires technology items to install "backdoor" and thus, “陸制
定反恐法 歐巴馬開砲 - China Uses Obama's Logic Against Him in Drafting New Anti-Terror Law
Tied to Cyber Security”.35
In Summary, the People’s Republic of China has already undertaken numerous tactical and
strategic measures to successfully carry future cyber warfare.
33
“尊重网络主权 维护网络安全. Kanka News. (2014). (Internet). Accessed: “http://domestic.kankanews.com/c/2014-11-
20/0045791297.shtml
34
“中方回应“奥巴马要求中国修改反恐法草案”China's Response to Obama is not very polite, Obama wants China to change anti-terror laws.”
Sohu News. (2015). (Internet). Accessed: http://news.sohu.com/20150303/n409307174.shtml
http://www.hngn.com/articles/74028/20150303/obama-criticizes-chinese-cybersecurity-bill-will-not-do-business-with-china-if-its-
passed.htm
35
“陸制定反恐法 歐巴馬開砲”. China Times. (2015). (Internet). Accessed: http://www.chinatimes.com/newspapers/20150304000113-
260203 http://www.chinatimes.com/newspapers/20150304000507-260102

More Related Content

What's hot

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
Brett L. Scott
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
MarioEliseo3
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Dr. Lydia Kostopoulos
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
bfuesz
 
About cyber war
About cyber warAbout cyber war
About cyber war
eugenvaleriu
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
EnclaveSecurity
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
MarioEliseo3
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cyberware
CyberwareCyberware
Cyberware
Ensar Seker
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
Mark Raduenzel
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
Positive Hack Days
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
shifahirani
 
Sample translation drones
Sample translation dronesSample translation drones
Sample translation drones
Mohammed Khamal Uddin
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
pradhansushil
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
AFCEA International
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
Clifford Stone
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
Richard Stiennon
 

What's hot (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Cyber war
Cyber warCyber war
Cyber war
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyberware
CyberwareCyberware
Cyberware
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Sample translation drones
Sample translation dronesSample translation drones
Sample translation drones
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 

Similar to Future of Chinese Cyber Warfare

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
Murray Security Services
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case Study
Keith Krach
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins
 
Ht f42
Ht f42Ht f42
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
Karl Wolfgang
 
Geovon TECH621 Presentation
Geovon TECH621 PresentationGeovon TECH621 Presentation
Geovon TECH621 Presentation
Geovon
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
Avirot Mitamura
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
Richard Stiennon
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
Richard Stiennon
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdf
deepakarora871
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Jose Gonzalez
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
Kate Neal
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
FalconPeregrine1
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
Kate Neal
 
Cyberwar
CyberwarCyberwar
Cyberwar
Sam Bowne
 
LiPari_Assignment9
LiPari_Assignment9LiPari_Assignment9
LiPari_Assignment9
Phillip LiPari
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
CloudCamp Chicago
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
Talwant Singh
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security Review
Simon Moffatt
 

Similar to Future of Chinese Cyber Warfare (20)

Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case Study
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Ht f42
Ht f42Ht f42
Ht f42
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Geovon TECH621 Presentation
Geovon TECH621 PresentationGeovon TECH621 Presentation
Geovon TECH621 Presentation
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdf
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
LiPari_Assignment9
LiPari_Assignment9LiPari_Assignment9
LiPari_Assignment9
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security Review
 

More from Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
Bill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Bill Hagestad II
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
Bill Hagestad II
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
Bill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
Bill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
Bill Hagestad II
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
Bill Hagestad II
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
Bill Hagestad II
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
Bill Hagestad II
 

More from Bill Hagestad II (16)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 

Recently uploaded

G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
Energy for One World
 
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
yzxexy
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
Energy for One World
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
tshree896
 
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance PaymentCall Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
prijesh mathew
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
Energy for One World
 
2024: The FAR - Federal Acquisition Regulations, Part 43
2024: The FAR - Federal Acquisition Regulations, Part 432024: The FAR - Federal Acquisition Regulations, Part 43
2024: The FAR - Federal Acquisition Regulations, Part 43
JSchaus & Associates
 
一比一原版办理(UQ毕业证)昆士兰大学毕业证
一比一原版办理(UQ毕业证)昆士兰大学毕业证一比一原版办理(UQ毕业证)昆士兰大学毕业证
一比一原版办理(UQ毕业证)昆士兰大学毕业证
eesme1
 
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdfGUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
ProexportColombia1
 
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
afsebu
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
deepakrana121234
 
All Loan Insorance Are Money Problem.docx 1
All Loan Insorance Are Money Problem.docx 1All Loan Insorance Are Money Problem.docx 1
All Loan Insorance Are Money Problem.docx 1
arushiyadavp11
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
Congressional Budget Office
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
ProexportColombia1
 
The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...
ResolutionFoundation
 
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
JSchaus & Associates
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 

Recently uploaded (20)

G7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdfG7 Apulia Leaders Communique, June 2024 (1).pdf
G7 Apulia Leaders Communique, June 2024 (1).pdf
 
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
一比一原版(uob学位证书)英国伯明翰大学毕业证如何办理
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024G7 Apulia Leaders Communique, 14th June 2024
G7 Apulia Leaders Communique, 14th June 2024
 
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdfLecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
Lecture 7 Module VII Agriculture Insurance - Support Services (2).pdf
 
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance PaymentCall Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
Call Girls Ahmedabad 🌹 7339748667 🌹 With No Advance Payment
 
UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
 
2024: The FAR - Federal Acquisition Regulations, Part 43
2024: The FAR - Federal Acquisition Regulations, Part 432024: The FAR - Federal Acquisition Regulations, Part 43
2024: The FAR - Federal Acquisition Regulations, Part 43
 
一比一原版办理(UQ毕业证)昆士兰大学毕业证
一比一原版办理(UQ毕业证)昆士兰大学毕业证一比一原版办理(UQ毕业证)昆士兰大学毕业证
一比一原版办理(UQ毕业证)昆士兰大学毕业证
 
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdfGUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
GUIA_LEGAL_CHAPTER_7_COLOMBIAN TAX REGIME.pdf
 
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
Call Girls in Kolkata (West Bengal) call me [🔝9352988975🔝] Escort In Kolkata ...
 
All Loan Insorance Are Money Problem.docx 1
All Loan Insorance Are Money Problem.docx 1All Loan Insorance Are Money Problem.docx 1
All Loan Insorance Are Money Problem.docx 1
 
Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021Spending in the 340B Drug Pricing Program, 2010 to 2021
Spending in the 340B Drug Pricing Program, 2010 to 2021
 
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdfGUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
GUIA_LEGAL_CHAPTER_6_IMMIGRATION_REGIME.pdf
 
The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...The cost of poor health: What does rising health-related benefit spending mea...
The cost of poor health: What does rising health-related benefit spending mea...
 
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
SPONSORED CONTENT - Palmetier Law - Unleashing Small Business Innovations: A ...
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 

Future of Chinese Cyber Warfare

  • 1. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising Future of Chinese Cyber Warfare By William T. Hagestad II The future of Chinese Cyber Warfare is monumental and is comprised of several factors that are both very international and far reaching in their strategic implications. The international aspects of Chinese Cyber Warfare in the next millennium are based upon the facts and history of China’s experience with the West. The strategic and tactical aspects of future cyber actions by the Chinese are beyond the comprehension of most technologists; and during “Future of Chinese Cyber Warfare” a scan of what lies ahead in the Chinese cyber realm will be discussed. It seems that whenever we scan the headlines these days the terms China and hacking are synonymous. The dilemma is that nefarious cyber activity that China is accused of is mainly coming from the United States of America. The People’s Republic of China on the other side of the world denies the hacking allegations as erroneous and so the it goes, repetitive charges of hacking by one country against another in an endless infinite loop of delusion and missed opportunity for reconciliation by both nation states. It would seem then that the United States has 100% internet Protocol (IP) address proof of these cyber-attacks from China. Yet when the US Government and its various law enforcement, intelligence and secretive agencies are pushed for facts and evidence, none can be produced and the default always seems to be “Well that’s classified information and you do not have a need to know”. Tactical Chinese Responses China it would seem has tired of living by the Western rules of the cyber-road.
  • 2. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising One of the watershed moments was when secrets revealed by the ex-Booz-Allen-Hamilton contractor at the US National Security Agency saw the light of day. China perceiving all American technology products as being compromised by the NSA began to close its technical borders. Many Western technology companies, primarily United States technical firms have been taken off of Chinese procurement lists. Chinese government offices and state owned enterprises (SOEs) such as bank and telecommunications providers are prohibited from purchasing global brands such as Cisco Systems, International Business Machines (IBM) and Microsoft.1 The beginning of the end for China was the US Federal Bureau of Investigation (F-B-I) placing five People’s Liberation Army Officers on Most Wanted posters for intellectual property (IP) theft on May 19th , 2014 in the Western District of Pennsylvania (WDPA).2 By equating, actively serving Chinese Military Officers with International terrorists, the shame and inaccuracies were a bit much for the Chinese Government to bear and thus the strategic technical shots were fired. In February of 2015 the Central Government of China announced the ban of many Western information security products including notably Apple and Cisco Systems, Citrix Systems and McAfee.3 The Chinese press announced that “U.S. official accused China of military personnel engaged in cyber espionage“,美国正式指控中国军方人员从事网络间谍活动”.4 1 “Spying scandal hits US tech companies in China”. (2013). South China Morning Post. (Internet) Accessed: http://www.scmp.com/business/companies/article/1356534/spying-scandal-hits-us-tech-companies-china 2 “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage”. United States Department of Justice. (2014). (Internet). Accessed: http://www.justice.gov/opa/pr/us-charges-five-chinese-military- hackers-cyber-espionage-against-us-corporations-and-labor 3 “Apple, Cisco gear off Beijing's shopping list in surveillance fears”. South China Morning Post. (2015). Internet. Accessed: http://www.scmp.com/news/china/article/1723484/apple-cisco-gear-beijings-shopping-list-surveillance-fears 4 ““U.S. official accused China of military personnel engaged in cyber espionage“,美国正式指控中国军方人员从事网络间谍活动 ”.”ChinaCity.be. (2014) Internet. Accessed: http://www.chinacity2.be/uncategorized/4616/
  • 3. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising In April of 2014, China announced that it would implement network security review of foreign technology companies ,“中国宣布将对外国科技公司实施网络安全审查”.5 This of course came in response to observations that US technology companies were ““US wrestling network security U.S. corporate interests quagmire trap” – “中美角力網絡安全 美企陷利益泥沼”.6 In a purely Chinese move there was no mention of the FBI’s “Most Wanted” gaffe, rather China simply executed upon an economic move, banning Western technology for use in Chinese Government offices and networks. Essentially Chinese Officials can no longer source from these Western technology companies – and thus the Chinese way of dealing with such Western impudence and false accusations of hacking includes a purge by 2020 of most if not all foreign technology relying instead on its own indigenous innovations for government, read state and military uses.7 The date of this announcement by the outgoing Chinese President Hu Jintao on 8 November 2012 was monumental. Besides the number eight being auspicious in Chinese numerology and superstition, this was also the day on which the new President of the People’s Republic of China, Xi Jinping became the new leader of Asia’s largest communist nation. One of Hu Jintao’s most notable proclamations to the People’s Liberation Army was: “"We should attach great importance to maritime, space and cyberspace security. We should make active planning for the use of military forces in peacetime, expand and intensify military preparedness, and 5 “China's banking sector to foreign technology companies to resist new rules Network Security”. (20141).Chinese New York Times. Internet. Accessed: http://chinadigitaltimes.net/chinese/2015/01/%E7%BA%BD%E7%BA%A6%E6%97%B6%E6%8A%A5%EF%BD%9C%E5%A4%96%E5%9B%BD% E7%A7%91%E6%8A%80%E5%85%AC%E5%8F%B8%E6%8A%B5%E5%88%B6%E4%B8%AD%E5%9B%BD%E9%93%B6%E8%A1%8C%E4%B8%9A %E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8/ 6 “中美角力網絡安全 美企陷利益泥沼”. (2014). Singpao. Internet. Accessed: http://www.singpao.com/cj/zh/201405/t20140526_509397.html 7 “China to speed up full military IT application: Hu”. Xinhua News. (2012). Internet. Accessed: http://news.xinhuanet.com/english/special/18cpcnc/2012-11/08/c_131959900.htm
  • 4. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising enhance the capability to accomplish a wide range of military tasks, the most important of which is to win local war in an information age,".8 For the Chinese Armed Forces, this was the outgoing president’s commander’s intent – the informization tasking for the PLA was several-fold. The most important statements are below: “…train a new type of high-caliber military personnel in large numbers, intensively carry out military training under computerized conditions, and enhance integrated combat capability based on extensive IT application…”; “…implement the military strategy of active defense for the new period, and enhance military strategic guidance as the times so require”; …strengthen national defense aim to safeguard China's sovereignty, security and territorial integrity and ensure its peaceful development…“; “…enhance the capability to accomplish a wide range of military tasks, the most important of which is to win local war in an information age…“;9 During March of 2013, which was also the 86th Anniversary of the founding of the People’s Liberation Army, discussions arose discussing guarding the Chinese ‘motherland’ and her frontiers traditionally with kinetic weaponry such as bombs had progressed beyond what a seen enemy might possess. The PLA went on to discuss the security provocations in the cyber realm primarily from the United States. During an anniversary report, called the “18 Report” PLA officials and officers alike paid particular attention to China’s need for “10 8 Ibid. 9 Ibid. 10 “Chinese Military Projects Globally: PLA & New Equipment Development -中国军队项目世界第一:惊曝解放军最新装备发展 ”JunShi.XiLu.com. (2013. Internet. Accessed: http://junshi.xilu.com/20130802/news_44_379586_2.html
  • 5. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising The “18 Report” further indicated that the quality of US Military cyber weapons was improving and thus posing a significant and growing threat to China’s national security. In that, cyberspace is a basic sign of the information age, it is becoming a new strategic areas affecting national security and development has become the penetration, impact and even decide other important battle space. The state attaches great importance to the development of the world's major military network, network warfare units under construction; improve network warfare capabilities, competition intensified around cyberspace right to development, ownership, control, and China in cyberspace faced with many real and potential threats.11 The “18 Report” went on to discuss and prioritize Chinese military weapons research and innovation specifically noting that China’s future cyber wars would be in the cyber realm. PLA units tasked with generating this future cyber combat capability included the People’s Liberation Army Navy (PLAN), Air Force (PLLAN) and the Second Artillery Force.12 The PLA noted with understanding that the areas of sea, space, cyberspace security situation, strengthening maritime, space, cyberspace security research, are necessary areas of China’s national security sovereignty. Efficient and capable construction of a cyber-power and the necessary means to provide strong strategic support to safeguard all of China’s national interests. The “18 Report” also specifically tasked all of the PLA with a comprehensive construction of a modern military system with Chinese characteristics, promoting the revolution in military affairs with Chinese characteristics.13 11 Ibid. 12 Ibid. 13 Ibid.
  • 6. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising The “18 Report” went on to emphasize a total fighting force, adjusting and optimizing the PLA’s structure, “improve the institutional mechanisms conducive to joint operations, promote operational elements fusion integration, accelerate the formation of capable, joint, more energy, efficient information military system.”14 Adjust and optimize the structure of combat forces, primarily focus on strengthening the Navy, Air Force, Second Artillery Force, and accelerate the construction of new combat information operations forces, military and aerospace, and promote the overall transformation of the Army, optimizing the internal structure and composition of forces branches. In favor of joint operations and improve institutional mechanisms, mainly focus on improving conditions at the PLA Information joint operational capabilities, establish and improve joint operational command system, the joint training system, the joint security system. Promote integration integrated operational elements, mainly the use of information systems to reconnaissance, command and control, firepower elements integrated, comprehensive support, etc., to maximize the overall effectiveness of combat system. Build a military system, the Chinese armed forces will face profound changes, military power will have a qualitative leap, national security will be more solid and reliable protection. Notable Chinese strategic technology moves seen during December 2014 as SOEs in northeastern China replaced Microsoft’s operating system with the Chinese homegrown Linux version based on Free BSD called NeoKylin. Additional tactical replacement of Western technology came about as many of China’s banks replaced IBM servers with Chinese –made 14 Ibid.
  • 7. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising hardware manufactured by China’s Inspur Group.15 This is an interesting report by Bloomberg however it may be true – there is some Chinese tactical and strategic gamesmanship behind the local choice of China’s Inspur. During August of 2014 IBM was hailed as a Western company worthy of doing business in the People’s Republic of China after the government ban when it was disclosed that IBM would help China's Inspur to design servers, IBM将帮助竞争对手浪潮 国际设计服务器.16 Thus, the People’s Republic of China, in response to hacking allegations by the United States and subsequent criminal charges against its military officers has responded in accurate Chinese fashion – placing Western technology on a “do-not-buy” list as a measure of response for the aforementioned accusations. These strategic moves in consonance with the revelations that there are indeed American spy organization backdoors embedded in US technology products have given the Chinese a capability for winning economically in the first round of a 21st century cyber war with the United States. Future Chinese Cyber Warfare Strategic Developments China’s Great Cannon China under the current Communist regime is quick to learn from the downfall of previous Chinese dynasties. The Communist Party of China (CPC) has been very aware of what happens amongst the Chinese populace once they become disenchanted with current leadership direction and policies – since Mao Tse tung in 1949 unpopular leaders of China such as Chiang 15 “China Said to Plan Sweeping Shift From Foreign Technology to Own”. Bloomberg. (2014). Internet. Accessed: http://www.bloomberg.com/news/articles/2014-12-17/china-said-to-plan-sweeping-shift-from-foreign-technology-to-own 16 “IBM将帮助竞争对手浪潮国际设计服务器” Tech @ QQ.com. (2014). Internet. Accessed: http://tech.qq.com/a/20140823/001945.htm
  • 8. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising Kai Shek have been overthrown, routed and replaced. In order to maintain current regime hegemony inside China, China’s cyber security initiatives as of late, March 2015, focused outwards in an attempt to block and edit global website who Communist leaders regarded as anti-Chinese. Thus, the concept of securing the Communist ideology went from controlling internal Chinese dissent to the Internet in the Western world. American-based Greatfire.org was the victim of a Chinese based Distributed Denial of Service (DDoS) attack in late March 2015. The reason for this DDoS attack was an attempt by Greatfire.org to make available blocked, nay, banned content in the People’s Republic of China available to Chinese Netziens. Examples of Greatfire.org’s efforts to educate censored Chinese include the creation of websites such as the China Digital Times, A Chinese Reuters website and Freeweibo.com which Greatfire has itself created as a poke in the eye of Chinese censors who have censured Chinese run Weibo.cn.com. In the last example, perhaps the Greatfire efforts of re-posting edited and removed content from Sina’s Weibo was too much for the 50,000 Chinese Internet censors. As a result, China may have used this Western named cyber weapon, the “Great Cannon” to curtail and fend off more of Greatfire’s unblocking efforts.17 China’s Great Cannon when operated has the ability to technically hijack unsuspecting Internet browsers and redirect millions Internet users’ traffic in an aggressive cyber offensive on websites which are blocked by China. China’s use of the Great Cannon is a deliberate offensive strategy in an otherwise defensively framed cyber public awareness campaign. Indeed now, China’s Internet censorship efforts have shifted from defensive anti-Communist rhetoric 17 “Breaking Through China's Great Firewall”. (2015). (Internet). Accessed: http://www.bloomberg.com/bw/articles/2014-03-20/secretive-web- activists-give-chinese-a-way-around-censorship
  • 9. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising content control to an overt attempt at aggressive use of Western Internet sites against free Internet organizations such as Gretfire.org. “The operational deployment of the Great Cannon represents a significant escalation in state-level information control: the normalization of widespread use of an attack tool to enforce censorship by weaponizing users.”18 Besides the regular desire to free content for average Chinese in China, perhaps another reason for the undue cyber-affection by China’s Great Cannon is the fact that Greatfire.org openly funded by a United States Government entity. This nepotistic US organization or Other Governmental Agency (OGA), called Open Technology Fund (OTF). According to Open Technology Fund’s website, https://www.opentechfund.org/project/greatfire-expanding- collateral-freedom , the “Greatfire - Expanding Collateral Freedom” project has received a total of $ 114,000.00 in US Government funding.19 Besides perhaps the US Government backed efforts of Greatfire.org, more precisely the Communist Chinese take exception with the initiatives undertaken by the Internet freedom organization – these include; Restrictive Internet filtering by technical methods (IP blocking, DNS filtering, TCP RST, DPI, etc.), Government practices that hold intermediaries (social networks or ISPs) liable for user content, Prohibitive cost to access the Internet, Policies, laws, or directives that increase surveillance, censorship, and punishment; and, Localized or nationwide communications shut down or throttling (Blackouts).20 The DDoS attack method creates a frenzy of information packets destined for a particular IP address or website. The cyber attacker floods the target website with requests to its server, 18 “China’s Great Cannon”. Open Technology Fund. (2015), (Internet). Accessed: https://www.opentechfund.org/article/chinas-great-cannon 19 “Greatfire - Expanding Collateral Freedom”. Open technology Fund. (2015). (Internet). Accessed: https://www.opentechfund.org/project/greatfire-expanding-collateral-freedom 20 Ibid.
  • 10. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising slowing or even crashing the server and driving up maintenance costs. Greatfire.org reported on the 19th of March that the DDoS attacks started the 17th of March and peaked when Greatfire.org began "receiving up to 2.6 billion requests per hour, which is about 2,500 times more than normal levels."21 Thus, one the People’s Republic of China’s latest strategic cyber weapons, the Great Cannon has been successful in turning the West’s own open Internet against itself. The technical details are unique in that 22 Cooperation’s With Foreign Military not aligned with the United States Asian Infrastructure Investment Bank (AIIB) China’s financial strategy for future cyber warfare has materialized in the form of its own regional funding apparatus, soon to be globally recognized> This unanimous recognition may have come sooner than anticipated for China as on the 12th of March 2015 the United Kingdom has recognized its financial legitimacy and applied as founding member. In total 46 countries from Australia, to Russia, South Korea, Kuwait and many other counties have signed up as founding members as of the 28th of March 2015.23 China-led AIIB has several initiatives in financially supporting strategic (and global) nation state infrastructure projects such as railways, ports, highways, energy, electricity and 21 Anti-censorship activist site Greatfire.org under DDoS attack, bandwidth costs skyrocket”. Tech In Asia. (2015). (Internet). Accessed: https://www.techinasia.com/anticensorship-activist-site-greatfireorg-ddos-attack-bandwidth-costs-skyrocket/ 22 ‘Ideological security is of the utmost concern': Meet ‘The Great Cannon,’ China’s latest cyber weapon” National Post. (2015). (Internet). Accessed: http://news.nationalpost.com/news/world/ideological-security-is-of-the-utmost-concern-meet-the-great-cannon-chinas-latest- cyberweapon 23 What do we know about AIIB”. China Daily – European Edition. (2015). (Internet). Accessed: http://europe.chinadaily.com.cn/business/2015- 04/01/content_19971275.htm
  • 11. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising telecommunications.24 According to AAIB’s website it gives the world and prospective members an idea what its focus is supposed to contribute global economic recovery; “The AIIB, a modern knowledge-based institution, will focus on the development of infrastructure and other productive sectors in Asia, including energy and power, transportation and telecommunications, rural infrastructure and agriculture development, water supply and sanitation, environmental protection, urban development and logistics, etc. The operational strategy and priority areas of engagement may be revised or further refined by its governing boards in the future as circumstances may warrant. AIIB will complement and cooperate with the existing MDBs to jointly address the daunting infrastructure needs in Asia. The Bank’s openness and inclusiveness reflect its multilateral nature. AIIB welcomes all regional and non-regional countries, developing and developed countries, that seek to contribute to Asian infrastructure development and regional connectivity.”25 Headquartered in Beijing, People’s Republic of China, the current secretary-general of the AIIB is Jin Liqun. He’s a former chairman of the Chinese state owned enterprise (SOE) China International Capital Corporation. He also has experience with the Asia Development Bank.26 One of the most interesting projects that AIIB is seen as possibly contributing to is the deep water Pakistan port of Gwadar27 , although China has claimed that the $46 Billion USD needed 24 Ibid. 25 “About Us”. THE ASIAN INFRASTRUCTURE INVESTMENT BANK”. (2015). (Internet). Accessed: http://www.aiibank.org/html/aboutus/AIIB/ 26 Ibid, Chain Daily European Edition.
  • 12. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising for the Pakistani port reconstruction and maintenance will not come from AIIB funding sources.28 China’s future cyber warfare capabilities thus need not always be technical advantages over nation states it does not ally itself with. In the case of the AIIB, the United States says it won’t join, rather using the deployment of military in the very same AIIB countries and choosing to knock on local residents doors with weapon systems in hand rather than a checkbook as the People’s Republic of China has so adroitly shown with the formation of the AIIB. Forming a “No-Hack” Agreement with the Russian Federation During May 2015 both the Russian Federation and the People’s Republic of China decided on their own form of global cyber hegemony by agreeing in a 12-page document not to hack each other; the document itself is appropriately titled “Russian-Chinese intergovernmental agreement on cooperation in ensuring international information security”.29 According to the international security agreement written in Russian, both countries” agreed to exchange information between law enforcement agencies, exchange technologies and ensure security of information infrastructure.”30 The Russian Ministry of Foreign Affairs (MFA) issued a much more official and perhaps specific statement ensuring what it is calling ensuring international information security (IIS). The MFA Official Statement is worth reading and in its brief entirety it is inserted below: 27 “Gwadar port: Southern starting point of China-Pakistan Economic Corridor”. People’s Daily Online. (2015). (Internet). Accessed: http://en.people.cn/n/2015/0514/c98649-8892217.html 28 “China says AIIB won't be used for $46 billion Pakistan deal”. Reuters. (2015). (Internet). Accessed: http://in.reuters.com/article/2015/04/17/china-pakistan-idINKBN0N80RQ20150417 29 “Signing a Russian-Chinese intergovernmental agreement on cooperation in ensuring international information security”. Russian Government Official Website. (2015). (Internet). Accessed: http://government.ru/en/docs/17952/ 30 China – Russian Security Agreement. (2015). (Internet). Accessed: https://www.documentcloud.org/documents/2076545- 5amaccs7mslxgbff1ua785wwmwcabdjw.html
  • 13. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising “On May 8, during the visit of President of the People's Republic of China Xi Jinping to Russia, the foreign ministers of Russia and China signed, in the presence of the Heads of State, the bilateral intergovernmental Agreement on Cooperation to Ensure International Information Security (IIS). “The Agreement takes Russian-Chinese cooperation in the sphere of IIS to an entirely new level. It reflects the similar strategic approaches of Russia and China to IIS, and is concerned with practical application and joint efforts to resolve specific tasks of national and international information security. Essentially, the Agreement creates a legal framework for starting a dialogue between the relevant departments in our two countries on all IIS issues. The main focus is on joint response to the most serious threats in this sphere, including countering the use of information and communication technology (ICT) to commit violations of generally recognised principles of international law, such as interference in the internal affairs of states, undermining sovereignty or political and economic stability, and inciting ethnic or religious conflict. The priorities of Russian-Chinese cooperation also include preventing the use of ICT for terrorist or other illegal purposes. In practical terms, the Agreement involves information sharing on existing and potential risks and threats in IIS, working together to improve the international legal framework for cooperation in this area, and developing and implementing necessary joint confidence-building measures, among others. Other important areas of cooperation mentioned in the document include conducting joint research on issues related to supporting IIS, joint training of specialists in this sphere, exchanges of undergraduate and postgraduate students and professors, as well as maintaining contacts at the expert level in various formats. With respect to supporting IIS, the document confirms the sovereign right of the states to formulate and implement their respective state policies on issues related to the Internet, including cybersecurity, and emphasises the need for the full
  • 14. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising internationalisation of Internet governance and for a guarantee of the equal rights of states to participate in this process. The Agreement will allow our countries to deepen IIS cooperation within international organisations and forums, including the UN, the International Telecommunication Union, the SCO, BRICS, and the ASEAN Regional Forum on Security. In order to implement the Agreement, Russia and China will maintain a regular bilateral dialogue on IIS issues, including interdepartmental consultations.”31 Thus, in a manner that is more Russian than Chinese, the Chinese have adroitly been able to official ally themselves with the best hacking nation on the planet in an agreement which prevents either country from violating the other’s cyber sovereignty. China has effectively placed the United States on notice that it is willing to cooperate in cyberspace with countries such as Russia and prevent further nefariousness in the Internet space – while the United States militarizes cyber with Cyber Command, China and Russia agree to international Internet Security best practices. Response to the US Military Offensive Cyber Weapons Capabilities April 24th 2015 the US Department of Defense announces a summary of cyber weapons capabilities aimed at countries who would attach the US homeland. The Chinese viewed this military announcement as one of a direct threat to China’s cyber sovereignty. The US military three main tasks are security, counter-attack, deterrence. “One cyber-strategy (sic) is to protect the United States own network security. Summary of the new offensive cyber-strategy stipulates that the Department of Defense must destroy the internal network Attacker based upon the background evidence. The second cyber-strategy 31 “ Press release on signing the Agreement between the Government of the Russian Federation and the Government of the People's Republic of China on Cooperation to Ensure International Information Security”. 897-08-05-2015”. The Ministry of Foreign Affairs of the Russian Federation. (2015). (Internet). Accessed: http://www.mid.ru/brp_4.nsf/0/EDC236DC70D18CA443257E440060B11B
  • 15. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising (sic)is to counter a major cyberattack. Once the US military counter-attack, we must make the enemy "paralyzed." The new strategy that will strengthen the network-related intelligence gathering capabilities attack, proposed to further cooperation with US allies in the Asia-Pacific region, increased military options in cyberspace. The third is to deter a major cyberattack. Increase in cyber-attacks is required to pay the cost, while the President to provide comprehensive, involving all government agencies to fight back a variety of network solutions, as well as diplomatic and military options to deter potential enemies.”32 China then views the United States Department of Defense further militarization of cyberspace into a binary battlefield with abject disdain and perhaps even fear. The fear is borne of the fact that the Pentagon has said that it will now indeed use kinetic force on nation states it proves have hacked the United States infrastructure. The Chinese must be thinking that indeed the America is hell-bent on attacking and invading every country, but then again the Communist Chinese boys and girls must be chuckling as the acknowledge that the United Sates seems to be at war with everyone already. Interestingly the Chinese have also used America’s global war on terror logic against itself when it comes to Chinese cyber-sovereignty. The Chinese, in November 2014, made statements asking the United States to exhibit more respect for China’s cyber hegemony after the Chinese had banned ceratin American technology products over fears of rampant cyber-surveillance by 32 “US Security Strategy released a new version cyber warfare offensive capabilities exposed SUMMARY Network -美军发布新版网络安全战略 概要 露出网络战獠牙”. China Daily.com. (2015) . Internet. Accessed: http://www.chinadaily.com.cn/hqgj/jryw/2015-04- 24/content_13597520.html
  • 16. Future of Chinese Cyber Warfare by William T Hagestad II LTCOL USMCR – Retired ©Red Dragon Rising America’s National Security Agency. Chinese newspapers stated the popular voice very clearly; “Respect the sovereignty of China’s network security”33 United States President Barack Obama openly criticized the new Chinese Cyber Security Bill banning certain American technology companies stating that America will not do business with China. China’s response was not very polite, on the one hand they expressed that they, the Chinese had no respect for Obama’s opinions and on the other were more direct in their criticism o f his meddling in Chinese internal affairs; “中方回应“奥巴马要求中国修改反恐法草 案”, China's Response to Obama is not very polite, Obama wants China to change anti-terror laws.”34 China’s draft anti-terrorism law requires technology items to install "backdoor" and thus, “陸制 定反恐法 歐巴馬開砲 - China Uses Obama's Logic Against Him in Drafting New Anti-Terror Law Tied to Cyber Security”.35 In Summary, the People’s Republic of China has already undertaken numerous tactical and strategic measures to successfully carry future cyber warfare. 33 “尊重网络主权 维护网络安全. Kanka News. (2014). (Internet). Accessed: “http://domestic.kankanews.com/c/2014-11- 20/0045791297.shtml 34 “中方回应“奥巴马要求中国修改反恐法草案”China's Response to Obama is not very polite, Obama wants China to change anti-terror laws.” Sohu News. (2015). (Internet). Accessed: http://news.sohu.com/20150303/n409307174.shtml http://www.hngn.com/articles/74028/20150303/obama-criticizes-chinese-cybersecurity-bill-will-not-do-business-with-china-if-its- passed.htm 35 “陸制定反恐法 歐巴馬開砲”. China Times. (2015). (Internet). Accessed: http://www.chinatimes.com/newspapers/20150304000113- 260203 http://www.chinatimes.com/newspapers/20150304000507-260102