(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

DoD 2009 PLA Cyber Warfare Capabilities Assessment

with one comment

US DoD Estimates of Chinese Information Warfare Capabilities and Commitment 2002-2009

“PRC military writings highlight the seizure of electromagnetic dominance in the early
phases of a campaign as among the foremost tasks to ensure battlefield success. PLA
theorists have coined the term “integrated network electronic warfare” (wangdian yitizhan –
网电一体战) to describe the use of electronic warfare, computer network operations, and
kinetic strikes to disrupt battlefield network information systems that support an adversary’s
warfighting and power projection capabilities. PLA writings on future models of joint
operations identify “integrated network electronic warfare” as one of the basic forms of
“integrated joint operations,” suggesting the centrality of seizing and dominating the
electromagnetic spectrum in PLA campaign theory.”

“In 2003, the CCP Central Committee and the CMC approved the concept of “Three
Warfares” (san zhong zhanfa – 三种战法), a PLA information warfare concept aimed at
influencing the psychological dimensions of military activity:

o Psychological Warfare seeks to undermine an enemy’s ability to conduct combat
operations through psychological operations aimed at deterring, shocking, and
demoralizing enemy military personnel and supporting civilian populations.

o Media Warfare is aimed at influencing domestic and international public opinion to
build public and international support for China’s military actions and to dissuade an
adversary from pursuing policies perceived to be adverse to China’s interests.

o Legal Warfare uses international and domestic laws to gain international support
and manage possible political repercussions of China’s military actions.”

“The PLA is investing in electronic countermeasures, defenses against electronic attack (e.g.,
electronic and infrared decoys, angle reflectors, and false target generators), and Computer
Network Operations (CNO). China’s CNO concepts include computer network attack
(CNA), computer network exploitation (CNE), and computer network defense (CND). The
PLA has established information warfare units to develop viruses to attack enemy computer
systems and networks, and tactics and measures to protect friendly computer systems and
networks. In 2005, the PLA began to incorporate offensive CNO into its exercises, primarily
in first strikes against enemy networks.”

“According to a 2008 Federal Bureau of Investigation (FBI) statement, PRC intelligence
services “pose a significant threat both to the national security and to the compromise of
U.S. critical national assets,” and concluded that these services “will remain a significant
threat for a long time.” The U.S. intelligence community has noted that, of all foreign
intelligence organizations attempting to penetrate U.S. agencies, China’s are the most

“China has also identified 16 “major special items” for which it plans to develop or expand
indigenous capabilities. These include core electronic components, high-end universal chips
and operating system software, very large-scale integrated circuit manufacturing, next-
generation broadband wireless mobile communications, high-grade numerically controlled
machine tools, large aircraft, high-resolution satellites, manned spaceflight, and lunar

“Shu Quansheng, a naturalized U.S. citizen • who worked as a physicist in the United States,
pleaded guilty to violating the Arms Export Control Act by providing the PRC with
information on the design and development of a fueling system for space launch vehicles.

US DoD Estimates of Chinese Information Warfare Capabilities and Commitment 2002-2009

Chi Mak, a PRC national, acknowledged being • placed in the United States for more than 20
years to conduct espionage against the United States, providing sensitive plans for U.S. Navy
ships, submarines, and weapons to the PRC. In March 2008, he was sentenced to twenty-
four and a half years in prison by a federal judge.

In April 2008, Indian Government officials confirmed that its Ministry of External Affairs’
computer network and servers were the victims of intrusions that appeared to originate in

In May 2008, the Belgian Government reported that it had been targeted by PRC hackers
multiple times.

In May 2008, U.S. authorities investigated whether PRC officials secretly copied contents of
a U.S. Government laptop during a visit to China by the U.S. Commerce Secretary and used
the information to try to penetrate into Commerce computers. The investigation is

Well, looks like the Chinese Overlords have high plans for those back doors they are alleged to have left in our Grid networks. I find it rather amusing that “WE” invented the internets and “WE” first took the lessons of Sun Tsu to the likes of VMI and yet “WE” failed so miserably at determining the cyber warfare capabilities of the technologies we unleashed on the world. Even less so did we actually make any attempts at SECURING that technology that “WE” created and disseminated out of sheer laziness or stupidity… Or both…

Now we are behind the 8 ball and everyone is beginning to panic….

Such hubris…

Written by Krypt3ia

2009/04/17 at 12:46

One Response

Subscribe to comments with RSS.

  1. […] DoD 2009 PLA Cyber Warfare Capabilities Assessment […]

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: