SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Chinese Military Cyber Capabilities Development
中国军队网络战能力
2012-4-27
Since 2005, the number of Chinese troops for the invasion of the US network activities more and more. These
network intrusion activities may gather intelligence for the US military system for activities, or to find weaknesses in
the US network, or implanted in the US network virus. Thus, once the Sino-US conflict, the Chinese army can in a
dominant position immediately.
If these intrusions are carried out attacks against the US system, then the US military network system will malfunction
or destroyed. On the facts, the computer network reconnaissance activities are in line with the traditional Chinese a
strategy that "victory to win the soldiers then Qiuzhan, while defeated warriors go to war and then win." Through
network reconnaissance operations before finding the enemy's weaknesses fits this strategy.
This paper described the network support Chinese army launched a military invasion theory, especially on China's
military strategy to carry out appointments electronic warfare and computer network to enable patriotic hackers and
other activities. This paper also reviews the Chinese military network intrusion activities in recent years, and look at
the military's most famous theory who offered public comment on information warfare.
Chinese troops continue to enrich theory based on practice. Computer network warfare becomes part of the Chinese
army in peacetime strategic activities. The purpose of the US military invasion of the activities of deep concern, it is a
reconnaissance activity, or to the Trojan virus implanted into the US military and its allies in the network system,
resulting in paralysis or wartime destruction of these systems. With the outside world understanding the development
of information warfare, the Chinese army, China's intentions in terms of network intrusion into question US military
and its allies.
Network warfare units
While the outside world do not know the Chinese army to carry out the real cause of network intrusion action, but
some books or articles published by the army gives some explanation. Chinese military application of information
technology and information technology are the armed forces constitute a huge impact on military technology,
especially in the United States against Iraq affected by the use of technology. The impact of technology on Chinese
military theory is that Chinese army believes that a country only in the information war to seize the initiative in
advance, or to establish information superiority or information control, it could win the war, which requires prior
combat to carry out reconnaissance and intelligence gathering activities, the foundation for network forces.
Chinese military has been pursuing "active defense" strategy, that is, not the first attack others, but once attacked,
fight back immediately. Over the past few years with the advent of the Internet, some changes occurred in this
strategy. A lot of information disclosure describes a Chinese army troops and their offensive cyber warfare cyber
warfare operations. Chinese military openly acknowledged the need for offensive cyber warfare, reflecting its great
extent to break the traditional military thinking. In addition, Chinese military openly stated that the US military is
dependent on computer systems require a great weakness of the study. If the Chinese military to weaken the US
military on information warfare has the advantage, then it must study this weakness. In order to understand the
evolution of Chinese troops from defense to attack thinking thinking, the author in 1999 began the development of
information warfare will be described.
Development of network attack strategy
1999. Military theorists who about 10 years ago, began to discuss the information on offensive operations, Zhu
Wenquan and Anson 1999 coauthored an "information war" with one chapter devoted narrative "to carry out pre-
emptive strikes in disguise." The authors point out the need to carry out pre-emptive strikes to destroy enemy forces
attacked computer. Pre-emptive attacks, including network reconnaissance activities related to C4I systems to collect
enemy’s performance, purpose, structure of information systems, and electronic warfare and weapons systems. The
authors noted that from a broader sense, the computer information is part of the computer information
reconnaissance attacks. They pointed out that: In order to carry out reconnaissance computer, you can use the
computer information network established in peacetime, and with different identities to access the network to carry
out reconnaissance activities. You can use computer experts strength, especially the strength hackers, computer
perform reconnaissance missions. Use hackers obtain military information is a very effective way from your computer
network. Should be familiar with network protocols and network intelligence accumulated.
The authors noted that the Chinese army has established a small computer offensive and defensive combat troops to
the implementation of network attacks. Forces conducted training courses, including how to design and organize
activities viruses, how to infiltrate the enemy's computer networks. Attacking forces must continue to study and
analyze the enemy's intentions. They must also be able to determine the location of the enemy's computer control
center.
November 1999, "Liberation Army Daily" published an article that China may need to set up an independent army
Original Mandarin Chinese:
2005年以来,中国军队针对美国网络系统的入侵活动的次数越来越多。这些网络入侵活动可能为针对美军事系统的情
报搜集活动,或是寻找美军网络系统的弱点,或是在美军网络系统植入病毒。这样,一旦中美发生冲突,中国军队能够
立即处于优势地位。
如果这些入侵活动是对美军系统开展的攻击行动,那么美军网络系统就会发生故障或被毁坏。实事上,这些计算机网络
侦察活动是是符合中国传统的一个谋略,即“胜兵先胜而后求战,败兵先战而后求胜”。通过网络侦察活动在作战行动之
前寻找敌人的弱点正好符合这个战略。
本文主要说明支撑中国军队发动网络入侵行动的军事理论,特别是介绍了中国军队任用电子谋略开展计算机网络作
战和启用爱国骇客等活动。本文还回顾了中国军队近年的网络入侵活动,并审视军队中最有名的理论人士所提供的对信
息战的公开评论。
中国军队不断根据实践丰富理论。计算机网络战成为中国军队在和平时期开展的战略活动的一部分。美军对中军队
的入侵活动的目的深表担忧,它是一种侦察活动,还是为了将木马等病毒植入到美军及其盟军的网络系统中,从而在战
时使这些系统瘫痪或毁坏。随着外界深入了解中国军队的信息战发展情况,中国的在网络入侵方面的意图引起美军及其
盟军的质疑。
网络战部队
外界虽然不清楚中国军队开展网络入侵行动的真正原因,但是军队所出版的一些著作或文章给出了一些解释。中国
军队应用信息新技术及军队开展信息化建设都是技术对军事的构成的巨大影响,特别是受美国针对伊拉克所使用技术的
影响。这些技术对中国军事理论的影响是,中国军队认为,一个国家只有在信息战中事先夺取了主动权,或是建立起信
息优势或信息控制,才可能取得战争的胜利,这就需要在作战之前就开展侦察和情报搜集活动,为网络部队使用奠定基
础。
中国军队一直奉行“积极防御”战略,即不首先攻击别人,但一旦遭到攻击,就会立即还击。过去几年里随着网络的
出现,这个战略发生了一定的变化。大量公开的资料描述了中国军队的网络战部队及其进攻性网络战行动。中国军队公
开承认需要开展进攻性网络战,这反映出其极大程度地突破了传统的军事思想。此外,中国军队公开声称,美军依赖计
算机系统是一个很大的需要研究的弱点。如果中国军队削弱美军在信息战上所具有的优势,那么它就必须研究这个弱点
。为了解中国军队从防御思维向进攻思维的演变,作者从1999年信息战发展情况开始予以说明。
网络进攻战略的发展
1999年。军队理论界人士约在10年前就开始讨论信息进攻行动,1999年朱文泉与陈太一合著的《信息作战》利用
一个章节的篇幅叙述“开展伪装的先发制人攻击”。作者指出开展先发制人攻击需要摧毁敌人计算机攻击部队。先发制人
攻击活动包括网络侦察活动,搜集敌人有关C4I系统的性能、目的、系统结构的信息,以及电子战和武器系统。作者指
出,从更广泛的意义上来说,计算机信息侦察是计算机信息攻击的一部分。他们指出:为了开展计算机侦察,可以利用
在和平时期建立的计算机信息网络,并且以不同的身份访问网络开展侦察活动。可以借用计算机专家的力量,特别是骇
客的力量,执行计算机侦察任务。使用骇客从计算机网络中获得军事信息是一种非常有效的方式。应该熟悉网络协议并
积累网络情报。
作者指出,中国军队建立了小规模计算机进攻和防御对抗部队,以实施网络攻击行动。部队所开展的训练科目包括
如何设计和组织病毒入侵活动,如何渗透至敌人的计算机网络。进攻部队必须不断研究和分析敌人的意图。他们也必须
能够去伪存真,确定敌人的计算机控制中心的位置。
1999年11月,《解放军报》发表文章指出中国军队可能需要组建一个独立
Original Source http://51gt.com/news/wap.aspx?nid=13031&cid=15

Contenu connexe

En vedette

Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 
The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfareMousselmal Tarik
 

En vedette (18)

Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 
Final ew ppt
Final ew pptFinal ew ppt
Final ew ppt
 
The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfare
 

Plus de Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Bill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Bill Hagestad II
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015 Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparisonBill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Bill Hagestad II
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoSBill Hagestad II
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites listBill Hagestad II
 

Plus de Bill Hagestad II (15)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 

Dernier

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Chinese Military Cyber Capabilities Development 中国军队网络战能力

  • 1. Chinese Military Cyber Capabilities Development 中国军队网络战能力 2012-4-27 Since 2005, the number of Chinese troops for the invasion of the US network activities more and more. These network intrusion activities may gather intelligence for the US military system for activities, or to find weaknesses in the US network, or implanted in the US network virus. Thus, once the Sino-US conflict, the Chinese army can in a dominant position immediately. If these intrusions are carried out attacks against the US system, then the US military network system will malfunction or destroyed. On the facts, the computer network reconnaissance activities are in line with the traditional Chinese a strategy that "victory to win the soldiers then Qiuzhan, while defeated warriors go to war and then win." Through network reconnaissance operations before finding the enemy's weaknesses fits this strategy. This paper described the network support Chinese army launched a military invasion theory, especially on China's military strategy to carry out appointments electronic warfare and computer network to enable patriotic hackers and other activities. This paper also reviews the Chinese military network intrusion activities in recent years, and look at the military's most famous theory who offered public comment on information warfare. Chinese troops continue to enrich theory based on practice. Computer network warfare becomes part of the Chinese army in peacetime strategic activities. The purpose of the US military invasion of the activities of deep concern, it is a reconnaissance activity, or to the Trojan virus implanted into the US military and its allies in the network system, resulting in paralysis or wartime destruction of these systems. With the outside world understanding the development of information warfare, the Chinese army, China's intentions in terms of network intrusion into question US military and its allies. Network warfare units While the outside world do not know the Chinese army to carry out the real cause of network intrusion action, but some books or articles published by the army gives some explanation. Chinese military application of information technology and information technology are the armed forces constitute a huge impact on military technology, especially in the United States against Iraq affected by the use of technology. The impact of technology on Chinese military theory is that Chinese army believes that a country only in the information war to seize the initiative in advance, or to establish information superiority or information control, it could win the war, which requires prior combat to carry out reconnaissance and intelligence gathering activities, the foundation for network forces. Chinese military has been pursuing "active defense" strategy, that is, not the first attack others, but once attacked, fight back immediately. Over the past few years with the advent of the Internet, some changes occurred in this strategy. A lot of information disclosure describes a Chinese army troops and their offensive cyber warfare cyber warfare operations. Chinese military openly acknowledged the need for offensive cyber warfare, reflecting its great extent to break the traditional military thinking. In addition, Chinese military openly stated that the US military is dependent on computer systems require a great weakness of the study. If the Chinese military to weaken the US military on information warfare has the advantage, then it must study this weakness. In order to understand the evolution of Chinese troops from defense to attack thinking thinking, the author in 1999 began the development of information warfare will be described. Development of network attack strategy 1999. Military theorists who about 10 years ago, began to discuss the information on offensive operations, Zhu Wenquan and Anson 1999 coauthored an "information war" with one chapter devoted narrative "to carry out pre- emptive strikes in disguise." The authors point out the need to carry out pre-emptive strikes to destroy enemy forces
  • 2. attacked computer. Pre-emptive attacks, including network reconnaissance activities related to C4I systems to collect enemy’s performance, purpose, structure of information systems, and electronic warfare and weapons systems. The authors noted that from a broader sense, the computer information is part of the computer information reconnaissance attacks. They pointed out that: In order to carry out reconnaissance computer, you can use the computer information network established in peacetime, and with different identities to access the network to carry out reconnaissance activities. You can use computer experts strength, especially the strength hackers, computer perform reconnaissance missions. Use hackers obtain military information is a very effective way from your computer network. Should be familiar with network protocols and network intelligence accumulated. The authors noted that the Chinese army has established a small computer offensive and defensive combat troops to the implementation of network attacks. Forces conducted training courses, including how to design and organize activities viruses, how to infiltrate the enemy's computer networks. Attacking forces must continue to study and analyze the enemy's intentions. They must also be able to determine the location of the enemy's computer control center. November 1999, "Liberation Army Daily" published an article that China may need to set up an independent army Original Mandarin Chinese: 2005年以来,中国军队针对美国网络系统的入侵活动的次数越来越多。这些网络入侵活动可能为针对美军事系统的情 报搜集活动,或是寻找美军网络系统的弱点,或是在美军网络系统植入病毒。这样,一旦中美发生冲突,中国军队能够 立即处于优势地位。 如果这些入侵活动是对美军系统开展的攻击行动,那么美军网络系统就会发生故障或被毁坏。实事上,这些计算机网络 侦察活动是是符合中国传统的一个谋略,即“胜兵先胜而后求战,败兵先战而后求胜”。通过网络侦察活动在作战行动之 前寻找敌人的弱点正好符合这个战略。 本文主要说明支撑中国军队发动网络入侵行动的军事理论,特别是介绍了中国军队任用电子谋略开展计算机网络作 战和启用爱国骇客等活动。本文还回顾了中国军队近年的网络入侵活动,并审视军队中最有名的理论人士所提供的对信 息战的公开评论。 中国军队不断根据实践丰富理论。计算机网络战成为中国军队在和平时期开展的战略活动的一部分。美军对中军队 的入侵活动的目的深表担忧,它是一种侦察活动,还是为了将木马等病毒植入到美军及其盟军的网络系统中,从而在战 时使这些系统瘫痪或毁坏。随着外界深入了解中国军队的信息战发展情况,中国的在网络入侵方面的意图引起美军及其 盟军的质疑。 网络战部队 外界虽然不清楚中国军队开展网络入侵行动的真正原因,但是军队所出版的一些著作或文章给出了一些解释。中国 军队应用信息新技术及军队开展信息化建设都是技术对军事的构成的巨大影响,特别是受美国针对伊拉克所使用技术的 影响。这些技术对中国军事理论的影响是,中国军队认为,一个国家只有在信息战中事先夺取了主动权,或是建立起信 息优势或信息控制,才可能取得战争的胜利,这就需要在作战之前就开展侦察和情报搜集活动,为网络部队使用奠定基 础。 中国军队一直奉行“积极防御”战略,即不首先攻击别人,但一旦遭到攻击,就会立即还击。过去几年里随着网络的 出现,这个战略发生了一定的变化。大量公开的资料描述了中国军队的网络战部队及其进攻性网络战行动。中国军队公 开承认需要开展进攻性网络战,这反映出其极大程度地突破了传统的军事思想。此外,中国军队公开声称,美军依赖计 算机系统是一个很大的需要研究的弱点。如果中国军队削弱美军在信息战上所具有的优势,那么它就必须研究这个弱点 。为了解中国军队从防御思维向进攻思维的演变,作者从1999年信息战发展情况开始予以说明。 网络进攻战略的发展 1999年。军队理论界人士约在10年前就开始讨论信息进攻行动,1999年朱文泉与陈太一合著的《信息作战》利用 一个章节的篇幅叙述“开展伪装的先发制人攻击”。作者指出开展先发制人攻击需要摧毁敌人计算机攻击部队。先发制人 攻击活动包括网络侦察活动,搜集敌人有关C4I系统的性能、目的、系统结构的信息,以及电子战和武器系统。作者指 出,从更广泛的意义上来说,计算机信息侦察是计算机信息攻击的一部分。他们指出:为了开展计算机侦察,可以利用 在和平时期建立的计算机信息网络,并且以不同的身份访问网络开展侦察活动。可以借用计算机专家的力量,特别是骇 客的力量,执行计算机侦察任务。使用骇客从计算机网络中获得军事信息是一种非常有效的方式。应该熟悉网络协议并 积累网络情报。 作者指出,中国军队建立了小规模计算机进攻和防御对抗部队,以实施网络攻击行动。部队所开展的训练科目包括 如何设计和组织病毒入侵活动,如何渗透至敌人的计算机网络。进攻部队必须不断研究和分析敌人的意图。他们也必须 能够去伪存真,确定敌人的计算机控制中心的位置。