- Page 2 and 3: Cover: China’s cyber activities a
- Page 4 and 5: FOREWORD China’s cyber policy has
- Page 6 and 7: To conduct this transformation, inf
- Page 8 and 9: efforts to attain a strategic advan
- Page 10 and 11: PART ONE CYBER PEACE ACTIVIST
- Page 12 and 13: This chapter first will discuss the
- Page 14 and 15: equal concern was that these inform
- Page 16 and 17: other people.” 38 The state found
- Page 18 and 19: Second, China should cultivate dive
- Page 20 and 21: people’s thinking and cognitive p
- Page 22 and 23: incidents from occurring. 71 Much l
- Page 24 and 25: Hu Quanliang, the chief editor of t
- Page 26 and 27: In another example, to offset US ex
- Page 28 and 29: anticipate future developmental tre
- Page 32 and 33: deterrence. It will then look at th
- Page 34 and 35: strategic deterrence must be built
- Page 36 and 37: Former Chinese President Jiang Zemi
- Page 38 and 39: manipulate the start and conclusion
- Page 40 and 41: latter controls ten of the worlds t
- Page 42 and 43: analytical frameworks and a strateg
- Page 44 and 45: Can retaliators hold assets of the
- Page 46 and 47: characteristics that we must work w
- Page 48 and 49: supercomputer that is 100 times fas
- Page 50 and 51: Several other cyber or information-
- Page 52 and 53: defensive Internet strategies. 229
- Page 54 and 55: Shenzhen as the source of the parts
- Page 56 and 57: training; and comprehensive support
- Page 58 and 59: and eliminates many ground-based te
- Page 60 and 61: PART TWO CYBER INTELLIGENCE ACTIVIS
- Page 62 and 63: activities as soon as possible. Lef
- Page 64 and 65: measures, electronic warfare, elect
- Page 66 and 67: The Symantec Corporation’s analys
- Page 68 and 69: publicly available.” 289 The repo
- Page 70 and 71: eak into computers at US embassies
- Page 72 and 73: for government agencies. 301 Markof
- Page 74 and 75: termed soft psychological power. Fo
- Page 76 and 77: organized integration of military a
- Page 78 and 79: acquisition of US bonds; or how mig
- Page 80 and 81:
shi as the combination of the frien
- Page 82 and 83:
that in China there is the saying:
- Page 84 and 85:
Chinese have learned to operate in
- Page 86 and 87:
Mr. Henderson breaks the control me
- Page 88 and 89:
PART THREE CYBER ATTACK PLANNER
- Page 90 and 91:
key. 368 Control over war situation
- Page 92 and 93:
change from its original form in th
- Page 94 and 95:
objective: to use information techn
- Page 96 and 97:
is said to have information inferio
- Page 98 and 99:
1-02, DOD Dictionary of Military an
- Page 100 and 101:
completely destroy information syst
- Page 102 and 103:
used to produce illusions (both rea
- Page 104 and 105:
via rote memory from past experienc
- Page 106 and 107:
nation’s cultural proclivities. T
- Page 108 and 109:
his 48th Blue Force victory. The Bl
- Page 110 and 111:
two journalists reported, went to t
- Page 112 and 113:
The South Sea Fleet has also engage
- Page 114 and 115:
CHAPTER NINE: CHINA’S SYSTEM OF S
- Page 116 and 117:
vogue in the PLA, as General Dai’
- Page 118 and 119:
decision-making, and sabotaging ene
- Page 120 and 121:
e one of the big differences betwee
- Page 122 and 123:
6. “A Study on Improving Core Log
- Page 124 and 125:
integration and for assisting decis
- Page 126 and 127:
psychological, public opinion, and
- Page 128 and 129:
same time hiding them in enemy syst
- Page 130 and 131:
A precondition for commanding SoS o
- Page 132 and 133:
nuclear, biological, and chemical (
- Page 134 and 135:
CHAPTER TEN BEYOND CYBER: CHINA’S
- Page 136 and 137:
eing developed or are not yet used
- Page 138 and 139:
guns, coil guns, and reconnection g
- Page 140 and 141:
China, according to a Taipei Times
- Page 142 and 143:
CHAPTER ELEVEN: COMPARING CHINESE A
- Page 144 and 145:
control, and precision attacks—re
- Page 146 and 147:
its impact on the conscience of the
- Page 148 and 149:
The Concept of Information Deterren
- Page 150 and 151:
Escalation models Civil infrastruct
- Page 152 and 153:
PART FOUR CONCLUSIONS AND APPENDIXE
- Page 154 and 155:
There is a strong Chinese focus on
- Page 156 and 157:
as well. The Chinese write that the
- Page 158 and 159:
APPENDIX ONE: IW ARTICLES IN CHINA
- Page 160 and 161:
Number 5, 2010 “Theme Forum: Theo
- Page 162 and 163:
Number 4, 2009 “Air Superiority i
- Page 164 and 165:
meant to be thought-provoking. It i
- Page 166 and 167:
Natural resources (in the case of t
- Page 168 and 169:
subjective and objective is a diale
- Page 170 and 171:
are not the same thing. Thinking
- Page 172 and 173:
Stratagems When US planners gather
- Page 174 and 175:
Li Qi believes that the development
- Page 176 and 177:
thinking has such shortcomings and
- Page 178 and 179:
Diqing, Campaign Course Materials,
- Page 180 and 181:
circumstances to victory. 734 So, h
- Page 182 and 183:
an opponent’s deterrence capabili
- Page 184 and 185:
A 2009 article in China Military Sc
- Page 186 and 187:
world affairs. He states: The devel
- Page 188 and 189:
and social security issues. Chairma
- Page 190 and 191:
Yao provides a glimpse of the growi
- Page 192 and 193:
ole in international relationships
- Page 194 and 195:
for its developmental needs and to
- Page 196 and 197:
presence and a deterrence posture o
- Page 198 and 199:
stirring up confrontation (read “
- Page 200 and 201:
with layers of “island chains”
- Page 202 and 203:
a strategy of regional defense. 844
- Page 204 and 205:
Li Jinming, Professor with the Rese
- Page 206 and 207:
University, stated that Vietnam int
- Page 208 and 209:
High-Technology Company is aiming t
- Page 210 and 211:
Meanwhile, rare-earth industry down
- Page 212 and 213:
Simultaneously, Japan is trying to
- Page 214 and 215:
instead of the US method of killing
- Page 216 and 217:
an enemy’s telephone networks, oi
- Page 218 and 219:
Grand Strategies; A Grand Panoramic
- Page 220 and 221:
DEDICATION This book is dedicated t
- Page 222 and 223:
Footnotes 1 Fang Binxing, in Richar
- Page 224 and 225:
44 Wu Jiao and Ai Yang, “Putting
- Page 226 and 227:
90 Ibid. 91 Ibid. 92 Ding Chunguang
- Page 228 and 229:
Science, issue number is unknown, 2
- Page 230 and 231:
183 Roger Barnett, “Information O
- Page 232 and 233:
225 Wang Dongpin and Liu Gang, “G
- Page 234 and 235:
265 Ibid., p. 12. 266 Bryan Krekel
- Page 236 and 237:
303 David Barboza, “Hacking Inqui
- Page 238 and 239:
Publishing House, 2005. The section
- Page 240 and 241:
393 Ibid., pp. 95-96. 394 Ibid., p.
- Page 242 and 243:
Information Warfare,” Jiefangjun
- Page 244 and 245:
478 Ding Haiming, Wang Yongxiao, Zh
- Page 246 and 247:
Bao Online, 24 September 2010. 513
- Page 248 and 249:
of Systems Operations,” China Mil
- Page 250 and 251:
601 Song and Geng, p. 300. 602 Ibid
- Page 252 and 253:
646 Mike McConnell, Michael Chertof
- Page 254 and 255:
Systems Operations,” China Milita
- Page 256 and 257:
739 Ibid., pp. 42-43. 740 Ibid., p.
- Page 258 and 259:
Comprehensive National Power Plus S
- Page 260 and 261:
842 Ibid. 843 Cao Wenzhen, “US-Ch
- Page 262 and 263:
February 2009. 888 “Revised Progr