PLA discussions in Congress

china_iwar

Just Hatched
Registered Member
Interesting report released yesterday or today to the US Congress regarding Chinese cyberwarfare capabilities.

Ahem...apparently you don't trust me enough to include the actual link to the report...go to www dot uscc dot gov, it is right on the front page (released 3/8/12).

---------- Post added at 06:49 PM ---------- Previous post was at 06:43 PM ----------

Here is part of the executive summary...

Executive Summary

The PLA’s sustained modernization effort over the past two decades has driven remarkable transformation within the force and put the creation of modern command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) infrastructure at the heart of the PLA’s strategic guidelines for long term development. This priority on C4ISR systems modernization, has in turn been a catalyst for the development of an integrated information warfare (IW) capability capable of defending military and civilian networks while seizing control of an adversary’s information systems during a conflict.

Information Warfare Strategy

PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground, occupying which has become just as important for controlling the battlespace as its geographic equivalent in the physical domain.
The PLA has not publicly disclosed the existence of a computer network operations strategy distinct from other components of IW, such as electronic warfare, psychological operations, kinetic strike, and deception, but rather appears to be working toward the integration of CNO with these components in a unified framework broadly known as “information confrontation.” This concept, as discussed by the PLA, seeks to integrate all elements of information warfare—electronic and non-electronic—offensive and defensive under a single command authority.

Earlier in the past decade, the PLA adopted a multi-layered approach to offensive information warfare that it calls Integrated Network Electronic Warfare or INEW strategy. Now, the PLA is moving toward information confrontation as a broader conceptualization that seeks to unite the various components of IW under a single warfare commander. The need to coordinate offensive and defensive missions more closely and ensure these missions are mutually supporting is driven by the recognition that IW must be closely integrated with PLA campaign objectives. The creation of what a probable information assurance command in the General Staff Department bureaucracy suggests that the PLA is possibly creating a more centralized command authority for IW that will possibly be responsible for coordinating at least network defense throughout the PLA.

As Chinese capabilities in joint operations and IW strengthen, the ability to employ them effectively as either deterrence tools or true offensive weapons capable of degrading the military capabilities of technologically advanced nations or hold these nations’ critical infrastructure at risk in ways heretofore not possible for China will present U.S. leaders and the leaders of allied nations with a more complex risk calculus when evaluating decisions to intervene in Chinese initiated conflicts such as aggression against Taiwan or other nations in the Western Pacific region.

Chinese Use of Network Warfare Against the United States

Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict. A defense of Taiwan against mainland aggression is the one contingency in the western Pacific Ocean in which success for the United States hinges upon the speed of its response and the ability of the military to arrive on station with sufficient force to defend Taiwan adequately. PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict.

The effects of preemptive penetrations may not be readily observable or detected until after combat has begun or after Chinese computer network attack (CNA) teams have executed their tools against targeted networks. Even if circumstantial evidence points to China as the culprit, no policy currently exists to easily determine appropriate response options to a large scale attack on U.S. military or civilian networks in which definitive attribution is lacking. Beijing, understanding this, may seek to exploit this gray area in U.S. policymaking and legal frameworks to create delays in U.S. command decision making.

...it goes on for another for another few pages, very interesting reading.
 
Interesting report released yesterday or today to the US Congress regarding Chinese cyberwarfare capabilities.

Ahem...apparently you don't trust me enough to include the actual link to the report...go to www dot uscc dot gov, it is right on the front page (released 3/8/12).

...it goes on for another for another few pages, very interesting reading.


What's disturbing yet perhaps stabilizing like nuclear war MAD is that technology has developed to the point where extremely destructive weaponry in cyberspace, space, and even conventional warfare (stealth aircraft and precision weapons etc.) are unobservable by most people and capabilities are unclear yet destruction is likely to be vast and speedy. It's as if the militaries with these capabilities have taken on more the character of assasins rather than soldiers.
 

china_iwar

Just Hatched
Registered Member
What's disturbing yet perhaps stabilizing like nuclear war MAD is that technology has developed to the point where extremely destructive weaponry in cyberspace, space, and even conventional warfare (stealth aircraft and precision weapons etc.) are unobservable by most people and capabilities are unclear yet destruction is likely to be vast and speedy. It's as if the militaries with these capabilities have taken on more the character of assasins rather than soldiers.

Well I am not sure that is avoidable, after all warfare when boiled down to it's essence is about doing as much harm to your opponent as quickly as possible. Personally what I find most interesting about cyberwarfare are it's parallels between the introduction of the aircraft to warfare almost exactly a century ago.
 
Well I am not sure that is avoidable, after all warfare when boiled down to it's essence is about doing as much harm to your opponent as quickly as possible. Personally what I find most interesting about cyberwarfare are it's parallels between the introduction of the aircraft to warfare almost exactly a century ago.

I am concerned as much with the implications of this within a country as much as between multiple countries.

With the move towards "professional" militaries, large segments of society have minimal participation in and interaction with their own militaries. The same alienation applies in the other direction in terms of how well members of "professional" militaries relate to the rest of their societies. With pay, benefits, and maybe access to weaponry and an eager trigger finger being the drivers for people to become members of "professional" militaries these organizations are likely to become more mercenary.

Mercenary militaries which do not reflect their societies at large, with access to almost omnipotent assassination capable weaponry could very well destroy civilian governance as we know it. Though outsized corporate influence is probably doing that already.

Bring back the draft.
 
Top