1,292
Views
2
CrossRef citations to date
0
Altmetric
ARTICLES

Information Warfare: China's Response to U.S. Technological Advantages

Pages 682-706 | Published online: 21 Aug 2006

REFERENCES

  • Operation Unified Assistance was the coordinated relief efforts for the victims of the 26 December 2004 Indian Ocean Tsunami .
  • Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries . Joint Publication (JP) 1 – 02 , Department of Defense , DoD Dictionary of Military and Associated Terms .
  • Note: the revised but unapproved version of JP 3–13 (dated 8 July 2004) defines IO as “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”
  • JP 1 – 02 , DoD Dictionary of Military and Associated Terms , dated 12 April 2001 , amended 7 October 2004 .
  • Note: As stated earlier, China equates the U.S. term Information Operations to its Information Warfare .
  • Wang Baocun , “ A preliminary Analysis of IW ,” Zhongguo Junshi Kexue (China Military Science ), No. 4, 20 November 1997 , pp. 102 – 111 , accessed at the FBIS Website on 13 December 2004 .
  • That degree of dominance in the information domain which permits the conduct of operations without effective opposition . JP 1 – 02 , DoD Dictionary of Military and Associated Terms .
  • Thomas Cleary , The Art of War by Sun Tzu ( , Shambhala Dragon Editions, Shambhala Publications , 1988), pp. 67.
  • The total war concept called for war against the nation as a whole, not just its military forces . Carl von Clausewitz , On War , edited and translated by Michael Howard and Peter Paret ( Princeton , NJ : Princeton University Press , 1989 ), pp. 645 .
  • This conference held by the Strategic Studies Institute (SSI) of the US Army War College convenes annually . In 1999 , the SSI held the conference jointly with the American Enterprise Institute .
  • James R. Lilley , “ The Future of Chinese Military Power ,” Defense Intelligence Journal (China ), Vol. 10 , No. 1 , Winter 2001 , pp 19 – 25 . [CSA]
  • Timothy L. Thomas , Chinese Information-War Theory and Practice , Foreign Military Studies Office (FMSO ), Fort Leavenworth , Kansas , June 2004 , p. 7 .
  • The Eighth Army Group , “ A Look Back at the Great China–US Hacker War of 2001 ,” Jisuanji Shijie ( yesky.com ), 18 January 2004 , accessed at the FBIS Website on 13 December 2004 .
  • The China Eagle Union was one of several Chinese Nationalist hackers/groups involved in the May 2001 hacker war. Sources documenting the “event” have credited them for coordinating some of the Chinese hacker “retaliations.”
  • FBIS, “China Eagle Union Forms Online Combat Troop, Pilots People's Reserve Information Warfare Company,” China Eagle Union Website, 16 November 2004, accessed at the FBIS Website on 13 December 2004 .
  • Xu Xiaoyan , “ Establishing an Information Resource Mobilization Mechanism with Chinese Characteristics ,” Zhongguo Junshi Kexue (China Military Science ), 20 October 2000 , pp. 77 – 82 , 95, accessed at the FBIS Web page on 14 December 2004 . [CSA]
  • Timothy L. Thomas , Chinese Information-War Theory and Practice , p. 65 .
  • Wen T'ao , “ PLA Bent on Seizing ‘Information Control ’,” Hong Kong Ching Pao , 1 June 2002 , No. 299, pp. 44 – 46 , accessed at the FBIS Web page on 2 February 2005 . [CSA]
  • Cheng Tung-lung , “ Secret Intelligence: Summary of Exercises Shows the Purpose Is to Attack the Island and Strike at Warships ,” Taipei Tung-sen Hsin-Wen Pao , 3 March 2002 , accessed at the FBIS Website on 1 February 2005 . [CSA]
  • Ibid ., pp. 80 . [CSA]
  • JP 1 – 02 , DoD Dictionary of Military and Associated Terms , dated 12 April 2001 , amended 7 October 2004 .
  • Nui Li , Li Jiangzhou , and Xu Dehui , “ Planning and Application of Strategies of Information Operations in High-Tech Local War ,” Zhongguo Junshi Kexue (China Military Science ), No. 4, 20 August 2000 , pp. 115 – 122 , accessed at the FBIS Web site on 16 December 2004 . [CSA]
  • Timothy L. Thomas , Chinese Information-War Theory and Practice , pp. 87 – 89 .
  • Ibid . [CSA]
  • Lan Bo , “ What Is Purpose of First China-Russia Joint Exercise? ,” Xinhua Wang , 16 December 2004 , accessed at the FBIS Web site on 17 December 2004 .
  • “Naval Laser Weapons Surveyed,” Jianchuan Zhishi (Naval and Merchant Ships ), No. 7, 1 July 1996, pp. 32–33, accessed at the FBIS Website on 19 December 2004.
  • Chen Xuejun and Lang Daqiang “ Methods for Defeating GPS ,” Junshi Wenzhai , 1 November 2004 , pp. 52 – 53 , accessed at the FBIS Website on 17 December 2004 .
  • Nui Li , Li Jiangzhou , and Xu Dehui , “ Planning and Application of Strategies of Information Operations in High-Tech Local War .”
  • Timothy L. Thomas , Chinese Information-War Theory and Practice , pp. 87 – 89 .
  • Martin C. Libicki , “ What Is Information Warfare?” Center for Advanced Concepts and Technology, National Defense University, August 1995. The entire pamphlet is devoted to identifying and describing the seven forms of information warfare posited by Libicki . See especially pp. 7 – 8 and 87 – 89 .
  • Timothy L. Thomas , “ Deterring Information Warfare: A New Strategic Challenge,” Foreign Military Studies Office (FMSO), Fort Leavenworth, accessed at the FMSO Website on 10 December 2004 .
  • JP 3 – 13 , Joint Doctrine for Information Operations, , Second Draft, 14 December 2004 .
  • Timothy L. Thomas , “ Deterring Information Warfare: A New Strategic Challenge .”
  • Ibid . [CSA]
  • Jonathan Lockwood and Kathleen Lockwood , The Russian View of US Strategy: Its Past, Its Future, , Fourth edition ( New Brunswick , NJ : Transaction Publishers , 1993 ), pp. 60 – 61 .
  • Timothy L. Thomas , “ Deterring Information Warfare: A New Strategic Challenge .”
  • Bill Gertz , The China Threat: How the People's Republic Targets America ( Washington , DC : Regnery Publishing , 2000 ), p. 8 .
  • Andrew McClain , “ Will China Attack Taiwan? What China-Watchers Should Be Looking for ,” Defense Intelligence Journal ( China ), Vol. 10 , No. 1 , Winter 2001 , pp. 61 . [CSA]
  • Ibid ., pp. 59 – 69 . [CSA]
  • Ibid ., p. 66 . [CSA]
  • Ibid . [CSA]
  • Commercial airlines were used extensively to augment limited military airlift capabilities during Gulf War I, II and Operation IRAQI FREEDOM. With the continued drawdown of forces, it is reasonable to believe this trend would continue during a U.S.–China–Taiwan conflict . [CSA]
  • Microsoft Press Release, “China Information Technology Security Certification Center Source Code Review Lab Opened,” accessed 26 January 2005 at http://www.microsoft.com/presspass/press/2003/sep03/09–26GSPCHPR.asp
  • Zheng Yu , “ Using Force Against Taiwan ,” Wen Wei Po ( Hong Kong ), 25 September 2000 , accessed at the FBIS Web site on 2 February 2005 .
  • Bill Gertz , The China Threat: How the People's Republic Targets America , pp. 76 – 77 .
  • The Panama Canal serves as a major transit point for U.S. naval forces moving from the Atlantic to Pacific region. Loss of passage through the canal means U.S. forces in the Atlantic must sail completely around South America in order to reinforce forces in the Pacific . [CSA]
  • Richard Lister , “ Panama Canal: America's strategic artery,” BBC News Online, 8 December 1999, accessed 2 February 2005 at http://news.bbc.co.uk/1/hi/world/americas/553979.stm
  • Andrew McClain , “ Will China Attack Taiwan? What China-Watchers Should Be Looking for .”
  • Zheng Yu , “ Using Force Against Taiwan .”
  • Andrew McClain , “ Will China Attack Taiwan? What China-Watchers Should Be Looking for .”
  • Ibid ., p. 66 . [CSA]
  • Andrew Toppan , “ World Navies Today: China,” (Haze Gray Website, World Navies), accessed on 26 January 2005 at www.hazegray.org/worldnav/
  • Chen Xuejun and Lang Daqiang “ Methods for Defeating GPS,” Junshi Wenzhai .
  • The Democratic Peoples Republic of Korea (DPRK) government released similar rhetoric during the planning and mobilization phases of the wars in Afghanistan and to remove Iraqi President Saddam Hussein .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.