Countering information warfare
By Peter Brookes, Special to The China Post
October 18, 2007, 12:00 am TWN
The PLA has invested heavily in developing its cyberwarfare capabilities, including openly expressing a desire to develop information warfare expertise — and boasting of its growing sophistication in the field.
The PLA has incorporated cyberwarfare tactics into military exercises and created schools that specialize in IW. It is also hiring top computer-science graduates to develop its cyberwarfare capabilities and, literally, creating an ‘army of hackers.’
Despite its unprecedented military buildup, the Chinese realize, for the moment, they still cannot win a conventional war against the U.S. and are, naturally, seeking unorthodox — or asymmetric — ways to defeat the U.S. in a conflict over Taiwan or elsewhere.
China is developing weapons, including the so-called ‘assassin’s mace’ that will allow China to balance the U.S.’s military superiority by attacking ‘soft spots’ such as its high-value computer networks.
The idea that a less-capable foe can take on a militarily superior opponent also aligns with the thoughts of the ancient Chinese general, Sun Tzu. In his Art of War, he advocates stealth, deception and indirect attack to overcome a stronger opponent. Overlaying the still-influential Sun Tzu onto modern Chinese military thought could lead one to conclude the PLA believes a Chinese ‘David’ could, in fact, slay a U.S. ‘Goliath’ using an asymmetrical military option such as cyberwarfare.
The PLA’s U.S. target list is expansive, including command, control, communications, computers and intelligence nodes, airbases and even aircraft carrier strike groups — China’s bete noir in a Taiwan contingency.
Industrial espionage against government and private defense research, development and production concerns is also a priority for Chinese cyber-spies, cutting costs and time in support of Beijing’s massive effort to develop a world-class defense industry.
Even more troubling, however, is the assertion among analysts that potential Chinese cyber-strikes are not limiting themselves to just diplomatic and security-related targets. Private-sector financial and economic institutions may also be on the PLA’s hit list.
Nor is China limiting itself to the U.S., France, Germany and the UK. Beijing is looking for cyber-dominance over other key potential regional rivals such as Delhi, Moscow, Seoul, Tokyo and Taipei. Wellington also recently reported an incident.
China’s IW efforts and activities provide a cautionary tale to U.S. and other policymakers. Fortunately, many governments have devoted significant resources to cyber-security, including measures against terrorists and amateur hackers.
The recent Chinese intrusions, however, clearly demonstrate remaining vulnerabilities and IW is here and now, making it increasingly important— and complementary — to the broad spectrum of modern warfare.
A ‘digital Pearl Harbor’ for any country is by no means a certainty, but then again, no one believed that terrorists would fly aircraft into buildings. The time to take heed of the cyber threat — Chinese or otherwise — is now.
Peter Brookes is a Heritage Foundation senior fellow and former U.S. deputy assistant secretary of defense.