Chinese cyberspace mr timothy l thomas fmso january 2010
Download
1 / 38

CHINESE CYBERSPACE - PowerPoint PPT Presentation


  • 407 Views
  • Uploaded on

CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010 TABLE OF CONTENTS (18 CHAPTERS) THE INEVITABLE INTERNET WAR BATTLES FOR INTERNET CONTROL OFFENSIVE AND DEFENSIVE INTERNET WARS THE INTERNET WILL DETERMINE VICTORY IN FUTURE WARS DANGEROUS VIRTUAL REALITY

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'CHINESE CYBERSPACE' - Ava


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Chinese cyberspace mr timothy l thomas fmso january 2010 l.jpg
CHINESE CYBERSPACE MR. TIMOTHY L. THOMAS FMSO, JANUARY 2010


Table of contents 18 chapters l.jpg
TABLE OF CONTENTS (18 CHAPTERS)

  • THE INEVITABLE INTERNET WAR

  • BATTLES FOR INTERNET CONTROL

  • OFFENSIVE AND DEFENSIVE INTERNET WARS

  • THE INTERNET WILL DETERMINE VICTORY IN FUTURE WARS

  • DANGEROUS VIRTUAL REALITY

  • FINANCIAL WARS IN THE INTERNET WORLD


Slide5 l.jpg
RMA

  • War with the objective of expanding territory has already basically withdrawn from the stage of history, and even war with the objective of fighting for natural resources is now giving way to war with the objective of controlling the flow of financial capital.


China looks at cyberspace l.jpg
China Looks at Cyberspace

  • History—the Art of War and packets of electrons

  • Comprehensive national power changes in accordance with new technology—which influences military affairs—gaining the initiative a prerequisite

  • Laws and regulations are different than ours—ask Google!


Slide7 l.jpg

Stratagem (EBO?) is designed to mislead enemy processes of perception, thinking, emotion and will; use of packets of electrons as stratagems


Chinese internet strategy l.jpg
CHINESE INTERNET STRATEGY perception, thinking, emotion and will; use of packets of electrons as stratagems

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSE AS IMPORTANT AS DEFENSE


Chinese internet strategy10 l.jpg
CHINESE INTERNET STRATEGY perception, thinking, emotion and will; use of packets of electrons as stratagems

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSIVE AS IMPORTANT AS DEFENSIVE


Network warfare deterrence liberation army daily march 2007 l.jpg
Network Warfare Deterrence perception, thinking, emotion and will; use of packets of electrons as stratagemsLiberation Army Daily, March 2007

  • To offset network warfare deterrence of the country holding information network hegemony, we not only need to pay attention to raising our offensive operations capabilities in network warfare but also our defensive capabilities. We should make unremitting efforts to seek such a preemptive opportunity through developing network technology and systems.


Chinese internet strategy12 l.jpg
CHINESE INTERNET STRATEGY perception, thinking, emotion and will; use of packets of electrons as stratagems

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSIVE AS IMPORTANT AS DEFENSIVE


Dai direct iw l.jpg
Dai—Direct IW perception, thinking, emotion and will; use of packets of electrons as stratagems

  • Computer network reconnaissance is the prerequisite for seizing victory in warfare. It helps to choose opportune moments, places, and measures for attack.


Methods l.jpg
Methods perception, thinking, emotion and will; use of packets of electrons as stratagems

  • Focus on collecting technical parameters and specific properties of all categories of information weapon systems and electronic information products


Chinese internet strategy16 l.jpg
CHINESE INTERNET STRATEGY perception, thinking, emotion and will; use of packets of electrons as stratagems

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSE AS IMPORTANT AS DEFENSE


Slide17 l.jpg
“A victorious army first wins and then seeks battle. A defeated army first battles and then seeks victory.” Sun Tzu, The Art of War


Shi strategic advantage according to the chinese l.jpg
Shi (Strategic Advantage) According to the Chinese defeated army first battles and then seeks victory.”

  • Tao Hanzhang, Chinese General: shi is “the strategically advantageous posture before a battle that enables it to have a flexible, mobile, and changeable position during a campaign.”


Chinese internet strategy19 l.jpg
CHINESE INTERNET STRATEGY defeated army first battles and then seeks victory.”

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSE AS IMPORTANT AS DEFENSE


Http googleblog blogspot com 2010 01 new approach to china html l.jpg
http://googleblog.blogspot.com/2010/01/new-approach-to-china.htmlhttp://googleblog.blogspot.com/2010/01/new-approach-to-china.html

  • Mid-Dec Chinese cyber attack caused the theft of intellectual property from Google. 20 other companies from finance, technology, and the media and chemical sectors were similarly targeted. A primary goal of the attackers was to access Gmail accounts of Chinese human rights activists.


Chinese internet strategy21 l.jpg
CHINESE INTERNET STRATEGYhttp://googleblog.blogspot.com/2010/01/new-approach-to-china.html

  • SEEK PREEMPTION

  • COMPUTER RECONNAISSANCE A PREREQUISITE TO VICTORY

  • CHINESE STRATAGEMS AND “ELECTRONIC SHI”

  • RECONNAISSANCE OF BANKS, INDUSTRY, MILITARY, ETC. SITES WORLDWIDE—COLLECT TECHNICAL PARAMETERS

  • OFFENSE AS IMPORTANT AS DEFENSE


Deciphering information security l.jpg

The issue of information and network security, which accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

Deciphering Information Security


China doesn t do pmesii pt l.jpg
CHINA DOESN’T DO accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy. PMESII-PT

  • Strategic/objective environment

  • War engineering and control/system sabotage

  • War versus non-war actions; combinations of military actions


China doesn t do pmesii pt28 l.jpg
CHINA DOESN’T DO accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy. PMESII-PT

  • Strategic/objective environment

  • War engineering and control/system sabotage

  • War versus non-war actions; combinations of military actions


Shen at lanzhou l.jpg
Shen at Lanzhou accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

  • Military power was calculated by adding the number of divisions, aircraft, and carriers. Now we must figure intangibles as well, such as computing capability, communications capability and reliability, and real-time surveillance. “An ounce of silicon”may be more potent than a “ton of radium.”


China doesn t do pmesii pt30 l.jpg
CHINA DOESN’T DO accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy. PMESII-PT

  • Strategic/objective environment

  • War engineering and control/system sabotage

  • War versus non-war actions; combinations of military actions


War engineering issue 3 2007 in zhongguo junshi kexue l.jpg
War Engineering, Issue 3, 2007 in accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy. ZhongguoJunshiKexue

A method of systems engineering that studies, designs, tests, controls, and evaluates war systems based on information technology.


Hu xiaofeng cont l.jpg
Hu Xiaofeng (cont.) accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

  • War engineering takes all of war space and time into consideration as well as politics, military affairs, economics, and diplomacy to obtain the best results overall. Regardless of the situation, one must achieve effective control of war systems to gain real-time control of the course of operations.

  • The path to victory depends on making innovations, which means creating asymmetries in the shape of warfare, methods of operations, and in war methods and training methods. Only then is war control possible.


China doesn t do pmesii pt33 l.jpg
CHINA DOESN’T DO accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy. PMESII-PT

  • Strategic/objective environment

  • War engineering and control/system sabotage

  • War versus non-war actions; combinations of military actions


Other military actions l.jpg
Other Military Actions… accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

  • Sichuan Earthquake—a non-war military activity that was an informatized warfare practice session

  • Combinations and lethal cocktail mixtures— the book Unrestricted War and 24 methods of conflict (economic, diplomatic, information, electronic, blockade, etc.)


Expansion of culture via digital means l.jpg
Expansion of Culture via Digital Means accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

  • China must take action to “propel China’s culture industry and media industry beyond China’s borders in an effort to take over the international culture market”

  • Simulate cultural battles to learn how to use the media effectively

  • Increased aggressiveness of Chinese students in at least one US university


China versus the u s l.jpg

ARE THEY PLAYING RUGBY WHILE WE PLAY FOOTBALL? accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

HOW WELL ARE WE SCOUTING THE OTHER TEAMS?

CHINA VERSUS THE U.S.


Slide38 l.jpg

Timothy Lee Thomas accompanies the development of informationization and the rise of information warfare, is an issue of technology, but above all else it is an issue of strategy.

Foreign Military Studies Office (FMSO)

Phone: 913-684-5957

Fax: 913-684-5960

[email protected]

http://fmso.leavenworth.army.mil


ad