recommended reading

Pentagon: China Views Information Warfare as Key to Countering U.S. Pacific Forces

Soldiers of the Chinese People's Liberation Army's honor guard battalions march during a demonstration.

Soldiers of the Chinese People's Liberation Army's honor guard battalions march during a demonstration. // Andy Wong/AP

China views cyber warfare as the essential element to attack U.S. forces operating in the western Pacific, the Defense Department reported today in its annual analysis of that country’s military capabilities.

The Pentagon, in its report “Military and Security Developments Involving the People’s Republic of China,” said the People’s Liberation Army views space operations as “the commanding point for the information battlefield.” The report said PLA documents emphasized the necessity of “destroying, damaging and interfering” with an enemy’s reconnaissance and communications satellite systems.

If China goes to war, the report said, the country plans to control information, sometimes to seize the initiative and gain an advantage in the early phases of a campaign to achieve air and sea superiority.

“China is improving information and operational security to protect its own information structures, and is also developing electronic and information warfare capabilities, including denial and deception, to defeat those of its adversaries,” the report said.

Chinese doctrine puts a priority on computer network defense in peacetime, the report said. It views offensive information operations as an unconventional weapon, “which must be established in the opening phase of the conflict and continue during all phases of war,” with all potential adversaries. China sees the United States as particularly “information dependent,” the report said.

The report notes that China also uses cyber warfare as an espionage tool: “In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” the report said -- a statement reinforced by David Helvey, deputy assistant secretary of Defense for East Asia, at a Pentagon press briefing today.

Computer network intrusions detected in 2012 “were focused on exfiltrating information. China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,” the report said.

China is acquiring  a range of technologies to enhance its  counter-space capabilities so in time of war it can “bind and deafen the enemy,” according to  PLA writings, the report said, while at the same time beefing up its own space systems.

In December 2012, China turned on a regional navigation system to rival GPS. It plans to launch 100 satellites through 2015. The launches include imaging, remote sensing, navigation, communication, and scientific satellites, as well as manned spacecraft, the report said.

While the report depicts an increasingly robust and high-tech Chinese military, the country’s defense budget of $114 billion announced on March 13 amounts to just over 20 percent of the Pentagon’s 2014 budget request of $526.6 billion.   

Helvey said that Defense lacks total insight  into the Chinese military budget. He estimated that it ranges between $135 billion and $215 billion. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.