recommended reading

Pentagon: China Views Information Warfare as Key to Countering U.S. Pacific Forces

Soldiers of the Chinese People's Liberation Army's honor guard battalions march during a demonstration.

Soldiers of the Chinese People's Liberation Army's honor guard battalions march during a demonstration. // Andy Wong/AP

China views cyber warfare as the essential element to attack U.S. forces operating in the western Pacific, the Defense Department reported today in its annual analysis of that country’s military capabilities.

The Pentagon, in its report “Military and Security Developments Involving the People’s Republic of China,” said the People’s Liberation Army views space operations as “the commanding point for the information battlefield.” The report said PLA documents emphasized the necessity of “destroying, damaging and interfering” with an enemy’s reconnaissance and communications satellite systems.

If China goes to war, the report said, the country plans to control information, sometimes to seize the initiative and gain an advantage in the early phases of a campaign to achieve air and sea superiority.

“China is improving information and operational security to protect its own information structures, and is also developing electronic and information warfare capabilities, including denial and deception, to defeat those of its adversaries,” the report said.

Chinese doctrine puts a priority on computer network defense in peacetime, the report said. It views offensive information operations as an unconventional weapon, “which must be established in the opening phase of the conflict and continue during all phases of war,” with all potential adversaries. China sees the United States as particularly “information dependent,” the report said.

The report notes that China also uses cyber warfare as an espionage tool: “In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” the report said -- a statement reinforced by David Helvey, deputy assistant secretary of Defense for East Asia, at a Pentagon press briefing today.

Computer network intrusions detected in 2012 “were focused on exfiltrating information. China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,” the report said.

China is acquiring  a range of technologies to enhance its  counter-space capabilities so in time of war it can “bind and deafen the enemy,” according to  PLA writings, the report said, while at the same time beefing up its own space systems.

In December 2012, China turned on a regional navigation system to rival GPS. It plans to launch 100 satellites through 2015. The launches include imaging, remote sensing, navigation, communication, and scientific satellites, as well as manned spacecraft, the report said.

While the report depicts an increasingly robust and high-tech Chinese military, the country’s defense budget of $114 billion announced on March 13 amounts to just over 20 percent of the Pentagon’s 2014 budget request of $526.6 billion.   

Helvey said that Defense lacks total insight  into the Chinese military budget. He estimated that it ranges between $135 billion and $215 billion. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.