How the chinese conduct cyber warfare operations, by exploiting ict systems on selected targets

HOW THE CHINESE CONDUCT CYBER WARFARE OPERATIONS, BY EXPLOITING
ICT SYSTEMS ON SELECTED TARGETS
Student’s Name
Institutional Affiliation
Date
1
Literature Review
This chapter presents a literature review and analysis of the how the Chinese carry out
Cyber warfare processes by manipulating ICT systems flaws on carefully chosen targets. The
primary purpose of this section is, therefore, to evaluate China’s cyber warfare capabilities while
simultaneously attempting to answer the question about the likely implications for bilateral as
well as Cross Straight Relations with the United States of America. Libicki defines cyber warfare
as cyber confrontation perpetuate by nation-states against other countries. The practice, however,
encompasses different forms of attacks carried out by terrorist groups or hackers with the aim of
promoting the goals of one state against another. Cyber warfare is made possible by cyberspace
which represents an artificial sphere that has evolved during the current century to provide
incredible benefits on the one hand while generating new challenges and risks to cybersecurity.
Currently, government agencies and global ICT bodies have increased their focus on
cybersecurity thereby making cyber warfare essential policy issues in the context of national
security.
Due to increasing national security concerns, the United is engaged in a process to
develop different strategies aimed at enhancing its capacity to growing threat posed by the ability
to emerge nations to conduct cyber warfare by exploiting different ICT systems of selected
targets. However, these efforts have been limited by the lack of a proper definition of the
construct of cyberwar in the country. Kanke and Clarke note that a concise interpretation and
understanding of the concept and associated terminologies are crucial in appreciating the
capacity of different nation-states such as China to carry out warfare through cyberspace by
exploiting ICT systems of selected targets. More importantly, this practice as conceptualized by
2
the Chinese aims at undermining the position of the United States the world leader from a
political, economic, military, and technological perspective
1
.
Cyber warfare is not possible without cyberspace. According to Tabansky, cyberspace as
the inter-connected informational technology infrastructure consisting of the internet, computing
devices, computer-based telecommunication systems in addition to the information processed
and disseminated via these systems. Other components of cyberspace include tasks specific to
the systems, and these differ significantly concerning size, complexity and the control of
different functionalities regarding diverse ambiguous processes. Control functionalities are
increasingly becoming computerized, and thus the terminology cyber in this context refers to
control aspects of cyberspace
2
.
Cyber warfare as defined by Hjortdal relates to activities that employ and target network
systems, virtual control structures and by criminal assemblages or state actors to cause maximum
damage in a manner analogous to ordinary warfare. It thus encompasses the deployment of
offensive as well as defensive stratagems to address a multitude of threats emanating from
espionage, sabotage, and cyber-attacks
3
. Knake and Clarke provide a more suitable definition, an
explanation for the concept in that cyber warfare is a collection of diverse actions carried out by
nation-states. The primary objective of such efforts is to penetrate another nation’s computer or
ICT infrastructure and networks to cause disturbances to critical functions.
4
1
Richard, Clarke and Robert Knake and, Cyber War: The Next Threat to National Security and What to Do About It. (New
York,NY: HarperCollins, 2012), 43.
2
Lior Tabansky. “The Current State Of Cyber Warfare” last modified 2017. https://www.cybersecurity-review.com/articles/the-
current-state-of-cyber-warfare/.
3
Magnus Hjortdal, China's Use of Cyber Warfare: Espionage." Journal of Strategic Security 4 no. 2 (2012): 3.
4
Richard, Clarke and Robert Knake, Cyber War: The Next Threat to National Security and What to Do About It. (New
York,NY: HarperCollins, 2012), 16.
3
Martin Libin identifies two types of cyber warfare. These are tactical and operational
cyber warfare. The strategic form refers to campaigns driven through cyberattacks by an
aggressor against another country via non-physical confrontation. Functional combat, on the
other hand, it involves the deployment of different cyber-attacks strategies by a state actor
against the national security and military assets of another country during the actual war.
5
Lech
Janczewski contends that cybersecurity is now the most outstanding national security problem
compounding the United States. The most critical aspect of this outstanding issues is underscored
by cyber warfare which involves the employment of ICT technologies and capabilities to
develop defensive and offensive weaponry to influence global relations and dominance
6
.
China defines cyber warfare as “war under conditions of informatization.
7
This
definition of the construct confirms the Chinese government is cognizant of the fact that winning
battles in future does not rely on advanced armaments but the consolidation ICT solutions and
capabilities. The intention of this determination is predicated on the need to support military
operations through cyberspace creativity and innovation
8
. In both the United States and China,
official as well as unsanctioned discourse is underlined by the threat of Cyberwarfare and the
capacities of both countries to protect national security through improved cybersecurity
vigilance.
9
The escalation of cybercrimes mostly drives the debate and supplying between both
nations. Consequently, divergent narratives concerning China’s capability to carry out
efficacious cyber warfare activities by exploiting flaws of selected targets have advanced. The
5
Libicki, Martin C. 2009. Cyberdeterrence and Cyberwar.( Rand Corporation, 2009), 4.
6
Lech Janczewski, Cyber Warfare and Cyber Terrorism. (Hershey, Pennsylvania: Idea Group Inc), 8.
7
"China: Military cyber capabilities will grow," Oxford Analytica online last modified November 14, 2017,
https://search.proquest.com/docview/1151763753?accountid=45049.
8
Ibid.
9
Lior Tabansky. “The Current State of Cyber Warfare” last modified 2017. https://www.cybersecurity-review.com/articles/the-
current-state-of-cyber-warfare/.
4
United States has taken this discourse as validation for instituting pre-emptive policies geared
towards supporting the development of defensive and aggressive to enhance the ability of
agencies responsible for national security. Deployment of indiscreet surveillance the networks
also endorses these approaches. Such a shift in strategy is thus the most explicit pointer that
China can conduct warfare activities through cyberspace and inflict unmatched disruptions to the
United States from an ICT perspective.
10
The most reliable indication that China is indeed preparing to wage cyber warfare
through exploiting ICT vulnerabilities of the selected targets the creation of a department in
charge of cyber warfare in LBA.The principal role of this agency is to engage in continuous
efforts aimed at causing weakening or causing disruptions to the enemy’s ICT network
instantaneously.
11
More importantly, China is interested in using cyberspace to paralyze the
United States decision-making ability at the commencement of confrontations
12
.
The Strategy
The military history of the “People’s Republic of China” has been underlined by
disproportionate warfare over the centuries. Cyber warfare, therefore, represents just a novel
approach in its quest to realize global dominance.
13
Kozłowski notes that the stratagem to
conduct future warfare through cyberspace originates from the US’s experience as well as
observations made during the intervention in the Balkan states and the initial Gulf War
14
.
More
10
Stuart Malawer, "Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance," 58 no. 11 (2010): 28.
11
"CHINA: Military cyber capabilities will grow," Oxford Analytica online last modified November 14, 2017,
https://search.proquest.com/docview/1151763753?accountid=45049.
12
Ibid.
13
Shane Haris: “China’s Cyber-Militia,”. Triposec online last modified May 31,2008.
http://www.triprosec.net/pdf/china_cyber_militia.pdf.
14
Andrzej Kozłowski:”The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict
over,” The Cyber Weapons Gap Taiwan last modified 2016,
5
significantly, the Chinese predicate this plan on the operational conception known as the
“cooperative target engagement” anchored on sharing data or information concerning likely
targets concurrently by combat stages in the air, the sea as well as on land.
15
The United States is seen a likely target by the Chinese due to its heavy reliance on
command control systems and global information driven by satellites to amalgamate military
assets successfully. The strategy, therefore, sees America’s overreliance on information and its
dissemination via cyberspace a source of strategic advantage for the side that succeeds in
dominating any conflict or confrontation through the information superhighway.
16
Upon this
realization, the PLA that the Chinese required examine ways through which they could exploit
these weaknesses prompting the drafting of the earliest stratagems and guidelines for information
warfare (IW) with a particular focus on the internet in the 1990s.
17
Streinnon contends that the
principal target of information warfare the trust and cognitive systems of the enemies with the
intention of exerting control their actions.
18
In 2004, the then “Communications Department”
head for the “Chinese General Staff” provided a more detailed visualization of IW. He
underscored the need for China to develop a “Network confrontation technology” capable of
capturing, exploiting, corrupting and destroying information from the opponent. The vision also
detailed the importance of utilizing viruses, false information coupled with other tactics to
disable the normal functioning of information systems by using computer networks.
19
http://dspace.uni.lodz.pl:8080/xmlui/bitstream/handle/11089/12511/11-161_174-
Koz%C5%82owski.pdf?sequence=1&isAllowed=y.
15
Scott. Applegate, 2011. "Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare”. IEEE Security &
Privacy 9 no. 5: 16 - 22.
16
A. Warikoo, 2013. “Cyber Warfare China's Role and Challenge to The United States". Himalayan and Central Asian
Studies, 17 no. 3: 61
17
Ibid: 63.
18
R. Striennon 2010, Surviving Cyberwar, (, Toronto: The Scarecrow Press, 2010), 48.
19
L.T. Thomas T. Decoding the Virtual Dragon, (Fort Leavenworth: Foreign Military Studies Office,2007), 333.
6
From a practical perspective, the underlying principle of this strategy is predicated on the
need to defend PLA’s networks on the one hand while simultaneously launching attacks to
infiltrate, exploit weaknesses. Similarly, the plan intends even to sabotage or cause destruction to
critical aspects such as warfare systems and command-and-control systems in the battlefield and
financial hubs. The primary intent in this respect is to cripple decision-making centers and
processes, slowing down military and government operations and eventually curtail the likely
adversaries’ morale.
20
The strategy is linked with altering reconnaissance results, radar sensing
and warning systems for ballistic missiles. Moreover, the Chinese are convinced that the actions
contained in the plan as enumerated here are can be conducted anonymously thereby reducing
the risk of counterattacks
21
. However, Singer and Friedman contend that this strategy meant to
enhance the ability of China to do cyber warfare is not merely an offensive approach. Chinese
strategists, therefore, hold the view that possessing advanced cyber warfare abilities is can act as
a valid deterrent measure. According to Sheldon, the understanding of cyber warfare concerning
China is markedly different from that of the United States. The country perceives the concept as
additional domain capable of influencing battle setting and therefore not an auxiliary to
conventional warfare. From the perspective of China, cyber warfare is a practice conducted
through the electromagnetic continuum and hence overlaps with the construction of customary
war. To the Chinese cyber warfare activities and abilities are bloodless
22
.
Another important aspect in how the Chinese carry out Cyber warfare processes by
manipulating ICT systems flaws on carefully chosen targets is the collecting of strategic data
20
M. J. Teplinsky, (2013). “Fiddling On the Roof: Recent Developments in Cybersecurity.” American University Business Law
Review 2 no. 2 (2013): pp. 225-322.
21
W. P. Singer and A. Friedman, Cybersecurity and Cyberwar. What everyone need to know, (New York, NY: Oxford
University Press, 2014), p. 143.
22
R. Sheldon 2011, “China’s Great Firewall and Situational Awareness.Strategic Insights 10, No. 2 (2011): 36.
7
with the intention of augmenting the transformation process
23
. This behavior traces its roots to
the 863 program developed in the 1980s that encompassed a widespread campaign collecting
information concerning Western technologies
24
. During the initial stages, the implementation of
the strategy was chaotic, but the challenges were addressed when the Chinese military-industrial
complex began supervising the program. From then on, the increasing use of the internet has
availed a new cyber-based tool for carrying out cyber warfare operations by capitalizing on ICT
vulnerabilities of selected targets. According to the U.S-China Economic and Security Review
Commission, the increasing use of the Internet in daily military activities has allowed the PLA
to decrease the need for human intelligence operations in cyber warfare. Such procedures are
risky with the potential of culminating in diplomatically embarrassing disgrace in the event a spy
is caught.
25
Cyber Warfare Assets
China has invested in the development and acquisition of relevant ICT and human assets
in its quest to advance its ability to conduct cyber warfare. In line with objective, China has
created different units to carry out various activities concerning cyber warfare. These units fall
into two categories: patriotic hackers and professional hackers. The former work intermittently
for government to avail the necessary support for various cyberspace operations. Professional
hackers, on the other hand, work under the PLA’s supervision on a full-time basis
26
. The latter is
charged with the responsibility of offensive warfare through electronic means and reviewing and
23
Ibid. 36-51.
24
L. Qiao and W. Xiangsui, Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House, 2009).
25
U.S.-China Economic and Security Review Commission 2009, “China’s Propaganda and Influence Operations, Its Intelligence Activities That
Target the United States, And The Resulting Impacts On U.S. National Security “last modified 2009.
http://origin.www.uscc.gov/sites/default/files/transcripts/4.30.09HearingTranscript. Pdf.
26
W. P. Singer and A. Friedman, Cybersecurity and Cyberwar. What everyone need to know, (New York, NY: Oxford University Press, 2014),
146.
8
updating cyber-based countermeasures such as counter-jamming and jamming. Also, the
activities of this unit of novel “Information Safeguards Base” to respond cyber threats as well as
strengthening the security of information and ICT infrastructure
27
.
The patriotic hackers conduct simple cyberspace operations such as DDoS attacks, email
bombing and web defacement. In its preparation for conducting cyber warfare, the government
has strategically embarked on a recruitment campaign of individuals from IT departments of
Universities, online gamers, IT experts employed by state departments and sometimes even
criminals. These assets are intended to fulfill the objective of “war under conditions of
informatization.
28
As Tabansky confirms the Chinese government is cognizant of the fact that
winning battles in future does not rely on advanced armaments but the consolidation ICT
solutions and capabilities. This is the rationale behind the development of this assets. The
intention of this resolve is predicated on the need to support military operations through
cyberspace creativity and innovation
29
.
From the review and analysis of literature, China’s capabilities in conducting cyber
warfare by exploiting cyber warfare demonstrate the outstanding connection to asymmetric
warfare practices. This is a justification of the popularity of cyber warfare among different
policymakers in this nation and the US. The intention of the Peoples Republic of China is
predicated on the need to create stout structures, draft doctrines and strategies by employing
different cyberspace and cyberwarfare abilities. The country, therefore, hopes to be the leader in
the Asian region and indeed the world regarding global influence and to dissuade and slow down
27
L. Qiao and W. Xiangsui, Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House, 2009).
28
"China: Military cyber capabilities will grow," Oxford Analytica online last modified November 14, 2017,
https://search.proquest.com/docview/1151763753?accountid=45049.
29
Ibid.
9
the reaction of the United States to any eruption of regional or global conflicts. More
importantly, cyber warfare as conceptualized by the Chinese aims at undermining the position of
the United States as the world leader from a political, economic, military, and technological
perspective.
10
Bibliography
"China: Military cyber capabilities will grow." 2012. Oxford Analytical. November 14.
Accessed March 28, 2018.
https://search.proquest.com/docview/1151763753?accountid=45049.
Applegate, Scott. "Cybermilitias and Political Hackers: Use of Irregular Forces in
Cyberwarfare." IEEE Security & Privacy 9, no.5 (2011): 16 - 22.
Harris, Shane. 2008. China’s Cyber-Militia. May 31. Accessed April 7, 2018.
http://www.triprosec.net/pdf/china_cyber_militia.pdf.
Hjortdal, Magnus. "China's Use of Cyber Warfare: Espionage." Journal of Strategic Security 4,
no. 2 (2011): 1-24.
Janczewski, Lech. Cyber Warfare and Cyber Terrorism. Hershey, Pennsylvania: Idea Group Inc.
(IGI), 2007.
Kelsey, J. T. G. “Hacking into International Humanitarian Law: The Principles of Distinction
and Neutrality in The Age of Cyber Warfare.” Michigan Law Review 106, no.7 (2008):
1427-1451.
Clarke, Richard and Knake, Robert, and Richard Clarke. Cyber War: The Next Threat to
National Security and What to Do About It. New York, NY: HarperCollins, 2012.
Kozłowski, Andrzej, 2016. The “Cyber Weapons Gap.” The Assessment of China’s Cyber
Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan. Accessed
11
April 7, 20118. http://dspace.uni.lodz.pl:8080/xmlui/bitstream/handle/11089/12511/11-
161_174-Koz%C5%82owski.pdf?sequence=1&isAllowed=y.
Libicki, Martin C. Cyber deterrence and Cyberwar. Rand Corporation, 2009.
Malawer, Stuart. "Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance." GMU
School of Public Policy Research Paper 58, no. 11 (2010): 28-33.
https://ssrn.com/abstract=1437002.
Qiao, L and Xiangsui, W. Unrestricted Warfare, Beijing, PLA Literature and Arts Publishing
House, 2009.
Sheldon R. “China’s Great Firewall and Situational Awareness,” Strategic Insights, 10, no.2
(2011): pp. 3651.
Singer WP & Friedman A 2014, Cybersecurity and Cyberwar, what everyone need to know,
New York, Oxford University Press.
Striennon R 2010, Surviving Cyberwar, Toronto, The Scarecrow Press.
Tabansky, Lior. 2017. The current state of cyber warfare. Accessed March 29, 2018.
https://www.cybersecurity-review.com/articles/the-current-state-of-cyber-warfare/.
Teplinsky, M. J. “Fiddling On the Roof: Recent Developments in Cybersecurity.” American
University Business Law Review 2, no. 2 (2013.): 225-322.
Thomas L T 2007, Decoding the Virtual Dragon, Fort Leavenworth, Foreign Military Studies
Office.
12
U.S.-China Economic and Security Review Commission 2009, “China’s Propaganda and
Influence Operations, Its Intelligence Activities That Target the United States, And The
Resulting Impacts On U.S. National Security,” viewed September 19, 2014,
http://origin.www.uscc.gov/sites/default/files/transcripts/4.30.09HearingTranscript. pdf
Warikoo, A. “Cyber Warfare China's Role and Challenge to The United States.” Himalayan and
Central Asian Studies 17, no.3 (2013.): 61-0_4.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.