Category Archives: Uncategorized

China Options and the New US Network Warfare Strategy // 中国的选项和新的美国网络战战略


来源: 中国电子报


April 23, the US Department of Defense released a new web strategy to replace in 2011 issued a “cyberspace operations strategy.” The new network strategy clearly reflects the “war to end war”, “pre-emptive” thinking explicit proposal to strengthen the construction of the network deterrence, and under what circumstances you can use cyber weapons against network attacks, and lists the greatest threat to countries China, Russia, Iran, North Korea thinks it. The US strategy is bound to intensify the arms race in cyberspace, increasing the likelihood of cyber war broke out, bring more unrest to cyberspace, our response should be prepared in advance, to prepare for contingencies.

The new network strategy “new” Where?

First, a clear network deterrence as a strategic objective. Prior to this, the US has been pursuing a strategy of active defense, the Department of Defense in 2011 issued a “cyberspace operations strategy” in spite of the new network to be deployed weapons, but still mainly focus on cyber defense. The new network strategy will focus on the network as a deterrent, will build the power of the Internet to deal with cyber war as a key objective, and clearly the network architecture includes 133 troops teams. As US Secretary of Defense Carter said, the new network strategy will show the determination of the American cyber attacks to retaliate, “We need to prove to the world that we will protect themselves.”

Second, a clear expansion of the coverage of the network of national defense. The United States has multiple departments, including the Department of Defense, Department of Homeland Security and the National Security Bureau in network security, while the United States a lot of critical information infrastructure by the private sector operators, in order to protect the network security of government departments closely between public and private institutions Cooperation.Although the 2011 “cyberspace operations strategy” in the proposed public-private partnership to strengthen, also referred to strengthen cooperation between the Department of Homeland Security, but the new strategy will be directly “to protect local interests are not destructive and core network attack “the department of Defense and other written tasks, network infrastructure, private sector operators are also included in the scope of protection of the department of Defense, but also proposes strengthening cybersecurity information sharing among government departments and between public and private institutions.

The third is clearly cyber war adversary. Although the United States has been an enemy list, but its previous strategy documents are rarely directly named 2011 “cyberspace operations strategy” in only a general reference to rival cyberspace. But the new network strategy was to dedicate China, Russia, Iran and North Korea and other countries put forward, which is the number of countries in recent years has repeatedly accused. In fact, the United States has been through a variety of ways to find a reasonable excuse for network monitoring, network armaments and other acts taken against cyber attacks accusing China, Russia and other countries are most common in the United States in April 2015 the company released a FireCam accused China and Russia were two reports of cyber attacks.

What impact will the world?

First, the network will be further intensified competition in armaments. According to the United Nations Institute for Disarmament Research in 2013 statistics, there are 47 countries, announced the formation of a network warfare units, 67 countries set up a network of non-military security agencies. With further exacerbated cyberspace security threats, data still growing, new network strategy to attack the United States and deterrence as the core will further aggravate the situation. As the world network of the most powerful country, the United States continued to increase network armaments efforts, other countries will inevitably increase its own power into the network.

Second, large-scale networks will continue to increase the risk of war. In recent years, cyber conflict between nations has been emerging, but the conflict is still the main non-governmental forces, the conflict broke out between the network such as Malaysia and the Philippines, North Korea and South Korea, although part of the conflict emerge out of the shadow of national power, but there is no State publicly acknowledged. US network to the new network strategy war on its head, and set trigger conditions for cyber attacks, in the current absence of international standards related to cyberspace, cyber war risk between countries will continue to increase.

Third, the network will become the fuse of conflict in the real world war. In recent years, the United States has been trying to set a standard network warfare, from the 2011 “cyberspace operations strategy” to 2013’s “Tallinn Manual”, to the new network strategy, the United States has been as a response to the reality of armed combat cyber attacks a means. However, due to technical limitations, network attacks traced still difficult to achieve, the US government and corporate network attacks blamed the lack of direct evidence, or even need to confirm whether the other attacks by cyber attacks, such as the media reported that the United States finds that a North Korean attack from Sony Sony Korea nearly 10 years of network attacks. In this case, it is the United States armed attacks as an excuse to invade his country may occur.

How should China respond?

First, the introduction of national cybersecurity strategy. Based on important principles and national positions to protect national security in cyberspace, the formation of a clear framework for strategic action in cyberspace, improve top-level design Cyberspace national strategic layout.Key areas and key elements for the development of integrated package of cyberspace action plan, including countries such as the protection of critical information infrastructure, the establishment of a sound network and information security system.

The second is to establish a network of space defense forces. Established under the Ministry of Defence into the establishment of the network unit, identify core functions and the main task of the network forces, formed a dedicated network security personnel training and selection of channels, rapid formation of cyberspace defense capability. Set up in the National Technology Plan network security technology projects, research network attack and defense technology and equipment, the establishment of Cyber ​​Range, conduct regular network attack and defense drills, form a network combat capability.

Third, actively participate in international cooperation in cyberspace. Participation in the intergovernmental process of network security cooperation, strengthen dialogue between Russia and the United States, European Union and other countries and regions, forming a major cyber security incident communication and coordination mechanisms. Actively promote bilateral and multilateral cooperation within the framework of the United Nations, the promotion of international conventions to resist the formation of cyber war, the establishment of a unified network of weapons found, network attacks and other recognized international standards.Actively participate in international exchanges and publicly announced our attitude to cyber war, emphasized that States have the responsibility and obligation to protect its cyberspace and critical infrastructure from threats, interference and sabotage attacks.

Original Mandarin Chinese:














China’s Effort at network security has become a major trend of international cooperation



The present era, the rapid development of information society, a safe, stable and prosperous cyberspace, a country and world peace and development increasingly significant. It is considered after land, sea, air, space “fifth space” in cyberspace and Internet governance has become an important global issue for the international community unprecedented attention.

Currently, the world is not peaceful. Traditional threats and non-traditional threats intertwined. To benefit from the global network of development and also suffered network attack, and this behavior with the further development of information technology and the Internet more frequently. Currently, the traditional network boundaries become increasingly blurred, non-traditional security threats increase, distributed denial of service, advanced persistent threats and other new network attacks intensified. Network global information infrastructure frequent high-risk vulnerabilities intrusion, critical information infrastructure and critical information systems security is facing serious threats. Network attacks are gradually infiltrate the various types of network terminals. In addition, phishing, hackers, cyber-terrorism, and other issues of rampant Internet rumors, disturb and destroy the countries of normal production and life, and even threaten the stability of state power.

In recent years, the world has a profound understanding of the importance of joint response to network security threats, network security, international cooperation has become a major trend. October 2013, ICANN, IETF, W3C and other major international Internet governance institutions signed the “Montevideo was Asia,” the statement, all stakeholders equal participation as the future direction of development of Internet governance. April 2014, the Brazilian Internet Conference issued a “multi-stakeholder network in the world declared,” and proposed future “Global Principles” Internet governance and the “road map.” In the same month, Japan and the US conducted a second comprehensive network security dialogue between the two countries will further strengthen cooperation in the field of cyber defense. In October, Japan and South Korea signed the “on the strengthening of cooperation in the field of network security memorandum of understanding” to establish network security affairs consultation mechanism to discuss the fight against cyber crime and cyber terrorism, cooperation in the establishment of the Internet emergency response. In May, the new EU disclosed 2015-2020 to strengthen the fight against crime, cyber-terrorism plan. In the same month, Russia and China signed the “inter-governmental cooperation agreement in the field of international information security”, the two sides focus on the use of computer technology in particular undermine national sovereignty, security and the threat of interference in internal affairs area. In June, the global Internet Governance Council of the Global Alliance held in Brazil, a clear governance model of cooperation. In July, German Internet Industry Roundtable, deepen cooperation in the network security aspects. In August, the United Nations Intergovernmental Group of Experts on Information Security held a meeting to report to the Secretary-General of the United Nations, for the first time a unified constraint own activities in cyberspace, including critical foundation can not use the Internet to attack his country’s nuclear power plants, banking, transportation, water supply systems, etc. facilities, and can not be implanted “backdoor” in IT products and so on. In September, the United States on outstanding issues in the field of law enforcement in combating cyber crime and other security-depth exchange of views and reached important consensus; the eighth “China-US Internet Forum” held in Seattle, talks between the two countries aimed at promoting exchanges Internet industry and cooperation, continue to promote the world of Internet and network information security. In October, the Shanghai Cooperation Organization Member States authorities was successfully held in Xiamen City, Fujian Province, the “Xiamen -2015” Network counter-terrorism exercises; the sixth Sino-British Internet Roundtable opened in London, the two countries signed the first network security protocol; Chinese military sixth Xiangshan Science Society Forum and the China international strategic Association jointly sponsored the Beijing national Convention Center, which is an important issue around the “code of conduct in cyberspace” build mode, path, content and other discussions. December 1, State Councilor Guo Shengkun US Attorney Lynch, Johnson, Secretary of Homeland Security, co-chaired the first Sino-US cyber crime and related matters joint high-level dialogue.

Mandarin Chinese:



近年來,世界各國已深刻認識到共同應對網絡安全威脅的重要性,網絡安全國際合作已成大趨勢。 2013年10月,ICANN、IETF、W3C等國際互聯網治理主要機構共同簽署了“蒙得維得亞”聲明,將所有的利益相關者平等參與視為未來互聯網治理的發展方向。 2014年4月,巴西互聯網大會發表《網絡世界多利益攸關方聲明》,提出未來互聯網治理的“全球原則”和“路線圖”。同月,日美進行了第二次網絡安全綜合對話,兩國將進一步強化在網絡防禦領域的合作。 10月,中日韓簽署《關於加強網絡安全領域合作的諒解備忘錄》,建立網絡安全事務磋商機制,探討共同打擊網絡犯罪和網絡恐怖主義,在互聯網應急響應方面建立合作。 5月,歐盟新披露了2015年至2020年強化打擊網絡恐怖犯罪的計劃。同月,俄羅斯與中國簽署了《國際信息安全保障領域政府間合作協議》,雙方特別關注利用計算機技術破壞國家主權、安全以及乾涉內政方面的威脅。 6月,全球互聯網治理聯盟在巴西召開全球理事會,明確了合作的治理模式。 7月,中德互聯網產業圓桌會議召開,深化在網絡安全等方面的合作。 8月,聯合國信息安全問題政府專家組召開會議,並向聯合國秘書長提交報告,各國首次統一約束自身在網絡空間中的活動,包括不能利用網絡攻擊他國核電站、銀行、交通、供水系統等重要基礎設施,以及不能在IT產品中植入“後門程序”等。 9月,中美就共同打擊網絡犯罪等執法安全領域​​的突出問題深入交換意見,達成重要共識;第八屆“中美互聯網論壇”在西雅圖召開,會談旨在促進中美兩國互聯網業界的交流與合作,持續推動世界互聯網和網絡信息安全。 10月,上海合作組織成員國主管機關在福建省廈門市成功舉行了“廈門-2015”網絡反恐演習;第六屆中英互聯網圓桌會議​​在倫敦開幕,簽署兩國首個網絡安全協議;中國軍事科學學會和中國國際戰略協會聯合主辦的第六屆香山論壇在北京國家會議中心舉行,其中一個重要議題是圍繞“網絡空間行為準則”的構建模式、路徑、內涵等展開討論。 12月1日,國務委員郭聲琨與美國司法部部長林奇、國土安全部部長約翰遜共同主持首次中美打擊網絡犯罪及相關事項高級別聯合對話。

Source: China Information Security

China’s PLA & Toward Winning ‘informationized local wars’


At the beginning of the 2016, President Xi Jinping gave his commander’s intent for reorganizing China’s People’s Liberation Army (PLA) at this beginning of the week, China announced a series of major comprehensive reforms for the People’s Liberation Army (PLA) that will defiinitely forge China’s military modernization emphasis for the immediate and long term.


The Chinese leadership intent for the overhaul is to redefine roles, missions and authorities of the PLA military services, consolidates Communist Party of China (CPC) control over the nearly autonomous military branches, and ultimately attain new levels of combat effectiveness drsigned under a new set of military guidelines of fighting and winning ‘local wars under informationized conditions.’

The first wave of official announcements included changes in the organisational force structure, starting at the highest echelons of command. Specifically, the creation of a new command structure; a joint staff under the Central Military Commission (CMC) that integrated the previous four general departments. The CMC will now manage the PLA through the Joint Staff Department comprised of 15 departments, commissions and offices.

The second significant measure is the inauguration of three new PLA services: PLA Ground Forces, PLA Rocket Forces and PLA Strategic Support Forces. The previous Second Artillery Corps, in charge of China’s nuclear and conventional ballistic missiles, has been upgraded to the PLA Rocket Force, a full service branch on par with the navy, air force, and, for the first time, the army.

The third major military reform measure, announced on 1 February 2016 @ 21:15 Local, is the restructuring of previous seven ‘military regions’ to five ‘major war zones’ or theater operations. While very similar to the US Military component commands the PLA re-oragnization reflects a move toward truly joint operations . The new major Chinese military commands now represent the Northern, Eastern, Southern, Western, and Middle or Central theaters, which are now mimicking the US Department of Defense (DoD) concept of Combatant Commands.

Changes in the PLA’s organization force structure complement its gradual technological advances. While since Novemeber 8th, 2012, the PLA under President Xi Jinping has seen many accomplishments: from the introduction of next generation of supercomputers such as the TianHe – 2,  aviation prototypes such as the J-16, J-20, J-31, new helicopters and UAVs, to the ongoing construction of a second aircraft carrier, as well as record number of commissioned People’s Liberarion Army Navy (PLAN) ships such as Type 054A, 056 frigates and 052C destroyers.

In the next five to ten years, China is expected to transfer many experimental models from R&D to the production stage (Plan 863), including a number of systems in what the PLA calls ‘domains of emerging military rivalry’: outer space, near space, cyber space, and under water.

These include next generation ballistic missiles, nuclear and conventional, long-range precision-strike assets such as hypersonic vehicles, offensive and defensive cyber capabilities and new classes of submarines, supported by a variety of high-tech directional rocket rising sea mines with accurate control and guidance capacity.

PLA Strategic Support Forces (SSF)

Of all the newly established units, the PLA Strategic Support Forces (SSF), 戰略支援部隊. represents perhaps the most significant development. While details remain hidden under a veil of secrecy, unofficial Chinese PLA sources and Chinese language press reports indicate that the SSF will consist of three independent branches: ‘cyber force’ with ‘hacker troops’ responsible for cyber offense and defense; ‘space force’ tasked with surveillance and satellites; and ‘electronic force’ responsible for denial, deception, disruption of enemy radars and communications systems. The overaarching focus of this reorganizartion is to create an effective and strategic support force” to strengthen the network and space attack.

The SSF integrates the previous PLA General Staff Headquarters Third and Fourth Departments, responsible for technical reconnaissance, electronic warfare, cyber intelligence and cyber warfare, as well as absorbing the Foreign Affairs Bureau of the former PLA General Political Department, tasked with information operations, propaganda and psychological warfare.

This corresponds to PLA writings on future conflicts such as Science of Military Strategy that emphasise a holistic perspective toward space, cyberspace and the electromagnetic spectrum that must be defended to achieve information dominance. This is the ability to gather, transmit, manage, analyse and exploit information, and prevent an opponent from doing the same as a key prerequisite for allowing the PLA to seize air and naval superiority.

To this end, the PLA recognises the importance of controlling space-based information assets as a means of achieving true information dominance, calling it the ‘new strategic high ground.’ Consequently, establishing space dominance is an essential component of achieving military ‘information dominance.’

Strategic Chinese Military Implications

Ultimately, the key question is this: will the reforms in the PLA’s organisational force structure will be reflected in its operational conduct, particularly in the PLA’s capabilities to exploit cyber-kinetic strategic interactions in its regional power projection, as well as responses in potential crises and security flashpoints in East Asia?

On one hand, China’s political and military elites believe that a new wave of the global Revolution in Military Affairsis gathering pace, led principally by the US, and China must therefore accelerate the pace of its military development. Internally, however, the reforms are designed primarily to close the PLA’s inter-service rivalries, interoperability gaps and the dominance of the ground forces.

In other words, significant capability gaps will continue to exist.

In the long-term the coordinated exploitation of space, cyber-space, electromagnetic spectrum and strategic information operations will likely enable four critical missions for the PLA:

  1. Force enhancement to support combat operations and improve the effectiveness of military forces such as ISR, integrated tactical warning and attack assessment, command, control and communications, navigation and positioning and environmental monitoring;
  2. Counter-space missions to protect PLA forces while denying space capabilities to the adversary;
  3. Information operations to direct influence on the process and outcome in areas of strategic competition, and;
  4. Computer network operations targeting adversaries data and networks.

Consequently, the PLA’s growing military-technological developments may significantly alter both the strategic thought and operational conduct of major powers in East Asia, including the US and its Five Eyes allies including the United Kingdom, New Zealand, Canada, and Australia.

Original content published at this Australian Source

China’s Strategic Support Forces – Mission and Combat Power Intent


来源:人民网  作者:邱越  时间:2016-01-06


    December 31, 2015, People’s Liberation Army’s governing bodies, the PLA rocket forces, the PLA strategic support troops inaugural meeting was held in Beijing Bayi Building.The newly established strategic support units is quite mysterious, whether it is a kind of military do? Military expert Yin Zhuo interview, said in an interview with People’s Daily, the main mission of strategic support task force is to support the battlefield, so that our army in the aerospace, space, network, and electromagnetic space battle can get local advantage, to ensure smooth operations. It is an important force in joint operations, and action will be the Army, Navy, Air Force and Army rocket integration, throughout the war always, is the key to winning the war power.

Defense Ministry spokesman Yang Yujun noted that the strategic support units is to safeguard the national security of the new combat forces is an important growth point of our military combat capability of quality, mainly the strategic, fundamental, all kinds of support are strong safeguards after forces from the formation of functional integration. The establishment of strategic support units, help to optimize the structure of military forces, thus improving the overall capacity. We will adhere to system integration, civil-military integration, strengthening the new combat forces, and strive to build a strong modernization strategy support units.

Yin 卓介绍 said strategic support units main task of the mission is to support the battlefield, so that our army in the aerospace, space, network, and electromagnetic space battle can get local advantage, to ensure smooth operations. Specifically, the strategic support unit tasks include: return of target detection, reconnaissance and target information; undertake everyday navigation operations, and Beidou satellite and space reconnaissance means management; undertake electromagnetic space and cyber space defense mission .

During the war, Reconnaissance Force cyberspace can help master the movements of the enemy army to help troops develop operations to ensure the achievement battlefield victory.In peacetime, with the increasing degree of national information technology, security, electromagnetic space and cyberspace are increasingly important. Yin Zhuo pointed out that with the satellite navigation facilities in civil applications in the future high-speed rail, ship, aircraft, vehicle or car will be equipped with on-board positioning facilities that our country’s socialist construction will play an important role. In addition, the face of many hackers on the Internet for the illegal actions of the implementation of such important government facilities, military facilities, civilian facilities important to the implementation of network attacks, which requires that we must be equipped with appropriate defenses. Strategic support forces in protecting the country’s financial security and people’s daily lives and safety will play an important role.

“Strategic support units is an important force in joint operations.” Yin Zhuo said, now can not do without any combat operations in cyberspace offensive and defensive strategic support troops in reconnaissance, early warning, communications, command, control, navigation, ocean digital, digital construction and other aspects of the Earth play an important role, and provide strong support for the joint battlefield operations, in order to achieve the goal of winning local wars under conditions of informatization.

Yin Zhuo noted that the strategic support units are not a separate fighting force, it will blend in with the Army, Navy, Air Force, Army and other branches of the military rocket actions form an integrated joint operations, strategic combat support units throughout the whole process, penetrated into every combat operations, will be the key to winning the war power.

Original Mandarin Chinese:








China’s World Internet Conference and the Future of Chinese Cyberspace

William Hagestad II


December 2015, the Cyberspace Administration of China (CAC) invited me to attend the World Internet Conference (WIC) in Wuzhen, People’s Republic of China (PRC).

It is important to understand that the Chinese Government had created a 20 kilometer security exclusion zone around the epicenter of the WIC. The Chinese residents of Wuzhen were replaced with a regiment of soldiers from the People’s Liberation Army (PLA) and plainclothes policemen and women of China’s Ministry of State Security.

Opening day of the WIC China’s President, Xi Jinping gave his opening comments, a heavenly mandate for the largely handpicked Communist Party of China (CPC) member and international audience “Cyberspace is not a place [that is] beyond the rule of law”. President Xi’s opening address was focused on delegates including Russian Prime Minister Dmitry Medvedev and Pakistani president Mamnoon Hussain; conspicuously absent were officials from the United States, England, Australia, Canada and New Zealand.

Chinese President Xi provided direction which included a proposed the “four principles and five propositions”, systematically expounding China’s concept of a “China Network View” in the New Period. His focus included a statement that China is willing countries to strengthen dialogue and exchanges, effective management and control differences, and promote the development of the parties to the generally accepted international rules of cyberspace, cyberspace develop international conventions on terrorism, the fight against cybercrime and improve mutual legal assistance mechanisms, and jointly safeguard peace and security in cyberspace .

China’s 21st Century Boxer Rebellion

Short history lesson lest we forget how the Western failed to read between the Chinese tea leaves of China’s 21st Century network sovereignty initiative. During the early 1900’s an eight nation coalition of Eight Powers had invaded and occupied North Eastern China. The Qing Dynasty Chinese rebels known as the Boxer’s called this foreign invasion the “八國聯軍”, or Eight-Nation Alliance. This eight nation alliance included the Empire of Japan, United Kingdom, French Third Republic, German Empire, Austria-Hungary, Kingdom of Italy, the United States of America and the Russian Empire.[1] the capital of the Qing Empire, was captured eight countries & invading armies this day…”the darkest day in modern Chinese history.”[2] Save the attendance of Russia’s Prime Minister Dmitry Medvedev at the 2015 WIC, none of the other members of the 1900 “八國聯軍” were invited to officially attend China future discussion on the Internet at the WIC. It is prophetic then that the Chinese have not forgotten the foreign invasion and occupation of China’s homeland so long ago as backdrop for the WIC and the new future of China’s version of the Internet in the form of a Chinese Binary Rebellion…where delaying, denying and disrupting foreign incursions into China’s Internet are an echo and reminder of the 1900’s Boxer Rebellion.


You Are Either Part of the Party or You are Not

One of the important comments made by President Xi which underscores China’s current proposal for a secured and stable International Internet is that “Everyone should abide by the law, with the rights and obligations of parties concerned clearly defined. Cyberspace must be governed, operated and used in accordance with the law so that the internet can enjoy sound development under the rule of law.”[3]

Perhaps in the light of America’s National Security Agency failure to properly vet and control traitorous contractors, Chinese President Xi called for Chinese (sic) government action was needed to strengthen “civilised behaviour” on the internet, adding and calling for measures to “rehabilitate the cyber ecology”.[4]

China’s new cyber ecology will include, according to President Xi’s keynote speech will include building China into a global cyber power, speeding up Internet infrastructure development and imperative that China be regarded as a staunch defender of international cybersecurity.[5] Certainly the recent agreement with the United States on a high-level and mutual dialogue on cybercrime is evidence of China’s willingness to work with even the harshest critics of its organic Internet governance policies.[6]

International governments should make no mistake however, China’s leader emphasized that “cyber security is as important as national security.” And thus both Internet security and informatization are China’s major strategic issues concerning any country’s security and development.[7]

Curiously, however, President Xi’s keynote comments were live-tweeted by the state-run news portal, Xinhua, China’s official news agency, and broadcast on YouTube.[8] Both of these Western social media platforms are services which are blocked by Beijing.

Indeed as the WIC came to a conclusion, international cooperation was a main focus for China’s leadership as “President Xi Jinping urged all countries to respect Internet sovereignty, jointly safeguard cybersecurity, cooperate with an open mind, and improve Internet governance together.”[9]


Thus, given the international audience represented at the WIC, guidelines were given for adhering to the new Rule of Law on China’s version of an international Internet or be left behind and thus unable to participate in the world’s largest economy. Indeed Mr. Eugene Kaspersky signed a very lucrative contract at the WIC forging a unique cyber-security partnership with the China Cyber Security Company, thus demonstrating China’s willingness to embrace and recognize Internet technology such as those offered by Kaspersky.[10]


The Future of China’s Internet


Indicative of what the future holds for the Internet within the People’s Republic of China is the Xiaomi mobile phone I was provided on the first day of the WIC. While the number was Chinese, the SIM card was registered in Hong Kong allowing me to access typically blocked Western Internet websites such as Facebook, Twitter, and Google. China’s future Internet may include allowing limited access to the forbidden fruits of the Western Internet.


Similarly, the hotel the Cyberspace Administration of China (CAC) put me up in also came with a ‘special Internet account’ where access to usually blocked services was allowed, such as those enabled by my shiny new Xiaomi. However, as I switched off the ‘special account’, the familiar Chinese Internet presented itself and Gmail, Facebook, and Twitter were all blocked.


I expect that the future Internet we will all globally experience in the future will encompass an ability to access Chinese versions of Western Internet services, while denying or restricting our ability to use Western Internet technologies which may or may not be surveilled by Western intelligence services.


Quite frankly, my experience at China’s World Internet Conference was a positive one. Given the 20 kilometer security exclusion zone I felt very safe, no jihadist terrorists wielding legal semi-automatic weapons in Wuzhen. From a global cyber security researcher perspective, even though I could access both the Chinese and Western versions of the Internet, my experience was actually no different than any of the many other global locations I have visited in the past.


While the People’s Republic of China forges forward with a global secure definition of cyberspace which embodies both national security and sovereignty it will be up to other global governments to decide whether to be part of China’s secure Internet party or be left behind.

[1] “八国联军”.  八国联军侵华战争_八国联军为什么侵华_八国联军是哪八国 – 趣历史. Chinese History Topics. (December 2015). (Chinese Internet). Accessed:

[2] Ibid.

[3] “2nd World Internet Conference”. (December16-18, 2015). (Internet). Accessed:

[4] Ibid.

[5] Ibid.

[6] “Xi: China a staunch defender of cybersecurity”. September 25, 2015). (Internet). Accessed:

[7] “Xi: Efforts should be made to build China into cyber power”. (February 28th, 2015). (Internet). Accessed:

[8]  “China is home to 670 million Internet users & over 4.13 million websites: President #XiJinping says at #WIC2015. Twitter. (December 15th, 2015). (Internet). Accessed:

[9] “2nd World Internet Conference concludes”. Xinhua. December18th, 2015). (Internet). Accessed:

[10] “Russia’s Kaspersky Labs signs deal with China Cyber Security Company as Beijing and Moscow call for end to US domination of internet”. (December17th, 2015). (Internet). Accessed:

China’s Military Hacking of US Business Subsides

US Officials: #chinese military has slashed corporate #Hacking | TheHill


By Cory Bennett

The Chinese military significantly reduced its cyber theft of American corporate secrets following the Justice Department’s May 2014 indictment of five Chinese officers, U.S. officials told The Washington Post.

And the People’s Liberation Army (PLA) has not returned to its previous level of commercial espionage since then, said several current and former U.S. officials.

“The big picture is that from 2014 on, the administration pursued a much more direct and coercive approach with China, and it has produced results over time,” Evan Medeiros, a former senior director for Asia affairs on the National Security Council, told The Post.

The report comes a day before top U.S. and Chinese officials begin several days of talks that aim to flesh out a September deal between the two countries to eradicate corporate hacking.

“For a period of time following the indictments, there was a very significant decrease” by the PLA, an unnamed U.S. official told The Post. “And today we are definitely not at the level that we were before the indictments.”

The narrative cuts against some recent reports that China’s civilian spy agency, the Ministry of State Security (MSS), has not reduced its commercial espionage efforts in the wake of the September agreement, which was struck during Chinese President Xi Jinping’s state visit to Washington, D.C. in September.

But it’s also possible that China has transitioned some of its digital theft from the PLA to the MSS, which can better hide its digital tracks.

The MSS is believed to be behind some of the more major U.S. breaches over the past year, including the intrusions at health insurer Anthem and the Office of Personnel Management (OPM), in which over 20 million federal workers had their sensitive data stolen.

But those hacks were likely part of China’s ongoing digital espionage campaign to gather detailed information on U.S. government workers, not an attempt to steal intellectual property.

Cyber espionage was not part of the September agreement between the two global powers.

A U.S. official told The Post that this week’s meetings will be a good opportunity to discuss China’s ongoing commitment to its September deal, but that it will take time to determine whether the Asian power is fully complying.

“As we move forward, we will continue to monitor China’s cyber activities closely and press China to abide by all of its commitments,” the senior administration official said. “We have been clear with the Chinese government that we are watching to ensure their words are matched by actions.”

Read Original article at: The Hill


Chinese Cyber Espionage – Infiltration of Target Networks Gets Sophisticated

Chinese hackers have expanded their attacks to parking malware on popular file-sharing services including Dropbox and Google Drive to lure unsuspecting  cyber-victims into downloading infected files and revealing compromising sensitive information. These Chinese hackers are also using more sophisticated cyber espionage tactics, focusing their cyber-spying on specific targets via targeted ‘white lists’ infect only specific visitors, named as high value targets, luring them unwittingly to compromised websites.

Chinese hackers are using the following sophisticated techniques, technology and protocols (TTPs) to successfully execute their cyber espionage campaigns:

  • Using noted Mandarin Chinese or Modern Russian hacking TTPs that are specifically charectreristic of both Chinese & Russian based hackers;
  • China’s Ministry of Public Security (MPS) is noting an increase in unauthorized access cases throughout Greater China;
  • Western media file sharing services such as Dropbox and Google Drive are being manipulated for launching successful hacker attack campaigns.

Surveillance and information extfiltration techniques are typically used only by sophisticated hackers from China and Russia who have been given specific cyber targeting packages for cyber-exploitation.

The level of hacking is a sign, they say, of how important China views Hong Kong, where 79 days of protests late last year brought parts of the territory, a major regional financial hub, to a standstill. The scale of the protests raised concerns in Beijing about political unrest on China’s periphery.

“We’re the most co-ordinated opposition group on Chinese soil, (and) have a reasonable assumption that Beijing is behind the hacking,” said Lam Cheuk-ting, chief executive of Hong Kong’s Democratic Party, which says it has been a victim of cyber attacks on its website and some members’ email accounts.

U.S.-based Internet security company FireEye said the attacks via Dropbox were aimed at “precisely those whose networks Beijing would seek to monitor”, and could provide China with advance warning of protests and information on pro-democracy leaders. The company said half its customers in Hong Kong and Taiwan were attacked by government and professional hackers in the first half of this year – two and a half times the global average.

China’s Ministry of Foreign Affairs, Public Security Bureau and the Liaison Office of the Central People’s Government in the Hong Kong Special Administrative Region did not respond to requests for comment. The Defence Ministry said the issue was not part of its remit. China has previously denied accusations of hacking, calling them groundless, and saying it is a victim.

The Hong Kong police said its Cyber Security and Technology Crime Bureau works with other law enforcement agencies to combat cross-border crime, but did not respond to questions on how much information it shares with mainland Chinese authorities, the origin of the Hong Kong cyber attacks, or whether these might be a source of instability or concern.

Police data show a drop in reported “unauthorised access”, which includes Internet or email account abuse and hacking, over the past two years. Many of the victims Reuters spoke to said they hadn’t bothered to report being hacked.


Like other groups taking on the might of Beijing – from Uighurs and exiled Tibetans to some Taiwanese – Hong Kong activists, academics and journalists have become more savvy and adopted tactics that, in turn, force hackers to get savvier still.

When Tibetan exile groups stopped clicking on files attached to emails, to avoid falling victim to a common form of ‘spear phishing’ attack, hackers switched their malware to Google Drive, hoping victims would think these files were safer, said Citizen Lab, a Canada-based research organisation which works with Tibetans and other NGOs.

Hackers also recently used Dropbox to lure Chinese language journalists in Hong Kong into downloading infected files. FireEye, which discovered the attack, said it was the first time it had seen this approach.

“We don’t have any arrogance to think we can beat them,” said Mark Simon, senior executive at the parent company of Hong Kong’s Apple Daily, a media group on the front line of the attacks.


Trying to stay ahead of the hackers, activists and others use multiple mobile phones with different SIM chips, encrypted messaging apps, apps that automatically delete tweets, and code words to set up meetings. If someone thinks they may be arrested, they remove themselves from group chats.

Some things are kept offline.

“If we want to talk, we have some signal,” said Derek Lam, a member of student group Scholarism that helped organise the protests. “It’s a few words … if I say some words that are really strange it means we have to talk somewhere privately.”

Law professor and protest organizer Benny Tai stores personal data, such as names, email addresses and mobile numbers, on an external hard drive that he says he only accesses on a computer without an Internet connection.

The pro-democracy Apple Daily, which says it is hacked on an almost weekly basis, has tightened its email security software, and has its lawyers use couriers rather than email. FireEye last year connected denial of service (DDoS) attacks against Apple Daily with more professional cyber spying attacks, saying there may be a “common quartermaster”. It said China’s government would be the entity most interested in these “political objectives”.


Steven Adair, co-founder of U.S.-based security firm Volexity, said that code hidden on pro-democracy websites last year, including those of the Democratic Party and the Alliance for True Democracy, suggested a group he said “we strongly suspect to be Chinese… who is very well resourced.”

He said such tactics were more usually seen employed by Russian hackers, aimed at very specific targets and designed to be as unobtrusive as possible. “It’s a real evolution in targeting,” he said.

In the run-up to Hong Kong district council elections earlier this month, hackers used more basic techniques, breaking into at least 20 Gmail accounts at the Democratic Party, according to party officials and Google logs seen by Reuters.

Between April and June, many hacked accounts were forwarding emails to An examination of the hackers’ IP addresses by the party’s IT experts found some appeared to originate in China, party officials said.

(Reporting by Clare Baldwin and James Pomfret in HONG KONG and Jeremy Wagstaff in SINGAPORE, with additional reporting by Teenie Ho in HONG KONG and Michael Martina and Ben Blanchard in BEIJING; Editing by Ian Geoghegan)
Read more at Reuters