Category Archives: Uncategorized

China Options and the New US Network Warfare Strategy // 中国的选项和新的美国网络战战略

中国的选项和新的美国网络战战略

来源: 中国电子报

中国的选项和新的美国网络战战略

April 23, the US Department of Defense released a new web strategy to replace in 2011 issued a “cyberspace operations strategy.” The new network strategy clearly reflects the “war to end war”, “pre-emptive” thinking explicit proposal to strengthen the construction of the network deterrence, and under what circumstances you can use cyber weapons against network attacks, and lists the greatest threat to countries China, Russia, Iran, North Korea thinks it. The US strategy is bound to intensify the arms race in cyberspace, increasing the likelihood of cyber war broke out, bring more unrest to cyberspace, our response should be prepared in advance, to prepare for contingencies.

The new network strategy “new” Where?

First, a clear network deterrence as a strategic objective. Prior to this, the US has been pursuing a strategy of active defense, the Department of Defense in 2011 issued a “cyberspace operations strategy” in spite of the new network to be deployed weapons, but still mainly focus on cyber defense. The new network strategy will focus on the network as a deterrent, will build the power of the Internet to deal with cyber war as a key objective, and clearly the network architecture includes 133 troops teams. As US Secretary of Defense Carter said, the new network strategy will show the determination of the American cyber attacks to retaliate, “We need to prove to the world that we will protect themselves.”

Second, a clear expansion of the coverage of the network of national defense. The United States has multiple departments, including the Department of Defense, Department of Homeland Security and the National Security Bureau in network security, while the United States a lot of critical information infrastructure by the private sector operators, in order to protect the network security of government departments closely between public and private institutions Cooperation.Although the 2011 “cyberspace operations strategy” in the proposed public-private partnership to strengthen, also referred to strengthen cooperation between the Department of Homeland Security, but the new strategy will be directly “to protect local interests are not destructive and core network attack “the department of Defense and other written tasks, network infrastructure, private sector operators are also included in the scope of protection of the department of Defense, but also proposes strengthening cybersecurity information sharing among government departments and between public and private institutions.

The third is clearly cyber war adversary. Although the United States has been an enemy list, but its previous strategy documents are rarely directly named 2011 “cyberspace operations strategy” in only a general reference to rival cyberspace. But the new network strategy was to dedicate China, Russia, Iran and North Korea and other countries put forward, which is the number of countries in recent years has repeatedly accused. In fact, the United States has been through a variety of ways to find a reasonable excuse for network monitoring, network armaments and other acts taken against cyber attacks accusing China, Russia and other countries are most common in the United States in April 2015 the company released a FireCam accused China and Russia were two reports of cyber attacks.

What impact will the world?

First, the network will be further intensified competition in armaments. According to the United Nations Institute for Disarmament Research in 2013 statistics, there are 47 countries, announced the formation of a network warfare units, 67 countries set up a network of non-military security agencies. With further exacerbated cyberspace security threats, data still growing, new network strategy to attack the United States and deterrence as the core will further aggravate the situation. As the world network of the most powerful country, the United States continued to increase network armaments efforts, other countries will inevitably increase its own power into the network.

Second, large-scale networks will continue to increase the risk of war. In recent years, cyber conflict between nations has been emerging, but the conflict is still the main non-governmental forces, the conflict broke out between the network such as Malaysia and the Philippines, North Korea and South Korea, although part of the conflict emerge out of the shadow of national power, but there is no State publicly acknowledged. US network to the new network strategy war on its head, and set trigger conditions for cyber attacks, in the current absence of international standards related to cyberspace, cyber war risk between countries will continue to increase.

Third, the network will become the fuse of conflict in the real world war. In recent years, the United States has been trying to set a standard network warfare, from the 2011 “cyberspace operations strategy” to 2013’s “Tallinn Manual”, to the new network strategy, the United States has been as a response to the reality of armed combat cyber attacks a means. However, due to technical limitations, network attacks traced still difficult to achieve, the US government and corporate network attacks blamed the lack of direct evidence, or even need to confirm whether the other attacks by cyber attacks, such as the media reported that the United States finds that a North Korean attack from Sony Sony Korea nearly 10 years of network attacks. In this case, it is the United States armed attacks as an excuse to invade his country may occur.

How should China respond?

First, the introduction of national cybersecurity strategy. Based on important principles and national positions to protect national security in cyberspace, the formation of a clear framework for strategic action in cyberspace, improve top-level design Cyberspace national strategic layout.Key areas and key elements for the development of integrated package of cyberspace action plan, including countries such as the protection of critical information infrastructure, the establishment of a sound network and information security system.

The second is to establish a network of space defense forces. Established under the Ministry of Defence into the establishment of the network unit, identify core functions and the main task of the network forces, formed a dedicated network security personnel training and selection of channels, rapid formation of cyberspace defense capability. Set up in the National Technology Plan network security technology projects, research network attack and defense technology and equipment, the establishment of Cyber ​​Range, conduct regular network attack and defense drills, form a network combat capability.

Third, actively participate in international cooperation in cyberspace. Participation in the intergovernmental process of network security cooperation, strengthen dialogue between Russia and the United States, European Union and other countries and regions, forming a major cyber security incident communication and coordination mechanisms. Actively promote bilateral and multilateral cooperation within the framework of the United Nations, the promotion of international conventions to resist the formation of cyber war, the establishment of a unified network of weapons found, network attacks and other recognized international standards.Actively participate in international exchanges and publicly announced our attitude to cyber war, emphasized that States have the responsibility and obligation to protect its cyberspace and critical infrastructure from threats, interference and sabotage attacks.

Original Mandarin Chinese:

4月23日,美国国防部发布了新的网络战略,以替换于2011年发布的《网络空间行动战略》。新的网络战略明显体现了“以战止战”、“先发制人”的思想,明确提出要强化网络威慑力量的建设,以及在何种情况下可以使用网络武器来对付网络攻击者,并列出了中国、俄罗斯、伊朗、朝鲜等其自认为威胁最大的国家。美国这一战略势必加剧网络空间军备竞赛,增加网络战争爆发的可能性,给网络空间安全带来更多不安定因素,我国应提前做好应对措施,以备不时之需。

新版网络战略“新”在何处?

一是明确将网络威慑作为战略目标。在此之前,美国一直推行积极防御战略,2011年国防部发布的《网络空间行动战略》中虽然提出要部署一些新的网络武器,但仍主要以网络防御为重点。而新的网络战略中则将网络威慑作为重点,将建设应对网络战争的网络力量作为重点目标,并明确了包含133个小组的网络部队架构。正如美国国防部长卡特所说,新的网络战略展示了美国将对网络攻击进行报复的决心,“我们有必要向世界证明,我们将保护自己。”

二是明确扩大网络国防的覆盖范围。美国在网络安全方面有多个部门负责,包括美国国防部、国土安全部和国家安全局等,同时美国大量关键信息基础设施由私营机构运营,以保障网络安全有政府部门、公私机构间的紧密合作。虽然2011年的《网络空间行动战略》中就提出要加强公私合作,也提到了要加强与国土安全部之间的合作,但新的战略则直接将“保障本土和核心利益不受破坏性网络攻击”等写入了国防部的任务,私营机构运营的网络基础设施也纳入了国防部保护的范畴,同时也提出加强政府各部门间以及公私机构间的网络安全信息共享等。

三是明确提出网络战争假想敌。虽然美国一直有一个假想敌名单,但其之前的战略文件中很少直接点名,2011年的《网络空间行动战略》中也只是笼统地提到网络空间的对手。但新的网络战略却专门将中国、俄罗斯、伊朗和朝鲜等国提了出来,这也是其近年来不断指责的一些国家。实际上,美国一直通过多种途径为其采取的网络监控、网络军备等行为寻找合理借口,针对中国、俄罗斯等国的网络攻击指责则最为普遍,在2015年4月份美国火眼公司就发布了指责中国和俄罗斯进行网络攻击的两份报告。

将给世界带来什么影响?

一是网络军备竞争将进一步加剧。据联合国裁军研究所2013年的统计,有47个国家宣布组建了网络战部队,67个国家组建了非军方网络安全机构。随着网络空间安全威胁的进一步加剧,相关数据还在不断增加,美国以进攻和威慑为核心的新网络战略将进一步加剧这一情况。作为世界上网络力量最强大的国家,美国仍不断加大网络军备力度,其他国家也不可避免地加大自身网络力量投入。

二是大规模网络战争风险将不断加大。近年来,国家间的网络冲突已经不断出现,但冲突仍以民间力量为主,如马来西亚和菲律宾、朝鲜和韩国等之间爆发的网络冲突,虽然部分冲突浮现出国家力量的影子,但尚没有国家公开承认。美国新的网络战略把网络战争提到了台面上,并为网络攻击设定了触发条件,在当前缺乏国际网络空间相关标准的情况下,国家间的网络战争风险将不断加大。

三是网络冲突将成为现实世界战争的导火索。近年来,美国一直试图设定网络战的标准,从2011年的《网络空间行动战略》到2013年的《塔林手册》,再到新的网络战略,美国一直将现实武装打击作为应对网络攻击的一种手段。但由于技术所限,网络攻击追溯仍较难实现,美国政府及企业的网络攻击指责都缺乏直接证据,甚至需要通过网络攻击来确认对方是否攻击,如媒体报道称美国认定朝鲜攻击索尼公司源于索尼对朝鲜网络近10年的攻击。在这种情况下,很可能出现美国以网络攻击为借口武装入侵他国的现象。

中国应如何应对?

一是推出网络安全国家战略。基于保障国家网络空间安全的重要原则和国家立场,形成清晰的网络空间战略行动的框架,完善网络空间国家战略布局的顶层设计。针对网络空间关键领域和关键要素统筹制定一揽子行动计划,包括国家关键信息基础设施的保护工作等,建立完善的网络和信息安全保障体系。

二是建立网络空间防御力量。在国防部下设立成建制的网络部队,明确网络部队的核心职能和主要任务,形成专门的网络安全人才培养和选拔通道,快速形成网络空间防御能力。在国家科技计划中设立网络安全技术专项,研究网络攻防技术设备,建立网络靶场,开展定期网络攻防演习,形成网络实战能力。

三是积极参与国际网络空间合作。参与政府间网络安全合作进程,加强与俄罗斯、美国、欧盟等国家和地区间的对话,形成重大网络安全事故沟通和协调机制。积极推动联合国框架下的双边与多边合作,推动形成抵制网络战争的国际公约,建立统一的网络武器认定、网络攻击认定等国际标准。积极参与国际交流,公开宣布我国对网络战争的态度,强调各国有责任和义务保护本国网络空间和关键基础设施免受威胁、干扰和攻击破坏。

China’s Effort at network security has become a major trend of international cooperation

来源:中国信息安全

ChinaKeyboard

The present era, the rapid development of information society, a safe, stable and prosperous cyberspace, a country and world peace and development increasingly significant. It is considered after land, sea, air, space “fifth space” in cyberspace and Internet governance has become an important global issue for the international community unprecedented attention.

Currently, the world is not peaceful. Traditional threats and non-traditional threats intertwined. To benefit from the global network of development and also suffered network attack, and this behavior with the further development of information technology and the Internet more frequently. Currently, the traditional network boundaries become increasingly blurred, non-traditional security threats increase, distributed denial of service, advanced persistent threats and other new network attacks intensified. Network global information infrastructure frequent high-risk vulnerabilities intrusion, critical information infrastructure and critical information systems security is facing serious threats. Network attacks are gradually infiltrate the various types of network terminals. In addition, phishing, hackers, cyber-terrorism, and other issues of rampant Internet rumors, disturb and destroy the countries of normal production and life, and even threaten the stability of state power.

In recent years, the world has a profound understanding of the importance of joint response to network security threats, network security, international cooperation has become a major trend. October 2013, ICANN, IETF, W3C and other major international Internet governance institutions signed the “Montevideo was Asia,” the statement, all stakeholders equal participation as the future direction of development of Internet governance. April 2014, the Brazilian Internet Conference issued a “multi-stakeholder network in the world declared,” and proposed future “Global Principles” Internet governance and the “road map.” In the same month, Japan and the US conducted a second comprehensive network security dialogue between the two countries will further strengthen cooperation in the field of cyber defense. In October, Japan and South Korea signed the “on the strengthening of cooperation in the field of network security memorandum of understanding” to establish network security affairs consultation mechanism to discuss the fight against cyber crime and cyber terrorism, cooperation in the establishment of the Internet emergency response. In May, the new EU disclosed 2015-2020 to strengthen the fight against crime, cyber-terrorism plan. In the same month, Russia and China signed the “inter-governmental cooperation agreement in the field of international information security”, the two sides focus on the use of computer technology in particular undermine national sovereignty, security and the threat of interference in internal affairs area. In June, the global Internet Governance Council of the Global Alliance held in Brazil, a clear governance model of cooperation. In July, German Internet Industry Roundtable, deepen cooperation in the network security aspects. In August, the United Nations Intergovernmental Group of Experts on Information Security held a meeting to report to the Secretary-General of the United Nations, for the first time a unified constraint own activities in cyberspace, including critical foundation can not use the Internet to attack his country’s nuclear power plants, banking, transportation, water supply systems, etc. facilities, and can not be implanted “backdoor” in IT products and so on. In September, the United States on outstanding issues in the field of law enforcement in combating cyber crime and other security-depth exchange of views and reached important consensus; the eighth “China-US Internet Forum” held in Seattle, talks between the two countries aimed at promoting exchanges Internet industry and cooperation, continue to promote the world of Internet and network information security. In October, the Shanghai Cooperation Organization Member States authorities was successfully held in Xiamen City, Fujian Province, the “Xiamen -2015” Network counter-terrorism exercises; the sixth Sino-British Internet Roundtable opened in London, the two countries signed the first network security protocol; Chinese military sixth Xiangshan Science Society Forum and the China international strategic Association jointly sponsored the Beijing national Convention Center, which is an important issue around the “code of conduct in cyberspace” build mode, path, content and other discussions. December 1, State Councilor Guo Shengkun US Attorney Lynch, Johnson, Secretary of Homeland Security, co-chaired the first Sino-US cyber crime and related matters joint high-level dialogue.

Mandarin Chinese:

當今時代,社會信息化迅速發展,一個安全、穩定、繁榮的網絡空間,對一國乃至世界和平與發展越來越具有重大意義。被視為繼陸、海、空、天之後的“第五空間”的網絡空間安全和互聯網治理已成為國際社會空前關注的一個重要全球性議題。

當前,世界並不太平。傳統威脅與非傳統威脅交織。全球在享受網絡發展之利的同時也深受網絡攻擊之苦,而且這種行為將隨著信息技術和互聯網的進一步發展更加頻繁。當前,傳統的網絡邊界越來越模糊,非傳統網絡安全威脅有增無減,分佈式拒絕服務、高級持續威脅等新型網絡攻擊愈演愈烈。網絡信息基礎設施屢受全球性高危漏洞侵擾,重要信息基礎設施和重要信息系統安全面臨嚴峻威脅。網絡攻擊正逐步向各類聯網終端滲透。除此之外,網絡詐騙、網絡黑客、網絡恐怖主義、網絡謠言等問題日益猖獗,干擾和破壞著各國正常的生產和生活,甚至威脅著國家政權的穩定。

近年來,世界各國已深刻認識到共同應對網絡安全威脅的重要性,網絡安全國際合作已成大趨勢。 2013年10月,ICANN、IETF、W3C等國際互聯網治理主要機構共同簽署了“蒙得維得亞”聲明,將所有的利益相關者平等參與視為未來互聯網治理的發展方向。 2014年4月,巴西互聯網大會發表《網絡世界多利益攸關方聲明》,提出未來互聯網治理的“全球原則”和“路線圖”。同月,日美進行了第二次網絡安全綜合對話,兩國將進一步強化在網絡防禦領域的合作。 10月,中日韓簽署《關於加強網絡安全領域合作的諒解備忘錄》,建立網絡安全事務磋商機制,探討共同打擊網絡犯罪和網絡恐怖主義,在互聯網應急響應方面建立合作。 5月,歐盟新披露了2015年至2020年強化打擊網絡恐怖犯罪的計劃。同月,俄羅斯與中國簽署了《國際信息安全保障領域政府間合作協議》,雙方特別關注利用計算機技術破壞國家主權、安全以及乾涉內政方面的威脅。 6月,全球互聯網治理聯盟在巴西召開全球理事會,明確了合作的治理模式。 7月,中德互聯網產業圓桌會議召開,深化在網絡安全等方面的合作。 8月,聯合國信息安全問題政府專家組召開會議,並向聯合國秘書長提交報告,各國首次統一約束自身在網絡空間中的活動,包括不能利用網絡攻擊他國核電站、銀行、交通、供水系統等重要基礎設施,以及不能在IT產品中植入“後門程序”等。 9月,中美就共同打擊網絡犯罪等執法安全領域​​的突出問題深入交換意見,達成重要共識;第八屆“中美互聯網論壇”在西雅圖召開,會談旨在促進中美兩國互聯網業界的交流與合作,持續推動世界互聯網和網絡信息安全。 10月,上海合作組織成員國主管機關在福建省廈門市成功舉行了“廈門-2015”網絡反恐演習;第六屆中英互聯網圓桌會議​​在倫敦開幕,簽署兩國首個網絡安全協議;中國軍事科學學會和中國國際戰略協會聯合主辦的第六屆香山論壇在北京國家會議中心舉行,其中一個重要議題是圍繞“網絡空間行為準則”的構建模式、路徑、內涵等展開討論。 12月1日,國務委員郭聲琨與美國司法部部長林奇、國土安全部部長約翰遜共同主持首次中美打擊網絡犯罪及相關事項高級別聯合對話。

Source: China Information Security

China’s PLA & Toward Winning ‘informationized local wars’

對獲獎“信息化條件下的局部戰爭”

At the beginning of the 2016, President Xi Jinping gave his commander’s intent for reorganizing China’s People’s Liberation Army (PLA) at this beginning of the week, China announced a series of major comprehensive reforms for the People’s Liberation Army (PLA) that will defiinitely forge China’s military modernization emphasis for the immediate and long term.

74GK-fxmazss1605475

The Chinese leadership intent for the overhaul is to redefine roles, missions and authorities of the PLA military services, consolidates Communist Party of China (CPC) control over the nearly autonomous military branches, and ultimately attain new levels of combat effectiveness drsigned under a new set of military guidelines of fighting and winning ‘local wars under informationized conditions.’

The first wave of official announcements included changes in the organisational force structure, starting at the highest echelons of command. Specifically, the creation of a new command structure; a joint staff under the Central Military Commission (CMC) that integrated the previous four general departments. The CMC will now manage the PLA through the Joint Staff Department comprised of 15 departments, commissions and offices.

The second significant measure is the inauguration of three new PLA services: PLA Ground Forces, PLA Rocket Forces and PLA Strategic Support Forces. The previous Second Artillery Corps, in charge of China’s nuclear and conventional ballistic missiles, has been upgraded to the PLA Rocket Force, a full service branch on par with the navy, air force, and, for the first time, the army.

The third major military reform measure, announced on 1 February 2016 @ 21:15 Local, is the restructuring of previous seven ‘military regions’ to five ‘major war zones’ or theater operations. While very similar to the US Military component commands the PLA re-oragnization reflects a move toward truly joint operations . The new major Chinese military commands now represent the Northern, Eastern, Southern, Western, and Middle or Central theaters, which are now mimicking the US Department of Defense (DoD) concept of Combatant Commands.

Changes in the PLA’s organization force structure complement its gradual technological advances. While since Novemeber 8th, 2012, the PLA under President Xi Jinping has seen many accomplishments: from the introduction of next generation of supercomputers such as the TianHe – 2,  aviation prototypes such as the J-16, J-20, J-31, new helicopters and UAVs, to the ongoing construction of a second aircraft carrier, as well as record number of commissioned People’s Liberarion Army Navy (PLAN) ships such as Type 054A, 056 frigates and 052C destroyers.

In the next five to ten years, China is expected to transfer many experimental models from R&D to the production stage (Plan 863), including a number of systems in what the PLA calls ‘domains of emerging military rivalry’: outer space, near space, cyber space, and under water.

These include next generation ballistic missiles, nuclear and conventional, long-range precision-strike assets such as hypersonic vehicles, offensive and defensive cyber capabilities and new classes of submarines, supported by a variety of high-tech directional rocket rising sea mines with accurate control and guidance capacity.

PLA Strategic Support Forces (SSF)

Of all the newly established units, the PLA Strategic Support Forces (SSF), 戰略支援部隊. represents perhaps the most significant development. While details remain hidden under a veil of secrecy, unofficial Chinese PLA sources and Chinese language press reports indicate that the SSF will consist of three independent branches: ‘cyber force’ with ‘hacker troops’ responsible for cyber offense and defense; ‘space force’ tasked with surveillance and satellites; and ‘electronic force’ responsible for denial, deception, disruption of enemy radars and communications systems. The overaarching focus of this reorganizartion is to create an effective and strategic support force” to strengthen the network and space attack.

The SSF integrates the previous PLA General Staff Headquarters Third and Fourth Departments, responsible for technical reconnaissance, electronic warfare, cyber intelligence and cyber warfare, as well as absorbing the Foreign Affairs Bureau of the former PLA General Political Department, tasked with information operations, propaganda and psychological warfare.

This corresponds to PLA writings on future conflicts such as Science of Military Strategy that emphasise a holistic perspective toward space, cyberspace and the electromagnetic spectrum that must be defended to achieve information dominance. This is the ability to gather, transmit, manage, analyse and exploit information, and prevent an opponent from doing the same as a key prerequisite for allowing the PLA to seize air and naval superiority.

To this end, the PLA recognises the importance of controlling space-based information assets as a means of achieving true information dominance, calling it the ‘new strategic high ground.’ Consequently, establishing space dominance is an essential component of achieving military ‘information dominance.’

Strategic Chinese Military Implications

Ultimately, the key question is this: will the reforms in the PLA’s organisational force structure will be reflected in its operational conduct, particularly in the PLA’s capabilities to exploit cyber-kinetic strategic interactions in its regional power projection, as well as responses in potential crises and security flashpoints in East Asia?

On one hand, China’s political and military elites believe that a new wave of the global Revolution in Military Affairsis gathering pace, led principally by the US, and China must therefore accelerate the pace of its military development. Internally, however, the reforms are designed primarily to close the PLA’s inter-service rivalries, interoperability gaps and the dominance of the ground forces.

In other words, significant capability gaps will continue to exist.

In the long-term the coordinated exploitation of space, cyber-space, electromagnetic spectrum and strategic information operations will likely enable four critical missions for the PLA:

  1. Force enhancement to support combat operations and improve the effectiveness of military forces such as ISR, integrated tactical warning and attack assessment, command, control and communications, navigation and positioning and environmental monitoring;
  2. Counter-space missions to protect PLA forces while denying space capabilities to the adversary;
  3. Information operations to direct influence on the process and outcome in areas of strategic competition, and;
  4. Computer network operations targeting adversaries data and networks.

Consequently, the PLA’s growing military-technological developments may significantly alter both the strategic thought and operational conduct of major powers in East Asia, including the US and its Five Eyes allies including the United Kingdom, New Zealand, Canada, and Australia.

Original content published at this Australian Source

China’s Strategic Support Forces – Mission and Combat Power Intent

[责任编辑:冯玲玲]

来源:人民网  作者:邱越  时间:2016-01-06

20160104131249755

    December 31, 2015, People’s Liberation Army’s governing bodies, the PLA rocket forces, the PLA strategic support troops inaugural meeting was held in Beijing Bayi Building.The newly established strategic support units is quite mysterious, whether it is a kind of military do? Military expert Yin Zhuo interview, said in an interview with People’s Daily, the main mission of strategic support task force is to support the battlefield, so that our army in the aerospace, space, network, and electromagnetic space battle can get local advantage, to ensure smooth operations. It is an important force in joint operations, and action will be the Army, Navy, Air Force and Army rocket integration, throughout the war always, is the key to winning the war power.

Defense Ministry spokesman Yang Yujun noted that the strategic support units is to safeguard the national security of the new combat forces is an important growth point of our military combat capability of quality, mainly the strategic, fundamental, all kinds of support are strong safeguards after forces from the formation of functional integration. The establishment of strategic support units, help to optimize the structure of military forces, thus improving the overall capacity. We will adhere to system integration, civil-military integration, strengthening the new combat forces, and strive to build a strong modernization strategy support units.

Yin 卓介绍 said strategic support units main task of the mission is to support the battlefield, so that our army in the aerospace, space, network, and electromagnetic space battle can get local advantage, to ensure smooth operations. Specifically, the strategic support unit tasks include: return of target detection, reconnaissance and target information; undertake everyday navigation operations, and Beidou satellite and space reconnaissance means management; undertake electromagnetic space and cyber space defense mission .

During the war, Reconnaissance Force cyberspace can help master the movements of the enemy army to help troops develop operations to ensure the achievement battlefield victory.In peacetime, with the increasing degree of national information technology, security, electromagnetic space and cyberspace are increasingly important. Yin Zhuo pointed out that with the satellite navigation facilities in civil applications in the future high-speed rail, ship, aircraft, vehicle or car will be equipped with on-board positioning facilities that our country’s socialist construction will play an important role. In addition, the face of many hackers on the Internet for the illegal actions of the implementation of such important government facilities, military facilities, civilian facilities important to the implementation of network attacks, which requires that we must be equipped with appropriate defenses. Strategic support forces in protecting the country’s financial security and people’s daily lives and safety will play an important role.

“Strategic support units is an important force in joint operations.” Yin Zhuo said, now can not do without any combat operations in cyberspace offensive and defensive strategic support troops in reconnaissance, early warning, communications, command, control, navigation, ocean digital, digital construction and other aspects of the Earth play an important role, and provide strong support for the joint battlefield operations, in order to achieve the goal of winning local wars under conditions of informatization.

Yin Zhuo noted that the strategic support units are not a separate fighting force, it will blend in with the Army, Navy, Air Force, Army and other branches of the military rocket actions form an integrated joint operations, strategic combat support units throughout the whole process, penetrated into every combat operations, will be the key to winning the war power.

Original Mandarin Chinese:

2015年12月31日,中国人民解放军陆军领导机构、中国人民解放军火箭军、中国人民解放军战略支援部队成立大会在北京八一大楼隆重举行。新成立的战略支援部队颇为神秘,这究竟是一支什么样的军事力量呢?军事专家尹卓在接受人民网采访时表示,战略支援部队主要的使命任务是支援战场作战,使我军在航天、太空、网络和电磁空间战场能取得局部优势,保证作战的顺利进行。它是联合作战的重要力量,将与陆军、海军、空军和火箭军的行动融为一体,贯穿整个作战始终,是战争制胜的关键力量。

国防部新闻发言人杨宇军指出,战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点,主要是将战略性、基础性、支撑性都很强的各类保障力量进行功能整合后组建而成的。成立战略支援部队,有利于优化军事力量结构、提高综合保障能力。我们将坚持体系融合、军民融合,加强新型作战力量建设,努力建设一支强大的现代化战略支援部队。

尹卓介绍称,战略支援部队主要的使命任务是支援战场作战,使我军在航天、太空、网络和电磁空间战场能取得局部优势,保证作战的顺利进行。具体地说,战略支援部队的任务包括:对目标的探测、侦察和目标信息的回传;承担日常的导航行动,以及北斗卫星和太空侦察手段的管理工作;承担电磁空间和网络空间的防御任务。

在战争时期,电子空间的侦察力量可以帮助我军掌握敌人的动向,协助部队制定作战行动,确保取得战场胜利。在和平时期,随着国家信息化程度日益提高,电磁空间和网络空间的安全也日益重要。尹卓指出,随着卫星导航设施在民间的应用,今后高铁、轮船、飞机、汽车都会配备车载或机载的定位设施,这些设施对我国的社会主义建设将起到重要的作用。此外,面对诸多黑客在互联网上针对我国实施的非法行动,比如对重要政府设施、军队设施、重要民用设施实施的网络攻击,这要求我们必须配备相应的防御力量。战略支援部队在保障国家金融安全和人民日常生活安全等方面将起到重要作用。

“战略支援部队是联合作战行动的重要力量。”尹卓说,如今任何作战行动都离不开电子空间攻防,战略支援部队将在侦察、预警、通信、指挥、控制、导航、数字化海洋、数字化地球建设等方面发挥重要作用,并将为联合作战行动提供有力的战场支持,以实现打赢信息化条件下局部战争的目标。

尹卓指出,战略支援部队不是一支单独的作战力量,它将与陆军、海军、空军、火箭军等军兵种的行动融为一体,形成一体化的联合作战行动,战略支援部队贯穿于作战的全过程,渗透到每一个作战行动中,将成为战争制胜的关键力量。

http://news.mod.gov.cn/pla/2016-01/06/

 

China’s World Internet Conference and the Future of Chinese Cyberspace

William Hagestad II

DSC_4244

December 2015, the Cyberspace Administration of China (CAC) invited me to attend the World Internet Conference (WIC) in Wuzhen, People’s Republic of China (PRC).

It is important to understand that the Chinese Government had created a 20 kilometer security exclusion zone around the epicenter of the WIC. The Chinese residents of Wuzhen were replaced with a regiment of soldiers from the People’s Liberation Army (PLA) and plainclothes policemen and women of China’s Ministry of State Security.

Opening day of the WIC China’s President, Xi Jinping gave his opening comments, a heavenly mandate for the largely handpicked Communist Party of China (CPC) member and international audience “Cyberspace is not a place [that is] beyond the rule of law”. President Xi’s opening address was focused on delegates including Russian Prime Minister Dmitry Medvedev and Pakistani president Mamnoon Hussain; conspicuously absent were officials from the United States, England, Australia, Canada and New Zealand.

Chinese President Xi provided direction which included a proposed the “four principles and five propositions”, systematically expounding China’s concept of a “China Network View” in the New Period. His focus included a statement that China is willing countries to strengthen dialogue and exchanges, effective management and control differences, and promote the development of the parties to the generally accepted international rules of cyberspace, cyberspace develop international conventions on terrorism, the fight against cybercrime and improve mutual legal assistance mechanisms, and jointly safeguard peace and security in cyberspace .

China’s 21st Century Boxer Rebellion

Short history lesson lest we forget how the Western failed to read between the Chinese tea leaves of China’s 21st Century network sovereignty initiative. During the early 1900’s an eight nation coalition of Eight Powers had invaded and occupied North Eastern China. The Qing Dynasty Chinese rebels known as the Boxer’s called this foreign invasion the “八國聯軍”, or Eight-Nation Alliance. This eight nation alliance included the Empire of Japan, United Kingdom, French Third Republic, German Empire, Austria-Hungary, Kingdom of Italy, the United States of America and the Russian Empire.[1] the capital of the Qing Empire, was captured eight countries & invading armies this day…”the darkest day in modern Chinese history.”[2] Save the attendance of Russia’s Prime Minister Dmitry Medvedev at the 2015 WIC, none of the other members of the 1900 “八國聯軍” were invited to officially attend China future discussion on the Internet at the WIC. It is prophetic then that the Chinese have not forgotten the foreign invasion and occupation of China’s homeland so long ago as backdrop for the WIC and the new future of China’s version of the Internet in the form of a Chinese Binary Rebellion…where delaying, denying and disrupting foreign incursions into China’s Internet are an echo and reminder of the 1900’s Boxer Rebellion.

 

You Are Either Part of the Party or You are Not

One of the important comments made by President Xi which underscores China’s current proposal for a secured and stable International Internet is that “Everyone should abide by the law, with the rights and obligations of parties concerned clearly defined. Cyberspace must be governed, operated and used in accordance with the law so that the internet can enjoy sound development under the rule of law.”[3]

Perhaps in the light of America’s National Security Agency failure to properly vet and control traitorous contractors, Chinese President Xi called for Chinese (sic) government action was needed to strengthen “civilised behaviour” on the internet, adding and calling for measures to “rehabilitate the cyber ecology”.[4]

China’s new cyber ecology will include, according to President Xi’s keynote speech will include building China into a global cyber power, speeding up Internet infrastructure development and imperative that China be regarded as a staunch defender of international cybersecurity.[5] Certainly the recent agreement with the United States on a high-level and mutual dialogue on cybercrime is evidence of China’s willingness to work with even the harshest critics of its organic Internet governance policies.[6]

International governments should make no mistake however, China’s leader emphasized that “cyber security is as important as national security.” And thus both Internet security and informatization are China’s major strategic issues concerning any country’s security and development.[7]

Curiously, however, President Xi’s keynote comments were live-tweeted by the state-run news portal, Xinhua, China’s official news agency, and broadcast on YouTube.[8] Both of these Western social media platforms are services which are blocked by Beijing.

Indeed as the WIC came to a conclusion, international cooperation was a main focus for China’s leadership as “President Xi Jinping urged all countries to respect Internet sovereignty, jointly safeguard cybersecurity, cooperate with an open mind, and improve Internet governance together.”[9]

 

Thus, given the international audience represented at the WIC, guidelines were given for adhering to the new Rule of Law on China’s version of an international Internet or be left behind and thus unable to participate in the world’s largest economy. Indeed Mr. Eugene Kaspersky signed a very lucrative contract at the WIC forging a unique cyber-security partnership with the China Cyber Security Company, thus demonstrating China’s willingness to embrace and recognize Internet technology such as those offered by Kaspersky.[10]

 

The Future of China’s Internet

 

Indicative of what the future holds for the Internet within the People’s Republic of China is the Xiaomi mobile phone I was provided on the first day of the WIC. While the number was Chinese, the SIM card was registered in Hong Kong allowing me to access typically blocked Western Internet websites such as Facebook, Twitter, and Google. China’s future Internet may include allowing limited access to the forbidden fruits of the Western Internet.

 

Similarly, the hotel the Cyberspace Administration of China (CAC) put me up in also came with a ‘special Internet account’ where access to usually blocked services was allowed, such as those enabled by my shiny new Xiaomi. However, as I switched off the ‘special account’, the familiar Chinese Internet presented itself and Gmail, Facebook, and Twitter were all blocked.

 

I expect that the future Internet we will all globally experience in the future will encompass an ability to access Chinese versions of Western Internet services, while denying or restricting our ability to use Western Internet technologies which may or may not be surveilled by Western intelligence services.

 

Quite frankly, my experience at China’s World Internet Conference was a positive one. Given the 20 kilometer security exclusion zone I felt very safe, no jihadist terrorists wielding legal semi-automatic weapons in Wuzhen. From a global cyber security researcher perspective, even though I could access both the Chinese and Western versions of the Internet, my experience was actually no different than any of the many other global locations I have visited in the past.

 

While the People’s Republic of China forges forward with a global secure definition of cyberspace which embodies both national security and sovereignty it will be up to other global governments to decide whether to be part of China’s secure Internet party or be left behind.

[1] “八国联军”.  八国联军侵华战争_八国联军为什么侵华_八国联军是哪八国 – 趣历史. Chinese History Topics. (December 2015). (Chinese Internet). Accessed: http://www.qulishi.com/huati/baguolianjun/

[2] Ibid.

[3] “2nd World Internet Conference”. CCTV.com. (December16-18, 2015). (Internet). Accessed: http://english.cntv.cn/special/wic2015/

[4] Ibid.

[5] Ibid.

[6] “Xi: China a staunch defender of cybersecurity”. CCTV.com. September 25, 2015). (Internet). Accessed: http://english.cntv.cn/2015/09/25/VIDE1443125998021193.shtml

[7] “Xi: Efforts should be made to build China into cyber power”. CCTV.com. (February 28th, 2015). (Internet). Accessed: http://english.cntv.cn/program/newshour/20140228/102815.shtml

[8]  “China is home to 670 million Internet users & over 4.13 million websites: President #XiJinping says at #WIC2015. Twitter. (December 15th, 2015). (Internet). Accessed:  https://twitter.com/XHNews/status/676955445286801410

[9] “2nd World Internet Conference concludes”. Xinhua. December18th, 2015). (Internet). Accessed: http://china.org.cn/china/2015-12/18/content_37351052.htm

[10] “Russia’s Kaspersky Labs signs deal with China Cyber Security Company as Beijing and Moscow call for end to US domination of internet”. (December17th, 2015). (Internet). Accessed: http://www.scmp.com/news/china/policies-politics/article/1892257/russias-kaspersky-labs-signs-deal-china-cyber-security

China’s Military Hacking of US Business Subsides

US Officials: #chinese military has slashed corporate #Hacking | TheHill

48287428.cached

By Cory Bennett

The Chinese military significantly reduced its cyber theft of American corporate secrets following the Justice Department’s May 2014 indictment of five Chinese officers, U.S. officials told The Washington Post.

And the People’s Liberation Army (PLA) has not returned to its previous level of commercial espionage since then, said several current and former U.S. officials.

“The big picture is that from 2014 on, the administration pursued a much more direct and coercive approach with China, and it has produced results over time,” Evan Medeiros, a former senior director for Asia affairs on the National Security Council, told The Post.

The report comes a day before top U.S. and Chinese officials begin several days of talks that aim to flesh out a September deal between the two countries to eradicate corporate hacking.

“For a period of time following the indictments, there was a very significant decrease” by the PLA, an unnamed U.S. official told The Post. “And today we are definitely not at the level that we were before the indictments.”

The narrative cuts against some recent reports that China’s civilian spy agency, the Ministry of State Security (MSS), has not reduced its commercial espionage efforts in the wake of the September agreement, which was struck during Chinese President Xi Jinping’s state visit to Washington, D.C. in September.

But it’s also possible that China has transitioned some of its digital theft from the PLA to the MSS, which can better hide its digital tracks.

The MSS is believed to be behind some of the more major U.S. breaches over the past year, including the intrusions at health insurer Anthem and the Office of Personnel Management (OPM), in which over 20 million federal workers had their sensitive data stolen.

But those hacks were likely part of China’s ongoing digital espionage campaign to gather detailed information on U.S. government workers, not an attempt to steal intellectual property.

Cyber espionage was not part of the September agreement between the two global powers.

A U.S. official told The Post that this week’s meetings will be a good opportunity to discuss China’s ongoing commitment to its September deal, but that it will take time to determine whether the Asian power is fully complying.

“As we move forward, we will continue to monitor China’s cyber activities closely and press China to abide by all of its commitments,” the senior administration official said. “We have been clear with the Chinese government that we are watching to ensure their words are matched by actions.”

Read Original article at: The Hill

 

Chinese Cyber Espionage – Infiltration of Target Networks Gets Sophisticated

Chinese hackers have expanded their attacks to parking malware on popular file-sharing services including Dropbox and Google Drive to lure unsuspecting  cyber-victims into downloading infected files and revealing compromising sensitive information. These Chinese hackers are also using more sophisticated cyber espionage tactics, focusing their cyber-spying on specific targets via targeted ‘white lists’ infect only specific visitors, named as high value targets, luring them unwittingly to compromised websites.

Chinese hackers are using the following sophisticated techniques, technology and protocols (TTPs) to successfully execute their cyber espionage campaigns:

  • Using noted Mandarin Chinese or Modern Russian hacking TTPs that are specifically charectreristic of both Chinese & Russian based hackers;
  • China’s Ministry of Public Security (MPS) is noting an increase in unauthorized access cases throughout Greater China;
  • Western media file sharing services such as Dropbox and Google Drive are being manipulated for launching successful hacker attack campaigns.

Surveillance and information extfiltration techniques are typically used only by sophisticated hackers from China and Russia who have been given specific cyber targeting packages for cyber-exploitation.

The level of hacking is a sign, they say, of how important China views Hong Kong, where 79 days of protests late last year brought parts of the territory, a major regional financial hub, to a standstill. The scale of the protests raised concerns in Beijing about political unrest on China’s periphery.

“We’re the most co-ordinated opposition group on Chinese soil, (and) have a reasonable assumption that Beijing is behind the hacking,” said Lam Cheuk-ting, chief executive of Hong Kong’s Democratic Party, which says it has been a victim of cyber attacks on its website and some members’ email accounts.

U.S.-based Internet security company FireEye said the attacks via Dropbox were aimed at “precisely those whose networks Beijing would seek to monitor”, and could provide China with advance warning of protests and information on pro-democracy leaders. The company said half its customers in Hong Kong and Taiwan were attacked by government and professional hackers in the first half of this year – two and a half times the global average.

China’s Ministry of Foreign Affairs, Public Security Bureau and the Liaison Office of the Central People’s Government in the Hong Kong Special Administrative Region did not respond to requests for comment. The Defence Ministry said the issue was not part of its remit. China has previously denied accusations of hacking, calling them groundless, and saying it is a victim.

The Hong Kong police said its Cyber Security and Technology Crime Bureau works with other law enforcement agencies to combat cross-border crime, but did not respond to questions on how much information it shares with mainland Chinese authorities, the origin of the Hong Kong cyber attacks, or whether these might be a source of instability or concern.

Police data show a drop in reported “unauthorised access”, which includes Internet or email account abuse and hacking, over the past two years. Many of the victims Reuters spoke to said they hadn’t bothered to report being hacked.

SWITCHING TACTICS

Like other groups taking on the might of Beijing – from Uighurs and exiled Tibetans to some Taiwanese – Hong Kong activists, academics and journalists have become more savvy and adopted tactics that, in turn, force hackers to get savvier still.

When Tibetan exile groups stopped clicking on files attached to emails, to avoid falling victim to a common form of ‘spear phishing’ attack, hackers switched their malware to Google Drive, hoping victims would think these files were safer, said Citizen Lab, a Canada-based research organisation which works with Tibetans and other NGOs.

Hackers also recently used Dropbox to lure Chinese language journalists in Hong Kong into downloading infected files. FireEye, which discovered the attack, said it was the first time it had seen this approach.

“We don’t have any arrogance to think we can beat them,” said Mark Simon, senior executive at the parent company of Hong Kong’s Apple Daily, a media group on the front line of the attacks.

STRANGE WORDS

Trying to stay ahead of the hackers, activists and others use multiple mobile phones with different SIM chips, encrypted messaging apps, apps that automatically delete tweets, and code words to set up meetings. If someone thinks they may be arrested, they remove themselves from group chats.

Some things are kept offline.

“If we want to talk, we have some signal,” said Derek Lam, a member of student group Scholarism that helped organise the protests. “It’s a few words … if I say some words that are really strange it means we have to talk somewhere privately.”

Law professor and protest organizer Benny Tai stores personal data, such as names, email addresses and mobile numbers, on an external hard drive that he says he only accesses on a computer without an Internet connection.

The pro-democracy Apple Daily, which says it is hacked on an almost weekly basis, has tightened its email security software, and has its lawyers use couriers rather than email. FireEye last year connected denial of service (DDoS) attacks against Apple Daily with more professional cyber spying attacks, saying there may be a “common quartermaster”. It said China’s government would be the entity most interested in these “political objectives”.

SOPHISTICATED HACKS

Steven Adair, co-founder of U.S.-based security firm Volexity, said that code hidden on pro-democracy websites last year, including those of the Democratic Party and the Alliance for True Democracy, suggested a group he said “we strongly suspect to be Chinese… who is very well resourced.”

He said such tactics were more usually seen employed by Russian hackers, aimed at very specific targets and designed to be as unobtrusive as possible. “It’s a real evolution in targeting,” he said.

In the run-up to Hong Kong district council elections earlier this month, hackers used more basic techniques, breaking into at least 20 Gmail accounts at the Democratic Party, according to party officials and Google logs seen by Reuters.

Between April and June, many hacked accounts were forwarding emails to lovechina8964@gmail.com. An examination of the hackers’ IP addresses by the party’s IT experts found some appeared to originate in China, party officials said.

(Reporting by Clare Baldwin and James Pomfret in HONG KONG and Jeremy Wagstaff in SINGAPORE, with additional reporting by Teenie Ho in HONG KONG and Michael Martina and Ben Blanchard in BEIJING; Editing by Ian Geoghegan)
Read more at Reuters

http://www.reuters.com/article/2015/11/29/cybersecurity-hongkong-insight-pix-tv-gr-idUSL3N13E35U20151129#lPgUKAm9SkpjG973.99