Cyber dragon : inside China's information warfare and cyber operations

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower―currently the world's second largest economy―with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically. • Provides a detailed overview and thorough analysis of Chinese cyber activities • Makes extensive use of Chinese-language materials, much of which has not been utilized in the existing Western literature on the subject • Enables a better understanding of Chinese computer espionage by placing it in the context of broader Chinese information warfare activities • Analyzes Chinese military modernization efforts, providing a context for the ongoing expansion in China's military spending and reorganization • Offers readers policy-relevant insight into Chinese military thinking while maintaining academic-level rigor in analysis and source selection DEAN CHENG is senior research fellow for Chinese political and security affairs in the Asia Studies Center at the Heritage Foundation. He has worked at the Center for Naval Analyses, Science Applications International Corporation, and the U.S. Congress’s Office of Technology Assessment. Cheng has written extensively on Chinese military and security developments; testified before Congress; and spoken at the Army War College, National Defense University, and U.S. Air Force Academy.

Author(s): Dean Cheng
Series: Changing face of war
Publisher: Praeger, an imprint of ABC-CLIO, LLC
Year: 2017

Language: English
Pages: 300
City: Santa Barbara, California
Tags: China;PLA;History;Political Science;Chinese Society;Economics;Cyberwar;Space militarization;Societal control;Corruption;Mind Control;Propaganda;Military Strategy;Information Warfare;Disinformation;Information Dominance;

Acknowledgments
Chapter 1 Setting the Stage: China’s Evolving Views of Information
Chapter 2 China’s Military: This Is Not Your Father’s PLA
Chapter 3 Informationized Conflict: Maintaining Party Control amid the Information Revolution
Chapter 4 Information Warfare: Waging Information Campaigns in the Next War
Chapter 5 Information Operations: Putting Theory into Practice
Chapter 6 Space and Information Warfare: A Key Battleground for Information Dominance
Chapter 7 Organizing to Secure Information Dominance
Chapter 8 Chinese Views of Future Warfare and Implications for the United States
Notes
Bibliography