How China will use cyber warfare to leapfrog in military competitiveness
نویسنده
چکیده
The People’s Republic of China (PRC) may be a global power economically but its military lacks force projection beyond the Asia Pacific region. Its traditional military hardware is one to three generations behind the US and Russia. In light of these deficiencies it is probable that cyber warfare will provide China with an asymmetric advantage to deter aggression from stronger military powers as they catch up in traditional military capabilities. Cyber warfare would also allow China to leapfrog by means of technology transfer and exploiting adversary weaknesses. This investigation will address three primary questions: What is China’s current military capability? How would cyber warfare allow China to seriously advance its strategic abilities? And what is the evidence that China is headed in a cyber warfare direction?
منابع مشابه
China's Emerging Cyber War Doctrine
China will develop much greater depth and sophistication in its understanding and handling of information warfare techniques and operations. With Indian security becoming increasingly dependent on date processing and network centricity, it will become extremely vulnerable to such information warfare campaigns. India needs to adopt a multidisciplinary approach towards dealing with the emerging c...
متن کاملCyber Wars: A Paradigm Shift from Means to Ends
The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...
متن کاملRealistic and Affordable Cyberware Opponents for the Information Warfare BattleSpace
As military environments increase in the complexity, fidelity, scope, and number of participants, the reliance of the military upon information superiority to facilitate successful operations increases. In conjunction with this increase upon accurate and timely information the vulnerability of military forces to information attack also increases. Additionally, information management capability ...
متن کاملA Case Study of the 2016 Korean Cyber Command Compromise
On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of ‘evidence’ were used for attribution purposes. Disclosed methods of ...
متن کاملDigital Forensics in a Cyber Warfare Context
The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context o...
متن کامل