CFR Presents

Asia Unbound

CFR experts give their take on the cutting-edge issues emerging in Asia today.

Print Print Email Email Share Share Cite Cite
Style: MLA APA Chicago Close

loading...

Ideas about China’s Cyber Command

by Adam Segal
December 27, 2011

National Security Agency Headquarters at Fort Meade, Maryland.

Fort Meade, Maryland, which is home to U.S. Cyber Command. (Courtesy National Security Agency)

Chinese analysts and officials like to point out that it was the United States that first set up Cyber Command and thus, in their view, militarized cyberspace. Yet Chinese military thinkers are clearly thinking about what type of organizations and institutions they will need to conduct offensive cyber operations and to defend their own networks against attacks. An interesting piece in China Defense Daily lays out some of the characteristics necessary for “a highly effective command system for cyber war mobilization.”

• Military and civilian networks are interconnected, and the resources needed for cyber war permeate society; military units, social organizations, and even individuals “will all possibly become combat forces during a cyber war.”

• Given this diffusion of resources, there is a need for a cyber war mobilization command system with a “vertical command hierarchy” that reaches into all of society.

• Each of the branches of the military should have its own command division, manage necessary resources, cultivate forces, and organize training and drills. Once a war breaks out, there needs to be a “coordinated strategic level” command structure that mobilizes resources and launches combat operations.

• There must be specialized troops within industrial sectors, with especially strong ties to the information industries.

• Need to enlarge specialized cyber troops, recruiting computer network experts. The PLA should also reach out to all segments of society and create cyber reserves and people’s militias.

• Offense and defense in cyber war have distinct characteristics, and they change frequently. Offensive technologies include computer viruses, EMP bombs, microwave bombs, and computer and microchip backdoors.  For defense, there are network scanners, network wiretapping devices, password breaking devices, electromagnetic detectors and firewalls, and anti-virus software.

• Because the technological requirements of these weapons are very high, there must be extensive R&D programs into new offensive weapons as well as the defensive and offensive capabilities of the potential adversary.

This is a very “whole of society” approach, one which seems to fundamentally grasp that power in cyberspace is multi-faceted and spread throughout society. And while we assume that Chinese policymakers can simply mobilize these social forces to bolster state power, is that actually the case?  And if it is true now, might that change?

These types of articles (and perhaps blog posts like this one?) can be expected to feed into the growing security dilemma between the United States and China. Chinese analysts see Cyber Command and Cyber Storm exercises as directed against them. Though the tone of the article is exploratory—and the author, Huang Chunping, appears to be an aerospace and nuclear expert, not a cyber specialist—the take-home for many readers will be that all Chinese citizens are potential cyber warriors. Dampening a security dilemma is not easy.  Dialogue and confidence-building measures can help, but these are only at the preliminary stages right now. Hopefully they will pick up in 2012, otherwise the lack of trust between Washington and Beijing looks only to grow.

(p.s.—I am now worsening the security dilemma on twitter )

Post a Comment 1 Comment

  • Posted by RousseauC

    Are you saying that CIA is losing cyber war against the Chinese? Or CIA is becoming a tourism bureau? I guess CIA director will protest. That is a great humiliation to CIA….

Post a Comment

CFR seeks to foster civil and informed discussion of foreign policy issues. Opinions expressed on CFR blogs are solely those of the author or commenter, not of CFR, which takes no institutional positions. All comments must abide by CFR's guidelines and will be moderated prior to posting.

* Required

Pingbacks