Fourth Department of the PLA General Staff Department

The Fourth Department (4PLA) of the Chinese People’s Liberation Army (PLA) General Staff Department (GSD) is also known as the Electronic Countermeasures and Radar Department. It is charged with the PLA’s offensive electronic warfare (EW) and information warfare (IW) missions, to include offensive cyber operations. Based on PLA doctrine and 4PLA’s mission, this department will almost certainly play a major role in future conflicts, including conflicts with the U.S. While information on 4PLA can be sparse, this paper will attempt to pull together many sources to provide an overview of 4PLA, to include its history, the role of an important 4PLA leader and the doctrine that he produced, 4PLA’s responsibilities and mission, its organizational structure, 4PLA’s relationship with other organizations in China, its locations and size, and how 4PLA and its related doctrine could be used in battle.

History

During the Sino-Soviet conflict in 1969, the Chinese military experienced repeated disruptions of their communication networks, impeding command and control (C2) of their combat units. This experience resulted in the conclusion that China’s C2 infrastructure could not survive a conflict with a technically advanced enemy. This conclusion led to a three phased approach to upgrading and advancing China’s C2 infrastructure. The third phase of this modernization effort, the development of electronic countermeasures for C2 infrastructure, continues today and is the responsibility of 4PLA.[1] The exact year that 4PLA was founded is not agreed upon by publicly available sources. One website indicates that 4PLA was established in 1982 for EW and counter-EW.[2] Another website on Major General Yao Hong Zhang may indicate that 4PLA existed or was being created in 1989 when he was transferred there. Multiple sources, however, indicate that 4PLA was established in 1990 as an EW entity.[3][4] A 1990 establishment falls in line with the international conflicts and activities that shaped PLA IW doctrine, specifically the first Gulf War.

The PLA’s observations of U.S. information operations in the Balkans and in the first Gulf War resulted in contemplation and reflection regarding China’s doctrine and adaptation to IW, which the PLA saw as a “new battlespace.”[5] The PLA referred specifically to the Gulf War as “the great transformation.” The effect of modern IW on operations and international strategy was clear to the PLA, and it began to establish organizations, strategies, and doctrine to address this new type of warfare.[6] The PLA understood as early as 1991 that future conflicts would heavily involve technology and electronics.[7] The establishment of 4PLA and its growth supported the development of the PLA’s IW capabilities.[8] In 1993, the PLA made revisions to the Central Military Commission’s Military Strategic Guidelines, stating that the PLA should prepare to “fight local wars under informationized conditions,”[9] and as early as 1996, major joint exercises included EW units.[10]

The PLA spent the years following the Gulf War studying military publications on IW from around the world, which eventually resulted in the PLA’s own IW doctrine that it tasked the 4PLA to implement.[11] 4PLA is believed to have been in direct control of traditional jamming and offensive EW operations since its inception, but it is unknown when 4PLA took on its IW responsibilities.[12] 4PLA has overseen the PLA’s IW operations since at least 1999, when Major General Dai Qingmin produced a major work outlining an IW doctrine that he called Integrated Network Electronic Warfare (INEW). His publication was reviewed by 4PLA, indicating that 4PLA was in charge of IW oversight at this time. In 2000, Dai was promoted to the head of 4PLA, likely demonstrating the GSD’s endorsement of the INEW strategy and consolidating the IW mission in 4PLA.[13] Bryan Krekel, in his book Occupying the Information High Ground, writes that 4PLA had to fight for this authority,[9] citing a February 2002 issue of China Military Science where the heads of the Third Department of the GSD (3PLA) and 4PLA each made their cases for operational control of IW.[14] Dai’s INEW strategy won the debate, and subsequently, IW responsibilities were consolidated in 4PLA.[15]

Major General Dai Qingmin and Integrated Network Electronic Warfare (INEW)

Major General Dai Qingmin was the head of 4PLA for approximately five years starting in 2000.[16] Prior to joining 4PLA leadership, Dai was the head of the PLA Electronic Engineering Academy, 4PLA’s primary training institution. His rise to the head of 4PLA is attributed to his seminal work on INEW, Introduction to Information Warfare. Soon after the release of this publication, Dai was promoted to the head of 4PLA.[17] Subsequent articles included An Introduction to Integrated Network Electronic Warfare, which Dai published in 2002.[18] The GSD’s decision to promote Dai is largely believed to be an endorsement of the INEW strategy.[19]

In terms of his ideology, Dai sees CNO and EW as principle forms of IW with information superiority as the ultimate goal. Dai indicates that specific IW operations include jamming or sabotaging an enemy’s information or information systems, sabotaging an enemy’s overall information operation structure, and blinding and deafening the enemy through IW measures. For Dai, the integration of military and civilian IW fighting forces and integration of soft, hard, offensive, and defensive forces are crucial.[20] An important aspect of Dai’s doctrine is the combination of both IW and kinetic strikes:

After the information attack succeeds in suppressing the enemy, the enemy’s plight of temporary ‘blindness, deafness, and even paralysis’ can be exploited for quick organization of an ‘information/firepower’ assault.[21]

Dai’s vision is destructive and disruptive in nature, calling for the destruction and control of the enemy’s information infrastructure.[22]

While Dai is the major author of INEW doctrine, the strategy stems from both U.S. and Soviet IW doctrine. During the Cold War, the Soviet Union had a doctrine called Radio-Electronic Combat (REC), which the U.S. Army describes as “the total integration of electronic warfare and physical destruction resources to deny us the use of our electronic systems.”[23] Multiple authors call INEW “REC on steroids.” This is because INEW adds additional dimensions to REC, specifically INEW moves beyond the tactical and theater realms of operations where REC was applied by elevating the INEW doctrine to a strategic level of war. Additionally, INEW adds cyber attacks and kinetic attacks on satellites to the REC doctrine. INEW also implements U.S. IW strategy from the AirLand Battle doctrine, the U.S. response to REC that integrated airpower, special operations forces, artillery, armor, and EW. Additionally, INEW implements lessons learned from U.S. information operations in Kosovo, the Balkans, and Iraq. Lessons learned from these U.S. military engagements may have influenced China’s decision to apply IW doctrine at the strategic war level.[23]

INEW integrates the use of “EW, CNO, and limited kinetic strikes against key command, control, communication, and computer nodes to disrupt the enemy’s battlefield network information systems.” CNO include computer network attack, defense, and exploitation. Aligning with Dai’s ideology, INEW unites offensive and defensive IW under a single authority, specifically 4PLA.[24] One of the most important aspects of INEW is that it integrates IW into larger PLA operations,[25] calling for kinetic attacks that make use of opportunities created by IW operations, as Dai discussed above.[26] For example, INEW doctrine combines precision strikes and IW operations, likely targeting command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) targets in line with INEW doctrine.[27] INEW applies a variety of methods, to include the disruption and destruction of systems, creation of false realities through falsified information, electronic jamming, deception, and suppression, computer network attacks, computer intrusions to sabotage information processing, and impeding information transmissions.[28][29]

The goal of INEW is to weaken and/or paralyze an opponent’s decision making capabilities and the political, economic, and military component’s of the enemy’s war infrastructure.[30] To do this, INEW doctrine calls for IW operations to seize control of opponent’s information flows and maintain information dominance during campaigns. IW operations also aim to achieve information dominance that would result in denying the opponent access to information that is vital to continuing the conflict.[31] This dominance should be maintained throughout conflicts. INEW continues to be the dominant doctrinal core of PLA IW operations today, with 4PLA likely in the authoritative position to implement this strategy.[32]

Responsibilities

4PLA has a range of responsibilities within the IW realm. 4PLA is the main entity that conducts EW,[33] including offensive EW,[34] the destruction of enemy information systems,[35] and computer network attacks and penetrations.[36] 4PLA is also responsible for the collection of electronic intelligence (ELINT), although it is unclear whether or not 4PLA is also in charge of ELINT analysis, since what happens to information once 4PLA collects it is relatively unknown.[37] ELINT collection responsibilities include space-based photoreconnaissance,[38] ELINT operations in conjunction with the PLA, PLA Air Force (PLAAF), and PLA Navy (PLAN), some military intelligence and counterintelligence efforts,[39] and the collection and cataloguing of exploits and weaknesses in enemies’ military infrastructure.[40] 4PLA is also in charge of electronic countermeasures, including developing radar and electronic countermeasure capabilities,[41] electronic counter-countermeasures,[42] and jamming and counter-jamming capabilities.[43]

On a strategic level, 4PLA coordinates the PLA’s EW and IW doctrine and strategy,[44] including implementing INEW.[45] There is debate as to what 4PLA’s defensive responsibilities are. Multiple writings on the PLA indicate that 4PLA is responsible for the defense of strategic targets, indicating that the PLA command bunkers in the Western Hills of Beijing are a strategic target that they defend,[46][47] but 3PLA is also identified as the entity in charge of computer network defense. It is possible that these sources are incorrect, this information is not publicly known, 3PLA and 4PLA share these responsibility, or that there are different aspects of defense that are divided between 3PLA and 4PLA. You Ji, in his book The Armed Forces of China, writes that 4PLA identified three tasked for improving the PLA’s C2 infrastructure’s ability to conduct EW, indicating that 4PLA may be responsible for assess China’s EW capabilities as well as the execution of EW.[48] In addition to its operational responsibilities, 4PLA also conducts research and development (R&D) on technology related to EW and IW. These programs will be discussed more below. Subsequently, these responsibilities support 4PLA’s ultimate goals of information superiority, the disruption of information control capabilities, the maintenance of China’s information systems and capabilities,[49] and the weakening of the enemy’s ability to acquire, transmit, process, and use information during conflicts.[50]

Organization

4PLA is organized under the GSD, a military component of the Central Military Commission (CMC) that oversees the GSD’s operations. The GSD organizes and directs PLA military units across China, including planning, training, and organizing armed forces.[51] The military intelligence services under the GSD, including the Second Department (2PLA) in charge of collecting military intelligence,[52] 3PLA, and 4PLA, compose China’s only all source intelligence organization.[53] The exact organization of 4PLA is not publicly known. Although, some components of its organization include operational electronic countermeasure units, some of which are integrated within military region organizations.[54] Additionally, 4PLA oversees or has relationships with multiple R&D institutions that focus on offensive IW technologies and related research.[55] In terms of 4PLA leadership, Dai is the most well known and frequently mentioned leader of 4PLA. 4PLA directors and political commissars, like other GSD department heads, are likely equivalent in rank to a Group Army Commander.[56]

In his book, James Mulvenon mentions the Joint Campaign Command Headquarters, which may take wartime responsibilities from 4PLA and may be organized into multiple “centers” that would direct and coordinate IW operations. These centers include comprehensive planning, electronic countermeasures, network warfare, information system defense, information security and secrecy, weapons and equipment support, and comprehensive support. One of the centers that Mulvenon mentions in detail is the Information Countermeasures Center, which he suggests 4PLA would have some involvement in. This center is composed of members from relevant services, likely including 4PLA. The center is responsible for providing advice, planning, and coordinating IW and countermeasure operations. Mulvenon states that personnel from 4PLA would be “trigger pullers” at the national and warzone levels of conflicts in this command structure.[32] This command structure would only be applied during wartime, however, and information on the command structure during peacetime is not publicly available.

4PLA Relationships with Other Organizations

4PLA appears to have a variety of relationships with other Chinese entities, including other military units, research institutes, and the private sector. 4PLA has counterparts in the PLA’s military regions, PLAN, PLAAF, and the Second Artillery Force, all of which have at least one electronic countermeasures regiment that 4PLA oversees and/or staffs.[57] Additionally,

Order of Battle

There is little available information on 4PLA’s size and location, but a Project 2049 white paper provides some insight. The white paper indicates that 4PLA has at least four bureaus, on brigade, and two regiments. Additionally, the white paper explains that operational 4PLA units, including an electronic countermeasures brigade, are headquartered in Langfang in the Hebei Province, with subordinate battalion-level entities in Anhui, Jiangxi, Shandong and “other locations in China.” The white paper also identifies at least two 4PLA units on Hainan Island. One of these units appears to be responsible for jamming U.S. satellite assets. Another regimental-level unit on the island may also have satellite jamming responsibilities, but it is unclear if these responsibilities are operational or experimental.[81]

Application

4PLA is in charge of offensive IW, which China is interested in developing and using for a variety of reasons. IW is inexpensive, is currently available to the PLA, does not require an invasion or use of other kinetic assets, has a reasonable level of deniability, exploits U.S. dependency on information systems, and can deter U.S. response and/or degrade U.S. deployments.[82] Using IW, China can also strike at the U.S. homeland, which is beyond the range of most conventional weapons.[83] To carry out IW operations, however, the PLA and 4PLA will need to prepare the battlespace ahead of time, likely during times of peace.[84] Cyber reconnaissance missions by 4PLA or 3PLA during peacetime can identify information system nodes and critical infrastructure to target during conflict.[85] One PLA publication, Information Confrontation Theory, suggests that IW forces, like 4PLA, could plant malicious software in enemy systems or other information systems that would remain dormant until employed.[86] These operations would allow the PLA to prepare for future IW operations.

Available Chinese IW doctrine strongly indicates that IW operations will be executed at the opening phase of conflicts. Some publications go so far as to say that IW cannot be effective unless carried out in the first phase of a conflict[87] and identify early establishment of information dominance as one of the highest operational priorities in a conflict, a strategic goal that is supported by the INEW doctrine.[88] Additionally, the PLA plans to use IW to achieve information dominance as quickly as possible, as opposed to using IW operations as a force multiplier during subsequent phases of a conflict.[89] Although Chinese IW doctrine does not suggest the PLA will use IW as a force multiplier, it does suggest that IW operations will be conducted throughout conflicts and not only in the opening phase, likely to retain information dominance.[90] Additionally, the PLA may use IW in a pre-emptive strike, especially against the U.S., since the Chinese military is inferior in terms of strength. The PLA may execute this pre-emptive strike so that it does not lose the initiative, which may be difficult or impossible to regain if the stronger military force, the U.S., gains the initiative in a conflict.[91] The PLA also sees IW campaigns as operations that do not require conventional military action, possibly indicating that a pre-emptive strike may not result in a kinetic conflict unless it crosses an adversary’s red line.[50] This strike may instead be a deterrence mechanism.

Writings on China’s IW strategy identify a range of both military and civilian targets for IW operations. Military targets include C4ISR, logistics, and direct military targets, or any targets that can prevent the opponent, and specifically the U.S. military, from operating or intervening in a conflict in the Pacific and targets that can degrade U.S. capabilities.[92] C4ISR infrastructure and logistics networks are seen by the PLA as U.S. strategic centers of gravity.[93] C4ISR targets include “the enemy’s information detection sources, information channels, and information-processing and decision making systems.”[49] A 2007 book published by the PLA, Informationized Joint Operations, indicates that C2 networks and logistics systems would be among the first entities targeted by INEW forces, which likely means 4PLA.[94] One PLA strategy is referred to by Northrop Grumman as “strike the enemy’s nodes to destroy his network.” This strategy directs the PLA to target the adversary’s C4ISR and logistics networks and then exploit the resulting “blindness” with traditional kinetic force.[95]

Logistics targets for IW operations include U.S. NAVSTAR GPS, airborne early warning platforms, satellites, and American military networks, such as the Joint Tactical Information Distribution System and the Non-secure Internet Protocol Router Network (NIPRNET).[96] By targeting logistics networks using IW forces like 4PLA, the PLA could delay resupply by misdirecting supply vehicles, corrupt or delete inventory files, or otherwise hindering the opponent’s logistics capabilities.[97] NIPRNET would likely be a high priority target for PLA IW operations.[98] NIPRNET contains and transmits critical deployment information, including time-phased force deployment lists (TPFDLs).[99] It is vital to logistical, personnel, and unit movements, and some writers believe that Chinese forces have already penetrated and mapped out this network, likely supporting future exploitation of NIPRNET, possibly during conflict.[100] By targeting NIPRNET, the PLA could degrade and/or slow down U.S. deployment long enough to achieve campaign objectives before the U.S. can respond.[101]

It is probable that IW operations against military targets will occur in parallel with kinetic operations against military targets, such as warships, aircraft, and supply craft that would exploit the temporary blindness and/or confusion caused by IW operations.[102] Simultaneous operations could be conducted on all domains at the same time, including ground, air, sea, space, and electromagnetic.[103] Identified civilian targets include IW operations against civilian communications systems, power grids, production lines, water utilities, chemical plants, telecommunications, and transportation entities that could directly affect both civilians and military personnel.[104] Successful IW operations targeting these entities would bring a conflict to the American homeland, which could impact U.S. support of a conflict and the willingness of the American people to support a war or get involved in a conflict.[105]

In terms of the goals of IW operations, China’s IW doctrine focuses on disruption and paralysis, not destruction, meaning that the PLA may manipulate and collect data or shut down networks, but they are unlikely to destroy this data or destroy target systems in IW operations, unless these operations are in conjunction with conventional military operations. Mulvenon provides this quote that outlines the goals of PLA IW operations:

We must as far as possible seal up the enemies’ eyes and ears, and make them become blind and deaf, and we must as far as possible confuse the minds of their commanders and turn them into madmen, using this to achieve our own victory.[106]

Additional IW goals include raising the cost of a conflict to an unacceptable level,[107] preventing or disrupting the acquisition, processing, or transmission of information in support of decision making or combat operations, and providing opportunities that can be exploited using kinetic strikes.[108] Some writings on Chinese IW operations indicate that the goals of some IW operations may be deterrence.[109] One report by Northrop Grumman indicates that IW deterrence, specifically through cyber network attack, a 4PLA responsibility, is a deterrence mechanism second only to nuclear deterrence.[110] Similar to pre-emptive strikes, these IW operations may lack subsequent kinetic actions.

References

  1. Ji, You (1999). The Armed Forces of China. New York: I.b. Touris. pp. 70–77.
  2. Shambaugh, David (2002). Modernizing China's Military. Berkeley: University of California Press. p. 128.
  3. "姚洪章". Baidu.com.
  4. Smith, I.C. (2012). Historical Dictionary of Chinese Intelligence. Lanham: Scarecrow. p. 95.
  5. Feakin, Tobias (2013). "Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies' Cyber Capabilities". Australian Strategic Policy Institute.
  6. Wortzel, Larry. Chinese People's Liberation Army and Information Warfare. Carlisle Barracks, PA: United States Army War College.
  7. Ji, You (1999). The Armed Forces of China. New York: I.B. Tauris. p. 7.
  8. Xuezhi, Guo (2012). China's Security State: Philosophy, Evolution, and Politics. Cambridge: Cambridge UP. p. 371.
  9. 1 2 Krekel, Bryan; Adams, Patton; Bakos, George (3/7/2012). Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage. Northrop Grumman. Check date values in: |date= (help)
  10. Stokes, Mark (1999). China's Strategic Modernization: Implications for the United States. Strategic Studies Institute.
  11. Wortzel, Larry. Chinese People's Liberation Army and Information Warfare. Carlisle Barracks, PA: United States Army War College. p. vi.
  12. Mulvenon, James (2009). Kamphausen, Roy; Lai, David; Scobell, Andrew, eds. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. Strategic Studies Institute. p. 272.
  13. Sharma, Deepak (2010). "Integrated Network Electronic Warfare: China's New Concept of Information Warfare". Journal of Defense Studies: 39.
  14. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 273.
  15. Krekel, Bryan (2009). Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. McLean, VA: The US-China Economic and Security Review Commission.
  16. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. 30: The US-China Economic and Security Review Commission.
  17. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. pp. 272–3.
  18. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 15.
  19. 1 2 Sharma. p. 39. Missing or empty |title= (help)
  20. Thomas, Timothy L. (2007). Decoding the Virtual Dragon. Fort Leavenworth, KS: Foreign Military Studies Office. pp. 111–112.
  21. Wortzel. p. 16. Missing or empty |title= (help)
  22. Wortzel. 14. Missing or empty |title= (help)
  23. 1 2 Wortzel. pp. 11–14. Missing or empty |title= (help)
  24. Sharma. pp. 36–37. Missing or empty |title= (help)
  25. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 261.
  26. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 16.
  27. Sharma. p. 36. Missing or empty |title= (help)
  28. Thomas. p. 36. Missing or empty |title= (help)
  29. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation,. The US-China Economic and Security Review Commission. p. 14.
  30. Wortzel. Chinese People's Liberation Army and Information Warfare. p. 11.
  31. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. pp. 6, 13.
  32. 1 2 Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 274.
  33. Smith. p. 95. Missing or empty |title= (help)
  34. 1 2 Wortzel. p. 22. Missing or empty |title= (help)
  35. Annual Report to Congress: Military and Security Developments Involving the People's Republic of China. Department of Defense. 2013. p. 10.
  36. Xuezhi. p. 371. Missing or empty |title= (help)
  37. Feakin. p. 8. Missing or empty |title= (help)
  38. Smith. pp. 95–96. Missing or empty |title= (help)
  39. Xuezhi. p. 371. Missing or empty |title= (help)
  40. Fritz, Jason (2008). "How China Will Use Cyber Warfare to Leapfrog in Military Competitiveness". Culture Mandala: 68.
  41. Stokes. Strategic Modernization: Implications for the United States. pp. 34, 52.
  42. Xuezhi. p. 371. Missing or empty |title= (help)
  43. Wortzel. Chinese People's Liberation Army and Information Warfare. p. 22.
  44. Stokes. Strategic Modernization: Implications for the United States. p. 22.
  45. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 30.
  46. Stokes. Strategic Modernization: Implications for the United States. p. 52.
  47. Xuezhi. p. 371. Missing or empty |title= (help)
  48. Ji. p. 77. Missing or empty |title= (help)
  49. 1 2 Wortzel. p. 3. Missing or empty |title= (help)
  50. 1 2 Annual Report to Congress: Military and Security Developments Involving the People's Republic of China. Office of the Secretary of Defense. p. 10.
  51. Krekel. p. 44. Missing or empty |title= (help)
  52. Fritz. p. 36. Missing or empty |title= (help)
  53. Mattis, Peter (2012). "The Analytic Challenge of Understanding Chinese Intelligence Services". Studies in Intelligence: 48.
  54. 1 2 Krekel. p. 47. Missing or empty |title= (help)
  55. Sharma. p. 38. Missing or empty |title= (help)
  56. Stokes, Mark A.; Lin, Jenny; Hsiao, L.C. Russell (2011). The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructur. Project 2049 Institute. p. 4.
  57. Prakash, Rahul (2013). "China and Cyberspace". ORF Issue Brief: 5.
  58. Smith. Missing or empty |title= (help)
  59. Sharma. pp. 39–40. Missing or empty |title= (help)
  60. Sharma. Missing or empty |title= (help)
  61. Staff Reporter. "PLA Building Fleet of 100 Large Transport Aircraft". WantChinaTimes.com.
  62. 1 2 3 Smith. p. 96. Missing or empty |title= (help)
  63. Stokes. Strategic Modernization: Implications for the United States. p. 34.
  64. Mulvenon, James; Bickford, Thomas (1999). Mulvenon, James; Yang, Richard H., eds. The PLA and the Telecommunications Industry in China. Washington: RAND.
  65. Smith. pp. 97–8. Missing or empty |title= (help)
  66. Stokes. Strategic Modernization: Implications for the United States. pp. 34, 53.
  67. 1 2 Sharma. p. 37. Missing or empty |title= (help)
  68. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 276.
  69. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 7.
  70. "PLA Building Fleet of 100 Large Transport Aircraft".
  71. Feakin. p. 3. Missing or empty |title= (help)
  72. Prakash. p. 5. Missing or empty |title= (help)
  73. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 30.
  74. Smith. p. 263. Missing or empty |title= (help)
  75. Stokes. The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure. p. 2.
  76. Prakash. p. 22. Missing or empty |title= (help)
  77. Lewis, James; Timlin, Katrina (2011). Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. Center for Strategic and International Studies. p. 8.
  78. Minnick, Wendell. "China's PLA Involved in Cyber Espionage: Report". DefenseNews.com.
  79. Feakin. p. 4. Missing or empty |title= (help)
  80. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 21.
  81. Stokes. The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure. p. 15.
  82. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. pp. 259, 272.
  83. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 21.
  84. Thomas. p. 31. Missing or empty |title= (help)
  85. Wortzel, Larry (2012). "Assessing the Chinese Cyber Threat". Defense Dossier: 4.
  86. Krekel. pp. 25–26. Missing or empty |title= (help)
  87. Investigating the Chinese Threat:Military and Economic Aggression (2012) (testimony of Dr. Larry M. Wortzel). p. 5.
  88. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 7.
  89. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 259.
  90. Investigating the Chinese Threat: Military and Economic Aggression. p. 1.
  91. Thomas. p. 129. Missing or empty |title= (help)
  92. Wortzel. "Assessing the Chinese Cyber Threat": 1.
  93. Krekel. p. 9. Missing or empty |title= (help)
  94. Krekel. p. 31. Missing or empty |title= (help)
  95. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 23.
  96. Wortzel. p. 11. Missing or empty |title= (help)
  97. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 271.
  98. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 24.
  99. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 270.
  100. Wortzel. p. 28. Missing or empty |title= (help)
  101. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 24.
  102. Annual Report to Congress: Military and Security Developments Involving the People's Republic of China. Office of the Secretary of Defense. p. 24.
  103. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 10.
  104. Fritz. p. 65. Missing or empty |title= (help)
  105. Wortzel. p. 11. Missing or empty |title= (help)
  106. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 258.
  107. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 258.
  108. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 12.
  109. Mulvenon. PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. p. 257.
  110. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The US-China Economic and Security Review Commission. p. 20.
This article is issued from Wikipedia - version of the Thursday, December 17, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.