𝔖 Scriptorium
✦   LIBER   ✦

📁

Cyber dragon : inside China's information warfare and cyber operations

✍ Scribed by Dean Cheng


Publisher
Praeger, an imprint of ABC-CLIO, LLC
Year
2017
Tongue
English
Leaves
300
Series
Changing face of war
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts.

China combines financial firepower―currently the world's second largest economy―with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare.

Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically.

• Provides a detailed overview and thorough analysis of Chinese cyber activities

• Makes extensive use of Chinese-language materials, much of which has not been utilized in the existing Western literature on the subject

• Enables a better understanding of Chinese computer espionage by placing it in the context of broader Chinese information warfare activities

• Analyzes Chinese military modernization efforts, providing a context for the ongoing expansion in China's military spending and reorganization

• Offers readers policy-relevant insight into Chinese military thinking while maintaining academic-level rigor in analysis and source selection

DEAN CHENG is senior research fellow for Chinese political and security
affairs in the Asia Studies Center at the Heritage Foundation. He has worked
at the Center for Naval Analyses, Science Applications International Corporation,
and the U.S. Congress’s Office of Technology Assessment. Cheng has
written extensively on Chinese military and security developments; testified
before Congress; and spoken at the Army War College, National Defense University,
and U.S. Air Force Academy.

✦ Table of Contents


Acknowledgments
Chapter 1 Setting the Stage: China’s Evolving Views of Information
Chapter 2 China’s Military: This Is Not Your Father’s PLA
Chapter 3 Informationized Conflict: Maintaining Party Control amid the Information Revolution
Chapter 4 Information Warfare: Waging Information Campaigns in the Next War
Chapter 5 Information Operations: Putting Theory into Practice
Chapter 6 Space and Information Warfare: A Key Battleground for Information Dominance
Chapter 7 Organizing to Secure Information Dominance
Chapter 8 Chinese Views of Future Warfare and Implications for the United States
Notes
Bibliography

✦ Subjects


China;PLA;History;Political Science;Chinese Society;Economics;Cyberwar;Space militarization;Societal control;Corruption;Mind Control;Propaganda;Military Strategy;Information Warfare;Disinformation;Information Dominance;


📜 SIMILAR VOLUMES


Inside cyber warfare: mapping the cyber
✍ Jeffrey Carr 📂 Library 📅 2011 🏛 O'Reilly Media 🌐 English

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. <em>Inside Cyber Warfare</em> provides fascinating and disturbing details on how nations, groups, and indivi

Inside cyber warfare: mapping the cyber
✍ Jeffrey Carr 📂 Library 📅 2011 🏛 O'Reilly Media 🌐 English

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. <em>Inside Cyber Warfare</em> provides fascinating and disturbing details on how nations, groups, and indivi

Inside cyber warfare: mapping the cyber
✍ Jeffrey Carr 📂 Library 📅 2009 🏛 O'Reilly Media 🌐 English

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantage

Inside Cyber Warfare: Mapping the Cyber
✍ Jeffrey Carr 📂 Library 📅 2009 🏛 O'Reilly Media, Inc 🌐 English

What people are saying about Inside Cyber Warfare"The necessary handbook for the 21st century."--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments"A must-read for policy makers and leaders who need to understand the big-picture landscape