Sie sind auf Seite 1von 14

China Threat in Space and Cyber Space

Page 1 of 14

China Threat in Space and Cyber Space


Point Paper Final Robert Lai Contemporary International ProblemsPOL300 September 5, 2008

China Threat in Space and Cyber Space

Page 2 of 14

According to the hearing of China's Proliferation Practices and the Development of its Cyber and Space Warfare Capabilities before the U.S.-China Economic and Security Review Commission on May 20, 2008, Chinas increasing capabilities in cyber and space warfare have posed growing threats to the national interest of the United States (China's Proliferation Practices and the Development of its Cyber and Space Warfare Capabilities, 2008). China has attained shashoujian (killer weapon) as a deterrent tool against the United States, and the shashoujian will be very effective as a secret weapon for asymmetric attack to the critical infrastructure of the United States (Bruzdzinski). Chinas shashoujian means more than assassins mace that it is a vital concept on combining Western technology with Eastern wisdom into an array of secret weapons and military doctrines. China is taking the stance that the best defense is an offense, where its space and cyber space program (elements of shashoujian) are focused on offensive strategies. The Iraq Wars, Kosovo, and Afghanistan wars resulted in China realizing US overwhelming superiority in both space and cyber space. However, the US military C4ISR (command, control, communications, computers, intelligence, surveillance and reconnaissance) has a dependence on space and cyber space, which make the two domains the most vulnerable. In Sun Tzus Art of War, one of the principles is to strike where the enemy is most vulnerable. China understands this strategy profoundly and develops capabilities in parallel to exploit these vulnerabilities. Current Issues of the China Threat in Space China understands that the US supremacy in space with the advanced satellite system will have an advantage over Chinas military. On the other hand, the Peoples Liberation Army (PLA) of China is convinced that the US strength in space can become its Achilles heel as well (Wortzel, 2003a). The space program of China is dual-use for civilian and military, and its military objective is secretive and unknown to the US. In the past five years, China has made significant milestones in becoming the third country after the United States and Russia to have successfully launched manned spacecrafts two times; the successful launch of Change-1 orbiting the moon has set the stage for the Moon Exploration Project (Yuan, 2008). The challenge from China to US in space is inevitable. Opinions and details of this issue: The successful anti-satellite (ASAT) missile test event on January 17, 2007, showed that China has already mastered the capability in counter-space by using ballistic missiles to shoot down spy satellites in low earth orbit (Covault, 2007). Chinas ASAT test has just aligned with its plan to decapitate, paralyze, disintegrate, and blind the adversary (Bruzdzinski). This ASAT test demonstrated the vulnerability of US satellites in low earth-orbit used for military communication, GPS navigation for smart bombs and troops, and for real-time surveillance (U.S. official: Chinese test missile obliterates satellite - CNN.com, 2007). The ASAT test caught the U.S. by surprise since it was considered a military hedge to the U.S. space dominance (Hagt, 2007). Beijing will develop a high-powered laser weapon in the near future to destroy enemy satellites (Chinese Anti-Satellite Capabilities). In January, 2006, Pentagon confirmed that China beamed a ground-based laser at a U.S. spy

China Threat in Space and Cyber Space

Page 3 of 14

satellite over its territory, but no details were provided about any damage to the spy satellite. Does China have the high-powered laser capability to attack a satellite in low earth orbit? No, there are still technical challenges (e.g., atmospheric attenuation and turbulence) to overcome before China can utilize high-powered laser for space target. However, the incident has signaled a fact that China has the capabilities to track the target in low earth orbit with lowerpowered laser beam. This is an important prerequisite for the high-powered laser attack to follow. According to the "Operational Implications of Laser Weapons" paper by Richard J. Dunn, III, U.S. experiments have already demonstrated that satellites located hundreds of kilometers up are vulnerable to high energy lasers (Richard J. Dunn, III, 2005). China is pursuing a multi-dimensional counter-space programs to develop counter-space capabilities that could be used to deny others (e.g., U.S., Japan) access to, or operations in outer space (Donald A. Manley, 2008). On April 19, 2004, China launched its first nanotechnology-based satellite, Nano-satellite I, which was only 55 pounds (Smith, 2004). It is obvious that the nano-satellite is one of the shashoujian for jamming or destroying enemy satellite in kinetic collision mode. To make the matter even worst, China can deploy multiple nanosatellites and form distributed attack on multiple U.S. space assets, which can be effective and inexpensive. China has revealed its Air Launched Launch Vehicle model first at the 2006 Zhuhai Airshow (Tellis, 2008). In additional, China has built solid fueled mobile space launch vehicle (SLV) to support rapid nanosatellites launching. Space Pearl Harbor might be the U.S. worst nightmare since the threat is real. Chinas moon program is a comprehensive program that includes a lander, a sample return mission, human mission, and eventual permanent space station (Reynolds, 2008). Nationalism is a major factor since Chinese have thousands of years of passion about the moon. Change, a Chinese goddess, flew to the moon to live a happier life there according to Chinese legend (Rong, 2007). The MidAutumn Festival, occurs at the fifteenth of the eighth month in Chinese Lunar Calendar, that has always been the most important traditional holiday for Chinese; it is also the festival for harvest in the Autumn and family reunion. There are countless of legends, folklores, and mythologies that admire the moon and the goddess of moon, Change, in Chinese history. Meeting with Change on the moon is not only the dream of many Chinese poets, but all Chinese share the same dream. Chinese government has known that its red flag on the moon means a lot for the pride of its nation; it also means the mandate from heaven for the communist party to rule the country, and becomes a superpower in space. China is growing its second generation of talents in science and technology from the space program. 80% of 10,000 Chinese engineers and technicians working in the China manned space program are under 40 (Xinhua, 2003). The Peoples Liberation Army (PLA) has a role in Chinas space activities, where its militaristic intent is unknown. Chinas manned and lunar space programs have prerequisites in tracking and identifying satellites, which could provide them the effective and precise physical attacks in outer space (Donald A. Manley, 2008). China has the resolve to challenge the U.S. dominance in space.

China Threat in Space and Cyber Space

Page 4 of 14

Current Issues of the China Threat in Cyber Space Cyber warfare is no longer a concept, but rather a reality. Recently, Russia conducted cyber warfare against Georgia before the Russian troop advance. The incident of the cyber attack on Estonia in the spring of 2007 has signaled that cyber space has become a virtual battlefield. There have been many incidents of hacking by Chinese to the U.S. defense and civilian government networks, but China denies the allegation since source IP addresses of the attacker origin in China might be spoofed. However, Kevin Coleman, a Senior Fellow at the Technolytics Institute, said that China has the intent and technological capabilities necessary to carry out a cyber attack anywhere in the world at any time (Coleman, 2008). The critical infrastructure of the U.S. that include financial network, communication, internet, Supervisory Control and Data Acquisition System (SCADA) controlled water and power grids, and defense network are all vulnerable to cyber attack. A digital Pearl Harbor attack is possible. Opinions and details of this issue: The Chinese are the first to use cyber-attacks for political and military goals, says James Mulvenon, an expert on China's military and director of the Center for Intelligence and Research in Washington (Marquand & Arnoldy). Toshi Yoshihara, a Research Fellow and resident expert on security issues in the AsiaPacific region at the Institute for Foreign Policy Analysis, has pointed out that China has demonstrated an intense fascination with information warfare (IW) in his monograph Chinese Information Warfare: A Phantom Menace or Emerging Threat (Yoshihara, 2001). The transformations of the Peoples Liberation Army (PLA) and its interest in Information Warfare (IW) theory and practice coupled with the principles of the Art of War by Sun Tzu should signal an alarm call to the U.S. (Thomas, 2008). According to an annual report issued by the Office of the Secretary of Defense, titled "Military Power of the People's Republic of China 2007," the PLA has developed a comprehensive principle of Computer Network Operations (CNO) computer network attack, computer network defense, and computer network exploitation (Peter, 2007). The PLAs CNO is methodical in offense as well as defense. In PLA, there are information warfare reserve and militia units, which have the capability to launch pre-emptive attacks against enemy computer networks (Rogin, 2006). In Like Adding Wings to the Tiger, Timothy L. Thomas stated Chinese Information Warfare (IW) theory is strongly influenced by Chinese military art (Thomas, 2008). The recent hackings to the U.S. Government appeared to have originated within the People Republic of China. The code name, Titan Rain, hacking was suspected to be a structured cyber attack by highly skillful hackers with Peoples Liberation Army (PLA) involvement (Thornburgh, 2005a, 2005b). These successful attacks proved that the PLAs net militia units have reached high level of technological sophistication in hacking. The new doctrine of the PLA described as pressure point warfarethe attacking of specific nodes to leave the

China Threat in Space and Cyber Space

Page 5 of 14

adversary paralyzed, that seems to be adopted in these hackings have caused some agencies networks to go out of service (Norton-Taylor, 2007). In November, 2006, Chinese hackers prompted Navy college site closure (Chinese hackers prompt Navy college site closure, 2006). The Chinese hackers increase their interest in getting information on military network infrastructure. In addition, the Defense Information Systems Agencys Nonclassified Internet Protocol Router Network (NIPRNET) is a prime target for many hackers to exploit. The PLA understands that the attacks on NIPRNET might effectively impact the militarys logistics system (China's Proliferation Practices and the Development of its Cyber and Space Warfare Capabilities, 2008). Data-mining might even infer classified information from unclassified network. With simultaneous asymmetrical cyber attacks, China military might create a digital 9/11 attack to bring down the critical network infrastructure of the U.S. (Brookes, 2005). Botnet works like sleeper cells in a collection of compromised computer (also known as zombie) on internet that can be remotely-controlled to attack other peer computers on the network in a distributed fashion. PLA will apply this technique in its cyber offense operation. Two PLA air force officials, Sun Yiming and Yang Liping, have drafted a detailed plan to disable U.S. aircraft battle carrier fleet with a devastating cyber attack, which might use botnet, according to a Pentagon report obtained by The Times (Reid, 2007). Dr. Jiang Mianheng graduated from Drexel in 1991 with a doctorate in Electrical Engineering who is the son of Former President Jiang Zeming has strong association between the State Key Laboratory of Information Security (SKLOIS) and Dr. Jane Yan of Venus Tech (the elite hacking group) (The VeriSign iDefense Intelligence Operations Team, 2008). PLA Net Militia units have enlisted members from academia, private sectors, and state entities. SKLOIS researchers led by Dr. Xiaoyun Wang broke the MD5 and SHA-1 encryption algorithm and announced the hash collision attacks at the CRYPTO 2004 conference (Cryptography Research - Hash Collision Q&A). Courses of action

If the space is considered as the fourth domain after air, land, and sea, then cyber space is the fifth domain for the U.S. military. In a net-centric warfare, the five domains should be viewed as one integral system, since they are interconnected functionally to support superiority. Both space and cyber space domains are very closely related since one complements the other. The space dominance provides widespread military capabilities (e.g., navigation, surveillance, command and control) and economic potential to the U.S. The cyber space links all critical infrastructures including the support to the defense network. These two domains are vital to the U.S. national interest. China is aggressive to challenge the space dominance and information superiority of the U.S. The U.S. should consider the following courses of action in order to counter the China emerging threat in space and cyber space. Work out a space arms control proposals in accordance with the U.S. Policy on the prevention of an arms race in outer space (PAROS) to contain China, Russia,

China Threat in Space and Cyber Space

Page 6 of 14

and others. Without a multilateral agreement to ban the development of space weapons, it might encourage the space arms race. PAROS might make China improve its transparency on its space program (Logan, 2008). Yet, PAROS is a double-edged sword that it also prevents the U.S. from developing space weapon. In the worst case, the negotiation process might put pressure on China. Containment might not work well for China since it has demonstrated its strong determination to succeed in its space program. Engagement might bring in cooperation instead of confrontation. If U.S. can partner with Russia in the international space station program, then it should include China to join the partnership. There are two benefits to cooperating with China in space program. First, it keeps China dependent on U.S. technology instead of letting China develop space technologies unilaterally. Second, U.S. can have leverage in other areas of the relationship (Logan, 2008). Step up the Air Force Cyber Commands effort to counter cyber attacks proactively. Air Force has claimed that the cyber domain is characterized by use of electronic systems and the electromagnetic spectrum. Space and cyber space domains are interrelated, and Air Force might justify to taking the lead to coordinate and de-conflict cyber activities. Finalize an Information Warfare (IW) doctrine to ensure cyber dominance. In Joint Vision 2010, the Joint Chiefs of Staff specifies the central operational concept of the futurethe one from which the others will flowto be information superiority (Major Raul R Henning, 1997). Since the PLA might already have an IW doctrine, it is logical to believe that China has strategic plan on IW attack and defense. The IW doctrine to the U.S. is important for its readiness to counter-attack and maintain information superiority. U.S. government must plan on having long-term funding and resources to meet the strategic goal. In the hearing before the U.S.-China Economic and Security Review Commission, U.S. Congresswoman Zoe Lofgren said its not at all clear to us in Homeland overlooking the various departments that the FISMA standards are even being deployed throughout the federal government, and certainly its not clear that the FISMA standards provide an adequate level of security from a cyber point of view (China's Proliferation Practices and the Development of its Cyber and Space Warfare Capabilities, 2008). The Office of Management and Budget (OMB) should mandate all Information Systems Security workforces in all federal agencies to establish the minimum requirements for professional certification (e.g., Certified Information Systems Security Professional, Information Systems Security Engineering Professional) in order to meet the required skills, knowledge, and abilities for fighting the cyber security. To meet the challenge in cyber security, the U.S. government must take the initiatives to promote research and innovation in robust cyberspace technologies, and foster collaboration amongst government, private industry and academia. Staying ahead is the only game plan to counter cyber-attack.

China Threat in Space and Cyber Space

Page 7 of 14

References: Before the Gunfire, Cyberattacks - NYTimes.com. . Retrieved August 13, 2008, from http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=1&em&oref=s login. Bennett, J. T. (2006, October 4). World Politics Review | Air Force to Establish New Cyberspace Operations Command. . Retrieved August 3, 2008, from http://www.worldpoliticsreview.com/article.aspx?id=233. Bishop, M. W. (2006, September). Foreign Policy: Chinas Cyberwarriors. . Retrieved August 3, 2008, from http://www.foreignpolicy.com/story/cms.php?story_id=3553. Blincoe, R. (2008, July 28). China blamed for cyber-terrorism - vnunet.com. . Retrieved August 3, 2008, from http://www.vnunet.com/vnunet/news/2222622/chinablamed-hack-attacks. Bowen, P., Chew, E., & Hash, J. (2007, January). NISTIR-7359: Information Security Guide For Government Executives. . Retrieved August 4, 2008, from http://csrc.nist.gov/publications/nistir/ir7359/NISTIR-7359.pdf. Broad, W. J., & Sanger, D. E. (2007, January 18). China Tests Anti-Satellite Weapon, Unnerving U.S. - New York Times. . Retrieved September 6, 2008, from http://www.nytimes.com/2007/01/18/world/asia/18cnd-china.html. Brookes, P. (2005, August 30). The Art of (Cyber) War. . Retrieved August 3, 2008, from http://www.heritage.org/Press/Commentary/ed083005a.cfm. Bruno, G. (2008, February 27). The Evolution of Cyber Warfare - Council on Foreign Relations. . Retrieved September 10, 2008, from http://www.cfr.org/publication/15577/evolution_of_cyber_warfare.html. Bruzdzinski, J. E. MITRE - Our Work - MITRE Research Program - Best Paper Awards 2004 - Demystifying Shashoujian: China's 'Assassin's Mace' Concept. . Retrieved September 5, 2008, from http://www.mitre.org/work/best_papers/04/bruzdzinski_demystify/. Burke, A. W. (2006, April 17). Space Threat Warning: Foundation for Space Superiority, Avoiding a Space Pearl Harbor. . Retrieved September 6, 2008, from http://stinet.dtic.mil/cgibin/GetTRDoc?AD=ADA476999&Location=U2&doc=GetTRDoc.pdf. Butler, A. (2008, March 16). USAF Eyes Counter-ASAT System in 2011 | AVIATION WEEK. . Retrieved September 6, 2008, from http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=ne ws/aw031708p2.xml&headline=USAF%20Eyes%20CounterASAT%20System%20in%202011. Cain, F. (2008, March 17). Preventing Pearl Harbor in Space | Universe Today. . Retrieved September 6, 2008, from http://www.universetoday.com/2008/03/17/preventing-pearl-harbor-in-space/. Carroll, J. (2008, May 12). Preventing an arms race in outer space - The Boston Globe. . Retrieved September 10, 2008, from http://www.boston.com/bostonglobe/editorial_opinion/oped/articles/2008/05/12/p reventing_an_arms_race_in_outer_space/.

China Threat in Space and Cyber Space

Page 8 of 14

Chapter 16: Electronic and Information Warfare. . Retrieved August 14, 2008, from http://www.cl.cam.ac.uk/~rja14/Papers/SE-16.pdf. China presents possible space and tech threats, US says - electronic-threats - 04 March 2008 - New Scientist Tech. . Retrieved August 3, 2008, from http://technology.newscientist.com/channel/tech/electronic-threats/dn13409china-presents-possible-space-and-tech-threats-us-says.html. China Vitae : Biography of Jiang Mianheng. . Retrieved September 11, 2008, from http://www.chinavitae.com/biography/Jiang_Mianheng. China's Proliferation Practices and the Development of its Cyber and Space Warfare Capabilities. (2008). Retrieved August 3, 2008, from http://www.uscc.gov/hearings/2008hearings/transcripts/08_05_20_trans/08_05_2 0_trans.pdf. Chinese Anti-Satellite Capabilities. . Retrieved August 3, 2008, from http://www.globalsecurity.org/space/world/china/asat.htm. Chinese hackers prompt Navy college site closure. . (2006, November 30). Retrieved August 3, 2008, from http://www.washingtontimes.com/news/2006/nov/30/20061130-103049-5042r/. Col James W. McLendon. (1995, September). Battlefield of the Future: Information Warfare: Impacts and Concerns. . Retrieved August 3, 2008, from http://www.airpower.au.af.mil/airchronicles/battle/chp7.html. Coleman, K. (2008, May 8). Defense Tech: China's Cyber Forces. . Retrieved September 10, 2008, from http://www.defensetech.org/archives/004165.html. Coping with the Dragon: Essays on PLA Transformation and the U.S. Military. The National Defense University Center for Technology and National Security Policy. Retrieved August 3, 2008, from http://www.ndu.edu/ctnsp/pubs/CopingwithDragon.pdf. Covault, C. (2007, January 17). Chinese Test Anti-Satellite Weapon. . Retrieved August 3, 2008, from http://www.aviationweek.com/aw/generic/story_generic.jsp?channel=awst&id=ne ws/CHI01177.xml. Cryptography Research - Hash Collision Q&A. . Retrieved September 11, 2008, from http://www.cryptography.com/cnews/hash.html. Cyber Innovation Center's Mission Statement. . Retrieved September 11, 2008, from http://www.cyberinnovationcenter.org/AboutUs/Focus/tabid/62/Default.aspx. Cyberwar unsurprisingly rages in Georgia | Beyond the Beyond from Wired.com. . Retrieved August 13, 2008, from http://blog.wired.com/sterling/2008/08/cyberwar-unsurp.html. David, L. (2002, March 12). SPACE.com -- Red Dragon Rising: China's Space Program Driven by Military Ambitions. . Retrieved September 8, 2008, from http://www.space.com/news/china_space_020313.html. David, L. (2003, August 1). SPACE.com -- Pentagon Report: China's Space Warfare Tactics Aimed at U.S. Supremacy. . Retrieved September 6, 2008, from http://www.space.com/news/china_dod_030801.html.

China Threat in Space and Cyber Space

Page 9 of 14

Dellios, R. (2005, December). China's Space Program: A Strategic and Political Analysis. . Retrieved September 8, 2008, from http://www.internationalrelations.com/CM7-1WB/ChinasSpaceWB.htm. Denning, D. E. (1990, October). Concerning Hackers Who Break into Computer Systems. . Retrieved August 14, 2008, from http://www.sgrm.com/art-7.htm. Denning, D. E., & MacDoran, P. F. (1996, February). Location-Based Authentication: Grounding Cyberspace for Better Security. . Retrieved August 14, 2008, from http://www.cs.georgetown.edu/%7Edenning/infosec/Grounding.txt. Did Chinese hack U.S. official's laptop? - Security- msnbc.com. . (2008, May 29). Retrieved August 3, 2008, from http://www.msnbc.msn.com/id/24880526/. Donald A. Manley. (2008, January 24). The State of Space Security. . The Space Policy Institute, Elliott School of International Affairs, The George Washington University. Retrieved August 3, 2008, from http://www.state.gov/t/isn/rm/2008/99746.htm. Eaglen, M. The Air Force's Cyber Command: Combating Electronic and Network Threats. . Retrieved August 3, 2008, from http://www.heritage.org/research/NationalSecurity/wm1629.cfm. GIS News:China launches first ever nano-satellite. . (2004, April 19). Retrieved September 8, 2008, from http://www.gisdevelopment.net/news/viewn.asp?id=GIS:N_wbxljecmyh. Goodman, G. (2008). CYBER WARFIGHTING DOMAIN. Journal of Electronic Defense, 31(4), p22. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=31640191&log inpage=Login.asp&site=ehost-live&scope=site. Graham, B. (2005, August 25). Hackers Attack Via Chinese Web Sites. . Retrieved August 3, 2008, from http://www.washingtonpost.com/wpdyn/content/article/2005/08/24/AR2005082402318_pf.html. Hagt, E. (2007). China's ASAT Test: Strategic Response. . Retrieved September 6, 2008, from http://www.wsichina.org/cs5_3.pdf. Harris, S. China's Cyber-Warfare Militia :: InfoWar Monitor :: Tracking Cyberpower. . Retrieved August 3, 2008, from http://www.infowarmonitor.net/modules.php?op=modload&name=News&file=article&sid=1899. Harris, S. China's Cyber-Warfare Militia :: InfoWar Monitor :: Tracking Cyberpower. . Retrieved September 11, 2008, from http://www.infowarmonitor.net/modules.php?op=modload&name=News&file=article&sid=1899&m ode=thread&order=0&thold=0. Harris, S. (2008a, May 29). Chinese hackers pose serious danger to U.S. computer networks (5/29/08) -- www.GovernmentExecutive.com. . Retrieved August 3, 2008, from http://www.govexec.com/dailyfed/0508/053008nj1.htm. Harris, S. (2008b, May 31). National Journal Magazine - Chinas Cyber-Militia. . Retrieved August 3, 2008, from http://www.nationaljournal.com/njmagazine/cs_20080531_6948.php. Hearing on: MILITARY MODERNIZATION AND THE CROSS-STRAIT BALANCE Remarks as presented before the U.S.-China Commission by Mr. Jason E. Bruzdzinski. . Retrieved September 5, 2008, from

China Threat in Space and Cyber Space

Page 10 of 14

http://www.uscc.gov/hearings/2004hearings/written_testimonies/04_02_06wrts/br uzdzinski.htm. Henry Rosemont, Jr. (2008, February 7). Foreign Policy In Focus | Is China a Threat? . Retrieved August 3, 2008, from http://www.fpif.org/fpiftxt/4945. Information Warfare: The Curious China Connection. . (2008, July 1). Retrieved August 3, 2008, from http://www.strategypage.com/htmw/htiw/articles/20080701.aspx. Khan, S. R. China's Cyber Warfare. . Retrieved August 3, 2008, from http://www.opensourcesinfo.org/journal/2008/7/3/chinas-cyber-warfare.html. Lemon, S. U.S. warns about China's 'cyberwarfare buildup'. . Retrieved August 3, 2008, from http://www.itworldcanada.com/a/Enterprise-Infrastructure/5b24f354-395643ee-86b7-b0e9dcc760ee.html. Lewis, J. A. (2005, September). Computer Espionage, Titan Rain and China. . Retrieved August 3, 2008, from http://www.csis.org/media/csis/pubs/051214_china_titan_rain.pdf. Lieggi, S. (2007, January 24). CNS - Space Arms Race: China's ASAT Test a Wake-up Call - Jan 24, 2007 - Research Story. . Retrieved September 6, 2008, from http://cns.miis.edu/pubs/week/070124.htm. Logan, J. (2008, May 21). Chinas Space Program: Options for U.S.-China Cooperation. . Retrieved September 9, 2008, from http://ftp.fas.org/sgp/crs/row/RS22777.pdf. Lowe, C. (2007). China Attempting Cyberspace Dominance. . Retrieved August 3, 2008, from http://www.military.com/NewsContent/0,13319,139082,00.html. Major General Wang Pufeng. (1995). THE CHALLENGE OF INFORMATION WARFARE . . Retrieved August 3, 2008, from http://www.fas.org/irp/world/china/docs/iw_mg_wang.htm. Major Raul R Henning. (1997, March). Air Force Information Warfare Doctrine: Valuable or Valueless? . Retrieved September 11, 2008, from http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA397871&Location=U2&doc=GetTRDoc.pdf. Mannion, J. (2007, March 9). US Working On Satellite Defenses In The Shadow Of Chinese Test. . Retrieved September 6, 2008, from http://www.spacewar.com/reports/US_Working_On_Satellite_Defenses_In_The_ Shadow_Of_Chinese_Test_999.html. Marquand, R., & Arnoldy, B. China emerges as leader in cyberwarfare | csmonitor.com. . Retrieved August 3, 2008, from http://www.csmonitor.com/2007/0914/p01s01woap.html. Military Fellows Roundtable: Air Force Cyberspace Command: Protecting Against an Electronic Pearl Harbor [Rush Transcript; Federal News Service] - Council on Foreign Relations. . Retrieved August 3, 2008, from http://www.cfr.org/publication/15898/military_fellows_roundtable.html?breadcru mb=%2Fissue%2F119%2Ftechnology_and_foreign_policy. Military Power of the Peoples Republic of China 2008. (2008). Office of the Secretary of Defense. Retrieved August 3, 2008, from http://www.defenselink.mil/pubs/pdfs/China_Military_Report_08.pdf. Mulvenon, J. THE PLA AND INFORMATION WARFARE. . Retrieved August 3, 2008, from http://www.rand.org/pubs/conf_proceedings/CF145/CF145.chap9.pdf.

China Threat in Space and Cyber Space

Page 11 of 14

Mulvenon, J., & Yang, R. H. RAND | Conference Proceedings | The Peoples Liberation Army in the Information Age. . Retrieved August 3, 2008, from http://www.rand.org/pubs/conf_proceedings/CF145/. Norton-Taylor, R. (2007, September 5). Titan Rain - how Chinese hackers targeted Whitehall | Technology | The Guardian. . Retrieved August 3, 2008, from http://www.guardian.co.uk/technology/2007/sep/04/news.internet?gusrc=rss&fee d=networkfront. Page, L. (2007a, September 10). The Times: PLA war-hackers can switch off US navy | The Register. . Retrieved August 3, 2008, from http://www.theregister.co.uk/2007/09/10/chinese_military_net_attack_circus_roll s_on/. Page, L. (2007b, November 16). Chinese cyber strikes will be 'like WMD' | The Register. . Retrieved August 3, 2008, from http://www.theregister.co.uk/2007/11/16/china_cyber_wmd_space_plague_horror /. Pan, E. (2006, June 2). The Scope of China's Military Threat. . Retrieved August 3, 2008, from http://www.cfr.org/publication/10824/. Parry, S. (2007, November 21). China's bold return to Space | Mail Online. . Retrieved September 9, 2008, from http://www.dailymail.co.uk/moslive/article494556/Chinas-bold-return-Space.html. People's Daily Online -- U.S. Air Force creates cyberspace command: report. . Retrieved August 3, 2008, from http://english.people.com.cn/200611/08/eng20061108_319445.html. Perera, D. (2008, February 22). 'Space Pearl Harbor' overstated. . Retrieved September 6, 2008, from http://www.gcn.com/online/vol1_no1/45866-1.html?topic=defensetechnology#. Peter, T. A. (2007, September 7). Alleged Chinese hacker attack stirs fears of digital cold war | csmonitor.com. . Retrieved September 10, 2008, from http://www.csmonitor.com/2007/0906/p99s01-duts.html. Pollpeter, K. (2007, January 24). Motives and Implications Behind China's ASAT Test. . Retrieved September 5, 2008, from http://jamestown.org/china_brief/article.php?articleid=2373261. Reed, J. (2007, October 5). Officials announce Cyber Command will take an offensive posture. . Retrieved August 3, 2008, from http://integrator.hanscom.af.mil/2007/October/10112007/10112007-14.htm. Reid, T. Chinas cyber army is preparing to march on America, says Pentagon - Times Online. . Retrieved August 3, 2008, from http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article24098 65.ece. Reid, T. (2007, September 8). Chinas cyber army is preparing to march on America, says Pentagon - Times Online. The Times. Retrieved September 4, 2008, from http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article24098 65.ece. Reynolds, G. (2008, May 30). China's Space Race Plan - Chinese Moon Program in Space - Popular Mechanics. . Retrieved September 9, 2008, from http://www.popularmechanics.com/science/air_space/4266340.html.

China Threat in Space and Cyber Space

Page 12 of 14

Richard J. Dunn, III. (2005, September). Operational_Implications_of_Laser_Weapons.pdf (application/pdf Object). . Retrieved September 6, 2008, from http://www.analysiscenter.northropgrumman.com/files/Operational_Implications_ of_Laser_Weapons.pdf. Rogin, J. (2006, May 25). DOD: China fielding cyberattack units. . Retrieved August 3, 2008, from http://www.fcw.com/online/news/94650-1.html. Rong, J. (2007, October 24). China flies its dream and ambition to moon. . Retrieved September 9, 2008, from http://news.xinhuanet.com/english/200710/24/content_6938885.htm. Sands, D. R. (2008). Hacking on Hill traced to China. Washington Times, The (DC). Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=bwh&AN=4KB5200806 12025434000&loginpage=Login.asp&site=ehost-live&scope=site. Saunders, P., Yuan, J., Lieggi, S., & Deters, A. (2002, July 22). CNS - China's Space Capabilities and the Strategic Logic of Anti-Satellite Weapons - July 22, 2002 Research Story of the Week. . Retrieved September 6, 2008, from http://cns.miis.edu/pubs/week/020722.htm. Several countries trying to hack into US military system: Pentagon. . (2007, September 4). Retrieved August 4, 2008, from http://www.spacewar.com/reports/Several_countries_trying_to_hack_into_US_mi litary_system_Pentagon_999.html. Sgt. Sara Wood. New Air Force Command To Fight In Cyberspace. . Retrieved August 3, 2008, from http://www.spacewar.com/reports/New_Air_Force_Command_To_Fight_In_Cyb erspace_999.html. Sipress, A. (2006, October 6). Computer System Under Attack - washingtonpost.com. Washington Post, A21. Retrieved August 3, 2008, from http://www.washingtonpost.com/wpdyn/content/article/2006/10/05/AR2006100501781.html. Skypek, T. (2008). Soldier Scholars: Military Education as an Instrument of China's Strategic Power. China Brief, 8(4). Retrieved August 3, 2008, from http://www.jamestown.org/china_brief/article.php?articleid=2373977. Smith, C. R. (2004, April 22). Losing the Next War Chinese Space War Heats Up. . Retrieved September 8, 2008, from http://archive.newsmax.com/archives/articles/2004/4/22/141829.shtml. Spencer, J. Pentagon report eyes China's cyberwarfare, anti-satellite programs | csmonitor.com. . Retrieved August 3, 2008, from http://www.csmonitor.com/2008/0304/p99s01-duts.html. Staff Sgt. C. Todd Lopez. 8th Air Force to become new cyber command. . Retrieved August 3, 2008, from http://www.af.mil/news/story.asp?storyID=123030505. State Department Computers Hacked, Large-Scale Computer Break-Ins Appeared To Target Specific Offices - CBS News. . (2006, July 11). Retrieved August 4, 2008, from http://www.cbsnews.com/stories/2006/07/11/national/main1794152.shtml?CMP= ILC-SearchStories.

China Threat in Space and Cyber Space

Page 13 of 14

Stein, G. J. (1995, September). Battlefield of the Future: Information War - Cyberwar Netwar. . Retrieved August 3, 2008, from http://www.airpower.au.af.mil/airchronicles/battle/chp6.html. Strategic Insights -- Countering Asymmetrical Warfare in the 21st Century: A Grand Strategic Vision. . Retrieved August 23, 2008, from http://www.ccc.nps.navy.mil/si/2008/Jul/longJul08.asp. Strategic Insights -- Sun Tzu, Nuclear Weapons and Chinas Grand Strategy. . Retrieved August 23, 2008, from http://www.ccc.nps.navy.mil/si/2008/Jul/rickardJul08.asp. Tellis, A. J. (2008, May 20). Testimony before the U.S.China Economic and Security Review Commission: Hearing on Chinas Nonproliferation Practices - Statement of Ashley J. Tellis. . Retrieved September 8, 2008, from http://www.uscc.gov/hearings/2008hearings/written_testimonies/08_05_20_wrts/ 08_05_20_tellis_statement.php. The Scope of China's Military Threat - Council on Foreign Relations. . Retrieved August 3, 2008, from http://www.cfr.org/publication/10824/. The VeriSign iDefense Intelligence Operations Team. (2008). Development, Capability and Motivations of the Chinese Hacker Community. VeriSign. Thomas, T. L. Chinese and American Network Warfare. . Retrieved August 3, 2008, from http://www.ndu.edu/inss/press/jfq_pages/1538.pdf. Thomas, T. L. New Developments in Chinese Strategic Psychological Warfare. . Retrieved August 3, 2008, from http://www.iwar.org.uk/psyops/resources/china/chinesepsyop.pdf. Thomas, T. L. (2001a). The Internet in China: Civilian and Military Uses. . Retrieved September 11, 2008, from http://fmso.leavenworth.army.mil/documents/chinainternet.htm. Thomas, T. L. (2001b, May). China's Electronic Strategies. . Retrieved August 3, 2008, from http://www.au.af.mil/au/awc/awcgate/milreview/thomas_china_iw.pdf. Thomas, T. L. (2008, March 20). Like Adding Wings to the Tiger: Chinese Information War Theory and Practice. . Retrieved August 3, 2008, from http://www.iwar.org.uk/iwar/resources/china/iw/chinaiw.htm. Thornburgh, N. (2005a, August 25). Inside the Chinese Hack Attack - TIME. . Retrieved August 3, 2008, from http://www.time.com/time/nation/article/0,8599,1098371,00.html. Thornburgh, N. (2005b, August 29). The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them) - TIME. . Retrieved August 3, 2008, from http://www.time.com/time/magazine/article/0,9171,1098961,00.html. U.S. at risk of cyberattacks, experts say - CNN.com. . Retrieved August 19, 2008, from http://www.cnn.com/2008/TECH/08/18/cyber.warfare/index.html. U.S. official: Chinese test missile obliterates satellite - CNN.com. . (2007, January 19). Retrieved September 6, 2008, from http://www.cnn.com/2007/TECH/space/01/18/china.missile/index.html. Wagner, C. G. (2007). Countering Cyber Attacks. Futurist, 41(3), p16. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24550898&log inpage=Login.asp&site=ehost-live&scope=site.

China Threat in Space and Cyber Space

Page 14 of 14

Washington Times - Chinese information warfare threatens Taiwan. . (2004, October 13). Retrieved August 3, 2008, from http://www.washtimes.com/news/2004/oct/12/20041012-101455-7846r/. Watts, J. (2007, September 5). Army sets sights on targets in space and cyberspace | Technology | The Guardian. . Retrieved August 3, 2008, from http://www.guardian.co.uk/technology/2007/sep/05/internet.hacking. William Jackson. (2008, June 25). Microsoft Certified Professional Magazine Online | News: Security Certification Rules Could Shake Up IT Management. . Retrieved August 3, 2008, from http://mcpmag.com/news/article.asp?editorialsid=1588. Wolf, J. (2008, May 21). U.S. cites growing China space and cyber threat | Technology | Reuters. . Retrieved August 3, 2008, from http://uk.reuters.com/article/internetNews/idUKN2029195220080521. World Tribune U.S. Air Force sets up cyberspace command against continuing China attacks. . Retrieved August 3, 2008, from http://www.worldtribune.com/worldtribune/WTARC/2008/ea_china0041_04_10. asp. Wortzel, L. M. (2003a, August 11). China Waging War on Space-Based Weapons. . Retrieved September 6, 2008, from http://www.heritage.org/Press/Commentary/ed081103b.cfm. Wortzel, L. M. (2003b, October 15). China and the Battlefield in Space. . Retrieved September 5, 2008, from http://www.heritage.org/Research/AsiaandthePacific/wm346.cfm. Wright, D., Grego, L., & Gronlund, L. (2005, May). The Physics of Space Security (2005) | Union of Concerned Scientists. . Retrieved September 6, 2008, from http://www.ucsusa.org/nuclear_weapons_and_global_security/space_weapons/tec hnical_issues/the-physics-of-space-security.html. Wynne, M. W. Speeches : Cyberspace as a Domain In which the Air Force Flies and Fights. . Retrieved August 3, 2008, from http://www.af.mil/library/speeches/speech.asp?id=283. Xinhua. (2003, October 28). Young Space Elite Emerges from Manned Space Program: Experts. . Retrieved September 9, 2008, from http://en.invest.china.cn/english/scitech/78554.htm. Yoshihara, T. (2001, November). Chinese Information Warfare: A Phantom Menace or Emerging Threat? . Retrieved August 3, 2008, from http://www.au.af.mil/au/awc/awcgate/ssi/chininfo.pdf. Yuan, J. (2008, April 14). Chinas Ascendancy to a Space Power. . Retrieved September 5, 2008, from http://www.jamestown.org/china_brief/article.php?articleid=2374098.

Das könnte Ihnen auch gefallen