Recent cyberattacks could be part of a Chinese military strategy started nearly 20 years ago

In light of this, it’s highly recommended two read two books that were ahead of the curve and how they illustrate (by publishing date alone) that what we see transpiring just now was planned many decades ago. One could only imagine what the Chinese are up to now if we just now caught on to decades-old warfare plans. It’s often what you don’t see that hits you the hardest. Read the quotes and ask yourself if what you see happening today in general with a “recession” going on its 6th year (something no real economist has ever heard of) just happens to be what is called a ‘correction of the free market’ or something else.

The two books:

The first signs of China’s interest in cyberwarfare began with Major General Wang Pufeng, a former Director of the Strategy Department at the Academy of Military Science in Beijing. Now regarded as the founding father of “Chinese information warfare” (link in Chinese), Wang’s 1995 paper titled “The Challenge of Information Warfare” (a more literal translation of the Chinese, 信息战争与军事革命, would be “Information Technology and Military Revolution”) analyzed the way the US had used information technology to win battles. Wang urged the Chinese military to ”strive for an active approach in a reactive situation and use every means possible to destroy the opponent’s information superiority and transform our inferior position in information.”

Major General Wang Pufeng, the founding father of Chinese information warfare No. 1 School, Jiangyang City, Jiangsu Province

Here’s a longer excerpt from his analysis of how cyberwarfare would play out (emphasis is ours):

The large-scale importation of information technology deep into the field of warfare will inevitably bring about a military revolution. This revolution has actually already started.Those who perceive it first will swiftly rise to the top and have the advantage of the first opportunities. Those who perceive it late will unavoidably also be caught up in the vortex of this revolution. Every military will receive this baptism.

This revolution is first a revolution in concepts, then it is a revolution in science and technology, equipment, troop strength, strategy, and tactics as well as a revolution in training. Thus, the issue of how to adapt to and achieve victory in the information warfare which we will face from now on is an important question which we need to study carefully.

By going on the offensive, Wang reasoned, a China still lacking the IT superiority of the West could gain the upper hand.

As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons….

The new concept of weapons will cause ordinary people and military men alike to be greatly astonished at the fact that commonplace things that are close to them can also become weapons with which to engage in war. We believe thatsome morning people will awake to discover with surprise that quite a few gentle and kind things have begun to have offensive and lethal characteristics.

Full article: Recent cyberattacks could be part of a Chinese military strategy started nearly 20 years ago (Quartz)

Comments are closed.