US Army Is Preparing For Decades Of Hybrid Wars

 

Released on Monday, the US Army’s Training and Doctrine Command, or TRADOC, drafted a new strategy for how US ground forces will operate, fight, and campaign successfully across multiple domains—space, cyberspace, air, land, maritime—against all enemies in the 2025-2040 timeframe.

The new strategy calls for “super-empowered individuals and small groups”, who are mobile and can simultaneously fight in every domain of warfare, which will replace the conventional large units like today. Continue reading

China targets American technology in drive to become innovation leader

Photo by: Mark Schiefelbein Robotic military technology was displayed at an exhibition highlighting China’s achievements under five years of leadership by President Xi Jinping. The exhibition at the Beijing Exhibition Hall opened in September ahead of a Communist Party congress this month. (Associated Press/File)

 

China has stepped up efforts to work with American businesses in a bid to acquire advanced technology, part of a drive to become a leading technology-innovation power.

“China is pushing to further deepen technology collaboration with U.S. business and academic institutions as part of a national effort to transform its economy, including by putting China at the leading edge of global technological innovation,” said a U.S. intelligence official who provided a recent assessment of China.

“At the same time, Beijing is trying to downplay concerns that this state-led technology acquisition drive creates an unlevel playing field, forces technology transfers to China, limits foreign companies’ access to the Chinese market and is a threat to U.S. and other companies economic strengths,” the official added. Continue reading

Military building for info warfare

The U.S. Missile Defense Agency will take greater control of the Ground-Based Midcourse Defense missile system from Boeing at the end of this year, according a spokesman. This is a major shift in oversight. (Department of Defense)

 

Air Force Gen. Paul Selva, vice chairman of the Joint Chiefs of Staff, told the Senate this week that the military is taking steps to improve its capabilities for countering and conducting information warfare — the use of cyberattacks and influence operations.

The Pentagon “must continue to improve its ability to exploit cyberspace as a pathway for information operations to affect adversary perceptions, decisions and actions in support of strategic ends,” Gen. Selva said in written policy statements to the Senate Armed Services Committee.

The four-star general testified at a nomination hearing for a second term as vice chairman. Continue reading

China’s Secret Plan to Control the Internet | China Uncensored

Hi, welcome to China Uncensored, I’m your host Chris Chappell.

The Internet! Some of you watching may not have even been alive at a time when the Internet wasn’t everywhere. But I remember such a time. When computers were mysterious novelties, completely misunderstood by popular media.

Electric Dreams was popular, right? Anyway, the world has now changed in weird, wild ways. Because Internet. Continue reading

China Could Control the Global Internet After Oct. 1

https://i0.wp.com/img.theepochtimes.com/n3/eet-content/uploads/2016/09/14/ICANN_Chair-463030862.jpg

ICANN Chairman Steve Crocker speaks during the opening of the ICANN meeting in Singapore on Feb. 9, 2015. The U.S. plan to relinquish control of ICANN opens the door for China to have greater influence over the global internet. (Roslan Rahman/AFP/Getty Images)

 

The handover of ICANN, the body that governs domain name registration, fits into a strategy by the Chinese regime to determine how the Internet is run

In November 2014, Li Yuxiao, a research fellow at the Chinese Academy of Cyberspace, stated, according to the state-run China Daily, “Now is the time for China to realize its responsibilities. If the United States is willing to give up its running of the internet sphere, the question comes as to who will take the baton and how it would be run?”

“We have to first set our goal in cyberspace, and then think about the strategy to take, before moving on to refining our laws,” he said.

Li’s comments were in response to news, also in 2014, that the United States would relinquish its remaining federal government control of the internet by ending its contract between the Commerce Department and the Internet Corporation for Assigned Names and Numbers (ICANN), which is scheduled for Oct. 1. Continue reading

The Wars of the Near Future (IV)

MUNICH/BERLIN (Own report) – The Bundeswehr University in Munich has convened a high level cyberwarfare conference. Organized by the military academy’s research center’s “Cyber Operational Defense” (CODE), representatives from the Defense, Interior and Foreign Ministries, the Bavarian Regional Office of Criminal Investigation as well as from several leading German arms companies are among the participants. German Defense Minister Ursula von der Leyen (CDU) recently announced the establishment of a new branch of the military, the “Cyber and Information Command” (KdoCIR) with a staff of 13,500. Like the Army, Navy, and Air Force, it will be commanded by its own Inspector General. The Bundeswehr has already launched an advertising campaign costing millions, which, according to the Minister, is aimed at recruiting IT specialists (“Nerds”) for military service. The Bundeswehr is explicitly preparing capabilities for cyber attacks – a project that is massively being promoted by NATO. The “neutralization” of enemy air defenses through cyber attacks is also in discussion.

Continue reading

America the Weak

The intent of this essay is to advance several observations about how we plan and fight wars, in order to shed light upon why we are performing so poorly. We invaded both Afghanistan and Iraq with inchoate plans and inadequate forces to establish post-war security and governance. After winning the first battle in both countries, President George W. Bush offhandedly decided to build democratic nations, a task for which our State Department and US Agency for International Development had no competence or interest. By default, the mission fell to our military, also without competence but with unflagging devotion and determination.

When 2011 arrived, President Barack Obama went against the recommendations of the intelligence community, the Pentagon, and the State Department. Instead of politically maneuvering to keep a residual force to check al-Maliki’s dark instincts, Obama pulled out all our troops. He fulfilled Bush’s foolish promise. Al-Maliki then proceeded to oppress the Sunnis, leading to the reemergence of the extremists now called the Islamic State. Obama quit, but Bush made it easy for him to do so.

Continue reading

Chinese Military Declares the Internet an Ideological ‘Battleground’

China’s military newspaper, the People’s Liberation Army Daily, warned on Wednesday that China must “resolutely protect ideological and political security on the invisible battleground of cyberspace.” The call to arms against “Western hostile forces” on the Internet comes amidst a broader push for tighter Internet controls, including experiments with offensive cyber capabilities against websites that have been banned in China.

The piece begins by repeating a claim China has made often: that Internet or cyber sovereignty is a manifestation of national sovereignty. Over the past year, China has called attention to this concept in media articles and official speeches, seeking to win international recognition of its conceptualization of how the internet should be governed. The PLA Daily piece makes it clear that China’s “cyber territory” must be defended as vigorously as physical territory. The article warned that if China doesn’t occupy and defend its “cyber territory,” then nameless “hostile forces” will use it as a “bridgehead” to attack China. Continue reading

The U.S. government thinks China could take down the power grid

Washington (CNN) — China and “probably one or two other” countries have the capacity to shut down the nation’s power grid and other critical infrastructure through a cyber attack, the head of the National Security Agency told a Congressional panel Thursday.

Admiral Michael Rogers, who also serves the dual role as head of U.S. Cyber Command, said the United States has detected malware from China and elsewhere on U.S. computers systems that affect the daily lives of every American.

“It enables you to shut down very segmented, very tailored parts of our infrastructure that forestall the ability to provide that service to us as citizens,” Rogers said in testimony before the House Intelligence Committee. Continue reading

The Dragon’s Spear: China’s Asymmetric Strategy

China’s asymmetric capabilities have the potential to lessen US military advantage

BEIJING: Over a decade ago the Federation of American Scientists described the Chinese missile program as a pocket of excellence in an otherwise problematic indigenous military industry. In 2010 the Chinese military was reported to have started tests on its most ambitious missile project, the DF-21A, an anti-ship ballistic missile. In early 2013 several reports claimed that the missile had begun to be deployed in small numbers in Southern China. The DF-21A is reportedly designed to be an aircraft carrier killer aimed at deterring US aircraft-carrier battle groups from interfering in case of conflict over Taiwan and other flashpoints like the South China Sea.

China’s decision to use ballistic missiles for anti-ship warfare is unusual considering that targeting moving ships with a missile on a ballistic trajectory is much harder and requires more sophisticated navigation than cruise missiles. The People’s Liberation Army decision to opt for an anti-ship ballistic missile, or ASBM, reflects the growing confidence and sophistication of its military industries. Continue reading

China Pres Urges Military To Expand, Strengthen

As China becomes a superpower, so with it comes the need for a stronger military.

President Xi Jinping told the Navy this weekend that he wants his military to train harder, strengthen their defense capabilities and protect the country’s “sovereignty, security and development.”

Last week, President Xi was at the Shenyang military theater of operations where he visited a training session aboard China’s first aircraft carrier, the Liaoning. Continue reading

China’s Military Preparing for ‘People’s War’ in Cyberspace, Space

China’s military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital “people’s war,” according to an internal Chinese defense report.

“As cyber technology continues to develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in space is vital for China’s military modernization. Continue reading

Chinese hacker who once targeted the US switches sides to help defend Western companies

Or is he a double-spy under the guise of a defector who ‘got in’ and is now feeding information back to the PLA?

A leading Chinese hacker who used to attack American targets in the name of patriotism is now sharing his skills with Western multinational firms.

Earlier, US security experts had identified a specialist hacking unit within the People’s Liberation Army honing in on their institutions. Continue reading

Chinese Cyberattack Continues

DHS warns about new ‘watering hole’ cyber attack vulnerability as a high-tech firm also reportedly is hit

The Department of Homeland Security warned Internet Explorer users this week about a new software flaw used in remote cyber attacks as Microsoft issued an advisory on the embattled browser’s software hole.

The response followed reports in the Free Beacon revealing that hackers linked to China attacked the Council on Foreign Relations website and used it as a watering hole for a sophisticated cyberespionage attack. Continue reading

Israeli government websites under mass hacking attack

JERUSALEM (Reuters) – More than 44 million hacking attempts have been made on Israeli government web sites since Wednesday when Israel began its Gaza air strikes, the government said on Sunday.

Finance Minister Yuval Steinitz said just one hacking attempt was successful on a site he did not want to name, but it was up and running after 10 minutes of downtime.

“The war is taking place on three fronts. The first is physical, the second is on the world of social networks and the third is cyber,” said Carmela Avner, Israel’s chief information officer.

Last month, U.S. Defence Secretary Leon Panetta said cyberspace is the battlefield of the future, with attackers already going after banks and other financial systems. U.S. banks have been under sustained attack by suspected Iranian hackers thought to be responding to economic sanctions aimed at forcing Tehran to negotiate over its nuclear program.

Full article: Israeli government websites under mass hacking attack (CNBC)