Chinese Information Operations
   HOME

TheInfoList



OR:

Informatized warfare of China is the implementation of
information warfare Information warfare (IW) (as different from cyber warfare that attacks computers, software, and command control systems) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a ...
(IW) within the People's Liberation Army (PLA) and other organizations of the
Chinese Communist Party The Chinese Communist Party (CCP), officially the Communist Party of China (CPC), is the founding and sole ruling party of the People's Republic of China (PRC). Under the leadership of Mao Zedong, the CCP emerged victorious in the Chinese Civil ...
(CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including
battlefield management system A battlefield management system (BMS) is a system meant to integrate information acquisition and processing to enhance command and control of a military unit. France The French Army is using SICS (Système d'Information du Combat de SCORPION - SCO ...
s, precision-strike capabilities, and technology-assisted
command and control Command and control (abbr. C2) is a "set of organizational and technical attributes and processes ... hatemploys human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or en ...
( C4ISR). However, some media and analyst report also uses the term to describe the political and espionage effort from the Chinese state.


Definitions

People's Liberation Army defines the term informatization to describe the implementation of information technology in the
digital age The Information Age (also known as the Computer Age, Digital Age, Silicon Age, or New Media Age) is a historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during t ...
, and as an evaluation criteria of its military modernization effort. The Chinese military leadership aims to transform PLA from conducting
people's war People's war ( Chinese: 人民战争), also called protracted people's war, is a Maoist military strategy. First developed by the Chinese communist revolutionary leader Mao Zedong (1893–1976), the basic concept behind people's war is to main ...
to engage in warfare conditions of informatization, which includes moving the military doctrine from weapon platform-centric to cyber-centric. The indicated characteristic of the cyber-centric force is the utilization of network linkages (
data-link A data link is the means of connecting one location to another for the purpose of transmitting and receiving digital information (data communication). It can also refer to a set of electronics assemblies, consisting of a transmitter and a recei ...
) among platforms.
United States-China Economic and Security Review Commission The United States-China Economic and Security Review Commission (informally, the US-China Commission, USCC) is an independent agency of the United States government. It was established on October 30, 2000, through the Floyd D. Spence National Defe ...
defines "Informationization" and informatized warfare in Chinese military doctrine as follows: " the operational level appears focused on providing an integrated platform for joint war-zone command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) connectivity, and for peacetime command and control (C2) within the PLA’s Military Regions." United States
Defense Intelligence Agency The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense, specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the ...
defines China's "informatized warfare" as similar to U.S. military's concept of net-centric capability, which means the military's capability to use advanced information technology and communications systems to gain operational advantage over an adversary. In 1995, the father of Chinese IW, Major General Wang Pufeng, wrote "Information war is a crucial stage of high-tech war... At its heart are information technologies, fusing intelligence war, strategic war, electronic war, guided missile war, a war of "motorization" idong zhan a war of firepower uoli€”a total war. It is a new type of warfare."Wang Pufeng, "Xinxi zhanzheng yu junshi geming" (Information Warfare and the Revolution in Military Affairs), Beijing: Junshi kexueyuan, 1995. Quoted in Mulveron, 1999, "The PLA and Information Warfare" In two articles in the ''Liberation Army Daily'', of 13 and 20 June 1995, Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science, Beijing, noted several definitions. They concluded: :'We hold that information warfare has both narrow and broad meanings. Information warfare in the narrow sense refers to the U.S. military's so-called "battlefield information warfare," the crux of which is "command and control warfare." It is defined as the comprehensive use, with intelligence support, of military deception, operational secrecy, psychological warfare, electronic warfare, and substantive destruction to assault the enemy's whole information system including personnel; and to disrupt the enemy's information flow, in order to impact, weaken, and destroy the enemy's command and control capability, while keeping one's own command and control capability from being affected by similar enemy actions.'Senior Colonel Wang Baocun and Li Fei, (1995
"Information Warfare"
. Excerpted from articles in ''Liberation Army Daily'', 13 June and 20 June 1995. Reproduced at the Federation of American Scientists website, www.fas.org. (Accessed 21 April 2011.)
They went on to state: A July 1998 conference held in San Diego, sponsored jointly by the RAND Center for Asia-Pacific Policy and the Taiwan-based Chinese Council of Advanced Policy Studies, "brought together Chinese military experts to discuss the non-hardware side of the People's Liberation Army's modernization."James C. Mulvenon and Richard H. Yang, Editors

, (Washington DC: RAND, 1999)
In his presentation, James C. Mulvenon stated: "Chinese writings clearly suggest that IW is a solely military subject, and as such, they draw inspiration primarily from U.S. military writings. The net result of this "borrowing" is that many PLA authors' definitions of IW and IW concepts sound eerily familiar."James C. Mulvenon
"The PLA and Information Warfare"
, Chapter 9 in Mulvenon & Yang, Editors, "The People's Liberation Army in the Information Age", (Washington DC: RAND, 1999), pp.175-186
In December 1999, Xie Guang, the then Vice Minister of Science & Technology and Industry for National Defence, defined IW as: :"IW in military sense means overall use of various types (of) information technologies, equipment and systems, particularly his command systems, to shake determination of enemy’s policy makers and at the same time, the use of all the means possible to ensure that that one’s own systems are not damaged or disturbed".Anand, Vinod
"Chinese Concepts and Capabilities of Information Warfare."
Strategic Analysis, Indian Institute for Defence Studies and Analyses, Vol:30, Issue:4, October 2006. (Accessed 15 April 2011).
In a strategic analysis paper for the Indian
Institute for Defence Studies and Analyses The Manohar Parrikar Institute for Defence Studies and Analyses (MP-IDSA) (formerly known as: Institute for Defence Studies and Analyses (IDSA)), New Delhi, is India's foremost think tank for advanced research in international relations, espec ...
written in 2006, Vinod Anand examines the definitions of Chinese Information Warfare. He notes that although Chinese understanding of IW was initially based on western concepts, it has increasingly moved towards evolving its own orientation. This list omits an element that plays a large role in Chinese IW and IO:
computer network operations Computer network operations (CNO) is a broad term that has both military and civilian application. Conventional wisdom is that information is power, and more and more of the information necessary to make decisions is digitized and conveyed over an e ...
.


Background

China's interest in information warfare began after the United States victory in the first
Gulf War The Gulf War was a 1990–1991 armed campaign waged by a Coalition of the Gulf War, 35-country military coalition in response to the Iraqi invasion of Kuwait. Spearheaded by the United States, the coalition's efforts against Ba'athist Iraq, ...
(1990–1991). U.S. success was the result of information technologies and the total dominance it was able to provide in the battle space. From that point forward, the PLA began to seriously invest in and develop its own concepts of information warfare and what they mean to China. The idea of a revolution in military affairs including information warfare has arisen as a school of thought in Chinese warfare. China's leadership has continuously stressed using asymmetric techniques to counter more powerful nations, such as the United States, and information warfare is a tool that the PLA uses to achieve their goals. While China has adopted the idea of information dominance, its method for going about information dominance differs, using ancient
political warfare Political warfare is the use of political means to compel an opponent to do one's will, based on hostile intent. The term political describes the calculated interaction between a government and a target audience, including another state's govern ...
methods such as the
Thirty-Six Stratagems The ''Thirty-Six Stratagems'' is a Chinese essay used to illustrate a series of stratagems used in politics, war, and civil interaction. Its focus on the use of cunning and deception both on the battlefield and in court have drawn comparisons ...
.


Nature

The Chinese strategy of information warfare focuses on the use of what China calls "strategems" to build and maintain information superiority. These strategems help China compensate for its deficiencies in technology-based weapons, and may contain efforts to create cognitive errors and to influence the contents, process, and direction of thinking of an adversary. Cyberspace operations are used to achieve information dominance through reconnaissance and espionage, conducting network intrusions to steal and possibly alter data. The Chinese concept of "Unrestricted Warfare" combines elements of information operations, cyberspace operations, irregular warfare, lawfare, and foreign relations, carried out in peacetime, as well as in conflict. The United States is viewed as a militarily superior foe whose advantages can be overcome through strategy and information operations. The U.S. reliance on technology, both in the military and in the civilian population, creates a vulnerability that can be exploited, along with "theoretical blind spots" and "thought errors", such as the absence of a comprehensive theory in
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
doctrine that combines all elements of information warfare. In cyberspace, computer network espionage plays a large role in Chinese efforts to pursue a competitive advantage. In 2009, China was suspected of stealing large terabytes of design data for the F-35 Joint Strike Fighter from defense contractor Lockheed Martin's computers. In 2012, a Chinese version, the J-31, appeared to rival the F-35. In 2014, a Chinese national was indicted for theft of sensitive trade secrets defense contractors, particularly data relating to Boeing's C-17 military transport aircraft. Industrial espionage such as this yields economic benefits, as well as military and national security advantages for China, while eroding the technical superiority of the United States. Another concern with this type of espionage is that detailed knowledge of the F-35 and C-17 platforms could afford China the ability to hack a plane's command and control system, to alter its course or possibly disable it in a time of crisis. In addition, a network intrusion could allow an undetectable cyber weapon to be planted, lying dormant until activated during a conflict. On the defensive side, China employs a combination of legal policies and information technology for censorship and surveillance of dissenters in a program called " The Golden Shield". This is often referred to as "The
Great Firewall The Great Firewall (''GFW''; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected for ...
" of China. In addition, the People's Republic of China actively promotes the idea of "cyber sovereignty", putting borders on the internet based on territorial integrity. This may be a way for the government to bypass the democratic free-flow of information that the internet represents. Reportedly, the CIA has chronicled China's information warfare activities inside the United States, where financial incentives such as personnel and support in funding are aimed at academic institutions and think tanks to dissuade them from research that paints China in a negative light. In a February 2018 hearing before the Senate Intelligence Committee, FBI Director Christopher Wray described so-called Confucius Institutes, Chinese language and cultural centers at universities that may be used as espionage tools to influence public opinion or to stifle academic freedom by limiting or disallowing discussions on certain topics. China has invested heavily in the motion picture industry as a way to gain cultural and economic influence, though reportedly China's relationship with Hollywood has started to cool. China has also been propagating an image of itself as a peaceful, nonthreatening nation focused on internal development rather than the pursuit of international power. UN Statements such as Communist Party leader
Xi Jinping Xi Jinping ( ; ; ; born 15 June 1953) is a Chinese politician who has served as the general secretary of the Chinese Communist Party (CCP) and chairman of the Central Military Commission (CMC), and thus as the paramount leader of China, ...
's
leadership Leadership, both as a research area and as a practical skill, encompasses the ability of an individual, group or organization to "lead", influence or guide other individuals, teams, or entire organizations. The word "leadership" often gets vi ...
"will never pursue hegemony, expansion, or sphere of influence" exemplify these attempts at influencing perception. Chinese information warfare doctrine suggests that these tactics are part of a broader strategy of encouraging complacency in potential adversaries. Other tactics include using international fora to promote the idea of arms control for "information weapons" in order to maintain control over its own information apparatus and to level the playing field with technologically advanced powers. Chinese disinformation operations have continued to evolve with operations in 2021 being significantly more sophisticated and resilient than operations in 2019. China has devoted significant human and financial resources to their operations.


Asymmetric warfare

The PLA places an emphasis on asymmetric warfare, particularly using information warfare to compensate for technological inferiority. In a 2001 paper in the U.S. ''Military Review'',LtCol Timothy L. Thomas, US Army, Retired
"47 China's Electronic Strategies"
, ''Military Review'', May–June 2001
T. L. Thomas examines the writings of Major General Dai Qingmin (Director of the PLA's Communications Department of the General Staff responsible for IW and IO), Senior Colonel Wang Baocun (of the PLA's Academy of Military Sciences) and others on the ways that China is employing "Electronic Strategies" to realise the benefits of asymmetric warfare. Thomas also summarises the April 2000 issue of the Chinese journal ''China Military Science'' which contains three articles on information warfare subjects. The only article written in English ("The Current Revolution in Military Affairs and its Impact on Asia-Pacific Security," by Senior Colonel Wang Baocun) presents a quite different approach to an article Wang Baocun wrote only three years previously where he presented a description of IW which contained the elements of Soviet/Russian military science. In the article "On Information Warfare Strategies", by Major General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui (of the Communications and Command Institute), the authors define IW stratagems as "schemes and methods devised and used by commanders and commanding bodies to seize and maintain information supremacy on the basis of using clever methods to prevail at a relatively small cost in information warfare."


Informationization

Information warfare is a subset of informationization. As a result of technological advancement, China has now entered an era where Informationization is the military concept of the present and future. Informationization "entails embracing all the opportunities and technologies the Information Age can offer and integrating them into military systems". China's 2004 White Paper on National Defense outlines the importance of informationization. :"The PLA, aiming at building an informationalised force and winning an information war, deepens its reforms, dedicates itself to innovation, improves its quality and actively pushes forward the RMA with Chinese characteristics with informationalization at its core." The U.S. Department of Defense's 2009 Annual Report to Congress on "Military Power of the People's Republic of China" defines local wars under conditions of informationization as "high intensity and short duration fighting against
high technology High technology (high tech), also known as advanced technology (advanced tech) or exotechnology, is technology that is at the cutting edge: the highest form of technology available. It can be defined as either the most complex or the newest te ...
adversaries" ... "capable of fighting and winning short-duration, high-intensity conflicts along its periphery against high-tech adversaries".U.S. Department of Defense
Military Power of the People’s Republic of China 2009
, Office of the Secretary of Defense, Washington, D.C. (Accessed 28 April 2011).
Additionally, local war under informationization is an effort which seeks to fully develop and link land, air, sea, space and the
electromagnetic spectrum The electromagnetic spectrum is the range of frequencies (the spectrum) of electromagnetic radiation and their respective wavelengths and photon energies. The electromagnetic spectrum covers electromagnetic waves with frequencies ranging fro ...
into one system. China's military strategy is focused on fighting and winning "informationized local wars."


Three warfares

China's "three warfares" strategy involves using public opinion (or
media Media may refer to: Communication * Media (communication), tools used to deliver information or data ** Advertising media, various media, content, buying and placement for advertising ** Broadcast media, communications delivered over mass e ...
) warfare,
psychological warfare Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and M ...
and legal warfare ( lawfare). 3W's was introduced in 2003.


Examples


COVID-19

The Chinese government has actively engaged in disinformation to downplay the emergence of
COVID-19 Coronavirus disease 2019 (COVID-19) is a contagious disease caused by a virus, the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The first known case was identified in Wuhan, China, in December 2019. The disease quickly ...
in China and manipulate information about its spread around the world.


Chinese information operations against the United States

Computer network operations, including
cyber operations Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States i ...
, are being undertaken by both Chinese citizens and the Chinese government. Because the United States has a weak
critical infrastructure Critical infrastructure (or critical national infrastructure (CNI) in the UK) is a term used by governments to describe assets that are essential for the functioning of a society and economy – the infrastructure. Most commonly associated wi ...
, it is vulnerable to Chinese cyber operations. As was described to the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washing ...
: :"In 2007, the Department of Defense, other U.S. Government agencies and departments, and defense-related think tanks and contractors, experienced multiple computer network intrusions, many of which appeared to originate in the PRC". In September 2022, Meta Platforms removed fake accounts linked to a China-based influence operation ahead of the
2022 United States elections The 2022 United States elections were held on November 8, 2022, with the exception of absentee balloting. During this U.S. midterm election, which occurred during the first term of incumbent president Joe Biden of the Democratic Party, all 4 ...
.


Chinese information operations against Taiwan

The PRC is actively seeking to unify
Taiwan Taiwan, officially the Republic of China (ROC), is a country in East Asia, at the junction of the East and South China Seas in the northwestern Pacific Ocean, with the People's Republic of China (PRC) to the northwest, Japan to the nort ...
with China and uses information operations as an important part of that work. China's actions against Taiwan have been described as an active information war. Despite the large resource outlay the Chinese have been relatively ineffective in influencing the Taiwanese public. According to James C. Mulvenon rather than risk failure of a militarily forced unification, which could lead to international recognition of the independence of Taiwan, PRC leadership could potentially use computer network operations to undermine the will of Taiwan by attacking Taiwanese infrastructure.James C. Mulvenon
"Chinese Information Operations Strategies in a Taiwan Contingency"
, 15 September 2005. (Accessed 20 March 2011).
In 2022 Taiwan's
Ministry of Justice Investigation Bureau The Ministry of Justice Investigation Bureau (MJIB; ) is a criminal-investigation and counter-intelligence agency reporting under the Ministry of Justice of the Republic of China (Taiwan). The agency is run by the Director-General which is accoun ...
revealed that it had identified more than 400 social media accounts being used to push disinformation to Taiwanese citizens as part of Chinese content farms. During the
2022 Chinese military exercises around Taiwan The 2022 Chinese military exercises around Taiwan () were a series of military exercises by the People's Republic of China (PRC) that encircled Taiwan, officially the Republic of China (ROC). They initially lasted from 4–7 August 2022 and inv ...
, Taiwanese officials accused the PLA of engaging in information warfare with claims of military exercises close to Penghu.


Chinese information operations against India

The ''
Times of India ''The Times of India'', also known by its abbreviation ''TOI'', is an Indian English-language daily newspaper and digital news media owned and managed by The Times Group. It is the third-largest newspaper in India by circulation and largest se ...
'' reported that during the 2017 Doklam standoff China used information warfare against India.


Chinese information operations against the Philippines

In 2020,
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
took down a Chinese network which was part of a disinformation campaign against the
Philippines The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
. The campaign used false profiles to influence public opinion, particularly related to politics. The campaign was dubbed "Operation Naval Gazing" by security researchers. Facebook is the dominant information source in the Philippines.


Platforms


Quora

In 2018, the '' People's Daily'', the official newspaper of the Central Committee of the Chinese Communist Party, reported on successful results from coordinated use of
Quora Quora () is a social question-and-answer website based in Mountain View, California. It was founded on June 25, 2009, and made available to the public on June 21, 2010. Users can collaborate by editing questions and commenting on answers that ...
in foreign propaganda campaigns.


Twitter

In June 2020, Twitter shut down 23,750 primary accounts and approximately 150,000 booster accounts which were being used by China to conduct an information operation aimed at boosting China's global position during the COVID-19 outbreak as well as attacking traditional targets such as Hong Kong pro-democracy activists, Guo Wengui, and Taiwan. Twitter said that the accounts had pushed deceptive narratives and spread propaganda.


YouTube

In August 2020 Google removed over 2,500 channels on
YouTube YouTube is a global online video sharing and social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by Google, and is the second mo ...
which they suspected of spreading disinformation for China. The deleted channels mostly featured content in Chinese and included coverage of divisive issues like
Black Lives Matter Black Lives Matter (abbreviated BLM) is a decentralized political and social movement that seeks to highlight racism, discrimination, and racial inequality experienced by black people. Its primary concerns are incidents of police br ...
.


See also

* Anti-infiltration Act *
Chinese intelligence activity abroad The Government of China is engaged in espionage overseas, directed through diverse methods via the Ministry of State Security (MSS), the Ministry of Public Security (MPS), the United Front Work Department (UFWD), People's Liberation Army (PLA); ( ...
*
List of cyber warfare forces Many countries around the world maintain military units that are specifically trained to operate in a cyberwarfare environment. In several cases this units acts also as the national computer emergency response team for civilian cybersecurity threa ...
*''
Unrestricted Warfare ''Unrestricted Warfare: Two Air Force Senior Colonels on Scenarios for War and the Operational Art in an Era of Globalization'' () is a book on military strategy written in 1999 by two colonels in the People's Liberation Army (PLA), Qiao Liang ...
'' * Misinformation related to the COVID-19 pandemic ** COVID-19 misinformation by China * Document Number Nine


References

{{Authority control Military of the People's Republic of China Information operations and warfare Disinformation operations Espionage in China Cyberwarfare by China Misinformation