Presentation on theme: "中國信息戰的基礎 Fundamentals of Chinese Information Warfare LTCOL (RET)William Hagestad II MSc Security Technologies MSc Management of Technology www.red-dragonrising.com."— Presentation transcript:
1)planting information mines 2)conducting information reconnaissance 3)changing network data 4)releasing information bombs 5)dumping information garbage 6)disseminating propaganda 7)applying information deception 8)releasing clone information 9)organizing information defense 10)establishing network spy stations Richard A. Clarke and Robert K. Knake, Cyber War. The Next Threat to National Security and What to Do about It, New York, HarperCollins Publishers 2010, pp. 47 – 64 制信息权 Information Dominance….. Precise attack vectors of 制信息权
1)Omni directionality 2)Synchrony 3)Limited objectives 4)Unlimited measures 5)Asymmetry 6)Minimal consumption 7)Multidimensional coordination 8)Adjustment and control of the entire process Unrestricted Warfare, Qiao Liang and Wang Xiangsui, Beijing: PLA Literature and Arts Publishing House, February 1999 (Simplified Mandarin Chinese version) 8 - Pillars of Chinese Warfare ( 超限战 ) 8 Principles of "beyond-limits combined war” in Unrestricted Warfare
Your consent to our cookies if you continue to use this website.