Chinese Information Warfare: A Phantom Menace or Emerging Threat?
46. Xu Dexin, “Military Photo-electronics Technology,” Kexue Shibao, June 6, 1999, in FBIS-CHI, September 14, 1999, pp. 1-3.
47. Zhang Zhizhong, “Remote Sensing Application Techniques,” Huokong Leida Jishu, March 1, 2000, in FBIS-CHI, October 16, 2000, p. 4.
48. “Experts Discuss Military Mapping Support in Information Era,” Jiefangjun Bao, May 17, 2000, in FBIS-CHI, May 17, 2000, pp. 1-5.
49. Mulvenon, p. 182.
50. Su Enze, “Logical Concepts of Information Warfare,” Jiefangjun Bao, March 19, 1996.
51. Mulvenon, p. 181.
52. Nikolai Sokov, Russian Strategic Modernization: The Past and Future, New York: Rowman & Littlefield Publishers, 2000, p. 34.
53. Michael Pillsbury, China Debates, No. xv, cites Andrew W. Marshall, “A Program to Improve Analytic Methods Related to Strategic Forces,” Policy Sciences, November 1982, p. 48.
54. Greg Rattray, Strategic Warfare in Cyberspace, Cambridge, MA: MIT Press, 2001, pp. 8-14.
55. Ibid., pp. 314-342.
56. Jim Hoagland, “Creating a New Tone,” Washington Post, April 29, 2001, p. B-7.
57. See Admiral William Owens and Ed Offley, Lifting the Fog of War, New York: Farrar, Straus and Giroux, April 2000; or Joseph S. Nye and William A. Owens, “America’s Information Edge,” Foreign Affairs, Vol. 75, No. 2, March/April 1996, pp. 20-36. See also Chairman of the Joint Chiefs of Staff, Joint Vision 2020, Washington, DC: U.S. Department of Defense, June 2000; The Joint Staff, Enabling the Joint Vision, Washington, DC: The U.S. Department of Defense, May 2000; Chairman of the Joint Chiefs of Staff, Information Operations: A Strategy for Peace . . . The Decisive Edge in War, Washington, DC: U.S. Department of Defense, March 1999; Assistant Secretary of Defense for Command, Control, Communications, and Intelligence, Information Superiority: Making the Joint Vision Happen, Washington, DC: U.S. Department of Defense, 2000; and The Joint Staff, J-6, Information Assurance through Defense in Depth, Washington, DC: U.S. Department of Defense, February 2000.
58. Cui Shizeng, “Reading the US Military’s Joint Vision 2020,” Jiefangjun Bao, August 23, 2000, in FBIS-CHI, August 23, 2000, p. 2.
59. Matthew J. Von Bencke, The Politics of Space, Boulder, CO:Westview Press, 1997, pp. 12, 16, 47, 65.
60. Christoph Bluth, Soviet Strategic Arms Policy Before SALT, Cambridge, MA: Cambridge University Press, 1992, pp. 51-58.
61. Qiao Liang and Wang Xiangsui, Unrestricted Warfare, Beijing: PLA Literature and Arts Publishing House, February 1999.
62. John Pomfret, “Rewriting the Rules of War: Two Colonels Propose Terrorism, Drugs and Computer Viruses as Strategic Weapons,” Washington Post, August 16, 1999, p. 15.
63. Kao Chienh-chien, “What Limits has ‘Unrestricted Warfare’ Exceeded,” Ta Kung Pao, June 21, 2000, in FBIS-CHI, June 21, 2000; and Gao Yan, “ Dangerous ‘Unrestricted Warfare’: And What to Make of
the Current International Order and Rules,” Ta Kung Pao, March 13, 2000, in FBIS-CHI, March 13, 2000.
64. Owens, Lifting the Fog of War, p. 100
65. Pillsbury, China Debates, pp. 268-275.
66. Dreyer, p. 15.
67. Victor A. DeMarines, “Exploiting the Internet Revolution,” in Keeping the Edge Managing Defense for the Future, Ashton B. Carter and John P. White, eds., Cambridge, MA: Belfer Center for Science and International Affairs, 2000, pp. 91-92.
68. Ibid., pp. 92-93.
69. Arquilla and Karmel, p. 266.
70. Wang Baocun, “New Military Revolution in the World,” Zhongguo Junshi Kexue, May 4, 1999, in FBIS-CHI, August 23, 1999, p.6.
71. William C. Triplett II, “Potential Applications of PLA Information Warfare Capabilities to Critical Infrastructures,” in People’s Liberation Army After Next, Susan M. Puska, ed., Carlisle Barracks: U.S. Army War College Strategic Studies Institute, 2000, p. 92.
72. Mulvenon, pp. 183-185.
73. Ibid., p. 185.
74. Rattray, p. 477.
75. John Keegan, The First World War, New York: Alfred A. Knopf, 1999, pp. 24-47.
76. Rattray, p. 476.
77. Triplett, p. 80.
78. Ernest R. May, Strange Victory: Hitler’s Conquest of France, New York: Hill and Wang, 2000, p. 460.
- A primer on Chinese information operations - February 23, 2007