Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China's Stealth War on the U.S.
Los Angeles Times ^ | July 20, 2005 | Max Boot

Posted on 11/05/2005 10:53:11 AM PST by montana233

China's Stealth War on the U.S.

July 20, 2005 Los Angeles Times

Maj. Gen. Zhu Chenghu of the Chinese People's Liberation Army caused quite a stir last week when he threatened to nuke "hundreds" of American cities if the U.S. dared to interfere with a Chinese attempt to conquer Taiwan.

In 1998, an official People's Liberation Army publishing house brought out a treatise called "Unrestricted Warfare," written by two senior army colonels, Qiao Liang and Wang Xiangsui. This book, which is available in English translation, is well known to the U.S. national security establishment but remains practically unheard of among the general public.

Their different approaches include financial warfare (subverting banking systems and stock markets), drug warfare (attacking the fabric of society by flooding it with illicit drugs), psychological and media warfare (manipulating perceptions to break down enemy will), international law warfare (blocking enemy actions using multinational organizations), resource warfare (seizing control of vital natural resources), even ecological warfare (creating man-made earthquakes or other natural disasters).

Cols. Qiao and Wang write approvingly of Al Qaeda, Colombian drug lords and computer hackers who operate outside the "bandwidths understood by the American military." They envision a scenario in which a "network attack against the enemy" -- clearly a red, white and blue enemy -- would be carried out "so that the civilian electricity network, traffic dispatching network, financial transaction network, telephone communications network and mass media network are completely paralyzed," leading to "social panic, street riots and a political crisis." Only then would conventional military force be deployed "until the enemy is forced to sign a dishonorable peace treaty."

(Excerpt) Read more at latimes.com ...


TOPICS: Business/Economy; Editorial; Foreign Affairs; Government
KEYWORDS: alqaeda; china; communistparty; jiabao; putin; redchina; russia; ussr2; vladimirputin; wenjiabao

1 posted on 11/05/2005 10:53:12 AM PST by montana233
[ Post Reply | Private Reply | View Replies]

To: Jeff Head

ChiPing


2 posted on 11/05/2005 10:55:57 AM PST by Travis McGee (--- www.EnemiesForeignAndDomestic.com ---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: montana233; Admin Moderator

Incorrect/missing article source.

The link to LATIMES only takes you to LATIMES homepage.


3 posted on 11/05/2005 10:57:04 AM PST by M203M4
[ Post Reply | Private Reply | To 1 | View Replies]

To: montana233

Found a source:
http://www3.cfr.org/pub8259/max_boot/chinas_stealth_war_on_the_us.php


4 posted on 11/05/2005 11:02:06 AM PST by M203M4
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #5 Removed by Moderator

To: montana233

If they nuke us, who will buy their cheap crap?


6 posted on 11/05/2005 11:15:36 AM PST by beethovenfan
[ Post Reply | Private Reply | To 1 | View Replies]

To: montana233

China are following Iran's lead.


7 posted on 11/05/2005 11:41:22 AM PST by Irish_Thatcherite (~~~A vote for Bertie Ahern is a vote for Gerry Adams!~~~)
[ Post Reply | Private Reply | To 1 | View Replies]

To: beethovenfan

"If they nuke us, who will buy their cheap crap?"



Well, if Chinese enterprises paid their manufacturing workers a decent wage, then the Chinese domestic work force could buy it, or at least a whole lot more of it than is now consumed domestically.

Instead, the local Chinese work force is fed crumbs, and their work product is exported to the USA, where the Chinese government's financial agents, by funding the US Federal debt and buying large volumes of securitized US mortages, effectively loans money to Americans to buy their exported stuff, and eliminate many other Americans' decent paying jobs by driving US manufacturing enterprises into the ground, and then buying up the equipment at fire sale prices and shipping it abroad.

Very strange, though as a form of warfare it does make an odd kind of sense: help your enemy towards bankruptcy while encouraging them to dismantle their domestic manufacturing capacity, at which point they become easy pickings as they are both financially crushed by debt and incapable of keeping their military forces in the field with functional equipment and adequate supplies.


I don't think the Chinese will need to nuke us If we keep borrowing from them to buy their cheap stuff, and plowing our own productive capacity under in the process, generally continuing to behave like economic fools, then the PRC and its agents will eventually own the place, lock, stock, and barrel. As the new owners, they would have little incentive to destroy it, would they?


8 posted on 11/05/2005 12:04:57 PM PST by Blue_Ridge_Mtn_Geek
[ Post Reply | Private Reply | To 6 | View Replies]

To: montana233

Good article. I get about 15 attempted hacker attacks per hour on my PC that are stopped by the McAfee Personal Firewall. When I trace these attacks back to their source, approximately 35% of the attacks originate in China. I think China is probing our internet infrastructure and looking for weak points, including servers and PC's that don't have proper security.


9 posted on 11/05/2005 12:11:15 PM PST by defenderSD (What do Bush, Blair, Aznar, and Berlusconi know about Saddam's regime that Democrats don't know?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: montana233

The Clinton Legacy.


10 posted on 11/05/2005 1:09:54 PM PST by Brilliant
[ Post Reply | Private Reply | To 1 | View Replies]

To: defenderSD

How are you able to trace them?


11 posted on 11/05/2005 1:19:07 PM PST by diamond6 (Everyone who is for abortion has already been born. Ronald Reagan)
[ Post Reply | Private Reply | To 9 | View Replies]

To: diamond6
McAfee SecurityCenter has a personal firewall with a trace command that records the location of the source computer on the internet and displays a map with the most probable route taken from the source computer to my computer. It also displays the network information for the source computer and usually the registrant of the source computer. I think it records the IP address of the source computer and then works back through the internet to that IP address and shows you the most probable route. Here's the source of an attempted attack from this afternoon at 1:02 PM PST:

descr: CHINA RAILWAY TELECOMMUNICATIONS CENTER
descr: 22F Yuetan Mansion, Xicheng District, Beijing, P.R.China

In this case, the source computer attempted an unsolicited connection to UDP port 1027 on my computer. The Chinese are probing the internet very actively these days.

12 posted on 11/05/2005 1:38:26 PM PST by defenderSD (What do Bush, Blair, Aznar, and Berlusconi know about Saddam's regime that Democrats don't know?)
[ Post Reply | Private Reply | To 11 | View Replies]

To: montana233

BTRL


13 posted on 11/05/2005 1:59:59 PM PST by TigersEye ('I am' is the meditation. Meditation is the 'I am.' All other 'I's and meditations are fabrications.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Brilliant
The Clinton Legacy.

What an upside down world this would be, if we expected Republicans would change things.

14 posted on 11/05/2005 2:05:07 PM PST by Doe Eyes
[ Post Reply | Private Reply | To 10 | View Replies]

To: defenderSD
During the situation where China allowed our crippled surveillance plane to land and took the crew hostage my Zone Alarm pings went way up. This was back when you could trace pings to their source with the free version of ZA. I was posting some rather harsh rhetoric about China FWIW.

Normally I got infrequent pings from internet research companies and universities and other rather benign stateside sources. But during this hostage episode I was getting a ping every few minutes and they all traced back to Taiwan, China or other SE Asian sites. Interesting.

15 posted on 11/05/2005 2:06:53 PM PST by TigersEye ('I am' is the meditation. Meditation is the 'I am.' All other 'I's and meditations are fabrications.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: defenderSD

That is frightening.


16 posted on 11/05/2005 2:21:01 PM PST by diamond6 (Everyone who is for abortion has already been born. Ronald Reagan)
[ Post Reply | Private Reply | To 12 | View Replies]

To: montana233
>They envision a scenario in which a "network attack against the enemy" -- clearly a red, white and blue enemy -- would be carried out

Looks like the Chinese
can get Amazon to ship
Clancy books to them!

17 posted on 11/05/2005 2:28:39 PM PST by theFIRMbss
[ Post Reply | Private Reply | To 1 | View Replies]

To: Brilliant

"The Clinton Legacy"

Only partly correct.

Nixon and Clinton legacy.


18 posted on 11/05/2005 2:31:20 PM PST by razoroccam (Then in the name of Allah, they will let loose the Germs of War (http://www.booksurge.com))
[ Post Reply | Private Reply | To 10 | View Replies]

To: montana233
They envision a scenario in which a "network attack against the enemy" -- clearly a red, white and blue enemy -- would be carried out "so that the civilian electricity network, traffic dispatching network, financial transaction network, telephone communications network and mass media network are completely paralyzed," leading to "social panic, street riots and a political crisis." Only then would conventional military force be deployed "until the enemy is forced to sign a dishonorable peace treaty."

At least these people are less grounded in reality than the military officers that Hitler relied upon in the beginning of WWII. Of course, Japan's government in the 30's was more or less taken over by these sorts of meglomaniacs, and we all know what the result was. I hope the WH and the pentagon is showing fewer of its cards than these news stories allude to, because there may soon come a time when these little s**ts in N.K. and the P.R.C. try to make good on their bluster beyond the occasional acts of piracy or espionage.

BTW, There was a good article out there suggesting all these people out there who were harping on about "information warfare" were full of it. Anyone have any thoughts on this? Links?
19 posted on 11/05/2005 2:40:35 PM PST by dr_who_2
[ Post Reply | Private Reply | To 1 | View Replies]

To: diamond6
I'm not too concerned about it...yet. China probably has a million people working on intelligence gathering just inside their country and they have to keep them all busy. I'm sure these attempted hacker attacks are automated and run by computer programs, otherwise they would never hit my PC here in Phoenix, AZ so frequently. They're probably just sweeping throught he whole internet with computer software and researching the "security topography", if you will.

But if everybody uses good security software and firewalls then there isn't much China can do to us other than write new viruses to attack compupters throughout the world. But I would think it's difficult to write a virus that specifically attacks just the US or just the US and NATO. Viruses go everywhere now and would even return and attack computers in China.

20 posted on 11/05/2005 2:41:55 PM PST by defenderSD (What do Bush, Blair, Aznar, and Berlusconi know about Saddam's regime that Democrats don't know?)
[ Post Reply | Private Reply | To 16 | View Replies]

To: defenderSD

Do you have any nuclear warhead plans on your hard drive?


21 posted on 11/05/2005 2:42:26 PM PST by dr_who_2
[ Post Reply | Private Reply | To 9 | View Replies]

To: diamond6
Sorry, compupters = computers

I wonder if puppy dogs use compupters?...lol

22 posted on 11/05/2005 2:44:14 PM PST by defenderSD (What do Bush, Blair, Aznar, and Berlusconi know about Saddam's regime that Democrats don't know?)
[ Post Reply | Private Reply | To 16 | View Replies]

To: defenderSD
I've come to the conclusion that you have to have a very trusting nature and an appreciable amount of computer illiteracy in order to fall victim to a computer virus. I never have. Social engineering attacks take longer than stack smashing/etc, but there's no way for the computer to stop them if the person using the computer is a schmuck. If there's one thing that can bring Windows to its knees, it's an anti-virus program combined with all those other wunnerful freebie ad-ware programs that you can run in the background.

But I would think it's difficult to write a virus that specifically attacks just the US or just the US and NATO. Viruses go everywhere now and would even return and attack computers in China.

I disagree. Viruses probably are introduced from public parts of the Internet (one would hope), but it probably isn't that difficult to make a virus home in on IP addresses for government/military sites. I think it's already been tried by now and found wanting for the most part. At least as a way of knocking out US/NATO computer networks. Spying is another matter.
23 posted on 11/05/2005 2:55:33 PM PST by dr_who_2
[ Post Reply | Private Reply | To 20 | View Replies]

To: dr_who_2
"Do you have any nuclear warhead plans on your hard drive?"

No, there is nothing on my computer of any value whatsoever to Chinese intelligence agents. But they might enjoy my pictures of the US National Bikini team.

24 posted on 11/05/2005 4:37:33 PM PST by defenderSD (What do Bush, Blair, Aznar, and Berlusconi know about Saddam's regime that Democrats don't know?)
[ Post Reply | Private Reply | To 21 | View Replies]

To: montana233
"Unrestricted Warfare," by Qiao Liang and Wang Xiangsui on Amazon


25 posted on 11/05/2005 4:51:43 PM PST by SauronOfMordor (I do what the voices in lazamataz's head tell me to)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Travis McGee
Online copy of "Unrestricted Warfare"
26 posted on 11/05/2005 4:55:20 PM PST by SauronOfMordor (I do what the voices in lazamataz's head tell me to)
[ Post Reply | Private Reply | To 2 | View Replies]

To: defenderSD
Excellent. Your techno-smut will forever ruin the morals of the flower of pimply, patriotic, desperate Chinese computer geeks. Their diabolical plans will turn out to be the means of their undoing! Purple prose, but poetic justice nonetheless.
27 posted on 11/05/2005 5:22:54 PM PST by dr_who_2
[ Post Reply | Private Reply | To 24 | View Replies]

To: SauronOfMordor

Those yellow swine hid the chapter on "Essential Principles" in page 204. I tell you, the Book of the Five Rings has got to be more enjoyable reading than this. Geeze.


28 posted on 11/05/2005 5:27:12 PM PST by dr_who_2
[ Post Reply | Private Reply | To 26 | View Replies]

To: montana233

The Russians have also said that they will stop the US Pacific Fleet if it were to try to interfere with a chinese invasion of Taiwan.


29 posted on 11/05/2005 7:02:50 PM PST by Thunder90
[ Post Reply | Private Reply | To 1 | View Replies]

To: Thunder90

Just give Taiwan a couple of nukes. Seems to be the equalizer.


30 posted on 11/06/2005 5:14:02 AM PST by EQAndyBuzz (Liberal Talking Point - Bush = Hitler ... Republican Talking Point - Let the Liberals Talk)
[ Post Reply | Private Reply | To 29 | View Replies]

To: neverdem; Tolik; MEG33; Alice au Wonderland

ping


31 posted on 11/06/2005 5:31:33 AM PST by King Prout (many accuse me of being overly literal... this would not be a problem if many were not under-precise)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dr_who_2; Travis McGee; Jeff Head; montana233
Those yellow swine hid the chapter on "Essential Principles" in page 204. I tell you, the Book of the Five Rings has got to be more enjoyable reading than this. Geeze

Some parts are illuminating (from the pdf pages 206-207)

In terms of beyond-limits warfare, there is no longer any distinction between what is or is not the battlefield. Spaces in nature including the ground, the seas, the air, and outer space are battlefields, but social spaces such as the military, politics, economics, culture, and the psyche are also battlefields. And the technological space linking these two great spaces is even more so the battlefield over which all antagonists spare no effort in contending. [3] Warfare can be military, or it can be quasi-military, or it can be non-military. It can use violence, or it can be nonviolent. It can be a confrontation between professional soldiers, or one between newly emerging forces consisting primarily of ordinary people or experts. These characteristics of beyond-limits war are the watershed between it and traditional warfare, as well as the starting line for new types of warfare.
Reading between the lines, I'm getting the impression that a Chinese offensive against the US will involve not only conventional military conflict, but also
No matter whether it serves as a line of thought or as a principle guiding combat operations, asymmetry manifests itself to some extent in every aspect of warfare. Understanding and employing the principle of asymmetry correctly allows us always to find and exploit an enemy's soft spots. The main fighting elements of some poor countries, weak countries, and non-state entities have all used "mouse toying with the cat"-type asymmetrical combat methods against much more powerful adversaries. In cases such as Chechniya vs. Russia, Somalia vs. the United States, Northern Ireland guerrillas vs. Britain, and Islamic Jihad vs. the entire West, without exception we see the consistent, wise refusal to confront the armed forces of the strong country head-to-head. Instead, the weaker side has contended with its adversary by using guerrilla war (mainly urban guerrilla war) [9], terrorist war, holy war, protracted war, network war, and other forms of combat. Mostly the weaker side selects as its main axis of battle those areas or battlelines where its adversary does not expect to be hit. The center of mass of the assault is always a place which will result in a huge psychological shock to the adversary.[aside: 9/11?] This use of asymmetrical measures which create power for oneself and make the situation develop as you want it to, is often hugely effective. It often makes an adversary which uses conventional forces and conventional measures as its main combat strength look like a big elephant charging into a china shop. It is at a loss as to what to do, and unable to make use of the power it has. Apart from the effectiveness it displays when used, asymmetry in itself is a rule of action suggested by the golden rule. Of all rules, this is the only one which encourages people to break rules so as to use rules. Also it is an effective prescription for methodical and well-balanced medical treatment for a chronic illness of thought.
This document gives a lot to think about, Thanks, montana233

The more I think about it, the more I'm concluding that China and AlQueda are in bed together, with China

32 posted on 11/06/2005 7:20:41 AM PST by SauronOfMordor (I do what the voices in lazamataz's head tell me to)
[ Post Reply | Private Reply | To 28 | View Replies]

To: SauronOfMordor
The more I think about it, the more I'm concluding that China and AlQueda are in bed together, with China

If it isn't some grand conspiracy, it's not titillating enough. There are limits to what unconventional warfare can accomplish, and Americans aren't stupid. We survived 9/11, it didn't take us too long to figure out who was responsible, and when we found out, it didn't take us too long to hunt down the perps and kick their asses. Any particular chink in the U.S. armor to some disasterous attack is likely to be dwarfed by China's weaknesses. In terms of the propaganda war, its hard to say whether the paranoia of the people who write this Art of War gobbledygook is trumped by the paranoia of the mouth breathers who read so much into it. If you want to worry about what China can do to us, look at their nukes and their navy. On second thought, focus on their nukes. We obviously shouldn't trust the Chinese as far as we can spit, but even a short, wonderful little war with them is not the best outcome. Nor is economic warfare.
33 posted on 11/06/2005 4:25:46 PM PST by dr_who_2
[ Post Reply | Private Reply | To 32 | View Replies]

To: montana233

Bump.


34 posted on 05/26/2006 2:32:06 PM PDT by Paul Ross (We cannot be for lawful ordinances and for an alien conspiracy at one and the same moment.-Cicero)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson