Three Faces of the Cyber Dragon: Cyber Peace Activist, Spook, Attacker (Timothy L. Thomas)
By Timothy Thomas
Distribution A: Approved for public release
File Size:
2.0MB
File Type:
Page Count:
263
Share & Get The Message Out
(Click image to download book.)
China’s cyber policy has become partly visible to foreign nations through observation, tracking, and inference. The policy appears to have three vectors. The first vector is in the public opinion or “soft power” arena, where China professes to be led by a policy of active defense and cooperation with other nations over cyber issues. The second and most prominent vector is China’s exhibited capability to conduct strong and stealthy intelligence and reconnaissance activities against nation’s worldwide, using the guise of anonymity to hide these efforts. The third vector is the offensive character of China’s cyber strategy. It contains the theoretical backing for preemptive cyber operations against other nations in times of crisis. These three aspects—peace activist, espionage activist, and attack planner—dominate China’s cyber policy. Some are always hidden from view while others are demonstrated daily. Three Faces of the Cyber Dragon is divided into sections that coincide with these vectors.
Related Products
Instruments of Chinese Military Influence in North Korea
Chinese Military Exercises Highlight Improvements in Joint Operations
China Developing Improved Equipment for Deep Sea, Polar Exploration
How China Fights in Large-Scale Combat Operations
U.S. Army Strength is Our NCO Corps infographic
Taiwan Suspects Chinese Ship of Cutting Undersea Data Cables
How China Is Challenging U.S. Maritime Dominance
China Upgrades Strategic Partnership With Nigeria
China Expands Its Influence in Africa Through Economic and Security Cooperation
Wargame Insights Into PLA Strengths and Vulnerabilities