Chinese information operations and information warfare

Informatized warfare of China is the implementation of information warfare (IW) within the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008,[1] informatized warfare includes the utilization of information-based weapons and forces, including battlefield management systems, precision-strike capabilities, and technology-assisted command and control (C4ISR).[2] However, some media and analyst report also uses the term to describe the political and espionage effort from the Chinese state.[3]

Definitions

People's Liberation Army defines the term informatization to describe the implementation of information technology in the digital age, and as an evaluation criteria of its military modernization effort. The Chinese military leadership aims to transform PLA from conducting people's war to engage in warfare conditions of informatization, which includes moving the military doctrine from weapon platform-centric to cyber-centric. The indicated characteristic of the cyber-centric force is the utilization of network linkages (data-link) among platforms.[4]

Taking informationization as the goal of modernization of its national defense and armed forces and in light of its national and military conditions, China actively pushes forward with the revolution in military affairs with Chinese characteristics.

— China’s National Defense in 2008[1]

United States-China Economic and Security Review Commission defines "Informationization" and informatized warfare in Chinese military doctrine as follows: "[A]t the operational level appears focused on providing an integrated platform for joint war-zone command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) connectivity, and for peacetime command and control (C2) within the PLA’s Military Regions."[2]

United States Defense Intelligence Agency defines China's "informatized warfare" as similar to U.S. military's concept of net-centric capability, which means the military's capability to use advanced information technology and communications systems to gain operational advantage over an adversary.[5]

In 1995, the father of Chinese IW, Major General Wang Pufeng, wrote "Information war is a crucial stage of high-tech war... At its heart are information technologies, fusing intelligence war, strategic war, electronic war, guided missile war, a war of "motorization" [jidong zhan], a war of firepower [huoli]—a total war. It is a new type of warfare."[6]

In two articles in the Liberation Army Daily, of 13 and 20 June 1995, Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science, Beijing, noted several definitions. They concluded:

'We hold that information warfare has both narrow and broad meanings. Information warfare in the narrow sense refers to the U.S. military's so-called "battlefield information warfare," the crux of which is "command and control warfare." It is defined as the comprehensive use, with intelligence support, of military deception, operational secrecy, psychological warfare, electronic warfare, and substantive destruction to assault the enemy's whole information system including personnel; and to disrupt the enemy's information flow, in order to impact, weaken, and destroy the enemy's command and control capability, while keeping one's own command and control capability from being affected by similar enemy actions.'[7]

They went on to state:

The essential substance of information warfare in the narrow sense is made up of five major elements and two general areas.

The five major elements are:

  • Substantive destruction, the use of hard weapons to destroy enemy headquarters, command posts, and command and control (C2) information centers
  • Electronic warfare, the use of electronic means of jamming or the use of antiradiation [electromagnetic] weapons to attack enemy information and intelligence collection systems such as communications and radar
  • Military deception, the use of operations such as tactical feints [simulated attacks] to shield or deceive enemy intelligence collection systems
  • Operational secrecy, the use of all means to maintain secrecy and keep the enemy from collecting intelligence on our operations
  • Psychological warfare, the use of TV, radio, and leaflets to undermine the enemy's military morale.

The two general areas are information protection (defense) and information attack (offense):

  • Information defense means preventing the destruction of one's own information systems, ensuring that these systems can perform their normal functions. In future wars, key information and information systems will become "combat priorities," the key targets of enemy attack.
  • Information offense means attacking enemy information systems. Its aims are: destroying or jamming enemy information sources, to undermine or weaken enemy C&C capability, and cutting off the enemy's whole operational system. The key targets of information offense are the enemy's combat command, control and coordination, intelligence, and global information systems. A successful information offensive requires three prerequisites:
    • 1) the capability to understand the enemy's information systems, and the establishment of a corresponding database system;
    • 2) diverse and effective means of attack; and
    • 3) the capability to make battle damage assessments [BDA] of attacked targets.
      — Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science, Beijing, 1995.[7]

A July 1998 conference held in San Diego, sponsored jointly by the RAND Center for Asia-Pacific Policy and the Taiwan-based Chinese Council of Advanced Policy Studies, "brought together Chinese military experts to discuss the non-hardware side of the People's Liberation Army's modernization."[8] In his presentation, James C. Mulvenon stated: "Chinese writings clearly suggest that IW is a solely military subject, and as such, they draw inspiration primarily from U.S. military writings. The net result of this "borrowing" is that many PLA authors' definitions of IW and IW concepts sound eerily familiar."[9]

In December 1999, Xie Guang, the then Vice Minister of Science & Technology and Industry for National Defence, defined IW as:

"IW in military sense means overall use of various types (of) information technologies, equipment and systems, particularly his command systems, to shake determination of enemy’s policy makers and at the same time, the use of all the means possible to ensure that that one’s own systems are not damaged or disturbed".[10]

In a strategic analysis paper for the Indian Institute for Defence Studies and Analyses written in 2006, Vinod Anand examines the definitions of Chinese Information Warfare.[10] He notes that although Chinese understanding of IW was initially based on western concepts, it has increasingly moved towards evolving its own orientation.

This list omits an element that plays a large role in Chinese IW and IO: computer network operations.[11]

Background

China's interest in information warfare began after the United States victory in the first Gulf War (1990–1991). U.S. success was the result of information technologies and the total dominance it was able to provide in the battle space.[12] From that point forward, the PLA began to seriously invest in and develop its own concepts of information warfare and what they mean to China.

The idea of a revolution in military affairs including information warfare has arisen as a school of thought in Chinese warfare.[13] China's leadership has continuously stressed using asymmetric techniques to counter more powerful nations, such as the United States, and information warfare is a tool that the PLA uses to achieve their goals.[14]

While China has adopted the idea of information dominance, its method for going about information dominance differs, using ancient political warfare methods such as the Thirty-Six Stratagems.[15]

The PLA has increasingly stressed an operational concept called "cognitive domain operations."[16]

Nature

The Chinese strategy of information warfare focuses on the use of what China calls "strategems" to build and maintain information superiority. These strategems help China compensate for its deficiencies in technology-based weapons, and may contain efforts to create cognitive errors and to influence the contents, process, and direction of thinking of an adversary. Cyberspace operations are used to achieve information dominance through reconnaissance and espionage, conducting network intrusions to steal and possibly alter data.[17]

The concept of "Unrestricted Warfare" combines elements of information operations, cyberspace operations, irregular warfare, lawfare,[18][19] and foreign relations, carried out in peacetime, as well as in conflict. The United States is viewed as a militarily superior foe whose advantages can be overcome through strategy and information operations. The U.S. reliance on technology, both in the military and in the civilian population, creates a vulnerability that can be exploited, along with "theoretical blind spots" and "thought errors", such as the absence of a comprehensive theory in United States Department of Defense doctrine that combines all elements of information warfare.[20][17]

In cyberspace, computer network espionage plays a large role in Chinese efforts to pursue a competitive advantage. In 2009, China was suspected of stealing large terabytes of design data for the F-35 Joint Strike Fighter from defense contractor Lockheed Martin's computers. In 2012, a Chinese version, the J-31, appeared to rival the F-35.[21] In 2014, a Chinese national was indicted for theft of sensitive trade secrets defense contractors, particularly data relating to Boeing's C-17 military transport aircraft.[22] Industrial espionage such as this yields economic benefits, as well as military and national security advantages for China, while eroding the technical superiority of the United States. Another concern with this type of espionage is that detailed knowledge of the F-35 and C-17 platforms could afford China the ability to hack a plane's command and control system, to alter its course or possibly disable it in a time of crisis. In addition, a network intrusion could allow an undetectable cyber weapon to be planted, lying dormant until activated during a conflict.[17]

On the defensive side, China employs a combination of legal policies and information technology for censorship and surveillance of dissenters in a program called "The Golden Shield".[23] This is often referred to as "The Great Firewall" of China. In addition, the People's Republic of China actively promotes the idea of "cyber sovereignty", putting borders on the internet based on territorial integrity.[24] This may be a way for the government to bypass the democratic free-flow of information that the internet represents.[17]

In a February 2018 hearing before the Senate Intelligence Committee, FBI Director Christopher Wray described so-called Confucius Institutes, Chinese language and cultural centers at universities that may be used as espionage tools to influence public opinion or to stifle academic freedom by limiting or disallowing discussions on certain topics. China has invested heavily in the motion picture industry as a way to gain cultural and economic influence, though reportedly China's relationship with Hollywood has started to cool.[25][17]

China has also been propagating an image of itself as a peaceful, nonthreatening nation focused on internal development rather than the pursuit of international power. UN Statements such as CCP general secretary Xi Jinping's administration "will never pursue hegemony, expansion, or sphere of influence" exemplify these attempts at influencing perception. Chinese information warfare doctrine suggests that these tactics are part of a broader strategy of encouraging complacency in potential adversaries. Other tactics include using international fora to promote the idea of arms control for "information weapons" in order to maintain control over its own information apparatus and to level the playing field with technologically advanced powers.[26][17]

Chinese disinformation operations have continued to evolve with operations in 2021 being significantly more sophisticated and resilient than operations in 2019. China has devoted significant human and financial resources to their operations.[27]

Asymmetric warfare

The PLA places an emphasis on asymmetric warfare, particularly using information warfare to compensate for technological inferiority.[15] In a 2001 paper in the U.S. Military Review,[28] T. L. Thomas examines the writings of Major General Dai Qingmin (Director of the PLA's Communications Department of the General Staff responsible for IW and IO), Senior Colonel Wang Baocun (of the PLA's Academy of Military Sciences) and others on the ways that China is employing "Electronic Strategies" to realise the benefits of asymmetric warfare. Thomas also summarises the April 2000 issue of the Chinese journal China Military Science which contains three articles on information warfare subjects. The only article written in English ("The Current Revolution in Military Affairs and its Impact on Asia-Pacific Security," by Senior Colonel Wang Baocun) presents a quite different approach to an article Wang Baocun wrote only three years previously where he presented a description of IW which contained the elements of Soviet/Russian military science.

In the article "On Information Warfare Strategies", by Major General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui (of the Communications and Command Institute), the authors define IW stratagems as "schemes and methods devised and used by commanders and commanding bodies to seize and maintain information supremacy on the basis of using clever methods to prevail at a relatively small cost in information warfare."[29]

Informationization

Information warfare is a subset of informationization.[10] As a result of technological advancement, China has now entered an era where Informationization is the military concept of the present and future. Informationization "entails embracing all the opportunities and technologies the Information Age can offer and integrating them into military systems".[30]

China's 2004 White Paper on National Defense outlines the importance of informationization.

"The PLA, aiming at building an informationalised force and winning an information war, deepens its reforms, dedicates itself to innovation, improves its quality and actively pushes forward the RMA with Chinese characteristics with informationalization at its core."[10]

The U.S. Department of Defense's 2009 Annual Report to Congress on "Military Power of the People's Republic of China" defines local wars under conditions of informationization as "high intensity and short duration fighting against high technology adversaries" ... "capable of fighting and winning short-duration, high-intensity conflicts along its periphery against high-tech adversaries".[31] Additionally, local war under informationization is an effort which seeks to fully develop and link land, air, sea, space and the electromagnetic spectrum into one system.[32] China's military strategy is focused on fighting and winning "informationized local wars."[33]

Three warfares

China's "three warfares" strategy involves using public opinion (or media) warfare, psychological warfare and legal warfare (lawfare). 3W's was introduced in 2003.[34]

Examples

COVID-19

The Chinese government has actively engaged in disinformation to downplay the emergence of COVID-19 in China and manipulate information about its spread around the world.[35][36] In January 2023, Google stated that it shut down more than 50,000 accounts promoting disinformation about COVID-19, Taiwan, and U.S. politics. The accounts were part of a campaign that Mandiant named "Dragonbridge" linked to Chinese public relations firm Shanghai Haixun Technology Co.[37] Haixun subsequently planted pro-Beijing stories in almost three dozen news outlets in an effort to help the Chinese government improve its image.[38]

Chinese information operations against the United States

Computer network operations, including cyber operations, are being undertaken by both Chinese citizens and the Chinese government. Because the United States has a weak critical infrastructure, it is vulnerable to Chinese cyber operations.[39] As was described to the United States Congress:

"In 2007, the Department of Defense, other U.S. Government agencies and departments, and defense-related think tanks and contractors, experienced multiple computer network intrusions, many of which appeared to originate in the PRC".[40]

Through a combination of overt and covert activities, China has sought to gain strategic political influence within the American government in order to affect policies and the political process. In the U.S., China employs efforts to "influence U.S. academics, journalists, think tank personnel and other shapers of public opinion..."[41] Chinese government information operations have also attempted to co-opt local NIMBY sentiment to drive opposition against perceived economic threats such as the development projects that compete with the rare earth industry in China.[42]

Influence operations

Using a variety of methods, the PRC has recruited American agents of influence to advocate for Chinese interests in the United States. While many of these agents of influence serve China unwittingly, they can be very effective. A 1999 Congressional report found that "the Chinese Government continues to seek influence in Congress through various means, including inviting Congressional members to visit the PRC, lobbying ethnic Chinese voters and prominent U.S. citizens, and engaging U.S. business interests to weigh in on issues of mutual concern."[43] Junkets were also effectively used by the Soviet Union as part of active measures to co-opt Western politicians, journalists, and academics.

China also uses its vast market as leverage in order to persuade American companies to lobby for Chinese interests. This is especially true of companies that deal in high technology or dual-use technology, as there are significant export controls placed on such technology. According to the 1999 Cox Report, "Executives wishing to do business in the PRC share a mutual commercial interest with the PRC in minimizing export controls on dual-use and military-related technologies. The PRC has displayed a willingness to exploit this mutuality of interest in several notoriously public cases by inducing VIPs from large U.S. companies to lobby on behalf of initiatives, such as export liberalization, on which they are aligned with the PRC."[44]

U.S. elections

Through its agents in America, the PRC has financed a number of political candidates. Katrina Leung, a Chinese spy, contributed $10,000 to the campaign of Richard Riordan, the former mayor of Los Angeles. When he lost his primary to Bill Simon Jr., Leung contributed $4,200 to Simon's campaign. At the direction of her Chinese handlers, Leung also contributed to the 1992 campaign of George H. W. Bush. It is estimated that Leung donated around $27,000 to politicians in the 1990s on behalf of the PRC.[45]

A 2012 report by the Government Accountability Institute[46] cites other examples: It was discovered that officers from the Chinese Embassy in Washington, D.C. "sought to direct contributions from foreign sources to the Democratic National Committee before the 1996 presidential campaign."[47] While these allegations have been denied by the PRC, "Secret communications between Beijing and the Chinese Embassy in Washington establish that the influence-buying plan was 'government sanctioned...'"[48]

In 1996, People's Liberation Army intelligence officer Gen. Ji Shengde provided Johnny Chung, a fundraiser for the Democratic National Committee, with $300,000 to donate towards President Bill Clinton's reelection. Chung visited the White House over fifty times during the 1996 presidential campaign, and was responsible for over $400,000 of contributions to the DNC.[49] This money was returned after the election.

In September 2022, Meta Platforms removed fake accounts linked to a China-based influence operation ahead of the 2022 United States elections.[50][51]

Chinese information operations against Taiwan

The PRC is actively seeking to unify Taiwan with China and uses information operations as an important part of that work. China's actions against Taiwan have been described as an active information war.[52][53] Despite the large resource outlay the Chinese have been relatively ineffective in influencing the Taiwanese public.[54] According to James C. Mulvenon rather than risk failure of a militarily forced unification, which could lead to international recognition of the independence of Taiwan, PRC leadership could potentially use computer network operations to undermine the will of Taiwan by attacking Taiwanese infrastructure.[55]

In 2022 Taiwan's Ministry of Justice Investigation Bureau revealed that it had identified more than 400 social media accounts being used to push disinformation to Taiwanese citizens as part of Chinese content farms.[56] In 2023, the Investigation Bureau announced that it was monitoring for money laundering undertaken in an effort to finance election interference in Taiwan.[57]

During the 2022 Chinese military exercises around Taiwan, Taiwanese officials accused the PLA of engaging in information warfare with claims of military exercises close to Penghu.[58]

Chinese information operations against India

The Times of India reported that during the 2017 Doklam standoff China used information warfare against India.[59]

Chinese information operations against the Philippines

In 2020, Facebook took down a Chinese network which was part of a disinformation campaign against the Philippines. The campaign used false profiles to influence public opinion, particularly related to politics. The campaign was dubbed "Operation Naval Gazing" by security researchers. Facebook is the dominant information source in the Philippines.[60]

Russian invasion of Ukraine

During the Russian invasion of Ukraine, state news agency Xinhua and other Chinese state media outlets paid for digital ads on Facebook supporting pro-Kremlin disinformation and propaganda after Meta Platforms banned Russian state media advertisement buys.[61][62][63][64] In March 2022, China Global Television Network repeated unsubstantiated Russian claims of biological weapons labs in Ukraine.[65][66][67] The CCP-owned tabloid Global Times also echoed Russian state media claims that the Bucha massacre was staged.[68]

Platforms

Quora

In 2018, the People's Daily, the official newspaper of the Central Committee of the Chinese Communist Party, reported on successful results from coordinated use of Quora in foreign propaganda campaigns.[69]

Twitter

In June 2020, Twitter shut down 23,750 primary accounts and approximately 150,000 booster accounts which were being used by China to conduct an information operation aimed at boosting China's global position during the COVID-19 outbreak as well as attacking traditional targets such as Hong Kong pro-democracy activists, Guo Wengui, and Taiwan.[70][71] Twitter said that the accounts had pushed deceptive narratives and spread propaganda.[72]

YouTube

In August 2020 Google removed over 2,500 channels on YouTube which they suspected of spreading disinformation for China. The deleted channels mostly featured content in Chinese and included coverage of divisive issues like Black Lives Matter.[73]

See also

References

  1. ^ a b "China's National Defense in 2008" (PDF). Federation of American Scientists.
  2. ^ a b Dr. Eric C. Anderson; Mr. Jeffrey G. Engstrom. "Capabilities of the Chinese People's Liberation Army to Carry Out Military Action in the Event of a Regional Military Conflict" (PDF). U.S.-China Economic and Security Review Commission.
  3. ^ DiResta, Renée (20 July 2020). "Telling China's Story: The Chinese Communist Party's Campaign to Shape Global Narratives" (PDF). Stanford University. Archived (PDF) from the original on 20 July 2020. Retrieved 21 July 2020.
  4. ^ A. Bitzinger, Richard (27 February 2018). "China's love affair with 'informatized warfare'". Asia Times.
  5. ^ "China Military Power" (PDF). Defense Intelligence Agency. Archived from the original (PDF) on 11 May 2019. Retrieved 5 November 2020.
  6. ^ Wang Pufeng, "Xinxi zhanzheng yu junshi geming" (Information Warfare and the Revolution in Military Affairs), Beijing: Junshi kexueyuan, 1995. Quoted in Mulveron, 1999, "The PLA and Information Warfare"
  7. ^ a b "INFORMATION WARFARE - Senior Colonel Wang Baocun and Li Fei". irp.fas.org. Retrieved 28 January 2023.
  8. ^ Mulvenon, James C.; Yang, Richard H. (1 January 1999). "The People's Liberation Army in the Information Age". {{cite journal}}: Cite journal requires |journal= (help)
  9. ^ James C. Mulvenon, "The PLA and Information Warfare" Archived 7 October 2012 at the Wayback Machine , Chapter 9 in Mulvenon & Yang, Editors, "The People's Liberation Army in the Information Age", (Washington DC: RAND, 1999), pp.175-186
  10. ^ a b c d "Chinese Concepts and Capabilities of Information Warfare | Manohar Parrikar Institute for Defence Studies and Analyses". www.idsa.in. Retrieved 28 January 2023.
  11. ^ "Redefining the Role of Information Warfare in Chinese Strategy | SANS Institute". www.sans.org. Retrieved 28 January 2023.
  12. ^ "China's Strategy for Information Warfare: A Focus on Energy". www.ensec.org. Retrieved 28 January 2023.
  13. ^ Michael Pillsbury, ed., China Debates the Future Security Environment (Washington, D.C.: National Defense University Press, 2000), 293.
  14. ^ Toshi Yoshihara, Chinese information warfare: a phantom menace or emerging threat? Archived 10 May 2011 at the Wayback Machine , Strategic Studies Institute, U.S. Army War College, Carlisle, PA, November 2001. ISBN 1-58487-074-5 (Accessed 23 April 2011)
  15. ^ a b Wang, Vincent (1 January 2002). "Asymmetric War? Implications for China's Information Warfare Strategies". American Asian Review. 20: 167–207. Archived from the original on 21 July 2020. Retrieved 21 July 2020.
  16. ^ Jackson, Smith; Beauchamp-Mustafaga, Nathan. "PLA Social Media Warfare and the Cognitive Domain". China Brief. Jamestown Foundation. Retrieved 10 September 2023.
  17. ^ a b c d e f Theohary, Catherine A. Information warfare: issues for Congress. ISBN 2-01-823163-4. OCLC 1076278968.Public Domain This article incorporates text from this source, which is in the public domain.
  18. ^ Dunlap, Charles J. (2011). "Lawfare Today... and Tomorrow". In Pedrozo, Raul A.; Wollschlaeger, Daria P. (eds.). International law and the changing character of war. Naval War College. ISBN 978-2-01-102264-6. OCLC 1136455835.
  19. ^ Kittrie, Orde F. (2016). Lawfare law as a weapon of war. Oxford University Press. ISBN 978-0-19-026357-7. OCLC 942888621.
  20. ^ Liang, Qiao. (2007). Unrestricted warfare : China's master plan to destroy America. Natraj Publishers. ISBN 978-81-8158-084-9. OCLC 699160241.
  21. ^ "China's Copycat Jet Raises Questions About F-35". Defense One. Retrieved 3 September 2020.
  22. ^ "Chinese National Pleads Guilty to Conspiring to Hack into U.S. Defense Contractors' Systems to Steal Sensitive Military Information". justice.gov. 23 March 2016. Retrieved 3 September 2020.
  23. ^ Denyer, Simon (2016). "China's Scary Lesson To the World: Internet Censorship Works". The Washington Post.
  24. ^ "Xi calls for 'cyber sovereignty'". BBC News. 16 December 2015. Retrieved 3 September 2020.
  25. ^ Faughnder, Ryan; Koren, James Rufus (12 November 2017). "As China cools on Hollywood, the movie business looks closer to home for money". Los Angeles Times. Retrieved 3 September 2020.
  26. ^ "Developments in the field of information and telecommunications in the context of international security". United Nations Digital Library System. 4 January 1999.
  27. ^ Cook, Sarah. "Beijing Is Getting Better at Disinformation on Global Social Media". The Diplomat. The Diplomat. Retrieved 29 March 2021.
  28. ^ LtCol Timothy L. Thomas, US Army, Retired, "47 China's Electronic Strategies" Archived 10 June 2011 at the Wayback Machine , Military Review, May–June 2001
  29. ^ Niu Li, Li Jiangzhou, and Xu Dehui, "On Information Warfare Stratagems," Beijing Zhongguo Junshi Kexue, 12 January 2001, 115-22. Translated and downloaded from /f_049.htm FBIS[permanent dead link].
  30. ^ Ferguson, MAJ Robyn E. "Information Warfare with Chinese Characteristics: China's Future of Information Warfare and Strategic Culture." Archived 12 April 2010 at the Wayback Machine Masters Thesis, US Army Command and General Staff College, Fort Leavenworth, Kansas, 2002. (Accessed 23 April 2011)
  31. ^ U.S. Department of Defense, Military Power of the People’s Republic of China 2009 Archived 23 July 2015 at the Wayback Machine , Office of the Secretary of Defense, Washington, D.C. (Accessed 28 April 2011).
  32. ^ Krekel, Bryan (16 October 2009). "Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation" (PDF). Prepared for The US-China Economic and Security Review Commission. Archived from the original (PDF) on 3 February 2011. Retrieved 3 March 2011.
  33. ^ "Is China a military superpower?". CSIS China Power. 24 February 2016. Archived from the original on 20 September 2016. Retrieved 25 August 2016.
  34. ^ Fritz, Jason R. (21 March 2017). China's Cyber Warfare: The Evolution of Strategic Doctrine. Lexington Books. p. 70. ISBN 978-1-4985-3708-7.
  35. ^ Cook, Sarah. "Welcome to the New Era of Chinese Government Disinformation". The Diplomat. Archived from the original on 29 March 2021. Retrieved 8 February 2021.
  36. ^ Wong, Edward; Rosenberg, Matthew; Barnes, Julian E. (22 April 2020). "Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say". The New York Times. Archived from the original on 4 April 2021. Retrieved 8 February 2021.
  37. ^ Creig, Jonathan (26 January 2023). "Google shut down thousands of pro-Beijing disinformation channels on Taiwan, COVID-19". The Record. Recorded Future. Retrieved 27 January 2023.
  38. ^ Cadell, Cate; Starks, Tim (24 July 2023). "Pro-China influence campaign infiltrates U.S. news websites". The Washington Post. ISSN 0190-8286. Retrieved 26 July 2023.
  39. ^ 2009 Report to Congress Archived 16 April 2017 at the Wayback Machine , U.S-China Economic and Security Review Commission, 2009, Washington D.C., pg.20
  40. ^ U.S. Department of Defense, Military Power of the People’s Republic of China 2008 Archived 12 October 2012 at the Wayback Machine , Washington, D.C., pg.14. (Accessed 28 April 2011).
  41. ^ Terrill, Ross (30 April 2009). "China's Propaganda and Influence Operations, Its Intelligence Activities That Target the United States, and the Resulting Imacts on U.S. National Security" (PDF). Hearing Before the U.S-China Economic and Security Review Commission: 65. Archived from the original (PDF) on 30 October 2012. Retrieved 15 November 2012. {{cite journal}}: Cite journal requires |journal= (help)
  42. ^ Tucker, Patrick (29 June 2022). "China's Disinformation Warriors May Be Coming for Your Company". Defense One. Retrieved 2 September 2023.
  43. ^ "Report to Congress on Chinese Espionage Activities Against the United States". FBI/CIA. 12 December 1999. Archived from the original on 29 October 2013. Retrieved 15 November 2012.
  44. ^ Cox, Christopher (1999). The Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China. Washington: U.S. G.P.O. OCLC 41428120. OL 17581519M. Archived from the original on 15 June 2020. Retrieved 15 June 2020.
  45. ^ Wise, David (2011). Tiger Trap: America's Secret Spy War With China. Boston/New York: Houghton Mifflin Harcourt. pp. 38, 110. ISBN 978-0-547-55310-8. OCLC 746747564.
  46. ^ "America the Vulnerable: Are Foreign and Fraudulent Online Campaign Contributions Influencing U.S. Elections?" (PDF). Government Accountability Institute. 26 September 2012. Archived (PDF) from the original on 10 October 2012. Retrieved 15 November 2012. {{cite journal}}: Cite journal requires |journal= (help)
  47. ^ Woodward, Bob; Brian Duffy (13 February 1997). "Chinese Embassy Role in Contributions Probed". The Washington Post. Archived from the original on 18 August 2018. Retrieved 8 September 2017.
  48. ^ Woodward, Bob (25 April 1997). "FBI Links Top China Officials, U.S. Donations". The Washington Post. Archived from the original on 28 March 2017. Retrieved 20 February 2020.
  49. ^ Johnston, David (12 May 1999). "Committee Told of Beijing Cash For Democrats". The New York Times. Archived from the original on 12 September 2017. Retrieved 18 February 2017.
  50. ^ Paul, Katie (27 September 2022). "Meta says removes China-based propaganda operation targeting U.S. midterms". Reuters. Retrieved 27 September 2022.
  51. ^ Myers, Steven Lee (27 September 2022). "Meta Removes Chinese Effort to Influence U.S. Elections". The New York Times. ISSN 0362-4331. Retrieved 27 September 2022.
  52. ^ Doshi, Rush (15 January 2020). "China Steps Up Its Information War in Taiwan". Foreign Affairs. Retrieved 6 October 2020.
  53. ^ Hung, Tzu-Chieh; Hung, Tzu-Wei (19 July 2022). "How China's Cognitive Warfare Works: A Frontline Perspective of Taiwan's Anti-Disinformation Wars". Journal of Global Security Studies. 7 (4). doi:10.1093/jogss/ogac016. ISSN 2057-3170.
  54. ^ Prasso, Sheridan; Ellis, Samson (23 October 2019). "China's Information War on Taiwan Ramps Up as Election Nears". Bloomberg News. Retrieved 6 October 2020.
  55. ^ James C. Mulvenon. "Chinese Information Operations Strategies in a Taiwan Contingency" Archived 3 November 2011 at the Wayback Machine , 15 September 2005. (Accessed 20 March 2011).
  56. ^ Li-chung, Chien (24 January 2022). "PRC targets Taiwan with new disinformation ploy". Taipei Times. Retrieved 24 January 2022.
  57. ^ "MJIB eyes China cash ahead of elections". Taipei Times. 20 November 2023. Retrieved 21 November 2023.
  58. ^ Tung, Roger (16 August 2022). "Taiwan accuses China of exaggeration with islands footage". Reuters. Retrieved 17 August 2022.
  59. ^ Bagchi, Indrani (13 August 2017). "Doklam standoff: China playing out its 'Three Warfares' strategy against India". The Times of India. Retrieved 15 September 2020.
  60. ^ Winger, Gregory. "China's Disinformation Campaign in the Philippines". The Diplomat. Retrieved 6 October 2020.
  61. ^ Langley, William; White, Edward (14 March 2022). "China backs Russian allegations about US biological weapons". Financial Times. Archived from the original on 10 December 2022. Retrieved 25 March 2022.
  62. ^ McCarthy, Simone (10 March 2022). "China's promotion of Russian disinformation indicates where its loyalties lie". CNN. Retrieved 24 March 2022.
  63. ^ Goodwin, Bill (23 March 2022). "Chinese state media use Facebook to push pro-Russia disinformation on Ukraine war". Computer Weekly. Retrieved 24 March 2022.
  64. ^ Young, Oliver (11 March 2022). "Chinese State Media Reinforces Russian Disinformation About War in Ukraine". China Digital Times. Retrieved 24 March 2022.
  65. ^ Rising, David (11 March 2022). "China amplifies unsupported Russian claim of Ukraine biolabs". Associated Press. Archived from the original on 11 March 2022. Retrieved 11 March 2022.
  66. ^ Mozur, Paul; Myers, Steven Lee; Liu, John (11 April 2022). "China's Echoes of Russia's Alternate Reality Intensify Around the World". The New York Times. ISSN 0362-4331. Retrieved 17 May 2022.
  67. ^ Aisha, Majid (21 March 2022). "How China uses Facebook to promote disinformation about Ukraine". Press Gazette. Retrieved 7 November 2022.
  68. ^ Carey, Alexis (7 April 2022). "Chinese state media's shocking claim after evidence of Russian torture revealed". news.com.au. Retrieved 6 June 2022.
  69. ^ "利用海外问答平台Quora改善国际传播效果--传媒--人民网". People's Daily (in Chinese). 18 December 2018. Retrieved 9 February 2022.
  70. ^ Conger, Kate (11 June 2020). "Twitter Removes Chinese Disinformation Campaign". The New York Times. ISSN 0362-4331. Archived from the original on 14 June 2020. Retrieved 21 July 2020.
  71. ^ Taylor, Josh (12 June 2020). "Twitter deletes 170,000 accounts linked to China influence campaign". The Guardian. ISSN 0261-3077. Archived from the original on 14 June 2020. Retrieved 21 July 2020.
  72. ^ "Twitter suspends 'China-backed accounts that spread propaganda'". Al Jazeera. Archived from the original on 13 June 2020. Retrieved 14 June 2020.
  73. ^ Strong, Matthew (7 August 2020). "Google removes 2,500 China-linked YouTube channels". Taiwan News. Archived from the original on 24 August 2020. Retrieved 7 August 2020.
  • v
  • t
  • e
Types
Books and documentaries
Examples
Health
Operations and events by country
Canada
China
Czechoslovakia
Operation Neptune
Germany
India
Israel
Korea
Mexico
Philippines
Russia /
Soviet Union
Soviet era
Post-Soviet era
South Africa
Turkey
United Kingdom
United States
Venezuela
Vietnam
Opposition
  • v
  • t
  • e
General
Branches
Ground

Navy
Air
Rocket
Strategic Support
Joint Logistics
Support [zh]
Structure
Central Military
Commission
Theater
Commands
Military regions
(defunct)
Ranks
Uniform
Institutions
Publications
Paramilitary
Contractors
  • v
  • t
  • e
National organizations
Mainland organizations
Hong Kong organizations
Macau organizations
Operations
Other topics
  • v
  • t
  • e
Diplomatic posts
Diplomacy
Conflicts
Incidents
Legislation
Organizations
Concepts
Related
Category:Cross-Strait relations