• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber warfare
  • China and its cyber capabilities, are you really surprised?

China and its cyber capabilities, are you really surprised?

Pierluigi Paganini March 20, 2015

China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest experts for a comment.

Bill Hagestad (Red-DragonRising  @RedDragon1949) is a consultant, speaker and expert on Chinese cyber warfare. He is author of 21st Century Chinese Cyberwarfare and Chinese Information Warfare Doctrine Development 1994 – 2014  among others. Lieutenant Colonel(ret) US Marine Corps.

I contacted Bill Hagestad II to have a clear picture related the information that the security community and intelligence collected over the year about Chinese cyber capabilities.

“Here are my views on the latest headlines about Chinese ‘hacking divisions” – the news is nothing new…albeit great that Chinese Hacking & the PLA is making the headlines, it is mere sensationalism and self-promotion – not really contributing anything new to the study of Chinese Military Cyber Doctrine Development.

Factually the work on this subject is pioneered in the West by LtCol Timothy Thomas US Army retired. It was carried on by Richard Bejtlich @taosecurity and further studied by Scot Turban, USMC. I have since carried the torch on behalf these three and others such as Mark Stokes, since 2011.

Theories about Chinese military use of computers as a weapon system began some would argue with Major General Wang Pu Feng in 1995; later in 1999 Senior Colonels Qiao Liang & Wang Xiangsui of the PLA Air Force (PLAAF) wrote “War Without Limits” colloquially known as “Unrestricted Warfare”. In 2002 Major General Dai Qing Min codified Chinese Military Information Warfare (IW) strategy with his pronouncement of Integrated Network Electronic Warfare (INEW). From

2002 to 2010 the Chinese began carefully studying through observation the US Military use of Electronic Warfare (EW) uses during Operation Iraqi Freedom (OIF) – please don’t ask me about this as some of it is still CLASSIFIED.

As late as 2009, Chinese Military Officers of the People’s Liberation Army (PLA) Professor Hu Xiaofeng Professor Meng Xiangqing have stated that since August 8th 2009 that the PLA cadre’s are being taught “Combat Development Under Conditions of Informatization” (see http://blog.sina.com.cn/s/blog_4b46cda30100e5dh.html).

In 2010, then President Hu Jin Tao gather his five most senior PLA generals of the General Staff Directorate (GSD) and proclaimed he wanted an informization command, Chinese version of cyber command in response to the US Department of Defence’s militarization of the binary world with the creation of component command, US Cyber Command in 2009.

Then president Hu’s presidential order on 20 JUL 2010 was “to handle cyber threats as China enters the information age, & strengthen the nation’s cyber-infrastructure”.

Cyber China

On 8 NOV 2012 as Hu Jin Tao was transferring Chinese presidential leadership to Xi Jin Ping he stated that the Chinese military the PLA “China will speed up full military IT Applications by 2020”. The orders given to the PLA about cyber warfare future operations included these following important points:

“…train a new type of high-caliber military personnel in large numbers, intensively carry out military training under computerized conditions, and enhance integrated combat capability based on extensive IT application…”;

“…implement the military strategy of active defense for the new period, and enhance military strategic guidance as the times so require”;

“…strengthen national defense aim to safeguard China’s sovereignty, security and territorial integrity and ensure its peaceful development…“;

“…enhance the capability to accomplish a wide range of military tasks, the most important of which is to win local war in an information age…“; See this link for the details:

http://news.xinhuanet.com/english/special/18cpcnc/2012-11/08/c_131959900.htm

In 2013, we have the now (lately 2015 MAR) infamous headline grabbing

“中國武裝力量的多元化就業” or The Science of Military Strategy” that McReynolds claims is new – it is not…I have been speaking globally about this since it came out in ENGLISH on 16 APR 2013! (see both http://news.xinhuanet.com/mil/2013-04/16/c_124586672.htm and

http://roll.sohu.com/20130417/n372988548.shtml)

While his headlines are a continuation of Chinese military cyber development they are NOT NEW!

– From China’s “The Science of Military Strategy” the key tenent is “In addition to winning local wars under conditions of informatization outside the core military tasks, but also given by the State to complete the new diversified military missions and tasks.” I ordered this book from Amazon.com at this link:

http://www.amazon.com/Science-Military-Strategy-GUANGQIAN-YOUZHI/dp/780137892X

In 2014, both a Hong Kong newspaper and the Chinese version of the Wall Street Journal broke news of an alleged Chinese National Security Agency or “揭秘中国情报机构总参三部” (see both http://www.awaker.hk/2014/07/02/the-nsa-nsa-listening-is-just-the-beginning-led-us-into-the-network-war-spy-chief.html and http://cn.wsj.com/gb/20140708/bch104007.asp)

My original research in 2014 indicates that the three new PLA leaders of China’s NSA are the following PLA Officers:

鲍廷祥, 总参某信息保障基地政委

Bao Tingxiang, Political Commissar of Information Assurance Base;

张宁 总参, 某卫星地面站主任

Zhang Ning General Staff Director of Strategic Satellites; and,

张玉 总参某卫星地面站工程师

Zhang Yu General Staff Director of Satellite Earth Stations see this link for confirmation:

http://tv.81.cn/2014/dmmxrzn.htmhttp://www.oumil.com/article/zhenggong/26101.html

In late 2014 Chinese military websites began announcing PLA use of information weapons see 中國軍隊信息化战争时代的战斗力生成模式

China’s Information Warfare Age – A Mode for Generating Combat Power, see http://bit.ly/1sTMDPF And again 中国网络战部队大数据助力军队提高信息化作战能力

Chinese Cyber Forces: Large Data to Help Improve Chinese Military Information Warfare Capability, see http://goo.gl/UcPIjJ

On 6 JAN 2015 Major General Zhu Tan of the PLA stated that “Information weapons are the key to future warfare” see link for details:

http://military.people.com.cn/n/2015/0106/c1011-26336440.html

On 7 JAN 2015 Chinese University at Xi’an began announcement of university level cyber warfare education courses for the Chinese military (PLA); “西電開設網絡工程學院

Xi’an University of Electronic Science & Technology and Chinese military PLA cyber warfare courses” and “西安电子科大网络与信息安全学

院成立 - Xi’an Electronic Science Tech Inst establishes Network & Info Security Courses”. See both http://news.xidian.edu.cn/view-47502.html and http://cn.nytimes.com/china/20150107/c07cyber/zh-hant/

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – China, Information warfare)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

China cyber espionage Hacking Information Warfare Iran North Koral People’s Liberation Army PLA US

you might also like

Pierluigi Paganini August 13, 2025
Charon Ransomware targets Middle East with APT attack methods
Read more
Pierluigi Paganini August 13, 2025
Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Charon Ransomware targets Middle East with APT attack methods

    Malware / August 13, 2025

    Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

    Data Breach / August 13, 2025

    SAP fixed 26 flaws in August 2025 Update, including 4 Critical

    Uncategorized / August 13, 2025

    August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

    Hacking / August 12, 2025

    Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

    Hacking / August 12, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT