Important Factors in an Informationized Battlefield, US cyber-attacks in China, Importance of Computing Power
Issue 24, 28 March 2022
I. Military and Warfare
Important Factors to Consider in an Informationized Battlefield
Next in the series of exploring entropy of informationized battlefield, this article by Sun Shidong, Su Zhiguang, and Zhao Mengshan of Unit 61001 highlights important factors in informationized battlefield.
The authors have compared a key factors needed to fully operationalized an informationized battlefield with a human body. Where different systems work independently and together to make a human. The metaphors used by authors are:
Network (网络) - Skeleton (骨骼)
Data (数据) - Blood (血液)
Cloud (云态) - Nerve (神经)
Electromagnetic spectrum (电磁) - Eyes and Ears (耳目)
Algorithm (算法) - Brain (大脑)
Network (网络) : Skeleton (骨骼) - Connecting everything on the battlefield
As per Metcalfe's law, a network is more usable and valuable as the number of devices and users increase. Following this law, the authors explain that in information age, the power on battlefield comes from acquisition and sharing of information. They argue that in the modern combat system, the network not only has the traditional communication transmission function, but also becomes a link coupler that aggregates and manages various combat resources such as computing and storage, security and confidentiality, space-time reference, sensor detection, and military firepower. Connecting devices to a larger network promotes the integrated operation of all combat elements in the observation chain, judgment chain, decision chain, and action chain. This transforms "platform centric" battlefield into to "network centric" battlefield. The key to improving combat effectiveness is to focus on realizing the interconnection and interoperability between different combat forces, elements, and units.
Data (数据) : Blood (血液) - Accurately defines the battlefield
The essence of information warfare is data. The deep integration of big data, cloud computing, artificial intelligence, etc., can dig out the combat laws hidden behind massive data, thus making combat operations research more scientific and efficient. Use of these technologies can manifest as follows:
Tigger changes in intelligence analysis
Revolutionize command and decision-making
Activate the use of intelligent weapon systems
Cloud (云态) : Nerve (神经) - Fabric of battlefield
Practice has proved that only cloud platform has ability to support the complexity of informationized battlefield and can complete OODA cycle faster and accurately. It can ease the complex battlefield in following ways:
Matching the supply and demand of information - The cloud computing-based data processing environment can instantly complete the processing of ultra-large-scale data traffic, and realize the rapid integration of battlefield intelligence, real-time perception of battlefield situation and real-time assessment of threat level.
Support command planning - Using data analysis, realize the accumulation and transformation from data to information to knowledge, support the evaluation of combat plans, process deduction, and plan optimization. Thus, improving the level of command and planning.
Control combat resources - Using the cloud terminal, battlefield information such as battlefield meteorology, hydrology, and geology can be easily observed. It can also help to perceive the force deployment, firepower configuration, and provide update on action status of the warring parties in full-dimensional real-time, providing strong support for collaborative combat decision-making.
Electromagnetic spectrum (电磁) : Eyes and Ears (耳目) - To know battlefield situation
Modern warfare is highly dependent on the electromagnetic spectrum, and maintaining the advantages of the electromagnetic spectrum is an important prerequisite for gaining tactical, operational and strategic advantages. It is used for various reconnaissance means to control the electromagnetic activities on the battlefield, judge the enemy's combat intentions, predict the combat situation on the battlefield, determine the combat target, select the combat direction, rationally deploy the troops and weapons, and scientifically plan the information firepower, has become the focus of battlefield perception and combat command. It is necessary to improve the ability to control the electromagnetic spectrum on the battlefield, master the right to use battlefield information, and ensure the normal flow of information and data flow of one's own side, so as to achieve flexible and adaptive comprehensive confrontation in high-intensity wars.
Algorithm (算法) : Brain (大脑) : To precisely control battlefield actions
Under the conditions of informatization, algorithms can help the combat system to realize situational awareness, analysis and judgment, intelligent decision-making, action handling, and autonomous learning. Algorithms can be useful in following ways:
Algorithm design leads the innovation of tactics
Algorithm to control flash war
Algorithmic confrontation produces a high-end war system
Importance of Computing Power
An article in PLA Daily article has elaborated on importance of better computing for future warfare along with overall importance of computing power. In last issue, I had written about China's "East Data, West Calculation" project which also includes plan to develop a National Computing Network. This article is in continuation to the same topic.
Why national computing project is necessary?
Development of western regions
Country is producing large amount of data
Promote digital economy
Important for future military operations
National computing power is needed for Beijing's lofty ambitions in digital era.
An essential feature of this project is "network" computing clusters which can aggregate and uniformly dispatch distributed computing power resources, realize the on-demand selection of computing power services when needed. It is expected that this structure will incentivise reforms in computing sector of economy.
Following quote highlights importance of computing power for military:
"In the future, algorithmic warfare has shifted from the human brain level to the machine brain-like level. Whoever has the fastest computing power iteratively upgrades and who has strong machine learning ability, whose decision-making is more in line with the confrontation situation, will occupy the top of the intelligent warfare." (未来算法战,已从人类大脑层面转换到机器类脑层面,谁的算力迭代升级快,谁的机器学习能力强,谁的决策就更符合对抗态势,谁就将占据智能化战争的顶端。)
Additional Reading:
II. SinoSync
US Cyber-activities in China
In March 24 press conference, Wang Wenbin, Spokesperson of the Ministry of Foreign Affairs, China responded to a question on a report released by Chinese security company Qihoo 360 about US National Security Agency's (NSA) cyber-activities in China in addition to other countries. (Global Times Article)
Here is a full response :
Question by CCTV: Previously, the Chinese cybersecurity company named 360 released the report on indiscriminate cyberattacks across the world launched by the APT-C-40 group of the US National Security Agency (NSA) over the past decade or so. The company recently disclosed in full the technical features of “Quantum”, the most powerful cyberweapon used by the NSA to attack targets in China mentioned in the report. Do you have any further comment?
Response by Wang Wenbin:
Wang Wenbin: I noted relevant reports. The latest revelation shows that “Quantum” is an advanced cyber hijacking tool that the NSA has specially designed for attacking state-level Internet. The US can use this technology to attack all Internet users browsing US websites such as Twitter, YouTube, Amazon as well as Chinese social media applications. This means no matter who you are and where you are, Big Brother is probably watching you whenever you log on to a social media platform.
In recent years, the US has proposed to build the so-called “Clean Network”, has been brewing the so-called “Alliance for the Future of the Internet”, and has used cyber capacity building as a pretext to strengthen cybersecurity cooperation with many countries. However, as the report reveals, many countries the US works with are also targets of its cyberattacks. As we can see from exposed operations such as “Dirtbox”, “PRISM”, “Irritant Horn” and “Telescreen”, the US doesn’t even spare its allies and partners in its global cyber surveillance and attacks. In this sense, the so-called “Clean Network” is nothing but a mirage to camouflage US surveillance and cyber theft across the globe and an “invisibility cloak” to conceal its true face as the “empire of hacking”.
We once again urge the US to act responsibly in cyberspace and stop cyber theft and attacks on China and the rest of the world. The US should implement the framework that it insists all other states abide by.
In the span of just a few months, two Chinese cybersecurity and tech companies have released a detailed report of US cyber activities in China. One by Pangu Lab and another by Qihoo 360. Moreover, this is the second time in this month that Qihoo 360 has alleged cyberattacks in China by US agencies. Qihoo 360 had made similar allegations back in 2020 too. The biggest cybersecurity company in China had alleged that the CIA had targeted Chinese companies.
The latest report by Qihoo 360 alleges that NSA has used quantum technology to attack all users who platform like Facebook, Twitter, YouTube, Amazon, along with Chinese social media platforms like QQ. As Global Times reported, "the weapon can monitor and hijack users' social media accounts, emails and communication information."
My thoughts:
These reports are the beginning of a strong counternarrative effort by Beijing in response to similar moves by Washington.
Over the years, various institutes and state-affiliated bodies in the US have exposed China's cyber espionage activities in the US and in other countries. The US also holds publicly broadcasted testimony sessions exploring China's cyber activities and threats. These reports and testimonies have taken discourse on China's cyber activities to a global audience, making everyone aware of possible threats arising out of China.
Chinese companies, security experts, and leaders believe that allegations of Chinese cyberattacks are attempts to malign China. Global Times article talks about the views expressed by Chinese companies and experts about Us attempts to malign China. An article published by the China Institute of International Studies (CIIS) in 2020 also called out US' "hypocrisy in cybersecurity" after the 2020 Qihoo 360 report. MoFA too had renounced the US as "Hacker Empire" in 2020.
A section in China's intelligentsia had expressed their discontent over the lack of similar reports in China exposing the US' cyber activities.
For example, just a few days before Pangu Lab released its report on US cyber espionage, Hu Xijin, former Global Times editor had expressed discontent over the lack of Chinese reports over US cyber espionage activities.
By leveraging such reports Beijing wants to highlight that the US will space even its partners and allies when it comes to cyberattacks. One, The Pangu Lab report was available in both Mandarin and English, listing all the other countries NSA has allegedly penetrated. This list included targets from India, the UK, Australia, Japan, and many other countries. (See China Tech Dispatch, Issue 20). Two, Wang Wenbin's statement is clearly calling out the US. Notice the statement where he emphasized, "we can see from exposed operations such as “Dirtbox”, “PRISM”, “Irritant Horn” and “Telescreen”, the US doesn’t even spare its allies and partners in its global cyber surveillance and attacks."
Additional Reading:
Refer to Issue 20 of China Tech Dispatch for details on Pangu Lab's report
DJI Caught in Ukraine-Russia War
I regularly emphasize the utility of dual-use technologies in military applications. Any technology that can be used to gain leverage during a time of crisis will absolutely be used. And that makes it necessary to keep an eye on civilian technologies. The most evident example of this is Chinese technology company DJI's civilian drones being allegedly used by Ukraine and Russia in the ongoing war.
On 16th March, Ukraine's Vice Prime Minister of Ukraine and Minister of Digital Transformation of Ukraine, Mykhailo Fedorov, posted on Twitter that Russian troops were using DJI troops to target Ukrainians.
It is notable that the AeroScope functionality, which is being allegedly used to target drone users, is a civilian tech and was not meant for military use. DJI itself has expressed that the intended functionality of AeroScope was to track rogue drones. DJI had reportedly developed this technology to preempt possible regulations from governments. The Verge quoted a Bloomberg report that this was done on the indication from the Chinese government.
About DJI
Before we delve into this issue further, it is important to note that DJI is a Chinese drone maker company. It is a leading drone maker company producing a range of drones for civilian and military use. Before the US sanctioned DJI, it was one of the leading suppliers to the US military.
In Dec 2021, the US Department of Treasury has named DJI as one of the eight Chinese tech firms as a part of the Chinese Military-Industrial Complex and placed it under-investment blocklist for enabling human rights abuse by providing surveillance technologies in the Xinjiang region. DJI is also on the US Department of Commerce's Entity List.
DJI's stance on Russia: So far, DJI has refused to stop sales in Russia or pull out of Russia.
How Ukrainians are using drones?
Using aerial cameras to track Russian convoys and send geotagged images to Ukrainian troops.
Using drones to reportedly drop Molotov cocktails
Using military-grade Turkish drones to drop laser-guided bombs
Switchblade kamikaze drones provided by US
Additional Reading:
Chinese satellite project aims to give smartphone users fast access to cameras in space
AI on its way to replacing humans in hypersonic weapon design: Chinese study
III. InfoBytes
Metcalfe's Law
This law states that a value of a telecommunications network is proportional to the square of the number of connected users of the system (n2). This means greater the number of users or devices in a network, more useful and valuable the network. It is attributed to Robert Metcalfe since he first formulated this law using communicating devices in network in era of Ethernet. It was later adopted by George Gilder in 1993 for internet.
Additional Reading:
IV. Before You Go
Applications for Takshashila’s Public Policy Courses are now open.
The Graduate Certificate in Public Policy (GCPP) is a 3 month course. There are four streams to choose from: Defence and Foreign Affairs, Health and Life Sciences, Technology & Policy and Advanced Public Policy. Refer links below for details of each specialisations.
GCPP: https://bit.ly/may22-ti-gcpp
For Advance Public Policy: https://bit.ly/may22-ti-app
For Tech & Policy: https://bit.ly/may22-ti-tp
For Defence & Foreign Affairs: https://bit.ly/may22-ti-dfa
Megha Pardhi is a Research Analyst at The Takshashila Institution. She tweets at @pardhimegha21.