- Joined
- Feb 26, 2012
- Messages
- 56,981
- Reaction score
- 27,029
- Location
- Chicago Illinois
- Gender
- Male
- Political Leaning
- Private
Part two.....
“Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people’s warfare,” the report says.
The study links China’s space warfare development programs with its extensive cyber warfare capabilities. Both programs are considered “trump card” weapons that would allow a weaker China to defeat a militarily stronger United States in a conflict.
“Cyber warfare is an act of war that utilizes space technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace,” the study says. Because cyberspace relies on satellites, “space will surely be the main battlefield of cyber warfare,” the report said.
Satellites and space vehicles are considered the “outer nodes” of cyber space and “are clear targets for attack and may be approached directly,” the report said, adding that ground-based cyberspace nodes are more concealed and thus more difficult to attack. Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them very vulnerable to attack.
The report reveals that China’s military, which controls the country’s rapidly growing space program, is preparing to conduct space-based cyber warfare—“cyber reconnaissance, jamming, and attack”—from space vehicles.
Space-based cyber warfare will include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and intelligence gathering.
“A space cyber-attack is carried out using space technology and methods of hard kill and soft kill,” the report said. “It ensures its own control at will while at the same time uses cyberspace to disable, weaken, disrupt, and destroy the enemy’s cyber actions or cyber installations.”
Soft-kill methods are designed to disrupt or damage cyberspace links using jamming, network cyber attacks, and “deceit” in the electromagnetic domain.
The cyber attacks include launching computer viruses, theft and tampering of data, denial of service attacks, and “detonation of [a] network bomb that can instantaneously paralyze or destroy enemy’s information network.”.....snip~
“Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people’s warfare,” the report says.
The study links China’s space warfare development programs with its extensive cyber warfare capabilities. Both programs are considered “trump card” weapons that would allow a weaker China to defeat a militarily stronger United States in a conflict.
“Cyber warfare is an act of war that utilizes space technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace,” the study says. Because cyberspace relies on satellites, “space will surely be the main battlefield of cyber warfare,” the report said.
Satellites and space vehicles are considered the “outer nodes” of cyber space and “are clear targets for attack and may be approached directly,” the report said, adding that ground-based cyberspace nodes are more concealed and thus more difficult to attack. Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them very vulnerable to attack.
The report reveals that China’s military, which controls the country’s rapidly growing space program, is preparing to conduct space-based cyber warfare—“cyber reconnaissance, jamming, and attack”—from space vehicles.
Space-based cyber warfare will include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and intelligence gathering.
“A space cyber-attack is carried out using space technology and methods of hard kill and soft kill,” the report said. “It ensures its own control at will while at the same time uses cyberspace to disable, weaken, disrupt, and destroy the enemy’s cyber actions or cyber installations.”
Soft-kill methods are designed to disrupt or damage cyberspace links using jamming, network cyber attacks, and “deceit” in the electromagnetic domain.
The cyber attacks include launching computer viruses, theft and tampering of data, denial of service attacks, and “detonation of [a] network bomb that can instantaneously paralyze or destroy enemy’s information network.”.....snip~