Customer Review

6 of 6 people found the following review helpful
5.0 out of 5 stars Second in the trilogy on Chinese information warfare theory, December 31, 2010
This review is from: Decoding The Virtual Dragon - Critical Evolutions In The Science And Philosophy Of China's Information Operations And Military Strategy - The Art Of War And IW by Timothy L. Thomas
Decoding the Virtual Dragon (DTVD) is the sequel to Timothy L Thomas' 2004 book Dragon Bytes. A colleague introduced me to both books, and an expert on the Chinese hacker scene was kind enough to secure a copy of the book. I thank all of them for the extraordinary journey presented in DTVD. Published in 2007, DTVD is an historical review of key publications by Chinese information warfare (IW) theorists and thought leaders, as translated by American translators and the Open Source Center, successor to the former Foreign Broadcast Information Service (FBIS). The author is an analyst with the Foreign Military Studies Office, and is a West Point graduate, a retired Army Lt Col, and a former Foreign Area Officer focusing on the USSR and Russia. DTVD covers Chinese IW thought from 2004-early 2007. Thomas' earlier book discusses 1995-2003, and his later book addresses 2007-2009.

My review of DB summarized key Chinese IW themes, all of which extend into DTVD. Therefore I'd like to highlight a few aspects of DTVD that should be of interest to Western digital security specialists.

Chinese military leaders have always promoted development of theory and strategy, but they are now integrating practice into their doctrine. This is difficult for a military that lacks the ops tempo of a force like the US military, with a decade of continuous war experience on hand. However, IW allows continuous practice, since it can be exercised "using a borrowed sword" (i.e., using deception and "camouflage" to lend plausible deniability to Chinese IW offensives against the West).

Chinese thought leaders often see the US as an offensive force. Thomas reports on the views of two theorists thus: "Conflict-oriented strategy still holds a strong place in Western strategic culture. Expansion and the seizure of hegemony are Western strategic targets while China's has been an introvert-type behavior whose targets are peace, safeguarding national territories, and seeking unification and resisting aggression" (p 23). (That's apparently how the Chinese frame their activities in Tibet and their missiles facing Taiwan.)

The two theorists (Peng and Yao) also note that "the seizure of information has become a primary task of modern warfare" (p 30). One form of conflict perpetrated by the West is "strategic psychological warfare (SPW)," which includes "attempts to advance their [Western] political system and life style, to use economic aid as bait, to seek economic infiltration and control, and to promote western values via TV, movies, newspapers and journals, audio and video products, and especially over the Internet" (p 34). China sees this as a threat to their "network sovereignty" (p 124).

War is increasingly a financial affair: "War with the objective of expanding territory has already basically withdrawn from the stage of history, and even war with the objective of fighting for natural resources is now giving way to war with the objective of controlling the flow of financial capital" (p 76). "IW will gradually shift into the primary form of war, and military objectives will shift from eliminating the enemy and preserving oneself to controlling the enemy and preserving oneself" (p 87).

DTVD includes a translation of a Chinese IW dictionary and questions and answers on IW. The definition of Computer Network Attack (CNA) says "various measures and actions taken to make use of security flaws in the enemy's computer network systems to steal, modify, fabricate, or destroy information and to reduce or destroy network utility." The definition of IW mentions "the use of computer network systems to gain enemy intelligence," not just destroy targets. Crucially, "in this day and age, there is no distinction between peacetime and wartime network warfare" (p 127). Hopefully for world peace, "network warfare could develop in another direction and work to create 'network deterrence' or 'network containment.' That is, it may be more valuable for both sides to simply comply with the rulebook of not attacking another's networks if two sides attain a mutual balance of network power" (p 128).

Dai Qingmin notes "an individual can threaten an entire country in the information age" and "in some cases the more technologically advanced a country becomes, the more vulnerable it becomes as well" (p 134). Individuals who conduct IW can be hard to find or retaliate against, hinting at the PLA's interest in leveraging individual civilian hackers. Thomas writes: "Dai's discussion focuses heavily on obtaining key information via reconnaissance of foreign computer systems in peacetime... As he [Dai] states, 'Computer network reconnaissance (CNR) is the prerequisite for seizing victory in warfare.' His focus on CNR provides added context to current Chinese operations aimed at the reconnaissance of US systems" (p 137). A later section in DTVD mentions "intelligence warfare" as another Chinese concept where "two sides in a conflict adopt various means to gather and steal information from one another" (p 207).

Father of IW Dr Shen notes "the goals of war have changed from territorial expansion and economic aggression to information plundering and targeting psychological elements" (pp 160-1). Skilled people are key, according to another author, who writes "the personnel system of the armed forces will have to enlist computer hackers or treat them as wartime reserves and give them preferred treatment to provide technical support for military building and operations" (p 173); hear that, US military?

Finally, Thomas observes the "extensive knowledge that the Chinese have about our concepts and systems," with bookstores in China offering "translations of thirty or forty (perhaps more, depending on the size of the store) US military books... [but] a US military bookstore is usually limited to five Chinese titles" (p 304).

I strongly recommend reading DTVD and Thomas' other works if you want to better understand Chinese IW history and thinking.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No

[Add comment]
Post a comment
To insert a product link use the format: [[ASIN:ASIN product-title]] (What's this?)
Amazon will display this name with all your submissions, including reviews and discussion posts. (Learn more)
This badge will be assigned to you and will appear along with your name.
There was an error. Please try again.
Please see the full guidelines here.

Official Comment

As a representative of this product you can post one Official Comment on this review. It will appear immediately below the review wherever it is displayed.   Learn more
The following name and badge will be shown with this comment:
 (edit name)
After clicking the Post button you will be asked to create your public name, which will be shown with all your contributions.

Is this your product?

If you are the author, artist, manufacturer or an official representative of this product, you can post an Official Comment on this review. It will appear immediately below the review wherever it is displayed.  Learn more
Otherwise, you can still post a regular comment on this review.

Is this your product?

If you are the author, artist, manufacturer or an official representative of this product, you can post an Official Comment on this review. It will appear immediately below the review wherever it is displayed.   Learn more
System timed out

We were unable to verify whether you represent the product. Please try again later, or retry now. Otherwise you can post a regular comment.

Since you previously posted an Official Comment, this comment will appear in the comment section below. You also have the option to edit your Official Comment.   Learn more
The maximum number of Official Comments have been posted. This comment will appear in the comment section below.   Learn more
Prompts for sign-in


Sort: Oldest first | Newest first
Showing 1-6 of 6 posts in this discussion
Initial post: Jan 5, 2011 2:50:43 PM PST
Great review! I'd love to buy these books, do you know of anywhere they're available?

Posted on Jan 5, 2011 5:28:03 PM PST
Dan Rathbun says:
I think this is a critically important subject that deserves a wider audience. It is shameful that the book is not avaialable and I would urge the author and/or publisher to do something about it! I know many people in the Infosec industry who would be keenly interested!

Posted on Jan 6, 2011 5:46:52 AM PST
Based on what I got from the review and the description of the book, I would love to get my hands on a copy. If there is no way to get a "paper & ink" version of the book can it at least be made available for my Kindle?

Posted on Mar 18, 2011 3:35:34 PM PDT
Anybody got it used? They gotta reprint this!

Posted on Apr 4, 2011 4:25:15 PM PDT
J. W. Ames says:
I would definitely buy this book if it were reprinted.

Posted on Apr 7, 2011 10:00:13 PM PDT
Guy Israeli says:
please republish this book!
‹ Previous 1 Next ›

Review Details



Location: Metro Washington, DC

Top Reviewer Ranking: 13,240