Add to book club
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.
Flip to back Flip to front
The Dragon's Quantum Leap: Transforming from a Mechanized to an Informatized Force Paperback – January 1, 2009
by
Timothy L. Thomas
(Author),
Tom Wilhelm
(Foreword)
| Price | New from | Used from |
From the Foreword: "Chinese observations of warfare in the information age have results in a widespread transformation and metamorphosis of the People's Liberation Army (PLA) from a mechanized to an informatized force. This transformation has affected nearly every aspect of China's military from strategy to logistics to educational development.
"The Dragon's Quantum Leap intends to peel back the transformation process and uncover the impact of new modes of thought on several key segments of military development (culture, strategems, crisis management, deception, and reconnaissance among other elements) that digital age thought is affecting. It exapdns the scope but not the basic theoretical theme of the author's two previous works on Chinese information warfare concepts..."
- Print length298 pages
- LanguageEnglish
- PublisherForeign Military Studies Office (FMSO), Fort Leavenworth, KS
- Publication dateJanuary 1, 2009
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.
Customers who viewed this item also viewed
Page 1 of 1 Start overPage 1 of 1
Customers who bought this item also bought
Page 1 of 1 Start overPage 1 of 1
Tell the Publisher!
I'd like to read this book on Kindle
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
I'd like to read this book on Kindle
Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.
Product details
- ASIN : B003OAQFE8
- Publisher : Foreign Military Studies Office (FMSO), Fort Leavenworth, KS (January 1, 2009)
- Language : English
- Paperback : 298 pages
- Item Weight : 1.1 pounds
- Best Sellers Rank: #3,797,036 in Books (See Top 100 in Books)
- #40,364 in Asian History (Books)
- Customer Reviews:
Customer reviews
4.7 out of 5 stars
4.7 out of 5
3 global ratings
How are ratings calculated?
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzes reviews to verify trustworthiness.
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Reviewed in the United States on December 23, 2013
This was a very detailed look at advances in Chinese capabilities in information warfare. The stength of this book lies in the fact that the author bases his conclusions exclusively from Chinese open source material, to include a look at how Taiwan views this growing threat. Thomas starts by analyzing the meaning and impact of the book, "Unrestricted War", and how this shines a light on the PLA's military culture. Thomas also examines how the PLA conducts crisis management, through an examination of the Sichuan province earthquake. The last part of the main text examines Chinese digital thought and developing doctrine, the conduct of digital recon by the PLA and how the idea of information war has taken hold of strategists within the PLA and governmental sectors of the PRC. Clearly the Chinese want the U.S. to believe that the PRC is the weaker opponent. The appendices are a gold mine of primary, open source material on IW in Chinese military publications and the ongoing development of virtual stratagems as an art of war. This is an incredible resource and a wake up call to strategic and operational planners at the national and COCOM levels.
2 people found this helpful
Report abuse
Reviewed in the United States on December 31, 2010
The Dragon's Quantum Leap (TDQL) is the third in a trilogy by Timothy L Thomas. A colleague introduced me to all three books, and an expert on the Chinese hacker scene was kind enough to secure a copy of the book. I thank all of them for the extraordinary journey presented in TDQL. Published in 2009, TDQL is an historical review of key publications by Chinese information warfare (IW) theorists and thought leaders, as translated by American translators and the Open Source Center, successor to the former Foreign Broadcast Information Service (FBIS). The author is an analyst with the Foreign Military Studies Office, and is a West Point graduate, a retired Army Lt Col, and a former Foreign Area Officer focusing on the USSR and Russia. TDQL covers Chinese IW thought from 2007-2009, while the earlier books Dragon Bytes (DB) addressed 1995-2003 and Decoding the Virtual Dragon covered 2004-early 2007.
My reviews of DB and DTVD summarized key Chinese IW themes, all of which extend into TDQL. Therefore I'd like to highlight a few aspects of TDQL that should be of interest to Western digital security specialists.
TDQL opens with an analysis of the one book by Chinese IW experts likely to be known to some US military strategists: Unrestricted Warfare (UW), published by Qiao Liang and Wang Xiangsui in 1999. Thomas includes it here because it foreshadows developments in Chinese IW in later years. It was interesting to learn that initially the Chinese government treated the UW authors critically, but later their ideas became popular. UW is filled with gems that cut to the heart of Chinese IW. For example, "the biggest difference between contemporary wars and the wars of the past is that, in contemporary wars, the overt goal and the covert goal are often two different matters" (p 21). "Military threats are already often no longer the major factors affecting national security... these traditional factors are increasingly becoming more intertwined with grabbing resources, contending for markets, controlling capital, trade sanctions, and other economic factors" (pp 21-2).
The authors offer critical insights that the Chinese have operationalized: "Warfare can be military, or it can be quasi-military, or it can be non-military. It can use violence, or it can be nonviolent. It can be a confrontation between professional soldiers, or one between newly emerging forces consisting primarily of ordinary people or experts" (p 28). In an interview about UW, author Qiao called war with the US "inevitable... because China will grow strong only at the cost of consuming much of the world's resources which will put it in direct competition and eventually conflict with the US" (p 30). They also claim "The battlefield is everywhere and war may be conducted in areas where military actions do not dominate" (pp 33-4). This reminds me of the subtitle of James Adams' 1998 book The Next World War: Computers Are the Weapons and the Front Line Is Everywhere.
Another author, PLA Major Peng Hongqi says "the weaker side [in IW] must adhere to the active offense... especially in peacetime" (p 40). Thomas says "Peng seems to imply that it is the RIGHT [author's emphasis] of an inferior force to attack a superior force first" (p 41). Peng advocates concepts like "protracted control" and using civilians, hackers, or other computers to gain plausible deniability. He says "forces begin engagements and reconnaissance before a conflict emerges. Peacetime collection of key information... is vital" (p 42). One should "treat the peacetime struggle for information supremacy as 'a genuine, perpetual, never-ending battle'... gain as much enemy information as possible and keep the enemy from gaining information on one's own side" (p 42). Also, "the only way the inferior side can compete with a powerful enemy is by taking full advantage of peacetime to energetically elevate its material and technological foundation" (p 42).
Deng Yifei provides what might be the "money quote" in TDQL: "In confrontation on the future battlefield, what is scarier than inferior technology is inferior thinking" (p 56). Evidence of China's IW thinking involves their focus on penetrating Western computers. Thomas notes "it is suspected that Chinese reconnaissance performs two functions: to expose an opposing force's military plans and to study the conditions and vulnerabilities that lead to the successful use of Internet attacks" (p 119). These intrusions bring to life this Chinese strategem: "a victorious army first wins and then seeks battle" (p 174). Chinese thinkers also plan to target foreign commanders, even including "a study of hobbies, weaknesses and flaws" (p 121).
Thomas notes Taiwan's reporting on Chinese IW as well. He also includes suggestions made to strengthen Taiwanese IW defense. For example, Lin Chin-ching recommends that "all officers under the rank of lieutenant general would be tested on their knowledge of IW and computer information, and their test results would be taken into consideration when their files are reviewed for promotion" (p 216). I suggest the same for business managers as well as US military leaders.
I strongly recommend reading TDQL and Thomas' other works if you want to better understand Chinese IW history and thinking.
My reviews of DB and DTVD summarized key Chinese IW themes, all of which extend into TDQL. Therefore I'd like to highlight a few aspects of TDQL that should be of interest to Western digital security specialists.
TDQL opens with an analysis of the one book by Chinese IW experts likely to be known to some US military strategists: Unrestricted Warfare (UW), published by Qiao Liang and Wang Xiangsui in 1999. Thomas includes it here because it foreshadows developments in Chinese IW in later years. It was interesting to learn that initially the Chinese government treated the UW authors critically, but later their ideas became popular. UW is filled with gems that cut to the heart of Chinese IW. For example, "the biggest difference between contemporary wars and the wars of the past is that, in contemporary wars, the overt goal and the covert goal are often two different matters" (p 21). "Military threats are already often no longer the major factors affecting national security... these traditional factors are increasingly becoming more intertwined with grabbing resources, contending for markets, controlling capital, trade sanctions, and other economic factors" (pp 21-2).
The authors offer critical insights that the Chinese have operationalized: "Warfare can be military, or it can be quasi-military, or it can be non-military. It can use violence, or it can be nonviolent. It can be a confrontation between professional soldiers, or one between newly emerging forces consisting primarily of ordinary people or experts" (p 28). In an interview about UW, author Qiao called war with the US "inevitable... because China will grow strong only at the cost of consuming much of the world's resources which will put it in direct competition and eventually conflict with the US" (p 30). They also claim "The battlefield is everywhere and war may be conducted in areas where military actions do not dominate" (pp 33-4). This reminds me of the subtitle of James Adams' 1998 book The Next World War: Computers Are the Weapons and the Front Line Is Everywhere.
Another author, PLA Major Peng Hongqi says "the weaker side [in IW] must adhere to the active offense... especially in peacetime" (p 40). Thomas says "Peng seems to imply that it is the RIGHT [author's emphasis] of an inferior force to attack a superior force first" (p 41). Peng advocates concepts like "protracted control" and using civilians, hackers, or other computers to gain plausible deniability. He says "forces begin engagements and reconnaissance before a conflict emerges. Peacetime collection of key information... is vital" (p 42). One should "treat the peacetime struggle for information supremacy as 'a genuine, perpetual, never-ending battle'... gain as much enemy information as possible and keep the enemy from gaining information on one's own side" (p 42). Also, "the only way the inferior side can compete with a powerful enemy is by taking full advantage of peacetime to energetically elevate its material and technological foundation" (p 42).
Deng Yifei provides what might be the "money quote" in TDQL: "In confrontation on the future battlefield, what is scarier than inferior technology is inferior thinking" (p 56). Evidence of China's IW thinking involves their focus on penetrating Western computers. Thomas notes "it is suspected that Chinese reconnaissance performs two functions: to expose an opposing force's military plans and to study the conditions and vulnerabilities that lead to the successful use of Internet attacks" (p 119). These intrusions bring to life this Chinese strategem: "a victorious army first wins and then seeks battle" (p 174). Chinese thinkers also plan to target foreign commanders, even including "a study of hobbies, weaknesses and flaws" (p 121).
Thomas notes Taiwan's reporting on Chinese IW as well. He also includes suggestions made to strengthen Taiwanese IW defense. For example, Lin Chin-ching recommends that "all officers under the rank of lieutenant general would be tested on their knowledge of IW and computer information, and their test results would be taken into consideration when their files are reviewed for promotion" (p 216). I suggest the same for business managers as well as US military leaders.
I strongly recommend reading TDQL and Thomas' other works if you want to better understand Chinese IW history and thinking.
12 people found this helpful
Report abuse




