Industrial Deals Beauty Best Books of the Month STEM nav_sap_plcc_ascpsc Starting at $39.99 Wickedly Prime Handmade Wedding Rustic Decor Book House Cleaning TheTick TheTick TheTick  Introducing Echo Show All-New Fire 7 Kids Edition, starting at $99.99 Kindle Oasis GNO Water Sports STEMClubToys17_gno
Customer Review

7 of 7 people found the following review helpful
5.0 out of 5 stars Lifting the veil on Chinese information warfare, December 31, 2010
A colleague introduced me to Dragon Bytes (DB) by Timothy L Thomas, and an expert on the Chinese hacker scene was kind enough to secure a copy of the book. I thank all of them for the extraordinary journey presented in DB. Published in 2004, DB is an historical review of key publications by Chinese information warfare (IW) theorists and thought leaders, as translated by the former Foreign Broadcast Information Service (FBIS) and other American translators. The author is an analyst with the Foreign Military Studies Office, and is a West Point graduate, a retired Army Lt Col, and a former Foreign Area Officer focusing on the USSR and Russia. DB covers Chinese IW thought from 1995-2003. Thomas' subsequent books, Decoding the Virtual Dragon, and The Dragon's Quantum Leap, cover later periods in Chinese IW history.

DB is really unlike any of the books I have reviewed before, because it summarizes the IW doctrine of another country. As a former Air Force intelligence officer, I helped develop our nation's IW plans in the late 1990s and have defended civilian infrastructures for the last 10 years. DB provides a view of a world that is plain to see if only the reader knows where to look and can read Chinese. Thanks to FBIS translations and Thomas' keen eye, Western readers can learn what the Chinese military says about IW.

I'd like to highlight a few concepts and excerpts that I feel are important to understanding Chinese IW theory.

The Chinese do not seek to simply copy Western IW concepts. Rather, they stress development of IW "with Chinese characteristics." They draw heavily on Marx and Engels for their military doctrine, including People's War, and believe Mao brought Marx's ideas to fruition in China. They feel that IW is a natural implementation of People's War, especially when individual Chinese citizens can participate simply by virtue of owning a computer. Unlike Western militaries and governments, China vigorously integrates civilians and reservists into their military framework, to include individual "hackers."

Traditionally China has pursued "active defense" as their military model, meaning they do not seek (or claim not to seek) conquest beyond their borders. Rather, they respond with People's War when attacked by aggressors. IW, however, does not lend itself to an active defense strategy because losing the initiative means losing the war. Chinese IW theorists increasingly abandoned "active defense" with IW and now promote active offense, which takes various forms.

Chinese IW theorists are advocates of proper thinking over force (p 101). Unsurprisingly, theorists channel Sun Tzu by seeking to "win without fighting" through IW. They devote a lot of energy to developing strategy and "strategems," sometimes considered to be "tricks" or "schemes" to overcome superior forces. They believe information is as important as energy and materials, and "warfare may be waged around the struggle for intellectual resources, such as the allegiance of a high-tech expert or the patented right to a piece of technology" (p 13).

The Chinese military sees Western culture, particularly American culture, as an assault on China, saying "the West uses a system of values (democracy, freedom, human rights, etc.) in a long-term attack on socialist countries... Marxist theory opposes peaceful evolution, which... is the basic Western tactic for subverting socialist countries" (pp 102-3). They believe the US is conducting psychological warfare operations against socialism and consider culture as a "frontier" that has extended beyond American shores into the Chinese mainland. The Chinese therefore consider control of information to be paramount, since they do not trust their population to "correctly" interpret American messaging (hence the "Great Firewall of China"). In this sense, China may consider the US as the aggressor in an ongoing cyberwar.

Dr Shen Weiguang, China's "father of IW," defines IW as "two sides in pitched battle against one another in the political, economic, cultural, scientific, social, and technological spheres," (p 32) or as "brain war" (p 40). Thomas reports Shen's views thus: "information control is the doorway to an opportunity to dominate the world" (p 33). Shen mentions "total IW" where "information aggression" involves "violating the information space of another country and plundering its information resources" (p 36). Shen recommends creating an "information academy" and believes "'attack in order to defend' is more effective than defense alone in many cases since advance warning is impossible and the effectiveness of defense is hard to predict" (p 45). However, Shen seems to believe IW should be constrained by international norms, since he also advocates developing a "set of information rules" to limit IW (p 48). Finally, academic Deng Xiaobao discusses "dwindling distinctions... between wars and non-wars (referring here to the lack of distinction between IW and times of peace, where an IW can start with an information assault and the side under attack may not be able to judge that it is a war)" (p 125).

I strongly recommend reading DB and Thomas' subsequent works if you want to better understand Chinese IW history and thinking.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No

[Add comment]
Post a comment
To insert a product link use the format: [[ASIN:ASIN product-title]] (What's this?)
Amazon will display this name with all your submissions, including reviews and discussion posts. (Learn more)
This badge will be assigned to you and will appear along with your name.
There was an error. Please try again.
Please see the guidelines and FAQs here.

Official Comment

As a representative of this product you can post one Official Comment on this review. It will appear immediately below the review wherever it is displayed.   Learn more
The following name and badge will be shown with this comment:
 (edit name)
After clicking the Post button you will be asked to create your public name, which will be shown with all your contributions.

Is this your product?

If you are the author, artist, manufacturer or an official representative of this product, you can post an Official Comment on this review. It will appear immediately below the review wherever it is displayed.  Learn more
Otherwise, you can still post a regular comment on this review.

Is this your product?

If you are the author, artist, manufacturer or an official representative of this product, you can post an Official Comment on this review. It will appear immediately below the review wherever it is displayed.   Learn more
System timed out

We were unable to verify whether you represent the product. Please try again later, or retry now. Otherwise you can post a regular comment.

Since you previously posted an Official Comment, this comment will appear in the comment section below. You also have the option to edit your Official Comment.   Learn more
The maximum number of Official Comments have been posted. This comment will appear in the comment section below.   Learn more
Prompts for sign-in


Track comments by e-mail

Sort: Oldest first | Newest first
Showing 1-9 of 9 posts in this discussion
Initial post: Jan 5, 2011, 2:48:28 PM PST
Great review! I'd love to buy these books, do you know of anywhere they're available?

Posted on Jan 5, 2011, 5:26:26 PM PST
It's a shame it's out of print. Sounds fascinating and relevant. Even (or especially!) a Kindle edition would be excellent.

Posted on Jan 5, 2011, 5:28:40 PM PST
D Rathbun says:
I think this is a critically important subject that deserves a wider audience. It is shameful that the book is not avaialable and I would urge the author and/or publisher to do something about it! I know many people in the Infosec industry who would be keenly interested!

Posted on Jan 6, 2011, 4:22:21 AM PST
I'd love to buy these books, particularly in an ebook format.

Posted on Jan 6, 2011, 5:49:51 AM PST
This sounds like another fine effort from Mr Thomas that I would like to acquire. If there is no way to get a "paper & ink" version of the book can it at least be made available for my Kindle?

Posted on Mar 18, 2011, 3:35:53 PM PDT
Anybody got it used? They gotta reprint this!

Posted on Apr 4, 2011, 4:24:56 PM PDT
J. W. Ames says:
I would definitely buy this book if it were reprinted.

Posted on Apr 7, 2011, 9:56:57 PM PDT
Guy Israeli says:
excellent review! I am looking for this book for months.. where can we get it?

Posted on May 1, 2011, 7:50:06 PM PDT
Brian Gehrke says:
Looking to buy... new or used... reprints would be good.
‹ Previous 1 Next ›

Review Details

Item not available

Location: Metro Washington, DC

Top Reviewer Ranking: 384,592