Knowledge (XXG)

Fourth Department of the General Staff Department

Source 📝

229:
intelligence. 3PLA has a large staff of linguists and technicians and is the largest Chinese intelligence agency. Subsequently, 3PLA and 4PLA are the two largest players in China's CNO. They share several responsibilities: cyber intelligence collection, R&D on information security, and the joint management of network attack and defense training systems. 4PLA's offensive mission is the key differentiator between 3PLA and 4PLA. The INEW doctrine consolidates this offensive mission under 4PLA, while 3PLA is left responsible for intelligence gathering and network defense. The personnel at 3PLA are also a key differentiator, since there is no indication that 4PLA has the analysis capabilities that 3PLA possesses, suggesting that 3PLA may analyze and exploit the cyber information that 4PLA gathers in their offensive missions. One interesting point is the importance of understanding adversary's “red lines” when conducting offensive IW actions to avoid unintended escalation, including assessments on how dependent opponents are on a single network node or a specific network. 3PLA or another PLA intelligence organization may provide these assessments and inform 4PLA operations.
252:
one of the highest operational priorities in a conflict, a strategic goal that is supported by the INEW doctrine. Additionally, the PLA plans to use IW to achieve information dominance as quickly as possible, as opposed to using IW operations as a force multiplier during subsequent phases of a conflict. Although Chinese IW doctrine does not suggest the PLA will use IW as a force multiplier, it does suggest that IW operations will be conducted throughout conflicts and not only in the opening phase, likely to retain information dominance. Additionally, the PLA may use IW in a pre-emptive strike, especially against the U.S., since the Chinese military is inferior in terms of strength. The PLA may execute this pre-emptive strike so that it does not lose the initiative, which may be difficult or impossible to regain if the stronger military force, the U.S., gains the initiative in a conflict. The PLA also sees IW campaigns as operations that do not require conventional military action, possibly indicating that a pre-emptive strike may not result in a kinetic conflict unless it crosses an adversary's red line. This strike may instead be a deterrence mechanism.
171:
jamming and communication disruption capabilities. By 2006, at least thirty-three more IW Militia units were established across China, similarly recruiting from universities, research institutions, and the private sector. A March 2008 PLA announcement indicated that a new IW Militia unit was established in Yongning that had computer network warfare, data processing and collection, network warfare research and training, and network defense responsibilities, displaying an overlap with 4PLA's mission. The Yongning unit's website indicates that it is tasked to “attack the enemy's wartime networks." Similar to TRBs, there is little public information regarding the command structures for these IW militias or the role that 4PLA plays in their structure. One article on the Guangzhou Garrison IW militia mentions input on training documents from an unspecified “electronic countermeasures regiment,” that Deepak Sharma, author of “Integrated Network Electronic Warfare,” suspects may refer to the 4PLA. This connection could indicate that 4PLA may interact to an unknown degree with IW Militias.
219:
Israel-based companies. MEI called this program "Project 63". While these joint ventures and other programs like them form a relationship between 4PLA and the private sector, the main relationship appears to be in terms of personnel. The PLA has incorporated people from the commercial industry, academia, and possible some hacker communities to meet personnel requirements for IW. Although not explicitly stated, 4PLA's relation to IW likely indicates that it benefits from these personnel acquisition programs. Additionally, 4PLA appears to have an R&D relationship with the China Electronic Technology Corporation, but the exact nature of this relationship is not publicly available. Other available texts indicate that the PLA and PLA intelligence organizations have “become involved in the corporate sector" and the "Chinese private sector will continue to play a crucial role in securing cyberspace," possibly indicating that 4PLA has more relationships with the private sector that are not publicized.
109:
resources to deny us the use of our electronic systems." Multiple authors call INEW “REC on steroids.” This is because INEW adds additional dimensions to REC, specifically INEW moves beyond the tactical and theater realms of operations where REC was applied by elevating the INEW doctrine to a strategic level of war. Additionally, INEW adds cyber attacks and kinetic attacks on satellites to the REC doctrine. INEW also implements U.S. IW strategy from the AirLand Battle doctrine, the U.S. response to REC that integrated airpower, special operations forces, artillery, armor, and EW. Additionally, INEW implements lessons learned from U.S. information operations in Kosovo, the Balkans, and Iraq. Lessons learned from these U.S. military engagements may have influenced China's decision to apply IW doctrine at the strategic war level.
113:
offensive and defensive IW under a single authority, specifically 4PLA. One of the most important aspects of INEW is that it integrates IW into larger PLA operations, calling for kinetic attacks that make use of opportunities created by IW operations, as Dai discussed above. For example, INEW doctrine combines precision strikes and IW operations, likely targeting command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) targets in line with INEW doctrine. INEW applies a variety of methods, to include the disruption and destruction of systems, creation of false realities through falsified information, electronic jamming, deception, and suppression, computer network attacks, computer intrusions to sabotage information processing, and impeding information transmissions.
60:
conclusion led to a three-phased approach to upgrading and advancing China's C2 infrastructure. The third phase of this modernization effort, the development of electronic countermeasures for C2 infrastructure, continues today and is the responsibility of 4PLA. The exact year that 4PLA was founded is not agreed upon by publicly available sources. One website indicates that 4PLA was established in 1982 for EW and counter-EW. Another website on Major General Yao Hong Zhang may indicate that 4PLA existed or was being created in 1989 when he was transferred there. Multiple sources, however, indicate that 4PLA was established in 1990 as an EW entity. A 1990 establishment falls in line with the international conflicts and activities that shaped PLA IW doctrine, specifically the
192:, notes that 4PLA worked with the Louyang Institute of Tracking, Telemetry, and Telecommunication to develop a space tracking system. The same book indicates that 4PLA has some responsibilities related to unmanned aerial vehicles and worked with the Peking University's Unmanned Flight Vehicle Design Institute and Institute of Unmanned Aircraft. It is important to notice, however, the absence of this 4PLA responsibility in other available sources. The Ministry of Electronic Industry (MEI) has at least two research institutions that maintain a relationship with 4PLA: the MEI's 17th Research Institute in Nanjing that researches phased-array radar and the MEI's 36th Research Institute in Anhui, which is also called the East China Research Institute of Electronic Engineering. 147:
network warfare, information system defense, information security and secrecy, weapons and equipment support, and comprehensive support. One of the centers that Mulvenon mentions in detail is the Information Countermeasures Center, which he suggests 4PLA would have some involvement in. This center is composed of members from relevant services, likely including 4PLA. The center is responsible for providing advice, planning, and coordinating IW and countermeasure operations. Mulvenon states that personnel from 4PLA would be “trigger pullers” at the national and warzone levels of conflicts in this command structure. This command structure would only be applied during wartime, however, and information on the command structure during peacetime is not publicly available.
248:
information systems, and can deter U.S. response and/or degrade U.S. deployments. Using IW, China can also strike at the U.S. homeland, which is beyond the range of most conventional weapons. To carry out IW operations, however, the PLA and 4PLA will need to prepare the battlespace ahead of time, likely during times of peace. Cyber reconnaissance missions by 4PLA or 3PLA during peacetime can identify information system nodes and critical infrastructure to target during conflict. One PLA publication, Information Confrontation Theory, suggests that IW forces, like 4PLA, could plant malicious software in enemy systems or other information systems that would remain dormant until employed. These operations would allow the PLA to prepare for future IW operations.
143:
GSD, including the Second Department (2PLA) in charge of collecting military intelligence, 3PLA, and 4PLA, compose China's only all source intelligence organization. The exact organization of 4PLA is not publicly known. Although, some components of its organization include operational electronic countermeasure units, some of which are integrated within military region organizations. Additionally, 4PLA oversees or has relationships with multiple R&D institutions that focus on offensive IW technologies and related research. In terms of 4PLA leadership, Dai is the most well known and frequently mentioned leader of 4PLA. 4PLA directors and political commissars, like other GSD department heads, are likely equivalent in rank to a Group Army Commander.
264:
IW forces like 4PLA, the PLA could delay resupply by misdirecting supply vehicles, corrupt or delete inventory files, or otherwise hindering the opponent's logistics capabilities. NIPRNET would likely be a high priority target for PLA IW operations. NIPRNET contains and transmits critical deployment information, including time-phased force deployment lists (TPFDLs). It is vital to logistical, personnel, and unit movements, and some writers believe that Chinese forces have already penetrated and mapped out this network, likely supporting future exploitation of NIPRNET, possibly during conflict. By targeting NIPRNET, the PLA could degrade and/or slow down U.S. deployment long enough to achieve campaign objectives before the U.S. can respond.
134:, writes that 4PLA identified three tasks for improving the PLA's C2 infrastructure's ability to conduct EW, indicating that 4PLA may be responsible for assessing China's EW capabilities as well as the execution of EW. In addition to its operational responsibilities, 4PLA also conducts research and development (R&D) on technology related to EW and IW. These programs will be discussed more below. Subsequently, these responsibilities support 4PLA's ultimate goals of information superiority, the disruption of information control capabilities, the maintenance of China's information systems and capabilities, and the weakening of the enemy's ability to acquire, transmit, process, and use information during conflicts. 126:
although it is unclear whether or not 4PLA is also in charge of ELINT analysis, since what happens to information once 4PLA collects it is relatively unknown. ELINT collection responsibilities include space-based photoreconnaissance, ELINT operations in conjunction with the PLA, PLA Air Force (PLAAF), and PLA Navy (PLAN), some military intelligence and counterintelligence efforts, and the collection and cataloguing of exploits and weaknesses in enemies' military infrastructure. 4PLA is also in charge of electronic countermeasures, including developing radar and electronic countermeasure capabilities, electronic counter-countermeasures, and jamming and counter-jamming capabilities.
68:
transformation.” The effect of modern IW on operations and international strategy was clear to the PLA, and it began to establish organizations, strategies, and doctrine to address this new type of warfare. The PLA understood as early as 1991 that future conflicts would heavily involve technology and electronics. The establishment of 4PLA and its growth supported the development of the PLA's IW capabilities. In 1993, the PLA made revisions to the Central Military Commission's Military Strategic Guidelines, stating that the PLA should prepare to "fight local wars under informationized conditions," and as early as 1996, major joint exercises included EW units.
268:
conducted on all domains at the same time, including ground, air, sea, space, and electromagnetic. Identified civilian targets include IW operations against civilian communications systems, power grids, production lines, water utilities, chemical plants, telecommunications, and transportation entities that could directly affect both civilians and military personnel. Successful IW operations targeting these entities would bring a conflict to the American homeland, which could impact U.S. support of a conflict and the willingness of the American people to support a war or get involved in a conflict.
72:
since its inception, but it is unknown when 4PLA took on its IW responsibilities. 4PLA has overseen the PLA's IW operations since at least 1999, when Major General Dai Qingmin produced a major work outlining an IW doctrine that he called Integrated Network Electronic Warfare (INEW). His publication was reviewed by 4PLA, indicating that 4PLA was in charge of IW oversight at this time. In 2000, Dai was promoted to the head of 4PLA, likely demonstrating the GSD's endorsement of the INEW strategy and consolidating the IW mission in 4PLA. Bryan Krekel, in his book
239:
electronic countermeasures brigade, are headquartered in Langfang in the Hebei Province, with subordinate battalion-level entities in Anhui, Jiangxi, Shandong and “other locations in China.” The white paper also identifies at least two 4PLA units on Hainan Island. One of these units appears to be responsible for jamming U.S. satellite assets. Another regimental-level unit on the island may also have satellite jamming responsibilities, but it is unclear if these responsibilities are operational or experimental.
212:
and military defense. The Information Engineering University trains personnel in technical fields, including information systems, information security, and IW.</ref> Wuhan Communications Command Academy (CCA) is a senior professional military education institute that educates personnel in communications and electronics. Based on the establishment of the PLA's first IW simulation experiment center at CCA in 1998, this institute appears closely aligned with the IW mission.
178:
and maintaining a close relationship with China Electronic Technology Corporation (CETC) entities. In a report by James Mulvenon and Thomas Bickford, the authors indicate that 4PLA may operate the China Electronic Systems Engineering Company. They described the company as "key to PLA telecommunications, with interests ranging from mobile communications to encryption, microwaves, computer applications, and dedicated military C4I systems."
260:, indicates that C2 networks and logistics systems would be among the first entities targeted by INEW forces, which likely means 4PLA.</ref> One PLA strategy is referred to by Northrop Grumman as “strike the enemy's nodes to destroy his network.” This strategy directs the PLA to target the adversary's C4ISR and logistics networks and then exploit the resulting “blindness” with traditional kinetic force. 130:
command bunkers in the Western Hills of Beijing are a strategic target that they defend, but 3PLA is also identified as the entity in charge of computer network defense. It is possible that these sources are incorrect, this information is not publicly known, 3PLA and 4PLA share these responsibilities, or that there are different aspects of defense that are divided between 3PLA and 4PLA. You Ji, in his book
117:
dominance during campaigns. IW operations also aim to achieve information dominance that would result in denying the opponent access to information that is vital to continuing the conflict. This dominance should be maintained throughout conflicts. INEW continues to be the dominant doctrinal core of PLA IW operations today, with 4PLA likely in the authoritative position to implement this strategy.
282:
writings on Chinese IW operations indicate that the goals of some IW operations may be deterrence. One report by Northrop Grumman indicates that IW deterrence, specifically through cyber network attack, a 4PLA responsibility, is a deterrence mechanism second only to nuclear deterrence. Similar to pre-emptive strikes, these IW operations may lack subsequent kinetic actions.
256:
conflict in the Pacific and targets that can degrade U.S. capabilities. C4ISR infrastructure and logistics networks are seen by the PLA as U.S. strategic centers of gravity. C4ISR targets include "the enemy's information detection sources, information channels, and information-processing and decision making systems." A 2007 book published by the PLA,
92:
Introduction to Information Warfare. Soon after the release of this publication, Dai was promoted to the head of 4PLA. Subsequent articles included An Introduction to Integrated Network Electronic Warfare, which Dai published in 2002. The GSD's decision to promote Dai is largely believed to be an endorsement of the INEW strategy.
76:, writes that 4PLA had to fight for this authority, citing a February 2002 issue of China Military Science where the heads of the Third Department of the GSD (3PLA) and 4PLA each made their cases for operational control of IW. Dai's INEW strategy won the debate, and subsequently, IW responsibilities were consolidated in 4PLA. 96:
structure, and blinding and deafening the enemy through IW measures. For Dai, the integration of military and civilian IW fighting forces and integration of soft, hard, offensive, and defensive forces are crucial. An important aspect of Dai's doctrine is the combination of both IW and kinetic strikes:
177:
4PLA directly oversees the 54th Research Institute in Hebei. This institute conducts research and provides engineering support to 4PLA. Activities at this institute include developing digital ELINT signal processors to analyze parameters of radar pulses, forming joint ventures with private companies,
170:
Reports of IW militias began as early as 1998 with press reports on an experimental IW militia in Datong City. This report said that a state-owned Chinese enterprise recruited forty personnel from universities, scientific research institutions, and other facilities for the purpose of developing radar
163:
The PLA has at least six TRBs located in the Lanzhou, Jinan, Chengdu, Guangzhou, and Beijing military regions. These TRBs have some signal intelligence (SIGINT) and CNO responsibilities, but their exact responsibilities and command structure are not public. It is possible that, due to the overlapping
129:
On a strategic level, 4PLA coordinates the PLA's EW and IW doctrine and strategy, including implementing INEW. There is debate as to what 4PLA's defensive responsibilities are. Multiple writings on the PLA indicate that 4PLA is responsible for the defense of strategic targets, indicating that the PLA
271:
In terms of the goals of IW operations, China's IW doctrine focuses on disruption and paralysis, not destruction, meaning that the PLA may manipulate and collect data or shut down networks, but they are unlikely to destroy this data or destroy target systems in IW operations, unless these operations
116:
The goal of INEW is to weaken and/or paralyze an opponent's decision-making capabilities and the political, economic, and military components of the enemy's war infrastructure. To do this, INEW doctrine calls for IW operations to seize control of opponent's information flows and maintain information
281:
Additional IW goals include raising the cost of a conflict to an unacceptable level, preventing or disrupting the acquisition, processing, or transmission of information in support of decision making or combat operations, and providing opportunities that can be exploited using kinetic strikes. Some
263:
Logistics targets for IW operations include U.S. NAVSTAR GPS, airborne early warning platforms, satellites, and American military networks, such as the Joint Tactical Information Distribution System and the Non-secure Internet Protocol Router Network (NIPRNET). By targeting logistics networks using
211:
Additional training may take place at the PLA's Science and Engineering University, Information Engineering University, and Wuhan Communications Command Academy. The Science and Engineering University provides advanced IW and network training. It also conducts research in scientific, technological,
112:
INEW integrates the use of “EW, CNO, and limited kinetic strikes against key command, control, communication, and computer nodes to disrupt the enemy's battlefield network information systems.” CNO include computer network attack, defense, and exploitation. Aligning with Dai's ideology, INEW unites
108:
While Dai is the major author of INEW doctrine, the strategy stems from both U.S. and Soviet IW doctrine. During the Cold War, the Soviet Union had a doctrine called Radio-Electronic Combat (REC), which the U.S. Army describes as "the total integration of electronic warfare and physical destruction
251:
Available Chinese IW doctrine strongly indicates that IW operations will be executed at the opening phase of conflicts. Some publications go so far as to say that IW cannot be effective unless carried out in the first phase of a conflict and identify early establishment of information dominance as
71:
The PLA spent the years following the Gulf War studying military publications on IW from around the world, which eventually resulted in the PLA's own IW doctrine that it tasked the 4PLA to implement. 4PLA is believed to have been in direct control of traditional jamming and offensive EW operations
198:
An important relationship exists between 4PLA and the 29th Research Institute in Chengdu, which is also called SWIEE. Together SWIEE and the 54th Research Institute undertake a large portion of 4PLA's research needs. Engineers at SWIEE have conducted studies on jamming synthetic aperture radar on
142:
4PLA is organized under the GSD, a military component of the Central Military Commission (CMC) that oversees the GSD's operations. The GSD organizes and directs PLA military units across China, including planning, training, and organizing armed forces. The military intelligence services under the
238:
There is little available information on 4PLA's size and location, but a Project 2049 white paper provides some insight. The white paper indicates that 4PLA has at least four bureaus, one brigade, and two regiments. Additionally, the white paper explains that operational 4PLA units, including an
125:
4PLA has a range of responsibilities within the IW realm. 4PLA is the main entity that conducts EW, including offensive EW, the destruction of enemy information systems, and computer network attacks and penetrations. 4PLA is also responsible for the collection of electronic intelligence (ELINT),
91:
Major General Dai Qingmin was the head of 4PLA for approximately five years starting in 2000. Prior to joining 4PLA leadership, Dai was the head of the PLA Electronic Engineering Academy, 4PLA's primary training institution. His rise to the head of 4PLA is attributed to his seminal work on INEW,
59:
in 1969, the Chinese military experienced repeated disruptions of their communication networks, impeding command and control (C2) of their combat units. This experience resulted in the conclusion that China's C2 infrastructure could not survive a conflict with a technically advanced enemy. This
267:
It is probable that IW operations against military targets will occur in parallel with kinetic operations against military targets, such as warships, aircraft, and supply craft that would exploit the temporary blindness and/or confusion caused by IW operations. Simultaneous operations could be
255:
Writings on China's IW strategy identify a range of both military and civilian targets for IW operations. Military targets include C4ISR, logistics, and direct military targets, or any targets that can prevent the opponent, and specifically the U.S. military, from operating or intervening in a
146:
In his book, James Mulvenon mentions the Joint Campaign Command Headquarters, which may take wartime responsibilities from 4PLA and may be organized into multiple “centers” that would direct and coordinate IW operations. These centers include comprehensive planning, electronic countermeasures,
228:
4PLA and 3PLA are related due to their similar missions and overlapping responsibilities. 3PLA is a SIGINT organization that is in charge of the PLA's computer network defense and espionage missions. It oversees an extensive network of SIGINT stations throughout China that collect and process
218:
The 4PLA has relationships with private companies, including joint ventures through its research institutes, help with personnel, and some unclear relationships. In an effort to improve PLA technology, MEI setup several joint ventures between SWIEE, MEI's 36th Research Institute, and multiple
247:
4PLA is in charge of offensive IW, which China is interested in developing and using for a variety of reasons. IW is inexpensive, is currently available to the PLA, does not require an invasion or use of other kinetic assets, has a reasonable level of deniability, exploits U.S. dependency on
95:
In terms of his ideology, Dai sees CNO and EW as principle forms of IW with information superiority as the ultimate goal. Dai indicates that specific IW operations include jamming or sabotaging an enemy's information or information systems, sabotaging an enemy's overall information operation
155:
4PLA appears to have a variety of relationships with other Chinese entities, including other military units, research institutes, and the private sector. 4PLA has counterparts in the military theater commands, the PLAGF, PLAN, PLAAF, and PLARF, all of which have at least one electronic
67:
The PLA's observations of U.S. information operations in the Balkans and in the first Gulf War resulted in contemplation and reflection regarding China's doctrine and adaptation to IW, which the PLA saw as a "new battlespace". The PLA referred specifically to the Gulf War as “the great
199:
reconnaissance satellites. SWIEE is also in charge of radar jamming station development. It is believed to be in charge of more than 25 ELINT receivers. Although SWIEE is responsible for these receivers, it is unclear who mans them and how the information is passed to 4PLA.
80: 44: 276:
We must as far as possible seal up the enemies' eyes and ears, and make them become blind and deaf, and we must as far as possible confuse the minds of their commanders and turn them into madmen, using this to achieve our own
100:
After the information attack succeeds in suppressing the enemy, the enemy's plight of temporary ‘blindness, deafness, and even paralysis' can be exploited for quick organization of an ‘information/firepower'
1740: 1687: 1193: 1674: 223: 1005: 79:
In 2016, as part of military reforms in the PLA, the General Staff Department was abolished. The Fourth Department's functions were likely transferred to the
491: 205:
4PLA training primarily occurs at the PLA's Electronic Engineering Academy in Hefei, which is the PLA's primary academic and training center for EW.
1810:
Mulvenon, James; Bickford, Thomas (1999). "The PLA and the Telecommunications Industry in China". In Mulvenon, James; Yang, Richard H. (eds.).
1936: 1825: 1748: 1716: 1695: 1663: 1642: 1620: 1593: 1563: 1778: 1992: 105:
Dai's vision is destructive and disruptive in nature, calling for the destruction and control of the enemy's information infrastructure.
272:
are in conjunction with conventional military operations. Mulvenon provides this quote that outlines the goals of PLA IW operations:
1811: 1802: 1585: 1928: 1897: 1769: 1015: 32: 1906: 1299: 1972: 1676:
Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage
1301:
Investigating the Chinese Threat: Military and Economic Aggression (2012) (testimony of Dr. Larry M. Wortzel)
1914: 1886: 1851: 1787: 1842:
Fritz, Jason (October 2008). "How China Will Use Cyber Warfare to Leapfrog in Military Competitiveness".
1729:
Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
1973:
Annual Report to Congress: Military and Security Developments Involving the People's Republic of China
518: 496: 56: 43:(IW) missions, to include offensive cyber operations. In 2016, its functions were transferred to the 1856: 40: 1780:
The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
1727: 36: 313: 1821: 1759: 1744: 1712: 1691: 1659: 1638: 1616: 1589: 1559: 27:) of the Chinese People's Liberation Army General Staff Department (GSD) is also known as the 1817: 1736: 1683: 1195:
Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization
1612: 1573: 1929:"Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies' Cyber Capabilities" 492:"The PLA's New Organizational Structure: What is Known, Unknown and Speculation (Part 1)" 1949: 1604: 1578: 185: 1986: 1945: 1760:"PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability" 1630: 1867:"Integrated Network Electronic Warfare: China's New Concept of Information Warfare" 1866: 523: 1796: 1763: 1706: 1653: 1555: 1010: 87:
Major General Dai Qingmin and Integrated Network Electronic Warfare (INEW)
156:
countermeasures regiment that 4PLA oversees and/or staffs. Additionally,
61: 490:
Allen, Kenneth; Blasko, Dennis J.; Corbett, John F. (February 4, 2016).
1907:"The Analytic Challenge of Understanding Chinese Intelligence Services" 184:
4PLA maintains relationships with several other research institutes.
1708:
China's Strategic Modernization: Implications for the United States
1331:
Investigating the Chinese Threat: Military and Economic Aggression
164:
aspects of their duties, 4PLA has some interactions with the TRBs.
886: 884: 882: 1637:. Carlisle Barracks, PA: United States Army War College Press. 396: 394: 1673:
Krekel, Bryan; Adams, Patton; Bakos, George (March 8, 2012).
81:
Network Systems Department of the PLA Strategic Support Force
45:
Network Systems Department of the PLA Strategic Support Force
1201:. Center for Strategic and International Studies. p. 8. 1741:
United States-China Economic and Security Review Commission
1688:
United States-China Economic and Security Review Commission
1655:
China's Security State: Philosophy, Evolution, and Politics
620: 618: 1777:
Stokes, Mark A.; Lin, Jenny; Hsiao, L. C. Russell (2011).
1762:. In Kamphausen, Roy; Lai, David; Scobell, Andrew (eds.). 1489: 1487: 1037: 1035: 1033: 736: 734: 324: 322: 1635:
Chinese People's Liberation Army and Information Warfare
753: 751: 749: 709: 707: 705: 1414: 1412: 1222: 1220: 1100: 1098: 949: 947: 869: 867: 545: 543: 541: 449: 447: 445: 381: 379: 377: 375: 373: 1127: 1125: 1006:"PLA Building Fleet of 100 Large Transport Aircraft" 770: 768: 766: 196:
Southwest Institute of Electronic Equipment (SWIEE):
1813:
The People's Liberation Army in the Information Age
1577: 1765:Beyond the Strait: PLA Missions Other Than Taiwan 1000: 998: 1379: 1367: 1286: 1065: 890: 400: 224:Third Department of the General Staff Department 274: 98: 29:Electronic Countermeasures and Radar Department 1238: 1167: 938: 1609:Historical Dictionary of Chinese Intelligence 8: 1971:Office of the Secretary of Defense (2013). 190:Historical Dictionary: Chinese Intelligence 151:4PLA relationships with other organizations 1855: 1658:. Cambridge: Cambridge University Press. 1155: 1077: 1041: 965: 798: 328: 309: 1517: 1493: 1430: 1403: 1317: 1250: 1116: 740: 648: 561: 465: 436: 161:Technical reconnaissance bureaus (TRBs): 1442: 1355: 1274: 1179: 953: 873: 757: 713: 624: 609: 597: 424: 352: 290: 1529: 1505: 1466: 1418: 1391: 1343: 1262: 1226: 1211: 1192:Lewis, James; Timlin, Katrina (2011). 1143: 1131: 1104: 1089: 1053: 989: 977: 926: 914: 846: 834: 822: 786: 725: 696: 684: 672: 660: 636: 585: 573: 549: 477: 453: 412: 385: 340: 1937:Australian Strategic Policy Institute 1478: 902: 810: 74:Occupying the Information High Ground 7: 1950:"Assessing the Chinese Cyber Threat" 1454: 774: 858: 364: 297: 31:. It was charged with the Chinese 14: 175:54th Research Institute in Hebei: 1978:(Report). Department of Defense. 1905:Mattis, Peter (September 2012). 258:Informationized Joint Operations 1803:Foreign Military Studies Office 1711:. Strategic Studies Institute. 203:Electronic Engineering Academy: 1586:University of California Press 1380:Krekel, Adams & Bakos 2012 1368:Krekel, Adams & Bakos 2012 1287:Krekel, Adams & Bakos 2012 891:Krekel, Adams & Bakos 2012 401:Krekel, Adams & Bakos 2012 1: 1885:Prakash, Rahul (March 2013). 1865:Sharma, Deepak (April 2010). 168:Information warfare militias: 1927:Feakin, Tobias (June 2013). 1898:Observer Research Foundation 1580:Modernizing China's Military 1307:. March 18, 2012. p. 5. 1239:Stokes, Lin & Hsiao 2011 1168:Stokes, Lin & Hsiao 2011 1066:Mulvenon & Bickford 1999 939:Stokes, Lin & Hsiao 2011 1798:Decoding the Virtual Dragon 1795:Thomas, Timothy L. (2007). 1770:Strategic Studies Institute 519:"Decoding Chinese Politics" 216:4PLA and private companies: 2009: 1874:Journal of Defense Studies 209:Other training facilities: 182:Other research institutes: 1552:The Armed Forces of China 132:The Armed Forces of China 1993:People's Liberation Army 1801:. Fort Leavenworth, KS: 1758:Mulvenon, James (2009). 188:and I. C. Smith's book, 33:People's Liberation Army 1915:Studies in Intelligence 1887:"China and Cyberspace" 1788:Project 2049 Institute 1726:Krekel, Bryan (2009). 279: 103: 1705:Stokes, Mark (1999). 1156:Smith & West 2012 1078:Smith & West 2012 1042:Smith & West 2012 966:Smith & West 2012 799:Smith & West 2012 329:Smith & West 2012 16:Chinese military unit 1820:. pp. 245=257. 1652:Xuezhi, Guo (2012). 1253:, pp. 259, 272. 497:Jamestown Foundation 57:Sino-Soviet conflict 1772:. pp. 253–285. 1018:on December 4, 2014 588:, pp. 111–112. 564:, pp. 272–273. 41:information warfare 1816:. Washington, DC: 1092:, pp. 34, 53. 825:, pp. 34, 52. 37:electronic warfare 1827:978-0-8330-2716-0 1750:978-1-4379-4285-9 1718:978-1-4289-1197-0 1697:978-1-4751-2722-5 1665:978-1-139-53681-3 1644:978-1-58487-608-3 1622:978-0-8108-7174-8 1603:Smith, Ivian C.; 1595:978-0-520-22507-7 1565:978-1-86064-487-0 1289:, pp. 25–26. 980:, pp. 39–40. 801:, pp. 95–96. 728:, pp. 6, 13. 639:, pp. 36–37. 627:, pp. 11–14. 300:, pp. 70–77. 21:Fourth Department 2000: 1979: 1977: 1960: 1954: 1941: 1933: 1923: 1911: 1901: 1891: 1881: 1871: 1861: 1859: 1831: 1818:RAND Corporation 1806: 1791: 1785: 1773: 1754: 1737:Northrop Grumman 1734: 1722: 1701: 1684:Northrop Grumman 1681: 1669: 1648: 1626: 1599: 1583: 1574:Shambaugh, David 1569: 1550:Ji, You (1999). 1533: 1527: 1521: 1515: 1509: 1503: 1497: 1491: 1482: 1476: 1470: 1464: 1458: 1452: 1446: 1440: 1434: 1428: 1422: 1416: 1407: 1401: 1395: 1389: 1383: 1377: 1371: 1365: 1359: 1353: 1347: 1341: 1335: 1334: 1327: 1321: 1315: 1309: 1308: 1306: 1296: 1290: 1284: 1278: 1272: 1266: 1260: 1254: 1248: 1242: 1236: 1230: 1224: 1215: 1209: 1203: 1202: 1200: 1189: 1183: 1177: 1171: 1165: 1159: 1153: 1147: 1141: 1135: 1129: 1120: 1114: 1108: 1102: 1093: 1087: 1081: 1080:, pp. 97–8. 1075: 1069: 1063: 1057: 1051: 1045: 1039: 1028: 1027: 1025: 1023: 1014:. Archived from 1002: 993: 987: 981: 975: 969: 963: 957: 951: 942: 936: 930: 924: 918: 912: 906: 900: 894: 888: 877: 871: 862: 856: 850: 844: 838: 832: 826: 820: 814: 808: 802: 796: 790: 784: 778: 772: 761: 755: 744: 738: 729: 723: 717: 711: 700: 694: 688: 682: 676: 670: 664: 658: 652: 646: 640: 634: 628: 622: 613: 607: 601: 595: 589: 583: 577: 571: 565: 559: 553: 547: 536: 535: 533: 531: 515: 509: 508: 506: 504: 487: 481: 475: 469: 463: 457: 451: 440: 434: 428: 422: 416: 410: 404: 398: 389: 383: 368: 362: 356: 350: 344: 338: 332: 326: 317: 307: 301: 295: 121:Responsibilities 2008: 2007: 2003: 2002: 2001: 1999: 1998: 1997: 1983: 1982: 1975: 1970: 1967: 1957:Defense Dossier 1952: 1948:(August 2012). 1944: 1931: 1926: 1909: 1904: 1894:ORF Issue Brief 1889: 1884: 1869: 1864: 1857:10.1.1.352.3753 1844:Culture Mandala 1841: 1838: 1828: 1809: 1794: 1783: 1776: 1757: 1751: 1732: 1725: 1719: 1704: 1698: 1679: 1672: 1666: 1651: 1645: 1629: 1623: 1613:Scarecrow Press 1602: 1596: 1572: 1566: 1549: 1546: 1541: 1536: 1528: 1524: 1516: 1512: 1504: 1500: 1492: 1485: 1477: 1473: 1465: 1461: 1453: 1449: 1441: 1437: 1429: 1425: 1417: 1410: 1402: 1398: 1390: 1386: 1378: 1374: 1366: 1362: 1354: 1350: 1342: 1338: 1329: 1328: 1324: 1316: 1312: 1304: 1298: 1297: 1293: 1285: 1281: 1273: 1269: 1261: 1257: 1249: 1245: 1237: 1233: 1225: 1218: 1210: 1206: 1198: 1191: 1190: 1186: 1178: 1174: 1166: 1162: 1154: 1150: 1142: 1138: 1130: 1123: 1115: 1111: 1103: 1096: 1088: 1084: 1076: 1072: 1064: 1060: 1052: 1048: 1040: 1031: 1021: 1019: 1004: 1003: 996: 988: 984: 976: 972: 964: 960: 952: 945: 937: 933: 925: 921: 913: 909: 901: 897: 889: 880: 872: 865: 857: 853: 845: 841: 833: 829: 821: 817: 809: 805: 797: 793: 785: 781: 773: 764: 756: 747: 739: 732: 724: 720: 712: 703: 695: 691: 683: 679: 671: 667: 659: 655: 647: 643: 635: 631: 623: 616: 608: 604: 596: 592: 584: 580: 572: 568: 560: 556: 548: 539: 529: 527: 517: 516: 512: 502: 500: 489: 488: 484: 476: 472: 464: 460: 452: 443: 435: 431: 423: 419: 411: 407: 399: 392: 384: 371: 363: 359: 351: 347: 339: 335: 327: 320: 308: 304: 296: 292: 288: 245: 236: 234:Order of battle 153: 140: 123: 89: 53: 17: 12: 11: 5: 2006: 2004: 1996: 1995: 1985: 1984: 1981: 1980: 1966: 1963: 1962: 1961: 1946:Wortzel, Larry 1942: 1924: 1902: 1882: 1862: 1837: 1834: 1833: 1832: 1826: 1807: 1792: 1774: 1755: 1749: 1735:. McLean, VA: 1723: 1717: 1702: 1696: 1670: 1664: 1649: 1643: 1631:Wortzel, Larry 1627: 1621: 1600: 1594: 1570: 1564: 1545: 1542: 1540: 1537: 1535: 1534: 1522: 1520:, p. 257. 1510: 1498: 1496:, p. 258. 1483: 1471: 1459: 1447: 1435: 1433:, p. 270. 1423: 1408: 1406:, p. 271. 1396: 1384: 1372: 1360: 1348: 1346:, p. 129. 1336: 1322: 1320:, p. 259. 1310: 1291: 1279: 1267: 1255: 1243: 1231: 1216: 1204: 1184: 1172: 1160: 1158:, p. 263. 1148: 1136: 1121: 1119:, p. 276. 1109: 1094: 1082: 1070: 1058: 1046: 1029: 994: 982: 970: 958: 943: 931: 919: 907: 895: 878: 863: 851: 839: 827: 815: 803: 791: 779: 762: 745: 743:, p. 274. 730: 718: 701: 689: 677: 665: 653: 651:, p. 261. 641: 629: 614: 602: 590: 578: 566: 554: 537: 510: 482: 470: 468:, p. 273. 458: 441: 439:, p. 272. 429: 417: 405: 390: 388:, p. 371. 369: 357: 345: 333: 318: 310:Shambaugh 2002 302: 289: 287: 284: 244: 241: 235: 232: 231: 230: 220: 213: 206: 200: 193: 179: 172: 165: 152: 149: 139: 136: 122: 119: 88: 85: 62:first Gulf War 52: 49: 15: 13: 10: 9: 6: 4: 3: 2: 2005: 1994: 1991: 1990: 1988: 1974: 1969: 1968: 1964: 1958: 1951: 1947: 1943: 1939: 1938: 1930: 1925: 1921: 1917: 1916: 1908: 1903: 1899: 1895: 1888: 1883: 1879: 1875: 1868: 1863: 1858: 1853: 1849: 1845: 1840: 1839: 1835: 1829: 1823: 1819: 1815: 1814: 1808: 1804: 1800: 1799: 1793: 1789: 1782: 1781: 1775: 1771: 1767: 1766: 1761: 1756: 1752: 1746: 1742: 1738: 1731: 1730: 1724: 1720: 1714: 1710: 1709: 1703: 1699: 1693: 1689: 1685: 1678: 1677: 1671: 1667: 1661: 1657: 1656: 1650: 1646: 1640: 1636: 1632: 1628: 1624: 1618: 1614: 1610: 1606: 1601: 1597: 1591: 1587: 1582: 1581: 1575: 1571: 1567: 1561: 1557: 1553: 1548: 1547: 1543: 1538: 1532:, p. 20. 1531: 1526: 1523: 1519: 1518:Mulvenon 2009 1514: 1511: 1508:, p. 12. 1507: 1502: 1499: 1495: 1494:Mulvenon 2009 1490: 1488: 1484: 1481:, p. 65. 1480: 1475: 1472: 1469:, p. 10. 1468: 1463: 1460: 1457:, p. 24. 1456: 1451: 1448: 1445:, p. 28. 1444: 1439: 1436: 1432: 1431:Mulvenon 2009 1427: 1424: 1421:, p. 24. 1420: 1415: 1413: 1409: 1405: 1404:Mulvenon 2009 1400: 1397: 1394:, p. 23. 1393: 1388: 1385: 1382:, p. 31. 1381: 1376: 1373: 1369: 1364: 1361: 1357: 1352: 1349: 1345: 1340: 1337: 1332: 1326: 1323: 1319: 1318:Mulvenon 2009 1314: 1311: 1303: 1302: 1295: 1292: 1288: 1283: 1280: 1276: 1271: 1268: 1265:, p. 31. 1264: 1259: 1256: 1252: 1251:Mulvenon 2009 1247: 1244: 1241:, p. 15. 1240: 1235: 1232: 1229:, p. 21. 1228: 1223: 1221: 1217: 1213: 1208: 1205: 1197: 1196: 1188: 1185: 1182:, p. 22. 1181: 1176: 1173: 1169: 1164: 1161: 1157: 1152: 1149: 1145: 1140: 1137: 1133: 1128: 1126: 1122: 1118: 1117:Mulvenon 2009 1113: 1110: 1107:, p. 37. 1106: 1101: 1099: 1095: 1091: 1086: 1083: 1079: 1074: 1071: 1067: 1062: 1059: 1056:, p. 34. 1055: 1050: 1047: 1044:, p. 96. 1043: 1038: 1036: 1034: 1030: 1017: 1013: 1012: 1007: 1001: 999: 995: 991: 986: 983: 979: 974: 971: 967: 962: 959: 955: 950: 948: 944: 940: 935: 932: 929:, p. 38. 928: 923: 920: 917:, p. 48. 916: 911: 908: 905:, p. 36. 904: 899: 896: 893:, p. 47. 892: 887: 885: 883: 879: 875: 870: 868: 864: 861:, p. 77. 860: 855: 852: 849:, p. 52. 848: 843: 840: 837:, p. 22. 836: 831: 828: 824: 819: 816: 813:, p. 68. 812: 807: 804: 800: 795: 792: 788: 783: 780: 777:, p. 10. 776: 771: 769: 767: 763: 760:, p. 22. 759: 754: 752: 750: 746: 742: 741:Mulvenon 2009 737: 735: 731: 727: 722: 719: 716:, p. 11. 715: 710: 708: 706: 702: 699:, p. 14. 698: 693: 690: 687:, p. 36. 686: 681: 678: 675:, p. 36. 674: 669: 666: 663:, p. 16. 662: 657: 654: 650: 649:Mulvenon 2009 645: 642: 638: 633: 630: 626: 621: 619: 615: 612:, p. 14. 611: 606: 603: 600:, p. 16. 599: 594: 591: 587: 582: 579: 576:, p. 15. 575: 570: 567: 563: 562:Mulvenon 2009 558: 555: 552:, p. 30. 551: 546: 544: 542: 538: 526: 525: 520: 514: 511: 499: 498: 493: 486: 483: 479: 474: 471: 467: 466:Mulvenon 2009 462: 459: 456:, p. 39. 455: 450: 448: 446: 442: 438: 437:Mulvenon 2009 433: 430: 427:, p. vi. 426: 421: 418: 414: 409: 406: 402: 397: 395: 391: 387: 382: 380: 378: 376: 374: 370: 366: 361: 358: 354: 349: 346: 342: 337: 334: 331:, p. 95. 330: 325: 323: 319: 315: 311: 306: 303: 299: 294: 291: 285: 283: 278: 273: 269: 265: 261: 259: 253: 249: 242: 240: 233: 227: 225: 221: 217: 214: 210: 207: 204: 201: 197: 194: 191: 187: 183: 180: 176: 173: 169: 166: 162: 159: 158: 157: 150: 148: 144: 137: 135: 133: 127: 120: 118: 114: 110: 106: 102: 97: 93: 86: 84: 82: 77: 75: 69: 65: 63: 58: 50: 48: 46: 42: 38: 35:'s offensive 34: 30: 26: 22: 1956: 1935: 1919: 1913: 1893: 1877: 1873: 1850:(1): 28–80. 1847: 1843: 1812: 1797: 1779: 1764: 1728: 1707: 1675: 1654: 1634: 1608: 1584:. Berkeley: 1579: 1554:. New York: 1551: 1539:Bibliography 1525: 1513: 1501: 1474: 1462: 1450: 1443:Wortzel 2014 1438: 1426: 1399: 1387: 1375: 1370:, p. 9. 1363: 1358:, p. 1. 1356:Wortzel 2012 1351: 1339: 1333:. p. 1. 1330: 1325: 1313: 1300: 1294: 1282: 1277:, p. 4. 1275:Wortzel 2012 1270: 1258: 1246: 1234: 1214:, p. 4. 1207: 1194: 1187: 1180:Prakash 2013 1175: 1170:, p. 2. 1163: 1151: 1146:, p. 3. 1139: 1134:, p. 7. 1112: 1085: 1073: 1061: 1049: 1022:December 19, 1020:. Retrieved 1016:the original 1009: 985: 973: 961: 956:, p. 5. 954:Prakash 2013 941:, p. 4. 934: 922: 910: 898: 876:, p. 3. 874:Wortzel 2014 854: 842: 830: 818: 806: 794: 789:, p. 8. 782: 758:Wortzel 2014 721: 714:Wortzel 2014 692: 680: 668: 656: 644: 632: 625:Wortzel 2014 610:Wortzel 2014 605: 598:Wortzel 2014 593: 581: 569: 557: 528:. Retrieved 524:Asia Society 522: 513: 501:. Retrieved 495: 485: 473: 461: 432: 425:Wortzel 2014 420: 408: 367:, p. 7. 360: 353:Wortzel 2014 348: 336: 305: 293: 280: 275: 270: 266: 262: 257: 254: 250: 246: 237: 222: 215: 208: 202: 195: 189: 181: 174: 167: 160: 154: 145: 141: 138:Organization 131: 128: 124: 115: 111: 107: 104: 99: 94: 90: 78: 73: 70: 66: 54: 28: 24: 20: 18: 1922:(3): 47–57. 1880:(2): 36–49. 1605:West, Nigel 1556:I.B. Tauris 1530:Krekel 2009 1506:Krekel 2009 1467:Krekel 2009 1419:Krekel 2009 1392:Krekel 2009 1344:Thomas 2007 1263:Thomas 2007 1227:Krekel 2009 1212:Feakin 2013 1144:Feakin 2013 1132:Krekel 2009 1105:Sharma 2010 1090:Stokes 1999 1054:Stokes 1999 1011:China Times 990:Sharma 2010 978:Sharma 2010 927:Sharma 2010 915:Mattis 2012 847:Stokes 1999 835:Stokes 1999 823:Stokes 1999 787:Feakin 2013 726:Krekel 2009 697:Krekel 2009 685:Thomas 2007 673:Sharma 2010 661:Krekel 2009 637:Sharma 2010 586:Thomas 2007 574:Krekel 2009 550:Krekel 2009 503:November 7, 478:Krekel 2009 454:Sharma 2010 413:Stokes 1999 386:Xuezhi 2012 341:Feakin 2013 312:, pp.  243:Application 55:During the 1611:. Lanham: 1479:Fritz 2008 903:Fritz 2008 811:Fritz 2008 530:October 2, 286:References 186:Nigel West 1959:(4): 1–6. 1852:CiteSeerX 39:(EW) and 1987:Category 1836:Journals 1633:(2014). 1607:(2012). 1576:(2002). 1455:DoD 2013 775:DoD 2013 277:victory. 101:assault. 1965:Reports 859:Ji 1999 365:Ji 1999 298:Ji 1999 226:(3PLA): 51:History 1896:(52). 1854:  1824:  1747:  1715:  1694:  1662:  1641:  1619:  1592:  1562:  1976:(PDF) 1953:(PDF) 1940:(50). 1932:(PDF) 1910:(PDF) 1890:(PDF) 1870:(PDF) 1784:(PDF) 1733:(PDF) 1680:(PDF) 1544:Books 1305:(PDF) 1199:(PDF) 1822:ISBN 1745:ISBN 1713:ISBN 1692:ISBN 1660:ISBN 1639:ISBN 1617:ISBN 1590:ISBN 1560:ISBN 1024:2019 532:2023 505:2023 25:4PLA 19:The 314:128 1989:: 1955:. 1934:. 1920:56 1918:. 1912:. 1892:. 1876:. 1872:. 1846:. 1786:. 1768:. 1743:. 1690:. 1682:. 1615:. 1588:. 1558:. 1486:^ 1411:^ 1219:^ 1124:^ 1097:^ 1032:^ 1008:. 997:^ 946:^ 881:^ 866:^ 765:^ 748:^ 733:^ 704:^ 617:^ 540:^ 521:. 494:. 444:^ 393:^ 372:^ 321:^ 83:. 64:. 47:. 1900:. 1878:4 1860:. 1848:8 1830:. 1805:. 1790:. 1753:. 1739:/ 1721:. 1700:. 1686:/ 1668:. 1647:. 1625:. 1598:. 1568:. 1068:. 1026:. 992:. 968:. 534:. 507:. 480:. 415:. 403:. 355:. 343:. 316:. 23:(

Index

People's Liberation Army
electronic warfare
information warfare
Network Systems Department of the PLA Strategic Support Force
Sino-Soviet conflict
first Gulf War
Network Systems Department of the PLA Strategic Support Force
Nigel West
Third Department of the General Staff Department
Ji 1999
Shambaugh 2002
128


Smith & West 2012
Feakin 2013
Wortzel 2014
Ji 1999





Xuezhi 2012


Krekel, Adams & Bakos 2012
Stokes 1999
Wortzel 2014
Mulvenon 2009

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.