The communist dictatorship in the People’s Republic of China is acquiring, developing and testing state-of-the-art technology that, many believe, it plans to use to wage information warfare against its neighbors and the United States.

As reported by WorldNetDaily, China has developed “Hacker Killer,” software that can defeat just about any kind of computer hacker attack. This week, China’s Scientific Information Institute — a branch of the Ministry of Finance and the Academy of Natural Science — announced its new PG7 variable lie detector, which will be used in court cases focusing on corruption and business disputes. The new device will monitor a suspect’s blood pressure, pulse, breath, pupil movement and brain waves.

The first homegrown, Chinese-made lie detector was used in court in 1991. During the past decade, the device was used in more than 2,000 court cases — often with controversial results. In one prominent case, a police officer failed the lie detector test. He consequently was sentenced to death and served two years in prison. Later, he was cleared of all charges.

What China cannot develop on its own, it usually purchases from transnational corporations like Motorola and Sun Micro Systems. Israel has also sold high-tech items to China’s police agencies.

This week, Motorola was forced to pull an ad in a Chinese publication promoting its products for sale in that nation. The ad featured a pair of handcuffs. Western human-rights groups objected strenuously to the ad.

What is China doing with all of these high-tech items? Many believe the nation is preparing to wage a high-tech war, not only on internal dissent, but also against its neighbors in Asia. India — which is troubled by China’s nuclear exports to Pakistan, not to mention Chinese nuclear missiles aimed at India’s largest cities — has a real concern for China’s potential for territorial expansion in the region. The fascist regime in Burma might be the first domino to fall to China. Burma exports most of its drugs, rice and jade to communist China. As a pariah state on the scale of North Korea, Burma has little or no ties to the West, and has increasingly moved into China’s orbit.

Information warfare

According to Timothy Thomas of the U.S. Army’s Foreign Military Studies Office in Fort Leavenworth, Kan., China’s leaders believe they can achieve hegemony in Asia only by integrating information warfare into its geopolitical strategies. Thomas believes that China is rapidly integrating the latest state-of-the-art information warfare techniques into its “People’s War” strategy. This action has, for the most part, been overlooked by the United States and its allies abroad. It has been addressed, however, by the Rand Corporation and other independent think tanks. China’s new high-tech information warfare capabilities will pose both strategic and operational problems for the West.

As reported by the Hindustan Times in June 1999, China established a special task force on information warfare composed of senior politicians, military officers and academics, headed by Xie Guang, vice-minister of the Commission of Science, Technology and Industry for National Defense. The task force has prepared detailed plans to cripple the civilian information infrastructures of Taiwan, the United States, India, Japan and South Korea.

Two members, Qi Jianguo and Dai Qingmin, have formulated a comprehensive scheme: China would not attack military or political targets in these countries but would target their financial, banking, electrical supply, water, sewage and telecommunications networks. According to the plan, Chinese companies will establish business links with private companies in these countries. After carrying on legitimate business for some time, they would insert malicious computer codes and viruses over commercial e-mail services. The viruses would be sent through computers in universities in third countries so that they could not be traced back to China. Reportedly, the attacks would be launched when the political leadership of the target countries is preoccupied with election campaigns.

China’s People’s Liberation Army has conducted several field exercises recently — information war games, in effect. In one exercise, 500 soldiers simulated cyberattacks on the telecommunications, electricity, finance and television sectors of Taiwan, India, Japan and South Korea.

Ten functions were rehearsed in another exercise: planting information mines, conducting information reconnaissance, changing network data, releasing information bombs, dumping garbage, disseminating propaganda, applying information deception, releasing clone information, organizing info-defense and establishing network spy stations. In Datong, 40 PLA specialists are preparing methods of seizing control of networks of commercial Internet service providers in Taiwan, India, Japan and South Korea. In October, Chief of Staff Gen. Fu Quanyou presided over an exercise that simulated electronic confrontation with countries south and west of Gobi Desert, focusing on electronic reconnaissance, counter-reconnaissance, electronic interference and counter-interference.

Part of the PLA’s strategy is enlisting support from universities. It established the Communications Command Academy in Wuhan, capital of Hubei province, in collaboration with Hubei engineering universities. The Navy Engineering College, headed by Shao Zijun, also in Wuhan, is collaborating on secret projects on information warfare with the Communications Command Academy. The PLA established the Information Engineering University, headed by Maj. Gen. Zhou Rongting in Zhengzhou, capital of Henan province. It did this by taking over and combining Henan’s civilian Institute of Information Engineering, Electronic Technology College and Survey and Mapping College. The new institution will specialize in remote image information engineering, satellite-navigation and positioning engineering, and map data banks of the regions from India to Indo-China.

The PLA also established the Science and Engineering University by combining the civilian Institute of Communications Engineering, the Institute of the Engineering Corps, the Air Forces Meteorology Institute and the Research Institute of General Staff Headquarters. Over 400 civilian professors from universities all over China have been recruited for the university. The PLA also announced the establishment of a new Institute of Computer and Command Automation and persuaded 60 experts of Chinese origin settled in the West to return to work there.

“China’s high-tech infrastructure is growing so rapidly that it’s a great chore just to document her acquisitions, let alone try to devise new strategies for countering them,” said Tracey Kinchen, a former MI-6 British intelligence agent and the head of the anti-Beijing Laurie Holden Hackers.

“I don’t know what frightens me more — China’s growing might or the fact that the West is fueling this growth. Some people I know in intelligence circles tell me, ‘Tracey don’t worry. China will break apart like the Soviet Union did.’ I want to believe them, but the evidence really suggests otherwise. We may well see a third heir to Attila the Hun and Genghis Khan.”

Related stories:

‘Hello Kitty’ battles in cyber wars

Hackers warn of encryption ‘beast’

Related column:

Life with Beijing’s bruisers

Note: Read our discussion guidelines before commenting.