Page:2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF/114

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.

critical component in its overall integrated strategic deterrence posture, alongside space and nuclear deterrence. PLA studies discuss using warning or demonstration strikes—strikes against select military, political, and economic targets with clear awing effects—as part of deterrence. Accordingly, the PLA probably seeks to use its cyber-reconnaissance capabilities to collect data for intelligence and cyberspace attack purposes; to constrain an adversary’s actions by targeting network-based logistics, C2, communications, commercial activities, and civilian and defense critical infrastructure; and, to serve as a force-multiplier when coupled with kinetic attacks during armed conflict.

In addition, PLA publications emphasize the importance of cyber defense to defend the PRC’s critical infrastructure and military system-of-systems against adversary reconnaissance and attacks. The PLA likely views cyber defense as including preventative measures as well as offensive actions to deter or disrupt adversary cyberspace activity.

The PLA may further change how it organizes and commands IO, particularly as the SSF continues to develop its capabilities and further integrate into joint planning, exercises, and operations with other PLA forces. The SSF likely is generating synergies by combining national-level cyberspace reconnaissance, attack, and defense capabilities in its organization, alongside other strategic IO capabilities, and integrating into theater command planning and operations.

CYBERSPACE ACTIVITIES DIRECTED AGAINST THE U.S. DEPARTMENT OF DEFENSE (DOD)

China-based intrusions continued to target computer systems around the world, including those owned by the U.S. Government, throughout 2022. These and past intrusions exploit known vulnerabilities to actively target U.S. government networks to steal intellectual property and develop access into sensitive networks. The PRC uses its cyberspace capabilities, not only to support intelligence collection against U.S. academic, economic, military, and political targets, but also to exfiltrate sensitive information from the critical defense infrastructure and research institutes to gain economic and military advantage and possibly for cyberattack preparations. The targeted information can benefit the PRC’s defense high-technology industries, support the PRC’s military modernization, provide the PRC’s leadership with insights into U.S. plans and intentions, and enable diplomatic negotiations. Moreover, targeted information could enable their cyberspace forces to build an operational picture of U.S. defense networks, military disposition, logistics, and related military capabilities that could be exploited prior to or during a crisis. The access and skillset required for these intrusions are similar to those necessary to conduct cyberspace operations in an attempt to deter, delay, disrupt, and degrade DoD operations prior to or during a conflict. Taken together, these cyber-enabled campaigns either directly or indirectly impact the United States’ ability to project, or defend against, military action.


96
OFFICE OF THE SECRETARY OF DEFENSE
Annual Report to Congress: Military and Security Developments Involving the People's Republic of China