Showing posts with label People's Liberation Army. Show all posts
Showing posts with label People's Liberation Army. Show all posts

Tuesday, February 24, 2015

China´s weak military spots - Wendell Minnick

Wendell Minnick
Wendell Minnick
China´s expanding military power got much media coverage over the past years. But defense analyst Wendell Minnick got a just released report on a less covered subject: why is China´s military build-up less strong than anticipated. From Defense News.

Wendell Minnick:
Sponsored by the USCC and produced by the International Security and Defense Policy Center of the Rand National Security Research Division, the report is based on the premise that understanding where the People's Liberation Army (PLA) falls short of its aspirations, or has not fully recognized the need for improvement, is just as important as recognizing the PLA's strengths. 
The report looks at two critical shortcomings: institutional and combat capabilities. On institutional issues, the PLA faces shortcomings regarding outdated command structures, quality of personnel, professionalism and corruption. Combat weaknesses include logistical, insufficient strategic airlift capabilities, limited numbers of special-mission aircraft, and deficiencies in fleet air defense and anti-submarine warfare. 
"Although the PLA's capabilities have improved dramatically, its remaining weaknesses increase the risk of failure to successfully perform some of the missions Chinese Communist Party [CCP] leaders may task it to execute, such as in various Taiwan contingencies, maritime claim missions, sea line of communication protection, and some military operations other than war scenarios."
Much more in Defense News.

Wendell Minnick is a speaker at the China Speakers Bureau. Do you need him at your meeting or conference? Do get in touch or fill in our speakers´ request form.

Are you interested in more recent stories by Wendell Minnick? Check out this regularly updated list.  

Wednesday, January 21, 2015

New spy games between China and Taiwan - Wendell Minnick

Wendell Minnick
Wendell Minnick
Officially China and Taiwan are still at war, although hostilities are mostly verbal. Until Taiwan arrested an alleged spy from China this month, writes defense analyst Wendell Minnick in Defense News.

Wendell Minnick:
Taiwan has arrested an alleged Chinese spy, the first such apprehension in Taiwan in decades, according to the National Security Bureau
The question many here in Taipei are asking is whether China will attempt some sort of swap to get him back. China is holding two Military Intelligence Bureau agents who were captured in Vietnam more than a decade ago. 
On Jan. 16, Taipei prosecutors went forward on indictments on mainlander Zhen Ziaojiang's alleged spy ring, which included five Taiwanese accused of spying for China. The indictment charged former Army Maj. Gen. Hsu Nai-chuan, Air Force Lt. Col. Chou Chih-li, Air Force pilot Sung Chia-lu, Air Force official Yang Jung-hua, and karaoke club owner Lee Huan-yu. 
According to media outlets, Zhen was a captain and an intelligence officer in the People's Liberation Army. This has given rise to the assumption that the Army's Second Department of the General Staff Department was in charge of the operation. 
In 2005, Zhen obtained residency in Hong Kong and began flying to Taiwan ostensibly on business and tourist trips, which were allegedly missions to recruit Taiwan military officers, according to government statements to the press. Zhen's alleged mainland intelligence contact has been identified as a "Mao Shangyu," most likely a pseudonym, based in Xiamen City, Fujian Province, the statements said.
More in Defense News.

Wendell Minnick is a speaker at the China Speakers Bureau. Do you need him at your meeting or conference? Do get in touch or fill in our speakers´ request form.

What are the most important China trends for 2015. At the China Speakers Bureau we listed our 7 major trends.

Tuesday, February 26, 2013

Hacking: who is holding the smoking gun? (part 2) China Weekly Hangout

Hackers
Hackers (Photo credit: José Goulão)
Much has been written and talked about the Mandian report, pinpointing at a PLA-unit in Shanghai as the culprit for hacking in the US, since we announced our China Weekly Hangout last week. (You can read the original announcement here, you can register here). On top of that, we got an unprecedented number of people (30 at the time of writing this post) who already registered for participation this week. So, time for a wrap up.

Who is holding the smoking gun, is the title of this week's hangout. But after reading all the additional articles, we can better ask who is not holding a gun, smoking or not? If we can believe the information in different articles, the APT1 or P.L.A. Unit 61398 in Shanghai is only one out of twenty China-based hacker groups.
And apart from China, similar hacker groups are believed to operate (condoned or not by their governments) in Russia, the US itself, France, Israel, Iran and possibly a few other countries.
That raises new questions. Why has this report developed into an exclusively China-US argument, leaving out other countries and other China-based hacker groups? Was the PLA unit so poorly organized, their IP addresses could be discovered?
Also the motives of Mandian came under scrutiny. Were they heading for an IPO and needed so media attention? Or are the media to blame, who just need a simple "bad guy/good guy" story and have used the Shanghai-based PLA unit for a too simplistic take on what hacking actually means for global security?
And indeed: when everybody is shooting at everybody, how can you protect yourself, as an individual, but also as a company, organization or government agency?

On Thursday we try to dive into a few of these questions with +Charlie Custer of Tech in Asia; while moderation will be in the hands of +Fons Tuinstra, president of the China Speakers Bureau. We can only allow a few people into the official hangout, and  if you give us a short bio and your take on this issue, you have a larger chance of getting into the hangout.
Everybody else can watch the hangout here in this space, or at our event page. Questions and remarks you can also send during the hangout over twitter and Google+, but make sure you add our hash tag #CWHCWH. 
You can view all previous hangouts here. 

Until then, you can also leave your remarks here in the comments.
Some additional useful articles:
Mandiant goes viral after China hacking report -Reuters
Hackers Embed Virus in Mandiant Report - CDT
Everyone Hacks Everyone: Stop Assuming All Hackers Come From China - TIA

Next week we plan to have a China Weekly Hangout on China's relations with Africa, especially the position of China's media in the continent. Participating will be +Eric Olander of the China Africa Project. The announcement for the hangout will follow later, but if you are interested, drop me a line. 

The US-China relations were discussed in the autumn of 2012 at the China Weekly Hangout with political scientist +G. E. Anderson  , China veteran +Janet Carmosky and +Fons Tuinstra 



Enhanced by Zemanta

Wednesday, February 20, 2013

PLA hackers case revisited - who calls the shots in China?

The PLA building in Shanghai
Outside observers look at China too often as a one-party state with a top-down government. When you are living in China or have been there a while, things look a tidbit more complicated, as internal divisions, infighting, if not outright factional wars cause heavy divisions. If you have no eye for those internal differences between government bodies, you might never be able to really understand China.
So, when the Chinese Ministry of Foreign Affairs came out with a firm denial on China's hacking efforts, after US security firm Mandiant published their report, I could not help but smile a bit. In cases of a crisis, the ministry of Foreign Affairs is the last one to get informed; they often have to rely on domestic and international media to find out what is really going on. The denial by the Chinese Ministry of Defense sounds slightly more convincing, although China's government bodies do not have a good tradition of informing each other. There is a fair chance the New York Times report on the country's hacking efforts came as a surprise to the leadership in Beijing too, not only to the ministry of foreign affairs.

Just as a reminder a relative recent incident to illustrate my point. Just hours before the US Secretary of State Robert Gates was due to meet President Hu Jintao during a visit to Beijing in January 2011, China's military conducted a first test flight with a stealth fighter. While US diplomats initially thought this was a way the Chinese leadership wanted to put pressure on the talks in Beijing, they found out their Chinese counterparts, including Hu Jintao, did not even have the information on the test flight. Hu Jintao was then the first in charge of the PLA, but even he was not informed about the test flight.
Perhaps the PLA leadership wanted to make a point? But to who? To the US, or to their comrades in the Zhongnanhai, China's political center? Or perhaps there was no point, as the PLA just had the high-level talks not on their radar screen. Only when some of the real decision makers will write their memoirs, we might possibly know.

The problem of the much quoted Mandiant report is that they come closer than ever in linking hacking efforts to China's military, they still fail to produce the smoking gun. Yes, the IP-addresses they found are linked to a neighborhood in Pudong, Shanghai, where a PLA-related offices of the APT1 or P.L.A. Unit 61398 operate. But even an amateur hacker like me knows that hiding your real IP-address is one of the first things you would have to do as a serious hacker.
So, there are two options. Or, these professional army hackers have not been able, or have been slacking, in hiding their real IP-addresses. Or other hackers have cleverly used those IP-addresses to implicate those poor Chinese. Both options look rather unlikely, but I cannot come up with a valid third one.

While I have no inside information on who is hacking who and for what reason, there is one golden rule to explain what is happening in China, also when it concerns the government: follow the money. Who might have a financial interest in hacking a wide variation of targets, from Coca-Cola to pipe-line companies, from government agencies to journalists?
My estimation is that this PLA-office in Shanghai is largely a commercial operation, bringing in money for both the PLA and possibly the units who are directly involved. They might have also worked on more political assignments, as long as that did not interfere with their commercial targets.
Of course, that is bad, whether hacking is done for financial or for political reasons, or both. But it would be hard to imagine that other parts of the world, including Russia and the US, would not have similar hacking operations. In the US it is even legally covered by the Patriot Act - although only legal from a US perspective.
Of course, by now high-level but low-profile investigation team from Beijing have arrived in Shanghai to find out what has really been happening in those office. But we might have to wait for a Chinese Wikileaks to find out what their findings will be.

At best these report can act as a wake-up call. It is not a China versus the US struggle, we are looking at a global threat that can come from everywhere.

Enhanced by Zemanta