The People's Republic of China engages in information warfare through the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008, informatized warfare includes the utilization of information-based weapons and forces, including battlefield management systems, precision-strike capabilities, and technology-assisted command and control (C4ISR). The term also refers to propaganda and influence operations efforts by the Chinese state. Consequential Chinese information operations have been carried out to influence Taiwanese sovereignty, U.S. elections, and the Russian invasion of Ukraine. China has also exploited artificial intelligence and increasingly complex communications structures to enhance their cyber-warfare capabilities.
Definitions
The People's Liberation Army (PLA) defines the term informatization to describe the implementation of information technology in the digital age, and as an evaluation criteria of its military modernization effort. The Central Military Commission aims to transform PLA from conducting people's war to engage in warfare conditions of informatization, which includes moving the military doctrine from weapon platform-centric to cyber-centric. This may include algorithmically generated narratives, AI coordinated social media accounts, and targeted attacks on communications infrastructure. The indicated characteristic of the cyber-centric force is the utilization of network linkages (data-link) among platforms.
Eric C. Anderson and Jeffrey G. Engstrom define "informationization" and informatized warfare in Chinese military doctrine as follows: "[A]t the operational level appears focused on providing an integrated platform for joint war-zone command, control, communications, computer, intelligence, surveillance, and reconnaissance (C4ISR) connectivity, and for peacetime command and control (C2) within the PLA's Military Regions."
The United States Defense Intelligence Agency (DIA) defines China's "informatized warfare" as similar to U.S. military's concept of net-centric capability, which means the military's capability to use advanced information technology and communications systems to gain operational advantage over an adversary.
In 1995, the father of Chinese information warfare, Major General Wang Pufeng, wrote: "Information war is a crucial stage of high-tech war... At its heart are information technologies, fusing intelligence war, strategic war, electronic war, guided missile war, a war of "motorization" [jidong zhan], a war of firepower [huoli]—a total war. It is a new type of warfare."
In two articles in the People's Liberation Army Daily, of 13 and 20 June 1995, Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science noted several definitions. They concluded:
- We hold that information warfare has both narrow and broad meanings. Information warfare in the narrow sense refers to the U.S. military's so-called "battlefield information warfare," the crux of which is "command and control warfare." It is defined as the comprehensive use, with intelligence support, of military deception, operational secrecy, psychological warfare, electronic warfare, and substantive destruction to assault the enemy's whole information system including personnel; and to disrupt the enemy's information flow, in order to impact, weaken, and destroy the enemy's command and control capability, while keeping one's own command and control capability from being affected by similar enemy actions.
They went on to state:
The essential substance of information warfare in the narrow sense is made up of five major elements and two general areas.
The five major elements are:
- Substantive destruction, the use of hard weapons to destroy enemy headquarters, command posts, and command and control (C2) information centers
- Electronic warfare, the use of electronic means of jamming or the use of antiradiation [electromagnetic] weapons to attack enemy information and intelligence collection systems such as communications and radar
- Military deception, the use of operations such as tactical feints [simulated attacks] to shield or deceive enemy intelligence collection systems
- Operational secrecy, the use of all means to maintain secrecy and keep the enemy from collecting intelligence on our operations
- Psychological warfare, the use of TV, radio, and leaflets to undermine the enemy's military morale.
The two general areas are information protection (defense) and information attack (offense):
- Information defense means preventing the destruction of one's own information systems, ensuring that these systems can perform their normal functions. In future wars, key information and information systems will become "combat priorities," the key targets of enemy attack.
- Information offense means attacking enemy information systems. Its aims are: destroying or jamming enemy information sources, to undermine or weaken enemy C&C capability, and cutting off the enemy's whole operational system. The key targets of information offense are the enemy's combat command, control and coordination, intelligence, and global information systems. A successful information offensive requires three prerequisites:
- 1) the capability to understand the enemy's information systems, and the establishment of a corresponding database system;
- 2) diverse and effective means of attack; and
- 3) the capability to make battle damage assessments [BDA] of attacked targets.
— Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science, Beijing, 1995.
A July 1998 conference held in San Diego, sponsored jointly by the RAND Center for Asia-Pacific Policy and the Taiwan-based Chinese Council of Advanced Policy Studies, "brought together Chinese military experts to discuss the non-hardware side of the People's Liberation Army's modernization." In his presentation, James C. Mulvenon stated: "Chinese writings clearly suggest that IW is a solely military subject, and as such, they draw inspiration primarily from U.S. military writings. The net result of this "borrowing" is that many PLA authors' definitions of IW and IW concepts sound eerily familiar.": 175–186
In December 1999, Xie Guang, the then Vice Minister of Science & Technology and Industry for National Defence, defined IW as:
- IW in military sense means overall use of various types (of) information technologies, equipment and systems, particularly his command systems, to shake determination of enemy's policy makers and at the same time, the use of all the means possible to ensure that that one's own systems are not damaged or disturbed.
In a strategic analysis paper for the Indian Institute for Defence Studies and Analyses written in 2006, Vinod Anand examines the definitions of Chinese Information Warfare. He notes that although Chinese understanding of IW was initially based on western concepts, it has increasingly moved towards evolving its own orientation.
Background and characteristics
China's interest in information warfare began after the United States victory in the first Gulf War (1990–1991). U.S. success was the result of information technologies and the total dominance it was able to provide in the battle space. From that point forward, the PLA began to seriously invest in and develop its own concepts of information warfare and what they mean to China.
As a result of technological advancement, China has now entered an era where informationization can be applied to military domains.
China's 2004 White Paper on National Defense outlines the importance of informationization.
- The PLA, aiming at building an informationalised force and winning an information war, deepens its reforms, dedicates itself to innovation, improves its quality and actively pushes forward the RMA with Chinese characteristics with informationalization at its core.
The U.S. Department of Defense's 2009 Annual Report to Congress on "Military Power of the People's Republic of China" defines local wars under conditions of informationization as "high intensity and short duration fighting against high technology adversaries" ... "capable of fighting and winning short-duration, high-intensity conflicts along its periphery against high-tech adversaries". Additionally, local war under informationization is an effort which seeks to fully develop and link land, air, sea, space and the electromagnetic spectrum into one system. China's military strategy is focused on fighting and winning "informationized local wars."
China's leadership has continuously stressed using asymmetric techniques to counter more powerful nations, such as the United States, and information warfare is a tool that the PLA uses to achieve their goals. In a 2001 paper in the U.S. Military Review, T. L. Thomas examines the writings of Major General Dai Qingmin (Director of the PLA's Communications Department of the General Staff responsible for IW and IO), Senior Colonel Wang Baocun (of the PLA's Academy of Military Sciences) and others on the ways that China is employing "Electronic Strategies" to realise the benefits of asymmetric warfare. Thomas also summarises the April 2000 issue of the Chinese journal China Military Science which contains three articles on information warfare subjects. The only article written in English ("The Current Revolution in Military Affairs and its Impact on Asia-Pacific Security," by Senior Colonel Wang Baocun) presents a quite different approach to an article Wang Baocun wrote only three years previously where he presented a description of IW which contained the elements of Soviet/Russian military science.
In the article "On Information Warfare Strategies", by Major General Niu Li, Colonel Li Jiangzhou and Major Xu Dehui (of the Communications and Command Institute), the authors define IW stratagems as "schemes and methods devised and used by commanders and commanding bodies to seize and maintain information supremacy on the basis of using clever methods to prevail at a relatively small cost in information warfare."
In 2003, the CCP approved the three warfares strategy for the PLA, which involves using public opinion (or media) warfare, psychological warfare and legal warfare (lawfare).
While China has adopted the idea of information dominance, its method for going about information dominance differs, using ancient political warfare methods such as the Thirty-Six Stratagems. The PLA has also increasingly stressed an operational concept called "cognitive domain operations."
On the defensive side, China employs a combination of legal policies and information technology for censorship and surveillance of dissenters in a program called Golden Shield. This is often referred to as the Great Firewall of China. China promotes the idea of "national cyber sovereignty," which Xi Jinping has described as the avoidance of "cyber hegemony" and the idea that countries should respect each other's national security in cyberspace.
Information operations
The PLA began developing social media influence operations in the mid-2010s and began employing them since at least 2018, according to RAND Corporation. Pro-China disinformation campaigns in 2021 showed greater sophistication compared to 2019. It has been difficult to attribute with certainty whether Chinese state actors are behind these actions.
COVID-19
Disinformation campaigns sought to downplay the emergence of COVID-19 in China and manipulate information about its spread around the world. In 2020, the Chinese government created a social media campaign in response to online civilian outrage at the COVID-19 pandemic. A look at Chinese controlled media would show how the government reportedly was able to efficiently contain the spread of the virus. The Chinese government took measures such as silencing Li Wenliang, the "whistleblower" doctor, and many other journalists in order to maintain this image.
Outside of the country, disinformation campaigns sought to downplay the emergence of COVID-19 in China and manipulate information about its spread around the world. In January 2023, Google stated that it shut down more than 50,000 accounts promoting disinformation about COVID-19, Taiwan, and U.S. politics. The campaign is believed to be linked to Chinese public relations firm Shanghai Haixun Technology Co. Haixun has planted pro-Beijing stories in dozens of American news outlets online.
Taiwan
The PRC seeks unification with Taiwan and uses information operations, sometimes referred to as "information war", as an important part of that work. Despite the large resource outlay the Chinese have been relatively ineffective in influencing the Taiwanese public. According to James C. Mulvenon rather than risk failure of a militarily forced unification, which could lead to international recognition of the independence of Taiwan, PRC leadership could potentially use computer network operations to undermine the will of Taiwan by attacking Taiwanese infrastructure.
In 2022 Taiwan's Ministry of Justice Investigation Bureau revealed that it had identified more than 400 social media accounts being used to push disinformation to Taiwanese citizens as part of Chinese content farms. In 2023, the Investigation Bureau announced that it was monitoring for money laundering undertaken in an effort to finance election interference in Taiwan.
During the 2022 Chinese military exercises around Taiwan, Taiwanese officials accused the PLA of engaging in information warfare with claims of military exercises close to Penghu.
United States
The Chinese Communist Party (CCP) has been carrying out propaganda against the West since the 1960s, spreading its ideology and creating division among the population. Its foreign-directed propaganda has been known to back far-left political activists and radical feminism.
Using a variety of methods, the PRC has recruited American agents of influence to advocate for Chinese interests in the United States. While many of these agents of influence serve China unwittingly, they can be very effective. A 1999 Congressional report found that "the Chinese Government continues to seek influence in Congress through various means, including inviting Congressional members to visit the PRC, lobbying ethnic Chinese voters and prominent U.S. citizens, and engaging U.S. business interests to weigh in on issues of mutual concern."
China also uses its vast market as leverage in order to persuade American companies to lobby for Chinese interests. This is especially true of companies that deal in high technology or dual-use technology, as there are significant export controls placed on such technology. According to the 1999 Cox Report, "Executives wishing to do business in the PRC share a mutual commercial interest with the PRC in minimizing export controls on dual-use and military-related technologies. The PRC has displayed a willingness to exploit this mutuality of interest in several notoriously public cases by inducing VIPs from large U.S. companies to lobby on behalf of initiatives, such as export liberalization, on which they are aligned with the PRC."
Chinese government information operations have also attempted to co-opt local NIMBY sentiment to drive opposition against perceived economic threats such as the development projects that compete with the rare earth industry in China.
In 2024 Network Contagion reported that several member organizations of the pro-Palestinian movement Shut It Down for Palestine (SID4P) are linked to what it calls the "Singham Network" under Neville Roy Singham, who has close ties to the CCP according to Network Contagion. The report accuses the Singham Network of stoking unrest at the grassroot level and amplifying the voice of SID4P and says that at least one member of SID4P has ties to extremist groups with anti-American, anti-Israel, and anti-Jewish agendas.
U.S. elections
Through its agents in America, the PRC has financed a number of political candidates. Katrina Leung, a Chinese spy, contributed $10,000 to the campaign of Richard Riordan, the former mayor of Los Angeles. When he lost his primary to Bill Simon Jr., Leung contributed $4,200 to Simon's campaign. At the direction of her Chinese handlers, Leung also contributed to the 1992 campaign of George H. W. Bush. It is estimated that Leung donated around $27,000 to politicians in the 1990s on behalf of the PRC.
A 2012 report by the Government Accountability Institute cites other examples: It was discovered that officers from the Chinese Embassy in Washington, D.C. "sought to direct contributions from foreign sources to the Democratic National Committee before the 1996 presidential campaign." While these allegations have been denied by the PRC, "Secret communications between Beijing and the Chinese Embassy in Washington establish that the influence-buying plan was 'government sanctioned...'"
In 1996, People's Liberation Army intelligence officer Gen. Ji Shengde provided Johnny Chung, a fundraiser for the Democratic National Committee, with $300,000 to donate towards President Bill Clinton's reelection. Chung visited the White House over fifty times during the 1996 presidential campaign, and was responsible for over $400,000 of contributions to the DNC.
In September 2022, Meta Platforms removed fake accounts linked to a China-based influence operation ahead of the 2022 United States elections. In the run-up to the 2024 United States elections, the Ministry of Public Security's Spamouflage influence operation was identified as having used fake social media accounts in an attempt to amplify divisions in US society.
Russian invasion of Ukraine
During the Russian invasion of Ukraine, state news agency Xinhua and other Chinese state media outlets paid for digital ads on Facebook amplifying pro-Kremlin disinformation and propaganda after Meta Platforms banned Russian state media advertisement buys. In March 2022, China Global Television Network repeated unsubstantiated Russian claims of biological weapons labs in Ukraine. The CCP-owned tabloid Global Times also echoed Russian state media claims that the Bucha massacre was staged.
2017 China–India border standoff
The Times of India reported that during the 2017 Doklam standoff China used information operations against India. Chinese state media asserted that the People's Liberation Army was preparing for combat by shifting substantial quantities of hardware and vehicles closer to Tibet's Sikkim frontier. Indian officials, however, maintained that there had been no unsettling troop movements south of the Tsangpo River in Tibet. Many analysts saw Beijing's reports as a deliberate psychological tactic designed to compel New Delhi to withdraw its forces from the Doklam Plateau in Bhutanese territory, where soldiers from both sides had remained locked in a tense standoff for over a month.
Other regions
In 2020, Facebook took down a network of inauthentic accounts that, according to Graphika, were attributed to individuals in China. The information campaign focused on politics in Southeast Asia and was dubbed "Operation Naval Gazing" by security researchers.
Other platforms
Social Media
In June 2020, Twitter shut down 23,750 primary accounts and approximately 150,000 booster accounts which were being used by China to conduct an information operation aimed at boosting China's global position during the COVID-19 outbreak as well as attacking traditional targets such as Hong Kong pro-democracy activists, Guo Wengui, and Taiwan. Twitter said that the accounts had pushed deceptive narratives and spread propaganda.
In 2020 Google removed over 2,500 YouTube accounts linked to China. Most of them uploaded spam-like content unrelated to politics, but a subset posted content primarily in Chinese about COVID-19 and racial protests in the United States.
Websites
Chinese influence operations have been also observed as making use of large networks of websites mimicking local news outlets. In 2022, the cybersecurity company Mandiant first exposed a network injecting pro-Chinese narratives into American news outlets, and even commissioning a live protest in Washington, D.C.
In February 2024, researchers at the Citizen Lab discovered an even larger set of websites posing as local news, and inserting targeted attacks on individuals and organizations critical of the Chinese government into much larger volumes of content stolen from real local news outlets. The network, dubbed PAPERWALL, remains active as of 2025, despite achieving virtually no traffic according to the researchers.
Artificial intelligence
Emerging artificial intelligence (AI) models are quickly becoming an important part of states' military and information strategies around the world. AI enables a more rapid production of content, targeted messaging, and user analysis---processes critical for effective disinformation campaigns. As a result, AI models shorten the cycle of propaganda dissemination, allowing state actors to more quickly exploit vulnerabilities in other states' information infrastructure. AI capabilities are an increasingly significant factor in the effectiveness of influence operations carried out by major power states (i.e. Russia, the United States, and China).
AI is already integrated into many of the processes of information warfare. The Chinese Communist Party has harnessed generative AI to automate the creation of deceptive content including deep fake videos and synthetic news articles. This information is disseminated by a large network of state-controlled social media accounts that pose as authentic users. These CCP-linked accounts are also controlled and managed by AI. Generative AI is used in this way to conduct online influence operations for both overt propaganda and covert psychological operations. Throughout this process, the CCP employs AI to continuously refine its messaging, ensuring that disinformation efforts adapt to foreign countermeasures while continuing to align with domestic CCP narratives. AI not only amplifies China's ability to shape public opinion at home and abroad but also poses significant challenges to adversaries attempting to counteract these influence campaigns.
Comparison to U.S. information operations
The PRC's information warfare strategies, such as the PLA's "three warfares" doctrine, draw partial inspiration from Sun Tzu's The Art of War, with its three pillars—psychological warfare, public opinion warfare, and legal warfare—closely aligned with Sun Tzu's principle of subduing the enemy without fighting.
China's approach places strong emphasis on shaping international narratives—particularly through narrative warfare that invokes historical claims in East Asia. At the same time, the PRC also prioritizes managing domestic narratives and maintaining internal order and stability. China has not only launched domestic campaigns to bolster nationalism among its citizens, but also employs a robust surveillance and censorship apparatus to suppress dissent within its borders.
As for the United States, information operations encompass a broad range of supporting activities, including electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC). As opposed to China, which treats information warfare as a core part of their military strategy, the U.S. views information operations primarily as a supporting element integrated within broader conventional military operations. Further, U.S. strategy is rather decentralized, with these responsibilities spread across agencies like the Department of Defense, State Department, and intelligence community. In contrast, PLA doctrine emphasizes centralized command and control under a unified structure which integrates the political, military, and civilian spheres.
Unlike China, which places an emphasis on employing information operations domestically, the U.S. employs a primarily outward facing approach, with little domestic narrative control due to legal and constitutional constraints, including the Smith-Mundt Act and First Amendment protections. The U.S. targets foreign influence through efforts like the Global Engagement Center, which counters disinformation campaigns from Russia and China. This center has also worked to safeguard elections from foreign interference, with Microsoft reporting attempts by Iranian, Chinese, and Russian actors to disrupt U.S. elections. On the offensive side, U.S. information operations are primarily used to deceive and subdue the enemy. Historically, this has entailed using techniques such as inflatable vehicles, false radio transmissions, airborne leaflets, and sound effects. More recently, the U.S. has conducted operations like Operation Glowing Symphony (2016–2018), where Cyber Command hacked and disrupted ISIS's online platforms to erase digital propaganda and block recruitment efforts.
Cyber offensive capabilities
In recent years, China has developed a sophisticated set of cyber capabilities as part of their information warfare strategy. The People's Liberation Army (PLA) and state-backed units have devoted significant resources to developing resources to be prepared for future geopolitical conflicts. China's cyber information warfare takes a unique approach that blends novel strategies with entrepreneurship. The government is able to work with technology firms like Huawei to support their cyber initiatives. Huawei's global presence would allow China to centralize a significant amount of communication data. This partnership allows state agencies to leverage new artificial intelligence and surveillance tools while countries like the United States still keep a firm boundary between the public and private sector. Non-state actors' transparent relationship with the government has allowed for numerous advantages in conflicts with foreign powers.
One recent example that illustrates their capabilities was a cyber campaign known as Volt Typhoon. The campaign has gained access to key areas of critical United States infrastructure including power grids and communication networks. Unlike information warfare tactics that disrupt operations temporarily, Volt Typhoon focused on long term pre-positioning for leverage in future conflicts. By proxying its traffic through compromised devices, Volt Typhoon is able to obtain credentials and maintain unauthorized access by blending in. This shift towards a long term focus in China's information warfare strategy enables them to have significant control over communications infrastructure in future key scenarios. China's emphasis on pre-positioning reflects a broader strategy of maintaining covert access to provide a strategic advantage in the right time.
Infrastructure
Economic Espionage
In mid September 2024, the Committee on Homeland Security investigated rising threats to U.S. economic and homeland security posed by the Chinese Communist Party (CCP), particularly through its control over maritime infrastructure.
In particular, the investigation highlighted the dominance of a state-owned logistics corporation managed by the Chinese government, Shanghai Zhenhua Heavy Industries (ZPMC) that controls nearly 80 percent of the cranes operating at U.S. ports.
In a statement from the Committee on Homeland Security website:
The evidence gathered during our joint investigation indicates that ZPMC could, if desired, serve as a Trojan horse capable of helping the CCP and the PRC military exploit and manipulate U.S. maritime equipment and technology at their request. This vulnerability in our critical infrastructure has the potential to affect Americans from coast to coast.
ZPMC has repeatedly requested remote access to its cranes at various U.S. ports, particularly those on the West Coast. If granted, this access could be extended to other PRC government entities, as China's national security laws require full cooperation. ZPMC's ascent to dominance is a direct result of strategic leveraging of cheap labor and steel to sell cranes at below market prices.
Rising concerns
The U.S.-China Economic and Security Review Commission is a legislative commission that prioritizes the assessment and monitoring of US- China economic relations. In 2022, the commission documented the expansion of China's influence beyond "the physical domains of land, air, and sea into cyberspace, the electromagnetic spectrum" and more. The commission also noted the potential for state sponsored cyber actors to utilize logistics infrastructure as potential targets.
In 2024, the Center for Strategic and International Studies, an American think tank, outlined major strategic risks associated with PRC control over global infrastructure. According to the report, PRC entities could gain access to sensitive data including the type, quantity and origin of a good among other characteristics. This intelligence would provide insights into global trade patterns allowing for potential modifications by Chinese governmental agencies.
See also
- Chinese intelligence activity abroad
- List of cyber warfare forces
- Transnational repression by China
- State-sponsored Internet propaganda
References
- "China's National Defense in 2008" (PDF). Federation of American Scientists. Archived (PDF) from the original on 15 July 2021. Retrieved 5 November 2020.
- Dr. Eric C. Anderson; Mr. Jeffrey G. Engstrom. "Capabilities of the Chinese People's Liberation Army to Carry Out Military Action in the Event of a Regional Military Conflict" (PDF). U.S.-China Economic and Security Review Commission. Archived (PDF) from the original on 18 October 2020. Retrieved 5 November 2020.
- DiResta, Renée (20 July 2020). "Telling China's Story: The Chinese Communist Party's Campaign to Shape Global Narratives" (PDF). Stanford University; Hoover Institution. Archived (PDF) from the original on 20 July 2020. Retrieved 21 July 2020.
- A. Bitzinger, Richard (27 February 2018). "China's love affair with 'informatized warfare'". Asia Times. Archived from the original on 17 July 2021. Retrieved 5 November 2020.
- "China Military Power" (PDF). Defense Intelligence Agency. Archived from the original (PDF) on 11 May 2019. Retrieved 5 November 2020.
- Pufeng, Wang. "Chinese Information Warfare as released through the FAS".
- Mulvenon, James (1999). "The PLA and Information Warfare". In Mulvenon, James C.; Yang, Richard H. (eds.). The People's Liberation Army in the Information Age. RAND Corporation. doi:10.7249/cf145. ISBN 978-0-8330-2716-0.
- "INFORMATION WARFARE - Senior Colonel Wang Baocun and Li Fei". Federation of American Scientists. Archived from the original on 12 October 2022. Retrieved 28 January 2023.
- Anand, Vinod (October 2006). "Chinese Concepts and Capabilities of Information Warfare". Manohar Parrikar Institute for Defence Studies and Analyses. Archived from the original on 22 March 2023. Retrieved 28 January 2023.
- Sobiesk, Edward (5 April 2003). "Redefining the Role of Information Warfare in Chinese Strategy". SANS Institute. Archived from the original on 9 February 2023. Retrieved 28 January 2023.
- Ventre, Daniel (18 May 2010). "China's Strategy for Information Warfare: A Focus on Energy". Journal of Energy Security. Archived from the original on 5 October 2011. Retrieved 28 January 2023.
- Ferguson, MAJ Robyn E. (2002). Information Warfare with Chinese Characteristics: China's Future of Information Warfare and Strategic Culture Archived 12 April 2010 at the Wayback Machine. Masters Thesis, US Army Command and General Staff College, Fort Leavenworth, Kansas. (Accessed 23 April 2011).
- U.S. Department of Defense, Military Power of the People's Republic of China 2009 Archived 23 July 2015 at the Wayback Machine, Office of the Secretary of Defense, Washington, D.C. (Accessed 28 April 2011).
- Krekel, Bryan (16 October 2009). "Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation" (PDF). Prepared for The US-China Economic and Security Review Commission. Archived from the original (PDF) on 3 February 2011. Retrieved 3 March 2011.
- "Is China a military superpower?". CSIS China Power. 24 February 2016. Archived from the original on 20 September 2016. Retrieved 25 August 2016.
- Toshi Yoshihara, Chinese information warfare: a phantom menace or emerging threat? Archived 10 May 2011 at the Wayback Machine , Strategic Studies Institute, U.S. Army War College, Carlisle, PA, November 2001. ISBN 1-58487-074-5 (Accessed 23 April 2011)
- Wang, Vincent (1 January 2002). "Asymmetric War? Implications for China's Information Warfare Strategies". American Asian Review. 20: 167–207. Archived from the original on 21 July 2020. Retrieved 21 July 2020.
- LtCol Timothy L. Thomas, US Army, Retired, "47 China's Electronic Strategies" Archived 10 June 2011 at the Wayback Machine , Military Review, May–June 2001
- Niu Li, Li Jiangzhou, and Xu Dehui, "On Information Warfare Stratagems," Beijing Zhongguo Junshi Kexue, 12 January 2001, 115-22. Translated and downloaded from /f_049.htm FBIS[permanent dead link].
- Fritz, Jason R. (21 March 2017). China's Cyber Warfare: The Evolution of Strategic Doctrine. Lexington Books. p. 70. ISBN 978-1-4985-3708-7. Archived from the original on 25 May 2024. Retrieved 17 September 2020.
- Michael Pillsbury, ed., China Debates the Future Security Environment (Washington, D.C.: National Defense University Press, 2000), 293.
- Jackson, Smith; Beauchamp-Mustafaga, Nathan. "PLA Social Media Warfare and the Cognitive Domain". China Brief. Jamestown Foundation. Archived from the original on 29 September 2023. Retrieved 10 September 2023.
- Denyer, Simon (2016). "China's Scary Lesson To the World: Internet Censorship Works". The Washington Post. Archived from the original on 6 December 2018. Retrieved 3 September 2020.
- "Xi calls for 'cyber sovereignty'". BBC News. 16 December 2015. Archived from the original on 2 September 2020. Retrieved 3 September 2020.
- Beauchamp-Mustafaga, Nathan; Green, Kieran; Marcellino, William; Lilly, Sale; Smith, Jackson (1 October 2024). Dr. Li Bicheng, or How China Learned to Stop Worrying and Love Social Media Manipulation: Insights Into Chinese Use of Generative AI and Social Bots from the Career of a PLA Researcher. RAND Corporation. doi:10.7249/rra2679-1.
- Cook, Sarah. "Beijing Is Getting Better at Disinformation on Global Social Media". The Diplomat. The Diplomat. Archived from the original on 29 March 2021. Retrieved 29 March 2021.
Conclusively attributing inauthentic networks of social media accounts to Chinese party-state actors is exceedingly difficult, even when they are clearly promoting Beijing's preferred narratives or specific state-produced content.
- Cook, Sarah. "Welcome to the New Era of Chinese Government Disinformation". The Diplomat. Archived from the original on 29 March 2021. Retrieved 8 February 2021.
- Wong, Edward; Rosenberg, Matthew; Barnes, Julian E. (22 April 2020). "Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say". The New York Times. Archived from the original on 4 April 2021. Retrieved 8 February 2021.
As the messages have sown confusion, it has been difficult to trace their true origins or pin down all the ways in which they have been amplified.
- "Misleading a Pandemic: The Viral Effects of Chinese Propaganda and the Coronavirus". National Defense University Press. Retrieved 28 February 2025.
- "China Covid-19: How state media and censorship took on coronavirus". BBC. 29 December 2020. Retrieved 28 February 2025.
- Loftus, Peter (1 May 2020). "Chinese Communist Party Information Warfare: US–China Competition during the COVID-19 Pand". Air University (AU). Retrieved 28 February 2025.
- Creig, Jonathan (26 January 2023). "Google shut down thousands of pro-Beijing disinformation channels on Taiwan, COVID-19". The Record. Recorded Future. Archived from the original on 27 January 2023. Retrieved 27 January 2023.
- Cadell, Cate; Starks, Tim (24 July 2023). "Pro-China influence campaign infiltrates U.S. news websites". The Washington Post. Archived from the original on 16 December 2023. Retrieved 26 July 2023.
- Doshi, Rush (15 January 2020). "China Steps Up Its Information War in Taiwan". Foreign Affairs. Archived from the original on 6 October 2020. Retrieved 6 October 2020.
- Hung, Tzu-Chieh; Hung, Tzu-Wei (19 July 2022). "How China's Cognitive Warfare Works: A Frontline Perspective of Taiwan's Anti-Disinformation Wars". Journal of Global Security Studies. 7 (4). doi:10.1093/jogss/ogac016. ISSN 2057-3170.
- Prasso, Sheridan; Ellis, Samson (23 October 2019). "China's Information War on Taiwan Ramps Up as Election Nears". Bloomberg News. Archived from the original on 14 October 2020. Retrieved 6 October 2020.
- James C. Mulvenon. "Chinese Information Operations Strategies in a Taiwan Contingency" Archived 3 November 2011 at the Wayback Machine , 15 September 2005. (Accessed 20 March 2011).
- Li-chung, Chien (24 January 2022). "PRC targets Taiwan with new disinformation ploy". Taipei Times. Archived from the original on 23 January 2022. Retrieved 24 January 2022.
- "MJIB eyes China cash ahead of elections". Taipei Times. 20 November 2023. Archived from the original on 21 November 2023. Retrieved 21 November 2023.
- Tung, Roger (16 August 2022). "Taiwan accuses China of exaggeration with islands footage". Reuters. Archived from the original on 17 August 2022. Retrieved 17 August 2022.
- Martin Jones, David (2022). Prof. Edward Elgar Publishing. ISBN 978-1-80220-945-7.
- Maochan Yu, Miles (5 May 2021). "Beijing's Woke Propaganda War in America". Hoover Institution. Archived from the original on 5 May 2024. Retrieved 5 May 2024.
- Van Fleet, Xi (2023). Mao's America. Center Street (published October 2023). ISBN 9781546006329.
- "Report to Congress on Chinese Espionage Activities Against the United States". FBI/CIA. 12 December 1999. Archived from the original on 29 October 2013. Retrieved 15 November 2012.
- Cox, Christopher (1999). The Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China. Washington: U.S. G.P.O. OCLC 41428120. OL 17581519M. Archived from the original on 15 June 2020. Retrieved 15 June 2020.
- Tucker, Patrick (29 June 2022). "China's Disinformation Warriors May Be Coming for Your Company". Defense One. Archived from the original on 2 September 2023. Retrieved 2 September 2023.
- "Contagious Disruption: How CCP Influence and Radical Ideologies Threaten Critical Infrastructure and Campuses Across the United States". Network Contagion Research Institute. Archived from the original on 16 May 2024. Retrieved 21 May 2024.
- Wise, David (2011). Tiger Trap: America's Secret Spy War With China. Boston/New York: Houghton Mifflin Harcourt. pp. 38, 110. ISBN 978-0-547-55310-8. OCLC 746747564.
- America the Vulnerable: Are Foreign and Fraudulent Online Campaign Contributions Influencing U.S. Elections? (PDF). Government Accountability Institute. 26 September 2012. Archived (PDF) from the original on 10 October 2012. Retrieved 15 November 2012.
- Woodward, Bob; Brian Duffy (13 February 1997). "Chinese Embassy Role in Contributions Probed". The Washington Post. Archived from the original on 18 August 2018. Retrieved 8 September 2017.
- Woodward, Bob (25 April 1997). "FBI Links Top China Officials, U.S. Donations". The Washington Post. Archived from the original on 28 March 2017. Retrieved 20 February 2020.
- Johnston, David (12 May 1999). "Committee Told of Beijing Cash For Democrats". The New York Times. Archived from the original on 12 September 2017. Retrieved 18 February 2017.
- Paul, Katie (27 September 2022). "Meta says removes China-based propaganda operation targeting U.S. midterms". Reuters. Archived from the original on 6 October 2022. Retrieved 27 September 2022.
- Myers, Steven Lee (27 September 2022). "Meta Removes Chinese Effort to Influence U.S. Elections". The New York Times. Archived from the original on 6 October 2022. Retrieved 27 September 2022.
- Hsu, Tiffany; Myers, Steven Lee (1 April 2024). "China's Advancing Efforts to Influence the U.S. Election Raise Alarms". The New York Times. Archived from the original on 3 April 2024. Retrieved 1 April 2024.
- Langley, William; White, Edward (14 March 2022). "China backs Russian allegations about US biological weapons". Financial Times. Archived from the original on 10 December 2022. Retrieved 25 March 2022.
- McCarthy, Simone (10 March 2022). "China's promotion of Russian disinformation indicates where its loyalties lie". CNN. Archived from the original on 12 May 2022. Retrieved 24 March 2022.
- Goodwin, Bill (23 March 2022). "Chinese state media use Facebook to push pro-Russia disinformation on Ukraine war". Computer Weekly. Archived from the original on 24 March 2022. Retrieved 24 March 2022.
- Young, Oliver (11 March 2022). "Chinese State Media Reinforces Russian Disinformation About War in Ukraine". China Digital Times. Archived from the original on 18 March 2022. Retrieved 24 March 2022.
- Rising, David (11 March 2022). "China amplifies unsupported Russian claim of Ukraine biolabs". Associated Press. Archived from the original on 11 March 2022. Retrieved 11 March 2022.
- Mozur, Paul; Myers, Steven Lee; Liu, John (11 April 2022). "China's Echoes of Russia's Alternate Reality Intensify Around the World". The New York Times. Archived from the original on 20 May 2022. Retrieved 17 May 2022.
- Aisha, Majid (21 March 2022). "How China uses Facebook to promote disinformation about Ukraine". Press Gazette. Archived from the original on 7 November 2022. Retrieved 7 November 2022.
- Carey, Alexis (7 April 2022). "Chinese state media's shocking claim after evidence of Russian torture revealed". news.com.au. Archived from the original on 7 April 2022. Retrieved 6 June 2022.
- Bagchi, Indrani (13 August 2017). "Doklam standoff: China playing out its 'Three Warfares' strategy against India". The Times of India. Archived from the original on 12 November 2020. Retrieved 15 September 2020.
- Pandit, Rajat (20 July 2017). "China media claims major PLA build-up, India denies it". The Times of India. Archived from the original on 12 November 2020. Retrieved 17 April 2025.
- Winger, Gregory. "China's Disinformation Campaign in the Philippines". The Diplomat. Archived from the original on 9 October 2020. Retrieved 6 October 2020.
- "Operation Naval Gazing". Graphika. Archived from the original on 14 May 2024. Retrieved 1 June 2024.
- Conger, Kate (11 June 2020). "Twitter Removes Chinese Disinformation Campaign". The New York Times. Archived from the original on 14 June 2020. Retrieved 21 July 2020.
- Taylor, Josh (12 June 2020). "Twitter deletes 170,000 accounts linked to China influence campaign". The Guardian. Archived from the original on 14 June 2020. Retrieved 21 July 2020.
- "Twitter suspends 'China-backed accounts that spread propaganda'". Al Jazeera. Archived from the original on 13 June 2020. Retrieved 14 June 2020.
- Strong, Matthew (7 August 2020). "Google removes 2,500 China-linked YouTube channels". Taiwan News. Archived from the original on 24 August 2020. Retrieved 7 August 2020.
- "TAG Bulletin: Q2 2020". Google. 5 August 2020. Archived from the original on 20 May 2024. Retrieved 1 June 2024.
- "Pro-China influence campaign allegedly financed staged protests in Washington". therecord.media. Retrieved 22 April 2025.
- Lanzavecchia, Otto (7 February 2024). "Uncovering Paperwall, the "glocal" network of Chinese propaganda". Decode39. Retrieved 22 April 2025.
- Hanson, Russell; Grissom, Adam R.; Mouton, Christopher A. (14 March 2024). The Future of Indo-Pacific Information Warfare: Challenges and Prospects from the Rise of AI (Report). RAND Corporation.
- Hunter, Lance Y.; Albert, Craig D.; Rutland, Josh; Topping, Kristen; Hennigan, Christopher (2024). "Artificial intelligence and information warfare in major power states: how the US, China, and Russia are using artificial intelligence in their information warfare and influence operations". Defense & Security Analysis. 40 (2): 235–269. doi:10.1080/14751798.2024.2321736.
- Beauchamp-Mustafaga, Nathan (1 February 2024). Exploring the Implications of Generative AI for Chinese Military Cyber-Enabled Influence Operations: Chinese Military Strategies, Capabilities, and Intent (Report). RAND Corporation.
- "Misleading a Pandemic: The Viral Effects of Chinese Propaganda and the Coronavirus". National Defense University Press. Retrieved 28 February 2025.
- "China Covid-19: How state media and censorship took on coronavirus". BBC News. 29 December 2020. Retrieved 28 February 2025.
- "Finding the Right Model: The Joint Force, the People's Liberation Army, and Information Wa". Air University (United States Air Force). 24 April 2023. Retrieved 1 March 2025.
- "PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure". Cybersecurity and Infrastructure Security Agency. 7 February 2024. Retrieved 1 March 2025.
- Intelligence, Microsoft Threat (24 May 2023). "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques". Microsoft Security Blog. Retrieved 1 March 2025.
- Miller, Maggie (23 October 2024). "Influence campaigns from Iran, China, Russia ramping up ahead of elections, Microsoft finds". Politico. Retrieved 1 March 2025.
- Davidson, Helen (13 February 2024). "Explainer: what is Volt Typhoon and why is it the 'defining threat of our generation'?". The Guardian. Retrieved 1 March 2025.
- "Investigation by House Homeland, Select Committee on the CCP Finds Potential Chinese Threats to U.S. Port Infrastructure Security". United States House Committee on Homeland Security. Retrieved 2 March 2025.
- shandler (30 January 2023). "The 5×5—China's cyber operations". Atlantic Council. Retrieved 1 March 2025.
- "Is China's Huawei a Threat to U.S. National Security?". Council on Foreign Relations. Retrieved 20 April 2025.
- "NEW: Investigation by House Homeland, Select Committee on the CCP Finds Potential Chinese Threats to U.S. Port Infrastructure Security – Committee on Homeland Security". Retrieved 17 April 2025.
- "China's Cyber Capabilities and Their Implications for U.S. National Security" (PDF). U.S.-China Economic and Security Review Commission. November 2022.
- Ziemer, Henry; Bermudez Jr., Joseph S.; Jun, Jennifer (23 September 2024). "The Geopolitics of Port Security in the Americas". Center for Strategic and International Studies.
Author: www.NiNa.Az
Publication date:
wikipedia, wiki, book, books, library, article, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games, mobile, phone, android, ios, apple, mobile phone, samsung, iphone, xiomi, xiaomi, redmi, honor, oppo, nokia, sonya, mi, pc, web, computer
The People s Republic of China engages in information warfare through the People s Liberation Army PLA and other organizations affiliated or controlled by the Chinese Communist Party CCP Laid out in the Chinese Defence White Paper of 2008 informatized warfare includes the utilization of information based weapons and forces including battlefield management systems precision strike capabilities and technology assisted command and control C4ISR The term also refers to propaganda and influence operations efforts by the Chinese state Consequential Chinese information operations have been carried out to influence Taiwanese sovereignty U S elections and the Russian invasion of Ukraine China has also exploited artificial intelligence and increasingly complex communications structures to enhance their cyber warfare capabilities DefinitionsThe People s Liberation Army PLA defines the term informatization to describe the implementation of information technology in the digital age and as an evaluation criteria of its military modernization effort The Central Military Commission aims to transform PLA from conducting people s war to engage in warfare conditions of informatization which includes moving the military doctrine from weapon platform centric to cyber centric This may include algorithmically generated narratives AI coordinated social media accounts and targeted attacks on communications infrastructure The indicated characteristic of the cyber centric force is the utilization of network linkages data link among platforms Eric C Anderson and Jeffrey G Engstrom define informationization and informatized warfare in Chinese military doctrine as follows A t the operational level appears focused on providing an integrated platform for joint war zone command control communications computer intelligence surveillance and reconnaissance C4ISR connectivity and for peacetime command and control C2 within the PLA s Military Regions The United States Defense Intelligence Agency DIA defines China s informatized warfare as similar to U S military s concept of net centric capability which means the military s capability to use advanced information technology and communications systems to gain operational advantage over an adversary In 1995 the father of Chinese information warfare Major General Wang Pufeng wrote Information war is a crucial stage of high tech war At its heart are information technologies fusing intelligence war strategic war electronic war guided missile war a war of motorization jidong zhan a war of firepower huoli a total war It is a new type of warfare In two articles in the People s Liberation Army Daily of 13 and 20 June 1995 Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science noted several definitions They concluded We hold that information warfare has both narrow and broad meanings Information warfare in the narrow sense refers to the U S military s so called battlefield information warfare the crux of which is command and control warfare It is defined as the comprehensive use with intelligence support of military deception operational secrecy psychological warfare electronic warfare and substantive destruction to assault the enemy s whole information system including personnel and to disrupt the enemy s information flow in order to impact weaken and destroy the enemy s command and control capability while keeping one s own command and control capability from being affected by similar enemy actions They went on to state The essential substance of information warfare in the narrow sense is made up of five major elements and two general areas The five major elements are Substantive destruction the use of hard weapons to destroy enemy headquarters command posts and command and control C2 information centers Electronic warfare the use of electronic means of jamming or the use of antiradiation electromagnetic weapons to attack enemy information and intelligence collection systems such as communications and radar Military deception the use of operations such as tactical feints simulated attacks to shield or deceive enemy intelligence collection systems Operational secrecy the use of all means to maintain secrecy and keep the enemy from collecting intelligence on our operations Psychological warfare the use of TV radio and leaflets to undermine the enemy s military morale The two general areas are information protection defense and information attack offense Information defense means preventing the destruction of one s own information systems ensuring that these systems can perform their normal functions In future wars key information and information systems will become combat priorities the key targets of enemy attack Information offense means attacking enemy information systems Its aims are destroying or jamming enemy information sources to undermine or weaken enemy C amp C capability and cutting off the enemy s whole operational system The key targets of information offense are the enemy s combat command control and coordination intelligence and global information systems A successful information offensive requires three prerequisites 1 the capability to understand the enemy s information systems and the establishment of a corresponding database system 2 diverse and effective means of attack and 3 the capability to make battle damage assessments BDA of attacked targets Senior Colonel Wang Baocun and Li Fei of the Academy of Military Science Beijing 1995 A July 1998 conference held in San Diego sponsored jointly by the RAND Center for Asia Pacific Policy and the Taiwan based Chinese Council of Advanced Policy Studies brought together Chinese military experts to discuss the non hardware side of the People s Liberation Army s modernization In his presentation James C Mulvenon stated Chinese writings clearly suggest that IW is a solely military subject and as such they draw inspiration primarily from U S military writings The net result of this borrowing is that many PLA authors definitions of IW and IW concepts sound eerily familiar 175 186 In December 1999 Xie Guang the then Vice Minister of Science amp Technology and Industry for National Defence defined IW as IW in military sense means overall use of various types of information technologies equipment and systems particularly his command systems to shake determination of enemy s policy makers and at the same time the use of all the means possible to ensure that that one s own systems are not damaged or disturbed In a strategic analysis paper for the Indian Institute for Defence Studies and Analyses written in 2006 Vinod Anand examines the definitions of Chinese Information Warfare He notes that although Chinese understanding of IW was initially based on western concepts it has increasingly moved towards evolving its own orientation Background and characteristicsChina s interest in information warfare began after the United States victory in the first Gulf War 1990 1991 U S success was the result of information technologies and the total dominance it was able to provide in the battle space From that point forward the PLA began to seriously invest in and develop its own concepts of information warfare and what they mean to China As a result of technological advancement China has now entered an era where informationization can be applied to military domains China s 2004 White Paper on National Defense outlines the importance of informationization The PLA aiming at building an informationalised force and winning an information war deepens its reforms dedicates itself to innovation improves its quality and actively pushes forward the RMA with Chinese characteristics with informationalization at its core The U S Department of Defense s 2009 Annual Report to Congress on Military Power of the People s Republic of China defines local wars under conditions of informationization as high intensity and short duration fighting against high technology adversaries capable of fighting and winning short duration high intensity conflicts along its periphery against high tech adversaries Additionally local war under informationization is an effort which seeks to fully develop and link land air sea space and the electromagnetic spectrum into one system China s military strategy is focused on fighting and winning informationized local wars China s leadership has continuously stressed using asymmetric techniques to counter more powerful nations such as the United States and information warfare is a tool that the PLA uses to achieve their goals In a 2001 paper in the U S Military Review T L Thomas examines the writings of Major General Dai Qingmin Director of the PLA s Communications Department of the General Staff responsible for IW and IO Senior Colonel Wang Baocun of the PLA s Academy of Military Sciences and others on the ways that China is employing Electronic Strategies to realise the benefits of asymmetric warfare Thomas also summarises the April 2000 issue of the Chinese journal China Military Science which contains three articles on information warfare subjects The only article written in English The Current Revolution in Military Affairs and its Impact on Asia Pacific Security by Senior Colonel Wang Baocun presents a quite different approach to an article Wang Baocun wrote only three years previously where he presented a description of IW which contained the elements of Soviet Russian military science In the article On Information Warfare Strategies by Major General Niu Li Colonel Li Jiangzhou and Major Xu Dehui of the Communications and Command Institute the authors define IW stratagems as schemes and methods devised and used by commanders and commanding bodies to seize and maintain information supremacy on the basis of using clever methods to prevail at a relatively small cost in information warfare In 2003 the CCP approved the three warfares strategy for the PLA which involves using public opinion or media warfare psychological warfare and legal warfare lawfare While China has adopted the idea of information dominance its method for going about information dominance differs using ancient political warfare methods such as the Thirty Six Stratagems The PLA has also increasingly stressed an operational concept called cognitive domain operations On the defensive side China employs a combination of legal policies and information technology for censorship and surveillance of dissenters in a program called Golden Shield This is often referred to as the Great Firewall of China China promotes the idea of national cyber sovereignty which Xi Jinping has described as the avoidance of cyber hegemony and the idea that countries should respect each other s national security in cyberspace Information operationsThe PLA began developing social media influence operations in the mid 2010s and began employing them since at least 2018 according to RAND Corporation Pro China disinformation campaigns in 2021 showed greater sophistication compared to 2019 It has been difficult to attribute with certainty whether Chinese state actors are behind these actions COVID 19 Disinformation campaigns sought to downplay the emergence of COVID 19 in China and manipulate information about its spread around the world In 2020 the Chinese government created a social media campaign in response to online civilian outrage at the COVID 19 pandemic A look at Chinese controlled media would show how the government reportedly was able to efficiently contain the spread of the virus The Chinese government took measures such as silencing Li Wenliang the whistleblower doctor and many other journalists in order to maintain this image Outside of the country disinformation campaigns sought to downplay the emergence of COVID 19 in China and manipulate information about its spread around the world In January 2023 Google stated that it shut down more than 50 000 accounts promoting disinformation about COVID 19 Taiwan and U S politics The campaign is believed to be linked to Chinese public relations firm Shanghai Haixun Technology Co Haixun has planted pro Beijing stories in dozens of American news outlets online Taiwan The PRC seeks unification with Taiwan and uses information operations sometimes referred to as information war as an important part of that work Despite the large resource outlay the Chinese have been relatively ineffective in influencing the Taiwanese public According to James C Mulvenon rather than risk failure of a militarily forced unification which could lead to international recognition of the independence of Taiwan PRC leadership could potentially use computer network operations to undermine the will of Taiwan by attacking Taiwanese infrastructure In 2022 Taiwan s Ministry of Justice Investigation Bureau revealed that it had identified more than 400 social media accounts being used to push disinformation to Taiwanese citizens as part of Chinese content farms In 2023 the Investigation Bureau announced that it was monitoring for money laundering undertaken in an effort to finance election interference in Taiwan During the 2022 Chinese military exercises around Taiwan Taiwanese officials accused the PLA of engaging in information warfare with claims of military exercises close to Penghu United States The Chinese Communist Party CCP has been carrying out propaganda against the West since the 1960s spreading its ideology and creating division among the population Its foreign directed propaganda has been known to back far left political activists and radical feminism Using a variety of methods the PRC has recruited American agents of influence to advocate for Chinese interests in the United States While many of these agents of influence serve China unwittingly they can be very effective A 1999 Congressional report found that the Chinese Government continues to seek influence in Congress through various means including inviting Congressional members to visit the PRC lobbying ethnic Chinese voters and prominent U S citizens and engaging U S business interests to weigh in on issues of mutual concern China also uses its vast market as leverage in order to persuade American companies to lobby for Chinese interests This is especially true of companies that deal in high technology or dual use technology as there are significant export controls placed on such technology According to the 1999 Cox Report Executives wishing to do business in the PRC share a mutual commercial interest with the PRC in minimizing export controls on dual use and military related technologies The PRC has displayed a willingness to exploit this mutuality of interest in several notoriously public cases by inducing VIPs from large U S companies to lobby on behalf of initiatives such as export liberalization on which they are aligned with the PRC Chinese government information operations have also attempted to co opt local NIMBY sentiment to drive opposition against perceived economic threats such as the development projects that compete with the rare earth industry in China In 2024 Network Contagion reported that several member organizations of the pro Palestinian movement Shut It Down for Palestine SID4P are linked to what it calls the Singham Network under Neville Roy Singham who has close ties to the CCP according to Network Contagion The report accuses the Singham Network of stoking unrest at the grassroot level and amplifying the voice of SID4P and says that at least one member of SID4P has ties to extremist groups with anti American anti Israel and anti Jewish agendas U S elections Through its agents in America the PRC has financed a number of political candidates Katrina Leung a Chinese spy contributed 10 000 to the campaign of Richard Riordan the former mayor of Los Angeles When he lost his primary to Bill Simon Jr Leung contributed 4 200 to Simon s campaign At the direction of her Chinese handlers Leung also contributed to the 1992 campaign of George H W Bush It is estimated that Leung donated around 27 000 to politicians in the 1990s on behalf of the PRC A 2012 report by the Government Accountability Institute cites other examples It was discovered that officers from the Chinese Embassy in Washington D C sought to direct contributions from foreign sources to the Democratic National Committee before the 1996 presidential campaign While these allegations have been denied by the PRC Secret communications between Beijing and the Chinese Embassy in Washington establish that the influence buying plan was government sanctioned In 1996 People s Liberation Army intelligence officer Gen Ji Shengde provided Johnny Chung a fundraiser for the Democratic National Committee with 300 000 to donate towards President Bill Clinton s reelection Chung visited the White House over fifty times during the 1996 presidential campaign and was responsible for over 400 000 of contributions to the DNC In September 2022 Meta Platforms removed fake accounts linked to a China based influence operation ahead of the 2022 United States elections In the run up to the 2024 United States elections the Ministry of Public Security s Spamouflage influence operation was identified as having used fake social media accounts in an attempt to amplify divisions in US society Russian invasion of Ukraine During the Russian invasion of Ukraine state news agency Xinhua and other Chinese state media outlets paid for digital ads on Facebook amplifying pro Kremlin disinformation and propaganda after Meta Platforms banned Russian state media advertisement buys In March 2022 China Global Television Network repeated unsubstantiated Russian claims of biological weapons labs in Ukraine The CCP owned tabloid Global Times also echoed Russian state media claims that the Bucha massacre was staged 2017 China India border standoff The Times of India reported that during the 2017 Doklam standoff China used information operations against India Chinese state media asserted that the People s Liberation Army was preparing for combat by shifting substantial quantities of hardware and vehicles closer to Tibet s Sikkim frontier Indian officials however maintained that there had been no unsettling troop movements south of the Tsangpo River in Tibet Many analysts saw Beijing s reports as a deliberate psychological tactic designed to compel New Delhi to withdraw its forces from the Doklam Plateau in Bhutanese territory where soldiers from both sides had remained locked in a tense standoff for over a month Other regions In 2020 Facebook took down a network of inauthentic accounts that according to Graphika were attributed to individuals in China The information campaign focused on politics in Southeast Asia and was dubbed Operation Naval Gazing by security researchers Other platforms Social Media In June 2020 Twitter shut down 23 750 primary accounts and approximately 150 000 booster accounts which were being used by China to conduct an information operation aimed at boosting China s global position during the COVID 19 outbreak as well as attacking traditional targets such as Hong Kong pro democracy activists Guo Wengui and Taiwan Twitter said that the accounts had pushed deceptive narratives and spread propaganda In 2020 Google removed over 2 500 YouTube accounts linked to China Most of them uploaded spam like content unrelated to politics but a subset posted content primarily in Chinese about COVID 19 and racial protests in the United States Websites Chinese influence operations have been also observed as making use of large networks of websites mimicking local news outlets In 2022 the cybersecurity company Mandiant first exposed a network injecting pro Chinese narratives into American news outlets and even commissioning a live protest in Washington D C In February 2024 researchers at the Citizen Lab discovered an even larger set of websites posing as local news and inserting targeted attacks on individuals and organizations critical of the Chinese government into much larger volumes of content stolen from real local news outlets The network dubbed PAPERWALL remains active as of 2025 despite achieving virtually no traffic according to the researchers Artificial intelligence Emerging artificial intelligence AI models are quickly becoming an important part of states military and information strategies around the world AI enables a more rapid production of content targeted messaging and user analysis processes critical for effective disinformation campaigns As a result AI models shorten the cycle of propaganda dissemination allowing state actors to more quickly exploit vulnerabilities in other states information infrastructure AI capabilities are an increasingly significant factor in the effectiveness of influence operations carried out by major power states i e Russia the United States and China AI is already integrated into many of the processes of information warfare The Chinese Communist Party has harnessed generative AI to automate the creation of deceptive content including deep fake videos and synthetic news articles This information is disseminated by a large network of state controlled social media accounts that pose as authentic users These CCP linked accounts are also controlled and managed by AI Generative AI is used in this way to conduct online influence operations for both overt propaganda and covert psychological operations Throughout this process the CCP employs AI to continuously refine its messaging ensuring that disinformation efforts adapt to foreign countermeasures while continuing to align with domestic CCP narratives AI not only amplifies China s ability to shape public opinion at home and abroad but also poses significant challenges to adversaries attempting to counteract these influence campaigns Comparison to U S information operations The PRC s information warfare strategies such as the PLA s three warfares doctrine draw partial inspiration from Sun Tzu s The Art of War with its three pillars psychological warfare public opinion warfare and legal warfare closely aligned with Sun Tzu s principle of subduing the enemy without fighting China s approach places strong emphasis on shaping international narratives particularly through narrative warfare that invokes historical claims in East Asia At the same time the PRC also prioritizes managing domestic narratives and maintaining internal order and stability China has not only launched domestic campaigns to bolster nationalism among its citizens but also employs a robust surveillance and censorship apparatus to suppress dissent within its borders As for the United States information operations encompass a broad range of supporting activities including electronic warfare EW computer network operations CNO psychological operations PSYOP military deception MILDEC and operations security OPSEC As opposed to China which treats information warfare as a core part of their military strategy the U S views information operations primarily as a supporting element integrated within broader conventional military operations Further U S strategy is rather decentralized with these responsibilities spread across agencies like the Department of Defense State Department and intelligence community In contrast PLA doctrine emphasizes centralized command and control under a unified structure which integrates the political military and civilian spheres Unlike China which places an emphasis on employing information operations domestically the U S employs a primarily outward facing approach with little domestic narrative control due to legal and constitutional constraints including the Smith Mundt Act and First Amendment protections The U S targets foreign influence through efforts like the Global Engagement Center which counters disinformation campaigns from Russia and China This center has also worked to safeguard elections from foreign interference with Microsoft reporting attempts by Iranian Chinese and Russian actors to disrupt U S elections On the offensive side U S information operations are primarily used to deceive and subdue the enemy Historically this has entailed using techniques such as inflatable vehicles false radio transmissions airborne leaflets and sound effects More recently the U S has conducted operations like Operation Glowing Symphony 2016 2018 where Cyber Command hacked and disrupted ISIS s online platforms to erase digital propaganda and block recruitment efforts Cyber offensive capabilities In recent years China has developed a sophisticated set of cyber capabilities as part of their information warfare strategy The People s Liberation Army PLA and state backed units have devoted significant resources to developing resources to be prepared for future geopolitical conflicts China s cyber information warfare takes a unique approach that blends novel strategies with entrepreneurship The government is able to work with technology firms like Huawei to support their cyber initiatives Huawei s global presence would allow China to centralize a significant amount of communication data This partnership allows state agencies to leverage new artificial intelligence and surveillance tools while countries like the United States still keep a firm boundary between the public and private sector Non state actors transparent relationship with the government has allowed for numerous advantages in conflicts with foreign powers One recent example that illustrates their capabilities was a cyber campaign known as Volt Typhoon The campaign has gained access to key areas of critical United States infrastructure including power grids and communication networks Unlike information warfare tactics that disrupt operations temporarily Volt Typhoon focused on long term pre positioning for leverage in future conflicts By proxying its traffic through compromised devices Volt Typhoon is able to obtain credentials and maintain unauthorized access by blending in This shift towards a long term focus in China s information warfare strategy enables them to have significant control over communications infrastructure in future key scenarios China s emphasis on pre positioning reflects a broader strategy of maintaining covert access to provide a strategic advantage in the right time Infrastructure Economic Espionage In mid September 2024 the Committee on Homeland Security investigated rising threats to U S economic and homeland security posed by the Chinese Communist Party CCP particularly through its control over maritime infrastructure In particular the investigation highlighted the dominance of a state owned logistics corporation managed by the Chinese government Shanghai Zhenhua Heavy Industries ZPMC that controls nearly 80 percent of the cranes operating at U S ports In a statement from the Committee on Homeland Security website The evidence gathered during our joint investigation indicates that ZPMC could if desired serve as a Trojan horse capable of helping the CCP and the PRC military exploit and manipulate U S maritime equipment and technology at their request This vulnerability in our critical infrastructure has the potential to affect Americans from coast to coast ZPMC has repeatedly requested remote access to its cranes at various U S ports particularly those on the West Coast If granted this access could be extended to other PRC government entities as China s national security laws require full cooperation ZPMC s ascent to dominance is a direct result of strategic leveraging of cheap labor and steel to sell cranes at below market prices Rising concerns The U S China Economic and Security Review Commission is a legislative commission that prioritizes the assessment and monitoring of US China economic relations In 2022 the commission documented the expansion of China s influence beyond the physical domains of land air and sea into cyberspace the electromagnetic spectrum and more The commission also noted the potential for state sponsored cyber actors to utilize logistics infrastructure as potential targets In 2024 the Center for Strategic and International Studies an American think tank outlined major strategic risks associated with PRC control over global infrastructure According to the report PRC entities could gain access to sensitive data including the type quantity and origin of a good among other characteristics This intelligence would provide insights into global trade patterns allowing for potential modifications by Chinese governmental agencies See alsoChinese intelligence activity abroad List of cyber warfare forces Transnational repression by China State sponsored Internet propagandaReferences China s National Defense in 2008 PDF Federation of American Scientists Archived PDF from the original on 15 July 2021 Retrieved 5 November 2020 Dr Eric C Anderson Mr Jeffrey G Engstrom Capabilities of the Chinese People s Liberation Army to Carry Out Military Action in the Event of a Regional Military Conflict PDF U S China Economic and Security Review Commission Archived PDF from the original on 18 October 2020 Retrieved 5 November 2020 DiResta Renee 20 July 2020 Telling China s Story The Chinese Communist Party s Campaign to Shape Global Narratives PDF Stanford University Hoover Institution Archived PDF from the original on 20 July 2020 Retrieved 21 July 2020 A Bitzinger Richard 27 February 2018 China s love affair with informatized warfare Asia Times Archived from the original on 17 July 2021 Retrieved 5 November 2020 China Military Power PDF Defense Intelligence Agency Archived from the original PDF on 11 May 2019 Retrieved 5 November 2020 Pufeng Wang Chinese Information Warfare as released through the FAS Mulvenon James 1999 The PLA and Information Warfare In Mulvenon James C Yang Richard H eds The People s Liberation Army in the Information Age RAND Corporation doi 10 7249 cf145 ISBN 978 0 8330 2716 0 INFORMATION WARFARE Senior Colonel Wang Baocun and Li Fei Federation of American Scientists Archived from the original on 12 October 2022 Retrieved 28 January 2023 Anand Vinod October 2006 Chinese Concepts and Capabilities of Information Warfare Manohar Parrikar Institute for Defence Studies and Analyses Archived from the original on 22 March 2023 Retrieved 28 January 2023 Sobiesk Edward 5 April 2003 Redefining the Role of Information Warfare in Chinese Strategy SANS Institute Archived from the original on 9 February 2023 Retrieved 28 January 2023 Ventre Daniel 18 May 2010 China s Strategy for Information Warfare A Focus on Energy Journal of Energy Security Archived from the original on 5 October 2011 Retrieved 28 January 2023 Ferguson MAJ Robyn E 2002 Information Warfare with Chinese Characteristics China s Future of Information Warfare and Strategic Culture Archived 12 April 2010 at the Wayback Machine Masters Thesis US Army Command and General Staff College Fort Leavenworth Kansas Accessed 23 April 2011 U S Department of Defense Military Power of the People s Republic of China 2009 Archived 23 July 2015 at the Wayback Machine Office of the Secretary of Defense Washington D C Accessed 28 April 2011 Krekel Bryan 16 October 2009 Capability of the People s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation PDF Prepared for The US China Economic and Security Review Commission Archived from the original PDF on 3 February 2011 Retrieved 3 March 2011 Is China a military superpower CSIS China Power 24 February 2016 Archived from the original on 20 September 2016 Retrieved 25 August 2016 Toshi Yoshihara Chinese information warfare a phantom menace or emerging threat Archived 10 May 2011 at the Wayback Machine Strategic Studies Institute U S Army War College Carlisle PA November 2001 ISBN 1 58487 074 5 Accessed 23 April 2011 Wang Vincent 1 January 2002 Asymmetric War Implications for China s Information Warfare Strategies American Asian Review 20 167 207 Archived from the original on 21 July 2020 Retrieved 21 July 2020 LtCol Timothy L Thomas US Army Retired 47 China s Electronic Strategies Archived 10 June 2011 at the Wayback Machine Military Review May June 2001 Niu Li Li Jiangzhou and Xu Dehui On Information Warfare Stratagems Beijing Zhongguo Junshi Kexue 12 January 2001 115 22 Translated and downloaded from f 049 htm FBIS permanent dead link Fritz Jason R 21 March 2017 China s Cyber Warfare The Evolution of Strategic Doctrine Lexington Books p 70 ISBN 978 1 4985 3708 7 Archived from the original on 25 May 2024 Retrieved 17 September 2020 Michael Pillsbury ed China Debates the Future Security Environment Washington D C National Defense University Press 2000 293 Jackson Smith Beauchamp Mustafaga Nathan PLA Social Media Warfare and the Cognitive Domain China Brief Jamestown Foundation Archived from the original on 29 September 2023 Retrieved 10 September 2023 Denyer Simon 2016 China s Scary Lesson To the World Internet Censorship Works The Washington Post Archived from the original on 6 December 2018 Retrieved 3 September 2020 Xi calls for cyber sovereignty BBC News 16 December 2015 Archived from the original on 2 September 2020 Retrieved 3 September 2020 Beauchamp Mustafaga Nathan Green Kieran Marcellino William Lilly Sale Smith Jackson 1 October 2024 Dr Li Bicheng or How China Learned to Stop Worrying and Love Social Media Manipulation Insights Into Chinese Use of Generative AI and Social Bots from the Career of a PLA Researcher RAND Corporation doi 10 7249 rra2679 1 Cook Sarah Beijing Is Getting Better at Disinformation on Global Social Media The Diplomat The Diplomat Archived from the original on 29 March 2021 Retrieved 29 March 2021 Conclusively attributing inauthentic networks of social media accounts to Chinese party state actors is exceedingly difficult even when they are clearly promoting Beijing s preferred narratives or specific state produced content Cook Sarah Welcome to the New Era of Chinese Government Disinformation The Diplomat Archived from the original on 29 March 2021 Retrieved 8 February 2021 Wong Edward Rosenberg Matthew Barnes Julian E 22 April 2020 Chinese Agents Helped Spread Messages That Sowed Virus Panic in U S Officials Say The New York Times Archived from the original on 4 April 2021 Retrieved 8 February 2021 As the messages have sown confusion it has been difficult to trace their true origins or pin down all the ways in which they have been amplified Misleading a Pandemic The Viral Effects of Chinese Propaganda and the Coronavirus National Defense University Press Retrieved 28 February 2025 China Covid 19 How state media and censorship took on coronavirus BBC 29 December 2020 Retrieved 28 February 2025 Loftus Peter 1 May 2020 Chinese Communist Party Information Warfare US China Competition during the COVID 19 Pand Air University AU Retrieved 28 February 2025 Creig Jonathan 26 January 2023 Google shut down thousands of pro Beijing disinformation channels on Taiwan COVID 19 The Record Recorded Future Archived from the original on 27 January 2023 Retrieved 27 January 2023 Cadell Cate Starks Tim 24 July 2023 Pro China influence campaign infiltrates U S news websites The Washington Post Archived from the original on 16 December 2023 Retrieved 26 July 2023 Doshi Rush 15 January 2020 China Steps Up Its Information War in Taiwan Foreign Affairs Archived from the original on 6 October 2020 Retrieved 6 October 2020 Hung Tzu Chieh Hung Tzu Wei 19 July 2022 How China s Cognitive Warfare Works A Frontline Perspective of Taiwan s Anti Disinformation Wars Journal of Global Security Studies 7 4 doi 10 1093 jogss ogac016 ISSN 2057 3170 Prasso Sheridan Ellis Samson 23 October 2019 China s Information War on Taiwan Ramps Up as Election Nears Bloomberg News Archived from the original on 14 October 2020 Retrieved 6 October 2020 James C Mulvenon Chinese Information Operations Strategies in a Taiwan Contingency Archived 3 November 2011 at the Wayback Machine 15 September 2005 Accessed 20 March 2011 Li chung Chien 24 January 2022 PRC targets Taiwan with new disinformation ploy Taipei Times Archived from the original on 23 January 2022 Retrieved 24 January 2022 MJIB eyes China cash ahead of elections Taipei Times 20 November 2023 Archived from the original on 21 November 2023 Retrieved 21 November 2023 Tung Roger 16 August 2022 Taiwan accuses China of exaggeration with islands footage Reuters Archived from the original on 17 August 2022 Retrieved 17 August 2022 Martin Jones David 2022 Prof Edward Elgar Publishing ISBN 978 1 80220 945 7 Maochan Yu Miles 5 May 2021 Beijing s Woke Propaganda War in America Hoover Institution Archived from the original on 5 May 2024 Retrieved 5 May 2024 Van Fleet Xi 2023 Mao s America Center Street published October 2023 ISBN 9781546006329 Report to Congress on Chinese Espionage Activities Against the United States FBI CIA 12 December 1999 Archived from the original on 29 October 2013 Retrieved 15 November 2012 Cox Christopher 1999 The Report of the Select Committee on U S National Security and Military Commercial Concerns with the People s Republic of China Washington U S G P O OCLC 41428120 OL 17581519M Archived from the original on 15 June 2020 Retrieved 15 June 2020 Tucker Patrick 29 June 2022 China s Disinformation Warriors May Be Coming for Your Company Defense One Archived from the original on 2 September 2023 Retrieved 2 September 2023 Contagious Disruption How CCP Influence and Radical Ideologies Threaten Critical Infrastructure and Campuses Across the United States Network Contagion Research Institute Archived from the original on 16 May 2024 Retrieved 21 May 2024 Wise David 2011 Tiger Trap America s Secret Spy War With China Boston New York Houghton Mifflin Harcourt pp 38 110 ISBN 978 0 547 55310 8 OCLC 746747564 America the Vulnerable Are Foreign and Fraudulent Online Campaign Contributions Influencing U S Elections PDF Government Accountability Institute 26 September 2012 Archived PDF from the original on 10 October 2012 Retrieved 15 November 2012 Woodward Bob Brian Duffy 13 February 1997 Chinese Embassy Role in Contributions Probed The Washington Post Archived from the original on 18 August 2018 Retrieved 8 September 2017 Woodward Bob 25 April 1997 FBI Links Top China Officials U S Donations The Washington Post Archived from the original on 28 March 2017 Retrieved 20 February 2020 Johnston David 12 May 1999 Committee Told of Beijing Cash For Democrats The New York Times Archived from the original on 12 September 2017 Retrieved 18 February 2017 Paul Katie 27 September 2022 Meta says removes China based propaganda operation targeting U S midterms Reuters Archived from the original on 6 October 2022 Retrieved 27 September 2022 Myers Steven Lee 27 September 2022 Meta Removes Chinese Effort to Influence U S Elections The New York Times Archived from the original on 6 October 2022 Retrieved 27 September 2022 Hsu Tiffany Myers Steven Lee 1 April 2024 China s Advancing Efforts to Influence the U S Election Raise Alarms The New York Times Archived from the original on 3 April 2024 Retrieved 1 April 2024 Langley William White Edward 14 March 2022 China backs Russian allegations about US biological weapons Financial Times Archived from the original on 10 December 2022 Retrieved 25 March 2022 McCarthy Simone 10 March 2022 China s promotion of Russian disinformation indicates where its loyalties lie CNN Archived from the original on 12 May 2022 Retrieved 24 March 2022 Goodwin Bill 23 March 2022 Chinese state media use Facebook to push pro Russia disinformation on Ukraine war Computer Weekly Archived from the original on 24 March 2022 Retrieved 24 March 2022 Young Oliver 11 March 2022 Chinese State Media Reinforces Russian Disinformation About War in Ukraine China Digital Times Archived from the original on 18 March 2022 Retrieved 24 March 2022 Rising David 11 March 2022 China amplifies unsupported Russian claim of Ukraine biolabs Associated Press Archived from the original on 11 March 2022 Retrieved 11 March 2022 Mozur Paul Myers Steven Lee Liu John 11 April 2022 China s Echoes of Russia s Alternate Reality Intensify Around the World The New York Times Archived from the original on 20 May 2022 Retrieved 17 May 2022 Aisha Majid 21 March 2022 How China uses Facebook to promote disinformation about Ukraine Press Gazette Archived from the original on 7 November 2022 Retrieved 7 November 2022 Carey Alexis 7 April 2022 Chinese state media s shocking claim after evidence of Russian torture revealed news com au Archived from the original on 7 April 2022 Retrieved 6 June 2022 Bagchi Indrani 13 August 2017 Doklam standoff China playing out its Three Warfares strategy against India The Times of India Archived from the original on 12 November 2020 Retrieved 15 September 2020 Pandit Rajat 20 July 2017 China media claims major PLA build up India denies it The Times of India Archived from the original on 12 November 2020 Retrieved 17 April 2025 Winger Gregory China s Disinformation Campaign in the Philippines The Diplomat Archived from the original on 9 October 2020 Retrieved 6 October 2020 Operation Naval Gazing Graphika Archived from the original on 14 May 2024 Retrieved 1 June 2024 Conger Kate 11 June 2020 Twitter Removes Chinese Disinformation Campaign The New York Times Archived from the original on 14 June 2020 Retrieved 21 July 2020 Taylor Josh 12 June 2020 Twitter deletes 170 000 accounts linked to China influence campaign The Guardian Archived from the original on 14 June 2020 Retrieved 21 July 2020 Twitter suspends China backed accounts that spread propaganda Al Jazeera Archived from the original on 13 June 2020 Retrieved 14 June 2020 Strong Matthew 7 August 2020 Google removes 2 500 China linked YouTube channels Taiwan News Archived from the original on 24 August 2020 Retrieved 7 August 2020 TAG Bulletin Q2 2020 Google 5 August 2020 Archived from the original on 20 May 2024 Retrieved 1 June 2024 Pro China influence campaign allegedly financed staged protests in Washington therecord media Retrieved 22 April 2025 Lanzavecchia Otto 7 February 2024 Uncovering Paperwall the glocal network of Chinese propaganda Decode39 Retrieved 22 April 2025 Hanson Russell Grissom Adam R Mouton Christopher A 14 March 2024 The Future of Indo Pacific Information Warfare Challenges and Prospects from the Rise of AI Report RAND Corporation Hunter Lance Y Albert Craig D Rutland Josh Topping Kristen Hennigan Christopher 2024 Artificial intelligence and information warfare in major power states how the US China and Russia are using artificial intelligence in their information warfare and influence operations Defense amp Security Analysis 40 2 235 269 doi 10 1080 14751798 2024 2321736 Beauchamp Mustafaga Nathan 1 February 2024 Exploring the Implications of Generative AI for Chinese Military Cyber Enabled Influence Operations Chinese Military Strategies Capabilities and Intent Report RAND Corporation Misleading a Pandemic The Viral Effects of Chinese Propaganda and the Coronavirus National Defense University Press Retrieved 28 February 2025 China Covid 19 How state media and censorship took on coronavirus BBC News 29 December 2020 Retrieved 28 February 2025 Finding the Right Model The Joint Force the People s Liberation Army and Information Wa Air University United States Air Force 24 April 2023 Retrieved 1 March 2025 PRC State Sponsored Actors Compromise and Maintain Persistent Access to U S Critical Infrastructure Cybersecurity and Infrastructure Security Agency 7 February 2024 Retrieved 1 March 2025 Intelligence Microsoft Threat 24 May 2023 Volt Typhoon targets US critical infrastructure with living off the land techniques Microsoft Security Blog Retrieved 1 March 2025 Miller Maggie 23 October 2024 Influence campaigns from Iran China Russia ramping up ahead of elections Microsoft finds Politico Retrieved 1 March 2025 Davidson Helen 13 February 2024 Explainer what is Volt Typhoon and why is it the defining threat of our generation The Guardian Retrieved 1 March 2025 Investigation by House Homeland Select Committee on the CCP Finds Potential Chinese Threats to U S Port Infrastructure Security United States House Committee on Homeland Security Retrieved 2 March 2025 shandler 30 January 2023 The 5 5 China s cyber operations Atlantic Council Retrieved 1 March 2025 Is China s Huawei a Threat to U S National Security Council on Foreign Relations Retrieved 20 April 2025 NEW Investigation by House Homeland Select Committee on the CCP Finds Potential Chinese Threats to U S Port Infrastructure Security Committee on Homeland Security Retrieved 17 April 2025 China s Cyber Capabilities and Their Implications for U S National Security PDF U S China Economic and Security Review Commission November 2022 Ziemer Henry Bermudez Jr Joseph S Jun Jennifer 23 September 2024 The Geopolitics of Port Security in the Americas Center for Strategic and International Studies