jump to navigation

“The War God’s Face has Become Indistinct”- Updated Whitepaper on Unrestricted Warfare October 21, 2025

Posted by Chris Mark in Uncategorized.
Tags: , , , , ,
add a comment

I recently updated and republished a paper on Unlimited or Unrestricted Warfare Doctrine against the US. I first wrote on this in 2013 for The Counter Terrorist Magazine and have been keeping the concept updated. Here is a summary…:

Read the Whitepaper Here!

“This comprehensive assessment examines the implementation of China’s unrestricted warfare doctrine against the United States from 2020-2025. Developed by PLA Colonels Qiao Liang and Wang Xiangsui following the 1991 Gulf War, unrestricted warfare represents a paradigm shift from conventional military confrontation to asymmetric operations across multiple domains.

This study analyzes documented Chinese operations including: Volt Typhoon’s five-year penetration of critical infrastructure systems; Salt Typhoon’s compromise of nine major U.S. telecommunications companies affecting over one million users; systematic academic infiltration through Confucius Institutes and intellectual property theft costing an estimated $500 billion annually; congressional penetration operations targeting rising political figures and senior officials; and state-level influence campaigns exemplified by the Linda Sun case.

The analysis demonstrates how China employs cyber operations, political influence, academic exploitation, and infrastructure pre-positioning to achieve strategic objectives while avoiding direct military confrontation. Drawing on government reports, intelligence assessments, and primary source materials, this work examines the doctrine’s principles of asymmetry, omnidirectionality, and minimal consumption as manifested in contemporary operations. The study concludes that unrestricted warfare represents a coherent strategic framework specifically designed to neutralize American conventional military advantages by exploiting vulnerabilities in open democratic societies.”

Chinese Cyber Attacks and Unrestricted Warfare February 1, 2024

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , ,
add a comment

I first wrote about this phenomenon in 2012. It is becoming reality. The recent cyber-attacks attributed to the Chinese government on American infrastructure can be analyzed within the conceptual framework of “unrestricted warfare,” a doctrine developed by two PLA Colonels, Qiao Liang and Wang Xiangsui, in response to the perceived military superiority of the United States. This doctrine signifies a strategic shift from traditional, kinetic warfare to a multifaceted approach incorporating a broad spectrum of tactics including economic, political, and PR maneuvers to conduct ‘sub wars’ and ‘pseudo wars’.

At the core of unrestricted warfare is the recognition that the principles of war have evolved. As the authors state, “If we acknowledge that the new principles of war are no longer ‘using armed force to compel the enemy to submit to one’s will,’ but rather are ‘using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests’”[1]. This perspective broadens the scope of warfare to encompass non-traditional methods such as economic manipulation, cyber-attacks, and disinformation campaigns, transcending the conventional battlefield.

The Chinese cyber-attacks on the U.S. infrastructure, as reported in the aforementioned sources, align with this doctrine. These attacks represent a strategic choice to exploit vulnerabilities in critical systems to cause disruption and potential societal panic, without resorting to open military confrontation. This approach fits into the broader pattern of asymmetric threats.

Asymmetric threats, characterized by a disparity in the means and methods between different adversaries, are further defined by three criteria: the involvement of a tactic that one adversary could and would use against another, the unique ability or willingness of the adversary to use such means, and the potential for serious consequences if these means are not countered. In the cybersecurity realm, these threats take on a significant role. A minor actor with basic hacking tools can compel major entities to invest heavily in defense, illustrating the asymmetry in resources and efforts between attackers and defenders.

The Chinese strategy, as evidenced by the cyber-attacks, meets these criteria of asymmetric warfare. It involves tactics that the Chinese government is capable and willing to employ, which the U.S. would not mirror. The potential consequences of these attacks are severe, necessitating significant defensive measures.

Further aligning with the principles of unrestricted warfare, the authors note that unconventional methods can be formidable weapons in modern conflict. They observe, “As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons”[2]. This recognition of non-traditional tactics as weapons underscores the expanded battlefield that now includes economic, political, and technological realms.

In conclusion, the Chinese cyber-attacks on U.S. infrastructure, as part of their broader strategic approach, are indicative of the principles of unrestricted warfare. They represent a calculated move to use asymmetric tactics to undermine U.S. strengths and exploit vulnerabilities, extending the battlefield into the cyber realm. This strategy exemplifies a modern approach to warfare, where the lines between military and non-military means are blurred, and the battleground extends into multiple domains.

Loading the Elevenlabs Text to Speech AudioNative Player…


References:

  1. Qiao Liang and Wang Xiangsui, “Unrestricted Warfare.”
  2. Ibid.

Covid19: “The War God’s Face Has Become Indistinct” – China’s Unlimited Warfare Strategy April 14, 2020

Posted by Chris Mark in cybersecurity, Risk & Risk Management, terrorism.
Tags: , , , , , , , , , ,
add a comment

CT2013UPDATE-  Today (April 15, 2020) Fox News published an article supporting what has been proposed in this post.  Titled“Sources believe coronavirus originated in Wuhan lab as part of China’s efforts to compete with US the article lays out compelling evidence that China was attempting demonstrate that China’s “…efforts to identify and combat viruses are equal too or greater than capabilities of the United States.” The article states that evidence comes from classified, and open source sources and documents.  It further states that:

“…(China) blaming the wet market was an effort by China to deflect blame from the laboratory, along with China’s propaganda efforts targetting the US and Italy.”

For those who have not read Unrestricted Warfare referenced in this post, I would strongly suggest you consider reading.  The Fox News article is directly in line with China’s 1999 strategy of unlimited warfare against the US and European countries.

In 2013, I wrote an article for The Counter Terrorist  Magazine that identified the Chinese strategy of CyberWarfare. You can read the article here.

This followed a seperate article I wrote for the same magazine called “CyberEspionage” that identified China’s efforts to infiltrate the US.  Both identify the Chinese focus on unlimited warfare discussed below.ctmay2012

Today, while reading the news, I came across an article that stated that stated that the US State Department cables (read CIA and Intelligence) has stated that the Covid19 Virus may have originated the Wuhan Viral Lab (WVL) who were testing the Coronavirus in bats.  According to the Washington Post:

“As many have pointed out, there is no evidence that the virus now plaguing the world was engineered; scientists largely agree it came from animals. But that is not the same as saying it didn’t come from the lab, which spent years testing bat coronaviruses in animals, said Xiao Qiang, a research scientist at the School of Information at the University of California at Berkeley.”

No “Evidence” is distinctly different than “They did not do it”.  Keep in mind that in February, 2020, the US Government charged 4 Chinese Military members with the 2017 Equifax breach.

The question should be: “why would the Chinese launch viruses (if they did) and why would they hack US companies?”  The answer is actually pretty straightforward.   If you read the article from 2012, you will get much more information than in this blog post.

In 1990 the US engaged the Iraqi military in the Gulf War.  The Russians (then Soviets) tankmedinaand Chinese watched closely as the US went literally “toe to toe” with the World’s 5th largest standing Army (Iraqi).  96 hours later, the Iraqi Army was soundly defeated.  In particular was the Battle of Medina Ridge (also called the Battle of 73 Easting) fought on Feb 27, 1991. It was an absolute route. This convinced the Chinese that a “linear/kinetic war” with the US was unwinnable.

For this reason they embarked upon a new policy called “Unlimited/Unrestricted warfare”.

This is documented in the book called Unrestricted Warfare.  In first reading the document, I was shocked at what it contained.  In 1999, two Chinese Peoples’ Liberation Army (PLA) Colonels were tasked to write a document titled: Unrestricted Warfare that outlines China’s approach to war with the West.   In short, the document articulates a new definition of warfare that includes using all economic, political, and PR means to fight ‘sub wars’ and ‘pseudo wars’.

While we sit in the US laboring under our definition of warfare, our adversaries are redefining the battlespace.  Here are some quotes from the document:

“If we acknowledge that the new principles of war are no longer “using armed force to compel the enemy to submit to one’s will,” but rather are “using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests.”[i]

“As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons.”[i]

In short, the Chinese manipulating currency, or the press or even paying a Harvard Professor to be an agent can arguably be considered a ‘pseudo war’ consistent with their strategy of unlimited warfare.  As more information becomes available, I would not be surprised to see that this is much more than an “accident” in a lab in Wuhan.  Look at the financial toll it has taken on the World and positions the Chinese to be much larger players.


[i] House of Representatives. (Kindle Locations 325-327). Kindle Edition.

 


[i] Wiangsui Qiao Liang and Wang. Unrestricted warfare. Beijing: PLA Literature and Arts Publishing House; 1999.

超限战 – “Warfare without Bounds”; China’s Hacking of the US February 24, 2020

Posted by Chris Mark in cyberespionage, cybersecurity, Politics, weapons and tactics.
Tags: , , , , , , , , ,
add a comment

Unconditional_warfare

“Pleased to meet you…hope you guessed my name…But what’s puzzling you is the nature of my game.”
– The Rolling Stones; Sympathy for the Devil

UPDATE:  On Feb 10, 2020 The US Government charged 4 Chinese Military Officers with hacking in the 2017 Equifax breach.  On January 28th, the FBI arrested a Harvard professor of lying about ties to a Chinese recruitment effort and receiving payment from the US Government.  The attacks, subterfuge and efforts continue against the US.  Why?  Read the original post form 2016 and learn about Unlimited Warfare.

Original post from 2016: More recently, the With the recent US Government’s acknowledgement of China’s hacking of numerous government websites and networks, many are likely wondering why China would have an interest in stealing employee data?  To answer this question, we need to look back at the 1991 Gulf War. You can read my 2013 Article (WorldCyberwar) in the Counter Terrorist Magazine on this subject.

In 1991, a coalition led by the United States invaded Iraq in defense of Kuwait.  At the time Iraq had the 5th largest standing army in the world.  The US led coalition defeated the Iraqi army in resounding fashion in only 96 hours.  For those in the United States the victory was impressive but the average American civilian did not have an appreciation for how this victory was accomplished.

The Gulf War was the first real use of what is known as C4I.  In short, C4I is an acronym for Command, Control, Communications, Computers, and Intelligence. The Gulf War was the first use of a new technology known as Global Positioning Systems (GPS).  The Battle of Medina Ridge was a decisive tank battle in Iraq fought on February 26, 1991 and the first to use GPS.  In this 40 minute battle, the US 1st Armored Division fought the 2nd Brigade of the Iraqi Republican Guard and won decisively. While the US lost 4 tanks and had 2 people killed, the Iraqis suffered a loss of 186 tanks, 127 Infantry Fighting Vehicles and 839 soldiers captured.  The Chinese watched the Gulf War closely and came away with an understanding that a conventional ‘linear’ war against the United States was unwinnable.

After the Gulf War the Chinese People’s Liberation Army tasked two PLA colonels (Qiao Liang and Wang Xiangsui) with redefining the concept of warfare.  From this effort came a new model of Warfare that is published in the book “Unrestricted Warfare” or “Warfare without Bounds”.  Unrestricted Warfare is just what it sound like.  The idea that ‘pseudo-wars’ can be fought against an enemy.  Information warfare, PR efforts and other tactics are used to undermine and enemy without engaging in kinetic, linear battle.  Below is a quote from the book:

“If we acknowledge that the new principles of war are no longer “using armed force to compel the enemy to submit to one’s will,” but rather are “using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests.”

“As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons.”

It further stated: “… a single rumor or scandal that results in fluctuation in the enemy country’s exchange rates…can be included in the ranks of new concept weapons.”

On April 15, 2011, the US Congressional Subcommittee on Oversight and Investigations conducted a hearing on Chinese cyber-espionage. The hearing revealed the US government’s awareness of Chinese cyberattacks. In describing the situation in his opening remarks, subcommittee chairperman Dana Rohrbacher* astutely stated:

“[The]United States is under attack.”

“The Communist Chinese Government has defined us as the enemy. It is buying, building and stealing whatever it takes to contain and destroy us. Again, the Chinese Government has defined us as the enemy.”

Given the Chinese perspective on Unlimited Warfare, it becomes much more clear that what we are seeing with the compromises are examples of ‘pseudo wars’ being fought by the Chinese.  It will be interesting to see how or if the US responds.

*thank you to the reader who corrected my referencing Mr. Rohrbacher as a female.  My apologies to Chairman Rohrbacher!

“The United States is Under Attack” – CyberWar Article May 23, 2016

Posted by Chris Mark in cyberespionage, cybersecurity, Uncategorized.
Tags: , , , , , ,
add a comment

CT2013The title was a comment made in 2011 by the US House of Representatives.

In cleaning out my house for an impending move I found a copy of The Counter Terorist Magazine for which I had written an article in 2013 titled “CyberWar”.While the article is 3 years old, it still provides some valuable information and valuable lessons on the current state of Cyber War.   The US Congress has has several sessions and working groups to discuss “The Chinese Problem” related to cyber espionage and Cyber War.  You can learn more by reading my article!