jump to navigation

Covid19: “The War God’s Face Has Become Indistinct” – China’s Unlimited Warfare Strategy April 14, 2020

Posted by Chris Mark in cybersecurity, Risk & Risk Management, terrorism.
Tags: , , , , , , , , , ,
add a comment

CT2013UPDATE-  Today (April 15, 2020) Fox News published an article supporting what has been proposed in this post.  Titled“Sources believe coronavirus originated in Wuhan lab as part of China’s efforts to compete with US the article lays out compelling evidence that China was attempting demonstrate that China’s “…efforts to identify and combat viruses are equal too or greater than capabilities of the United States.” The article states that evidence comes from classified, and open source sources and documents.  It further states that:

“…(China) blaming the wet market was an effort by China to deflect blame from the laboratory, along with China’s propaganda efforts targetting the US and Italy.”

For those who have not read Unrestricted Warfare referenced in this post, I would strongly suggest you consider reading.  The Fox News article is directly in line with China’s 1999 strategy of unlimited warfare against the US and European countries.

In 2013, I wrote an article for The Counter Terrorist  Magazine that identified the Chinese strategy of CyberWarfare. You can read the article here.

This followed a seperate article I wrote for the same magazine called “CyberEspionage” that identified China’s efforts to infiltrate the US.  Both identify the Chinese focus on unlimited warfare discussed below.ctmay2012

Today, while reading the news, I came across an article that stated that stated that the US State Department cables (read CIA and Intelligence) has stated that the Covid19 Virus may have originated the Wuhan Viral Lab (WVL) who were testing the Coronavirus in bats.  According to the Washington Post:

“As many have pointed out, there is no evidence that the virus now plaguing the world was engineered; scientists largely agree it came from animals. But that is not the same as saying it didn’t come from the lab, which spent years testing bat coronaviruses in animals, said Xiao Qiang, a research scientist at the School of Information at the University of California at Berkeley.”

No “Evidence” is distinctly different than “They did not do it”.  Keep in mind that in February, 2020, the US Government charged 4 Chinese Military members with the 2017 Equifax breach.

The question should be: “why would the Chinese launch viruses (if they did) and why would they hack US companies?”  The answer is actually pretty straightforward.   If you read the article from 2012, you will get much more information than in this blog post.

In 1990 the US engaged the Iraqi military in the Gulf War.  The Russians (then Soviets) tankmedinaand Chinese watched closely as the US went literally “toe to toe” with the World’s 5th largest standing Army (Iraqi).  96 hours later, the Iraqi Army was soundly defeated.  In particular was the Battle of Medina Ridge (also called the Battle of 73 Easting) fought on Feb 27, 1991. It was an absolute route. This convinced the Chinese that a “linear/kinetic war” with the US was unwinnable.

For this reason they embarked upon a new policy called “Unlimited/Unrestricted warfare”.

This is documented in the book called Unrestricted Warfare.  In first reading the document, I was shocked at what it contained.  In 1999, two Chinese Peoples’ Liberation Army (PLA) Colonels were tasked to write a document titled: Unrestricted Warfare that outlines China’s approach to war with the West.   In short, the document articulates a new definition of warfare that includes using all economic, political, and PR means to fight ‘sub wars’ and ‘pseudo wars’.

While we sit in the US laboring under our definition of warfare, our adversaries are redefining the battlespace.  Here are some quotes from the document:

“If we acknowledge that the new principles of war are no longer “using armed force to compel the enemy to submit to one’s will,” but rather are “using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests.”[i]

“As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons.”[i]

In short, the Chinese manipulating currency, or the press or even paying a Harvard Professor to be an agent can arguably be considered a ‘pseudo war’ consistent with their strategy of unlimited warfare.  As more information becomes available, I would not be surprised to see that this is much more than an “accident” in a lab in Wuhan.  Look at the financial toll it has taken on the World and positions the Chinese to be much larger players.


[i] House of Representatives. (Kindle Locations 325-327). Kindle Edition.

 


[i] Wiangsui Qiao Liang and Wang. Unrestricted warfare. Beijing: PLA Literature and Arts Publishing House; 1999.

Dr. Janina Dallas Bans Army Vet Parent from Daughter’s School November 5, 2013

Posted by Chris Mark in Uncategorized.
Tags: , , , , , ,
1 comment so far

DallasPrincipalAs a Marine and Navy veteran who supports the 2nd Amendment, I am particularly disturbed by this story.  Dr. Janina Dallas, who is principal McBean Elementary School in Georgia, has banned a student’s mother from the school because the mother is 1) an Army vet and 2) has a concealed weapons permit.  According to news reports, the Principal said that she was ‘scared’ of the parent for the reasons above and actually had a ‘no trespassing order’ filed against the mother.  It is beyond the pale to believe that a principal who was named the “high performance principal” by the Georgia DOE would take such actions against a law abiding citizen and a veteran.  SHAME on the school and SHAME on Ms. Dallas!   You can email Ms. Dallas directly here: dallaja@rcboe.org or call the school and voice your opinion by calling this number: 706-592-3723

“Does an F1 Car = F1 Racer? OR Does a Bullet = Sniper?” NO – Expertise ain’t about technology July 19, 2012

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
add a comment

I was reading a story today on Foxnews titled: “could guided bullets turn an average joe into a sniper?”  The article is written by a former ballerina turned “defense specialist” (I didn’t make that up).  I have written about this subject before in “The Carpenter Not The Hammer Builds the House”.  In short, her article suggests that new, more accurate bullets could turn an “average joe” into a sniper.  The referenced article on bullets demonstrates several major flaws in thinking about security or defense.  First, it quotes a “specialist” who has no specialized knowledge of the subject gained through actual experience.  I am not doubting that Ms. Barrie has read some great books and attended great lectures but the fact remains that without real world experience, it is difficult to understand how she is qualified to speak on the subject at hand.  We see this in many areas of security from information to physical and so on.  The second issue is one I see every day.  It is the mistaken belief that the technology makes the expert.  It discounts the knowledge, training and practice required to use the ‘tool’ with effect.  If I were to buy a Formula 1 racecar would I suddenly be considered a ‘racer’?  A more accurate rifle does not make a sniper…it simply makes a sniper more accurate.  Within information security we see the same flawed logic.  Companies believe that by purchasing the latest and greatest technology they can replace expertise gained through years of work ‘in the trenches’.  A leading application layer firewall is only as effective as the person deploying, configuring and managing the device.  The moral of the story?  Technology makes experts more effective they do not create or establish expertise. BTW: the picture is a Canadian Sea Marshal Tactical Team (CSMTT) sniper on a ship.

%d bloggers like this: