Information Warfare Tactics

Chinese Tactics > PART ONE: People’s Liberation Army Forces > Chapter 5: Tactical Information Operations > Information Warfare Tactics

5-14. The PLA breaks IW techniques into two broad categories: information attack and information defense, with each of these containing several subcategories. Information attack is described in paragraphs 5-15 through 5-19. Information defense is described in paragraphs 5-20 through 5-24.

Information Attack

5-15. The PLA defines information attack as any IW activity intended to weaken or deprive the enemy of control of information. Information attack is the primary means by which information warfare is won, and it is the key to achieving information superiority. There are four subcategories of information attack: electromagnetic attack, network attack, psychological attack, and physical attack. Of note, psychological attack is considered both a form of information attack and its own unique campaign; it is unclear what the relationship is between the two.

Electromagnetic Attack

5-16. Electromagnetic attack encompasses those activities that manipulate the electromagnetic spectrum to jam, suppress, deceive, or neutralize enemy information systems. There are three subcategories of electromagnetic attack: electronic reconnaissance, electromagnetic suppression, and electromagnetic deception. Electronic reconnaissance attempts to use electromagnetic and other reconnaissance platforms to collect intelligence on enemy information operations platforms, enabling more effective electromagnetic attack operations. Electromagnetic suppression uses electronic warfare capabilities to jam or suppress enemy sensors or communications, softening or neutralizing enemy information systems. Electromagnetic deception manipulates enemy information operations systems—ideally, without enemy knowledge—in support of friendly operations. The PLAA views electromagnetic attack as the centerpiece of most IW operations; this belief is broadly represented in the increasing concentration of IW capabilities at tactical levels, including ground-based and aerial jammers and electronic reconnaissance platforms.

Network Attack

5-17. Network attack includes those activities that target enemy computer information systems, software, hardware, and their associated networks. Network attack differs from electromagnetic attack in that it is conducted digitally and through networks, rather than through the electromagnetic spectrum. There are two major types of network attack: computer virus attack, which makes use of preprogrammed viruses, and hacker invasion, which uses active code experts working in real time. The aim of both methods is to penetrate enemy information systems. The two techniques can be mutually supportive, and should be closely coordinated. The PLAA broadly prefers clandestine or concealed network attack, wherein the enemy’s information is manipulated without its knowledge. This is viewed as the most efficient form of information attack, allowing for more aggressive activities that remain beneath the threshold of active conflict. Concealed network attack operations in peacetime focus on understanding the enemy’s operational architecture, disposition, and possible weaknesses, enabling more aggressive network attacks when hostilities commence. Concealed network attacks also focus on acquiring and exfiltrating critical information, particularly that surrounding the defense industrial base. The PLAA seeks to employ network attack even at tactical echelons in order to manipulate enemy situational understanding and trick the enemy into behavior conducive to PLAA tactical operations.

Physical Attack

5-18. Physical attack comprises those activities that target enemy IO systems with direct physical damage or destruction. At tactical echelons, this primarily entails attacking command and communication centers, network nodes, and sensors. There are three subcategories of physical attack: force strength, which is essentially using maneuver forces to penetrate enemy defenses and destroy the IO systems at close range; firepower assault, which is the use of fires systems of all types—particularly artillery—to target and destroy IO systems at extended ranges; and energy weapons, which involves the use of highly specialized weapons systems to destroy enemy IO systems. The latter includes both current (such as antiradiation missiles) and future (laser or microwave) weapons systems. The PLAA emphasizes firepower assault as the most effective method of physical attack, and firepower assaults against IO systems are a key element of tactical system warfare.

Psychological attack

5-19. Psychological attack is composed of those activities that target the enemy’s mindset and morale. While categorized as a form of information attack, psychological attack is also a component of psychological warfare. Psychological attack is discussed in greater detail in paragraphs 5-40 and 5-41.

Information Defense

5-20. The PLA defines information defense as all those operational activities that protect friendly IW systems from enemy IO. The PLA views IW as a zero-sum activity: any successes gained from information attack are eroded by losses due to inadequate or ineffective information defense. Every potential offensive tactic has a corresponding defensive responsibility. Information attack and defense are viewed as mutually supporting, and they should be carefully integrated.

Electromagnetic Protection

5-21. Electromagnetic protection contains those measures put into place to resist enemy electromagnetic attack. There are two main modes of electromagnetic protection: counterelectronic reconnaissance and counterelectronic jamming. Counterelectronic reconnaissance is the use of both active and passive means to prevent enemy collection on friendly IW systems. This includes active suppression of enemy collection systems, concealment of friendly electromagnetic signals, the use of decoy or spoof signals to confuse enemy collection, and physical targeting of enemy collection systems. Counterelectronic jamming consists of those systems and techniques that either eliminate or weaken the effects of enemy jamming. This includes hardening IW systems, using of more powerful or more resistant emitters, and carefully monitoring information to weed out disinformation planted by the enemy.

Note. The Chinese concepts of electromagnetic attack and electromagnetic defense comprise what both China and the U.S. refer to as electronic warfare (EW).

Network Protection

5-22. Network protection encompasses those measures put into place to resist enemy network attack. There are two main types of network protection: computer virus defense and hacker defense. Each seeks to proactively protect friendly hardware, software, and networks from both overt and covert enemy intrusion. Network defense is both an active and passive activity. Passive defense seeks to prevent, disrupt, or delay intrusion, while active defense seeks to identify and stop intrusion after it occurs. Due to the extensive use of computer networks, along with the wide variety of hardware and software in use, network defense is seen as a highly difficult—though highly important—tactical task.

Note. The Chinese concepts of network attack and network defense comprise what both China and the U.S. refer to as cyber warfare.

Physical Protection

5-23. Physical protection consists of those activities that defend IW systems from direct lethal attack by enemy forces. There are two categories of physical protection: force strength and firepower, and quality protection. Force strength and firepower incorporates tactical activities that preclude, preempt, neutralize, or defeat enemy direct lethal attack against IW systems. They can be broadly grouped into either defensive and security activities, such as tactical ground defense, or firepower activities, such as counterfire. Quality protection comprises those activities that harden or hide IW systems, making them more difficult to neutralize or destroy. This includes both engineering measures—such as building physical barriers, using underground facilities, or camouflage and concealment—and survivability measures, such as adding armor. The PLAA is very concerned about the vulnerability of IW systems to direct attack—particularly by firepower and energy weapons—and it emphasizes survivability against such attacks.

Intelligence Protection

5-24. Intelligence protection is IW’s counterintelligence component. This includes measures and activities that defeat enemy reconnaissance, surveillance, and espionage, concealing friendly operations and capabilities. Intelligence protection in the form of disinformation can be integrated with information attack—particularly psychological attack—in order to effectively deceive the enemy and trick it into behaving in a preferred way.