Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Chinese mercenaries in global corporations

admin by admin
Dec 20, 2022
in Digital Influence Mercenaries
A A
0

China is gaining economic influence, not just by spying and stealing technology. They create an incentive system in multinational corporations that makes it in their interest to support the goals of the Chinese Communist Party. That’s why 21st-century warfare is so effective,” said Gen. Robert Spalding, architect of the current U.S. National Security Strategy and author of the book “War Without Rules: China’s Playbook for Global Domination”.

TVP WEEKLY: Can China militarily threaten the world? In your latest book, “War Without Rules: China’s Playbook for Global Domination” – which has also been published in Poland – you describe a playbook developed by Chinese colonels Qiao Liang and Wang Xiangsui. “Unrestricted Warfare” has become the basis for the training of the commanding ranks in the Chinese People’s Liberation Army.

GEN. ROBERT SPALDING: China will soon have the world’s most powerful army with global military reach. This will give the [country] the ability to intervene in geopolitical disputes and secure economic and energy resources in every corner of the world. China will be able to act in a similar way as the U.S. and its allies did after the end of the Cold War.

What do the authors mean when they write that “everything is war”?

They point out that the notion of war in the Western sense – limited to the use of force to achieve political goals – is primitive and unnecessary in a globalised world with a universally accessible internet. These tools can make citizens of other countries adopt China’s development model without military pressure. By controlling the global narrative, the world can be controlled without a single gunshot. On the battlefield of the 21st century, the hearts and minds of citizens of free countries are the targets, and greed and fear are the weapons of war. Beijing also uses favouritism from corporations and international financial institutions toward its plans in order to expand its influence.

You also write that the modern soldier is in the process of morphing into a digital warrior. What methods will he use to fight?

There is no need to shoot at the enemy if you can make the opponent agree with your position. As I said earlier, this can be achieved using the Internet. It doesn’t have to happen right away. Maybe it will happen slowly over years or even decades, during which the principles of freedom will be undermined slowly but consistently. Why use B-2 bombers and missiles to destroy a mobile network transmitter? All you need to do is put malware into the system and turn it off when the time is right.

What are the ways China is implementing its global plans today?

Through the media, including social media, as well as relations in trade, finance, economics, academia, and politics. Each engagement helps the Chinese Communist Party gain acceptance for its interests.

Click here to read the full article.

By Tomasz Plaskota

Translated by Roberto Galea

source:
weekly.tvp.pl



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.