上海品茶

陆战研究中心:中国正在发展的网络战能力(英文版)(26页).pdf

编号:60571 PDF 26页 926.58KB 下载积分:VIP专享
下载报告请您先登录!

陆战研究中心:中国正在发展的网络战能力(英文版)(26页).pdf

1、 The Centre for Land Warfare Studies (CLAWS), New Delhi, is an independent Think Tank dealing with national The Centre for Land Warfare Studies (CLAWS), New Delhi, is an independent Think Tank dealing with national security and conceptual aspects of land warfare, including conventional & subsecurity

2、 and conceptual aspects of land warfare, including conventional & sub- -conventional conflict and terroconventional conflict and terrorism. rism. CLAWS conducts research that is futuristic in outlook and policyCLAWS conducts research that is futuristic in outlook and policy- -oriented in approach.or

3、iented in approach. Website: Website: www.claws.in www.claws.in Contact us: Contact us: No. 323 January 2022 Chinas Developing Cyber Warfare Capabilities Major General PK Mallick, VSM (Retd) held the Chief of Army Staff Chair of Excellence at CLAWS. The General is an Electronics and Telecommunicati

4、on Engineering graduate from BE College, Shibpore, MSc (Defence Studies) from Madras University, M.Tech from IIT, Kharagpur, MMS from Osmania University and M. Phil from Madras University. He was commissioned in the Corps of Signals of Indian Army. The Officer has interest in Cyber Warfare, Electron

5、ic Warfare, SIGINT, Technology and Strategic Affairs. His last posting before retirement was Senior Directing Staff (Army) at National Defence College, New Delhi. Introduction Chinese President Xi Jinping has made it clear that Chinas objective is to emerge as a cyber superpower. China wants to be t

6、he worlds largest nation in cyberspace and also one of the most powerful. The information technology revolution has produced both momentous opportunities and likely vulnerabilities for China. China is home to the largest number of netizens in the world. It hosts some of the worlds most vibrant and s

7、uccessful technology companies. It is also a major victim of cybercrime. The comprehensive national powerthe measurement of a state and societys power, which includes military, political, economic, diplomatic, science & technology and cultural componentsis now measured in terms of information. China

8、 has emerged as a cyber superpower. China possesses enormous economic and military capabilities that augment Key Points PLA believes that future wars will be decided by the side that is more capable to generate, gather, transmit, analyse and exploit information. China has been conducting cyber opera

9、tions against India for a long time. PLA differs considerably from its Western counterparts in its approach to cyber and network operations. It recognises the importance of a digital battlefield. The PLA is actively looking at and experimenting with new concepts and capabilities to leverage artifici

10、al intelligence to improve its combat power and deterrence. The Strategic Support Force is responsible for collecting and managing technical intelligence from cyber and space assets as well, supporting joint operations and carrying out attacks against the adversarys command network. SSF seeks to int

11、egrate Electronic Warfare with cyber, space and psychological warfare. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 2 its overall national power. It is actively pursuing todays emerging technologies such as big data, robotics, quantum computing, 5G technology and Artificial Intelligence (AI)

12、. This would enable China to flourish in the new industrial revolution that is presently unfolding. Chinas cyber power constitutes a critical component of its comprehensive national power. Harvard Kennedy School of Government in a study of cyber power of various countries has ranked China as the sec

13、ond most powerful nation after US. (see Table 1) Table 1: 2020 NCPI Rankings Source: Julia Vooet al, National Cyber Power Index 202, Harvard Kennedy School of Government, September 2020 available at: https:/www.belfercenter.org/publication/national-cyber-power-index-2020 The International Institute

14、for Strategic Studies (IISS) published a report titled Cyber Capabilities and National Power: A Net Assessment. IISS has done a qualitative assessment of the cyber capabilities of 15 major countries. The report analyses the cyber capabilities of the US, the UK, China, Canada, Russia, North Korea, Ja

15、pan, Israel and India among others. It puts US. in first tier and China as second-tier cyber power along with Russia and five US allies Australia, Canada, UK, France and Israel. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 3 The report estimates Chinas cyber power as: 1 Conducts large scale

16、cyber operations abroad, aiming to acquire intellectual property, achieve political influence, carry out state-on-state espionage and position capabilities for disruptive effect in case of future conflict. Established the worlds most extensive cyber enabled domestic surveillance and censorship syste

17、m. Core cyber defences remain weak compared with those of the US; cyber resilience policies for its critical national infrastructure are only in the early stages of development. Given its growing industrial base in digital technology, China is best placed to overtake US in National Cyber Power Index

18、. Cyber Exploitation Activities The Peoples Liberation Army (PLA) believes that, with the rise of Information Age, future wars will occur in the information domain. Wars will be decided by the side who is more capable to generate, gather, transmit, analyse and exploit information. Informationalised

19、warfare blurs the line between peacetime and wartime. A nation in the information age cannot wait for the hostilities to break out to collect intelligence, carryout influence operations, develop anti-satellite systems or design computer software weapons. Such warfare will include activities in peace

20、time, aimed at civilian and commercial entities, as well as operations against adversarys military systems in war.2 Chinese hackers have carried out cyber industrial espionage at high-technology and advanced manufacturing companies of emerging industries, such as aerospace, biotechnology and semicon

21、ductors in the US, Europe, Japan and Southeast Asia. Hackers were interested in firms negotiation strategies and financial information in the energy, banking, law, and pharmaceutical sectors. Former NSA Director Keith Alexander said that, the Chinese operations enabled the greatest transfer of wealt

22、h in history”.3 CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 4 The Washington Post reported that Chinese hackers stole critical files related to missile defence, including the advanced Patriot missile system,an Army system for shooting down ballistic missiles,.and the Navys Aegis ballistic m

23、issile defense system”. The hackers also gathered information on planes, helicopters, and ships, including “the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navys new Littoral Combat Ship, which is designed to patrol waters close to shore”.4 These were the weapons on which

24、the US would rely in a fight with China. These vulnerabilities were now exposed for China to study. Chinas Ministry of State Security (MSS) has come out as a highly skilled player in cyberspace, demonstrating increasing sophistication and operational security while undertaking a global cyber espiona

25、ge campaign for economic, political and strategic purposes. China can use its MSS to support political and geopolitical objectives in peacetime, including continued targeting of countries involved in territorial disputes in the East and South China seas. Chinas emergence as a cyber power will have c

26、ritical implications for the future of security and stability of the Asia-Pacific and beyond. GhostNet. China has been conducting cyber operations against India for a long time. One of the examples is the GhostNet episode. Between June 2008 and March 2009, the Information Warfare Monitor conducted a

27、n investigation focused on allegations of Chinese cyber espionage against the Tibetan community. GhostNet penetrated computer systems containing sensitive and secret information at private offices of the Dalai Lama and other Tibetan targets. GhostNet infected 1,295 computers in 103 countries. Almost

28、 a third of the targets infected by GhostNet included the Ministries of Foreign Affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan; Embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan; the ASEAN (A

29、ssociation of Southeast Asian Nations) Secretariat, SAARC (South Asian Association for Regional Cooperation) and the Asian Development Bank; news organizations; and an unclassified computer located at NATO headquarters. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 5 These activities still co

30、ntinue. The latest example being of 28 February 2021, wherein The New York Times (NYT), based on analysis by a US based private intelligence firm, reported that a Chinese entity penetrated Indias power grid at multiple load dispatch points. Chinese malware intruded into control systems that manage e

31、lectric supply across India, along with high voltage transmission substation and a coal-fired power plant. The Chief Operating Officer of Recorded Future (an American cyber security company) said that, the Chinese state-sponsored group, which the firm named RedEcho, “has been seen to systematically

32、utilize advanced cyber intrusion techniques to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation and transmission infrastructure”.5 In this report, details of a campaign conducted by RedEcho, targeting the Indian power sector has been analysed. It is believe

33、d that the group was responsible for Mumbai power outage on 13 October 2020 that lasted for two hours. Concepts of Warfare The PLA differs considerably from its Western counterparts in its approach to cyber and network operations. PLA does not use the word cyber as extensively as the West. They perc

34、eive everything related to cyber developments as the process as informationisation or informatisation. Rather than seeing cyber power as a distinct capability like air, land, sea and space, PLAs planners view cyber and network operations as occurring in an “information domain”. This domain encompass

35、es network, psychological and media operations, as well as electronic warfare.6 PLA strategists believe that network-electronic operations will be critical to combat effectiveness as new means of warfare. Cyber and network operations can be an indispensable method for deterring powerful enemies with

36、 the potential to enable winning without fighting under certain conditions. Chinas 2015 Defense White Paper highlighted that the PLA should be able to fight and win informationized local wars. The report stated: “integrated combat forces will be employed to prevail in system v/s system i.e. C4ISR op

37、erations featuring information dominance, precision strikes and joint operations” to meet the offensive and defensive operational requirements of modern warfare. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 6 The PLAs Current View on Warfare. The Science of Strategy published by the NDU in 2

38、017 states that, wars will represent a system of systems confrontation”. The PLA envisions warfare conducted on tangible and intangible battlefields. The tangible battlefield includes land, sea, air and space domains, while the intangible battlefield includes the electromagnetic spectrum, cyber, spa

39、ce and psychological cognition. Operations are characterised as highly dynamic, decentralised, blurring lines between the front & rear areas and rapid transitions between offence and defence. Characteristics include non-contact, non-linear and asymmetric operations.7 According to Elsa Kania and John

40、 Costello, “Informatization is the core of everything the PLA wants to accomplish from high-tech missions in space and cyberspace, to long-range precision strike, ballistic missile defence and naval deployments abroad, the ability to transmit, process and receive information is a vital enabler”.8 Th

41、is theory incorporates thinking and strategy informed by numerous geopolitical and technological developments over the past 25 years. The PLA recognises the importance of the digital battlefield. Chinas efforts to informatise the PLA extends to cultivating and integrating emerging technologies like

42、quantum computing and artificial intelligence. Winning Informationalised Local Wars. As PLA leaders recognise the importance of technology, professionalisation and military hierarchy, Chinese military theory has been moving away from traditional Marxist-Leninist and Maoist theory. The PLA, however,

43、remains staunchly Communist and views its modern theories as an evolution of Peoples War. Peoples War in Conditions of Informationization, as per PLA, is a modern adaptation of The Art of War and Peoples War. The concept of active defence is its centrepiece, and deception and political willpower are

44、 the most important elements of a successful military campaign. The diagram below displays the timeline of the evolution of Peoples War concept under different Chinese leadership. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 7 Figure 1: Evolution of PRC Military Strategic Thought Source: ROC

45、 National Defense Report 2021 9 Network Warfare. Network warfare is the aspect of information warfare involving the range of activities that occur within networked information space, as the two sides seek to reduce the effectiveness of the adversarys networks while preserving ones own. The purpose o

46、f network warfare is to establish network dominance”. When one has network dominance”, the full range of ones networks (not just computer networks) can operate smoothly and the information on those networks is safeguarded while being rapidly moved and applied. In contrast, an adversarys networks are

47、 prevented from doing the same. Some of the networks that are integral to network warfare include the command & control network, intelligence information network and air defence network. The Chinese campaign design includes detailed planning for protecting networks in physical (personnel, equipment,

48、 and facilities) and non-physical (cyber, electromagnetic, informational) domains. Primary targets will be leadership, C2 nodes, sensors and information hubs. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 8 Network warfare is also a focus area in PLAs big data program, with research agendas a

49、cross the force prioritising network security and cyber defence technologies. Moreover, PLA restructuring and modernisation efforts go beyond network defence to encompass broader cyber warfare applications designed to accomplish information superiority missions and to enhance operations in other war

50、fighting domains. Integrated Network and Electronic Warfare (INEW).10The future local wars under informationalised conditions will see the merging of network and electronic warfare. The PLA defines the INEW concept which at times is translated as “network-electronic integration warfare”, as a form o

51、f information warfare where one implements information attacks against the enemys networked information systems through highly melded electronic warfare and network warfare. According to the Chinese experts, in future conflicts, the electromagnetic spectrum will have a key influence upon the operati

52、on of network space, with network and electronic warfare organically linked, operating under a single unified direction. Network warfare will be affected by efforts aimed at dominating the electromagnetic spectrum. Neither electronic warfare nor network warfare alone can comprehensively disrupt that

53、 system-of-systems, but given the mutually supporting nature of the two different types of warfare in terms of attack concepts, attack methods and operating environments, they constitute a highly effective integrated attack methodology. System Destruction Warfare The PLA classifies all capabilities,

54、 ranging from ballistic missiles and fighter aircraft to special operations forces and cyber operators, as military systems. Each system has inherent strengths and weaknesses. System warfare involves: Bypassing enemy systems areas of strength and gaining a combat advantage by approaching them asymme

55、trically. Developing systems that excel at utilising apparent weaknesses in enemy systems, thus offsetting their strengths by undermining their ability to perform assigned missions. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 9 The most common examples of system warfare are targeting networ

56、ks instead of shooters, command and communication nodes instead of manoeuvre forces or sensors instead of aircraft. The PLA expands system warfare to include offensive cyber operations disabling air or seaport operations, diplomatic efforts undermining international alliances or special operation fo

57、rces undermining civilian morale through covert operations. To operationalise systems destruction warfare, the PLA has made significant progress towards waging informationalised war, modernising command & control networks ability to transfer complex information rapidly, new space jamming & anti-jamm

58、ing weapons and increasingly sophisticated cyber attack capabilities. System destruction warfare has become a dominant driver behind PLA force structure decisions and modernisation priorities. It explains heavy Chinese investments in counter-battle network capabilities. The means to conduct “informa

59、tionalised warfare includes the use of electronic warfare, cyber, computer network attack, information operations, and deception to destroy the integrity of the adversarys battle network.The emphasis on systems destruction warfare also helps to understand the reasoning behind PLAs new Strategic Supp

60、ort Force, a system-of-systems organisation designed to integrate better space, cyber and electronic warfare capabilities into PLA operations. During war, the PLA plans to build task-organised suites of capabilities designed to strike specific weak points of its opponents key systems. These suites o

61、f capabilities are called operational systems. Each operational system consists of five main subcomponents: the command system, the strike system, the information warfare system, the intelligence system and the support system. At the tactical level, system warfare concentrates mostly on targeting hi

62、gh-value battlefield systems such as radars, command & communication nodes, field artillery and air defence systems. It can include selective armoured vehicles and critical logistics support means. Examples of tactical system warfare can be using heavy rocket artillery to defeat or destroy enemy rad

63、ars and artillery systems, Electronic Warfare (EW) to suppress or neutralise enemy command and communication networks and deception operations to target enemy leaderships situational understanding and state of mind. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 10 The PLAs use of system warfa

64、re supports the development of several traditional military strategies, such as preclusion, isolation and sanctuary, throughout all domains and at all levels of war. Preclusion is attained by keeping enemy commanders and forces off balance through asymmetric means, such as deception and information

65、warfare, while simultaneously denying use of wide geographic areas through long-range reconnaissance-strike capabilities. Isolation is achieved by manipulating communications between units or jamming, employing psychological warfare to confuse and segregate enemy units from one another, then rapidly

66、 manoeuvring to physically isolate them. Sanctuary is achieved through a mix of information warfare, protection, defensive planning and deception operations. Sanctuary includes safety from physical attack and enemy information operations. Informatisation to Intelligentisation Chinas military strateg

67、ists anticipate a transformation in the form and character of conflict. This is evolving from todays informatised warfare to future “intelligentised” warfare. The PLA is actively looking at and experimenting with new concepts and capabilities to leverage artificial intelligence to improve its combat

68、 power and deterrence. These initial conceptual developments may influence future directions in PLA strategy, doctrine and weapons development. Chinese defence academics and military strategists are creating ideas and theories of intelligentised operations, seeking to determine new mechanisms for vi

69、ctory. Intelligentised Warfare incorporates emerging technologies like decentralised computing, data analytics, quantum computing, artificial intelligence and unmanned or robotic systems into the PLAs conceptual framework. The PLA is studying and adapting lessons learned from US concepts and initiat

70、ives closely.11 One of Xi Jinpings milestones on the road to Chinese national rejuvenation by 2050 is China becoming a global leader in AI technologies and applications by 2030. This includes using AI to build an intelligentised military. In his report to the 19th Party Congress, in October 2017, Xi

71、 Jinping urged that the PLA should, “accelerate the development of military intelligentization and improve joint operations capabilities and all-domain operational capabilities based on network information systems”.12 AI is seen as capabilities to include automated decision aids to enhance the speed

72、 and accuracy of operational decisions. PLA strategists also think that AI applications will provide the basis for advanced cruise missiles; CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 11 autonomous ground, air, surface and sub-surface drone systems; anti-artillery, air, and missile defence

73、 systems and a range of C2 and other systems. China considers big data analytics and AI as strategic resources. Chinese scholars think that big data and AI will improve PLA capabilities and position China to prevail in future conflicts. Hence, the PLA is exploring programs to collect, process, integ

74、rate and share data across the force for various applications, including C4ISR, logistics, equipment acquisition, mobilisation, modelling and simulation, training and cyber operations. The PLA believes that intelligentization will primarily change future warfare and provide a rare opportunity to lea

75、pfrog its development over Chinas adversaries. Chinese aspirations for an innovative military strategy and doctrine to become a reality will mainly depend on applying emerging big data and AI technologies to military purposes and the integration of new capabilities to existing concepts of joint forc

76、e operations in system-of-systems warfare. CCP leadership has prioritised and resourced the development of the requisite technologies and systems.13 At the same time, the PLA faces critical challenges to operationalise artificial intelligence (AI) across a range of applications from issues of talent

77、 to the management of data and adaptation as an organisation.14 Challenges in Chinese Military Innovation PLAs advances and ambitions in autonomy, robotics and a range of applications of artificial intelligence cannot be underestimated. However, the PLA will confront many likely difficulties and sho

78、rtcomings that will impede its implementation. Some of them are:15 The PLAs capacity to innovate may be impeded by its bureaucratic politics and culture. The PLAs capability to leverage AI could be delayed by a continued shortage in talent and human capital. Despite progress in training, the PLA may

79、 continue to struggle to match the required sophistication for future warfare. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 12 The PLA appears to have difficulties revising its doctrine, adopting new theories and concepts in practice. The PLA has difficulty managing and integrating its data

80、due to bureaucratic challenges and limited adoption of cloud computing. The PLAs lack of operational experience under actual combat conditions could lead to failure in appreciating the challenges of operating highly complex autonomous systems. The implementation of military-civil fusion might be ine

81、fficient and undermined by poor coordination or corruption. The massive investments required to promote military-civil fusion and the development of emerging technologies may not be allocated efficiently, creating distortion. There are specific weaknesses in key and core technologies within Chinas t

82、echnological ecosystem that will be difficult to redress. Difficulties of Intelligentisation There are many problems in achieving intelligentisation. Some of them are: PLA experts on intelligentisation overwhelmingly call for highly centralised decision-making structures. They think advanced algorit

83、hms will help operational commanders to perfectly direct intelligent swarms of autonomous battle systems to achieve campaign objectives. PLA experts think that this approach will fuse command responsibility onto a few Generals who can remain safely away from the battlefield. But this negates the con

84、cept of mission command. The PLA theorists do not appear to recognise this risk compared to the perceived gains. PLA experts seem to miss the inherent fragility of AI and autonomous systems. The future PLA is based almost entirely on advanced technology, with little consideration for potential risks

85、 and mitigation approaches. A well-planned electronic warfare attack from an adversary could severely affect the PLAs command and control setup. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 13 PLA strategists seem to have too much faith in the capabilities of AI and advanced technologies. Th

86、ey think that autonomous systems will eventually be better at making decisions than humans. They go to the extent of claiming that future warfare will closely resemble the Star Wars movies. It is being recognised that AI is neither artificial nor intelligent. But the PLA does not acknowledge or acce

87、pt this uncertainty. Though advancements in AI continue, many overestimate the ability of AI to make decisions. In future combat operations, autonomous systems will face unexpected challenges which can only be suitably addressed through human ingenuity. PLA will need to enhance the technical profici

88、ency of its officers and personnel to continue developing and applying AI to warfare. Ironically, this could result in a greater split among PLAs human resources, with operational commanders remaining under-qualified for technical aspects and underutilised because of automated decision-making. The o

89、verconfidence of PLA on futuristic technology has potential risks that could affect its war fighting capabilities. These new technologies are only as useful as they are manifested and effectively applied in Chinese war fighting doctrine. Intelligentisation may not deliver all the advantages the PLA

90、hopes for. PLA experts visions of intelligentisation appear to overestimate the transformative potential of AI. It could set the army up for failure in the long-term. Intelligentisation will bring about new set of vulnerabilities for the PLA that may reduce any effective advantage gained. Chinas AI

91、capabilities US Secretary of Defense, Lloyd Austin, said in July 2021 that the US urgently needs to develop responsible artificial intelligence technology at a faster pace. He stated that a new $1.5bn investment would expedite the Pentagons adoption of AI over the next five years. 600 AI efforts wer

92、e already under way. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 14 Nicolas M Chaillan, a member of the US Air Force and the Pentagons former first Chief Software Officer, caused a furore when after resignation, he stated the following:16 China will dominate numerous aspects of emerging tec

93、hnologies over the next few decades, especially when it comes to artificial intelligence, synthetic biology and genetics. China has won the artificial intelligence battle with the US and is heading towards global dominance because of its technological advances. China is set to dominate the future of

94、 the world, controlling everything from media narratives to geopolitics. We have no competing fighting chance against China in 15 to 20 years. Right now, its already a done deal; it is already over in my opinion. Whether it takes a war or not is kind of anecdotal. Regarding the readiness level of go

95、vernment agencies in cyber security and defence, some departments were operating at a kindergarten level”. Many senior officials with little experience were allowed to run cyber security programs. Part of the reason the US was behind in technology race was the unwillingness of large American compani

96、es like Google to work with the government due to ethics related issues surrounding the use of AI and extensive ethical debates over technology and sluggish innovation. Chinese tech companies are making massive investments in AI and are not taking ethics into account. The US would be unable to match

97、 Chinas rapid pace of technological advances. However, not all agree with the views of Nicolas Chaillan. US Army CIO Ray Iyer vehemently denied this. He said Its absolutely not true If you looked at both what we have in the Department of Defense and Intelligence Community, across the federal governm

98、ent and our industrial partners, we have the best AI technology”. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 15 The US and its partners share trade intelligence information and other things”, helping both sides. Ray Iyer added, “I can tell you the Chinese dont have that. Theyre operating i

99、n a vacuum, and theyre relying on nefarious methods and cyber attacks to be able to get to, you know, what they think they know that we have”.17 As per the testimony of independent analyst and former US Army attach to Beijing and Hong Kong Lieutenant Colonel Dennis J Blasko: in certain areas, such a

100、s some categories of ballistic and cruise missiles, air defence, electronic warfare, and cyber capabilities, the PLA ranks among the worlds leaders. However, in many other battlefield functions, the PLA trails advanced militaries by one to multiple decades of experience”.18 Bloomberg reports that Ch

101、ina watchers shouldnt think that its position is unassailable or that the US. is weaker.19 Chinas expertise is somewhat limited in scope. Artificial intelligence has many sub-fields, including robotics, machine learning, natural language processing and computer vision. The US has broad toolkit that

102、is deployed across each of these disciplines and used around the world. China excels mostly in computer vision, an area that helps Beijing build out its surveillance state. US asserts its dominance by creating products that help clients around the world become more profitable or efficient. The US is

103、 the world leader in the following: Machine learning that leverages data and algorithms to learn and improve accuracy. Lions share of the worlds leading and widely adopted frameworks were developed in US by companies like Google, Microsoft, Facebook and the University of California, Berkeley. The be

104、st natural language processing engines also come from US tech giants like Microsoft, Google, Amazon and IBM. Globally these tools are used for voice recognition in smart speakers, improve translation and search results or detect fraud in the financial industry and run chatbots in customer service. U

105、S is a world-beater in process automation, which replaces staff in call centres and customer service. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 16 US companies are leaders in enterprise deployments. The recent surge in Work From Home usage has driven demand for cloud computing and network

106、ing technologies. China has world-leading companies in computer vision, speech recognition and natural language processing, including SenseTime, Unisound, iFLYTEK and Face+. But it lags in shaping the core technology tools of AI. For example, the open source platforms like TensorFlow and Caffe are w

107、idely used in industry and academia the world over. These are developed by US companies and academies to design, build and train the sets of algorithms that facilitate computers to function more like the human brain. But PaddlePaddle, one of the major open-source platforms developed by Chinese compa

108、ny Baidu, is mostly used to quickly develop AI products. China lags in AI hardware. Most of the worlds leading AI-enabled semiconductor chips are made by US companies such as Intel, Nvidia, Apple, Google and Advanced Micro Devices. China lacks expertise in designing computing chips that can support

109、advanced AI systems. China would take five to ten years to reach the level of innovation in fundamental theories and algorithms occurring in the US and the UK. The key to China meeting its long-term AI goals is contributing to the fundamental theories and technologies of AI.20 However, US is now hea

110、vily reliant on Taiwan for semiconductors, as is PRC. While South Korea, Thailand and Vietnam have stepped up semiconductor production, the US needs to begin re-shoring this industry. 21 AI talent. An important factor for Chinas progress will be its ability to hold onto talented researchers. As per

111、the 2018 China AI Development Report,22 by the end of 2017, China had the second-largest pool of AI scientists and engineers. They are about 18,200 people in number, ranking behind the US, which had roughly 29,000 people. But China was sixth in its number of top AI researchers. CENTRE FOR LAND WARFA

112、RE STUDIES (CLAWS): ISSUE BRIEF 17 Figure 2: AI Talent Concentration Source: Sarah OMeara, Will China lead the world in AI by 2030? Nature, 21 August 2019. Available at: https:/ Normally, Chinese computer scientists are trained in the US and then stay there to work for global technology companies. H

113、owever, the situation is changing. AI institutes in China are trying to allure some of these researchers back to the mainland with high salaries. They are also welcoming top scientists from across the globe, including India, by offering lucrative salaries, excellent research facilities and liberty t

114、o work independently. Chinas three core tech companies, Tencent, Baidu and Alibaba, have become global leaders in AI, although they are still not in the same league as US companies, like Google and Microsoft. China also has at least ten Unicorns which are privately owned AI start-ups valued at more

115、than US$1 billion, including facial recognition firm SenseTime.23 Eric Schmidt, former chairman of Google and the chairman of a special commission on artificial intelligence, warned US Congress and stated that the US is only one to two years ahead of China in developing artificial intelligence. Test

116、ifying before the Senate Armed CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 18 Services Committee, he said that the US needs to maintain a five to ten years advantage over China in AI and other high technology fields like quantum computing. He said he was “worried as US dont understand the c

117、ompetitive threat from China” that encompasses semiconductor manufacturing, directed energy, 5G technologies and synthetic biology, as well as AI, machine learning and hypersonics.24 The advantages of the US are in its innovative private sector and robust university system. A Center for Data Innovat

118、ion report25 that looked at talent, research, development, adoption, data and hardware in the AI space found that despite Chinas bold AI initiative, the United States still leads in absolute terms; China comes in second, and the European Union lags further behind”. The US leads in AI in four of the

119、six categories: talent, research, development and hardware. China surpassed the European Union in AI. It is quickly reducing the gap between itself and the US. The Chinese have more data than the EU and US, which fuels AI technology and accurate AI models. The Center for Security and Emerging Techno

120、logy (CSET) estimates show that China is likely to spend far less on AI than previously assumed. Most of its AI money is going to non-military-related research, such as fundamental algorithm development, robotics research, and smart infrastructure development. By contrast, USs planned spending for t

121、he fiscal year 2020 allocated majority of its AI budget to defence. It means US could outspend China in that category. These numbers directly oppose the prevailing narrative. Change in Thinking about Warfare. The Chinese concept of war has changed drastically in last 20 years. However, basic thinkin

122、g of PLA like stratagems, deception etc. remain as important parts of their concept and are being incorporated with modern technological advances. AI is now being seen as a tool to help the PLA in controlling future conflicts. That will provide PLA with a deterrence to confront other nation states i

123、n a conflict scenario. It seems that Chinas earlier belief of technology determines tactics is now changed to technologies determine strategy due to the recent stress on technologies, including cyber technology. PLAs thought process on use of technologies in warfare is changing, and we would do well

124、 to evaluate this thought process. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 19 The emerging theory of intelligentised operations attempts to address what Prussian theorist Carl von Clausewitz called the “Fog of War” on the battlefield. The PLA can thus take credit for thinking big to sol

125、ve problems that warfighters have grappled with for generations. It is trying to create a strategic doctrine for AI and other cutting-edge technologies in future warfare. China is thinking long term. If successful, the PLA will have an obvious advantage over its adversaries in future conflicts. Chin

126、a feels that US is its main adversary. The US has tremendous technological capabilities as compared to China. China is trying to match that with its own strength in AI as a leapfrog technology and a new concept of war. But there will be many problems in implementing this concept of Intelligentizing

127、Warfare to reality. President Xi Jinping has thrown the gauntlet, and it is up to the US, other adversaries and the rest of the world to follow this concept keenly. PLA Strategic Support Force (PLASSF) Established in 2015, the Strategic Support Force has integrated and consolidated Chinas previously

128、 disparate cyber, electronic, space and psychological warfare units under a unified command structure. The PLASSFs Network Systems Department has combined technical reconnaissance bureaus (TRBs) responsible for cyber espionage and signals intelligence and elements of the former GSD Fourth Department

129、 (4PLA) responsible for electronic countermeasures and offensive cyber operations. The structure of the PLASSF incorporates the concept of integrated network and electronic warfare.26 The Strategic Support Force is responsible for collecting and managing technical intelligence, including from cyber

130、and space assets; supporting joint operations and carrying out attacks against an adversarys command network. The PLAs cyber capabilities of defence, offence and reconnaissance, all have been centralised under the SSF. The PLA looks for using offensive cyber operations to disrupt, degrade or damage

131、adversary systems, including critical infrastructure, preceding and during multiple stages of a conflict and in various conflict scenarios. PLA wants to use defensive cyber operations to defend against the same capability from an adversary . Reconnaissance includes a broader set of capabilities, inc

132、luding those used in peacetime. This includes cyber CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 20 espionage against military, civilian or commercial targets, theft of military technological know-how, intellectual property, etc. In some instances, espionage and reconnaissance intrusions can

133、 be leveraged later for destructive capability. According to US DOD, “the PRC presents a significant, persistent cyber espionage and attack threat”. However, PLA leaders believe PRC cyber warfare capabilities are inferior to those of the US. PLA, through the SSF seeks to integrate Electronic warfare

134、 more thoroughly with cyber warfare. PLA Structure after Reform Figure 3: PLA Structure after Reform Source: Phillip C. Saunders and Joel Wuthnow, Chinas Goldwater-Nichols? Assessing PLA Organizational Reforms, National Defense University, April 2016, http:/inss.ndu.edu/Portals/68/Documents/stratfor

135、um/SF-294.pdf CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 21 Cyber Security Management Deficiencies in Chinas Cyber Security Mechanisms. China is acutely aware of its weakness in cyber security. President Xi Jinping complained when he said, “The control of core technology by others is our b

136、iggest hidden danger”.27 Chinese experts assess that the US holds advantage in cyber capabilities in overall IT industry dominance, control of Internet infrastructure, malware design and training of cyber forces. Chip, network switch, processor and other core technologies of US are superior to other

137、 countries. Big US companies like Apple, Cisco, Google, IBM, Intel, Microsoft, Oracle, and Qualcomm dominates the IT industry, which the Chinese media call eight guardian warriors. China feels that the dominance of these companies would give US access to the critical information infrastructure of an

138、y country that US can exploit during conflicts. According to Chinas statistics, 80 per cent of Chinese chips, high-end components, universal protocols, and standards depend on imports; 65 per cent of information security products like firewalls, encryption machines and others are also imported. Chin

139、as leaders consider its cyber defences weak. According to the annual report from the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), in 2020 about 5.31 million hosts on the Chinese mainland were controlled by a total of about 52,000 overseas mali

140、cious program command & control servers, and the top three origins of overseas servers in terms of the number of compromised Chinese hosts are all from NATO member states.28 Tencent, one of the worlds largest internet firms, in a report from Tencent Security Response Centre, gave out reasons for the

141、 weakness of Chinas cyber security sector: High cost. Focus on profit instead of security. A general lack of talent. Poor cyber security threat technology. Concentration of the sector in Tier 1 and Tier 2 cities such as Beijing, Shanghai and Guangdong. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE

142、BRIEF 22 Reliance on foreign imports for main information infrastructure. Poor capability to track hostile activity especially advanced persistent threats. Reliance on outdated methods of protecting data. Limited legal foundations for thwarting and tracking illegal access of data. Lack of national c

143、ontrol in core technologies. Under developed identity-authentication systems. Cyber security investment of Chinese firms as a share of total investment (1.78 per cent) was far lower than that in the US (4.78 per cent) and the rest of the world (3.75 per cent). Edward Snowdens Revelation. Edward Snow

144、den, in June 2013, revealed widespread successful penetration of Chinese systems with the help of the National Security Agency (NSA) and the FBI. This dramatic disclosure put US in an embarrassing situation. Edward Snowden exposed the following: 29 The NSA has been hacking majority of Chinese govern

145、ment and private systems since 2007. They relied on routers of the US Company- Cisco Systems. NSA penetrated Huaweis headquarters in Shenzhen to exploit the routers and switches made by Huawei that are used by third of the worlds Internet population. NSA had hacked Chinese universities, telecommunic

146、ations firms and submarine cables. 14 American secret cyber agencies had been closely tracking secret cyber operations by China for several years. NSA broke into a Chinese telecommunication company to obtain mobile phone messages and repeatedly attacked the backbone network of Tsinghua University an

147、d computers of the telecommunications company Pacnet in their Hong Kong headquarters. According to a scholar at the China Institute of Contemporary International Relations, The United States holds the power of determining anyones life or death in cyberspace and has CENTRE FOR LAND WARFARE STUDIES (C

148、LAWS): ISSUE BRIEF 23 the capability of dominating cyber information. China is aware that some of the most sophisticated malware like Stuxnet and Flame have been developed in American labs. The broadband information infrastructure development gap with developed countries has widened; the level of go

149、vernment information sharing and business collaboration is not high; the core technology is controlled by others; . . . insufficient strategy coordination; weak critical infrastructure protection capability; mobile Internet and other technologies pose serious challenges”. China had to deal with the

150、humiliating exposure of a PLA cyber espionage. Mandiant, a US cyber security firm, gave a detailed report of Chinas cyber espionage activities and its main organization Unit 61398. This report also showed critical gaps in PLAs cyber security system.30 Indigenous Digital Industrial Base. China wants

151、to decrease its reliance on foreign cyber technology. It has a much weaker cyber industrial base than the US, lower levels of nationwide informatisation and less advanced & fertile educational system. China has no cyber military allies, where the US leads an impressive cyber military alliance networ

152、k. The US- China Security and Economic Review Committee, 2019 Report to Congress states: To achieve security in the long run, China must domestically produce chip technology, operating systems, and cryptographic techniques with independent intellectual property. Only with these steps can China guara

153、ntee the real safety of national networks.31 China has a modest domestic cyber security industry, a fraction of the size of its American counterpart. The leading cyber security firms in China have much lower revenues than those in the US and much smaller global footprints. President Xi Jinping has b

154、een pragmatic on this issue. He seems to be accepting the time and effort it will take to overcome the challenge posed by the US. In 2019, he summarised it succinctly, “No matter how large an internet company is, no matter how high its market value is, if it is heavily dependent on foreign countries

155、 for its core components, and if the major artery of the supply chain is in the hands of others, it is like building a house on someone elses foundation. No matter how big and beautiful it is, it may not stand up to wind and rain, and it may be so vulnerable that it collapses at the first blow. 32 T

156、he free market would not be sufficient. Market exchange cannot bring us core technologies, and money cannot buy core technologies. We must rely on own research and development. In a globalised environment CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 24 such research and development could not

157、 be expected to take place behind closed doors. Only when we fight against masters can we know the gap in ability. China would not reject any new technology. It would strategically determine which ones can be introduced from abroad, digested, absorbed, and then re-innovated versus which must be indi

158、genously innovated on their own”.33 China has been taking action to improve its cyber security. Chinas Ministry of Industry and Information Technology, in July, 2021 released a draft three-year cyber security plan. It is the most detailed strategy for the development of Chinas cyber security industr

159、y. This mandates that key industries, such as telecommunication industry, must devote 10 percent of their budget to cyber security by 2023.34 Conclusion Chinas Peoples Liberation Army (PLA) has understood that dominance in the information domain is the priority in modern conflict. Through the re-org

160、anisation of the PLA and the establishment of the Strategic Support Force, China has brought space, cyber, electronic warfare, and psychological warfare under one umbrella to use these capabilities more efficiently and effectively. No other country, including the US has done this. China has no threa

161、t from land. Presently, its main aim is to secure Taiwan. All its modernisation, organisational changes and concepts of warfare are meant for this conflict, which will also involve the US, and has systematically developed these capabilities keeping in mind this scenario. End Notes 1Cyber Capabilitie

162、s and National Power: A Net Assessment, IISS, 28 June 2021. Available at https:/www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power. 2 “Chinas Cyber Power in a New Era”, in Tim Huxley and William Choong, eds. Asia-Pacific Regional Security Assessment 2019, (London, UK: Routle

163、dge, International Institute for Strategic Studies, 2019). Available at https:/www. iiss.org/publications/strategic-dossiers/asiapacific-regional-security-assessment-2019/rsa19-07-chapter-5. 3 Hearing before the subcommittee on oversight and investigations of the committee on energy and commerce hou

164、se of representatives one hundred thirteenth congress first session, cyber espionage and the theft of US Intellectual property and technology, 09 July 2013. Available at https:/www.govinfo.gov/content/pkg/CHRG-113hhrg86391/html/CHRG-113hhrg86391.html. CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE B

165、RIEF 25 4 “Confidential report lists US weapons system designs compromised by Chinese cyber spies”, The Washington Post, 27 May 2013. Available at https:/ 5 PK Mallick, “Chinese Cyber Exploitation in Indias Power Grid: Is There a linkage to Mumbai Power Outage? Strategic Study India, Issue Brief. Av

166、ailable at https:/ 6 “2020 Report to Congress of the US-China Economic and Security Review Commission, December 2020. Available at https:/www.uscc.gov/sites/default/files/2020-12/2020_Annual_Report_to_Congress.pdf. 7Chinas Military Strategy”, Xinhua, 27 May 2015. Available at http:/ 8 Elsa Kania and

167、 John Costello, “Chinas Quest for Informatization Drives PLA Reforms”, The Diplomat, 04 March 2017. Available at: https:/ 9ROC National Defense Report 2021. Available at https:/www.mnd.gov.tw/NewUpload/%E6%AD%B7%E5%B9%B4%E5%9C%8B%E9%98%B2%E5%A0%B1%E5%91%8A%E6%9B%B8%E7%B6%B2%E9%A0%81%E5%B0%88%E5%8D%8

168、0/%E6%AD%B7%E5%B9%B4%E5%9C%8B%E9%98%B2%E5%A0%B1%E5%91%8A%E6%9B%B8%E5%B0%88%E5%8D%80.files/%E5%9C%8B%E9%98%B2%E5%A0%B1%E5%91%8A%E6%9B%B8-110/110%E5%B9%B4%E5%9C%8B%E9%98%B2%E5%A0%B1%E5%91%8A%E6%9B%B8-%E8%8B%B1%E6%96%87%E7%89%88.pdf 10 Joe McReynolds, “Chinas Military Strategy for Network Warfare”, in

169、Joe McReynolds, ed., Chinas Evolving Military Strategy, (Jamestown Foundation, 2016), p. 213 and Shou Xiaosong, ed., The Science of Military Strategy Military Science, 2013, p.93. 11 PK Mallick, “Defining Chinas Intelligentized Warfare and Role of Artificial Intelligence”, Vivekananda International

170、Foundation, March 2021. Available at https:/www.vifindia.org/sites/default/files/defining-china-s-intelligentized-warfare-and-role-of-artificial-intelligence.pdf. 12 Edmund J Burke et al, Peoples Liberation Army Operational Concepts, (Rand Corporation, 2020). Available at https:/www.rand.org/content

171、/dam/rand/pubs/research_reports/RRA300/RRA394-1/RAND_RRA394-1.pdf. 13 Ibid. 14 Ben Non and Chris Bassler, “Schrodingers Military? Challenges for Chinas Military Modernization Ambitions”, WOTR, 14 October 2021. Available at https:/ 15 Elsa B Kania , “Testimony before the US-China Economic and Securit

172、y Review Commission Hearing on Trade, Technology”, and “Military-Civil Fusion Chinese Military Innovation in Artificial Intelligence”, 07 June 2019. 16 Justin Klawans , “Pentagon Official Resigns Over Belief China Has Won AI Battle, Heading to Global Dominance”, Newsweek, 11 October 2021. Available

173、at https:/ 17 Colin Clark, “Absolutely Not True: Army CIO Answers Claim US Has Already Lost To China In AI”, Breaking Defense, 13 October 2021. Available at https:/ CENTRE FOR LAND WARFARE STUDIES (CLAWS): ISSUE BRIEF 26 18 Testimony of independent analyst and former US Army Attach to Beijing and Ho

174、ng Kong Lieutenant Colonel (ret.) Dennis J Blasko, in US-China Economic and Security Review Commission, “What Keeps Xi Up at Night: Beijings Internal and External Challenges”, hearings, 07 February 2019. 19 Tim Culpan, “China isnt the AI juggernaut the West fears”, Bloomberg, 13 October 2021. 20 Sar

175、ah OMeara, “Will China lead the world in AI by 2030? Nature”, 21 August 2019. Available at https:/ 21Committee on Armed Services United States Senate Hearing to Receive Testimony on Emerging Technologies and Their Impact on National Security, 23 February 2021. Available at https:/www.armed-services.

176、senate.gov/hearings/21-02-23-emerging-technologies-and-their-impact-on-national-security. 22 “China AI Development Report”, China Institute for Science and Technology Policy at Tsinghua University, July 2018. Available at http:/ 23John Grady, “US Holds Slim Edge over China in Artificial Intelligence

177、, Former Google Chairman Says”, 23 February 2021. Available at https:/news.usni.org/2021/02/23/u-s-holds-slim-edge-over-china-in-artificial-intelligence-former-google-chairman-says. 24Committee on Armed Services United States Senate Hearing to Receive Testimony on Emerging Technologies and Their Imp

178、act on National Security, 23 February 2021. Available at https:/www.armed-services.senate.gov/hearings/21-02-23-emerging-technologies-and-their-impact-on-national-security 25 Daniel Castro, Michael McLaughlin and Eline Chivot, “Who Is Winning the AI Race: China, the EU or the United States?” Center

179、for Data Innovation, 19 August 2019. Available at https:/datainnovation.org/2019/08/who-is-winning-the-ai-race-china-the-eu-or-the-united-states/. 26 John Costello and Joe McReynolds, “Chinas Strategic Support Force: A Force for a New Era”, Institute for National Strategic Studies, China Strategic P

180、erspectives, no. 13, 02 October 2018. Available at www.inss.ndu.edu. 27 “President Xi Says China Faces Major Science, Technology Bottleneck”, Xinhua, 01 June 2016. Available at http:/ 28 “GT investigates: Hacking Chinas medical institutes at COVID-19 outbreak, targeting aerospace firms during Chinas

181、 space missions Cyber attacks from India disclosed”, Global Times, 05 November 2021. Available at https:/ 29 Kurt Eichenwald, “How Edward Snowden Escalated Cyber War with China”, Newsweek, 01 November 2013. 30APT1, “Exposing One of Chinas Cyber Espionage Units”. Available at https:/ 31 “USChina Secu

182、rity and Economic Review Committee”, 2019 Report to Congress of the US China Economic and Security Review Commission, 116th Congress, 1st Session, November 2019, p. 135. Available at https:/www.uscc.gov/sites/default/files/2019-11/2019 percent20Annual percent20Report percent20to percent20Congress.pdf. 32 “Chinas Xi Jinping warns of new “long march” as trade war with US intensifies”, Straits Times, 22 May 2019. Available at https:/www. 33 “The Full Text of Xi Jinpings Speech at the Forum on Cyber security and Informatisation Work”.

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(陆战研究中心:中国正在发展的网络战能力(英文版)(26页).pdf)为本站 (X-iao) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
会员动态
会员动态 会员动态:

 wei**n_... 升级为至尊VIP  wei**n_... 升级为标准VIP 

wei**n_...  升级为高级VIP 155**91...  升级为至尊VIP

155**91... 升级为标准VIP  177**25... 升级为至尊VIP 

 139**88... 升级为至尊VIP wei**n_...  升级为至尊VIP

wei**n_... 升级为高级VIP  wei**n_...  升级为标准VIP

135**30... 升级为标准VIP   wei**n_...  升级为高级VIP 

138**62... 升级为标准VIP   洛宾 升级为高级VIP

 wei**n_...  升级为标准VIP   wei**n_... 升级为高级VIP

wei**n_... 升级为标准VIP 180**13...  升级为高级VIP

 wei**n_... 升级为至尊VIP  152**69... 升级为标准VIP 

 152**69...  升级为标准VIP 小**... 升级为标准VIP

wei**n_... 升级为标准VIP 138**09...  升级为标准VIP 

wei**n_...  升级为至尊VIP 邓** 升级为标准VIP 

wei**n_... 升级为标准VIP wei**n_...  升级为至尊VIP

186**22...  升级为标准VIP  微**...  升级为至尊VIP

wei**n_... 升级为至尊VIP   zhh**_s...  升级为标准VIP 

wei**n_...   升级为至尊VIP wei**n_...  升级为至尊VIP 

 wei**n_... 升级为高级VIP wei**n_... 升级为至尊VIP  

131**00... 升级为高级VIP  wei**n_... 升级为高级VIP 

 188**05... 升级为至尊VIP   139**80...  升级为至尊VIP

wei**n_...  升级为高级VIP 173**11...  升级为至尊VIP 

152**71... 升级为高级VIP   137**24... 升级为至尊VIP 

  wei**n_... 升级为高级VIP  185**31... 升级为至尊VIP

186**76...  升级为至尊VIP wei**n_... 升级为标准VIP 

wei**n_...  升级为标准VIP  138**50... 升级为标准VIP

 wei**n_...  升级为高级VIP wei**n_... 升级为高级VIP 

wei**n_... 升级为标准VIP   wei**n_... 升级为至尊VIP 

 Bry**-C... 升级为至尊VIP 151**85...  升级为至尊VIP 

136**28... 升级为至尊VIP   166**35... 升级为至尊VIP 

 狗**... 升级为至尊VIP  般若  升级为标准VIP 

wei**n_... 升级为标准VIP   185**87... 升级为至尊VIP 

131**96... 升级为至尊VIP  琪**  升级为标准VIP

wei**n_...  升级为高级VIP  wei**n_... 升级为标准VIP

186**76... 升级为标准VIP  微**...  升级为高级VIP

186**38... 升级为标准VIP  wei**n_...  升级为至尊VIP

 Dav**ch... 升级为高级VIP  wei**n_... 升级为标准VIP

 wei**n_... 升级为标准VIP 189**34...  升级为标准VIP

 135**95... 升级为至尊VIP   wei**n_... 升级为标准VIP

 wei**n_...  升级为标准VIP 137**73... 升级为标准VIP 

  wei**n_... 升级为标准VIP wei**n_... 升级为标准VIP 

wei**n_...  升级为至尊VIP 137**64... 升级为至尊VIP 

139**41...   升级为高级VIP  Si**id 升级为至尊VIP 

180**14...  升级为标准VIP  138**48...   升级为高级VIP

180**08...  升级为高级VIP wei**n_... 升级为标准VIP 

wei**n_... 升级为高级VIP    136**67... 升级为标准VIP

136**08...  升级为标准VIP  177**34... 升级为标准VIP  

186**59... 升级为标准VIP 139**48... 升级为至尊VIP

 wei**n_... 升级为标准VIP 188**95...  升级为至尊VIP

 wei**n_... 升级为至尊VIP  wei**n_... 升级为高级VIP

wei**n_...  升级为至尊VIP  微**... 升级为至尊VIP