You are on page 1of 1

INVESTIGATION

China’s Secret War


T
he Chinese Communist Party (CCP) are to win a war without fighting openly, seize control of a country by destroying reli- unconventional and conventional tactics to revolution, known as “dialectical material- try’s traditional values and the creation of
is using a series of unconven- to seize control of a society gradually, to gion, morals, traditions, and everything that achieve any number of goals. ism.” The concept works on the three stages labels to attack people who still believe in
tional warfare tactics designed to steal an economy, and to use methods to makes the country function. The end goal is “The ultimate goal is complete takeover, to “identify” an issue, “contradict” it by traditions. Examples include the CCP label-

Against America
achieve the goals of war, without intentionally keep the public distracted to bring the country into a state of chaos, so both economically and militarily, un- finding its opposite, and then “eliminate the ing religious belief as “superstition” and its
engaging in troop-on-troop com- and unaware. that the public will support outside interven- til permanent capitulation is achieved,” middle” to push people to its two extremes. use of this label to attack or imprison reli-
bat. Many of these tactics were de- Among the overarching strategies is the tion to install a new form of government. Fleming said, and described it as a form of After the society is divided, the two sides gious believers. When used abroad, dialecti-
tailed in the 1999 Chinese military process of subversion. The Soviet Union Casey Fleming, CEO of BlackOps Part- warfare “based on deception, and devoid of can be driven into conflict, which allows cal materialism works as a tool to invert the
book “Unrestricted Warfare” but used subversion to spread its “communist ners Corp., a global intelligence strategy any rules.” the perpetrator to step in and stabilize or values of a target country, to form social is-
pull from older deception tactics revolution,” and the CCP has adopted and cyber advisory company, described the At the heart of all these strategies is a “normalize” the situation. sues and movements around the inversions,
Methods of subversion and unrestricted war used and from programs that were set in mo- many of the same strategies to export its CCP’s strategies as a system of “asymmetri- central tool of communist regimes that Dialectical materialism can include the and to use the inversions to drive forward a
tion by the Soviet Union. The key goals “China model.” Subversion is a process to cal hybrid warfare” using a combination of is used to manufacture issues to push for promotion of values that contradict a coun- subversive agenda.
to undermine the United States
BULL'S-EYE ARTS/SHUTTERSTOCK

STEP 1 DEMORALIZE STEP 2 DESTABILIZE STEP 3 OPEN CONFLICT STEP 4 INTERVENTION


Destroy a population’s hope, Destabilize a country by Bring the targeted country Invade the country directly or with
morals, and values by attacking its infiltrating, undermining, or to civil war or foreign war by proxies, then subjugate it under the
religion, culture, and traditions. destroying the institutions inflating conflicts and turning guise of “stabilizing” the situation.

STAGES OF SUBVERSION
that make it function. groups against each other.

STEP 1 STEP 2 STEP 3 STEP 4

CONTROL INFORMATION INFILTRATE AND SEIZE CONTROL STEAL FROM AND DESTROY SUPPORT OPERATIONS TO ASSIST WAGE WAR INDIRECTLY IN EVENT OF WAR, USE
AND PUBLIC PERCEPTIONS OF INSTITUTIONS THE ECONOMY IN OTHER FORMS OF WARFARE DEVASTATING SURPRISE ATTACKS
SAMIRA BOUAOU/THE EPOCH TIMES VCG/VCG VIA GETTY IMAGES KEIVAN/GETTY IMAGES SCREENSHOT YOUTUBE

PROPAGANDA SUBVERSIVE ECONOMIC LEGAL PROXY POISONING


WARFARE MOVEMENTS WARFARE WARFARE WARFARE WARFARE
The promotion of a set image The control or creation of move- Methods to steal or undermine The manipulation of legal The manipulation and supply The use of poisons to kill or
for a nation, a national figure, ments in a society to launch industries, agriculture, and systems, both international and of foreign fighters to fight wars weaken targeted populations.
or a targeted issue. This can protests or attacks against a services that affect a country’s local, to block or stall a foreign without open engagement. Examples include Soviet-era
include framing a politician as targeted group or issue. gross domestic product. action; or to legalize otherwise directives to poison water
strong or weak or an issue as illegal activities—and vice versa. supplies in the event of a war
desirable or undesirable. with America.
ROBYN BECK/AFP/GETTY IMAGES SPENCER PLATT/NEWSMAKERS FREDERIC J. BROWN/AFP/GETTY IMAGES STR/AFP/GETTY IMAGES
CULTURE FRONT REGULATORY SANCTION GUERRILLA BIOCHEMICAL
WARFARE OPERATIONS WARFARE WARFARE WARFARE WARFARE
Attacks on the values, reli- The creation or control of The use of regulations to help The use of sanctions as a The use of small, specialized The use of chemical weapons
gion, language, perceptions groups, businesses, think or inhibit a targeted industry or deterrent against actions that fighting groups to disrupt an and biological agents to create
of history, and ways of life in tanks, and other institutions in business deal. Examples include would affect a country’s own adversary. Operations in- disease and chaos, or to wipe
a targeted country in order to a foreign country, which can be tariffs or country-specific envi- interests or as a weapon to clude attacks on supply lines, out population centers.
destroy the moral fabric, desta- mobilized for numerous goals. ronmental policies. attack a key industry in another destruction of resources, and
bilize, and allow for other forms country. assassinations.
of subversion.
ROBERT MACPHERSON/AFP/GETTYIMAGES GETTY IMAGES

MIKE CLARKE/AFP/GETTY IMAGES OVERSEAS RESOURCE CYBERWARFARE CONTROLLED SLEEPER AGENTS


MEMETIC GOVERNANCE WARFARE The use of hackers to OPPOSITION The use of spy networks that
WARFARE Pressing government control The control of, or attacks breach networks or launch The creation of groups or remain dormant until needed
The introduction and spread into a foreign country. An against, a country’s natural cyberattacks. Cyberwarfare movements that appear and can launch terrorist or
of ideas among a targeted example is the operations of or human resources. This can can be used for many purposes to support an adversary’s clandestine operations.
population in order to introduce the Chinese Overseas Affairs include control of oil supplies or including economic theft, interests and that can be used
concepts and eventually influ- Office, which manages Chinese rare earth minerals, or the hiring censorship, military attacks, to play both sides of a conflict.
ence the culture. communities abroad. of niche experts in target indus- and surveillance.
tries, such as cybersecurity or
artificial intelligence.
DREW ANGERER/GETTY IMAGES HOW HWEE YOUNG/AFP/GETTY IMAGES

MEDIA DIPLOMATIC ENVIRONMENTAL INTELLIGENCE TERRORIST ATOMIC


WARFARE WARFARE WARFARE WARFARE WARFARE WARFARE
Using or controlling platforms Use of diplomacy to push or Operations to manipulate or The gathering of information to The use of terrorist attacks on The use of a pre-emptive
for public information in order to condemn issues or to run intel- block the supply of resources or understand how a target oper- civilians in order to direct public nuclear strike, either from
distract, lie, or alter perceptions. ligence operations. It can be to manufacture environmental ates. This can be used to predict sentiment and opinion. shipping containers or suitcase
These include social networks, used in conjunction with other issues to pave the way for regu- reactions to set issues and to bombs, or launched from a
news outlets, television net- strategies to manufacture con- latory warfare. create strategies. proxy state, in order to destroy
works, and others. troversy or grow influence. strategic targets.
CHINA PHOTOS/GETTY IMAGES SCREENSHOT FBI.GOV
DANIEL SANNUM-LAUTEN/AFP/GETTY IMAGES MARK WILSON/GETTY IMAGES

PSYCHOLOGICAL POLITICAL INDUSTRIAL SPY ELECTROMAGNETIC


WARFARE INFILTRATION WARFARE WARFARE PULSE
Methods for altering the way The infiltration of political Competition for the control of The use of spies to achieve The use of the electromagnetic
a group of people interprets circles or of communities that factories and manufacturing any number of goals including pulse generated by nuclear
information or setting emotional can influence politics such as prowess and all industries that political subversion, intelligence weapons to destroy the electric
triggers around key narratives. business circles and think tanks. relate to manufacturing. gathering, economic theft, and grid and most electronics.
operations to grow influence.

GARY DU/THE EPOCH TIMES SANDY HUFFAKER/GETTY IMAGES JOE RAEDLE/NEWSMAKERS

DISINFORMATION SMUGGLING TRANSACTION ELECTRONIC


The use of false-flag incidents WARFARE WARFARE WARFARE
or the creation of false re- The use of organized crime net- The targeting of money as it’s Attacks in the electromagnetic
ports, which are then used as works or humanitarian fronts being exchanged in business spectrum to control commu-
footnotes in what appear to be
credible reports.
to develop smuggling channels or economic deals. Transac-
tion warfare aims to disrupt or
The ultimate goal is complete nication networks and attack
into a country, which can be command and control systems.
used for additional subversive subvert the exchange of goods, takeover, both economically
operations. services, or money.
BENJAMIN CHASTEEN/THE EPOCH TIMES STR/AFP/GETTY IMAGES
and militarily, until permanent
MISINFORMATION EDUCATION TECHNOLOGICAL capitulation is achieved. SPACE
The spread of outright WARFARE WARFARE WARFARE
false information intended The subversion of schools and The battle for technological Casey Fleming, CEO, BlackOps Partners Corp. The use of weapons to destroy
to confuse and muddle universities to grow academic superiority to ensure that other strategic satellites in order to
debate and analysis. support on key issues and plant nations remain generations disable crucial systems of a
indoctrinated youth in posi- behind in economy and defense. targeted nation and its military.
tions of power or to incite youth
protests around key issues. ALL ILLUSTRATIONS
BY SHUTTERSTOCK
BRENT STIRTON/GETTY IMAGES DON EMMERT/AFP/GETTY IMAGES PHILIPPE LOPEZ/AFP/GETTY IMAGES

HONEYTRAPS FINANCIAL COUNTERFEIT


AND BLACKMAIL WARFARE WARFARE
The luring of influential people, Attacks that target a country’s The creation and smuggling
such as politicians and business currency. This includes currency of counterfeit goods and
Subversion is a leaders, into compromising situ- manipulation, manipulation of currencies to attack a key
communist strategy, ations, which can then be used banks to cause booms or busts, brand or to undermine a Unrestricted warfare
for blackmail. and creation of counterfeit target economy.
perfected by the Chinese currency. is a strategy of using
Communist Party, to
STR/AFP/GETTY IMAGES

STRONG-ARM AND
BEHRAM BALOCH/AFP/GETTY IMAGES

TRADE
KNS/AFP/GETTY IMAGES

ECONOMIC AID
every facet of a
INTIMIDATION TACTICS WARFARE WARFARE THOMAS PETER/AFP/GETTY IMAGES country to achieve a
discreetly seize control
The use of street gangs or The competition for control of The use of economic aid
of a nation. organized crime networks to global trade. This includes the to create dependency and miltiary objective.
threaten or kill dissidents or control or disruption of physical corruption or to assist a
influential critics. or online markets as well as target nation’s adversaries.
trade deals such as China’s
“One Belt One Road Initiative.”

Steal From and Destroy the Economy continued

You might also like