 Good afternoon everybody Today is Saturday is a Sabbath day. I have to confess I'm drinking too much party too much Especially last night I defenced the playboy party and the skybox pin party. It's awesome And so if anything goes good, I love it because those parties if anything goes bad Just blame those alcohol residues Yeah, I'm just a regular researcher from iDefense and Starts like a couple years ago. I heard about some kind of PLA hacking Pentagon was penetrated those kind of story and bring me a couple questions because They talk about three terabyte data was Took him in two months period and The I was thinking can those guys do like a mess can those guys like have some common sense on the forensics So since like the speaker was like Pentagon Senior so I think it may be something true. It's just curiosity So I doing some my own research I love internet internet is widely open and I don't have to be a spy I'm too smart to be a spy and I just sit in my nice couch Drink my tea have some snacks and the type couple keywords I'm running in Texas in Oklahoma in Colorado. It's kind of just like why wet wild west you free run you are cowboy, you know and the From one key word search we have this a splendid story Okay, let's back to my agenda So the first we will talk about what we haven't seen that's probably most people already know it and Another second I will talk about my research methodology and Then we form a PLA information warfare timeline Then from there we have deduction and induction some facts in there and from my own curiosity My grandma always told me curiosity kill cats What the heck I like it So I have a one-step leap so bring up another big story Okay, this is the Timeline for PLA information warfare from 1997 to 2009 and Looks ugly it is sometimes choose is ugly when you cut everything to piece You know just like a Michael Jackson the nose fall out the air fall out. It is ugly Yeah, and then this ugly picture gonna come back force couple times So what Western have to see is first we see Titan rain That's a co-name and the go Google go wiki. It's a larger scale of intrusion and the last couple years the Germany UK a couple Western countries starts accusing PLA doing the hacking for the government sites and then they say they have evidence, okay, I didn't find on online, but well, that's they said and The there is in the National Laboratory. They have Intrusion and a couple of human rights Congress was crying about their box was hacked and the couple DOD contractors like a racion and Lucky whatever whoever your guys know just you guys didn't tell the media, you know you guys cannot lose contract and And the Pentagon. Yeah, every day is 14,000 times scan three terabyte, whatever and the Navy barracks NASA Indian government it's interesting and the When we after we see this we'll have a question where the PLA did so based on this question there is a Yes, or no, some people just say very confirmed PR. It did Some people ask question. How why? When what kind of method whether really pure it did maybe this is deceive and the decept so It's kind of like a set it has a subset it has attributes within it You have to fulfill those criteria to make the statement true So when when you say pure it did whether this relate to stay sponsor Definitely pure is a State unit their entity must be they to do it they did but not necessarily Sometimes under under their own will so whether it is stay sponsor. You still have to fulfill The set all those attributes have to be true so there was many gaps within it and It's beautiful digging beautiful internet browsing first I found out That's a pri barracks soldier. They have the capability physical infrastructure. They have everything provide for them They can do in the they can browse in the internet. They can go through their barracks go to everywhere and So they have the infrastructure. They have the capability and the this guy was a little hacker for five six years and the right now he's in PLA. He's a armor police fireman and he has the ability to do so so question before I start everything is Whether they under the order to do so. That's very important Whether they did it to just for fun. That's very important because it forms different conclusion If a soldier with his uniform or a soldier without uniform how to identify his status that brings different conclusion several soldiers with uniform several without uniform and I love us You love Cambodian you love Romania. He loves China the patriotism is same and And I got inference from CNN or ABC you got an inference from Tokyo news He got an inference from I Don't know whatever news. It's the propaganda Whatever we received whatever we following the same and So another thing is called acquaintance. Whatever we're doing. What I would did is Whatever stay they under the acquaintance. Maybe they know maybe they just Careless I that's from my perspective Asymmetrical warfare. It's kind of like a car game. It's just like a car game because there's 52 cars in there and Which means like a whatever technology whatever method actually right now is a limited It's countable. So like it, you know, what's in your hand just like here. It's Just like a WW's You have your technology you have your capability you have your skill everything you have a sources everything in your hand You know it and the here. Maybe it's China. Maybe Russia. Maybe Iran, whatever They have a one cards and the you think why they give these cards What else possible in their hands after Iran or Russian give their cards You make a decision. What are you gonna do and then you think probably this one? What kind of cards gonna give so it's just Mind game and use a limited sources. That's my perspective of Of the search internet browsing I believe a river rock could make a splendid but ugly New York City Just like a one piece information. I starts grab starts doing the research on internet starts digging and then when I accumulate everything I form a New York City and the When I spot the big cheetah when I see the big cheetah, I really don't have to catch the cheetah I only need a just character his character his special pattern to identify that's a cheetah So that's our methodology says we goes from micro to macro we see everything from macro to micro and And when we receive those information when we see the evidence we first identify them we verify Have we have a criteria to verify and we validate in our database and then we organize them to form a conclusion So all those criteria We set the rules for consistency for continuity for it has to be carried by tangible entities and has to be Published because we are doing ocean so it has to be published by undeniable Published news even those news the purpose is a deceived and decept even those news came from some dumb reporter Doesn't matter because it's a footprint. It's a footprint. There is something to generate this news something in there and And we use a cross-reference. That's very important to three triangulated cross-reference So those conditions are and the logic and the condition and The rules in there is you have to have time time attributes in there or location or Unicode or leaders name or orders number or designated function It's just kind of like a machine learning when we write in program for machine learning Basically, you don't have to fill all the attributes. You may be missing two missing one. It doesn't matter. It's all condition here is a little bit about China PLA and the day in their high ackee and that's the National Party Congress and After that is a central committee and Below this it has a central military commission CMC Under the same CMC no the rest of just your guys can go to like a dot gov any pages It will educate you so well, you know, it's a well documented and Just police department the foreign affair whatever it's just For Chinese China dot gov or us doing the keyword search and in here we see the CMC has Full subsets one is called general staff department. It's kind of like a brain It organized and the planning do all kinds things the second is called general political department this department is kind of like a Like Y cell like your body immune system and preventing soldiers and getting goes to the bedside thinking bad and encourage the moral those kinds things and Another call general logistic department basically You need to give them dress give them food and the providing things for them in order for fight to fight, right? And the general armament department the weapon and the equipment things So that's a GSD. It's a function. It's a brain organizing leading Commanding action training military affair, whatever those just their function That's a PLA force structure There is seven regions northeast northwest and the Beijing region and the east region Nanjing Southeast and the southwest and recently they just reshuffle the cars and they The seams to change a couple regions and mix with some and reduce I think a reduced one or two and Air force same Navy same second artillery its missile unit and Ground force they have active soldier about a half a million armed police force about 1.5 million and Malaysia it's about one million actually much more because One general military general recently just say they can just call out to about 20 million soldiers Malaysia 20 million good Malaysia in 72 hours That's the ways that capability So we recursively break down the infrastructure the function everything we can find out there is a China people's armed police and the militia in there and then the militia basically kind of like a National Guard or reserve unit and they attach to Active PLA They do something PLA cannot do a PLA doesn't want to do whatever it's just National Guard You know guarding the street or doing some airport job something. Yeah, and the In here we can see the subordination relationship is CMC it publishes the order give the guidance and GSD it provides management right and the PLA regional commander They just execute the order to the city level to APF the armor police force and after that GSD they publish the training manual training tasks and The regional PLA garrison they execute those tasks those local Local city or local APF they providing manpower providing equipment on the different authority So timeline and that's my initial search because I always like to back to the head first So when I type in the keyword search PLA information warfare, whatever it pops up first 1997 they have a first PLA division staff chief of staff training form basically They're learning from Kosovo. They discuss about it and try to find other What's what China should do for the information warfare? They talk about hacking that's instant they want to hack it and 1998 they formed the first official net Malaysia Union. Please remember this word net Malaysia Union and This unit has a fully professionals. Most are professor and PhDs most people were familiar in this book if you're from West Point from DIA whatever from the IC community you definitely familiar in this book It was a cry louder for a while and it's called unrestrict the warfare the two writers one is the Air Force Colonel another is Lieutenant Colonel I say I forgot they get promoted and the one retarded and Retarded and this to this book basically Alcohol alcohol alcohol Yeah, this book actually Copied or like a use a lot of Theory and ideas from West from the information wall so They have their own stuff and they actually inherited and learned from West this is a very interesting guy and he wrote the first Trojan called why AI and the PLA is using it and still use it It's called why AI and the you guys can go like a online doing search about it's a really old Trojan and the 1999 and the PLA starts thinking about the remote remote access and the intuition and Right after this 2000 January two PLA region starts have Joint drill and that the purpose is Taiwan war this general his name is Xu Xiaoyan and He graduate he got he grabbed his graduate degree from Canada Forgot which university, but he's a really good for computer science and In 2000 he 2000 he talked about information warfare and he largely that's bad and December 2000 the General staff meeting he talked about unrestricted warfare he largely quote words phrase or idea from and strict warfare and president love his talk so he get a promoted from a Communication a chief of a communication department something to a deputy commander of a PLA region that's a big jump and August 2000 there is a first real drill deployed in China and The it's called a militia special network training system for air defense please notice the red marked air defense and the 2001 PLA invest 60 million yuan to build a base Information warfare base training those professors doctors professionals. There is a 430 professionals in there and the this guy is a professor in university and He's a leading couple female militia net militia groups and 2001 his proposal called air defense emergency alternative plans was accept by PLA and Under this plan there is a 60 masters and the professors work on it 2002 Two cities starts to exchange and study from each other about their experience Whatever whatever they sink. That's just experienced exchange 2002 there is a one unit and they tested It's called air defense mass which basically they adapt the air defense system the military System with the civilian system and that they testing the capability testing the they're like all the capability for the For the whole system air defense system There is a Southwest region. There is a 24 7 not 7 11 24 7 militia net militia unit formed by professors and the PhDs and the basically their task is doing the Surveillance and the air defense and the quick response. They even build a Platform so everyone has a laptop. They can they can jump on the platform any time and Anywhere 30 minutes they can do it 2002 couple PLA generals they inspect different labs the network offense and defense labs 2002 they they invited a couple civilian instructors civilian hackers and to teach them how to hack and Use the Trojan called Galicia It's very famous very famous famous one. I used before too Yeah, so let's back to the ugly picture That's all the events all the events Happens during that time period and that you can see like it starts starts the book starts talking starts the book and starts the Taiwan drill and Starts some like a active drill and it starts the Trojan and it starts a training base. There is a promotion there is a Base right here and there is a couple university involvement These are the net militia units and those are the unit members They pledge the loyalty to the party to the PLA and there is a selection the criteria for those people's you have to be above 26 25 to 26 and below 45 and Some some like there is some kind of order that really weird you have to above one five three five five five five feet six inch something like that. It's just very interesting they have a kind of criteria for this and the That's the future field training and the field like Inspection for those guys you see the heavy box for that see the heavy CRT for that I don't know probably they don't have enough money to buy wireless So Normally normally those universities those teachers falling the Category the criteria they've been selected you have to be PhD or graduate degree. You had to be maybe party member or 45 below whatever based on this In this picture probably one-third of them are not militia They had that militia training in the in 2003 PLA Nanjing PLA region starts also seeing also seeing their work commanding center to universities and the usually like a You see like a wee bomb Manufacturer we bomb air base. We bomb whatever military base, but we never bomb university They put in university and those university stay with the civilian residence area. So it's good safe and And 2003 some like a senior net militia. He's back to his University to teach those journal guys how to use Trojans and In 2003 a couple stay on the enterprise They starting act as wartime commanding center just like we see they put a commanding center in university So you won't bomb it. That's a Lord's mercy and you put it in stay on enterprise That's so big and you can't just destroy so much. You can't destroy it in 2003 end of 2003 they purchased the new equipment for network and for the For the network offense and defense they're doing a test couple regions starts doing the joint test and 2003 there is a operation codename called frontier guard 230 and it's a joint operation The purpose is for air defense and net militia was heavily involved Starts 2004 they starts purchase new space surveillance and the radar system 2004 GSD published order the order give to most of the cities Task them to form net militia unit and it has a function. It has designation. It has tasks whatever drill related it's Just very clearly order you need a net militia unit and May and the they starts universe Institute called air defense officer Institute That's their badge by end of 2004 Guangzhou PRA they starts doing a special recruiting for computer science PhDs and the masters and the PhD The bonnet is 30,000 Chinese one and a master is 20,000 Chinese one and the GSD published the net militia performance review and appraisal By end of 2004 they have a training and the drill integrate to the real war track Okay, little stop right here. Yeah last time actually people ask me question about why you like highlight Or you put those air defense words like a seven times and the And anyone recognize this one Go ahead you have a question give me second and the so you have your own Indication, right? That's the indication. What's the purpose for air defense? Who they're gonna defend for? Very clearly that's their target their intention and May April of 2005 there is a large-scale emergency order to form a national militia unit Net militia unit. So that's a found out a really weird criteria You have to be five six five three six inches taller and you have to look neat and Whatever it just seems like doing the show, you know for soldier. It's very interesting. It has to be all male No female something that's criteria and Yeah, that's the mixed the air defense team and some like a I Forgot some kind of fiber related team. I just forgot that Yeah, and that they in the same time they start the intelligence units for information collection and translation related multiple units and The well those those are girls translation or intelligence probably girl doing that better in the PLA and the PAF starts recruit Hackers recruit good computer science people in different universities That's back to a very interesting story Anyone heard about the Jin Wei? Okay, I defense develop a guy called wiki Rose and this guy was was a at beginning he was a regular hackers and regular hacker and but Accidentally he win the competition. He became the first class in PAF network offense defense that the drill so they send him to intensive training the bow camper for one month to doing all kinds of like hands-on training and He came back and he get a paid so he formed a team called called NCP edge network crack program hacking and They released the rule kit called Jin Wei I'm sure like a some people just don't want to raise the hand say you know it or you heard about but That's like it costs us a lot of problem and the eye defense Chasing everything back and found out that that's him. That's his team found out his box everything and we Published the whole story to the community so after after that times kind of follow him to where he lives and Exposed this guy too much. So PIA just think Since you are exposed too much. We just dump you so right now. He's back to the university doing his graduate study But in China living is tough. So right now. He's doing doing the underground things. He's selling the credential he Hacking the games those online games and he has a really weird like Habit those those habit in his leisure time as a male, you know, he likes Dressing he liked it cosmetic things. So it's a really called the wiki rose Yeah In the 2005 end of the 2005 there is national emergency drill structure China integrate Integrate all the the airport Harbors hospital gas stations Surveillance system Into the emergent drill and those telecom infrastructure was under in the 2006 May there is air defense drill and the exchange everybody Learning and the experience it and that they're doing the exchange so that's the Another picture in here seems like a not many activities for the hacking things it's all like universities recruitings and school related 2000 end of 2006 starts a large-scale online psychological warfare against Taiwan that's the Inspection for Taiwan war it said The first the battle use me and the all-time use me and use me must win. That's they said so that's the 2007 Shanghai it's very Westernized city in the air defense game and 2007 Wuhan China's submarine base a production base was in the air defense game in the 2007 Guangzhou PR a they set 100 miles offshore for the net Malaysia task in the I ask myself why they use 100 mile offshore as It's a reference. It's very interesting why you're not using like a 250 or 50 so You think about 100 miles offshore What's the speed travel of the bomber what speed of the missile? What's the speed of the net Malaysia reaction time? So that's the number indicates That's the Wuhan drill. That's he's a PhD. He's leaning about the 30 guys under him In 2007 PR a starts announcing a big news called the electronic Magnetic protection solution and one lady officer found out this solution. So they bring up a new concept complicated And it's called CEE they bring up this concept and they integrate into their practicing Then it's interesting. We starts from a network of hacking and then suddenly we jump to tank Tank regiment just kind of jumping too much bear with me follow me and if you're not following me bear with me Yeah, and Tank is a tank regiment to travel 1,000 miles It takes a lot of a logistic support a lot of time and you can't Get away from the satellite surveillance. It's just too much in the why it has to be 1,000 miles That's another numbers. Just like say why is 100 miles offshore? Why is the 1,000 miles maneuver? under the CEE so which means they have a long way to go right in the 2007 Piai starts purchasing Purchasing from to from west they start to purchasing free purchasing use hackers to purchasing though the Helicopter related information. It's a 10-ton helicopter. So it's good for land combat and the 2008 It's a Shenyang Piai region. They have a drill the drill the purpose is use Trojan Trojan to change logistic requirements and the data to cause confusion and then EMP destroy the motherboard and the wireless function modules and the landlines and the finally radio stations September That's Guangzhou. They deploy a KS-1 missile with them at Malaysia units and that's the short-range missile 50 to 100 miles and The second artillery battalion Atelier they have the largest real in the history and the deploy that new Network standard Well, we jump everywhere 35 satellites will cover the surrounding China surrounding area We're back to tank again and the tanker regiment. They have a codename called the front line 2008 and it's a live emanation under the CEE Beginning of this year China has South Sea fleet. They have a drill under the CEE. So I'm Use a blue word for the CEE So in this stage, there's not much university involved. Those are the Real practicing real integration in there. Okay, let's see the small animation The original starts from here the two PI region then they move to move to the Chengdu then move to Guiyang That's the first stage is the red second stage is blue third stage is green Can anybody like a form some kind of fuzzy sense about what they are doing for South Sea fleet easy fleet and as as an industry as business like a we usually use a Production developer stage. We're learning. We have a different stages for so first that we're doing the strategic planning stage everything You're doing strategic state planning stage. So it's meets. It's perfectly fits timeline one and After that you have a research stage this timeline to Production define that stage three project management timeline for You industrializing everything timeline five Implementation timeline six and dissemination timeline set seven and You go to a new circle prepare for CEE. So That's the that's a spiral mode for everything. Basically, you understand the requirements It goes to design a system then you build it in the stage then you test evaluate final released and the following like a PPT I Insert from my boss and the Rick. He's a he's a PPT PowerPoint good goo You know and I like it. He's really good and that's his credit Okay Why you love that lady Okay, it's starts in 1997 and start here they have a discussion It's a pro rapid prototype and it's in the 2009 Okay, so starts 1997 here 2009 here in the First training course of all discussion. It's understand Understand the requirement to go to the rapid prototype is first net militia union then 99 first Trojan Understand requirement. That's not Unstrict warfare. Why this guy there? Okay, just like a game you understand all the requirement you Understand this first then you know the game. Otherwise, you're just yelling with everybody else and the designer system He get a promoted To the Nanjing region this he starts design a system. That's the Air Defense Institute The build it into different stages When they're doing the different unit tests psychological unit warfare unit, that's a testing and the evaluation It back to the understand requirement again. It's wartime in command center design the system. That's they put it into universities And testing evaluation that's called from from frontier guy 230 and that's a testing and the evaluation Perfectly fits each sector He published a book called military it principles It's a little messed up. Okay, so final release EMP That's a final release We can see the quick prototype the target is Taiwan and The requirements in the second stage the design state design the system in the third stage Building building different units into a different operation. That's the stage four and a five test 16 and a seven and release it disseminate and the research of the CE back to the initial focus Fact list and I deduct from Those informations we see PLA is guiding and the task in the militia unit in the civilian companies PLA has deployed large-scale national cyber emergency drill and the All activities are based on physical infrastructure. Sir, I will show you in the next slide and the PLA information warfare the focus was air defense and the recently they shift to the operation under the CE and You can see those dots like a first stage second stage third stage is from inland to the coastline If you see personal involved you see business involved in the whole national nationwide Immersion drill. So it's a from person to business to nationwide It's called people's war from civilian researcher to official orders from land to ocean to space Everybody see we jumping everywhere from space to ocean to tank to network and From virtual just a theory just a to tank to missile. That's from virtual to real and That's my conclusion. Taiwan was the initial issue and the is still will be and In here PLA information warfare that the module is complete and that's the Cernet map and I'm talking about because I say everything is based on the Cernet and This is a China Cernet structure and you see all the events. I put all the events into this map. You see perfect It perfectly fit they're practicing on this structure It's a China education at research net Because that's IPv6 is running on this net. Okay just just a little like a Little curiosity to make me forward a little bit because since Taiwan Taiwan is close to us right and so I doing a little more research from Taiwan intelligent those Asserts and I found out there is one thing called a head-off operation That's the map shows The yellow one shows the missile the bombing area and the Air Force the airborne dropping area the The gray one is the China's second artillery Cover zone the red one is 72 hours US Japan and the Korea reaction zone And that's the for the seventh flea Seventh flea for after the battle and that's the South Sea China South Sea Flea control zone The this blue with the blue one. That's the China easy flea control zone and that's the landing land force land zone and the So that's the Taipei Taipei city map There is all the government in government Buildings in this area. That's perfect lands or the missile will be there. Hey, I love internet It's called Google search Yeah, it's it's called Taiwan war head-off operation You guys can find out it's easy just type keyword. I explained early already. That's Western US Japan retching time missile cover and following just my own observation and I I'm really like a love the curiosity and I was bringing you so so much so much good things and Most my information just from internet just internet sitting on the couch Drinking and the typing find out and the 10% maybe just talk to some reliable sources and tell me some story and Following things you may just you have to have some kind of character or to digest this because like a You have to have some kind of investigators in a special sense Very sharp sense to do it and when you sink it you put everything together. You have to have a kind of a robot That's what I'm doing the AI AI writing for a robot the robot thinking You have to fill all the slots and the doing machine learning things and the You can't give up but you can't be a queer you have to be a tank sable wrong you to penetrate You have to all the way to the end and the you have to serve or you have to like treat those information like a Disney Kitchen man basically doesn't matter where you came from who you are I'm serve you with a professional attitude with a neuter a Neutral ground so takes passion takes expertise takes neutral thinking takes effort time to digest it I Found out that this information They've been practicing 107 millimeter rockets and the Same thing why using one millimeter seven rock Rockets why it is a battalion size why it's on the beach. It's just very normal question for a normal person normal researchers and Put everything together find the principle find the facts That's the size of the one seven millimeter rocket and the find out the landcraft for China armies and you see like this the size the capability you calculate one battalion and When pure a doing the simulation They focus on the landing parts why they're not doing the jungle parts why they love to do in the landing parts It must be some kind of purpose for landing and they have diesel AIP and the since the if anyone remember there was incidents happens to One China diesel submarine raised up really close to US Aircraft carrier and kind of like I say hi dumb just I'm here and Those like a US submarine was like a really shocked they penetrate their defense line And that that's the good parts of the diesel AIP. It's really quiet You can't detect hard to detect and it's cheap So China increase the order to produce those submarines Wuhan and Shanghai increase the order for the submarine 30 kilometer entire ship missile So that's a fits the perfectly fits the picture the head off Because when you measure the distance between the coastline to Taiwan Coastline, that's a perfectly fits the zone and the ship whose ship in there Wow, they're getting serious about after nuke action and the how many countries has this capabilities and The how many country will easily deploy the nuke in South Sea and They use a thousands thousands jets bombers and those some jets are really older Grandma level jets and some are very she fashion fashion jets They mix them together doing a deep inland combined the drills and Why they use those older like a jets really old like a grandma level, you know and What's the purpose and That's another another province they try to confiscate those a faked military tax In China military, there is a lot of a toro on the highway It's a really bad things because like I can drive from East coast to West coast. I pay nothing. I drive from South to North. I pay nothing But in China the highway is kind you have to pay every times and Military tech give you a privilege. You can go through those toros free and quicker than everybody else and So those are smuggling people Use a fake military tax mixed with a military convoy to get there like a save the money Or can get some good stuff sneak in and it will basically it will harm or damage the operation so they take those tags away catch them and Keep the operation clean Why put a Y max on the top of Everest? I don't know they want to help Indian something but I know they hate each other and then That's if anybody remember that's last year. There's the Indian government was crying about to shout in her female hacker union was like Hacking the Indian government and doing the deface and something they did they They actually take some data from a government takes from some financial institute and I met her She's a she's not that good. Just not that skill set not that Dedicate self-lover and has a big scar right here came came from countryside her all her parents are farmers and And then she has no job right now, but she gets some money for travel. I don't know where it came from Yeah, 210 210 by end of 210 China say they're gonna deploy 35 satellites and that they will cover in it by next year 2011 they will have a space station So let's check this It's a map and that's the satellite cover zone from here east 70 to 140 North 5 to 55 so basically it covers China and some like a Philippine Cambodian and South Sea and the all the way cover Afghanistan. Wow. They're doing some of free service for them or what and the Basically those 35 satellite covers and in here there is a pass You can access from Pakistan to China In here, there is pass in here Bangladesh there is a it's called a MacMahon line, whatever I think China had and the India had a big fight during that time during like a 60 or 70 60 in the here is the South Sea operation EC operation in the here is a Y max on the Everest here is the military tag fake military tag That's the nuke operation That's That's the what's name 107 rocky Yeah, that's That's the China that they can deploy a half million soldier and the 1500 tanks and the 900 jets Into that area really quick See that's the tank maneuver. We talked about the tank maneuver one southern mouse That's distance for one southern mouse. So it's if you're doing the doing the cover zone it covers basically Covers this area cover this area That's another frontier to 30 drill they covers another maneuver they covers this area That's the EC flea That's the Nanjing another another drill So you see the purpose of this is the focus is still by the coastline and They have some kind of surveillance and protection in this area. I Just read the news like a one couple of China generals talk about the China has no real war since like a 50 years ago with a U.S. and Soldier needs practicing. Wow sounds really cold-blooded and By the military regulation 2004 the air defense University the Institute of soldier they graduate they will be o2 level just like a lieutenant level and Every four years they get promoted. So from o2 to o5 or to o6 basically you can calculate it's a about 220 and O5 o6 they are the most Backbone for military operation and the U.S. Heritage Foundation research found out to on 2025 in Pacific area China submarine and US submarine the number of the ratio would be five verse one and by 2020 China will have two aircraft carrier and It's another interesting issue the imbalance between male and the female because Some like a really bad tradition. They like a boy. They don't like girls. So they kill girls and that's the bad That's a bad consequence. They have they have extra 40 million bachelors by 2020 and the Can you imagine 40 million extra young boys? And that they mostly live poor without party like us and the what's the best solution for them? waste them So from now on we're looking for another 10 years. That's my hypothesis So if Taiwan war break out Then mostly China will face cyber related cyber propaganda economic Things media and whatever it's like a do whatever we will do whatever we can do and Space we probably gonna shut down those satellites and we'll have a regular airstrike regular airborne landing whatever those things and the ocean we have a specifically in there and that maybe we'll have like a special task Then in search of backstabbing from India and so All the policies all the movement China made starts making sense. It's counter though all those Operations great firewall to against the propaganda and media penetration and IPv6 CN rule China was applying for the CN doc CN as a route For so many years said that I quick launch they can launch the 12th satellite in 20 minutes and the air defense CE more diesel submarine satellite cover zone Deal with the Indian everything starts making sense That's just my one step leap probably too much and That's I conclude I finished my today's speech and if you have any questions we can answer By the launch Thank you