July 6, 2011:
China has established an "Online Blue Army" to provide a realistic enemy for those seeking ways to protect China's Internet infrastructure. In Chinese training exercises, the "Red" side is the good guys, while the "Blues" are the enemy. It's just the opposite in the West.
The U.S. has similar "enemy' units. Four years ago the U.S. Air Force formed "aggressor squadrons" to help sysadmins (computer network system administrators) deal with foreigners, or Americans, trying to hack into military computers. The 57th Information Warfare Aggressor Squadron is an active duty, while the 177th Information Warfare Aggressor Squadron is a reserve outfit, part of the Kansas Air National Guard. Until 2002, the 177th Squadron flew B-1B bombers. The bomber pilots and their support personnel were replaced with Internet geeks. Both of these squadrons spend much of their time attacking American military networks, to discover vulnerabilities before a real enemy does.
Having your own "professional bad guys" is an old air force tradition. Since the early 1970s, the U.S. Air Force has been using "aggressor squadrons" of air force pilots flying like foreign aircraft. These training squadrons used training areas that were equipped with radio towers to collect information on where the participating aircraft were during the exercise, and what they were doing. This was the "Red Flag" training system, used for exposing American pilots to enemy tactics and equipment. The facilities included "enemy" aircraft (often actual Russian fighters, but also U.S. aircraft flown in the same manner as Russian ones). The "enemy" (or "aggressor") pilots knew how to fight like various enemy pilots (usually Russian, during the Cold War). On the ground, there were mockups of Russian air defense systems, including transmitters putting out the same kinds of electronic signals the Russian gear would. China has since formed similar squadrons.
The Red Flag program was begun when, during the Vietnam war, the air force noted that they were not doing as well against Russian aircraft (used by the North Vietnamese) than they had two decades earlier in Korea. Turns out that the American pilots had become too accustomed to "fighting" other American pilots, using American tactics (which is the way it was done in training).
The air force eventually adapted the "aggressor" technique to other areas. In the 1990s, there was "Project Checkmate," a bunch of brainy air force officers and civilians whose job was to come up with new ideas on how potential enemies could try to win. Eleven years ago, the U.S. Air Force created the 527th Space Aggressor Squadron. The air force needed someone to play the role of enemy space forces in wargames, using information available from publicly available information. The four main specialties of this squadron were; Imagery Exploitation, Electronic Warfare, Red Attack, and Space Control.
The Information Warfare Aggressor role is similar to the "tiger teams" commercial firms hire (and the air force pioneered) to test the defenses of corporate networks. The two aggressor squadrons have increased the quality and quantity of attacks that can be launched against U.S. systems, to see how well the defenses hold up. Members of the squadron then analyze the results of their attack. Finally, the aggressor hackers tell the sysadmins and other concerned personnel of the target unit what they did wrong, and why.
The Chinese have been catching up in this department. Six years ago, the China formed a special electronic warfare unit, the Electromagnetic Blue Army (EBA). The EBA contains dozens of electronic jammers, radars, UAVs and electronic gear similar to that found in Western armies. The EBA is used to expose Chinese army combat units to potential electronic warfare they might encounter when fighting Western (particularly American) troops.
The EBA is also a research operation, taking data collected by Chinese intel units on Western electronic warfare capabilities, and coming up with the best way for Chinese forces to cope. To test the abilities of Chinese units, the EBA has been used in over a hundred training exercises. Some of these have involved naval forces as well. The Chinese units on the receiving end of EBA attacks often perform poorly. This is part of the learning process, and Chinese units are better prepared for battlefield electronic warfare tactics because of it.