Tag Archives: PRC

Call for Articles: China’s Defense and Foreign Policy

By Dmitry Filipoff

Articles Due: November 22, 2017
Week Dates: November 27 – December 1, 2017

Article Length: 1000-3500Words
Submit to: Nextwar@cimsec.org

As China’s economic power has grown, so too has its diplomatic and military might. President Xi Jinping, in his opening speech before the 19th National Congress of the Communist Party of China, stated that China will “stand proudly among the nations of the world” and “become a leading global power.” This ambition includes building a “world-class” military. 

China’s deepening economic relationships across the world has lifted many other nations. New relationships are forming, especially due to its ambitious One Belt One Road initiative. But China’s foreign policy has taken on greater prominence for international security, especially in regard to disputes over sovereignty, the rule sets that govern the world’s commons, and the increasingly volatile situation on the Korean peninsula. 

Authors are encouraged to analyze these issues and more as China’s defense and foreign policy yields more expansive and impactful implications. 

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Nextwar@cimsec.org.

Featured Image: China’s President Xi Jinping at a military parade in Hong Kong. (Sam Tsang/South China Morning Post)

The CCP National Congress: Milestone for Policy Revision?

Dr. Ching Chang

The Coming Power Reshuffle

The Nineteenth National Congress of the Chinese Communist Party will be held on October 18, 2017. As many China political observers already know, the Communist Party National Congress itself and the First Plenary Session of the Nineteenth National Congress of the Communist Party of China that gathers immediately after the National Congress will be the defining event for the reallocation of power for the next five years.

This National Congress will select new membership for the Central Committee, the Central Commission for Discipline Inspection, and the subsequent First Session of the Central Committee will select Politburo, Politburo Standing Committee, and party Secretariat members. It will also decide on the members of the Military Commission of the Central Committee, in addition to leadership selection such as the General Secretary. Additionally, many states that are tightly associated or affected by future Chinese political maneuvers are concerned about whether any new policy will also be formulated through the same mechanisms.

This article will provide certain credible references as the basis to judge the possibility of revising existing policies by scrutinizing the institutions of these two meetings and reviewing actual practices of previous similar meetings. Whether these two meetings can become platforms for substantial policy discussion, debate, and reconciliation is the core matter that needs to be understood in order to identify any PRC policy revision and grasp a more overt picture of how the Chinese Communist Party manages their political and power transitions. Yet this still might not be necessarily implying any immediate policy shifts and adjustments.

Examining the Nature from the Institutions

It is necessary to review the Chinese Communist Party Constitution to understand the nature of the National Congress of the Chinese Communist Party. According to Article 19 of the Constitution:

The functions and powers of the National Congress of the Party are as follows: 1. To hear and examine the reports of the Central Committee; 2. To hear and examine the reports of the Central Commission for Discipline Inspection; 3. To discuss and decide on major questions concerning the Party; 4. To revise the Constitution of the Party; 5. To elect the Central Committee; and 6. To elect the Central Commission for Discipline Inspection.

As we review the meeting records of previous Chinese Communist Party National Congresses, we may notice that all six functions and powers have been well exercised except the third one which is, “To discuss and decide on major questions concerning the Party.” This is actually the only function that contains the possibility of formulating or revising policies, yet it is rarely utilized in previous congressional agendas. The first and the second functions are fundamentally a top-down model of political communication and the examination process is in essence a formality conducted by applauding. The fourth function is focused on internal institutions by setting operational rules within the party and hardly associated with any policy toward the outside world. And finally, the fifth and the sixth functions are basically serving the purpose of internal power reallocation. We therefore hardly find any trace of substantial policy formulation.

Nonetheless, the first function of the Party General Secretary is to identify certain elaborations and interpretations of policies. For instance, Hu Jintao, in his capacity as the General Secretary of the Central Committee of the Communist Party of China, delivered his report to the Eighteenth National Congress of the Communist Party of China titled, “Firmly March on the Path of Socialism with Chinese Characteristics and Strive to Complete the Building of a Moderately Prosperous Society in all Respects” (堅定不移沿著中國特色社會主義道路前進,為全面建成小康社會而奮鬥) on Nov 8, 2012, is a typical case of identifying the contents of PRC’s policies.

The major portion of this policy report may address domestic issues. Nevertheless, contents mainly within several chapters of this report such as the Chapter IX, “Accelerating the Modernization of National Defense and the Armed Forces” (加快推進國防和軍隊現代化), Chapter X, “Enriching the Practice of ‘One Country, Two Systems’ and Advancing China’s Reunification” (豐富”一國兩制”實踐和推進祖國統一) and Chapter XI, “Continuing to Promote the Noble Cause of Peace and Development of Mankind” (繼續促進人類和平與發展的崇高事業) may naturally trigger concerns from  international audiences.

There are several features we should address here to remind the readers that these statements within the report are not the result of policy formulation process contained by the meeting agenda. First, the contents of the report are concluded from the actual practices during the period of the previous Central Committee still in power. The perspectives are more or less retrospective and relatively less prospective in nature. Second, it is a report delivered by the party General Secretary of the past five-year term Central Committee. Unless the same General Secretary of the party extends for another term for five years, power may pass to new leadership right after the party National Congress. Although there certain elements of policy continuity may exist, the contents revealed by the report are no assurance for their applicability in the future.

And last, it is a unilateral political communication, not a multilateral discussion at all. It therefore could not be a result of a policy review occurred within the National Congress itself. We may expect Xi Jinping will follow the same modus operandi to conclude all his achievements in his previous five-year term and mention still valid policies for his next term. The possibility of declaring new policy is relatively low since no proper policy review is likely to happen in this enormous political gathering. There also is no meeting agenda to accommodate any provisional policy proposal.

As for the First Plenary Session of the Nineteenth National Congress expected to be held right after the National Congress, its main mission at this period is to select new leadership for the party, not revise or promulgate new policies. According to Article 22 of the present Constitution of the Chinese Communist Party:

The Political Bureau, the Standing Committee of the Political Bureau and the General Secretary of the Central Committee of the Party are elected by the Central Committee in plenary session. The General Secretary of the Central Committee must be a member of the Standing Committee of the Political Bureau. When the Central Committee is not in session, the Political Bureau and its Standing Committee exercise the functions and powers of the Central Committee. The Secretariat of the Central Committee is the working body of the Political Bureau of the Central Committee and its Standing Committee.

The members of the Secretariat are nominated by the Standing Committee of the Political Bureau of the Central Committee and are subject to endorsement by the Central Committee in plenary session. The General Secretary of the Central Committee is responsible for convening the meetings of the Political Bureau and its Standing Committee and presides over the work of the Secretariat. The members of the Military Commission of the Central Committee are decided on by the Central Committee.

It is also noted at the end of the same article that, “The central leading bodies and leaders elected by each Central Committee shall, when the next National Congress is in session, continue to preside over the Party’s day-to-day work until the new central leading bodies and leaders are elected by the next Central Committee.

Obviously, the power rearrangement is the major concern for the First Plenary Session of the Chinese Communist Party Nineteenth National Congress. Although it is clearly noted in  Article 21 of the present Chinese Communist Party Constitution, “The Central Committee of the Party meets in plenary session at least once a year, and such sessions are convened by its Political Bureau. The Political Bureau reports its work to these sessions and accepts their oversight,” it is not always practical to conduct these for the First Plenary Session of each party National Congress since the members of the Central Committee and the Politburo are newly elected at the moment. We therefore may expect that no policy review and reformulation process will be exercised during the coming First Plenary Session of the Chinese Communist Party Nineteenth National Congress.

Assessing Meeting Practices

Reviewing actual meeting practices, we may also assess whether the Chinese Communist Party National Congress and its subsequent First Plenary Session of the Central Committee can be a platform for policy revision and formulation. As many political observers have already concluded, although the Chinese Communist Party National Congress and the Central Committee are theoretically the highest political power mechanism as noted by Article 10, Point 3 of the CCP Constitution: “The highest leading body of the Party is the National Congress and the Central Committee elected by it,” all the important decisions including personnel arrangements and policy stances are generally settled before the actual meetings. After all, the actual political practices are the consequences jointly achieved by political institutions and political culture together. Hidden rules in human societies always exist.

Premier Li Keqiang delivers a speech during the National People’s Congress in the Great Hall of the People in Beijing. (AFP)

So far, the Chinese Communist Party has persistently tried to keep a harmonic and systematic power transition process since Deng Xiaoping in the mid-1980s though this political design was still unavoidably disrupted by the Tiananmen Square incident in 1989.  The routine CCP National Congress may always attract international media attention simply because it has the capacity to present the major leadership shift every ten years in its even number term gatherings. On the other hand, the CCP National Congress will also reveal the future political leadership by promoting young generations to key party posts for preparing to shoulder the duties of leadership in those odd number party assemblies of the national level like this time.

Given the size of congregation, well over two thousand including voting delegates plus specially-invited delegates who are retired seniors but granted equal delegate privileges for the CCP National Congress in the previous two terms. As for the Central Committee, its full members and alternate members are generally selected from the leadership of provinces, direct-governed municipalities and autonomous regions, top brass of the People’s Liberation Army, operational theater and major staff establishments of the Central Military Commission, leadership at the minister level of the State Council and CCP administration apparatus, as well from the leadership of state-owned enterprises or state-sponsored institutions. No meaningful and substantial policy reconciliation process can be managed within a meeting of such a complicated composition and with members from so diversified backgrounds. And this is exactly the reason why we had never seen any PRC’s policy shift after those CCP National Congresses for power reshuffles and their subsequent First Session of the Central Committee.

Predicting Policy Orientation from Personnel Structures

As noted above, the nature of the CCP National Congress and its subsequent Session of the Central Committee is power reorganization and transition, personnel reallocation and revisions to party institutions as necessary. These two meetings are by no means an appropriate or useful venue for policy review, discussion, debate, and formulation. Although certain traces of policies can be identified from those political reports, most of the contents in these political statements are retrospective but less prospective.

Nonetheless, policies are defined and designed by those holding the legitimate positions in the decision-making systems. Fresh arrangements of PRC’s personnel structure in various dimensions can be the catalysts for formulating new policies towards the external world. Those states that have deep concerns about how new Chinese policies will affect their interests have the opportunity to observe these decision-makers, and their selection, through these two political conferences. Even though we should remember that it always takes two for tango, many policies are the result of interactions and not unilaterally decided. For those cases where Beijing does not have full capacity to dominate all future developments, it is hard to precisely expect how Beijing may react to outside challenges with any specific policy.

We should also remember that the process of negotiating personnel arrangements before these two party meetings among the party leadership may also practically reflect the significant political positions that will eventually affect policies. Many active political figures may not be promoted in these party meetings as many international observers would expect. Those PRC government officials who are not assigned any party posts are encountering the dead end of their political future.

Those who expect any PRC policy revision towards any specific objective or aspect after the coming Nineteenth Chinese Communist Party National Congress and the following First Plenary Session of its Central Committee should reconsider the nature of these political events before jumping prematurely into conclusions. Without knowing the result of power sharing arrangements, how can we fairly foresee the future Chinese policy? As we have no idea of the general characteristics and power structure of the PRC’s leadership over the next five years, how can anyone tell what will possibly be the results of their policy review and revision process?

It takes time for the new echelon of the PRC leadership to review the present policies before any future revision. That nothing regarding policy can be really determined immediately after the power transition is the best advice that we should keep in mind. And of course, no reliable or credible predictions of PRC’s future policies can be made before these two meetings, either.

Dr. Ching Chang was a line officer in the Republic of China Navy for more than thirty years. As a very productive commentator on Chinese military affairs, he is recognized as a leading expert on the Peoples Liberation Army with unique insights on its military thinking.

Featured Image: The ceiling of the 10,000-seat auditorium in China’s Great Hall of the People. (Wikimedia Commons)

Beijing’s Views on Norms in Cyberspace and Cyber Warfare Strategy Pt. 2

By LCDR Jake Bebber USN

The following is a two-part series looking at PRC use of cyberspace operations in pursuit of its national strategies and the establishment of the Strategic Support Force. Part 1 considered the centrality of information operations and information war to the PRC’s approach toward its current struggle against the U.S. Part 2 looks at the PRC’s use of international norms and institutions in cyberspace, and possible U.S. responses.

Cyber-Enabled Public Opinion and Political Warfare

Many American planners are carefully considering scenarios such as China making a play to force the integration of Taiwan, seize the Senkaku Islands from Japan, or seize and project power from any and all claimed reefs and islands in the South China Sea. Under these scenarios we can expect preemptive strikes in the space and network domains in an attempt to “blind” or confuse American and allied understanding and establish a fait accompli. This will, in Chinese thinking, force the National Command Authority to consider a long and difficult campaign in order to eject Chinese forces, and the CCP is placing a bet that American decision makers will choose to reach a political accommodation that recognizes the new “facts on the ground” rather than risk a wider military and economic confrontation.

The role of public opinion warfare may be an integral component of future crisis and conflict in Asia. Well in advance of any potential confrontation, Chinese writing emphasizes the role of “political warfare” and “public opinion warfare” as an offensive deterrence strategy. China will seek to actively shape American, allied, and world opinion to legitimize any military action the CCP deems necessary. We might see cyber-enabled means to “incessantly disseminate false and confused information to the enemy side … through elaborate planning [in peacetime], and [thereby] interfere with and disrupt the enemy side’s perception, thinking, willpower and judgment, so that it will generate erroneous determination and measures.”1 China may try to leverage large populations of Chinese nationals and those of Chinese heritage living outside China as a way to influence other countries and generate new narratives that promote the PRC’s position. Consider, for example, how Chinese social media campaigns led to the boycotts of bananas from the Philippines when it seized Scarborough Reef, or similar campaigns against Japanese-made cars during its ongoing territorial dispute over the Senkaku Islands. Most recently, Lotte Duty Free, a South Korean company, suffered distributed denial-of-service attacks from Chinese IP servers – almost certainly a response to South Korea’s recent decision to host the THAAD missile defense system.

It is also critical to recognize China’s understanding and leverage of the American political, information, and economic system. Over decades, China has intertwined its interests and money with American universities, research institutes, corporate institutions, media and entertainment, political lobbying, and special interest organizations. This has had the effect of co-opting a number of institutions and elite opinion makers who view any competition or conflict with China as, at best, detrimental to American interests, and at worst, as a hopeless cause, some going so far as to suggest that it is better for the U.S. to recognize Chinese primacy and hegemony, at least in Asia, if not worldwide. Either way, China will maximize attempts to use cyber-enabled means to shape American and world understanding so as to paint China as the “victim” in any scenario, being “forced” into action by American or Western “interference” or “provocation.”

What can the U.S. do to Enhance Network Resilience?

One of the most important ways that network resiliency can be addressed is by fundamentally changing the intellectual and conceptual approach to critical networks. Richard Harknett, the former scholar-in-residence at U.S. Cyber Command, has suggested a better approach. In a recent issue of the Journal of Information Warfare, he points out that cyberspace is not a deterrence space, but an offense-persistent environment. By that he means that it is an inherently active, iterative, and adaptive domain. Norms are not established by seeking to impose an understood order (such as at Bretton Woods) or through a “doctrine of restraint,” but rather through the regular and constant interactions between states and other actors.  Defense and resiliency are possible in this space, but attrition is not. Conflict here cannot be contained to “areas of hostility” or “military exclusion zones.” No steady state can exist here—every defense is a new opportunity for offense, and every offense generates a new defense.2

Second, the policy and legal approach to network resiliency must shift from a law enforcement paradigm to a national security paradigm. This paradigm is important because it affects the framework under which operations are conducted. The emphasis becomes one of active defense, adaptation, identification of vulnerabilities and systemic redundancy and resilience. A national security approach would also be better suited for mobilizing a whole-of-nation response in which the government, industry, and the population are engaged as active participants in network defense and resiliency. Important to this is the development of partnership mechanisms and professional networking that permit rapid sharing of information at the lowest level possible. Major telecommunications firms, which provide the infrastructure backbone of critical networks, require timely, actionable information in order to respond to malicious threats. Engagement with the private sector must be conducted in the same way they engage with each other – by developing personal trust and providing actionable information.

Network hardening must be coupled with the capabilities needed to rapidly reconstitute critical networks and the resiliency to fight through network attack. This includes the development of alternative command, control, and communication capabilities. In this regard, the military and government can look to industries such as online retail, online streaming, and online financial networks (among others) that operate under constant attack on an hourly basis while proving capable of providing on-demand service to customers without interruption. Some lessons might be learned here.    

Third, new operational concepts must emphasize persistent engagement over static defense. The United States must have the capacity to contest and counter the cyber capabilities of its adversaries and the intelligence capacity to anticipate vulnerabilities so we move away from a reactive approach to cyber incidents and instead position ourselves to find security through retaining the initiative across the spectrum of resiliency and active defensive and offensive cyber operations.

Congressional Action and Implementing a Whole-of-Government Approach

There are five “big hammers” that Congress and the federal government have at their disposal to effect large changes – these are known as the “Rishikof of Big 5” after Harvey Rishikof, Chairman of the Standing Committee on Law and National Security for the American Bar Association. These “hammers” include the tax code and budget, the regulatory code, insurance premiums, litigation, and international treaties. A comprehensive, whole-of-nation response to the challenge China represents to the American-led international system will require a mixture of these “big hammers.” No one change or alteration in Department of Defense policy toward cyberspace operations will have nearly the impact as these “hammers.”3

The tax code and budget, coupled with regulation, can be structured to incentivize network resiliency and security by default (cyber security built into software and hardware as a priority standard), not only among key critical infrastructure industries, but among the population as a whole to include the telecommunication Internet border gateways, small-to-medium sized Internet service providers, and information technology suppliers. Since the federal government, Defense Department, and Homeland Security rely largely on private industry and third-party suppliers for communications and information technology, this would have the attendant effect of improving the systems used by those supporting national security and homeland defense. The key question then is: how can Congress incentivize network resiliency and security standards, to include protecting the supply chain, most especially for those in industry who provide goods and services to the government?

If the tax code, budget, and regulation might provide some incentive (“carrots”), so too can they provide “sticks.” Litigation and insurance premiums can also provide similar effects, both to incentivize standards and practices and discourage poor cyber hygiene and lax network security practices. Again, Congress must balance the “carrots” and “sticks” within a national security framework.

Congress might also address law and policy which permits adversary states to leverage the American system to our detriment. Today, American universities and research institutions are training China’s future leaders in information technology, artificial intelligence, autonomous systems, computer science, cryptology, directed energy and quantum mechanics. Most of these students will likely return to China to put their services to work for the Chinese government and military, designing systems to defeat us. American companies hire and train Chinese technology engineers, and have established research institutes in China.4 The American taxpayer is helping fund the growth and development of China’s military and strategic cyber forces as well as growth in China’s information technology industry.

Related specifically to the Department of Defense, Congress should work with the Department to identify ways in which the services man, train, and equip cyber mission forces. It will have to provide new tools that the services can leverage to identify and recruit talented men and women, and ensure that the nation can benefit long-term by setting up appropriate incentives to retain and promote the best and brightest. It will have to address an acquisition system structured around platforms and long-term programs of record. The current military is one where highly advanced systems have to be made to work with legacy systems and cobbled together with commercial, off-the-shelf technology. This is less than optimal and creates hidden vulnerabilities in these systems, risking cascading mission failure and putting lives in jeopardy.

Finally, Congress, the Department of Defense, and the broader intelligence and homeland security communities can work together to establish a center of excellence for the information and cyber domain that can provide the detailed system-of-systems analysis, analytic tools, and capability development necessary to operate and defend in this space. Such centers have been established in other domains, such as land (e.g., National Geospatial Intelligence Agency), sea (e.g., Office of Naval Intelligence) and air and space (e.g., National Air and Space Intelligence Center).

Conclusion

It is important to understand that this competition is not limited to “DOD versus PLA.” The U.S. must evaluate how it is postured as a nation is whether it is prepared fight and defend its information space, to include critical infrastructure, networks, strategic resources, economic arrangements, and the industries that mold and shape public understanding, attitude, and opinion. It must decide whether defense of the information space and the homeland is a matter of national security or one of law enforcement, because each path is governed by very different approaches to rules, roles, policies, and responses. Policymakers should consider how to best address the need to provide critical indications, warnings, threat detection, as well as the system-of-systems network intelligence required for the U.S. to develop the capabilities necessary to operate in and through cyberspace. For all other domains in which the U.S. operates, there is a lead intelligence agency devoted to that space (Office of Naval Intelligence for the maritime domain, National Air and Space Intelligence Center for the air and space domains, etc.).

It must always be remembered that for China, this is a zero-sum competition – there will be a distinct winner and loser. It intends to be that winner, and it believes that the longer it can mask the true nature of that competition and keep America wedded to its own view of the competition as a positive-sum game, it will enjoy significant leverage within the American-led system and retain strategic advantage. China is pursuing successfully, so far, a very clever strategy of working through the system the U.S. built in order to supplant it – and much of it is happening openly and in full view. This strategy can be countered in many ways, but first the U.S. must recognize its approach and decide to act.

LCDR Jake Bebber is a cryptologic warfare officer assigned to the staff of Carrier Strike Group 12. He previously served on the staff of U.S. Cyber Command from 2013 – 2017. LCDR Bebber holds a Ph.D. in public policy. He welcomes your comments at: jbebber@gmail.com. These views are his alone and do not necessarily represent any U.S. government department or agency.

1. Deal 2014.

2. Richard Harknett and Emily Goldman (2016) “The Search for Cyber Fundamentals.” Journal of Information Warfare. Vol. 15 No. 2.

3. Harvey Rishikof (2017) Personal communication, April 21.

4. See: https://www.bloomberg.com/view/articles/2013-03-28/chinese-hacking-is-made-in-the-u-s-a-

Featured Image: Nokia Security Center server room (Photo: Nokia)

Beijing’s Views on Norms in Cyberspace and Cyber Warfare Strategy Pt. 1

By LCDR Jake Bebber USN

The following is a two-part series looking at PRC use of cyberspace operations in pursuit of its national strategies and the establishment of the Strategic Support Force. Part 1 considers the centrality of information operations and information war to the PRC’s approach toward its current struggle against the U.S. Part 2 looks at the PRC’s use of international norms and institutions in cyberspace, and possible U.S. responses.

Introduction

A recent article noted a marked shift in Chinese strategy a few short years ago which is only now being noticed. Newsweek author Jeff Stein wrote a passing reference to a CCP Politburo debate under the presidency of Hu Jintao in 2012 in which “Beijing’s leading economics and financial officials argued that China should avoid further antagonizing the United States, its top trading partner. But Beijing’s intelligence and military officials won the debate with arguments that China had arrived as a superpower and should pursue a more muscular campaign against the U.S.”1

The nature of this competition is slowly taking shape, and it is a much different struggle than the Cold War against the Soviet Union – however, with stakes no less important. This is a geoeconomic and geoinformational struggle. Both U.S. and PRC views on cyber warfare strategy, military cyber doctrine, and relevant norms and capabilities remain in the formative, conceptual, and empirical stages of understanding. There is an ongoing formulation of attempting to understand what cyberspace operations really are. While using similar language, each has different orientations and perspectives on cyberspace and information warfare, including limiting structures, which has led to different behaviors. However, the nature of cyberspace, from technological advancement and change, market shifts, evolving consumer preferences to inevitable compromises, means that while windows of opportunity will emerge, no one side should expect to enjoy permanent advantage. Thus, the term ‘struggle’ to capture the evolving U.S.-PRC competition.

The PRC recognized in the 1990s the centrality of information warfare and network operations to modern conflict. However, it has always understood the information space as blended and interrelated. Information is a strategic resource to be harvested and accumulated, while denied to the adversary. Information warfare supports all elements of comprehensive national power to include political warfare, legal warfare, diplomatic warfare, media warfare, economic warfare, and military warfare. It is critical to recognize that the PRC leverages the American system and its values legally (probably more so than illegally), to constrain the U.S. response, cloud American understanding, and co-opt key American institutions, allies, and assets. In many ways, the PRC approach being waged today is being hidden by their ability to work within and through our open liberal economic and political system, while supplemented with cyber-enabled covert action (such as the OPM hack).

To support their comprehensive campaign, the PRC is reforming and reorganizing the military wing of the Communist Party, the People’s Liberation Army (PLA), posturing it to fight and win in the information space. Most notably, it recently established the Strategic Support Force (SSF) as an umbrella entity for electronic, information, and cyber warfare. Critical for U.S. policymakers to understand is how the SSF will be integrated into the larger PLA force, how it will be employed in support of national and military objectives, and how it will be commanded and controlled. While much of this remains unanswered, some general observations can be made.

This reform postures the PLA to conduct “local wars under informationized conditions” in support of its historic mission to “secure dominance” in outer space and the electromagnetic domain. Network (or cyberspace) forces are now alongside electromagnetic, space, and psychological operations forces and better organized to conduct integrated operations jointly with air, land, and sea forces.2

This change presents an enormous challenge to the PLA. The establishment of the SSF disrupts traditional roles, relationships, and processes. It also disrupts power relationships within the PLA and between the PLA and the CCP. It challenges long-held organizational concepts, and is occurring in the midst of other landmark reforms, to include the establishment of new joint theater commands.3 However, if successful, it would improve information flows in support of joint operations and create a command and control organization that can develop standard operating procedures, tactics, techniques, procedures, advanced doctrine, associated training, along with driving research and development toward advanced capabilities.

While questions remain as to the exact composition of the Strategic Support Force, there seems to be some consensus that space, cyber, electronic warfare, and perhaps psychological operations forces will be centralized into a single “information warfare service.” Recent PLA writings indicate that network warfare forces will be charged with network attack and defense, space forces will focus on ISR and navigation, and electronic warfare forces will engage in jamming and disruption of adversary C4ISR. It seems likely that the PRC’s strategic information and intelligence support forces may fall under the new SSF. The PLA’s information warfare strategy calls for its information warfare forces to form into ad hoc “information operations groups” at the strategic, operational, and tactical levels, and the establishment of the SSF will save time and enable better coordination and integration into joint forces. The SSF will be better postured to conduct intelligence preparation of the battlespace, war readiness and comprehensive planning for “information dominance.”4

The establishment of the SSF creates a form of information “defense in depth,” both for the PLA and Chinese society as a whole. The SSF enables the PLA to provide the CCP with “overlapping measures of electronic, psychological, and political deterrents.” It is reasonable to expect that there will be extensive coordination and cooperation among the PRC’s military, internal security, network security, “commercial” enterprises such as Huawei and ZTE, political party organizations, state controlled media both inside and outside China, and perhaps even mobilization of Chinese populations.

Chinese Information Warfare Concepts and Applications

Recent Chinese military writings have stressed the centrality of information to modern war and modern military operations. Paying close attention to the way the West – principally the U.S. – conducted the First Gulf War and operations in Kosovo and the Balkans in the 1990s, the PRC has been aggressively pursuing a modernization and reform program that has culminated in where they are today. Indeed, there is close resemblance to PLA and PRC aspirational writing from the 1990s to today’s force structure.

In many ways, the PLA understanding of modern war reflects the American understanding in so much as both refer to the centrality of information and the need to control the “network domain.” “Informatized War” and “Informatized Operations” occur within a multi-dimensional space – land, sea, air, space and the “network electromagnetic” or what Americans generally understand as “cyberspace.” The U.S. has long held that the control of the network domain provides a significant “first mover advantage,” and the PRC is well on the way toward building the capability for contesting control of the network domain. Its writings consistently hold that the PLA must degrade and destroy the adversary’s information support infrastructure to lessen its ability to respond or retaliate. This is especially necessary for “the weak to defeat the strong,” because most current writing still suggests that the PLA believes itself still inferior to American forces, though this perception is rapidly changing. Regardless, the PRC understanding of modern war supposes a strong incentive for aggressive action in the network domain immediately prior to the onset of hostilities.6 These operations are not restricted geographically, and we should expect to see full-scope network operations worldwide in pursuit of their interests, including in the American homeland.7

There are three components to a strategic first strike in the cyber domain. The first component is network reconnaissance to gain an understanding of critical adversary networks, identifying vulnerabilities, and manipulating adversary perception to obtain strategic advantage. Network forces are then postured to be able to conduct “system sabotage” at a time and place of the PRC’s choosing. When the time is right, such as a prelude to a Taiwan invasion or perhaps the establishment of an air defense identification zone over the South China Sea, the PRC will use system sabotage to render adversary information systems impotent, or to illuminate the adversary’s “strategic cyber geography” in order to establish a form of “offensive cyber deterrence.” The PRC could take action to expose its presence in critical government, military, or civilian networks and perhaps conduct some forms of attack in order to send a “warning shot across the bow” and give national decision-makers reason to pause and incentive to not intervene.8

Indeed, unlike the American perspective, which seeks to use cyberspace operations as a non-kinetic means to dissuade or deter potential adversaries in what Americans like to think of as “Phase 0,” the PLA has increasingly moved toward an operational construct that blends cyberspace operations with kinetic operations, creating a form of “cyber-kinetic strategic interaction.” The goal would be to blind, disrupt, or deceive adversary command and control and intelligence, surveillance, and reconnaissance (C4ISR) systems while almost simultaneously deploying its formidable conventional strike, ballistic missile, and maritime power projection forces. The PLA envisions this operational concept as “integrated network electronic warfare,” described by Michael Raska as the “coordinated use of cyber operations, electronic warfare, space control, and kinetic strikes designed to create ‘blind spots’ in an adversary’s C4ISR systems.”9 

The PLA has recently described this as a form of “network swarming attacks” and “multi-directional maneuvering attacks” conducted in all domains – space, cyberspace, ground, air, and sea. The Strategic Support Force has been designed to provide these integrated operations, employing electronic warfare, cyberspace operations, space and counter-space operations, military deception and psychological operations working jointly with long-range precision strike, ballistic missile forces and traditional conventional forces.

Essential to these concepts are China’s ability to achieve dominance over space-based information assets. PRC authors acknowledge this as critical to conducting joint operations and sustaining battlefield initiative. This includes not only the orbiting systems, but ground stations, tracking and telemetry control, and associated data systems. We can expect full-scope operations targeting all elements of America’s space-based information system enterprise.

Important to all of this is the necessity of preparatory operations that take place during “peacetime.” China understands that many of its cyberspace, network, electronic and space warfare capabilities will not be available unless it has gained access to and conducted extensive reconnaissance of key systems and pre-placed capabilities to achieve desired effects. We should expect that the PRC is actively attempting to penetrate and exploit key systems now in order to be able to deliver effects at a later date.

Chinese Understandings of Deterrence and International Law in Cyber Warfare

China recently released the “International Strategy of Cooperation on Cyberspace.”10 Graham Webster at the Yale Law School made some recent observations. First, it emphasizes “internet sovereignty,” which is unsurprising, since the CCP has a vested interest in strictly controlling the information space within China, and between China and the rest of the world.  This concept of “internet sovereignty” should best be understood as the primacy of Chinese interests. China would consider threatening information sources outside of the political borders of China as legitimate targets for cyber exploitation and attack. In the minds of the CCP, the governance of cyberspace should recognize the sovereignty of states, so long as the Chinese state’s sovereignty is paramount over the rest of the world’s.

Second, the strategy suggests that “[t]he tendency of militarization and deterrence buildup in cyberspace is not conducive to international security and strategic mutual trust.” This appears to be aimed squarely at the U.S., most likely the result of Edward Snowden’s actions. The U.S. seems to also be the target when the strategy refers to “interference in other countries’ internal affairs by abusing ICT and massive cyber surveillance activities,” and that “no country should pursue cyber hegemony.” Of course, the PRC has been shown to be one of the biggest sources of cyber-enabled intellectual property theft and exploitation, and China’s cyber surveillance and control regimes are legendary in scope. Immediately after decrying the “militarization” of cyberspace, the strategy calls for China to “expedite the development of a cyber force and enhance capabilities … to prevent major crisis, safeguard cyberspace security, and maintain national security and social stability.” These broad, sweeping terms would permit China to later claim that much of its activities that appear to violate its own stated principles in the strategy are indeed legitimate.

The strategy seeks to encourage a move away from multi-stakeholder governance of the Internet to multilateral decision-making among governments, preferably under the United Nations. This would certainly be in China’s interests, as China continues to hold great sway in the U.N., especially among the developing world. After all, China is rapidly expanding its geoeconomic and geoinformational programs, leveraging its state-owned enterprises to provide funding, resources, and informational infrastructure throughout Africa, Asia, Europe, and the Americas. As more countries become dependent on Chinese financing, development, and infrastructure, they will find it harder to oppose or object to governance regimes that favor Chinese interests.

Naturally, the strategy emphasizes domestic initiatives and a commitment to a strong, domestic high-tech industry. This would include the “Made in China 2025” plan, which has received a great deal of attention. The plan seeks to comprehensively upgrade and reform Chinese industry, with an emphasis on information technology.11

When considering deterrence in the Chinese understanding, it is important to remember that China approaches it from a different context than the United States. Jacqueline Deal noted that China’s basic outlook proceeds from the premise that the “natural state of world is one of conflict and competition, and the goal of strategy is to impose order through hierarchy.”12 While Americans understand deterrence as a rational calculation, the Chinese approach emphasizes the conscious manipulation of perceptions.

Indeed, the Chinese term weishe, which translates as “deterrence,” also embodies the idea of “coercion.” We might see examples of this understanding by China’s historic use of “teaching a lesson” to lesser powers. In the 20th Century, Chinese offensives against India and Vietnam – thought by many in the West to be an example of tragic misunderstanding and failed signaling of core interests – might be better thought of as attempts by China to secure its “rightful” place atop the regional hierarchy. It is a form of “lesson teaching” that has long-term deterrent effects down the road.

We can expect therefore that cyberspace would become one means among many that China will use in support of its “Three Warfares” (public opinion, media, legal) concept in support of its larger deterrent or compellence strategies. It will likely be much broader than the use of PLA SSF forces, and could include cyber-enabled economic strategies, financial leverage, and resource withholding.

LCDR Jake Bebber is a cryptologic warfare officer assigned to the staff of Carrier Strike Group 12. He previously served on the staff of U.S. Cyber Command from 2013 – 2017. LCDR Bebber holds a Ph.D. in public policy. He welcomes your comments at: jbebber@gmail.com. These views are his alone and do not necessarily represent any U.S. government department or agency.

1. Available at: http://www.newsweek.com/cia-chinese-moles-beijing-spies-577442

2. Dean Cheng (2017). Cyber Dragon: Inside China’s Information Warfare and Cyber Operations. Praeger Security International.

3. Cheng 2017.

4. John Costello and Peter Mattis (2016). “Electronic Warfare and the Renaissance of Chinese Information Operations.” in China’s Evolving Military Strategy (Joe McReynolds, editor). The Jamestown Foundation.

6. Joe McReynolds, et. Al. (2015) “TERMINE ELECTRON: Chinese Military Computer Network Warfare Theory and Practice.” Center for Intelligence Research and Analysis

7.  Barry D. Watts (2014) “Countering Enemy Informationized Operations in Peace and War.” Center for Strategic and Budgetary Assessments

8. Timothy L. Thomas (2013) “China’s Cyber Incursions.” Foreign Military Studies Office

9. See: http://www.atimes.com/article/chinas-evolving-cyber-warfare-strategies/

10. See: http://news.xinhuanet.com/english/china/2017-03/01/c_136094371.htm

11. See: https://www.csis.org/analysis/made-china-2025

12. Jacqueline N. Deal (2014). “Chinese Concepts of Deterrence and their Practical Implications for the United States.” Long Term Strategy Group.

Featured Image: The Center for Nanoscale Materials at the Advanced Photon Source. (Photo: Argonne National Laboratory)