All posts by Guest Author

Members’ Roundup: April 2016

By Sam Cohen

Welcome to the April 2016 members’ roundup. Over the past month CIMSEC members have examined several international maritime security issues, including the strategic implications of China’s land creation in the South China Sea, Russia and China’s testing and deployment of offensive hypersonic weapons, the U.S. Navy’s development of the Next Generation Air Dominance (NGAD) program, India’s maritime ambitions in the Asia-Pacific and finally, increasing maritime tensions between African coastal countrie,s and the resulting naval build-up taking place on the continent.

Beginning the roundup in the Asia-Pacific, Lauren Dickey for the Asia Unbound Series at the Council on Foreign Relations analyzes the current political turmoil challenging the stability of Taiwan’s government. Ms. Dickey explains that Taiwan’s ruling Kuomintang (KMT) party has retreated from an agreement with the country’s opposition Democratic Progressive Party (DPP) to conduct an item-by-item review of a service trade pact arranged with mainland China. The resulting breakout of severe protests by citizens, unions, and the DPP have demonstrate the harmful affects approval of the trade pact would have on Taiwan, including an increase in Beijing’s influence over domestic Taiwanese policy and the ability for large corporations to increase control over Taiwanese industry at the expense of local enterprises. Ms. Dickey highlights the perspective that the KMT party’s decision is one that has and will continue to challenge democratic principles within Taiwan while also creating a public atmosphere non-conducive to cooperative cross-strait relations.

Kyle Mizokami, at Popular Mechanics, discusses the test of China’s new hypersonic weapon, the DF-ZF, at the Wuzhai missile test center in central China. The DF-ZF is likely launched by a DF-21 IRBM, which releases a Hypersonic Glide Vehicle (HGV) just before leaving the atmosphere. Mr. Mizokami explains how the HGV released in the upper atmosphere is capable of travelling at speeds from 4000-7000 miles an hour making it difficult to intercept and capable of reaching almost any target in the world within an hour. In a second article at Popular Mechanics, Mr. Mizokami continues the discussion on hypersonic weapons with Russia’s continued development of its Zircon anti-ship missile. He explains how the missile will increase the surface warfare capabilities of Russia’s aging battlecruisers by providing a new offensive capacity capable of penetrating sophisticated air-defense systems. Dave Majumdar, at the National Interest, also discusses the technicalities and implications of Russia’s development of the Zircon anti-ship missile, which you can find here.    

Harry Kazianis, at The National Interest, highlights China’s primary strategic objective in the South China Sea; that Beijing views complete control of the waters from Taiwan to Malaysia as imperative to supporting regional Chinese sovereignty. Mr. Kazianis notes that Beijing has used a process of incremental aggression throughout the region to slowly, and perhaps unnoticeably, challenge the status-quo maintained by the U.S. with the ultimate goal of achieving regional hegemony. However, as outlined by Mr. Kazianis, there is potential for the U.S. and regional allies to limit and even halt this Chinese aggression at Scarborough Shoal just West of the Philippines, where the U.S. has already begun operations with A-10 Warthogs and Sikorsky HH-60 helicopters providing air and maritime situational awareness to local forces while also articulating to China that reclaiming the reef will not be tolerated.

In a second article at The National Interest, Mr. Kazianis provides a list of different methods for confronting Chinese antagonism in the South China Sea, including a joint U.S. and allied A2/AD strategy, utilizing media and communications to demonstrate a clear U.S. regional objective and lawfare – the notion that the U.S. and regional allies should coordinate legal actions and claims against China to maximize their effectiveness.

James Goldrick, at The Interpreter, discusses the impact China’s artificial island construction in the South China Sea will have on peace and stability in the region when combined with its aggressive territorial claims under a pretense of sovereign rights. He outlines how China’s objective of creating a safe haven for its naval forces in the region will collide with the national interests of the rest of maritime Southeast Asia. He suggests that Beijing should adapt a more sensitive approach to their regional claims as to not risk international, kinetic conflict.

Alex Calvo, for the University of Nottingham’s China Policy Institute Blog, examines the sinking of a Chinese fishing vessel by an Argentinian Coast Guard vessel and highlights the incidents’ significance should China succeed in breaking out of the First Island Chain and seek an expanded posture in the Southern Atlantic. He notes that China operates the world’s largest long-distance fishing fleet and its interaction with foreign nations and their waters should merit appropriate attention considering how similar fishing related events have contributed to an increasingly tense political and security environment in the East and South China Seas.

To conclude the April 2016 Members’ Roundup, Paul Pryce at Offiziere discusses Africa’s rapidly growing naval forces in relation to the rise of piracy threats in the Gulf of Aden and the Gulf Guinea while also noting an increase in maritime boundary disputes rooted in contested off-shore oil deposits. While identifying several examples, Mr. Pryce notes increased tensions between Ghana and Cote d’Ivoire and the corresponding procurement of 40 patrol vessels by Ivorian defense officials in response as a primary example of the new arms-race on the continent. He also mentions the procurement of three HIS 32 interceptor patrol vessels and three Ocean Eagle 43 OPVs by the Mozambican Navy in addition to the procurement of seven Macaé-class OPVs by Angola.

Members at CIMSEC were active elsewhere during the month of April:

At CIMSEC we encourage members to continue writing, either here on CIMSEC or through other means. You can assist us by emailing your works to [email protected].

Sam Cohen is currently studying Honors Specialization Political Science at Western University in Canada. His interests are in the fields of strategic studies, international law and defense policy.

Thomas Jefferson and the Tripoli Pirates

Kilmeade, Brian, and Don Yaeger. Thomas Jefferson and the Tripoli Pirates: The Forgotten War That Changed American History. New York City: Sentinel, 2015, 256 pp. $21.00

Book Cover photo

By Commander Greg Smith, USN

Thomas Jefferson and the Tripoli Pirates is an exciting account of an often overlooked but formative chapter in the history of American foreign policy and U.S. naval heritage. While even amateur naval historians recognize the names of heroes like Decatur and Preble, and every Marine sings the words “to the shores of Tripoli” while standing at attention, few recall the decade-long struggle and humiliations endured before achieving the honorable outcome that is taken for granted today. As the world’s sole superpower with a naval force of nuclear powered aircraft carriers and submarines, it is often difficult to examine the early struggles of the United States Navy without assuming that victory was a foregone conclusion. Brian Kilmeade and Don Yaeger, however, convincingly convey the narrow margin by which the victory over the Barbary pirates was gained and the many diplomatic, military, and personal setbacks that were overcome along the way. They also capture the bravery and determination of the American Sailors, Marines, and Statesmen who ensured a favorable conclusion of the Barbary Wars for the nascent United States. For these reasons alone, Thomas Jefferson and the Tripoli Pirates deserves to be on every commander’s recommended reading list for all ranks, especially in the U.S. Navy and Marine Corps.  

The book also explores several themes that are of recurring interest to CIMSEC’s readership: from justifications for force structure and naval presence, to the need for judgment and initiative in naval leaders, and to the role of the Navy in diplomacy. The thoroughly enjoyable book makes strong arguments for U.S. naval presence and the need for the United States to a “play a military role in overseas affairs,” without significant discussion of counter-arguments or allusions to alternative analyses. Although this may ultimately leave military historians and other scholars and theorists unsatisfied, these shortcomings seem to be by design, enabling the authors to maintain an exciting pace and to focus on the heroism of the characters from whom “the world would learn that in America failure is not an option.”  

Naval Presence and the Size of the Fleet

Kilmeade and Yaeger make a strong case that Thomas Jefferson was among the first American officials to recognize the need for a strong and persistent forward naval presence to protect American interests.  In his role as American minister to France in 1785, Jefferson was an official advocate for Americans enslaved by Algerian pirates. He recognized that the United States could neither afford the tribute demanded by the Barbary States, nor could they cease trading with nations of the Mediterranean. Jefferson’s solution was patrols by armed American vessels in the Mediterranean; that vision would not be realized for another sixteen years. Initially, Jefferson did not convince fellow diplomat John Adams, Congress, or the President, who were pursuing a policy of neutrality and willing to pay the price (i.e. annual tribute to Barbary pirates) for peace. It was not until ten American vessels were captured in 1793 that there was enough support to pass the Naval Act of 1794 to build six frigates to respond to the “depredations committed by Algerine corsairs.”

Although the more academically sophisticated arguments for seapower made by Samuel Huntington[1] in 1954 or more recently by CAPT Robert Rubel (ret) [2] and Seth Cropsey will be more edifying for CIMSEC’s regular audience, the arguments in Thomas Jefferson and the Tripoli Pirates are self-evident, convincing, and accessible even to those who have shown little interest in strategic or maritime thinking. Thus, the book is a worthy read not only for the naval enthusiast but also for the accountant brother-in-law who balks at the Navy’s shipbuilding budget, to the family isolationist who argues that U.S. naval presence is always provocative and never stabilizing, or for the West Point graduate who just doesn’t get it. 

Naval Leadership

Thomas Jefferson and the Tripoli Pirates provides many case studies on naval leadership. The book examines many successful and unsuccessful commanders and diplomats who must carry out national policies and execute military operations with little communication and guidance. 

LT Presely O'Bannon
LT Presely O’Bannon.

While it is rare to execute any coordinated action today without communication before, during, and after each mission, the authors remind us that orders from the United States to commanders in the Mediterranean routinely took three months to arrive in theater. This made seeking guidance during a crisis, like the grounding of the USS Philadelphia in Tripoli harbor, impossible. Incidents like these formed the basis for naval principles like the absolute responsibility of commanding officers, the requirement to understand the commander’s intent, and centralized command and decentralized execution that continue to serve as the foundation for naval conduct. Looking at the 21st century battlespace, where instantaneous and continuous communications are often assumed for our naval and air forces, it is worth pondering how well we still adhere to these principles and how much decision making and execution would suffer should those communications be disrupted in combat. Kilmeade and Yaeger make clear that in the absence of higher guidance those who represented the country well were those guided by a commitment to personal and national honor. 

The authors also assert that throughout the Barbary Wars, successful naval leaders demonstrated superior judgment and initiative. The authors contrast the risk-averse and lazy Commodore Richard Morris, who brought his wife on deployment and failed to impose a worthy blockade of Tripoli, with the decisive actions of Commodore Edward Preble, who quickly gained an “honorable peace” with Morocco, achieving a “significant victory” in a manner reminiscent of Sun-Tzu—“without firing a shot.” 

Edward Preble by Rembrandt Peale. Courtesy of the U.S. Naval Academy Museum Collection, Public Domain
Edward Preble by Rembrandt Peale. Courtesy of the U.S. Naval Academy Museum Collection, Public Domain.

The authors also recount the bold manner with which Preble overcame the loss of the USS Philadelphia by a subordinate commander.  Preble and the young nation found an invaluable asset in the bravery, skill, and leadership of Lieutenant Stephen Decatur. The leadership, persistence, and vision of William Eaton are credited with the successful execution of the elaborate plan to raise and march an army from Alexandria, Egypt to defeat the Bashaw of Tripoli. The success of Eaton’s 600-mile desert march that resulted in capture of the city of Derne, “one of the most remarkable military assaults in U.S. military history,” was in no small part due to the bravery and skill of Lieutenant Presley O’Bannon and his seven U.S. Marines. 

Thomas Jefferson and the Tripoli Pirates provides a fresh look at leaders whose actions significantly shaped the character of the nascent Navy and Marine Corps and whose impact is still visible today. The book also recalls some of the earliest collaboration between military power and diplomacy in the implementation of U.S. foreign policy.

Diplomacy and the Military

Kilmeade and Yaeger recount the first attempt to support diplomacy with a display of naval power in 1800, when the USS George Washington became the first American warship to enter the Mediterranean. In spite of the bolstered confidence of U.S. Consul to Algiers, Richard O’Brien, and the clear display of American resolve, the incident resulted in humiliation for the United States due to a combination of insufficient force and naiveté on the part of the George Washington’s commander, the 27-year old Captain William Bainbridge. Still, naval forces represented a level of commitment and national resolve that provides significant leverage for diplomatic efforts.  

As with the U.S. consuls to the Barbary States 200 years ago, diplomats today are often strong proponents of American naval power. In February, a former U.S. Ambassador to Singapore argued that cutting the number of Littoral Combat Ships (LCS) would damage U.S. diplomacy. Of course, the requirements for fighting a modern naval battle are often different than those for diplomatic shows of the flag, assurances to allies, and demonstrations of resolve. Still, even when the latter was the primary justification for the existence of the fleet in 1794, getting the right-sized force was a significant challenge. Thomas Jefferson and the Tripoli Pirates also demonstrates that, in addition to the right number of ships, success requires the right policies and military leadership to successfully support diplomatic efforts.  

The book also highlights a natural tension between military and diplomatic elements of national power through its account of the termination of the war with Tripoli in 1805. After achieving an impressive victory at Derne, Colonel William Eaton and Lieutenant O’Bannon prepared to take Tripoli to depose the Bashaw. Before they could do so, however, U.S. Consul Tobias Lear, negotiated a termination to the conflict with terms that were ultimately ungratifying to Eaton, the military commander whose men had sacrificed much blood for a peace that allowed the Bashaw to remain in power.

Although the authors’ treatment of the relationship between military power and diplomacy seems to suggest that the solution to bolstering diplomacy is always more military power, one does not have to accept that premise to appreciate the books’ account of early cooperation to achieve U.S. foreign policy objectives. 

Few today recall the risks that were taken by the men of the naval and diplomatic services to defend the honor of the young United States against the extortion of the Barbary pirates, but Brian Kilmeade and Don Yaeger do a great service by remedying that situation.  At the time that Thomas Jefferson was dealing the pirates from the Barbary States – Morocco, Algiers, Tunis, and Tripoli—the confrontation was far from a foregone conclusion. Thomas Jefferson and the Tripoli Pirates details how visionary leadership from Thomas Jefferson, William Eaton, and Edward Preble as well as the bold and daring initiative from Stephen Decatur and Presley O’Bannon enabled the young United States to prevail. The story explores the connection between naval presence and security, illustrates the need for judgment and initiative in executing distributed military operations, and the role of the Navy in foreign policy. It is worth reading and keeping on your bookshelf.

Commander Smith is a career naval flight officer and a former commanding officer of Patrol Squadron 26 (VP-26). He is currently serving as the Federal Executive Fellow at the Johns Hopkins University – Applied Physics Lab (APL). The views expressed are his own and do not reflect the views of the Navy or APL.

[1] Huntington, Samuel P. “National Policy and the Transoceanic Navy.” United States Naval Institute Proceedings. Vol. 50, Number 5. May 1954, 491.

[2] Rubel, Robert C. “National Policy and the Post-systemic Navy,” Naval War College Review Vol. 66, No. 4 Autumn 2013, 12.

Turbulence for The Philippines: Blimps over the South China Sea

The following article is the first in CIMSEC’s first regular column: The Red Queen’s Navy. Written by Vidya Sagar Reddy, The Red Queen’s Navy will discuss the The Red Queeninfluence of emerging naval platforms and technologies in the geostrategic contours of the Indo-Pacific region. The column will also identify relevant historical precedents, forming the basis for various maritime development and security related projects in the region.

“Now, here, you see, it takes all the running you can do, to keep in the same place.”- The Red Queen, Through the Looking Glass, Lexi’s Carroll.

By Vidya Sagar Reddy

During his recent visit to the Philippines, the United States Secretary of Defense promised delivery of a variety of sensors and communications equipment worth $42 million to the host nation. One of the critical sensors in this suite is an observation blimp that can peer across the South China Sea (SCS), providing maritime domain awareness to the Philippines.

The Philippines is one of several claimants to sovereign rights over few SCS islands; they are faced with a coercive China claiming such rights over 80 percent of the sea. China has forcefully seized control of maritime features in the SCS from both Vietnam and the Philippines. In addition, the PRC has started land reclamation projects and built artificial islands. Radars and missile batteries have been installed on some of the features, and military planes operate and land there routinely.

In 2012, China overwhelmed Philippine forces in a two month long conflict, resulting in China’s defacto control of Scarborough Shoal, located barely 140 miles off Manila. The Philippines filed a case against China before the UN’s Permanent Court of Arbitration, challenging 15 claims from China’s so-called nine-dash line to Scarborough Shoal. The tribunal is likely to find China’s activities around the Shoal illegal.

In spite of this, China has refuted the authority of the arbitration tribunal to rule on these claims. It is reported that China is now considering construction of outposts on Scarborough Shoal. Military installations on this Shoal would allow China to control the Luzon Strait, a gateway to the Pacific and tremendously busy trade artery, therefore further consolidating its control over the SCS. The proximity of the Shoal to Manila would also allow China to monitor military installations and maneuvers on the Philippine islands, of particular interest as the US visiting forces begin to deploy.

The primary concern is the expansion of China’s coast guard and maritime militias around the Shoal to erode the Philippine legal rights like fishing, maritime trade, and exploitation of natural resources in these waters. Establishing new facts on the ground will defeat Philippines’ legal standing. Continuous monitoring of China’s actions is required for validating these assumptions and in order to respond proactively to new security threats.

A network of sensors established in and over the SCS would enable monitoring of land reclamation activities, build up of military assets on the islands, transits of coast guard and maritime militia units, oil exploration rigs, and any other object that can potentially fly or sail as China has become innovative in asserting its claims. The communications equipment offered to the Philippines will enable secure transmission of data from these sensors for faster and more transparent decision-making.

One of the critical sensor nodes in this suite is an observation blimp that can peer across the SCS using onboard radar. The blimp is a powered, gas filled lighter-that-the-air airship. It does not have a rigid structure like that of a balloon, but can instead be steered while floating in the air. Hindenburg is a famous example of these airships, which had a rigid structure.

Historically, airships have been used for both commercial and military activities, including ferrying passengers across the Atlantic, the American Civil War, bombing raids during World War I, polar exploration, advertisement campaigns, etc. The US Navy developed the airships USS Akron and USS Macon for ocean surveillance with the ability to launch and recover aircraft, dubbed flying aircraft carriers. Most of these airships crashed, but public interest truly faded with the Hindenburg disaster. The simultaneous advent of airplanes ferrying passengers far more efficiently across the oceans sealed their fate completely.

The potential of airships to provide constant mass area surveillance renewed military interest in them. Airships were useful to coalition forces in Afghanistan, forces along the US-Mexico border, and by Israel over Gaza, just to name a few.

The US Army initiated a $2.8 billion project called the Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System (JLENS) that uses a blimp-duo hovering about 10,000 feet and covering an area the size of Texas. One blimp is capable of providing high resolution 360 degree radar coverage while the other is used for focusing on specific targets including fixed or rotary-wing aircraft, cruise missiles, unmanned air vehicles, tactical ballistic missiles etc. JLENS is designed to connect to the nation’s air defense networks for faster response to incoming threats.  

Last October, one of the prototype JLENS blimps broke loose from the mooring station. Without the steering controls in place, the blimp dragged part of its tether across Pennsylvania causing power outages and damages to private property. Two F-16s were scrambled to monitor the movement of the blimp until it deflated and crashed into the trees.

Already looked upon unfavorably for cost overruns, the US Congress awarded a mere $2.5 million instead of the $45 million sought by the Pentagon, a measure supposedly aimed at killing the program.

Although details are yet to emerge regarding the size and observational scope of the blimp promised to the Philippines, this set of incidents and accidents points to knowledge gaps about the inherent risks of airships that contain highly inflammable gases and are prone to various atmospheric phenomena. Given this tenuous history of blimps, a loose one free floating over the SCS would invite further aggression from the PRC. It is in the interest of all parties to avoid such a situation. How can the US prove the blimp platform has been rigorously tested, despite Congress having killed the program? This is a critical question for the Philippines. It may be wiser to avoid creating, even accidentally, another tense situation in an already contested environment. Therefore the Philippines should explore additional options to improve its maritime domain awareness and security. Such options include acquiring patrol boats and light aircraft that can not only provide the Philippines maritime domain awareness, but also enhance the security of its territory and possessions.

Vidya Sagar Reddy is a researcher at the Observer Research Foundation, New Delhi.

Featured Image: U.S. Customs and Border Protection, Office of Air and Marine, Tethered Aerostat Radar System (TARS) Deming New Mexico. Photographer: Donna Burton

A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power Pt. 2

The following is a two-part series on how the U.S. might better utilize cyberspace and information operations as a Third Offset. Part I evaluated current offset proposals and explores the strategic context. Part II provides specific cyber/IO operations and lines of effort. Read Part One here.

By Jake Bebber

Targeting China’s ability to control information is an efficient means to offset Chinese power. To be effective, the United States should adopt a “whole of government” approach, leveraging cyberspace and other information related capabilities that can hold China’s domestic internet filtering, censorship, and information dissemination capabilities at risk. This campaign should operate across the entire spectrum of conflict and engagement, from public diplomacy and strategic communication, to battlespace preparation, limited conflict, and if de-escalation is unsuccessful, full-spectrum military operations. It will likely require coordination and administration at the highest civilian leadership level. This will be a long-term campaign aiming to counter China during the critical window in the next ten to twenty years when Chinese economic and military power will surge, and then subside as demographic factors limit its growth causing China to enter into a period of decline and inherently shifts its focus inward to to maintain stability.

The United States will have to address three broad issues: access, authorities, and capabilities. Internet access into China is restricted from the outside, and it is reasonable to assume that during a period of rising tensions or even conflict, traditional means of accessing China’s “red space” (civilian, military, and government networks) will not be available. The U.S. will need alternative avenues into Chinese networks, which may take the form of radio frequency injection into wireless networks (Bluetooth, WiFi and WiMAX)[i] to other methods targeting the physical and logical network layers and cyber-persona layers[ii] of cyberspace for preplacement of access.

Figure 1. The Three Layers of Cyberspace[iii]
The Three Layers of Cyberspace [iii].

The authority of the U.S. government to operate in cyberspace crosses boundaries and jurisdictions, and largely depends on the function of the agency or entity. Traditional military activities conducted by the Department of Defense are covered under Title 10 of U.S. Code, with the principal being the Secretary of Defense. Other titles supporting cyberspace operations include foreign intelligence collection (Title 50), domestic security (Title 6), law enforcement (Title 18) and government information technology security and acquisition (Title 40).[iv] These authorities will have to be aligned and deconflicted.

The capabilities required run the spectrum. They can include fully attributable on-net operations, such as a Foreign Service Officer participating in an online forum or social network to communicate U.S. policy, to the development of tools and malware that can degrade and disrupt command and control networks. Other possibilities include the distribution of encrypted personal communication devices and unattributable social media and organizing applications that permit dissident groups within China to maintain situational awareness.

There have been attempts to respond to China’s growing Internet censorship capabilities by those in the telecommunications industry and by the U.S. government. The Global Network Initiative was started in 2008 by industry, civic organizations, and universities to “promote best practices related to the conduct of U.S. companies in countries with poor Internet freedom records.” In 2011, the President issued the “International Strategy for Cyberspace.” Its goals include “enabling continued innovation for increasing economic activity, increasing individuals’ ability to communicate with one another, safeguarding freedom of expression, association, and other freedoms, and enhancing both individual privacy and national and international security.” The U.S. Department of State includes Internet freedom as a part of its global human rights agenda. In 2006, State formed the Global Internet Freedom Taskforce which later became the NetFreedom Taskforce, to coordinate State Department efforts monitoring Internet freedom. Both the State Department and U.S Agency for International Development have received funding for the development of Internet censorship circumvention technologies, training of non-government organizations and activists, media assistance, and leading international policy formulation on Internet freedom.[v]

The Broadcasting Board of Governors, which oversees the Voice of America (VOA) and Radio Free Asia (RFA) programs, also supports counter-censorship and circumvention software development and distribution. The VOA sends daily emails to “8 million Chinese citizens … with international and domestic news stories as well as information about how to use proxy servers.” The RFA has implemented the Freedom2Connect program to “research, develop, and deliver online tools for Internet users in China to securely browse online and send secure e-mail.”[vi]

While important, the current response by industry and government lacks both the senior policy coordination required of a grand strategy or adequate funding to keep up with China’s growing Internet monitoring and censorship capabilities. They do not fully leverage other assets and tools at America’s disposal. The U.S. can and should be doing much more to attack China’s critical vulnerabilities in information control.

Lines of Effort

Public Diplomacy – At the interagency level, the United States should continue pursuing bilateral, multilateral, and international agreements such as those mentioned above which promote freedom of information, expression and freedom from government oversight and censorship. The U.S. should also continue to strengthen international regimes against cybercrime and intellectual property theft. Internet norms and rules should be standardized across political boundaries where practical. This diplomatic effort ties into longstanding American policy of supporting freedom of speech and protection of universal human rights.

Economic Policy and Trade – Here again, longstanding American policy supporting property rights and free trade legitimize the continued advocacy of international agreements and accords promoting freedom in cyberspace. At the same time, the U.S. must tighten technology export controls to nations like China that continue to restrict access. In the event of industrial espionage or even cyber-attack, the U.S. can impose real economic costs and sanctions. The U.S. can also move on the Global Online Freedom Act, which would, among other things, prohibit U.S. companies from cooperating with foreign governments that engage in censorship or human rights abuses, require the U.S. Trade Representative to report on trade-related issues that arise out of a foreign government’s censorship policies, and impose export controls on telecommunications equipment that can be used to carry out censorship or surveillance.[vii] Some of these provisions can be waived when it suits American interests. In other areas, the U.S. can also promote public cybersecurity regimes, such as international risk insurance tools and accreditation that encourage network protection and hardening in the private sector.

Strategic Communication – In modern war, the actions of a single Soldier, Sailor, Airman or Marine can have a far-reaching impact on national strategy. While this is often used to highlight the potential implications of an untoward or controversial event, the reverse also holds true. The actions of every member of the U.S. government, from Foreign Service officer, embassy staff and humanitarian assistance officer to those of the military can have an equally positive impact if the appropriate messages are coordinated and timed to unfolding events. The United States should expand strategic communication tools such as Radio Free Asia and Voice of America. Using new capabilities in cyberspace and in personal communications, a comprehensive program of unbiased news delivery and strategic messaging to the Chinese public on a much larger scale can, over time, provide alternatives to Chinese government propaganda. Not to be forgotten, approximately two million Chinese visit the United States each year as tourists[viii], and around a quarter of a million Chinese students attend college in the U.S.[ix] Each visitor and student represents an opportunity for engagement.

Cyberspace Operations – Being able to deliver effects in and through cyberspace to China is a question of both access and capabilities. China has one of the most robust and sophisticated information control systems in the world, with multiple internal security and military organizations and tens of thousands of Chinese working daily to censor communications and filter access within China and between China and the world. Network penetrations and preplacement access generation needs to occur now, during peacetime, and continue throughout in order to assure capabilities can be delivered when needed. The fact is that when tensions escalate and China erects more firewalls, penetration becomes that much more difficult, if not impossible. This leaves military commanders and policy-makers little choice but to revert to traditional kinetic tools to dissuade Chinese aggression – exactly the scenario they hope to avoid – and plays to China’s strengths. Developing multiple access vectors now with the capability to hold at-risk, at a time and place of our choosing, information control systems in the long run represent an efficient means of directly attacking China’s most critical vulnerability and holding the Communist Party’s political control at risk. This represents an asymmetric counter to China’s growing A2/AD capabilities, and is a far more efficient and economical alternative.

bebber1
A snapshot image of cyber attacks. Source: Norse Corp.

Cyberspace operations reside on a continuum, sometimes offensive, sometimes defensive and sometimes both simultaneously. At the same time the U.S. is developing access vectors and tools to exploit China’s information control systems, it must also harden its own military, government, and civilian critical infrastructure networks. Research suggests that improving cyber defenses limit incentives to infiltrate networks for espionage, intellectual property theft, or cyber-attack. A resilience model should be adopted. Instead of building “cyber walls” using a traditional warfare model, cyber defense should model biological systems that can adapt and recover. Systems can be designed to turn the table on intrusions, misdirecting them down false alleys or “sinkholing” them in so-called “honeypots” for study. This can even be effective in passing back false information or simply causing the attacker to waste time and resources chasing phantoms.[x] On the offensive side of the continuum, experts like retired Army Lieutenant Colonel Timothy Thomas see the development and fielding of 13 offensive cyber warfare teams as significant. According to him, the Chinese “now know we are ready to go on the offense. There’s something that’s been put in place that I think is going to change their view.”[xi]

Clandestine Action – Due to the difficulties in acquiring and maintaining access in closed networks, the United States will have to undertake clandestine efforts, both in cyberspace and through traditional means. Policy makers should be careful, however, not to be lulled by the lure of technologically-based cyberspace operations as the preferable alternative to traditional human intelligence operations. While the U.S. is right to continue to pursue advances in unmanned vehicles, radio-frequency and electro-magnetic operations, and space-based computer and communication operations, obtaining and maintaining access  in many cases will require mixed-mode penetration: human and cyber action. Cultivating human sources to gain insight into leadership intentions, network configurations, and potential areas of exploitation remain a critical part of a broad information operations campaign. As China continues to pursue clandestine operations against the U.S., both to gather traditional intelligence and to enable their own cyberspace operations, our own counter-intelligence and cyberspace defense capabilities will become that much more important.

These lines of effort will have to be synchronized in a mutually supporting effort. Public diplomacy and strategic communication can be enabled in and through cyberspace. Clandestine action may be required to obtain and maintain access to critical networks. Economic incentives, technology export controls and sanctions will play critical roles at times to advance America’s interests to degrade or disrupt China’s information control systems.

It will be necessary to develop options which degrade China’s information control capabilities incrementally while preserving significant reserves. Historically, this has been especially tricky. Past experience, such as the Vietnam War, suggests that the incremental application of force with too fine of control tends to condition the adversary rather than compel the adversary. The U.S. will need to be able to send “warning shots” that indicate to the CCP that we possess capabilities that will cause them to lose control entirely and threaten their hold on power, allowing the U.S. to prevail. Of course, given that many cyberspace and IO capabilities are perishable once used, the U.S. will need to maintain a host of capabilities able to be delivered across multiple vectors and times and places of our choosing.

One must be mindful that while China’s information controls systems are a critical vulnerability, they are not a gateway to the overthrow of the CCP and the establishment of a democratic government, at least not right away. Data suggests that the vast majority of the Chinese public who utilize the Internet and social media are quite happy with the amount and variety of content available. Only about 10 percent use the Internet for political purposes with the remainder, like their American counterparts, using it for entertainment and socializing.[xii] Therefore, strategic messaging will have to be much less overt and subtler.

We should utilize the natural advantages the U.S. has in the entertainment and public relations world to encourage the public to put pressure on the government gradually, perhaps not directly in the political sphere but rather on natural fissures and tensions already resident, such as corruption, mismanagement, ethnic strife, uneven development, environmental degradation, and the growing wealth gap in China. Consider the recent effort by the U.S. Department of State to publicly highlight air quality in Beijing, resulting in embarrassment as well as change in China’s environmental policies.[xiii] Similar efforts, both public or through providing covert support to internal groups in China, would hopefully have similar impact. The goal will be to keep the CCP looking inward, concerned about social stability, rather than outward, projecting power.

To be successful, it will be necessary to understand at the highest level of detail possible not only the technical aspects of China’s information control apparatus but also its command, control and communication pathways, chain of command, and decision making calculus. Technical intelligence requirements would include network configuration pathways, router and server equipment models, operating and surveillance software versions, administrative controls, wireless hot points and air gaps and fiber network systems. The U.S. will need to know which agencies and bureaucracies are responsible for various kinds of surveillance and what their resident capabilities, gaps and scope of responsibility is. It would be helpful to identify key personalities and understand the resource competition between them in order to exploit them. We need to know how commands are passed down from leadership to operators, and if it is possible to deny, degrade, and in some way get in the middle of those communication pathways. We will also need to know the decision calculus of the Central Standing Committee. What will cause them to want to tighten control, or perhaps better yet, what might they simply ignore? This is certainly not an exhaustive list of intelligence requirements, but gives a sense of the kinds of information that a successful strategy will require.

China’s Response

In war, the enemy gets a vote, so policy makers and military commanders must carefully consider and “wargame” China’s response to a U.S. effort threatening its information control systems. By doing so, the U.S. can better prepare courses of action that counter potential Chinese responses. Traditionally, planners will break down adversary responses into two categories: most likely and most dangerous.

China’s responses are naturally shaped by their historic understanding of their place in the world, and especially the recent “Century of Humiliation” and the role that historical grievance plays in this understanding.[xiv] Attempting to shape the CCP’s ability to control information within China has a direct impact on the regime’s need to mobilize popular support in times of crisis or even war. The CCP has come to realize that “it cannot simply demand compliance and access to materials, people or facilities” as it probably once could during the days of Mao Zedong. The CCP and the PLA have undertaken “a systematic attempt to plan for mobilization, integrating it into economic development.”[xv] This planning includes “information mobilization” due to the “central role of information and information technology, especially in the context of informationized warfare.”[xvi] The various activities proposed here to attack critical vulnerabilities in China’s strategy should be viewed by policy-makers on a continuum of escalation. Public information campaigns highlighting air quality in Beijing will annoy the CCP in a much different way than denying China the ability to filter Internet content or threatening regime legitimacy.

March 22, 2013: Staff members of the newly-merged State General Administration of Press, Publication, Radio, Film and Television pose for group photos during a ceremony to hang the new nameplate in Beijing (Photo Credit: Xinhua/Wang Zhen).
March 22, 2013: Staff members of the newly-merged State General Administration of Press, Publication, Radio, Film and Television pose for group photos during a ceremony to hang a new nameplate in Beijing (Photo Credit: Xinhua/Wang Zhen).

China’s most likely course of action will be to continue to “plug the gaps” that any U.S. program creates in their information control system. This is a beneficial byproduct since the Chinese will continue to expend time and resources with an inward focus, possibly diverting some of its effort away from cyber espionage, or change its focus of cyber espionage from intellectual property theft to countering U.S. efforts. It will continue to partner with “like minded” regimes such as Russia, Iran, and Venezuela, perhaps targeting U.S. allies in Asia, Africa, and the Middle East, to advance an alternative international rule set and standard. China’s “Internet Agenda” will continue to focus on international recognition of state sovereignty over cyberspace, a global internet regulatory scheme that targets cybercrime and terrorism (with sufficiently vague definitions of “crime” and “terrorism” to allow for maximum latitude), and the legitimate role of the state to remain the “gatekeeper” to their country’s access to the internet.[xvii]

We can surmise what effect this strategy might have by examining world events and how the PRC responded when it felt threatened by internal pressures. For example, China has had a difficult relationship with some Muslim nations due to persecution of Uighurs in Xinjiang province. The recent decision by Thailand to repatriate nearly 100 Uighurs back to China was met with harsh criticism from the United Nations Refugee Agency and the international non-governmental organization Human Rights Watch. Reporting suggests that Beijing may have pressured Bangkok, and Chinese persecution has strained relations with Turkey, which has both ethnic and religious ties to the Uighurs in Xinjiang.[xviii] In September of 2014, Ilham Tohti, an economics professor and member of the CCP, was sentenced to life in prison  by a Xinjiang court for “inciting separatism” and inviting “international opprobrium,” according to Georgetown University professor James A. Millward.[xix]

China’s continued crackdown on Internet access appears to be having a direct impact on business and foreign investment, according to surveys conducted by the European Union Chamber of Commerce in China and the American Chamber of Commerce. Respondents noted that foreign firms feel “less welcome,” poor air quality makes it harder for firms to recruit executives, and that recent regulatory enforcement campaigns “target and hinder foreign companies.”[xx]

These two examples – internal repression, censorship and the impact on international relations and foreign investment – expose vulnerabilities in how China chooses to stem threats, which come at a cost to China. Therefore, we have insight into how proposed information activities which parallel previous events might look and the anticipated costs. A Cyberspace/IO Offset targeting China’s information control systems can be expected to result in more extreme or diverse efforts to clamp down on information and economic exchange, perhaps ratcheting up internal dissent or imposing economic costs as foreign investment slows.

Conclusion

By targeting China’s information control system, the United States can directly attack China’s most critical vulnerabilities and weaken its center of gravity, the Chinese Communist Party. By placing these controls at risk, PRC leadership will come to believe that their hold on power and ability to maintain domestic harmony is in jeopardy. This will permit the United States to effectively and efficiently counter Chinese power during a critical window of the next ten to twenty years, when demographic and economic headwinds will cause China to enter a period of decline.

A whole of government approach is often advocated but exceedingly difficult to execute in our federal system. The strategy will require careful coordination and long-term vision, two capabilities that Western democracies are notoriously deficient in. Due to the nature of the strategy, lines of effort and operations can become quickly compartmentalized in classified channels, which will make coordination that much more difficult. Importantly, much like the policy of containment against the Soviets, it will require buy in from across the political spectrum, also no easy task.

Ultimately, a Cyberspace-IO Offset permits the United States to leverage its unique advantages, both technological and historically ideological, to attack China’s critical vulnerabilities asymmetrically. Despite the challenge this strategy poses, the U.S. has shown historic resiliency and proven adaptability in the past, and the present is no different.

LT Robert “Jake” Bebber USN is a Cryptologic Warfare Officer assigned to United States Cyber Command. His previous assignments have included serving as an Information Operations officer in Afghanistan, Submarine Direct Support Officer and the Fleet Information Warfare Officer for the U.S. Seventh Fleet. He holds a Ph.D. in Public Policy from the University of Central Florida. His writing has appeared in Proceedings, Parameters, Orbis and elsewhere. He lives in Millersville, Maryland and is supported by his wife, Dana and their two sons, Vincent and Zachary. The views expressed here are his own and do not reflect those of the Department of Defense, Department of the Navy or U.S. Cyber Command. He welcomes your comments at [email protected].

[i] George K. Kostopoulos,  Cyberspace and Cybersecurity. (Boca Raton, FL: CRC Press, 2013).

[ii] Joint Publication 3-12 Cyberspace Operations defines the Physical Network Layer as “comprised of the geographic component and the physical network components. It is the medium where the data travel;” the Logical Network Layer as consisting of “those elements of the network that are related to one another in a way that is abstracted from the physical network, i.e., the form or relationships are not tied to an individual, specific path, or node;” and the Cyber-Persona Layer as “the people actually on the network. Cyber-personas may relate fairly directly to an actual person or entity, incorporating some biographical or corporate data, e-mail and IP address(es), Web pages, phone numbers, etc. However, one individual may have multiple cyber-persona, which may vary in the degree to which they are factually accurate. A single cyber-persona can have multiple users.”

[iii] Joint Chiefs of Staff. Joint Publication 3-12 (R): Cyberspace Operations. (Washington, D.C.: Department of Defense, 2013).

[iv] Joint Chiefs of Staff. Joint Publication 3-12(R): Cyberspace Operations.

[v] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy.

[vi] Ibid.

[vii] Ibid.

[viii] Chen Weihua. “2.1 Million Chinese to Visit US This Year.” China Daily USA, May 23, 2014, accessed December 24, 2014. http://usa.chinadaily.com.cn/us/2014-05/23/content_17538066.htm

[ix] Institute of International Education. “Top 25 Places of Origin of International Students, 2011/12-2012/13.” Open Doors Report on International Educational Exchange. 2013.

[x] P.W. Singer and Allen Friedman. “Cult of the Cyber Offensive.” Foreign Policy. January 15, 2014, accessed Demcember 24, 2014. http://foreignpolicy.com/2014/01/15/cult-of-the-cyber-offensive/

[xi] David Fieth. “Timothy Thomas: Why China Is Reading Your Email.” The Wall Street Journal. March 29, 2013, accessed September 24, 2015 . http://www.wsj.com/articles/SB10001424127887323419104578376042379430724

[xii] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy.

[xiii] David Roberts. “How the U.S. Embassy Tweeted to Clear Beijing’s Air.” Wired, March 6, 2015, accessed April 2, 2016. http://www.wired.com/2015/03/opinion-us-embassy-beijing-tweeted-clear-air/

[xiv] Zheng Wang. In China, History is a Religion. The Diplomat, June 16, 2014, accessed April 2, 2016. http://thediplomat.com/2014/06/in-china-history-is-a-religion/

[xv] Dean Cheng, Converting the Potential to the Actual: Chinese Mobilization Policies and Planning, in The People’s Liberation Army and Contingency Planning in China, Ed by Andrew Scobell, Arthur S. Ding, Phillip C. Saunders and Scott W. Arnold (National Defense University Press: Washington DC, 2015). P. 130-131.

[xvi] Dean Cheng, Converting the Potential to the Actual. p 111.

[xvii] John Jamison. “China’s Internet Agency.” The Diplomat, December 23, 2014, accessed December 28, 2014. http://thediplomat.com/2014/12/chinas-internet-agenda/

[xviii] Oliver Holmes. “Thailand forcibly sends nearly 100 Uighur Muslims back to China.” The Guardian, July 9, 2015, accessed September 24, 2015.. http://www.theguardian.com/world/2015/jul/09/thailand-forcibly-sends-nearly-100-uighur-muslims-back-to-china

[xix] James A. Millward.“China’s Fruitless Repression of the Uighurs.” The New York Times. September 28, 2014, accessed September 24, 2015.. http://www.nytimes.com/2014/09/29/opinion/chinas-fruitless-repression-of-the-uighurs.html

[xx] Calum MacLeod. “Foreign firms in China gripe about Internet, pollution.” USA Today, February 12, 2015, accessed Septmeber 24, 2015.http://www.usatoday.com/story/money/2015/02/12/china-internet-curbs-hurt-us-business/23283491/