Category Archives: Capability Analysis

Analyzing Specific Naval and Maritime Platforms

Full Spectrum Anti-Theater Missile Warfare

The following article is part of our cross-posting partnership with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. You can read it in its original form here.

By Jon Solomon

My recent post on how to counter Chinese anti-shipping capabilities between the First and Second Island Chains was heavily influenced by CAPT William Toti’s seminal article in last June’s Naval Institute Proceedings on the need to tackle anti-submarine warfare from a theater-wide, threat-tailored, combined arms campaign construct. If you haven’t read his article (which is outside the paywall), do so. It is a foundational work.

Toti observes that the dramatic sensor advantages that allowed the U.S. Navy to thoroughly dominate Soviet submarines throughout much of the Cold War no longer hold. Our ability to detect and attack an approaching adversary submarine before it can shoot first is uncertain at best. Yet, as Toti points out, “real ASW is not about detecting the submarine, it’s not about killing the submarine, it’s about defeating the submarine.”[i] The ability to win a close-in “knife fight” against a submarine, while important, represents just one of many opportunities to prevent the submarine from executing an effective attack. The submarine in wartime must, after all, have a safe haven in port for resupply, must break out of port, must transit through marginal seas or the open ocean to its patrol station, must be cued into patrol stations or intercept positions from which it would have the greatest opportunity for encountering prey, must detect and correctly classify a target (or receive targeting-quality cues from external surveillance and reconnaissance assets), must approach the target to weapons release range, and must land a blow with its weapon salvo. Most conceivable adversaries of the U.S. have the added geographical challenge of pushing their submarines through chokepoints such as straits in order to access the open ocean or return to port from patrol. Toti observes that there are exploitable vulnerabilities in each of these steps that can deny the submarine a chance to attack effectively and perhaps even lead to the submarine’s own destruction. Toti also notes that if a potential adversary’s leaders became convinced that the U.S. would be able to defang any submarine offensive, they might opt not to employ their submarines—or go to war—in the first place.

In rereading Toti’s article the other week, it occurred to me that there are remarkable parallels between what he suggests could be done to wage a wartime theater anti-submarine campaign and what could be done to wage a campaign to defeat an adversary’s wartime use of theater-range conventionally-armed ballistic and cruise missiles. His recounting of the Navy’s “full-spectrum ASW” doctrine provides an excellent model for tying together a combined arms “full-spectrum anti-theater missile campaign” concept along the lines of what Deputy Secretary of Defense Bob Work dubbed “raid breaker” earlier this year.[ii]

Just as ASW doesn’t depend entirely on destroying the submarine, theater missile defense doesn’t depend entirely on destroying the inbound theater missile. With this in mind, we see that each of Toti’s “ten threads of full-spectrum ASW” has an anti-theater missile analogue:

Full Spectrum ASW Full Spectrum Anti-Theater Missile Warfare
Defeat submarines in port Suppress missile-armed mobile platforms’ basing and logistical support infrastructure
Defeat the submarines’ shore-based command and control capability Defeat the systems-of-systems that missile-armed mobile platforms rely upon to attack effectively
Defeat submarines near port, in denied areas Defeat missile-armed mobile platforms as they break out of bases/garrisons towards their firing positions
Defeat submarines in choke points Defeat missile-armed air and naval platforms in choke points
Defeat submarines in open ocean Defeat missile-armed mobile platforms in their patrol or firing areas
Draw enemy submarines into ASW “kill boxes,” to a time and place of our choosing Induce missile-armed mobile platforms to fire at false targets and perhaps expose themselves to attack
Mask our forces from submarine detection or classification Mask our forces from the adversary’s local reconnaissance and targeting efforts
Defeat the submarine in close battle Defeat missile-armed air and naval platforms in close battle
Defeat the incoming torpedo Defeat the inbound missile
Create conditions where an adversary chooses not to employ submarines Create conditions where an adversary chooses not to employ theater missiles

Let’s go through the anti-theater missile “threads” in turn. As we proceed, note that I implicitly discard the option of engaging in war-opening preemptive attacks against an adversary’s theater missile forces. With the exception of certain types of electronic or cyber operations, I work under the assumption that most of the below types of attacks would only be authorized by a U.S. President after a war has already started. 

Suppress Missile-Armed Mobile Platforms’ Basing and Logistical Support Infrastructure

Theater missile-firing platforms include aircraft, submarines, naval surface combatants, and Transporter Erector Launchers (TEL). All of these platforms require logistical support including rearmament, refueling (with the exception of SSNs, of course), replenishment of stores, corrective maintenance, and damage repair. In war, the bases in which they normally reside, receive servicing, and operate from can be attacked (assuming authorization from political leadership, which I’ll discuss in more detail below).

Nevertheless, not all of these platforms need to always return to a permanently-fixed base for all forms of servicing. For example, many missile-firing platforms can operate from and be serviced to some extent in austere locations such as seaports, airports, “satellite” airbases or ad hoc airstrips, or relocatable logistical depots. Some missile-firing platforms can have fuel, stores, repair parts, and even certain types of munitions brought to them in the field: replenishment ships can resupply surface combatants and sometimes submarines at sea, trucks or transport aircraft can resupply strike aircraft at austere airbases/airstrips, and trucks can resupply TEL units. All of these means for logistical support in the “field” can be directly attacked given sufficient intelligence, surveillance, or reconnaissance to know when and where to strike. Moreover, the depots and other fixed infrastructure that logistics forces inevitably pull from can also be identified and attacked. There’s an important caveat, though: the heavy wartime demands on U.S. strike-capable platforms and the finite size of their guided munitions inventories suggests that (politically authorized) targeting lists would have to be prioritized based on a particular logistical asset’s or site’s importance in the adversary’s combat logistics chain, plus the operational and tactical difficulties/risks in attacking that target. 

This leads to a key point: an intelligent adversary could employ many forms of deception and concealment to heavily complicate U.S. and allied targeting efforts against a logistical asset/site or the missile-armed platforms it was servicing. Nevertheless, many forms of concealment would require that the adversary reduce its missile forces’ operational tempos somewhat in order to reduce the risk of detection, classification, and attack. This might relieve some pressure on friendly air and missile defenses by suppressing the frequency and sizes of missile raids on the margins; this can have a significant effect on a given defense’s probability of annihilating a raid. In turn, this suppression might provide friendly forces increased temporary localized margins of operational freedom in a theater—not to mention possibly alleviate some margin of pressure on allied populations and their governments (and by extension on U.S political leaders).

Attacking an adversary’s theater missile forces’ bases along with much of their supporting logistical infrastructure would require strikes against the adversary’s home soil. U.S. political leaders would undoubtedly weigh the escalatory risks of such strikes against the consequences of allowing the adversary to enjoy operational sanctuary for its missile forces. Some critics suggest these escalatory risks would—and should—bar the U.S. from ever attacking a nuclear-armed adversary’s soil. Such critiques however do not recognize the high probability that if the adversary valued certain political objectives highly enough to opt for major war, those objectives would force him to commit the escalatory precedent of conventionally striking a treaty ally’s territory—and perhaps also sovereign U.S. territories—first. This is of immense strategic significance. For one thing, an adversary’s conventional first strike against U.S. or allied territories would almost certainly ignite the popular passions of the victims’ citizens.  The pressure on a U.S. President to retaliate in scope if not in kind would be intense. For another, the adversary’s first strike would allow the U.S. and its ally to invoke unassailable legal as well as moral justification for retaliation. These factors would not offset the nuclear risks of non-nuclear retaliation, but it should be noted that there is an enormous difference between selectively striking conventional forces that might carry theater nuclear weapons and striking distinct nuclear forces. In many cases, the bases and logistical infrastructure supporting conventional forces are distinct from those used by nuclear forces. For example, China’s theater nuclear forces (in the form of its DF-21 medium-range ballistic missile force) are distinct (and often geographically segregated) from its conventionally-armed short-range ballistic missile and long-range cruise missile forces.

None of this is meant to minimize questions of escalation risk facing a U.S. President, but they most certainly do not present a “checkmating” barrier that prevents operations to deny the adversary’s theater missile forces sanctuary. It bears observing that potential adversaries wouldn’t be investing heavily in integrated territorial air defenses, base hardening, and deception and concealment technologies to protect their conventional theater missile forces if they didn’t accept the reality that those forces might be attacked in war.[iii]

Defeat the Systems-of-Systems that Missile-Armed Mobile Platforms Rely Upon to Attack Effectively

I’ve previously written about these kinds of operations at length. Suffice to say, an adversary must be able to either provide correct targeting-quality tactical pictures to its firing units or be able to cue those “shooters” into positions from which they can use their own sensors to build local targeting pictures. The U.S. and its allies can use deception and concealment to prevent the adversary from being able to effectively attack protected mobile forces. This can also be done to some extent for fixed bases and military or civil infrastructure, as deception and concealment can be used to make unimportant sites look important and vice versa. Deception and concealment might additionally be used to induce the adversary to waste precious weapons (and expose firing platforms) in attacks against false or low-value targets. The U.S. might additionally attack the adversary’s surveillance and reconnaissance assets, precision navigation and time systems that allow the construction of an accurate situational picture, command and control sites where firing decisions are made, and data relay pathways that form the “backbone” of the entire apparatus. These attacks can be physical, but in many cases it might be more effective as well as carry less escalation risk to use electronic or (as technically plausible) cyber attacks. Nor do these attacks need to have permanent effects (though that would certainly be the ideal), as friendly forces could greatly capitalize on even temporary localized degradation of the adversary’s surveillance-reconnaissance-targeting infrastructure.

This “thread” would not prevent an adversary from using its conventionally-armed theater missiles in terror bombardment campaign against an American ally’s cities. Even so, history suggests such a campaign would be far more likely to further ignite the ally’s popular passions and deepen its resolve to prevail—and retaliate—than it would to coerce the ally into submission. In other words, it would be a strategically self-defeating move by the adversary.

Defeat Missile-Armed Mobile Platforms as They Break out of Bases/Garrisons Towards Their Firing Positions

As Toti observes, this “thread” would largely occur within “denied” areas such as the adversary’s own soil, any friendly or neutral territories occupied by the adversary’s forces, the airspace above or adjacent to these territories, or the waterspace adjoining these territories. This would accordingly complicate offensive anti-air, anti-submarine, anti-surface combatant, and anti-TEL operations. Nevertheless, friendly submarines could lurk offshore to intercept the adversary’s submarines and surface combatants. Offensive sweeps by theater-range fighters might be used when and where feasible to attack the adversary’s outbound aircraft. Standoff strike aircraft cued by penetrating scouts might be used to attack the adversary’s surface combatants. If adequate air superiority is present, maritime patrol aircraft might be used to search for and attack adversary submarines. Special forces might be used to cue attacks using penetrating aircraft or long-range guided munitions against TELs (though if the First Gulf War is any indication, probably without a great deal of success). Destroying missile-firing platforms would of course be ideal, but the real goal of this “thread” would be to make breakout more time-consuming and resource-intensive than it might otherwise be for the adversary. This might result in further suppression of his operational tempo. It might also prevent him from seizing or maintaining the operational initiative.

Defeat Missile-Armed Air and Naval Platforms in Choke Points

I covered this with respect to aircraft and submarines last week; the threats facing an adversary’s surface combatants would be even steeper. This forms part of the argument for deploying land-based anti-ship missiles alongside straits. Land-based surveillance assets bordering a strait can also cue anti-ship strikes by friendly aircraft operating from more distant bases. Similarly, these surveillance assets can provide other friendly forces with tactically-actionable indications and warning of a strike aircraft raid transiting through a choke point towards its targets or back to its airbases. Lastly, defensive minefields could be laid as geographically practical to complicate transits by the adversary’s surface combatants or submarines.

Defeat Missile-Armed Mobile Platforms in Their Patrol or Firing Areas

I also covered this with respect to aircraft and submarines last week. In the absence of persistent tactical air cover, an adversary’s surface combatants would not be able to hold out for long against U.S or allied anti-ship onslaughts.

TELs present the hardest target to engage in the adversary’s firing areas, bar none. They not only can hide within the broad expanse (and defense-in-depth) of the adversary’s territory, but can also blend into their surroundings on par with the quietest submarines at sea. They can shift quickly and frequently between prepared firing positions, or can hunker down heavily camouflaged for protracted periods. There is no existing or technically-plausible weapon system that could offer a high kill probability against TEL units that were smartly employing deception and concealment. Nor is there an existing or technically-plausible strike aircraft that could persistently perform TEL hunts deep within a capable adversary’s airspace unless the adversary’s territorial air defenses had been comprehensively rolled back. This does not mean that TEL hunting, if the tactical environment allows it, would be fruitless. The situation-dependent use of U.S. aircraft to hunt TELs using cheap weapons with low kill probabilities would still put TEL units on the defensive, which in turn might contribute to suppressing TEL firing rates and salvo sizes.

The most effective means of defeating ground-launched missile forces is to physically occupy the territory they are operating within. This is a principle that has been proven time and time again, from the allies’ Second World War efforts to defeat the German V-1 and V-2 bombardment campaign, to the Israelis’ efforts to break up Hezbollah and Hamas rocket bombardment campaigns over the past decade. It’s also the most costly in treasure and blood, as it requires the use of sizable ground forces. This is plausible and probably necessary if the adversary is operating TELs on the overrun soil of a U.S. ally; liberation of the ally’s territory would normally be a U.S. war objective in any case. It may also be plausible, albeit possibly far more costly, if a relatively small adversary country is operating TELs on its own soil. It is not plausible at all, whether militarily or politically, against TELs operated on the soil of a regional or great power. However, if a regional or great power is operating TELs relatively close to its border or coastal areas, and especially if those areas are somewhat geographically isolated, it might be plausible to dispatch special forces on brief raids aimed at destroying them directly, flushing them for attack by other friendly forces, or temporarily suppressing them by inducing them to go into hiding. Expeditionary forces might also be used to raid a regional power’s TELs in these kinds of areas; this would not be possible politically or militarily against a great power.

Induce Missile-Armed Mobile Platforms to Fire at False Targets and Perhaps Expose Themselves to Attack

I’ve written about this one extensively in the past as well. Every theater missile wasted is one less in the adversary’s finite inventory, with concomitant impacts on his campaign plans. This is especially true if a wasted missile cannot be readily replaced off the production line during wartime.

Similarly, an adversary platform or grouping that is seduced into attacking false targets will be incapable of attacking valid targets elsewhere at the same time. U.S. and allied forces can obviously exploit this operationally. At maximum, a submarine, surface combatant, or aircraft that shoots a theater missile gives away its general presence and sometimes even its approximate position. False targets might thus be used to set up reactive intercepts against the attackers, or perhaps even to lure them into prepared ambushes. It isn’t a stretch to imagine the kinds of enduring (and exploitable) psychological effects that might be imposed upon previously-overconfident adversary crews that wasted ordnance against decoys—or managed to survive an ambush.

Mask our Forces From the Adversary’s Local Reconnaissance and Targeting Efforts

This is another “thread” I’ve covered previously elsewhere. It is just as crucial to the use of false target tactics in the previous “thread” as it is to defending actual U.S. and allied forces from attack. The adversary must not be allowed to properly classify, let alone detect if at all practical, actual U.S. and allied forces until it is too late to matter. Toti hits the nail on the head in his piece when he notes “…it is about increasing the fog of war by making the real targets look like anything but a real target” and that it “must be a continuous process.”[iv]

Defeat Missile-Armed Air and Naval Platforms in Close Battle

This is self-explanatory: destroy them or induce them to retreat before they can shoot at friendly forces. This demands either long-range weaponry that can be fired from the “inner zone” against the adversary’s inbound missile-armed platforms or the placement of persistent outer layer defenses in the adversary’s path. The latter is almost always preferable as the adversary can easily field strike missiles that outrange any weapon the defender might fire from the inner zone.

As its title makes clear, this “thread” is not applicable to TELs.

Defeat the Inbound Missile

This is also self-explanatory. Missile defense sensors, kinetic weapons, and electronic warfare systems all factor here. So does damage recoverability (e.g. use of redundant systems, rapid repair of damaged runways, hardening of a base’s critical infrastructure, shipboard damage control, etc). No single measure offers a panacea: some combination of active and passive measures is necessary to maximize defensive effectiveness.

A subtle variation of this “thread” involves the dispersal of forces not just to enhance their survivability, but also to force the adversary into an inventory management dilemma. The adversary could concentrate strikes over a specific period of time against a small number of force dispersal sites in order to overwhelm the missile defense systems protecting those sites, but that would leave the U.S. and allied forces positioned in other dispersal sites free to operate. The adversary could alternatively strike the maximum number of dispersal sites possible within a specific time period, but that would result in relatively few missiles attacking any single site—and thereby greatly simplify the jobs of each site’s missile defense systems. Also recall that theater missiles are not easily produced, especially in war. This means every missile fired would reduce the number available to the adversary for the duration of the conflict. As such, the adversary would probably have some threshold limit to the number of missiles he’d be willing to use in a concentrated or “spread” attack. U.S. and allied forces could adapt to capitalize on whichever attack type the adversary selected, and by doing so defeat the adversary’s theater missiles at the operational level of war. 

Create Conditions Where an Adversary Chooses not to Employ Theater Missiles

Full-spectrum anti-theater missile warfare signifies denying the adversary conventional escalation dominance in a crisis or war. The cumulative effect of convincing an opportunistic potential adversary that each of its “threads” are combat-credible—and that U.S. political leaders would be willing to deny the potential adversary’s forces operational sanctuary on their own soil if the adversary struck first—will generally be successful conventional deterrence.

The ideal state of deterrence would obviously be prevention of war outright, and Cold War-era theories regarding how this can be achieved between two competing nuclear-armed powers remain applicable. But even if a conventional war did erupt, the credibility of full-spectrum anti-theater missile warfare might help induce an adversary with modest political objectives to keep the conflict limited to a brief localized clash along a land border or at sea involving only the shortest-range missiles in both sides’ inventories. While tragic and hardly desirable, it would still be vastly preferable to a ruinous general war.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at [email protected]. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

Endnotes

[i] CAPT William J. Toti, USN (Retired). “The Hunt for Full-Spectrum ASW.” Naval Institute Proceedings 140, No. 6, June 2014, 39.

[ii] I define “theater missile” to include short and medium range ballistic and cruise missiles that can strike targets on land or at sea.

[iii] This point is made abundantly clear in Elbridge Colby. “Don’t Sweat Air Sea Battle.” The National Interest online, 13 July 2013, accessed 5/24/15, http://nationalinterest.org/commentary/dont-sweat-airsea-battle-8804?page=show

[iv] Toti, 43.

Featured Image: ARABIAN GULF (March 20, 2011) Mineman Seaman Charles Bryan watches for contacts on the SPA 256 radar while on watch in the Combat Directive Center aboard the mine countermeasures ship USS Ardent (MCM 12).  (U.S. Navy photo by Mass Communication Specialist 2nd Class Lewis Hunsaker/Released)

China’s Expanding Ability to Conduct Conventional Missile Strikes on Guam

The following article is adapted from a report by the U.S.-China Economic and Security Review CommissionRead the original report here.

By Jordan Wilson

Observers of China’s September 2015 military parade witnessed the surprise introduction of a new road-mobile intermediate-range ballistic missile (IRBM), the DF-26, reported to feature nuclear, conventional, and antiship variants and a range of 3,000–4,000 kilometers (km) (1,800–2,500 miles [mi])1—greater than any of China’s current systems except the ICBMs in its nuclear arsenal. This range would cover U.S. military installations on Guam, roughly 3,000 km (1,800 mi) from the Chinese mainland, prompting some analysts and netizens to refer to the missile as the “Guam Express” or “Guam Killer” (derived from the term “carrier killer” used to refer to China’s shorter-range DF-21D antiship ballistic missile).2 Combined with improved air- and sea-launched cruise missiles and modernizing support systems, the DF-26 would allow China to bring a greater diversity and quality of assets to bear against Guam in a contingency than ever before.

China’s reason for developing capabilities to hold locations in the Pacific at risk can be traced to the domestic political interests of its leaders. The Chinese Communist Party (CCP) perceives that its legitimacy in the eyes of China’s citizens is based, in part, on its ability to demonstrate that it is capable of strengthening the nation3 and safeguarding China’s territorial interests and claims.4 Yet the CCP leadership believes the United States’ presence in the Asia Pacific—intended to back the U.S. commitment to defending key interests and upholding global norms in the Asia Pacific, such as the security of allies and partners, the peaceful resolution of disputes, and freedom of navigation5—could interfere with its ability to defend these interests and claims if a regional crisis were to arise.6 This concern has prompted Beijing to develop conventional missile capabilities to target U.S. military facilities in the Asia Pacific in general, and Guam in particular, in order to expand China’s options and improve its capacity to deter or deny U.S. intervention during such a crisis. Guam is referenced in many Chinese academic and military writings as a highly important feature in the purported U.S. “containment” strategy,7 with analysts noting its strategic position,8 and its role as an “anchor” of U.S. forces in the region9 and of the “second island chain”* in particular.10 China has been able to reach Guam with nuclear weapons for decades. It could theoretically employ conventional gravity bombs, naval gunfire, and torpedoes as well, but the same air and naval platforms that would deliver these are now equipped with significantly more advanced cruise missiles. This article thus focuses on the more relevant concerns posed by missiles below the nuclear threshold.

First and Second Island Chains Showing Guam. The precise boundaries of the island chains vary among Chinese sources, and have never been officially defined by China’s government. Andrew S. Erickson and Joel Wuthnow, “Barriers, Springboards and Benchmarks: China Conceptualizes the Pacific ‘Island Chains,’” China Quarterly, January 21, 2016, 3, 7-9, 17. http://journals.cambridge.org/abstract_S0305741016000011. (U.S. Department of Defense)

Multiplying Forces Capable of Striking Guam

Several new conventional platforms and weapons systems developed by China in recent years have increased its ability to hold U.S. forces stationed on Guam at risk in a potential conflict:

Intermediate-Range Ballistic Missiles: The DF-26 is China’s first conventionally-armed IRBM and first conventionally-armed ballistic missile capable of reaching Guam. Its inclusion in the September 2015 parade indicates it has likely been deployed as an operational weapon,11 although only a few have likely been installed thus far. The missile also reportedly has serious accuracy limitations:12 a 2015 report by IHS Jane’s assesses its current circular error probable (CEP)** at intermediate range to be 150–450 meters,13 while China’s DF-15B short-range ballistic missile, for example, is reported to have a CEP of 5–10 meters as a precision guided weapon.14 Practically, this means that many more launches would be required to achieve the same degree of confidence in inflicting damage, pending the improvement of the sensor systems on the missile and the space-based systems providing pre- and post-strike intelligence, surveillance, and reconnaissance (ISR) and position, navigation, and timing data.

Antiship Ballistic Missiles (ASBMs): The DF-26 ASBM version is, like the DF-21D, unproven against a moving target at sea15 but likely to undergo further development.

Air-Launched Land Attack Cruise Missiles (LACMs): China’s newest and most capable bomber, the H-6K, when equipped with up to six recently-developed air-launched CJ-20 LACMs, gives China the ability to conduct precision airstrikes and potentially reach Guam with air-launched weapons for the first time.16 However, these antiquated bombers*** would have a high probability of being detected and intercepted by U.S. aircraft and anti-aircraft systems.17 Such an attack would also outdistance the range of any Chinese escort fighters, according to a 2015 RAND Corporation study,18 and China’s air refueling fleet is still too small to support large-scale, long-distance air combat.19

Air-Launched Antiship Cruise Missiles (ASCMs): The PLA Navy’s H-6 bombers, including its H-6Ks, can carry up to four of China’s new long-range, supersonic YJ-12 ASCMs,20 but would have the same limitations in employing these weapons.

Sea-Launched Land Attack Cruise Missiles: The PLA Navy currently does not have the ability to strike land targets, but China has likely begun to develop a sea-based LACM capability over the last few years.21 The U.S. Department of Defense (DOD) has stated that this capability may involve China’s forthcoming Type 095 nuclear-powered attack submarine (SSN) or new LUYANG-III guided missile destroyer (DDG).22

Sea-Launched Antiship Cruise Missiles: PLA Navy platforms equipped with ASCMs, particularly the new YJ-18, could complicate U.S. naval operations near its Guam facilities, provided the PLA Navy vessels were able to get into position without being detected. China’s quietest submarines, however, are diesel-electric and relatively slow in comparison to other types (see comparison in figure below).

The Expanding Range of China's Conventional Missiles. Full list of sources available here.
The Expanding Range of China’s Conventional Missiles. Click to enlarge. (U.S.-China Economic and Security Review Commission)

China’s new conventional regional strike weapons, as well as ongoing qualitative improvements to its naval operations and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) systems, provide Beijing with the ability to hold U.S. forces and installations on Guam at greater risk than in the past, despite remaining challenges and gaps that indicate the level of risk is still low. Overall, the efficiency/vulnerability tradeoff between China’s air and naval forces probably factors into why China pursued a third option by developing DF-26 ballistic missiles. Beijing is working to advance its regional strike capabilities across the board, however, indicating concerns will be posed by ground-, air-, and sea-launched types going forward. To evaluate China’s ability to strike Guam in the future, the areas that should be monitored most closely are increased deployments of DF-26 missiles and qualitative improvements to China’s precision strike capabilities, bomber fleet, in-air refueling capability, and submarine quieting technology. 

Implications for the United States

Guam is growing in importance to U.S. strategic interests and any potential warfighting operations in the Asia Pacific, even as China’s ability to strike the island is increasing. The island is home to two U.S. military facilities, Apra Naval Base and Andersen Air Force Base, and hosts a total of about 6,000 military personnel23 (with 5,000 more projected to be moved from Okinawa by 202024), as well as four nuclear attack submarines;25 three Global Hawk UAVs;26 continuous rotations of B1, B-2, and B-52 bombers;27 temporary fighter rotations;28 the largest U.S. weaponry storage in the Pacific;29 and a Terminal High Altitude Area Defense (THAAD) missile battery.30 It is also crucial to U.S. preparations for responding to crises, providing valuable basing capacity31 and a location to which the United States can pull back assets from within China’s precision strike range, if needed.

China’s conventional missile force modernization could complicate the United States’ response in a contingency in which Beijing sought to deny or delay a U.S. intervention. An assessment by the RAND Corporation, for example, estimates that with 50 (hypothetically more accurate) IRBMs, “China could keep Andersen AFB closed to large aircraft for more than eight days (assuming missile reliability of 75 percent and eight-hour repair times), even if the PLA is denied battle damage assessment … With 100 IRBMs, the PLA could make a full sweep of all unsheltered aircraft parking areas and then use the rest of its inventory to keep Andersen shut to large aircraft for 11 days.”32 Of additional concern, China’s leaders could also be more willing to resort to military force in an existing crisis if they believed they could successfully hold Guam at risk, diminishing the United States’ ability to deter escalation, although it is difficult to determine the extent to which better operational capabilities might influence strategic thinking in Beijing.

U.S. experts and analysts have proposed several options that could help mitigate these concerns:

Hardening Facilities on Guam: Investing in improved protection for U.S. assets on Guam could increase the costliness and uncertainty of conventional ballistic and cruise missile strikes against these facilities, and thereby work to disincentivize a first strike and increase regional stability, as noted by the U.S.-China Economic and Security Review Commission in its 2015 Report to Congress.33 However, this approach is complicated by the likely high costs of such investments,34 and the potential for China to counter them with an even further buildup of its missile arsenal.

Dispersing U.S. Regional Military Facilities: A greater dispersion of U.S. military facilities throughout the Asia Pacific, or access to an increased number of alternate regional ports and airfields, would multiply the number of targets against which China might employ missile strikes and complicate its ability to disrupt U.S. operations in a contingency, particularly through a first strike.35 This approach does face high financial costs, the possibility that China might respond with further missile deployments, and potential difficulties in obtaining approval and financial support from host countries.36 It also runs counter to efforts to reduce long-term dependence on foreign bases. The United States has nonetheless been able to take steps towards this objective, recently securing access to facilities in the Philippines and entering discussions regarding access to airfields in Australia.37

Investments in New Missile Defense Capabilities: Continued U.S. investments in “next-generation” missile defense initiatives such as directed energy and rail gun technologies, as recommended in the Commission’s 2015 Report to Congress,38 could yield better options for defending U.S. bases and platforms from China’s conventional ballistic and cruise missiles. While current missile defense systems such as THAAD—already stationed on Guam—and PAC-3 (the upgraded Patriot missile system) may help to an extent, they are intended to stop North Korean missiles and would likely not completely protect against an attack from China.39

Revisiting the Intermediate-Range Nuclear Forces (INF) Treaty: China’s missile force modernization has contributed to a U.S. policy debate regarding the United States’ participation in the INF Treaty, particularly given Russia’s recent violations of its Treaty obligations.40 Signed by the United States and Soviet Union in 1987, the INF Treaty required “destruction of both parties’ ground-launched ballistic and cruise missiles with ranges between 500 and 5,500 kilometers (310 and 3,418 miles), along with their launchers and associated support structures and support equipment,” altogether eliminating 846 U.S. and 1,846 Soviet missiles. Although titled a “Nuclear Forces” treaty, INF’s prohibition of conventional systems is the substance of the current debate, as China’s buildup of conventional intermediate-range ballistic and cruise missiles has been a driving force behind concerns regarding the Treaty in recent years.41 As China has engaged in a relatively low-cost buildup of land-based theater-range conventional missiles, including the DF-26, the United States has been prevented under the Treaty from doing so. As policymakers weigh the costs and benefits of continued U.S. participation, three potential actions would allow the United States to carefully explore these questions while remaining in full compliance with the Treaty: reports examining the potential benefits and costs of incorporating ground-launched short-, medium-, and intermediate-range conventional cruise and ballistic missile systems into the United States’ Asia Pacific defensive force structure;42 research and development activities for conventional INF-accountable cruise and ballistic missiles, in preparation for possible changes;43 and discussions with allies regarding whether they would be open to hosting such systems,44 investing in INF-accountable missiles themselves,45 or joining in advocating for a broadened Treaty at the multilateral or global level.46

Maintaining Superiority in Regional Strike Capabilities: The United States could invest in maintaining its ability to strike an adversary’s launchers and support networks as part of its deterrence posture in the Asia Pacific, aiming to prevent conflicts from beginning and to protect U.S. regional assets should one begin.47 Some experts have specifically noted the high number of LACMs carried by some U.S. attack submarines48 and the potential for U.S. procurement programs such as the Long Range Strike Bomber and Virginia payload module (which increases the missile capacity of the Virginia-class SSN) to provide a higher volume of firepower at a more affordable rate than ground-launched missile forces.49 Policymakers could continuously monitor the performance and sustainability of these and other aspects of the U.S. regional force posture to ensure the United States maintains its military edge.

Conclusion

Beijing’s assessment of Guam’s role in the United States’ regional force posture has made it a focal point of developments in China’s conventional regional strike capabilities, although limitations to these systems render the current risk to U.S. forces on Guam in a potential conflict relatively low. At present, the new DF-26 IRBM headlines China’s expanding capabilities, although it likely will remain extremely inaccurate until China successfully extends its precision strike complex. China could also employ surface- and submarine-launched ASCM attacks, should the platforms be able to move into range undetected; while air-launched ASCM and LACM attacks could reach Guam more quickly, but with a high risk of the bombers being detected and intercepted by U.S. aircraft and anti-aircraft systems. The DF-26 ASBM is still unproven, and China has yet to develop a sea-launched LACM capability. China will likely continue to invest in developing these systems, however, even as Guam’s importance to U.S. strategic interests in the Asia Pacific continues to grow. Options such as hardening facilities on Guam, further dispersing U.S. regional military facilities, continuing investments in “next-generation” missile defense capabilities, revisiting the Intermediate-Range Nuclear Forces Treaty (INF) Treaty, and maintaining superiority in regional strike capabilities offer potential avenues for addressing these key security concerns.

Jordan Wilson is a Policy Analyst at the U.S.-China Economic and Security Review Commission, focusing on U.S.-China security and foreign policy issues.

Featured Image: The Los Angeles-class submarine USS Topeka (SSN 754) arrives at its new homeport of U.S. Naval Base Guam in May 2015. Courtesy of Navaltoday.com.

Endnotes

* The first island chain refers to a line of islands running through the Kurile Islands, Japan and the Ryukyu Islands, Taiwan, the Philippines, Borneo, and Natuna Besar. The second island chain is farther east, running through the Kurile Islands, Japan, the Bonin Islands, the Mariana Islands, and the Caroline Islands. Bernard D. Cole, The Great Wall at Sea: China’s Navy in the Twenty-First Century, Naval Institute Press, 2010, 174-176.

** CEP is defined as the radius of a circle, centered about the intended point of impact, whose boundary is expected to include the landing points of 50 percent of the rounds. Oleg Yakimenko, “Statistical Analysis of Touchdown Error for Self-Guided Aerial Payload Delivery Systems,” (American Institute of Aeronautics and Astronautics Aerodynamic Decelerator Systems Conference, Daytona Beach, FL, March 26, 2013), 1.

*** The H-6 design, on which future versions have been based, is a licensed copy of the ex-Soviet Tu-16 “Badger” medium jet bomber, first flown in 1952. U.S. Office of Naval Intelligence, The PLA Navy: New Capabilities and Missions for the 21st Century, April 2015, 18; Encyclopedia Britannica, “Tu-16.” http://www.britannica.com/technology/Tu-16.

Citations

1. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 372; Andrew S. Erickson, “Showtime: China Reveals Two ‘Carrier-Killer’ Missiles,” National Interest, September 3, 2015; and Richard D. Fisher, Jr., “DF–26 IRBM May Have ASM Variant, China Reveals at Military Parade,” Jane’s Defence Weekly, September 2, 2015.

2. Wang Changqin and Fang Guangming “PRC Military Sciences Academy Explains Need for Developing the DF-26 Anti-Ship Missile,” China Youth Daily (Chinese edition), November 30, 2015; Andrew S. Erickson, “Showtime: China Reveals Two ‘Carrier-Killer’ Missiles,” National Interest, September 3, 2015. http://nationalinterest.org/feature/showtime-china-reveals-two-carrier-killer-missiles-13769; Wendell Minnick, “China’s Parade Puts U.S. Navy on Notice,” Defense News, September 3, 2015. http://www.defensenews.com/story/defense/naval/2015/09/03/chinas-parade-puts-us-navy-notice/71632918/; Charles Clover, “China Unveils ‘Guam Express’ Advanced Anti-Ship Missile,” Financial Times, September 5, 2015. http://www.ft.com/intl/cms/s/0/8847ddd0-5225-11e5-8642-453585f2cfcd.html#axzz3uKTMR2rn; and Franz-Stefan Gady, “Revealed: China for the First Time Publicly Displays ‘Guam Killer’ Missile,” National Interest, August 31, 2015. http://thediplomat.com/2015/08/revealed-china-for-the-first-time-publicly-displays-guam-killer-missile/.

3. Robert Lawrence Kuhn, “Xi Jinping’s Chinese Dream,” New York Times, June 4, 2013. http://www.nytimes.com/2013/06/05/opinion/global/xi-jinpings-chinese-dream.html?_r=0.

4. Alastair Iain Johnston, “The Evolution of Interstate Security Crisis Management Theory and Practice in China,” Naval War College Review 69:1 (2016), 40; Edward Wong, “Security Law Suggests a Broadening of China’s ‘Core Interests,’” New York Times, July 2, 2015. http://www.nytimes.com/2015/07/03/world/asia/security-law-suggests-a-broadening-of-chinas-core-interests.html; Ministry of National Defense of the People’s Republic of China, Defense Ministry’s Regular Press Conference on Nov 26, November 26, 2015; and Caitlin Campbell et al., “China’s ‘Core Interests’ and the East China Sea,” U.S.-China Economic and Security Review Commission, May 10, 2013, 1-5. http://www.uscc.gov/sites/default/files/Research/China’s%20Core%20Interests%20and%20the%20East%20China%20Sea.pdf.

5. White House Office of the Press Secretary, Fact Sheet: Advancing the Rebalance to Asia and the Pacific, November 15, 2015. https://www.whitehouse.gov/the-press-office/2015/11/16/fact-sheet-advancing-rebalance-asia-and-pacific; Andrew S. Erickson and Justin D. Mikolay, “Guam and American Security in the Pacific,” in Andrew S. Erickson and Carnes Lord, eds., Rebalancing U.S. Forces: Basing and Forward Presence in the Asia-Pacific, Naval Institute Press, 2014, 17, 25; and Andrew J. Nathan and Andrew Scobell, China’s Search for Security, Columbia University Press, 2012, 357.

6. Alastair Iain Johnston, “The Evolution of Interstate Security Crisis Management Theory and Practice in China,” Naval War College Review 69.1, 2016, 34; Harry J. Kazianis, “America’s Air-Sea Battle Concept: An Attempt to Weaken China’s A2/AD Strategy,” China Policy Institute, 2014, 1-2. http://www.nottingham.ac.uk/cpi/documents/policy-papers/cpi-policy-paper-2014-no-4-kazianis.pdf; Lu Zhengtao, “PRC Article Urges PLA to Boost Air-Sea Force Building for Breaking U.S. ‘Island Chain’ Strategy,” China Youth Daily (Chinese edition), November 19, 2013; Toshi Yoshihara and James R. Holmes, Red Star over the Pacific: China’s Rise and the Challenge to U.S. Maritime Strategy, Naval Institute Press, 2010, 20; and Bi Lei, “Sending an Additional Aircraft Carrier and Stationing Massive Forces: The U.S. Military’s Adjustment of Its Strategic Disposition in the Asia-Pacific Region,” People’s Daily (Chinese edition), August 13, 2004.

7. Song Shu, “Is the DF-26 a ‘Guam Killer?’” Naval Warships (Chinese), December 1, 2014; Li Jie, “U.S. Quickens Construction of ‘Bridgeheads’ of the Second Island Chain,” Global Times (Chinese edition), September 30, 2013; Lin Limin, “A Review of the International Strategic Situation in 2012,” Contemporary International Relations (Chinese), December 2012; Zhang Ming, “Security Governance of the ‘Global Commons’ and China’s Choice,” Contemporary International Relations (Chinese), May 2012; Liu Qing, “New Changes in U.S. Asia-Pacific Strategic Deployment,” Contemporary International Relations (Chinese), May 20, 2011; Liu Ming, “Obama Administration’s Adjustment of East Asia Policy and Its Impact on China,” Contemporary International Relations (Chinese), February 20, 2011; Modern Navy (Chinese), The Island Chains, China’s Navy, October 1, 2007; and Lu Baosheng and Guo Hongjun, “Guam: A Strategic Stronghold on the West Pacific,” China Military Online, June 16, 2003.

8. Qiu Yongzheng, “Second U.S. Aircraft Carrier Likely To Be Deployed to East Asia,” Youth Reference (Chinese), July 21, 2004.

9. Run Jiaqi, “Experts Say China’s Military Power Has Forced the United States to Fall Back from the First Island Chain,” People’s Daily (Chinese edition), October 8, 2014.

10. Andrew S. Erickson and Joel Wuthnow, “Barriers, Springboards and Benchmarks: China Conceptualizes the Pacific ‘Island Chains,’” China Quarterly, January 21, 2016, 9. http://journals.cambridge.org/abstract_S0305741016000011; Li Jie, “U.S. Quickens Construction of ‘Bridgeheads’ of the Second Island Chain,” Global Times (Chinese edition), September 30, 2013; Liu Bin, “The ‘Roadmap’ of the Asia-Pacific Military Bases of the U.S. Military,” People’s Daily (Chinese edition) April 23, 2012; and Modern Navy (Chinese), The Island Chains, China’s Navy, October 1, 2007.

11. Andrew S. Erickson, “Showtime: China Reveals Two ‘Carrier-Killer’ Missiles,” National Interest, September 3, 2015.

12. IHS, Jane’s Strategic Weapons Systems: Offensive Weapons, China, DF-26, September 11, 2015, 2.

13. Ibid.

14. Ibid, 4.

15. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, written testimony of Dennis Gormley, April 22, 2015; and Ronald O’Rourke, “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress,” Congressional Research Service, June 1, 2015, 6–7.

16. U.S. Department of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2015, April 2015, 12, 36, 40; U.S.-China Economic and Security Review Commission, Hearing on China’s Military Modernization and Implications for the United States, written testimony of Lee Fuell, January 30, 2014; and U.S. House Armed Services Subcommittee on Strategic Forces, Hearing on Nuclear Weapons Modernization in Russia and China: Understanding Impacts to the United States, written testimony of Richard D. Fisher, Jr., October 14, 2011.

17. Ian Easton, “China’s Evolving Reconnaissance Strike Capabilities: Implications for the U.S.-Japan Alliance,” Project 2049 Institute, February 2014, 26. http://www2.jiia.or.jp/pdf/fellow_report/140219_JIIA-Project2049_Ian_Easton_report.pdf.

18. Eric Heginbotham et al., “The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power 1996-2017,” RAND Corporation, 2015, 63. http://www.rand.org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf.

19. Michael Pilger, “First Modern Tanker Observed at Chinese Airbase,” U.S.-China Economic and Security Review Commission, November 18, 2014, 1. http://origin.www.uscc.gov/sites/default/files/Research/StaffBulletin_First%20Modern%20Tanker%20Observed%20at%20Chinese%20Airbase_0.pdf.

20. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 357, 373.

21. U.S. Department of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2014, May 2014, 36. U.S.-China Economic and Security Review Commission, Hearing on PLA Modernization and its Implications for the United States, written testimony of Jesse Karotkin, January 10, 2014; Craig Murray, Andrew Berglund, and Kimberly Hsu, “China Naval Modernization and Implications for the United States,” U.S.-China Economic and Security Review Commission, August 26, 2013. http://origin.www.uscc.gov/sites/default/files/Research/Backgrounder_China’s%20Naval%20Modernization%20and%20Implications%20for%20the%20United%20States.pdf.

22. U.S. Department of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2014, May 2014, 36; U.S. Department of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2013, May 2013, 6-7.

23. Shirley A. Kan, “Guam: U.S. Defense Deployments,” Congressional Research Service, November 26, 2014, 2, 3. https://www.fas.org/sgp/crs/row/RS22570.pdf.

24. Gidget Fuentes, “Navy Signs off on Plan to Move 5,000 Marines to Guam,” Military Times, September 5, 2015. http://www.marinecorpstimes.com/story/military/2015/09/05/navy-signs-off-plan-move-5000-marines-guam/71657614/.

25. Commander, Submarine Force, U.S. Pacific Fleet Public Affairs, “Second Submarine Tender to Be Homeported in Guam,” December 23, 2015. http://www.csp.navy.mil/Media/News-Articles/Display-News/Article/637958/second-submarine-tender-to-be-homeported-in-guam; Dean Cheng, “China’s Bomber Flight into the Central Pacific: Wake-Up Call for the United States,” War on the Rocks, December 23, 2015. http://warontherocks.com/2015/12/chinas-bomber-flight-into-the-central-pacific-wake-up-call-for-the-united-states/.

26. Shirley A. Kan, “Guam: U.S. Defense Deployments,” Congressional Research Service, November 26, 2014, 2, 3. https://www.fas.org/sgp/crs/row/RS22570.pdf.

27. Eric Heginbotham et al., “The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power 1996-2017,” RAND Corporation, 2015, 41. http://www.rand.org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf; Andrew S. Erickson and Justin D. Mikolay, “Guam and American Security in the Pacific,” in Andrew S. Erickson and Carnes Lord, eds., Rebalancing U.S. Forces: Basing and Forward Presence in the Asia-Pacific, Naval Institute Press, 2014, 20.

28. Oriana Pawlyk, “12 Air Force F-16s to Deploy to Guam,” Military Times, January 8, 2016. http://www.militarytimes.com/story/military/2016/01/08/12-air-force-f-16s-deploy-guam/78501546/; Shirley A. Kan, “Guam: U.S. Defense Deployments,” Congressional Research Service, November 26, 2014, 3. https://www.fas.org/sgp/crs/row/RS22570.pdf.

29. Andrew S. Erickson and Justin D. Mikolay, “Guam and American Security in the Pacific,” in Andrew S. Erickson and Carnes Lord, eds., Rebalancing U.S. Forces: Basing and Forward Presence in the Asia-Pacific, Naval Institute Press, 2014, 17.

30. Wyatt Olson, “Guam Anti-Missile Unit’s Main Focus Is North Korean Threat,” Stars and Stripes, January 10, 2016. http://www.stripes.com/news/guam-anti-missile-unit-s-main-focus-is-north-korean-threat-1.388070; Jen Judson, “Lockheed Secures $528 Million U.S. Army Contract for More THAAD Interceptors,” Defense News, January 4, 2016. http://www.defensenews.com/story/defense/2016/01/04/lockheed-secures-528-million-contract-for-more-thaad-interceptors/78274842/; Cheryl Pellerin, “Work: Guam Is Strategic Hub to Asia-Pacific Rebalance,” U.S. Department of Defense News, August 19, 2014. http://www.defense.gov/News-Article-View/Article/603091/work-guam-is-strategic-hub-to-asia-pacific-rebalance; and Shirley A. Kan, “Guam: U.S. Defense Deployments,” Congressional Research Service, November 26, 2014, 3. https://www.fas.org/sgp/crs/row/RS22570.pdf.

31. Eric Heginbotham et al., “The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power 1996-2017,” RAND Corporation, 2015, 78-79. http://www.rand.org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf.

32. Ibid, 64-65.

33. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 566.

34. Marcus Weisgerber, “Pentagon Debates Policy to Strengthen, Disperse Bases,” Defense News, April 13, 2014. http://archive.defensenews.com/article/20140413/DEFREG02/304130017/.

35. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, written testimony of Toshi Yoshihara, April 1, 2015; Marcus Weisgerber, “Pentagon Debates Policy to Strengthen, Disperse Bases,” Defense News, April 13, 2014. http://archive.defensenews.com/article/20140413/DEFREG02/304130017/; Andrew S. Erickson and Justin D. Mikolay, “Guam and American Security in the Pacific,” in Andrew S. Erickson and Carnes Lord, eds., Rebalancing U.S. Forces: Basing and Forward Presence in the Asia-Pacific, Naval Institute Press, 2014, 25, 31.

36. Shirley A. Kan, “Guam: U.S. Defense Deployments,” Congressional Research Service, November 26, 2014, 11. https://www.fas.org/sgp/crs/row/RS22570.pdf; David J. Berteau et al., “U.S. Force Posture Strategy in the Asia-Pacific Region: An Independent Assessment,” Center for Strategic and International Studies, August 2012, 19. http://csis.org/files/publication/120814_FINAL_PACOM_optimized.pdf.

37. Armando J. Heredia, “Analysis: New U.S.-Philippine Basing Deal Heavy on Air Power, Light on Naval Support,” USNI News, March 22, 2016. https://news.usni.org/2016/03/22/analysis-new-u-s-philippine-basing-deal-heavy-on-air-power-light-on-naval-support; Rob Taylor, “U.S. Air Force Seeks to Enlarge Australian Footprint,” Wall Street Journal, March 8, 2016. http://www.wsj.com/articles/u-s-air-force-seeks-to-enlarge-australian-footprint-1457431803; Manuel Mogato, “Philippines Offers Eight Bases to U.S. Under New Military Deal,” Reuters, January 13, 2016. http://www.reuters.com/article/us-philippines-usa-bases-idUSKCN0UR17K20160113.

38. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 566.

39. Andrew S. Erickson and Justin D. Mikolay, “Guam and American Security in the Pacific,” in Andrew S. Erickson and Carnes Lord, eds., Rebalancing U.S. Forces: Basing and Forward Presence in the Asia-Pacific, Naval Institute Press, 2014, 22.

40. Senate Armed Services Committee, Hearing on Worldwide Threats, statement for the record of Director of National Intelligence James R. Clapper, February 9, 2016, 7. http://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf; U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 370.

41. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 370.

42. Ibid, 566.

43. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Elbridge Colby, April 1, 2015; U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Robert Haddick, April 1, 2015.

44. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, written testimony of Evan Montgomery, April 1, 2015.

45. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Toshi Yoshihara, April 1, 2015; U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Evan Montgomery, April 1, 2015.

46. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Mark Stokes, April 1, 2015.

47. U.S.-China Economic and Security Review Commission, Chapter 2, Section 3, “China’s Offensive Missile Forces,” in 2015 Annual Report to Congress, November 2015, 368-369.

48. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Dennis Gormley, April 1, 2015.

49. U.S.-China Economic and Security Review Commission, Hearing on China’s Offensive Missile Forces, oral testimony of Robert Haddick, April 1, 2015.

Featured Image: USS Topeka at Polaris Point, Guam in 2012. (U.S. Navy)

The Strategic Support Force: China’s Information Warfare Service

This piece was originally published by the Jamestown Foundation. It is republished here with permission. Read it in its original form here.

By John Costello

Gao Jin (高津) is the PLASSF’s Commander. Note that he was promoted to major general in June 2006 and to lieutenant general occurred in July 2013. (Xinhua)

On December 31, 2015, Xi Jinping introduced the People’s Liberation Army Rocket Force (PLARF; 火箭军), Strategic Support Force (PLASSF; 战略支援部队), and Army Leadership Organ. The move came just within the Central Military Commission’s deadline to complete the bulk of reforms by the end of the year. Most media coverage has focused on the Rocket Force, whose reorganization amounts to a promotion of the PLA Second Artillery Force (PLASAF) to the status of a service on the same level of the PLA Army, Navy, and Air Force. However, by far the most interesting and unexpected development was the creation of the SSF.

According to official sources, the Strategic Support Force will form the core of China’s information warfare force, which is central to China’s “active defense” strategic concept. This is an evolution, not a departure from, China’s evolving military strategy. It is a culmination of years of technological advancement and institutional change. In the context of ongoing reforms, the creation of the SSF may be one of the most important changes yet. Consolidating and restructuring China’s information forces is a key measure to enable a number of other state goals of reform, including reducing the power of the army, implementing joint operations, and increasing emphasis on high-tech forces.

The Strategic Support Force in Chinese Media

Top Chinese leadership, including President Xi Jinping and Ministry of Defense spokesman Yang Yujun have not provided significant details about the operational characteristics of the SSF. Xi has described the SSF as a “new-type combat force to maintain national security and an important growth point of the PLA’s combat capabilities” (MOD, January 1).

On January 14, the SSF’s newly-appointed commander, Gao Jin (高津) said that the SSF will raise an information umbrella(信息伞) for the military and will act as an important factor in integrating military services and systems, noting that it will provide the entire military with accurate, effective, and reliable information support and strategic support assurance (准确高效可靠的信息支撑和战略支援保障) (CSSN, January 14). [1]

Senior Chinese military experts have been quick to comment on the SSF, and their interviews form some of the best and most authoritative insights into the role the new force will play in the Chinese military. For instance, on January 16th, the Global Times quoted Song Zhongping (宋忠平), a former PLASAF officer and a professor at the PLARF’s Equipment Research Academy, who described SSF as as a “fifth service” and, contrary to official reports, states it is not a “military branch” (兵种) but rather should be seen as an independent military service (军种) in its own right. [2] He continues by stating that it will be composed of three separate forces or force-types: space troops (天军), cyber troops (网军), and electronic warfare forces (电子战部队). The cyber force would be composed of “hackers focusing on attack and defense,” the space forces would “focus on reconnaissance and navigation satellites,” and the electronic warfare force would focus on “jamming and disrupting enemy radar and communications.” According to Song, this would allow the PLA to “meet the challenges of not only traditional warfare but also of new warfare centered on new technology” (Global Times, January 16).

By far the most authoritative description of the Strategic Support Force comes from People’s Liberation Army Navy (PLAN) Rear Admiral Yin Zhuo (尹卓). As a member of both the PLAN Expert Advisory Committee for Cybersecurity and Informatization (海军网络安全和信息化专家委员会) and the All-Military Cybersecurity and Informatization Expert Advisory Committee (全军网络安全和信息化专家委员会, MCIEAC) formed in May 2015, Yin is in the exact sort of position to have first-hand knowledge of the SSF, if not a direct role in its creation.

In an interview published by official media on January 5th, 2016, Yin stated that its main mission will be to enable battlefield operations by ensuring the military can “maintain local advantages in the aerospace, space, cyber, and electromagnetic battlefields.” Specifically, the SSF’s missions will include target tracking and reconnaissance, daily operation of satellite navigation, operating Beidou satellites, managing space-based reconnaissance assets, and attack and defense in the cyber and electromagnetic spaces” and will be “deciding factors in [the PLA’s] ability to attain victory in future wars” (China Military News, January 5).

Yin also foresees the SSF playing a greater role in protecting and defending civilian infrastructure than the PLA has in the past:

“[The SSF] will play an important role in China’s socialist construction. Additionally, China is facing a lot of hackers on the internet which are engaging in illegal activities, for example, conducting cyber attacks against government facilities, military facilities, and major civilian facilities. This requires that we protect them with appropriate defense. The SSF will play an important role in protecting the country’s financial security and the security of people’s daily lives” (China Military News, January 5).

Yang Yujun, MND spokesman, also suggested that civilian-military integration will form a portion of the SSF’s mission, but stopped short of clarifying whether this meant the force will have a heavy civilian component or will be involved in defending civilian infrastructure, or both (CNTV, January 2).

Yin noted that the SSF will embody the PLA’s vision of real joint operations. In Yin’s view, military operations cannot be divorced from “electronic space,” a conceptual fusion of the electromagnetic and cyber domains. The SSF will integrate “reconnaissance, early warning, communications, command, control, navigation, digitalized ocean, digitalized land, etc. and will provide strong support for joint operations for each military service branch.” Indeed, this view was also echoed by Shao Yongling (邵永灵), a PLARF Senior Colonel who is currently a professor at the PLA’s Command College in Wuhan. She suggested that the SSF was created to centralize each branch of the PLA’s combat support units, where previously each service had their own, resulting in “overlapping functions and repeat investment.” Consolidating these responsibilities in a central force would allow the military to “reduce redundancies, better integrate, and improve joint operational capabilities” (China Military News, January 5).

Taken together, these sources suggest that at its most basic, the SSF will comprise forces in the space, cyber, and electromagnetic domains. Specifically, sources indicate the SSF will most likely be responsible for all aspects of information in warfare, including intelligence, technical reconnaissance, cyber attack/defense, electronic warfare, and aspects of information technology and management.

Force Composition

Rear Admiral Yin’s comments in particular suggest that at a minimum the SSF will draw from forces previously under the General Staff Department’s (GSD) subordinate organs, to include portions of the First Department (1PLA, operations department), Second Department (2PLA, intelligence department), Third Department (3PLA, technical reconnaissance department), Fourth Department (4PLA, electronic countermeasure and radar department), and Informatization Department (communications).

The “Joint Staff Headquarters Department” (JSD) under the Central Military Commission will likely incorporate the 1PLA’s command and control, recruitment, planning, and administrative bureaus. Information support organs like the meteorology and hydrology bureau, survey and mapping bureau, and targeting bureau would move to the SSF.

The GSD’s intelligence department, the 2PLA will likely move to the SSF, although there is some question as to whether it will maintain all aspects of its clandestine intelligence mission, or this will be moved to a separate unit. The Aerospace Reconnaissance Bureau (ARB), responsible for the GSD’s overhead intelligence, surveillance, and reconnaissance mission will most likely form the center of the SSF’s space corps. The 2PLA’s second bureau, responsible for tactical reconnaissance, will also move to the SSF. This will include one of its primary missions: operating China’s long-range unmanned aerial vehicles (UAV).[3]

The SSF will unify China’s cyber mission by reducing the institutional barriers separating computer network attack, espionage, and defense, which have been “stove-piped” and developed as three separate disciplines within the PLA. The 3PLA’s technical reconnaissance and cyber espionage units will likely move, including the national network of infamous technical reconnaissance bureau’s (TRB), the most famous of which is Unit 61398. The 4PLA’s electronic countermeasures mission will likely form the core of a future electronic warfare force under the SSF, and the its secondary mission of computer network attack (CNA) will also likely also move under the SSF.

Finally, the entirety of the Informatization Department will likely move to the SSF. This will unify its mission, which has expanding over the years to include near all aspects of the support side of informatization, including communications, information management, network administration, computer network defense (CND), and satellite downlink.

Drawing the bulk of the SSF from former GSD organs and subordinate units is not only remarkably practical, but it is also mutually reinforcing with other reforms. Firstly, it reduces the power and influence of the Army by removing its most strategic capabilities. Previously the PLA Army was split into two echelons, its GSD-level headquarters departments (部门) and units (部队) and Military Region-level (MR; 军区) operational units. GSD units did not serve in combat or traditional operational roles, yet constituted some of China’s most advanced “new-type” capabilities: information management, space forces, cyber espionage, cyber-attack, advanced electronic warfare, and intelligence, reconnaissance, and surveillance. The creation of the Army Leadership Organ effectively split the Army along these lines, with lower-echelon forces forming the PLA Ground Forces and the higher-echelon units forming the Strategic Support Force.

Secondly, separating these capabilities into a separate SSF allows the PLA Army to concentrate on land defense and combat. Nearly all personnel staffing the supposedly joint-force GSD units were Army personnel and by-and-large these units were considered Army units, despite serving as the de facto joint strategic support units for the entire PLA military. Giving the SSF its own administrative organs and personnel allows the PLA Army to concentrate solely on the business of ground combat, land defense, and fulfilling its intended roles in the context of China’s national defense strategy.

Finally and most importantly, separating the second, third, fourth, and “fifth” departments—as the Informatization Department is sometimes called—into their own service branch allows them to be leveraged to a greater degree for Navy Air Force, and Rocket Force missions. More than anything, it allows them to focus on force-building and integrating these capabilities across each service-branch, thereby enabling a long-sought “joint-force” capable of winning wars.

In many ways, taking GSD-level departments, bureaus, and units and centralizing them into the Strategic Support Force is making official what has long been a reality. GSD-level components have nearly always operated independently from regional Group Army units. Separating them into a separate service is less of an institutional change and more of an administrative paper-shuffle.

Integrated Information Warfare

The Strategic Support Force will form the core of China’s information warfare force, which is central to China’s strategy of pre-emptive attack and asymmetric warfare. China’s new military reforms seek to synthesize military preparations into a “combined wartime and peacetime military footing.” These “strategic presets” seek to put China’s military into an advantageous position at the outset of war in order to launch a preemptive attack or quickly respond to aggression. [4] This allows China to offset its disadvantages in technology and equipment through preparation and planning, particularly against a high-tech opponent—generally a by-word for the United States in PLA strategic literature.

These presets require careful selection of targets so that a first salvo of hard-kill and soft-kill measures can completely cripple an enemy’s operational “system of systems,” or his ability to use information technology to conduct operations. Achieving this information dominance is necessary to achieve air and sea dominance, or the “three dominances.” [5] A PLA Textbook, The Science of Military Strategy, (SMS) specifically cites space, cyber, and electronic warfare means working together as strategic weapons to achieve these ends, to “paralyze enemy operational system of systems” and “sabotage enemy’s war command system of systems.” [6] This includes launching space and cyber-attacks against political, economic, and civilian targets as a deterrent. The Strategic Support Force will undoubtedly play a central role as the information warfare component of China’s warfare strategy, and will be the “tip of the spear” in its war-plans and strategic disposition.

Remaining Questions

Despite what can be culled and answered from official sources and expert commentary, significant questions remain regarding the structure of Strategic Support Force and the roles it will play. For one, it is unclear how the Strategic Support Force will incorporate civilian elements into its ranks. Mentioned in 2015’s DWP and the more recent reform guidelines, civilian-military integration is a priority, but Chinese official sources have stopped short in describing how these forces will be incorporated into military in the new order (MOD, May 26, 2015). Previously, the General Staff Department research institutes, known as the “GSD RI’s,” acted as epicenters of civilian technical talent for strategic military capabilities. If the Strategic Support Force is primarily composed of former GSD units, then these research institutes will be ready-made fusion-points for civilian-military integration, and may take on a greater role in both operations and acquisition. Even so, the civilian piece is likely to prove vital, as they will undoubtedly serve as the backbone of China’s cyber capability.

Secondly, it is unknown specifically what forces will compose the Strategic Support Force, or the full extent of its mission. When official sources say “new-type” forces, they could mean a wide range of different things, and the term can include special warfare, intelligence operations, cyber warfare, or space. At a minimum, a consensus has emerged that the force will incorporate space, cyber, and electronic warfare, but the full extent of what this means is unclear. It is also unknown, for instance, if the space mission will include space launch facilities, or whether those will remain under the CMC Equipment Development Department, a rechristened General Armament Department. Where psychological operations will fall in the new order is also up for debate. Some sources have said that it will be incorporated into the SSF while others have left it out entirely.

Finally, although it is clear that the SSF will act as a service, it remains unclear if the CMC will also treat it as an operational entity, or how the CMC will operationalize forces that are under its administrative purview. It is unlikely that the military theaters will have operational authority over strategic-level cyber units, electronic warfare units, or space assets. These capabilities will likely be commanded directly by the CMC. This logic flies in the face of the new system, which requires that services focus on force construction rather than operations and warfare. The solution may be that the SSF, as well as the PLARF, act as both services and “functional” commands for their respective missions.

Conclusion

Ultimately, the strategic support force needs to be understood in the broader context of the reforms responsible for its creation. On one hand, the reforms are practical, intending to usher China’s military forces into the modern era and transform them into a force capable of waging and winning “informatized local wars.” On the other hand, the reforms are politically motivated, intending to reassert party leadership to transform the PLA into a more reliable, effective political instrument.

The Strategic Support Force, if administered correctly, will help solve many of the PLA’s problems that have prevented it from effectively implementing joint operations and information warfare. The creation of an entire military service dedicated to information warfare reaffirms China’s focus on the importance of information in its strategic concepts, but it also reveals the Central Military Commission’s desire to assert more control over these forces as political instruments. With the CMC solidly at the helm, information warfare will likely be leveraged more strategically and will be seen in all aspects of PLA operations both in peace and in war. China is committing itself completely to information warfare, foreign nations should take note and act accordingly.

John Costello is Congressional Innovation Fellow for New American Foundation and a former Research Analyst at Defense Group Inc. He was a member of the U.S. Navy and a DOD Analyst. He specializes in information warfare, electronic warfare and non-kinetic counter-space issues.

Notes

1. A Chinese-media report on Gao Jin’s military service assignments can be found at <http://news.sina.com.cn/c/sz/2016-01-01/doc-ifxneept3519173.shtml>. Gao Jin’s role as commander of the SSF is noteworthy in two respects: One, he is a career Second Artillery officer, so his new role muddies the waters a bit in understanding whether the SSF will be a force composed of Army personnel but treated administratively separate from the Army—not unlike the former PLASAF-PLA Army relationship—or will be composed of personnel from various services and treated administratively separate from all forces. Secondly and more important to this discussion, before his new post as SSF commander, Gao Jin was head of the highly-influential Academy of Military Sciences (AMS) which besides being the PLA’s de facto think-tank (along with the National Defense University), is responsible for putting out the Science of Strategy, a wide-reaching consensus document that both captures and guides PLA strategic thinking at the national level. The most recent edition published in 2013 was released under his tenure as commandant of AMS and many of the ideas from that edition have found their way into the 2015 defense white paper, December’s guide on military reforms, and many of the changes made to China’s national defense establishment. His new role could be seen as CMC-endorsement of SMS’s views on China’s strategic thought.

2. Song’s description of the SSF contradicts official-media descriptions of the service, which had suggested that the service will occupy a similar echelon to that of the PLASAF before it was promoted to full military service status equal to the other branches.

3. Ian M. Easton and L.C. Russell Hsiao, “The Chinese People’s Liberation Army’s Unmanned Aerial Vehicle Project: Organizational Capacities and Operational Capabilities,” 2049 Institute, March 11, 2013. p. 14.

4. The Science of Military Strategy [战略学], 3rd ed., Beijing: Military Science Press, 2013. p. 320.

5. Ibid. p. 165.

6. Ibid. p. 164.

Featured Image: Soldiers of the Chinese People’s Liberation Army 1st Amphibious Mechanized Infantry Division prepare to provide Chairman of the Joint Chiefs of Staff Adm. Mike Mullen with a demonstration of their capablities during a visit to the unit in China on July 12, 2011. (DoD photo by Mass Communication Specialist 1st Class Chad J. McNeeley/Released)

Distributed Lethality Task Force Launches CIMSEC Topic Week

Week Dates: Aug. 29-Sep. 2, 2016
Articles Due: Aug. 26, 2016
Article Length: 800-1800 Words (with flexibility)
Submit to: [email protected]

By William Burke

We want to hear your ideas! This call for articles solicits input on the topic of Distributed Lethality to help shape the future of Surface Force initiatives. 

Distributed Lethality is the condition gained by increasing the offensive power and defensive hardening of individual components of the surface force and then employing them in dispersed, offensive formations across a wide expanse of geography. Distributed Lethality leverages tactics, tools, talent, and training to enhance surface combat capability and promote the Navy’s principal role of controlling the sea in order to project national power through the core operational lines of effort of Deceive, Target and Destroy.

The most recent CIMSEC call for articles on Distributed Lethality yielded 12 submissions that formed a robust topic week in February, 2016. Moving forward, the Distributed Lethality Task Force (DLTF) continues its efforts to place a renewed emphasis on sea control. To support this journey, CIMSEC will hold a Distributed Lethality topic week during the week of 29 August through 2 September. Just as before, this series is intended to elicit innovative ideas to enhance the depth of understanding of the role of Distributed Lethality as both an operating concept and organizing principle in support of the Navy’s core missions.

The theme for this upcoming topic week is applying the Distributed Lethality concept to operational roles. Therefore, questions germane to the direction Distributed Lethality is headed and subjects that merit more thoughtful written discussion include: How are lines of effort in the Surface Navy aligned with fleet-wide initiatives and Combatant Commander needs? How can we effectively and innovatively deploy Surface Action Groups (SAG)? What platforms can compose an Adaptive Force Package and what missions could be performed?How can individual ships employ Distributed Lethality tactics while operating independently? How can assets other than surface ships be integrated into the Distributed Lethality construct? How could an “up-gunned” Expeditionary Strike Group be equipped and employed for distributed operations? How can we provide our ships accurate and timely targeting data? What weapon modernizations, combat systems initiatives, and future technology could improve Distributed Lethality? How can we operate distributed and agile logistics during conflict? How can we achieve assured command and control? What electromagnetic maneuver warfare enhancements can surface ships implement? How does cyber warfare fit into the Distributed Lethality construct?  

Submissions can be written on the above issues or may expand on other lines of inquiry relevant to Distributed Lethality. Submissions should be between 800 and 1800 words in length (with flexibility) and submitted no later than August 26 to the CIMSEC editorial team at [email protected].

Editor’s Note: This topic week has since concluded and writings submitted in response to this call for articles may be viewed here

William Burke is a Surface Warfare Officer in the United States Navy currently assigned to Commander, Naval Surface Forces Distributed Lethality Task Force.

Featured Image: The guided missile destroyer USS Curtis Wilbur (DDG 54) fires a RIM-66 Standard missile March 23, 2014, during a missile firing exercise as part of Multi-Sail 2014 in the Pacific Ocean near Guam. (FC2 Kristopher G. Horton, U.S. Navy)