Category Archives: Asia-Pacific

Analysis relating to USPACOM.

India’s Role in the Asia-Pacific Topic Week Kicks off on CIMSEC

By Dmitry Filipoff

This week CIMSEC is running a topic week on India’s Role in the Asia-Pacific. Authors responded to our Call for Articles with publications featuring in-depth analysis on Indian strategic thinking, Chinese and Indian counterbalancing power plays, and factors driving India’s rise as a regional titan. We thank our contributors for their quality contributions.

Below is a list of articles featuring during the topic week. It will be updated as the topic week rolls out and as additional publications are finalized.

India as the Pivotal Power of the 21st Century Security Order by MAJ Chad Pillai
How The Indian Ocean Remains Central to India’s Emerging Aspirations by Vidya Sagar Reddy
India-China Competition Across the Indo-Pacific by David Scott
Sino-India Strategic Rivalry: Misperception or Reality by Ching Chang
Diluting the Concentration of Regional Power Players in Maldives by MAJ Ahmed Mujuthaba
Strategic Maritime Balancing in Sino-Indian Foreign Policy by Ryan Kuhns
India in the Asia-Pacific: Roles as a ‘Balancer’ and Net Security Provider by Ajaya Kumar Das
Modi’s Asia-Pacific Push by Vivek Mishra
Understanding Sino-Indian Relations – A Theoretical Perspective by Byron Chong
India as a Net Security-Provider in the Indian Ocean and Beyond by VADM Pradeep Chauhan (ret)

Dmitry Filipoff is CIMSEC’s Director of Online Content. Reach the CIMSEC editorial team at Nextwar@cimsec.org.

Model Maritime Militia: Tanmen’s Leading Role in the April 2012 Scarborough Shoal Incident

By Conor M. Kennedy and Andrew S. Erickson

This series on the leading maritime militias of Hainan Province began by examining the “rights protection” efforts of Sanya City’s maritime militia, whose exploits have given them a prominent position among the province’s irregular sea forces. Discussions about the Sanya City maritime militia are still ongoing as we watch their development. Next came our evaluation of the historical legacy of Danzhou’s maritime militia, which directly demonstrated the value of irregular forces in naval warfare during the 1974 Paracels Sea Battle. This third installment in the series is part one of a two-part in-depth look at the maritime militia of Tanmen.

Tanmen Fishing Harbor is a small fishing port on the eastern shore of Hainan Island. It is home to one of China’s best-known maritime militia units, the Tanmen Maritime Militia Company (潭门海上民兵连). This irregular force receives disproportionate media coverage stemming largely from its involvement in numerous incidents with foreign actors at sea, most notably the April 2012 Scarborough Shoal Incident between the People’s Republic of China (PRC) and the Philippines. Since its founding in 1985, Tanmen has received numerous accolades as an “advanced militia unit” from the government and military on all levels. Tanmen’s fame spread further after Chinese President Xi Jinping’s high-profile visit on the first anniversary of the incident. Xi encouraged Tanmen’s maritime militia to build larger vessels, collect information in distant waters, master modern equipment, and support “island and reef” development. The extent of Chinese attention to this fishing village merits a deep-dive analysis to determine what is happening on the ground there, and what kind of maritime militia capabilities are resulting.

Some of Tanmen’s importance to the PRC stems from the wealth of historical artifacts and other evidence China possesses that allegedly support claims that Tanmen fishermen were the earliest community to discover and sustain continuous exploitation of the Paracel and Spratly Islands. Numerous reports of Tanmen fishermen having been detained or attacked by foreign states also support a growing Chinese narrative of the victimization of Chinese fishermen in the South China Sea. This narrative justifies enhanced ‘defensive’ activities by Chinese maritime forces operating there. Contributions from fishing communities such as Tanmen’s to China’s overall posture in the South China Sea bolsters domestic Chinese rationale for regaining lost “blue territory” (蓝色国土) and “maritime rights and interests” (海洋权益). Tanmen Village is likewise the future site of China’s South China Sea Museum and the South China Sea Base for the State Administration of Cultural Heritage’s Undersea Cultural Heritage Protection Center. Both institutions will likely be dedicated to bolstering China’s historical evidence to support its claims of sovereignty over the islands of the South China Sea and resource rights in those waters. The latter also has a stated purpose of “promoting maritime industries, shoreline protection and development, utilization and conservation of marine resources, marine service systems, and the implementation of the overall national marine economic development strategy.”  

Central to furthering these interests are irregular units including the Tanmen Maritime Militia Company. Its history exhibit, located in its headquarters, houses artifacts documenting historical presence in the South China Sea by the forefathers of present-day militia members. These include navigation logs, compasses, and diving gear. Tanmen’s maritime militia activities began well before the present company’s official establishment in 1985. Previously a more loosely-organized fishermen militia, it became an official militia company when the PRC promulgated new guidelines for developing fisheries in distant waters and opened up the oceanic fishing industry to privatization. A contingent from this new organization was led initially by its first commander, Huang Xunmian, to the Spratlys, thereby becoming the first organized Tanmen fleet for Spratly development. Huang became a major part of the militia movement to mobilize Tanmen fishermen to build bigger vessels and venture to the Spratlys. By the early 1990s, the company included 150 militiamen and 21 vessels. Today it continues to expand under the current political agenda of transforming China into a “maritime power.”

Chinese media coverage of Tanmen fishermen often states that a large portion of incidents in the South China Sea between Chinese fishermen and foreign states is attributable to the Tanmen fishermen and maritime militia, whose members resolutely oppose “foreign encroachment.” The deputy station chief of the Qionghai City Fisheries Management Station told reporters in 2012 that 90% of the Chinese fishing vessels visiting the Paracels and Spratlys are from Tanmen Harbor, the remainder from Sanya City (also in Hainan Province) or Guangdong Province. While that particular claim is difficult to verify, the number of tense encounters between Tanmen fishermen and militia and the maritime forces of other South China Sea states—particularly the Philippines—certainly helps illustrate the point. Below is a brief, non-exhaustive list of events within the past three decades involving Tanmen fishing vessels, documenting their constant presence and activities in disputed waters and the resulting encounters, and periodic altercations, with other claimant states’ maritime forces. Of note, the incidents listed are as reported in the Chinese press.  Instances of provocations by Tanmen fishermen or Chinese law enforcement vessels are therefore not included.

Timeline: Incidents and Other Events involving Tanmen Fishermen/Maritime Militia

Based on accumulated reports on Tanmen fishing vessels, the below list is by no means complete. Chinese media often reports that hundreds of incidents have occurred.

1985, August – First Tanmen maritime militia trip to Spratlys

After the founding of the militia company in August 1985 and the relaxing of China’s fisheries policies, company leader Huang Xunmian (黄循绵) led a group of 100 fishermen on five fishing vessels on their first trip to the Spratlys.

1989, 13 April – Near Philippine-occupied Thitu Island (中业岛):

Fishing vessel Qionghai 00224 and three fishermen—Huang Changbiao (黄昌标), Yu Yeyou (郁业友), and Yu Yexuan (郁业轩)—are arrested by Philippine authorities.

1989-95 – Chinese-occupied Spratly features:

A number of Tanmen maritime militia work in coordination with the PLA over the years on multiple-month trips to erect the first generation of structures on Chinese-occupied Spratly features. These included stilted shacks, sovereignty markers, piers, and helipads.

1993  Somewhere in the Spratlys:

Qionghai 00417 is attacked by non-uniformed armed men, resulting in the deaths of four Tanmen fishermen. Tanmen fisherman Hu Xingliang (胡兴良) reported that they were speaking Tagalog, the language of the Phillipines.

1995, 25 March – Mischief Reef (美济礁):

Four of the Tanmen Maritime Militia Company’s fishing vessels with 62 fishermen aboard, working near Mischief Reef, are arrested by Philippine authorities. Platoon leader Wang Qiongfa (王琼法) and four other militia members maintain group solidarity despite strong Philippine attempts to coerce confessions from the Chinese fishermen to violating Philippine waters.

1998, 11 January – Scarborough Shoal (黄岩岛):

Tanmen Maritime Militia squad leader Chen Zebo (陈则波), captain of Qionghai 00372, and Tanmen fishing vessel Qionghai 00473 and its captain Chen Yiping (陈奕平) (altogether 22 fishermen) are arrested by the Philippine Navy for poaching, sent to Subic Bay Coast Guard Station, and held there for 5-6 months.

1998, March – Scarborough Shoal:

Trawlers Zhongyuanyu (中远渔) 313 and 311, and their ~29 fishermen, are detained by a Philippine naval patrol for possession of explosives and endangered coral.

1999 May – Scarborough Shoal:

Chen Zebo’s ship is rammed and sunk by the Philippine Navy, sending 11 crewmembers into the water. Chen and two others are picked up and sent to jail, subsequently released in July.

2000, 26 May – Off the coast of Palawan:

Tanmen fishing vessel Qionghai 01068 encounters a Philippine Coast Guard Vessel. Philippine Coast Guard fires on Qionghai 01068, killing captain Fu Gongwu (符功武); and detains the rest of the crew.

2001 – Near Thitu Island:

Captain Feng Xinyi (冯信义) and three other fishermen aboard Qionghai 00389 are arrested by Philippine authorities.

2002 – Scarborough Shoal:

Qionghai 09016’s owner Lu Haichuan (卢海川) and the 22 fishermen aboard were arrested by Philippine authorities and jailed for 8 months in Palawan.

2006, April – South Shoal (南方浅滩):

Chen Zebo’s nephew Chen Yichao (陈奕超) was on Qionghai 03012 in the Spratlys at South Shoal when on 26 April 2006 an armed vessel of unknown origin attacked and killed four fishermen and injured 3 more.

2007, August – Second Thomas Shoal (仁爱礁):

Qionghai 01039, operated by Mo Taifu (莫太福), was pursued and fired upon by Philippine authorities.

2007, September – Somewhere in the Spratlys:

Qionghai 01038, owned by Mo Taifu, was intercepted and inspected by Malaysian authorities.

2012, 10 April – Scarborough Shoal Standoff:

12 Tanmen fishing boats at Scarborough Shoal encounter Philippine Naval Vessel Gregorio Del Pilar. Six fishing vessels were outside the lagoon at the time, including that of Tanmen Maritime Militia Company Deputy Commander Wang Shumao (王书茂), who led an unsuccessful effort to block Philippine fishing vessels from approaching the shoal.

The other six fishing vessels present inside the lagoon, two of which are confirmed maritime militia vessels, were trapped when Philippine forces blocked the lagoon’s opening. These boats were subsequently boarded by Philippine troops:

  • Qionghai 03026 – One of two boats present under the direct command of Tanmen Militia Squad Leader Chen Zebo. Returned to Scarborough Shoal after initial standoff.
  • Qionghai 09099 – Under direct command of Tanmen Militia Squad Leader Xu Detan (许德谭). Returned to Scarborough Shoal after initial standoff.
  • Qionghai 02096 – Owned by Yu Ning (郁宁), Captain is Li Chengduan (李成端), Yu reported the incident to the Tanmen Border Defense Station.
  • Qionghai 03065 – Owned by Zhao Xuxian (赵绪贤); Zhao Shisong (赵市松) is captain. Returned to Scarborough Shoal after initial standoff.
  • Qionghai 05668 – A 300-ton vessel owned by Fu Mingyan (符名燕), its captain is Li Qiongmei (李琼美). Ship had 16 crewmen, 12 conducting underwater clam harvest. Returned to Scarborough Shoal after initial standoff. Qionghai 03889 – Captain is Chen Yiping (陈奕平), (also detained in 1998). Returned to Scarborough Shoal after initial standoff.

2012, May – Triton Island (中建岛):

Possible maritime militia vessel Qionghai 02067 is hired to carry “official” engineering surveyors and stone boundary markers to Triton Island. Media coverage states that crew members were skittish during the Chinese journalist’s inquiry.

2014 Spring – Half-Moon Shoal (半月礁):

Chen Zebo’s older brother Chen Zelong (陈则龙) encounters Philippine authorities.

2014, 6 May – Half-moon Shoal:

Two Tanmen fishing vessels are caught by Philippine personnel poaching endangered turtles near Half Moon Shoal on 6 May 2014. One of the fishing vessels, Qionghai 03168, escaped; Qionghai 09063 and 11 fishermen are detained by Philippine coast guardsmen reportedly disguised as fishermen. Orders were sent via the Beidou system to fishing vessels Qionghai 03168 and Qionghai 05067 to return to the area of last contact to conduct a search. China Coast Guard vessel 3102 was also recalled from its task of blockading Second Thomas Shoal to assist with the search.

While numerous open sources confirm the Tanmen Maritime Militia clearly exists and operates in the South China Sea, it is sometimes difficult to ascertain which of Tanmen’s fishing vessels are part of the militia and which are not. One incident on 25 May 2000, wherein a Tanmen fishing boat captain was shot and killed, yielded contradictory Chinese and Filipino narratives. Tanmen fishing vessel Qionghai 01068 was operating off the coast of Palawan when it encountered a Philippine Coast Guard Vessel. Chinese news coverage portrays Philippine thugs firing upon hapless Tanmen fishermen who drifted into Philippine waters after suffering engine failure. Philippine sources, however, assert that the Chinese fishermen were poaching inside Philippine waters (reported coordinates here) and catching endangered turtle species, an activity for which Tanmen fishermen are well-known. The fishing boat fled as the Philippine Coast Guard vessel approached. When the coast guard vessel fired warning shots to halt them, the fishermen reportedly fired back, sparking a firefight. With the captain dead at the helm, Qionghai 01068 came to a stop. Philippine police suspect the fishermen tossed their weapons into the water before the coast guard boarded. Previously-documented activities by the maritime militia in Tanmen and other areas of Hainan Province suggests that Chinese reports tend to omit important details to present an image of defensive victimization. Such discrepancies make it difficult for observers to separate truth from fiction as each claimant pursues its own interests in making its statements. This article’s scope primarily covers Chinese source materials on Tanmen Township (潭门镇)’s maritime militia; contradicting reports from other South China Sea claimant states merit further comparative research.

Ambiguity surrounding the identity of fishermen-based militia is a veil of protection often exploited by the PRC as it advances its maritime claims in the South China Sea. Even with proof of a boat’s connection to the militia, that force’s part-time nature means that most of the time personnel are non-uniformed and engaged in economic production. Nevertheless, domestic Chinese-language sources sometimes reveal the true identity of the maritime militia, clarifying a fishing vessel’s background. However, as the 10 April 2012 Scarborough Shoal incident makes clear, even when Tanmen fishing vessels may be operating for private gain, they can be quickly transformed into instruments of state policy when the situation calls for it.

The Scarborough Shoal event was the Tanmen militia’s most notable recent encounter and was likely the impetus behind President Xi Jinping’s widely reported visit to the unit. As outlined in the timeline above, twelve Tanmen fishing boats were operating at Scarborough Shoal, six inside the lagoon. The six were boarded by sailors from Philippine Navy vessel BRP Gregorio Del Pilar, who inspected their catches and took photographs. It also appears that Philippine forces’ protocol upon boarding a Chinese fishing vessel is to shut off the vessel’s communications equipment, including the Beidou satellite navigation terminal, as they did upon boarding Qionghai 09063 on 6 May 2014. Chinese Maritime Law Enforcement (MLE) forces have difficulty interfering in Philippine inspections and arrests of fishermen if they cannot use the Beidou’s transmitter to locate the boarded vessel. Fortunately for Tanmen’s fishermen caught in the Scarborough Shoal lagoon, before Philippine sailors could stop him, Yu Ning (郁宁), owner of Qionghai 02096, was able to transmit several short messages to the phone of Fu Shibao (符史宝), the attendant at the Tanmen Village Border Defense Control Station’s command office. He did so by using the Beidou message transmission service, which can send messages directly to Fu’s phone. Upon receiving the messages “Philippine naval vessel No. 15 inbound,” Fu and his superior verified the reported vessel as the BRP Gregorio Del Pilar. Yu’s final message, “They are boarding,” prompted Fu to rapidly elevate the report to MLE authorities. China Maritime Surveillance ships CMS 75 and CMS 84 were dispatched to the shoal to intervene, arriving that afternoon. China Fisheries Law Enforcement ship YZ 303 left its mission at Mischief Reef to go full steam to Scarborough Shoal, arriving on 11 April. Fisheries cutter YZ 310 also left Guangzhou harbor on 18 April to arrive at Scarborough Shoal on the 20th

A report on the Qionghai City Government website features a profile of the Tanmen Maritime Militia Company Deputy Commander Wang Shumao (王书茂). It contains a description of his actions to support the 2012 Scarborough Shoal Incident. It appears that he was in command of the twelve Tanmen fishing vessels present during the incident, as he led an effort outside of the shoal to block any Philippine fishing vessels from entering the area. The article states that those Philippine fishing vessels were attempting to cross China’s “sea area defense line” (海域防护线), and that other Chinese fishing vessels in the area stopped fishing and joined in the rights protection force. The struggle continued until the 14th, when the remaining fishing vessels left the lagoon under escort by the law enforcement vessels. Some of the fishing vessels returned to Tanmen Harbor, while others continued on to operate in the Paracels.

However, just days after leaving the shoal, some of the Tanmen fishing vessels received notice from the Tanmen Fisheries Law Enforcement Department that it was again safe to operate at Scarborough Shoal. Having sustained economic losses from the incident, several of the Tanmen fishing vessels that had left quickly made the 500-mile journey to fish again at the shoal. This includes Qionghai 09099 and Qionghai 03026, whose captains are maritime militia squad leaders. That the identities of the fishermen are confirmed as maritime militia squad leaders who had been present inside the lagoon during the Scarborough Shoal Standoff and the militia company’s deputy commander operating outside the lagoon suggests that the Tanmen fishing vessels present at the shoal at some point became state-sponsored forces for China’s rights protection action at Scarborough Shoal. Additionally, under orders from shore command, Fisheries Law Enforcement vessel YZ 310 shared its own fuel with the fishing vessels for the stated purpose of maintaining their presence at Scarborough Shoal. By 25 April, eight Tanmen fishing vessels had returned to Scarborough Shoal. It is unclear whether the other vessels that returned, such as Qionghai 03065 and Qionghai 05668, are members of the Tanmen Maritime Militia. Balancing profitability and risk are normal considerations for regular fishermen. However, the tense incident at Scarborough Shoal, and the fact that these same fishermen were boarded days earlier at that shoal by armed commandos from the flagship of the Philippine Navy, renders unlikely the proposition of the Tanmen fishermen returning to the shoal out of concerns for economic profit.

11 April 2012: Fishing vessel Qionghai 09099, a confirmed maritime militia vessel operated by squad leader Xu Detan (center-front) and present at the Scarborough Shoal Standoff, is shown here detained by Philippine authorities for poaching giant clams.
11 April 2012: Fishing vessel Qionghai 09099, a confirmed maritime militia vessel operated by squad leader Xu Detan (center-front) and present at the Scarborough Shoal Standoff, is shown here detained by Philippine authorities for poaching giant clams.

One report from the Qionghai City Development Research Association covered an event held to commemorate the Tanmen fishermen’s contribution to “rights protection” at Scarborough Shoal. In attendance were Qionghai City’s officials and ten “fishermen representatives.” The report states that after the standoff began at Scarborough Shoal, Tanmen Township dispatched 25 fishing vessels in four groups to the shoal in response to a request from “higher national authorities.” Coverage of the event cited their bravery and obedience to commands while executing their mission to fish at Scarborough Shoal during the incident. Qionghai City officials then awarded the ten representatives with “consolation money” (慰问金), presumably meant to reimburse them for the costs of conducting their rights protection mission. It is thus clear that Tanmen fishermen were mobilized, possibly by central government authorities, to support China’s rights protection action at Scarborough Shoal.

23
23 August 2012: Qionghai City leaders hold an award ceremony for “fishermen representatives” who participated in the rights protection action at Scarborough Shoal. Banner reads “Consolation Forum by Qionghai City Government for Fishermen that went to Huangyan Dao (Scarborough Shoal) for Rights Protection.” Tanmen “fishermen representatives” received “consolation money” for executing the missions assigned to them during the Scarborough Shoal Incident in April 2012.

Political Pilgrimage Begins…

The successful role of the Tanmen Militia in the Scarborough Shoal Incident resulted in visits by numerous delegations to Tanmen, where militia representatives urged others to emulate their example or to learn from their experiences. Some of this attention advances local economic development, but a greater focus is in the stated objective of protecting China’s sovereign rights and supporting “island” construction in the South China Sea. Although some visits predated Xi Jinping’s, it was his visit in 2013 that put Tanmen’s irregular sea forces on the national map.  

Xi Jinping’s visit to the Tanmen Maritime Militia Company was a symbolic gesture that catalyzed growth in maritime militia work nationwide. In the fashion of many Chinese political-economic endeavors, a model unit and locality were selected for all others to learn from and to emulate. The only thing needed was Xi’s stamp of approval to make it official.

Hainan Provincial Party Secretary Luo Baoming and Deputy Party Secretary Li Xiansheng helped lay the foundation for Hainan’s maritime militia construction. Luo visited Tanmen Township on 6 December 2012 and Li on 8 March 2013. Luo spoke with the community about the content of decisions by the CPC’s Eighteenth National Congress, explaining how China’s goals to develop marine resources, protect maritime sovereignty, and become a maritime power were good news for Tanmen’s development. The visits also likely helped prepare townspeople for the political movement about to unfold around them.

Militia 3
10 April 2013: Chinese President Xi Jinping made a special trip to Tanmen fishing harbor during his tour of Hainan Province. This photo shows him inspecting the Tanmen maritime militia. Behind Xi is Hainan Province Deputy Secretary Li Xiansheng, head of the Hainan leading small group tasked with overseeing construction of maritime militia forces, vessels, equipment, infrastructure, and training.

In the aftermath of Xi’s visit, numerous delegations from other areas of the province made trips to Tanmen’s fishing harbor to learn from the “model work unit.” Most delegations held their ceremonial meetings aboard the same maritime militia vessel that Xi boarded, Qionghai 09045. The vessel’s captain, Platoon Leader Lu Chuan’an, appears to have assumed the role of maritime militia representative for the delegations. Below is a selective sampling of the delegations that visited Tanmen Township, ranging from Hainan’s local counties to national-level agencies:

  • 10 October 2012 – Delegation led by Guangzhou Military Region Deputy Chief of Staff.
  • 19 April 2013 – Delegation led by Party Secretary of Wanning City, Hainan Province.
  • 11 July 2013 – Delegation led by head of Hainan Province’s Political and Legal Affairs Commission.
  • 14 October 2013 – Representatives from Baoting County, Hainan Province.
  • 1 November 2013 – Delegation led by Party Secretary of Dongfang City, Hainan Province.
  • 15 November 2013 – Delegation led by Sansha City Mayor Xiao Jie. China’s newest city, built on Woody Island in the Paracels, this prefectural-level polity administers all PRC-occupied South China features ex-Hainan.
  • 25 March 2014 – Delegation from Ministry of Human Resources and Social Security.
  • 23 September 2014 – National People’s Congress Special Research Group led by Former Guangzhou Military Region Deputy Commander Lu Dingwen.
  • 17 October 2014 – Research group from Foreign Affairs Committee of the Chinese People’s Political Consultative Conference.
  • 26 March 2015 – Hainan Governor Liu Cigui; former director, State Oceanic Administration.
  • 16 April 2015 – Hainan Province, Lin Gao County Committee visit.
  • 3 August 2015 – Supervisory group from the National Ministry of Civil Affair’s Double-Support Office, dedicated to the PLA and governments’ mutual efforts to support each other, visits Tanmen and holds a conference in Qionghai.

Most news coverage of these visits showcases the Tanmen Maritime Militia Company as the “first stop.” Many photos in reports of the visit show delegation members visiting the maritime militia headquarters command’s sand table depicting South China Sea geomorphology with markers representing numerous features.

On 23 September 2014, for instance, former Guangzhou Military Region Deputy Commander Lü Dingwen (吕丁文) led a National People’s Congress Special Research Group to survey the Tanmen Maritime Militia Company. With the provincial deputy commander and Qionghai City officials in tow, the delegation followed the usual itinerary for all delegation visits to the Tanmen Maritime Militia. Afterward, it held a conference attended by Qionghai City and Tanmen Township officials, including officials from the City Oceanic and Fisheries Bureau, People’s Armed Forces Department, and fishermen and militia representatives. They discussed issues involving Tanmen fishermen’s income, fuel subsidies, medical insurance, and policy support. The Special Research Group then drafted a feasibility proposal and report for submission to their superiors in Beijing. It appears that Xi’s stamp of approval on Tanmen in particular, and the maritime militia generally, is resulting in research and possible future legislation efforts by the National People’s Congress. 

1
23 September 2014: Former Guangzhou Military Region Deputy Commander Lü Dingwen inspecting the pilot house on one of the Tanmen Maritime Militia vessels.

The period after Xi’s visit saw Qionghai City and Tanmen Township transformed into a hotbed for new discussions on what role the militia should play in China’s effort to become a maritime power. In early 2014 Qionghai City hosted a symposium titled “Maritime Mobilization – 1312” held by the National Defense Mobilization Committee. Representatives from the province’s cities and counties came to discuss maritime militia construction, while units from other areas came to Tanmen Harbor for exercises.

With Xi’s having given the Tanmen Militia his stamp of approval as the model unit to emulate, previously influential but obscure grassroots-level figures, such as Deputy Commander Wang, Platoon Leader Lu Chuan’an, and Squad Leader Chen Zebo, will now feature prominently as exemplars in maritime militia work. Chen Zebo, in particular, has become famous for his aforementioned bravery against Philippine encroachments. He was first detained by Philippine authorities in 1998 when he was fishing at Scarborough Shoal, and reportedly held at Subic Bay for around 6 months. A year later his vessel was rammed and sunk by the Philippine navy, again at Scarborough Shoal. More than a decade later he became famous after he stood up to the Philippine authorities who boarded his boat at the start of the 2012 incident. Today, numerous Chinese news articles extol the Tanmen fishermen’s heroism, often profiling Chen Zebo as the archetype of the Tanmen Militia’s success.

This first part of the Tanmen Maritime Militia portion of our series examined the accumulated incidents and events that eventually put the Tanmen Militia on the radar of Chinese leaders, and its subsequent anointing as a model unit. The next installment in this continuing series on the leading irregular sea forces of Hainan Province (Tanmen Militia deep-dive, part two) will detail how the success of this company continued with its deployment to defend the HYSY 981 drilling rig in contested waters near Triton Island in the Paracels. It will also discuss the Tanmen Militia’s force structure, regulatory tensions, and the militia’s involvement in “island” building in the Spratlys.

Dr. Andrew S. Erickson is a Professor of Strategy in, and a core founding member of, the U.S. Naval War College’s China Maritime Studies Institute. He serves on the Naval War College Review’s Editorial Board. He is an Associate in Research at Harvard University’s John King Fairbank Center for Chinese Studies and an expert contributor to the Wall Street Journal’s China Real Time Report. In 2013, while deployed in the Pacific as a Regional Security Education Program scholar aboard USS Nimitz, he delivered twenty-five hours of presentations. Erickson is the author of Chinese Anti-Ship Ballistic Missile Development (Jamestown Foundation, 2013). He received his Ph.D. from Princeton University. Erickson blogs at www.andrewerickson.com and www.chinasignpost.com. The views expressed here are Erickson’s alone and do not represent the policies or estimates of the U.S. Navy or any other organization of the U.S. government.

Conor Kennedy is a research assistant in the China Maritime Studies Institute at the US Naval War College in Newport, Rhode Island. He received his MA at the Johns Hopkins University – Nanjing University Center for Chinese and American Studies.

Featured Image: Tanmen fishing vessel receiving supplies and fuel from YZ 310 during the Scarborough Shoal Incident. Source: NDD Daily.

A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power

The following is a two-part series on how the U.S. might better utilize cyberspace and information operations as a Third Offset. Part I will evaluate current offset proposals and explores the strategic context. Part II will provide specific cyber/IO operations and lines of effort.

By Jake Bebber 

“It is better by noble boldness to run the risk of being subject to half of the evils we anticipate than to remain in cowardly listlessness for fear of what might happen.”

-Herodotus, The Histories

Introduction

In 2014, then Secretary of Defense Hagel established the Defense Innovation Initiative, better known as the Third Offset, which is charged with recommending ways to sustain American military superiority in the face of growing capabilities fielded by powers such as Russia and China.[i] The purpose of the Third Offset is to “pursue innovative ways to sustain and advance our military superiority” and to “find new and creative ways to sustain, and in some cases expand, our advantages even as we deal with more limited resources.” He pointed to recent historical challenges posed by the Soviets in the 1970’s which led to the development of “networked precision strike, stealth and surveillance for conventional forces.” Centrally-controlled, inefficient Soviet industries could not match the U.S. technological advantage, and their efforts to do so weakened the Soviet economy, contributing to its collapse.

Today, China represents the most significant long-term threat to America and will be the focus here. A number of leading organizations, both within and outside government, have put forward recommendations for a Third Offset. However, these strategies have sought to maintain or widen perceived U.S. advantages in military capabilities rather than target China’s critical vulnerabilities. More importantly, these strategies are predicated on merely affecting China’s decision calculus on whether to use force to achieve its strategic aims – i.e., centered around avoiding war between the U.S. and China. This misunderstands China’s approach and strategy. China seeks to win without fighting, so the real danger is not that America will find itself in a war with China, but that America will find itself the loser without a shot being fired. This paper proposes a Cyberspace-IO Offset strategy directly attacking China’s critical vulnerability: its domestic information control system. By challenging and ultimately holding at risk China’s information control infrastructure, the U.S. can effectively offset China’s advantages and preserve America’s status as the regional security guarantor in Asia.

All effective strategies target the adversary’s center of gravity (COG), or basis of power. “Offset strategies” are those options that are especially efficient because they target an adversary’s critical vulnerabilities, while building on U.S. strengths, to “offset” the opponent’s advantages. Ideally, such strategies are difficult for an adversary to counter because they are constrained by their political system and economy. Today, China’s COG is the Chinese Communist Party (CCP). The stability of this system depends greatly on the ability of the Chinese regime to control information both within China, and between China and the outside. Without this control, opposition groups, minority groups, and factions within the CCP itself could organize more effectively and would have greater situational awareness for taking action. Thus, information control is potentially a critical Chinese vulnerability. If the United States can target the ability of the Chinese regime to control information, it could gain an efficient means to offset Chinese power. This offset strategy, using cyberspace and other information operations (IO) capabilities, should aim to counter China during the critical window in the next ten to twenty years when Chinese economic and military power will surge, and then subside as demographic, economic and social factors limit its growth.

Targeting the CCP’s ability to control information can be considered a long-term IO campaign with options to operate across the spectrum of conflict: peacetime diplomacy and battlespace preparation; limited conflict; and, if deterrence fails, full-scale military operations. The goal is to ensure that PRC leaders believe that, as conflict escalates, they will increasingly lose their ability to control information within China and from outside, in part because the U.S. would be prepared to use more drastic measures to impede it.

This strategy is most efficient because it serves as an organizing concept for cyber options targeted against China that would otherwise be developed piecemeal. It could serve as a means to prioritize research and development, and better link military planning for cyberspace operations to public diplomacy, strategic communication, and economic policy initiatives. The nature of cyberspace operations makes it difficult to attribute actions back to the United States with certainty, unless we wish it to be known that the U.S. is conducting this activity. Finally, it provides an alternative array of responses that policy makers can use to offset growing Chinese power without immediate direct military confrontation.

Demographic, economic and social factors will combine to create a ceiling on Chinese power, ultimately causing it to enter a period of decline much sooner than it expects.[ii] These factors will stress the Communist Party’s ability to exclude economic, social and political participation of dissenters, and create further reliance by the Party on information control systems.

The Strategic Environment

The United States is a status quo power. It seeks to retain its position of dominance while realizing that relative to other powers, its position may rise or fall given the circumstances. It supports the post-World War II international order – a mix of international legal and liberal economic arrangements that promote free trade and the resolution of disputes through international organizations or diplomatic engagement when possible. The United States recognizes the growth of China, and that it will soon achieve “great power” status, if not already. It is most advantageous to the United States if the “rise” (or more correctly, return to great power status) of China occurs peacefully, and within the already established framework of international rules, norms, and standards.

There are two important considerations. First is the “singularity” of China with respect to its self-understanding and its role in the world. China views the last two centuries – a time when China was weak internally and under influence from foreign powers – as an aberration in the natural world order. Most Chinese consider their several thousand year history as the story of China occupying the center of the world with “a host of lesser states that imbibed Chinese culture and paid tribute to China’s greatness …” This is the natural order of things. In the West, it was common to refer to China as a “rising power,” but again, this misreads China’s history. China was almost always the dominant power in the Asia-Pacific, punctuated by short periods of turmoil. It just so happened that the birth and growth of the United States took place during one of those periods of Chinese weakness.[iii]

The strategic approach of China is markedly different, based on its concept of shi, or the “strategic configuration of power.” The Chinese “way of war” sees little difference in diplomacy, economics and trade, psychological warfare (or in today’s understanding, “information warfare”) and violent military confrontation. To paraphrase the well-known saying, the acme of strategy is to preserve and protect the vital interests of the state without having to resort to direct conflict while still achieving your strategic purpose. The goal is to build up such a dominant political and psychological position that the outcome becomes a foregone conclusion. This is in contrast to Western thought which emphasizes superior power at a decisive point.[iv]

To the American leadership, the “most dangerous” outcome of a competition with China would seem to be one that leads to war; hence the near-desperate desire to not undertake any action which might lead China down that path. Yet a better understanding of China suggests that it believes it can (and is) achieving its strategic purpose without having to resort to force. Its military buildup, use of economic trade agreements, diplomacy, and domestic social stability are creating the very political and psychological conditions where the use of force becomes unnecessary. China is quite content to remain in “Phase 0” with the United States, because it  believes it is winning there. Thus, the question for America is not “How do we maintain the status quo in Phase 0?” but “How do we win in Phase 0?” The most dangerous course of action is not war with China, but losing to China without a shot being fired.

cyber 2
Figure 1. In 2015, China reorganized the PLA and created a new Cyber Warfare branch under its Strategic Support Force.

Current Offset Proposals

In response to the call for proposals, a number of initiatives and programs have been put forward by both the Department of Defense and leading national security think tanks. The underlying assumption of most of these proposals is that the United States has lost or is quickly losing its “first mover” advantage – such as that offered by the shift from unguided to guided munitions delivered from a position of stealth or sanctuary. In this regard, China represents a “pacing threat,” leading the way in developing its own guided weapons regime and the ability to deliver them asymmetrically against the United States.[v] In order to regain America’s military advantage, most recommendations follow along these lines:

  • Development and procurement of new platforms and technologies that leverage current perceived technological advantages over China in such areas as:
    • Unmanned autonomous systems;
    • Undersea warfare;
    • Extended-range and low-observable air operations;
    • Directed energy; and
    • Improved power systems and storage.
  • New approaches to forward basing, including hardening of infrastructure (both physical and communication networks), the use of denial and deception techniques and active defense;
  • Countering China’s threats to U.S. space-based surveillance and command and control systems;
  • Assisting allies and friends in the development of or exporting of new technologies that impose smaller-scale anti-access and area denial (A2/AD) costs on China; and
  • Reconstitute and reinvigorate Department of Defense “iterative, carefully adjudicated tabletop exercises and model-based campaign assessments.”[vi]

These approaches[vii] may have much to offer and are commendable, however they suffer from a glaring weakness: none target China’s center of gravity or critical vulnerabilities. They seek to leverage capabilities where the United States appears to enjoy an advantage, such as undersea warfare. For example, while it may be true that the People’s Liberation Army-Navy (PLAN) is not as proficient as the U.S. Navy (or some allies) in the undersea domain, it is also true that the Chinese regime is investing heavily to “close the gap” in these and other capabilities or is developing asymmetric alternatives. The United States will face a diminishing marginal utility as it attempts to maintain or widen the gap, especially in an era when China’s cyberspace-enabled information exploitation capabilities are extremely robust, and capable of transferring intellectual property back to China on a scale unimaginable in the Cold War.

More fundamentally, the offsets proposed are not guided by an overarching grand strategy that utilizes all elements of national power attacking key weaknesses and critical vulnerabilities in the Chinese regime, much in the same way that the Reagan Administration was able to do against the Soviets. Reagan’s policy and strategy represented a “sharp break from his predecessors,” eschewing containment in favor of attacking “the domestic sources of Soviet foreign behavior.”[viii] By recognizing the inherent weakness of the Soviet economic system, the new policy sought to leverage national military, political and economic tools to press the American advantage home, causing the Soviet system to collapse. This is not to suggest that the Chinese economic system suffers from the same malaise as their Soviet brethren did. Despite growing demographic, social and economic headwinds, it is unlikely that the United States can “bankrupt” the Chinese. However, China does have acute vulnerabilities – vulnerabilities which align with unique American advantages.

China’s Center of Gravity and Critical Vulnerabilities

None of the proposed previously mentioned offset lines of effort attempt to identify or target China’s COG. The center of gravity is defined by Milan Vego is “a source of massed strength – physical or moral – or a source of leverage whose serious degradation, dislocation, neutralization, or destruction would have the most decisive impact on the enemy’s or one’s own ability to accomplish a given political/military objective.”[ix] Joint military doctrine defines it as “The source of power that provides moral or physical strength, freedom of action, or will to act.”[x] The center of gravity concept is important to offset strategies because it enhances “the chance that one’s sources of power are used in the quickest and most effective way for accomplishing a given political/military objective.” It is the essence of “the proper application of the principles of objective, mass and economy of effort.”[xi]

Using an analytic construct designed by Vego, we note that any military situation encompasses a large number of both “physical and so-called abstract military and nonmilitary elements.” These are the “critical factors” that require attention and are deemed essential to the accomplishment of the objective, both of the adversary and ourselves. Not surprisingly, these factors encompass both critical strengths and critical weaknesses – both of which are essential. Critical vulnerabilities are “those elements of one’s military or nonmilitary sources of power open to enemy attack, control, leverage, or exploitation.” By attacking critical vulnerabilities, we ultimately attack the enemy center of gravity.[xii] The figure below shows notionally how China’s information control systems are a critical vulnerability (note that it is not all-encompassing).

Figure 2. Notional Center of Gravity Analysis[xiii].
Figure 2. Notional Center of Gravity Analysis[xiii].
According to Vego, it is generally agreed that for most authoritarian/totalitarian regimes, the dictator, central governing party or leadership committee is the strategic center of gravity. In the case of China, the CCP is the sole governing political party. The top leadership of the CCP is the Politburo Standing Committee (or Central Standing Committee), currently made up of seven members and led by General Secretary Xi Jinping. A number of factors permit the continued rule of the CCP, including a massive domestic security apparatus and the world’s largest military, a growing standard of living and state control over media and information available to its people. In many ways, the Chinese leadership have already conducted their own vulnerability analysis and concluded that the free flow of information represents the biggest threat to their power – we can see this in both their words and deeds. China spends more on domestic security than on its own military. The last officially reported figures from the PRC in 2013 show the military budget was approximately 740.6 billion yuan ($119 billion) while domestic security received 769.1 billion yuan ($121 billion).[xiv] Beginning in 2014, the PRC stopped reporting on domestic security spending.[xv] In 2015, the PRC announced an 11 percent increase in “public security” spending to 154.2 billion yuan, or $24.6 billion. However, the total amount spent on domestic security remains unreported, and is certainly much higher, since regional and provincial figures are not provided. The reported military spending was 886.9 billion yuan, approximately $139 billion.[xvi] Fourteen separate state ministries are charged with domestic censorship responsibilities, everything from traditional press and broadcast media to text messages on cell phones.[xvii] A form of self-censorship has been institutionalized with Chinese internet companies being required to sign a “Public Pledge on Self-Regulation and Professional Ethics for China Internet Industry.”[xviii] In short, China has already shown what it fears most and where it is most vulnerable – it has performed its own “COG analysis” and has identified information control as a critical requirement to maintain CCP dominance.

cyber 3
Figure 3. In 2015, the U.S. and China met to discuss recent cyberspace issues.

A Cyberspace – IO Strategy

China’s regime identifies the free flow of information as an existential threat, and has erected a massive bureaucratic complex to censor and restrict free access to the nearly 618 million (and growing) Chinese internet uses (and 270 million social network users).[xix] However, the very nature of the Internet as a networked system makes censorship and restricted access difficult to maintain. As has been shown, China’s information control systems represent a critical vulnerability to their center of gravity. China’s network security is managed by a fragmented, disjointed system of “frequently overlapping and conflicting administrative bodies and managing organizations.”[xx]

China’s cyberspace operations and strategy are driven primarily by domestic concerns, with its central imperative being the preservation of Communist Party rule. Domestic security, economic growth and modernization, territorial integrity and the potential use of cyberspace for military operations define China’s understanding. Even its diplomatic and international policies are built around giving China maneuvering room to interpret international norms, rules and standards to serve domestic needs, principally through the primacy of state sovereignty. This creates a natural tension, as China must seek to balance economic growth and globalization with maintaining the Party’s firm grip on power. Not only is Internet usage controlled and censored, but it is also a tool for state propaganda.[xxi]

Chinese authorities use a number of techniques to control the flow of information. All internet traffic from the outside world must pass through one of three large computer centers in Beijing, Shanghai and Guangzhou – the so-called “Great Firewall of China.” Inbound traffic can be intercepted and compared to a regularly updated list of forbidden keywords and websites and the data blocked.[xxii] Common censorship tactics[xxiii] include:

  • Blocking access to specific Internet Protocol (IP) addresses;
  • Domain Name System (DNS) filtering and redirection, preventing the DNS from resolving or returning an incorrect IP address;
  • Uniform Resource Locator (URL) filtering, scanning the targeted website for keywords and blocking the site, regardless of the domain name;
  • Packet filtering, which terminates Transmission Control Protocol (TCP) transmission when a certain number of censored keywords are detected. This is especially useful against search engine requests.
  • “Man-in-the-Middle” attack, allowing a censor to monitor, alter or inject data into a communication channel;
  • TCP connection reset, disrupting the communication data link between two points;
  • Blocking of Virtual Private Network (VPN) connections; and
  • Network Enumeration, which initiates an unsolicited connection to computers (usually in the United States) for the purpose of blocking IP addresses. This is usually targeted against secure network systems or anonymity networks like “Tor.”

cyber 4
Figure 4. Simplified Chinese Firewall Topology[xxiv].
China also heavily regulates and monitors Internet service providers, Internet cafes, and university bulletin board systems. It requires registration of websites and blogs, and has conducted a number of high profile arrests and crackdowns on both dissidents and Internet service providers. This “selective targeting” has created an “undercurrent of fear and promoted self-censorship.” The government employs thousands who monitor and censor Internet activity as well as promote CCP propaganda.[xxv]

China’s information control regime is vulnerable on a number of levels to a coordinated strategy that seeks to hold it at risk. From a technical standpoint, the distributed nature of the internet makes it inherently vulnerable, the “Great Firewall” notwithstanding. The techniques used to filter and block content have a number of workarounds available to the average person. For example, IP addresses that have been blocked may be accessed utilizing a proxy server – an intermediary server that allows the user to bypass computer filters. DNS filtering and redirection can be overcome by modifying the Host file or directly typing in the IP address (64.233.160.99) instead of the domain name (www.google.com). These are simple examples that a novice government censor can easily outwit, but the point remains.

China has long been rightfully accused of being a state-sponsor of cybercrime and theft of intellectual property. One negative consequence of this from China’s perspective is the high level of cybercrime within China “due in large part to rampant use and distribution of pirated technology” which creates vulnerabilities. It is estimated that 54.9 percent of computers in China are infected with viruses, and that 1,367 out of 2,714 government portals examined in 2013 “reported security loopholes.”[xxvi] China’s networks themselves, by virtue of their size and scope, represent a gaping vulnerability.

At the same time, China’s information control bureaucracy is especially unwieldy. This is an ideal target to exploit the seams and gaps both horizontally and vertically in their notoriously byzantine structure. The fourteen agencies that conduct internet monitoring and censorship operations must all compete for resources and the attention of policy makers, leading to organizational conflict and competition. Any strategy should exploit these fissures, complicating China’s ability to control information.

Part 2 will outline several lines of effort the U.S. might pursue to attack China’s critical vulnerabilities in its information control system. It will advance the notion that the full range of American power – overt, covert, diplomatic, economic, information and military – must be coordinated and managed at the national level to wage a successful information operations campaign. Based on America’s past success, the future may be brighter than it first appears. Read Part 2 here.

LT Robert “Jake” Bebber USN is a Cryptologic Warfare Officer assigned to United States Cyber Command. His previous assignments have included serving as an Information Operations officer in Afghanistan, Submarine Direct Support Officer and the Fleet Information Warfare Officer for the U.S. Seventh Fleet. He holds a Ph.D. in Public Policy from the University of Central Florida. His writing has appeared in Proceedings, Parameters, Orbis and elsewhere. He lives in Millersville, Maryland and is supported by his wife, Dana and their two sons, Vincent and Zachary. The views expressed here are his own and do not reflect those of the Department of Defense, Department of the Navy or U.S. Cyber Command. He welcomes your comments at jbebber@gmail.com.

[i] Charles Hagel. “The Defense Innovation Initiative .” Memorandum for Deputy Secretary of Defense. Washington, D.C.: Department of Defense, November 15, 2014.

[ii] Robert Bebber. “Countersurge: A Better Understanding of the Rise of China and the Goals of U.S. Policy in East Asia.” Orbis 59 no. 1 (2015): 49-61.

[iii] Kissinger, Henry. On China. (New York, NY: Penguin Books, 2012).

[iv] David Lai. “Learning from the Stones: A Go Approach to Mastering China’s Strategic Concept, Shi.” U.S. Army War College Strategic Studies Institute. May 1, 2004, accessed Decmeber 26, 2014. http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=378

[v] Shawn W. Brimley. “The Third Offset Strategy: Security America’s Military-Technical Advantage.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[vi] David.Ochmanek. “The Role of Maritime and Air Power in the DoD’s Third Offset Strategy.” Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[vii] This list is certainly not exhaustive. For a more thorough review of the ones mentioned, see:. Brimley, Shawn W. “The Third Offset Strategy: Security America’s Military-Technical Advantage.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014. Martinage, Robert. “Statement Before the House Armed Services Subcommittee on Seapower and Projection Forces on the Role of Maritime and Air Power in DoD’s Third Offset Strategy.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014. Ochmanek, David. “The Role of Maritime and Air Power in the DoD’s Third Offset Strategy.” Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[viii] Thomas G. Mahnken.”The Reagan Administration’s Strategy Toward the Soviet Union.” In Successful Strategies: Triumphing in War and Peace from Antiquity to the Present, by Williamson Murray and Richard Hart Sinnreich. Cambridge: Cambridge University Press, 2014.

[ix] Milan N. Vego. Joint Operational Warfare – Theory and Practice. (Newport, RI: Government Printing Office, 2007) VII-13-29.

[x] Joint Chiefs of Staff. Joint Publication 5-0: Joint Operational Planning. (Washington, D.C.: Department of Defense, 2011).

[xi] Vego, Joint Operational Warfare – Theory and Practice, VII-15

[xii] Ibid, VII-15.

[xiii] Joint Publication 5.0 defines Critical Capability as “A means that is considered a crucial enabler for a center of gravity to function as such and is essential to the accomplishment of the specified or assumed objective(s);” Critical Requirement as “An essential condition, resource, and means for a critical capability to be fully operational;” and Critical Vulnerability as “An aspect of a critical requirement which is deficient or vulnerable to direct or indirect  attack that will create decisive or significant effects.”

[xiv] Ben Blanchard and John Ruwich. “China Hikes Defense Budget, To Spend More on Internal Security.” Reuters, March 5, 2013, accessed December 23, 2014.http://www.reuters.com/article/2013/03/05/us-china-parliament-defence-idUSBRE92403620130305  

[xv] Michael Martina. “China Withholds Full Domestic Security-Spending Figure.” Reuters, March 4, 2014, accessed September 25, 2015.  http://www.reuters.com/article/2014/03/05/us-china-parliament-security-idUSBREA240B720140305

[xvi] Ting Shi and Keith Zhai. “China To Boost Security Spending as Xi Fights Dissent, Terrorism.” Bloomberg News, March 5, 2015 accessed September 25, 2015. http://www.bloomberg.com/news/articles/2015-03-05/china-to-boost-security-spending-as-xi-fights-dissent-terrorism

[xvii] Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.” The New York Times, April 7, 2010, accessed December 23, 2014.http://www.nytimes.com/2010/04/08/world/asia/08censor.html

[xviii] Biena Xu. Media Censorship in China. February 2014, accessed December 23, 2014. http://www.cfr.org/china/media-censorship-china/p11515

[xix] Ibid..

[xx] Amy Chang. Warring State: China’s Cybersecurity Strategy. (Washginton, D.C.: Center for a New American Security, 2014) 12.

[xxi] Rebecca MacKinnon. “Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China.” Public Choice 134 (2008): 31-46.

[xxii] Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.”

[xxiii] Jonathan Zittrain, and Benjamin Edelman. “Empirical Analysis of Internet Filtering in China.” Harvard Law School Berkman Center for Internet and Society. March 20, 2003, accessed December 23, 2014. http://cyber.law.harvard.edu/filtering/china/

[xxiv] Available at: https://news.ycombinator.com/item?id=4931595

[xxv] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress, (Washington, D.C.: Congressional Research Service, 2013).

[xxvi] Amy Chang. Warring State: China’s Cybersecurity Strategy. 15. 

The US-China Arrangement for Air-to-Air Encounters Weakens International Law

This article originally featured on Lawfare and is republished with permission. It may be read in its original form here

By James Kraska and Raul “Pete” Pedrozo

As part of the September 2015 fanfare visit by Xi Xinping to the United States, the United States and China signed an arrangement on rules of behavior for safety of air-to-air encounters of military aircraft. The deal is supposed to avert aviation incidents in international airspace between military aircraft of the United States and China. In a deadly 2001 incident, for example, a Chinese F-8 fighter jet interceptor collided with a U.S. EP-3 aircraft that was operating more than 75 miles from Hainan Island, causing the loss of the Chinese aircraft and pilot, and an emergency landing in China by the U.S. surveillance aircraft. Similarly, in August 2014, a Chinese fighter jet roared over, under, and in front of a U.S. P-8 maritime patrol aircraft – coming as close as 50 feet to the American aircraft – about 135 miles east of Hainan Island. The Chinese jet climbed vertically with its underbelly showing in front of the U.S. aircraft to display its under wing combat load out.

After China’s establishment of an Air Defense Identification Zone (ADIZ) in the East China Sea in 2013, Beijing appears poised to adopt a similar zone over the South China Sea. Over the past 18 months, China has constructed three airstrips on artificial islands in the Spratlys that are capable of handling the country’s most advanced military aircraft. China has also deployed surface-to-air missiles to Woody Island in the Paracels and has installed high-frequency radar systems on four of the reefs that it occupies in the Spratlys, which significantly enhances the ability of the People’s Liberation Army (PLA) to monitor surface and air traffic in and over the South China Sea.

The new “Rules of Behavior for Safety of Air-to-Air Encounters” (Air Rules) is not a legally binding instrument, so it does not create any new substantive obligations. The agreement also does not create any new norms, as customary international law already requires military aircraft to fly in accordance with the rules applicable to civilian aircraft “to the extent practicable,” and to exercise due regard during air-to-air encounters. China wanted (and obtained) the deal as a trophy of great power status and strategic equivalence.

The Air Rules are likely to be a fruitless exercise to bring China back into compliance with international norms and its preexisting legal obligations. But if the deal merely restates existing obligations then what is the harm? We view the new Air Rules as more than just a superfluous agreement. The Air Rules reflect orthodox liberal internationalism and the belief among many U.S. international lawyers and policy makers that the international system is made safer and more stable and secure by enmeshing states in a continually expanding web of new commitments. Often, as is the case with the Air Rules, the specific terms of an instrument, the fact that an agreement does not reflect an actual meeting of the minds, or a lack of compliance with its provisions, are deemed less important than the good vibes hopefully generated by signing something. But the Air Rules erode confidence in international law as an effective element of diplomacy and security and diminishes more authoritative sources of law by adding an additional layer of ambiguity and confusion. Moreover, a bilateral deal plays into China’s claim that the issues concerning air-to-air interactions between Chinese fighter jets and the slow and vulnerable American wide body aircraft involve good faith differences over the law between Washington and Beijing, rather than China unilaterally breaking with universal norms to drive U.S. surveillance from the region.

Specific problems with the Air Rules include:

  • The arrangement states that the parties “should” operate consistent with the 1944 Convention on International Civil Aviation (Chicago Convention) and its Annexes and guidance….” Yet the Chicago Convention is legally binding; the Air Rules fail to state that the United States and China “shall” comply with its terms in accordance with their legal commitments. The Chicago Convention reflects the norm of customary international law that aircraft will fly with “due regard” for the safety of other aircraft, so the United States and China are already bound to observe this norm as a matter of law. The requirement in the Annex that the parties “should” operate consistent with the Chicago Convention dilutes the existing legal duty. This section of Annex III should have stated that the parties “shall operate” consistent with the Chicago Convention; it does not and international law has been weakened.
  • The arrangement says that the two powers are to “encourage” active communications during air-to-air encounters, but then states the opposite by specifically indicating that there is no obligation to communicate during such events.
  • The arrangement requires the two states to maintain safe separation of aerial forces using their own “national rules,” although China’s national rules are incompatible with its own treaty obligations in international law. Referencing China’s unlawful national rules in the Air Rules lends them undeserved credibility that undermines the rule of law in the airspace over the oceans.  
  • Furthermore, while the arrangement states that an intercepting aircraft should maintain a “safe separation” with other aircraft, it also says that the “intercepted” aircraft should “avoid reckless maneuvers.” This language clearly recalls the 2001 EP-3 incident described above, in which the Chinese side accused the slower and larger, multi-engine EP-3 aircraft of intentionally turning into the F-8 interceptor. This incredulous claim and the reference in the Air Rules for intercepted aircraft to avoid reckless maneuvers helps China avoid responsibility for past aggressive interceptions. Future scenarios are likely to raise similar facts – Chinese fighter jets intercepting slower U.S. reconnaissance aircraft. The text that attempts to balance or equate responsibilities for avoiding air-to-air incidents implicitly supports China’s effort to avoid responsibility for such incidents.
  •  The arrangement considers establishment of warning areas or danger areas using the worldwide Notice to Mariners (NOTAM) system. This provision is also an existing legal requirement and therefore superfluous. China currently does not comply with this legally binding requirement, so why would it now comply with a new, nonbinding requirement to do the same thing?
  • The arrangement states both sides should implement “in good faith” the 2014 Code for Unalerted Encounters at Sea (CUES). This “good faith” requirement is notoriously ambiguous in international law, and in practical terms is not an obligation to do anything. Furthermore, China already has signed CUES, so it already has a preexisting duty to implement it in good faith regardless of what is included in the new Air Rules. Rather than focus on getting China to comply with the nonbinding CUES, it would be better to insist that China fulfill its binding and longstanding legal commitments.
  • The arrangement indicates that aircraft are entitled to freedom of navigation and overflight in warning areas, but this provision is already a legally binding obligation that China ignores. Will the new, nonbinding Air Rules encourage compliance? Furthermore, China has long insisted that the right of freedom of navigation and overflight is limited to non-military ships and aircraft, or is subject to coastal state requirements, such as prior notification or consent.
  • Finally, the arrangement states that aircraft “should” avoid certain actions that may be seen as provocative, much like the Incidents at Sea Agreement (INCSEA) between the superpowers during the Cold War. Once again, however, this legally nonbinding provision is already subsumed by the legal requirement to exercise due regard during air-to-air encounters.

China’s dangerous interception of U.S. aircraft in international airspace violates long-standing and legally binding rules and norms of international law, so adding a new layer of nonbinding provisions merely creates unhelpful ambiguity and dilutes China’s preexisting legal obligations. Since lawyers are experts in the craft of statutory interpretation, saying the same thing in a different way can actually weaken rather than strengthen the underlying norm because it adds additional grist to the interpretative mill.

Besides the political significance of the agreement, the Air Rules are a new plank in China’s unremitting campaign of lawfare. The Air Rules either fail to invoke the appropriate legal terms of art or contain counterproductive and unorthodox references designed to place the United States in a worse light and provide China with colorable arguments to justify its unlawful behavior in the aftermath of the next air-to-air encounter.

The superfluous nature of the arrangement is also not helpful to the United States. There is a view among liberal internationalists that mention of preexisting international obligations in new agreements helps to reinforce them, and this approach perpetuates a compliance spiral that brings states closer together. But China already understands its existing legal obligations and chooses not to comply, so repeating them in oblique terms in a non-binding agreement only serves to weaken the very terms the United States seeks to reinforce. 

James Kraska is Howard S. Levie Professor of International Law at the Stockton Center for the Study of International Law, U.S. Naval War College, Distinguished Fellow at the Law of the Sea Institute, University of California at Berkeley School of Law, and Senior Fellow, Center for Oceans Law and Policy, University of Virginia School of Law.

Raul “Pete” Pedrozo is Deputy General Counsel for the Defense POW/MIA Accounting Agency (DPAA). Previously he was a Professor of International Law in the Stockton Center for the Study of International Law at the U.S. Naval War College, where he now serves as a Non-Resident Scholar.