China’s Military Strategy: Assessment of White Paper 2015

This article can be found in its original form at the National Maritime Foundation here and was republished with permission. 

China has been issuing Defence White Papers biennially since 1998. The ninth White Paper of 2014 titled ‘China’s Military Strategy’ was released recently in May 2015. This essay seeks to analyse the salient aspects of the document, particularly in context of the preceding document of 2012 released in April 2013.

In comparison to the Defence White Papers published by China in the preceding years, the 2014 document is very concise. Nonetheless, it reveals substantial content and context, disproportionate to the size of its text. While much of the revelation is likely to be Beijing’s ‘strategic communications’, the document is nonetheless insightful.  

Title of White Paper

The present White Paper has continued the trend of using a thematic title – a trend that was initiated with the 2012 document titled ‘The Diversified Employment of China’s Armed Forces’. The trend and the specific title spelling out “China’s Military Strategy” signify the increased self-confidence of an emerging global military power, which until a few years ago, preferred to be opaque to the world on ‘matters military’.  The document also reflects an increased self-assurance as a nation, stating that “China’s comprehensive national strength, core competitiveness and risk-resistance capacity are notably increasing, and China enjoys growing international standing and influence”.

Core National Objectives

In the document, China has maintained its earlier stance of avoiding war through its military strategy of “active defence” (that envisages an ‘offensive’ only at the operational and tactical levels). However, the document mentions “preparation for military struggle (PMS)”, which indicates its strong desire to retain the option of first use of military force, if it cannot achieve its core objectives otherwise. Furthermore, the emphasis on “maritime PMS” indicates that these objectives pertain to Taiwan’s “reunification”, and fructification of its maritime-territorial claims in the Western Pacific. Furthermore, the inclusion of the phase “You fight your way and I fight my way” indicates that China’s war-fighting concept to meet its core objectives is likely to be based on use of asymmetric capabilities.

Maritime Interests

The previous 2012 document stated the PLA Navy’s mandate to preserve China’s sovereignty over its territorial seas and its maritime rights and interests in ‘offshore areas’ against complex security threats, thereby portraying China as a victim or an underdog reacting to the actions of Japan, and implicitly, of the U.S. The new document, however, emphasises a more proactive protection of its interests in ‘open waters’, thereby enlarging its strategic depth. Notably, the document also calls upon the need to shed the mindset that peace, stability, and development of China is linked to affairs on land rather than the sea. This indicates a maritime emphasis of China’s military strategy.

With regard to the security of sea-lanes, it uses the term “strategic Sea Lines of Communication (SLOCs)”. Although the term ‘SLOC’ itself bears a ‘strategic’ connotation, the addition of the adjective indicates that China considers itself vulnerable to commodity denial during war, thereby severely limiting its option of use of military force. Although the document does not specifically mention the ‘Indian Ocean’, the reference to Indian Ocean SLOCs may be inferred.

 Naval Presence in Indian Ocean

Alike the previous 2012 document, the 2014 White Paper states that the PLA Navy would maintain “regular combat readiness patrols…(and maintain)…military presence in relevant sea areas.” While the former may refer to the Western Pacific, the latter is a likely reference to the Indian Ocean. This is buttressed by the statement that the PLA Navy would “continue to carry out escort missions in the Gulf of Aden and other sea areas as required, enhance exchanges and cooperation with naval task forces of other countries, and jointly secure international SLOCs.” This implies that China’s naval presence in the Indian Ocean would continue, and may even increase. While such presence may be primarily for undertaking ‘Military Operations Other than War’ (MOOTW), it is likely to be dovetailed with preparing for ‘wartime’ operations. This assertion is borne out by Beijing’s assertion in September 2014 that its Song-class submarine deployed in the Indian Ocean was meant for counter-piracy. (The credibility of this rationale was dismissed by naval analysts on operational grounds). The document adds that the “PLA Navy will work to incorporate MOOTW capacity building into…PMS” thereby implying the China would also seek to develop fungible capabilities.

Furthermore, the White Paper lays emphasis on ‘sustenance’ of the forward-deployed naval platforms through “strategic prepositioning”. This indicates that China is likely to seek overseas access facilities (if not military bases) in the Indian Ocean, or even resort to the U.S. concept of ‘sea-basing’. The latter possibility is supported by recent news-reports about China developing large ‘Mobile Landing Platforms’ (MLP) similar to those used by the U.S. expeditionary forces.

Military Interface with Major Powers

The mention of Russia in the White Paper precedes all other countries. The “exchanges and cooperation with the Russian military within the framework of the comprehensive strategic partnership…to promote military relations in more fields and at more levels” indicates the imminence of a China-Russia quasi-alliance. 

The 2012 White Paper, without naming the U.S., had expressed a concern for its “pivot” to Asia strategy and “strengthening of its military alliances with the regional countries, leading to tensions.” In contrast, the 2014 document mentions the U.S. explicitly. While it does state the need for “cooperative mechanisms with the US Navy, including exchange of information in the maritime domain”, its tone and tenor indicates a precursor to a ‘Cold War-style’ military interface between the two major powers. It talks about a “new model of military relationship” with the US based on “major-country relations”, with “strengthening of defence dialogue (and)…CBMs to include notification of major military activities (and) rules of behaviour” to prevent “air and maritime encounters…strengthen mutual trust, prevent risks and manage crises.” However, it is yet unclear what kind of bipolar interface will eventually emerge since the current global environment marked by close China-U.S. economic ties is vastly dissimilar to the erstwhile Cold War era.

 The 2012 White Paper had mentioned India’s combined Army exercises with PLA and increased anti-piracy coordination with India. Since the 2014 document is more succinct, the lack of details is understandable. However, the lack of even a mention of defence exchanges with India, or any other Asian country is remarkable.

Also ‘conspicuous by absence’ are the various facets of ‘transparency’ that the preceding Defence White Papers had addressed, ranging from China’s defence budget to its nuclear weapons policy of no-first use (NFU). Evidently, China has ‘arrived’ on the world stage with a single-minded preoccupation of how it could challenge the unipolar world order dominated by the U.S.

Captain (Dr.) Gurpreet S Khurana is the Executive Director, National Maritime Foundation (NMF), New Delhi. The views expressed are his own and do not reflect the official policy or position of the NMF, the Indian Navy or the Government of India. He can be reached at gurpreet.bulbul@gmail.com

 

For a Good Time Hack OPM

Guest article by Brian Scopa, USN.

“Once is happenstance. Twice is coincidence. Three times, it’s enemy action.”

-Ian Fleming

 

M looking for W? W looking for M? PRC looking for Intel?

The revelation that the Office of Personnel Management has been hacked, allegedly by the Chinese, has profound implications for the safeguarding of classified US information. Beyond the typical identity theft problems associated with any breach of Personally Identifiable Information (PII) from a government or private database, the fact that the data on 4.1 million military and  government personnel contained  information on their security clearances is extremely grave. This is not only an egregious breach of individual privacy, but when combined with two other hacks of private websites make for a counterintelligence nightmare.

Allowing ourselves to go briefly down the conspiracy theory rabbit hole, two additional hacks of private websites are worth considering in conjunction with the OPM hack:

Linkedin in 2012. 

“LinkedIn Security professionals suspected that the business-focused social network LinkedIn suffered a major breach of its password database. Recently, a file containing 6.5 million unique hashed passwords appeared in an online forum based in Russia. More than 200,000 of these passwords have reportedly been cracked so far.”

The consensual aggregation of personal and employment information online has greatly simplified the task of finding targets for intelligence gathering. The technology that makes finding a project manager with an MBA and five years of experience fast and convenient also makes it easy to track down missile and radar engineers on LinkedIn. The publicly available information on LinkedIn is a trove of intelligence in itself regarding military, government, and contract employees that work in defense related industries. Having the private email addresses and passwords of LinkedIn members has staggering spearfishing implications ala STUXNET.

Adult Friend Finder (AFF) in May 2015 

Andrew Auernheimer, a controversial computer hacker who looked through the files, used Twitter to publicly identify Adult FriendFinder customers, including a Washington police academy commander, an FAA employee, a California state tax worker and a naval intelligence officer who supposedly tried to cheat on his wife.” (emphasis mine)

Catching Flies

Developing intelligence sources costs time, money, and effort, regardless of the method employed, and intelligence agencies are constantly searching for ways to more efficiently target and recruit intelligence sources. The OPM and LinkedIn hack simplify the targeting, but it’s the AFF hack that helps with recruitment.

One of the most useful tools intelligence agencies have for recruiting sources is blackmail, and a ‘Honey Trap’ is the practice of luring a potential intelligence source into a compromising position with a romantic partner that’s working for an intelligence agency, and either gaining their cooperation in the name of love, or blackmailing the source into compliance.

The Chinese are apparently particularly fond of this specific type of intelligence gathering operation:

“MI5 is worried about sex. In a 14-page document distributed last year to hundreds of British banks, businesses, and financial institutions, titled “The Threat from Chinese Espionage,” the famed British security service described a wide-ranging Chinese effort to blackmail Western businesspeople over sexual relationships.”

The AFF hack is probably the first Massive Multiplayer Online Honey Trap (MMOHT).  Even better for foreign intelligence agencies (FIAs), it was self-baiting and required zero investment of resources.

How bad is it?

Perverting the Drake Equation for this exercise, we can conduct a thought experiment about the number of potential intelligence sources created by the confluence of the three hacks mentioned above, expressed mathematically as P = O * W * N * Y, where:

P = Total number of useful possible US government employee intelligence sources that could be exploited.

O  = All government employees with security clearances whose personally identifiable information has been compromised, reported to be 4.1 million.

W = Fraction of O that are AFF members. This number has not been made public by the DoD, if it’s known, but the reported number of member profiles compromised was 3.5 million.

N = Fraction of W that desperately want their activities on AFF to remain undisclosed and could be effectively blackmailed. Not everyone will be embarrassed by their activities on AFF.

Y = Fraction of O that has been or is currently employed in a position that a FIA would find useful to turn into a source of intelligence.

Since I don’t have any insight into the any of the variables with the exception of O, I won’t speculate on what P might be, but I have no doubt that it’s an actionable, non-zero number that FIAs must be rushing to exploit.

AdultFriendFinderIntel

 

Lessons Re-identified, Still Unlearned

Any information that’s online can be accessed online- full stop. We should all assume that any device connected to the public internet is hackable, and act accordingly. While there are many good precautions and security features that individuals, companies, institutions, and governments can take to better protect online dealings and information, such as two-factor authentication, tokens, and salted password hashing, it has been demonstrated time and again that the advantage in the cyber security arms race is with the attacker. You cannot count on technical means alone to protect your information.  If individuals with security clearances have used the internet to facilitate behavior that the knowledge of by a third party could lead to blackmail, the individuals should assume the information will be made public.

Security through obscurity is always a loser, but anonymity is still worthwhile. The critical information that makes blackmail possible in this instance is being able to identify government employees that were also members of AFF. If AFF members had taken care to remain anonymous by making their member profiles non-attributional, using email addresses and phone numbers not otherwise linked to them, using non-identifiable pictures, and keeping locations ambiguous, they may yet have some measure of protection from identification.

What’s next?

This is only the beginning of this particular saga. In the coming months I have no doubt we’ll hear about the hacks of other popular dating, hook-up, and porn sites. The hacking itself has probably already happened; it’ll just take time for the discoveries to be made.

The news is grim, but there is opportunity here. While FIA see openings, our own counterintelligence organizations have an unprecedented opportunity to identify potential targets before they can be contacted by FIAs and possibly prepare them to act as double-agents, turning the honey traps on the attackers. If nothing else, the act of sharing the blackmail information with the security services helps to inoculate the individuals against blackmail, since it’s typically (but not always) the fear of disclosure that makes the information useful, not the specific behavior that’s problematic.

In any case, it’s time for a DoD-wide effort to review the list of AFF members and check it against current and past employees with security clearances. Then, command security officers can start having the difficult, closed-door conversations necessary to learn the scope of the possible vulnerability. Doing so will limit the damage from this hack, and it’ll be a useful exercise in preparing for the next episode.

Which has already happened.

Sea Control 81 – Third Offset and Human Offset

seacontrol2ADM John Harvey, USN (ret), joins us to discuss the Third Offset and the “Human Offset.” Third Offset is Defense Undersecretary Robert Work’s strategy to embraces the US technological advantage, pushing the throttle to the max through a suite of development efforts. However, ADM Harvey worries that this technological emphasis will pull attention from other foundational areas – like talent management and development – as well as what he sees as a dedication of our resources into dominance less-achievable in our globalized civilian-led tech economy.

DOWNLOAD: Third Offset and Human Offset

CIMSEC’s June NY Meet-up

013a7778ffe210bbe8932e2ec467933eJoin our New York chapter for its June informal meet-up/happy hour. Members Ankit Panda and Stephen Brooker will lead a discussion on the South China Sea. We hope you’ll drop by for drinks and discussions with friends old and new.

Time: Thursday, 18 June 5:45pm
PlaceBedford Falls (Backyard)
206 E 67th St NW
New York City, NY

All are welcome – RSVPs not required, but appreciated: newyork@cimsec.org

Fostering the Discussion on Securing the Seas.