Tag Archives: China

The Future of China’s Military Innovation

 

Forging China

Forging China’s Military Might: A New Framework for Assessing Innovation, edited by Tai Ming Cheung. Johns Hopkins Press, 2014. 304pp. $24.95

Review by Dr. Jeffrey Becker

Can China’s defense industry take the next step in supporting the country’s military modernization? Can it progress beyond a few well-known pockets of excellence in space and missiles to the point where the industry writ-large is capable of truly radical innovation? The CCP leadership clearly recognizes the importance of developing the nation’s defense science and technology industry, and defense industry reforms appear to be an integral part of the larger ongoing military reform process initiated at the 3rd Plenum of the 18th Party Congress in 2013. One need only look at recent Chinese writings on adjustment to weapons and equipment procurement and a growing focus on civil-military integration to see that the current leadership understands the importance of this issue to China’s future status as a military great power.

It is this context that we should view Tai Ming Cheung’s recently released edited volume, Forging China’s Military Might (2014, Johns Hopkins University Press). The results of a 2011 conference examining the Chinese defense economy held at Berkeley’s Institute on Global Conflict and Cooperation, the book tackles the question of how we should view China’s defense industry within a global comparative perspective. While the relatively long time from conference to publication is lamentable, the volume contains many essays which remain highly relevant and cover a range of topics, including analytical models designed to better understand important drivers of innovation, trends in the direction of China’s defense industry development, and detailed case studies examining important organizations within the Chinese military and defense establishment.

The volume is anchored by the theoretical chapter authored by Tai Ming Cheung, Thomas G.  Mahnken, and Andrew L. Ross. The chapter lays out a general model that allows for comparing innovation in national defense industries across countries. The details of the model are far too complex to do justice in the space here, but are certainly worthy of more in-depth examination.  In sum, the model attempts to place national defense innovation on a spectrum ranging from simplistic and duplicative imitation, to disruptive and radical innovation. Where a country falls on this spectrum depends on a number of factors, including the state’s level of technological development, their security situation, and level of global integration. The authors find that most advances in the Chinese defense industry have been more incremental than disruptive to date, a finding likely true in most countries. While this is non-controversial, the chapter also notes that China’s innovative success has been more a function of technological advancements rather than doctrinal reform or organizational change, a point some may argue given the amount of ink spilled over the past twenty years examining PLA reforms in training, organization, and doctrine. 

Of the remaining chapters, two are likely of greatest interest to CIMSEC readers in that they deal directly with issues of concern to the PLA Navy. 

The first is an examination of China’s Military Representative Offices (MROs) by Susan M. Puska et. al. China’s MRO system is the PLA’s attempt to ensure quality at all stages of weapons and equipment production. Like previous studies of this system, the authors find it to be redundant, fragmented, and largely ineffectual. However, the chapter provides useful information on relatively recent (2010-2011) attempts to experiment with changes to the PLAN’s MRO system, with the goal of incorporating them into other MRO systems once they have been deemed successful. 

Like many experiments within the Chinese military and government, reforms to the MRO system appear to have gone nowhere. However, given that the PLA now appears to be undertaking some of the widest ranging and most serious reforms in decades, it will be extremely interesting to see whether they provide an impetus to finally bring the MRO system more in line with the PLA’s current needs and requirements. Added incentive to change how the PLA manages weapons development and procurement has also come from the ongoing anti-corruption campaign, which has already taken down a number of military officials – including those involved in weapons logistics and procurement. 

The second chapter likely to be of greatest interest to CIMSEC readers is the examination of China’s place in the global defense industry by Richard A. Bitzinger et. al. The authors compare and contrast the accomplishments of China’s defense industries in the field of shipbuilding, aviation, and space launch vehicles.  The examination of China’s shipbuilding industry provides some useful detail regarding the sectors’ accomplishments and challenges. Despite the dramatic achievements made over the past two decades, the authors find the continued reliance on foreign technology to be problematic, especially should China need to ramp up production during conflict, when access to needed foreign material and components may be in short supply. The authors conclude that China’s naval shipbuilding has been “remarkable, yet short of impressive,” a more somber assessment which contrasts with some of the more optimistic predictions regarding China’s naval shipbuilding capacity over the near term.   

So what are we to expect from China’s defense industry in the near future? The assessment here is that results are likely to be mixed. Pockets of excellence in areas such as missiles, space and cyber are likely to expand and will continue to improve. Other areas such as aviation – particularly the aero-engine sector – will continue to face challenges. Key for China analysts and those who focus specifically on China’s defense industry will be to identify well in advance those early warning indicators that will allow us to determine the extent to which real change in the industry is occurring, and how to determine how much of an impact it is having on China’s ability to close the defense technology gap. This book helps to advance that conversation by providing a number of ways to look at China defense industry in comparative perspective, which will be of value to anyone seeking to answer these questions for some time to come.

Jeffrey Becker is an analyst in the CNA China Studies Division. Dr. Becker’s published books and monographs include From Peasants to Protesters: Social Ties, Resources, and Migrant Labor Contention in Contemporary China (Lexington Books, 2014), and Behind the Periscope: Leadership in China’s Navy (CNA, 2013). His current research interests include Chinese maritime issues and Chinese foreign policy in the Asia-Pacific. Dr. Becker holds a Ph.D. in political science from the George Washington University, an M.A. in political science from Columbia University, and a B.A. in international relations and Asian studies from Colgate University.

Readers interested in reviewing books for CIMSEC can contact the book review editor at books@cimsec.org.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.
Select a Donation Option (USD)

Enter Donation Amount (USD)

Call for Articles: Chinese Military Strategy Week, 3-7 Aug 15

Week Dates: 3-7 Aug 15
Articles Due: 29 Jul 15
Article Length: 500-1500 Words
Submit to: nextwar(at)cimsec(dot)org

In a watershed moment, the Chinese Ministry of National Defense recently published a white paper on the Chinese Military Strategy (with an English-language version made available and published almost immediately by USNI News). This document lays out a policy for future Chinese military engagement with the world, proclaiming the centrality of active defense as the essence of the Chinese Communist Party’s military strategic thought and then describing an approach for implementing this military policy in the air, cyber, land, and maritime domains. This document comes at a particularly interesting time as General Martin Dempsey, Chairman on the Joint Chiefs of Staff, has since approved a new National Military Strategy for the United States, a strategy that names China explicitly as culpable for increased tension in the Asia-Pacific region and establishes an explicit interactive dynamic between the Chinese and U.S. strategies. While this is not the first time a U.S. National Military Strategy names China as a consideration, the shift in tone here is noteworthy.

During the first week of August, CIMSEC will host a series focused on exploring the relationship between the new Chinese military strategy and the strategic policies of the United States and others. Of particular interest are the dynamics of symmetry and asymmetry in their respective National Military Strategies (ideological, technological, doctrinal, coalitional, etc.); the implicit and explicit assumptions in each; the potentially divergent social and political purposes of such documents given their sources; and the implications for the other elements of national power in China, the United States, and the other actors (state and otherwise) in the international system. If the United States and China were to pursue their stated military strategies in whole or in part, what are the implications for their relative and absolute advantage? What are the acknowledged and unacknowledged risks for each in their stated policies?

Contributions should be between 500 and 1500 words in length and submitted no later than 29 July 2015. Publication reviews will also be accepted.

Eric Murphy is a Strategist and Operations Research Analyst with the United States Air Force and a graduate of the School of Advanced Air and Space Studies.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.
Select a Donation Option (USD)

Enter Donation Amount (USD)

China’s Military Strategy White Paper 2015: Far Seas Operations and the Indian Ocean Region

The Security Environment

On 26 May 2015, China released its first ever White Paper focusing exclusively on military strategy. China’s economic rise propelled by an extensive growth strategy has caused its integration with the global economy. It has consequently developed expansive interests linking its fate with that of the global system, most notably its access to African and Persian Gulf resources. China’s transition from the ‘near coast defence’ maritime doctrine in the 1980’s (product of a maritime strategy that was seen only as an extension to the continental strategy) to the ‘near seas control’ doctrine till 2004 calling for China to exercise control up to the first island chain has mirrored China’s increasing integration in the global economy. The conferment of historical missions upon the Chinese Navy post 2004 required it to focus on the distant seas as well. That was symptomatic of the increased stakes China had in influencing the events in the maritime commons, and was a trend that has continued unabated. The document acknowledges this, noting that:

In the new circumstances, the national security issues facing China encompass far more subjects, extend over a greater range, and cover a longer time span than at any time in the country’s history. Internally and externally, the factors at play are more complex than ever before.”

Taiwan’s reunification and safeguarding its territorial claims in the ‘near seas’ remain important to China. However, the emphasis accorded to safeguarding of China’s overseas interests is notable, as observed in the section on National Security Overview which says:

With the growth of China’s national interests, its national security is more vulnerable to international and regional turmoil, terrorism, piracy, serious natural disasters and epidemics, and the security of overseas interests concerning energy and resources, strategic sea lines of communication (SLOCs), as well as institutions, personnel and assets abroad, has become an imminent issue.”

A Blue Water Force

The most revealing part of the strategy indicating China’s aim to build a globe spanning blue water navy says:

“..the PLA Navy (PLAN) will gradually shift its focus from “offshore waters defense” to the combination of “offshore waters defense” with “open seas protection,” and build a combined, multi-functional and efficient marine combat force structure.

The section on force development goes on to say:

The seas and oceans bear on the enduring peace, lasting stability and sustainable development of China. The traditional mentality that land outweighs sea must be abandoned, and great importance has to be attached to managing the seas and oceans and protecting maritime rights and interests. It is necessary for China to develop a modern maritime military force structure commensurate with its national security and development interests, safeguard its national sovereignty and maritime rights and interests, protect the security of strategic SLOCs and overseas interests, and participate in international maritime cooperation, so as to provide strategic support for building itself into a maritime power.”

An overhead view of China’s carrier, the Liaoning.

Far Seas Operations

The strategic guideline of active defence is prescribed for the military with a focus on winning local wars in conditions of modern technology and informationisation (with the maritime military struggle aspect being highlighted).

In the section about Preparation for Military Struggle, however a reference is made to the need to strengthen strategic prepositioning. Limited logistical support severely constrains the PLAN’s ability to operate beyond East Asia; and in context of the Indian Ocean, this could be interpreted to refer to the strengthening of a Chinese policy popularly dubbed as the ‘String of Pearls’. Recent talks between China and Djibouti aimed at enhancing Chinese naval operations in the region is part of a Chinese effort to establish a variety of access points in the Indian Ocean Region in the upcoming years.

Further (as seen in the U.S. Office of Naval Intelligence 2015 Report on the PLAN) it is clear that the Chinese naval order of battle is undergoing qualitative improvements as legacy combatants are giving way to larger multi-mission ships capable of undertaking a broader spectrum of missions. The PLAN’s involvement in diversified missions in the far seas is mirrored in both its acquisition patterns and far seas training patterns (as routine deployments in the Philippines, operations in the Mediterranean and increasing incursions in the Indian Ocean indicate).

Looking to the Future

China has enhanced overseas interests, is building a blue water fleet to conduct far seas operations and the Indian Ocean is slated to become an active area of operations for the PLAN. Should this set alarm bells ringing in India? The answer is that it’s too early to tell.

The Chinese fleet is currently optimized for anti-surface warfare and has made substantial investments and developments in advanced Anti-Ship Cruise Missiles and Over the Horizon Targeting systems in pursuit of the same. Proficient as it may be in Anti Surface Warfare and increasingly Anti Air Warfare (shipboard air defences having witnessed dramatic improvements of late) Anti-Submarine Warfare and power projection in contested environments remain weaknesses for China. Given PLAN’s priorities closer to home, the pace at which aircraft carriers, large deck amphibious ships (power projection tools) and its anti-submarine capabilities are bolstered will be indicating the priority PLAN places on being able to sustain far seas operations that can involve high intensity combat operations.

Just as important as adapting to these developments militarily though would be closely mirroring Chinese diplomatic approaches not just in the Indian Ocean region but within China’s backyard as well. Whether or not such an approach is considered feasible depends in large part on whether it is the pursuit of simply a reactive or a pro-active strategy that is being considered. Either way policy must be formulated keeping in mind the fact that China has growing global interests and this is occurring simultaneously with the loosening of its historic reticence for using its military forces in far seas operations.

This piece was originally published as a Viewpoint at the National Maritime Foundation. The author (Himanil Raina) can be reached at himanilraina@gmail.com.

China’s Evolving Perspectives on Network Warfare: Lessons from the Science of Military Strategy

This article by Joe McReynolds originally appeared in the Jamestown Foundation’s China Brief and can be found in its original form here

When tracking the development of China’s military capabilities, Western People’s Liberation Army (PLA) watchers encounter frequent challenges in determining which data sources they should draw upon for their analysis. Purely quantitative measurements of the PLA’s nominal force strength, though often valuable, may not provide insights into challenges the PLA faces in the real-world execution of its missions, while writings on Chinese military strategy by any given PLA author may not reflect the PLA’s broader institutional stance or limitations imposed by inadequate material capabilities.

If one analyzes China’s approach to network warfare in particular, these challenges are multiplied. [1] “Cyber weapons” are not publicly viewable and quantifiable in the same sense as submarines or aircraft, and often the PLA will not admit even their existence. And just as in U.S. discussions of “cyber war,” charlatans and self-promoters abound; although it is easy to find writings by PLA officers theorizing loosely and grandiosely about information warfare, they are often speaking only for themselves rather than for their respective military institutions.

Roughly once every 15 years or so, however, the PLA’s influential Academy of Military Sciences (AMS) issues a new edition of The Science of Military Strategy (SMS), a comprehensive, generally authoritative study of the PLA’s evolving strategic thought that escapes much (though not all) of the shortcomings of other PLA original sources. The AMS plays a much more central role in the formation of China’s military strategic thought than its academic counterparts in the United States, and the SMS is its flagship external product. It is the result of dozens of high-level PLA authors working together over a period of years to produce a heavily vetted consensus document.

As a result, each new edition of the SMS is closely scrutinized by China hands in the West for the valuable insights it provides into the evolving thinking of the PLA on a range of strategically important topics. The newest edition of the Science of Military Strategy has recently been released, with Western PLA analysts beginning to obtain copies since summer 2014. Although no English translation is currently available, a book forthcoming this year from The Jamestown Foundation, China’s Evolving Military Strategy, will aim to convey the central insights contained within this important new document to Western policy and analysis audiences.

The SMS is a particularly valuable resource for understanding China’s evolving strategic approach to network warfare. A study that aims to be as comprehensive as the SMS cannot afford to ignore network warfare due to the centrality of information warfare to modern war-fighting, and the process by which the SMS is written ensures that the information analysts receive on network warfare represents something approaching an authoritative consensus within the PLA. The following are the most important revelations from the new SMS on the PLA’s approach to network warfare:

The Fig Leaf is Gone: China’s Network Warfare Forces Are Now Explicitly Acknowledged

In recent years, official PLA publications have repeatedly issued blanket denials of offensive activities in the network domain, such as that “the Chinese military has never supported any hacker attack or hacking activities” (China Armed Forces / 中国军队, No. 20, 2013) even as the evidence conclusively attributing various large-scale cyber intrusions to China has continued to mount. The release of the new SMSremoves that barest fig leaf of plausible deniability. The SMS not only explicitly acknowledges that China has built up network attack forces, but divides them into three types:

  • The PLA’s “specialized military network warfare forces” (军队专业网络战力量), which are military operational units specially employed for carrying out network attack and defense
  • “PLA-authorized forces” (授权力量), which are teams of network warfare specialists in civilian organizations such as the Ministry of State Security (MSS), the Ministry of Public Security (MPS) and others that have been authorized by the military to carry out network warfare operations
  • “Non-governmental forces” (民间力量), which are external entities that spontaneously engage in network attack and defense, but can be organized and mobilized for network warfare operations

This is the first time an explicit acknowledgement was made of the existence of China’s secretive network attack forces from the Chinese side, and it is particularly noteworthy that this acknowledgement extends beyond the military domain and into the network warfare capabilities of civilian government agencies. The AMS’s statement that China’s civilian network attack forces operate under the PLA’s “authorization” may speak to an ongoing power struggle within the Chinese system between the PLA’s leadership and the aforementioned civilian government organs to determine who truly oversees Chinese actions in cyberspace; as unprecedented as it is to have the Chinese military acknowledge the existence of its network attack forces, having a PLA publication be the first to announce the existence of such secretive forces inside the civilian government is particularly unusual, and may represent an attempt to “plant the flag” for the PLA.

This could also seriously complicate China’s international efforts at law enforcement cooperation on cybercrime. The MPS, which is more or less “China’s FBI,” has assisted more than 50 countries in investigating over a thousand cases of cyber-crime in the past decade, and China has established bilateral law enforcement cooperation with over 30 countries (including the United States, the United Kingdom, Germany and Russia), often including a cyber-crime component (China Armed Forces, 2013). With the Chinese now explicitly acknowledging that the MPS has network warfare forces stationed within it, the United States and other targets of Chinese state-sponsored hacking will have to weigh carefully whether cooperation with the MPS on cyber-crime is worth the risks.

Blurring the Divide Between the Military and Civilian Realms

In keeping with Chinese President Xi Jinping’s recent statements that “without network security there is no national security” (PLA Daily, October 7, 2014), the authors of the new SMS break from the previous edition’s vague talk of overall information warfare objectives to concretely assert the centrality of cyberspace power to China’s overall ability to project national power, engage in strategic deterrence, and defend itself in a conflict. However, this “network domain,” which has become so central to the PLA’s warfighting, exists primarily as civilian infrastructure and is used globally for civilian purposes. As a result, although development of elite network warfare personnel remains central to the PLA’s ongoing cyber mission, the authors of the SMS focus an unusual amount of their energies examining the importance of civilian information technology and the civilian Internet to network warfare.

First and foremost, the authors believe that civilian infrastructure in foreign countries can be targeted more freely with network warfare than with conventional weapons, without provoking the degree of conflict escalation that a conventional attack on civilian targets would. This echoes an idea known as “unrestricted network warfare” long advocated by some of the PLA’s more hawkish network warfare theorists, and its presence in an authoritative work such as the SMS suggests that more aggressive voices may be gaining ground in the PLA’s internal deliberations on network warfare strategy (See Dong Qingling and Dai Changzheng, “Deterrence in the Network Space: Is Retaliation Feasible?”). To put it simply, they believe that the old playground sports adage of “no blood, no foul” applies to network warfare, even if the attack in question has debilitating effects on civilian infrastructure, and in a conflict scenario they may advocate that the PLA chooses its targets accordingly.

Second, the authors of the SMS acknowledge that China’s civilian information technology (IT) industry functions as a core component of China’s overall power in cyberspace. Since the development of China’s network warfare capabilities relies heavily on human talent and the civilian IT industry is where the bulk of China’s IT talent is found, PLA analysts believe that civilian industry will continue to serve as an important source of technical talent and human capital for the PLA’s network warfare operations to a degree that is disproportionate to the PLA’s reliance on civilian industry in other realms of warfare. The authors also emphasize the fact that despite recent advances in Chinese IT, key state-of-the-art networking technologies are still advanced primarily in the West, and the bulk of the Internet’s core architecture is controlled by the United States and its allies. Thus, what the West views as the neutral “status quo” of the network domain is, to China, an intolerable “network hegemony” (????) imposed by the United States and others. Based on the increasing prominence of these sentiments within the PLA, the prediction one sometimes hears in the West—that China’s IT development will one day transform it into a “mature” partner interested primarily in cyberspace cooperation to preserve our “mutual” interests—appears likely be overly optimistic. The PLA’s stated intentions to mobilize its civilian IT industry as a component of national power in both peacetime and wartime must be accounted for in the calculus of determining whether any given Sino-U.S. information security cooperation is in the United States’ national interest.

“Salami-Slicing” in Cyberspace and Planning for Resilience in the Face of the Inevitable

The SMS authors also focus heavily on the central role of peacetime “network reconnaissance”—that is, the technical penetration and monitoring of an adversary’s networks—in developing the PLA’s ability to engage in wartime network operations. As the SMS puts it, since the technical principles underlying successful penetrations of an adversary’s systems are essentially the same whether the objective is reconnaissance or active disruption, at the appropriate moment “one need only press a button” to switch from reconnaissance to attack.

Despite this ambiguity of intent, since network reconnaissance is both non-destructive (at least initially) and widely engaged in by all nations for the purposes of espionage, the SMS authors believe it has been clearly demonstrated that the act of network reconnaissance alone is unlikely to lead to escalation or the outbreak of war. As a result, PLA strategists appear to have arrived at a strategic understanding of peacetime network operations similar to China’s “salami slicing” tactics for asserting control of disputed islands in the South China Sea: a pattern of taking actions during peacetime that incrementally put China into a superior tactical position should conflict ever break out but that, which while provocative and unwelcomed by China’s neighbors, are unlikely to lead to direct conflict in and of themselves. If conflict eventually does break out, China will be in a better position than they otherwise would; if it does not, they will have incrementally gained much of what they desire without a fight.

PLA analysts understand, however, that network reconnaissance is not by any means one-sided, and believe that just as they are actively attempting to penetrate the networks of their adversaries, the PLA’s networks are likely being repeatedly breached as well. Furthermore, they argue that since China’s “main strategic opponent” (their euphemistic way of referring to the United States) has superior network warfare capabilities, the strict balance of power in a network-domain conflict would not necessarily tilt in China’s favor. As a result, the SMS emphasizes that the PLA must plan for a future of network warfare in which its defenses will inevitably be breached, military networks will at times be taken down by hostile adversaries, and China’s modernized C4ISR systems cannot be fully relied upon. [2] Although they do call for a major effort to strengthen China’s network defenses, this is undertaken in the hope that those defenses will not catastrophically fail, without any expectation that they will fully withstand outside attacks.

For Western military analysts, this line of thinking should trigger particular attention and concern. With China preparing for conflict in the network domain under the assumption that from the outset their information networks will quickly be heavily degraded and only partially functional, there will be a strong incentive in a conflict for the PLA to push the envelope of what is globally considered legitimate in areas such as anti-satellite warfare. The intersection of U.S. technological reliance on space-based C4ISR systems with its distance from East Asia will multiply this incentive, as China will (all other things equal) be able to do “more with less” in its immediate backyard.

Much of the focus by Western analysts when examining China’s approach to anti-access/area-denial (A2/AD), also known as “counter-intervention,” has centered on the physical realm of warfare, including the use of precision-guided munitions reliant on C4ISR. However, as the insights contained in the newSMS demonstrate, this discussion is fundamentally incomplete if it does not take into account China’s evolving approach to network and information warfare. Rightly or wrongly, many Chinese analysts believe that the United States currently possesses what they term a “no satellites, no fight” military force, and in a major conflict scenario they appear increasingly likely to put that presumption to the test.

Notes

  1. Rather than mirroring the United States’ ‘cyber’ concept, PLA writing speaks at the broadest level of the ‘information domain’ and ‘information warfare,’ with network, electromagnetic, psychological, and intelligence warfare each taking place as distinct components of that broader concept. The PLA concept of “network warfare” is roughly analogous to the current United States cyber concept, though not always identical in its details.
  2. C4ISR stands for command, control, computers, communication, intelligence, reconnaissance and surveillance.

Joe McReynolds is a Research Analyst at Defense Group Inc.’s Center for Intelligence Research and Analysis. His research interests primarily center on China’s approach to computer network warfare and defense science & technology development. Mr. McReynolds has previously worked with the Council on Foreign Relations and the Pacific Council for International Policy, and is a graduate of Georgetown University’s School of Foreign Service and Graduate Security Studies programs. He speaks and reads Chinese and Japanese, and has lived and studied in Nagoya, Guilin and Beijing.