Tag Archives: China

Call for Articles: Chinese Military Strategy Week, 3-7 Aug 15

Week Dates: 3-7 Aug 15
Articles Due: 29 Jul 15
Article Length: 500-1500 Words
Submit to: nextwar(at)cimsec(dot)org

In a watershed moment, the Chinese Ministry of National Defense recently published a white paper on the Chinese Military Strategy (with an English-language version made available and published almost immediately by USNI News). This document lays out a policy for future Chinese military engagement with the world, proclaiming the centrality of active defense as the essence of the Chinese Communist Party’s military strategic thought and then describing an approach for implementing this military policy in the air, cyber, land, and maritime domains. This document comes at a particularly interesting time as General Martin Dempsey, Chairman on the Joint Chiefs of Staff, has since approved a new National Military Strategy for the United States, a strategy that names China explicitly as culpable for increased tension in the Asia-Pacific region and establishes an explicit interactive dynamic between the Chinese and U.S. strategies. While this is not the first time a U.S. National Military Strategy names China as a consideration, the shift in tone here is noteworthy.

During the first week of August, CIMSEC will host a series focused on exploring the relationship between the new Chinese military strategy and the strategic policies of the United States and others. Of particular interest are the dynamics of symmetry and asymmetry in their respective National Military Strategies (ideological, technological, doctrinal, coalitional, etc.); the implicit and explicit assumptions in each; the potentially divergent social and political purposes of such documents given their sources; and the implications for the other elements of national power in China, the United States, and the other actors (state and otherwise) in the international system. If the United States and China were to pursue their stated military strategies in whole or in part, what are the implications for their relative and absolute advantage? What are the acknowledged and unacknowledged risks for each in their stated policies?

Contributions should be between 500 and 1500 words in length and submitted no later than 29 July 2015. Publication reviews will also be accepted.

Eric Murphy is a Strategist and Operations Research Analyst with the United States Air Force and a graduate of the School of Advanced Air and Space Studies.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.
Select a Donation Option (USD)

Enter Donation Amount (USD)

China’s Military Strategy White Paper 2015: Far Seas Operations and the Indian Ocean Region

The Security Environment

On 26 May 2015, China released its first ever White Paper focusing exclusively on military strategy. China’s economic rise propelled by an extensive growth strategy has caused its integration with the global economy. It has consequently developed expansive interests linking its fate with that of the global system, most notably its access to African and Persian Gulf resources. China’s transition from the ‘near coast defence’ maritime doctrine in the 1980’s (product of a maritime strategy that was seen only as an extension to the continental strategy) to the ‘near seas control’ doctrine till 2004 calling for China to exercise control up to the first island chain has mirrored China’s increasing integration in the global economy. The conferment of historical missions upon the Chinese Navy post 2004 required it to focus on the distant seas as well. That was symptomatic of the increased stakes China had in influencing the events in the maritime commons, and was a trend that has continued unabated. The document acknowledges this, noting that:

In the new circumstances, the national security issues facing China encompass far more subjects, extend over a greater range, and cover a longer time span than at any time in the country’s history. Internally and externally, the factors at play are more complex than ever before.”

Taiwan’s reunification and safeguarding its territorial claims in the ‘near seas’ remain important to China. However, the emphasis accorded to safeguarding of China’s overseas interests is notable, as observed in the section on National Security Overview which says:

With the growth of China’s national interests, its national security is more vulnerable to international and regional turmoil, terrorism, piracy, serious natural disasters and epidemics, and the security of overseas interests concerning energy and resources, strategic sea lines of communication (SLOCs), as well as institutions, personnel and assets abroad, has become an imminent issue.”

A Blue Water Force

The most revealing part of the strategy indicating China’s aim to build a globe spanning blue water navy says:

“..the PLA Navy (PLAN) will gradually shift its focus from “offshore waters defense” to the combination of “offshore waters defense” with “open seas protection,” and build a combined, multi-functional and efficient marine combat force structure.

The section on force development goes on to say:

The seas and oceans bear on the enduring peace, lasting stability and sustainable development of China. The traditional mentality that land outweighs sea must be abandoned, and great importance has to be attached to managing the seas and oceans and protecting maritime rights and interests. It is necessary for China to develop a modern maritime military force structure commensurate with its national security and development interests, safeguard its national sovereignty and maritime rights and interests, protect the security of strategic SLOCs and overseas interests, and participate in international maritime cooperation, so as to provide strategic support for building itself into a maritime power.”

An overhead view of China’s carrier, the Liaoning.

Far Seas Operations

The strategic guideline of active defence is prescribed for the military with a focus on winning local wars in conditions of modern technology and informationisation (with the maritime military struggle aspect being highlighted).

In the section about Preparation for Military Struggle, however a reference is made to the need to strengthen strategic prepositioning. Limited logistical support severely constrains the PLAN’s ability to operate beyond East Asia; and in context of the Indian Ocean, this could be interpreted to refer to the strengthening of a Chinese policy popularly dubbed as the ‘String of Pearls’. Recent talks between China and Djibouti aimed at enhancing Chinese naval operations in the region is part of a Chinese effort to establish a variety of access points in the Indian Ocean Region in the upcoming years.

Further (as seen in the U.S. Office of Naval Intelligence 2015 Report on the PLAN) it is clear that the Chinese naval order of battle is undergoing qualitative improvements as legacy combatants are giving way to larger multi-mission ships capable of undertaking a broader spectrum of missions. The PLAN’s involvement in diversified missions in the far seas is mirrored in both its acquisition patterns and far seas training patterns (as routine deployments in the Philippines, operations in the Mediterranean and increasing incursions in the Indian Ocean indicate).

Looking to the Future

China has enhanced overseas interests, is building a blue water fleet to conduct far seas operations and the Indian Ocean is slated to become an active area of operations for the PLAN. Should this set alarm bells ringing in India? The answer is that it’s too early to tell.

The Chinese fleet is currently optimized for anti-surface warfare and has made substantial investments and developments in advanced Anti-Ship Cruise Missiles and Over the Horizon Targeting systems in pursuit of the same. Proficient as it may be in Anti Surface Warfare and increasingly Anti Air Warfare (shipboard air defences having witnessed dramatic improvements of late) Anti-Submarine Warfare and power projection in contested environments remain weaknesses for China. Given PLAN’s priorities closer to home, the pace at which aircraft carriers, large deck amphibious ships (power projection tools) and its anti-submarine capabilities are bolstered will be indicating the priority PLAN places on being able to sustain far seas operations that can involve high intensity combat operations.

Just as important as adapting to these developments militarily though would be closely mirroring Chinese diplomatic approaches not just in the Indian Ocean region but within China’s backyard as well. Whether or not such an approach is considered feasible depends in large part on whether it is the pursuit of simply a reactive or a pro-active strategy that is being considered. Either way policy must be formulated keeping in mind the fact that China has growing global interests and this is occurring simultaneously with the loosening of its historic reticence for using its military forces in far seas operations.

This piece was originally published as a Viewpoint at the National Maritime Foundation. The author (Himanil Raina) can be reached at [email protected].

China’s Evolving Perspectives on Network Warfare: Lessons from the Science of Military Strategy

This article by Joe McReynolds originally appeared in the Jamestown Foundation’s China Brief and can be found in its original form here

When tracking the development of China’s military capabilities, Western People’s Liberation Army (PLA) watchers encounter frequent challenges in determining which data sources they should draw upon for their analysis. Purely quantitative measurements of the PLA’s nominal force strength, though often valuable, may not provide insights into challenges the PLA faces in the real-world execution of its missions, while writings on Chinese military strategy by any given PLA author may not reflect the PLA’s broader institutional stance or limitations imposed by inadequate material capabilities.

If one analyzes China’s approach to network warfare in particular, these challenges are multiplied. [1] “Cyber weapons” are not publicly viewable and quantifiable in the same sense as submarines or aircraft, and often the PLA will not admit even their existence. And just as in U.S. discussions of “cyber war,” charlatans and self-promoters abound; although it is easy to find writings by PLA officers theorizing loosely and grandiosely about information warfare, they are often speaking only for themselves rather than for their respective military institutions.

Roughly once every 15 years or so, however, the PLA’s influential Academy of Military Sciences (AMS) issues a new edition of The Science of Military Strategy (SMS), a comprehensive, generally authoritative study of the PLA’s evolving strategic thought that escapes much (though not all) of the shortcomings of other PLA original sources. The AMS plays a much more central role in the formation of China’s military strategic thought than its academic counterparts in the United States, and the SMS is its flagship external product. It is the result of dozens of high-level PLA authors working together over a period of years to produce a heavily vetted consensus document.

As a result, each new edition of the SMS is closely scrutinized by China hands in the West for the valuable insights it provides into the evolving thinking of the PLA on a range of strategically important topics. The newest edition of the Science of Military Strategy has recently been released, with Western PLA analysts beginning to obtain copies since summer 2014. Although no English translation is currently available, a book forthcoming this year from The Jamestown Foundation, China’s Evolving Military Strategy, will aim to convey the central insights contained within this important new document to Western policy and analysis audiences.

The SMS is a particularly valuable resource for understanding China’s evolving strategic approach to network warfare. A study that aims to be as comprehensive as the SMS cannot afford to ignore network warfare due to the centrality of information warfare to modern war-fighting, and the process by which the SMS is written ensures that the information analysts receive on network warfare represents something approaching an authoritative consensus within the PLA. The following are the most important revelations from the new SMS on the PLA’s approach to network warfare:

The Fig Leaf is Gone: China’s Network Warfare Forces Are Now Explicitly Acknowledged

In recent years, official PLA publications have repeatedly issued blanket denials of offensive activities in the network domain, such as that “the Chinese military has never supported any hacker attack or hacking activities” (China Armed Forces / 中国军队, No. 20, 2013) even as the evidence conclusively attributing various large-scale cyber intrusions to China has continued to mount. The release of the new SMSremoves that barest fig leaf of plausible deniability. The SMS not only explicitly acknowledges that China has built up network attack forces, but divides them into three types:

  • The PLA’s “specialized military network warfare forces” (军队专业网络战力量), which are military operational units specially employed for carrying out network attack and defense
  • “PLA-authorized forces” (授权力量), which are teams of network warfare specialists in civilian organizations such as the Ministry of State Security (MSS), the Ministry of Public Security (MPS) and others that have been authorized by the military to carry out network warfare operations
  • “Non-governmental forces” (民间力量), which are external entities that spontaneously engage in network attack and defense, but can be organized and mobilized for network warfare operations

This is the first time an explicit acknowledgement was made of the existence of China’s secretive network attack forces from the Chinese side, and it is particularly noteworthy that this acknowledgement extends beyond the military domain and into the network warfare capabilities of civilian government agencies. The AMS’s statement that China’s civilian network attack forces operate under the PLA’s “authorization” may speak to an ongoing power struggle within the Chinese system between the PLA’s leadership and the aforementioned civilian government organs to determine who truly oversees Chinese actions in cyberspace; as unprecedented as it is to have the Chinese military acknowledge the existence of its network attack forces, having a PLA publication be the first to announce the existence of such secretive forces inside the civilian government is particularly unusual, and may represent an attempt to “plant the flag” for the PLA.

This could also seriously complicate China’s international efforts at law enforcement cooperation on cybercrime. The MPS, which is more or less “China’s FBI,” has assisted more than 50 countries in investigating over a thousand cases of cyber-crime in the past decade, and China has established bilateral law enforcement cooperation with over 30 countries (including the United States, the United Kingdom, Germany and Russia), often including a cyber-crime component (China Armed Forces, 2013). With the Chinese now explicitly acknowledging that the MPS has network warfare forces stationed within it, the United States and other targets of Chinese state-sponsored hacking will have to weigh carefully whether cooperation with the MPS on cyber-crime is worth the risks.

Blurring the Divide Between the Military and Civilian Realms

In keeping with Chinese President Xi Jinping’s recent statements that “without network security there is no national security” (PLA Daily, October 7, 2014), the authors of the new SMS break from the previous edition’s vague talk of overall information warfare objectives to concretely assert the centrality of cyberspace power to China’s overall ability to project national power, engage in strategic deterrence, and defend itself in a conflict. However, this “network domain,” which has become so central to the PLA’s warfighting, exists primarily as civilian infrastructure and is used globally for civilian purposes. As a result, although development of elite network warfare personnel remains central to the PLA’s ongoing cyber mission, the authors of the SMS focus an unusual amount of their energies examining the importance of civilian information technology and the civilian Internet to network warfare.

First and foremost, the authors believe that civilian infrastructure in foreign countries can be targeted more freely with network warfare than with conventional weapons, without provoking the degree of conflict escalation that a conventional attack on civilian targets would. This echoes an idea known as “unrestricted network warfare” long advocated by some of the PLA’s more hawkish network warfare theorists, and its presence in an authoritative work such as the SMS suggests that more aggressive voices may be gaining ground in the PLA’s internal deliberations on network warfare strategy (See Dong Qingling and Dai Changzheng, “Deterrence in the Network Space: Is Retaliation Feasible?”). To put it simply, they believe that the old playground sports adage of “no blood, no foul” applies to network warfare, even if the attack in question has debilitating effects on civilian infrastructure, and in a conflict scenario they may advocate that the PLA chooses its targets accordingly.

Second, the authors of the SMS acknowledge that China’s civilian information technology (IT) industry functions as a core component of China’s overall power in cyberspace. Since the development of China’s network warfare capabilities relies heavily on human talent and the civilian IT industry is where the bulk of China’s IT talent is found, PLA analysts believe that civilian industry will continue to serve as an important source of technical talent and human capital for the PLA’s network warfare operations to a degree that is disproportionate to the PLA’s reliance on civilian industry in other realms of warfare. The authors also emphasize the fact that despite recent advances in Chinese IT, key state-of-the-art networking technologies are still advanced primarily in the West, and the bulk of the Internet’s core architecture is controlled by the United States and its allies. Thus, what the West views as the neutral “status quo” of the network domain is, to China, an intolerable “network hegemony” (????) imposed by the United States and others. Based on the increasing prominence of these sentiments within the PLA, the prediction one sometimes hears in the West—that China’s IT development will one day transform it into a “mature” partner interested primarily in cyberspace cooperation to preserve our “mutual” interests—appears likely be overly optimistic. The PLA’s stated intentions to mobilize its civilian IT industry as a component of national power in both peacetime and wartime must be accounted for in the calculus of determining whether any given Sino-U.S. information security cooperation is in the United States’ national interest.

“Salami-Slicing” in Cyberspace and Planning for Resilience in the Face of the Inevitable

The SMS authors also focus heavily on the central role of peacetime “network reconnaissance”—that is, the technical penetration and monitoring of an adversary’s networks—in developing the PLA’s ability to engage in wartime network operations. As the SMS puts it, since the technical principles underlying successful penetrations of an adversary’s systems are essentially the same whether the objective is reconnaissance or active disruption, at the appropriate moment “one need only press a button” to switch from reconnaissance to attack.

Despite this ambiguity of intent, since network reconnaissance is both non-destructive (at least initially) and widely engaged in by all nations for the purposes of espionage, the SMS authors believe it has been clearly demonstrated that the act of network reconnaissance alone is unlikely to lead to escalation or the outbreak of war. As a result, PLA strategists appear to have arrived at a strategic understanding of peacetime network operations similar to China’s “salami slicing” tactics for asserting control of disputed islands in the South China Sea: a pattern of taking actions during peacetime that incrementally put China into a superior tactical position should conflict ever break out but that, which while provocative and unwelcomed by China’s neighbors, are unlikely to lead to direct conflict in and of themselves. If conflict eventually does break out, China will be in a better position than they otherwise would; if it does not, they will have incrementally gained much of what they desire without a fight.

PLA analysts understand, however, that network reconnaissance is not by any means one-sided, and believe that just as they are actively attempting to penetrate the networks of their adversaries, the PLA’s networks are likely being repeatedly breached as well. Furthermore, they argue that since China’s “main strategic opponent” (their euphemistic way of referring to the United States) has superior network warfare capabilities, the strict balance of power in a network-domain conflict would not necessarily tilt in China’s favor. As a result, the SMS emphasizes that the PLA must plan for a future of network warfare in which its defenses will inevitably be breached, military networks will at times be taken down by hostile adversaries, and China’s modernized C4ISR systems cannot be fully relied upon. [2] Although they do call for a major effort to strengthen China’s network defenses, this is undertaken in the hope that those defenses will not catastrophically fail, without any expectation that they will fully withstand outside attacks.

For Western military analysts, this line of thinking should trigger particular attention and concern. With China preparing for conflict in the network domain under the assumption that from the outset their information networks will quickly be heavily degraded and only partially functional, there will be a strong incentive in a conflict for the PLA to push the envelope of what is globally considered legitimate in areas such as anti-satellite warfare. The intersection of U.S. technological reliance on space-based C4ISR systems with its distance from East Asia will multiply this incentive, as China will (all other things equal) be able to do “more with less” in its immediate backyard.

Much of the focus by Western analysts when examining China’s approach to anti-access/area-denial (A2/AD), also known as “counter-intervention,” has centered on the physical realm of warfare, including the use of precision-guided munitions reliant on C4ISR. However, as the insights contained in the newSMS demonstrate, this discussion is fundamentally incomplete if it does not take into account China’s evolving approach to network and information warfare. Rightly or wrongly, many Chinese analysts believe that the United States currently possesses what they term a “no satellites, no fight” military force, and in a major conflict scenario they appear increasingly likely to put that presumption to the test.

Notes

  1. Rather than mirroring the United States’ ‘cyber’ concept, PLA writing speaks at the broadest level of the ‘information domain’ and ‘information warfare,’ with network, electromagnetic, psychological, and intelligence warfare each taking place as distinct components of that broader concept. The PLA concept of “network warfare” is roughly analogous to the current United States cyber concept, though not always identical in its details.
  2. C4ISR stands for command, control, computers, communication, intelligence, reconnaissance and surveillance.

Joe McReynolds is a Research Analyst at Defense Group Inc.’s Center for Intelligence Research and Analysis. His research interests primarily center on China’s approach to computer network warfare and defense science & technology development. Mr. McReynolds has previously worked with the Council on Foreign Relations and the Pacific Council for International Policy, and is a graduate of Georgetown University’s School of Foreign Service and Graduate Security Studies programs. He speaks and reads Chinese and Japanese, and has lived and studied in Nagoya, Guilin and Beijing.

INS Vikrant Makes Progress at Cochin Shipyard

Guest Post by Chris B.

New satellite imagery shows that India’s first indigenous aircraft carrier has made significant progress since it was launched in August 2013, helping India inch towards the goal of a two carrier battle group.

Imagery acquired by commercial satellite firm DigitalGlobe in February 2015 shows further assembly of INS Vikrant, a 40,000 ton aircraft carrier and India’s soon-to-be largest vessel once commissioned. Additional ship modules now welded to the hull have enlarged the deck width — measuring almost 60 meters. The erection of the superstructure reported last November was also confirmed. India’s first domestically produced carrier is currently under construction at state-owned Cochin Shipyard Limited, the country’s largest shipbuilding and maintenance facility located in Kerala on the west coast.

Like other vessels built in India, significant cost overruns and delays have hampered shipbuilding progress. The South Asian country is already four years behind schedule on the project with the latests estimates pushing an operational date closer to December 2018, if not beyond. However, the Indian Navy expects that the vessel will “undock” sometime this month after mounting the propellers on the engine shafts, according to an April statement from Vice Admiral Ashok Subedar. Afterward, the shipyard will continue with the fitting out process.

Originally, India was to have fielded her carrier by 2014, eleven years after the government approved the build. Last July, the Cabinet Committee on Security released an additional Rs 19,000 crore (approx USD 3.18 billion), the lion’s share, to complete the vessel’s construction — on top the USD 585 million already spent. Due to India’s extensive bureaucracy, the funds languished for almost a year halting progress on the project.

“As much as 95 per cent of its hull is complete as is 22,000 tons of [its] steel structure,” Subedar went on to say. That’s 3,500 tons heavier than its August 2013 launch weight though significantly less than its planned 40,000 tons. Of course, much of the that weight will be comprised of two fixed wing squadrons (12 x fighters each) of Russian-built MIG-29K and Indian-built Tejas Light Combat Aircraft, 10 x Ka-31 ASW helicopters as well as necessary ammo, fuel, and other supplies.

Vikrant

Indian Navy Computer Model of INS Vikrant

Featuring a STOBAR (short take-off but arrested recovery) configuration with a ski-jump, India’s indigenous carrier will push naval pilots to master a new launch and recovery system, one very different from its existing STOVL (short take-off and vertical landing). Luckily, Russia helped India build a shore-based testing facility which became operational early last year. Imagery shows that Indian pilots are already hard at work. (INS Vikramaditya also features a STOBAR configuration).

Aircraft aside, India’s latest carrier will be powered by four General Electric LM2500 gas turbines capable of cruising speeds around 18 knots. With an endurance of 7,500 nautical miles the Navy should have few problems projecting force throughout the Indian Ocean region, especially given India’s previous proficiency in carrier operations.

But if issues do arise, the United States has proposed a joint working group to help support Indian ops, share best practices and even possibly, technology. All of which may lead observers to conclude that India’s naval capability has become increasingly important. Prime Minister Modi made that clear while visiting Mauritius in March: “India is becoming more integrated globally. We will be more dependent than before on the ocean and the surrounding regions. We must also assume our responsibility to shape its future. So, [the] Indian Ocean region is at the top of our policy priorities.”

As perhaps it should be. India is already advantaged by its unique geography, jutting out in the Indian Ocean with its 7,500km coastline and island territories. Given India has short distances to travel to manage any regional conflict or rivalry, it only makes sense that India would focus resources on protecting national interests in its own backyard.

DG (11MAR15) PLAN Salalah

Satellite Imagery of PLAN Vessel at Oman’s Salalah port (DigitalGlobe 11MAR15)

However, few regional contenders are making a splash in the maritime space, though emerging challenges from China are certainly on India’s radar. China’s People’s Liberation Army Navy (PLAN) commissioned its first aircraft carrier, the Liaoning, in 2012 and has already started construction on a second. With recent infrastructure established in the South China Sea and additional PLAN deployments in the Indian Ocean region, China appears poised to take a more aggressive maritime stance, a clear departure from India’s Cold War experience.

In response, India is planning a 160-plus-ship navy as it seeks to constrain what it sees as a Chinese incursion into its sphere of influence. Unfortunately for the navy, India is still predominately a land force with the Army maintaining the biggest share of the defense budget. Regardless, India expects that its homegrown carrier program will eventually allow it to maintain two carrier battle groups supporting its respective Eastern and Western Naval Commands.

Named after India’s first aircraft carrier recently scrapped, the INS Vikrant is one of two homegrown carriers planned for the Indian Navy. The second carrier, INS Vishal is currently being fast-tracked—though it’s unknown what this means for Vishal’s construction timeline. In the meantime, India’s lack of experience building carriers and the uncertainty of outside assistance may impede India’s pressing strategic goals, probably pushing the operation of its second carrier to 2025 or beyond.

This article can be found in its original form at Offiziere.ch