conflict foretold america and china
TRANSCRIPT
-
8/12/2019 Conflict Foretold America and China
1/23
-
8/12/2019 Conflict Foretold America and China
2/23
In his novella Chronicle of a Death Foretold, Gabriel Garca Mrquez tells the
story of two brothers who are driven to murder the man who they believe
has deowered their sister. Everyone in the small town where the action
takes place believes that the intended victim will be murdered. But for a
variety of reasons, mostly mundane, nobody warns him or tries to prevent
the murder from taking place. It is not clear that the brothers really want
to murder the presumed culprit but they are driven to do so by a spiral of
circumstances, including a widespread public expectation that this is what
they will do. Though hardly an exact parallel, the novellas title may have aprophetic quality in describing a relationship between China and the United
States which seems increasingly to be governed by a security dilemma. This
dilemma is a phenomenon rst described by US academic and former
intelligence ocer John H. Herz. Herz related a situation whereby in a
context of uncertainty and bounded rationality, perceived external threats
generate feelings of insecurity in states that believe themselves to be the
target of such threats.1He identied six factors that contribute to a security
dilemma: a state of international anarchy by which he meant an absence
of supranational institutions capable of mediating relations between states;
a situation of uncertainty among states and fear about each others inten-
Conflict Foretold: America
and China
Nigel Inkster
Nigel Inksteris Director of Transnational Threats and Political Risk at the IISS. He served in the British Secret
Intelligence Service (SIS) from 1975 to 2006, and spent seven years on the Board of SIS, the last two as Assistant
Chief and Director for Operations and Intelligence. This article arose out of a talk the author gave at the Third
Seminar on National Security Strategy and the Development of Science and Technology at the National
University of Defence Technology, Changsha, China, from 1718 June 2013.
Survival | vol. 55 no. 5 | OctoberNovember 2013 | pp. 728 DOI 10.1080/00396338.2013.841802
-
8/12/2019 Conflict Foretold America and China
3/23
8 | Nigel Inkster
tions to do harm; a response by states that involves accumulating power to
mitigate the perceived threat which leads to a cycle of power competition;
the reality that such a response may not only fail to improve a states secu -
rity but also prove self-defeating and even tragic the word tragic beingused in the classical sense of a situation which has a prophetic inevitability;
the potential for causing war though war is not an inevitable outcome,
nor is the security dilemma the sole cause of war; and a dynamic and self-
reinforcing vicious cycle.
Herzs original formulation has been modied and embellished by a
number of subsequent scholars, among whom the best known are Herbert
Buereld, Robert Jervis, Kenneth Wal and John Mearsheimer. Three sep-
arate schools of security-dilemma theory have been identied.2
The rst school is fatalistic. This approach is epitomised by Mearsheimer,
an oensive realist who argues that uncertainty between states can never be
eliminated, and hence states are destined to engage in competitive power
accumulation. There is thus no such thing as a security dilemma per se, but
rather a security paradox whereby the accumulation of ever-greater power
can prove self-defeating.
The second school is mitigating. Defensive realists like Jervis, who claimsthat a security dilemma can create enmity between states which start out with
no intention to harm each other, have argued that a security dilemma can
be mitigated when the oencedefence balance favours defence, and where
the nature of such defence is clear. Jervis has also suggested that a range of
material and physical factors geography and technology can also exercise
a mitigating eect. He juxtaposes the spiral model in which states seek to
outdo each other in acquiring defensive and oensive capabilities with the
deterrence model, whereby states assume they are dealing with an aggressor
and focus on developing strong deterrence and a show of resolve.3
The third school is transcending. Scholars such as Emanuel Adler and
Michael Barne constructivists argue that security dilemmas can be tran-
scended via the creation of security communities in which states cede some
degree of sovereignty in pursuit of wider common interests.4NATO might
serve as an example of such a community, as might, in a more embryonic
form, the Shanghai Cooperation Organisation.
-
8/12/2019 Conflict Foretold America and China
4/23
Conflict Foretold: America and China | 9
It is important to recall that, as mentioned earlier, security dilemmas
cannot account for all wars that occur between states. The Second World
War has often been cited as a conict in which there was no pre-existing
security dilemma; Adolf Hitlers thinking was dominated above all else bythe concepts of Rache(revenge) and Lebensraum(living space), ideas which
made aggressive expansionism an inevitability. Other cases, starting with
the Peloponnesian Wars and Chinas Warring States period, t the model
rather beer, as, arguably, do more recent examples such as the Cold War or
the break-up of Yugoslavia. Whether the Sino-American security relation-
ship conforms exactly to the various denitions of the security dilemma that
have been advanced by academics is a moot point. But it is by no means an
irrelevant one if such a consideration helps us determine more clearly where
a relationship as globally signicant as that between the United States and
China may be heading, and provides policymakers and opinion formers
on both sides with a greater sense of self-awareness, thereby reducing the
potential for miscalculation and inadvertent escalation. That such poten-
tial exists is becoming increasingly clear. As Aaron Friedberg observes, the
United States and China are today locked in a quiet but increasingly intense
struggle for power and inuence, not only in Asia but around the world.5This is a contest taking place across all areas of activity political, economic,
cultural and military. But two domains in particular, space and cyberspace,
both intimately connected, merit aention because of their relative newness
and the ways in which they intersect with and inuence policies and behav-
iours across the board.
Space
Space has emerged as a domain characterised by a growing array of mili-
tary operations, and one in which tensions manifest in other domains are
increasingly played out. From a military and security perspective, space
remains a largely unregulated environment. The 1967 Outer Space Treaty,
negotiated at a time when there were only two spacefaring powers, has
limited utility in terms of regulating contemporary space activities. It
bans the deployment in space of weapons of mass destruction but says
nothing about the stationing of conventional weaponry there, nor does it
-
8/12/2019 Conflict Foretold America and China
5/23
10 | Nigel Inkster
regulate the use of terrestrial weapons against space-based assets. It pre-
vents states from claiming sovereignty over celestial bodies but oers no
guidance on how activities such as mining asteroids or even planets, a
possibility unlikely to be the preserve of science ction for much longer,might be regulated. There are now 11 spacefaring nations states with
a space launch capability and over 60 countries that own and manage
around 1,100 satellites whose functions govern many of the systems on
which states and populations depend for the conduct of daily life. And the
situation is further complicated by the reality that space is no longer the
sole preserve of nation-states, as private actors become increasingly active
in this domain. From a defence perspective, space is inextricably bound
up with the question of nuclear weapons and the associated questions of
missile-defence systems, and a new generation of US precision missiles
developed under the collective term of conventional prompt global strike
(CPGS) capabilities. And the degree to which space-based assets are both
dependent on cyber capabilities and also critical in enabling such capa-
bilities testies to the inextricable linkages between these domains and to
their growing relevance to national defence.
For the United States, space has come to represent a critical domain forenabling warfare in all other areas, with many of its terrestrial weapons
systems and other military capabilities dependent on satellite-based
communications. The 2006 National Space Policy of the George W. Bush
administration sought to reect this with the assertion that freedom of
action in space is as important to the United States as air or sea power. The
policy goes on to say:
The United States considers space capabilities vital to its national
interests ... [and] will: preserve its rights, capabilities and freedom of
action in space; dissuade or deter others from impeding those rights or
developing capabilities intended to do so; take those actions necessary
to protect its space capabilities; respond to interference and deny, if
necessary, adversaries the use of space capabilities hostile to US national
interests.
-
8/12/2019 Conflict Foretold America and China
6/23
Conflict Foretold: America and China | 11
And, more ominously:
The United States will oppose the development of new legal regimes or
other restrictions that seek to prohibit or limit US access to or use of space.
Proposed arms control agreements or restrictions must not impair the
rights of the United States to conduct research, development, testing and
operations or other activities in space for US national interests.6
Perhaps unsurprisingly, this policy was received with less than rapture
by the rest of the world; one British newspaper summed up its signicance
with the words space: no longer the nal frontier but the 51st state of the
United States.7
For China, the 2006 policy was conrmation of a long-held conviction
that the United States was seeking to perpetuate its decisive advantage in
space as part of an eort to pursue absolute security, at the expense of other
states.8 Of particular concern to China was the United States 2001 with-
drawal from the Anti-Ballistic Missile Treaty as a prelude to developing
space-enabled anti-ballistic-missile systems. Beijing saw these systems not
as a purely defensive capability but rather as one which could be deployed,together with overwhelming US nuclear-missile capabilities and CPGS, to
neutralise Chinas much smaller nuclear arsenal. At a less existential level,
Beijing also saw missile defence as part of a US encirclement strategy which
would constrain Chinas room for manoeuvre within the Asia-Pacic gen-
erally, and in relation to Taiwan specically. This perception of threat is
further enhanced by annual US war games that include a space-warfare sce-
nario invariably involving China. Beijings nuclear policy has been one of
minimal deterrence, with a nuclear arsenal far smaller than that of either the
United States or Russia. A particular feature of Chinas nuclear approach
has been a consistent refusal to reveal the size and structure of this arsenal
as part of a strategy of ambiguity designed to raise doubts in the mind of
potential aackers about the possible existence of a second-strike capabil-
ity.9 In response to US behaviour seen as seeking to subvert the strategic
balance, China has expanded and modernised its arsenal, and has moved
in the direction of acquiring an unequivocal second-strike capability in the
-
8/12/2019 Conflict Foretold America and China
7/23
-
8/12/2019 Conflict Foretold America and China
8/23
Conflict Foretold: America and China | 13
tion of space-based minerals. And the importance of national prestige as
a driver for Chinas space programme cannot be overlooked. Beijing has
repeatedly emphasised the peaceful nature of this programme and has
long campaigned for an international treaty banning the development ofweapons in space.13But the dynamics of the security dilemma make it hard
for the United States to take such protestations at face value, as evidenced by
statements such as that contained in the 2003 US Department of Defenses
annual report to Congress:
Publicly, China opposes the militarization of space and seeks to prevent
or slow the development of anti-satellite (ASAT) systems and space-based
ballistic missile defences. Privately, however, Chinas leaders probably
view ASATS and oensive counterspace systems in general as well as
space-based missile defences as inevitabilities.14
More recently, a report by Project 2049 for the USChina Economic and
Security Review Commission stated:
Chinas space ambitions are in part peaceful in nature. Yet technologies
can also be used with ill-intent, and military applications of dual-use
space technology are a principal concern: space technology increases the
capacity of the PLA [Peoples Liberation Army] to project power vertically
into space and horizontally beyond its immediate periphery.15
The Project 2049 report does not, of course, represent the views of the
US administration, but is likely to prove inuential with key constituencies
within the US Congress.
The trajectory between China and the United States in relation to space
has not been uniformly downward. The revised National Space Policy
released by the Obama administration in 2010 appeared to represent a
softening of the uncompromising unilateralism of the George W. Bush
administration, particularly in terms of the formers expressed readiness to
consider proposals and concepts for arms control measures if they are equi-
table, eectively veriable, and enhance the national security of the United
-
8/12/2019 Conflict Foretold America and China
9/23
14 | Nigel Inkster
States and its allies.16 Relations between NASA and the China National
Space Administration, which had proceeded in a desultory fashion for
several years, appeared to receive a boost as a result of this apparent shift.
This, plus a climate of markedly reduced tension in the Taiwan Strait, brieyled to a sense that greater levels of cooperation in space might be possible.
But a Republican-dominated Congress has proven resistant to such ini-
tiatives. And the Obama administrations pivot into Asia at its outset
more a statement of strategic intent than a substantial transfer of military
resources combined with tensions in the South and East China Seas, and a
US decision to expand the provision of a missile shield to its key Asian allies
to protect against threats from North Korea, have collectively given rise to
greater levels of mutual distrust.
The conditions for the United States and China to achieve closer
approximation in the domain of space cooperation do not seem propitious.
A multilateral treaty banning space weapons seems a remote prospect,
not least because with relatively lile eort currently being devoted to
the development of such weaponry, the political urgency that drove the
USSoviet arms-control agenda is absent. But even without any kind of
treaty, it may be possible to achieve some measure of pragmatic coopera-tion, either at a bilateral or multilateral level, in respect of specic issues
that constitute an equal challenge for all spacefaring nations. Chief among
these is the problem of space debris now estimated to consist of over
20,000 items over four centimetres in diameter which is entirely uncon-
cerned about national interests in terms of its potential to cause damage.17
In September 2010, the EU produced a draft Code of Conduct for Outer
Space Activities which, inter alia, called on member states to establish pol-
icies and procedures to minimise the possibility of accidents in space ... or
any form of harmful interference with other States rights to the peaceful
exploration and use of outer space based on three principles: freedom
of access to space for peaceful purposes; preservation of the security and
integrity of space objects in orbit; and due consideration for the legitimate
defence interests of states.18
After initial reservations, Washington has now expressed interest in
taking this proposal forward. And the United States is the only country
-
8/12/2019 Conflict Foretold America and China
10/23
Conflict Foretold: America and China | 15
with the capacity to track space debris in a systematic manner. The code of
conduct would not be legally binding but, given the limited prospects for
any kind of treaty, it may represent the best way of securing some kind of
consensus on what represents acceptable state and non-state behaviourin space. Such a code might outlaw the further production of space debris,
as well as providing for advance notication of launches, planned satellite
orbital placements and scheduled space manoeuvres.19As in cyberspace,
such informal agreements may oer the only realistic way of establishing
some rules of the road in what otherwise seems destined to be an increas-
ingly contested domain.
Cyber
The relationship between the United States and China in respect of the cyber
domain is more complex than it is in relation to space, if only because of the
multifarious and complex nature of the former environment, whose stabil-
ity and integrity is far from guaranteed, and which is populated by a wide
array of actors and interest groups. The United States and China have in
practice emerged as the primary exponents of very dierent philosophi-
cal approaches towards the Internet, particularly on the issue of Internetgovernance. The United States has focused on network security, freedom
of expression on the Internet and the continuation of the multi-stakeholder
governance model, whereas China has become a leading exponent of infor-
mation security, a concept widely seen as conferring on states the right
to determine what Internet sites their populations may access. China has
argued consistently for a top-down government-centric governance model
under the global auspices of the United Nations, and recognition of the
concept of Internet sovereignty.20
From the Chinese perspective, cyberspace is perceived as another
domain in which the United States is seeking to preserve a globally domi-
nant position at the expense of other states, an appreciation which seems
at least partly based on the 2011 US Department of Defense Strategy for
Operating in Cyberspace and the US Air Force cyber-operations concept,
which was summed up by then US Secretary for the Air Force Michael
Wynne in a 2006 speech entitled Cyberspace as a Domain in Which the
-
8/12/2019 Conflict Foretold America and China
11/23
16 | Nigel Inkster
Air Force Flies and Fights.21Chinas concerns span a wide spectrum, start-
ing with a continuing conviction that the United States may seek to exploit
its perceived control of global Internet architecture to deny China access to
the Internet, a suspicion seemingly based on a widespread but mistakenperception that the Internet is controlled by 13 so-called root servers,
all located in the United States, Japan or Western Europe. (The reality is
rather more complex and becoming more so).22Other concerns include a
sense of vulnerability arising out of continuing Chinese dependence on
US-designed hardware and software and, perhaps most important of all,
the conviction that the Internet serves as a vector for spreading hostile
propaganda which challenges the legitimacy of the Chinese Communist
Party, much of it emanating from the United States and its key Western
allies.23 Nor is China remotely persuaded by US advocacy of Internet
freedom. As Deputy Chief of the General Sta Lieutenant-General Qi
Jianguo observed in a recent article in Study Times:
Cybersecurity concerns national sovereignty as well as the security of
economic and social operations, and it concerns the quality of human
existence. The Wests so-called internet freedom actually is a type
of cyber-hegemony. In the information era, seizing and maintaining
superiority in cyberspace is more important than seizing command of the
sea and command of the air were in World War II.24
Chinas suspicions of US intentions in cyberspace have only been rein-
forced by the revelations of former Booz Allen Hamilton contractor Edward
Snowden about the scope of NSA and GCHQ coverage of global Internet
trac. An article in the 1 August edition of the Chinese Communist Party
theoretical journal Qiushiillustrates the extent of these suspicions:
The Internet was originally developed by US academia and was then taken
up by the military. Once the technology was mature, the United States
encouraged global informatisation and the spread of the Internet and got
other states commied to hitching a long-term ride on US networks. The
same thing happened with the international nancial system originally
-
8/12/2019 Conflict Foretold America and China
12/23
Conflict Foretold: America and China | 17
driven by the United States and the related US technology patents and
production standards, which were provided more or less free of charge
to other countries. Then, once the countries concerned had mainstreamed
these into their own economic systems they developed a reliance on these
systems which was exploited by the United States to obtain hegemonic
prots and to place these states in a position of dependency.25
The main area of current contention is the issue of cyber exploitation
operations or, more bluntly, cyber espionage. In particular, the United
States has for some while been publicising what have been described as
industrial-scale aacks on a wide range of US corporations, designed to
access intellectual property and details of negotiating positions in respect of
specic contracts for which they are competing. Until relatively recently, the
US government line, while maintaining that the overwhelming majority of
these aacks emanated from China, had always stopped short of aributing
them to the Chinese state. But since 2012 the US government has become
more outspoken. In February 2013, the US security rm Mandiant released
a report identifying a specic building in Shanghai connected to Chinas
signals-intelligence agency, the Third Department of the PLA General Sta,as the source of many of the cyber intrusions directed against the United
States.26 It is unclear whether Mandiant consulted the US administration
before releasing its report but the possibility cannot be excluded. A month
later, US National Security Advisor Thomas Donilon, in a speech to the Asia
Society, talked of the sophisticated, targeted theft of business information
and proprietary technologies through cyber intrusions emanating from
China on an unprecedented scale. He highlighted the threat this posed to
international trade, the reputation of Chinas own industries and overall
Sino-American relations, and called upon Beijing to desist.27The issue was
subsequently raised directly with the highest levels of Chinas leadership,
rstly during a telephone conversation between President Barack Obama
and President Xi Jinping, and shortly thereafter during Secretary of the
Treasury Jack Lews March 2013 visit to Beijing.28On 22 March, during a
trip to the same city, Chairman of the US Joint Chiefs of Sta General Martin
Dempsey and PLA Chief of Sta General Fang Fenghui agreed to unspeci-
-
8/12/2019 Conflict Foretold America and China
13/23
18 | Nigel Inkster
ed cooperation on cyber security though Fang warned that progress
would not be swift.29
The public response of the Chinese government and media was to deny
all allegations and highlight the extent to which China was the victim ofcyber aacks, many emanating from the United States.30Beijing reiterated
the need for international agreement on the regulation of cyberspace, while
the United States argued for an agreement on norms of behaviour: not a new
treaty which could prove hard to negotiate, given the number of stake-
holders involved but rather a set of pragmatic arrangements based on the
presumption of the applicability of existing international law to the cyber
domain.31Neither of these apparent initiatives actually represents a depar-
ture from pre-existing positions, and it remains to be seen whether raising
the issue to the highest level will generate any disposition towards compro-
mise. China is resistant to US arguments that large-scale, state-sponsored
industrial espionage cannot be seen in the same light as normal state-on-
state espionage, and is profoundly sceptical of the US governments claims
that it does not undertake industrial espionage.32
The US decision to escalate the cyber espionage issue coincided with
an escalation of tensions on the Korean Peninsula, bringing into starkfocus the prospect that China might nd itself being drawn inadvertently
into direct conict with the United States as a result of North Koreas
provocative and irresponsible behaviour behaviour which could just as
easily manifest itself in the cyber domain. South Korean banks and TV
stations were aacked during the latest upsurge in tensions, apparently
by North Korean actors using Chinese IP addresses.33 Meanwhile, the
Internet-freedom group Anonymous addressed some highly incendiary
remarks to the North Korean leadership, claiming that it had obtained
the passwords for North Koreas intranet and government websites, and
writing rst we gonna wipe your data, then we gonna wipe your badass
dictatorship government.34It is far from clear whether Anonymous had
in fact obtained the access it claimed to North Koreas intranet, and in the
event there was no resulting escalation. But it is not hard to imagine cir -
cumstances in which a South Korean cyber aack or activity by an entity
like Anonymous which North Korea might interpret as ventriloquised
-
8/12/2019 Conflict Foretold America and China
14/23
Conflict Foretold: America and China | 19
by the US government elicits a response which escalates into a North
Korean cyber aack, seemingly emanating from China, against US critical
infrastructure. Such escalation would appear to cross a US red line with
unpredictable consequences.More immediately, the United States has taken steps to mitigate a per-
ceived back-door threat from Chinese-manufactured ICT components via
a provision inserted into the 2013 Consolidated and Further Continuing
Appropriations Act. The provision requires either the FBI or the heads of
agencies considering the purchase of such equipment to approve the prod-
ucts by assessing any risks they may impose on government users and data,
and has predictably resulted in Chinese complaints of
protectionism and a degree of opposition from within
the United States own business community.35 The
US telecommunications company Sprint announced
that it would no longer use technology sourced from
the Chinese telecoms champion Huawei, which for
some time has been ghting an uphill bale to achieve a greater level of
access to US markets comparable to that which it has achieved in the United
Kingdom.36 China has contrasted the diculties faced by rms such asHuawei and ZTE in penetrating US markets with the pervasive access to
Chinese markets enjoyed by US rms Cisco many of whose products are
actually manufactured in China and Microsoft.
US concerns about the vulnerability of intellectual property have argu-
ably been a factor in recent initiatives by the Obama administration to
pursue free-trade agreements the USEU trade pact and the Trans-Pacic
Partnership from which China is excluded. One purpose of these agree-
ments, in which issues of government subsidies and intellectual-property
protection play a signicant part, is to set high global standards to which
China would be impelled to conform.37 In an era where the prospect of
securing the Doha Round appears to be rapidly receding, the pursuit of
alternative bilateral or multilateral free-trade agreements is far from irra-
tional. But the US initiatives have been characterised by Chinese ocials as
the United States trying to rewrite global trade rules behind our backs.38
Meanwhile, China appears to be trying to use a near-global monopoly on
China is resistant
to US arguments
-
8/12/2019 Conflict Foretold America and China
15/23
20 | Nigel Inkster
ICT components manufacture and its position as one of only three coun-
tries with the ability to provide end-to-end 4G communications systems to
secure de facto acceptance of Chinese engineering standards, thereby rein-
forcing its position in global telecommunications markets.China was quick to identify the importance of the cyber domain in modern
warfare, with Colonel Liang Qiao and Colonel Wang Xiangsui, authors of
the seminal text Unrestricted Warfare, identifying US dependence on cyber-
space as a vulnerability to be exploited asymmetrically.39The asymmetric
advantage initially enjoyed by China has eroded somewhat as its own mili-
tary has become increasingly network-enabled in pursuit of a mandate to
develop the capacity to ght local wars under informationised conditions.40
PLA cyber doctrine has witnessed an evolution linking electronic and cyber
warfare in a concept referred to as integrated network electronic warfare.
This initial concept has expanded to incorporate information warfare in an
idea termed information confrontation, whose purpose has been described
as follows:
In future hi-tech warfare, oensive operations will often necessitate
pre-emptive destruction of the enemys integrated baleeld command
and control; systems and warfare networks ... And to aack its state or
military communications hubs, nancial centers and C4ISR [command,
control, communications, computers, intelligence, surveillance and
reconnaissance] systems, so as to directly aect the enemys strategic
decision-making.41
The concept also appears to envisage the use of information to break an
opponents will becoming integrated into Chinas spectrum of capabilities
for more conventional military purposes. But the boom line is that the PLA
appears to view warfare within the cyber domain as an essential adjunct to
warfare in other areas rather than as a decisive capability that would render
warfare in other spheres superuous.
The US approach to cyber warfare is typically categorised, not least by
Chinese politicians and media, as inherently more aggressive than that of
China.42
Much is made of the fact that the United States was the rst country
-
8/12/2019 Conflict Foretold America and China
16/23
Conflict Foretold: America and China | 21
to set up a cyber command and, if accounts such as Confront and Conceal
by New York Times journalist David Sanger are to be taken at face value,
the rst nation to achieve physical damage as a result of action within the
cyber domain. Sangers reporting relates to the deployment of the Stuxnetvirus against the supervisory control and data acquisition systems con-
trolling Irans uranium-enrichment centrifuge cascades.43In fact in purely
military terms, the United States may to some extent be the victim of its own
rhetoric, combined with media hype and the justied perception that it
enjoys a decisive advantage in terms of cyber capabilities. The 2011 Strategy
for Operating in Cyberspace makes clear that the overwhelming focus of
the US Cyber Command is on defending US military networks from aack
with defence of civilian networks and critical infrastructure the respon-
sibility of the Department of Homeland Security.44Since the publication of
the strategy, a number of announcements have been interpreted mostly by
the US media as indicating that the Pentagons ambitions were more far-
reaching and more oensive in scope. The rst of these was a 12-page report
submied by the Department of Defense to Congress, as mandated under
the 2011 National Defense Authorization Act, which aracted headlines
such as Pentagon Conrms Military Action Is an Acceptable Response toCyber-Aacks.45A careful reading of that report suggests that such kinetic
responses would in fact be a reaction to aacks on forward-deployed mili-
tary systems rather than US domestic civilian systems.
A further example of exaggerated perception is the news, rst broken
in January 2013, that the US Cyber Command will undergo a signicant
expansion by the middle of the decade to comprise three components:
national mission forces to protect computer systems that undergird electri-
cal grids, power plants and other infrastructure deemed critical to national
and economic security; combat mission forces to help commanders abroad
plan and execute aacks or other oensive operations; and cyber protection
forces to fortify US Department of Defense networks.46Of the new teams to
be created, only 13 would have a remit to undertake oensive cyber opera-
tions overseas. Prior to that announcement, it transpired that President
Obama had signed Presidential Policy Directive 20, a classied document
which, in the words of unnamed ocials, establishes a broad and strict
-
8/12/2019 Conflict Foretold America and China
17/23
22 | Nigel Inkster
set of standards to guide the operations of federal agencies in confronting
threats in cyberspace.47Much of the reporting of this initiative focused on
the classied nature of the document and the expectation that it heralded a
more aggressive US stance on cyber security, whereas the real story seemedto be one of allocating departmental responsibilities and authorisations in a
more systematic and clear-cut fashion.
The United States has asserted on more than one occasion that war
within the cyber domain is governed by the Law of Armed Conict. China
has objected to this assertion on the grounds that cyberspace cannot be con-
sidered a military domain. In the words of one Chinese scholar:
Cyberaacks, despite being acts of aggression, do not threaten territorial
integrity or sovereignty; there can be no neutrality in cyberspace since
aacks would undoubtedly transit through neutral countries networks;
it is impossible to distinguish between civilian and military assets; and
the proportionality requirement is much more dicult in cyberspace
because of the expanse and penetration of the Internet and the diculty
in containing unintended eects of aacks.48
Other Chinese scholars are more ambivalent, with some giving a cau-
tious welcome to the Tallinn Manual on the International Law Applicable to
Cyber Warfare, published in 2013 by a group of 20 legal scholars, as some-
thing which at least oers some basis for discussion.49
The reality is that for both China and the United States, cyber warfare
in its more apocalyptic portrayal seems far from an immediate prospect
since such conict would inevitably be a function of a more general war
between the two countries something which, at present, clearly neither
side wants. In particular, media images of a testosterone-fuelled US Cyber
Command belie the more sober reality of an entity that is still focused pri-
marily on protecting its own networks from aack in conditions of actual
military conict. The real issue is how to manage a situation of continu-
ous cyber skirmishing in circumstances where the Law of Armed Conict
cannot reasonably be said to apply a manifestation of the new era of con-
stant conict and confrontation described by General Rupert Smith.50
This
-
8/12/2019 Conflict Foretold America and China
18/23
Conflict Foretold: America and China | 23
is a situation in which no agreed ground rules currently apply. And there
can be no doubt that the signals-intelligence agencies of the United States
and China not to mention those of many other states are engaged in a
process of constant cyber contestation, although, in the short term, an asym-metry of vulnerabilities arising out of a disparity in levels of technological
sophistication may seem to be working to Chinas advantage. Perhaps more
than any other issue, the two countries have to manage the problems stem-
ming from the fact that cyber exploitation or cyber espionage has created
a climate of suspicion and uncertainty which has begun to infect the entire
Sino-American relationship, and which brings with it the potential for an
escalatory dynamic about which almost the only certainty is that it would
not be conned to that one domain.
But although the diculties of achieving an accommodation in the cyber
domain cannot be underestimated, neither should it be forgoen that the
United States and China have strong mutual interests in maintaining a robust
and hygienic Internet environment as a crucial adjunct to an open, rules-
based global trading and nancial system on which both equally depend.
Both are vulnerable to discontinuities in global supply chains arising from
disruptions in worldwide connectivity. Both have signicant problemswith cyber criminality and, potentially, cyber terrorism. And although the
Chinese government seeks greater control over information content on the
Internet, it has no more desire than the United States to cut itself o from the
rest of the world. The Chinese Internet may be emerging as a very distinctive
phenomenon no less informative and entertaining for that but it is not a
no-go area for the rest of the planet, and Chinas netizens are not deprived
of contact with the wider world. It is not inconceivable that both countries
could build on these strong shared interests to begin re-establishing some
of the trust that has been lost. Indeed, given the geostrategic importance of
USChina relations and their pre-eminence in the cyber domain, one could
argue that progress in key areas relating to cyber security might serve as a
benchmark for global standards of conduct. Potential areas for cooperation
might include: identication of those facets of Internet functionality which
are critical to the interests of both countries and the scope for bilateral coop-
eration to ensure them; a readiness to address escalatory risks in the cyber
-
8/12/2019 Conflict Foretold America and China
19/23
24 | Nigel Inkster
domain looking into the abyss and to begin developing mechanisms
and processes for evaluating and mitigating such risks; a commitment in
principle not to target or aack each others critical infrastructure with the
establishment of mechanisms to dene this and the undertaking of eortsto develop appropriate verication and condence-building measures; and
a readiness to explore other ways in which mutual cyber activity might be
contained within what both parties regard as acceptable limits.
* * *
It should be borne in mind that Sino-American relations remain very far
from the hostility and confrontation which characterised the relationship
between the United States and the Soviet Union during much of the Cold
War. (It should not be forgoen that only two years before President Mikhail
Gorbachev inaugurated an era of dtente, Soviet leaders had convinced
themselves that the United States was planning to launch a nuclear rst
strike.) Levels of engagement and mutuality of interests are of a completely
dierent order of magnitude from anything achieved during the Cold War,
and relations are far more complex and nuanced. But the Sino-Americanrelationship has to be seen in terms of a dynamic involving one power in
relative decline, though still globally pre-eminent, coming to terms with
another which is rapidly rising and naturally driven to challenge the status
quo imposed and policed by the former. It must also be viewed in light of
two guiding political philosophies that are more or less in polar opposition
to one another. Even in the best of circumstances, this would be a recipe
for tension and competition, exacerbated by the chronic inability of each
states policymakers to see the world from the others perspective. Left unat-
tended, competition in key areas such as space and cyberspace have the
capacity to act as catalysts driving the relationship in an undesirable direc-
tion. Some degree of competition in these domains is inevitable and not
necessarily malign, especially if it drives scientic and technical innovation
with a capacity to benet humanity as a whole. But if the relationship is to
avoid becoming the chronicle of a death foretold, both parties will need to
demonstrate greater self-awareness than either has yet shown.
-
8/12/2019 Conflict Foretold America and China
20/23
Conflict Foretold: America and China | 25
1 John H. Herz, Idealist
Internationalism and the Security
Dilemma, World Politics, vol. 2, no. 2,January 1950.
2 Ken Booth and Nicholas Wheeler, The
Security Dilemma: Fear, Cooperation and
Trust in World Politics(Basingstoke:
Palgrave Macmillan, 2007).3 Robert Jervis, Perception and
Misperception in International Politics
(Princeton, NJ: Princeton University
Press, 1976), pp. 58113.4 Michael Barne and Emanuel Adler,
Studying Security Communities in
Theory, Comparison, and History,
in Emanuel Adler and Michael
Barne (eds), Security Communities
(Cambridge: Cambridge University
Press, 1998).5 Aaron L. Friedberg,A Contest for
Supremacy: China, America, and the
Struggle for Mastery in Asia(New York:W.W. Norton & Company, 2011), p. 1.
6 The White House, U.S. National Space
Policy, 31 August 2006, hp://www.
fas.org/irp/odocs/nspd/space.pdf.7 Bronwen Maddox, America Wants
It All: Life, the Universe and
Everything, Times, 19 October 2006.8 Sha Zukang, US Missile Defence Plans:
Chinas View, Disarmament Diplomacy,
no. 43, JanuaryFebruary 2000.9 Li Bin, China and Nuclear
Transparency, in Nicholas Zarimpas
(ed.), Transparency in Nuclear Warheads
and Materials: The Political and
Technical Dimensions(Oxford: Oxford
University Press, 2003).10 IISS, The Military Balance 2013
(Abingdon: Routledge for the IISS,
2013), p. 253.
11 Charles R. Lister, US Missile Defence
and Space Security: A Security
Dilemma for China?, e-InternationalRelations, 18 March 2011, hp://
www.e-ir.info/2011/03/18/american-
missile-defence-and-space-security-a-
security-dilemma-for-china/.12 Will China Launch an Anti-Satellite
Test Soon?, Space.com, 4 January
2013, hp://www.space.com/19137-
china-anti-satellite-launch-test.html.13 Russia and China Introduce
Draft Treaty on Space Weapons,
Disarmament Diplomacy, no. 66,
September 2002.14 US Department of Defense, Annual
Report on the Military Power of the
Peoples Republic of China, 28 July
2003, p. 36, hp://www.defense.gov/
pubs/2003chinaex.pdf.15 Mark A. Stokes and Dean Cheng,
Chinas Evolving Space Capabilities:Implications for U.S. Interests,
Project 2049 Institute, 26 April 2012,
hp://project2049.net/documents/
uscc_china-space-program-report_
april-2012.pdf.16 The White House, National Space
Policy of the United States of America,
28 June 2010, p. 7, hp://www.
whitehouse.gov/sites/default/les/
national_space_policy_6-28-10.pdf.17 NASA, Space Debris and Human
Spacecraft, hp://www.nasa.gov/
mission_pages/.18 Council of the European Union, Code
of Conduct for Outer Space Activities,
11 October 2010, p. 7, hp://www.con-
silium.europa.eu/uedocs/cmsUpload/
st14455.en10.pdf.
19 Ibid.
Notes
-
8/12/2019 Conflict Foretold America and China
21/23
26 | Nigel Inkster
20 Information Oce of the State
Council, The Internet in China, 8
June 2010, hp://english.gov.cn/2010-
06/08/content_1622956_6.htm; Xiang
Jun, Wangluo Zhuquan Ye Shi GuojiaZhuquan,Jiefangjun Bao, 16 January
2013.21 Michael W. Wynne, Cyberspace
as the Domain in Which the Air
Force Flies and Fights, remarks to
the C4ISR Integration Conference
on 2 November 2006,Air Force
Magazine, hp://www.airforcemag.
com/SiteCollectionDocuments/
Reports/2006/November/Day03/
Wynne110206.pdf; US Department
of Defense, Department of Defense
Strategy for Operating in Cyberspace,
June 2011, hp://www.defense.gov/
news/d20110714cyber.pdf.22 See Kim Davies, DNS Root Server
Locations, hp://kim.id.au/ja/root-
servers.png.
23 Wangluo Dianfu: Burong Xiaoqu DeAnquan Weixie,Jiefangjun Bao, 10
August 2009, hp://www.fyjs.cn/bbs/
read.php?tid=200214.24 Qi Jianguo, Qian Suo Weiyou De Da
Bianju: Dui Shijie Zhanlue Xingshi He
Woguo Anquan Huanjing De Renshi
Yu Sikao, 21 January 2013, Qiushi
Lilunwang, hp://www.qstheory.cn/
zywz/201301/t20130121_207019.htm.25 Guo Ji, Wangluo Buying Chengwei
Meiguo Baquan Xin Gongju, Qiushi, 3
August 2013, hp://www.szhgh.com/
article/news/news/201308/26569.html.26 Mandiant, APT1: Exposing One of
Chinas Cyber Espionage Units, 18
February 2013, hp://intelreport.mandi-
ant.com/Mandiant_APT1_Report.pdf.27 Thomas Donilon, The United
States and the Asia-Pacic in
2013, The White House Oce
of the Press Secretary, 11 March
2013, hp://www.whitehouse.gov/
the-press-oce/2013/03/11/remarks-
tom-donilon-national-security-advi-sory-president-united-states-a.
28 Jonathan Kaiman, Chinese President
Xi Jinping Tackles Cyber-aacks
in First US Talks, Guardian, 20
March 2013, hp://www.theguard-
ian.com/world/2013/mar/20/
chinese-president-xi-jinping-us-talks.29 Jane Perlez, U.S. and China Put
Focus on Cybersecurity, New York
Times, 22 April 2013, hp://www.
nytimes.com/2013/04/23/world/asia/
united-states-and-china-hold-military-
talks-with-cybersecurity-a-focus.
html?_r=1&.30 Chinas Cyber Security Under
Severe Threat: Report, Xinhua,
19 March 2013, hp://news.
xinhuanet.com/english/china/2013-
03/19/c_132246098.htm.31 China Says Cyber Space Needs
Rules and Cooperation, Not War,
Xinhua, 9 March 2013, hp://news.
xinhuanet.com/english/china/2013-
03/09/c_132220584.htm; Cynthia
Harvey, U.S. Calls on China to Stop
Cyberaacks, Datamation Magazine, 12
March 2013, hp://www.datamation.
com/news/u.s.-calls-on-china-to-stop-
cyberaacks.html.32 Qi Zhiping, Cyber Witch Hunt
Ignores Mote in Wests Own Eye,
Global Times, 2 April 2013, hp://www.
globaltimes.cn/content/772540.shtml#.
UhTTnUpGKiB.33 South Korea Blames North for Bank
and TV Cyber-Aacks, BBC, 10 April
2013, hp://www.bbc.co.uk/news/
technology-22092051.
-
8/12/2019 Conflict Foretold America and China
22/23
Conflict Foretold: America and China | 27
34 Jack Taylor, Anonymous Declares
Cyber-war on North Korea, VR-Zone,
5 April 2013, hp://vr-zone.com/
articles/anonymous-declares-cyber-
war-on-north-korea/19498.html.35 Danielle Walker, China Unhappy
with New U.S. Requirement that
Its IT Gear Must Face Review,
SC Magazine, 1 April 2013, hp://
www.scmagazine.com/china-
unhappy-with-new-us-requirement-
that-its-it-gear-must-face-review/
article/287010/#.36 For an account of Huaweis eorts to
penetrate the US market, see Eric C.
Anderson, Sinophobia: The Huawei Story
(CreateSpace, 2013), Kindle edition.37 Geo Dyer, China Left Out of Obama
Free Trade Party, Financial Times,
1 April 2013, hp://www.ft.com/
cms/s/0/c9f5046a-9ae9-11e2-b982-
00144feabdc0.html#axzz2ccHRsNtc.38 Ibid.39
Liang Qiao and Xiangsui Wang,Unrestricted Warfare: Chinas Master
Plan to Destroy America(Los Angeles,
CA: Pan American Publishing, 2002).40 Warfare under informationised con-
ditions is that which is reliant on
ICT-enabled networks.41 Zeng Pingshun, Xiandai Xinxi
Duikang: Wangdian Yitizhan,
Jiefangjun Bao, 7 September 2004,
hp://www.chinamil.com.cn/site1/
ztpd/2004-09/07/content_4731.htm.42 Meiguo Jundui De Heike Zai Gan
Shemma?, Xinhua, 20 February 2013.43 David E. Sanger, Confront and Conceal:
Obamas Secret Wars and Surprising Use
of American Power(New York: Crown
Publishers, 2012), Chapter 8.
44 US Department of Defense,
Department of Defense Strategy for
Operating in Cyberspace.45 Fahmida Y. Rashid, Pentagon
Conrms Military Action is anAcceptable Response to Cyber-
Aacks, eWEEK, 22 November 2011,
hp://www.eweek.com/c/a/Security/
Pentagon-Conrms-Military-Action-
is-an-Acceptable-Response-to-
CyberAacks-493894/.46 Ellen Nakashima, Pentagon
to Boost Cybersecurity Force,
Washington Post, 27 January
2013, hp://articles.wash-
ingtonpost.com/2013-01-27/
world/36583575_1_cyber-protection-
forces-cyber-command-cybersecurity.47 Ellen Nakashima, Obama Signs
Secret Directive to Help Thwart
Cyberaacks, Washington Post,
14 November 2012, hp://articles.
washingtonpost.com/2012-11-14/
world/35505871_1_networks-cyberat-tacks-defense.
48 Shi Haiming, a researcher at the
National University of Defense
Technology, quoted in Adam Segal,
China, International Law, and
Cyberspace, Diplomat, 8 October
2012, hp://thediplomat.com/
china-power/china-international-law-
and-cyberspace/.
49 Michael N. Schmi (ed.), Tallinn
Manual on the International
Law Applicable to Cyber Warfare
(Cambridge: Cambridge University
Press, 2013).50 Rupert Smith, The Utility of Force:
The Art of War in the Modern World
(London: Allen Lane, 2005), p. 1.
-
8/12/2019 Conflict Foretold America and China
23/23
28 | Nigel Inkster