China

Assessing Threats to U.S. Vital Interests

China

Nov 17, 2020 About an hour read

Threats China
The Heritage Foundation

Dean Cheng

The Asia region (also known as the Indo-Pacific region) hosts a variety of threats to the U.S. homeland and international common spaces as well as a general threat of regional war that stems from a handful of inter-state rivalries. Included in this range of threats is a growing and increasingly multifaceted set of threats from an increasingly powerful China. America’s forward-deployed military bases throughout the Western Pacific, five treaty allies, security partners in Taiwan and Singapore, and growing security partnership with India are keys to the U.S. strategic footprint in Asia, and all are threatened by China.

  • Taiwan faces a long-standing, well-equipped, purposely positioned, and increasingly active military threat from China;
  • Japan, Vietnam, and the Philippines, by virtue of maritime territorial disputes, are subject to paramilitary, military, and political pressure from China;
  • India is geographically positioned between two major security threats: Pakistan to its west and China to its northeast; and
  • Pakistan has an unresolved territorial dispute with China that is the cause of periodic tensions.

Threats to the Homeland

In the 2017 National Security Strategy, the Trump Administration made clear that it was shifting the focus of American security planning away from counterterrorism and back toward great-power competition. In particular, it noted that:

China and Russia challenge American power, influence, and interests, attempting to erode American security and prosperity. They are determined to make economies less free and less fair, to grow their militaries, and to control information and data to repress their societies and expand their influence….
These [and other such] competitions require the United States to rethink the policies of the past two decades—policies based on the assumption that engagement with rivals and their inclusion in international institutions and global commerce would turn them into benign actors and trustworthy partners. For the most part, this premise turned out to be false.1

China and Russia are seen as revisionist powers, but they pose very different challenges to the United States. The People’s Republic of China (PRC) has a far larger economy, as well as the world’s second-largest gross domestic product (GDP), and is intertwined in the global supply chain for crucial technologies, especially those relating to information and communications technology (ICT). As a result, it has the resources to support its comprehensive program of military modernization, which has been underway for more than two decades and spans the conventional, space, and cyber domains as well as weapons of mass destruction, including nuclear weapons.

At the same time, the PRC has been acting more assertively, even aggressively, against more of its neighbors. Unresolved border and territorial claims have led Beijing to adopt an increasingly confrontational attitude with regard to the South China Sea and India, and cross-Strait tensions have reemerged as a result of Beijing’s reaction to the Democratic Progressive Party’s victories in Taiwan’s 2016 and 2020 elections.

A May 2020 report from the U.S.–China Economic and Security Review Commission warned that China was undermining global health by using its influence at multilateral institutions “to exclude Taiwan from the international response to the [COVID-19] pandemic.” The report claimed that “China also intensified its multi-faceted pressure campaign against Taiwan. Chinese military aircraft crossed the median line of the Taiwan Strait three times in the early months of 2020, after only one such incursion in 2019.” It further noted that China conducted several provocative military exercises around the island and “continued its efforts to poach Taiwan’s remaining diplomatic allies as the virus spread.”2

Growing Conventional Capabilities. The Chinese People’s Liberation Army (PLA) remains one of the world’s largest militaries, but its days of having to rely on largely obsolescent equipment are in the past. Nearly two decades of officially acknowledged double-digit growth in the Chinese defense budget have resulted in a comprehensive modernization program that has benefited every part of the PLA. This has been complemented by improvements in Chinese military training and, at the end of 2015, the largest reorganization in the PLA’s history.3 The PLA’s overall size has shrunk, including a 300,000-person cut in the past two years, but its overall capabilities have increased as older platforms have been replaced with newer systems that are much more sophisticated.

A major part of the 2015 reorganization was the establishment of a separate ground forces headquarters and bureaucracy; previously, the ground forces had been the default service providing staffs and commanders. Now the PLA Army (PLAA), responsible for the PLA’s ground forces, is no longer automatically in charge of war zones or higher headquarters functions. At the same time, the PLAA has steadily modernized its capabilities, incorporating both new equipment and a new organization. It has shifted from a division-based structure toward a brigade-based one and has been improving its mobility, including heliborne infantry and fire support.4 These forces are increasingly equipped with modern armored fighting vehicles, air defenses, both tube and rocket artillery, and electronic support equipment.

The PLA Navy (PLAN) is Asia’s largest navy. Although the total number of ships has dropped, the PLAN has fielded increasingly sophisticated and capable multi-role ships. Multiple classes of surface combatants are now in series production, including the Type 055 cruiser and the Type 052C and Type 052D guided missile destroyers, each of which fields long-range surface-to-air (SAM) and anti-ship cruise missile systems, as well as the Type 054 frigate and Type 056 corvette.

The PLAN has similarly been modernizing its submarine force. Since 2000, the PLAN has consistently fielded between 50 and 60 diesel-electric submarines, but the age and capability of the force have been improving as older boats, especially 1950s-vintage Romeo-class boats, are replaced with newer designs. These include a dozen Kilo-class submarines purchased from Russia and domestically designed and manufactured Song and Yuan classes. All of these are believed to be capable of firing both torpedoes and anti-ship cruise missiles.5 The Chinese have also developed variants of the Yuan, with an air-independent propulsion (AIP) system that reduces the boats’ vulnerability by removing the need to use noisy diesel engines to recharge batteries.6

The PLAN has also been expanding its amphibious assault capabilities. The Chinese have announced a plan to triple the size of the PLA naval infantry force (their counterpart to the U.S. Marine Corps) from two brigades totaling 10,000 troops to seven brigades with 30,000 personnel.7 To move this force, the Chinese have begun to build more amphibious assault ships, including Type 071 amphibious transport docks.8 Each can carry about 800 naval infantrymen and move them to shore by means of four air-cushion landing craft and four helicopters.

Supporting these expanded naval combat forces is a growing fleet of support and logistics vessels. The 2010 PRC defense white paper noted the accelerated construction of “large support vessels.” It also specifically noted that the navy is exploring “new methods of logistics support for sustaining long-time maritime missions.”9 These include tankers and fast combat support ships that extend the range of Chinese surface groups and allow them to operate for more prolonged periods away from main ports. Chinese naval task forces dispatched to the Gulf of Aden have typically included such vessels.

The PLAN has also been expanding its naval aviation capabilities, the most publicized element of which has been a growing carrier fleet. This currently includes not only the Liaoning, purchased from Ukraine over a decade ago, but a domestically produced copy that is in workups. While both of these ships have ski jumps for their air wing, the Chinese are also building several conventional takeoff/barrier landing (CATOBAR) carriers (like American or French aircraft carriers) that will employ catapults and therefore allow their air complement to carry more ordnance and/or fuel.10

The PLAN’s land-based element is modernizing as well, with a variety of long-range strike aircraft, anti-ship cruise missiles, and unmanned aerial vehicles (UAVs) entering the inventory. In addition to more modern versions of the H-6 twin-engine bombers (a version of the Soviet/Russian Tu-16 Badger), the PLAN’s Naval Aviation force has added a range of other strike aircraft to its inventory. These include the JH-7/FBC-1 Flying Leopard, which can carry between two and four YJ-82 anti-ship cruise missiles, and the Su-30 strike fighter.

The PLA Air Force (PLAAF), with over 1,700 combat aircraft, is Asia’s largest air force. It has shifted steadily from a force focused on homeland air defense to one capable of power projection, including long-range precision strikes against both land and maritime targets. The PLAAF has over 700 fourth-generation fighters (comparable to the U.S. F-15/F-16/F-18). They include the domestically designed and produced J-10 as well as the Su-27/Su-30/J-11 system (comparable to the F-15 or F-18) that dominates both the fighter and strike missions.11 China is also believed to be preparing to field two stealthy fifth-generation fighter designs. The J-20 is the larger aircraft and resembles the American F-22 fighter. The J-31 appears to resemble the F-35 but with two engines rather than one. The production of advanced combat aircraft engines remains one of the greatest challenges to Chinese fighter design.

The PLAAF is also deploying increasing numbers of H-6 bombers, which can undertake longer-range strike operations, including operations employing land-attack cruise missiles. Like the American B-52 and Russian Tu-95, the H-6 is a 1950s-era design (copied from the Soviet-era Tu-16 Badger bomber), but the latest versions (H-6K) are equipped with updated electronics and engines and are made of carbon composites.

Equally important, the PLAAF has been introducing a variety of support aircraft, including airborne early warning (AEW), command and control (C2), and electronic warfare (EW) aircraft. These systems field state-of-the-art radars and electronic surveillance systems that allow Chinese air commanders to detect potential targets, including low-flying aircraft and cruise missiles, more quickly and gather additional intelligence on adversary radars and electronic emissions. In addition, more and more of China’s combat aircraft are capable of undertaking mid-air refueling, which allows them to conduct extended, sustained operations, and the Chinese aerial tanker fleet (based on the H-6 aircraft) has been expanding.

At the biennial Zhuhai Air Show, Chinese companies have displayed a variety of unmanned aerial vehicles that reflect substantial investments and research and development efforts. The surveillance and armed UAV systems include the Xianglong (Soaring Dragon) and Sky Saber systems. The 2019 U.S. Department of Defense (DOD) report on Chinese capabilities also reported that China had tested a cargo drone, the AT-200, capable of carrying 1.5 tons of cargo.12 Chinese UAVs have been included in various military parades over the past several years, suggesting that they are being incorporated into Chinese forces, and the 2018 DOD report on Chinese capabilities states that “China’s development, production and deployment of domestically-developed reconnaissance and combat UAVs continues to expand.”13

The PLAAF is also responsible for the Chinese homeland’s strategic air defenses. Its array of surface-to-air missile batteries is one of the largest in the world and includes the S-300 (SA-10B/SA-20) and its Chinese counterpart, the Hongqi-9 long-range SAM. In 2018, the Russians began to deliver the S-400 series of long-range SAMs to China. These missiles represent a substantial improvement in PLAAF air defense capabilities, as the S-400 has both anti-aircraft and anti-missile capabilities.14 China has deployed these SAM systems in a dense, overlapping belt along its coast, protecting the nation’s economic center of gravity. Key industrial and military centers such as Beijing are also heavily defended by SAM systems.

Unlike the U.S. military, China’s airborne forces are part of the PLAAF. The 15th Airborne Corps has been reorganized from three airborne divisions to six airborne brigades in addition to a special operations brigade, an aviation brigade, and a support brigade. The force has been incorporating indigenously developed airborne mechanized combat vehicles for the past decade, giving them more mobility and a better ability to engage armored forces.

Nuclear Capability. Chinese nuclear forces are the responsibility of the PLA Rocket Forces (PLARF), one of the three new services created on December 31, 2015. China’s nuclear ballistic missile forces include land-based missiles with a range of 13,000 kilometers that can reach the U.S. (CSS-4) and submarine-based missiles that can reach the U.S. when the submarine is deployed within missile range.

The PRC became a nuclear power in 1964 when it exploded its first atomic bomb as part of its “two bombs, one satellite” effort. In quick succession, China then exploded its first thermonuclear bomb in 1967 and orbited its first satellite in 1970, demonstrating the capability to build a delivery system that can reach the ends of the Earth. China chose to rely primarily on a land-based nuclear deterrent instead of developing two or three different basing systems as the United States did.

Furthermore, unlike the United States or the Soviet Union, China chose to pursue only a minimal nuclear deterrent. The PRC fielded only a small number of nuclear weapons, with estimates of about 90 intercontinental ballistic missiles (ICBMs).15 Its only ballistic missile submarine (SSBN) conducted relatively few deterrence patrols (perhaps none),16 and its first-generation SLBM, the JL-1, if it ever attained full operational capability had only limited reach. The JL-1’s 1,700-kilometer range makes it comparable to the first-generation Polaris A1 missile fielded by the U.S. in the 1960s.

Although it remained stable for several decades, China’s nuclear force has been part of its modernization effort. The result has been modernization and some expansion of the Chinese nuclear deterrent. The core of China’s ICBM force is the DF-31 series, a solid-fueled, road-mobile system, along with a growing number of longer-range, road-mobile DF-41 missiles that may already be in the PLA operational inventory. The DF-41 may be deployed with multiple independently targetable reentry vehicles (MIRVs).17 China’s medium-range nuclear forces have similarly shifted to mobile, solid-rocket systems so that they are both more survivable and more easily maintained.

Notably, the Chinese are expanding their ballistic missile submarine fleet. Replacing the one Type 092 Xia-class SSBN are perhaps six Type 094 Jin-class SSBNs, four of which are already operational. They will likely be equipped with the new, longer-range JL-2 SLBM.18 Such a system would give the PRC a “secure second-strike” capability, substantially enhancing its nuclear deterrent.

There is also some possibility that the Chinese nuclear arsenal now contains land-attack cruise missiles. The CJ-20, a long-range, air-launched cruise missile carried on China’s H-6 bomber, may be nuclear tipped, although there is not much evidence at this time that China has pursued such a capability. China is also believed to be working on a cruise missile submarine that, if equipped with nuclear cruise missiles, would further expand the range of its nuclear attack options.19

As a result of its modernization efforts, China’s nuclear forces appear to be shifting from a minimal deterrent posture (one suited only to responding to an attack and even then with only limited numbers) to a more robust but still limited deterrent posture. While the PRC will still likely field fewer nuclear weapons than either the United States or Russia, it will field a more modern and diverse set of capabilities than India, Pakistan, or North Korea, its nuclear-armed neighbors. If there are corresponding changes in doctrine, modernization will enable China to employ limited nuclear options in the event of a conflict.

In addition to strategic nuclear forces, the PLARF has responsibility for medium-range and intermediate-range ballistic missile (MRBM and IRBM) forces. These include the DF-21 and DF-26 missiles, the latter of which, with a range of approximately 4,000 kilometers, is “capable of ranging targets in the Indo-Pacific region” as far as away Guam and southern India.20 It is believed that Chinese missile brigades equipped with these systems may have both nuclear and conventional responsibilities, making any deployment from garrison much more ambiguous from a stability perspective. The expansion of these forces also raises questions about the total number of Chinese nuclear warheads.

Cyber and Space Capabilities. The major 2015 reorganization of the PLA included the creation of the PLA Strategic Support Force (PLASSF), which brings the Chinese military’s electronic warfare, network warfare (including cyber), and space warfare forces under a single service umbrella. Previously, these capabilities had been embedded in different departments across the PLA’s General Staff Department and General Armaments Department. By consolidating them into a single service, the PLA has created a Chinese “information warfare” force that is responsible for offensive and defensive operations in the electromagnetic and space domains.

Chinese network warfare forces have been identified as conducting a variety of cyber and network reconnaissance operations as well as cyber economic espionage. In 2014, the U.S. Department of Justice charged PLA officers from Unit 61398, then of the General Staff Department’s 3rd Department, with theft of intellectual property and implanting of malware in various commercial firms.21 Members of that unit are thought also to be part of “Advanced Persistent Threat-1,” a group of computer hackers believed to be operating on behalf of a nation-state rather than a criminal group. In 2020, the Department of Justice charged a number of PLA officers with one of the largest breaches in history, accusing them of stealing 147 million people’s credit ratings and records from Equifax.22

Chinese space capabilities gained public prominence in 2007 when the PLA conducted an anti-satellite (ASAT) test in low-Earth orbit against a defunct Chinese weather satellite. The test became one of the worst debris-generating incidents of the Space Age, with several thousand pieces of debris generated, many of which will remain in orbit for over a century. However, the PRC has been conducting space operations since 1970 when it first orbited a satellite. Equally important, Chinese counter-space efforts have been expanding steadily. The PLA has not only tested ASATs against low-Earth orbit systems, but is also believed to have tested a system designed to attack targets at geosynchronous orbit (GEO), approximately 22,000 miles above the Earth. As many vital satellites are at GEO, including communications and missile early-warning systems, China’s ability to target such systems constitutes a major threat.

The creation of the PLASSF, incorporating counter-space forces, reflects the movement of counter-space systems, including direct-ascent ASATs, out of the testing phase. A recent report from the U.S. National Air and Space Intelligence Center (NASIC) notes that Chinese units are now training with anti-satellite missiles.23

Threat of Regional War

Three issues, all involving China, threaten American interests and embody the “general threat of regional war” noted at the outset of this section: the status of Taiwan, the escalation of maritime and territorial disputes, and border conflict with India.

Taiwan. China’s long-standing threat to end the de facto independence of Taiwan and ultimately to bring it under the authority of Beijing—if necessary, by force—is both a threat to a major American security partner and a threat to the American interest in peace and stability in the Western Pacific.

After easing for eight years, tensions across the Taiwan Strait have resumed as a result of Beijing’s reaction to the outcome of Taiwan’s 2016 and 2020 presidential elections. Beijing has suspended most direct government-to-government discussions with Taipei and is using a variety of aid and investment efforts to draw away Taiwan’s remaining diplomatic partners.

Beijing has also significantly escalated its military activities directed at Taiwan. Chinese fighters, along with airborne early warning aircraft, have increased their exercises southwest of Taiwan, demonstrating a growing ability to conduct flexible air operations and reduced reliance on ground-based control.24 The PLA has also undertaken sustained joint exercises to simulate extended air operations, employing both air and naval forces.25 These activities have continued unabated in the wake of China’s struggle with the COVID-19 coronavirus and in some ways have even been intensified.26

Regardless of the state of the relationship at any given time, Chinese leaders from Deng Xiaoping and Mao Zedong to Xi Jinping have consistently emphasized the importance of ultimately reclaiming Taiwan. The island—along with Tibet—is the clearest example of a geographical “core interest” in Chinese policy. China has never renounced the use of force and continues to employ political warfare against Taiwan’s political and military leadership.

For the Chinese leadership, the failure to effect unification, whether peacefully or through the use of force, would reflect fundamental political weakness in the PRC. For this reason, China’s leaders cannot back away from the stance of having to unify the island with the mainland, and the island remains an essential part of the People’s Liberation Army’s “new historic missions,” shaping PLA acquisitions and military planning.

It is widely posited that China’s anti-access/area-denial (A2/AD) strategy—the deployment of an array of overlapping capabilities, including anti-ship ballistic missiles (ASBMs), submarines, and long-range cruise missiles, satellites, and cyber weapons—is aimed largely at forestalling American intervention in support of friends and allies in the Western Pacific, including Taiwan. By holding at risk key American platforms and systems (e.g., aircraft carriers), the Chinese seek to delay or even deter American intervention in support of key friends and allies, allowing the PRC to achieve a fait accompli. The growth of China’s military capabilities is oriented specifically toward countering America’s ability to help Taiwan defend itself.

Chinese efforts to reclaim Taiwan are not limited to overt military means. The “three warfares” highlight Chinese political warfare methods, including legal warfare/lawfare, public opinion warfare, and psychological warfare. The PRC employs such approaches to undermine both Taiwan’s will to resist and America’s willingness to support Taiwan. The Chinese goal would be to “win without fighting”—to take Taiwan without firing a shot or with only minimal resistance before the United States could organize an effective response.

Escalation of Maritime and Territorial Disputes. Because the PRC and other countries in the region see active disputes over the East and South China Seas not as differences regarding the administration of international common spaces, but rather as matters of territorial sovereignty, there exists the threat of armed conflict between China and American allies who are also claimants, particularly Japan and the Philippines.

Moreover, because its economic center of gravity is now in the coastal region, China has had to emphasize maritime power to defend key assets and areas. As the world’s foremost trading state, China increasingly depends on the seas for its economic well-being. Its factories are powered increasingly by imported oil, and its diets contain a growing percentage of imported food. Chinese products are moved to foreign markets by sea. Consequently, China not only has steadily expanded its maritime power, including its merchant marine and maritime law enforcement capabilities, but also has acted to secure the “near seas” as a Chinese preserve.

Beijing prefers to accomplish its objectives quietly and through nonmilitary means. In both the East and South China Seas, China has sought to exploit “gray zones,” gaining control incrementally and deterring others without resorting to the lethal use of force. It uses military and economic threats, bombastic language, and enforcement through legal warfare (including the employment of Chinese maritime law enforcement vessels) as well as military bullying. Chinese paramilitary-implemented, military-backed encroachment in support of expansive extralegal claims could lead to an unplanned armed clash.

Especially risky are the growing tensions between China and Japan and among a number of claimants in the South China Sea. In the former case, the most proximate cause is the dispute over the Senkakus. China has intensified its efforts to assert claims of sovereignty over the Senkaku Islands of Japan in the East China Sea. Beijing asserts both exclusive economic rights within the disputed waters and recognition of “historic” rights to dominate and control those areas as part of its territory.27 Chinese fishing boats (often believed to be elements of the Chinese maritime militia) and China Coast Guard (CCG) vessels have been encroaching steadily on the territorial waters within 12 nautical miles of the uninhabited islands. As of April 2020, there had been seven incidents in which CCG or other government vessels entered the waters around the Senkakus.28 In the summer of 2016, China deployed a naval unit (as opposed to CCG) into the area.29

Beijing’s 2013 declaration of an air defense identification zone (ADIZ) was just part of a broader Chinese pattern of using intimidation and coercion to assert expansive extralegal claims of sovereignty and/or control incrementally. In June 2016, a Chinese fighter made an “unsafe” pass near a U.S. RC-135 reconnaissance aircraft in the East China Sea area. In March 2017, Chinese authorities warned the crew of an American B-1B bomber operating in the area of the ADIZ that they were flying illegally in PRC airspace. In response to the incident, the Chinese Foreign Ministry called for the U.S. to respect the ADIZ.30 In May, the Chinese intercepted an American WC-135, also over the East China Sea.31 There have been no publicly reported ADIZ-related confrontations since then.

In the South China Sea, overlapping Chinese, Bruneian, Philippine, Malaysian, Vietnamese, and Taiwanese claims raise the prospect of confrontation. This volatile situation has led to a variety of confrontations between China and other claimants, as well as with Indonesia, which is not claiming territory or rights disputed by anyone but (occasionally) China.

2021_IndexOfUSMilitaryStrength_MAPS_02_0.gifDownload Map

China–Vietnam tensions in the region, for example, were once again on display early in 2020 when a CCG vessel reportedly rammed and sank a Vietnamese fishing boat near the disputed Paracel islands.32 Vietnam has also protested the Chinese decision to create additional administrative regions for the South China Sea, one centered on the Paracels and the other centered on the Spratlys.33 For Beijing, this is part of its legal and administrative “legal warfare” efforts to underscore China’s control of the South China Sea region.

Because of the relationship between the Philippines and the United States, tensions between Beijing and Manila are the most likely to lead to American participation. There have been a number of incidents going back to the 1990s. The most contentious occurred in 2012 when a Philippine naval ship operating on behalf of the country’s coast guard challenged private Chinese poachers in waters around Scarborough Shoal. The resulting escalation left Chinese government ships in control of the shoal. The Philippines then successfully challenged Beijing in the Permanent Court of Arbitration (PCA) regarding its rights under the U.N. Convention on the Law of the Sea (UNCLOS). There have been consistent concerns since 2016 that the Chinese intended to consolidate their gains in the area by reclaiming the sea around the shoal, but there is no indication that this has happened.

Since the election of Philippine President Rodrigo Duterte in 2016, there has been a general warming in China–Philippines relations. Meanwhile, U.S.–Philippines relations have worsened, most recently as a result of Duterte’s decision to serve notice on the abrogation of the Philippines Visiting Forces Agreement with the U.S. Against this backdrop, Duterte has generally sought to sideline the dispute with the Chinese over the South China Sea. While not accepting the authority of the PCA ruling that found against it, China has allowed Filipino fishermen access to areas around Scarborough Shoal in accordance with it.

In each of these cases, the situation is exacerbated by rising Chinese nationalism. In the face of persistent economic challenges, nationalist themes are becoming an increasingly strong undercurrent and affecting policymaking. Although the nationalist phenomenon is not new, it is gaining force and complicating efforts to maintain regional stability.

Governments may choose to exploit nationalism for domestic political purposes, but they also run the risk of being unable to control the genie that they have released. Nationalist rhetoric is mutually reinforcing, which makes countries less likely to back down. The increasing power that the Internet and social media provide to the populace, largely outside of government control, adds elements of unpredictability to future clashes. China’s refusal to accept the 2016 Permanent Court of Arbitration findings (which were overwhelmingly in favor of the Philippines) despite both Chinese and Philippine accession to UNCLOS is a partial reflection of such trends.

In case of armed conflict between China and the Philippines or between China and Japan, either by intention or as a result of an accidental incident at sea, the U.S. could be required to exercise its treaty commitments.34 Escalation of a direct U.S.–China incident is also not unthinkable. Keeping an inadvertent incident from escalating into a broader military confrontation would be difficult, particularly in the East and South China Seas, where naval as well as civilian law enforcement vessels from both China and the U.S. operate in what the U.S. considers to be international waters.

The most significant development in the South China Sea during the past three years has been Chinese reclamation and militarization of seven artificial islands or outposts. In 2015, President Xi promised President Barack Obama that China had no intention of militarizing the islands. That pledge has never been honored. As described by Admiral Harry Harris, Commander, U.S. Pacific Command, in his April 2017 posture statement to the Senate Committee on Armed Services:

China’s military-specific construction in the Spratly islands includes the construction of 72 fighter aircraft hangars—which could support three fighter regiments—and about ten larger hangars that could support larger airframes, such as bombers or special mission aircraft. All of these hangars should be completed this year. During the initial phases of construction China emplaced tank farms, presumably for fuel and water, at Fiery Cross, Mischief and Subi reefs. These could support substantial numbers of personnel as well as deployed aircraft and/or ships. All seven outposts are armed with a large number of artillery and gun systems, ostensibly for defensive missions. The recent identification of buildings that appear to have been built specifically to house long-range surface-to-air missiles is the latest indication China intends to deploy military systems to the Spratlys.35

There have been additional developments since the admiral’s statement,36 yet by 2019, the DOD’s annual report on the Chinese military found no new militarization,37 suggesting that it has been completed.

There is the possibility that China will ultimately declare an ADIZ above the South China Sea in an effort to assert its authority over the entire area.38 There are also concerns that in the event of a downturn in its relationship with the Philippines, China will move against vulnerable targets like Philippines-occupied Second Thomas Shoal or Reed Bank, where during 2019 a Chinese fishing boat rammed and sank a Philippine boat, causing a controversy in Manila. There is also consistent speculation in the Philippines about when the Chinese will start reclamation work at Scarborough. This development in particular would facilitate the physical assertion of Beijing’s claims and enforcement of an ADIZ, regardless of the UNCLOS award.

Border Conflict with India. The possibility of armed conflict between India and China, while currently remote, poses an indirect threat to U.S. interests because it could disrupt the territorial status quo and raise nuclear tensions in the region. A border conflict between India and China could also prompt Pakistan to try to take advantage of the situation, further contributing to regional instability.

Long-standing border disputes that led to a Sino–Indian war in 1962 have become a flashpoint again in recent years. In April 2013, the most serious border incident between India and China in over two decades occurred when Chinese troops settled for three weeks several miles inside northern Indian territory on the Depsang Plains in Ladakh. In September 2014, a visit to India by Chinese President Xi Jinping was overshadowed by another flare-up in border tensions when hundreds of Chinese PLA forces reportedly set up camps in the mountainous regions of Ladakh, prompting Indian forces to deploy to forward positions in the region. This border standoff lasted three weeks and was defused when both sides agreed to pull their troops back to previous positions.

In 2017, Chinese military engineers were building a road to the Doklam plateau, an area claimed by both Bhutan and China, and this led to a confrontation between Chinese and Indian forces, Bhutanese authorities having requested assistance from India. The crisis lasted 73 days; both sides pledged to pull back, but Chinese construction efforts in the area have continued.39 Improved Chinese infrastructure not only would give Beijing the diplomatic advantage over Bhutan, but also could make the Siliguri corridor that links the eastern Indian states with the rest of the country more vulnerable.

India claims that China occupies more than 14,000 square miles of Indian territory in the Aksai Chin along its northern border in Kashmir, and China lays claim to more than 34,000 square miles of India’s northeastern state of Arunachal Pradesh. The issue is also closely related to China’s concern for its control of Tibet and the presence in India of the Tibetan government in exile and Tibet’s spiritual leader, the Dalai Lama.

China is building up military infrastructure and expanding a network of road, rail, and air links in its southwestern border areas. To meet these challenges, the Indian government has also committed to expanding infrastructure development along the disputed border, although China currently holds a decisive military edge.

2021_IndexOfUSMilitaryStrength_CHARTS_04_0.gifDownload Chart

Threats to the Commons

The U.S. has critical sea, air, space, and cyber interests at stake in the East Asia and South Asia international common spaces. These interests include an economic interest in the free flow of commerce and the military use of the commons to safeguard America’s own security and contribute to the security of its allies and partners.

Washington has long provided the security backbone in these areas, and this has supported the region’s remarkable economic development. However, China is taking increasingly assertive steps to secure its own interests in these areas independent of U.S. efforts to maintain freedom of the commons for all in the region. Given this behavior, which includes the construction of islands atop previously submerged features, it cannot be assumed that China shares either a common conception of international space with the United States or an interest in perpetuating American predominance in securing international common spaces.

In addition, as China expands its naval capabilities, it will be present farther and farther away from its home shores. China has now established its first formal overseas military base, having initialed an agreement with the government of Djibouti in January 2017.

Dangerous Behavior in the Maritime and Airspace Common Spaces. The aggressiveness of China’s navy, maritime law enforcement forces, and air forces in and over the waters of the East China Sea and South China Sea, coupled with ambiguous, extralegal territorial claims and assertion of control there, poses an incipient threat to American and overlapping allied interests. Chinese military writings emphasize the importance of establishing dominance of the air and maritime domains in any future conflict.

Although the Chinese do not necessarily have sufficient capacity to deny the U.S. the ability to operate in local waters and airspace, the ability of the U.S. to take control in the early stages of a conflict at acceptable costs has become a matter of greater debate.40 As its capabilities have expanded, China not only has increasingly challenged long-standing rivals Vietnam and the Philippines, but also has increasingly begun to push toward Indonesia’s Natuna Islands as well as into Malaysian-claimed waters.

It is unclear whether China is yet in a position to enforce an ADIZ consistently, but the steady two-decade improvement of the PLAAF and PLAN naval aviation will eventually provide the necessary capabilities. Chinese observations of recent conflicts, including wars in the Persian Gulf, the Balkans, and Afghanistan, have emphasized the growing role of airpower and missiles in conducting “non-contact, non-linear, non-symmetrical” warfare.41 This growing parity, if not superiority, constitutes a radical shift from the Cold War era when the U.S., with its allies, clearly would have dominated air and naval operations in the Pacific.

Meanwhile, China has also begun to employ nontraditional methods of challenging foreign military operations in what Beijing sees as its territorial waters and airspace. It has employed lasers, for example, against foreign air and naval platforms, endangering pilots and sailors by threatening to blind them.42

Increasing Military Space Activities. One of the key force multipliers for the United States is its extensive array of space-based assets. Through its various satellite constellations, the U.S. military can track opponents, coordinate friendly forces, engage in precision strikes against enemy forces, and conduct battle-damage assessments so that its munitions are expended efficiently.

The American military is more reliant than many others on space-based systems because it is also an expeditionary military, meaning that its wars are conducted far from the homeland. Consequently, it requires global rather than regional reconnaissance, communications and data transmission, and meteorological information and support. At this point, only space-based systems can provide this sort of information on a real-time basis. No other country is capable of leveraging space as the U.S. does, and this is a major advantage, but this heavy reliance on space systems is also a key American vulnerability.

China fields an array of space capabilities, including its own navigation and timing satellites, the Beidou/Compass system, and has claimed a capacity to refuel satellites.43 It has three satellite launch centers and is constructing a fourth. China’s interest in space dominance includes not only accessing space, but also denying opponents the ability to do the same. As one Chinese assessment notes, space capabilities provided 70 percent of battlefield communications, over 80 percent of battlefield reconnaissance and surveillance, and 100 percent of meteorological information for American operations in Kosovo. Moreover, 98 percent of precision munitions relied on space for guidance information. In fact, “[i]t may be said that America’s victory in the Kosovo War could not [have been] achieved without fully exploiting space.”44

To this end, the PLA has been developing a range of anti-satellite capabilities that include both hard-kill and soft-kill systems. The former include direct-ascent kinetic-kill vehicles (DA-KKV) such as the system famously tested in 2007, but they also include more advanced systems that are believed to be capable of reaching targets in mid-Earth orbit and even geosynchronous orbit.45 The latter include anti-satellite lasers for either dazzling or blinding purposes.46 This is consistent with PLA doctrinal writings, which emphasize the need to control space in future conflicts. “Securing space dominance has already become the prerequisite for establishing information, air, and maritime dominance,” says one Chinese teaching manual, “and will directly affect the course and outcome of wars.”47

Soft-kill attacks need not come only from dedicated weapons, however. The case of Galaxy-15, a communications satellite owned by Intelsat Corporation, showed how a satellite could disrupt communications simply by always being in “switched on” mode.48 Before it was finally brought under control, it had drifted through a portion of the geosynchronous belt, forcing other satellite owners to move their assets and juggle frequencies. A deliberate such attempt by China (or any other country) could prove far harder to handle, especially if conducted in conjunction with attacks by kinetic systems or directed-energy weapons.

Most recently, China has landed an unmanned probe at the lunar south pole on the far side of the Moon. This is a major accomplishment because the probe is the first spacecraft ever to land at either of the Moon’s poles. To support this mission, the Chinese deployed a data relay satellite to Lagrange Point-2, one of five points where the gravity wells of the Earth and Sun “cancel out” each other, allowing a satellite to remain in a relatively fixed location with minimal fuel consumption. Although the satellite itself may or may not have military roles, its deployment highlights that China will now be using the enormous volume of cis-lunar space (the region between the Earth and Moon) for various deployments. This will greatly complicate American space situational awareness efforts, as it forces the U.S. to monitor a vastly greater area of space for possible Chinese spacecraft. The expected launch of the Chinese Chang’e-5 mission later in 2020, involving lunar sample retrieval (i.e., return to Earth), underscores the Chinese effort to move beyond Earth orbit to cis-lunar space.

Cyber Activities and the Electromagnetic Domain. In 2013, the Verizon Risk Center reported that “[s]tate-affiliated actors tied to China [were] the biggest mover in 2012. Their efforts to steal [intellectual property] comprise about one-fifth of all breaches in this dataset.”49 In addition:

96% of espionage cases [in 2012] were attributed to threat actors in China and the remaining 4% were unknown. This may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today.50

In a July 7, 2020, speech, FBI Director Christopher Wray underscored the continuing challenge posed by Chinese espionage, both cyber and traditional: “The greatest long-term threat to our nation’s information and intellectual property, and to our economic vitality, is the counterintelligence and economic espionage threat from China. It’s a threat to our economic security—and by extension, to our national security.” Chinese theft of intellectual property represents “theft on a scale so massive that it represents one of the largest transfers of wealth in human history.”51

Given the difficulties of attribution, country of origin should not necessarily be conflated with perpetrator, but forensic efforts have associated at least one Chinese military unit with cyber intrusions, albeit many years ago.52 Since the 2015 Xi–Obama summit where the two sides reached an understanding to reduce cyber economic espionage, Chinese cyber actions have shifted. The overall level of activity appears to be unabated, but the Chinese seem to have moved toward more focused attacks mounted from new sites.

China’s cyber-espionage efforts are often aimed at economic targets, reflecting the much more holistic Chinese view of both security and information. Rather than creating an artificial dividing line between military security and civilian security, much less information, the PLA plays a role in supporting both aspects and seeks to obtain economic intellectual property as well as military electronic information.

This is not to suggest that the PLA has not emphasized the military importance of cyber warfare. Chinese military writings since the 1990s have emphasized a fundamental transformation in global military affairs. Future wars will be conducted through joint operations involving multiple services rather than through combined operations focused on multiple branches within a single service. These future wars will span not only the traditional land, sea, and air domains, but also outer space and cyberspace. The latter two arenas will be of special importance because warfare has shifted from an effort to establish material dominance (characteristic of Industrial Age warfare) to establishing information dominance. This is due to the rise of the information age and the resulting introduction of information technology into all areas of military operations.

Consequently, according to PLA analysis, future wars will most likely be “local wars under informationized conditions.” That is, they will be wars in which information and information technology will be both widely applied and a key basis of victory. The ability to gather, transmit, analyze, manage, and exploit information will be central to winning such wars: The side that is able to do these things more accurately and more quickly will be the side that wins. This means that future conflicts will no longer be determined by platform-versus-platform performance and not even by system against system. Rather, conflicts are now clashes between rival arrays of systems of systems.53

Chinese military writings suggest that a great deal of attention has been focused on developing an integrated computer network and electronic warfare (INEW) capability. This would allow the PLA to reconnoiter a potential adversary’s computer systems in peacetime, influence opponent decision-makers by threatening those same systems in times of crisis, and disrupt or destroy information networks and systems by cyber and electronic warfare means in the event of conflict. INEW capabilities would complement psychological warfare and physical attack efforts to secure “information dominance,” which Chinese military writings emphasize as essential for fighting and winning future wars.

It is essential to recognize, however, that the PLA views computer network operations as part of information operations, or information combat. Information operations are specific operational activities that are associated with striving to establish information dominance. They are conducted in both peacetime and wartime, with the peacetime focus on collecting information, improving its flow and application, influencing opposing decision-making, and effecting information deterrence.

Information operations involve four mission areas:

  • Command and Control Missions. An essential part of information operations is the ability of commanders to control joint operations by disparate forces. Thus, command, control, communications, computers, intelligence, surveillance, and reconnaissance structures constitute a key part of information operations, providing the means for collecting, transmitting, and managing information.
  • Offensive Information Missions. These are intended to disrupt the enemy’s battlefield command and control systems and communications networks, as well as to strike the enemy’s psychological defenses.
  • Defensive Information Missions. Such missions are aimed at ensuring the survival and continued operation of information systems. They include deterring an opponent from attacking one’s own information systems, concealing information, and combating attacks when they do occur.
  • Information-Support and Information-Safeguarding Missions. The ability to provide the myriad types of information necessary to support extensive joint operations and to do so on a continuous basis is essential to their success.54

Computer network operations are integral to all four of these overall mission areas. They can include both strategic and battlefield network operations and can incorporate both offensive and defensive measures. They also include protection not only of data, but also of information hardware and operating software.

Computer network operations will not stand alone, however, but will be integrated with electronic warfare operations, as reflected in the phrase “network and electronics unified.” Electronic warfare operations are aimed at weakening or destroying enemy electronic facilities and systems while defending one’s own.55 The combination of electronic and computer network attacks will produce synergies that affect everything from finding and assessing the adversary to locating one’s own forces to weapons guidance to logistical support and command and control. The creation of the PLASSF is intended to integrate these forces and make them more complementary and effective in future “local wars under informationized conditions.”

Conclusion

Overall, China poses a diverse set of threats and challenges to the U.S., its allies and partners, and its interests in the Indo-Pacific. In both the air and maritime domains, China is ever more capable of challenging American dominance and disrupting the freedom of the commons that benefits the entire region. Territorial disputes related to what the U.S. and its allies consider the commons could draw the U.S. into conflict, as could accidental incidents. Although China probably does not intend to engage in armed conflict with its neighbors, particularly American treaty allies, or with the U.S., it will continue to press its territorial claims at sea in ways that, even if inadvertent, cause incidents that could escalate into broader conflict.

China has a large arsenal of nuclear weapons, multiple demonstrated and tested means of delivery, and mature systems, but it is a more stable actor than North Korea and has a variety of interests that include relations with the United States and its extensive interaction with the international system. In space, the PRC poses a challenge to the United States that is qualitatively different from the challenge posed by any other potential adversary in the post–Cold War environment. It is the first nation to be capable of accessing space on its own while also jeopardizing America’s ability to do the same.

Above all, however, China’s ongoing and sustained effort to penetrate foreign computer networks poses a major risk to Western security. The Chinese effort to dominate the 5G market only exacerbates this, because 5G will be the backbone for the next generation of telecommunications. The PLA emphasizes the need to suppress and destroy an enemy’s information systems while preserving one’s own, as well as the importance of computer and electronic warfare in both the offensive and defensive roles. Methods to secure information dominance would include establishing an information blockade; deception, including through electronic means; information contamination; and information paralysis.56 China sees cyber as part of an integrated capability both for achieving strategic dominance in the Western Pacific region and for influencing global perceptions and balances of power.

The Chinese threat to Taiwan is a long-standing one. China’s ability to execute a military action against Taiwan, albeit at high economic, political, and military cost, is improving, and its intent to unify Taiwan with the mainland under the full authority of the PRC central government and to end the island’s de facto independence has been consistent over time. With respect to India, the Chinese seem to use border tensions for limited diplomatic and political gain, and India responds in ways that are intended to contain minor incursions and maximize reputational damage to China. Despite limited aims, however, the unsettled situation and gamesmanship along the border could result in miscalculation, accidents, or overreaction.

This Index therefore assesses the overall threat from China, considering the range of contingencies, as “aggressive” for level of provocation of behavior and “formidable” for level of capability.

2021_IndexOfUSMilitaryStrength_ASSESSMENTS_Threats_CHINA.jpgDownload Assessment

Endnotes

  1. National Security Strategy of the United States of America, The White House, December 2017, pp. 2 and 3, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf (accessed June 11, 2020).
  2. Anastasia Lloyd-Damnjanovic, “Beijing’s Deadly Game: Consequences of Excluding Taiwan from the World Health Organization During the COVID-19 Pandemic,” U.S.–China Economic and Security Review Commission Issue Brief, May 12, 2020, pp. 1 and 2, https://www.uscc.gov/sites/default/files/2020-05/Beijings_Deadly_Game_Excluding_Taiwan_from_WHO_during_COVID-19_Pandemic.pdf (accessed June 9, 2020).
  3. Joel Wuthnow and Phillip C. Saunders, Chinese Military Reform in the Age of Xi Jinping: Drivers, Challenges, and Implications, National Defense University, Institute for National Strategic Studies, Center for the Study of Chinese Military Affairs, China Strategic Perspectives No. 10, March 2017, passim, https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/ChinaPerspectives-10.pdf (accessed June 10, 2020).
  4. U.S. Defense Intelligence Agency, China Military Power: Modernizing a Force to Fight and Win, 2019, pp. 58–60, https://www.dia.mil/Portals/27/Documents/News/Military%20Power%20Publications/China_Military_Power_FINAL_5MB_20190103.pdf (accessed June 10, 2020).
  5. Dennis Gormley, Andrew S. Erickson, and Jingdong Yuan, “A Potent Vector: Assessing Chinese Cruise Missile Developments,” Joint Force Quarterly No. 75 (4th Quarter 2014), pp. 98–105, https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-75/Article/577568/a-potent-vector-assessing-chinese-cruise-missile-developments/ (accessed June 10, 2020).
  6. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2017, p. 24, https://dod.defense.gov/Portals/1/Documents/pubs/2017_China_Military_Power_Report.PDF (accessed June 10, 2020).
  7. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, p. 35, https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf (accessed June 11, 2020).
  8. U.S. Defense Intelligence Agency, China Military Power: Modernizing a Force to Fight and Win, p. 70.
  9. Section II, “National Defense Policy,” in People’s Republic of China, Ministry of National Defense, White Paper 2010, http://eng.mod.gov.cn/publications/2017-04/11/content_4778206_2.htm (accessed June 10, 2020).
  10. Franz-Stefan Gady, “China’s New Aircraft Carrier to Use Advanced Jet Launch System,” The Diplomat, November 6, 2017, https://thediplomat.com/2017/11/chinas-new-aircraft-carrier-to-use-advanced-jet-launch-system/ (accessed June 10, 2020).
  11. International Institute for Strategic Studies, The Military Balance 2018: The Annual Assessment of Global Military Capabilities and Defence Economics (London: Routledge, 2018), pp. 249–259.
  12. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, p. 58.
  13. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2018, p. 34, https://media.defense.gov/2018/Aug/16/2001955282/-1/-1/1/2018-CHINA-MILITARY-POWER-REPORT.PDF (accessed June 10, 2020).
  14. Franz-Stefan Gady, “Russia Delivers 1st S-400 Missile Defense Regiment to China,” The Diplomat, April 3, 2018, https://thediplomat.com/2018/04/russia-delivers-1st-s-400-missile-defense-regiment-to-china/ (accessed June 10, 2020).
  15. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, pp. 44, 66, and 117.
  16. Andrew S. Erickson and Michael S. Chase, “China’s SSBN Forces: Transitioning to the Next Generation,” Jamestown Foundation China Brief, Vol. 9, Issue 12 (June 12, 2009), http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=35120#.U5G0OSjb5NQ (accessed June 10, 2020).
  17. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, p. 45.
  18. Ibid., p. 66.
  19. For more information on China’s cruise missile program, see Dennis M. Gormley, Andrew S. Erickson, and Jingdong Yuan, A Low-Visibility Force Multiplier: Assessing China’s Cruise Missile Ambitions (Washington: National Defense University Press, 2014), http://ndupress.ndu.edu/Portals/68/Documents/Books/force-multiplier.pdf (accessed June 10, 2020). Published by the NDU Press for the Center for the Study of Chinese Military Affairs, of the NDU’s Institute for National Strategic Studies.
  20. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, pp. 44, 45, 62, and 66.
  21. Press release, “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,” U.S. Department of Justice, May 19, 2014, https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor (accessed June 10, 2020).
  22. BBC News, “Equifax: US Charges Four Chinese Military Officers over Huge Hack,” February 11, 2020, https://www.bbc.com/news/world-us-canada-51449778 (accessed June 10, 2020).
  23. National Air and Space Intelligence Center, “Competing in Space,” December 2018, p. 21, https://media.defense.gov/2019/Jan/16/2002080386/-1/-1/1/190115-F-NV711-0002.PDF (accessed June 10, 2020).
  24. Al Jazeera, “Taiwan Air Force Scrambles Again to Warn off Chinese Jets,” March 16, 2020, https://www.aljazeera.com/news/2020/03/taiwan-airforce-scrambles-warn-chinese-jets-200317003712908.html (accessed June 10, 2020).
  25. Kristin Huang, “Chinese Air Force’s Drill ‘Aimed at Signalling Deterrent Around Taiwan,’” South China Morning Post, April 2, 2020, https://www.scmp.com/news/china/military/article/3077997/chinese-air-forces-drill-aimed-signalling-deterrent-around (accessed June 10, 2020).
  26. Erin Hale, “In Shadow of Coronavirus, China Steps up Manoeuvres Near Taiwan,” Al Jazeera, April 23, 2020, https://www.aljazeera.com/news/2020/04/shadow-coronavirus-china-steps-manoeuvres-taiwan-200422011542456.html (accessed June 10, 2020), and Yew Lun Tian and Ben Blanchard, “China Rattles Sabres as World Battles Coronavirus Pandemic,” Reuters, April 21, 2020, https://www.reuters.com/article/us-china-security/china-rattles-sabres-as-world-battles-coronavirus-pandemic-idUSKBN2230GC (accessed June 10, 2020).
  27. See Chapter 10, “The South China Sea Tribunal,” in Tufts University, The Fletcher School, Law of the Sea: A Policy Primer, https://sites.tufts.edu/lawofthesea/chapter-ten/ (accessed June 10, 2020).
  28. Kyodo News, “Japan Lodges Protests Against Chinese Maritime Intrusions Near Senkakus,” The Japan Times, April 22, 2020, https://www.japantimes.co.jp/news/2020/04/22/national/japan-protest-chinese-intrusions-senkakus/ (accessed June 10, 2020).
  29. Ankit Panda, “Japan Identifies Chinese Submarine in East China Sea: A Type 093 SSN,” The Diplomat, January 16, 2018, https://thediplomat.com/2018/01/japan-identifies-chinese-submarine-in-east-china-sea-a-type-093-ssn/ (accessed June 10, 2020); Howard Wang, “China vs. Japan: Is the East China Sea Showdown Back on?” The National Interest, June 7, 2019, https://nationalinterest.org/blog/buzz/china-vs-japan-east-china-sea-showdown-back-61492 (accessed June 10, 2020); and Ankit Panda, “China Patrol Ships Sustain Presence Near Senkaku Islands: Report,” The Diplomat, June 10, 2019, https://thediplomat.com/2019/06/china-patrol-ships-sustain-presence-near-senkaku-islands-report/ (accessed June 10, 2020).
  30. Jason Le Miere, “China Claims U.S. Military Plane ‘Illegally’ Entered Chinese Air Defense Zone,” Newsweek, March 24, 2017, http://www.newsweek.com/china-claims-us-military-plane-illegally-entered-chinese-air-defense-zone-573711 (accessed June 10, 2020).
  31. Hans Nichols and Courtney Kube, “Two Chinese Fighter Jets Intercept U.S. Plane over East China Sea, Officials Say,” NBC News, updated May 18, 2017, http://www.nbcnews.com/news/us-news/two-chinese-fighter-jets-intercept-u-s-plane-officials-say-n761931 (accessed June 10, 2020).
  32. Khanh Vu, “Vietnam Protests Beijing’s Sinking of South China Sea Boat,” Reuters, April 4, 2020, https://www.reuters.com/article/us-vietnam-china-southchinasea/vietnam-protests-beijings-sinking-of-south-china-sea-boat-idUSKBN21M072 (accessed June 10, 2020).
  33. NHK World, “Vietnam Protests Chinese Districts in S China Sea,” April 19, 2020, https://www.youtube.com/watch?v=TqiLnt2XDPM (accessed June 10, 2020), and Tsukasa Hadano and Tomoya Onishi, “Vietnam Protests China’s New South China Sea Districts,” Nikkei Asian Review, April 20, 2020, https://asia.nikkei.com/Politics/International-relations/Vietnam-protests-China-s-new-South-China-Sea-districts (accessed June 10, 2020).
  34. While it has long been a matter of U.S. policy that Philippine territorial claims in the South China Sea lie outside the scope of American treaty commitments, the treaty does apply in the event of an attack on Philippine “armed forces, public vessels or aircraft in the Pacific.” Mutual Defense Treaty Between the United States and the Republic of the Philippines, August 30, 1951, Article V, http://avalon.law.yale.edu/20th_century/phil001.asp (accessed June 10, 2020). In any event, Article IV of the treaty obligates the U.S. in case of such an attack to “meet the common dangers in accordance with its constitutional processes.” Regardless of formal treaty obligations, however, enduring U.S. interests in the region and perceptions of U.S. effectiveness and reliability as a check on growing Chinese ambitions would likely spur the U.S. to become involved.
  35. Admiral Harry B. Harris Jr., U.S. Navy, Commander, U.S. Pacific Command, statement “On U.S. Pacific Command Posture” before the Committee on Armed Services, U.S. Senate, April 27, 2017, p. 8, https://www.armed-services.senate.gov/imo/media/doc/Harris_04-27-17.pdf (accessed June 10, 2020).
  36. Center for Strategic and International Studies, Asia Maritime Transparency Initiative, “An Accounting of China’s Deployments to the Spratly Islands,” May 9, 2018, https://amti.csis.org/accounting-chinas-deployments-spratly-islands/ (accessed June 10, 2020).
  37. U.S. Department of Defense, Office of the Secretary of Defense, Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019, p. 75.
  38. Kelvin Chen, “China to Set up ADIZ in South China Sea,” Taiwan News, May 5, 2020, https://www.taiwannews.com.tw/en/news/3928503 (accessed June 10, 2020).
  39. Joel Wuthnow, Satu Limaye, and Nilanthi Samaranayake, “Doklam, One Year Later: China’s Long Game in the Himalayas,” War on the Rocks, June 7, 2018, https://warontherocks.com/2018/06/doklam-one-year-later-chinas-long-game-in-the-himalayas/ (accessed June 10, 2020).
  40. Gregory B. Poling, “The Conventional Wisdom on China’s Island Bases Is Dangerously Wrong,” War on the Rocks, January 10, 2020, https://warontherocks.com/2020/01/the-conventional-wisdom-on-chinas-island-bases-is-dangerously-wrong/ (accessed June 10, 2020), and J. Michael Dahm, “Beyond ‘Conventional Wisdom’: Evaluating the PLA’s South China Sea Bases in Operational Context,” War on the Rocks, March 17, 2020, https://warontherocks.com/2020/03/beyond-conventional-wisdom-evaluating-the-plas-south-china-sea-bases-in-operational-context/ (accessed June 10, 2020).
  41. “Building an Active, Layered Defense: Chinese Naval and Air Force Advancement,” interview with Andrew S. Erickson, National Bureau of Asian Research, September 10, 2012, https://www.nbr.org/publication/building-an-active-layered-defense-chinese-naval-and-air-force-advancement/ (accessed June 10, 2020).
  42. Patrick Cronin, “Countering China’s Laser Offensive,” The Diplomat, April 2, 2020, https://www.hudson.org/research/15883-countering-china-s-laser-offensive (accessed June 10, 2020).
  43. Xinhua, “China Announces Success in Technology to Refuel Satellites in Orbit,” June 30, 2016, http://www.china.org.cn/china/Off_the_Wire/2016-06/30/content_38784419.htm (accessed June 10, 2020).
  44. Mei Lianju, Space Operations Teaching Materials (Beijing, PRC: Academy of Military Sciences Publishing House, 2013), p. 65.
  45. See, for example, Brian Weeden, “Through a Glass, Darkly: Chinese, American, and Russian Anti-Satellite Testing in Space,” Secure World Foundation, March 17, 2014, https://swfound.org/media/167224/through_a_glass_darkly_march2014.pdf (accessed June 10, 2020).
  46. Ian Easton, “The Great Game in Space: China’s Evolving ASAT Weapons Programs and Their Implications for Future U.S. Strategy,” Project 2049 Institute, 2009, pp. 4–5, https://project2049.net/wp-content/uploads/2018/05/china_asat_weapons_the_great_game_in_space.pdf (accessed June 10, 2020).
  47. Mei Lianju, Space Operations Teaching Materials, p. 69.
  48. Peter B. de Selding, “Runaway Zombie Satellite Galaxy 15 Continues to Pose Interference Threat,” Space.com, October 15, 2010, http://www.space.com/9340-runaway-zombie-satellite-galaxy-15-continues-pose-interference-threat.html (accessed June 10, 2020).
  49. Verizon, 2013 Data Breach Investigations Report, p. 5, https://cybersecurity.idaho.gov/wp-content/uploads/sites/87/2019/04/data-breach-investigations-report-2013.pdf (accessed June 10, 2020).
  50. Ibid., p. 21. See also Elise Ackerman, “New Verizon Security Report Finds a Growing Number of Attacks by China’s Hacker Army,” Forbes, April 23, 2013, https://www.forbes.com/sites/eliseackerman/2013/04/23/new-verizon-security-report-finds-a-growing-number-of-attacks-by-chinas-hacker-army/#11429f622c49 (accessed June 10, 2020), and Lucian Constantin, “Verizon: One in Five Data Breaches Are the Result of Cyberespionage,” PC World, April 23, 2013, http://www.pcworld.com/article/2036177/one-in-five-data-breaches-are-the-result-of-cyberespionage-verizon-says.html (accessed June 10, 2020).
  51. Christopher Wray, Director, Federal Bureau of Investigation, “The Threat Posed by the Chinese Government and the Chinese Communist Party to the Economic and National Security of the United States,” remarks delivered as part of a Hudson Institute “Video Event: China’s Attempt to Influence U.S. Institutions,” Washington, DC, July 7, 2020, https://www.fbi.gov/news/speeches/the-threat-posed-by-the-chinese-government-and-the-chinese-communist-party-to-the-economic-and-national-security-of-the-united-states (accessed July 9, 2020).
  52. Dan McWhorter, “Mandiant Exposes APT1—One of China’s Cyber Espionage Units & Releases 3,000 Indicators,” FireEye, February 19, 2013, https://www.fireeye.com/blog/threat-research/2013/02/mandiant-exposes-apt1-chinas-cyber-espionage-units.html (accessed June 10, 2020).
  53. Bai Bangxi and Jiang Lijun, “‘Systems Combat’ Is Not the Same as ‘System Combat,’” China National Defense Newspaper, January 10, 2008, cited in Dean Cheng, “U.S.–China Competition in Space,” testimony before the Subcommittee on Space, Committee on Science, Space, and Technology, U.S. House of Representatives, September 27, 2016, p. 2, https://docs.house.gov/meetings/SY/SY16/20160927/105387/HHRG-114-SY16-Wstate-ChengD-20160927.pdf (accessed June 26, 2019).
  54. Guo Ruobing, Theory of Military Information Security (Beijing, PRC: National Defense University Publishing House, 2013), pp. 12–21.
  55. Tan Rukan, Building Operational Strength Course Materials (Beijing, PRC: Academy of Military Sciences Publishing House, 2012), p. 204.
  56. Yuan Wenxian, Joint Campaign Information Operations Teaching Materials (Beijing, PRC: National Defense University Press, 2009), pp. 109–112.