Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


James P. Micciche is a U.S. Army Strategist and Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Command and General Staff Officer Course student and can be found on Twitter @james_micciche. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China rises to become a Great Power and other nations lack the will to counter this rise via armed conflict, options below the level of armed conflict are required.

Date Originally Written:  July 20, 2020.

Date Originally Published:  September 21, 2020.

Author and / or Article Point of View:  The author believes the United States must increase its capability and efforts to compete with China below levels of armed conflict.

Background:  The 2017 National Security Strategy (NSS) specifically identifies China as a revisionist competing against the United States. The NSS describes the objectives of revisionist nations as, “contesting our geopolitical advantages and trying to change the international order in their favor[1].” Stephen Brooks and William Wohlforth identify China as the driving force of a systemic realignment, “the system has shifted from 1 superpower plus X great powers to 1+1+X, with China occupying a middle category as an emerging potential superpower[2].”

Significance:  China currently avoids directly challenging U.S. hegemony and instead utilizes two primary strategies to expand influence and advance objectives below levels of conflict.

The first strategy, “Three Warfares,” seeks “to break adversary resistance and achieve Chinese national objectives with little or no actual fighting[3].” The three “warfares” are public opinion, psychological operations, and legal warfare. The first two warfares attempt to dominate the information domain and the third warfare targets both international and national structures as a means to make them more conducive to Chinese objectives.

The second strategy uses China’s growing economic power to expand China’s political power.  This expansion is done through a combination of debt-laden investments, economic coercion, and predatory liberalism, which describes how China weaponizes market access to suppress public criticism from companies and nations alike[4].

These two strategies mutually support each other as predatory liberalism enables information dominance facilitating further coercive economic expansion enabling systemic changes to legal structures. Former National Security Advisor H.R. McMaster described this vanguard of Chinese expansion as “a delegation of bankers and party officials with duffel bags full of cash[5],” rather than the traditional military elements of national power associated with historical revisionist expansion. This paper will provide three options to degrade China’s capability and deter their will to execute the aforementioned strategies.

Option #1:  The United States resurrects previous capabilities in an effort to dominate the information environment.

China’s Three Warfares and economic programs are predicated upon dominance of the information environment which is “comprised of and aggregates numerous social, cultural, cognitive, technical, and physical attributes that act upon and impact knowledge, understanding, beliefs, world views, and, ultimately, actions of an individual, group, system, community, or organization[6].” The United States is unable to compete within this environment due to a lack of bureaucratic coherence and leadership[7]. In this option, the United States recreates an Information Age version of the United States Information Agency (USIA) empowering it not only to counter malign Chinese efforts but also potentially propagate messaging into China itself against an autocratic state that severely restricts external information access to its citizens.

Risk:  Establishing an empowered and aggressive USIA could lead to an increase in China’s use of psychological operations, sharp power, and media manipulation against the U.S. and other regional partners. There are also legal concerns regarding U.S. Government filters on speech, press, or information consumed by U.S. citizens.

Gain:  Reestablishing information dominance enhances U.S. soft power globally and fosters resiliency against Chinese manipulation both domestically and abroad. Gaining the capability to target domestic Chinese populations as a form of punitive deterrence restricts China’s aggression across the whole spectrum of competition.

Option #2:  The United States reestablishes and expands the Trans-Pacific Partnership (TPP) with nations throughout the Indo-Pacific region that excludes China.

This TPP 2.0 would specifically address intellectual property rights, Chinese foreign direct investment review processes, and provide smaller nations access to development funds through USAID, The World Bank, and similar organizations. TPP 2.0 would expand from the original 11 signatories to include India, the Philippines, and South Korea.

Risk:  By utilizing their quasi command economy and authoritarian state structure, China could attempt to take substantial economic losses to create an alternative structure to counter U.S. efforts. There might be apprehension from potential TPP 2.0 members due to the unilateral withdraw from TPP by the Trump administration in 2017 placing the United States at a disadvantage in negotiations.

Gain:  TPP 2.0 would provide preferential treatment to U.S. goods, thus increasing market access. It would improve the economies of small Indo-Pacific nations, fostering resiliency to Chinese economic coercion. TPP 2.0 would deny China access to benefits unless it discontinued intellectual property theft, predatory FDI practices, and other malign economic behaviors. Increased trade costs and potential exclusion would undercut much of the funding needed to complete Belt and Road Initiative (BRI) projects. TPP 2.0 enables the creation of alternate supply chains and offshoring options outside of China allowing U.S. firms to protect intellectual property while still reducing costs to U.S. consumers and remaining globally competitive.

Option #3:  The United States harasses and impedes China’s terrestrial expansion.

Chinese competition below levels of conflict includes land and sea-based building programs ranging from constructing artificial islands within the South China Sea to infrastructure projects associated with the BRI initiative. The United States could take overt and covert actions to drive up the costs of Chinese expansion. Overt efforts include funding local environmental and cultural heritage groups that oppose Chinese projects and foster local resistance, which increase regulatory or construction costs. Covert efforts include incentivizing maritime proxies to harass and impede the use of Chinese paramilitary maritime militia in the South China Sea.

Risk:  If direct U.S. funding of proxies becomes known, there could be irreversible damage to the United States’ reputation and advantages in soft power and the information domains. Funding or supporting proxies can lead to secondary support for nonstate actors that seek to destabilize regional partners as well as China. Any escalation in the South China Sea could lead to armed conflict.

Gain:  Increasing Chinese costs could severely restrict their capability to continue expansion and complete projects per agreements with host nations. Combining overt resistance campaigns with coordinated messaging enables the United States to degrade China’s soft and economic power. Directly confronting Chinese maritime militia with similarly designed forces presents a unique geopolitical challenge with few positive outcomes.

Other Comments:  These options are not mutually exclusive and can be utilized in conjunction with other elements of national power to support competition below levels of conflict.

Recommendation:  None.


Endnotes:

[1] Trump, Donald J., National Security Strategy of the United States of America. Executive Office of The President Washington DC Washington United States, 2017, 27

[2] Brooks, Stephen G., and William C. Wohlforth. “The rise and fall of the great powers in the twenty-first century: China’s rise and the fate of America’s global position.” International Security 40, no. 3 (2016): 7-53, 43

[3] Livermore, Doug. “China’s “Three Warfares” in theory and practice in the South China Sea.” Georgetown Security Studies Review (2018).

[4] Cha, Victor, and Andy Lim. “Flagrant Foul: China’s Predatory Liberalism and the NBA.” The Washington Quarterly 42, no. 4 (2019): 23-42.

[5] McMaster, H. R., “How China Sees the World,” The Atlantic, (2020), accessed April 22 2020, https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

[6] Joint Chiefs of Staff, Joint Concept for Operating in the Information Environment (JCOIE), Department of Defense, Washington DC (2018)

[7] Cobaugh, Paul, “Combat Ineffective: Ethical Influence, the Broken-down Rusting Vehicle of American Power” Narrative Strategies, (2020) accessed April 23 2020, https://www.narrative-strategies.com/failed-usg-influence