Assessing the Cognitive Threat Posed by Technology Discourses Intended to Address Adversary Grey Zone Activities

Zac Rogers is an academic from Adelaide, South Australia. Zac has published in journals including International Affairs, The Cyber Defense Review, Joint Force Quarterly, and Australian Quarterly, and communicates with a wider audience across various multimedia platforms regularly. Parasitoid is his first book.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Cognitive Threat Posed by Technology Discourses Intended to Address Adversary Grey Zone Activities

Date Originally Written:  January 3, 2022.

Date Originally Published:  January 17, 2022.

Author and / or Article Point of View:  The author is an Australia-based academic whose research combines a traditional grounding in national security, intelligence, and defence with emerging fields of social cybersecurity, digital anthropology, and democratic resilience.  The author works closely with industry and government partners across multiple projects. 

Summary:  Military investment in war-gaming, table-top exercises, scenario planning, and future force design is increasing.  Some of this investment focuses on adversary activities in the “cognitive domain.” While this investment is necessary, it may fail due to it anchoring to data-driven machine-learning and automation for both offensive and defensive purposes, without a clear understanding of their appropriateness. 

Text:  In 2019 the author wrote a short piece for the U.S. Army’s MadSci website titled  “In the Cognitive War, the Weapon is You![1]” This article attempted to spur self-reflection by the national security, intelligence, and defence communities in Australia, the United States and Canada, Europe, and the United Kingdom.  At the time these communities were beginning to incorporate discussion of “cognitive” security/insecurity in their near future threat assessments and future force design discourses. The article is cited in in the North Atlantic Treaty Organization (NATO) Cognitive Warfare document of 2020[2]. Either in ways that demonstrate the misunderstanding directly, or as part of the wider context in which the point of that particular title is thoroughly misinterpreted, the author’s desired self-reflection has not been forthcoming. Instead, and not unexpectedly, the discourse on the cognitive aspects of contemporary conflict have consumed and regurgitated a familiar sequence of errors which will continue to perpetuate rather than mitigate the problem if not addressed head-on.  

What the cognitive threat is

The primary cognitive threat is us[3]. The threat is driven by a combination of, firstly, techno-futurist hubris which exists as a permanently recycling feature of late-modern military thought.  The threat includes a precipitous slide into scientism which military thinkers and the organisations they populate have not avoided[4].  Further contributing to the threat is the commercial and financial rent-seeking which overhangs military affairs as a by-product of private-sector led R&D activities and government dependence on and cultivation of those activities increasingly since the 1990s[5].  Lastly, adversary awareness of these dynamics and an increasing willingness and capacity to manipulate and exacerbate them via the multitude of vulnerabilities ushered in by digital hyper-connectivity[6]. In other words, before the cognitive threat is an operational and tactical menace to be addressed and countered by the joint force, it is a central feature of the deteriorating epistemic condition of the late modern societies in which said forces operate and from which its personnel, funding, R&D pathways, doctrine and operating concepts, epistemic communities and strategic leadership emerge. 

What the cognitive threat is not   

The cognitive threat is not what adversary military organisations and their patrons are doing in and to the information environment with regard to activities other than kinetic military operations. Terms for adversarial activities occurring outside of conventional lethal/kinetic combat operations – such as the “grey-zone” and “below-the-threshold” – describe time-honoured tactics by which interlocutors engage in methods aimed at weakening and sowing dysfunction in the social and political fabric of competitor or enemy societies.  These tactics are used to gain advantage in areas not directly including military conflict, or in areas likely to be critical to military preparedness and mobilization in times of war[7]. A key stumbling block here is obvious: its often difficult to know which intentions such tactics express. This is not cognitive warfare. It is merely typical of contending across and between cross-cultural communities, and the permanent unwillingness of contending societies to accord with the other’s rules. Information warfare – particularly influence operations traversing the Internet and exploiting the dominant commercial operations found there – is part of this mix of activities which belong under the normal paradigm of competition between states for strategic advantage. Active measures – influence operations designed to self-perpetuate – have found fertile new ground on the Internet but are not new to the arsenals of intelligence services and, as Thomas Rid has warned, while they proliferate, are more unpredictable and difficult to control than they were in the pre-Internet era[8]. None of this is cognitive warfare either. Unfortunately, current and recent discourse has lapsed into the error of treating it as such[9], leading to all manner of self-inflicted confusion[10]. 

Why the distinction matters

Two trends emerge from the abovementioned confusion which represent the most immediate threat to the military enterprise[11]. Firstly, private-sector vendors and the consulting and lobbying industry they employ are busily pitching technological solutions based on machine-learning and automation which have been developed in commercial business settings in which sensitivity to error is not high[12]. While militaries experiment with this raft of technologies, eager to be seen at the vanguard of emerging tech; to justify R&D budgets and stave off defunding; or simply out of habit, they incur opportunity cost.  This cost is best described as stultifying investment in the human potential which strategic thinkers have long identified as the real key to actualizing new technologies[13], and entering into path dependencies with behemoth corporate actors whose strategic goal is the cultivation of rentier-relations not excluding the ever-lucrative military sector[14]. 

Secondly, to the extent that automation and machine learning technologies enter the operational picture, cognitive debt is accrued as the military enterprise becomes increasingly dependent on fallible tech solutions[15]. Under battle conditions, the first assumption is the contestation of the electromagnetic spectrum on which all digital information technologies depend for basic functionality. Automated data gathering and analysis tools suffer from heavy reliance on data availability and integrity.  When these tools are unavailable any joint multinational force will require multiple redundancies, not only in terms of technology, but more importantly, in terms of leadership and personnel competencies. It is evidently unclear where the military enterprise draws the line in terms of the likely cost-benefit ratio when it comes to experimenting with automated machine learning tools and the contexts in which they ought to be applied[16]. Unfortunately, experimentation is never cost-free. When civilian / military boundaries are blurred to the extent they are now as a result of the digital transformation of society, such experimentation requires consideration  in light of all of its implications, including to the integrity and functionality of open democracy as the entity being defended[17]. 

The first error of misinterpreting the meaning and bounds of cognitive insecurity is compounded by a second mistake: what the military enterprise chooses to invest time, attention, and resources into tomorrow[18]. Path dependency, technological lock-in, and opportunity cost all loom large if  digital information age threats are misinterpreted. This is the solipsistic nature of the cognitive threat at work – the weapon really is you! Putting one’s feet in the shoes of the adversary, nothing could be more pleasing than seeing that threat self-perpetuate. As a first step, militaries could organise and invest immediately in a strategic technology assessment capacity[19] free from the biases of rent-seeking vendors and lobbyists who, by definition, will not only not pay the costs of mission failure, but stand to benefit from rentier-like dependencies that emerge as the military enterprise pays the corporate sector to play in the digital age. 


Endnotes:

[1] Zac Rogers, “158. In the Cognitive War – The Weapon Is You!,” Mad Scientist Laboratory (blog), July 1, 2019, https://madsciblog.tradoc.army.mil/158-in-the-cognitive-war-the-weapon-is-you/.

[2] Francois du Cluzel, “Cognitive Warfare” (Innovation Hub, 2020), https://www.innovationhub-act.org/sites/default/files/2021-01/20210122_CW%20Final.pdf.

[3] “us” refers primarily but not exclusively to the national security, intelligence, and defence communities taking up discourse on cognitive security and its threats including Australia, the U.S., U.K., Europe, and other liberal democratic nations. 

[4] Henry Bauer, “Science in the 21st Century: Knowledge Monopolies and Research Cartels,” Journal of Scientific Exploration 18 (December 1, 2004); Matthew B. Crawford, “How Science Has Been Corrupted,” UnHerd, December 21, 2021, https://unherd.com/2021/12/how-science-has-been-corrupted-2/; William A. Wilson, “Scientific Regress,” First Things, May 2016, https://www.firstthings.com/article/2016/05/scientific-regress; Philip Mirowski, Science-Mart (Harvard University Press, 2011).

[5] Dima P Adamsky, “Through the Looking Glass: The Soviet Military-Technical Revolution and the American Revolution in Military Affairs,” Journal of Strategic Studies 31, no. 2 (2008): 257–94, https://doi.org/10.1080/01402390801940443; Linda Weiss, America Inc.?: Innovation and Enterprise in the National Security State (Cornell University Press, 2014); Mariana Mazzucato, The Entrepreneurial State: Debunking Public vs. Private Sector Myths (Penguin UK, 2018).

[6] Timothy L. Thomas, “Russian Forecasts of Future War,” Military Review, June 2019, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MJ-19/Thomas-Russian-Forecast.pdf; Nathan Beauchamp-Mustafaga, “Cognitive Domain Operations: The PLA’s New Holistic Concept for Influence Operations,” China Brief, The Jamestown Foundation 19, no. 16 (September 2019), https://jamestown.org/program/cognitive-domain-operations-the-plas-new-holistic-concept-for-influence-operations/.

[7] See Peter Layton, “Social Mobilisation in a Contested Environment,” The Strategist, August 5, 2019, https://www.aspistrategist.org.au/social-mobilisation-in-a-contested-environment/; Peter Layton, “Mobilisation in the Information Technology Era,” The Forge (blog), N/A, https://theforge.defence.gov.au/publications/mobilisation-information-technology-era.

[8] Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare, Illustrated edition (New York: MACMILLAN USA, 2020).

[9] For example see Jake Harrington and Riley McCabe, “Detect and Understand: Modernizing Intelligence for the Gray Zone,” CSIS Briefs (Center for Strategic & International Studies, December 2021), https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/211207_Harrington_Detect_Understand.pdf?CXBQPSNhUjec_inYLB7SFAaO_8kBnKrQ; du Cluzel, “Cognitive Warfare”; Kimberly Underwood, “Cognitive Warfare Will Be Deciding Factor in Battle,” SIGNAL Magazine, August 15, 2017, https://www.afcea.org/content/cognitive-warfare-will-be-deciding-factor-battle; Nicholas D. Wright, “Cognitive Defense of the Joint Force in a Digitizing World” (Pentagon Joint Staff Strategic Multilayer Assessment Group, July 2021), https://nsiteam.com/cognitive-defense-of-the-joint-force-in-a-digitizing-world/.

[10] Zac Rogers and Jason Logue, “Truth as Fiction: The Dangers of Hubris in the Information Environment,” The Strategist, February 14, 2020, https://www.aspistrategist.org.au/truth-as-fiction-the-dangers-of-hubris-in-the-information-environment/.

[11] For more on this see Zac Rogers, “The Promise of Strategic Gain in the Information Age: What Happened?,” Cyber Defense Review 6, no. 1 (Winter 2021): 81–105.

[12] Rodney Brooks, “An Inconvenient Truth About AI,” IEEE Spectrum, September 29, 2021, https://spectrum.ieee.org/rodney-brooks-ai.

[13] Michael Horowitz and Casey Mahoney, “Artificial Intelligence and the Military: Technology Is Only Half the Battle,” War on the Rocks, December 25, 2018, https://warontherocks.com/2018/12/artificial-intelligence-and-the-military-technology-is-only-half-the-battle/.

[14] Jathan Sadowski, “The Internet of Landlords: Digital Platforms and New Mechanisms of Rentier Capitalism,” Antipode 52, no. 2 (2020): 562–80, https://doi.org/10.1111/anti.12595.

[15] For problematic example see Ben Collier and Lydia Wilson, “Governments Try to Fight Crime via Google Ads,” New Lines Magazine (blog), January 4, 2022, https://newlinesmag.com/reportage/governments-try-to-fight-crime-via-google-ads/.

[16] Zac Rogers, “Discrete, Specified, Assigned, and Bounded Problems: The Appropriate Areas for AI Contributions to National Security,” SMA Invited Perspectives (NSI Inc., December 31, 2019), https://nsiteam.com/discrete-specified-assigned-and-bounded-problems-the-appropriate-areas-for-ai-contributions-to-national-security/.

[17] Emily Bienvenue and Zac Rogers, “Strategic Army: Developing Trust in the Shifting Strategic Landscape,” Joint Force Quarterly 95 (November 2019): 4–14.

[18] Zac Rogers, “Goodhart’s Law: Why the Future of Conflict Will Not Be Data-Driven,” Grounded Curiosity (blog), February 13, 2021, https://groundedcuriosity.com/goodharts-law-why-the-future-of-conflict-will-not-be-data-driven/.

[19] For expansion see Zac Rogers and Emily Bienvenue, “Combined Information Overlay for Situational Awareness in the Digital Anthropological Terrain: Reclaiming Information for the Warfighter,” The Cyber Defense Review, no. Summer Edition (2021), https://cyberdefensereview.army.mil/Portals/6/Documents/2021_summer_cdr/06_Rogers_Bienvenue_CDR_V6N3_2021.pdf?ver=6qlw1l02DXt1A_1n5KrL4g%3d%3d.

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Below Established Threshold Activities (BETA) Cyberspace Influence Operations Information Systems Zac Rogers

Options to Counter Russia’s Wagner Group in Africa

Benjamin Fincham-de Groot is a masters candidate at Deakin University pursuing his masters of international relations with a specialization in conflict and security. He can be found on twitter at @Finchamde. Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Russia’s Wagner Group, a Private Military Company, conducts military-like operations in Africa.  As a PMC, Wagner Group’s activities can be disavowed by the Russian government.  

Date Originally Written:  August 10, 2021.

Date Originally Published:  October 4, 2021.

Author and / or Article Point of View:  The author believes that Russia’s Wagner Group poses a threat to stability in Africa.  This article discusses options to project U.S. influence and protect American interests in the African theatre. 

Background:  Grey zone tactics are the use of civilian or non-military assets to achieve military or strategic objectives. These tactics are useful for state actors to use or project power while maintaining a plausible deniability that can minimise the chance of conflict escalation[1][2]. 

Broadly, there are two ways in which state actors work to effect change through grey zone tactics[3]. First, through grey zone tactics a state actor normalises transgressions through small violations that each create precedent to justify a greater violation[4]. Thus, whereas it would be unreasonable for one state actor to escalate to full-blown conflict over a freedom of navigation operation, or a lesser violation of airspace, each unanswered transgression creates precedent for greater transgression without repercussion.  One example is the steady escalation of Chinese military flight incursions into Taiwanese airspace[5]. Second, the fait accompli in which a state actor swiftly and suddenly achieves a strategic objective and positions near-peer rivals to choose between escalation and acceptance. This tactic can be pertinent to seizing an objective, extracting a person of interesting, or destroying an enemy asset.  

Antulio Echevarria believes that a key aspect of grey zone tactics has been ensuring that no transgression executed as a grey zone manoeuvre is so significant as to elicit a response from the North Atlantic Treaty Organization (NATO) under Article Five.  This article states that any attack on a NATO member state should be treated as an attack on all of them; and that any military attack should be responded to in kind. To stay below the Article Five threshold, grey zone tactics in Europe have primarily been used in the cyber-domain. That said, the definition of what constitutes an attack under Article Five is evolving and has grown to include transgressions in both space and cyber. 

Significance:  Africa is increasingly become a theatre for great power competition[6]. The United States has a well-established presence there, both military in nature and for peace-keeping operations. China is developing its ability to project power from Africa and within it, and has recently completed its first port capable of servicing Chinese aircraft carriers away from Chinese sovereign territory in Djibouti. 

Through 2018 and 2019, pursuant to President Omar Hassan al-Bashir being convicted by the International Criminal Court of war crimes, Sudan was isolated within the global community. It was Vladimir Putin’s Russia that came to Sudan’s aid in supporting Sudan through trade generally, but also supplying Sudan with a significant supply of weapons. Further, when pro-democracy protesters pushed for al-Bashir to step down, the Russian paramilitary contractors known as Wagner Group were unleashed on the protesters. 

While officially unaffiliated with Putin, the Russian military or any part of Russian intelligence, Wagner Group nonetheless have ties with Yevgeny Prigozhin, a Kremlin insider[7]. Thus, because of their ties with Prigorzhin and the Kremlin, the actions of Wagner group are considered to be simultaneously enacting the Kremlin’s agenda and projecting Russian power, while also operating as a private military contractor whose behaviour cannot be held against any given state. That is to say, it is a reasonable assumption that any and all actions taken by Wagner Group are on behalf of or towards the strategic goals of the Kremlin, but must be considered as being beneath the threshold of war as they are not representing a state at this time[8]. 

While primarily operating in Sudan, Wagner Group has been active throughout Africa[9]. Wagner Group uses both gray zone tactics described above, normalizing transgressions and fait accompli.  As such, America and their allies and partners allied state actors have two options available to them that would allow them to combat or minimise the impact that Wagner Group are having in the African theatre[10]. 

Option #1:  First, given that American forces are already deployed in the African theatre, it is reasonable that some troops can be repositioned.  If Wagner Group were to act on key strategic or humanitarian objectives, they would have to choose between escalating and initiating combat with American forces or abandoning those objectives[11]. As much as openly pursuing Wagner Group assets for their war crimes would be difficult to justify to the United Nations Security Council, and might be seen as the pursuit of Russian nationals; positioning assets to defend strategic objectives minimises the capacity for Wagner Group to achieve Russian strategic goals[12]. This is not to say that these repositioned American forces should patrol endlessly, but rather be positioned around key objectives such that Wagner Group assets must risk greater escalation and greater personal risk in pursuing those strategic objectives.

Risk:  This option risks an escalation of conflict between Wagner group assets and the American military. 

Gain:  This option deters of Wagner Group assets from achieving their strategic goals, and minimizing Russian power projection in Africa. 

Option #2:  The U.S. could deploy their own paramilitary contractors into the African theatre to counter Wagner Group.  These paramilitary contractors, similar to the ones the Americans deployed into Afghanistan and Iraq, could be used to provide strategic pressure, or engage in combat with Wagner Group assets in the event in efforts to maintain the security of key assets. Significantly, the deployment of paramilitary contractors in defense of American and humanitarian assets would reasonably be below any threshold for war, and be unlikely to escalate beyond that initial conflict.

Risk:  This option risks an escalation of conflict between Wagner Group and American-employed paramilitary contractors. 

Gain:  This option protectis humanitarian assets in the African theatre, minimising Russian power  projection, and demonstrating American investment in protecting Allied assets.  Through the utilization of paramilitary contractors, this also frees up the U.S. military to focus on other threats.

Other Comments:  Africa is increasingly a theatre for great power competition. With Russia and China pursuing very different avenues of projecting power onto that continent, America and its allies need to clarify what their goals and strategic aims are in that region; and to what lengths the West is willing to go to in order to pursue them. 

Recommendation:  None.


Endnotes:

[1] Mazarr, Michael J. Mastering the gray zone: understanding a changing era of conflict. US Army War College Carlisle, 2015.

[2] Banasik, Miroslaw. “Unconventional war and warfare in the gray zone. The new spectrum of modern conflicts.” Journal of Defense Resources Management (JoDRM) 7, no. 1 (2016): 37-46.

[3] Echevarria, Antulio. “Operating in the Grey Zone: An Alternative Paradigm for US Military Strategy.” Strategic Studies Institute, U.S. Army War College (2016). 

[4] Carment, David, and Dani Belo. War’s Future: The Risks and Rewards of GreyZone Conflict and Hybrid Warfare. Canadian Global Affairs Institute, 2018.

[5] Jackson, Van. “Tactics of strategic competition: Gray zones, redlines, and conflicts before war.” Naval War College Review 70, no. 3 (2017): 39-62.

[6] Port, Jason Matthew. “State or Nonstate: The Wagner Group’s Role in Contemporary Intrastate Conflicts Worldwide.” (2021).

[7] Marten, Kimberly. “Russia’s use of semi-state security forces: the case of the Wagner Group.” Post-Soviet Affairs 35, no. 3 (2019): 181-204.

[8] Rondeaux, Candace. Decoding the Wagner group: Analyzing the role of private military security contractors in Russian proxy warfare. New America., 2019.

[9] Benaso, Ryan. “Invisible Russian Armies: Wagner Group in Ukraine, Syria and the Central African Republic.” (2021).

[10] Belo, Dani. “Conflict in the absence of war: a comparative analysis of China and Russia engagement in gray zone conflicts.” Canadian Foreign Policy Journal 26, no. 1 (2020): 73-91.

[11] Gannon, J. Andrés, Erik Gartzke, Jon R. Lindsay, and Peter Schram. “The Shadow of Deterrence: Why capable actors engage in conflict short of war.” (2021).

[12] Rizzotti, Michael A. “Russian Mercenaries, State Responsibility, and Conflict in Syria: Examining the Wagner Group under International Law.” Wis. Int’l LJ 37 (2019): 569.

Africa Below Established Threshold Activities (BETA) Benjamin Fincham-de Groot Option Papers Private Military Companies (PMC etc) United States

Assessing Australia’s Cyber-Attack Attribution Issues


Jackson Calder is the Founder and CEO of JC Ltd., a futures modeling firm specialising in geopolitical risk advisory based in New Zealand, and holds a Masters of Strategic Studies from Victoria University of Wellington.  Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Australia’s Cyber-Attack Attribution Issues

Date Originally Written:  August 11, 2021.

Date Originally Published:  September 27, 2021.

Author and / or Article Point of View:  The author believes that without more proactive and novel thinking by decision makers, strategic competition in the grey-zone is likely to continue to outpace meaningful policy responses.

Summary:  Recent years have proven that China can prevail over Australia in the threshold below war, particularly through cyber-attacks that go without attribution. Without building trust between agencies, implementing the right training and education, and properly conceptualizing cyber warfare to bolster political will, Canberra will not strengthen attribution capabilities and achieve greater strategic agility in the cyber domain.

Text:  Making an official attribution of a cyber-attack is one of the key techno-political challenges faced by governments today. Using China-Australia tensions as a case study, one can analyse how capability gaps, technical expertise, and political will all play a role in shaping attribution and assess how one state prevails over another in the grey-zone of conflict below the threshold of war. Thus far Australia has favoured freeriding upon its more powerful allies’ attribution capability vis-à-vis China, rather than make attributions of its own[1]. Unless Canberra greatly expands its cyber security and attribution capabilities it will not accrue more agency, independence and, ultimately, strategic agility in this domain.

Over the past three years Australia has been the victim of numerous large-scale cyber campaigns carried out by China, targeting critical infrastructure, political parties, and service providers. While Australian Prime Minister Scott Morrison did state that a “sophisticated state-based actor” perpetrated these attacks, his government has thus far never made a public attribution to China[2]. Senior Australian officials have confirmed to media that they believe China is behind the attacks, raising questions around the lack of attribution[3].

Australia’s situation is representative of a wider strategic environment rife with frequent and sophisticated information operations, with China being a leading perpetrator of offensive cyber -attacks. Chinese hybrid warfare is undoubtedly inspired by Soviet political warfare dating back to the early 1920’s, but is perhaps grounded more in the concept of ‘unrestricted warfare’ posited by Liang and Xiangsui in 1999[4]. This concept manifested in the ‘Three Warfares’ doctrine of the early 2000’s, with offensive cyber operations being used as a key strategic tool since the PLA formed their Informatization Department in 2011[5]. Though described as ‘kinder weapons’, their ability to ‘strike at the enemy’s nerve center directly’ has indeed produced kinetic effects in recent years when used to sabotage critical infrastructure[6]. Whilst it is widely accepted that China is responsible for large-scale cyber operations, proving this can be a monumental task by virtue of cyber forensics being technically intensive and time-consuming.

In 2014, Thomas Rid and Ben Buchanan captured the nuance of cyber attribution excellently when they stated that ‘attribution is an art: no purely technical routine, simple or complex, can formalise, calculate, quantify, or fully automate attribution[7].’ While the art statement is true, technical routines exists to build attribution capability upon, and this is the crux of China’s prevailing over Australia in recent years. Canberra’s ‘freeriding’ on capabilities outside of the government and lack of streamlined inter-agency processes and accountability has severely limited their effectiveness in the cyber domain[8]. Attempts to remedy this have been made over the past two decades, with a number of agencies agreeing to communicate more and share responsibility for bringing an attribution forward, but they have been hamstrung by endemic underinvestment. Consequently, Australia’s response to a greatly increased threat profile in the cyber domain ‘has been slow and fragmented, thus ‘Australia’s play-book is not blank but it looks very different from those of pace-setter countries[9].’ 

Improving the speed and integrity of an attribution begins with ensuring that cyber security practitioners are not over-specialised in training and education. Though it may seem counterintuitive, evidence suggests that the most effective practitioners utilise general-purpose software tools more than others[10]. This means that organisational investment into specialised cyber security tools will not translate directly into improved capability without also establishing a training and work environment that pursues pragmatism over convoluted hyper-specialisation.

Attribution is less likely when there are low levels of trust between the government and civilian organisations involved in cyber security as this does not foster an operational environment conducive to the maturing of inter-agency responses. Trust is particularly important in Australia’s case in the relationship between more centralised intelligence agencies like the national Computer Emergency Response Team (CERT) based out of the Australian Cyber Security Centre and the civilian-run AusCERT. In 2017, Frank Smith and Graham Ingram addressed trust poignantly in stating that ‘the CERT community appears to have lacked the authority and funding needed to institutionalise trust – and thus depersonalise or professionalise it – enough to grow at scale[11].’ Trust between organisations, as well as between practitioners and the technology available to them, underpin the development of a robust and timely cyber security capability[12]. Without robust information sharing and clear lanes of responsibility failure will occur.

Attribution requires political will but competition in the cyber domain remains somewhat nebulous in its strategic conceptualisation, which constrains meaningful responses. If cyber war remains undefined, how do we know if we are in one or not[13]? Conceptualisation of the grey-zone as on the periphery of power competition, instead of at the centre of power competition itself, similarly confuses response thresholds and dampens political will. In 2016, James K. Wither stated that although information operations are non-kinetic, ‘the aim of their use remains Clausewitzian, that is to compel an opponent to bend to China’s will[14].’ Wither develops this point, arguing that within a rivalry dynamic where an ideological battle is also present, revisionist states wage hybrid warfare against the West ‘where, to reverse Clausewitz, peace is essentially a continuation of war by other means[15].’ Adopting this mindset is key to building political will, thus improving attribution external to technical capability. 

Finally, it is best to acknowledge Australia’s geopolitical environment may make attribution a less preferable course of action, even if a robust case is made. Foreign Minister Payne has stated that Australia ‘publicly attributes cyber incidents’ only ‘when it is in our interest to do so[16].’ Until attribution is tied to concrete consequences for the perpetrator, Canberra’s strategic calculus is likely to weigh potential Chinese economic and diplomatic retaliation as heavier than any potential benefits of making an official attribution. Nevertheless, it creates more options if Canberra possesses rapid and robust attribution capabilities, combined with political will to use them, to compete more effectively under the threshold of war.       


Endnotes:

[1] Chiacu, D., & Holland, S. (2021, July 19). U.S. and allies accuse China of global hacking spree. Retrieved from https://www.reuters.com/technology/us-allies-accuse-china-global-cyber-hacking-campaign-2021-07-19/

[2] Packham, C. (2020, June 18). Australia sees China as main suspect in state-based cyberattacks, sources say. Retrieved from https://www.reuters.com/article/us-australia-cyber-idUSKBN23P3T5

[3] Greene, A. (2021, March 17). China suspected of cyber attack on WA Parliament during state election. Retrieved from https://www.abc.net.au/news/2021-03-17/wa-parliament-targeted-cyber-attack/13253926

[4] Liang, Q., & Xiangsui, W. (1999). Unrestricted warfare. Beijing, CN: PLA Literature and Arts Publishing House Arts. https://www.c4i.org/unrestricted.pdf

[5] Raska, M. (2015). Hybrid Warfare with Chinese Characteristics. (RSIS Commentaries, No. 262). RSIS Commentaries. Singapore: Nanyang Technological University. https://hdl.handle.net/10356/82086 p.1.

[6] Liang, Q., & Xiangsui, W. (1999). Unrestricted warfare. Beijing, CN: PLA Literature and Arts Publishing House Arts. https://www.c4i.org/unrestricted.pdf p.27.

[7] Rid, T., & Buchanan, B. (2014). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. doi:10.1080/01402390.2014.977382 p.27.

[8] Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. doi:10.1080/10357718.2017.1320972 p.10.

[9] Joiner, K. F. (2017). How Australia can catch up to U.S. cyber resilience by understanding that cyber survivability test and evaluation drives defense investment. Information Security Journal: A Global Perspective, 26(2), 74-84. doi:10.1080/19393555.2017.1293198 p.1.

[10] Mcclain, J., Silva, A., Emmanuel, G., Anderson, B., Nauer, K., Abbott, R., & Forsythe, C. (2015). Human Performance Factors in Cyber Security Forensic Analysis. Procedia Manufacturing, 3, 5301-5307. doi:10.1016/j.promfg.2015.07.621 p.5306.

[11] Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. doi:10.1080/10357718.2017.1320972 p.14.

[12] Robinson, M., Jones, K., & Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & Security. 49. 70-94. 10.1016/j.cose.2014.11.007. p.48.

[13] Ibid, p.12.

[14] Wither, J. K. (2016). Making Sense of Hybrid Warfare. Connections: The Quarterly Journal, 15(2), 73-87. doi:10.11610/connections.15.2.06 p.78.

[15] Ibid, p.79.

[16] Payne, M. (2018, December 21). Attribution of Chinese cyber-enabled commercial intellectual property theft. Retrieved from https://www.foreignminister.gov.au/minister/marise-payne/media-release/attribution-chinese-cyber-enabled-commercial-intellectual-property-theft

Assessment Papers Australia Below Established Threshold Activities (BETA) Cyberspace Jackson Calder

Space, Climate, and Comprehensive Defense Options Below the Threshold of War

Joe McGiffin has served in the United States Army for seven years. He is currently pursuing a M.A. in International Relations prior to teaching Defense and Strategic Studies at the United States Military Academy at West Point. He can be found on Twitter @JoeMcGiffin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As the space domain, climate change, and views of military purpose evolve, multiple options below the threshold of war are required.

Date Originally Written:  August 10, 2021.

Date Originally Published:  September 13, 2021. 

Author and / or Article Point of View:  The author is an active-duty service member. This article is written from the point of view of the U.S. towards the anticipated operating environment of the next thirty years.

Background:  Conflict below the threshold of war is characterized by subversive tactics and the amoral use of force[1]. Democratic states cannot justify the use of these means in the defense of their national security interests[2]. The United States requires alternative strategies to bolster the free world order and deter or defeat adversaries through legitimate, transparent methods.

Significance:  The strategic environment is a fluid expression of geopolitical changes. A state’s ability to predict, adapt to, and manipulate those variables will determine its relative influence and security over the next thirty years. To be competitive strategically, free nations will need to synergize their private and public assets into courses of action which maximize effective and efficient use of resources.

Option #1:  Diversify Space Exploitation: The Techno-National Approach

The space industry has yet to scratch the surface of the domain’s strategic potential. Navigation, communications, surveillance[3], and even transportation are the starting point[4]. The United States and its allies can invest in new space capabilities to harden their physical and economic vulnerabilities. One approach could be the use of additive manufacturing and recycling of inert satellites in orbit to produce in-demand computer components[5]. This plausible course of action would reduce materiel costs for these parts and alleviate U.S. economic dependence on China. As the industry grows, so too will the technology, expanding potential for other space-based capabilities and options.

Risk:  This option requires a long-term commitment by public and private entities and offers few short-term returns. The exact timeline to achieving the desired end state will prove unpredictable as necessary technological breakthroughs are difficult to anticipate. Additionally, this approach may trigger the weaponization of space as these strategic platforms become the targets of adversaries.

Gain:  Industrial use of space will alleviate economic interdependence with adversaries and provide enhanced economic security and physical protection of strategic supply lines. There is also the potential for alliance and partnership-building by offering interstate collaboration on required research, development, and manufacturing.

Option #2:  Green and Lean Logistics: The Climate Change Approach

Rising sea levels, the increasing frequency of extreme weather events, and the diminishing supply of oil and natural gas will impact the geopolitical environment[6]. While the first two factors will require direct action to mitigate as they continue, finding alternative fuel options has national security implications that are not widely discussed. Previous DoD tests indicate that current technologies could reduce military fuel dependency by up to 90% without impacting operations[7]. As a higher research and investment priority, more astonishing gains can be anticipated.

Risk:  As one of the leading exporters of oil and natural gas, the United States’ transition to alternative energies will face even more staunch resistance than it has previously. Making alternative fuels a priority investment may also restrict defense spending on other strategic assets.

Gain:  This approach enhances military capability and could present a new means of promoting U.S. influence and democratic values internationally. The tooth to tail ratio of the resulting force will extend operational reach exponentially while curtailing vulnerabilities and expenses through the reduction of required support personnel, platforms, and installations. Alternatively, the sustainment network could be maintained with enhanced flexibility, capable of nesting with disaster response and humanitarian aid agencies to assist with international relief operations.

Option #3:  Comprehensive Defense Force: The Demographic Change Response

The sole purpose of a professional military in a democracy is defense. This option expands the definition of defense to include protection from all threats to the nation and the promotion of its ideals, not just those posed by enemy forces. International social unrest poses a danger that is not conventionally considered as a strategic threat. For example: Megacities are projected to present a critical factor of the international environment over the next thirty years[8]. They are typically in a stagnant or declining state, offering refuge for illicit non-state actors seeking to destabilize the host nation for their own purposes. Relieving the conditions which promote instability proactively defends the United States and her allies from criminal or terrorist actions against any potential target. Using the military in conjunction with other means could help defuse these regions if done in a deliberate and unified manner.

Risk:  U.S. military and aid personnel will be targeted by militant actors as they work to improve the megactiy’s administration and infrastructure. Additionally, host nation corruption could lead to fraudulent use of humanitarian resources or sympathetic support of an embedded actor, requiring strict supervision and involvement. There is also the potential that the non-state actor is a proxy or funded by an adversary and will execute missions with the intention to discredit allied aid operations.

Gain:  Aiding states improves ties, alleviates unrest, and promotes democratic values and U.S. influence. Eliminating their power bases neutralizes illicit non-state actors, depriving adversaries of proxy forces for use in subversive tactics. The military will integrate more completely with the U.S. interagency, resulting in increased impact from unity of effort in future strategic endeavors.

Other Comments:  None.

Recommendation:  None.


Endnotes:

 

Below Established Threshold Activities (BETA) Defense and Military Reform Environmental Factors Joe McGiffin Option Papers Space

Assessing Shortcomings of the U.S. Approach for Addressing Conflict Below the Threshold of War

Joe McGiffin has served in the United States Army for seven years. He is currently pursuing a M.A. in International Relations prior to teaching Defense and Strategic Studies at the United States Military Academy at West Point. He can be found on Twitter @JoeMcGiffin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Shortcomings of the U.S. Approach for Addressing Conflict Below the Threshold of War.

Date Originally Written:  August 13, 2021.

Date Originally Published:  September 6, 2021.

Author and / or Article Point of View: The author is an active-duty service member. This article is written from the point of view of the U.S. toward the anticipated operating environment of the next thirty years.

Summary:  The current U.S. national security approach is not suitable for addressing threats below the threshold of war. This approach focuses on achieving security through military superiority.  A more effective approach would achieve national security objectives derived from an analysis of geopolitical trends. This new approach will allow for more unified, synergistic use of national resources in the defense of U.S. interests.

Text:  By its own estimate, the United States is losing global influence as a result of strategic atrophy, permitting other actors the freedom to reshape the weakening world order through “all-of-nation long-term strategy[1].”  However, myopia, not atrophy, has eroded U.S. advantages. A new approach, one that can frame its national security problems within the changing geopolitical context, will result in a more resilient and agile security strategy.

The current U.S. approach is a dangerous misinterpretation of the Revolution in Military Affairs (RMA) theory that originated from Soviet observations of the United States’ Second Offset Strategy which ended the Cold War[2]. Nuclear weapons created a conflict threshold, which neither power would cross, and spurred a race to tactical dominance in conflict below that level. Between their own success and the proliferation of assets which promised dominant battlefield knowledge, maneuver, and precision[3], the United States concluded that military supremacy was synonymous with national security. Though the defense community rebrands it as a new concept every decade (i.e., Transformation and Defense Innovative Initiative), the intellectual underpinnings do not change[4].

While RMA theory is appealing, history proves two points: that superior weaponry rarely equates directly to a strategic advantage; and that overemphasis on such advances disregards other critical factors of national security[5]. While military advancements have had profound impacts on the rise and fall of global powers in the past, those innovations were seldom developed in isolation from revolutionary change in society or culture[6]. For example, it was the socioeconomic isolation of the East and West that created the conditions for an arms race to determine the victor of the Cold War, not the weapons themselves. Near-exclusive focus on the military aspect of national security has left the United States committed to the pursuit of tactical superiority at the expense of strategic flexibility.

The Third Offset Strategy (3OS) and F-35 Joint Strike Fighter Program both illustrate this issue. The 3OS hinges entirely on having a technological advantage to negate adversary Anti-Access/Area Denial Operations: industrial espionage or an adversary’s own disruptive innovations could plausibly neutralize the 3OS rapidly enough to significantly disrupt U.S. foreign policy[7]. The F-35, for its part, demonstrates another issue. While the apex of air power for now, it came at exorbitant cost and will continue to be a resource strain on the U.S. defense budget[8]. Furthermore, whether or not the F-35 was worth the price is an important question with implications for future strategy. While military supremacy has continued to fill a pivotal role in deterring war between major actors, it is not a fungible advantage; that is, military innovations can be used only in military conflicts or to deter them. While the F-35 may be the best fighter available, it is important to consider what measurable security advantages it has or has not achieved for the United States and its other investors.

Today’s environment requires the United States to adopt a more inclusive framework for achieving security goals. Instead of focusing resources into a single element of power (i.e., the military), it could use a more comprehensive approach grounded in geopolitical analysis. Instead of preparing for future war, it could focus on the threats posed by the present: subversive tactics and strategic maneuvers by aggressors deliberately avoiding the overt use of military force. The new paradigm would strive for synergy across as many public and private stakeholders as possible in order to achieve a unified effort to secure national interests.

As an example, use of space assets, because of their extreme expense, has only been possible through close cooperation of the private and public sector. Co-usage of platforms between the military, government, and private sector continues to be a hallmark of this domain[9]. That synergistic use of resources to achieve specific goals, if applied to national security means across the other domains, will offer far more flexibility and resiliency than strict reliance on what military power can achieve.

While conventional war is the purview of the military, conflict below that threshold is far more calculated and nuanced. In order to retain its position of power and influence in the future, the United States will be required to synchronize its national resources in pursuit of security goals within the greater geopolitical context. The RMA-inspired Cold War paradigm will be supplanted by one with renewed emphasis on operating environment variables instead of arbitrary strategic means.


Endnotes:

[1] United States Department of Defense (2018). Summary of the 2018 National Defense Strategy of the United States of America (NDS 2018). https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf United States Department of Defense. See also; Biden, J. (2021). Interim National Security Strategic Guidance. The White House. https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf.  

[2] Beier, J.M. (2006). Outsmarting Technologies: Rhetoric, Revolutions in Military Affairs, and the Social Depth of Warfare. International Politics, 43(2), 266-280. DOI:10.1057/palgrave.ip.8800144. See also; Louth, J. & Taylor T. (2016) The US Third Offset Strategy. The RUSI Journal, 161(3), 66-71. DOI: 10.1080/03071847.2016.1193360

[3] Mowthorpe, M. (2005). The Revolution in Military Affairs (RMA): The United States, Russian and Chinese Views. The Journal of Social, Political, and Economic Studies, 30(2), 137-153.

[4] Jensen, B.M. (2018). The Role of Ideas in Defense Planning: Revisiting the Revolution in Military Affairs, Defence Studies, 18(3), 302-317. DOI: 10.1080/14702436.2018.1497928

[5 Gray, C.S. (2003). Strategy for Chaos: Revolutions in Military Affairs and the Evidence of History. Routledge.

[6] Murray, W. (1997). Thinking About Revolutions in Military Affairs. Joint Forces Quarterly, unk. https://apps.dtic.mil/sti/pdfs/ADA354177.pdf

[7] Wellman, A. (2019). Parity Avoidance: A Proactive Analysis of the Obsolescence of the Third Offset Strategy. Homeland Security Affairs. https://www.hsaj.org/articles/15337 

[8] United States Government Accountability Office (2021). F-35 Sustainment: DOD Needs to Cut Billions in Estimated Costs to Achieve Affordability. Report to the Committee on Armed Services, House of Representatives. https://www.gao.gov/products/gao-21-505t 

[9] Madry, S. (2020). Disruptive Space Technologies and Innovations: The Next Chapter. Springer Nature.

 

Assessment Papers Below Established Threshold Activities (BETA) Defense and Military Reform Governing Documents and Ideas Joe McGiffin United States

An Assessment of Capability Gaps that Contribute to Fighting Below the Threshold of War

Shri is from India. The views expressed and suggestions made in the article are solely of the author in his personal capacity and do not have any official endorsement. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Capability Gaps that Contribute to Fighting Below the Threshold of War

Date Originally Written:  August 9, 2021.

Date Originally Published:  August 30, 2021.

Author and / or Article Point of View:  The article analyses a current situation playing out in a very important part of the world which is a nuclear flashpoint as well.  While the reader can likely guess which countries the author is referring to, indirect references are used to appeal to the audiences living this situation day-to-day.

Summary:  Fighting below the threshold of war happens only due to inadequacies of the stronger power.  These inadequacies may be based in law, policy, doctrine, political preferences, and corruption.  Unless these inadequacies are addressed, stronger powers will dilute their true combat capability by acting as police forces either locally, regionally, or globally.

Text:  The countries of IN and PK have over seven decades of animosity between them. In the 1970s, PK was comprehensively defeated during a war with IN and in the process, lost almost half of its territory. Thereafter, based on experience PK gained as Country UA’s proxy in the fight against Country RU in Country AF, PK realised in its fight against IN, direct war is not the way ahead.  This realisation started something different in which PK waged a conflict below the threshold of war against Country IN by simply harboring, arming, and supporting terrorists. PK, where the military is the de-facto ruler, acts as a client state of Country CN, another adversary of IN, and all three possess nuclear weapons.

It is now three decades since PK began to carry out nefarious activities against IN. In other words, PK prevails over IN below the threshold of war and keeps IN tied down through a low cost and low risk method. This success is despite the fact that IN is larger than PK in every possible metric – economy, territory, armed forces, population etc. PK is taking advantage of some inherent weaknesses and capability gaps of IN and is prevailing.

IN’s capability gaps begin with it still believing in outdated definitions of war, and therefore believing that only armed forces fight wars, and is waiting for PK’s Armed Forces to start one. PK is not obliging IN, knowing well that PK cannot win. IN, not wanting to be labeled as an aggressor, is not waging war on PK, little realizing that IN has been under attack for many decades. A doctrinal change by IN could perhaps settle matters regarding what constitutes aggression and what will be IN’s response. This doctrinal change would amply warn PK and, if PK did not change its behavior, the change would give IN the required casus belli. Threshold of war is not something that has been defined by nature as each country decides according to each unique circumstance. In 1914, assassination of a sovereign led to the First World War[1]. Without an adjustment to current below threshold realities, IN will not get the better of PK. 

IN’s armed forces have been engaged in counterinsurgency operations against PK sponsored terrorists for several decades. This fight without end continues due to an undefined military end-state. The armed forces of a country is it’s last resort and therefore it should not be distracted from it’s main role of war-fighting.  PK understands this well and therefore does everything possible to tie down IN’s armed forces in operations below the threshold of war, which are essentially policing duties. Establishing an end state allowing the military to exit counterinsurgency operations and return to preparing for war is perhaps the only thing that will deter PK from continuing what it does below the threshold of war. Many in IN’s armed forces talk about the United States’ two decade long engagement in Afghanistan to justify IN’s continued presence in counterinsurgency operations. It is worth noting that the United States sent in its armed forces to Afghanistan because its police, perhaps as potent as some armies, have no global mandate. Moreover, while the US always had the luxury of pulling out, as it subsequently did[2], IN doesn’t.

IN is also ineffective below the threshold of war because fighting below the threshold is a comfortable place to be in- no national mobilization, limited death and destruction, life and fighting goes on hand in hand. There would always be many interest groups apart from the IN Armed Forces that have a stake in the fight. While the IN Armed Forces get brass, budget allocations, and a disproportionate say in matters otherwise in the realm of governance, others who benefit include the Military Industrial Complex (about whom U.S. President Eisenhower had warned five decades ago[3]), war contractors and also politicians, most of whom thrive on divisive agendas. History illustrates that whenever a country has resolved to finish a fight, it happened – Sri Lanka being the best example[4]. So next time when any country thinks of finishing the fight, it is good to know who are directly and indirectly benefiting from the fight continuing.

Sun Tzu has said that, “The supreme art of war is to subdue the enemy without fighting.” Present day militaries have wrapped this very thought in many definitions and names to include grey zone warfare, hybrid warfare etc. However, war is war.  PK added its own touch by trying to subdue IN, taking advantage of IN’s inhibitions, and some weaknesses, by fighting, albeit below the threshold of war. Until IN wakes up to PK, and demonstrates that IN is ready for a major war with PK, IN will continue to be stuck in the quagmire of fighting below the threshold of war.


Endnotes:

[1] Greenspan, J. (2014, June 26). The assassination of Archduke Franz Ferdinand. History.com. https://www.history.com/news/the-assassination-of-archduke-franz-ferdinand

[2] The United States Government. (2021, July 8). Remarks by President Biden on the drawdown of U.S. forces in Afghanistan. The White House. https://www.whitehouse.gov/briefing-room/speeches-remarks/2021/07/08/remarks-by-president-biden-on-the-drawdown-of-u-s-forces-in-afghanistan/

[3] Farewell address by President Dwight D. Eisenhower, January 17, 1961; Final TV Talk 1/17/61 (1), Box 38, Speech Series, Papers of Dwight D. Eisenhower as President, 1953-61, Eisenhower Library; National Archives and Records Administration. https://www.eisenhowerlibrary.gov/sites/default/files/research/online-documents/farewell-address/1961-01-17-press-release.pdf

[4] Layton, P. (2015, April 9). How sri lanka won the war. The Diplomat. https://thediplomat.com/2015/04/how-sri-lanka-won-the-war/

Assessment Papers Below Established Threshold Activities (BETA) India Pakistan Shri

Assessing the Effect of the United Kingdom’s Integrated Review on Operations Below the Threshold of War

Bombardinio is the nom de plume of a staff officer who has served in the British armed forces, with operational experience in Northern Ireland, the Balkans, Iraq, and Afghanistan. She presently works for the Ministry of Defence in London where she looks at Defence policy. She has been published in the UK, USA and further afield. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Effect of the United Kingdom’s Integrated Review on Operations Below the Threshold of War

Date Originally Written:  August 10, 2021.

Date Originally Published:  August 23, 2021.

Author and / or Article Point of View:  The author is a serving staff officer in the British military. The author believes in the importance of a well-resourced standing military that underpins defense policy for both national spending plans, international policies, and allied engagements.

Summary:  The United Kingdom government’s decision, articulated in the Integrated Review 2021, to concentrate on operating below the threshold of war, with insufficient resource to also maintain an effective warfighting capability is a folly, formulated without regard either to historical precedent or to the contemporary international scene. In these failings, it risks national and international security and Britain’s global position of influence.

Text:

Speak softly and carry a big stick – you will go far.
Theodore Roosevelt

‘Global Britain in a Competitive Age, the Integrated Review of Security, Defense, Development, and Foreign Policy’ describes the United Kingdom (UK) government’s approach to contemporary international relations[1]. For UK Defense, it marks a de facto move from an emphasis on warfighting to one which privileges operating below the threshold of war. International competition below the threshold of war is neither new nor wholly unwelcome, the UK military have operated in this manner for centuries and this new policy recognizes the need for adaptation to reflect the changing character of warfare. The Integrated Review’s weakness lies in its ignorance of both historical experience and contemporary realities, these lacunae risk both national and international security and Britain’s global position.

The Grey Zone, that nebulous and ill-defined no-man’s land between peace and armed conflict, is fundamental to the nature of war[2]. If war is a continuation of politics by violent means, then military operations in the Grey Zone are part of that political continuum, just short of war. The width of the Zone is variable; while at times a personal affront or assault may form sufficient pretext for war – the War of Jenkin’s Ear (1739-48)[3] – on other occasions it will not – the Salisbury Nerve Agent Attack of 2018[4]. This variability is determined by political appetite informed by strategic balance. Political will is not purely the domain of politicians and statesmen, public opinion can affect the resolve of leaders considering armed conflict as a political tool; conversely, the public can be, and often have been, manipulated to support a resort to armed conflict. Whilst the will to fight provides the motivation for war, this is generally tempered by an analysis of the likelihood of success; in 1739, an eight-year old incident was allowed to presage war because Great Britain was confident of military superiority over Spain, in the 2018 nerve agent attack the advantage lay with the culprit.

The decision to concentrate on operating below the threshold of war will fail without considering the danger of crossing that threshold and understanding that the threshold is not self-determined, that freedom of decision is in the hands of the opposition, which will be making its own contiguous calculations with respect to its options. In 1861, the U.S. Navy seized the British ship ‘Trent’ in international waters and arrested two Confederate emissaries heading for Europe. This event led to the deployment of significant British land forces to Canada and naval units along the American east coast. War was only averted by a rapid apology by the Lincoln administration. While not a deliberate operation below the threshold of war, the Trent Affair is illustrative of the danger posed by military operations in a heightened political environment. Those who decided to risk the ire of the British had miscalculated both the appetite of the UK government to go to war and, more significantly, Britain’s military superiority.

The key to operating below the threshold of war is thus two-fold: understanding the adversary, their policy, strategy, risk calculus and appetite for armed conflict and maintaining sufficient credible military power to deter the adversary from retaliating through a resort to war. The Integrated Review identifies two systemic competitors, Russia and China, making it clear that the United Kingdom will seek to confront these nations below the threshold of war. Much of this confrontation will be done through enhancing the ways in which the UK protects itself and its interests and by engaging internationally in an attempt to persuade other countries that the West is a more attractive partner than either Vladimir Putin’s Russia or Communist China. These activities are relatively benign; the problem for UK Defense is that, despite a significant budget, it has failed to achieve value for money; the changed emphasis must hence be financed by significant cuts to conventional capability and thus deterrent effect[5]. In ‘robbing Peter to pay Paul’, the lightweight UK has chosen to enter a tag-team wrestling match, without its heavyweight partner.

Of course, it could be argued that as part of the North Atlantic Treaty Organization (NATO), the UK retains significant deterrent mass through the Alliance, theoretically this is true – the UK’s activities below the threshold of war are protected by the Treaty – but is that a practical reality[6]? The UK’s strategic decision to confront Russia is a reaction to widespread interference and subversion in Western societies, the perceived aim of which is to weaken and divide political resolve. The problem for the UK is that Russian interference and influence has succeeded in weakening resolve: although limited sanctions have been used by Western nations in response to Putin’s worst excesses, military action has never been in question except in protection of the territorial integrity of NATO nations. If German dependence on Russian gas[7], international tensions caused by Brexit[8], and NATO’s internal disagreements are taken into account, the likelihood of support in reaction to a targeted military strike by Russia begins to look shaky.

Recently, a British destroyer conducting a freedom of navigation mission off the coast of the Crimea was confronted by Russian ships and aircraft and ordered to leave what the Russians define as their territorial waters[9]. Shortly after, Putin threatened that a reoccurrence would be met by weapons against which the Royal Navy would have no defense[10]. If the recent confrontation in the Black Sea were to be repeated, at a time in the near future when the United Kingdom’s conventional deterrent is even more denuded, and a Royal Navy vessel were lost to a Russian hypersonic missile, would NATO nations go to war[11]? Russia may calculate that it has sufficiently eroded the Western will to fight, that outside of alliance borders most allies would be unwilling to enact NATO’s Article V, and that the UK has insufficient credible fighting power to respond, unless by resort to a strategic counterstroke by nuclear or offensive cyber operations, both of which would be irrationally escalatory. In such an instance, the UK would be isolated, her global position weakened, and NATO exposed as a paper tiger. The UK can only avoid this by listening to the wisdom of ages and bolstering her conventional forces, using the other levers of power to stiffen Western resolve, and exercise caution in operating below the threshold of war.


Endnotes:

[1] ‘Global Britain in a Competitive Age’, UK Govt (July 2021). https://www.gov.uk/government/collections/the-integrated-review-2021 

[2] ‘Understanding the Grey Zone’, IISS Blog (April 2019). https://www.iiss.org/blogs/analysis/2019/04/understanding-the-grey-zone

[3] ‘The War of Jenkin’s Ear 1739-48’, Oxford Reference (August 2021). https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100019496 

[4] ’Salisbury poisoning: What did the attack mean for the UK and Russia’, BBC Website (March 2020).  https://www.bbc.co.uk/news/uk-51722301  

[5] ‘UK second biggest defence spender in NATO’, UK Defence Journal (March 2021). https://ukdefencejournal.org.uk/britain-second-biggest-defence-spender-in-nato/

[6] ‘NATO 2030: “A global Alliance for all seasons”, reality or rhetoric?, European Leadership Network (June 2021). https://www.europeanleadershipnetwork.org/commentary/nato-2030-a-global-alliance-for-all-seasons-reality-or-rhetoric/  

[7] ‘Why Nordstream 2 is the world’s most controversial energy project’, The Economist (July 2021). https://www.economist.com/the-economist-explains/2021/07/14/why-nord-stream-2-is-the-worlds-most-controversial-energy-project 

[8] ‘The UK and European Defence: will NATO be enough?, The Foreign Policy Centre (December 2020). https://fpc.org.uk/the-uk-and-european-defence-will-nato-be-enough/ 

[9] ‘British warship deliberately sailed close to Crimea, UK officials say’, The New York Times (24 June 2021).  https://www.nytimes.com/2021/06/24/world/europe/russia-uk-defender-crimea.html  

[10] ‘Putin says Russian Navy can carry out ‘unpreventable strike’ if needed’, Reuters (25 June 2021. https://www.reuters.com/world/europe/putin-says-russian-navy-can-carry-out-unpreventable-strike-if-needed-2021-07-25/

[11] ‘No peace – no war. The future of the Russia-NATO relationship’, European Leadership Network (September 2018. https://www.europeanleadershipnetwork.org/commentary/no-peace-no-war-the-future-of-the-russia-nato-relationship/ 

Assessment Papers Below Established Threshold Activities (BETA) Bombardinio Defense and Military Reform Governing Documents and Ideas United Kingdom

Call for Papers: Prevailing in Conflict Below the Threshold of War

Background:

Divergent Options is a non-politically aligned non-revenue generating national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Below you will see a Call for Papers.  If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea. We look forward to hearing from you!

Call for Papers:

Divergent Options is calling for national security papers assessing situations or discussing options related to prevailing in conflicts below the threshold of war.

For the purposes of this Call for Papers, Conflict is defined as “a serious incompatibility between two or more opinions, principles, or interests” and Below the Threshold of War is defined as “actions taken that do not require Congress (or a similar governmental organization) to declare war or issue a specific statutory authorization to introduce Armed Forces into hostilities, or into situations where imminent involvement in hostilities is clearly indicated by the circumstances.”

To inspire potential writers, we provide the below prompts:

– Assess Country X’s capability gaps that contribute to their ineffectiveness below the threshold of war.

– Assess the psychological and organizational factors that motivate Country X to not invest in capabilities below the threshold of war.

– What options can Country X pursue to fill their capability gaps below the threshold of war?

– Country Y often prevails below the threshold of war, assess the factors that enable them do to this.

– While Country Y prevails below the threshold of war, why does this matter as far as Country X is concerned?  Provide an assessment.

– What can Country X do to make Country Y fail below the threshold of war?  Provide options.

– If your country is good at war, is it better to not invest in capabilities below the threshold of war and instead, ignore problems until they require a war, so your country can play to its strengths?  Provide an assessment.

– If Country Y, who excels below the threshold of war, is suddenly thwarted in its efforts by Country X, will this motivate Country Y to resort to war?  Provide an assessment.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by August 13, 2021.

Below Established Threshold Activities (BETA) Call For Papers

Assessing the Application of a Cold War Strategic Framework to Establish Norms in the Cyber Threat Environment

Jason Atwell is an officer in the U.S. Army Reserve and a Senior Manager with FireEye, Inc. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Application of a Cold War Strategic Framework to Establish Norms in the Cyber Threat Environment

Date Originally Written:  December 28, 2020.

Date Originally Published:  March 29, 2021.

Author and / or Article Point of View:  The article is written from the point of view of the United States and its Western allies as they seek to impose order on the increasingly fluid and frequently volatile cyber threat environment.

Summary:  The continued growth and maturity of cyber operations as a means of state sponsored espionage and, more recently, as a potential weapon of war, has generated a need for an “accepted” strategic framework governing its usage. To date, this framework remains unestablished. Cold War strategic frameworks could help govern the future conduct of cyber operations between nation states and bring some semblance of order to this chaotic battlespace.

Text:  The cyber threat environment continues to evolve and expand. Threat vectors like ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid, are now daily subjects for discussion among leaders in the public and private sectors alike. It is against this backdrop that high-level initiatives like the Cyberspace Solarium Commission have sought to formulate comprehensive, whole-of-government strategies for dealing with cyber threats and developing capabilities. The U.S. Department of Commerce’s National Institute for Standards in Technology issues a steady stream of best practices for cyber risk management and hygiene. Yet, no comprehensive framework to govern cyber operations at the macro, nation-to-nation level, has emerged and been able to achieve buy-in from all the affected parties. In fact, there are not even useful norms limiting the risk in many of these cyber interactions[1]. Industry leaders as well have lamented the lack of a coherent doctrine that governs relations in cyberspace and discourages the violating of doctrinal norms[2]. In some ways the Cold War norms governing armed conflict, espionage, and economic competition can be used to provide much needed stability to cyber and cyber-enabled operations. In other ways, the framing of current problems in Cold War vocabulary and rhetoric has proved unworkable at best and counterproductive at worst. 

Applying the accepted framework of great power interactions that was established during the Cold War presents both opportunities and challenges when it comes to the cyber threat environment. The rules which governed espionage especially, however informal in nature, helped to ensure both sides knew the red lines for conduct and could expect a standard response to common activities. On the individual level, frameworks like the informal “Moscow Rules” governed conduct and helped avoid physical confrontations[3]. When those rules were violated, and espionage came into the open, clear consequences were proscribed via precedent. These consequences made the use of persona-non-grata expulsions, facility closures, the use of neutral territories, exchanges and arrests were predictable and useful controls on behavior and means to avoid escalation. The application of these consequences to cyber, such as the closure of Russian facilities and expulsion of their diplomats has been used[4], however to little or no apparent effect as administrations have changed their approach over time. This uneven application of norms as cyber capabilities have advanced may in fact be leading the Russians in particular to abandon the old rules altogether[5]. In other areas, Cold War methods have been specifically avoided, such as the manner in which Chinese cyber operators have been indicted for the theft of intellectual property. Lowering this confrontation from high-level diplomatic brinkmanship to the criminal courts both prevents a serious confrontation while effectively rendering any consequences moot due to issues with extradition and prosecution. The dynamics between the U.S. and China have attracted a lot of discussion framed in Cold War terminology[6]. Indeed, the competition with China has many of the same hallmarks as the previous U.S.-Soviet Union dynamic[7]. What is missing is a knowledge of where the limits to each side’s patience lie when it comes to cyber activity. 

Another important component of Cold War planning and strategy was an emphasis on continuity of operations and government authority and survivability in a crisis. This continuity was pursued as part of a deterrence model where both sides sought to either convince the other that they would endure a confrontation and / or decisively destroy their opposition. Current cyber planning tends to place an emphasis on the ability to achieve overmatch without placing a similar emphasis on resilience on the friendly side. Additionally, deterrence through denial of access or geophysical control cannot ever work in cyberspace due to its inherently accessible and evolving nature[8]. Adopting a mindset and strategic framework based on ensuring the ability of command and control networks to survive and retaliate in this environment will help to impose stability in the face of potentially devastating attacks involving critical infrastructure[9]. It is difficult to have mutually assured destruction in cyberspace at this phase, because “destruction” is still nebulous and potentially impossible in cyberspace, meaning that any eventual conflict that begins in that domain may still have to turn kinetic before Cold War models begin to function.

As cyber capabilities have expanded and matured over time, there has been an apparent failure to achieve consensus on what the red lines of cyber confrontation are. Some actors appear to abide by general rules, while others make it a point of exploring new ways to raise or lower the bar on acceptable actions in cyberspace. Meanwhile, criminals and non-aligned groups are just as aggressive with their operations as many terrorist groups were during the height of the Cold War, and they are similarly frequently used or discarded by nation states depending on the situation and the need. However, nation states on the two sides were useful bulwarks against overzealous actions, as they could exert influence over the actions of groups operating from their territory or abusing their patronage. Espionage in cyberspace will not stop, nor can a framework anticipate every possible scenario that my unfold. Despite these imperfections, in the future an issue like the SolarWinds breach could lead to a series of escalatory actions a la the Cuban Missile Crisis, or the cyber threat environment could be governed by a Strategic Arms Limitation Talk-like treaty which bans cyber intrusions into global supply chains[10]. Applying aspects of the Cold War strategic framework can begin to bring order to the chaos of the cyber threat environment, while also helping highlight areas where this framework falls short and new ways of thinking are needed.


Endnotes:

[1] Bremmer, I., & Kupchan, C. (2021, January 4). Risk 6: Cyber Tipping Point. Retrieved February 12, 2021, from https://www.eurasiagroup.net/live-post/top-risks-2021-risk-6-cyber-tipping-point 

[2] Brennan, M., & Mandia, K. (2020, December 20). Transcript: Kevin MANDIA on “Face the Nation,” December 20, 2020. Retrieved February 12, 2021, from https://www.cbsnews.com/news/transcript-kevin-mandia-on-face-the-nation-december-20-2020/ 

[3] Sanger, D. (2016, December 29). Obama Strikes Back at Russia for Election Hacking. Retrieved February 13, 2021, from https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html 

[4] Zegart, A. (2021, January 04). Everybody Spies in Cyberspace. The US Must Plan Accordingly. Retrieved February 13, 2021, from https://www.defenseone.com/ideas/2021/01/everybody-spies-cyberspace-us-must-plan-accordingly/171112/

[5] Devine, J., & Masters, J. (2018, March 15). Has Russia Abandoned the Rules of Spy-Craft? Retrieved February 13, 2021, from https://www.cfr.org/interview/are-cold-war-spy-craft-norms-fading 

[6] Buchanan, B., & Cunningham, F. (2020, December 18). Preparing the Cyber Battlefield: Assessing a Novel Escalation risk in A Sino-American Crisis. Retrieved February 13, 2021, from https://tnsr.org/2020/10/preparing-the-cyber-battlefield-assessing-a-novel-escalation-risk-in-a-sino-american-crisis/ 

[7] Sayers, E. (2021, February 9). Thoughts on the Unfolding U.S.-Chinese Competition: Washington’s Policy Towards Beijing Enters its Next Phase. Retrieved February 13, 2021, from https://warontherocks.com/2021/02/thoughts-on-the-unfolding-u-s-chinese-competition-washingtons-policy-towards-beijing-enters-its-next-phase/ 

[8] Borghard, E., Jensen, B., & Montgomery, M. (2021, February 05). Elevating ‘Deterrence By Denial’ in U.S. Defense Strategy. Retrieved February 13, 2021, from https://www.realcleardefense.com/articles/2021/02/05/elevating_deterrence_by_denial_in_us_defense_strategy_659300.html 

[9] Borghard, E. (2021, January 04). A Grand Strategy Based on Resilience. Retrieved February 13, 2021, from https://warontherocks.com/2021/01/a-grand-strategy-based-on-resilience/ 

[10] Lubin, A. (2020, December 23). SolarWinds as a Constitutive Moment: A New Agenda for International Law of Intelligence. Retrieved February 13, 2021, from https://www.justsecurity.org/73989/solarwinds-as-a-constitutive-moment-a-new-agenda-for-the-international-law-of-intelligence/

Arms Control Assessment Papers Below Established Threshold Activities (BETA) Cold War Cyberspace Governing Documents and Ideas Jason Atwell Soviet Union Treaties and Agreements United States

Assessing the Role of Armed Forces in Activities Below the Threshold of War

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Dr Paul Jemitola is a lecturer at the Air Force Institute of Technology. He can be reached on LinkedIn at Paul Jemitola. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Role of Armed Forces in Activities Below the Threshold of War

Date Originally Written: September 26, 2020.

Date Originally Published:  December 21, 2020.

Authors and / or Article Point of View:  The return to Great Power competition and the utilization by various rising powers of the current world order of hybrid warfare and destabilizing activities short of war has increased the calls for governments to refocus their priorities to other levers of power. Even as the authors support increased investment in other areas of government to enhance their contributions to national security, it is important to articulate the role that armed forces could play in interactions that would fall short of armed conflict.

Summary:  As the world returns to Great Power competition, militaries will continue to play a role even in activities below the threshold of war. As the Global War on Terror winds down from a period of intensity, policymakers can identify those roles the military must play without needless overlap with the jurisdiction of other government agencies and shape their policy decisions accordingly.

Text:  The rise of new powers willing to upend the current global order has given rise to new flashpoints while rekindling old rivalries[1][2]. While the interconnected nature of the global economy disincentivizes direct conflict between major powers[3][4], the rise of nationalism, especially in the developed world[5], demands that political leaders take strong actions to counter perceived competitors. This demand for action drives countries to find ways to undermine their opponents without engaging in direct conflict[6].

This reality, combined with the mixed records of military interventions in recent times, has caused many to call for governments to shift resources away from the military to fund other means of projecting national power short of sustained armed conflicts[7]. While governments must maintain various options in foreign policy and defence [8][9], the role of the military in maintaining peace, whether against near-peer adversaries or non-state actors, cannot be diminished and will be crucial in the next Cold War as it was in the last[10].

Militaries can continue to serve as instruments of deterrence against hostile activities of competitors[11][12]. The presence of military power and highly visible demonstrations of its capabilities can reinforce messages being passed through diplomatic and political channels. From gunboat diplomacy to freedom of navigation operations, these shows of force are meant to demonstrate the willingness of their governments to challenge actions against their interests while reassuring allies that their interests were also being catered to. A credible deterrence means that adversaries are less likely to engage in costly conventional military actions and will keep their activities confined below war threshold levels[13].

Militaries can provide security for other arms of governments operating in hostile environments[14][15]. Diplomats and politicians visiting or serving in warzones and other adversarial conditions can be protected by military units with experience in Executive Protection. This security support to diplomacy will be keeping in traditions of the United States Marine Corps and especially its Marine Corps Embassy Security Group[16]. In case of emergencies, the military can provide contingency support to reinforcing security or evacuating personnel[17].

Militaries can build relationships with counterparts through exercises, personnel exchange programs, conferences, and intergovernmental military alliance meetings[18]. In many countries, the armed forces continue to serve as independent power bases largely separate from political leaders[19][20]. These military to military engagements require that senior military commanders engage with their opposite numbers and deliver a unified message alongside diplomatic and political overtures. This unified messaging ensures that actions agreed to by political leaders are not disrupted by the militaries of those countries.

Militaries seek to attract the best and brightest of society[21]. Military education programs and professional training also serve as a platform to develop professionals with critical skills needed by other government agencies. Intelligence collectors and analysts, language and cultural experts, and logistics and security specialists are just some of the skills routinely trained and deployed by the military. Government agencies can tap into the existing military structures to train their professionals[22] or hire veterans with training and experience. Militaries can also second their officers to work directly in civil or political organizations as subject matter experts or even leaders/managers[23].

The military may continue to provide relevant military intelligence on the military capabilities of allies, competitors, and adversaries to political leaders to support policy making[24]. By compiling and presenting information on how capable militaries and other state and non-state actors in the area of interest are, the military can help policymakers determine how much to depend on military power and how much to rely on other means of influencing the situation.

The military can provide support to civil government agencies seeking to leverage military capabilities to achieve civilian goals[25][26]. From logistical support in disaster relief, crisis management during unplanned contingencies, cybersecurity, or even the regular movement of daily items for diplomats and civilian government workers deployed abroad, the military can use its already established logistics networks to support the missions of agencies who do not need to establish duplicating functions in their agencies.

The military can also play a niche role in grey-zone or paramilitary operations usually the preserve of intelligence agencies[27]. As the Global War on Terror and the new competition between states continue to evolve, the military may continue to provide the personnel to carry out the planning and execution phase of clandestine operations previously left to the paramilitary forces of intelligence agencies.

The military can play a critical role in the protection of critical infrastructure[28], especially in cyberspace. In the age of information / political warfare[29], cyber-attacks[30], and election interference[31], the ability to identify, classify, and defeat external threats in real-time depends on military forces and intelligence agencies facing outwards as much as security services and law enforcement agencies looking inwards. The ability to deliver a proportionate response beyond the domain attacked adds additional credibility to deterrence [32]. By its nature, warfare in cyberspace will not be limited to a single service or agency but will require the entire society to build resilience and respond appropriately. The military will necessarily be a part of any response to such threats, either to the Defense Industrial Base Sector or to the wider society.

As the dawn of a new era in international relations begins, leaders will need to rely on every available lever of power to achieve favourable outcomes as they compete for a favourable place on the global stage. While many events will occur outside the realm of armed conflict, it will not diminish the role the armed forces plays to ensure successful outcomes. Thus as governments take critical decisions on the means of expressing their nation’s will and safeguarding its interests, they can embrace neither neglecting their militaries nor limit their contribution to simply to the waging of its wars.


Endnotes:

[1] Mullan, T. (2019, June 25). The World Order is Dead. Long Live the New World Order. Retrieved August 8, 2020, from https://www.cfr.org/blog/world-order-dead-long-live-world-order

[2] Friedman, U. (2019, August 6). The New Concept Everyone in Washington Is Talking About. Retrieved August 8, 2020, from https://www.theatlantic.com/politics/archive/2019/08/what-genesis-great-power-competition/595405

[3] Adorney, G. (2013, October 15). Want Peace, Promote Free Trade. Retrieved September 15, 2020, from https://fee.org/articles/want-peace-promote-free-trade

[4] Mooney, L. (2014, May 28). Matthew O. Jackson: Can Trade Prevent? Retrieved September 15, 2020, from https://www.gsb.stanford.edu/insights/matthew-o-jackson-can-trade-prevent-war

[5] Ulansky, E and Witenberg. W. (2016, May 31). Is Nationalism on the Rise Globally? Retrieved September 15, 2020, from https://www.huffpost.com/entry/is-nationalism-on-the-ris_b_10224712

[6] Barno, D. (2014, July 28). The Shadow Wars of the 21st Century. Retrieved September 26, 2020, from https://warontherocks.com/2014/07/the-shadow-wars-of-the-21st-century

[7] Hick, K. (2020, March/April). Getting to Less: The Truth About Defense Spending. Retrieved September 26, 2020, from https://www.foreignaffairs.com/articles/2020-02-10/getting-less

[8] Schweitzer, C. (2004, December 1). Building an alternative to military intervention. Retrieved September 26, 2020, from https://peacenews.info/node/3634/building-alternative-military-intervention

[9] (2007, November). Alternatives to military intervention: What is done by the military that could be done better by civilians? Retrieved September 26, 2020, from http://www.irenees.net/bdf_fiche-analyse-707_en.html

[10] Kaplan, R. (2019, January 7). A New Cold War has Begun. Retrieved September 26, 2020, from https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun

[11] Flournoy, M. (2020, August 18). How to Prevent a War in Asia. Retrieved September 26, 2020, from https://www.foreignaffairs.com/articles/united-states/2020-06-18/how-prevent-war-asia

[12] Mauroni, A. (2019, October 8). Deterrence: I Don’t Think It Means What You Think It Means. Retrieved September 26, 2020, from https://mwi.usma.edu/deterrence-dont-think-means-think-means

[13] Walter, P. (2016, August 15). National Security Adaptations to Below Established Threshold Activities. Retrieved September 26, 2020, from https://www.lawfareblog.com/national-security-adaptations-below-established-threshold-activities

[14] Roper, G. (2010, February 17). Soldiers train to protect VIPs. Retrieved September 26, 2020, from https://www.army.mil/article/34558/soldiers_train_to_protect_vips

[15] Elite UK ForcesSAS – Close Protection. Retrieved September 26, 2020, from https://www.eliteukforces.info/special-air-service/close-protection

[16] Martinez, L. (2019, May 1). An inside look at the training for Marines who protect US embassies. Retrieved September 26, 2020, from https://abcnews.go.com/Politics/inside-training-marines-protect-us-embassies/story?id=62736016

[17] Atlamazoglou, S. (2020, March 4). Exclusive: Army Special Forces Command Disbands Elite Unit. Retrieved September 26, 2020, from https://sofrep.com/news/exclusive-army-special-forces-command-disbands-elite-units

[18] Myers, D. (2018, August 17). The Importance of Educating Foreign Military Officers. Retrieved September 26, 2020, from https://smallwarsjournal.com/jrnl/art/importance-educating-foreign-military-officers

[19] Feldberg, R. (1970, Spring). Political System and the Role of the Military. The Sociological Quarterly, 11(2), 206-218. Retrieved September 26, 2020, from https://www.jstor.org/stable/4105402

[20] Gutteridge, W. (1982). The military in African politics — Success or failure?, Journal of Contemporary African Studies, 1:2, 241-252, Retrieved September 26, 2020, from https://www.tandfonline.com/doi/abs/10.1080/02589008208729384

[21] Barno, D. and Benshael, N. (2015, November 5). Can the U.S. Military Halt Its Brain Drain? Retrieved September 26, 2020, from https://www.theatlantic.com/politics/archive/2015/11/us-military-tries-halt-brain-drain/413965

[22] National Defense University. Attending National War College. Retrieved September 26, 2020, from https://nwc.ndu.edu/Students/Attending-NWC

[23] UN Secretary-General. (2016, July 29). Seconded active-duty military and police personnel: Report of the Secretary-General. Retrieved September 26, 2020, from https://digitallibrary.un.org/record/837050/files/A_71_257-EN.pdf

[24] Katz, B. (2018, November 14). Intelligence and You: A Guide for Policymakers. . Retrieved September 26, 2020, from https://warontherocks.com/2018/11/intelligence-and-you-a-guide-for-policymakers

[25] Buchalter, A. (2007, February). Military Support to Civil Authorities: The Role of the Department of Defence in Support of Homeland Defense. Retrieved September 26, 2020, from https://www.loc.gov/rr/frd/pdf-files/CNGR_Milit-Support-Civil-Authorities.pdf

[26] US Government. (2018, October 29). Defence Support of Civil Authorities. Retrieved September 26, 2020, from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_28.pdf

[27] Livermore, D. (2019, September 10). Passing the paramilitary touch from the CIA to the Special Operations Command. Retrieved September 26, 2020, from https://www.militarytimes.com/opinion/commentary/2019/09/10/passing-the-paramilitary-torch-from-the-cia-to-special-operations-command

[28] Vergun, D. (2019, September 6). Cyber Strategy Protects Critical U.S. Infrastructure. Retrieved September 27, 2020, from https://www.defense.gov/Explore/News/Article/Article/1954009/cyber-strategy-protects-critical-us-infrastructure

[29] Robinson, L. Helmus, T. Cohen, R. Nader, A. Radin, A. Magnuson, M. and Migacheva, K. (2018). Modern Political Warfare: Current Practices and Possible Responses. Retrieved September 27, 2020, from, https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1772/RAND_RR1772.pdf

[30] Wallace, I. (2013, December 16). The Military Role in National Cybersecurity Governance. Retrieved September 27, 2020, from, https://www.brookings.edu/opinions/the-military-role-in-national-cybersecurity-governance

[31] U.S. Cyber Command. (2020, February 10). DOD Has Enduring Role in Election Defense. Retrieved September 27, 2020, from, https://www.defense.gov/Explore/News/Article/Article/2078716/dod-has-enduring-role-in-election-defense

[32] Monaghan, S. Cullen, P. and Wegge N. (2019, March). MCDC Countering Hybrid Warfare Project: Countering Hybrid Warfare. Retrieved September 27, 2020, from, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/784299/concepts_mcdc_countering_hybrid_warfare.pdf

Armed Forces Below Established Threshold Activities (BETA) Damimola Olawuyi Dr. Paul Jemitola

Targeting North Atlantic Treaty Organization Article 5: Assessing Enhanced Forward Presence as a Below War Threshold Response

Steve MacBeth is a retired officer from the Canadian Forces. He recently transitioned to New Zealand and serves in the New Zealand Defence Force. He has deployed to Bosnia, completed three tours of duty in Khandahar, Afghanistan and most recently, as the Battle Group Commander of the NATO enhanced Forward Presence Battle Group in Latvia. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Targeting North Atlantic Treaty Organization Article 5: Assessing Enhanced Forward Presence as a Below War Threshold Response

Date Originally Written:  August 20, 2020.

Date Originally Published:  November 25, 2020.

Author and / or Article Point of View:  The author believes that the North Atlantic Treaty Organization’s (NATO) Article 5 does not provide the agility for forward deployed forces to effectively respond to challenges below the threshold of war. These challenges are also known as Grey Zone activities. This paper is a summation of a chapter the author wrote for publication at the NATO Staff College in Rome, regarding NATO in the Grey Zone, which was edited Dr Howard Coombes, Royal Military College of Canada.

Summary:  Russia has been careful, for the most part, to avoid direct confrontation with NATO. The Russian focus on indirect mechanisms targets the weaknesses of NATO’s conventional response and highlights the requirement to revisit Article 5 within context of the deployed enhanced Forward Presence Activities. Conflict through competitive and Grey Zone activities is omnipresent and does not follow the template that Article 5 was designed for[1] .

Text:  U.S. Army Major General Eric J. Wesley, Commander, U.S. Army Futures Command, has noted that western militaries and governments may need to adjust between a “continuum of conflict” that denotes “war” and “peace” to an age of constant competition and covert pressure punctuated by short violent overt struggle[2]. The Chief of the Russian General Staff, General Valery Gerasimov reflected upon this approach for the Russian military journal VPK in 2013. “Methods of conflict,” wrote Gerasimov, have changed, and now involve “the broad use of political, economic, informational, humanitarian and other non-military measures.” All of this, he said, could be supplemented by utilizing the local populace as a fifth column and by “concealed” armed forces[3]. These actions demonstrate a Russian philosophy of achieving political objectives by employing a combination of attributable/non-attributable military and other actions. Operating under the threshold of traditional warfare, these adversarial behaviours, known as Grey Zone activities, deliberately target the weaknesses of the traditional NATO responses.

Reactions to aggression are governed by Article 5 of the North Atlantic Treaty. Article 5 provides the Alliance’s collective defence paradigm, stating an “attack on one is an attack on all,” signaling the shared intent to deal with armed aggression vigorously[4]. Article 5 does not address Grey Zone activities that demand rapid, unified decision making and action. NATO crisis response is predicated on a system that acts in a predictable and deliberate manner to deal with overt aggression. Though NATO has recognized the Grey Zone there has been little adaption to this threat and NATO has not demonstrated that it is prepared to act decisively in the case of a Russian Grey Zone incursion. The NATO forces positioned to deter potential Russian aggression on the Alliance’s eastern flank are the enhanced Forward Presence (eFP) battle groups. This military commitment is structured and authorized to counter overt Article 5 threats. Paradoxically, the most likely danger they may encounter are Grey Zone challenges. Combine this capability to likely threat mismatch with the speed at which political and military decisions are required during crisis, like a limited Russian incursion with pre-conditions set by Grey Zone actions, and NATO may not be able to react effectively. Consequently, it may be time for NATO to re-visit its current Article 5 deterrence activities, in the context of Grey Zone activities. This re-visit would acknowledge the Eastern NATO nations require every opportunity to answer any form of threat to their security and fully enable the NATO forces arrayed within their countries.

Presently, the enhanced Forward Presence is an ‘activity’ and not an NATO mission. The forces remain under national control for all, but specifically pre-agreed tasks and lack common funding resources. For all intents and purposes NATO missions, with the exceptions of “operational limitations,” indicating national caveats or activities in which a contributing nation will not participate, contribute to a single military force under a unified NATO command structure. In the eFP context, this unified command structure does not exist. Outside of an invocation of an Article 5 response, the various elements of the eFP battle groups remain under national command. The Russian determination of conflict leans towards a state of constant, below the threshold of war competition utilizing deception, information, proxies, and avoiding attributable action. Russian efforts are focussed on NATO’s greatest vulnerability and, at times, source of frustration, lengthy centralized deliberation. At the best of times this need for consensus creates slow decision making and resultantly a diminution of strategic, operational, and tactical agility[6]. If the Russian trend of Grey Zone actions continue, Article 5 responses by the Alliance may become irrelevant due to this slowness of decision making. For the eFP battlegroups, which can react to conventional threats, the Grey Zone poses difficult challenges, which were not fully recognized when the eFP concept was originally proposed and implemented[7].

The Baltic countries are strengthened by having eFP forces garrisoned within their nations, but there is a capability gap in providing Article 5 deterrence. The lack of authority for eFP battle groups to compete below the threshold of conflict leaves Baltic allies uncertain if and how NATO can support them. Enhanced Forward Presence battle groups are not currently able to deal with Grey Zone eventualities. Consequently, in several important aspects, the Alliance response remains handicapped. Bringing about achieving rapid consensus for a crisis response operations in the face of an ambiguous attack, or in response to ostensibly unrelated low-level provocations, like those imbued in the Grey Zone, will not be an easy task in the current framework[8].


Endnotes:

[1] M. Zapfe. “Hybrid Threats and NATO’s Forward Presence”, Centre of Security Studies Policy Perspectives, Vol. 4, No. 7, 2016, pp. 1-4.

[2] E. Wesley, “Future Concept Centre Commander Perspectives – Let’s Talk Multi-Domain Operations”, Modern War Institute Podcast., 2019. https://podcasts.apple.com/us/podcast/lets-talk-multi-domain-operations/id1079958510 (accessed 15 March 2020)

[3] V. Gerasimov, “The Value of Science in Prediction”, Trans. R. Coalson, Military-Industrial Kurier, 2013, pp.

[4] “The North Atlantic Treaty Washington D.C. – 4 April 1949”, NATO, last modified 10 April 2019. https://www.nato.int/cps/en/natolive/official_texts_17120.htm (accessed 22 May 2020).

[5] The eFP Battle Group is an ad hoc grouping based upon an armoured or infantry battalion, which is normally commanded by a lieutenant-colonel (NATO O-4). It usually consists of a headquarters, a combination of integral and attached armour and infantry subunits, with their integral sustainment, elements. Also included are combat support organizations, which provide immediate tactical assistance, in the form of reconnaissance, mobility, counter-mobility or direct and indirect fire support, to combat elements. Additional sustainment elements may be attached as it is deemed necessary. eFP battle groups are integrated into host nation brigades. “Factsheet: NATO’s Enhanced Forward Presence”, NATO, 2017. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2017_05/1705-factsheet-efp.pdf (accessed 12 July 2020); C. Leuprecht. “The enhanced Forward Presence: innovating NATO’s deployment model for collective defence – NDC Policy Brief No. 22”, Rome, NATO Defense College, 2019, p. 3.

[6] J. Deni, “NATO’s Presence in the East: Necessary But Still Not Sufficient”, War on The Rocks Commentary, 2017. https://warontherocks.com/2018/06/natos-presence-in-the-east-necessary-but-still-not-sufficient (accessed 10 April 2020).

[7] For a synopsis of the apparent benefits of the eFP see C. Leuprecht. “The enhanced Forward Presence: innovating NATO’s deployment model for collective defence – NDC Policy Brief No. 22”, Rome, NATO Defense College, 2019.

[8] J. Deni, “The Paradox at the Heart of NATO’s Return to Article 5”, RUSI Newsbrief, Vol. 39, No. 10, 2019, p. 2. https://rusi.org/sites/default/files/20191101_newsbrief_vol39_no10_deni_web.pdf (accessed April 15 2020).

 

Assessment Papers Below Established Threshold Activities (BETA) Governing Documents and Ideas North Atlantic Treaty Organization Steve MacBeth

Assessing Morocco’s Below War Threshold Activities in Spanish Enclaves in North of Africa and the Canary Islands

Jesus Roman Garcia can be found on Twitter @jesusfroman. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


Title: Assessing Morocco’s Below War Threshold Activities in Spanish Enclaves in North of Africa and the Canary Islands

Date Originally Written:  August 10, 2020.

Date Originally Published:  November 16, 2020.

Author and / or Article Point of View:  The author believes that given the current economic and public health weakness and the climate of social instability in Spain, Morocco could try, once again, to execute activities below the threshold of war to achieve its strategic, political, and territorial objectives in the Spanish territories of North Africa.

Summary:  Spain is currently in a situation of economic and public health weakness and emerging social instability. Morocco, as a master of activities below the threshold of war, could take advantage of Spain’s situation to obtain political and territorial benefits in North of Africa and the Canary Islands. This risks escalation between the two countries and could decrease security for all near the Strait of Gibraltar.

Text:  The Strait of Gibraltar has always been an important strategic zone, and although it has been stable in the recent decades, it has not always been that way. The most recent relevant landmark between Moroccan-Spanish was the beginning of the Rif War in 1911. This war lasted until 1927 with the dissolution of the Rif Republic. Since then, what is known as the “Places of sovereignty” (Perejil Islet, Peñón de Vélez de la Gomera, Peñón de Alhucemas and the Chafarinas Islands) plus Ceuta, Melilla and the Alboran Islands, together with the former territory of Western Sahara and the Canary Islands, and the territorial waters of all the aforementioned territories have been the subject of disputes between Spain and Morocco. Morocco claims the territories or parts thereof as sovereign territory and does not recognize them as integral parts of Spain. This is the source of constant tension and conflict between the two countries.

There is little debate about the potential threat of a direct attack by Morocco on the enclaves of Ceuta and Melilla but, given that Spain has plans for a difficult defense of such territories, this option seems very unlikely[1]. Beyond direct attack though, Morocco has a long tradition of activities below the threshold of war. One of Morocco’s most successful movements below the threshold of war involved invading the territory of Western Sahara during the Green March in 1975 with the help of a peaceful march of some 350,000 civilians demonstrators accompanied by some 20,000 Moroccan troops. This below threshold activity expelled the Spanish administration and army from Western Sahara without the need to use a single bullet[2].

Jumping well ahead in time, the Perejil Islet was the scene of crisis between Morocco and Spain in July 2002. During this crisis, Morocco militarily occupied the uninhabited territory with 12 Marines under the pretext of fighting drug trafficking in the area and refusing to vacate the island afterwards. In this case, a bloodless action by the Spanish Army would solve the conflict and the situation would return to its previous status quo. In this case, the threshold of war was very close to being reached and the conflict de-escalated shortly afterwards[3].

Although Morocco also gets political advantage classified as peaceful competition in fields like immigration control, fishing agreements with Spanish fishers, or anti-terrorist cooperation, the Moroccan government also has tried to influence the Spanish territories by carrying out what some authors have described as hybrid actions which seek destabilization. Examples of these actions include:

-2007 Moroccan public condemnation of the visit of the Kings of Spain to Ceuta and Melilla.

-2010 issuing Moroccan passports of people originally born in Ceuta or Melilla which attributed the possession of both cities to Morocco.

-Since 2000 — selective regulation of the migratory flow of irregular immigrants who cross to Ceuta and Melilla and also to the peninsula by land or sea as a way of political pressure.

-2018-2020 unilateral closure of the commercial border between Ceuta and Melilla.

-2019 the Moroccan Government prohibits its officials with diplomatic or private passports from entering to Ceuta or Melilla.

-2020 veto at the entry of fresh fish into the city of Ceuta[4].

On other occasions, Morocco has frontally challenged Spanish sovereignty, as in the case of the new delimitation of its territorial waters[5]. In December 2014, Spain formally requested to the United Nations an extension of its Exclusive Economic Zone (EEZ) of the Canary Archipelago to 350 miles in accordance with the current legislation on Admiralty Law (International Maritime Law). In February 2020, Morocco approved a law on its parliament for the expansion of the EEZ of the militarily occupied territory of Western Sahara (which Morocco understands as its own), also of 350 miles, similar to the Spanish one, but with null international validity and colliding with the previous Spanish request. The object in dispute is the underwater mountain of Mount Tropic, where it is believed that there may be important deposits of Tellurium and cobalt, fundamental for the manufacture of electrical or solar panels. In this case, the main intention is not to directly dispute these waters, but to establish a lead position for future negotiation. In nearby waters there is also the low possibility of undersea oil fields[6].

Beyond the history of disputes between the Moroccan and Spanish governments in the area is growing destabilization due to different factors that could lead Morocco to a new attempt to try to obtain political or territorial revenue at the expense of Spain. These factors include: the demographic change in the cities of Ceuta and Melilla in favor of the population of Moroccan background, the COVID-19 crisis in both countries and the creation of social tension as a result of the mismanagement of the crisis, and the return of jihadists from the Middle East originally from the cities of Ceuta and Melilla. Further contributing factors include the fact that both cities are not protected by the North Atlantic Treaty Organizations’ Article 5, the rearmament of Algeria and the subsequent rearmament of Morocco, the migration crisis due to the civil war in Libya. Finally, the search for a common foreign enemy by the Moroccan authorities as a way to quell the growing internal discontent due to the lack of democratic freedoms combined with the departure from Spain of King Juan Carlos I with whom the Moroccan Royal Family maintained very good relations adds to the tensions.

One of the main keys is to understand that Morocco, due to its demographic, economic, and political weight, is currently in a situation of inferiority in relation to Spain. Based upon this inferiority, the most cost-effective scenario and maybe the only possible one in which Morocco can profit, is by continuing to pursue activities below the threshold of war. As described above, Morocco has mastered these below threshold activities and they have sometimes proved very successful. The current situation sets ideal conditions for Morocco to try once again to obtain some political (and territorial) benefit from the crisis that Spain is currently suffering. Therefore, it will depend on Spain’s preparation for these eventual activities that may probably occur when the country is the weakest. Avoiding falling into the trap of escalating the conflict, but directly and unambiguously addressing the challenges that may arise as result of such provocations, may be the only options for Spain to keep the current status quo in the area.


Endnotes:

[1] Gutiérrez, Roberto (2019, December 31) Ceuta y Melilla: ¿una defensa imposible? Retrieved August 10, 2020 https://www.revistaejercitos.com/2019/12/31/ceuta-y-melilla-una-defensa-imposible

[2] Villanueva, Christian D. (2018, September 27) La zona Gris. Retrieved August 10, 2020 https://www.revistaejercitos.com/2018/09/27/la-zona-gris

[3] Jordán, Javier (2018, June) Una reinterpretación de la crisis del Islote Perejil desde la perspective de la amenaza híbrida. https://www.ugr.es/~jjordan/amenaza-hibrida-perejil.pdf

[4] Jordán, Javier (2020, March 24) Ceuta y Melilla: ¿emplea Marruecos estrategias híbridas contra España? Retrieved August 10, 2020 https://global-strategy.org/ceuta-y-melilla-emplea-marruecos-estrategias-hibridas-contra-espana

[5] RTVE.es (2020, February 04) Marruecos da un paso más en la delimitación de sus aguas territoriales. https://www.rtve.es/noticias/20200204/marruecos-da-paso-mas-delimitacion-aguas-territoriales/1999044.shtml

[6] García, Rafael (2019, January 23) Canarias y la previsible ampliación de su plataforma continental: el difícil equilibrio entre España, Marruecos y Sáhara Occidental. https://revistas.uam.es/reim/article/view/reim2019.26.008/11212

Assessment Papers Below Established Threshold Activities (BETA) Jesus Roman Garcia Morocco Spain

Writing Contest Results — Below Threshold Competition: China

Divergent Options ran a Writing Contest from May 1, 2020 to July 31, 2020 and as of this writing all of the entries we received have been published.  On behalf of the Divergent Options Team of Phil Walter, Steve Leonard, and Bob Hein, and also on behalf of our judges Kori Schake of the American Enterprise Institute, Wayne Hugar of the National Intelligence University, and Ali Wyne a nonresident senior fellow with the Atlantic Council, we want to thank all of our writers who entered the contest.  Divergent Options would not be what it is without our writers, and for that we are eternally grateful.  All writings related to this contest can be found by clicking here, and the awards are as follows:

First Place $500:  Michael D. Purzycki – “Options for Altering Global Energy Developments to America’s Advantage and China’s Disadvantage

Second Place $300:  James P. Micciche – “U.S. Below War Threshold Options Against China

Third Place $100:  Eli Kravinsky – “Below Threshold Options for China Against the U.S.

Honorable Mention $50:  Thomas J. Shattuck – “Options for Taiwan to Better Compete with China

Honorable Mention $50:  Drake Long – “U.S. Options for Countering the Belt and Road Initiative in Africa

Honorable Mention $50:  William Freer – “Assessing How Countries Can Compete with Chinese Hybrid Tactics Below the Threshold of Armed Conflict

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China)

Options for the U.S. to Counter China’s Disruptive Economic Activities

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Johnathan Falcone is a United States Naval officer, entrepreneur, and graduate of the Princeton School of Public and International Affairs. He can be found on Twitter @jdfalc1. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China’s (PRC) economic activities threaten the U.S.-led financial order.

Date Originally Written:  June 02, 2020.

Date Originally Published:  October 26, 2020.

Author and / or Article Point of View:  The author believes that conflict between the U.S. and China is underway, and China has fired the first salvos in the economic and financial domains. The article is from the perspective of U.S. economic strategy to maintain competition below the threshold of kinetic war.

Background:  The PRC emerged from the 2008 financial crisis with increased capability to influence markets abroad and undermine U.S. leadership. Through new institutions, such as the Asian Infrastructure Investment Bank, and new development plans, including Belt and Road Initiative (BRI), China is making strides towards bifurcating the international financial system[1].

Significance:  Beijing uses its growing economic might to erode international support for the Republic of China (ROC) (Taiwan / Taipei)– the most likely source of armed conflict – and to increase military capacity beyond its shores[2]. Coercive economic strategies like tacit regional acquiescence and strategic land acquisition threaten the non-kinetic nature of today’s competitive environment[3]. Below are economic-based options to strengthen the existing U.S.-built financial order while simultaneously limiting the PRC’s capacity to project regional influence and stage wartime assets.

Option #1:  The U.S. takes action via proxy and encourages Southeast Asian and Pacific Island countries to increase bi-lateral trade volume with the ROC.

For countries in China’s near-abroad, diplomatic recognition of Taiwan is not possible. On the other hand, increasing trade with the ROC, a World Trade Organization member, is less provocative.

Risk:  As Taiwan’s largest trading partner, China will threaten and apply economic pressure to achieve political aims on the island. If Taiwan diversified its trade activity, economic coercion may no longer prove effective. This ineffectiveness might encourage China to pivot to military pressure against Taipei and its citizens. Substantiating this concern is the fact that China has already demonstrated its willingness to aggressively protect its economic interests in the South China Sea[4].

Further, the existing One-China Policy may be endangered if an increase in bi-lateral partnerships appeared to be U.S.-orchestrated. Although ROC independence would not be explicitly recognized, encouraging action symbolically consistent with an independent international actor could increase military posturing between the U.S. and China, as seen in the 1995-96 Taiwan Straits Crisis[5]. If tensions were to heighten again, the U.S. Navy would be opposing a much more capable People’s Liberation Army-Navy force than in previous crises.

Gain:  In addition to limiting China’s ability to apply economic pressure, bi-lateral trade would tie regional interests to ROC. China’s BRI has undermined relationships between ROC and neighboring countries, reducing incentives to aid Taiwan militarily and limiting U.S. military capacity to respond if China were to act aggressively in the region[6]. Substantive partnerships with the ROC create de facto buy-in to the U.S.-led financial system, increasing the number of potential partners to assist U.S. forces in case of war.

Option #2:  The U.S. lowers barriers to trade and access to markets by joining the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) trade agreement.

The original Trans-Pacific Partnership (TPP) was developed as part of the U.S.’ “strategic pivot to Asia” during President Obama’s administration. President Trump campaigned that he would withdraw the United States from negotiations and did so in 2017.

Risk:  The new CPTPP has left the door open for the PRC to join[7]. If Beijing and Washington were members of the same trade zone, it would become easier for both to circumvent tariffs, thereby undermining each state’s ability to compete with non-military tools.

Also, when it comes to CPTPP, friction exists between U.S. grand strategy and domestic politics. TPP received harsh opposition from both the political left and right[8][9]. Although there was agreement that there would likely be overall economic growth, many feared that American middle-class workers would be negatively impacted. As such, this option may be politically untenable.

Gain:  This option encourages regional buy-in to the U.S.-led financial order. CPTPP already creates a new market bloc that will bring about economic prosperity under U.S.-influenced rules. U.S. membership in the agreement would amplify its benefits. Chinese markets will have to liberalize to remain competitive, undermining the PRC’s alternative offerings to nearby states.

Today, China bullies developing countries into economic agreements with political concessions in exchange for access to Chinese markets[10]. U.S. entrance into CPTPP would decrease both PRC coercive power and regional dependency on Chinese markets.

Option #3: The U.S. leverages international institutions and assists strategically significant holders of Chinese debt obligations to refinance through the World Bank and International Monetary Fund (IMF).

China infamously financed the Hambantota Port Project, a port in southern Sri Lanka with access to the Indian Ocean. When the project failed, China negotiated a deal with Sri Lanka and now owns the port and surrounding land, granting Beijing unchallenged access to strategic waterways[11].

Risk:  Existing tensions between Western and the five BRICS (Brazil, Russia, India, China, and South Africa) states could be exacerbated at the World Bank and IMF. BRICS nations have routinely called for fundamental reforms to the Bretton Woods system to reflect the rising economic influence of developing states[12]. This financial intervention to refinance Chinese debt through Western channels could accelerate BRICS’ efforts to develop a competing financial channel.

Gain:  Beijing touts development projects in the Maldives and Djibouti, whose outstanding debt owed to China stands at 30 percent and 80 percent of their national Gross Domestic Products, respectively[13]. Default by either state would resign strategic territory in the Indian Ocean and mouth of the Red Sea to the PRC. Refinancing would ensure China does not acquire access to these strategic staging areas and would demonstrate the liberal financial system’s willingness to protect vulnerable states from predatory practices.

Other Comments:  The PRC will continue to project influence and hold an alternative vision for the world economy. The objective is to demonstrate the value of free markets to developing states and tie regional interests to ROC’s quasi-independent status.

Recommendation:  None.


Endnotes:

[1] Hillman, J. (2020, March 13). A ‘China Model?’ Beijing’s Promotion of Alternative Global Norms and Standards. Retrieved from https://www.csis.org/analysis/china-model-beijings-promotion-alternative-global-norms-and-standards.

[2] Kynge, J. (2020, July 10). China, Hong Kong and the world: is Xi Jinping overplaying his hand? Retrieved from https://www.ft.com/content/a0eac4d1-625d-4073-9eee-dcf1bacb749e.

[3] Leung, Z. (2020, May 15). The Precarious Triangle: China, Taiwan, and United States. Retrieved from https://thediplomat.com/2020/05/the-precarious-triangle-china-taiwan-and-united-states; Kristof, N. (2019, September 4). This Is How a War With China Could Begin. Retrieved from https://www.nytimes.com/2019/09/04/opinion/china-taiwan-war.html.

[4] Stavridis, J. (2020, May 30). World cannot ignore Chinese aggression in South China Sea. Retrieved from https://asia.nikkei.com/Opinion/World-cannot-ignore-Chinese-aggression-in-South-China-Sea.

[5] Suettinger, R. (2003). Beyond Tiananmen: The Politics of U.S.-China Relations, 1989-2000. Brookings Institution Press.

[6] Meick, E., Ker, M., & Chan, H.M. (2018, June 14). China’s Engagement in the Pacific Islands:
Implications for the United States. Retrieved from https://www.uscc.gov/sites/default/files/Research/China-Pacific%20Islands%20Staff%20Report.pdf.

[7] Zhou, W., & Gao, H. (2020, June 7). China and the CPTPP: is it time to rethink Beijing’s involvement in the trans-Pacific trade pact? Retrieved from https://www.scmp.com/economy/article/3087725/china-and-cptpp-it-time-rethink-beijings-involvement-trans-pacific-trade.

[8] Stiglitz, J. (2016, March 28). Why TPP Is a Bad Deal for America and American Workers. Retrieved from https://rooseveltinstitute.org/why-tpp-bad-deal-america-and-american-workers

[9] McBride, J. & Chatzky, A. (2019, January 4). What Is the Trans-Pacific Partnership (TPP)? Retrieved from https://www.cfr.org/backgrounder/what-trans-pacific-partnership-tpp.

[10] Grossman, D., & Chase, M.S. (2019, December 9). What Does Beijing Want from the Pacific Islands? Retrieved from https://www.rand.org/blog/2019/12/what-does-beijing-want-from-the-pacific-islands.html.

[11] Abi-habib, M. (2018, June 25). How China Got Sri Lanka to Cough up a Port. Retrieved from https://www.nytimes.com/2018/06/25/world/asia/china-sri-lanka-port.html

[12] Gangopadhyay, A., & Kala, A.V. (2012, March 29). Brics Wants World Bank, IMF Reforms. Retrieved from https://www.wsj.com/articles/SB10001424052702303816504577311012331186378.

[13] The Economic Times. (2019, May 09). China Building ‘International Network of Coercion through Predatory Economics’: US. Retrieved from https://economictimes.indiatimes.com/news/international/business/china-building-international-network-of-coercion-through-predatory-economics-us/articleshow/69257396.cms.

2020 - Contest: Civil Affairs Association Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Economic Factors Johnathan Falcone Option Papers United States

Below Threshold Options for China against the U.S.

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Eli Kravinsky is an undergraduate student at Haverford College. He previously spent a year in China on a State Department-funded language scholarship. He can be found on Twitter @elikravi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. is continuing to orient its foreign policy and defense policy towards the People’s Republic of China (PRC). Accordingly, PRC tactics that have proven successful against the U.S. thus far may begin to fail. This failure will cause the PRC to develop new tactics to use against the U.S. below the threshold of armed conflict.

Date Originally Written:  July 27, 2020.

Date Originally Published:  October 19, 2020.

Author and / or Article Point of View:  The author is an American undergraduate student interested in China and security studies. The article is written from the perspective of the PRC and Chinese Communist Party (CCP) towards the U.S.

Background:  Strategic competition between the U.S. and China has increased in recent years. China’s strategy is to carefully escalate tensions so as to enable it to create “facts on the ground”, such as de-facto Chinese control over much of the South China Sea, without allowing tensions to boil over into full-scale war, which could result in China’s gains being rolled back[1].

Significance:  The U.S. has started taking much stronger notice of China’s below-threshold tactics and is responding increasingly harshly. As such, China must innovate new, carefully calibrated below-threshold tactics.

Option #1:  The People’s Liberation Army (PLA) Navy (PLAN) can deliberately ram a U.S. Navy (USN) ship in the South China Sea.

While PLAN ships sometimes ‘brush up’ on USN ships, an actual crash – intentional or otherwise – is unprecedented. However, in the 2001 EP-3 incident a PLA fighter jet crashed into a USN reconnaissance aircraft[2]. An easy method to create plausible deniability and reduce the risk to the PRC side would be to instead use a civilian freighter operating under the Maritime Militia. In the summer of 2017, two USN Arleigh Burke-class destroyers collided with civilian ships, both suffering severe damage and casualties. Even though the two incidents both occurred close to shore, Search and Rescue vessels and aircraft did not arrive until several hours after the initial crash in both cases[3]. As such, a USN response in force would likely arrive late, especially given that a deliberate ramming attack would occur closer to Chinese shores. Accordingly, the PLAN could pre-position ships to rapidly secure the site of the incident, and the U.S. side would have to confirm the incident was deliberate and not an accident as in the 2017 incidents.

Risk:  This would constitute a significant escalation of tensions between the two militaries. There is an appreciable chance that such an incident would be treated by the U.S. as a casus belli, especially if it caused casualties on the U.S. side.

Gain:  If executed successfully, this move could deter the USN from operating within China’s claimed waters. While the USN understands the PLA can impose costs on it via access-denial weaponry in an actual conflict, this option would impose similar costs even under competition that falls short of war. Additionally, doing so could allow the PLA to board a damaged or possibly crippled USN ship under the guise of rescue operations, offering a valuable opportunity to study USN technology and damage-control procedures up close. Tellingly, in the EP-3 incident, the PLA exploited the situation to extract numerous secrets from the downed USN reconnaissance aircraft[4]. Lastly, were the USN ship to be sufficiently damaged the PLAN could effectively intern the crew under the guise of rescuing them. This would give the PRC leverage over the U.S. in the unfolding crisis, as it would effectively be holding U.S. military personnel as hostages.

Option #2:  The CCP can secretly support extremist protest movements in the U.S.

Risk:  The most appreciable risk is that the U.S. would respond in kind, and offer support to dissident groups in China, such as Hong Kong separatists. However, a convincing argument can be made that the CCP believes the U.S. is already secretly doing so[5][6], meaning the CCP may well be willing to stomach this risk. Likewise, the PRC can control the flow of information within its borders and call upon an effective domestic security apparatus to stem anti-Party civil disturbances. The risk of a harsh U.S. response would be contingent on how well the CCP could keep the funding secret or maintain plausible deniability.

Gain:  Recent events such as the anti-lockdown protests and anti-police brutality protests have shown the risk of domestic instability in the U.S.[7][8]. The CCP knows all too well from its own history how internal instability can sap a state’s ability to deal with external threats. Secretly channeling funding to extremist groups in the U.S., such as armed militias, would be an effective and cheap way to create a security headache for the U.S. government at home.

Option #3:  The PLAN could impose a maritime blockade on Taiwan. The CCP views Taiwan as an incredibly sensitive issue, to the extent that “reunifying” it with the mainland is the ultimate test of its legitimacy[9]. As such, the CCP is concerned about U.S. arms sales to Taiwan, and especially the possibility that the U.S. might relieve Taiwan were the PRC to attempt to invade Taiwan. One option to resolve both of these concerns, as well as potentially sap Taiwan’s will to resist would be to launch a maritime blockade of Taiwan[10].

Risk:  This option entails considerable risk. Although the PLAN and PLA Air Force are rapidly expanding their capabilities, this would still be a very difficult task[11][12]. Were the U.S. or its allies to attempt to relieve Taiwan, war could easily erupt from a localized incident at sea. This would also have huge knockoff effects on the shipping industry, as insurance rates would skyrocket amidst rising tensions. China’s exports sector would foot much of the bill. Lastly, doing so would likely backfire and strengthen Taiwan’s desire to protect itself from China, instead of weakening it. However, as the 1996 Taiwan Straits Incident shows, the CCP often fails to appreciate how a heavy-handed policy towards Taiwan can be against its own interests. The key to predicting this possibility isn’t a perfectly objective cost-benefit analysis, but an awareness of how constraints on the CCP could cause it to make a self-defeating choice.

Gain:  If executed successfully, this option could cripple the Taiwanese economy and make U.S. intervention in a Taiwan-PRC conflict vastly more difficult, making USN access to the Western Pacific increasingly difficult.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Erickson, A. S., Martinson, Martinson, R. D. (March 15, 2019) China’s Maritime Gray Zone Operations. China Maritime Studies Institute and Naval Institute Press

[2] Sanger, D. E., Rosenthal, E. (2001, April 2) U.S. Plane In China After It Collides With Chinese Jet. The New York Times. https://www.nytimes.com/2001/04/02/world/us-plane-in-china-after-it-collides-with-chinese-jet.html

[3] Department of the Navy/Office of the Chief of Naval Operations. (2017). Memorandum for Distribution:  Report on the Collision between USS FITZGERALD (DDG 62) and Motor Vessel ACX CRYSTAL, Report on the Collision between USS JOHN S MCCAIN (DDG 56) and Motor Vessel ALNIC MC. Retrieved from https://s3.amazonaws.com/CHINFO/USS+Fitzgerald+and+USS+John+S+McCain+Collision+Reports.pdf

[4] Zetter, K. Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident. The Intercept. https://theintercept.com/2017/04/10/snowden-documents-reveal-scope-of-secrets-exposed-to-china-in-2001-spy-plane-incident

[5] Buckley, C. (2013, August 19). China Takes Aim at Western Ideas. The New York Times. https://www.nytimes.com/2013/08/20/world/asia/chinas-new-leadership-takes-hard-line-in-secret-memo.html

[6] Higgins, A. (2019, August 9). China’s Theory for Hong Kong Protests: Secret American Meddling. The New York Times. https://www.nytimes.com/2019/08/08/world/asia/hong-kong-black-hand.html

[7] Picchi, A. (2020, January 6). Top Global Risk in 2020? It’s American politics, experts say. CBS News. https://www.cbsnews.com/news/the-top-risk-in-2020-its-u-s-politics-geopolitical-analysts-say

[8] Purtill, J. (2020 June 17) This Model forecast the US’s current unrest a decade ago. It now says ‘civil war’. Australian Broadcasting Corporation. https://www.abc.net.au/triplej/programs/hack/model-predicting-united-states-disorder-now-points-to-civil-war/12365280

[9] Yeung, J. T. (2019, October). Why is Taiwan so important? The manipulation of nationalism in legitimizing​ one-party rule in China. The Yale Review of International Studies. http://yris.yira.org/essays/3613

[10] Easton, I. (2017). The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia. Project 2049 Institute.

11] Yoshihara, T., Holmes, J. (2018). Red Star over the Pacific, Revised Edition: China’s Rise and the Challenge to US Maritime Strategy.  Naval Institution Press.

[12] Lee, J. (2019, April 3). Why a US Sale of Fighter Jets to Taiwan Matters. The Diplomat. https://thediplomat.com/2019/04/why-a-us-sale-of-fighter-jets-to-taiwan-matters

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Eli Kravinsky Option Papers United States

Options for Taiwan to Better Compete with China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Thomas J. Shattuck is a Research Associate in the Asia Program and the Managing Editor at the Foreign Policy Research Institute. Mr. Shattuck was a member of the 2019 class of scholars at the Global Taiwan Institute, receiving the Taiwan Scholarship. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Taiwan requires options to better compete with China in international organizations below the threshold of conflict.

Date Originally Written:  July 24, 2020.

Date Originally Published:  October 14, 2020.

Author and / or Article Point of View:  The author is a research associate at a non-partisan foreign policy think tank.

Background:  One of the key national security priorities of the People’s Republic of China is to force Taiwan into unification. Part of that strategy is to limit Taiwan’s ability to participate fully in the international community, specifically in international organizations in which Taiwan is not a full member[1]. Such pressure would be removed upon China-Taiwan unification.

Significance:  In light of the ongoing COVID-19 pandemic, the full participation and cooperation of the entire international community is needed to understand best practices in limiting the spread of the virus. The pandemic has shown the importance of public and global health for a country’s national security. Taiwan’s exclusion from the May 2020 United Nations (UN) World Health Assembly—after dual campaigns by major international players in support of Taiwan’s observership bid and by China to keep Taiwan out—demonstrates the danger and limitations of excluding certain states based on their geopolitical situation[2]. Taiwan is prevented from learning important information or receiving key data in a timely fashion. Also, it is more difficult for Taiwan to share its expertise in stopping the virus’ spread, something that Taipei has succeeded at doing despite its limitations[3]. The spread of viruses endangers the entire world, and political maneuvering by Beijing has damaged the global response effort.

Option #1:  Taipei works with like-minded nations, particularly the United States, to develop a new, non-UN-membership-based international entity, initially focused on health issues with a plan for expansion into other areas.

Risk:  There are two primary risks to such an endeavor. The first risk is the possibility that Beijing will pressure nations into not participating. By threatening various economic or political repercussions, leaders in China have been able to stop Taiwan from expanding its international participation. Such a campaign would likely occur in light of any effort by Taipei to work around current Beijing-imposed limitations. If such a new entity does not receive enough international buy-in, then Taipei risks getting embarrassed for failing to garner support. Second, Beijing would likely direct even greater backlash at Taipei for attempting to challenge it internationally. This could include more assertive military exercises in the Taiwan Strait.

Gain:  Successfully establishing a new international entity would demonstrate that Taipei does not have to live within Beijing-imposed boundaries. As the recent COVID-19 example has shown, Taiwan has much to contribute internationally, but international organizations and members will quickly revert to Beijing’s stance when it comes to Taiwan. It was Taipei that first sounded the alarm regarding the potential danger of COVID-19[4]. Without those confines, Taiwan would be able to showcase its COVID-19 success story and teach other nations its best public health practices. It also would be able to receive information in a timelier fashion. Taiwan’s international participation would no longer be limited by the current status of cross-Strait relations and could be further integrated into the international community. Such an effort would complement the Trump administration’s desire to form some sort of “alliance of democracies” to meet the China challenge[5].

Option #2:  Taiwan relaunches its bid for membership in the UN so that it could become a full member of all UN-affiliated international organizations and ones that require statehood for membership.

Risk:  Any attempt by Taipei to join the United Nations will be stopped by Beijing. The vote would fail in the same way that Taiwan’s bids for guest or observer status in international organizations have since 2016. Depending on the form that such a bid takes (i.e., independence referendum for establishment of the “Republic of Taiwan”), the bid could have catastrophic effects, i.e., Chinese military action against Taiwan or an invasion. If such a move is conducted similarly to past attempts, then it would cause Beijing to lash out in a ways below the threshold of war—perhaps more intense forms of aggression that have become regularized since 2016[6].

Gain:  Even though a UN membership bid would fail, it would once again place Taiwan’s confusing geopolitical status in the limelight. Taiwan’s international plight receives sympathetic news coverage in democratic nations, and forcing countries to vote for the record on where it stands on this issue could spark new conversations about a country’s relationship with Taiwan. With increasingly assertive and aggressive actions by Beijing on various fronts, launching a UN membership bid could help Taipei enhance ties with current “friends” or find new ones because how China treats Taiwan would be given even greater focus across the world. The current international spotlight on China’s behavior at home and abroad may lead to countries working to strengthen relations with Taiwan. Positive outcomes are possible even if the membership bid fails.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Dreyer, J. T. (2018, August 13). The Big Squeeze: Beijing’s Anaconda Strategy to Force Taiwan to Surrender. Foreign Policy Research Institute. https://www.fpri.org/article/2018/08/the-big-squeeze-beijings-anaconda-strategy-to-force-taiwan-to-surrender

[2] Tan, H. (2020, May 19). Taiwan ‘disappointed and angry’ about being excluded from WHO meeting, says it is developing its own coronavirus vaccine. CNBC. https://www.cnbc.com/2020/05/19/taiwan-says-it-is-disappointed-and-angry-being-excluded-from-who-meeting.html

[3] Griffiths, J. (2020, April 5). Taiwan’s coronavirus response is among the best globally. CNN. https://www.cnn.com/2020/04/04/asia/taiwan-coronavirus-response-who-intl-hnk/index.html

[4] Watt, L. (2020, May 19). Taiwan Says It Tried to Warn the World About Coronavirus. Here’s What It Really Knew and When. Time. https://time.com/5826025/taiwan-who-trump-coronavirus-covid19

[5] Pompeo, M. (2020, July 23). Communist China and the Free World’s Future. U.S. Department of State. https://www.state.gov/communist-china-and-the-free-worlds-future

[6] Taiwan says China sending planes near island almost daily. (2020, July 22). Associated Press. https://apnews.com/2126b0fbdf2b7d2e6a5a77c464aeb7b1

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Option Papers Taiwan Thomas J. Shattuck

Options for Altering Global Energy Developments to America’s Advantage and China’s Disadvantage

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Michael D. Purzycki is a researcher, analyst, writer and editor based in Arlington, Virginia. He is a former communications and media analyst for the United States Marine Corps. He writes regularly for Charged Affairs (the journal of Young Professionals in Foreign Policy) and Braver Angels, and has also been published in Merion West, Washington Monthly, the Truman National Security Project, France 24, and Arc Digital. He can be found on Twitter at @MDPurzycki and on Medium at https://medium.com/@mdpurzycki. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States devotes considerable military resources to the Persian Gulf despite significantly reduced reliance on the region’s oil, while China buys more Gulf oil than the U.S. does.

Date Originally Written:  July 27, 2020.

Date Originally Published:  October 7, 2020.

Author and / or Article Point of View:  This article is written from the perspective of U.S. policymakers who wish to indirectly increase economic and military burdens on the People’s Republic of China, in ways that benefit the United States and do not lead to armed conflict.

Background:  The United States has drastically reduced its reliance on oil from the Persian Gulf over the last decade, as the U.S. has become the world’s largest producer of crude oil[1]. China purchases significantly more oil from Saudi Arabia, the world’s second largest producer and the largest producer in the Gulf, than the U.S. does[2]. However, the U.S. still expends considerable military and financial resources in the Gulf, part of the estimated $81 billion per year it devotes to protecting global oil supplies[3]. Meanwhile, as demand for electric cars increases in response to climate change, China’s share of global electric vehicle production is double that of the U.S.[4].

Significance:  While there are multiple reasons for the U.S. presence in the Gulf region, such as deterring Iranian aggression and combatting terrorism, every ship, aircraft, vehicle and service member not protecting oil is one that can be deployed elsewhere in the world. Furthermore, despite the increase in oil prices that would likely result from more vulnerable oil supplies, an incentive to develop alternatives to petroleum would be a positive aspect, given climate change.

Option #1:  The United States ceases to deploy naval vessels to the Persian Gulf.

Risk:  A reduced military presence in the Gulf would increase the vulnerability of oil supplies to attacks by Iran, its proxies, and terrorist organizations, and will likely lead to a rise in global oil prices[5]. Saudi Arabia will fear the U.S. is abandoning it, and may begin developing nuclear weapons to guard against the possibility of a nuclear-armed Iran. Countries that rely more heavily on Gulf oil than the U.S. does – not only U.S. allies Japan and South Korea, but China’s rival India – may be harmed economically by less secure oil[6].

Gain:  Ceasing to deploy vessels to the Gulf leaves more vessels available for the U.S. to use in the Asia-Pacific. A risk of greater instability in the Gulf may lead China to expand its current naval presence in the region, leaving fewer vessels available elsewhere[7]. U.S. vessels would no longer be vulnerable to attacks by Iranian forces. Chillier U.S.-Saudi relations will loosen America’s connection to the aggressive and brutal regime of Mohammad bin Salman, improving America’s moral position[8]. Meanwhile, given petroleum’s contribution to climate change, a rise in oil prices can be embraced as an incentive to reduce reliance on oil, regardless of its source.

Option #2:  The United States prohibits oil exports to China in concert with withdrawal from the Gulf, and steers additional oil exports to major importers of Gulf oil, compensating them for Gulf oil’s increased vulnerability.

Risk:  Embargoing crude oil would likely stall or end negotiations for a U.S.-China trade deal[9]. Furthermore, the U.S. is a relatively minor source of oil for China, meaning the impact of an embargo will likely be weak[10]. China may also retaliate with new and/or higher tariffs on U.S. exports. Also, even with additional imports of U.S. oil, America’s trading partners may still endure a negative economic impact from higher oil prices during a global recession.

Gain:  If compensatory exports of U.S. oil are proportionate to a country’s purchases of Gulf oil, the largest beneficiaries would likely be Japan, South Korea and India (respectively the first, third and fifth largest purchasers of Saudi oil)[2]. The first two have deep, long-lasting economic and defense relationships with the U.S., while India is a potential counterweight to Chinese hegemonic ambitions in Asia. Thus compensatory oil supplies could link these countries close to the U.S. in a multilateral effort to tie China’s hands regarding Gulf oil.

Option #3:  The United States partners with countries importing Gulf oil to develop alternatives to petroleum products, and pointedly excludes China from the partnership. Public policies to this end can include increased investment in clean energy research and development, and initiatives to produce more electric cars at lower prices, as well as car charging stations powered by non-fossil energy.

Risk:  China might portray itself as a victim if it is excluded from international efforts to reduce fossil fuel use. This option might also portray the U.S. as not serious about climate change, arguing that if the U.S. really wanted to solve the problem it would cooperate with any country, including China.

Gain:  Participation in multinational efforts to reduce petroleum use would position the U.S. as a leader in the fight against climate change. U.S. clean energy development lags behind China’s, and during a global recession, a major stimulus of clean energy technology, including in the transportation sector, would provide economic and environmental benefits[11]. If, as with Option #2, America’s primary partners are Japan, South Korea and India, it will be collaborating with countries that are home to car manufacturers listed on the Global 500, companies well-positioned to benefit from an electric car boom[12].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] “What countries are the top producers and consumers of oil?” U.S. Energy Information Administration, April 1, 2020.
https://www.eia.gov/tools/faqs/faq.php

[2] Stevens, Harry, Lauren Tierney, Adrian Blanco and Laris Karklis. “Who buys Saudi Arabia’s oil?” Washington Post, September 16, 2019.
https://www.washingtonpost.com/world/2019/09/16/who-buys-saudi-arabias-oil

[3] “The Military Cost of Defending the Global Oil Supply.” Securing America’s Future Energy, September 21, 2018.
http://secureenergy.org/wp-content/uploads/2020/03/Military-Cost-of-Defending-the-Global-Oil-Supply.-Sep.-18.-2018.pdf

[4] Bledsoe, Paul. “New Ideas for a Do Something Congress No. 7: Winning the Global Race on Electric Cars.” Progressive Policy Institute, April 1, 2019.
https://www.progressivepolicy.org/publication/winning-the-global-race-on-electric-cars

[5] Cordesman, Anthony H. “The Strategic Threat from Iranian Hybrid Warfare in the Gulf.” Center for Strategic and International Studies, June 13, 2019.
https://www.csis.org/analysis/strategic-threat-iranian-hybrid-warfare-gulf

[6] “Iraq continues to be India’s top oil supplier, imports from US rises 4-folds.” Economic Times, May 1, 2019.
https://economictimes.indiatimes.com/industry/energy/oil-gas/iraq-continues-to-be-indias-top-oil-supplier-imports-from-us-rises-4-folds/articleshow/69129071.cms

[7] Eckstein, Megan. “5th Fleet CO: China Laying Groundwork in Middle East to Pose Future Threats; International Coalitions Pushing Back Against Iran.” USNI News, July 23, 2020.
https://news.usni.org/2020/07/23/5th-fleet-co-china-laying-groundwork-in-middle-east-to-pose-future-threats-international-coalitions-pushing-back-against-iran

[8] Editorial Board. “One year later, our murdered friend Jamal has been proved right.” Washington Post, September 30, 2019.
https://www.washingtonpost.com/opinions/2019/09/30/one-year-later-our-murdered-friend-jamal-has-been-proved-right

[9] Swanson, Ana and Keith Bradsher. “Once a Source of U.S.-China Tension, Trade Emerges as an Area of Calm.” New York Times, July 25, 2020.
https://www.nytimes.com/2020/07/25/business/economy/us-china-trade-diplomacy.html

[10] “China’s crude oil imports surpassed 10 million barrels per day in 2019.” U.S. Energy Information Administration, March 23, 2020.
https://www.eia.gov/todayinenergy/detail.php?id=43216

[11] Bledsoe, Paul. “Jumpstarting U.S. Clean Energy Manufacturing in Economic Stimulus and Infrastructure Legislation.” Progressive Policy Institute, May 2020.
https://www.progressivepolicy.org/wp-content/uploads/2020/05/PPI_Clean-Manufacturing-Infrastructure_Embargoed.pdf

[12] “Global 500: Motor Vehicles & Parts.” Fortune, 2019.
 https://fortune.com/global500/2019/search/?sector=Motor%20Vehicles%20%26%20Parts

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Michael D. Purzycki Option Papers Resource Scarcity United States

Assessing the U.S. and China Competition for Brazilian 5G 

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Martina Victoria Abalo is an Argentinian undergrad student majoring in international affairs from The University of San Andres in Buenos Aires, Argentina. She can be found on Twitter as @Martilux. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the U.S. and China Competition for Brazilian 5G

Date Originally Written:  July 24, 2020.

Date Originally Published:  October 5, 2020.

Author and / or Article Point of View:  The author is an advanced undergrad student of International Affairs from Argentina.

Summary:  Brazilian President Jair Bolsonaro and U.S. President Donald Trump see the world similarly. At the same time, China’s investment in Brazil is significantly more than the U.S. investment. With China trying to put 5G antennas into Brazil, and the U.S. trying to stop China from doing the same worldwide, President Bolsonaro finds himself in a quandary and thus far has not decided to side with the U.S. or China.

Text:  When thinking about China and the U.S., most tend to see the big picture. However, often unseen are the disputes that are going in the shadows for alignment. This article will assess how U.S. tries to counterbalance China in Brazil, as China pursues the alignment of the South American power for 5G.

The relationship between China and Brazil must be understood in context. Before the impeachment of Brazil’s President Dilma Rousseff, China was Brazil’s most important ally economically and one of the closest politically[1]. However, with the assumption of the Presidency by Jair Bolsonaro in 2019, Brazil’s foreign policy towards China turned 180 degrees[2]. Although Brazil has been famous for having a foreign policy autonomous from their domestic one[3], Bolsonaro’s office changed that and started a close linkage with U.S. President Donald Trump.

Having a similar political outlook, Bolsonaro and Trump have made Brazil and the U.S. closer than they have ever been. Nevertheless, this closeness comes with a price, especially for Brazil, which seems to be playing the role of the second state in a bandwagon for survival relationship[4] with the United States. This role can be seen in the first months of 2019 when Jair tried to follow the U.S. lead in the international community. Though alignment with the U.S. may be well or poorly appreciated, it remains to be seen what impacts Brazil will feel from China following this alignment.

Brazil’s relationship with the U.S. did not last long because no matter how uncomfortable Bolsonaro feels with the Chinese political model, China remains Brazil’s first economic partner. In 2018 the Brazilian Gross Domestic Product GDP was 12,79%[5] and during 2019 China bought assets in Brazil for U.S. $62.871 billion and had total trade of U.S. $98.142 billion[6] between these two countries. In parallel with this, Brazil’s second-best trade partner, the U.S., was far behind China, with a two – way trade of U.S. $59.646 billion. As we know, the United States can not offer to Brazil the economic benefits that China does and clearly, this is no secret in Brazil. With this trade disparity, the question is whether the U.S. can offer something as powerful as China, to persuade Brazil from signing more agreements with China, such as installation of 5G antennas?

Even though 5G antennas are faster than the 4G, there are two concerns around this new technology. The first one is the privacy of the users because it is easy to get the exact user location. The second is that the owner of the 5G network or a hacker could spy on the internet traffic passing through said network[8].

In 2020, the United States is attempting to thwart China from signing agreements to place 5G antennas in countries worldwide. While the United Kingdom and France[9] rejected any kind of deal with China, in Brazil the official decision keeps on being delayed, and as of this writing nobody knows whether Bolsonaro align with China or the U.S.

China is trying to persuade Brazil to sign an agreement with Huawei which aims to develop 5G technology by placing 5G antennas all along Brazil[10]. This quest to convince Brazil to sign with Huawei has been going on for months. Despite the lack of a signed agreement Huawei, who has been operating in Brazil for a long time now, is opening a lab of 5G technology in Brasilia[11].

The U.S. does not have a viable counteroffer to Brazil for the placement of Huawei 5G antennas across the country[12]. The Trump administration keeps trying to persuade their political allies to not sign with Huawei, although the United States has not developed this kind of alternative technology. However, there are some companies interested in placing 5G on Brazil alike the Mexican telecommunications company Claro[13].

President Bolsonaro, in an effort to balance the U.S. and China’s interest in Brazil, will likely have to find a middle way. Regarding the influence of China when it comes to Brazil’s economy, it is naïve to think that there will not be any consequence if Brazil says no to Huawei. Of course, this possible “no” does not mean that China will break any economical entanglement with Brazil, but clearly, China would not be pleased by this decision. A yes decision by Bolsonaro might be a deal-breaker for the Trump-Bolsonaro relationship. Additionally, Bolsonaro started his presidency seeking to be Trump’s southern ally to ensure survival. Bolsonaro remains as hopeful as Jair that Brazil would be a secondary state[14], and that following the U.S. will help Brazil to change their political and economic allies. Finally, the close relationship between the U.S. and Brazil is quite good, and the U.S. can support Bolsonaro politically and diplomatically speaking in ways that China is simply not able.

In conclusion, Brazil is placed between a rock and a hard place and the solution to this matter will not satisfy all participants. It might be rather expensive for the future of Brazil if the U.S. does not back Bolsonaro if he says yes to China, and China might turn back on the Brazilian administration if they say no to Huawei.


Endnotes:

[1] Ferreyra, J. E. (n.d.). Acciones de política exterior de Brasil hacia organismos multilaterales durante las presidencias de Lula Da Silva [Grado, Siglo 21]. https://repositorio.uesiglo21.edu.ar/bitstream/handle/ues21/12989/FERREYRA%20Jorge%20E..pdf?sequence=1&isAllowed=y

[2] Guilherme Casarões. (2019, December 20). Making Sense of Bolsonaro’s Foreign Policy at Year One. Americas Quarterly. https://www.americasquarterly.org/article/making-sense-of-bolsonaros-foreign-policy-at-year-one

[3] Jacaranda Guillén Ayala. (2019). La política exterior del gobierno de Bolsonaro. Foreign Affairs Latinoamérica. http://revistafal.com/la-politica-exterior-del-gobierno-de-bolsonaro

[4] Matias Spektot, & Guilherme Fasolin. (2018). Bandwagoning for Survival: Political Leaders and International Alignments.

[5] Brasil—Exportaciónes de Mercancías 2019. (2019). Datos Macro. https://datosmacro.expansion.com/comercio/exportaciones/brasil

[6] World Integrated Trade Solutions. (2020, July 12). Brasil | Resumen del comercio | 2018 | WITS | Texto. World Integrated Trade Solutions. https://wits.worldbank.org/CountryProfile/es/Country/BRA/Year/LTST/Summarytext

[7] World Integrated Trade Solutions. (2020, July 12). Brasil | Resumen del comercio | 2018 | WITS | Texto. World Integrated Trade Solutions. https://wits.worldbank.org/CountryProfile/es/Country/BRA/Year/LTST/Summarytext

[8] Vandita Grover. (2019, October 16). In the Age of 5G Internet Is Data Privacy Just A Myth? | MarTech Advisor. Martech Advisor. https://www.martechadvisor.com/articles/mobile-marketing/5g-internet-and-data-privacy

[9] George Calhoun. (2020, July 24). Is The UK Ban On Huawei The “Endgame” For Free Trade? Forbes. https://www.forbes.com/sites/georgecalhoun/2020/07/24/is-the-uk-ban-on-huawei-the-endgame-for-free-trade/#6735924d46db

[10] Oliver Stunkel. (2020, June 30). Huawei or Not? Brazil Faces a Key Geopolitical Choice. Americas Quarterly. https://americasquarterly.org/article/huawei-or-not-brazil-faces-a-key-geopolitical-choice

[11] Huawei to open 5G lab in Brasília. (2020, July 23). BNamericas.Com. https://www.bnamericas.com/en/news/huawei-to-open-5g-lab-in-brasilia

[12] Gabriela Mello. (2020, July 7). Huawei says U.S. pressure on Brazil threatens long delays in 5G rollout. Reuters. https://www.reuters.com/article/us-huawei-tech-brazil-5g-idUSKBN2482WS

[13] Forbes Staff. (2020, July 8). Claro, de Carlos Slim, iniciará la carrera del 5G en Brasil. Forbes México. https://www.forbes.com.mx/tecnologia-claro-slim-5g-brasil

[14] Matias Spektot, & Guilherme Fasolin. (2018). Bandwagoning for Survival: Political Leaders and International Alignments.

Assessment Papers Below Established Threshold Activities (BETA) Brazil China (People's Republic of China) Competition Emerging Technology United States

Assessing How Countries Can Compete with Chinese Hybrid Tactics Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


William Freer is currently reading at War Studies at King’s College London. He was a European finalist in the KF-VUB Korea Chair Writing Competition in 2018. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing How Countries Can Compete with Chinese Hybrid Tactics Below the Threshold of Armed Conflict

Date Originally Written:  July 24, 2020.

Date Originally Published:  September 28, 2020.

Author and / or Article Point of View:  The author is a soon to be graduated War Studies student reading at King’s College London who strongly believes in the upholding of the rules-based international order.

Summary:  Beijing’s continued use and development of coercive tactics below the threshold of armed conflict, sometimes referred to as ‘Hybrid’ or ‘Grey Zone’ conflict, threatens to undermine the existing rules-based international order. Rather than responding to Beijing at the tactical level, her competitors can instead develop their response on the strategic level and do so multilaterally.

Text:  Hybrid warfare is nothing new. States unable to compete (with the United States) in conventional military terms have long been evolving their capabilities below the threshold of armed conflict from cyber warfare to ‘Ambiguous’ warfare and everything in between[1]. The world has seen these tactics in use for decades in attempts by revanchist states to undermine the existing international order, yet there is little agreement on which tactics work best to counter them. In order to successfully compete with Beijing below the threshold of armed conflict, countries in South/East Asia can look to developing their responses on the strategic level and in a multilateral way.

The main problem this strategic level response poses is that it will require a great deal of multilateral cooperation. Beijing prefers to target states with its diplomacy and hybrid warfare individually rather than collectively[2]. By doing so, Beijing can maximise its coercive potential. When compared to Vietnam, Malaysia, Taiwan, the Philippines, Indonesia and even India or Japan, China’s economic and military strength is far greater[3]. These Chinese strengths have seen the placing of oil rigs in the claimed waters of other states or regular intrusions into the claimed waters of other states by Chinese naval vessels (from fishing boats to warships)[4]. These tactics are difficult to counter. The Vietnamese, for example, attempted to interfere with a Chinese oil drill’s operation in their waters through harassing it with coast guard cutters, but this did not prove effective in deterring Beijing’s activities. Simply responding in kind to Beijing’s tactics like this will in fact further serve to undermine the rules-based international order.

It is hard for individual states to counter these activities on the tactical level. The same cannot be said for the strategic level, however. Through more meaningful multilateral engagement, states can use their collective power to more effectively compete with Beijing, this multilateral engagement can (and must) come in many different forms.

The most important way in which states can help each other to compete with Beijing is through intelligence sharing. Good intelligence is vital in allowing for states to effectively combat tactics below the threshold of armed conflict. The less wealthy of China’s neighbours are severely restricted by the resources at their disposal and can therefore seek to pool their intelligence capabilities as much as possible. This pooling would not be a simple task; it will involve highly sensitive information and states typically jealously guard their secrets. To be able to stand a chance in competing against an adversary, especially in the use of hybrid warfare, knowledge of Chinese activities is essential. There is already a great deal of the necessary diplomatic framework in place for this sharing to happen. The Association of South East Asian Nations could provide a useful starting point for its members to better share intelligence. There is also talk of the Five Eyes program being expanded to include Japan, which is a step in the right direction[5].

Much of the competition between China and other countries is playing out across the Indo-Pacific region (from Japan and the central Pacific to the western end of the Indian Ocean), this is an inherently maritime region[6]. As such, any meaningful multilateral cooperation by those countries that compete with Beijing will need to include a maritime element.

This maritime angle presents many possibilities. For example, the joint patrolling of each other’s waters or joint responses to intrusions by Beijing’s naval assets is one way this could be done. Another would be to embed military personnel into each other’s forces. Actions like these would serve an important purpose in disabling Beijing’s ability to target countries bilaterally and thus minimise the leverage that Beijing could bring to bear on its competitors. If these actions were taken, Beijing would have to seriously re-evaluate when and where they employ coercive tactics. Already moves in this direction are being made as Japan, India, the United States and others conduct regular joint exercises[7]. These joint exercises could be taken to the next stage in the form of regular joint deployments and should even go as far as to include joint coast guard duties. This strategy could also include land-based options, military observers embedded with Indian forces along their contested borders with China for example.

The main problem in making a success out of multilateral engagement will be overcoming trust issues. Many of the countries that will need to support each other have their own disputes and complex histories. Take the Spratly Islands for example, it is not only China and Vietnam who have claims there, but also the Philippines, Malaysia and Taiwan[8]. Even so, these countries could learn to put aside their differences for now. Some countries appear to be trying to avoid competition with Beijing, but whether they like it or not Xi Jinping’s China will compete with them. Unless the countries of the Indo-Pacific work together, Beijing will be able to target them bilaterally at will.

The U.S. could encourage and support these actions and indeed this may be a necessary component for success. However, for it to work it is vital that the US does not take a leading role, but instead allows the regional countries to take these steps on their own initiative. In this way, these countries will not feel pressured towards an unwanted confrontation with Beijing by the US. If successful, this non-leading role for the U.S. will avoid tit-for-tat responses and the further undermining of international norms.

Beijing has become adept at making use of hybrid warfare, so why try and play them at their own game? By taking the competition with Beijing below the threshold of armed conflict to the strategic level, countries can prevent bilateral coercion from Beijing. If Beijing believes that actions against one country will result in involving many others into the situation, they will be far less likely to do so. Increased multilateral cooperation can have many different facets, in terms of competition with Beijing, the intelligence and maritime domains are the most important and so these would be the areas for countries to prioritise.


Endnotes:

[1] Connell, Mary Ellen and Evans, Ryan (2015, May). Russia’s “Ambiguous Warfare” and implications for the U.S. Marine Corps. Retrieved July 22, 2020, from https://www.cna.org/CNA_files/PDF/DOP-2015-U-010447-Final.pdf

[2] Miller, Tom (2019). Chapter 6. In China’s Asian Dream: Empire Building Along the New Silk Road (pp. 199-235). London: Zed Books.

[3] Blackwill, Robert D. & Harris, Jennifer M. (2016). Chapter 5. In War by Other Means: Geoeconomics and Statecraft (pp 129-152). Cambridge: Harvard University Press.

[4] Cole, Bernard D. (2016) Chapter 3. In China’s Quest for Great Power: Ships, Oil and Foreign Policy. (pp 85-114). Annapolis: Naval Institute Press.

[5] Howell, David (2020, June 30). Why Five Eyes should now become six. Retrieved July 22, 2020, from https://www.japantimes.co.jp/opinion/2020/06/30/commentary/japan-commentary/five-eyes-now-become-six

[6] Patalano, Dr Alessio (2019). UK Defence from the ‘Far East’ to the ‘Indo-Pacific’. London: Policy Exchange. Retrieved July 22, 2020, from https://policyexchange.org.uk/wp-content/uploads/2019/07/UK-Defence-from-the-%E2%80%98Far-East%E2%80%99-to-the-%E2%80%98Indo-Pacific%E2%80%99.pdf

[7] Oros, Andrew L (2017) Chapter 5. In Japan’ Security Renaissance: New Policies and Politics for the Twenty-First Century (pp 126-168). New York: Columbia University Press.

[8] Hawksley, Humphrey (2018) Part I. In Asian Waters: The Struggle over the Asia-Pacific and the Strategy of Chinese Expansion (pp 22-57). London: Duckworth Overlook.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) William Freer

Assessing the Development of Chinese Soft Power in Central Asia

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


James Ridley-Jones is a PhD student at King’s College London currently researching Geostrategy in Central Asia. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Development of Chinese Soft Power in Central Asia

Date Originally Written:  July 15th 2020.

Date Originally Published:  September 23, 2020.

Author and / or Article Point of View:  The author believes that Chinese Soft Power, initiative failures are indicative of wider Chinese strategic engagement failures in the Central Asian region. For the purposes of this assessment Soft Power is defined as the use of investment diplomacy and cultural engagement to build relationships and project influence below the threshold of armed conflict.

Summary:  Chinese Soft Power initiatives remain key to facilitating relations alongside Chinese investment. Although China retains good bi-lateral relations with the Central Asian states, a closer examination of Chinese initiatives demonstrates failures amongst the region’s general populations comparative to the ruling elites.

Text:  The announcement of the Belt and Road Initiative by Xi Jinping in Kazakhstan 2013 led to the required development of Chinese Soft Power within the region. The purpose of this Soft Power is to enable political security alongside economic investment. The Belt and Road Initiative encompasses economic investment and diplomatic initiatives, which, when combined, develop working partnerships and economic corridors along projected routes. The initiative has also absorbed prior programs and investments into this framework.

Chinese investment in the region allows for key infrastructure developments that might improve economic and social capacities. Diplomatic and co-operative initiatives take the form of exhibitions, student engagement and the notorious Confucius Institutes. All of these aim to engage students, businessmen and key officials in cultural engagement for the promotion of relations.

Chinese Soft Power actions are not without a downside. High levels of one-sided investment can be, and are, perceived negatively. The often debated debt-trap diplomacy employed by China, together with the use of a Chinese workforce for such projects, leaves poor public perceptions of these investments, irrespective of the benefits.

Similarly, the potential reach of Soft Power initiatives is limited within the countries that China targets. This limitation is due to population dispersal and the extent of possible population engagement. Although there have been multiple exhibitions in Tashkent for example, they only reach a small percentage of the population.

Soft power through language learning to encourage engagement is increasing, but still falls behind state languages, the lingua franca Russian, and English for both tourism and business purposes. In Almaty Kazakhstan, the Confucius Institute remains one of the few places Mandarin can be learnt, compared with English which is far more prevalent in foreign language schools.

China, however, does attract significantly more students to its Universities (2017-2018), with approximately 12,000 Kazakh students currently studying in China[1]. Comparatively there are only 1,300 Kazahk students in the United Kingdom[2] and 1,865 in the United States[3]. Although distance can be included as a factor for this decision, there are also additional Chinese grants and scholarships given to Central Asian students to encourage their attendance at Chinese Universities. This Soft Power will go on to affect the next generation of Kazakhs in the future.

The effectiveness of Chinese diplomatic initiatives is impeded in Central Asia by two main factors:

The first is the disparity between key parts of the target countries’ political and financial elite and the general population.

Although policymakers and businessmen in Central Asia benefit from Chinese initiatives and as such look to engage with China on business, such perceptions remain different to those of the general population who do not benefit in such ways. This disconnect requires a two-tier Chinese approach to inter-country relations that currently does not exist.

The second is the Uyghur problem, where current Chinese policy and actions are perceived very negatively by Central Asian populations. These differences on the Uyghur problem are illustrated in the government support given to Chinese actions, compared to feelings amongst the general populace. An indicator of this is a lack of support from specific Central Asian nations. Only the Governments of Tajikistan and Turkmenistan (the two most closed off Central Asian nations) signed a letter in support of Chinese actions, suggesting the other countries are in more turmoil over the decision[4].

The Uyghur have ethnic, cultural and religious similarities to the other Turkic ethnic groups within Central Asia, as well as there being Uyghur minorities in Central Asia. Because of such ties Chinese attitudes in Xinjiang have significant negative connotations within the Central Asian general populace. Although this might not be demonstrated at a governmental level, Sinophobia can be noted across the general population.

Both of these issues take the form of anti-Chinese protests, such as those in Almaty, to even the car bombing of the Chinese embassy in Bishkek (2016). This car bombing, it was reported, was the action of an Islamist, but it has also been suggested that it was in retaliation for the mistreatment of the Uyghur people and Sinophobia.

In 2016, land reform protests revealed underlying concerns of potential Chinese control over agriculture in Kazakhstan[5]. In 2019, there were protests at a Kyrgyzstan mine over environmental quality concerns, greatly affecting the local population[6]. This issue is likely to be compounded with additional mines given or sold to Chinese investors.

More recent protests in Almaty and Nur Sultan, Kazakhstan and in Bishkek, Kyrgyzstan September 2019 suggest relations remain frayed. The Kazakhstan protests stem from a variety of reasons to do with increasing Chinese influence in the region[7]. Similarly, in Kyrgyzstan protests grew as a result of Chinese businesses side-lining existing Kyrgyz businesses in the capital[8].

All of these protests demonstrate the disconnect between Chinese investment and maintaining relations with the general populace through diplomatic initiatives.

Given the nature of the regimes in Central Asia, there is no available data on opinion polls of China, and if data was available the validity of results might also be questionable. Public protest in these countries becomes an available method of assessing public opinion, though it is limited in scope and nuance.

The increasing numbers of Central Asian students at Chinese Universities through both grants, scholarships and engagement programs, will most likely be the continued Soft Power tactic.

Although relatively ineffective currently, the Confucius Institutes will look to further develop language teaching capabilities and promote further cultural engagement.

Chinese exhibitions will most likely continue, but at a similar rate of engagement with the population, limiting their effectiveness.

Understanding and analysing Chinese Soft Power failures is important to the development of counter- Chinese strategy. Although inaction by others would allow for continued Chinese failure, these Chinese actions will eventually become successful as newer generations, specifically elites, are increasingly influenced by Chinese Soft Power initiatives, particularly through Universities.

Chinese Soft Power failure is a lack of ability to connect with the wider population beyond the national elites. Critically, Chinese Soft Power failure indicates a lack of cohesive strategy incorporating both investment and diplomacy.


Endnotes:

[1] Uatkhanov, Y. Kazakh Students Also Seek Education in the East – Edge : Kazakhstan. Edge : Kazakhstan. Retrieved 20 July 2020, from https://www.edgekz.com/kazakh-students-also-seek-education-in-the-east.

[2] Shayakhmetova, Z. (2019). Kazakh students seek degrees in best UK universities – The Astana Times. The Astana Times. Retrieved 20 July 2020, from https://astanatimes.com/2019/12/kazakh-students-seek-degrees-in-best-uk-universities.

[3] Kazakhstan – Education. Export.gov. (2019). Retrieved 20 July 2020, from https://www.export.gov/apex/article2?id=Kazakhstan-Education.

[4] Putz, C. (2019).Which Countries Are For or Against China’s Xinjiang Policies?. Thediplomat.com. Retrieved 20 July 2020, from https://thediplomat.com/2019/07/which-countries-are-for-or-against-chinas-xinjiang-policies.

[5] Why Kazakhstan’s protests are unusual. BBC News. (2016). Retrieved 20 July 2020, from https://www.bbc.co.uk/news/world-asia-36163103.

[6] Putz, C. (2019). Tensions Flare at Kyrgyz Gold Mine. Thediplomat.com. Retrieved 20 July 2020, from https://thediplomat.com/2019/08/tensions-flare-at-kyrgyz-gold-mine.

[7] Dozens detained in Kazakhstan at anti-China protests. reuters.com. (2019). Retrieved 20 July 2020, from https://www.reuters.com/article/us-kazakhstan-china-protests-detentions/dozens-detained-in-kazakhstan-at-anti-china-protests-idUSKBN1W60CS.

[8] Kruglov, A. (2019). Sinophobia simmers across Central Asia. Asia Times. Retrieved 20 July 2020, from https://asiatimes.com/2019/11/sinophobia-simmers-across-central-asia.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) Central Asia China (People's Republic of China) Coercive Diplomacy Diplomacy James Ridley-Jones

U.S. Below War Threshold Options Against China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


James P. Micciche is a U.S. Army Strategist and Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Command and General Staff Officer Course student and can be found on Twitter @james_micciche. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China rises to become a Great Power and other nations lack the will to counter this rise via armed conflict, options below the level of armed conflict are required.

Date Originally Written:  July 20, 2020.

Date Originally Published:  September 21, 2020.

Author and / or Article Point of View:  The author believes the United States must increase its capability and efforts to compete with China below levels of armed conflict.

Background:  The 2017 National Security Strategy (NSS) specifically identifies China as a revisionist competing against the United States. The NSS describes the objectives of revisionist nations as, “contesting our geopolitical advantages and trying to change the international order in their favor[1].” Stephen Brooks and William Wohlforth identify China as the driving force of a systemic realignment, “the system has shifted from 1 superpower plus X great powers to 1+1+X, with China occupying a middle category as an emerging potential superpower[2].”

Significance:  China currently avoids directly challenging U.S. hegemony and instead utilizes two primary strategies to expand influence and advance objectives below levels of conflict.

The first strategy, “Three Warfares,” seeks “to break adversary resistance and achieve Chinese national objectives with little or no actual fighting[3].” The three “warfares” are public opinion, psychological operations, and legal warfare. The first two warfares attempt to dominate the information domain and the third warfare targets both international and national structures as a means to make them more conducive to Chinese objectives.

The second strategy uses China’s growing economic power to expand China’s political power.  This expansion is done through a combination of debt-laden investments, economic coercion, and predatory liberalism, which describes how China weaponizes market access to suppress public criticism from companies and nations alike[4].

These two strategies mutually support each other as predatory liberalism enables information dominance facilitating further coercive economic expansion enabling systemic changes to legal structures. Former National Security Advisor H.R. McMaster described this vanguard of Chinese expansion as “a delegation of bankers and party officials with duffel bags full of cash[5],” rather than the traditional military elements of national power associated with historical revisionist expansion. This paper will provide three options to degrade China’s capability and deter their will to execute the aforementioned strategies.

Option #1:  The United States resurrects previous capabilities in an effort to dominate the information environment.

China’s Three Warfares and economic programs are predicated upon dominance of the information environment which is “comprised of and aggregates numerous social, cultural, cognitive, technical, and physical attributes that act upon and impact knowledge, understanding, beliefs, world views, and, ultimately, actions of an individual, group, system, community, or organization[6].” The United States is unable to compete within this environment due to a lack of bureaucratic coherence and leadership[7]. In this option, the United States recreates an Information Age version of the United States Information Agency (USIA) empowering it not only to counter malign Chinese efforts but also potentially propagate messaging into China itself against an autocratic state that severely restricts external information access to its citizens.

Risk:  Establishing an empowered and aggressive USIA could lead to an increase in China’s use of psychological operations, sharp power, and media manipulation against the U.S. and other regional partners. There are also legal concerns regarding U.S. Government filters on speech, press, or information consumed by U.S. citizens.

Gain:  Reestablishing information dominance enhances U.S. soft power globally and fosters resiliency against Chinese manipulation both domestically and abroad. Gaining the capability to target domestic Chinese populations as a form of punitive deterrence restricts China’s aggression across the whole spectrum of competition.

Option #2:  The United States reestablishes and expands the Trans-Pacific Partnership (TPP) with nations throughout the Indo-Pacific region that excludes China.

This TPP 2.0 would specifically address intellectual property rights, Chinese foreign direct investment review processes, and provide smaller nations access to development funds through USAID, The World Bank, and similar organizations. TPP 2.0 would expand from the original 11 signatories to include India, the Philippines, and South Korea.

Risk:  By utilizing their quasi command economy and authoritarian state structure, China could attempt to take substantial economic losses to create an alternative structure to counter U.S. efforts. There might be apprehension from potential TPP 2.0 members due to the unilateral withdraw from TPP by the Trump administration in 2017 placing the United States at a disadvantage in negotiations.

Gain:  TPP 2.0 would provide preferential treatment to U.S. goods, thus increasing market access. It would improve the economies of small Indo-Pacific nations, fostering resiliency to Chinese economic coercion. TPP 2.0 would deny China access to benefits unless it discontinued intellectual property theft, predatory FDI practices, and other malign economic behaviors. Increased trade costs and potential exclusion would undercut much of the funding needed to complete Belt and Road Initiative (BRI) projects. TPP 2.0 enables the creation of alternate supply chains and offshoring options outside of China allowing U.S. firms to protect intellectual property while still reducing costs to U.S. consumers and remaining globally competitive.

Option #3:  The United States harasses and impedes China’s terrestrial expansion.

Chinese competition below levels of conflict includes land and sea-based building programs ranging from constructing artificial islands within the South China Sea to infrastructure projects associated with the BRI initiative. The United States could take overt and covert actions to drive up the costs of Chinese expansion. Overt efforts include funding local environmental and cultural heritage groups that oppose Chinese projects and foster local resistance, which increase regulatory or construction costs. Covert efforts include incentivizing maritime proxies to harass and impede the use of Chinese paramilitary maritime militia in the South China Sea.

Risk:  If direct U.S. funding of proxies becomes known, there could be irreversible damage to the United States’ reputation and advantages in soft power and the information domains. Funding or supporting proxies can lead to secondary support for nonstate actors that seek to destabilize regional partners as well as China. Any escalation in the South China Sea could lead to armed conflict.

Gain:  Increasing Chinese costs could severely restrict their capability to continue expansion and complete projects per agreements with host nations. Combining overt resistance campaigns with coordinated messaging enables the United States to degrade China’s soft and economic power. Directly confronting Chinese maritime militia with similarly designed forces presents a unique geopolitical challenge with few positive outcomes.

Other Comments:  These options are not mutually exclusive and can be utilized in conjunction with other elements of national power to support competition below levels of conflict.

Recommendation:  None.


Endnotes:

[1] Trump, Donald J., National Security Strategy of the United States of America. Executive Office of The President Washington DC Washington United States, 2017, 27

[2] Brooks, Stephen G., and William C. Wohlforth. “The rise and fall of the great powers in the twenty-first century: China’s rise and the fate of America’s global position.” International Security 40, no. 3 (2016): 7-53, 43

[3] Livermore, Doug. “China’s “Three Warfares” in theory and practice in the South China Sea.” Georgetown Security Studies Review (2018).

[4] Cha, Victor, and Andy Lim. “Flagrant Foul: China’s Predatory Liberalism and the NBA.” The Washington Quarterly 42, no. 4 (2019): 23-42.

[5] McMaster, H. R., “How China Sees the World,” The Atlantic, (2020), accessed April 22 2020, https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

[6] Joint Chiefs of Staff, Joint Concept for Operating in the Information Environment (JCOIE), Department of Defense, Washington DC (2018)

[7] Cobaugh, Paul, “Combat Ineffective: Ethical Influence, the Broken-down Rusting Vehicle of American Power” Narrative Strategies, (2020) accessed April 23 2020, https://www.narrative-strategies.com/failed-usg-influence

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) James P. Micciche Option Papers United States

Alternative Future: Options to Address China’s Reaction to COVID-19 and Growing Anti-Chinese Sentiment

Sarah Lucinsky is an Officer in the Royal Australian Navy and is a postgraduate at Charles Sturt University. She sometimes tweets from @LouSeaLu and has previously edited for JUR Press and presented at Asia-Pacific Week at Australian National University. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese activities in its disputed peripheries amidst the COVID-19 pandemic are increasing and anti-Chinese sentiment is growing. This increase and growth pose risk to nations on China’s periphery.

Date Originally Written:  July 15, 2020.

Date Originally Published:  September 16, 2020.

Author and / or Article Point of View:  The author believes that analysing an array of counter-factual scenarios and alternative futures through collegiate debate is valuable when tackling security issues.

Background:  China’s stated desire for ‘One China’ involves a forcible reunification of Hong Kong and Taiwan, but since the 1996 Taiwan Strait Crisis[1] this goal has been approached gradually by focussing on methods below the threshold of war. This is largely due to China’s desire to retain a level of world power credibility and consequently avoid widespread international backlash that risks dividing the Chinese Communist Party (CCP).

Recently, anti-Chinese sentiment has been rising[2] mostly due to COVID-19, but also due to growing awareness of China’s controversial territorial expansionism in the South and East China Seas (S/ECS). Simultaneously, Indo-Pacific militaries have progressively focussed on countering China’s People’s Liberation Army (PLA) in these disputed areas. These two factors risk eroding China’s fear of international backlash that has historically prevented it from executing decisive military actions.

Significance: If China continues to face the current international backlash and counter-PLA military activity in proximity to its claimed territories, two concurrent issues will arise. Firstly, China will perceive that its sovereignty is being directly threatened by foreign militaries. Secondly, China will no longer believe there is value in exercising restraint in its disputed areas in order to protect its international image, as its image has been eroded anyway[3]. This could lead to a more expansionist and offensively postured China[4]. The introduction of China’s new national security laws in Hong Kong is quite possibly an example of how international perceptions now matter less to China under the current, evolving context[5].

Option #1:  Nations on China’s periphery form paramilitaries that conduct activities below the threshold of war, separate from conventional military forces. The paramilitaries operate with the express aim of countering the PLA’s coercive tactics in disputed areas of national interest.

Risk:  As China’s own paramilitary forces operate throughout the S/ECS, other nations introducing their own paramilitaries jeopardise their legal advantage achieved through the 2016 Permanent Court of Arbitration’s ruling against China. China may then use the new paramilitary forces as a justification for bolstered militarisation of outposts and concentration of conventional forces. A greater concentration of forces in the vicinity of disputed areas increases the risk for paramilitary engagements such as freedom of manoeuvre and ramming incidents[6].

Gain:  S/ECS claimant states can more effectively address the threat of the PLA’s coercive tactics near their territories whilst also retaining a level of political deniability[7]. Asymmetric platforms and tactics can level the playing field, enabling smaller nations to more effectively defend their territory and increase their deterrence ability, similar to Iran’s success with the Iranian Revolutionary Guard Corps Navy[8]. Additional paramilitaries equal additional, stealthier threats for China to identify, track and respond to. China will not be able to démarche nations with emergent paramilitary forces without highlighting their own.

Option #2:  Indo-Pacific nations establish bilateral military exercises and political summits with China that are widely covered by local media to improve regional perceptions of China.

Risk:  China may perceive this proactive attempt to bolster relationships as appeasement or worse, agreement with their territorial claims and coercive activities in S/ECS. Moreover, there is little scope to control or influence how these bilateral exercises and summits will be framed in Chinese state media. Even if this approach succeeds from the Chinese side, pro-China publicity may not gain traction in the host country due to trending national issues such as COVID-19 and territorial disputes. In a worst-case scenario this option may be counter-productive and lead to public outrage, protests or boycott attempts of China/Chinese goods. In turn, media coverage of the public’s negative response would also be reported on in China and undermine any successes achieved there.

Gain:  Pro-China sentiment may draw China back into the soft-power game of international engagement. This could reignite China’s desire to protect their international image and thus refrain from conducting decisive military actions like forcibly reunifying Taiwan. Further, sustained bilateral engagement will improve political relationships and develop mutual understanding, reducing the likelihood of misjudgement or miscalculation at the strategic and tactical levels. A tertiary gain is Indo-Pacific nations would gain intimate exposure to PLA personnel, platforms and operational art that could provide advantages in a future conflict scenario. Sometimes one must put the rifle down to really pick the rifle up.

Option #3:  The United States deepens its ties with Russia, creating a new modus vivendi, working towards a future alliance that alienates China.

Risk:  A U.S.-Russia alliance would require the two nations to find common ground on Crimea, Iran and North Korea, all of which are incredibly unlikely without significant costs from either side[9]. A close relationship with Russia has higher risks for the U.S. as it would directly challenge much of U.S. recent history and ideology, alienate North Atlantic Treaty Organization members and breed distrust amongst the five eyes community. Further, closer ties with Russia may include additional Russian scrutiny that could result in political interference, cyber and information warfare operations as well as increased Russian avenues for intelligence collection.

Gain:  Whilst this option would carry a significant ideological cost for America, a U.S.-Russia alliance would combine the lethality of two military superpowers, a significant deterrent if both parties could agree on its use in a counter-China context[10]. Even without reaching alliance status, closer U.S.-Russia relations that incorporates military engagement would still create an effect that China would need to consider as a significant factor prior to any attempts at decisive military action.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Yves-Heng Lim, “Expanding the Dragon’s Reach: The Rise of China’s Anti-Access Naval Doctrine and Forces,” Journal of Strategic Studies 40, no. 1-2 (2017).

[2] Motoko Rich, “As Coronavirus Spreads, So Does Anti-Chinese Sentiment,” New York times 2020.

[3] Michael Swaine, “The Pla Navy’s Strategic Transformation to the “Far Seas”: How Far, How Threatening, and What’s to Be Done?,” in Going Global? The People’s Navy in a Time of Strategic Transformation (Rhode Island: Carnegie Endowment for International Peace, 2019).

[4] People’s Republic of China, “China’s Military Strategy,” (Xinhua News Agency2015).

[5] Eleanor Albert, “Which Countries Support the New Hong Kong National Security Law?,” The Diplomat 2020.

[6] Dhara Shah, “China’s Maritime Security Strategy: An Assessment of the White Paper on Asia-Pacific Security Cooperation,” Maritime Affairs: Journal of the National Maritime Foundation of India 13, no. 1 (2017).

[7] Tobias Böhmelt and Govinda Clayton, “Auxiliary Force Structure: Paramilitary Forces and Progovernment Militias,” Comparative political studies 51, no. 2 (2017).

[8] Abhijit Singh, “”Dark Chill in the Persian Gulf” – Iran’s Conventional and Unconventional Naval Forces,” Maritime Affairs: Journal of the National Maritime Foundation of India 6, no. 2 (2010).

[9] Legvold Robert, “All the Way: Crafting a U.S.-Russian Alliance,” no. 70 (2002).

[10] Ibid.

Alternative Futures / Alternative Histories / Counterfactuals Below Established Threshold Activities (BETA) China (People's Republic of China) Option Papers Sarah Lucinsky United States

Boxing Out: Assessing the United States’ Cultural Soft Power Advantage in Africa Over China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Scott Martin is a career U.S. Air Force officer who has served in a multitude of globally-focused assignments.  He studied Russian and International Affairs at Trinity University and received his Masters of Science in International Relations from Troy University.  He is currently assigned within the National Capitol Region. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Boxing Out: Assessing the United States’ Cultural Soft Power Advantage in Africa Over China

Date Originally Written:  July 16, 2020.

Date Originally Published:  September 14, 2020.

Author and / or Article Point of View:  The author believes that as a mechanism to counter China’s rising influence in Africa, the U.S. can leverage some of its soft power advantages. In particular, the popularity of American cultural offerings, such as the National Basketball Association (NBA) offers an opportunity for the U.S. to counter China and its soft power efforts in a geographically critical area of the globe.

Summary:  Chinese investment in hard and soft power in Africa over the past several decades presents a challenge to the U.S. role on the continent. While the Chinese focus in Africa is yielding positive results for China’s image and influence, there are still areas where the U.S. outpaces China. American advantages in soft power, such as the popularity of its cultural exports, like the NBA, offer an opportunity for the U.S. to counter Chinese efforts in Africa.

Text:  Since the Cold War, Chinese investment and engagement in Africa is a strong point of their foreign policy. For several decades, China has pumped billions in economic aid, estimated at over $100 billion[1]. The combination of presenting economic assistance on business terms only without dictating values and lack of historical barriers (ala Western Europe’s colonial past and American insistence on adherence to values such a human rights for economic assistance) has made China a formidable force on the African continent, offering an attractive “win-win” relationship[2]. However, while China dominates when it comes to economic engagement, they have not shut out the West when it comes to various forms of soft power. In particular, U.S.-based forms of entertainment, from movies to sporting events, still out-pace Chinese variants.

Since political scientist Joseph Nye first defined “soft power” in the 1990s as the concept of “when one country gets other countries to want what it wants…in contrast with the hard or command power of ordering others to do what it wants”, the concept has gained many political and academic converts[3]. The Chinese look to promote their soft power capabilities, and it is a stated goal of Chinese leaders since Hu Jintao in 2007[4]. These efforts appear to pay off, as surveys show Africans with positive opinions related to China[5].

Yet, while China makes strides in promoting its soft power, it still faces challenges. For all the positive responses it engenders with its efforts, it has not won over all Africans. In various surveys, many ordinary Africans do not always feel that China’s continued investment in their respective countries benefits them as much as it does political leaders[6]. Additionally, Chinese efforts for the promotion of soft power lack the impact of its Western/U.S. competitors. In cultural examples, to include entertainment, the Chinese lag far behind the U.S. It is in this area that the U.S. can leverage its soft power capabilities to help promote itself and counter some aspects of China power projection.

Many aspects of American culture and entertainment find a home in Africa. American cinematic offers dwarf all other international offering by a significant margin, to include China[7]. American music, especially hip-hop and rhythm and blues, dominate African music channels. An American traveling through the continent is considerably more likely to run across American music than the Chinese equivalent[8]. While the Chinese promote their educational capabilities, more African will look towards American colleges/universities if given the chance to attend[9]. While hard power economic and military investment numbers might favor China, the U.S. continues to hold a significant lead in soft power ratings over China in Africa[9].

In one key example, the U.S.-based NBA is arguably the most popular U.S.-based sports league on the continent. While professional football/soccer might be the most popular international sport, the NBA has grown in global popularity over the past 20 years, which includes Africa. Prior to the suspension of the NBA season due to COVID-19, 40 players born in Africa or descended African-born parents were on NBA rosters, to include reigning league Most Valuable Player Giannis Antetokounmpo and All-Star Joel Embiid[10]. Factor in NBA Hall of Famers such as Dikembe Mutombo and Hakeem Olajuwon, and the NBA has significant connections with Africa. Additionally, NBA merchandising and broadcasting takes in significant money, and previous games played in Africa posted sell-out crowds[11]. At the start of 2020, the NBA established an NBA Africa league for the continent, with participation from multiple countries. While COVID-19 disrupted plans for this league, the NBA will be eager to re-engage with Africa post-pandemic.

For the U.S., the NBA efforts offer an opportunity to counter Chinese activity, playing to America’s significant soft power advantage. While the NBA is becoming a more international game, the league is still an American corporation, with mainly American stars. While jersey sales focus on the individual names, which will include African players, the designs and logos are still from the American-based teams. Additionally, with the NBA’s current relationship with China severely curtailed after Houston Rockets’ General Manager Daryl Morey retweeted a message support Democratic protestors in Hong Kong, the NBA, facing a pre-COVID-19 shortfall of $400M from Chinese boycotting, is looking for additional revenue streams[12]. A U.S./NBA relationship in Africa can be a version of “win-win.”

While most view soft power as more effective when it is not directly promoted by the power projecting country, the U.S. can leverage its soft power advantages to counter Chinese actions in Africa. When it comes to the promotion of American cultural imports, U.S. officials, while not explicitly stating that the U.S. government supports that activity, can do things such as promote their attendance at such events via social media as well as take advantage of other communication forums to promote the successes of such ventures in Africa. Additionally, when applicable, the U.S. government can promote favorable messaging at efforts to expand U.S.-based cultural exports, such as the release of American-owned movies and music recordings and clear any governmental administrative hold-ups for entities like the NBA to promote their games and products in Africa.

Granted, promotion of American-based culture and entertainment, such as the NBA, cannot offset the extensive Chinese economic investment in Africa, and the U.S. will have to face its own challenges in soft power projection. However, by playing to its strengths, especially in soft power realm, the NBA in Africa can open the door towards showing a positive image and outreach of American and Western values. This NBA actions can also open the door toward future engagements that can both benefit Africa and challenge Chinese efforts. American cultural offerings are not a cure-all magic bullet, but the U.S. does have the ability to leverage them for soft power advantages, which could stem an increasingly powerful China whose influence across Africa is growing.


Endnotes:

[1] Versi, Anver (Aug/Sept 2017).“What is China’s Game in Africa?” New African, 18. https://newafricanmagazine.com/15707.

[2] Tella, Oluswaseun (2016) “Wielding Soft Power in Strategic Regions: An Analysis of China’s Power of Attraction in Africa and the Middle East” Africa Review, 8 (2) 135. https://www.academia.edu/30299581/Africa_Review_Wielding_soft_power_in_strategic_regions_an_analysis_of_Chinas_power_of_attraction_in_Africa_and_the_Middle_East.

[3] Lai, Hongyi (2019) “Soft Power Determinants in the World and Implications for China: A Quantitative Test of Joseph Nye’s Theory of Three Soft Power Resources and of the Positive Peace Argument.” The Copenhagen Journal of Asian Studies, 37(1) 10.

[4] Schmitt, Gary J (19 June 2014) “A Hard Look at Soft Power in East Asia” American Enterprise Institute Research, 5. https://www.aei.org/research-products/report/a-hard-look-at-soft-power-in-east-asia.

[5] Tella, Oluswaseun, “Wielding Soft Power in Strategic Regions” 137.

[6] Langmia, Kehbuma (2011). “The Secret Weapon of Globalization: China’s Activities in Sub-Saharan Africa” Journal of Third World Studies, XXVIII (2), 49. https://www.academia.edu/31196408/THE_SECRET_WEAPON_OF_GLOBALIZATION_CHINAS_ACTIVITIES_IN_SUB-SAHARAN_AFRICA_By_Kehbuma_Langmia.

[7] 2015-2020 Worldwide Box Office, IMDb Pro, Accessed 13 June 2020, https://www.boxofficemojo.com/year/world/?ref_=bo_nb_in_tab

[8] Tella, Oluswaseun. “Wielding Soft Power in Strategic Regions” 161.

[9] Lai, Hongyi. “Soft Power Determinants in the World and Implications for China” 29.

[10] Mohammed, Omar (2 April 2019) “NBA to Invest Millions of Dollars in New African League” Reuters. https://www.reuters.com/article/us-nba-africa-idUSKCN1RE1WB.

[11] Ibid.

[12] Young, Jabari (2020, 16 Feb). “NBA will Lose Hundreds of Millions of Dollars Due to Rift with China, Commissioner Says” CNBC. https://www.cnbc.com/2020/02/16/nba-will-lose-hundreds-of-millions-of-dollars-due-to-rift-with-china-commissioner-says.html.

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Private Sector Scott Martin United States

Options for African Nations Regarding Economic Collaboration with the U.S. and China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Ekene Lionel is the Executive Director for Military Africa.  He can be found on Twitter @LionelfrancisNG.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States and the People’s Republic of China are competing below the threshold of war for influence in Africa.

Date Originally Written:  May 19, 2020.

Date Originally Published:  July 27, 2020.

Author and / or Point of View:  The author believes that the possibility of a U.S.-Chinese economic collaboration in Africa is the only way forward, and that this collaboration will be key to competition in Africa below the threshold of war. The article is written from the point of view of Africa’s relationship between both major powers.

Background:  China is an increasingly important player in the politics, economic development, and security of Africa. China has prioritized strong diplomatic relations and political ties with African states. Beijing’s ideological aspiration, anchored on solidarity amongst the Third World countries, is appealing to African states.

Significance:  With China’s focus on Africa’s rich resources is to fuel its own domestic economic growth, this has placed it in direct competition with the United States.

Option #1:  The U.S. increases bilateral trade and investment in Africa to compete with China below the threshold of war.

Although China and the United States employ different strategies and tactics in Africa, they share very similar interests, and that their competition has been largely confined to the economic domain. Even though there is a fundamental distrust between both nations, particularly as the U.S. is cautious of China’s military entry into Africa, there is still much room for their cooperation in promoting peace and economic development on the continent.

With that said, the U.S. currently lacks a comprehensive approach to multilateral issues such as regional trade, governance, and infrastructural development that will serve Africa better than what China offers. Since trade is vital to Africa’s economic future and to improving lives and livelihoods, the U.S. can recognize that much of China’s appeal is its willingness to respond to Africa’s developmental priorities, and to project Africa as a promising hub for foreign investment. For several decades, U.S. investment is still heavily concentrated in the natural resource sector. Instead, for a long-term, sustainable economic growth, and development in Africa, America can identify and promote other sectors where U.S. businesses might have competitive advantages.

The United States can also work with African countries to take full advantage of both African Growth and Opportunity Act (AGOA) and worldwide trading opportunities and send exports to emerging markets such as Russia, China, India, and Brazil (BRIC). The AGOA, which was signed between 2002 and 2008, lowers tariff barriers for entry into the United States of African-produced textiles and other commodities[1].

Besides trade and foreign direct investment, America can leverage its relationship with Africa to encourage improvements in human rights practices and the pursuance of Western-style liberal democracy. In contrast, China has a policy of no political strings attached to its aid. Beijing maintains close relations with African governments whether they are democracies, autocracies, military regimes, or Islamists.

Risk:  Increased U.S. trade and investment in Africa angers China, who then takes steps to roll back U.S. efforts in Africa or elsewhere.

Gain:  This option will appeal to African nations on the basis of a common U.S-African interest in trade negotiations. At present, Africa has just 2 percent of all world trade, this is still low considering a large number of resources present in Africa. The U.S. will have to convince companies to invest in the region, and also opening its markets further to African exports.

Option #2:  The U.S. and China collaborate economically in Africa.

Militarily, the United States has a robust presence in Africa, and is particularly active in anti-piracy and counter-terror efforts, operating up to 29 different bases in the continent[2]. China cannot hope to match or contest U.S. military dominance in Africa. Africa is no stranger to conflict as the continent has been subjected to constant warfare for the past several decades. Africa will fiercely resist any attempt of international armed struggle for clout within the continent.

The United States and China use essentially the same political, economic, military, and cultural tools for implementing their policies in Africa. For China, the country has placed itself as the infrastructural vanguard of the new frontier, since Africa is now considered the fastest urbanizing continent globally. According to a 2017 report by the International Monetary Fund, in 2017, Africa boasted seven of the 20 fastest growing economies in the world[3].

Thus, China has position itself to capitalize and exploit this growth. Since 2005, the American Enterprise Institute (AEI) China Global Investment Tracker determined that the total value of Chinese investments and construction in Africa is nearing $2 trillion[4]. The Chinese investment is compared with the just $39 billion combined trade value for the United States according to a 2017 United States Agency for International Development report. The U.S. is it Africa’s third-largest trading partner behind China and the European Union.

To consolidate its robust economic influence, China recently launched a $1 billion Belt and Road infrastructure fund for Africa, and a $60 billion African aid package[5]. Even though China is presenting itself humbly in its interaction with Africa, it has been accused of saddling developing countries with substantial volumes of hidden debt through its Belt and Road Initiative. This humility is rapidly changing as China’s political and economic power increases. As China looks to diversify its trade and investment relationships amid the protracted trade war with the U.S, Beijing’s opaqueness in issuing loans means debt burdens for recipient countries, which can cause potential problems for the African economy.

For now, Chinese firms have been actively building ports, roads, and railways to enhance integration and trade between African nations, mainly under the African Continental Free Trade Agreement (AfCFTA). AfCFTA intends to bring together all 55 African Union member states into the world’s largest free trade area, covering over 1.2 billion people. Besides, China now has more diplomatic offices in Africa than the U.S., and in some countries, Chinese influence counts for more[6].

In contrast, being the leader of the Western world since the end of World War II, the United States is sometimes perceived in Africa as insensitive and arrogant. U.S.-Africa trade has dipped in recent years. Nearly all of the assistance provided to Africa by the United States is in the form of grants and aids to Africa has been running at about $8 billion annually.

If the U.S continues to pursue military dominance or competition with China even below the threshold of war, it risks being a step or even two behind China in Africa for a long time. U.S. interests in Africa remain shaped, to its own detriment, by a perceived competition with China. The U.S. may accomplish more by focusing on areas of current or potential collaboration and to pay less attention to the debilitating debate about U.S-China competition.

Washington can collaborate with China, smoothing the way to trade will help more entrepreneurial African states, especially those with the thriving private business sector, to grow where it would be welcomed by the new generation of dynamic African entrepreneurs.

While there are areas in Africa where China and the United States might compete as major powers, especially below the threshold of war, there are many more areas where they can cooperate. For example, both Countries have a successful agricultural sector, components of which could be combined and adapted to improve production in Africa.

At this point, America likely cannot sit idly while countries such as China become more engaged with the aspirations of Africa’s next generation of leaders. Frankly, China is not a strategic threat to the United States in Africa. However, Beijing could pose serious political and commercial challenges for influence. Nonetheless, by engaging China more on Africa-centric socio-economic, diplomatic, and infrastructural development can the U.S. meet this challenge effectively.

Risk:  Chinese and U.S. investments in Africa further entangle the two nations and cause both to hesitate to take more important actions to preserve national security.

Gain:  A coordinated and dedicated diplomatic, commercial, and security strategy can increase U.S. investment and challenge Chinese influence in Africa.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] African Growth and Opportunity Act (AGOA), https://agoa.info/about-agoa.html

[2] Nick Turse, Pentagon’s map of US bases in Africa, The Intercept, February 27, 2020, https://theintercept.com/2020/02/27/africa-us-military-bases-africom

[3] IMF Annual Report 2017, Promoting inclusive growth, 2017, https://www.imf.org/external/pubs/ft/ar/2017/eng/pdfs/IMF-AR17-English.pdf

[4] AEI, China Global Investment Tracker, 2005-2019, https://www.aei.org/wp-content/uploads/2020/01/China-Global-Investment-Tracker-2019-Fall-FINAL.xlsx

[5] Silk Road Briefing, US$ 1 Billion Belt & Road Africa Fund Launched, July 04, 2019, https://www.silkroadbriefing.com/news/2019/07/04/us-1-billion-belt-road-africa-fund-launched

[6] Ben Doherty , The Guardian, China leads world in number of diplomatic posts, leaving US in its wake, Tuesday 26 Nov 2019, https://www.theguardian.com/world/2019/nov/27/china-leads-world-in-number-of-diplomatic-posts-leaving-us-in-its-wake

2020 - Contest: PRC Below Threshold Writing Contest Africa Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Ekene Lionel Option Papers United States

Assessing African Strategic Needs to Counter Undue Chinese Influence

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing African Strategic Needs to Counter Undue Chinese Influence

Date Originally Written:  May 2, 2020.

Date Originally Published:  July 13, 2020.

Author and / or Article Point of View:  The author believes that China’s current posture in Africa, if left unchecked, will turn the continent into a battleground for Great Power Competition below the threshold of armed conflict.

Summary:  China, despite its claims of peaceful rise, has steadily exercised its military, economic and diplomatic might. With strong leadership that is not afraid of compromise, African countries can enforce their independence as they ensure peace and prosperity on the continent.

Text:  When Deng Xiaoping liberalized the Chinese economy in 1978[1], his goals were to lift 860 million Chinese from poverty and power the Chinese economy to overtake its neighbors[2]. From an agrarian, state-controlled economy, China is now an industrial, largely private sector-led economic superpower[3]. However, as China’s economic power has grown, concerns about China’s global agenda have emerged[4]. China, along with Russia, is determined to reorder the world in its image[5], making conflict with the West more likely[6]. Yet, despite professing a policy of “Peaceful Rise[7]”, Chinese actions in the South China Sea[8] and its isolation campaign against Taiwan[9] show that Beijing isn’t afraid to flex its diplomatic, economic and military muscles.

Africa has attracted the interest of Great Powers through the ages. Often this interest has been to the detriment of Africans. From the destruction of Carthage[10] to slave trade[11][12] and colonization[13], Africa has faced privations from empires looking to exploit its resources. Even after independence, warring powers continued to interfere in the internal conflicts of African countries[14] throughout the Cold War. With a large and growing African population, sophisticated middle class, and increased connectivity to the rest of the world, Africa will continue to be both a source of materials and destination for goods and services.

As China expands its international footprint, it has deliberately increased its African ties. It supplies weapons to African countries without regard to the human rights practices of their leaders[15]. China is now Africa’s biggest trading partner[16] while providing financing for infrastructural projects through its Belt and Road Initiative. These projects have often been sponsored without regard to their sustainability or economic viability. The inability of countries to repay such loans have forced them to surrender critical infrastructure, with potential military implications[17][18].

As Great Power competition returns and China’s stance becomes more confrontational, and African leaders fail to act, the continent will again become just another front for global rivalries without regard for the well being of Africans. Global powers have fought their wars on African soil since the 18th Century. Regardless of the winners of these conflicts, Africans lose more than they gain. Africans, more than ever, can shape their destinies and work for the 21st Century to become Africa’s Century.

Africa nations can work to secure peace on the continent. By leveraging multilateral organizations operating on the continent, African leaders can make the painful compromises required to settle their inter-state disputes and move to cooperative models that engender peace based on common interests. African leaders can expand intra-African trade through the African Continental Free Trade Area and exploit regional organizations to tackle transnational crimes including human trafficking, illegal extraction of resources, religious extremism, and corruption under joint platforms.

Leaders can resolve the various internal stresses that keep their countries in political crises. Many African countries have been unable to foster a national identity, leaving their people clinging to tribal and religious identities without regard for the state’s interest. By decentralizing power, increasing citizen participation, respecting the rule of law, and reforming governance models for efficient service delivery, populations can begin to develop their sense of nationhood. Food security, public sanitation, healthcare, power, justice, and education programs can be implemented smartly and with consideration to the direct needs of their citizens, to prevent the resentment that bad actors can exploit.

African countries can take deliberate steps to diversify their technical, industrial, and financial sources. Governments can implement open standards, secure sensitive infrastructure from interference, and break up monopolies. As COVID-19 exposes the weakness of China’s role as the world’s manufacturing hub, countries can invest in manufacturing abilities and build capabilities to scale up production of critical items to safeguard their supply chains.

Most importantly, African leaders can declare that China will not be allowed to use its assets on the continent for military purposes in its competition with the West. Individual countries can also demonstrate the will to prevent the militarization of Chinese financed projects in their jurisdictions. Regional blocs can come together and draw up contingencies to retake control, by force if necessary, any dual-use facilities in member states. The status of Chinese bases on the continent can be spelled out, and appropriate contingencies planned should open conflict break out.

Ultimately, Africans can make deliberate decisions about the future of the continent. They have more agency than at any other time in history to shape the direction of the continent. While many may balk at the redirections needed to make themselves independent of Chinese machinations as well as the costs involved, such actions are crucial to ensure that African countries have the freedom to pursue policies most favorable to them.


Endnotes:

[1] Le, Y., Rabinovitch, S. (2008, December 8). TIMELINE: China milestones since 1978. Retrieved April 19, 2020, from
https://www.reuters.com/article/us-china-reforms-chronology-sb-idUKTRE4B711V20081208

[2] Kopf, D., Lahiri, T. (2018, December 18). The charts that show how Deng Xiaoping unleashed China’s pent-up capitalist energy in 1978. Retrieved April 19, 2020, from
https://qz.com/1498654/the-astonishing-impact-of-chinas-1978-reforms-in-charts

[3] Brandt, L., Rawski, G. (2008, April 14). China’s Great Economic Transformation.

[4] Arace, A. (2018, August 8). China Doesn’t Want to Play by the World’s Rules. Retrieved April 19, 2020, from
https://foreignpolicy.com/2018/08/08/china-doesnt-want-to-play-by-the-worlds-rules

[5] Stent, A. (2020, February). Russia and China: Axis of Revisionist? Retrieved April 19, 2020, from
https://www.brookings.edu/wp-content/uploads/2020/02/FP_202002_russia_china_stent.pdf

[6] Kaplan, R. (2019, January 7). A New Cold War Has Begun. Retrieved April 19, 2020, from
https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun

[7] Bijian, Z. Speeches of Zheng Bijian 1997-2004. Retrieved April 24, 2020, from
https://www.brookings.edu/wp-content/uploads/2012/04/20050616bijianlunch.pdf

[8] Axe, D. (2020, March 23). How China is Militarizing the South China Sea with a Ton of Missiles. Retrieved April 24, 2020, from
https://nationalinterest.org/blog/buzz/how-china-militarizing-south-china-sea-ton-missiles-136297

[9] Myers, S. and Horton, C. (2018, May 25). China Tries to Erase Taiwan, One Ally (and Website) at a Time. Retrieved April 23, 2020, from
https://www.nytimes.com/2018/05/25/world/asia/china-taiwan-identity-xi-jinping.html

[10] Kierana, B. (2004, August 1). The First Genocide: Carthage, 146 BC. Retrieved April 23, 2020, from
https://gsp.yale.edu/sites/default/files/first_genocide.pdf

[11] M’Bokolo, E. (1998, April). The impact of the slave trade on Africa. Retrieved April 23, 2020, from
https://mondediplo.com/1998/04/02africa

[12] Nunn, N. (2017, February 27). Understanding the long-run effects of Africa’s slave trades. Retrieved April 23, 2020, from
https://www.bbc.co.uk/bitesize/guides/zxt3gk7/revision/1

[13] Settles, J. (1996). The Impact of Colonialism on African Economic Development. Retrieved April 28, 2020, from
https://trace.tennessee.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1182&context=utk_chanhonoproj

[14] Schmidt, E. (2016, July 26). Conflict in Africa: The Historical Roots of Current Problems. Retrieved April 23, 2020, from
https://www.historians.org/publications-and-directories/perspectives-on-history/summer-2016/conflict-in-africa-the-historical-roots-of-current-problems

[15] Hull, A. Markov, D. (2012, February 20). Chinese Arms Sales to Africa. Retrieved April 24, 2020, from
https://www.ida.org/-/media/feature/publications/2/20/2012-chinese-arms-sales-to-africa/2012-chinese-arms-sales-to-africa.ashx

[16] Smith, E. (2019, October 9). The US-China Trade Rivalry is Underway in Africa, and Washington is playing catch-up. Retrieved April 24, 2020, from
https://www.cnbc.com/2019/10/09/the-us-china-trade-rivalry-is-underway-in-africa.html

[17] Abi-Habib, Maria. (2018, June 25). How China Got Sri Lanka to Cough Up a Port. Retrieved April 24, 2020, from
https://www.nytimes.com/2018/06/25/world/asia/china-sri-lanka-port.html

[18] Paris, C. (2019, February 21). China Tightens Grip on East African Port. Retrieved April 24, 2020, from
https://www.wsj.com/articles/china-tightens-grip-on-east-african-port-11550746800

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Damimola Olawuyi Great Powers & Super Powers

Options for the United States to Compete with China Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Matthew Ader is a second-year undergraduate taking War Studies at King’s College London.  He tweets occasionally from @AderMatthew, and is an editor at the Wavell Room. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China rises and the U.S. wants to avoid direct military confrontation, the U.S. requires options to compete with China below the threshold of armed conflict

Date Originally Written:  May 12, 2020.

Date Originally Published:  July 8, 2020.

Author and / or Article Point of View:  The author is a second-year undergraduate student at King’s College London with a broadly liberal foreign policy view. The article is written from the point of view of the United States towards the People’s Republic of China.

Background:  The United States has identified China as a key competitor and revanchist power seeking to undermine the U.S.-led international order.

Significance:  China is expanding its influence globally through competition below the threshold of armed conflict, to the detriment of U.S. interests. A conventional Sino-American war to counter or roll back these gains would be catastrophic. The below options enable the U.S. to compete against China short of war.

Option #1:  The United States deploys specialist surveillance and training capabilities, along with Coast Guard and Navy vessels, to enhance and expand existing multilateral efforts against maritime lawlessness – particularly illegal, unreported and unregulated (IUU) fishing – in the Indo-Pacific theatre.

Risk:  This option would put US personnel in close contact with Chinese maritime militia, coast guard, and fishing fleets on a regular basis – increasing the possibility of a geopolitical incident. It could also contribute to overstretch in the U.S. 7th Fleet. Further, while maritime lawlessness is recognised as a major problem by all countries in theatre, U.S. enforcement action could be seen as high-handed. One particular concern would be how the U.S. treats Japan – it is a key ally but is also heavy enmeshed in the IUU industry. Too heavy-handed a treatment would alienate Japan; too lenient would make the U.S. seem hypocritical. This option might also embroil the U.S. in regional disputes over maritime border claims.

Gain:  This option would strengthen the U.S. claim of being a status quo power upholding the law and rules-based international order against an aggressive and lawless China. Given that regional trust in the U.S. has sunk dramatically over the course of the Trump administration, this option could constitute a helpful corrective. Substantively, this option could also assist in pushing back on Chinese influence in the South China Sea; the current Freedom of Navigation Operations are inherently transient and can be avoided without change to broader Chinese strategy — persistent presence cannot. Lastly, it would permit U.S. forces to work alongside regional partners, gaining valuable operational expertise and local knowledge.

Option #2:  The United States increases funding for the journalists, civil rights activists, and anti-corruption campaigners in nations involved in the Chinese Belt and Road Initiative (BRI).

Risk:  This option may be seen as the U.S. meddling unduly in the affairs of foreign countries, and certainly would be portrayed as such by the Chinese state media. It is also difficult to assess the impact of such investments, which, given the kleptocratic or authoritarian nature of many BRI states, may be negligible. Moreover, this option could lead to activists and journalists being labelled as foreign agents. Further, while the material loss to U.S. interests resulting from states cracking down on individuals and organisations who receive U.S. funding is relatively small, the reputational risk is significant.

Gain:  This option allows the U.S. to contest and bog down Chinese BRI expansion in Africa and central Asia, as activists and journalists expose Chinese elite corruption and oppose predatory debt-trap diplomacy. It would involve no risk to U.S. personnel, and limited expenditure compared to more kinetic options. Moreover, this option could, with appropriate messaging, allow the U.S. to portray itself as siding with local populations against an overbearing China and its puppets – an advantage for international media coverage.

Option #3:  China is a highly aggressive and malign actor in cyberspace. The U.S. encourages and facilitates greater global regulation surrounding cyberwarfare and espionage. One specific option would be an international body, likely under United Nations authority, to identify the origin of cyberattacks.

Risk:  The U.S. is highly capable in the cyber domain, and there is a risk that by encouraging more regulation, it would be creating a purity test it cannot itself meet. This would, in turn, create substantial reputational problems for the U.S. Moreover, attributing cyberattacks is difficult, and it is possible that the U.S. might be inadvertently accused of a crime it did not commit. Lastly, while international naming and shaming can be effective, the extent to which it would matter to China is unclear; the option might therefore involve expending substantial U.S. diplomatic capital for limited returns.

Gain:  This option could lead to stronger norms against aggression in cyberspace. This may not discourage China from continuing its current aggressive policy, but it could increase the reputational costs and diplomatic consequences associated with it. Moreover, an impartial and open-source organisation for attributing cyberattacks could be a helpful resource against non-state actors and rogue states – especially given that U.S. efforts at attribution are often hampered by the need to protect sensitive intelligence sources and methods. Lastly, this option, as a recourse to multilateralism, would signal U.S. commitment to the rules-based international order, which may be important in restoring global trust in U.S. leadership.

Other Comments:  Sino-U.S. competition is and will continue to shape this century. New ways for the U.S. to compete below the threshold of armed conflict may be critical assets in assuring U.S. victory.

Recommendation:  None.


Endnotes:

[1] Larter, D. B. (2019, May 2). Here’s how the Japan-based 7th Fleet has changed since 17 sailors died in accidents 2 years ago. Retrieved April 20, 2020, from https://www.defensenews.com/digital-show-dailies/navy-league/2019/05/05/heres-how-the-japan-based-7th-fleet-has-changed-since-17-sailors-died-in-accidents-2-years-ago

[2] Mackie, J. (2019, October 18). Japan Has an Illegal Seafood Problem. Retrieved April 20, 2020, from https://www.hakaimagazine.com/news/japan-has-an-illegal-seafood-problem

[3] Rudd, K. (2020, May 6). The Coming Post-COVID Anarchy. Retrieved from https://www.foreignaffairs.com/articles/united-states/2020-05-06/coming-post-covid-anarchy

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Matthew Ader Option Papers

Call for Papers: Activities Below the Threshold of War 

Background:

Divergent Options is a non-politically aligned non-revenue generating national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Below you will see a Call for Papers.  If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea. We look forward to hearing from you!

Call for Papers:

Divergent Options is calling for national security papers assessing situations or discussing options related to Activities Below the Threshold of War.

For the purpose of this Call for Papers, while activities below the threshold of war are innumerable, and we encourage writers to address them, we are very interested in exploring the idea of activities being designed from the beginning to stay below a threshold.  One example could be that 42 U.S. Code § 5195c defines “critical infrastructure,” what can be done to the U.S. in the cyber domain that stays below this definition?  Another example is that Article V of the North Atlantic Treaty does not define “armed attack.”  As such, what can be done to North Atlantic Treaty Organization Member States that ensures debate as to whether the action is considered an “armed attack,” and thus ensure a response is slow in coming?  More ideas regarding Below Established Threshold Activities can be found in this 2016 Lawfare article.  (And yes, Below Established Threshold Activities or BETA is why there is a picture of a Betamax video tape at the top of this Call for Papers.)

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by August 15, 2020.

Below Established Threshold Activities (BETA) Call For Papers

Options for a Five Eyes Response to Below Threshold Competition with China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Alexander Craig works in the United Kingdom’s Armed Forces. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  Competition with China below the threshold of armed conflict.

Date Originally Written:  May 4, 2020.

Date Originally Published:  July 1, 2020.

Author and / or Article Point of View:  This article is written from the perspective of the ‘Five Eyes’ nations: the United States, the United Kingdom (UK), Canada, New Zealand, and Australia.

Background:  The Five Eyes nations are united not just by security cooperation, but by shared history, language, culture and a commitment to democracy, free market institutions and the rule of law. Being few in number compared to the European Union’s 27 members and the North Atlantic Treaty Organization’s 30, the Five Eyes have the potential to act with depth and agility against a common challenge on the world stage beyond that of other international affiliations.

Significance:  China is promoting its authoritarian model abroad as a superior alternative to liberal democracy and the free market[1]. In doing so China is seeking to undermine the current rules based international order; with Xi Jinping openly stating in 2014 that China should be “constructing international playgrounds” and “creating the rules”[2]. If left unchecked, this below threshold competition will undermine democratic norms, support for the free market, and subvert global institutions.

Option #1:  The UK grants full citizenship to Hong Kong’s British Overseas Nationals.
There are approximately 250,000 holders of British National (Overseas) (BN(O)) passports.[3] Holders are permanent Hong Kong residents who voluntarily registered prior to 1997. They are not afforded the protection and right that full British citizenship would bring.

Risk:  It is likely that the Chinese government would seek to portray this as an act of interference in its domestic affairs. There is a possibility that BN(O) holders would be seen by the authorities as a suspect group, and this measure could be the catalyst for the victimisation of BN(O) passport holders. Domestically, there would likely be concern in the UK about the possible impact of the instant granting of citizenship to quarter of a million people.

Gain:  By granting full citizenship, the UK demonstrates its support to these citizens of Hong Kong. This act would reassure the people of Hong Kong that international support did not just amount to words; and demonstrates that there can be effective soft power responses to China’s use of hard power against its own citizens.

Option #2:  The Five Eyes nations establish their own Free Trade Agreement.

China uses access to its markets as a tool of both influence and punishment, as seen in recent threats levelled towards Australia[4]. Several unconnected arrangements already link most of the Five Eyes nations such as free trade agreements between the United States, Australia and Canada[5][6]. The withdrawal of the United Kingdom from the European Union presents an opportunity to simplify and formalise arrangements between the five nations.

Risk:  Free trade agreements can prove controversial[7] and domestic support for free trade often fluctuates, especially in the United States[8]. Increased rhetoric regarding the need for protectionism and claims that the coronavirus has highlighted the fragility of global supply chains could combine to make the early 2020s a difficult period for advancing ambitious free trade agreements[9].

Gain: The establishment of a simple and transparent free trade area by democratic nations deeply committed to the institutions of the free market and the rule of law (and with already existing security arrangements) would provide a global market where participants need not be at the mercy of an autocratic state. This free trade area would be the largest in the world, with a combined Gross Domestic Product of 26.73 trillion dollars, almost double that of China and exceeding the European Union’s[10].

Option #3:  The Five Eye nations give Taiwan full diplomatic recognition.

Currently 15 nations recognise Taiwan, a decrease of seven since 2016. This is primarily a result of pressure placed on smaller nations by China[11].

Risk:  The recognition of Taiwan as a sovereign nation would be highly provocative and would almost certainly be met with a response from China. U.S. President Donald Trump recently signed into law the TAIPEI Act[12], which prompted the Chinese foreign ministry spokesperson to respond “We urge the United States to correct its mistakes, not implement the law, or obstruct the development of relations between other countries and China, otherwise it will inevitably encounter a resolute strike back by China[13].” This option might entail having to be prepared to face this threatened ‘strike back’.

Gain:  The Chinese government’s opposition to international recognition of a prosperous free market democracy is enforced through threats and coercion. Recognition would be a declaration that, on the world stage, aggressive rhetoric and punitive use of boycotts and market access by larger nations do not trump the rule of law, democracy, and the sovereignty of smaller nations. If China does attempt a forced reunification, previous recognition of Taiwan makes clear what crime has been committed: the invasion of a sovereign nation by another – not a conclusion to the civil war, or the reigning in of a secessionist province.

Other Comments:  Suggestions for addressing the risks posed by Chinese competition are often reactive in nature and assume China has the initiative: preventing dominance of 5G networks, preventing mass corporate theft, reducing the influence of Confucius Institutes etc. While each suggestion is valid, there is a risk that the assumption of Chinese advantage fosters a pessimistic attitude. Instead, what authoritarian regimes often see as the West’s weaknesses are often strengths, and in the words of U.S. Army Lieutenant General H.R. McMaster, “we have far more leverage than we are employing[14].”

Recommendation:  None.


Endnotes:

[1] McMaster, H. 2020. How China sees the World. The Atlantic. https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

[2] Economy, E. 2018. China’s New Revolution. Foreign Affairs. https://www.foreignaffairs.com/articles/china/2018-04-17/chinas-new-revolution

[3] UK House of Commons. 2020. British Overseas Passport Holders in Hong Kong. Hansard https://hansard.parliament.uk/Commons/2020-01-29/debates/AC02FF56-64CB-4E14-92FD-D2EF59859782/BritishOverseasPassportHoldersInHongKong

[4] McCullough, D. 2020. China threatens to stop Australian imports. Canberra Times. https://www.canberratimes.com.au/story/6736562/china-threatens-to-stop-australian-imports

[5] Office of the United States Trade Representative. 2020. Free Trade Agreements. https://ustr.gov/trade-agreements/free-trade-agreements

[6] Department of Agriculture, Water and the Environment. 2020. Free Trade Agreements. https://www.agriculture.gov.au/market-access-trade/fta

[7] Pengelly, M. 2017.Trump threatens to terminate Nafta, renews calls for Mexico to pay for wall. The Guardian. https://www.theguardian.com/us-news/2017/aug/27/donald-trump-camp-david-nafta-mexico-wall-canada

[8] Wofe, R., & Acquaviva, 2018 Where does the public sit on NAFTA? Policy Options. https://policyoptions.irpp.org/magazines/april-2018/public-sit-nafta

[9] O’Leary, L. 2020. The Modern Supply Chain is Snapping. The Atlantic. https://www.theatlantic.com/ideas/archive/2020/03/supply-chains-and-coronavirus/608329

[10] The World Bank. 2020. GDP (current US$). The World Bank. https://data.worldbank.org/indicator/NY.GDP.MKTP.CD

[11] Lyons, K. 2020. Taiwan loses second ally in a week as Kiribati switches to China. The Guardian. https://www.theguardian.com/world/2019/sep/20/taiwan-loses-second-ally-in-a-week-as-kiribati-switches-to-china

[12] Hille, K. 2020. US steps up support of Taiwan in open rebuke to China. The Financial Times. https://www.ft.com/content/161e1b6b-8b5c-44a8-a873-76687427b522

[13] Blanchard, B., & Tian, Y. U.S. increases support for Taiwan, China threatens to strike back. https://www.reuters.com/article/us-taiwan-usa/us-increases-support-for-taiwan-china-threatens-to-strike-back-idUSKBN21E0B7

[14] McMaster, H. 2020. How China sees the World. The Atlantic. https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

2020 - Contest: PRC Below Threshold Writing Contest Alexander Craig Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Option Papers

Assessing China as a Complex Competitor and its Continued Evolution of Tactics Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Matthias Wasinger is an Austrian Army officer. He can be found on LinkedIn. The views contained in this article are the author’s alone and do not represent the views of the Austrian Armed Forces, the Austrian Ministry of Defense, or the Austrian Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing China as a Complex Competitor and its Continued Evolution of Tactics Below the Threshold of Armed Conflict

Date Originally Written:  April 1, 2020.

Date Originally Published:  June 17, 2020.

Author and / or Article Point of View:  The author is an active General Staff Officer. He believes in the importance of employing all national instruments of power in warfare in a comprehensive approach, including non-state actors as well as allies, coalition forces, and partners. This assessment is written from the author’s point of view on how China plans to achieve its objectives.

Summary:  The Thucydides trap – it is a phenomenon destining a hegemon and an emerging power to war. The People’s Republic of China and the United States of America are currently following this schema. China aims at reaching a status above all others. To achieve that, it employs all instruments of national power in a concerted smart power approach, led by the constant political leadership. China fills emerging gaps in all domains and exploits U.S. isolationism.

Text:  The People’s Republic of China and the U.S. are competing actors. As an emerging power, China challenges the current hegemon[1]. Whereas the U.S. sees itself “first” amongst others[2], China aims at being “above” all[3]. To achieve this goal, China adheres to a whole of nation approach[4]. In the current stage of national resurrection, China will not challenge the U.S. in a direct approach with its military[5]. However, it balances hard and soft power, consequently employing smart power[6]. Within this concept, China follows examples of the U.S., further develops concepts, or introduces new ones. Foremost, China is willing to fill all emerging gaps the U.S. leaves in any domain. Its exclusive political system provides a decisive advantage towards other competitors. China’s political leadership has no pressure to succeed in democratic elections. Its 100-year plan for the great rejuvenation until 2049 is founded on this constancy[7].

China’s diplomacy is framed by several dogmata, executed by the Chinese People’s Party that stands for entire China, its well-being, and development. China’s view of the world is not pyramidic but concentric. That given, it might be easier to understand why China is ignoring concerns about internal human rights violations, adheres to a One-China policy regarding Taiwan, and assumes Tibet as Chinese soil. Maintaining North Korea as a buffer-zone to a U.S. vassal and developing the “string of pearls” in the South China Sea are more examples for the concentric world perception. These examples are the inner circle. They are indisputable[8].

Additionally, China’s diplomacy overcame the pattern of clustering the world by ideology. Necessity and opportunity are the criteria for China’s efforts[9]. Western nations’ disinterest in Africa led – like the European Union’s incapability in stabilizing states like Greece after the 2008 economic crisis – to close diplomatic, economic, and military ties with China. Whereever the so-called west leaves a gap, China will bridge it[10]. The growing diplomatic self-esteem goes, thereby, hand in hand with increasing China’s economic and military strength. China exploits the recent U.S. isolationism and the lacking European assertiveness. It aims at weak points.

In the fight for and with information, China showed an impressive evolution in information technology[11]. This field is of utmost importance since gathering data is not the issue anymore, but processing and disseminating. The infinite amount of information in the 21st century requires computer-assisted processes. Since China gained “Quantum Supremacy”, it made a step ahead of the United States of America[12]. Under this supremacy, China’s increasing capabilities in both Space and Cyberspace gain relevance. Information is collected almost equally fast by competitors, but more quickly fed into the political decision-making process in China[13]. The outcome is superiority in this field[14].

In the information domain, China follows a soft power approach, turning its reputation into a benevolent one. Lately, even the COVID-19 crisis was facilitated to make China appear as a supporter, delivering medical capacities worldwide. China makes use of the western community’s vast and open media landscape while restricting information for the domestic population. China will continue to show a domestically deterrent but supportive expeditionary appearance.

A strong economy and an assertive military are the Chinese political leadership’s source of strength[15]. Concerning the economy, China achieved remarkable improvements. From being a high-production rate, but low-quality mass-producer, it switches increasingly towards quality industries — their chosen path led via industrial espionage and plagiarism towards further developing imported goods[16]. Automobile and military industries are two illustrative examples. The former led to Chinese cars being banned, for example, from the U.S. market, not due to lacking quality but to protect U.S. automobile industries. The latter is based on Russian imports that were analyzed and improved. In doing so, China was able to raise its domestic weapons industry, literally rushing through development stages that took other nations decades.

China requires economic development. Only a strong economy ensures social improvements for its population, a precondition for internal stability. As long as this social enhancement is perceived, China’s domestic population bears restrictions. China will, therefore, maintain its economic growth with all given means. Modern technologies will be pursued in China, and resources will be either imported or, as seen in Africa, entire land strips or regions will be acquired. An essential capstone in this regard will be the “Belt and Road Project”, connecting the Chinese economy with other relevant markets such as Europe[17]. Concentrically, China will extend its influence along this trade route and grow its influence by creating dependence[18].

Establishing and maintaining contested economic routes requires capable security forces. China’s military keeps the pace. Founded as a revolutionary force, the military achieved the goal of combat readiness. Until 2049, China’s ambition is to build armed forces, able to fight and win wars. In a regional context, deterrence is the requirement. However, China seeks more. Superseding the U.S. means exceeding U.S. maritime capabilities. China’s strategic goal is to build the most capable blue-water navy[19]. The “string of pearls” is just an intermediate step until its naval fleet as assets of power-projecting will be established. China will maintain its land forces and increase its capabilities in all other domains. Regional conflicts will be facilitated to test doctrine, technology, and combat readiness.

China is aware of its geopolitical situation. It has to deter Russia militarily while marginalizing it economically. It will avoid a direct military confrontation that might hamper economic growth[20]. China has to shape the surrounding Asian nations’ attitude so they would not provide U.S. forces further staging areas. It will exploit U.S. isolationism, influence Europe economically, and diminish transatlantic influence using the information domain.

The U.S., being a maritime power, is eager to maintain its status as a hegemon by controlling opposite coast-lines such as Europe via Great Britain or Asia via Japan and South Korea. Reluctance to directly compete with China will enable the concentric power growth to reach the U.S. territory, finally overwhelming it. Interventionism will be exploited in the information domain, and isolationism is even a precondition for China’s success.


Endnotes:

[1] Allison, G. (2018, 24). Destined for War.

[2] The President of the United States. (2017, 1). National Security Strategy of the United States of America.

[3] Ward, J. (2019, 5). China’s Vision of Victory.

[4] Ward (2019, 92). Ibid.

[5] Ward (2019, 31-36). Ibid.

[6] Allison, G. (2018, 22). Destined for War.

[7] Raik et al. (2018, 33). The Security Strategy of the United States of America, China, Russia, and the EU.

[8] Ward (2019, 54-61). China’s Vision of Victory.

[9] Raik et al. (2018, 22-26). The Security Strategy of the United States of America, China, Russia, and the EU.

[10] Allison (2018, 20-24). Destined for War.

[11] Ward (2019, 85-87). China’s Vision of Victory.

[12] Ward (2019, 86). Ibid.

[13] Preskill (2018, 7). Quantum Computing in the NISQ.

[14] Poisel (2013, 49-50). Information Warfare and Electronic Warfare.

[15] Raik et al. (2018, 36). The Security Strategy of the United States of America, China, Russia, and the EU.

[16] Ward (2019, 92-95). China’s Vision of Victory.

[17] Raik et al. (2018, 33). The Security Strategy of the United States of America, China, Russia, and the EU.

[18] Ward (2019, 116-118). China’s Vision of Victory.

[19] Ward (2019, 61). Ibid.

[20] Raik et al. (2018, 34). The Security Strategy of the United States of America, China, Russia, and the EU.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Matthias Wasinger United States

Assessing China’s Economic Influence in Latin America

Assad Raza is an Active Component U.S. Army Civil Affairs Officer with deployment experience throughout the Middle East.  He holds an M.A. in Diplomacy with a concentration in International Conflict Management from Norwich University, and is a graduate of The Western Hemisphere Institute for Security Cooperation Command and General Staff Officer Course at Fort Benning, Georgia.  He can be found on Twitter @assadraza12.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing China’s Economic Influence in Latin America

Date Originally Written:  April 12, 2020.

Date Originally Published:  May 25, 2020.

Summary:  Similar to the Soviet Union during Cold War, China is seeking victory without war.  In this Latin America case however, China is leveraging its economic instrument of power to achieve influence instead of supplying fellow communists with materiel like the Soviet Union did.  China’s efforts in this arena are a threat to U.S. interests in Latin America.

Author and / or Article Point of View:  The author believes China’s investments and financial deals throughout Latin America can threaten U.S. interests in the long-term.

Text:  In 2008, China published a White Paper expressing their long-term goals in Latin America. This White Paper highlighted several areas of cooperation to include trade, investment, and financing throughout the region[1]. Over a decade later, China almost built a canal in Nicaragua, negotiated several free trade agreements with countries like Brazil and El Salvador, and funded several infrastructure projects throughout Latin America. Unfortunately, China has successfully used its economic instrument of power to coerce countries and legally advance their global interests against competitors like the United States.

Over the past decade, China has become the largest trading partner to countries like Brazil and El Salvador. However, these trading dependencies have caused countries like Brazil to fall into recessions because of their reliance on China’s economy, as seen in 2015[2]. China’s approach has increased Latin American countries dependencies with them, which can be a risk to their economies and the region. A good example is China’s loans-for-oil deal with Venezuela, which contributed to Venezuela’s economic collapse due to falling oil prices and their inability to repay Chinese loans[3]. However, China’s trade is not limited to only natural resources; it also includes building infrastructure throughout the region as another means to trap countries into default, holding them hostage to more Chinese coercion.

China has taken on several infrastructure projects to consolidate its influence throughout Latin America. In December 2019, the President of El Salvador met with Chinese President Xi Jinping to finalize a deal on several infrastructure projects for the country[4]. These projects include a large sports stadium and a water treatment plant[5]. This deal came after El Salvador broke diplomatic ties with Taiwan and publicly announcing their support to the One-China Policy[6]. The agreement with El Salvador demonstrates China’s ability to undermine international support for Taiwan through investment opportunities in developing countries. These risky investments in Latin America are similar to China’s Belt and Road Initiative, in countries throughout Asia.

Throughout Asia and Africa, China has leveraged long-term leases of ports in vulnerable countries that have failed to pay off loans. For example, China was able to negotiate a 99-year lease over the port of Hambantota with Sri Lanka due to debt[7]. This long-term lease to pay off loans is not isolated to Asia but could be used to leverage territories in Central and South America with countries in debt to China. China’s investments are strategic, knowing that developing countries in Latin America that default on payments may feel pressured to lease out territories like their ports.

China has already attempted this approach in Central American countries like El Salvador. In 2018, China tried to purchase Isla Perico, an Island off the coast of El Salvador, and to relocate its population to the mainland[8]. China also requested a 100-year lease for areas near a port and tax exemptions for Chinese companies[9]. More importantly, these offers came at a time when the U.S. had suspended aid to El Salvador because of mass migration issues leaving a gap for China to exploit. Although the U.S. has temporarily stalled these negotiations, it demonstrates China’s ability to target vulnerable states to advance their agenda legally.

Chinese investment in Latin America also includes the technology sector. This technology consists of similar systems used in China to conduct surveillance on their people. In 2016, Chinese telecom company ZTE Corp assisted with Venezuela’s “fatherland card” that tracked citizens and linked it to government subsidized food and health programs[10]. The risk with this technology is that other governments may want to acquire it from China and use this to reward loyalists and oppress those perceived as not loyal, increasing instability, as seen in Venezuela. This pattern is worrying and without mitigation could be a harbinger of more Orwellian-type surveillance state behavior spreading throughout Latin America.

China’s interests throughout Latin America continue to increase, as seen with their recent attempt to lease port lying areas in El Salvador. Much like in Sri Lanka, China aggressively pursues developing countries to legally entrap them and coerce them into long-term commitments for compensation. Although their priority in Latin America is to gain an economic foothold, their actions also shape Latin American perceptions and buys political influence in the region. China’s economic advancement in Latin America has the potential to become a national security threat to the U.S. and its interests throughout the region.


Endnotes:

[1] Peters, E. (2015). China’s Evolving Role in Latin America: Can It Be a Win-Win? (pp. 5-11, Rep.). Atlantic Council. Retrieved April 12, 2020, from www.jstor.org/stable/resrep03629.5

[2] Patey, L. (2016, November 21). Trouble Down South: Xi Jinping’s Latin American Tour. Foreign Affairs. Retrieved April 12, 2020, from https://www.foreignaffairs.com/articles/south-america/2016-11-21/trouble-down-south

[3] Guevara, C. (2020, January 13). China’s support for the Maduro regime: Enduring or fleeting? Atlantic Council. Retrieved April 12, 2020, from https://www.atlanticcouncil.org/blogs/new-atlanticist/chinas-support-for-the-maduro-regime-enduring-or-fleeting

[4] Renteria, N. (2019, December 3). China signs on for ‘gigantic’ investment in El Salvador infrastructure. Reuters. Retrieved April 12, 2020, from https://www.reuters.com/article/us-el-salvador-china/china-signs-on-for-gigantic-investment-in-el-salvador-infrastructure-idUSKBN1Y7266

[5] Ibid.

[6] Ibid.

[7] Schultz, K. (2017, December 12). Sri Lanka, Struggling with Debt, Hands a Major Port to China. New York Times. Retrieved April 12, 2020, from https://www.nytimes.com/2017/12/12/world/asia/sri-lanka-china-port.html

[8] Londono, E. (2019, September 21). To Influence El Salvador, China Dangled Money. The U.S. Made Threats. New York Times. Retrieved April 12, 2020, from https://www.nytimes.com/2019/09/21/world/americas/china-el-salvador-trump-backlash.html

[9] Ibid.

[10] Berwick, A. (2018, November 14). How ZTE helps Venezuela create China-style social control. Reuters. Retrieved from https://www.reuters.com/investigates/special-report/venezuela-zte

Assad Raza Below Established Threshold Activities (BETA) China (People's Republic of China) Economic Factors

Options for Deterrence Below Armed Conflict

James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  He can be found on Twitter @james_miccicheDivergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As military competition below armed conflict once again becomes the norm, the U.S. requires deterrence options.

Date Originally Written:  November 17, 2019.

Date Originally Published:  December 23, 2019.

Author and / or Article Point of View:  The author believes that traditional nuclear deterrence will not suffice in the current national security paradigm as it is focused on mainly deterring nuclear war or major conflict, which are the least-likely situations to occur.

Background:  In June 2019, the United States Military’s Joint Staff published Joint Doctrine Note (JDN) 1-19 “The Competition Continuum.”  The JDN further developed and refined the non-linear/non-binary continuum that defines the perpetual state of competition that exists between nations .  This perpetual state of competition was originally proposed in the “Joint Concept for Integrated Campaigning (JCIC)[1].” Within the JDN continuum the Joint Force, in conjunction with other elements of national power (diplomacy, economic, information, etc.), simultaneously campaigns through a combination of cooperation, competition below armed conflict, and armed conflict to achieve desired strategic objectives including deterring actions and goals of rival states. The continuum represents a shift in U.S. military doctrine from a counterterrorism-centric security strategy to one focused on competing with a spectrum of international agents and actors.

Significance:  While not an authoritative document, JDNs generate and facilitate the creation and revision of joint and service specific doctrine. Therefore, the continuum proposed by the JDN will be integrated and operationalized by planners and doctrine writers across the Department of Defense (DoD). Within the JDN’s continuum, competition below armed conflict is not only the aspect that most regularly occurs, but also the most challenging for the DoD to operationalize. The JDN further refines the JCIC language by describing campaigning through competition below armed conflict as a protracted, constrained, often imbalanced, and diverse construct predicated upon a deep understanding of the operating environment where the joint force seeks to execute three newly codified tactical tasks: Enhance, Manage, and Delay.  Despite clarifying the language of competition below armed conflict, the JDN fails to provide concrete examples of the concepts implementation to include the Joint Force’s role in deterrence which is vaguely described “Deterrence in competition below armed conflict is similarly nuanced [to deterrence by armed conflict} and perhaps harder to judge[2].”  This paper will provide three options for planners and doctrine writers to employ deterring rivals through competition below armed conflict per the guidance outlined in the JDN and JCIC.

Option #1:  Persistent Presence.

The United States, at the behest of partner nations, overtly deploys conventional ground forces to key strategic regions / locations to prevent aggressive incursions from rival states in fear of causing U.S. casualties and invoking a potential kinetic response. This same principle is applied to the regular exercise of freedom of navigation though global commons that are considered vital to U.S. interests.

Risk:  Conventional U.S. force presence adjacent to competitor nations potentially escalates tensions and greatly increases the risk of armed conflict where U.S. personnel forward potentially face overwhelming force from a near peer competitor. The logistical and personnel requirements to deploy conventional forces forward are high and can lead partner nations to become overly dependent on U.S. forces thus creating enduring U.S. expenditures. The presence of a large U.S. footprint can facilitate competitor information operations focusing on delegitimizing the efficacy of host nation government / military possibly creating domestic instability, and prompting anti-U.S. sentiment amongst the population.

Gain:  There have been successful historic and contemporary applications of deterrence by presence from a proportionally smaller U.S. force compared to rivals. Examples include U.S. / North Atlantic Treaty Organization forward presence in Europe during the Cold War as part of a successful deterrence strategy against larger Eastern bloc forces and the recent expansion of Turkish, Syrian, and Russian forces into Northern Syria upon the departure of a small footprint of U.S. forces in October of 2019. Presence can also facilitate collaboration and interoperability between U.S. and regional partners supporting the two other elements of the competition continuum cooperation and armed conflict.

Option #2:  Civil Resiliency and Civil Engagement.

Many of the United States’ principal competitors attempt to advance their interests and achieve their objectives through various forms of population-centric warfare that seeks to instigate and capitalize on domestic instability. To deny access to, and mitigate the ability to influence populations needed to advance such a strategy, the Joint Force utilizes Civil Affairs and Psychological Operations capabilities to identify populations tied to key terrain and in conjunction with other elements of national power fosters civil resiliency to malign influence.

Risk:  Fostering civil resiliency in populations vulnerable to or targeted by malign influence operations is a long-term undertaking requiring enduring programming funds and command support to be effective. Assessments of population-centric operations are difficult to quantify making the establishment of measures of performance and effectiveness exceptionally difficult and impeding the understanding of effects of enemy, friendly, and partner actions within the complex system of the human domain.

Gain:  A population-centric engagement strategy facilitates interagency coordination enabling the utilization of multiple elements of national power to counter malign efforts by adversaries and simultaneously propagates U.S. soft power. Civil Affairs and Psychological Operations elements have exceptionally small personnel footprints and low logistical costs and can promote cooperation with host nation counterparts. Military-civil engagement programs and projects often permit personnel to operate in regions and nations where competitors have an established advantage.

Option #3:  Proxies and Regime Fragility.

Today, the United States’ chief competitors and their allies are regimes that are authoritarian in nature[3] and therefore all share the primacy of maintaining regime power as their supreme interest. The Joint Force can exploit this distinctive feature of authoritarianism and utilize clandestinely-supported proxies and / or focused information operations to threaten the domestic stability of autocrats taking actions against U.S. interests.

Risk:  Creating instability comes with many unknown variables and has the potential to produce unwanted secondary effects including expanding conflicts beyond a single nation and engulfing an entire region in war. There remains a long history of the United States equipping and training proxies that later become adversaries. If direct U.S involvement in a proxy conflict becomes publicly known, there could be irreversible damage to the United States’ international reputation degrading comparative advantages in soft power and the information domain.

Gain:  Operating through either a proxy or the information domain provides managed attribution to the Joint Force and increases freedom of maneuver within a normally constrained competition environment to threaten rival leadership in their most vulnerable areas. Working with proxies provides both an easy exit strategy with very few formal commitments and leads to little risk to U.S. personnel.

Other Comments:  The above listed options are not mutually exclusive and can be utilized in conjunction not only with each other but also together with other elements of the competition continuum to achieve an objective of deterring unwanted competitor actions while concurrently promoting U.S interests. The U.S. cannot compete in an omnipresent manner and ts planners would do well to pragmatically choose where and how to compete based on national interests, competitor action/inaction, available resources, and conditions within a competitive environment.

Recommendation:  None.


Endnotes:

[1] Joint Chiefs of Staff (2018) Joint Concept for Integrated Campaigning. Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joint_concept_integrated_campaign.pdf?ver=2018-03-28-102833-257

[2] Joint Chiefs of Staff (2019) Competition Continuum (Joint Doctrine Note 1-19). Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/jdn_jg/jdn1_19.pdf?ver=2019-06-10-113311-233

[3] The Economist Intelligence Unit (2018). 2018 Democracy Index, The Economist Intelligence Unit. Retrieved from https://www.eiu.com/topic/democracy-index

 

 

 

Below Established Threshold Activities (BETA) Deterrence James P. Micciche Option Papers

Assessment of the Role of Small Wars within the Evolving Paradigm of Great Power Competition in a Multipolar World

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific.  He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Role of Small Wars within the Evolving Paradigm of Great Power Competition in a Multipolar World

Date Originally Written:  April 25, 2019.

Date Originally Published:  June 17, 2019.

Author and / or Article Point of View:  The author is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Europe, and the Indo-Pacific.

Summary:  The U.S. is scaling down the Global War on Terrorism and focusing on threats posed by a revisionist China and Russia and rogue nations such as Iran. In this context, limited military operations (small wars) will be useful in transforming counterterrorism methods, which previously dominated U.S. foreign policy, into being only one facet of a synchronized whole of government response in pursuit of U.S. policy objectives in contested spaces.

Text:  Over the past decade, the global balance of power has shifted to a multipolar construct in which revisionist actors such as China and Russia attempt to expand their spheres of influence at the expense of the U.S.-led liberal order.  The ongoing rebalance has been gradual and often conducted through a myriad of activities beyond kinetic operations as Russia, China, and regional actors such as Iran have shown a capability to capitalize on and create domestic instability as a means to expand influence, gain access to key terrain and resources, and reduce western influence.  The capacity to utilize limited military operations (small wars) as part of a focused, tailored, and comprehensive whole of government approach to deter threats and expansion from revisionist powers is paramount in promoting U.S. and Western interests within the modern paradigm.  Despite the prominent role engaging in limited operations at or more importantly below the level of conflict fulfills within the context of great power competition, it is far from a proverbial silver bullet as the rebalancing of power brings new parameters and risks that U.S. policy makers must understand before engaging  in any small war. 

Since the collapse of the Union of Soviet Socialist Republics, the United States and her Western allies have enjoyed an exorbitant amount of freedom to execute limited military operations and foreign domestic interventions due to what scholars termed the unipolar moment[1].   The 1990s saw the principle of Responsibility to Protect (R2P) utilized as a guiding framework for Western engagement as liberal democracies intervened in the internal affairs of sovereign nations from Somalia to the Balkans to protect life and punish offenders[2].  Following the September 11, 2001 attacks, the United States and many of her longtime allies began the Global War on Terror (GWOT) fundamentally changing U.S. foreign policy for the next two decades.  The GWOT gave rise to an unprecedented increase in U.S. foreign intervention as the specter of terrorism emerged in all corners of the globe and a series of Secretary of Defense-approved Execute Orders granted the DoD broad authorities to conduct counterterrorism operations worldwide.  

The extent to which global terrorism poses an existential threat to U.S. and other Western powers has been debated with valid and well-researched positions on both sides[3], but what is not debatable is that GWOT consumed vast amounts of the West’s material resources and attention — the U.S. alone has spent an estimated $5.9 Trillion since 9/11[4].  With the West focusing on countering non-state actors, revisionist nations began to build power and expand which became evident when Russia annexed Crimea and China began aggressively expanding into the South China Sea.  The 2017 National Security Strategy marked a turning point in contemporary U.S. foreign policy by codifying an end to the CT-focused strategy of the previous sixteen years and placing an emphasis on great power competition with near-peers, as the document declares in very clear language “…after being dismissed as a phenomenon of an earlier century, great power competition returned. China and Russia reassert their influence regionally and globally[5].”   

Despite recent attempts by China and Russia to close the military capabilities gap between themselves and the U.S., the U.S. maintains an advantage, specifically in the global application and projection of power[6]. To overcome this disadvantage revisionist and rogue states utilize soft balancing (utilization of international structures to disrupt and discredit U.S. hegemony) at the strategic level[7] and hybrid warfare (population-centric operations that create instability) at the tactical and operational levels[8] to expand their influence and territory through activities that avoid direct confrontation.  The utilization and application of limited military operations (small wars) combined with other elements of state power can both identify and counter the aforementioned strategies employed by contemporary Western rivals while concurrently advancing U.S. strategic objectives. Within the small war paradigm, military actors have a wide range of applications that support U.S. strategic objectives that fall into three mutually supportive activities, mil-to-mil engagement, civ-mil engagement, and resistance operations.  

Persistent mil-to-mil engagements, exercises, and training missions help establish the U.S. as a partner of choice in strategically significant nations while simultaneously building partner capabilities within or adjacent to contested regions.  The deployment of Civil Affairs and Psychological Operations elements foster resiliency within vulnerable populations, denying adversaries access to key human terrain needed to conduct hybrid operations.  Resistance operations can manifest in defensive or offensive postures either supporting a partner nation from externally provoked and supported insurrection or undermining the capacity of rival nations to exert malign influence by supporting armed and unarmed opposition to the state. Military interventions are best as only one facet of a synchronized whole of government response in which the DoD might not be the lead agency.  Furthermore, as rivals compete over contested spaces the chances for escalation and international incident grows, a threat exponentially increased by the internationalization of civil wars, placing increased risk in direct military engagements. 

In the evolving context of great power competition, U.S. assets may not always be the best funded or equipped.  They will often face bureaucratic restrictions their rivals do not and potentially be deprived of access to key individuals or institutions.  These conditions will place a premium on individual interpersonal skills and international U.S. perception, so the U.S. can maintain a comparative advantage in soft power. To facilitate that advantage the U.S. will likely need to differentiate and categorize partners on not only their geopolitical importance but also the values that they represent and the company they keep.  Specifically the U.S. will likely examine the risks of collaborating with autocratic governments whose actions have the propensity to create domestic instability and an environment conducive to hybrid warfare.  Additionally, any government with substantial human rights concerns degrades the soft power of those that the international community perceives as their partners, a perception adversary information operations can greatly amplify.

As U.S. security strategy adapts and returns to a construct that places emphasis on challenges and threats from state actors the function, employment, and role of the small war will be useful to transform from a method of CT into a strategic instrument of national power that can support long-term U.S. objectives across the globe often below levels of conflict. 


Endnotes:

[1] Krauthammer, C. (1990). The Unipolar Moment. Foreign Affairs, 23-33. Retrieved from Foreign Affairs.

[2] Evans, G., & Sahnoun, M. (2002). The Responsibility to Protect. Foreign Affairs, 99-110.

[3] Brookings Institution. (2008, February 21). Have We Exaggerated the Threat of Terrorism. Retrieved from The Brookings Institution : https://www.brookings.edu/events/have-we-exaggerated-the-threat-of-terrorism/

[4] Crawford, N. C. (2018, November 14). United States Budgetary Csts of the Post-9/11 Wars Through FY2019: $5.9 Trillion Spend and Obligated. Retrieved from Watson Institute: https://watson.brown.edu/costsofwar/files/cow/imce/papers/2018/Crawford_Costs%20of%20War%20Estimates%20Through%20FY2019%20.pdf

[5] United States. (2017). The National Security Strategy of the United States of America. Washington D.C. : The White House.  Retrieved from: https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

[6] Heginbotham, E. M. (2019). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017. Santa Monica: Rand Corporation.

[7] Pape, R. A. (2005). Soft Balancing Against the United States. International Security, 7-45.

[8] Chives, C. S. (2017, March 22). Understanding Russian “Hybrid Warfare” and What Can Be Done About IT. Retrieved from Rand Corporation : https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT468/RAND_CT468.pdf

2019 - Contest: Small Wars Journal Assessment Papers Below Established Threshold Activities (BETA) Great Powers & Super Powers James P. Micciche

Options for the West to Address Russia’s Unconventional Tactics

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Jesse Short was enlisted in the U.S. Marine Corps infantry and served in the Republic of Iraq between 2005 and 2008.  He currently works as a security contractor in the Middle East and recently finished his M.S. in Global Studies and International Relations from Northeastern University.  He can be found on LinkedIn at www.linkedin.com/in/jesse-s-4b10a312a. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Russian Federation’s limited forms of warfare against western states and associated influence in other regions challenges the world as it is conducted below the threshold of war.

Date Originally Written:  March 3, 2019.

Date Originally Published:  March 25, 2019.

Author and / or Article Point of View:  The author is a veteran of the infantry in both the United States Marine Corps and United States Army. The author believes in checking clear threats to western states with strong and decisive, but intelligent responses. This article is written from the point of view of western states under the threat of the ‘unconventional’ actions of the Russian Federation.  

Background:  Russia, under the leadership of President Vladimir Putin, has established its foreign policy in the last ten years on interrupting and negatively influencing the stability of other states. This foreign policy has largely gone unanswered by the international community and only serves to reinforce the use of these actions by Russian actors. Georgia was the first case and Ukraine is a much more dynamic second example of this policy[1]. These two policy tests have proven to Russia, and in some sense to other states like China, that limited forms and unconventional forms of coercion, intimidation, and violence will go unchecked so long as they do not go too far with these actions. The West’s lack of imagination and adherence to one-sided western rules and laws are its glaring weakness. This weakness is being exploited relentlessly with little meaningful response.   

Significance:  Since around the time of Russia’s incursion into the Republic of Georgia in 2008, Putin has been operating unchecked around the world. Putin’s actions have been disastrous for what is an already tumultuous world order. If continued, these actions will create more direct and indirect issues in the future and increase the threat to western stability. 

Option #1:  The West influences Russia within its border.

The equal and opposite response to Russian transgressions around the world would be to attempt to spread misinformation and potentially destabilize Russian society by targeting the citizenry’s trust in Putin and his government. The aim with this approach is to distract the Russian government and intelligence services to preoccupy them with trouble within their own borders as to limit their ability to function effectively outside of their state borders. 

Risk:  While this approach is opposite to what actions most western societies are willing to take, this option can also have severely negative consequences on a political level in domestic politics in the West. While Russia can take similar actions as a semi-authoritarian state with little repercussion, the proposed actions would be a bigger issue in western democracies which are at the mercy of public opinion[2]. Russian media also has greater pull and influence within its community than western media does in the West, so Russia can shape its truth accordingly. Another large issue is that the Russian people should not be made to suffer for the actions that are mostly to be blamed on what appears to be their poorly representative government. This option could serve to galvanize polarity between Russians and western citizens unjustly if discovered. Finally, it is unlikely that western intelligence services would be given the support or be able to maintain the secrecy required to conduct these actions effectively without it being made public and having even more severe consequences once those actions were exposed[3]. 

Gain:  A misinformation campaign or the exposure to hidden truths covered up by the Russian government may have a positive effect on Russians and their relationship with / control of their government. Exposing voters to what their government is doing around the world with state funds may influence that relationship in a more positive manner. Also, if things did work out according to plan, Russia may be forced to withdraw somewhat from its politically divisive ventures in Georgia, Ukraine, Syria, and perhaps Africa and Belarus.     

Option #2:  The West responds outside of Russia.

Western states could act more aggressively in checking Russian support of small political factions and insurgencies in specific regions. The issue of Russian occupation in the Republic of Georgia and Russian material and personnel support in eastern Ukraine are the best places to start. A greater commitment to supporting the incoming regime following Ukraine’s upcoming elections and the involvement of western states in more intensive training and operations with Ukrainian forces would be a welcomed adjustment of policy[4]. The West’s turning of the other cheek that has largely followed Russia’s annexation of Crimea and support for the Donetsk and Luhansk Peoples’ Republics send the wrong messages to the friends and enemies of western powers.

Risk:  The risks that are ever-present with a stronger approach to Russian interventionist tactics are mainly geared at avoiding a larger conflict. The reason behind Russia’s low-intensity application of force and influence is to scare the faint-hearted away[5]. It is working. No state wants a war. War with Russia would not end well for any party that is involved. While war is unlikely, it is still a possibility that needs to be considered when additional states become involved in these limited conflicts. Again, politics must be factored into the commitment of force with warfighters, financial support, or materiel support. Democratic leaders are going to be hesitant to become involved in small wars with no strategy to back them up. Afghanistan and Iraq have already done enough damage to western powers with their lack of direction and their continued drain on resources to no end. 

Gain:  Showing aggressive states that their divisive actions will be met with a sure and solid response is the best thing that could happen for international stability in the coming years. The negligence the world community has shown to an overaggressive Russia and China in recent years has set a very dangerous precedent.  

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] United States Congress: Commission on Security Cooperation in Europe. (2018). Russia’s Occupation of Georgia and the Erosion of the International Order: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Fifteenth Congress, Second Session, July 17, 2018.

[2] Zakem, V., Saunders, P., Hashimova, U., & Frier, P. (2017). Mapping Russian Media Network: Media’s Role in Russian Foreign Policy and Decision-Making (No. DRM-2017-U-015367-1Rev). Arlington, Virginia: CNA Analysis and Solutions. 

[3] Reichmann, D. (2017). “CIA boss Mike Pompeo says ‘leaker worship’ compromising American intelligence”. Global News. Retrieved from https://globalnews.ca/news/3554008/mike-pompeo-leakers-us-intelligence/

[4] Deychakiwsky, O. (2018). “Analysis: U.S. Assistance to Ukraine”. U.S. Ukraine Foundation. Retrieved from https://www.usukraine.org/analysis-u-s-assistance-ukraine/

[5] Khramchikhin, A. (2018). “Rethinking the Danger of Escalation: The Russia-NATO Military Balance”. Carnegie Endowment of International Peace. Retrieved from https://carnegieendowment.org/2018/01/25/rethinking-danger-of-escalation-russia-nato-military-balance-pub-75346.    

2019 - Contest: Small Wars Journal Below Established Threshold Activities (BETA) Jesse Short Option Papers Russia

An Assessment of North Atlantic Treaty Organization Cyber Strategy and Cyber Challenges

Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare.  She tweets at @ali_craw.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of North Atlantic Treaty Organization Cyber Strategy and Cyber Challenges

Date Originally Written:  December 5, 2018.

Date Originally Published:  January 14, 2019.

Summary:  Cyber capabilities are changing the character of warfare.  Nations procure and develop cyber capabilities aimed at committing espionage, subversion, and compromising the integrity of information.  The North Atlantic Treaty Organization has evolved to meet these modern challenges by consistently implementing new policies, creating governing structures, and providing education to member-states.

Text:  In 2002, leaders from various nations met in Prague to discuss security challenges at a North Atlantic Treaty Organization (NATO) summit.  Agenda items included enhancing capabilities to more appropriately respond to terrorism and the proliferation of weapons of mass destruction, to consider the pending memberships of several Eastern European nations, and for the first time in NATO history, a pledge to strengthen cyber defenses.  Since 2002, NATO has updated its cyber policies to more accurately reflect the challenges of a world that is almost exclusively and continuously engaged in hybrid warfare. 

As NATO is a defensive organization, its primary focus is collective defense, crisis management, and cooperative security.  Early cyber policy was devoted exclusively to better network defense, but resources were limited; strategic partnerships had not yet been developed; and structured frameworks for policy applications did not exist.  When Russian Distributed Denial-of-Service (DDoS) attacks temporarily disrupted Estonian banking and business sectors in 2007, the idea of collective defense was brought to fruition.  Later, in 2008, another wave of vigorous and effective Russian DDoS attacks precluded an eventual kinetic military invasion of Georgia.  This onslaught of cyber warfare, arguably the first demonstration of cyber power used in conjunction with military force, prompted NATO to revisit cyber defense planning[1].  Today, several departments are devoted to the strategic and tactical governance of cybersecurity and policy. 

NATO’s North Atlantic Council (NAC) provides high-level political oversight on all policy developments and implementation[2].  Under the NAC rests the Cyber Defence Committee which, although subordinate to the NAC, leads most cyber policy decision-making.  At the tactical level, NATO introduced Cyber Rapid Reaction teams (CRRT) in 2012 which are responsible for cyber defense at all NATO sites[3].  The CRRTs are the first to respond to any cyber attack.  The Cyber Defence Management Board (CDMB), formerly known as the Defence Policy and Planning Committee (Cyber Defence), maintains responsibility for coordinating cyber defense activities among NATO’s civil and military bodies[4].  The CDMB also serves as the most senior advisory board to the NAC.  Additionally, the NATO Consultation, Control, and Command Board serves as the main authority and consultative body regarding all technical aspects and implementation of cyber defense[5]. 

In 2008 at the Bucharest Summit, NATO adopted its first political body of literature concerning cyber defense policy which primarily affirmed member nations’ shared responsibility to develop and defend its networks while adhering to international law[6].  Later, in 2010, the NAC was tasked with developing a more comprehensive cyber defense strategy which eventually led to an updated Policy on Cyber Defense in 2011 to reflect the rapidly evolving threat of cyber attacks[7].  NATO would continue to evolve in the following years.  In 2014, NATO began establishing working partnerships with industry leaders in cybersecurity, the European Union, and the European Defense Agency[8].  When NATO defense leaders met again at the Warsaw Summit in 2016, the Alliance agreed to name cyberspace as a domain of warfare in which NATO’s full spectrum of defensive capabilities do apply[9]. 

Despite major policy developments and resource advancements, NATO still faces several challenges in cyberspace.  Some obstacles are unavoidable and specific to the Internet of Things, which generally refers to a network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.  First, the problem of misattribution is likely. Attribution is the process of linking a group, nation, or state actor to a specific cyber attack[10].  Actors take unique precautions to remain anonymous in their efforts, which creates ambiguities and headaches for the response teams investigating a particular cyber attack’s origin.  Incorrectly designating a responsible party may cause unnecessary tension or conflict. 

Second, as with any computer system or network, cyber defenses are only as strong as its weakest link.  On average, NATO defends against 500 attempted cyber attacks each month[11].  Ultimately, the top priority is management and security of Alliance-owned security infrastructure.  However, because NATO is a collection of member states with varying cyber capabilities and resources, security is not linear.  As such, each member nation is responsible for the safety and security of their own networks.  NATO does not provide security capabilities or resources for its members, but it does prioritize education, training, wargaming, and information-sharing[12].

To the east of NATO, Russia’s aggressive and tenacious approach to gaining influence in Eastern Europe and beyond has frustrated the Alliance and its strategic partners.  As demonstrated in Estonia and Georgia, Russia’s cyber power is as equally frustrating, as Russia views cyber warfare as a component of a larger information war to control the flow and perception of information and distract, degrade, or confuse opponents[13].  U.S. Army General Curtis Scaparroti sees Russia using cyber capabilities to operate under the legal and policy thresholds that define war. 

A perplexing forethought is the potential invocation of NATO Article 5 after a particularly crippling cyber attack on a member nation.  Article 5 bounds all Alliance members to the collective defense principle, stating that an attack on one member nation is an attack on the Alliance[14].  The invocation of Article 5 has only occurred one time in NATO history following the September 11 terror attacks in the United States[15].  The idea of proportional retaliation often arises in cyber warfare debates.  A retaliatory response from NATO is also complicated by potential misattribution.

Looking ahead, appears that NATO is moving towards an active cyber defense approach.  Active defense is a relatively new strategy that is a set of measures designed to engage, seek out, and proactively combat threats[16].  Active defense does have significant legal implications as it transcends the boundaries between legal operations and “hacking back.”  Regardless, in 2018 NATO leadership agreed upon the creation and implementation of a Cyber Command Centre that would be granted the operational authority to draw upon the cyber capabilities of its members, such as the United States and Great Britain[17].  Cyber Deterrence, as opposed to strictly defense, is attractive because it has relatively low barriers to entry and would allow the Alliance to seek out and neutralize threats or even to counter Russian information warfare campaigns.  The Command Centre is scheduled to be fully operational by 2023, so NATO still has a few years to hammer out specific details concerning the thin line between cyber defense and offense. 

The future of cyber warfare is uncertain and highly unpredictable.  Some experts argue that real cyber war will never happen, like German professor Thomas Rid, while others consider a true act of cyber war will be one that results in the direct loss of human life[18].  Like other nations grappling with cyber policy decision-making, NATO leadership will need to form a consensus on the applicability of Article 5, what precisely constitutes a serious cyber attack, and if the Alliance is willing to engage in offensive cyber operations.  Despite these future considerations, the Alliance has developed a comprehensive cyber strategy that is devoted to maintaining confidentiality, integrity, and accessibility of sensitive information. 


Endnotes:

[1] Smith, David J., Atlantic Council: Russian Cyber Strategy and the War Against Georgia, 17 January 2014, retrived from http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia; and White, Sarah P., Modern War Institute: Understanding Cyber Warfare: Lessons From the Russia-Georgia War, 20 March 2018, retrieved from https://mwi.usma.edu/understanding-cyberwarfare-lessons-russia-georgia-war/

[2] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[3] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[4] Ibid.

[5] Ibid.

[6] Ibid.

[7] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[8] Ibid; and NATO Cooperative Cyber Defence Center for Excellence, History, last updated 3 November 2015, https://ccdcoe.org/history.html

[9] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[10] Symantec, The Cyber Security Whodunnit: Challenges in Attribution of Targeted Attacks, 3 October 2018, retrieved from https://www.symantec.com/blogs/expert-perspectives/cyber-security-whodunnit-challenges-attribution-targeted-attacks

[11] Soesanto, S., Defense One: In Cyberspace, Governments Don’t Know How to Count, 27 September 2018, retrieved from: https://www.defenseone.com/ideas/2018/09/cyberspace-governments-dont-know-how-count/151629/; and North Atlantic Treaty Organization, Cyber defence, last modified 18 February 2018, retrieved from https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2018_02/20180213_1802-factsheet-cyber-defence-en.pdf

[12] North Atlantic Treaty Organization, Cyber defence, last modified 18 February 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[13] U.S. Department of Defense, “NATO moves to combant Russian hybrid warfare,” 29 September 2018, retrieved from https://dod.defense.gov/News/Article/Article/1649146/nato-moves-to-combat-russian-hybrid-warfare/

[14] North Atlantic Treaty Organization, Collective defence – article 5, 12 June 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_110496.htm

[15] Ibid.

[16] Davis, D., Symantec: Navigating The Risky Terrain of Active Cyber Defense, 29 May 2018, retrieved from https://www.symantec.com/blogs/expert-perspectives/navigating-risky-terrain-active-cyber-defense

[17] Emmott, R., Reuters: NATO Cyber Command to be fully operational in 2023, 16 October 2018, retrieved from https://www.reuters.com/article/us-nato-cyber/nato-cyber-command-to-be-fully-operational-in-2023-idUSKCN1MQ1Z9

[18] North Atlantic Treaty Organization, “Cyber War Will Not Take Place”: Dr Thomas Rid presents his book at NATO Headquarters,” 7 May 2013, retrieved from https://www.nato.int/cps/en/natolive/news_100906.htm

 

Ali Crawford Assessment Papers Below Established Threshold Activities (BETA) Cyberspace North Atlantic Treaty Organization Policy and Strategy

Options for Countering the Rise of Chinese Private Military Contractors

Anthony Patrick is a graduate of Georgia State University and an Officer in the United States Marine Corps.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Future threats to United States (U.S.) interests abroad from Chinese Private Military Contractors.

Date Originally Written:  November, 26, 2018.

Date Originally Published:  December 24, 2018.

Author and / or Article Point of View:  The author is a United States Marine Corps Officer and currently attending The Basic School. 

Background:  Over the last six months, the media has been flooded with stories and articles about the possibility of a trade war between the U.S and the People Republic of China (PRC). These talks have mainly focused around specific trade policies such as intellectual property rights and the trade balance between the two nations. These tensions have risen from the PRC’s growing economic influence around the world. While many problems persist between the U.S and the PRC due to the latter’s rise, one issue that is not frequently discussed is the growing use of Private Military Contractors (PMCs) by the PRC. As Chinese companies have moved operations further abroad, they require protection for those investments. While the current number of Chinese PMCs is not large, it has been growing at a worrying rate, which could challenge U.S interests abroad[1]. 

Significance:  Many countries have utilized PMCs in foreign operations. The most significant international incidents involving PMCs mainly come from those based in the U.S and the Russian Federation. However, many other countries with interests abroad have increasingly started to utilize PMCs. One of the most significant examples has been the growing use of Chinese PMC’s. These PMCs pose a very unique set of threats to U.S national security interest abroad[2]. First, like most PMC’s, Chinese contractors come mainly from the Peoples Liberation Army and policing forces. This means that the PMCs have a significant amount of military training. Secondly, the legal relationship between the PMC’s and the PRC is different than in most other countries. Since the PRC is an authoritarian country, the government can leverage multiple forms of coercion to force PMC’s into a certain course of action, giving the government a somewhat deniable capability to control foreign soil. Lastly, the Chinese can use PMC’s as a means to push their desired political endstate on foreign countries. With the U.S still being ahead of the PRC militarily, and with both states having nuclear capabilities, conventional conflict is highly unlikely. One way for the Chinese to employ forces to counter U.S. interests abroad is through the use of PMC’s, similar to what Russia has done in Syria[3]. With this in mind, the U.S will need a proactive response that will address this problem both in the short and long term.  

Option #1:  Increase the Department of Defense’s (DoD) focus on training to counter irregular/asymmetric warfare to address the threat posed by PRC PMCs. 

Risk:  The new National Defense Strategy (NDS) focuses on many aspects of the future conventional battlefield like increasing the size of the U.S Navy, cyber operations, and cutting edge weapons platforms[4]. By focusing more of the DoD’s resources on training to counter irregular / asymmetric warfare, the military will not be able to accomplish the goals in the NDS. This option could also lead to a new generation of military members who are more adept at skills necessary for smaller operations, and put the U.S at a leadership disadvantage if a war were to break out between the U.S and a near peer competitor. 

Gain:  Another major conventional war is highly unlikely. Most U.S. near peer competitors are weaker militarily or have second strike nuclear capabilities. Future conflicts will most likely require the U.S. to counter irregular / asymmetric warfare methodologies, which PRC PMCs may utilize.  By focusing DoD resources in this area, the U.S would gain the ability to counter these types of warfare, no matter who employs them. In addition to being better able to conduct operations similar to Afghanistan, the U.S. would also have the tools to address threats posed by PRC PMCs.  Emphasizing this type of warfare would also give U.S actions more international legitimacy as it would be employing recognized state assets and not trying to counter a PRC PMC with a U.S. PMC. 

Option #2:  The U.S. pursues an international treaty governing the use of PMC’s worldwide.  

Risk:   Diplomatic efforts take time, and are subject to many forms of bureaucratic blockage depending on what level the negations are occurring. Option #2 would also be challenging to have an all-inclusive treaty that would cover every nation a PMC comes from or every country from which an employee of these firms might hail. Also, by signing a binding treaty, the U.S would limit its options in foreign conflict zones or in areas where Chinese PMC’s are operating or where the U.S. wants to use a PMC instead of the military.

Gain:  A binding international treaty would help solve most of the problems caused by PMC’s globally and set the stage for how PRC PMC’s act as they proliferate globally[5]. By making the first move in treaty negotiations, the U.S can set the agenda for what topics will be covered. The U.S can build off of the framework set by the Montreux document, which sets a non-binding list of good practices for PMCs[6]. By using the offices of the United Nations Working Group on PMCs the U.S would be able to quickly pull together a coalition of like minded countries which could drive the larger negotiation process. Lastly, Option #2 would help solve existing problems with PMC’s operating on behalf of other countries, like the Russian Federation. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Swaine, M. D., & Arduino, A. (2018, May 08). The Rise of China’s Private Security (Rep.). Retrieved November 26, 2018, from Carnegie Endowment For International Peace website: https://carnegieendowment.org/2018/05/08/rise-of-china-s-private-security-companies-event-6886

[2] Erickson, A., & Collins, G. (2012, February 21). Enter China’s Security Firms. Retrieved November 26, 2018, from https://thediplomat.com/2012/02/enter-chinas-security-firms/3/

[3] United States., Department of Defense, (n.d.). Summary of the 2018 National Defense strategy of the United States of America: Sharpening the American Military’s Competitive Edge (pp. 1-14).

[4] Gibbons-neff, T. (2018, May 24). How a 4-Hour Battle Between Russian Mercenaries and U.S. Commandos Unfolded in Syria. Retrieved November 25, 2018, from https://www.nytimes.com/2018/05/24/world/middleeast/american-commandos-russian-mercenaries-syria.html

[5] Guardians of the Belt and Road. (2018, August 16). Retrieved November 26, 2018, from https://www.merics.org/en/china-monitor/guardians-of-belt-and-road

[6] Switzerland, Federal Department of Foreign Affairs, Directorate of International Law. (2008, September 17). The Montreux Document. Retrieved November 26, 2018, from https://www.icrc.org/en/doc/assets/files/other/icrc_002_0996.pdf

Anthony Patrick Below Established Threshold Activities (BETA) China (People's Republic of China) Irregular Forces / Irregular Warfare Non-Government Entities Option Papers

U.S. Options for Responding to Sharp Power Threats

Anthony Patrick is a student at Georgia State University where he majors in political science and conducts research on Sharp Power.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Threats to U.S. and allied nations by sharp power actions (defined below).

Date Originally Written:  June 16, 2018.

Date Originally Published:  July 30, 2018.

Author and / or Article Point of View:  The author is an undergraduate student of defense policies and an Officer Candidate in the United States Marine Corps.  This article is written with the base assumption that foreign actions against the U.S political system is a top national security challenge and a continuing threat.

Background:  Recent U.S. news cycles have been dominated by the Mueller investigation into Russian interference in the U.S political system.  Other allied nations such as the United Kingdom, France, Australia, and New Zealand have also recently dealt with foreign political influence campaigns[1].  While historically nations have projected power either through military might (hard power) or cultural influence (soft power), rising authoritarian actors like the People’s Republic of China (PRC), Russia, Iran, and North Korea are resulting to a hybrid mix of classical power projection through emerging technologies with revisionist intent in the international system known as sharp power[2].  Sharp power is more direct than soft power, not as physically destructive as hard power, and does not cause enough damage to justify a military response like Article 5 of the North Atlantic Treaty Organization. 

Sharp power actions are normally covert in nature allowing the perpetrator plausible deniability.  Given the combined military and economic power of western democracies, sharp power is the preferred method for disruptive actions against the international order by authoritarian powers.  The effectiveness of sharp power is amplified by the open nature of democratic societies, especially in the information age[3].  Other examples of sharp power attacks include the North Korean hacking of Sony Pictures, the Iranian hacking of a dam in New York, PRC surveillance of Chinese students in foreign classrooms[4], and Russian actions in Ukraine and Moldova[5]. 

Significance:  The effects of sharp power actions can be very dangerous for western democracies.  One effect is a decrease in democratic legitimacy in an elected government.  When the citizens question if it was themselves or foreign actors who helped elect a government, that government is hamstrung due to a lack of legitimacy.  This lack of legitimacy can create new divisions or heighten polarization in the targeted countries.  Foreign actors can use the internet as a guise, pretend to be domestic actors, and push extreme ideas in communities, creating the potential for conflict.  This series of effects has already happened in U.S communities, where Russian actors have organized a protest and the counter protest[6].  These new divisions can also heighten political infighting, diverting political resources from international problems to deal with issues in the domestic sphere.  This heightened political infighting can give these revisionist actors the breathing room they need to expand their influence.  The increasing prevalence of these effects is a direct threat to U.S national security, chipping away at the government’s freedom of action and diverting resources to the domestic sphere away from international problems. 

Option #1:  Adopt military operational planning methodologies like Effects Based Operations (EBO) and Systematic Operational Design (SOD) at the interagency level to organize a response to adversary sharp power actions.

Risk:  The U.S also has the largest pool of soft power in the world and reverting to sharp power actions would hurt that important U.S resource[7].  Also, since these adversary countries are not as open, targeting would be a difficult task, and actions against the wrong group could be used as a rallying cry in the adversary country.  This rallying cry would give these adversaries a greater mandate to continue their actions against western democracies.  Lastly, successful sharp power actions against authoritarian countries could lead to more destructive domestic instability, harming allies in the region and disrupting global trading networks[8].

Gain:  By utilizing sharp power methodologies, the U.S would be able to strike back at opposing countries and deter further actions against the U.S.  The U.S has a large pool of resources to pull from in the interagency, and only needs a methodology to guide those resources.  Military style operational planning like EBO and SOD contain important theoretical constructs like System of System Analysis, Center of Gravity, and the constant reviewing of new information[9][10].  This planning style fits well for sharp power actions since it allows the government to create an operational plan for directed international political actions.  The U.S government can pull from the wealth of knowledge within the Department of Defense on how to combine these various frameworks to achieve sharp power action given their experience with designing complex operations on the joint level[11].  Successful actions would also give the U.S more leverage in negotiations with these countries on other areas and would divert their political resources from international actions 

Option #2:  Congress passes a Goldwater-Nichols-like Act to create a horizontal organization within the interagency, to address sharp power threats[12].

Risk:  Such reform would be substantial and would take a long time to implement.  The length of this process could delay any government response to both continued foreign interference and other international problems.  The congressional process is historically slow and designing the bill would also take a substantial amount of time.  Different agencies have set rules, procedures, and operating cultures, and changing those enough to allow effective interagency cooperation would also be difficult.  Option #2 would not change the defensive posture of the U.S government, thus it would not create the desired deterrent effect. 

Gain:  Streamlining the interagency process would increase the government’s ability to counter sharp power threats.  Option #2 would lead to better allocation of resources, more intelligence sharing, better allocation of authority during interagency deliberations, and provide more clarity on rules, regulations, and processes that govern interagency cooperation.  By adopting this reform, the national security council would be able to give task to a joint structure instead of a single lead agency.  This joint structure could operate like the joint command within the Department of Defense and create broad policy for interagency work[13].  By keeping a defensive posture, the U.S would also be able to protect its soft power appeal[14]. 

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Kurlantzick, J. (2017, December 13). Australia, New Zealand Face China’s Influence. Retrieved from https://www.cfr.org/expert-brief/australia-new-zealand-face-chinas-influence

[2] National Endowment for Democracy. (2017, December 5). Sharp Power: Rising Authoritarian Influence. Retrieved from https://www.ned.org/sharp-power-rising-authoritarian-influence-forum-report/

[3]  Wanless, A., & Berk, M. (2018, March 7). The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency. Retrieved from https://thestrategybridge.org/the-bridge/2018/3/7/the-strategic-communication-ricochet-planning-ahead-for-greater-resiliency

[4]  Sulmeyer, M. (2018, March 22). How the U.S. Can Play Cyber-Offense. Retrieved from https://www.foreignaffairs.com/articles/world/2018-03-22/how-us-can-play-cyber-offense

[5]  Way, L. A. (2018, May 17). Why Didn’t Putin Interfere in Armenia’s Velvet Revolution? Retrieved from https://www.foreignaffairs.com/articles/armenia/2018-05-17/why-didnt-putin-interfere-armenias-velvet-revolution

[6]  Lucas, R. (2017, November 01). How Russia Used Facebook To Organize 2 Sets of Protesters. Retrieved from https://www.npr.org/2017/11/01/561427876/how-russia-used-facebook-to-organize-two-sets-of-protesters

[7]  Nye, J. S., Jr. (2018, January 24). How Sharp Power Threatens Soft Power. Retrieved from https://www.foreignaffairs.com/articles/china/2018-01-24/how-sharp-power-threatens-soft-power

[8]  Breen, J. G. (2017). Covert Actions and Unintended Consequences. InterAgency Journal,8(3), 106-122. Retrieved from http://thesimonscenter.org/featured-article-covert-action-and-unintended-consequences/

[9]  Strange, J., Dr., & Iron, UK Army, R., Colonel. (n.d.). Understanding Centers of Gravity and Critical Vulnerabilities(United States, Department of Defense, United States Marine Corps War College).

[10]  Vego, M. N. (2006). Effects-based operations: A critique. National Defense University, Washington D.C. Institute for National Strategic Studies.

[11]  Beutel, C. (2016, August 16). A New Plan: Using Complexity In the Modern World. Retrieved    from https://thestrategybridge.org/the-bridge/2016/8/16/a-new-plan-using-complexity-in-the-modern-world

[12]  Dahl, U.S. Army, K. R., Colonel. (2007, July 1). New Security for New Threats: The Case for Reforming the Interagency Process. Retrieved from https://www.brookings.edu/research/new-security-for-new-threats-the-case-for-reforming-the-interagency-process/

[13]  United States, Department of Defense, Joint Chiefs of Staff. (2018). Joint Concept for Integrated Campaigning.

[14]  Nye, J. S., Jr. (summer 2004). Soft Power and American Foreign Policy. Political Science Quarterly,119(2), 255-270. Retrieved from http://www.jstor.org/stable/20202345

Anthony Patrick Below Established Threshold Activities (BETA) Deterrence Major Regional Contingency Option Papers United States

U.S. Diplomacy Options for Security & Adaptability in Cyberspace

Matthew Reitman is a science and technology journalist.  He has a background in security policy and studied International Relations at Boston University.  He can be found on Twitter @MatthewReitman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. competitors conducting national security activities in cyberspace below the threshold of war aka in the “Gray Zone.”

Date Originally Written:  April 14, 2017.

Date Originally Published:  May 18, 2017.

Author and / or Article Point of View:  This article is written from the point of view of the U.S. State Department towards cyberspace.

Background:  State actors and their non-state proxies operate aggressively in cyberspace, but within a gray zone that violates international norms without justifying a “kinetic” response.  Russian influence operations in the 2016 U.S. election were not an act of war, but escalated tensions dramatically[1].  North Korea used the Lazarus Group to circumvent sanctions by stealing $81 million from Bangladesh’s central bank[2].  Since a U.S.-People’s Republic of China (PRC) agreement in 2015 to curb corporate espionage, there have been 13 intrusions by groups based in the PRC against the U.S. private sector[3].  The State Department has helped to curb Islamic State of Iraq and Syria propaganda online via the Global Engagement Center[4].  The recent creation of another interagency entity, the Russia Information Group, suggests similar efforts could be effective elsewhere[5].

The State Department continues to work towards establishing behavior norms in cyberspace via multilateral channels, like the United Nations Group of Governmental Experts, and bilateral channels, but this remains a slow and tedious process.  Until those norms are codified, gray zone activities in cyberspace will continue.  The risk of attacks on Information Technology (IT) or critical infrastructure and less destructive acts will only grow as the rest of the world comes online, increasing the attack surface.

Significance:  The ever-growing digitally connected ecosystem presents a chimera-like set of risks and rewards for U.S. policymakers.  Protecting the free exchange of information online, let alone keeping the U.S. and its allies safe, is difficult when facing gray zone threats.  Responding with conventional tools like economic sanctions can be evaded more easily online, while “hacking back” can escalate tensions in cyberspace and further runs the risk of creating a conflict that spills offline.  Despite the challenge, diplomacy can reduce threats and deescalate tensions for the U.S. and its allies by balancing security and adaptability.  This article provides policy options for responding to and defending against a range of gray zone threats in cyberspace.

Option #1:  Establish effective compellence methods tailored to each adversary.  Option #1 seeks to combine and tailor traditional coercive diplomacy methods like indictments, sanctions, and “naming and shaming,” in tandem with aggressive counter-messaging to combat information warfare, which can be anything from debunking fake news to producing misinformation that undermines the adversary’s narrative.  A bifocal approach has shown to be more effective form of coercion[6] than one or the other.

Risk:  Depending on the severity, the combined and tailored compellence methods could turn public opinion against the U.S.  Extreme sanctions that punish civilian populations could be viewed unfavorably.  If sanctions are evaded online, escalation could increase as more aggressive responses are considered.  “Naming and shaming” could backfire if an attack is falsely attributed.  Fake bread crumbs can be left behind in code to obfuscate the true offender and make it look as though another nation is responsible.  Depending on the severity of counter-propaganda, its content could damage U.S. credibility, especially if conducted covertly.  Additionally, U.S. actions under Option #1 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Combined and tailored compellence methods can isolate an adversary financially and politically while eroding domestic support.  “Naming and shaming” sends a clear message to the adversary and the world that their actions will not be tolerated, justifying any retaliation.  Sanctions can weaken an economy and cut off outside funding for political support.  Leaking unfavorable information and counter-propaganda undermines an adversary’s credibility and also erodes domestic support.  Option #1’s severity can range depending on the scenario, from amplifying the spread of accurate news and leaked documents with social botnets to deliberately spreading misinformation.  By escalating these options, the risks increase.

Option #2:  Support U.S. Allies’ cybersecurity due diligence and capacity building.  Option #2 pursues confidence-building measures in cyberspace as a means of deterrence offline, so nations with U.S. collective defense agreements have priority.  This involves fortifying allies’ IT networks and industrial control systems for critical infrastructure by taking measures to reduce vulnerabilities and improve cybersecurity incident response teams (CSIRTs).  This option is paired with foreign aid for programs that teach media literacy, “cyber hygiene,” and computer science to civilians.

Risk:  Improving allies’ defensive posture can be viewed by some nations as threatening and could escalate tensions.  Helping allies fortify their defensive capabilities could lead to some sense of assumed responsibility if those measures failed, potentially fracturing the relationship or causing the U.S. to come to their defense.  Artificial Intelligence (AI)-enhanced defense systems aren’t a silver bullet and can contribute to a false sense of security.  Any effort to defend against information warfare runs the potential of going too far by infringing freedom of speech.  Aside from diminishing public trust in the U.S., Option #2 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Collectively, this strategy can strengthen U.S. Allies by contributing to their independence while bolstering their defense against a range of attacks.  Option #2 can reduce risks to U.S. networks by decreasing threats to foreign networks.  Penetration testing and threat sharing can highlight vulnerabilities in IT networks and critical infrastructure, while educating CSIRTs.  Advances in AI-enhanced cybersecurity systems can decrease response time and reduce network intrusions.  Funding computer science education trains the next generation of CSIRTs.  Cyber hygiene, or best cybersecurity practices, can make civilians less susceptible to cyber intrusions, while media literacy can counter the effects of information warfare.

Other Comments:  The U.S. Cyber Command and intelligence agencies, such as the National Security Agency and Central Intelligence Agency, are largely responsible for U.S. government operations in cyberspace.  The U.S. State Department’s range of options may be limited, but partnering with the military and intelligence communities, as well as the private sector is crucial.

Recommendation:  None.


Endnotes:

[1]  Nakashima, E. (2017, February 7) Russia’s apparent meddling in U.S. election is not an act of war, cyber expert says. Washington Post. Retrieved from: https://www.washingtonpost.com/news/checkpoint/wp/2017/02/07/russias-apparent-meddling-in-u-s-election-is-not-an-act-of-war-cyber-expert-says

[2]  Finkle, J. (2017, March 15) “North Korean hacking group behind recent attacks on banks: Symantec.” Reuters. Retrieved from: http://www.reuters.com/article/us-cyber-northkorea-symantec

[3]  FireEye. (2016, June 20). Red Line Drawn: China Recalculates Its Use Of Cyber Espionage. Retrieved from: https://www.fireeye.com/blog/threat-research/2016/06/red-line-drawn-china-espionage.html

[4]  Warrick, J. (2017, February 3). “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits.” Washington Post. Retrieved from: https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html

[5]  Mak, T. (2017, February 6). “U.S. Preps for Infowar on Russia”. The Daily Beast. Retrieved from: http://www.thedailybeast.com/articles/2017/02/06/u-s-preps-for-infowar-on-russia.html

[6]  Valeriano, B., & Jensen, B. (2017, March 16). “From Arms and Influence to Data and Manipulation: What Can Thomas Schelling Tell Us About Cyber Coercion?”. Lawfare. Retrieved from: https://www.lawfareblog.com/arms-and-influence-data-and-manipulation-what-can-thomas-schelling-tell-us-about-cyber-coercion

Below Established Threshold Activities (BETA) Cyberspace Diplomacy Matthew Reitman Option Papers United States