PLA Senior Colonels On Globalism And New Tactics: "Unrestricted
Warfare": Part III
A January 2000 report from U.S. Embassy Beijing
Summary: Two PLA senior colonels argue that
The high tech aspects of the new warfare get the most attention yet what
will win future wars will be superior tactics and especially the imaginative
combination of tactics and technologies. The emphasis on producing these
innovations by imaginative recombination of tactics, technologies and realms
of action in the new era of Globalism may well be the principal innovation
of the authors of "Unrestricted Warfare". Close examination of footnotes
shows that some of the authors' views are inspired by work done in the
United States. Therefore, as U.S. readers examine Chinese work in this
area, they should avoid getting trapped in an information warfare Hall
of Mirrors. The authors argue that globalism and the expansion of national
security definitions have made subnational actors such as terrorists the
concern of national military forces. The appendix shows how Chinese information
security concerns are also driving decisions on the development of PRC
commercial encryption rules and the development of the Red Flag Linux operating
system. End summary.
Summary Translations: "Unrestricted Warfare" by PLA
Senior Colonels
This is the third part of a four part series of
summary translations of the February 1999 book "Unrestricted Warfare" by
two PLA senior colonels. All four parts are now available on the U.S. Embassy
web page at http://www.usembassy-china.org.cn/english/sandt/index.html
Warfare For the Age of Globalism: Unrestricted Warfare
Qiao Liang and Wang Xiangsui, the two PLA Air
Force Senior Colonels who wrote "Unrestricted Warfare", examine in considerable
depth the strategies, tactics and technologies needed to meet the security
threats of the future. They see these threats coming largely not from foreign
countries but from subnational actors such as terrorists, hackers and rogue
financiers. The two senior colonels take great care to place their discussion
of military strategy into their geopolitical vision of a developing multipolar
world. Some characterize the Chinese gloss on globalism as statements (on
bad days) opposing U.S. hegemonism and (on good days) on working towards
a more stable, multipolar world in which big powers are effectively constrained
by the international community.
There is a close parallel in the economic arena.
Intellectual Property Bureau Vice Director Ma Linyuan said recently that
a great benefit China will obtain from WTO entry is a change in the rules
of trade relations. Rules would become multilateral WTO rules and no longer
be subject to the capriciousness of bilateral relations. Vice Director
Ma's comments were broadcast throughout China on CCTV 4 and worldwide by
satellite on a mid January episode of the "China Report" [Zhongguo Baodao]
television program.
Senior Colonel Qiao Liang made this point in
a Summer 1999 Washington Post interview that was recounted in a January
4, 2000 Beijing Youth Daily article. Senior Colonel Qiao Liang, responding
to a question whether China could accept a world in which the U.S. was
the dominant military power, said to the Washington Post interviewer, "You
Americans established a government with three separate branches to prevent
tyranny but what are you giving to the world? Why can't you give democracy
and freedom to the world? Now, I am not saying that everything the U.S.
does is wrong, but if you do something wrong, who is capable of correcting
you?" After the Spring NATO bombing of the Chinese Embassy in Belgrade,
some Chinese press reports expressed concern that a theory of human rights
trumping national sovereignty might one day be used to justify a foreign
intervention in Chinese affairs.
More Co-operation in An "Unrestricted Warfare" World?
The authors discuss "Unrestricted Warfare" in
the context of increasing globalism. They see the main security threat
to states coming not from other states but from subnational actors. One
might conclude from this that the age of unrestricted warfare would lead
to increased international and military-to-military cooperation rather
than confrontation. U.S. government efforts to improve U.S. information
security are well reported and closely followed in China. U.S. Embassy
Beijing officers hear from Chinese government counterparts that more U.S.
- China cooperation in addressing civilian information security is welcome.
[reftels D and E] Such contacts can be beneficial for both the United States
and China as both come to better understand the information security intentions
and concerns of the other.
The Colonels Question Assumptions, Demand Clear Thinking
The two PLA Air Force senior colonels "Unrestricted
Warfare" gives the big picture in considerable depth. Like good philosophers,
the two senior colonels aim to turn implicit assumptions into explicit
statements. The unexamined war is not worth fighting. We see this stress
on making explicit what was implicit in their questioning of the boundaries
of conventional warfare. We can see it in their demand that military thinkers
not combine elements unconsciously but do so explicitly. Examination of
the footnotes indicates that military and geopolitical thinking of U.S.
military and geopolitical thinkers such as Steven Metz and Zbigniew Brzenski
often inspires the authors.
How Much of the Book is Derivative, How Much Original?
Evaluating the proportion of "Unrestricted Warfare"
that is derivative of foreign work and the portion that is original is
difficult. Even where the work is derivative, the authors by their treatment
of the issues in considerable depth, have clearly made these ideas their
own. One clue to how the authors built upon the work of their predecessors
is to be found in the footnotes (summarized below) to the book which refer
extensively to work by U.S. military theorists and U.S. Department of Defense
documents.
Another way to judge the originality of the
book is to compare it to earlier works. A search of the worldwide web from
Beijing turned up many articles on "Unrestricted Warfare" themes such as
the revolution in military affairs and information warfare by military
and academic theorists of the United States and other countries. Some of
these writings are on U.S. military and academic websites. One article
the two senior colonels read especially closely was "Strategy and the Revolution
in Military Affairs -- From Theory to Policy" (June 1995) by Steven Metz
and James Kievit of the U.S. Army War College Strategic Studies Institute.
This article can be found in full text on the website of the DoD Defense
Technical Information Center at http://www.dtic.mil/doctrine/jel/research_pubs/rmastrat.pdf
Chinese
readers unaware of the extensive Western literature may overestimate the
originality of "Unrestricted Warfare". U.S. high tech warfare abilities
demonstrated in the Gulf War highly impressed the Chinese military. Since
then, various Chinese books (for example Information War [Xinxi Zhanzheng
(11/98) and The Digital Army [Shuzihua Budui] from the PLA Publishing House
and other books mentioned in the first summary (reftel A) and a recent
FBIS report (reftel F) and periodicals have focused on high tech warfare.
"Unrestricted Warfare" may be the first Chinese book, however, to provide
such a broad perspective on the implications of the revolution in military
affairs. Western readers may not appreciate the considerable philosophic
depth and originality, in particular in its critique of the excesses of
U.S. high tech enthusiasm, its discussion of the combination of elements
and its insistence that the even more than new technologies what is needed
is a new, broader way of thinking.
Will the New Warfare Increase Fears, Spur An Arms Race?
Chinese concerns about the new warfare rose sharply
through the 1990s with first the Gulf War and then the war in Kosovo. Their
reservations about humanitarian interventions in Kosovo, especially after
the NATO bombing of the Chinese Embassy in Belgrade, may be driven by a
fear of what they see as increasing U.S. unilateralism. Initiatives taken
by the U.S. in the light of the "revolution in military affairs" to improve
its defense capabilities and to reform its armed forces may not always
be seen as benign by the Chinese. U.S. press reports about U.S. government
efforts to reduce its vulnerability to information warfare and to improve
the capabilities of its forces are regularly picked up in the Chinese media.
Metz and Kievit on the Information Warfare Hall of Mirrors
This reaction was in fact predicted by Metz and
Kievit in their 1995 article "Strategy and the Revolution in Military Affairs
-- From Theory to Policy". They wrote, "In considering the response of
other states, policymakers and defense planners consistently overlook or
ignore the fact that U.S. power can be intimidating....Why, foreign leaders
ask, would the world's only superpower seek radical improvement of its
armed forces in the absence of a clear threat? ....But if the United States
unilaterally pursues the revolution in military affairs, other states will
respond whether symmetrically or asymmetrically. In turn, knowing the benign
intentions of the United States, American leaders and planners will consider
this threatening. Why, they will ask, would other states seek to improve
their military capability unless contemplating aggression? The result may
be a spiral of mutual misperception and a new arms race, albeit a qualitative
rather than a quantitative one."
Chinese Officials Acutely Aware of InfoSec Vulnerabilities
Chinese government orders and official statements
over the last year show that Chinese officials are very concerned about
Chinese vulnerabilities in an "Unrestricted Warfare" world. Many articles
during 1999 warned that imported (largely U.S. sourced) hardware and software
may include backdoors that could enable foreigners to threaten Chinese
national security.
Backdoors: U.S. Privacy Concerns = PRC Security Concerns
As hardware and software complexity increases,
there is a growing risk that intruders may find novel ways of combining
the functionalities of what are to the users opaque proprietary black boxes.
Intruders can thus threaten the personal privacy of a user or even, in
a setting, a nation's security. Increasing complexity boosts hardware and
software development costs yet their duplication costs given commercial
economies of scale continue to plummet. Thus national militaries have an
ever more difficult time in achieving the functionality they need at a
reasonable cost without using civilian products. Press interviews with
leading Chinese engineers regularly make the point that China needs to
develop its own proprietary intellectual property -- including an operating
system and microprocessors. Red Flag Linux has been mentioned in the Chinese
press as a potential operating system solution for China. There are however
several other Chinese-language versions of the free Linux operating system
on the market such as Red Hat Linux and Turbo Linux. For more on Chinese
concerns of foreign domination of its software market, see the summary
of the January 7, 2000 Yangcheng Wanbao article in Appendix Two.
Pentium, Windows, Large Foreign IT Market Share
Fears
In Summer 1999, the PRC Ministry of Information
Industry (MII) ordered that Chinese government offices should not use the
Pentium II chip. Controversies in the United States about the ID feature
of the Pentium II and of supposed back doors in the Microsoft Windows operating
system have been well-reported in China and have aroused concerns. Ninety-five
percent of the desktop operating systems used in China are Microsoft products.
Although former Microsoft Chairman Bill Gates has been almost a folk hero
in China -- he may be the best known private American in China after Michael
Jordan -- this is changing. A combination of increased threat perception
and reporting on the anti-monopoly action brought by the U.S. Justice Department
seems to have increased the view that the large market shares of Microsoft
and Intel threaten Chinese national security. Just as perhaps U.S. government
and military would be unwilling to rely on Chinese-made hardware and software,
so too does the Chinese government and military have concerns about over
reliance on U.S. products in some sensitive areas.
PRC Info Vulnerability: The Commercial Dimension
Another aspect of China's growing vulnerability
is its over ten million Internet users. Educating this very large number
of new computer users to take information security seriously will require
years. Chinese Public Security warned of the CIH computer virus six months
before it disabled tens of thousands of PRC computers. But nobody listened.
The project to put the Chinese government online project [Zhengfu Shangwang
Gongcheng] has increased the number of Chinese government departments and
agencies in the gov.cn domain from 45 in early 1999 to over 2400 in January
2000. Electronic commerce, although hindered by credit clearance and distribution
problems, is growing. The commercial encryption rules announced in October
reflect information and national security concerns in the commercial area.
See the translation of the October 17 People's Daily by He Dequan, Academician
of the Chinese Academy of Engineering in Appendix One.
PRC Info Vulnerability: The Political Dimension
The Chinese government tries to block with limited
success the use of the Internet by dissidents, would-be political parties
and the Falun Gong in a kind of information skirmish (ref G). Chinese hackers
in China have websites upon which various hacker tools and methods for
cracking anti-piracy features (such as passwords) of proprietary software
are discussed and exchanged. While hackers were praised in the Chinese
press as "Red Hackers" for attacks on NATO computers in the Spring, stories
of police pursuit of hackers appear regularly in the Chinese press. According
to one U.S. press report, some attacks on Falun Gong sites in the United
States were traced back to the PRC Ministry of State Security. Chinese
Public Security in 1996 established a computer crimes section. The Chinese
Internet offers much to China as a wide inexpensive channel for scientific
and technical information. Despite irritations from what some officials
see as an overly rich diet of foreign political and cultural information
entering China, Chinese official see the Internet as essential to building
the Chinese "information economy" of the future.
Summary Translation -- Unrestricted Warfare Part
Three
Subheads are added for the reader's convenience
On New Tactics
Just as water has no fixed shape there is no
one best military tactic. Varying tactics according to your enemy to bring
victory is best. – Sun Zi
Command in battle is like a physician caring
for a patient. It is an art. – Fuller
U.S. Thinking Focuses on High Tech, Slights Tactics
The revolution in military affairs theory is so
popular among military theorists today that it is really something like
a fad -- like the popularity of Michael Jordan among basketball fans. It
seems to be just another instance of Americans doing what they are so good
at: packaging a fad and selling it to the entire world. Although many countries
are concerned about and resist the American cultural invasion, they seem
to have accepted American thinking on military questions hook, line and
sinker. Former U.S. Defense Secretary William Perry, when asked what are
the most important results and theories of the U.S. revolution in military
affairs, answered, "Of course it is stealth technology and information
technology." For Perry and for most military thinking, if technology can
tell a soldier "what lies beyond the next hill", the military revolution
is complete. [pp. 121 – 122]
This view encapsulates the strengths and weaknesses
of the Americans. They believe that the technology revolution and the military
revolution are the same thing and have sold this view to the world. This
misunderstanding on the part of the Americans has sown much confusion in
world military circles. Some Chinese have also become entranced by the
slogan "Use high technology to create a modern military."
National Militaries Are No Longer the Main Security
Threat
The military technology revolution is the foundation.
Yet the revolution in military affairs is more than just technology and
the reorganization of the military. Both political and military leaders
tend to become set in their thinking. They tend to see the greatest threat
to national security in the military capacity of an enemy or potential
enemy country. But the lesson of the last decade of the Twentieth Century
is that this is no longer the chief threat to national security.
The New Warfare Is Often Waged by Subnational
Actors
The old types of wars were about territorial and
nationality disputes, religious conflicts and quarrels over spheres of
influence. These old causes of war are increasingly seen blended together
with newer economic elements -- disputes over resources, markets, the control
of capital, and trade sanctions. Some observers would say that these are
not wars at all, while some others might call them quasi-wars. But the
damage they cause in the area of attack is just as bad as in a war. We
need only to reflect on the names of people like George Soros, Bin Laden,
and Escobar to see that this is true. [pp. 123 - 124]
Groups such as Muslim extremists, Colombian
drug cartels, and Italian gangsters can form a kind of military force that
uses guns, aircraft, poison gas, biological weapons, and computer networks
to achieve their objectives. States, based as they are on territory, now
have to face a challenge that does not come from another well-defined territorial
state but from many dimensions. For example the economic attack from speculators
that Thailand suffered or the military and financial attacks upon Iraq.
With the end of the Cold War and the emergence
of the United States as the only Superpower, we see that the United States
has also become the country with the most enemies and the one that gets
the most threats. For example for the past several years U.S. Department
of Defense evaluations of potential national security threats has not been
confined to just countries but also includes terrorists movements and anarchists.
These subnational actors threaten to overthrow allied countries, threaten
U.S. prosperity and economic growth, conduct the illegal trade in drugs
and commit international crimes.
Globalism Brings Much Broader National Security
Definitions
Not just the United States, but all countries
have extended the modern concept of sovereignty to politics, economics,
resources, nationalities, religion, culture, computer networks, the environment
and outer space. This changes the concept of national sovereignty to a
broader one that includes a wide range of national interests including
political security, economic security, cultural security, and information
security.
Strategy Key: Imaginative Combination of Diverse
Elements
This broader conception leads also to a focus
on grand strategies that encompass not only the military but also economics,
culture, diplomacy, technology, the environment, resources, and nationalities.
This can even be seen in Chinese philosophy: "The Dao gives birth to the
first, the first to the second, the second to the third as so to the Ten
Thousand Things [everything]. No matter whether it is two or three, it
is all a matter of combining individual elements. With combination comes
diversity, variability and flexibility. The multiplication of possible
tactics has made the role of individual weapons less and less and so has
expanded the modern concept of war. [p. 125 - 128]
Footnotes Reveal Chinese Reflections on U.S. Sources
[Note: Footnotes -- "When Military Sciences Academy
researcher Col. Chen Bojiang visited the United States he visited some
Americans in military circles. Chen asked [former U.S. Secretary of Defense]
Perry, "What is the most important result and theoretical breakthrough
for the military revolution of the U.S. forces?" Perry answered, "The most
important breakthrough is stealth technology... but inventions in communications
technology are just as important...These communications technologies will
answer the question of the 21st Century soldier -- what lies beyond the
next hill?" Progress has been very slow on that question for centuries.
Over the past decade rapid progress has been made on it." as quoted in
the November 1998 Chinese National Defense University Journal [Guofang
Daxue Xuebao]. Perry, an engineering professor at Stanford University,
looks at the revolution in military affairs from a purely technological
perspective.
[Continued: References are also made to "Strategy
and the Revolution in Military Affairs -- From Theory to Policy" (June
1995) by Steven Metz and James Kievit of the U.S. Army War College Strategic
Studies
Institute
(available at http://www.dtic.mil/doctrine/jel/research_pubs/rmastrat.pdf);
U.S. Secretary of Defense reports for the fiscal years 1996, 1997, and
1998; the "Four Year Defense Audit Report" released by DoD in May 1997;
the 1997 U.S. DoD report "National Military Strategy of the United States",
and the 1997 issue (no. 16) of Comparative Strategy. End note]
Everything Changes: Proud U.S. Victors May Be
Overly Rigid
Everything -- technologies, weapons, and security
concepts -- is changing rapidly. Non-military tactics and personnel are
taking part in war and the scope of war is expanding. No-one has ever seen
a future war. The closest thing to future wars is to be seen in the wars
between digitized U.S. armies at the Owens National Training Center. Victors
don't like to change what brought victory in the last war. Yet American
generals know that winning the next war won't be as simple as the Desert
Storm victory. From the U.S. publication "Strategic Concept for Joint Forces
in the Year 2010" and "Tomorrow's Army" we can see what the U.S. believes
war will be like then. The reliance of the U.S. on a certain conception
of the battles of the future may just be a blind spot for them.
U.S. Errors: Might Makes Right, Still Fighting
Cold War
All the rapid changes in U.S. defense policy,
the evolution in its strategic thinking, and the statements of its military
leaders that war is the ultimate method for resolving international conflicts.
And so U.S. military thinkers prepare the U.S. forces to win two simultaneous
wars. Yet how many U.S. leaders realize as General Powell did that "Cold
War type battles will never recur" and that the U.S. is putting its resources
in the wrong place?
Globalism, High Tech Replaces Military Threat
By New Ones
At the close of the century we can see the spread
of non-proliferation agreements, the increasing role of the United Nations
troops, and efforts to inhibit military arms races and interventions by
UN and regional groups in local wars. This process is reducing the military
threat to national security. However rapid technological change is increasing
the high tech threat from non-traditional areas. This tend is marginalizing
old conceptions of national security and security structures.
U.S. Military Retreating From Full Spectrum Warfare
Concept
The U.S military does not seem to realize that
the conventional military national security threat is declining even as
the non-military threat is increasing. The U.S. Department of Defense "National
Defense Report" made this same point several years running. The U.S. military
is passing off responsibilities in the non-combat military operations to
the CIA and the FBI. In this can be seen the retreat of the U.S. military
from the full spectrum military and non-combat military operations concept.
[p. 136]
Military Non-Combat Ops in Kosovo, But Not Non-Military
War
The U.S. military is fighting unemployment. Every
since the fall of the Soviet Union, the U.S. military has been looking
for a cause to enable it to escape unemployment. Therefore the U.S. military
from the generals down to the foot soldiers prepare for victory in a large-scale
war. If someday the U.S. military and the U.S. Congress see that there
is no war to be fought between two great armies they will feel lost. The
solution is that if there is no enemy one must be created. We can see this
in the Kosovo conflict that the U.S. engaged in. The U.S. military extended
its concept to non-combat military operations but it is not willing to
take the next step to the more fertile concept of non-military war that
is now coalescing.
U.S. Poorly Prepared, Organized for Non-Military
War Threat
Strangely, a big country like the United States
even as it is faced with an ever larger non-military warfare threat it
has not established an integrated strategy and command for fighting terrorism.
Forty-nine U.S. ministries and agencies have responsibility for fighting
terrorism. The situation in other countries is about the same. The U.S.
spends USD 7 billion on anti-terrorist activities –- just one-thirty-fifth
of is USD 250 billion military budget.
War Without Gunpowder is Hard For Soldiers to
Accept
Even as humanity devotes more and more effort
to maintaining peace, more and more of the technologies surrounding us
in everyday life are becoming weapons with which to maim and kill. We can
see this in computer viruses, financial opportunism in finance, religious
extremism and faith, trade protectionism and free economies, information
barriers and information freedom, technological monopolies and open technologies.
A war can break out in any of these areas. Although one can’t smell the
gunpowder they do meet the definition of warfare which is fought to compel
and opponent to satisfy one’s own interests. This is warfare that goes
far beyond the conventional definition of warfare. No soldier is prepared
for this yet all soldiers must face this reality. [pp. 135 – 138]
Where the Rules are Broken or Break Down
Rules Are Different For Big and Small Countries
Over thousands of years humanity has tried to
domesticate war, that ferocious beast. We can see that in the Geneva Convention
and in the United Nations. Rules operate differently for big countries
and small countries. Countries obey rules if it suits their interests.
Small countries hope that the rules will protect their interests while
large countries want to use the rules to control other countries. If a
small country disobeys the rules, a large country might intervene in the
role of a law enforcer. An example is the U.S. intervention in Panama when
the U.S. brought the head of state of a foreign nation to stand trial in
the United States. Or India ignoring the Test Ban Treaty or annexing Sikkim.
Or Iraq annexing Kuwait.
Non-State Actors Are Not Constrained By Borders
or Rules
We see now the rise of non-state actors like the
hackers who attacked the Indian national defense computer network after
India’s nuclear tests and the rich Muslim Bin Laden’s terrorist attacks
against the United States in the Middle East. Non-state actors don’t feel
constrained by national boundaries, international or national laws or other
rules. By hacker here it means people who use the Internet to steal information,
change documents, distribute viruses, divert funds, or destroy programs.
Yet even people who don’t intend to cause problems can cause a great deal
of damage. The classic example is Robert Morris who distributed a virus
program over the Internet in 1988. The rise of malicious hackers is a greater
threat to the United States than to any other country.
Terrorist A-Bombs Much More Dangerous Than State
A-Bombs
Terrorist organizations and religious cults have
learned how to use banks and legitimate corporations to cover their activities.
Financial speculators although they aren’t usually considered to be terrorists,
have created havoc in many parts of the world. In its international, hidden,
and rule-breaking character and in the great destruction they cause, the
vast daily international capital flows mobilized by speculators have all
the classic signs of terrorist activities. Terrorists don’t follow rules.
A terrorist with nuclear weapons is much more dangerous than any state
with nuclear weapons. For Islamic terrorists like Bin Laden, for George
Soros who hides behind the free market, and for hackers hiding in computer
networks there are no borders and no rules.
Sometimes You Have to Break the Rules: Fighting
Terrorism
This new terrorism is an unprecedented challenge
to the present world order but it also makes us question the reasonableness
of that world order. We need to stop the rule breakers but we also need
to change some of the rules. To fight the people who break the rules, states
also need to break the rules. We can see some signs of this in the U.S.
using cruise missiles to attack terrorists and in the Hong Kong governments
use of foreign currency reserves and administrative regulations [note:
to fight speculators]. Yet these countermeasures by states have been unimaginative
and weak. But in the end, the best teacher of the government of the world
are those old-style terrorists who for the sake of their cause have no
compunctions about using any tactic at all. [pp. 139 – 146]
The Marshal's Cocktail
Past Military Geniuses Combined Elements to Win
King Wu of the Zhou Dynasty and Alexander the
Great has this in common: they could effectively combine several disparate
elements on the battlefield to win victory. Although the combination of
various kinds of forces and technologies came to the fore in the Cold War,
it has been important throughout the history of warfare. Although combination
was not an explicit concept, we can see it from the chariots and armored
soldiers of Zhou to Alexander's creative combination of cavalry and infantry
formations through the tactics of Gustavus Adolphus (who combined soldiers
with the lance with riflemen to provide cover to the latter) and Napoleon
down to Desert Storm. In Desert Storm the sea, air, ground, space, and
electronic forces and resources of thirty countries were combined. The
lesson of three thousand year of warfare is that the best organized side
wins.
High Tech Provides Many New Elements to Mix in
War Cocktail
Now the scope of war is expanding to include many
elements that were not part of warfare before. The addition of each element
that was never a part of warfare before can transform the battlefield,
change the way wars are fought or even bring about a revolution in military
affairs. Just consider new elements that entered warfare in the past: smokeless
gunpowder, the field telephone, radio, submarines, tanks, airplanes, guided
missiles, atomic bombs, computers, non-lethal weaponry. Or tactical elements
such as the organization of forces, blitzkrieg, and carpet bombing.
Over the past twenty years the introduction
of new, heretofore non-military elements such as information technology,
computer viruses, the Internet, and financial manipulation tools make it
difficult to foresee what the wars of the future will be like.
Combination of Tactics, Technologies Too Often
Unconscious
Yet still for most of the soldiers of today the
combination of elements is something they still do unconsciously. And the
combinations they do make are limited to the areas of weapons, formations
and tactics. Only an extraordinary military leader is able to bring it
all together. Yet in the wars of the future it will not just be a few geniuses
but all soldiers who will be combining force elements in novel ways both
broadly and in depth. [pp. 146 - 151]
Winning By Combining Elements
The Whole Is Greater Than the Sum of the Parts:
Choosing Elements to Combine
We already know that warfare is no longer what
it was. To a very large extent, warfare is not "warfare" but takes forms
such as the contention of opposing forces on the Internet, confrontations
in the mass media, attack and defense on the foreign exchange and futures
markets. The "enemy" may not be whom we thought of as the enemy before;
the weapons may not be the weapons of the past, and the battlefield is
not the battlefield of the past. Everything is uncertain. Adding elements
is the art of making combinations. The key is understanding how one plus
one can be more than two. Many of the people who ignore this fact claim
to be using combination of elements on the battlefield. Yet they are not
combining tactic with tactic, weapon with weapon etc. The key is knowing
just what to combine with what.
The Key to the Revolution in Military Affairs
is Clear Thinking
We need to combine war and non-war, and battlefield
with the off-the-battlefield, the concrete with the theory, and the stealth
aircraft with the guided missile. Weapon must be combined with weapon and
tactic combined with tactic. One and one is greater than two. A true revolution
in military affairs depends upon clarity of thought. The real effect of
the technological revolution in military affairs will depend upon whether
its principles can be made clear and enunciated in military thinking. Many
people, including many soldiers are limited by just seeing war as the battlefield
and killing.
Metz and Kievit Highlighted Gap Between Thinking,
Threats
The U.S. military theorists Steven Metz and James
Kievit of the U.S. Army War College Strategic Studies Institute made this
point in their work. They discovered a big gap between U.S. military thinking
and the actual national security threats which confront the United States.
Now ideology lagging behind the real world situation is certainly not a
uniquely American problem, but the U.S. military is a classic case of it.
They wrote "A band-width problem arises when a military force is so focused
on one particular type of opponent" they might be attacked by another enemy
outside their field of vision. [Note: in original text "it can be defeated
by a different kind [of opponent]." End note]
Metz and Kievit properly expressed their concern
about this. They wrote: "While official documents note that "the Army must
expand its understanding of conflict beyond current Western paradigms,"
most descriptions of how the "digitized" Army of the 21st century expects
to fight sound suspiciously like armored combat against the Warsaw Pact
with the new technology grafted on. Yet if the U.S. forces encounter a
low tech adversary, a medium tech adversary or an adversary at the same
level, they might run into a problem of insufficient band-width." [pp.
153 - 155]
Narrow Band-width Thinking Exposed by Trade Center
Attack
The U.S. has already run into this problem. Hacker
attacks, the attack on the World Trade Center, and Bin Laden's bomb attacks
all greatly exceeded the band-width understood by the U.S. military. Some
non-traditional ways of thinking or ways of thinking which the military
rejects offer the possibility of creating non-conventional tactics. Now
a war might involve conventional military attacks.
A Combined Attack Using Non-Miitary Elements Might
Win Without War
But now a combined approach might be a sneak attack
by using manipulation capital flows to create a financial crisis, activating
viruses installed previously on the enemy's computers combined with simultaneous
hacker attacks. These attacks might cripple communications, trading, and
mass media. Only then would conventional military means be gradually applied
to compel the enemy to accept the will of the attackers. This strategy
might even achieve victory without war.
Any battle strategy can be combined with any
other. These strategies might be conventional military, quasi-military
such as diplomatic attacks or computer network attacks, or non-military
such as financial war or trade war.
------- Types of Warfare ------
Military |
Quasi-military |
Non-military |
Nuclear |
Diplomatic |
Financial |
Conventional |
Network |
Trade |
Bio/Chemical |
Intelligence |
Resources |
Ecological |
Psychological |
Foreign
Assistance |
Space |
Hi Tech |
Legalistic |
Electronic |
Smuggling |
Embargo |
Guerilla |
Drug Warfare |
Media |
Terrorist |
Simulated
(Intimidation) |
Ideological |
Combining the Elements into a Marshal's Cocktail:
Examples
For example, the U.S. strategy against Bin Laden
combines state terrorism with intelligence war, financial war, network
war, and war using laws and rules. The war of NATO against Yugoslavia [during
early 1999] in Kosovo combined military intimidation, diplomacy, and legal
tactics. Against Iraq is the combination of conventional warfare, diplomatic
warfare, embargo warfare, legal warfare, media warfare, psychological warfare,
and intelligence warfare. When the Hong Kong government in August 1998
fought to defend itself against financial attacks, the tactics it adopted
against speculators combined financial warfare with legal warfare, psychological
warfare, and media warfare. The cost was high but the Hong Kong government
won. In addition there are methods like those used by Taiwan which prints
large quantities of Chinese banknotes. This can be characterized as a combination
of financial war and smuggling war.
Combine Elements in A Single Strategic Vision
Rapid improvements in communications technology
have brought the possibility of a more effective disposition and coordination
of battle elements -- and so the idea of effective combination of battle
elements has become much more effective. This idea of combination works
at a high level of abstraction so that it isn't directed against any one
particular type of objective but rather is a kind of thinking and principle
that can be applied against many types of objectives. The Song military
strategist Qiu Fei said that the "secret of using tactics properly is in
keeping oneself of one mind" -- [Translator's note: that is to see everything
as part of a great whole. Yunyong zhe miao, chu hu yixin. End note] Only
when this is understood can superior tactics be achieved. This is a simple
principle. But simple principles are not the products of simple minds.
[pp. 156 - 159]
[Note: Footnotes -- reference is made to the
introduction to "Game Theory and Information Economy Research" (1996) by
Zhang Weiying in which Zhang argues that the Cold War nuclear confrontations
cannot be explained by game theory since they are basically irrational.
Only as humanity moved away from this superpower confrontation towards
a more rational conception of national interest were people able to exit
from the "prisoner's dilemma". Now however the theory of cooperative yet
competitive economics expressed in game theory has come to be important
in the military arena as well. Reference is also made to a March 1997 war
game between digital and conventional troops reported in the Defense News
of March 17 - 23, 1997; the 1997 U.S. report "National Defense Strategy";
the Summer 1997 issue of the U.S. magazine "Strategy Review"; U.S. field
order FM100-6 on "Information battle".
Appendix One: Information Security and Red Flag
Linux
January 7, 2000 Yangcheng Evening News on Microsoft
2000
[Comment: The Chinese government and Microsoft
denied a Reuters press service report that Microsoft 2000 would not be
allowed on Chinese government computers. The Reuters report was based on
a Yangcheng Wanbao report (below) that made a much narrower claim that
according to "the departments concerned" Windows 2000 will not be allowed
to be loaded onto the computers of important government departments. This
issue aside, the Yangcheng Wanbao article has a very interesting discussion
of China's information security weaknesses and how they might be addressed.
One strategy is developing a Chinese operating system not controlled by
foreign countries. There are at least three flavors of the free Linux operating
system that popular in the PRC that have Chinese language support: Turbo
Linux, Red Hat Linux and now Red Flag Linux. End comment.]
Summary Translation of Yancheng Wanbao article
The Chinese government will standardize on
Red Flag Linux for its platforms. Chinese companies have tried to develop
their own operating systems -- the brains of the computer -- but these
efforts did not succeed for the lack of applications software. If you install
someone else's "brain" you'll be sorry. Yugoslav computer systems were
seriously hurt during the Kosovo war when they were attacked by NATO led
by the USA. If Yugoslavia had had its own hardware and software, its losses
wouldn't have been so great.
The Chinese Academy of Sciences Software Applications
Institute developed Red Flag Linux 1.0 on the foundation of Linux, but
improved the interface, made installation easier and increased the number
of device drivers. Now the Software Applications Institute is working together
with the Dafang Co.(of Beijing University). Sun Yufang, the Vice Director
of the Software Applications Institute, heads the Red Flag Linux Project.
Sun said that 50 million RMB had been invested in the Red Flag Linux Project.
Red Flag Linux does not try to do everything but does meet the basic needs
of users. The journalist noted that the Red Flag Linux interface resembled
that of Windows and so is easy to use. Sun expects with the release of
Linux 2.0 this year to capture 20 percent of the Chinese PC market. As
the unique Chinese intellectual property part of the software increases,
it won't be Red Flag Linux, it will simply be Red Flag.
Observers have noted that Microsoft's success
is based on sales and management and not technology. Thus Red Flag Linux
is in for a tough fight as it seeks its spot in the marketplace.
END SUMMARY TRANSLATION
Appendix Two: Commercial Encryption and PRC National
Security
The People's Daily on Commercial Encryption October
17, 1999
BEGIN TRANSLATION
People's Daily October 17 p.4
(full Chinese text available at http://www.peopledaily.com.cn)
We Must Act Immediately to Protect Our Information
Security (Information Technologies Forum)
by He Dequan, Academician of the Chinese Academy
of Engineering
As we move into the Twenty First Century, information
security has become a global problem. National security, the rise and fall
of nations, victory and defeat are the first concerns of states and nations.
Information security is linked to these issues. If we don't have information
security, we cannot say that we truly have national security, or truly
have political security, military security or economic security. Economics
and information are daily becoming ever more global. We can see how this
trends gives us new development opportunities but also severe new challenges.
The United States leads the tide towards globalization and is using information
hegemony to dominate the world. The United States is fostering and preparing
an information deterrent and information warfare. Therefore, when we think
about Chinese national security issues in the context of global strategy,
we should also think of it from a political perspective.
For a long time, people have thought of information
security as just the protection of the secrecy, completeness and accessibility
of information. This is of course true but that concept was formed in the
world of twenty years ago. We have entered the age of microcomputers and
local area networks. Computers have emerged from the central computing
department to office desktops and homes. The user to network connection
is relatively simple, so we must rely on technology to implement security
measures and require that everyone follows regulations. Therefore information
security in this era is oriented towards networks and regulations. With
the Internet age of the 1990s, individual users can connect to and even
control computing resources connected to the Internet that are spread across
the entire planet. Therefore the scope of Internet information security
is greater and needs to focus more on connections and on individual users.
The combination of people, networks and environments
creates a complex system. Through network protocols and exchanges, human
intelligence and the rapid operating speeds of computers are integrated
to become a new force of social production. This new force makes possible
electronic commerce and other applications involving purchases on the Internet.
The net satisfies human needs such as interpersonal communications, study,
medicine, consumption, entertainment, feeling of security, and a safe environment.
It might be said that the data security concept
refers to the aforementioned secrecy, completeness and accessibility aspects
of security. The user security concept includes as well identification,
authorization, control of visitors, resistance to denial of service and
service as well as personal privacy and intellectual property rights.
Data security and user security are the core
of security services of an information security system. Information security
problems can be resolved using technologies and measures such as encryption,
digital signatures, identity certification technology, firewalls, security
audits, disaster recovery, virus protection, and anti hacker entry protection
measures. Setting out from the perspectives of the historical concepts
of personal security and network security, modern network security involves
individual rights, the survival of enterprises, protection of financial
institutions from risk, social stability and state security. Information
security combines physical security, network security, data security, information
content security, information infrastructure, and public information security.
Information security technology involves some
antagonistic sensitive technologies. Faced with the ever incrasing need
for these technology, the only solution is for China to create them for
its own use.
Over the next five to ten years, we can focus
our information security technology development efforts in these three
areas:
-- First, develop key technologies that can
be applied widely and across many types of systems that will gradually
solve the present problem of inadequate information security. These include
firewall technology, identification technology, commercial encryption technology,
anti virus protection technology, intrusion detection technology, and security
management technology. The planned development of these technologies can
gradually improve the ability of China's information infrastructure to
protect itself and to adapt to future security threats and environments.
-- Second, focus on original breakthrough technologies
of wide applicability and then to effectively apply them so as to improve
China's information security capacity. Building on the results of the 863
[note: government supported high tech development program], S-863 and State
S&T Key Technologies Plan, concentrate limited resources and investment
to focus on breakthroughs so as to build an industry that can provide means
for managing state information security. These technologies include network
detection technology, content searching technology, risk management technology,
testing and evaluation technology, TEMPEST technology etc.
-- Third, strive to develop "killer" strategic
technologies in order to acquire deterrence superiority and high tech winning
cards in the information security area. Examples of "high cards" that China
won before are the atom bomb, hydrogen bomb and satellite launches ("two
bombs and a satellite"). Continually working towards progress in these
strategic technologies should be a long term national strategy. The state
should marshal resources and organizations to achieve these goals. Operating
systems, dedicated encryption chips, and security processors fall into
this category. The current operating systems, security processing chips
and other components are controlled by several big Western corporations.
Over the long term, China needs to develop
its own operating system. The present trend towards free software provides
a good opportunity.
For dealing with the present situation, one
practical measure we can adopt as to consider each component to be a black
box and use control theory to achieve operational security control over
each component.
END TRANSLATION OF PEOPLE'S DAILY ARTICLE