• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • About
    • Editorial Staff
      • Bryan Strawser, Editor in Chief, Strife
      • Dr Anna B. Plunkett, Founder, Women in Writing
      • Strife Journal Editors
      • Strife Blog Editors
      • Strife Communications Team
      • Senior Editors
      • Series Editors
      • Copy Editors
      • Strife Writing Fellows
      • Commissioning Editors
      • War Studies @ 60 Project Team
      • Web Team
    • Publication Ethics
    • Open Access Statement
  • Archive
  • Series
  • Strife Journal
  • Contact us
  • Submit to Strife!

Strife

The Academic Blog of the Department of War Studies, King's College London

  • Announcements
  • Articles
  • Book Reviews
  • Call for Papers
  • Features
  • Interviews
You are here: Home / Archives for orlanda gill

orlanda gill

Chinese cyber coercion in the Asia-Pacific? Recent cyber operations in South Korea, Hong Kong, and India.

June 21, 2021 by Orlanda Gill

Photo by Markus Spiske on Unsplash

Writings on Chinese cyber operations tend to focus on cyber espionage and the stealing of state secrets for China’s military modernisation. Comparatively in discussions of cyber operations, cyber coercion and Chinese cyber coercion are infrequently mentioned. This has to do with the ambiguity surrounding the definition of cyber coercion and the challenges of attribution.

Chinese cyber coercion is understood as a subset of what is known as weishe. Weishe is, in direct English translation, understood as “deterrence”, but is conceptually understood as a combination of compellence and deterrence. In theory, cyber coercion thus operates by compelling actors through cyber operations to produce an effect called deterrence wherein actors are deterred from decisions that are harmful to China’s interest. This role of compellence in cyber deterrence is made clearer when contrasted to the cyber deterrence strategies discussed so far in the United States and the United Kingdom. The use of cyber deterrence in the respective countries appears mostly in reference to a retaliation to a cyber-attack or in building domestic resilience to make an attack costly. In contrast, in the Chinese context, compellence and deterrence are one, the role of compellence is encouraged, and a cyber-attack does not seem to be a prerequisite to the use of cyber deterrence.

The theoretical understanding of weishe, however, is imperfect in practice. Whether deterrence is truly a component of weishe is subject to disagreement and is debated amongst Chinese analysts. If this is the case, then what lens should be used to analyse potential Chinese cyber coercion?

Observed practice of cyber coercion may be a more helpful lens than its theoretical counterpart. Observed practice can include the combination of vague threats, an implied actor, and an implicit desired behaviour. In a greater layer of complexity, consistency across the elements’ contents is not necessary. For instance, cyber coercion may include explicit threats, an implied actor, and an explicit desired behaviour. Therefore, observed practice captures a more detailed variation of what is understood as cyber coercion—something which is illustrated in the following three cases.

The cyberattacks against South Korea in 2017 illustrate one of the clearer cases of Chinese cyber-coercion, specifically cyber-enabled economic coercion. It also demonstrates the use of cyber deterrence to deter a country from choosing a political decision that is judged as harmful to China’s security. On February 7, 2016, officials from the United States and South Korea announced discussions on deploying Terminal High Altitude Area Defence missile defence system (THAAD). Beijing, however, disapproved of the X-band AN/TYP-2 band radar system which would allow for approximately a 3,000 miles detection range. This would mean potential US military monitoring of activity in China and the undermining of China’s nuclear deterrence.

In correspondence to the announcement of THAAD, there were reported increases in cyber intrusions. In the first half of 2017, there were over 6,000 cyber intrusions from China against the South Korean Foreign Ministry’s servers which was an increase from the 4,600 in 2016. Furthermore, Lotte Group, a South Korean-Japanese conglomerate was also attacked. Chinese internet protocol addresses took parts of Lotte Group’s storefront offline for several days, and Chinese e-commerce sites stopped co-operation with Lotte. This has been connected to Lotte Group permitting the South Korean government to use its golf course to deploy THAAD. South Korea did end up agreeing to limitations on THAAD, but it is difficult to say whether this was uniquely due to the cyber impacts because of the presence of other coercive levers. For instance, the Chinese government shut nearly all of Lotte’s physical stores in China. Cyber coercion, however, does signal great displeasure, and the intentions can be perceived as the use of compellence to deter further plans regarding THAAD.

Whilst the THAAD case outlines more clearly what happened and who the suspect is, other potential cases do not. Cyber operations in Hong Kong and India demonstrate cases of an explicit threat, an implied desire, and an implied actor.

Over the course of Xi Jinping’s rule, a tighter grip has been imposed on Hong Kong and protests have become more dangerous to participate in. Joshua Wong and Agnes Chow, who were the faces of Hong Kong’s protests against the Chinese Communist Party’s grip, are now imprisoned. The 2019-2020 Anti-Extradition Law Amendment Bill Movement, which was a series of movements against the Extradition Bill, coincided with the emergence of HKLeaks—a doxing website which appeared in late August 2019. The website doxes anti-government protestors, revealing people’s personal identifiable information (PII) such as headshot, social media handles, phone numbers and their misdeeds. The threat is explicit in that it threatens an individual’s privacy and makes the struggle for a freer Hong Kong even more costly. There have even been instances of malicious targeting. In one case, a doxed female reporter from Apple Daily, a Hong Kong tabloid known to criticise the Chinese Communist Party, started receiving threatening calls.

The argument that China is behind this is difficult to build, although there are very subtle implications behind HKLeaks that tie it to state-sponsored actors and potentially to the Chinese state. Aside from China’s interest in Hong Kong, looking at who or what HKLeaks is connected to is informative. HKLeaks has been linked to social media accounts similar to those taken down for being fake accounts linked to state-backed actors, which were also used as a tactic in disinformation campaigns against Taiwan. Some information of who the state could be is found in anecdotal evidence. According to an alleged victim of HKLeaks, they gave a “fake address I’ve never given to anyone” to Chinese police at the Hong-Kong and China border when returning from a business trip from mainland China. His address afterwards appeared on HKLeaks. Whilst the link between cause and effect is unclear, these disparate points of evidence could arguably form a weakly implied Chinese state as actor.

HKLeaks is also positively viewed and engaged by the Chinese state. For instance, the official Weibo account of China’s state-owned TV network, “published a video showcasing the HKLeaks website, and urged followers to ‘act together’ and ‘tear off the masks of the rioters’”. This post was then shared by “the Weibo accounts of local Chinese police, local media outlets, branches of Chinese Communist Youth League, and others.” Again, the actor cannot be established, but there is certainly a perception of an implied actor, an implied (or explicit, depending on one’s perception) desire to stop the protests and the threat of the violation of privacy and potential harm to the individual. This arguably forms a cyber coercion, rendered perhaps more threatening by the ambiguity on how members are being doxed and by not knowing the exact actor.

The case of the Mumbai power outage in October 2020 is a similar case where there is implied Chinese involvement. However, connections to the Chinese state around this topic is slightly clearer and less speculative. Speculation of China’s involvement is found across Foreign Affairs, NY Times, and The Diplomat, and domestically amongst Indian officials. The main source of information, however, is from a report by Recorded Future, a private cybersecurity company. On February 28 2021, Recorded Future published a report which demonstrated a connection between Red Echo, a Chinese state-sponsored group, and the installation of malware into civilian infrastructure such as “electric power organisations, seaports, and railways.” This cyber intrusion is thought to connect with the border conflict occurring at the time and has led to speculation about the connection to the Mumbai power outage. According to retired cyber expert Lt. Gen. D.S. Hooda, the power outage has acted as a signal from China to indicate “that we can and we have the capability to do this in times of a crisis.” Such a signal draws parallel to the cyber intrusions concerning South Korea and THAAD.

All three cases demonstrate the inherent limitations in analysing cyber coercion (as deterrence through compellence.) Even if China is implied from political context and from malware, building a case to clearly identify the Chinese State’s direct involvement is difficult to build without clear attribution. Nevertheless, if China is definitively involved, the utility of being an implied actor may be helpful with information operations elsewhere wherein appearing benign is used to gather support of the country. The case of Mumbai and South Korea also bring up interesting questions for compellence and deterrence, with China potentially being seen to blur the two. Cyber coercion overall remains somewhat enigmatic. The ambiguity is likely advantageous for the actor(s) behind the acts of cyber coercion. Ambiguity helps reduce chances of liability, which permits for a more peaceful (less conflict inducing) approach to manipulating and shaping another state to one’s desires.

Filed Under: Blog Article, Feature, Women in Writing Tagged With: China, Cybersecurity, Deterrence, orlanda gill, women in writing

How China’s Military-Civil Fusion strategy fuels China’s ambitious military aims

January 19, 2021 by Orlanda Gill

by Orlanda Gill

Flag of China. Source: Pixabay

Military-Civil Fusion (MCF) is a Chinese state-directed strategy which seeks to modernise the Chinese military by creating a distinct Chinese military-industrial complex. The MCF strategy effectively seeks to eliminate the barriers between the civilian and military sectors, which consist of legal, political, communicative, and bureaucratic divisions. Once eradicated, the result is a fused civil-military sector which allows for simultaneous military and economic growth. Whilst similarities can be found in the Civil-Military Integration (CMI) of the United States in that it shares the same goals of the civilian and military industry working closely together, CMI demands co-operation either within the military industry, or with a civilian company, rather than a complete removal of barriers between the civilian and military industry. The goal of the MCF is to have a ‘world-class military’ by 2050. Whilst the exact meaning is unclear, it can be interpreted to mean China desires to be amongst the world’s greatest military powers. How this would be realised can be understood by analysing China’s strategic guidelines which can be most closely translated to operational doctrine in the West. Realisation of this aim can also be examined through China’s attitude towards the Revolution in Military Affairs (RMA) which for China has placed and will place technological and scientific innovation at the center of war. The MCF therefore must be understood with regards to China’s strategic guidelines and the RMA. Overall, it can be demonstrated that the MCF is about having a modernised military which can fight and dominate in wars that demand technological and scientific superiority.

The MCF is not a new concept. The idea that economic growth cannot be without military is found in Deng Xiaoping, in the early 1980s, who focused on economic development before military equipment modernisation. It was, however, not until the ascension of President Jiang Zemin in 1993 when focus started to shift back more towards defence than solely economic growth. Jiang emphasised dual-use technologies, combining military facilities and civilian infrastructure to streamline military and econoomic spending. These core components, which are at the heart of the MCF, have endured from Jiang until the present, under Xi Jinping. The MCF, however, shares the most similarities to the policies of Xi’s predecessor Hu Jintao whose Civil-Military Integration (CMI) in 2009 sought to integrate the civilian and military sectors.

Whilst this brief historical overview demonstrates the evolution of a concept, the MCF is best understood at the implementation level. The strategy can be seen at work at many different levels: institutional, provincial, and local. At an institutional level, there is a growing number of the former and current senior defence industrial cadre serving in prominent party and state posts, while President Xi Jinping leads the Central Commission for Integrated Military and Civilian Development to monitor Military-Civil Fusion policies. Outside of government, the MCF also extends to universities for research. Currently, Tsinghua University is pursuing human-machine interaction with funding from the CMC Science and Technology Commission, which will likely contribute to China’s modernised military and concept of intelligentised warfare. At the provincial level, among production facilities, beginning in 2019, ten provincial-level governments are investing money into research and overseas acquisitions through guidance funds. At the local level, looking towards Tianjin, an AI Military-Civil Fusion Innovation Center was set up next to the National Supercomputer Center. This was coordinated with the Academy of Military Science. The MCF, therefore, should be understood as a guiding principle enforced and supervised by the state to guide the civilian sector to military usages, whilst retaining the civilian economic benefits from technologically innovating and supplying dual-use technology.

President Xi Jinping has remarked that the MCF strategy is instrumental, and this view is supported by China’s prioritisation of technology in contemporary warfare. The Gulf War (1990-1991) and Kosovo War (1998-1999) for China indicated a Revolution in Military Affairs (RMA) and therefore a new standard and future trend which puts information superiority and thus the quality of technology as a key factor in military victory and for what constitutes a powerful military. This understanding continues in the PLA’s strategic guideline in ‘winning informatised local wars’ in July 2014. An important (although not the only) aspect of this strategic guideline is the role of information. Informatisation ‘refers to the collection, processing, and utilization of information in all aspects of warfighting in order to seamlessly link individual platforms in real time from across the services to gain leverage and advantage on the battlefield.’ The demand for information superiority therefore places importance on the ‘cyber, space, and electromagnetic domains’. The importance of advanced information technologies is thus heightened and the MCF is made a crucial process for the PLA to advance technological innovation at a rapid pace in comparison to its adversaries to gain information superiority. Additionally, the MCF allows China to capitalise from the tech-dominated global RMA and to become a ‘world-class military’ by 2050.

The MCF is also important in what appears to a new and emerging concept known as intelligentised warfare. This may be understood as a ‘uniquely Chinese concept of applying AI’s machine speed and processing power to military planning, operational command, and decision support’. In President Xi Jinping’s report to the 19th Party Congress in October 2017, intelligentisation was elevated to a guiding principle for China’s military modernisation. This conceptualisation of future warfare marks an evolution from informatised warfare. Differences can be analysed in that intelligentised warfare involves an ‘algorithm confrontation’ rather than ‘systems confrontation’ that characterises informatised war. Winning would therefore come from having an ‘algorithm advantage’. Furthermore, whilst informatised warfare recognises the importance of the space and cyber domain, intelligentised warfare would expand the domain of warfare into the cognitive domain which concerns ‘the field of decision-making through reasoning’. Superiority in this domain would be achieved through enhanced cognitive capacity of human combatants via integrated human-machine intelligence. The expansion of warfare into new domains and the potential Revolution in Military Affairs through AI would certainly help produce a ‘world-class military’. The connection of intelligentised warfare and MCF is made explicit when we observe that the PLA’s Science of Military Strategy, an authoritative book on the PLA compiled by the PLA’s Academy of Military Science (AMS), states the intention to ‘Promote deeper military-civil fusion, and leverage societal resources for the development of military intelligentisation’. The MCF is thus integral to China’s capacity to leverage science and technology to bolster their combat capabilities as well as to lead in what China envisions as future wars.

Overall, the Military-Civil Fusion is an ambitious concept and strategy that seeks to modernise the military to great heights by fusing the civilian and economic sectors. The question of its success perhaps depends on whether the PLA is a world-class military by 2050. Nevertheless, the strategy has further implications; it promises China a technological edge, the strengthening of economic security and domestic and international prestige. Therefore, rather than becoming overly attached to what may be perceived as an end goal, it is important to remain open so as to see where the fusion is leading China.

 


Orlanda Gill is a MA National Security Studies student at the Department of War Studies at King’s College, London. Her interest is in East Asian security with a key focus on China’s foreign and domestic policy. She is also currently exploring the technology-security nexus especially with regards to China.

Orlanda is a part of Strife’s Women in Writing programme.

You can find her on Twitter at @orlanda_gill.

 

Filed Under: Blog Article, Feature, Women in Writing Tagged With: China, China MCF, MCF, Military Modernisation, Military-Civil Fusion, orlanda gill, technology, wiw, women in writing, women in writing programme

Footer

Contact

The Strife Blog & Journal

King’s College London
Department of War Studies
Strand Campus
London
WC2R 2LS
United Kingdom

[email protected]

 

Recent Posts

  • The cyber domain: capabilities and implications
  • The Case of the Wagner Group: the problematics of outsourcing war
  • From Physical Shift to Psychic Shift: Anne’s Move From 37 Merwedeplein to 263 Prinsengracht
  • Beyond Beijing: Russia in the Indo-Pacific
  • Book Review: The Father of Modern Vaccine Misinformation - “The Doctor Who Fooled the World: Science, Deception, and the War on Vaccines” by Brian Deer

Tags

Afghanistan Africa Brexit China Climate Change conflict counterterrorism COVID-19 Cybersecurity Cyber Security Diplomacy Donald Trump drones Elections EU feature France India intelligence Iran Iraq ISIL ISIS Israel ma Myanmar NATO North Korea nuclear Pakistan Politics Russia security strategy Strife series Syria terrorism Turkey UK Ukraine United States us USA women Yemen

Licensed under Creative Commons (Attribution, Non-Commercial, No Derivatives) | Proudly powered by Wordpress & the Genesis Framework