How China is revolutionizing warfare.
As the Pentagon's annual report to Congress, released last week, makes abundantly clear, China is on something of a long march in cyberspace. While most attention is being drawn to the report's assertions about Chinese snooping into sensitive classified areas and theft of intellectual property from leading American firms -- and others around the world -- there is some intriguing analysis of Beijing's broader aims as well. Indeed, the Pentagon sees a clear progression in Chinese strategic thought that, viewed as a whole, begins to elaborate what might be seen as an emerging military doctrine enabled by advanced information technologies. Just as the radio made skillful coordination of tanks and planes possible, introducing World War II-era blitzkrieg, so today the computer may be opening new vistas for cruise missiles, precision-guided munitions, and other smart weapons.
As the Pentagon’s annual report to Congress, released last week, makes abundantly clear, China is on something of a long march in cyberspace. While most attention is being drawn to the report’s assertions about Chinese snooping into sensitive classified areas and theft of intellectual property from leading American firms — and others around the world — there is some intriguing analysis of Beijing’s broader aims as well. Indeed, the Pentagon sees a clear progression in Chinese strategic thought that, viewed as a whole, begins to elaborate what might be seen as an emerging military doctrine enabled by advanced information technologies. Just as the radio made skillful coordination of tanks and planes possible, introducing World War II-era blitzkrieg, so today the computer may be opening new vistas for cruise missiles, precision-guided munitions, and other smart weapons.
What’s coming from Beijing is, in a word, "bitskrieg." The Pentagon report describes this as a three-phase process. First, there is a "focus on exfiltrating data" so as to gain vital information needed about military command and control systems as well as the points in our critical infrastructure that are vulnerable to disruption by means of cyberattack. It is believed that the Chinese have been engaging in this sort of intelligence gathering for many years — intrusions that Washington first openly acknowledged 10 years ago, giving them the code name "Titan Rain." It has been raining steadily for the past decade.
With all these data in hand, the second step — per the Pentagon report — is to use the same intrusive means that mapped our defense information systems to disrupt them with worms, viruses, and an assortment of other attack tools. The goal at this point is to slow the U.S. military’s ability to respond to a burgeoning crisis or an ongoing conflict. Think of what might happen, say, on the Korean Peninsula, if our small contingent there — a little over 25,000 troops — were to lose its connectivity at the outset of a North Korean invasion by its million-man army. Without the ability to operate more nimbly than the attacker, these forces would be hard-pressed from the outset. Cyberattacks on mostly automated force-deployment and air-tasking systems could also slow the sending of reinforcements and greatly impede air interdiction operations. In the first Korean War, the Chinese intervened with massive numbers of troops. In the second one, they might only have to send electrons.
The real payoff for Beijing, though, is in what the Pentagon report describes as China’s envisioned third phase of cyber-operations. This is the point at which the information advantage — that is, the ability to coordinate one’s own field operations while the adversary’s have been completely disrupted — is translated into material results in battle. The Pentagon describes cyberattack at this point as amounting to a major "force multiplier." Gaining such advantage means winning campaigns and battles with fewer casualties relative to those inflicted upon the enemy. In this respect, computer-driven "bitskrieg" could, it is thought, generate results like those attained by mechanized blitzkriegs — which also aimed at disrupting communications. In the Battle of France in 1940, for example, where the Germans had fewer troops and tanks, the Allies lost more than four times the number of soldiers as the Wehrmacht.
When my long-time research partner David Ronfeldt and I introduced our concept of cyberwar 20 years ago, the second and third phases of cyberattack that the Pentagon report describes are what we had in mind. In our view, striking at an enemy’s ability to maintain information flows, while keeping one’s own communications secure, would be the key to gaining a war-winning advantage in conflicts to come. But this would only hold true, we affirmed, if senior leaders recognized that cyberwar poses "broad issues of military organization and doctrine."
The point being that technology alone doesn’t create or sustain the advantage. In the case of blitzkrieg it was concentrating tanks in panzer divisions and closely linking them with attack aircraft that made the difference. To succeed at cyberwar, it will be necessary both to scale down large units into small ones and "scale them out" across the battlespace rather than mass them together. In this fashion — spread out but completely linked and able to act as one — the sweeping maneuvers of blitzkrieg will be supplanted by the swarming attacks of bitskrieg, characterized by the ability to mount simultaneous strikes from many directions. The guiding organizational concept for this new approach flows closely from technologist David Weinberger’s thoughtful description of online networks: "small pieces, loosely joined."
Thus should the Pentagon annual report to Congress be delved into more deeply — for the document reflects a clear awareness of, and takes a subtle, layered approach to thinking about, the Chinese cyber threat. One can only hope that the U.S. military analysis of Beijing’s looming capacity for bitskrieg is mirrored by introspective views and similarly nuanced considerations of American capacities for waging cyberwar. For the three phases described in the Pentagon report — so consistent with the original vision Ronfeldt and I described two decades ago — reflect the kind of conflict that is coming.
The militaries of most advanced countries think of cyberwar as a new form of strategic attack on power grids and such. The Chinese view differs, seeing this mode of conflict as much less about turning off the lights for a while in some other country and much more about defeating an opposing military grown dependent upon sustained, secure, and ubiquitous flows of information. Lights can always be turned back on. Soldiers’ lives lost amid the battlefield chaos caused by a bitskrieg can never be reclaimed. Thoughtful reading of the Pentagon report should affirm this — and appropriate action, along the lines of scaling down and "scaling out" our forces, and encouraging them to "swarm," must follow.
John Arquilla earned his degrees in international relations from Rosary College (BA 1975) and Stanford University (MA 1989, PhD 1991). He has been teaching in the special operations program at the United States Naval Postgraduate School since 1993. He also serves as chairman of the Defense Analysis department.
Dr. Arquilla’s teaching interests revolve around the history of irregular warfare, terrorism, and the implications of the information age for society and security.
His books include: Dubious Battles: Aggression, Defeat and the International System (1992); From Troy to Entebbe: Special Operations in Ancient & Modern Times (1996), which was a featured alternate of the Military Book Club; In Athena’s Camp (1997); Networks and Netwars: The Future of Terror, Crime and Militancy (2001), named a notable book of the year by the American Library Association; The Reagan Imprint: Ideas in American Foreign Policy from the Collapse of Communism to the War on Terror (2006); Worst Enemy: The Reluctant Transformation of the American Military (2008), which is about defense reform; Insurgents, Raiders, and Bandits: How Masters of Irregular Warfare Have Shaped Our World (2011); and Afghan Endgames: Strategy and Policy Choices for America’s Longest War (2012).
Dr. Arquilla is also the author of more than one hundred articles dealing with a wide range of topics in military and security affairs. His work has appeared in the leading academic journals and in general publications like The New York Times, Forbes, Foreign Policy Magazine, The Atlantic Monthly, Wired and The New Republic. He is best known for his concept of “netwar” (i.e., the distinct manner in which those organized into networks fight). His vision of “swarm tactics” was selected by The New York Times as one of the “big ideas” of 2001; and in recent years Foreign Policy Magazine has listed him among the world’s “top 100 thinkers.”
In terms of policy experience, Dr. Arquilla worked as a consultant to General Norman Schwarzkopf during Operation Desert Storm, as part of a group of RAND analysts assigned to him. During the Kosovo War, he assisted deputy secretary of defense John Hamre on a range of issues in international information strategy. Since the onset of the war on terror, Dr. Arquilla has focused on assisting special operations forces and other units on practical “field problems.” Most recently, he worked for the White House as a member of a small, nonpartisan team of outsiders asked to articulate new directions for American defense policy.
More from Foreign Policy
At Long Last, the Foreign Service Gets the Netflix Treatment
Keri Russell gets Drexel furniture but no Senate confirmation hearing.
How Macron Is Blocking EU Strategy on Russia and China
As a strategic consensus emerges in Europe, France is in the way.
What the Bush-Obama China Memos Reveal
Newly declassified documents contain important lessons for U.S. China policy.
Russia’s Boom Business Goes Bust
Moscow’s arms exports have fallen to levels not seen since the Soviet Union’s collapse.