SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
1
China’s Three Warfares
By Timothy A. Walton
Delex Consulting, Studies, and Analysis
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
2
The Delex Consulting, Studies and Analysis (CSA) Division of
Delex Systems, Inc. provides our government, industry, and
international partners with expert assistance in strategic and
operational planning and analysis.
In order to facilitate a better understanding of leading concepts and
viewpoints in China, Delex CSA has prepared the following Special
Report brief on China’s Three Warfares. An electronic copy of the
report may be found at the Delex Special Reports archive:
http://www.delex.com/sol_CSA_SR.aspx.
Any questions related to this topic may be addressed to Director
Bryan McGrath (bmcgrath@delex.com). Associate Timothy A.
Walton contributed to the translation and analysis of this work.
Delex CSA
http://www.delex.com/sol_CSA.aspx.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
3
China’s Three Warfares Addressed by Chief of Naval Operations Greenert
On the 10th
of January 2012, the Center for a New American Security (CNAS) released a report
examining the future of U.S. strategy in the South China Sea.1
The report rollout event at the
Willard Intercontinental Hotel featured a keynote address by Admiral Jonathan Greenert, Chief
of Naval Operations (CNO), followed by a panel discussion chaired by Richard Danzig, former
Secretary of the Navy, and including Singapore’s Ambassador to the United States Chan Heng
Chee, and report co-authors Dr. Patrick M. Cronin, Senior Director of CNAS’ Asia-Pacific
Security Program, and Mr. Robert D. Kaplan, a senior fellow at CNAS.
In addition to presenting his Sailing Directions and elucidating the Navy’s forward deployed
status, CNO Greenert discussed in his keynote address efforts to increase integration with
regional partners and allies.i
During the question period, Dr. Stefan Halper a Senior Fellow in
the Department of Politics and International Studies at the University of Cambridge, asked the
CNO for his thoughts on China’s Three Warfares and possible reactions to it. The CNO
responded that Three Warfares “is difficult and doesn't align directly with how we do business”
and supported the use of international protocols in “continuing the debate” with the Chinese.
Consistent with the CNO’s efforts to acknowledge the concept, this Special Report draws
attention to China’s Three Warfares. Drawing from the work of various experts and sources, this
Special Report also builds on a more in-depth journal article prepared for Defense Concepts by
its author, Timothy A. Walton.ii
The Special Report summarizes Three Warfares and U.S.
government attention brought to bear on it, ordinates the concept’s place in Chinese military
theory, explains the concept’s three components (using case studies), and evaluates the prospects
for Three Warfares’ employment and effectiveness.
i
Delex CSA Current Issues Brief (CIB) No. 46 “CNAS Report on U.S. Strategy in South China Sea” covered the
report and its rollout, including the CNO’s remarks. An electronic copy of the CIB may be found at the Delex CIB
archive: http://delex.com/sol_CSA_CIB.aspx.
ii
Walton, Timothy A. “Treble Spyglass, Treble Spear: China’s Three Warfares.” Defense Concepts 4.4 (2010): 49-
67.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
4
A Summary of Three Warfares
In 2003, the Chinese Communist Party (CCP) Central Committee and the Central Military
Commission (CMC) approved the concept of “Three Warfares” (san zhong zhanfa, 三种战法), a
People’s Liberation Army (PLA) information warfare concept aimed at preconditioning key
areas of competition in its favor.iii
As defined by the U.S. Department of Defense (DOD) in its
2011 Annual Report to Congress on Military and Security Developments Involving the People’s
Republic of China, Three Warfares consists of the following:2
• Psychological Warfare seeks to undermine an enemy’s ability to conduct combat
operations through operations aimed at deterring, shocking, and demoralizing enemy
military personnel and supporting civilian populations.
• Media Warfare is aimed at influencing domestic and international public opinion to
build support for China’s military actions and dissuade an adversary from pursuing
actions contrary to China’s interests.
• Legal Warfare uses international and domestic law to claim the legal high ground or
assert Chinese interests. It can be employed to hamstring an adversary’s operational
freedom and shape the operational space. Legal warfare is also intended to build
international support and manage possible political repercussions of China’s military
actions.
Over the past two decades, the PLA’s organizational structure, training, and equipment have
dramatically improved. Less visible but equally important improvements in coordinated force
enabling concepts seek to maximize the effectiveness of the PLA’s threat or use of force.
Notable among these concepts is Three Warfares.
In 2008, the findings of the U.S. Department of State’s (DOS) International Security Advisory
Board report, headed by former Deputy Secretary of Defense Paul Wolfowitz, were made public.
Among other recommendations, the authors of the report maintained that “it is essential that the
U.S. better understand and effectively respond to China’s comprehensive approach to strategic
rivalry, as reflected in its official concept of Three Warfares. If not countered, Beijing […] can
precondition key areas of strategic competition in its favor.”3
Furthermore, in its 2009, 2010,
and 2011 annual reports on the military power of China, DOD has noted the development of
Three Warfares. However, the U.S. has taken little action to counter or mitigate the effects of
this adversarial concept.
Three Warfares as Part of Information Warfare
The PLA’s operational hierarchy of combat consists of three major levels: “war (zhanzheng);
campaigns (zhanyi); and battles (zhandou), each of which is informed, respectively, by a distinct
level of operational guidance—namely strategy (zhanlue); campaign methods (zhanyi fangfa;
usually contracted as zhanfa) and tactics (zhanhu).”4
Three Warfares (sanzhong zhanfa) can be
iii
The Central Military Commission (CMC) is responsible for issuing directives for operational
guidance.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
5
identified primarily as a campaign method with secondary, mostly strategic but also tactical,
applications. The PLA’s operational guidance document Regulation on the Political Work
stipulates it is “a reinforcement of political work in terms of media warfare, psychological
warfare, and legal warfare.” 100 Case Studies for Each Type of the Triple Warfare, published by
the PLA in January 2005, serves as a corroborating supplement to the document.5
Information warfare has assumed a central role in Chinese military writings over the past decade.
Achieving information superiority is seen as the precondition for achieving and maintaining
battlefield supremacy. Information warfare also “greatly emphasizes the concept of ‘gaining
mastery by striking first.’”6
In fact, some Chinese writings suggest that successful information
operations require striking first electronically or kinetically. Three Warfares follows this vein of
thinking as a peacetime and wartime information warfare first strike aimed at maximizing the
effects of the threat or use of military force.
Psychological Warfare
Although recently popularized as part of Three Warfares, psychological warfare (xinlizhan) is
deeply rooted in classical Chinese strategy. Modern psychological operations concepts are
normally aimed at the adversary’s morale (shiqi), and employ a multitude of components
including television, radio broadcasts, loudspeakers, leaflets, and calculated military operations.
Conventional deterrence, as part of psychological warfare, would not only involve military
components, though, but also involve whole of government political, economic, and diplomatic
components. Retired U.S. Army Lieutenant Colonel Dennis Blasko explains:
“Political signals may be sent through (1) public or private diplomacy at international
organizations, such as the United Nations, and/or directly to other governments or
persons; (2) the use of the Chinese and foreign media in official statements or “opinion
pieces” written by influential persons; (3) non-military actions, such as restrictions on
travel or trade; or (4) by using military demonstrations, exercises, deployments, or tests,
which do not involve the use of deadly force.”7
Beyond the scope of traditional strategic communications or force signaling, the new
Psychological Warfare appears to aim for a high degree of precision in targeting critical nodes
(guanjie) to achieve nonlinear effects. Specifically, the enemy’s motivation and willingness to
wage war could be targeted, by eliminating opposing leadership, diminishing international
support, undercutting military capabilities, affecting the economy, or sowing domestic political
dissent.
An example of targeted, economic-based Psychological Warfare occurred during the 2010
Senkaku Boat Collision Incident. On 22 September 2010, in response to Japan’s arresting the
captain and crew of a Chinese trawler in a territorial dispute, China enacted a two-month
unofficial ban on exports of rare earths to Japan. Shortly thereafter, Japan released both the
trawler’s crew and captain. In China the event was perceived as a Chinese diplomatic victory,
while in Japan the government’s acquiescence received rebuke. This use of China’s “strategic
natural resource” demonstrated the precise, coercive effect of affecting an adversary’s economy.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
6
Target Taiwan
Taiwan, or the Republic of China (ROC) to be more precise, is the primary target of PLA
Psychological Warfare. Newly re-elected President Ma Ying-jeou is pursuing a policy of
rapprochement with the People’s Republic of China (PRC). His policies have decreased the
short-term likelihood of armed conflict in the Taiwan Straits. However, critics simultaneously
contend that he may be weakening the mission of the ROC military. Thus, he could face the
challenge of maintaining a credible defense force and a credible commitment to use it if
necessary.
Chinese writings posit that during peacetime, psychological operations seek to “reveal and
exploit” divisions in the enemy’s domestic political establishment or alliance system and cast
doubt on the enemy’s value concepts (jiazhi gainian).8
In 1997, the Chinese General Staff
Department and General Political Department “reportedly formed a special unit to examine
methodologies to spark a ‘soldiers movement’ (bingyun) to sap gradually the morale of ROC’s
armed forces and reduce confidence of the Taiwanese people in its military.” More recently,
PLA journals alleged that during the pro-independence overtures of the Chen Shui-bian
administration, “officers and men [in the Taiwanese ranks] were in ideological chaos, shaken in
their faith and confused about ‘just who and what they are fighting for.’”9
More recently, a series
of high profile espionage cases in which Taiwanese military and intelligence officers spied for
China have shocked the media and sparked concerns over deficiencies in Taiwan’s intelligence
apparatus.10
By presiding over the graduation ceremonies of the five ROC military schools in July 2008,
President Ma demonstrated his awareness of the situation and desire to instill confidence in the
armed forces. His speech to the cadets included the following lines:
“Some of you may wonder whether China is our friend or foe. What you should do is to
help us build a strong military force and be prepared for war. Only by being prepared for
war can we prevent it. Taiwan will not seek war, but we will not avoid or fear wars,
either.”11
Taiwan’s first Quadrennial Defense Review (QDR), issued in March of 2009 by the Ministry of
National Defense, identified the “three-front war” by China—legal, media, and psychological
warfare as a threat to the defense of the country. Furthermore, in planning its “Hard ROC”
defense strategy, the QDR called for “realizing an all-out (general civilian mobilization)
defense” as an important measure for preventing war. Such actions aim to bolster the perceived
weak or shallow morale of Taiwanese citizens. Overall, the Ma administration has developed
nuanced communications in seeking to improve relations with the PRC while also improving the
ROC’s defenses.
The PLA is evaluating and debating coercive strategies, which would be part of Psychological
Warfare to take advantage of the perceived weakened morale and unity of the ROC’s military
and government. Through psychological warfare tactics including the electronic transmission of
media, undercutting dialogue with elements of the ROC government, etc., the PLA aims to seize
and maintain the political initiative before and during military campaigns. Independent of the
method of the campaign, some PRC observers posit that the ROC will, after a 48-hour
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
7
psychological and limited military campaign, not only agree to initiate unification talks, but also
acquiesce to PRC terms. Whether or not such a scenario would materialize holds broad
implications not only for Taiwan, but for intervening states as well—the U.S. in particular. If
Taiwan swiftly loses political confidence and capitulates to Chinese demands, then U.S. forces
sent to signal U.S. commitment to stability in the region or actively stop Chinese coercion would
arrive too late to assist in the defense of the island. Clearly, the PLA views Psychological
Warfare as an essential element of its operational level of warfare, employing it in concert with
other Warfares and using the expectations of success created through it to guide the development
of plans to achieve strategic effects.
Media Warfare
As part of the Three Warfares, Media Warfare is “aimed at influencing domestic and
international public opinion to build support for China’s military actions and dissuade an
adversary from pursuing actions contrary to China’s interests.”12
Domestically, PLA planners
seek to control domestic information access and generate propaganda to guide public opinion
and thus present a ‘united front’ among the intelligentsia, common citizens, and the CCP. Over
the past few decades, China has adopted more sophisticated Media Warfare methodologies. In
particular, China has incorporated methods of mass persuasion from the Western world,
including political public relations, theories of mass communication, and individual and group
psychology.13
Foreign Media Warfare efforts have also become more sophisticated. Foreign Media Warfare
efforts have also sought to improve China’s international media voice in an effort to surmount
the perceived Western information hegemony. As stated by the People’s Daily, the United States
not only possesses political and military hegemony, but also media and cultural hegemony. In its
view, the ‘soft strength’ of Western news media far surpasses its economic ‘hard strength.’14
Since the 1990s, improved targeting of prominent foreign elites, journalists, military personnel,
and public relations firms has sought to “use foreigners as a bridge” (yiqiao weiqiao) to promote
China and convey Chinese messages.15
The government has improved the entertainment quality
of CCTV, co-opted popular, formerly private TV channels, sought to develop an alternative
cultural vision outside the Western model through cultural media subsidization, and by
establishing the infrastructure for a global mass communication system by deploying necessary
communications links such as satellites and fiber optic cables, by broadcasting CCTV in foreign
languages, and by providing Chinese media content to foreign national media providers.
The most important lobbyists for China and target audience of foreign propaganda are likely
Overseas Chinese, people of Chinese ancestry who are not living in the PRC or ROC. Overall,
China aims to create ideational power that grows increasingly attractive to citizens of the world
in general and Overseas Chinese in particular. With Overseas Chinese, China seeks to leverage
its notion of a transnational culture. Transnational culture, the idea of a common ethnic Chinese
people, supports Chinese public diplomacy and espionage operations throughout the world in
ethnic Chinese communities, university campuses, and cultural centers such as the Confucius
Institutes.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
8
Media Warfare, Nationalism, and Self-Binding
Regime legitimacy in China rests on bourgeoning economic growth and nationalism. Media
sources cater to the nationalistic desires of the people, but also whet their desires with rich
programming content that antagonistically portrays the U.S. and its allies. In his book, The
Three Faces of Chinese Power, David Lampton recalls conversations with Foreign Ministry
diplomats in which they speak of their online interactions with nationalistic citizens who allege
the Ministry does not represent China’s interests forcefully enough.16
Due to this sentiment, the
Foreign Ministry argues it must play two-level games with domestic citizens and foreign
governments. While the claim is likely true to a large degree, the possibility also exists that
exaggerating the influence of such nationalist movements or fueling them provides a form of
positive “selfbinding” for China in negotiations. In this manner, stoked nationalism could
precondition negotiations in China’s favor, allowing Chinese officials to argue in negotiations
with the U.S. or other states that they cannot fulfill obligations or requests or that their regime
survival might be at stake.
Media Warfare, Transparency, and Deception
On 18 May 2008, the Ministry of National Defense gave, for the first time, a public press
briefing at the Chinese Ministry of Defense.17
Senior Colonel Hu Changming, the PLA's first
spokesman, provided details of the military's role in rescue and relief efforts in the aftermath of
the 12 May Sichuan earthquake. Increasingly confident, the Ministry of National Defense now
holds regular press conferences and seeks to influence the international media discourse.iv
Furthermore, the PLA routinely sends “significant media teams to cover the efforts and inform
the population of the PLA’s, PAP’s, and militia’s work in non-traditional security missions.”18
Among other missions, the international naval review, in celebration of the 60th anniversary of
the founding of the PLA Navy on April 23rd, was an effort to liberalize the PLA’s public
relations image to the world. It not only demonstrated Chinese prestige to its own citizens, but
was highly oriented toward foreign consumption by portraying a strong, friendly, and transparent
force. Other efforts included the launching of an official PLA English website titled “China
Military Online.” It now features a series of regularly updated news articles, fact sheets,
photographs, and videos. It claims to offer a “window on Chinese armed forces” and to
demonstrate how China’s military is “open and transparent.”19
Despite these overtures, the PLA fundamentally lacks transparency or openness, systematically
underreporting both the cost and allocation of its budget. Moreover, Media Warfare operations
stress the supposedly nascent state of PLA capabilities and publicly deny capabilities such as
cyber-espionage. A high profile example of this took place 18 May 2011 when the PLA Chief of
General Staff Chen Bingde delivered an address at the U.S. National Defense University.
General Chen contended, as predecessors and colleagues of his have consistently argued over the
past couple decades, there “still exists a 20 year gap between equipment and weaponry between
iv
Delex CSA Special Report #2, Special Report on the Translation of Yang Yi Article on AirSea Battle, includes
coverage of a Ministry of National Defense press conference during which Defense Ministry spokesman Senior
Colonel Geng Yansheng (耿雁生) criticized the U.S. AirSea Battle concept. An electronic copy of the report may
be found at the Delex Special Reports archive: http://www.delex.com/sol_CSA_SR.aspx.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
9
the US and China.”v
This practice of deception supports Media Warfare’s aim of influencing
foreign actors’ perceptions of the PLA. Whether such a policy of deception will change with
greater Chinese confidence in PLA capabilities remains to be seen. Regardless, the role of
Media Warfare is likely to continue to grow as China seeks a more prominent international
media voice.
Legal Warfare
Legal warfare “uses international and domestic law to claim the legal high ground or assert
Chinese interests”20
In particular, legal war seeks to legitimize Chinese policies while sometimes
undercutting the authority or justification of enemy reactions. Legal Warfare is not necessarily
revisionist to the legal system itself; instead, it may aim to gradually set a new precedent or a fait
accompli situation backed by legal authority.
In general, China solely conducts contemporary external security operations under the mandate
of U.N. resolutions. This was evidenced when China waited for U.N. Security Council
Resolution 1851 before sending maritime forces December 26, 2008 to combat pirates.
Similarly, China only participates in U.N.-sanctioned peacekeeping operations. Even in foreign
policy trouble spots for China, such as Sudan, China’s peacekeeping presence is backed by a
U.N. mandate. This is consistent with the long-standing PRC position on noninterference in the
internal affairs of other countries.
China has used the concept of Legal Warfare in territorial disputes in the South China Sea. The
coordinated efforts of legal experts and maritime forces aim to “shape international opinion and
interpretation of the UN Convention on the Law of the Sea away from long-accepted norms of
freedom of navigation and territorial limits toward increased sovereign authority out to the 200
nautical mile Exclusive Economic Zone, the airspace above it, and possibly outer space.”21
Professor Peter Dutton of the U.S. Naval War College has thoroughly examined China’s legal
warfare in the South China Sea in a recent Naval War College Review paper.vi
Over the past
decade, military confrontations between the U.S. and China have exhibited significant
international law components, with China justifying its position in the context of or lack of
international law. Incidents include the March 4-8, 2009 harassment of U.S. (Surveillance
Towed Array Sensor System) SURTASS vessels (USNS Impeccable and USNS Victorious),
2006 and 2007 Chinese testing of directed energy and kinetic anti-satellite systems, and the April
1, 2001 collision of a Chinese J-8 with a U.S. EP-3E. In the future, Chinese Legal Warfare could
provide advantages in areas such as treaties regulating or abolishing the emplacement of
weapons in space, or the fielding of anti-satellite systems. Overall, Chinese interpretation of the
U.N. Convention on the Law of the Sea emphasizes that it strengthens stated sovereignty and
denies unauthorized access to foreign militaries.
v
Delex CSA Current Issues Brief (CIB) No. 34 “PLA Chief of General Staff Chen Bingde’s Visit to NDU” covered
General Chen’s presentation. An electronic copy of the CIB may be found at the Delex CIB archive:
http://delex.com/sol_CSA_CIB.aspx.
vi
Peter Dutton, “Three Disputes and Three Objectives: China and the South China Sea”, Naval War College Review,
Autumn 2011, Vol. 64, No. 4, http://www.usnwc.edu/getattachment/feb516bf-9d93-4d5c-80dc-
d5073ad84d9b/Three-Disputes-and-Three-Objectives--China-and-the.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
10
Additionally, legal warfare has been used to support economic coercion, urging foreign
companies against investing in certain Taiwanese companies with the threat of losing business in
the PRC.
Furthermore, longstanding efforts to portray the U.S. as a non-Asian power incorporate legal
elements through the fostering of mechanisms and apparatuses that solely involve ASEAN+3
states (Association of Southeast Asian States plus China, Russia, and Korea).22
In short, through
specific policies and the advocacy of general architectures, legal warfare seeks to legitimize
Chinese actions while delegitimizing adversaries’ actions.
Anti-Secession Law: A Combined Case Study
On the 8th of March 2005 the National People's Congress passed the Anti-Secession Law (ASL),
which stipulated: "If possibilities for a peaceful reunification should be completely exhausted,
the state shall employ non-peaceful means and other necessary measures to protect China's
sovereignty and territorial integrity." The law served three functions. First, it was seen as a
deterrent act against Taiwanese “splittists.” Second, it domestically strengthened and justified
the role of the security apparatus. Third, the law provided a legal, self-binding foundation for the
Chinese position on the problem of the Strait. Similar to the manner in which U.S. diplomats
cite the Taiwan Relations Act and the autonomy of members of the U.S. Congress in making
pronouncements and passing legislation, Chinese leaders can now fall back to the ASL to justify
their actions during negotiations. David Huang, a member of Taiwan’s Mainland Affairs
Council, which energetically protested the law, identified five stages of China’s Three Warfares
in the ASL:
1. Setting agenda and repeating messages (media)
2. Creating pressures on the government (psychological)
3. Undermining the government’s public authority (legal)
4. Generating the “chilling effect” by rewarding cooperators and punishing defectors
(psychological)
5. Denying Taiwan’s sovereign status by isolating it (legal)
As the case demonstrates, Three Warfares achieves ideal effects through the combined
application of the Three Warfares’ elements, skillful statesmanship, and a credible military force.
These long-term efforts by China are viewed by the Chinese leadership as a slow but sure
strategy for achieving reunification with Taiwan. Commensurately, Three Warfares must be
viewed through the paradigm of Chinese perception of past successes with brinkmanship and
pedagogical conflicts such as the Sino-Indian War and Sino-Vietnamese War. This perception
reinforces the appeal of a structured, methodical strategy that can achieve specific, almost
scientific effects. Hence, Chinese leaders must avoid overconfidence and possible
miscalculation in assessing their agent capabilities.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
11
“For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the
enemy without fighting is the acme of skill.” -Sun Tzu
Prospects for Three Warfares
Three Warfares can be primarily identified as a campaign method with secondary, mostly
strategic but also tactical, applications. By itself, it is unlikely to achieve significant strategic
goals. Indeed, Three Warfares will probably not “subdue the enemy without fighting.” However,
the combined employment of Three Warfares with credible PLA forces as part of established
operational guidance is likely to achieve significant nonlinear effects.
Integrated not only into military campaigns, but China’s larger strategy regarding other
applications of power, its relevance will likely continue to grow. Coordinated Three Warfares
efforts aim to dexterously support China’s position in regard to Asian security issues, while
undercutting those of adversaries. The dedication of Three Warfares’ methods against the ROC
constitutes the focal point of the method, incorporating psychological, media, and legal warfare
to support a long-term pacific, but if necessary swift and bellicose, reunification. The increasing
relevance of Three Warfares merits continued attention by Western analysts seeking to
understand how China will aim to shape, approach, and succeed in various situations. As both a
guiding paradigm and operational method, the unity of effort brought about by Three Warfares
will further PLA analysis of conditions and questions regarding the use of force.
Consulting Studies and Analysis
 
18 January 2012
Delex Special Report-3
Brief on China’s Three Warfares
Prepared by Delex Systems, Inc. 
12
Endnotes
1
Cooperation from Strength Report Website, CNAS, 10 January 2012,
http://www.cnas.org/node/7432.
2
Office of the Secretary of Defense (DoD), Military and Security Developments Involving the
People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16
August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26.
3
U.S. Department of State. 2008. China’s Strategic Modernization. International Security
Advisory Board, 2.
4
James Mulvenon, China’s Revolution in Doctrinal Affairs, (Alexandria: CNA Corporation,
2005), 22.
5
David W.F. Huang. “China’s Triple Warfare And Cross-Strait Economic Interactions.”,
Mainland Affairs Council, Taiwan, 5 May 2007,
http://www.docstoc.com/docs/654256/Chinas-Triple-Warfare-And-Cross-Strait-Economic-
Interactions.
6
Roger Cliff, Entering the Dragon's Lair, (Santa Monica: Rand Corp., 2007), 64.
7
Dennis Blasko, Personal correspondence via email with author, 2 May 2009.
8
Mark Stokes, “The Chinese Joint Aerospace Campaign: Strategy, Doctrine, and
Force Modernization”, in China’s Revolution in Doctrinal Affairs, ed. James Mulvenon and
David Finkelstein, (Alexandria: CNA Corporation, 2005), 272.
9
Ibid., 283.
10
Russell Hsiao. “‘War without Gunfire’: China's Intelligence War with Taiwan”, China Brief
Volume: 10 Issue: 22, 5 November 2010.
11
Yan-Chih Mo and Jimmy Chuang, “China is a threat and opportunity: Ma”, Taipei Times, 3
July 2008.
12
Office of the Secretary of Defense (DoD), Military and Security Developments Involving the
People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16
August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26.
13
Antony Funnell, “Three Perspectives on China”, ABC Radio National News
Web site, 3 July 2007, http://www.abc.net.au/rn/mediareport/stories/2007/1974183.htm
14
David Lampton, The Three Faces of Chinese Power, (Berkeley: University of California
Press, 2008),159.
15
Ibid., 224.
16
Ibid., 126.
17
“Defense ministry spokesman: China open to foreign military aid in disaster relief”, Xinhua,
June 12 2008, http://english.chinamil.com.cn/site2/special-reports/2008-
06/12/content_1321556.htm.
18
Dennis Blasko, The Chinese Army Today, (New York: Routledge, 2006), 164.
19
China Military Online, http://english.chinamil.com.cn/
20
Office of the Secretary of Defense (DoD), Military and Security Developments Involving the
People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16
August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26.
21
Office of the Secretary of Defense (DoD), Military Power of the People’s Republic of China
2009, Annual Report to Congress (Washington, DC: DoD), 16.
22
Victor Cha. Personal interview with author, Washington, D.C., 30 April 2009.

Contenu connexe

Tendances

Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)
Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)
Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)Russian Council
 
China Vs. USA
China Vs. USAChina Vs. USA
China Vs. USASajid Ali
 
Taiwan issue & sino us relations
Taiwan issue & sino us relationsTaiwan issue & sino us relations
Taiwan issue & sino us relationshindujudaic
 
U.s. foreign policy presentation
U.s. foreign policy presentationU.s. foreign policy presentation
U.s. foreign policy presentationCourtney Rowles
 
Mao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla warMao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla warBhadra Thakuri
 
USA Foreign policy Analysis
USA Foreign policy AnalysisUSA Foreign policy Analysis
USA Foreign policy AnalysisKARAKORAM
 
International relations chapter 2 non-states
International relations   chapter 2 non-statesInternational relations   chapter 2 non-states
International relations chapter 2 non-statest-MBA Digital
 
Balance Of Power
Balance Of PowerBalance Of Power
Balance Of PowerAnas ali
 
Foreign policy determinants
Foreign policy determinantsForeign policy determinants
Foreign policy determinantsKhan Zeb
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Foreign policy of the united states of america
Foreign policy of the united states of americaForeign policy of the united states of america
Foreign policy of the united states of americaSamSnipes
 
Lesson #8 post cold war era
Lesson #8 post cold war eraLesson #8 post cold war era
Lesson #8 post cold war eraJason Hauck
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview Nilendra Kumar
 
an intractable challenge: managing civil military relations after the electi...
 an intractable challenge: managing civil military relations after the electi... an intractable challenge: managing civil military relations after the electi...
an intractable challenge: managing civil military relations after the electi...ipipk
 
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICY
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICYCAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICY
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICYGeorge Dumitrache
 

Tendances (20)

Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)
Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)
Theses on Russia’s Foreign Policy and Global Positioning (2017–2024)
 
China Vs. USA
China Vs. USAChina Vs. USA
China Vs. USA
 
Taiwan issue & sino us relations
Taiwan issue & sino us relationsTaiwan issue & sino us relations
Taiwan issue & sino us relations
 
U.s. foreign policy presentation
U.s. foreign policy presentationU.s. foreign policy presentation
U.s. foreign policy presentation
 
Religious Conflict
Religious ConflictReligious Conflict
Religious Conflict
 
China after 1949.
China after 1949.China after 1949.
China after 1949.
 
Mao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla warMao tse tung a transformational leader and his guerilla war
Mao tse tung a transformational leader and his guerilla war
 
Peace and violence
Peace and violencePeace and violence
Peace and violence
 
Westphalia
WestphaliaWestphalia
Westphalia
 
USA Foreign policy Analysis
USA Foreign policy AnalysisUSA Foreign policy Analysis
USA Foreign policy Analysis
 
International relations chapter 2 non-states
International relations   chapter 2 non-statesInternational relations   chapter 2 non-states
International relations chapter 2 non-states
 
Balance Of Power
Balance Of PowerBalance Of Power
Balance Of Power
 
Foreign policy determinants
Foreign policy determinantsForeign policy determinants
Foreign policy determinants
 
International Security 3
International Security 3International Security 3
International Security 3
 
Foreign policy of the united states of america
Foreign policy of the united states of americaForeign policy of the united states of america
Foreign policy of the united states of america
 
Lesson #8 post cold war era
Lesson #8 post cold war eraLesson #8 post cold war era
Lesson #8 post cold war era
 
ISIS
ISISISIS
ISIS
 
War and Warfare - An Overview
War and Warfare - An Overview War and Warfare - An Overview
War and Warfare - An Overview
 
an intractable challenge: managing civil military relations after the electi...
 an intractable challenge: managing civil military relations after the electi... an intractable challenge: managing civil military relations after the electi...
an intractable challenge: managing civil military relations after the electi...
 
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICY
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICYCAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICY
CAMBRIDGE A2 HISTORY: TRUMAN'S CONTAINMENT POLICY
 

Similaire à China's Three Warfares strategy brief

Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareDavid Sweigert
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004Khairi Aiman
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
 
1. The constitution of the United States grants explicit powers to.docx
1. The constitution of the United States grants explicit powers to.docx1. The constitution of the United States grants explicit powers to.docx
1. The constitution of the United States grants explicit powers to.docxpaynetawnya
 
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES IN 21ST CENTURY COUNTERINSURGEN...
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES  IN 21ST CENTURY COUNTERINSURGEN...THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES  IN 21ST CENTURY COUNTERINSURGEN...
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES IN 21ST CENTURY COUNTERINSURGEN...Brett Hauenstein
 
Marine Corps Small Unit Leaders Guide To Counterinsurgency
Marine Corps Small Unit Leaders Guide To CounterinsurgencyMarine Corps Small Unit Leaders Guide To Counterinsurgency
Marine Corps Small Unit Leaders Guide To CounterinsurgencyMarine Books
 
The Military Might of China and Japan and the Future of East Asia
The Military Might of China and Japan and the Future of East AsiaThe Military Might of China and Japan and the Future of East Asia
The Military Might of China and Japan and the Future of East AsiaMario Miralles
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8John Paul Tabakian
 
USSOCOM or the Joint Staff: Who should lead the GWOT
USSOCOM or the Joint Staff: Who should lead the GWOTUSSOCOM or the Joint Staff: Who should lead the GWOT
USSOCOM or the Joint Staff: Who should lead the GWOTArie Richards
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCE
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCELEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCE
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCERupert Lescott
 
Pol 201 entire course
Pol 201 entire coursePol 201 entire course
Pol 201 entire coursePOL201
 
FN3440 Project 1 P ROJECT D ES CRIP TION .docx
FN3440 Project   1  P ROJECT D ES CRIP TION .docxFN3440 Project   1  P ROJECT D ES CRIP TION .docx
FN3440 Project 1 P ROJECT D ES CRIP TION .docxAKHIL969626
 
AY15 FS 6401 - Strategy, What is it, Why is it Difficult
AY15 FS 6401 - Strategy, What is it, Why is it DifficultAY15 FS 6401 - Strategy, What is it, Why is it Difficult
AY15 FS 6401 - Strategy, What is it, Why is it DifficultBob Poling
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Vic Artiga
 
Norris-International Relations Capstone 2016-2
Norris-International Relations Capstone 2016-2Norris-International Relations Capstone 2016-2
Norris-International Relations Capstone 2016-2Stephen Norris
 

Similaire à China's Three Warfares strategy brief (20)

Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
 
Strategic analysis-case-studies
Strategic analysis-case-studiesStrategic analysis-case-studies
Strategic analysis-case-studies
 
CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004CIA Stratergic Communication - September 2004
CIA Stratergic Communication - September 2004
 
Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...Big brother recipe for revolution By Glen Krawezyk...
Big brother recipe for revolution By Glen Krawezyk...
 
1. The constitution of the United States grants explicit powers to.docx
1. The constitution of the United States grants explicit powers to.docx1. The constitution of the United States grants explicit powers to.docx
1. The constitution of the United States grants explicit powers to.docx
 
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES IN 21ST CENTURY COUNTERINSURGEN...
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES  IN 21ST CENTURY COUNTERINSURGEN...THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES  IN 21ST CENTURY COUNTERINSURGEN...
THE FALLACY OF LEADERSHIP REMOVAL STRATEGIES IN 21ST CENTURY COUNTERINSURGEN...
 
Marine Corps Small Unit Leaders Guide To Counterinsurgency
Marine Corps Small Unit Leaders Guide To CounterinsurgencyMarine Corps Small Unit Leaders Guide To Counterinsurgency
Marine Corps Small Unit Leaders Guide To Counterinsurgency
 
The Military Might of China and Japan and the Future of East Asia
The Military Might of China and Japan and the Future of East AsiaThe Military Might of China and Japan and the Future of East Asia
The Military Might of China and Japan and the Future of East Asia
 
FINAL (full-length)
FINAL (full-length)FINAL (full-length)
FINAL (full-length)
 
Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8Tabakian Pols 7 Fall/Spring 2014 Power 8
Tabakian Pols 7 Fall/Spring 2014 Power 8
 
International Conference on Building Security Capacity
International Conference on Building Security CapacityInternational Conference on Building Security Capacity
International Conference on Building Security Capacity
 
USSOCOM or the Joint Staff: Who should lead the GWOT
USSOCOM or the Joint Staff: Who should lead the GWOTUSSOCOM or the Joint Staff: Who should lead the GWOT
USSOCOM or the Joint Staff: Who should lead the GWOT
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCE
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCELEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCE
LEARNING LESSONS THE HARD WAY - THE BRITISH ARMY'S EXPERIENCE
 
Pol 201 entire course
Pol 201 entire coursePol 201 entire course
Pol 201 entire course
 
FN3440 Project 1 P ROJECT D ES CRIP TION .docx
FN3440 Project   1  P ROJECT D ES CRIP TION .docxFN3440 Project   1  P ROJECT D ES CRIP TION .docx
FN3440 Project 1 P ROJECT D ES CRIP TION .docx
 
krav paper
krav paperkrav paper
krav paper
 
AY15 FS 6401 - Strategy, What is it, Why is it Difficult
AY15 FS 6401 - Strategy, What is it, Why is it DifficultAY15 FS 6401 - Strategy, What is it, Why is it Difficult
AY15 FS 6401 - Strategy, What is it, Why is it Difficult
 
Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...Influencing Terrorists and Their Support Base Through Information Operations ...
Influencing Terrorists and Their Support Base Through Information Operations ...
 
Norris-International Relations Capstone 2016-2
Norris-International Relations Capstone 2016-2Norris-International Relations Capstone 2016-2
Norris-International Relations Capstone 2016-2
 

Plus de Mousselmal Tarik

Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Mousselmal Tarik
 
The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfareMousselmal Tarik
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-unionMousselmal Tarik
 
Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Mousselmal Tarik
 
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Mousselmal Tarik
 
Cia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyCia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyMousselmal Tarik
 
Night For Life Dossier De Presse
Night For Life   Dossier De PresseNight For Life   Dossier De Presse
Night For Life Dossier De PresseMousselmal Tarik
 
Les Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageLes Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageMousselmal Tarik
 
Les Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerLes Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerMousselmal Tarik
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationEiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationMousselmal Tarik
 

Plus de Mousselmal Tarik (20)

Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
 
The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfare
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union
 
Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)
 
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
 
Information as power
Information as power  Information as power
Information as power
 
Cia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyCia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topography
 
Stolen iPad CNN
Stolen iPad CNN Stolen iPad CNN
Stolen iPad CNN
 
Night For Life Dossier De Presse
Night For Life   Dossier De PresseNight For Life   Dossier De Presse
Night For Life Dossier De Presse
 
Les Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageLes Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise Image
 
99 Tips E Version
99 Tips E Version99 Tips E Version
99 Tips E Version
 
Les Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerLes Echos 2009 Alvin Toffler
Les Echos 2009 Alvin Toffler
 
Right Ear
Right EarRight Ear
Right Ear
 
Twitter- Cyxymu
Twitter- CyxymuTwitter- Cyxymu
Twitter- Cyxymu
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationEiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
 
health is a new health
health is a new healthhealth is a new health
health is a new health
 
Pharell Vs Mcdonald's
Pharell Vs Mcdonald'sPharell Vs Mcdonald's
Pharell Vs Mcdonald's
 
Pharell Vs Mcdonald's
Pharell Vs Mcdonald'sPharell Vs Mcdonald's
Pharell Vs Mcdonald's
 

Dernier

wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
convolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfconvolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfSubhamKumar3239
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 

Dernier (20)

Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
convolutional neural network and its applications.pdf
convolutional neural network and its applications.pdfconvolutional neural network and its applications.pdf
convolutional neural network and its applications.pdf
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 

China's Three Warfares strategy brief

  • 1. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  1 China’s Three Warfares By Timothy A. Walton Delex Consulting, Studies, and Analysis
  • 2. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  2 The Delex Consulting, Studies and Analysis (CSA) Division of Delex Systems, Inc. provides our government, industry, and international partners with expert assistance in strategic and operational planning and analysis. In order to facilitate a better understanding of leading concepts and viewpoints in China, Delex CSA has prepared the following Special Report brief on China’s Three Warfares. An electronic copy of the report may be found at the Delex Special Reports archive: http://www.delex.com/sol_CSA_SR.aspx. Any questions related to this topic may be addressed to Director Bryan McGrath (bmcgrath@delex.com). Associate Timothy A. Walton contributed to the translation and analysis of this work. Delex CSA http://www.delex.com/sol_CSA.aspx.
  • 3. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  3 China’s Three Warfares Addressed by Chief of Naval Operations Greenert On the 10th of January 2012, the Center for a New American Security (CNAS) released a report examining the future of U.S. strategy in the South China Sea.1 The report rollout event at the Willard Intercontinental Hotel featured a keynote address by Admiral Jonathan Greenert, Chief of Naval Operations (CNO), followed by a panel discussion chaired by Richard Danzig, former Secretary of the Navy, and including Singapore’s Ambassador to the United States Chan Heng Chee, and report co-authors Dr. Patrick M. Cronin, Senior Director of CNAS’ Asia-Pacific Security Program, and Mr. Robert D. Kaplan, a senior fellow at CNAS. In addition to presenting his Sailing Directions and elucidating the Navy’s forward deployed status, CNO Greenert discussed in his keynote address efforts to increase integration with regional partners and allies.i During the question period, Dr. Stefan Halper a Senior Fellow in the Department of Politics and International Studies at the University of Cambridge, asked the CNO for his thoughts on China’s Three Warfares and possible reactions to it. The CNO responded that Three Warfares “is difficult and doesn't align directly with how we do business” and supported the use of international protocols in “continuing the debate” with the Chinese. Consistent with the CNO’s efforts to acknowledge the concept, this Special Report draws attention to China’s Three Warfares. Drawing from the work of various experts and sources, this Special Report also builds on a more in-depth journal article prepared for Defense Concepts by its author, Timothy A. Walton.ii The Special Report summarizes Three Warfares and U.S. government attention brought to bear on it, ordinates the concept’s place in Chinese military theory, explains the concept’s three components (using case studies), and evaluates the prospects for Three Warfares’ employment and effectiveness. i Delex CSA Current Issues Brief (CIB) No. 46 “CNAS Report on U.S. Strategy in South China Sea” covered the report and its rollout, including the CNO’s remarks. An electronic copy of the CIB may be found at the Delex CIB archive: http://delex.com/sol_CSA_CIB.aspx. ii Walton, Timothy A. “Treble Spyglass, Treble Spear: China’s Three Warfares.” Defense Concepts 4.4 (2010): 49- 67.
  • 4. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  4 A Summary of Three Warfares In 2003, the Chinese Communist Party (CCP) Central Committee and the Central Military Commission (CMC) approved the concept of “Three Warfares” (san zhong zhanfa, 三种战法), a People’s Liberation Army (PLA) information warfare concept aimed at preconditioning key areas of competition in its favor.iii As defined by the U.S. Department of Defense (DOD) in its 2011 Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China, Three Warfares consists of the following:2 • Psychological Warfare seeks to undermine an enemy’s ability to conduct combat operations through operations aimed at deterring, shocking, and demoralizing enemy military personnel and supporting civilian populations. • Media Warfare is aimed at influencing domestic and international public opinion to build support for China’s military actions and dissuade an adversary from pursuing actions contrary to China’s interests. • Legal Warfare uses international and domestic law to claim the legal high ground or assert Chinese interests. It can be employed to hamstring an adversary’s operational freedom and shape the operational space. Legal warfare is also intended to build international support and manage possible political repercussions of China’s military actions. Over the past two decades, the PLA’s organizational structure, training, and equipment have dramatically improved. Less visible but equally important improvements in coordinated force enabling concepts seek to maximize the effectiveness of the PLA’s threat or use of force. Notable among these concepts is Three Warfares. In 2008, the findings of the U.S. Department of State’s (DOS) International Security Advisory Board report, headed by former Deputy Secretary of Defense Paul Wolfowitz, were made public. Among other recommendations, the authors of the report maintained that “it is essential that the U.S. better understand and effectively respond to China’s comprehensive approach to strategic rivalry, as reflected in its official concept of Three Warfares. If not countered, Beijing […] can precondition key areas of strategic competition in its favor.”3 Furthermore, in its 2009, 2010, and 2011 annual reports on the military power of China, DOD has noted the development of Three Warfares. However, the U.S. has taken little action to counter or mitigate the effects of this adversarial concept. Three Warfares as Part of Information Warfare The PLA’s operational hierarchy of combat consists of three major levels: “war (zhanzheng); campaigns (zhanyi); and battles (zhandou), each of which is informed, respectively, by a distinct level of operational guidance—namely strategy (zhanlue); campaign methods (zhanyi fangfa; usually contracted as zhanfa) and tactics (zhanhu).”4 Three Warfares (sanzhong zhanfa) can be iii The Central Military Commission (CMC) is responsible for issuing directives for operational guidance.
  • 5. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  5 identified primarily as a campaign method with secondary, mostly strategic but also tactical, applications. The PLA’s operational guidance document Regulation on the Political Work stipulates it is “a reinforcement of political work in terms of media warfare, psychological warfare, and legal warfare.” 100 Case Studies for Each Type of the Triple Warfare, published by the PLA in January 2005, serves as a corroborating supplement to the document.5 Information warfare has assumed a central role in Chinese military writings over the past decade. Achieving information superiority is seen as the precondition for achieving and maintaining battlefield supremacy. Information warfare also “greatly emphasizes the concept of ‘gaining mastery by striking first.’”6 In fact, some Chinese writings suggest that successful information operations require striking first electronically or kinetically. Three Warfares follows this vein of thinking as a peacetime and wartime information warfare first strike aimed at maximizing the effects of the threat or use of military force. Psychological Warfare Although recently popularized as part of Three Warfares, psychological warfare (xinlizhan) is deeply rooted in classical Chinese strategy. Modern psychological operations concepts are normally aimed at the adversary’s morale (shiqi), and employ a multitude of components including television, radio broadcasts, loudspeakers, leaflets, and calculated military operations. Conventional deterrence, as part of psychological warfare, would not only involve military components, though, but also involve whole of government political, economic, and diplomatic components. Retired U.S. Army Lieutenant Colonel Dennis Blasko explains: “Political signals may be sent through (1) public or private diplomacy at international organizations, such as the United Nations, and/or directly to other governments or persons; (2) the use of the Chinese and foreign media in official statements or “opinion pieces” written by influential persons; (3) non-military actions, such as restrictions on travel or trade; or (4) by using military demonstrations, exercises, deployments, or tests, which do not involve the use of deadly force.”7 Beyond the scope of traditional strategic communications or force signaling, the new Psychological Warfare appears to aim for a high degree of precision in targeting critical nodes (guanjie) to achieve nonlinear effects. Specifically, the enemy’s motivation and willingness to wage war could be targeted, by eliminating opposing leadership, diminishing international support, undercutting military capabilities, affecting the economy, or sowing domestic political dissent. An example of targeted, economic-based Psychological Warfare occurred during the 2010 Senkaku Boat Collision Incident. On 22 September 2010, in response to Japan’s arresting the captain and crew of a Chinese trawler in a territorial dispute, China enacted a two-month unofficial ban on exports of rare earths to Japan. Shortly thereafter, Japan released both the trawler’s crew and captain. In China the event was perceived as a Chinese diplomatic victory, while in Japan the government’s acquiescence received rebuke. This use of China’s “strategic natural resource” demonstrated the precise, coercive effect of affecting an adversary’s economy.
  • 6. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  6 Target Taiwan Taiwan, or the Republic of China (ROC) to be more precise, is the primary target of PLA Psychological Warfare. Newly re-elected President Ma Ying-jeou is pursuing a policy of rapprochement with the People’s Republic of China (PRC). His policies have decreased the short-term likelihood of armed conflict in the Taiwan Straits. However, critics simultaneously contend that he may be weakening the mission of the ROC military. Thus, he could face the challenge of maintaining a credible defense force and a credible commitment to use it if necessary. Chinese writings posit that during peacetime, psychological operations seek to “reveal and exploit” divisions in the enemy’s domestic political establishment or alliance system and cast doubt on the enemy’s value concepts (jiazhi gainian).8 In 1997, the Chinese General Staff Department and General Political Department “reportedly formed a special unit to examine methodologies to spark a ‘soldiers movement’ (bingyun) to sap gradually the morale of ROC’s armed forces and reduce confidence of the Taiwanese people in its military.” More recently, PLA journals alleged that during the pro-independence overtures of the Chen Shui-bian administration, “officers and men [in the Taiwanese ranks] were in ideological chaos, shaken in their faith and confused about ‘just who and what they are fighting for.’”9 More recently, a series of high profile espionage cases in which Taiwanese military and intelligence officers spied for China have shocked the media and sparked concerns over deficiencies in Taiwan’s intelligence apparatus.10 By presiding over the graduation ceremonies of the five ROC military schools in July 2008, President Ma demonstrated his awareness of the situation and desire to instill confidence in the armed forces. His speech to the cadets included the following lines: “Some of you may wonder whether China is our friend or foe. What you should do is to help us build a strong military force and be prepared for war. Only by being prepared for war can we prevent it. Taiwan will not seek war, but we will not avoid or fear wars, either.”11 Taiwan’s first Quadrennial Defense Review (QDR), issued in March of 2009 by the Ministry of National Defense, identified the “three-front war” by China—legal, media, and psychological warfare as a threat to the defense of the country. Furthermore, in planning its “Hard ROC” defense strategy, the QDR called for “realizing an all-out (general civilian mobilization) defense” as an important measure for preventing war. Such actions aim to bolster the perceived weak or shallow morale of Taiwanese citizens. Overall, the Ma administration has developed nuanced communications in seeking to improve relations with the PRC while also improving the ROC’s defenses. The PLA is evaluating and debating coercive strategies, which would be part of Psychological Warfare to take advantage of the perceived weakened morale and unity of the ROC’s military and government. Through psychological warfare tactics including the electronic transmission of media, undercutting dialogue with elements of the ROC government, etc., the PLA aims to seize and maintain the political initiative before and during military campaigns. Independent of the method of the campaign, some PRC observers posit that the ROC will, after a 48-hour
  • 7. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  7 psychological and limited military campaign, not only agree to initiate unification talks, but also acquiesce to PRC terms. Whether or not such a scenario would materialize holds broad implications not only for Taiwan, but for intervening states as well—the U.S. in particular. If Taiwan swiftly loses political confidence and capitulates to Chinese demands, then U.S. forces sent to signal U.S. commitment to stability in the region or actively stop Chinese coercion would arrive too late to assist in the defense of the island. Clearly, the PLA views Psychological Warfare as an essential element of its operational level of warfare, employing it in concert with other Warfares and using the expectations of success created through it to guide the development of plans to achieve strategic effects. Media Warfare As part of the Three Warfares, Media Warfare is “aimed at influencing domestic and international public opinion to build support for China’s military actions and dissuade an adversary from pursuing actions contrary to China’s interests.”12 Domestically, PLA planners seek to control domestic information access and generate propaganda to guide public opinion and thus present a ‘united front’ among the intelligentsia, common citizens, and the CCP. Over the past few decades, China has adopted more sophisticated Media Warfare methodologies. In particular, China has incorporated methods of mass persuasion from the Western world, including political public relations, theories of mass communication, and individual and group psychology.13 Foreign Media Warfare efforts have also become more sophisticated. Foreign Media Warfare efforts have also sought to improve China’s international media voice in an effort to surmount the perceived Western information hegemony. As stated by the People’s Daily, the United States not only possesses political and military hegemony, but also media and cultural hegemony. In its view, the ‘soft strength’ of Western news media far surpasses its economic ‘hard strength.’14 Since the 1990s, improved targeting of prominent foreign elites, journalists, military personnel, and public relations firms has sought to “use foreigners as a bridge” (yiqiao weiqiao) to promote China and convey Chinese messages.15 The government has improved the entertainment quality of CCTV, co-opted popular, formerly private TV channels, sought to develop an alternative cultural vision outside the Western model through cultural media subsidization, and by establishing the infrastructure for a global mass communication system by deploying necessary communications links such as satellites and fiber optic cables, by broadcasting CCTV in foreign languages, and by providing Chinese media content to foreign national media providers. The most important lobbyists for China and target audience of foreign propaganda are likely Overseas Chinese, people of Chinese ancestry who are not living in the PRC or ROC. Overall, China aims to create ideational power that grows increasingly attractive to citizens of the world in general and Overseas Chinese in particular. With Overseas Chinese, China seeks to leverage its notion of a transnational culture. Transnational culture, the idea of a common ethnic Chinese people, supports Chinese public diplomacy and espionage operations throughout the world in ethnic Chinese communities, university campuses, and cultural centers such as the Confucius Institutes.
  • 8. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  8 Media Warfare, Nationalism, and Self-Binding Regime legitimacy in China rests on bourgeoning economic growth and nationalism. Media sources cater to the nationalistic desires of the people, but also whet their desires with rich programming content that antagonistically portrays the U.S. and its allies. In his book, The Three Faces of Chinese Power, David Lampton recalls conversations with Foreign Ministry diplomats in which they speak of their online interactions with nationalistic citizens who allege the Ministry does not represent China’s interests forcefully enough.16 Due to this sentiment, the Foreign Ministry argues it must play two-level games with domestic citizens and foreign governments. While the claim is likely true to a large degree, the possibility also exists that exaggerating the influence of such nationalist movements or fueling them provides a form of positive “selfbinding” for China in negotiations. In this manner, stoked nationalism could precondition negotiations in China’s favor, allowing Chinese officials to argue in negotiations with the U.S. or other states that they cannot fulfill obligations or requests or that their regime survival might be at stake. Media Warfare, Transparency, and Deception On 18 May 2008, the Ministry of National Defense gave, for the first time, a public press briefing at the Chinese Ministry of Defense.17 Senior Colonel Hu Changming, the PLA's first spokesman, provided details of the military's role in rescue and relief efforts in the aftermath of the 12 May Sichuan earthquake. Increasingly confident, the Ministry of National Defense now holds regular press conferences and seeks to influence the international media discourse.iv Furthermore, the PLA routinely sends “significant media teams to cover the efforts and inform the population of the PLA’s, PAP’s, and militia’s work in non-traditional security missions.”18 Among other missions, the international naval review, in celebration of the 60th anniversary of the founding of the PLA Navy on April 23rd, was an effort to liberalize the PLA’s public relations image to the world. It not only demonstrated Chinese prestige to its own citizens, but was highly oriented toward foreign consumption by portraying a strong, friendly, and transparent force. Other efforts included the launching of an official PLA English website titled “China Military Online.” It now features a series of regularly updated news articles, fact sheets, photographs, and videos. It claims to offer a “window on Chinese armed forces” and to demonstrate how China’s military is “open and transparent.”19 Despite these overtures, the PLA fundamentally lacks transparency or openness, systematically underreporting both the cost and allocation of its budget. Moreover, Media Warfare operations stress the supposedly nascent state of PLA capabilities and publicly deny capabilities such as cyber-espionage. A high profile example of this took place 18 May 2011 when the PLA Chief of General Staff Chen Bingde delivered an address at the U.S. National Defense University. General Chen contended, as predecessors and colleagues of his have consistently argued over the past couple decades, there “still exists a 20 year gap between equipment and weaponry between iv Delex CSA Special Report #2, Special Report on the Translation of Yang Yi Article on AirSea Battle, includes coverage of a Ministry of National Defense press conference during which Defense Ministry spokesman Senior Colonel Geng Yansheng (耿雁生) criticized the U.S. AirSea Battle concept. An electronic copy of the report may be found at the Delex Special Reports archive: http://www.delex.com/sol_CSA_SR.aspx.
  • 9. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  9 the US and China.”v This practice of deception supports Media Warfare’s aim of influencing foreign actors’ perceptions of the PLA. Whether such a policy of deception will change with greater Chinese confidence in PLA capabilities remains to be seen. Regardless, the role of Media Warfare is likely to continue to grow as China seeks a more prominent international media voice. Legal Warfare Legal warfare “uses international and domestic law to claim the legal high ground or assert Chinese interests”20 In particular, legal war seeks to legitimize Chinese policies while sometimes undercutting the authority or justification of enemy reactions. Legal Warfare is not necessarily revisionist to the legal system itself; instead, it may aim to gradually set a new precedent or a fait accompli situation backed by legal authority. In general, China solely conducts contemporary external security operations under the mandate of U.N. resolutions. This was evidenced when China waited for U.N. Security Council Resolution 1851 before sending maritime forces December 26, 2008 to combat pirates. Similarly, China only participates in U.N.-sanctioned peacekeeping operations. Even in foreign policy trouble spots for China, such as Sudan, China’s peacekeeping presence is backed by a U.N. mandate. This is consistent with the long-standing PRC position on noninterference in the internal affairs of other countries. China has used the concept of Legal Warfare in territorial disputes in the South China Sea. The coordinated efforts of legal experts and maritime forces aim to “shape international opinion and interpretation of the UN Convention on the Law of the Sea away from long-accepted norms of freedom of navigation and territorial limits toward increased sovereign authority out to the 200 nautical mile Exclusive Economic Zone, the airspace above it, and possibly outer space.”21 Professor Peter Dutton of the U.S. Naval War College has thoroughly examined China’s legal warfare in the South China Sea in a recent Naval War College Review paper.vi Over the past decade, military confrontations between the U.S. and China have exhibited significant international law components, with China justifying its position in the context of or lack of international law. Incidents include the March 4-8, 2009 harassment of U.S. (Surveillance Towed Array Sensor System) SURTASS vessels (USNS Impeccable and USNS Victorious), 2006 and 2007 Chinese testing of directed energy and kinetic anti-satellite systems, and the April 1, 2001 collision of a Chinese J-8 with a U.S. EP-3E. In the future, Chinese Legal Warfare could provide advantages in areas such as treaties regulating or abolishing the emplacement of weapons in space, or the fielding of anti-satellite systems. Overall, Chinese interpretation of the U.N. Convention on the Law of the Sea emphasizes that it strengthens stated sovereignty and denies unauthorized access to foreign militaries. v Delex CSA Current Issues Brief (CIB) No. 34 “PLA Chief of General Staff Chen Bingde’s Visit to NDU” covered General Chen’s presentation. An electronic copy of the CIB may be found at the Delex CIB archive: http://delex.com/sol_CSA_CIB.aspx. vi Peter Dutton, “Three Disputes and Three Objectives: China and the South China Sea”, Naval War College Review, Autumn 2011, Vol. 64, No. 4, http://www.usnwc.edu/getattachment/feb516bf-9d93-4d5c-80dc- d5073ad84d9b/Three-Disputes-and-Three-Objectives--China-and-the.
  • 10. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  10 Additionally, legal warfare has been used to support economic coercion, urging foreign companies against investing in certain Taiwanese companies with the threat of losing business in the PRC. Furthermore, longstanding efforts to portray the U.S. as a non-Asian power incorporate legal elements through the fostering of mechanisms and apparatuses that solely involve ASEAN+3 states (Association of Southeast Asian States plus China, Russia, and Korea).22 In short, through specific policies and the advocacy of general architectures, legal warfare seeks to legitimize Chinese actions while delegitimizing adversaries’ actions. Anti-Secession Law: A Combined Case Study On the 8th of March 2005 the National People's Congress passed the Anti-Secession Law (ASL), which stipulated: "If possibilities for a peaceful reunification should be completely exhausted, the state shall employ non-peaceful means and other necessary measures to protect China's sovereignty and territorial integrity." The law served three functions. First, it was seen as a deterrent act against Taiwanese “splittists.” Second, it domestically strengthened and justified the role of the security apparatus. Third, the law provided a legal, self-binding foundation for the Chinese position on the problem of the Strait. Similar to the manner in which U.S. diplomats cite the Taiwan Relations Act and the autonomy of members of the U.S. Congress in making pronouncements and passing legislation, Chinese leaders can now fall back to the ASL to justify their actions during negotiations. David Huang, a member of Taiwan’s Mainland Affairs Council, which energetically protested the law, identified five stages of China’s Three Warfares in the ASL: 1. Setting agenda and repeating messages (media) 2. Creating pressures on the government (psychological) 3. Undermining the government’s public authority (legal) 4. Generating the “chilling effect” by rewarding cooperators and punishing defectors (psychological) 5. Denying Taiwan’s sovereign status by isolating it (legal) As the case demonstrates, Three Warfares achieves ideal effects through the combined application of the Three Warfares’ elements, skillful statesmanship, and a credible military force. These long-term efforts by China are viewed by the Chinese leadership as a slow but sure strategy for achieving reunification with Taiwan. Commensurately, Three Warfares must be viewed through the paradigm of Chinese perception of past successes with brinkmanship and pedagogical conflicts such as the Sino-Indian War and Sino-Vietnamese War. This perception reinforces the appeal of a structured, methodical strategy that can achieve specific, almost scientific effects. Hence, Chinese leaders must avoid overconfidence and possible miscalculation in assessing their agent capabilities.
  • 11. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  11 “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.” -Sun Tzu Prospects for Three Warfares Three Warfares can be primarily identified as a campaign method with secondary, mostly strategic but also tactical, applications. By itself, it is unlikely to achieve significant strategic goals. Indeed, Three Warfares will probably not “subdue the enemy without fighting.” However, the combined employment of Three Warfares with credible PLA forces as part of established operational guidance is likely to achieve significant nonlinear effects. Integrated not only into military campaigns, but China’s larger strategy regarding other applications of power, its relevance will likely continue to grow. Coordinated Three Warfares efforts aim to dexterously support China’s position in regard to Asian security issues, while undercutting those of adversaries. The dedication of Three Warfares’ methods against the ROC constitutes the focal point of the method, incorporating psychological, media, and legal warfare to support a long-term pacific, but if necessary swift and bellicose, reunification. The increasing relevance of Three Warfares merits continued attention by Western analysts seeking to understand how China will aim to shape, approach, and succeed in various situations. As both a guiding paradigm and operational method, the unity of effort brought about by Three Warfares will further PLA analysis of conditions and questions regarding the use of force.
  • 12. Consulting Studies and Analysis   18 January 2012 Delex Special Report-3 Brief on China’s Three Warfares Prepared by Delex Systems, Inc.  12 Endnotes 1 Cooperation from Strength Report Website, CNAS, 10 January 2012, http://www.cnas.org/node/7432. 2 Office of the Secretary of Defense (DoD), Military and Security Developments Involving the People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16 August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26. 3 U.S. Department of State. 2008. China’s Strategic Modernization. International Security Advisory Board, 2. 4 James Mulvenon, China’s Revolution in Doctrinal Affairs, (Alexandria: CNA Corporation, 2005), 22. 5 David W.F. Huang. “China’s Triple Warfare And Cross-Strait Economic Interactions.”, Mainland Affairs Council, Taiwan, 5 May 2007, http://www.docstoc.com/docs/654256/Chinas-Triple-Warfare-And-Cross-Strait-Economic- Interactions. 6 Roger Cliff, Entering the Dragon's Lair, (Santa Monica: Rand Corp., 2007), 64. 7 Dennis Blasko, Personal correspondence via email with author, 2 May 2009. 8 Mark Stokes, “The Chinese Joint Aerospace Campaign: Strategy, Doctrine, and Force Modernization”, in China’s Revolution in Doctrinal Affairs, ed. James Mulvenon and David Finkelstein, (Alexandria: CNA Corporation, 2005), 272. 9 Ibid., 283. 10 Russell Hsiao. “‘War without Gunfire’: China's Intelligence War with Taiwan”, China Brief Volume: 10 Issue: 22, 5 November 2010. 11 Yan-Chih Mo and Jimmy Chuang, “China is a threat and opportunity: Ma”, Taipei Times, 3 July 2008. 12 Office of the Secretary of Defense (DoD), Military and Security Developments Involving the People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16 August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26. 13 Antony Funnell, “Three Perspectives on China”, ABC Radio National News Web site, 3 July 2007, http://www.abc.net.au/rn/mediareport/stories/2007/1974183.htm 14 David Lampton, The Three Faces of Chinese Power, (Berkeley: University of California Press, 2008),159. 15 Ibid., 224. 16 Ibid., 126. 17 “Defense ministry spokesman: China open to foreign military aid in disaster relief”, Xinhua, June 12 2008, http://english.chinamil.com.cn/site2/special-reports/2008- 06/12/content_1321556.htm. 18 Dennis Blasko, The Chinese Army Today, (New York: Routledge, 2006), 164. 19 China Military Online, http://english.chinamil.com.cn/ 20 Office of the Secretary of Defense (DoD), Military and Security Developments Involving the People’s Republic of China 2011, Annual Report to Congress (Washington, DC: DoD, 16 August 2011), http://www.defense.gov/pubs/pdfs/2011_CMPR_Final.pdf, 26. 21 Office of the Secretary of Defense (DoD), Military Power of the People’s Republic of China 2009, Annual Report to Congress (Washington, DC: DoD), 16. 22 Victor Cha. Personal interview with author, Washington, D.C., 30 April 2009.