Max Boot: China's Stealth War With US

Annie

Diamond Member
Nov 22, 2003
50,848
4,827
1,790
Looking towards the future:

http://www.latimes.com/news/opinion...,6226256.column?coll=la-news-comment-opinions
China's stealth war on the U.S.
Max Boot

July 20, 2005

Maj. Gen. Zhu Chenghu of the Chinese People's Liberation Army caused quite a stir last week when he threatened to nuke "hundreds" of American cities if the U.S. dared to interfere with a Chinese attempt to conquer Taiwan.

This saber-rattling comes while China is building a lot of sabers. Although its defense budget, estimated to be as much as $90 billion, remains a fraction of the United States', it is enough to make China the world's third-biggest weapons buyer (behind Russia) and the biggest in Asia. Moreover, China's spending has been increasing rapidly, and it is investing in the kind of systems — especially missiles and submarines — needed to challenge U.S. naval power in the Pacific.

The Pentagon on Tuesday released a study of Chinese military capabilities. In a preview, Defense Secretary Donald Rumsfeld told a Singapore audience last month that China's arms buildup was an "area of concern." It should be. But we shouldn't get overly fixated on such traditional indices of military power as ships and bombs — not even atomic bombs. Chinese strategists, in the best tradition of Sun Tzu, are working on craftier schemes to topple the American hegemon.

In 1998, an official People's Liberation Army publishing house brought out a treatise called "Unrestricted Warfare," written by two senior army colonels, Qiao Liang and Wang Xiangsui. This book, which is available in English translation, is well known to the U.S. national security establishment but remains practically unheard of among the general public.

"Unrestricted Warfare" recognizes that it is practically impossible to challenge the U.S. on its own terms.
No one else can afford to build mega-expensive weapons systems like the F-35 Joint Strike Fighter, which will cost more than $200 billion to develop. "The way to extricate oneself from this predicament," the authors write, "is to develop a different approach."

Their different approaches include financial warfare (subverting banking systems and stock markets), drug warfare (attacking the fabric of society by flooding it with illicit drugs), psychological and media warfare (manipulating perceptions to break down enemy will), international law warfare (blocking enemy actions using multinational organizations), resource warfare (seizing control of vital natural resources), even ecological warfare (creating man-made earthquakes or other natural disasters).

Cols. Qiao and Wang write approvingly of Al Qaeda, Colombian drug lords and computer hackers who operate outside the "bandwidths understood by the American military." They envision a scenario in which a "network attack against the enemy" — clearly a red, white and blue enemy — would be carried out "so that the civilian electricity network, traffic dispatching network, financial transaction network, telephone communications network and mass media network are completely paralyzed," leading to "social panic, street riots and a political crisis." Only then would conventional military force be deployed "until the enemy is forced to sign a dishonorable peace treaty."

This isn't just loose talk. There are signs of this strategy being implemented.
The anti-Japanese riots that swept China in April? That would be psychological warfare against a major Asian rival. The stage-managed protests in 1999, after the U.S. accidentally bombed the Chinese Embassy in Belgrade, fall into the same category.

The bid by the state-owned China National Offshore Oil Co., to acquire Unocal? Resource warfare. Attempts by China's spy apparatus to infiltrate U.S. high-tech firms and defense contractors? Technological warfare. China siding against the U.S. in the U.N. Security Council over the invasion of Iraq? International law warfare. Gen. Zhu's threat to nuke the U.S.? Media warfare.

And so on. Once you know what to look for, the pieces fall into place with disturbing ease. Of course, most of these events have alternative, more benign explanations: Maybe Gen. Zhu is an eccentric old coot who's seen "Dr. Strangelove" a few too many times.

The deliberate ambiguity makes it hard to craft a response to "unrestricted warfare." If Beijing sticks to building nuclear weapons, we know how to deal with that — use the deterrence doctrine that worked against the Soviets. But how do we respond to what may or may not be indirect aggression by a major trading partner? Battling terrorist groups like Al Qaeda seems like a cinch by comparison.

This is not a challenge the Pentagon is set up to address, but it's an urgent issue for the years ahead.

Max Boot is a senior fellow at the Council on Foreign Relations.
 
Keep their own people in the dark, while using our companies against us and their people:

http://www.washingtonpost.com/wp-dyn/content/article/2005/07/19/AR2005071901556.html



Let a Thousand Filters Bloom

By Anne Applebaum

Wednesday, July 20, 2005; Page A23

In 1949, when George Orwell wrote his dystopian novel "1984," he gave its hero, Winston, a job at the Ministry of Truth. All day long, Winston clips politically unacceptable facts, stuffs them into little pneumatic tubes, and then pushes the tubes down a chute. Beside him sits a woman in charge of finding and erasing the names of people who have been "vaporized." And their office, Orwell wrote, "with its fifty workers or thereabouts, was only one sub-section, a single cell, as it were, in the huge complexity of the Records Department."

It's odd to read "1984" in 2005, because the politics of Orwell's vision aren't outdated. There are still plenty of governments in the world that go to extraordinary lengths to shape what their citizens read, think and say, just like Orwell's Big Brother. But the technology envisioned in "1984" is so -- well, 1980s. Paper? Pneumatic tubes? Workers in cubicles? Nowadays, none of that is necessary: It can all be done electronically, especially if, like the Chinese government, you seek the cooperation of large American companies.


Without question, China's Internet filtering regime is "the most sophisticated effort of its kind in the world," in the words of a recent report by Harvard Law School's Berkman Center for Internet and Society. The system involves the censorship of Web logs, search engines, chat rooms and e-mail by "thousands of public and private personnel." It also involves Microsoft Inc., as Chinese bloggers discovered last month. Since early June, Chinese bloggers who post messages containing a forbidden word -- "Dalai Lama," for example, or "democracy" -- receive a warning: "This message contains a banned expression, please delete." It seems Microsoft has altered the Chinese version of its blog tool, MSN Spaces, at the behest of Chinese government. Bill Gates, so eloquent on the subject of African poverty, is less worried about Chinese free speech.

But he isn't alone: Because Yahoo Inc. is one of several companies that have signed a "public pledge on self-discipline," a Yahoo search in China doesn't turn up all of the (politically sensitive) results. Cisco Systems Inc., another U.S. company, has also sold hundreds of millions of dollars of equipment to China, including technology that blocks traffic not only to banned Web sites, but even to particular pages within an otherwise accessible site.

Until now, most of these companies have defended themselves on the grounds that there are side benefits -- a Microsoft spokesman has said that "we're helping millions of people communicate, share stories, share photographs and build relationships" -- or on the grounds that they can't control technology anyway. A Cisco spokesman told me that this is the "same equipment technology that your local library uses to block pornography," and besides, "we're not doing anything illegal."

But as U.S. companies become more deeply involved in China, and as technology itself progresses, those lines may begin to sound weaker. Over the past couple of years, Harry Wu, a Chinese human rights activist and former political prisoner, has carefully tracked Western corporate cooperation with Chinese police and internal security, and in particular with a Chinese project called "Golden Shield," a high-tech surveillance system that has been under construction for the past five years. Although the company won't confirm it, Wu says, Cisco representatives in China have told him that the company has contracts to provide technology to the police departments of at least 31 provinces. Some of that technology may be similar to what the writer and former businessman Ethan Gutmann describes in his recent book, "Losing the New China: A Story of American Commerce, Desire and Betrayal." Gutmann -- whose account is also bitterly disputed by Cisco ("He's getting a lot of press out of this," complained the spokesman) -- claims to have visited a Shanghai trade fair where Cisco was advertising its ability to "integrate judicial networks, border security, and vertical police networks" and more generally its willingness to build Golden Shield.

If this isn't illegal, maybe it should be. After the Tiananmen Square massacre in 1989, the United States passed a law prohibiting U.S. firms from selling "crime control and detection" equipment to the Chinese. But in 1989, the definition of police equipment ran to truncheons, handcuffs and riot gear. Has it been updated? We may soon find out: A few days ago, Rep. Dan Burton of the House Foreign Relations Committee wrote a letter to the Commerce Department asking exactly that. In any case, it's time to have this debate again. There could be other solutions -- such as flooding the Chinese Internet with filter-breaking technology.

Beyond legality, of course, there's morality. And here the judgment of history will prove more important than whatever Congress does or does not do today. Sixty years after the end of World War II, IBM is still battling lawsuits from plaintiffs who accuse the company of providing the "enabling technologies" that facilitated the Holocaust. Sixty years from now, will Microsoft, Cisco and Yahoo be doing the same?

[email protected]
 

Forum List

Back
Top