the dragon awakes %22master thesis%22
TRANSCRIPT
1
The Dragon Awakes: China, the United States and the New Cold War
A Master Thesis
Submitted to the Faculty
of
American Military University
by
Brian Curtis Moody
In Partial Fulfillment of the
Requirements for the Degree
of
Master of Arts
February 2016
American Military University
Charles Town, WV
2
The author hereby grants the American Public University System the right to display
these contents for educational purposes.
The author assumes total responsibility for meeting the requirements set by United States
copyright law for the inclusion of any materials that are not the author’s creation or in the
public domain.
© Copyright 2015 by Brian Curtis Moody
All Rights Reserved.
3
Dedication
I dedicate this thesis to my loving wife. Without her never ending support and
constant belief in me this project and long-term goal would have never been realized, and
to my children who have been patient and understanding while daddy does his
“homework”.
4
Acknowledgements
I wish to thank and acknowledge all the dedicated and superior staff at American
Military University and to thank Dr. Paul Medhurst who guided me through this process
and gave excellent advice helping to refine my topic. The professors within the
Intelligence Studies program have been consummate professionals who have given me
the tools to succeed within the Intelligence Community.
5
Abstract of the Thesis
The Dragon Awakes: China, the United States and the New Cold War
by
Brian Curtis Moody
American Military University, December 6, 2015
Charles Town, West Virginia
Professor Dr. Paul Medhurst, Thesis Professor
This paper examines the rising tensions between the Chinese and United States
government and to determine if the tension between the two governments has escalated to
a Cold War status. It will advance the study within the region and it will outline
possibilities the U.S can take in regards to responding to the Chinese threat. Qualitative
methods are used to explore two primary models and theories in the International
Relations theory. These models will assist in the determination of the papers hypothesis.
The findings of this paper will demonstrate that tension has risen in the area of the South
China Sea with the potential risk of a military conflict high. Espionage between the two
countries is conducted in the realm of cyberspace and these attacks occur daily with an
increase in severity. Economic tensions remain high and these tensions will be outlined in
the paper. These arguments will help support the papers conclusion that tensions between
the Chinese and United States will continue to rise and may escalate into a wider conflict.
6
Table of Contents
Chapters Pages
Introduction………………………………………………………………………7
History of U.S. Foreign Policy in Asia……………………………………7
Current Conflict………………………………………………………….10
Literature Review………………………………………………………………12
Historical Conflicts………………………………………………………12
Military Modernization and Cyber Capabilities…………………………16
Economic Issues…………………………………………………………22
Methodology…………………………………………………………………….26
Identification of Independent and Dependent Variables………………...26
International Relations Theory…………………………………………..28
Study Limitations and Bias………………………………………………31
Findings…………………………………………………………………………32
The Modernization of the People’s Liberation Army and Navy………...32
Cyberwarfare……………………………………………………………..38
Resource Driven Conflict………………………………………………..40
Analysis………………………………………………………………………….45
Countering China’s Navy………………………………………………..45
Cyberspace Vulnerabilities………………………………………………49
A Diversified Economy………………………………………………….51
Conclusion………………………………………………………………………55
References……………………………………………………………………….57
7
Introduction
There is a conflict brewing between nations in the Pacific region and two
superpowers are currently on a collision course not only in the South China Sea but
economically as well. So far the conflicts between these two nations have been fought
primarily in the cyber realm with each country engaging in their own form of cyber
warfare and cyber espionage. With increasing technology and the modernization of the
People’s Liberation Army and Navy (PLAN) the confrontational approach by all
interested parties in the region could lead to incidents that will potentially spin out of
control.
The United States has had a historical interest in this region since the founding of
the nation. After the United States won its independence from Great Britain the westward
expansion included into the Pacific and the establishment of trade with the Chinese. In
the winter of 1784 the Empress of China sailed from the United States to China. This
merchant vessel introduced American goods into China, and many more merchants
would soon follow. As more merchants entered into China the United States sought to
formalize relations by establishing diplomatic relations. In 1844 relations were
formalized between China and the United States with the ratification of the Treaty of
Wangxia. This treaty established consuls and provided protection for missionaries and
merchants.
Shortly after the United States formalized relations with China the United States
sought to formalize relations with Japan. In 1853 Commodore Matthew Perry sailed into
Edo (Tokyo) Bay to convince the Japanese to open their ports to American merchants and
allow American ships to resupply. Previous attempts at contact with the Japanese ended
8
with Japanese refusal to allow American’s to land on their shores. It was believed that by
bringing naval warships it would intimidate the Japanese to allow the American’s to
establish ports for resupply. A year later Commodore Perry returned with more warships
and the Japanese unenthusiastically signed the Treaty of Kanagawa in 1854 allowing the
United States to provision and resupply ships from two Japanese ports. This treaty also
granted most favored nation status to the United States so that any future treaties or
agreements entered with other nations would be applicable to the United States as well.
Conflict has plagued the Pacific region and the United States has been involved in
a number of the conflicts within the region. A number of these conflicts have involved
the United States and China either directly or indirectly. The Opium Wars that was
primarily fought by the British Empire is one conflict the United States was involved in.
The United States was not primarily involved militarily but achieved its goals
diplomatically. John Ward the chief diplomat of negotiations was able to negotiate a
treaty that included a clause that granted the other powers such as the British and French
the same rights and privileges as the United States. Since China required a tribute system
for foreign powers to conduct trade and business prior to the ratification of the Treaty of
Tianjin when the Treaty of Tianjin was ratified and gave foreign powers an advantage, it
created resentment amongst the Chinese against Western Imperialism.
In the Pacific, Japan had a national defense strategy that was more offensive than
defensive. Taking their cue from Western Imperialism the Japanese sought out building
an empire in Asia modeled after the British Empire. This started with the invasion of
Manchuria and Indochina. Seeking out territory and resources the Japanese expanded
their attacks into the Dutch East Indies to secure oil fields. Realizing that the primary
9
threat to Japanese expansionism was the U. S. military the Japanese conducted a surprise
attack at Pearl Harbor attempting to destroy the U.S. Navy while it was at harbor. The
attack was devastating, however it did not have the intended effect the Japanese
government wanted. The Japanese were hoping that a devastating strike would bring
America to the negotiating table and would keep the American’s from entering the war in
defense of the Chinese.
In World War II the United States fought on the side of the Chinese after the
Japanese invaded Manchuria and began seizing territory. However this support was
minimal and mainly consisted of war material and supplies rather than actual combat
troops. This support also did not occur until a few months prior to the Japanese attack on
Pearl Harbor. In July of 1941 volunteers began flying aircraft purchased by the Chinese
into Burma. These volunteers became known as the Flying Tigers and would be the first
Americans to fight alongside the Chinese. Six months later the Japanese attacked the
American fleet at Pearl Harbor ratcheting up American involvement in the Pacific and
causing the United States to declare war on the Japanese Empire.
Post World War II the Communist Party came into power forming the People’s
Republic of China in October 1949. The Nationalist Government that was supported by
the United States fled to Taiwan and established a government on Taiwan with the
eventual goal of taking over and reestablishing a ruling government on the mainland. Due
to the Chinese Communist policies that suppressed freedoms the United States severed
diplomatic ties with the People’s Republic of China.
Even though President Nixon reopened relations with the Chinese government in
1972, relations between the United States and China are still tenuous. Prior to President
10
Nixon’s overtures the Chinese and American’s were bitter enemies who both had
engaged in open conflict during the Korean War. The opening of trade with China may
have been less of a pragmatic approach by Nixon but more of another way to help contain
the Soviet Union and further drive a wedge between the Soviet Government and the
Chinese Communist Party.
When Nixon approached the Chinese government in 1972 he reestablished
diplomatic relations however this relationship has been frosty and at times adversarial.
The Chinese government is currently involved in land reclamation efforts in the South
China Sea with The People’s Liberation Army and Navy (PLAN) conducting dredging
operations around small coral reefs and shoals creating man made islands. The PLAN is
establishing military infrastructure on these islands and in the case of Fiery Cross Reef
has completed an airfield capable of handling most military aircraft. These islands are in
a disputed region that many regional powers lay claim to. The fact that the Chinese are
actually developing these islands has caused consternation amongst United States allies
in the region and is leading towards a potential conflict if not properly addressed.
It is not only the land reclamation efforts that has caused a further rift in U.S.
Chinese relations but an onslaught of perceived cyber attacks that have taken place at the
behest of the Chinese government or at the very least the official ignorance that lends
itself to plausible deniability. The Chinese have been accused of cyber espionage and
hacking into Department of Defense databases and targeting DOD contractors stealing
sensitive data and military technologies. In fact newer Chinese equipment in development
and being currently fielded have a remarkable resemblance to American military
technology.
11
Not only have defense networks been targeted, other government infrastructure
has been targeted with valuable and sensitive background investigation data stolen.
Financial data has been stolen as well although the perpetrators have not necessarily been
linked to the Chinese government. A source of tension between the United States and
China is the fact that the Chinese government rarely denounces any cyber attack and does
not act on groups that have perpetrated attacks within Chinese borders. As more
infrastructures are put online and networked, the cyber attacks will increase and tension
will increase between these two governments.
Economically both China and the United States are world leaders. It is projected
that China’s economy will surpass the U.S. in the mid 2020’s although that number may
be revised due to the current economic woes gripping China. One area where China is
lacking is in energy resources. While China does have access to oil and natural gas fields
they are the worlds leading consumer of energy resources. It is this consumption that is
partially behind the land reclamation efforts within the region of the South China Sea.
This region is rich in natural resources such as oil and gas deposits as well as abundant
fishing grounds. As China increases its territory it increases its ability to access these
resources spurring conflict with its regional neighbors who dispute Chinese territorial
claims.
China is also diversifying their portfolio when it comes to energy trading partners.
Some of the trading partners are also trading partners with the United States and a battle
between two nation’s vying for most favored status can occur if diplomatic overtures are
misinterpreted. A few of the trading partners with China are countries that the United
12
States does not support and Chinese financial support will allow these countries to
develop infrastructure that can be used to challenge the United States.
It is this ability to challenge the United States not only directly but also indirectly
through economic involvement with countries that have an adversarial relationship with
the United States. This leads to the question of Chinese foreign policy. Is China’s
aggressive foreign policy and military modernization challenging the status quo and
leading to a potential Cold War relationship with the United States? The global
ramifications that can occur if the United States enters into a cold war with China could
be disastrous.
Literature Review
There are several thematic viewpoints when reviewing the literature associated
with this topic. The literature can be broken into groups of conflicts as the Pacific region
has numerous territorial disputes ongoing at the moment. These territorial disputes
involve one principle nation, that being China, and several other nations such as the
nation of Japan, Korea, Philippines, Vietnam, Taiwan and Indonesia. Not only are these
countries disputing China’s claims to territorial waters and island chains but several of
these nations are important allies to the United States.
From these conflicts emerging themes begin to develop within the prevailing
literature. These themes coincide with the topic itself and are: defense, economics, and
cyberspace. These themes can be broken down even further and subcategories from the
main themes can be developed. The thematic element of defense can be broken down into
the categories of military modernization, weapons technology, and tactics and defense
13
strategies. Within the economics theme the literature can be broken down into defense
spending, development of natural resources, and market and currency manipulation.
Cyberspace can be broken down into cyber attacks, cyber espionage, and critical
infrastructure.
The literature on each conflict within the region has similar themes throughout the
scholarly articles and peer reviewed sources, however there are subtle differences within
each conflict that cannot be ignored. While the United States does not have any territorial
claim at stake within the Pacific region, the United States has treaties and pacts with
nations that do have claims and the United States could be drawn into a deeper conflict
depending on other nations reactions.
One theme in the literature that stands out as its own category is exploring the
conflict from a historical perspective. The United States and other Western powers have
been involved in Pacific affairs since early trading began with the British Empire. There
have been numerous conflicts within the region involving the British, Russians,
Americans, Chinese and Japanese. There were the Opium Wars and Boxer Rebellion
against the British and the Russo-Japanese war as well as the Sino-Japanese War. The
Spanish American War saw the United States seizing territory from Spain such as the
Philippines.
The ramifications from the Sino-Japanese War have led to tensions today. The
Japanese and Chinese are disputing territorial claims over the Senkaku/Diaoyu island
chain. This island chain along with other territorial disputes is leading to an increase in
tensions.
14
It is history that both China and Japan are using to claim the islands as their own.
Jean-Marc Blanchard starts by cataloging when each country claims they discovered the
territory. In 1372 China claims to have discovered the island chain. Documents from the
Qing and Ming courts such as travel records help support China’s long-term claim to the
island chain. Erdem Denk writes in his article titled Interpreting a Geographical
Expression in a Nineteenth Century Cession Treaty and the Senkaku/Diaoyu Islands
Dispute about the Shimonoseki Treaty, which helped end the war between China and
Japan during 1894-1895 that this treaty ceded the islands to Japan to end the dispute.
Understanding the historical conflicts within the region can assist policymakers
when navigating the difficult foreign policy process in dealing with all of the disputes
that are popping up within the region. This understanding can also help U.S.
policymakers in dealing with China while tensions currently continue to rise.
One form of foreign policy that is utilized within the region is gunboat diplomacy.
Christian La Miere defines gunboat diplomacy as:
“A definition of the nebulous concept of gunboat diplomacy could, then, run
along these lines: the overt use of naval or paramilitary power in kinetic or non-kinetic
operations designed to intimidate militarily to further a political goal, often unstated, of
deterring or coercing an opponent. Gunboat diplomacy is essentially a muscular form of
negotiation, with gunboats as the instrument”1
This form of foreign policy has been used in the region numerous times either by
the United States or China. The earliest use of “gunboat diplomacy” by the U.S. was
when Commodore Perry headed a diplomatic mission to forcefully open Japan to U.S.
1 Le Mière, Christian. 2011. The Return of Gunboat Diplomacy. Survival (00396338) 53 (5) (Oct): 53-68
15
businesses and trade. The Japanese were convinced to open up trade because Perry sailed
warships into Tokyo harbor to begin negotiations. Presently any joint military operation
with Korea or Japan by the United States can be viewed by China as a form of gunboat
diplomacy as the Chinese may view the exercises which are labeled as joint defense
operations being a preparation to defend against the Chinese.
The Chinese also engage in gunboat diplomacy to achieve foreign policy.
“In November 2004 a Chinese nuclear submarine cruised into Japan’s territorial
waters near the Okinawa Islands. In response, the Japanese government dispatched
several Japanese naval ships and planes to chase the Chinese submarine until it navigated
into international waters. This event, which potentially could have become the first
exchange of fire between Japan and China since the Second World War, illuminated
increasingly problematic security relations between the two neighboring countries in the
twenty-first century.”2
The Japanese have strong political, economic, and military relations with the
United States, however historically the Japanese relationship with the Chinese has been
strained at best and openly hostile at its worse. This relationship could further strain
relations between the U.S. and China especially if the Japanese escalate issues over
disputed territories such as the Senkaku /Diaoyo island chain.
Coinciding with the historical theme that is prevalent in the literature is the
thematic element of military and defense. The United States has been involved militarily
within the Pacific region since the Spanish American War. Historically the Chinese and
Americans have been cooperative within the region with the United States coming to
2Tsukasa Takamine, “A New Dynamism in Sino-Japanese Security Relations: Japans Strategic use of Foreign Aid” The Pacific Review, Vol. 18 No. 4 December 2005: 439–461
16
China’s defense during World War II. With the rise of communism in the region this
cooperation changed as U.S. forces fought Chinese forces in the Korean conflict. From
then on the relationship between the United States and China has been less than amicable.
China is challenging the United States militarily with its land reclamation efforts
and aggressive foreign policy and is in the process of intimidating American allies within
the region. When Secretary of State Hilary Clinton stated “freedom of navigation in the
South China Sea as a national interest”3 the Chinese government responded by organizing
and conducting one of the largest live fire drills within the history of the People’s
Liberation Army and Navy (PLAN). This drill demonstrated how China would respond
to threats within the region and shows that they are willing to use force if necessary to
achieve political and national security gains.
The Chinese have learned from historical mistakes when it comes to military
operations. During the Sino-Japanese war the Chinese were thoroughly embarrassed by
the more modern Japanese military. Large swaths of territory was ceded to the Japanese
upon their victory and the Chinese were forced to pay 200 million taels a form of silver
currency as part of the peace deal negotiated with the Japanese.
The history demonstrates that the Chinese do not want to be militarily
disadvantaged again when it comes to disputes within the region. This is why the
modernization of the PLAN has been such a priority for China. Historical tactics such as
gunboat diplomacy that have demonstrated success have been employed by the Chinese
to project power and strength.
3Le Mière, Christian. 2011. The Return of Gunboat Diplomacy. Survival (00396338) 53 (5) (Oct): 53-68
17
Industry leaders in military analysis such as IHS Jane’s Information group and
online magazine National Interest discuss the modernization of the PLAN at great length.
The National Interest outlined several weapons that the Chinese have that the United
States should be concerned about. One such weapon is the DF-21D anti-ship missile
known as the Dong Feng. This missile is a hypersonic land based system that is launched
from a mobile platform. Due to the kinetic energy and payload this missile carries it is
possible that a direct hit on a U.S. aircraft carrier would result in the total destruction of
the ship causing it to sink or at the very least rendering it completely ineffective and out
of the fight.
Another weapon system that not only is the United States concerned about, but
also other nations that are currently engaged in territorial disputes are concerned about is
the Type 071 Landing Platform Dock. This vessel can carry one battalion of Chinese
Marines the total force being approximately 400-800 personnel. 18 armored vehicles
would support these Marines.
China is modernizing their military especially their naval capabilities. The efforts
of the Chinese to transition from a brown water navy with the goal of coastal defense to a
blue water navy with the goal of open sea power projection are quite evident in the
literature. This modernization has caused concern with countries in the region and has
spurred vigorous debate about the Obama administration’s policies on the subject matter.
While China is modernizing their military not all scholars agree that the Chinese
are the threat that they are made out to be. John Ganumt writing for the journal Foreign
Policy argues that Chinese military leaders may be overestimating their power and that
the Chinese military is handicapped with corruption, and communication and
18
coordination between the branches is minimal. Ganumt is not the only scholar who
expresses this sentiment as J. Marshall Beier also agrees. In his work Bear Facts and
Dragon Boats: Rethinking the Modernization of Chinese Naval Power Beier compares
the Chinese naval fleet to the old Vladivostok Maritime Fleet that was stationed at the
port of Vladivostok.
“From our vantage point at the beginning of the twenty-first century, these
revelations might be little more than an historical curiosity were it not for a range of
compelling similarities between the Soviet-era assessments of the VMF and recent
interpretations and characterizations of Chinese naval modernization.”4
While these scholars are not alone in their thinking they are in the minority. After
all the portrayal of a nation that engages in a more hostile form of diplomacy becoming a
superpower can help drive defense budgets and influence lawmakers. Even though the
threat of China may be exaggerated and the Chinese military may only be a “paper tiger”
the literature agrees that China is currently engaged in a modernization and
reorganization of their military.
Another aspect of military modernization and a theme that represents a stand-
alone argument throughout the literature on the subject is the thematic element of cyber
warfare. This is a relatively new issue and even with it being such a new topic a vast
amount of literature has been written on the subject. Cyberspace has added a new battle
space when it comes to warfare. This is a dimension that has been exploited by China and
the United States.
4 J Marshall Beier “Bear Facts and Dragon Boats: Rethinking the Modernization of Chinese Naval Power” Contemporary Security Policy, Vol. 26 No. 2 August 2005: pp. 287-316
19
Defining cyber war is a difficult task as it is a new dimension of warfare and it is
considered asymmetrical warfare due to the unconventional nature in the way it is
utilized. Thomas Rid offers this description of cyber warfare:
“Consider the definition of an act of war: it has to be potentially violent, it has to
be purposeful, and it has to be political. The cyber attacks seen so far, from Estonia to the
Stuxnet virus, simply don’t meet these criteria”5
Other scholarly articles have challenged the definition of cyber war offered by
Rid and the definition has been challenged by events themselves. Denial of service
attacks occurred before the Russian’s invaded Georgia in 2008. Similarly when the
Russian’s invaded the Crimean Peninsula in Ukraine the cellular networks the Ukrainian
parliamentarians used to communicate with each other was disrupted. This disruption
especially in the case of Georgia caused significant communication failures that enabled
the Russian’s to move virtually unopposed quickly capturing military outposts.
Cyber attacks are not a new tactic being used by the Chinese against the United
States or U.S. interests. When the Chinese Embassy was accidently struck by a B-2
bomber in the Kosovo air campaign in 1999 the Chinese responded by attacking
government websites in denial of service strikes. After the midair collision between a
Chinese fighter and a U.S. P-3 Orion in 2000 the same Chinese nationalists defaced U.S.
government websites and disrupted the White House website. Even though no critical
infrastructure was affected these attacks demonstrated the Chinese were not afraid to
5 Rid, Thomas. "Think Again: Cyberwar." Foreign Policy, no. 192 (Mar, 2012): 80,84,9, http://search.proquest.com/docview/927664011?accountid=8289.
20
conduct attacks in the cyber realm and they were not afraid to conduct these operations
overtly.
Recent news headlines have shown that the Chinese are still actively engaging in
a cyber campaign against the United States. An article from Forbes details a new cyber
attack perpetrated by the Chinese government. This attack targeted defense contractors
and stole terabytes of data. This attack called Operation Iron Tiger occurred over a period
of several months. The recent hack of the Office of Personal Management (OPM)
exposed thousands of U.S. government employee’s personal files. These files contained
financial data and other sensitive data such as the detailed information given during a
background investigation. It is reported that the Chinese government is building a giant
index of government employees keeping track of the employees most intimate and
sensitive data. The fear by members of the intelligence community is that this
information could be used to expose or embarrass a professional within the intelligence
community and have him/her work for the Chinese government. While this attack is the
most recent it is one of many attacks conducted by the Chinese. The Chinese have
targeted companies like Boeing, Lockheed Martin, Northrup Grumman stealing
intellectual property and gaining access to classified programs. The Chinese have also
accessed databases on critical infrastructure like power stations and natural gas pipelines.
These attacks have demonstrated the vulnerabilities of cyberspace and computer
networks and the reason to develop a strong cyber defense network. James Adams who
wrote an article titled “Virtual Defense” for the journal Foreign Affairs proposes this type
of defense. In this article Adams gives examples of historical operations such as “Eligible
Receiver” and “Zenith Star” which were operations where National Security Agency
21
(NSA) hackers using publicly available hardware and software were able to break in and
demonstrate the havoc that can be caused by an unprotected cyberspace.6
Not only is critical infrastructure affected but other areas are affected as well. The
Sony hack by the North Koreans demonstrated that cyber attacks can and will target
every aspect of American culture and values. After the release of “The Interview” by
Sony pictures the North Koreans hacked into Sony networks and released damaging
information about the company. This released information lead to the resignation of the
CEO of Sony Pictures over the damaging emails. More disturbing than the release of
leaked emails by executives from Sony Pictures was the veiled threat on anyone who
attended a theater to watch the movie. The North Koreans implied that it would be
dangerous to see the movie in theaters and referenced the Aurora Colorado movie theater
attack. This was a blatant attack on America’s value of freedom of speech. While the
Chinese did not perpetrate this attack it is a tactic that they can use in the future.
The critical infrastructure is important and developing a cyber defense is crucial
especially as adversarial nations develop their cyber capabilities. Not only will the United
States need to develop a strong defense to counter cyber attacks from nations and nation-
states but it will also need to address the capabilities of “hacktavists” groups such as
Anonymous and others as these groups could be persuaded or manipulated to act on
another nation’s behalf.
Col. Matteo Martemucci argues that while the majority of literature on topics
related to the cyber domain discuss cyber defense and cyber attacks the literature ignores
the most significant and pressing threat from cyberspace and that is the economic damage
6Adams, James “Virtual Defense” Foreign Affairs Vol. 80 No. 3 (May/June 2001)
22
done by cyber espionage. While the government defends the domains it is responsible for
such as .mil and .gov domains the commercial sector in the Internet or public sector such
as .com, .edu, .org domains are left to fend for themselves. It is this area that a nation
such as China has chosen to exploit. Government hackers have stolen voluminous
amounts of data and have suffered little repercussions for their actions.
“The greatest single threat to the American national existence we enjoy today is
the systematic, long-term economic espionage by nation-states, like China, that
contribute to the shifting of the balance of economic power away from the U.S.”7 This
argument not only sounds the alarm over the intellectual property that has been stolen but
that it gives the thief a distinct advantage that possesses that property. Theft of
intellectual property will save money and time in research and development because that
process is entirely skipped. It may also allow a company to get a counterfeit product out
ahead of the actual products release. All of these scenarios undermine our economic
output and allow a country that engages in these practices to increase their economic
output thoroughly burying their rivals.
Economics and economic warfare is another important theme in the exploration of
this topic and a theme that helps paint the picture of the tension between the Chinese
government and the American government. Currency and market manipulation as well
as the battle for control over natural resources such as oil, gas, and abundant fisheries will
continue to drive the conflict with regional powers vying for control and potentially
relying on foreign alliances for support.
7Martemucci, Matteo “Unpunished Insults-The Looming Cyber Barbary Wars” Case Western Reserve Journal of International Law Iss. 47 (2015)
23
Harry Hongyi Lai outlines three steps the Chinese have taken when it comes to
resources in his article for the Third World Quarterly. China has expanded its overseas
supply of oil from the Middle East, they have diversified their trading partners reaching
out to Africa, the Americas, and Russia, and they have secured oil routes. Currently
China imports half of its oil but this is projected to grow as China’s economy grows and
demand for oil increases. Japan and China combined consume 15% of the world’s oil
resources and while China imports approximately half of its oil for consumption Japan
imports all of the oil it consumes. With the discovery of oil reserves in the continental
shelf in the disputed regions this becomes important territory that China will want to
control. “Currently, this region retains proven oil reserves of seven billion barrels and a
production capacity of 2.5 million barrels per day.”8 Chinese analysts believe that within
the region there is 2000 trillion cubic feet of natural gas, however most analysts believe
that the Chinese data is grossly exaggerated.
The United States Geological Survey estimates that there are 5 to 22
billion barrels of oil and that there are 70 to 290 trillion cubic feet of natural gas in the
South China Sea. These numbers are just estimates and in some cases new technology
needs to be developed to exploit these resources. In fact China just commissioned a semi-
submersible oilrig in May. This rig is known as the Haiyang Shiyou 981 (HYSY 981) and
it is technologically advanced enough to open up everything but the deepest seabeds or
trenches. With the vast amount of potential resources in this area and the entire region of
Asia clamoring for more resources as their economies develop this area has the potential
to be a flashpoint of conflicts in the future. 8Rowan, Joshua P. 2005. The U.S.-Japan Security Alliance, ASEAN, and the South China Sea Dispute. Asian Survey 45 (3) (May/June): 414-36, http://www.jstor.org/stable/10.1525/as.2005.45.3.414.
24
Dr. Martin Murphy writing for the Naval War College Review comments on how
the Chinese are using deep-water oil rigs as strategic weapons. He quotes Wang Yalin of
the China National Offshore Oil Corporation of saying that mobile deep-sea oilrigs
should be “our mobile national territory and a strategic weapon”9. This commentary,
which was made by a chairman of a company and not an official from the Chinese
government, does not necessarily mean that this statement is official government policy.
However any nation involved in territorial disputes especially one pertaining to the
exploitation of resources involving a deep sea oil rig seeing these statements would be
less likely to engage in friendly negotiations.
This aggressive talk has many nations in the region and nations that have
economic powers worried. The South Pacific in particular the Malacca Straits is the most
heavily sea trafficked area in the world. Approximately 50% of the world’s merchant
fleet tonnage transits through this region. While piracy has been an issue in the Malacca
Straits it is a minor issue comparatively to a hostile nation blocking the straits or seizing
the region as their own.
Another issue in the economic theme that is throughout the literature is the
economic manipulation by the Chinese government. This manipulation is caused by the
Chinese manipulating the markets or by devaluing their currency the Yuan. Devaluing
the Yuan allows the Chinese to buy domestic products at a cheaper rate than import.
Heavy government subsidization has resulted in Chinese companies being able to
produce and sell their marketable goods at rock bottom prices undermining foreign
companies. This ability to sell exports to the United States domestic market well below
9Murphy, Martin. "Deepwater Oil Rigs as Strategic Weapons." Naval War College Review 66.2 (2013)
25
the price enables the Chinese to gain more revenue from our market and it damages
domestic businesses and ensures that start up companies do not survive. The Chinese then
attempt to purchase these companies at prices well below market value and will achieve
monopolies in certain industries.
Not only is subsidization of Chinese companies an issue that is creating tension
amongst China and the United States, the fact that counterfeiting and piracy in China is a
rampant problem that is unaddressed gives the Chinese a distinct advantage.
“What’s more important is the theft of the blueprints for high technologies. I hear
all the time about American companies who find themselves competing in the
marketplace with a Chinese product, and they take it apart, and they find themselves
looking in the mirror because the Chinese have just stolen the plans of their own
product.”10
This is an issue that is addressed in the literature related to cyber security and
cyber defense. As an economic issue it gives the Chinese company an advantage as the
theft of intellectual property saves the company that pilfered the secrets to skip the entire
research and development process and all the time and financial investment that occurs
during that process. Counterfeited products also flood the market with cheap products
that without intimate knowledge of the product the average consumer will believe came
from the original company. In cases that these products do not live up to standards then it
will be the name brand company that will get the blame and not the company that has
produced the counterfeit products. This undermines the credibility of the original
manufacturing company and the public loses trust in the company even though the 10Navarro, Peter. “China’s Currency Manipulation: A Policy Debate” World Affairs September/October 2012
26
company is not at fault.
The conflict between the United States and China will continue to grow. The
literature on this topic provides numerous examples of issues between these two nations.
As has been demonstrated by the literature the relationship between China and the United
States is a complex relationship made more so by the various alliances and different
political power struggles in the region. This is an important topic that will require smart
leadership and decisive action when navigating the pitfalls of foreign policy.
Methodology
During this study the data will be collected using secondary sources. These
sources will include scholarly articles from journals and publications within the field of
study as well as press releases, government reports and statistics, and news reports from
respected and credible journalistic outlets. The data collected will attempt to answer the
research question of this study; “Due to aggressive foreign policy and military
modernization is China challenging the status quo and entering into a Cold War with the
United States?”
Identifying the independent and dependent variable is important for any scholarly
study or research. An independent variable is a variable that is causal in nature and it will
effect or influence a dependent variable. The dependent variable is just the opposite of an
independent variable as the dependent variable does not cause an effect but it is affected
by other variables whether they are the independent variable or other variables not listed.
Some of these other types of variables that influence the dependent variable are:
mediating variables, antecedent variables, and intervening variables. The dependent
27
variable in this study will be the relationship between the United States and the Chinese
government. The independent variables are the variables that will affect this relationship
between the two governments. These variables include economic data, military
deployment and strategies, and operations in the cyber realm including cyber espionage
and sabotage.
The measurement of these variables is what helps the reader to understand the
data that is being analyzed and how it affects the relationship between the two nations.
Economic data can be measured in several ways to help determine the tension and strain
that it puts on the Chinese and American relationship. A measurement of economic
output can be used as supporting evidence for rising tensions. Using data that
demonstrates the differences in currency and measuring it over a 10-year time period will
help demonstrate the differences in the currency rate and help to prove the hypothesis that
China is devaluing the Yuan fueling tensions between the United States and China. The
importation of natural resources as opposed to domestic production will give the reader a
good indicator of the imbalance that exists between the two countries. This will also be
an indicator of why tensions have increased between the United States and China. The
measurement of data demonstrating economic imbalances will support the hypothesis that
China is challenging the United States for a more dominant role on the world stage. A
third measurement of economic data such as military expenditures will also paint a
clearer picture of the ongoing diplomatic issues and it will also be used as supporting
evidence in the measurement of the military deployment and strategies independent
variable.
28
Measuring the military strategy and tactics variable that affects the dependent
variable of the relationship between China and the United States is measured using
qualitative and quantitative data. The quantitative data that is used to measure China’s
military modernization is the analysis of military expenditures and the percentage of the
budget that has been allocated towards the military over a period of ten years. Also
statistical analysis of new weapon systems and the number of weapons systems that have
been fielded will serve the purpose of measuring the modernization of the military. The
qualitative measurement of the military issues as well as the political issues that are
causing a rise in tensions in the region is measured by reviewing scholarly articles and
news reports. These articles are analyzed using social theories of international relations
such as the realist theory and institutionalism theory.
The independent variable of cyber attacks is also measured using a mixed
methods approach of measuring qualitative and quantitative data. The qualitative data is
gathered by the review of journals and articles written by the experts in the field of cyber
operations. This data will be analyzed looking for specific patterns within the literature to
determine if certain sectors or industrial areas in the economy are being targeted. The
quantitative data will measure the frequency and number of attacks. The increase of
attacks could help prove the hypothesis of the paper that tensions are escalating between
the Chinese and the United States and these tensions are precipitating a Cold War
atmosphere.
The primary theories used to examine this paper will be modeled from the
International Relations model. The two primary theories that will be used to view the
issues of the relationship between the United States and China are Realism and
29
Institutionalism. Both of these theories can help understand the complex issues that are
involved within the relationship between the United States, China, and other regional
powers.
Realism is a theory that looks at the international system as a system that is in
anarchy and lacks a centralized power structure. The realist approach would look at the
power shifts in each conflict. Each influencer on international security would be weighed
by where the concentration of power is and where it would be shifting too. A realist
would look at the conflict as winners and losers and who would benefit from these types
of conflicts. The only authority that a realist theory would recognize would be the law
maintaining peace. This authority would be difficult to enforce and issues that have
occurred with United Nation’s intervention and involvement with conflict scenarios have
demonstrated this difficulty of central control or authority. This method is really only
enforceable against smaller nations as it is very difficult to get a consensus for larger
nations to act. Under this theory power is crucial especially state power because this is
how the states retain their autonomy and survive as a singular sovereign state. A realist
theory believes that survival is the most important goal of a state. A foreign invasion
either militarily or by other means are seen under this theory as the most urgent need that
needs to be addressed.
This theory looks at the situation between the United States and China and views
it as two governments in conflict. Both governments are retaining their autonomy when
dealing with each other. The Chinese have unilaterally began land reclamation efforts in
the South China Sea even though numerous nations within the region have protested. The
30
United States has strongly condemned the Chinese for failing to reign in cyberattacks and
industrial espionage.
The other theory that will be used to help analyze this topic is institutionalism and
the theory of institutionalism views international relations similarly to the realist theory.
However there is one key difference and that is an institutionalist believes that states can
cooperate with each other. The reason for this cooperation is that the states are acting in
their self-interest. This self-interest may be an economic interest or it could be a smaller
nation relying on a more powerful nation for protection. An institutionalist sees this
cooperation as genuine while a realist would see the cooperation as a coercive act by the
state. A subset to this theory is the liberal theory of international relations. A liberal
would highlight the transitioning democratic governments and encourage international
organizations and cooperation. In this approach to conflict a liberal would not see one
nation as more powerful than other or as the parties involved in the conflict as winners or
losers. Instead they would focus on cooperation and compromise whereas the hopeful
resolution to the conflict would be peaceful with both sides coming to a mutual
agreement. The cooperation between states is what makes the liberal theory and
institutionalist theory very similar.
This theory is applicable to the relations between the various regional powers
within the geographical region of study. As China strengthens and flexes military muscle
smaller nations such as the Philippines, Vietnam, and Japan may put aside historical
differences to promote cooperation and unite against a bigger perceived threat. If we look
at France and Germany as a model of cooperation these two nations have successfully put
the past conflicts and differences behind them. France and Germany cooperate
31
economically and politically to achieve the highest potential for both the respective
nations. The past conflicts may be more difficult for China and Japan to overcome
especially as both nations continue to stoke the past conflicts with inflammatory rhetoric
and controversial memorialization. It is important to look at this theory in relation to the
hypothesis as the relationships of other nations specifically any sort of military alliance or
pact will have an effect on the relationship between the United States and the Chinese
government.
With any study there will be limitations within the research design that need to be
addressed to understand the topic and to allow further research to fill in the gaps that may
have been missed due to limitations and constraints. The limitations of this study will be
the timeline in which the study will be conducted as the short timeline prevents the
analysis and review of all pertinent data. Another limitation is that since the study is an
analysis of foreign relations between two powers the access to material that would be
relevant may be blocked due to government classification. A language barrier is another
limitation of the study. Important documents and even relevant news articles will be
written in the native language. There are numerous countries within the region of study
and the lack of knowledge of the written language of these countries prevents a total and
complete analysis of the subject. The timeline of the project will make it difficult to
properly request documents under the Freedom of Information Act. These requests need
to be properly completed and usually take several months to process. This may leave out
data that may be relevant and crucial to the study.
The biases that will affect the study will be related to the access of material. Any
foreign material produced by the Chinese government would obviously be slanted in a
32
way as to promote Chinese values. Due to the lack of knowledge of Mandarin Chinese,
reports and documents by the Chinese government and Chinese news outlets and other
media will be written in English. Since an English speaking audience is targeted the
documents will primarily promote the Chinese government’s policies. The similarity may
also be found in documents produced by American government officials but it would be
much less pervasive in American documents as the American government is more open
and transparent than the Communist party in China. However careful vetting of Western
media sources that have been used as secondary sources is needed as these media sources
may be biased towards supporting American government or similar Western style
policies within the region. Similarly access to material that would paint a clear picture of
the situation and give a greater understanding of the roles being played out may be denied
further limiting a complete and comprehensive study.
This methodology section outlines the research design so that other researchers
can replicate the study to further add information and data to the topic being studied. It
describes the methodology used and the theoretical framework used to reach the
conclusion of the paper. This is an important section as it validates the work and lends
credibility to the study.
Findings
The Chinese government has been steadily increasing the military budget and
increasing funding for specialized programs and purchasing upgraded military
equipment. The Chinese military budget has been averaging an annual ten percent growth
since 2005. This growth has gone into weapons development and to upgrading military
equipment. Not only has the budget gone into upgrading military equipment but it also
33
went into pay raises for the troops. Large pay raises went into effect in the year 2006,
2008, and 201111. As well as pay raises the Chinese government upgraded living quarters
and raised the standard of living for the soldiers serving in the armed forces. The Chinese
recognized that upgrading a military also requires increasing the morale of the troops
serving in the military.
It is difficult to measure the exact figures of China’s military budget as a lot of
data is excluded from public view. Some of the exclusionary data is the budget allotment
for paramilitary forces, strategic forces, and specific research and development. Due to
the opaque nature of the budget in China it is difficult to provide accurate analysis
however the current trend of double digit increases in military spending is forecasted to
continue.
The Chinese government has been modernizing the PLAN with new weapons
systems under development and being fielded as well as the procurement of more modern
military technology. Recently China reached an agreement with Russia to purchase 24
Sukhoi-35 fighters. This is a deal that is estimated to be worth 2 billion dollars and it is
the largest sale between the Chinese and the Russians. The Sukhoi-35 is a multi-use
fighter with a range of 1,944 nautical miles and the capabilities to carry a max armament
payload of 17,636 lbs. of a variety of different weapons from air-to-air to air-to-ground
missiles as well as guided bomb units.
The Chinese J-20 is another indicator of PLAN modernization. This is an
indigenous 5th generation stealth fighter. While it is manufactured independently in China
a number of U.S. officials suspect that data stolen from defense contractors in acts of 11Blasko, Dennis J. 2011. "An Analysis of China's 2011 Defense Budget and Total Military Spending -- The Great Unknown." China Brief 11, no. 4: 4-6. International Security & Counter Terrorism Reference Center, EBSCOhost (accessed November 25, 2015)
34
cyber espionage have aided the development of this fighter. The airframe suggests that
the J-20 will be an air superiority fighter. The J-20 is in its final testing phase and is set to
be operational in 2018.
While it is important to have offensive aircraft these aircraft will have limitations
such as range and length of time spent on station. Important logistical requirements such
as fuel will need to be considered. The Chinese have ordered 10 IL-78 aerial tankers from
Russia and 3 IL-78 tankers from the Ukraine. Currently they have one IL-78 tanker that
has been delivered from the Ukraine. The tankers ordered from Russia have not been
delivered due to contract negotiations and labor disputes with the manufacturing
companies. These tankers will be an updated addition to the Chinese aerial tanker fleet a
fleet that consists of 12 H 6-U tankers currently. If the Chinese want to continue the trend
of modernization of the air force than they will need to invest in the infrastructure to base
the tankers as well as invest in more capable and modern tankers to sustain future air
campaigns. The deal with Russia is an attempt to modernize their tanker fleet however
the longer the deal stalls the more likely it is that the Chinese modify an existing airframe
and begin domestic production of a tanker.
The Chinese are currently developing an aerial platform that will not require
refueling. This airship is a lighter than air aircraft inflated with helium and equipped with
solar panels to power the propellers allowing the aircraft to be moved into a position of
the aircraft operators choosing. This airship is called the Yuanmeng and will allow the
Chinese government new capabilities in surveillance and can be used to detect enemy
ships and relay-targeting data to land based missile systems or other aircraft. While
lighter than airships are not new technologies the ability for the Yuanmeng to achieve an
35
altitude of 328,000 is remarkable as this is considered the edge of space and no other
military aircraft can fly at that altitude.
It is not only the air force that the Chinese are modernizing but the Chinese have
focused on modernizing the naval forces of the Chinese military. The Chinese have three
naval fleets the Beihai Fleet, the Donghai Fleet, and the Nanhai Fleet. The Donghai and
Nanhai Fleets are headquartered in the southern portion of China. Both of these fleets are
headquartered very close to Taiwan. The Beihai fleet is in Shandong province, a province
that is farther north and is geographically situated to be able to respond to any threat from
Japan or Korea.
The Chinese commissioned the Liaoning in September 2012 the first aircraft
carrier of the PLAN. The Liaoning originally started out as the Russian aircraft carrier
Varyag however it was not completed and sat in a Ukrainian naval shipyard until it was
purchased by the Chinese. The Liaoning is a medium class carrier and can carry thirty-six
fixed wing and rotary wing aircraft.12 The Liaoning has finished sea trials and while it is
operational it has not been assigned to any of the three PLAN fleets it currently is being
used to conduct training in flight operations and carrier operations. The Chinese are
pursuing a domestic carrier program and IHS Jane’s has photographs of a ship being built
in the Dalian shipyard that has remarkable similarities to the Liaoning. While the Chinese
have not confirmed that this is a new carrier being built if the ship in the Dalian shipyard
once completed is another carrier it will demonstrate that the PLAN is committed to
developing a domestic carrier program.
12Scobell, Andrew. McMahon Micheal, Cooper Cortez “China’s Aircraft Carrier Program: Drivers, Developments, Implications” Naval War College Review Autumn 2015 Vol. 68 Iss. 4
36
Even though the Liaoning is an older Russian style aircraft carrier the Chinese
have made several upgrades to modernize the carrier and bring it on par with other navies
aircraft carriers. The Liaoning will have a complement of 26 J-15 fighters, 18 anti-
submarine warfare (ASW)/search and rescue (SAR) helicopters, and 4 anti-electronic
warfare (AEW) helicopters. The Liaoning also has impressive defensive capabilities. It is
armed with 3 FL-3000N surface to air missile batteries. Each launcher holds 18 missiles
for a total of 54 missiles. These missiles are not only designed to take out enemy aircraft
but the missile is also capable of intercepting anti-ship missiles. With the FL-3000N
batteries capable of destroying aerial threats the Liaoning also has 2 ASW launchers that
fire rockets capable of destroying submarines. These launchers have a total of 12 barrels
each bringing the total number of ASW rockets to 24. Included in the Liaoning’s
defensive arsenal are 4 chaff launchers with 24 barrels each. The chaff will be launched
as a last resort to hopefully confuse incoming missiles. The final defensive weapons on
the Liaoning are 3 Type 11 30mm CIWS weapons.13 This weapon system literally lays
out a wall of lead in front of incoming missiles to destroy them before they impact the
carrier. These weapon systems make the Liaoning a formidable offensive platform
capable of projecting naval air power beyond the shores of China.
The development of a domestic carrier program demonstrates that the Chinese
have committed to modernizing the PLAN and shifting from brown-water littoral
operations to a blue-water navy that is capable of projecting power farther from the
Chinese shoreline. Not only are carrier’s expensive propositions to build but they also
require extensive support in maintenance and logistics this also requires significant
13Lockie, Alex. “Here’s How China’s Aircraft Carrier Stacks Up To Other World Powers” Business Insider September 10 (2015)
37
funding and a political commitment to ensure adequate funding for the life of the
program. Aircraft carriers also require protection and modern escorts to defend the carrier
from external threats. If the PLAN pursues a domestic carrier program it will need to
ensure that the escort ships are modernized and upgraded as well as the crews properly
trained so the PLAN is not unnecessarily risking an important asset.
As the Chinese continuously fund the PLAN to pay for new ships and equipment
upgrades the Chinese government is also engaged in controversial land reclamation
efforts within the South China Sea. Currently the Chinese are involved in territorial
disputes with the Philippines, Taiwan, and Vietnam over the Spratly Islands and are
engaged in disputes with Japan over the Senkaku/Diayou Island chain. The Chinese are
claiming these island chains as sovereign territory and are developing facilities on reefs
that are being developed in to islands by land reclamation to support these claims.
An example of this can be seen on the island known as Fiery Cross Reef. This
was just a small reef before Chinese vessels began dredging around it and expanding it to
a size where facilities could be built. According to satellite imagery a runway is nearly
complete on this island. The runway once complete would be able to support most
military aircraft in the Chinese Air Force and would allow the Chinese to have air
coverage in most of the disputed area in the South China Sea.
China has been aggressive with the land reclamation efforts creating seven new
islets from submerged reefs in the past few years. While Fiery Cross Reef has an airstrip
near completion two other reefs Subi Reef and Mischief Reef would also have an airstrip
when the islands are completed. This would give the Chinese a total of three airfields in
38
the region with the ability to sustain intelligence-gathering operations and air patrols. It is
another example of power projection and challenging the status quo in the region.
Not only have the Chinese modernized their military and engaged in aggressive
tactics that have worried the other neighboring countries but the Chinese have been
accused of repeatedly conducting cyber attacks and cyber espionage on the United States
and other Western interests. These attacks have created tension between the two nations
and have been a sticking point when it comes to diplomatic negotiations.
The Chinese have taken a methodical approach when it has come to developing
cyberwar capabilities. The Chinese have developed offensive capabilities such as: the
recruitment of civilian hacker groups, the development of military cyberwarfare units, the
distribution of compromised hardware for networks, and the placement of logic bombs
and other exploitive back doors and viruses in foreign networks.14
The civilian hacker groups that operate independently but target certain foreign
government websites or monitor internal dissidents do so for “patriotic” reasons. This
actively engaged network of hackers has conducted numerous operations such as denial
of service attacks and defacing of government websites. These groups more than likely
are receiving orders from the Chinese government although there is enough distance
between the civilian hackers and the government to maintain plausible deniability. This is
where the government can deny any knowledge or responsibility for the action conducted
and will not confirm that they initiated the action. Confirmation of these actions, are
generally unlikely due to the lack of evidence confirming participation by the agencies
14 George Patterson Manson III (2011) “Cyberwar: The United States and China Prepare For the Next Generation of Conflict”, Comparative Strategy, 30:2, 121-133 (accessed October 2015)
39
running the operation. Plausible deniability can only be maintained if the operation is
kept secret. Exposure or leaks of any kind will damage the operation and may bring
embarrassment to the officials in charge as well as limit the success of the operation and
could compromise valuable assets.15
These civilian networks of hackers are not the only aspect of cyber operations that
the Chinese engage in. The Chinese have also exploited the position of being the leading
exporter of electronics for hardware and software development. The Chinese have sold
compromised network systems to various foreign governments allowing them to glean
information. In one such case compromised routers that were reverse engineered Cisco
servers were sold by the Chinese company Hauwei to Department of Defense (DoD)
contractors and clients. The compromised software would allow Chinese intelligence to
steal information, take down the networks, and degrade cryptographic capabilities.
Along with the manipulation of software and hardware produced in China the
Chinese have operatives that have placed logic bombs within vital networks in the United
States. These bombs will sit and wait until activated by the operative to damage and
degrade vital systems. The systems that have been targeted are in sectors such as the
power grid, water and sewage, air traffic control, and the financial sector. When activated
these bombs can cause widespread chaos and be used to further exploit a crisis. Deputy
Undersecretary of Defense Robert Lawless admitted that the Chinese have a “very
sophisticated capability to attack and degrade our computer systems…to shut down our
critical systems”16
15Moody, Brian “Cyber Operations: A New Frontier in Covert Operations” American Military University Mar. (2015) 16MansonGeorgeIII(2011)“Cyberwar:TheUnitedStatesandChinaPrepareFortheNextGenerationofConflict”,ComparativeStrategy,30:2,121-133(accessedOctober2015)
40
Since 2005 there have been numerous incidents of cyber attacks that can be linked
to the Chinese. In 2005 10-20 terabytes were stolen from defense contractors like
Lockheed Martin and from the DoD. In 2006 the State Department was targeted as well
as the U.S. Naval War Colleges network and in 2007 the United States Nuclear Labs
were attacked with malicious emails. In 2009 devices were left behind by Chinese
hackers in the U.S. power grid that could be used for exploitation at a later date. More
recently the Office of Personnel Management suffered a data breach where data on
sensitive background investigations was compromised. Prior to this data breach Anthem
Blue Cross Blue Shield suffered a data breach where more sensitive information was
stolen. Social Security Numbers as well as medical records were taken in this breach.
A map from the National Security Agency’s (NSA) National Threat Operations
Center (NTOC) reveals that over a five year time period 600 United States companies
and businesses have been hacked or breached and have had data stolen. This map shows
that most of the attacks have been located on the East Coast from Washington to Boston
and Silicon Valley. The state or region that had the highest amount of attacks was
California with the number of attacks totaling 50. These attacks stole data on hybrid cars
and pharmaceutical formulas as well as information related to defense technology and the
United States power grid.17
The conflict between China and the regional powers in the South Pacific such as
Japan, Vietnam, Taiwan, and the Philippines stems from territorial boundaries and the
fact that China is claiming nearly the entire South China Sea an area that is rich in
resources. These claims have led to China acting aggressively and challenging the United
17Windrem Robert “Exclusive: Secret NSA Map Shows China Cyber Attacks on U.S. Targets” NBC News July 30, 2015
41
States on the world stage emphasizing that the United States should not get involved as
this is a regional matter.
The Chinese government has diversified the country’s energy portfolio to include
more consumption of natural gas. Since the energy output of China has fallen due to
higher energy consumption by consumers the Chinese are looking for more avenues of
energy production. The U.S. Energy Information Agency (EIA) estimates that proven and
probable reserves of natural gas in the South China Sea are 190 trillion cubic feet
however this number may be higher as there are many areas in the region that are
underexplored due to the hotly contested territorial claims in these specific geographic
areas.
The Chinese have developed technology that allows them to explore and access
even the deepest areas within the South China Sea. The semi-submersible deepwater rig
Haiyang Shiyou (HSY 981) allows the Chinese to drill in the deepest waters of the South
China Sea.18 Other nations within the region do not have access to the kind of technology
that will allow them to conduct deepwater drilling operations. Even though China has the
ability to conduct deepwater drilling operations this technology is costly and unique and
it is doubtful that the Chinese will unnecessarily risk HSY 981 in disputed waters as the
political damage from any incident may be too difficult to control or deescalate
effectively.
China’s quest for natural resources have seen them enter into an area that brings
them into conflict with Russia and the United States. While not losing focus on the hotly
contested territorial disputes in the South and East China Seas the Chinese have focused
18Murphy, Martin. "Deepwater Oil Rigs as Strategic Weapons." Naval War College Review 66.2 (2013)
42
northward to the Arctic. China is not considered an Arctic state, as it does not have any
territory that borders the Arctic region unlike the United States and Russia. Even though
China does not border the Arctic region it has invested a significant amount of money for
research purposes. China “has maintained a vast, well funded Arctic research apparatus
since the mid-1990’s and has invested heavily in Arctic-resource projects in recent
years”.19 It is because of this that the Chinese feel that they should have a say in Arctic
affairs. The Chinese consider themselves a “near Arctic state” although geographically
speaking the Chinese do not possess any territory within the Arctic region. The Chinese
are also not members of the Arctic Council, a government organization that consists of
countries such as: the Kingdom of Denmark, Finland, Iceland, Norway, Sweden, Russia,
Canada, and the United States.
The Chinese have upgraded the war fighting naval capabilities of the PLAN and
are interested in upgrading the research capabilities of the PLAN as well. Currently the
Chinese operate the Xuelong translated as “Snow Dragon” a vessel that was built in the
Ukraine in 1993. This vessel has been modified to be a research vessel as well as a supply
vessel to the Arctic outposts the Chinese maintain. The Chinese have ordered a more
capable icebreaker to be built and commissioned in 2016. The icebreaker will be built in
a Chinese shipyard and Aker Arctic Technology of Finland is designing the ship.
It is important to note that the Arctic has abundant natural resources similar to the
South China Sea. Oil and natural gas have been discovered in the Arctic and the area
offers abundant fisheries as well. The Chinese with the exception of Japan would be the
19Rainwater, Shiloh. “Race to the North: China’s Arctic Strategy and its Implications” Naval War College Review Vol 66, No 2. Spring (2013)
43
only country within the Southeastern Asian region to be able to exploit the riches in the
Arctic.
The Asian region has a diverse set of economies. Thailand, Vietnam, and the
Philippines are countries with developing economies while Burma is an economy that is
classified as emerging. South Korea, Japan, and China are the most developed countries
in the region with China and Japan being the primary leaders in the regional economy.
The Chinese labor force numbers at one billion and is the largest labor force in the
world. The labor force is evenly broken down by occupation as 30% of labor force works
in the industrial occupations, 36% works in the service industry, and 33% work in the
agricultural sector.20 This is in comparison to the American workforce where 70% of the
workforce is in the service industry.21 It should be noted that classification of service
industry jobs could be country specific and there may be differences in the total
percentage.
The Chinese labor force is very productive and China is the number one exporter
of goods in the world. China exports electrical machinery, data processing equipment,
and integrated circuits. China is the third largest importer in the world and it primarily
imports commodities such as: oil, natural gas, and mineral fuels as well as various ores,
medical equipment, and soybeans. The importation and exportation of goods is very
important, as this is a key driver of the global economy. Due to China’s size and power
when it comes to the global import/export market it can have a variety of effects on
foreign markets.
20World Factbook www.cia.gov (accessed November 28, 2015) 21“The Service Sector: Projections and Current Stats” http://dpeaflcio.org/programs-publications/issue-fact-sheets/the-service-sector-projections-and-current-stats/ (accessed December 1, 2015)
44
It is this ability to impact the global economy that has caused several accusations
of currency manipulation by the Chinese government. China has also been accused of
stealing jobs by luring American manufacturing to China raising tensions between the
U.S. government and the Chinese. Theft of business and industrial data and the lack of
intellectual property laws in China have also contributed to tensions between China and
the United States. In fact in 2010 the United States filed a complaint with the World
Trade Organization (WTO) against the Chinese involving intellectual property rights.
The complaint alleged that China did not do enough to criminally prosecute businesses
that engaged in the theft of intellectual property and counterfeiting manufactured goods.
Lack of regulations and environmental controls have made manufacturing cheap
in China. Minimum wage laws and worker compensation have also allowed companies to
produce and manufacture products cheaper in China than the companies would be able to
in the United States. Subsidies that are provided to businesses by the Chinese government
also give an advantage to Chinese manufacturing. These subsidies provide an unfair
advantage to businesses within China and distort the overall trade picture. In a case
regarding auto part subsidies the United States challenged the fact that China was
providing export subsidies to auto part industries a practice prohibited by the WTO.
These subsidies devalued the price of American auto parts and automobiles hurting
American businesses and increasing trade deficits.
Again in 2012 the United States filed a complaint against China with the WTO
that the Chinese were limiting the export of rare earths like tungsten and molybdenum.
This was causing a shortage on the international markets and driving up prices. China
argued that this was conserving exhaustible natural resources and that the export limits
45
were legal. The WTO did not agree with the Chinese and reached a different conclusion.
The WTO found that due to the lack of domestic conservation of tungsten and
molybdenum by the Chinese there was no necessity to limit the export market and
conserve the materials in the international market.22
China provides a variety of subsidies to its various industries. There are subsidies
for energy consumption as well as subsidized land and facilities. The Chinese also offer
tax incentives that allow a manufacturer to sell products into the U.S. market at cost but
the company will still make a decent profit. This coupled with currency manipulation has
strained ties between the United States and China as well as strained ties with other
economic powers in Asia.
Analysis
China and the United States appear to be heading into a period where relations
between the two countries are reaching a Cold War status. There is no question that the
PLAN is modernizing and upgrading the naval capabilities and transitioning into a naval
power that is not only focused on littoral or coastal defense. The Chinese recently
completed sea trials of the Liaoning and it is the first aircraft carrier in the Chinese Navy.
The land reclamation efforts in the South China Sea with the dredging and island building
are another form of power projection.
To respond to these actions and counter the threat that China can be in the region
the United States needs to solidify relationships with regional powers such as Japan and
Taiwan.
22Dispute Settlement DS 431 “China – Measures Related to the Exportation of Rare Earths, Tungsten and Molybdenum” World Trade Organization (2012) https://www.wto.org/english/tratop_e/dispu_e/cases_e/ds431_e.htm
46
“The Pacific is a vast body of water and even though technology has made
logistics easier it would still be a monumental task to move troops, equipment, and
supplies. A strong military alliance with Japan would allow the U.S. to establish a
“beachhead” in the area in the case of conflict.”23
Establishing a “beachhead” would allow the United States to respond more
quickly in the case of a conflict breaking out. Stronger ties with Japan, Taiwan, and the
Philippines would allow a U.S. presence in the region that may have the Chinese back off
and act less aggressively. Establishing a beachhead is exactly what the Chinese are doing
with the land reclamation projects and island building in the South China Sea. While
these island chains would not be able to sustain large advanced military bases they would
support airfields and small postings with communication towers and sensor relays. This
would give the Chinese the ability to have stand off distance and prevent more capable
navies from breaking through and striking the homeland.
The Chinese recognize that the United States Navy (USN) is a powerful opponent
and that one of the primary symbols of power is the aircraft carrier. This is one of the
reasons the Chinese have started a domestic aircraft carrier program. The recognition of
the USN’s carriers being a threat by the Chinese have led them to develop a weapon that
has been dubbed the “carrier killer”. The DF-21 Dong Feng is an anti-ship ballistic
missile that is fired from land based mobile truck launchers. Depending on the variant it
has a range of 930 miles to 1100 miles and it carries a 600kg warhead with the capability
of being nuclear tipped. Due to the supersonic nature of the weapon and the amount of
23Moody, Brian “The Rise of the Dragon: The Growing Chinese Threat” American Military University (Mar. 2015)
47
kinetic energy it would gain after launch it is entirely feasible that this missile would be
able to sink an aircraft carrier.
Even with the DF-21 a very capable missile the missile itself needs a significant
amount of targeting data from satellites and sensors before it is able to hit a non-
cooperative moving target. The Chinese have begun to address this both with creating
artificial islands that radar installations and other communication outposts could be
stationed on and developing technology that would assist in the location of a mobile
carrier group. The development of the Yuanmeng a lighter than air airship that is capable
of staying aloft for a 24 hour time period would be critical in feeding data to targeting
computers for any strike on a carrier group or any U.S. naval fleet operating within the
region.
The United States is very capable of destroying and disrupting the sensor network
that the Chinese would be reliant on during an open conflict. Even though the Yuanmeng
is at an altitude that is out of range for most missile systems the United States does have a
weapon that can reach it. The SM-3 Block IIA ballistic missile interceptor can reach the
altitude that the Yuanmeng operates at. This missile has been used in the past to destroy a
satellite that was in a decaying orbit and posed a threat. Another platform that can
potentially be able to destroy the Yuanmeng is the Air Force’s new space plane X-37B.
This program is highly classified and little is known about its mission or its operational
capabilities however it could be designed specifically for a mission to target airships like
the Yuanmeng or satellites that would have the effect of blinding an enemy during a
conflict.
48
The Chinese have modernized the PLAN in ways the United States has neglected.
The Chinese have made sure that PLAN warships are often armed with a complement of
anti-ship missiles capable of inflicting severe damage to most naval vessels. The USN
has focused mainly on land attack outfitting USN warships with cruise missiles designed
to hit stationary targets. The PLAN also recognizes the potential for mine warfare and
how a cheap mine can severely damage or destroy a multi-million dollar advanced vessel.
With a foothold in the Spratly Island chain the Chinese could lay out a barrier of mines
protecting the islands from any naval incursions. Laying out a minefield of sea mines
would funnel China’s adversaries to a battle space of China’s choosing.
A counter to this would be for the United States to realize that a new player has
emerged in the realm of blue-water naval operations and to modify and retrofit naval
vessels to respond to an emerging threat. Outfitting naval vessels with anti-ship missiles
as well as the typical Tomahawk cruise missile would allow the naval vessel to be more
versatile and be available for a wider range of operations. Upgrading and building more
mine warfare capable ships and outfitting existing ships with better anti-mine capabilities
should also take place.
Activities that take place between the two countries that read like they are from a
Soviet spy novel take place between China and the United States. While the Cold War
between the Soviet Union and the United States did not have the technology that allowed
for the operations that take place in the cyber realm today, similar operations of
espionage and intelligence gathering are taking place between China and the United
States. These operations are now online in cyberspace instead of the back alley meetings
that take place in cloak and dagger stories.
49
Cyber warfare can be perpetrated by state and non-state actors and because of its
nature it is very difficult to trace to a particular group and even more difficult to provide
enough evidence to sanction or punish the offending group. While undoubtedly the U.S.
uses cyber warfare to achieve its national security objectives other countries are also
engaged in cyber warfare as well.
Data breaches in government agencies as well as defense contractors have been
traced back to Chinese servers. These breaches have resulted in the loss of terabytes of
data and will give the thieves the ability to gain a rather intimate look in government
operations and insider knowledge of future weapon systems. Many analysts point to the
remarkable similarities of Chinese weapon technology specifically the Chinese J-31 as
evidence of how the Chinese used the information that was stolen and evidence that the
Chinese government was behind the data breaches
If the United States does not address cyber attacks or cyber espionage properly
then the United States will continuously be on the defensive. The situation is very serious
and it can level the playing field for nation states that would have no hope of standing up
to a superpower. If other nations with cyber capabilities see that the United States is
vulnerable then those nations may exploit the lack of cyber defense and conduct
operations similar to the Chinese.
The United States needs to invest in network defense and strengthening cyber
security. Not only do federal agencies need a strong cyber defense, businesses and
corporations need a cyber defense as well. Legislation mandating a federal minimum for
cyber defense networks should be proposed. Even if private corporations do not adopt a
strong cyber defense any company that does business related to national security or
50
defense or a company contracted by the federal government should have a mandatory
minimum set for cyber defense networks.
The reasons that private companies need a stronger cyber defense is that breaches
in private corporations can expose vulnerabilities at the federal level. The recent hack of
Ashley Madison a company that promotes discreet liaisons between married adults
exposed a number of federal employees who had signed up for the service. This exposure
wasn’t just a personal embarrassment but it opened up the employee to exploitation by
foreign services. The employees using this service became compromised and had
material that could be used to manipulate them into revealing sensitive or classified
information.
A data breach at the Office of Personnel Management (OPM) exposed thousands
of personnel files of employees working in the federal government. These files contained
sensitive information about background investigations, discipline, and information on
family members. The Chinese have been building a Facebook type database of federal
employees, this online lexicon will give the Chinese an idea of a specific individual that
should be targeted for possible exploitation.
The United States has lodged formal complaints about Chinese cyber practices
with the WTO however it may be time for more aggressive action from the United States.
Using cyber operations as a form of covert action the United States can inflict damage on
the Chinese as well potentially staving off more attacks or reducing the frequency of the
attacks. The United States can use cyber warfare tactics to disrupt Chinese
communications and undermine military capabilities. This can decrease morale within the
PLAN especially as the PLAN grows in strength and confidence. If any open conflict
51
were to break out between China and the United States the cyber realm would be an
important battle space to control.
As the quest for resources drives conflict in the disputed regions the Chinese will
look into expanding into other areas that will cause conflict with the United States. While
the United States does not claim any of the resources located in the China Sea the United
States will want to ensure that shipping through the heavily trafficked Malacca Straits
would remain free of harassment and unopposed. A naval presence by the United States
in this region would ensure that those vital shipping lanes remain open and that they do
not become a target in the case of a conflict or that any minor military incident does not
occur near the shipping lanes.
With the Chinese eyeing the Arctic as a potential area for energy exploration this
is an area that China will come into conflict with the United States. Since the Chinese do
not possess territory that is in the Arctic region the Chinese government will have more
of a difficult time claiming any of the resources in the area. The United States can engage
in a form of legal warfare citing historical documents and past treaties and agreements
with other nations that possess Arctic territory to try and block the Chinese from gaining
a foothold in the area.
For the United States to secure the resources located in the Arctic the United
States needs to invest in icebreakers that can open up lanes within the ice to allow for oil
and natural gas exploration. Currently the United States operates two icebreakers
although one has been stuck in dry-dock in Seattle. The United States has not currently
commissioned any new icebreakers to be built. While China only has one icebreaker
currently the Chinese government has commissioned the building of another icebreaker.
52
When it is completed it will give the Chinese the same number of icebreakers as the
United States and the Chinese have proposed as many as three more icebreakers. The
United States will continue to have the advantage in nuclear submarines that can patrol
the Arctic and maintain a presence under the ice however these submarines won’t be able
to break the ice, a necessary requirement if shipping lanes and exploration of the Arctic is
to occur.
The United States can avoid tensions with China if the United States can diversify
the way they procure certain resources such as rare-earth metals. While China has a
significant amount of rare-earth elements Australia and India also have areas that have
minable rare-earth elements. As tensions remain high the United States can use Australia
or India as a new supplier of rare-earth elements solidifying relationships with those
countries and sending China an economic message.
When it comes to the economy many feel that China has an advantage due to the
expanding trade deficit. This may not necessarily be the case. Using the example of a
bank if a person owes the bank one million dollars than the bank can control the terms of
that loan. The bank is in a better position and will hold all the chips when it comes to
negotiations. If a person owes a hundred million dollars to the bank than the person has
more power over the bank. The bank cannot afford for the person to default, as it is an
existential threat to the banks survivability. This is a similar situation between the United
States and China. The Chinese government could not afford for the United States to
default on the trade debt. It would be politically destructive to both nation’s if the
Chinese decided to collect the debt and the United States did not have the money. The
53
trade deficit while an issue that is a sore point between the two countries is not an issue
that will drive the two countries to open conflict.
The larger economic issue that has caused tensions is the theft of intellectual
property by Chinese corporations. This is not only an issue that the United States has
addressed the European Union has addressed as well. This is an area where nations are
reliant on the dispute process by the WTO and while it negatively affects diplomatic
relations it is not an area that will cause armed conflict between the United States and
China.
Going forward it is important to recognize the areas of tension between the United
States and China. The Chinese have shown signs of aggression to the U.S. And have been
openly hostile to their neighbors. The United States has several alliances and pacts with
nations in the region. The United States cannot continue the policy of always fighting the
last war. The United States will need to assess the three major types of security as it
develops a national defense strategy in particular as it deals with China.
The first is systemic security and it is best described as a global environment
where the policies have led to the elimination of war or have limited warfare within the
world. The next type of security is state security and it is considered the security of the
government. This security is to ensure that the state continues to exist in its present state.
Primary threats to this system are insider type threats. Economic collapse, insurgency,
and terrorism all affect a nation’s state security. The third type of security is societal
security and this primarily refers to the people within a nation and the type of security
that the population enjoys. This is a very autonomous form of security and it refers to the
54
ability of the people to protect themselves. This is a type of security that can be eroded by
strong state security.24
Assessing the type of security that the United States needs when developing a
policy towards China the United States can also look at successful collaborative efforts as
ideas to help contain China and deal with aggressive actions. Using the example of the
North Atlantic Treaty Organization (NATO) a similar organization could be proposed
amongst the Asian regional powers.
NATO is a political and military alliance made up of 28 countries that believe in
the collective defense of all. This treaty is known as Article 5 in the Washington Treaty.
It stipulates that if one member state is attacked then all of the members have been
attacked and should provide for the mutual defense of each other. Forming a military
alliance in the Pacific with nations such as Australia, Japan, Korea and the Philippines
could be helpful and to dissuade Chinese concerns have the primary mission as
containing the North Koreans. This Pacific Rim alliance can have as a mission statement
the provision for providing safe and secure international shipping. This statement will
deal with piracy in the Malacca Straits and the coastal regions of Thailand and the
Philippines as well as Indonesia and Malaysia.
There can be several advantages and disadvantages to a collective security
arrangement or organization. One such advantage is safety in numbers. A nation is less
likely to attack another nation if it knows that the attack would incur the wrath of other
nations that would come to the defense of the nation being attacked. Not only is mutual
defense an advantage another advantage is mutual aid. In the event of a disaster mutual
24Morgan, Patrick M. "An Introduction to Security in International Relations." International Security: Problems and Solutions. Washington, D.C.: CQ Press, 2006.
55
aid is usually another stipulation of a collective security agreement. Any type of natural
disaster or man-made disaster and you could rely on your allies to give you support either
in humanitarian aid or defense and security.
Another advantage is information and intelligence sharing. All member states can
share information about adversary capabilities, pending attacks, or criminal and terrorist
organizations. This helps improve response time and can disrupt potential plots. Of
course these advantages also come with disadvantages too.
The disadvantage to mutual defense is that a small conflict can escalate into a
larger war as more and more countries get involved due to mutual aid and defense
treaties. In the case of information and intelligence the more parties that are involved the
higher probability that a member’s intelligence service will be penetrated exposing
valuable information.
These advantages and disadvantages will need to be weighed very carefully as
well as whether the creation of a Pacific Rim Alliance will escalate tensions to a level
where de-escalation is impossible.
Conclusion
In conclusion this paper set out to answer the research question “Is China’s
aggressive foreign policy and military modernization challenging the status quo and
leading to a potential Cold War relationship with the United States?” The findings show
that China and the United States have entered into a time period where tensions are high
and there is potential for conflict. Defining what a Cold War is can help interpret the
results of the findings in this paper. A Cold War is a term defined as “ a conflict over
ideological differences carried on by methods short of sustained overt military action and
56
usually without breaking off diplomatic relations”25 Using this definition clarifies that the
relationship between China and the United States has reached the status of a “Cold War”.
The actions taken by the Chinese and the United States are methods that are short of overt
military action and the differences between the two nation’s ideologies are very apparent.
Conflicts between naval vessels and in the cyber realm will continue unless a unified
overwhelming show of force or support for one nation occurs. Even with this support it is
unclear on if it would change either the United States or Chinese foreign policy.
It is unlikely that the Chinese will seek out open conflict with the United States.
The ramifications for China as well as the rest of the world are too severe. Likewise the
United States will press China aggressively but will also stop short of calling for open
warfare. This is an area that requires further study and review as tensions within this
region and the foreign policies between China and the United States are fraught with
areas that could lead to misinterpretations or military incidents that could lead to
escalation of hostilities. In a global environment and an environment that is so
interconnected the smallest military incident can quickly spiral out of control while other
nations attempt to join in the fray. This is why this topic is of the utmost importance for
national leadership within China and the United States to understand the complexities of
diplomatic relations between the two nations and the policy decisions that can lead to a
better future for both parties involved.
25 "Cold War." Merriam-Webster.com. Accessed December 1, 2015. http://www.merriam-webster.com/dictionary/coldwar
57
References
Adams, James “Virtual Defense” Foreign Affairs Vol. 80 No. 3 (May/June 2001)
Arquilla, John. 2012. “Cyberwar Is Already Upon Us.” Foreign Policy no. 192: 1-4.
International Security & Counter Terrorism Reference Center
Blanchard,Jean-MarcF.2000.TheU.S.RoleintheSino-JapaneseDisputeOverthe
Diaoyu(Senkaku)Islands,1945-1971.ChinaQuarterly(161)(03):95,
Blasko, Dennis J. 2011. "An Analysis of China's 2011 Defense Budget and Total Military
Spending -- The Great Unknown." China Brief 11, no. 4: 4-6. International
Security & Counter Terrorism Reference Center
Brownlee, Lisa. “New Report of Malicious Chinese Cyber Attack on a U.S. Government
Agency” Forbes.com (September 25, 2015)
http://www.forbes.com/sites/lisabrownlee/2015/09/25/new-report-of-malicious-
chinese-cyber-attack-on-a-u-s-government-agency/
Colarik,AndrewM.andLechJanczewski.2012“EstablishingCyberWarfare
Doctrine.”JournalofStrategicSecurity5no.1:31-48
58
“ColdWar."Merriam-Webster.com.
http://www.merriamwebster.com/dictionary/coldwar
DisputeSettlementDS431“China–MeasuresRelatedtotheExportationofRare
Earths,TungstenandMolybdenum”WorldTradeOrganization(2012)
https://www.wto.org/english/tratop_e/dispu_e/cases_e/ds431_e.htm
Denk,Erdem.2005.InterpretingaGeographicalExpressioninaNineteenthCentury
CessionTreatyandtheSenkaku/DiaoyuIslandsDispute.International
JournalofMarine&CoastalLaw20(1)(03):97-116
Erikson,Andrew.“China’sBlueSoftPower.Antipiracy,Engagement,andImage
Enhancement”NavalWarCollegeReview68,no.1(2015)
Ganumt,John.2013.Xi'sWarDrums.ForeignPolicy(200)(May):77-83
J Marshall Beier “Bear Facts and Dragon Boats: Rethinking the Modernization of
Chinese Naval Power” Contemporary Security Policy, Vol. 26 No. 2 August
2005: pp. 287-316
Le Mière, Christian. 2011. The Return of Gunboat Diplomacy. Survival (00396338) 53
(5) (Oct): 53-68
59
Liao,Janet.2008.Sino-JapaneseEnergySecurityandRegionalStability:TheCaseof
theEastChinaSeaGasExploration.EastAsia:AnInternationalQuarterly25
(1)(03):57-78
Lockie,Alex.“Here’sHowChina’sAircraftCarrierStacksUpToOtherWorld
Powers”BusinessInsiderSeptember10(2015)
MansonGeorgeIII(2011)“Cyberwar:TheUnitedStatesandChinaPrepareForthe
NextGenerationofConflict”,ComparativeStrategy,30:2,121-133
Martemucci, Matteo “Unpunished Insults-The Looming Cyber Barbary Wars” Case
Western Reserve Journal of International Law Iss. 47 (2015)
Murphy, Martin. "Deepwater Oil Rigs as Strategic Weapons." Naval War College
Review 66.2 (2013)
Mizokami,Kyle."FiveJapaneseWeaponsofWarChinaShouldFear."TheNational
Interest.June14,2014.
Moody,Brian“CyberOperations:ANewFrontierinCovertOperations”American
MilitaryUniversityMar.(2015)
Moody,Brian“TheRiseoftheDragon:TheGrowingChineseThreat”American
MilitaryUniversity(Mar.2015)
60
Morgan,PatrickM."AnIntroductiontoSecurityinInternationalRelations."
InternationalSecurity:ProblemsandSolutions.Washington,D.C.:CQPress,
2006.
Murphy,Martin."DeepwaterOilRigsasStrategicWeapons."NavalWarCollege
Review66.2(2013)
Navarro, Peter. “China’s Currency Manipulation: A Policy Debate” World Affairs
September/October 2012
Rainwater,Shiloh.“RacetotheNorth:China’sArcticStrategyanditsImplications”
NavalWarCollegeReviewVol66,No2.Spring(2013)
Rid, Thomas. "Think Again: Cyberwar." Foreign Policy, no. 192 (Mar, 2012): 80,84,9,
http://search.proquest.com/docview/927664011?accountid=8289.
Rowan, Joshua P. 2005. The U.S.-Japan Security Alliance, ASEAN, and the South China
Sea Dispute. Asian Survey 45 (3) (May/June): 414-36,
http://www.jstor.org/stable/10.1525/as.2005.45.3.414.
61
Pan,Zhongqi.2007.Sino-JapaneseDisputeOvertheDiaoyu/SenkakuIslands:The
PendingControversyFromtheChinesePerspective.JournalofChinese
PoliticalScience12(1)(03):71-92
Slaughter,Ann-Marie."InternationalRelations,PrincipalTheories."MaxPlanck
EncyclopediaofPublicInternationalLaw,2011
“The Chinese Revolution of 1949. 1945-1952 Milestones” Office of the Historian U.S.
Department of State 2015
https://history.state.gov/milestones/1945-1952/chinese-rev
The Service Sector: Projections and Current Stats” http://dpeaflcio.org/programs-
publications/issue-fact-sheets/the-service-sector-projections-and-current-stats/
Tsukasa Takamine, “A New Dynamism in Sino-Japanese Security Relations: Japans
Strategic use of Foreign Aid” The Pacific Review, Vol. 18 No. 4 December 2005:
439–461
“United States Maritime Expansion across the Pacific during the 19th Century 1830-1860
Milestones” Office of the Historian U.S. Department of State 2015
https://history.state.gov/milestones/1830-1860/pacific-expansion