For 25 years, Rear Adm. Michael Studeman, USN, director, J-2, U.S. Indo-Pacific Command, has been sounding the warning bell about the government of China and the threat it brings to the world and the United States. The threat is real, and China’s intent is clear, the leader has warned. The United States must now examine the time elements associated with China’s dangerous moves, the intelligence leader says.
NATO is increasing the amount of joint work on command and control (C2) systems as a result of increases in common funding, according to the alliance’s secretary general. Jens Stoltenberg told a media roundtable that “We are on the right track” as the allies are stepping up to meet changing challenges. These efforts include developing an offensive cyber capability and establishing a unified approach to China.
From the virtual realm to zero gravity, China is posing a serious threat to U.S. national security that goes far beyond the Earth. With a strategic thrust designed to buttress and expand the reach of the Chinese Communist Party, the country is engaged in a long march for control that currently includes operations inside the United States as well as in orbit and beyond.
Global changes increasing at an accelerated pace will drive new threats to international security, and some of these are already manifest in the worldscape, according to a pair of just-released U.S. intelligence community forecasts. Yet the diversity of these changes and their possible outcomes offer different potential scenarios ranging from “a renaissance of democracies” to “tragedy and mobilization.”
China’s quest for global dominance is definitive and open, said the director for intelligence (J-2) in the U.S. Indo-Pacific Command (INDOPACOM). Rear Adm. Michael Studeman, USN, held little back as he described China’s maneuvering and aggressive tactics as it pursues a long-term strategy of world domination.
The revolutionary advantages offered by defense use of 5G technology could be undone if the United States doesn’t begin now to meet and overcome a set of challenges, said an expert from the National Security Agency (NSA). These challenges range from developing effective security measures to ensuring the supply chain is not contaminated by parts made by foreign adversaries.
Ever since the Sputnik scare of 1957, space has been front and center on the U.S. national security agenda. Successive administrations have highlighted the essential role of space-based capabilities such as GPS, satellite imagery and real-time global communications in undergirding U.S. military power.
China is using the COVID-19 pandemic to progress its goal of global dominance. The adversary is using its vaccination program and assistance to poorer countries in the democratic Western Hemisphere to cement the use of China’s 5G communications and information technology, especially in the Caribbean and Central and South America, leaders say. The problem is that what starts as a veiled commercial interest ends with a significant military application and connection—given that the commercial companies, like Huawei, are all state owned, explained Adm. Craig S. Faller, USN, commander, U.S. Southern Command.
With its rapid-fire information operations campaign, China effectively outguns the United States and its partners and allies in the Indo-Pacific region, according to three military officers from the United States and Australia.
The seas of the Indo-Pacific region are an increasingly complex maritime environment. To combat an increase in nefarious activity, protect U.S. economic security and thwart brazen adversaries, the U.S. Coast Guard is adding resources to its operations there, says Vice Adm. Linda Fagan, USCG, commander, U.S. Coast Guard Defense Force West and commander, Pacific Area, presented a keynote address Thursday at AFCEA’s TechNet Indo-Pacific conference.
“The erosion of conventional deterrence vis-à-vis China” is the greatest danger the United States faces in the Indo-Pacific region, says the head of the vast area’s command. Adm. Philip Davidson, USN, commander of the U.S. Indo-Pacific Command (INDOPACOM), added that “without a valid and convincing conventional deterrent, China will be emboldened to take action to supplant the established rules-based international order.”
The rise of the People’s Republic China as a peer competitor vying for superpower status has emerged as an important challenge for the United States. To confront this competition, policy and decision makers must preserve and extend U.S. global interests to deter China if necessary and work in the international system in which the United States plays a vital role.
The entire nation must engage in an informed debate about cybersecurity and how to stop the damage being inflicted by adversaries through cyberspace, says the director of intelligence for the U.S. Cyber Command. Brig. Gen. Matteo Martemucci, USAF, J-2 for the U.S. Cyber Command, says this debate must explore whether the roles played in cyber defense stay the way they are or change.
The formation of the U.S. Space Force has led to more advanced cooperation in the space domain with existing and new partners, according to the force’s chief of space operations. Gen. John Raymond, USSF, noted that some nations even followed the U.S. example in giving space an increased priority as a warfighting domain.
Speaking at a Defense Writers Group media roundtable, Gen. Raymond stated that the United States is stronger as a nation with a stable and secure space domain. “The United States is a spacefaring nation, and we’ve long known that access to space and freedom to maneuver in space underpin all the instruments of our national power,” he declared.
The greatest threat the United States faces is through cyber attacks on economic targets, and the worst adversary in this realm is China, according to the director of intelligence for the U.S. Cyber Command. Brig. Gen. Matteo Martemucci, USAF, J-2 for the Cyber Command, declared that China’s pilferage of intellectual property represents a major strike against the United States as part of the Middle Kingdom’s plan for global domination.
Massive amounts of sensitive information on U.S. citizens are being collected, created, shared, bought and sold, and in some cases used as a weapon by the country’s adversaries, according to a panel of experts speaking at the AFCEA TechNet Cyber conference, a virtual event held December 1-3.
The information is gathered and sold by companies such as Facebook and Google and the producers of a wide range of applications, programs and technologies.
Despite attempts from adversaries such as China, Iran and Russia to compromise voting on America’s Election Day, the election system worked well, even with the record levels of voting, reported senior officials with the U.S. Department of Homeland Security’s (DHS’) Cybersecurity and Infrastructure Security Agency (CISA). The cybersecurity concerns now move to protecting the final vote counting, canvasing, auditing, certification and inauguration phases.
In its quest for global supremacy, China has overtaken the United States in some areas but remains uncertain of its own position in head-to-head competition. The United States can take advantage of this status, but must be careful of overconfidence.
These were two key points expressed by Rear Adm. Michael Studeman, USN, director of intelligence/J-2, U.S. Indo-Pacific Command (INDO-PACOM). Speaking at a virtual AFCEA Hawaii Chapter luncheon, Adm. Studeman cited these elements as he focused on seven myths about China.
The United States and its great power rivals are taking different paths in their pursuit of artificial intelligence (AI), but all three are devoting significant resources to what they believe will be a game changer. Their uses of AI also are likely to be different, as their approach to ethics varies according to each nation’s principles.
A breakout session panel provided a global view on the race for AI during the third and final day of the AFCEA/INSA Intelligence and National Security Summit being held online September 16-18. Panelists assessed the differences in AI research and applications among Russia, China and the United States.
China is steadily pursuing its global goals based on a series of core issues that are not likely to be affected by international actions, said a panel of experts. The United States must take bipartisan actions to boost its own standing relative to China, even if the upcoming election results in a change of parties in the White House come January 2021.
These were among many points introduced by experts in a breakout session during the second day of the AFCEA/INSA Intelligence and National Security Summit being held online September 16-18. They assessed China’s activities in and against the United States and recommended some actions to be taken by U.S. leaders.
Just as with terrorism, disinformation can be home-grown and as damaging to a democracy as its foreign counterpart. It will take a partnered effort among all people and elements of a democracy to combat disinformation and restore truth to its mantle of supremacy before the institutions that underpin freedom crumble under the weight of lies and other propaganda. The threat is growing and is widespread, as purveyors of falsehoods adjust their tactics to increase effectiveness.
China’s global moves to gain technological hegemony over 5G and reshape the Internet to suit its own needs offer the potential to give the Middle Kingdom control over the telecommunications market and information itself. At the very least, it would achieve market dominance. But at most, it would control both the nature of the Internet and the information that flows through it, say Internet experts.
U.S. trade secrets are being stolen by Chinese espionage at an alarming rate, and a Justice Department initiative is focusing on stopping the stealing. While cyber espionage is well known and hugely effective, the insider threat has shown to be equally damaging as the Middle Kingdom fuels its economic and military sectors with state-of-the-art U.S. technology.
The COVID-19 pandemic has had a sweeping effect across the Indo-Pacific region, but ultimately the most disruptive security threat to that vast area may turn out to be China’s strongarm moves against Hong Kong, says the head of the U.S. command for that region. Adm. Phil Davidson, USN, commander of the U.S. Indo-Pacific Command, specifically cited the Hong Kong crackdown as having a greater effect on security over that hemisphere of the globe.
Last of a multipart series.
The success of China’s foray into Internet control ultimately may be determined by the growth of the Internet itself, according to an Internet expert. While China seeks economic benefit from having its prime technology companies become the providers of choice for Internet customers, it also looks forward to being able to control Internet use outside of its borders. The ongoing evolution of the Internet, particularly its spread into a growing number of devices, may be China’s best asset for realizing its aims.
Threats to global security now include the ongoing pandemic, its exploitation by international malefactors and climate change, according to an ad-hoc group of international defense and national security experts. These experts spent two days brainstorming the future online, and their findings were analyzed by the world’s most well-known artificial intelligence (AI) computer.
Titled “Securing the Post-COVID Future,” the event exchanged ideas among active duty military and civilian expertise with several international organizations. Findings during the 50-hour nonstop event were evaluated by tools from Watson, IBM’s question-answering computer that bested Jeopardy!’s top two champions in a competition a few years ago.
After two years as the commander of the Pacific Air Forces, or PACAF, Gen. Charles Brown Jr., USAF, moves on from guiding airmen and operations in the complicated region. During a time of growing near-peer competition from China, Gen. Brown leaves advice for the new commander of PACAF, Lt. Gen. Kenneth Wilsbach, USAF. Gen. Wilsbach, who also will receive his fourth star, takes the helm at PACAF today.
Previously, Gen. Wilsbach was the commander of the 7th Air Force and the deputy commander of U.S. Forces in Korea.
When asked what advice he would give to the new PACAF commander, Gen. Brown, speaking virtually to AFCEA International’s Hawaii monthly chapter meeting last week, suggested that, “relationships really matter.”
Third of a multipart series.
The seeds of future telecommunications are being planted in China. But the question remains, will they take root globally?
China’s cyber policy has both economic and political sides to it. On the economic side, flooding the global market with subsidized Chinese-made technologies offers the chance for major financial rewards as this equipment and its services become ubiquitous. On the political side, introducing Chinese standards to the Internet and cellular service will give the nation control over both services and data.
Second of a multipart series.
China’s high-technology communications and networking industries are proposing a host of future capabilities to come if vendors cast their lot with companies such as Huawei and ZTE. But these new technologies, once ensconced, would lead their users down a path closed to others and open to Chinese government control, say Internet experts.
First of a multipart series.
The next-generation Internet proposed by Huawei and supported by the Chinese government would provide a platform for revolutionary capabilities while implementing repressive measures that would eliminate today’s open communication. At worst, it would place control of Internet content in the hands of a few masters. But even if it does not subsume the entire Internet, it would cripple the interoperability that has characterized the network’s value as an economic growth engine by creating separate and unequal Internets.
U.S. adversaries are trying to take control of cyberspace as a medium, resulting in implications to our freedom of maneuver and access in cyberspace, says Brig. Gen. Gregory Gagnon, USAF, director of Intelligence (A2), Headquarters Air Combat Command (ACC), Joint Base Langley-Eustis. Increasing cyberspace activity is coming from China, Russia, Iran and North Korea.
“We are seeing it not just in volume, but we are seeing an expansion in the ways that they use cyberspace, whether it is to steal information, whether it is to directly influence our citizens or whether it is to disrupt critical infrastructure,” Gen. Gagnon reports. The general spoke at the AFCEA Tidewater chapter’s recent monthly virtual luncheon.
The United States is overly dependent on foreign sources, especially China, for personal protective equipment such as the gear required during pandemics, including the ongoing COVID-19 outbreak, according to Ellen Lord, the undersecretary of defense for acquisition and sustainment.
Lord made the comments during an press April 30 press briefing that was streamed online.
A broadly expanded and multifaceted training effort entailing multiple friends and allies will be necessary to forestall Chinese adventurism in the Indo-Pacific region, said the commander of U.S. forces there. Adm. Philip S. Davidson, USN, commander, U.S. Indo-Pacific Command, laid out an extensive description of the threat China poses to the global community on the final day of WEST 2020, the conference and exposition in San Diego March 2-3 co-sponsored by AFCEA International and USNI.
The United States is woefully underprepared to protect cyberspace against the worst-case scenarios threatening the country, says the former supreme allied commander of NATO. Adm. James Stavridis, USN (Ret.), operating executive for the Carlyle Group, warns that long-term solutions must be paired with near-term actions to prevent a host of cyber threats from crippling the United States militarily and economically.
The United States and China are locked in a competition to take command of fifth-generation spectrum technologies known as 5G. Because those technologies will enable autonomous vehicles, smart cities and battlefield operations, the leading nation will reap commercial, economic and military benefits. To spur U.S. innovation, the Defense Department is largely relying on the National Spectrum Consortium, a research and development organization designed to develop revolutionary spectrum-related technologies through collaboration among industry, academia and government agencies.
The U.S. Defense Department has released two more draft requests for prototype proposals seeking fifth-generation (5G) wireless solutions. The newly announced projects are for smart warehousing and asset management for Naval Supply Systems Command and augmented reality and virtual reality at Joint Base Lewis-McChord in Washington.
China has no ambiguities about its concept of the global future. The rising superpower wants to replace the current system of international laws and guaranteed freedoms with one built around Chinese control of geography, commerce and information.
Thus defined, this challenge formed the basis of the keynote luncheon speech on the first day of TechNet Indo-Pacific, held November 19-21 in Honolulu. The speaker was Adm. Phil Davidson, USN, commander, U.S. Indo-Pacific Command (INDOPACOM), and he pulled no punches in describing how China has dropped all illusions of peaceful coexistence in its drive toward global domination.
The U.S. Indo-Pacific Command (INDOPACOM) harbors no illusions about China’s capabilities and intentions, its officials say. Experts who long have followed the Middle Kingdom’s official publications and statements have understood the nation’s aggressive nature and threat to peace and security, according to the director of intelligence (J-2) for INDOPACOM. These issues are now front and center for INDOPACOM as China expands its military and political reach to disrupt the peace and security of the entire Indo-Pacific region.
Adversaries are exploiting the inherent vulnerabilities of U.S. military supply chains that involve tens of thousands of private sector providers from all over the globe. Attack operations include stealing valuable technical data; striking critical infrastructure, manufacturing and weapon systems control systems; corrupting the quality and assurance across a broad range of product types and categories; and manipulating software to access connected systems and to degrade systems operation integrity.
The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.
China is investing heavily in the Indo-Pacific, a critical region of the world for strategic purposes, and luring poorer countries away from the United States, said Thomas Modly, undersecretary of the Navy.
Modly made the comments during an afternoon luncheon address on the first day of the West 2019 Conference in San Diego.
The response to the Chief of Naval Operations (CNO) Adm. John Richardson’s repeated request to “pick up the pace” of developing and implementing breakthrough technologies for our warfighters has gone, in my opinion, largely unheeded.
This is not the result of a lack of innovative solutions. A myriad of research and development programs exists to support the development of new technologies or to adapt existing commercial technologies to defense applications. Rather, it’s the result of an arcane acquisition process that is burdensome, expensive and lacking vision. Acquisition reform is where we need to pick up the pace!
The Warfighter Information Network–Tactical program delivered a digital transformation, enabling maneuver elements to move faster and provide commanders with vital battlefield information in near real-time. Its flexibility facilitated communications in Iraq’s urban environments and Afghanistan’s mountainous terrain. Although a powerful improvement over Mobile Subscriber Equipment, the technologies are not powerful enough to combat adversaries wielding cyber capabilities.
China is at the heart of many key geopolitical issues confronting the Indo-Pacific region. It has seen dramatic and unprecedented economic growth in the last three decades and is embarked on a path supporting that growth with a major expansion in military capabilities. China is a nation on the move, and its strategic behavior underscores a long-term goal of seeking hegemony over the vast Indo-Asia region where it resides and likely exerting extraordinary influence over global affairs.
China’s growth continues apace. Having surpassed Japan in gross domestic product, China is poised to overtake the U.S. economy as the world’s largest in the next decade. By some widely accepted standards, it has already done so.
With the United States engaged in a “long-term strategic competition” with China and Russia, which are mounting persistent cyber attack campaigns that pose long-term risks to America, the U.S. military will act to deter aggression, cyber or otherwise, according to a new policy, known as the Department of Defense Cyber Strategy, from the U.S. Department of Defense.
For the last decade, “informatization” of its national civilian and military infrastructure has been a top priority for the People’s Republic of China. The country’s efforts to become a global power in information and communications technology include a focus on signals intelligence. Out of its $150 billion total defense budget, the country is spending an estimated $15 billion on signals intelligence, said David Stupples, professor of electronic and radio systems, City, University of London, at an August 9 Association of Old Crows (AOC) online event.
The days of the United States’ stature as a force without equal appear to be over. The threat of near-peer competition with increasingly sophisticated adversaries is growing. As Secretary of Defense James Mattis says in the National Defense Strategy, "America has no preordained right to victory on the battlefield."
The generation that remembers “duck and cover” also recalls headlines that included the words Soviet Union and impending dangers. Today, a combination of global instability, rising authoritarianism and democracies in retreat may lead to similar yet more dangerous situations, and this time, the headlines also are likely to include the words “People's Republic of China.”
To succeed in the battlespace of the future and to ensure combat superiority over peer adversaries, the U.S. military must be equipped with capabilities to defend information networks in cyberspace and to secure unimpeded access to the electromagnetic spectrum. Adversaries are developing cyber and electronic warfare capabilities to conduct information operations against U.S. systems that will likely threaten the speed and accuracy of military communications, intelligence and data sharing channels, while maliciously altering or stealing the information itself. These capabilities often have complementary effects, which means integrating cyber and electronic warfare could provide a stronger protection and attack capacity for U.S.
Cloud computing, big data and cyber are among the capabilities that pose a major threat to U.S. forces, said Lt. Gen. Scott Berrier, Army deputy chief of staff, G-2.
“If you’re a threat actor out there, probably a little bit of investment in these areas is going to go a long way to make life very difficult for your adversaries,” Gen. Berrier told the audience at the AFCEA Army Signal Conference in Springfield, Virginia.