Threats to the Homeland
Threats to the homeland include both terrorist threats from non-state actors resident in ungoverned areas of South Asia and an active, developing ballistic missile threat from North Korea and credible Chinese nuclear missile capability to support other elements of China’s national power.
Terrorism Originating from Afghanistan and Pakistan (AfPak). Terrorist groups operating from Pakistan and Afghanistan continue to pose a direct threat to the U.S. homeland. Pakistan is home to a host of terrorist groups that keep the region unstable and contribute to the spread of global terrorism. The killing of Osama bin Laden at his hideout in Abbottabad, Pakistan, in May 2011 and an intensive drone campaign in Pakistan’s tribal areas bordering Afghanistan from 2010–2012 have helped to degrade the al-Qaeda threat. However, the presence of a major al-Qaeda training camp in southern Afghanistan that the U.S. and Afghan forces destroyed last October demonstrates that the international terrorist organization has the ability to regenerate, particularly in areas where the Taliban is influential. A joint U.S.–Afghan military operation involving 200 U.S. Special Operations Forces destroyed the al-Qaeda camp located in Kandahar province, killing 160 terrorists.1
In addition to al-Qaeda, several other like-minded terrorist groups still thrive along the Afghanistan–Pakistan border, carry out regular attacks in Pakistan and Afghanistan, and target U.S. interests in the region and beyond. The Afghan Taliban and its allies, headquartered in Pakistan, have stepped up attacks against the Afghan National Security Forces (ANSF) over the past year and are making a push to regain territory in Afghanistan as international forces depart. As of April 2016, around 13,200 U.S. and NATO troops were in Afghanistan as part of Operation Resolute Support to train and advise the Afghan forces.
The Afghan Taliban control more territory now than at any other time in the past 14 years, and the group was able to capture the northern city of Kunduz temporarily last October. A Taliban resurgence in Afghanistan could allow al-Qaeda to regain ground in the region and pave the way for terrorist groups of all stripes to reestablish bases there.2 Shortly after the fall of Kunduz, President Barack Obama reversed his earlier pledge to withdraw nearly all troops by the end of his term and said that the U.S. instead would keep a force level of 5,500 U.S. troops in the country when he departs office in January 2017. He later revised this further to say that he would keep 8,400 troops in place, with any further reductions up to his successor.3
ISIS also is seeking to make inroads into Pakistan and Afghanistan, but its efforts so far have met with only limited success. This is most likely due to al-Qaeda’s well-established roots in the region, ability to maintain the loyalty of the various South Asian terrorist groups, and careful nurturing of its relationship with the Afghan Taliban. The Afghan Taliban view ISIS as a direct competitor, vying for financial resources, recruits, and ideological influence. This competition was evident in a letter sent by the Taliban to ISIS leader al-Baghdadi in June of 2015, urging the group not to take actions that could lead to “division of the Mujahideen’s command.” There also have been reports of clashes between ISIS militants and the Taliban in eastern and southern Afghanistan.
A spokesman for the U.S.-led coalition in Afghanistan said in April 2016 that ISIS has the potential to be an “enormous” threat in Afghanistan, but its presence has declined since the beginning of 2016.4 According to the U.S. official, the U.S. carried out between 70 and 80 air strikes against ISIS targets in Afghanistan from January–March 2016. He also attributed ISIS’s waning footprint to Taliban attacks, local uprisings, and Afghan security force operations.
Pakistan’s continued support for terrorist groups that have links to al-Qaeda undermines U.S. counterterrorism goals in the region. Pakistan’s military and intelligence leaders maintain a short-term tactical approach of fighting some terrorist groups that are deemed to be a threat to the state while supporting others that are aligned with Pakistan’s goal of extending its influence and curbing India’s.
A terrorist attack on a school in Peshawar on December 16, 2014, that killed over 150 people, mostly children, shocked the Pakistani public and prompted the government led by Prime Minister Nawaz Sharif to introduce a National Action Plan (NAP) to reinvigorate the country’s fight against terrorism. The action plan includes steps like lifting the moratorium on the death penalty for terrorists, establishing special military courts to try terrorists, curbing the spread of extremist literature and propaganda on social media, freezing the assets of terrorist organizations, and forming special committees, comprised of army and political leaders, in the provinces to implement the NAP.
Implementation of the NAP and the Pakistani military’s operations against TTP hideouts in North Waziristan have helped to reduce Pakistan’s internal terrorist threat to some degree. A Pakistani think tank reported earlier this year that terrorist attacks were down by 48 percent in 2015 from the previous year.5 Nevertheless, the first few months of 2016 have seen major attacks in Pakistan. On January 20, militants stormed a university in the city of Charsadda in the northwest part of the country, killing at least 20 students and teachers. On March 27, Jamaat-ul-Ahrar, a splinter faction of the Pakistani Taliban, carried a suicide attack at a popular park in Lahore. The attack was targeted at Christian families celebrating the Easter holiday, but most of the victims were Muslim, and about half of the 72 killed were children.
There are few signs that Pakistan’s crackdown on terrorism extends to groups that target India, such as the Lashkar-e-Taiba (LeT), which was responsible for the 2008 Mumbai attacks, and the Jaish-e-Mohammed (JeM), which carried out an attack on the Indian airbase at Pathankot on January 2, 2016. In early April 2015, Pakistan released on bail the mastermind of the Mumbai attacks, Zakiur Rehman Lakhvi, who had been in Pakistani custody since 2009. The day before Lakhvi’s release, the U.S. Department of State had announced approval of nearly $1 billion in U.S. military sales to Pakistan.
In April 2012, the U.S. issued a $10 million reward for information leading to the arrest or conviction of LeT founder Hafez Muhammad Saeed. The LeT has engaged in recruitment and fundraising activities in the U.S. In September 2011, for instance, U.S. authorities arrested Jubair Ahmad, an American permanent resident born in Pakistan, for providing material support to the LeT by producing LeT propaganda and uploading it to the Internet. Ahmad reportedly attended an LeT training camp in Pakistan before moving to the U.S. in 2007.6
The U.S. trial of Pakistani American David Coleman Headley, who was arrested in Chicago in 2009 for his involvement in the 2008 Mumbai attacks, led to striking revelations about the LeT’s international reach and close connections to Pakistani intelligence. Headley had traveled frequently to Pakistan, where he received terrorist training from the LeT, and to India, where he scouted the sites of the Mumbai attacks. In four days of testimony and cross-examination, Headley provided details about his meetings with a Pakistani intelligence officer, a former army major, and a navy frogman who were among the key players in orchestrating the Mumbai assault.7
The possibility that terrorists could gain effective access to Pakistani nuclear weapons is contingent on a complex chain of circumstances. In terms of consequence, however, it is the most dangerous regional threat scenario. Concern about the safety and security of Pakistan’s nuclear weapons increases when Indo–Pakistani tensions increase. For example, during the 1999 Kargil crisis, U.S. intelligence indicated that Pakistan had made “nuclear preparations,” which spurred greater U.S. diplomatic involvement in defusing the crisis.8
If Pakistan were to move around its nuclear assets or, worse, take steps to mate weapons with delivery systems, the chances for terrorist theft or infiltration would increase. Increased reliance on tactical nuclear weapons (TNWs) is of particular concern because launch authorities for TNWs are typically delegated to lower-tier field commanders far from the central authority in Islamabad. Another concern is the possibility for miscalculations leading to regional nuclear war if top Indian leaders were to lose confidence that nuclear weapons in Pakistan are under government control or, conversely, assume they were under Pakistani government control after they ceased to be.
There is concern that Islamist extremist groups with links to the Pakistan security establishment could exploit those links to gain access to nuclear weapons technology, facilities, and/or materials. The realization that Osama bin Laden stayed for six years within a half-mile of Pakistan’s premier defense academy has fueled concern that al-Qaeda can operate relatively freely in parts of Pakistan and might eventually gain access to Pakistan’s nuclear arsenal. A Harvard University Belfer Center for Science and International Affairs study noted in 2010 that Pakistan’s stockpile “faces a greater threat from Islamic extremists seeking nuclear weapons than any other stockpile on earth.”9
There is the additional, though less likely, scenario of extremists gaining access through a collapse of the state. While Pakistan remains unstable because of its weak economy, regular terrorist attacks, sectarian violence, civil–military tensions, and the growing influence of religious extremist groups, it is unlikely that the Pakistani state will collapse altogether. The country’s most powerful institution, the 550,000-strong army, which has ruled Pakistan for almost half of its existence, would almost certainly intervene and take charge once again if the political situation began to unravel.10 The potential breakup of the Pakistani state would have to be preceded by the disintegration of the army, which currently is not plausible.11
WWTA: Although the WWTA assesses that “fighting in 2016 will be more intense than 2015” and will “continue to threaten US personnel, our Allies, and international partners—including Afghans—particularly in Kabul and other urban population centers,” it does not reference any threat to the homeland from AfPak-based terrorism. It does note, however, that despite the degradation of al-Qaeda’s leadership in Afghanistan and Pakistan, al-Qaeda “nodes” there are “dedicating resources to planning attacks.” It also says that the Khorasan branch of ISIS in South Asia “will probably remain a low-level threat to Afghan stability as well as to US and Western interests in the region in 2016.”12
Summary: The threat to the American homeland emanating from Afghanistan and Pakistan is diverse, complex, and mostly indirect and largely involves non-state actors. The intentions of non-state terrorist groups like the TTP, al-Qaeda, and ISIS toward the U.S. are demonstrably hostile. Despite the broad and deep U.S. relationships with Pakistan’s governing elites and military, however, it is likely that the political–military interplay in Pakistan and instability in Afghanistan will continue to result in an active threat to the American homeland.
Missile Threat: North Korea and China. The two sources of the ballistic missile threat to the U.S. are very different in terms of their sophistication and integration into broader strategies for achieving national goals. The threats from North Korea and China are therefore very different in nature.
North Korea. In December 2012 and February 2016, North Korea successfully put a satellite into orbit. The same technology that launches satellites can be used to build intercontinental ballistic missiles (ICBMs). North Korea conducted its third and fourth nuclear tests in 2013 and 2016. These events clearly signaled that new leader Kim Jong-un had no intention either of resuming North Korea’s Six-Party Talks pledge to denuclearize or of abiding by U.N. resolutions that require a cessation of Pyongyang’s nuclear and missile programs. Instead, Kim Jong-un would continue North Korea’s decades-long quest to develop nuclear weapons and the means to deliver them.
North Korea has declared that it already has a full nuclear strike capability, even altering its constitution to enshrine itself as a nuclear-armed state.13 Among North Korea’s many direct verbal threats to the U.S., the regime warned in March 2016 that it would “reduce all bases and strongholds of the U.S. and south Korean warmongers for provocation and aggression into ashes in a moment, without giving them any breathing spell.”14
The United States and South Korea have revised their estimates and now see a more dire North Korean threat. After recovering components of the ICBM launched by North Korea in December 2012, South Korea assessed that it had “a range of more than 10,000 kilometers.”15 U.S. Vice Chairman of the Joint Chiefs of Staff Admiral James A. Winnefeld, Jr., attested to the North Korean missile threat in March 2013 when he stated, “We believe the KN-08 [North Korean long-range missile] probably does have the range to reach the United States.”16
In April 2015, General Curtis Scaparrotti, commander of U.S. Forces Korea, testified that he believes the North Koreans “have had time and capability to miniaturize a nuclear warhead. They have stated that they had had intercontinental missiles and they had a nuclear capability, and they paraded it. As a commander, I think, we must assume that they have that capability.”17 Admiral Bill Gortney, commander of the North American Aerospace Defense Command, similarly told reporters that the KN-08 road-mobile ICBM “is operational today. Our assessment is that they have the ability to put a nuclear weapon on a KN-08 and shoot it at the [U.S.] homeland.”18 North Korea has also had some very limited success with tests of submarine-launched ballistic missiles (SLBMs), of which there have been at least five since May 2015, including successful ejection and, most recently, sending a missile 30 kilometers down range.19
According to press reports, U.S. experts concluded that the recovered North Korean missile provided “tangible proof that North Korea was building the missile’s cone at dimensions for a nuclear warhead, durable enough to be placed on a long-range missile that could re-enter the earth’s atmosphere from space.”20
China. Chinese nuclear forces are the responsibility of the People’s Liberation Army (PLA) Rocket Forces (PLARF), one of the three new services created on December 31, 2015. China’s nuclear ballistic missile forces include land-based missiles with a range of 13,000 kilometers that can reach the U.S. (CSS-4) and submarine-based missiles that can reach the U.S. when the submarine is deployed within missile range.
The PRC became a nuclear power in 1964 when it exploded its first atomic bomb as part of its “two bombs, one satellite” effort. In quick succession, China then exploded its first thermonuclear bomb in 1967 and orbited its first satellite in 1970, demonstrating the capability to build a delivery system that can reach the ends of the Earth. China chose to rely primarily on a land-based nuclear deterrent rather than developing two or three different basing systems as the United States did.
Furthermore, unlike the United States or the Soviet Union, China chose to pursue only a minimal nuclear deterrent. The PRC fielded only a small number of nuclear weapons, with estimates of about 100–150 weapons on medium-range ballistic missiles and about 60 ICBMs. Its only ballistic missile submarine (SSBN) conducted relatively few deterrence patrols (perhaps none),21 and its first-generation SLBM, the JL-1 (if it ever attained full operational capability), had limited reach. The JL-1’s 1,700-kilometer range makes it comparable to the first-generation Polaris A1 missile the U.S. fielded in the 1960s.
While China’s nuclear force remained stable for several decades, it has been part of the modernization effort of the past 20 years. The result has been modernization and some expansion of the Chinese nuclear deterrent. The core of China’s ICBM force is the DF-31 series, a solid-fueled, road-mobile system, along with a growing number of longer-range DF-41 missiles (also rail mobile) that may be in the PLA operational inventory. The DF-41 may be deployed with multiple independently targetable reentry vehicles (MIRVs). China’s medium-range nuclear forces have similarly shifted to mobile, solid-rocket systems so that they are both more survivable and more easily maintained.
Notably, the Chinese are expanding their ballistic missile submarine fleet. Replacing the one Type 092 Xia-class SSBN are several Type 094 Jin-class SSBNs, four of which are already operational. These are expected to be equipped with the new, longer-range JL-2 SLBM. Such a system would provide the PRC with a “secure second-strike” capability, substantially enhancing China’s nuclear deterrent. There is also some possibility that the Chinese nuclear arsenal now contains land-attack cruise missiles. The CJ-20, a long-range, air-launched cruise missile carried on China’s H-6 bomber, may be nuclear tipped, although there is not much evidence that China has pursued such a capability at this time. China is also believed to be working on a cruise missile submarine, which, if equipped with nuclear cruise missiles, would further expand the range of nuclear attack options.22
As a result of its modernization efforts, China’s nuclear forces appear to be shifting from a minimal deterrent posture (one suited only to responding to an attack, and even then with only limited numbers) to a more robust but still limited deterrent posture. While the PRC will still likely field fewer nuclear weapons than either the United States or Russia, it will field a more modern and diverse set of capabilities than India or Pakistan (or North Korea), its nuclear-armed neighbors. If there are corresponding changes in doctrine, modernization will enable China to engage in limited nuclear options in the event of a conflict.
WWTA: The WWTA assesses that China “continues to modernize its nuclear missile force by adding more survivable road-mobile systems and enhancing its silo-based systems. This new generation of missiles is intended to ensure the viability of China’s strategic deterrent by providing a second-strike capability.”23 The 2015 WWTA noted that China was likely to begin seaborne nuclear deterrence patrols in the near future but offered no judgment on the degree of threat that it poses to the U.S. The 2016 edition does not make this observation.
The WWTA classifies North Korea’s nuclear weapons and missile programs as a “serious threat to US interests and to the security environment in East Asia.” It also reports that North Korea is “committed to developing a long-range, nuclear-armed missile that is capable of posing a direct threat to the United States” and has “publicly displayed its KN08 road-mobile ICBM on multiple occasions. We assess that North Korea has already taken initial steps toward fielding this system, although the system has not been flight-tested.” The WWTA further states the Director of National Intelligence’s long-held assessment that North Korea’s “nuclear capabilities are intended for deterrence, international prestige, and coercive diplomacy.”24
Summary: The respective missile threats to the American homeland from North Korea and China are very different. China has many more nuclear weapons, multiple demonstrated and tested means of delivery, and more mature systems, but it is a more stable actor with a variety of interests, including relations with the United States and the international system. North Korea has fewer weapons and questionable means of delivery, but it is less stable and less predictable, with a vastly lower stake in the international system. There is also a widely acknowledged difference in intentions: China seeks a stable second-strike capability and, unlike North Korea, is not actively and directly threatening the United States.
Threat of Regional War
America’s forward-deployed military at bases throughout the Western Pacific, five treaty allies, security partners in Taiwan and Singapore, and growing security partnership with India are keys to the U.S. strategic footprint in Asia. One of its critical allies, South Korea, is under active threat of invasion from the North. Taiwan is under a long-standing, well-equipped, and purposely positioned military threat from China. Japan and the Philippines, by virtue of maritime territorial disputes, are under growing paramilitary, military, and political pressure from China.
In South Asia, India is geographically positioned between two major security threats: Pakistan to its west and China to its northeast. From Pakistan, India faces the additional threat of terrorism, whether state-enabled or carried out without state knowledge or control.
North Korean Attack on American Bases/Allies. North Korea’s conventional and nuclear missile forces threaten U.S. bases in South Korea, Japan, and Guam.
Beyond its nuclear weapons programs, North Korea poses additional risks to its neighbors. North Korea has an extensive ballistic missile force. Pyongyang has deployed approximately 800 Scud short-range tactical ballistic missiles, 300 No-dong medium-range missiles, and 50 Musudan intermediate-range ballistic missiles. The Scud missiles threaten South Korea, the No-dong can target all of Japan and South Korea, and the Musudan can hit U.S. bases on Okinawa and Guam. Pyongyang continues its development of the Taepo-dong series of ICBMs and the KN-08, which have a range sufficient to hit the continental U.S.25
North Korea has approximately 1 million people in its military, with reserves numbering several million more. Pyongyang has forward-deployed 70 percent of its ground forces within 90 miles of the Demilitarized Zone (DMZ), making it possible to attack with little or no warning, which is of particular concern because South Korea’s capital, Seoul, is only 30 miles south of the DMZ.26 In addition to three conventional corps alongside the DMZ, Pyongyang has deployed two mechanized corps, an armor corps, and an artillery corps.27
South Korea remains North Korea’s principal target. In 2005, South Korea initiated a comprehensive defense reform strategy to transform its military into a smaller but more capable force to deal with the North Korean threat. Overall, South Korean military manpower would be reduced approximately 25 percent, from 681,000 to 500,000. The army would face the largest cuts, disbanding four corps and 23 divisions and cutting troops from 560,000 in 2004 to 370,000 in 2020. Seoul planned to compensate for decreased troop levels by procuring advanced fighter and surveillance aircraft, naval platforms, and ground combat vehicles.28
That North Korea’s conventional forces are a very real threat to South Korea was clearly demonstrated by two deadly attacks on South Korea in 2010. In March, a North Korean submarine sank the South Korean naval corvette Cheonan in South Korean waters, killing 46 sailors. In November, North Korean artillery shelled Yeonpyeong Island, killing four South Koreans.
Since the North Korean military is predominantly equipped with older ground force equipment, Pyongyang has prioritized deployment of strong asymmetric capabilities, including special operations forces, long-range artillery, and missiles. As noted, North Korea has deployed hundreds of Scud short-range ballistic missiles that can target all of South Korea with explosive, chemical, and biological warheads. The land and sea borders between North and South Korea remain unsettled, heavily armed, and actively subject to occasional, limited armed conflict.
Many experts have assessed that North Korea has developed several nuclear devices but does not yet have the ability to miniaturize a warhead or deliver it by missile. More recently, however, several studies have concluded that the North Korean nuclear threat is much greater than previously thought. For example, Dr. Siegfried Hecker, former director of the Los Alamos Nuclear Laboratory, concluded that North Korea could have 20 nuclear weapons by 2016.29 A study published by the Korea Institute at Johns Hopkins University’s Nitze School of Advanced International Studies predicted a worst-case scenario of Pyongyang’s having 100 nuclear weapons by 2020.30
In any event, enough information is available to conclude that North Korea has likely already achieved the ability to deliver nuclear weapons by means of its No-dong medium-range missile.31 Factors for such an assessment include the decades-long duration of North Korea’s nuclear and missile programs; the technology, expertise, and components acquired from collaborative involvement with Pakistan, the A. Q. Khan network, and Iran; repeated instances of experts underestimating North Korean nuclear and missile capabilities; North Korea’s declarations of its ability to hit the U.S. and its allies with nuclear weapons; and U.S. and South Korean government assessments of North Korean breakthroughs.
Press reports indicate that the CIA assessed that Pyongyang received a nuclear package from Pakistan, including detailed, step-by-step instructions to produce a Chinese-designed nuclear warhead that could be delivered by North Korea’s No-dong missile.32 Pakistani nuclear scientist A. Q. Khan reportedly stated that North Korea’s nuclear weapons were “the perfect nuclear weapons, technologically more advanced than ours.”33 Khan described how, in return for Pakistani assistance to Pyongyang’s centrifuge program, “North Korea would help Pakistan in fitting the nuclear warhead into the Ghauri missile.”34
In March 2016, the National Defense Commission declared that it has a “military operation plan…to liberate south Korea and strike the U.S. mainland” and that “offensive means have been deployed to put major strike targets in the operation theaters of south Korea within the firing range and the powerful nuclear strike targeting the U.S. imperialist aggressor forces bases in the Asia-Pacific region and the U.S. mainland….”35 In April 2013, U.S. officials told reporters that North Korea “can put a nuclear weapon on a missile, that they have missile-deliverable nuclear weapons, but not ones that can go more than 1,000 miles [1,609 kilometers].”36
WWTA: The WWTA calls North Korea’s nuclear weapons and missile programs “a serious threat to…the security environment in East Asia.” It also references North Korea’s export of ballistic missiles and associated materials to several countries and assistance to Syria’s construction of a nuclear reactor as illustrating “its willingness to proliferate dangerous technologies.”37 The WWTA warns that “despite efforts at diplomatic outreach, Kim continues to challenge the international community with provocative and threatening behavior in pursuit of his goals….”38
Summary: North Korean forces arrayed against American allies in South Korea and Japan are substantial, and North Korea’s history of provocation is a consistent indicator of its intent to achieve its political objectives by threat of force.
Chinese Threat to Taiwan. China’s long-standing threat to end de facto independence of Taiwan and ultimately to bring it under the authority of Beijing—if necessary, by force—is both a threat to a major American security partner and a threat to the American interest in peace and stability in the Western Pacific.
Tensions across the Taiwan Strait have cooled significantly over the past eight years. Regardless of the state of the relationship at any given time, however, Chinese leaders from Deng Xiaoping and Mao Zedong to Xi Jinping have consistently emphasized the importance of ultimately reclaiming Taiwan. The island—along with Tibet—is the clearest example of a geographical “core interest” in Chinese policy. China has never renounced the use of force, and it continues to employ political warfare against Taiwan’s political and military leadership. The 2016 election of Tsai Ing-wen of the pro-independence Democratic Progressive Party (DPP) is likely to mark a revival in cross-Strait tensions.
For the Chinese leadership, the failure to effect unification, whether peacefully or through the use of force, would reflect fundamental political weakness in the PRC. For this reason, there is no realistic means by which any Chinese leadership can back away from the stance of having to unify the island with the mainland. As a result, the island remains an essential part of the PLA’s “new historic missions,” shaping PLA acquisitions and military planning.
Two decades of double-digit increases in China’s announced defense budget have produced a significantly more modern PLA, much of which remains focused on a Taiwan contingency. This modernized force includes more than 1,000 ballistic missiles, a modernized air force, and growing numbers of modern surface combatants and diesel-electric submarines capable of mounting a blockade. As the 1995–1996 Taiwan Strait crisis demonstrated, Beijing is prepared to use at least open displays of force—and might have been willing to go further in the absence of a strong American presence.
It is widely posited that China’s anti-access/area-denial (A2/AD) strategy—the deployment of an array of overlapping capabilities, including anti-ship ballistic missiles (ASBMs), submarines, and long-range cruise missiles, satellites, and cyber weapons—is aimed largely at forestalling American intervention in support of friends and allies in the Western Pacific, including Taiwan. By holding at risk key American platforms and systems (e.g., aircraft carriers), the Chinese seek to delay or even deter American intervention in support of key friends and allies, allowing the PRC to achieve a fait accompli. The growth of China’s military capabilities is specifically oriented toward countering America’s ability to assist in the defense of Taiwan.
Chinese efforts to reclaim Taiwan are not limited to overt military means. The “three warfares” highlight Chinese political warfare methods, including legal warfare/lawfare, public opinion warfare, and psychological warfare. The PRC employs such approaches to undermine both Taiwan’s will to resist and America’s willingness to support Taiwan. The Chinese goal would be to “win without fighting,” to take Taiwan without firing a shot or with only minimal resistance before the United States could organize an effective response.
WWTA: The WWTA does not reference the threat that China poses to Taiwan.
Summary: The Chinese threat to Taiwan is long-standing. Although recently obscured by positive political relations, the military threat is ever present and can be expected to resurface with any increase in tensions across the Strait that may be occasioned by the change in governments in Taipei. China’s ability to execute a military action against Taiwan, albeit at high economic and political cost, is improving. Its intent to unify Taiwan with the mainland under the full authority of the PRC central government and to end the island’s de facto independence has been consistent over time.
Major Pakistan-backed Terrorist Attack on India Leading to Open Warfare Between India and Pakistan. An Indo–Pakistani conflict would jeopardize multiple U.S. interests in the region and increase the threat of global terrorism. Pakistan would rely on militant non-state actors to help it fight India and thus create a more permissive environment in which various terrorist groups could operate freely. The threat of conflict going nuclear would force U.S. businesses to exit the region and disrupt investment and trade flows, mainly between the U.S. and India, whose bilateral trade currently totals around $100 billion. An actual nuclear exchange would be devastating, both in human lives lost and in long-term economic damage.
India and Pakistan are engaged in a nuclear arms race that threatens stability throughout the Subcontinent. Both countries tested nuclear weapons in 1998, establishing themselves as overtly nuclear weapons states. Both countries also are developing naval nuclear weapons and already possess ballistic missile and aircraft-delivery platforms.39
Pakistan has the fastest-growing nuclear weapons arsenal in the world today. Islamabad currently has an estimated 100 nuclear weapons and is developing war plans that include the use of tactical nuclear weapons in the event of conflict with India. Pakistan’s development of a mobile dual-use battlefield ballistic missile with a range of only 60 kilometers is of particular concern,40 especially given such weapons’ impact on India’s nuclear use threshold.
The broader military and strategic dynamic between India and Pakistan is essentially unstable. As noted, Pakistan continues to harbor terrorist groups like Lashkar-e-Taiba and Jaish-e-Mohammed, which carried out the recent attack on the Indian airbase at Pathankot. JeM had been less visible for several years, but JeM leader Masood Azhar resurfaced in 2014 in Pakistan to address a large public rally where he called on suicide attackers to resume jihad against India. Media reports indicate that some JeM leaders were detained in Pakistan following the January 2 Pathankot attack, but no charges have been filed.
Hafez Muhammed Saeed, LeT’s founder and leader of its front organization, JuD, also continues to operate freely in Pakistan, often holding press conferences and inciting violence against India during large-scale public rallies. In December 2014, Saeed held a two-day conclave in Lahore that received support from the Pakistani government, including security from 4,000 police officers and government assistance in transporting attendees to the gathering of more than 400,000. India condemned the Pakistani government’s support for the gathering as “blatant disregard” of global norms against terrorism.41
The possibility of armed conflict between India and Pakistan seemed to heighten slightly following the May 2014 election of Bharatiya Janata Party (BJP) leader Narendra Modi as India’s Prime Minister. While Modi initially sought to reach out to Pakistan by inviting Pakistani Prime Minister Nawaz Sharif to his swearing-in ceremony, he subsequently called off foreign secretary–level talks that were scheduled for August 2014 to express anger over a Pakistani official’s meeting with Kashmiri separatist leaders. Modi’s cancellation of the talks signaled that his government is likely to take a harder line toward Islamabad than the one taken by his predecessor, Manmohan Singh, and tie progress in dialogue to Pakistani steps to crack down on anti-India terrorists. Before it took power last year, the BJP often criticized Singh for being too soft on Pakistan. Another obstacle to improved Indo–Pakistani ties is the political weakness of Pakistani Prime Minister Sharif, whose government barely survived month-long street protests led by the opposition in August 2014.
Adding to the tension has been an increase in cross-border firing between the Indian and Pakistani militaries, raising questions about whether a cease-fire that has been in place since 2003 may be breaking down. In August 2014, the two sides engaged in intense firing and shelling along their international border (called the working boundary) and across the Line of Control (LoC) that divides Kashmir. India’s Border Security Force Director noted that the firing across the international border was the worst it had been since India and Pakistan fought a war in 1971.42 Tensions were defused following a phone call between the Directors General of Military Operations in which they mutually agreed to stop the firing. A similar escalation in border tensions occurred again in December 2014 when a series of firing incidents over a one-week period resulted in the deaths of at least five Pakistani soldiers and one Indian soldier.
On December 25, 2015, Prime Minister Modi made an impromptu visit to Lahore to meet with Nawaz Sharif. The visit created enormous good will between the two countries and raised hope that official dialogue would soon resume. However, six days later, JeM militants attacked the Indian airbase at Pathankot, killing seven Indian security personnel. India has provided information on the attackers to Pakistan and demanded action against JeM. Official Indo–Pakistani dialogue thus remains deadlocked, even though the two sides are reportedly communicating quietly through their foreign secretaries and national security advisors.
There is some concern about the impact on Indo–Pakistani relations of the international troop drawdown in Afghanistan. The vacuum created by the departing international forces will allow the Taliban and other extremists to strengthen their grip in the region, potentially reinvigorating the insurgency in Kashmir and raising the chances of a major terrorist attack against India. Afghan security forces successfully thwarted an attack on the Indian consulate in Herat, Afghanistan, in May 2014. A successful future attack on Indian interests in Afghanistan along the lines of the bombing of the Indian embassy in Kabul in 2008 would sharpen tensions between New Delhi and Islamabad.
With terrorist groups operating relatively freely in Pakistan and maintaining links to the country’s military and intelligence services, there is a moderate risk of the two countries climbing the military escalation ladder and eventually engaging in all-out conflict. Pakistan’s nuclear weapons capability appears to have acted as a deterrent against Indian military escalation both during the 2001–2002 military crisis and following the 2008 Mumbai attacks, but the Indian government would be under great pressure to react strongly in the face of a terrorist provocation. Pakistan’s recent focus on incorporating tactical nuclear weapons into its war-fighting doctrine has also raised concern that if conflict does break out, there is now a higher risk of nuclear exchange.43
WWTA: The WWTA does not reference the threat to American interests from a Pakistani attack on India and potential escalation. Unlike the 2015 assessment, however, it does specifically reference tense relations between the two countries. It also references “Islamabad’s willingness to take action against those in Pakistan linked to the [Pathankot] attack” as key to resuming engagement.44
Summary: Indian military retaliation against a Pakistan-backed terrorist strike against India could include targeted air strikes on terrorist training camps inside Pakistan. This would likely lead to broader military conflict with some prospect of escalating to a nuclear exchange. Neither side desires another general war. Both countries have limited objectives and have demonstrated their intent to avoid escalation, but this is a delicate calculation.
Major Chinese Border Incursion into India. The possibility of armed conflict between India and China, while currently remote, poses an indirect threat to U.S. interests because it could disrupt the territorial status quo and raise nuclear tensions in the region. A border conflict between India and China could also prompt Pakistan to try to take advantage of the situation, further contributing to regional instability.
Long-standing border disputes that led to a Sino–Indian War in 1962 have been heating up again in recent years. In April 2013, the most serious border incident between India and China in over two decades occurred when Chinese troops settled for three weeks several miles inside northern Indian territory on the Depsang Plains in Ladakh. A visit to India by Chinese President Xi Jinping in September 2014 was overshadowed by another flare-up in border tensions when hundreds of Chinese PLA forces reportedly set up camps in the mountainous regions of Ladakh, prompting Indian forces to deploy to forward positions in the region. The border standoff lasted three weeks and was defused when both sides agreed to pull back their troops to previous positions. India claims that China occupies more than 14,000 square miles of Indian territory in the Aksai Chin along its northern border in Kashmir, and China lays claim to more than 34,000 square miles of India’s northeastern state of Arunachal Pradesh. The issue is also closely related to China’s concern for its control of Tibet and the presence in India of the Tibetan government in exile and Tibet’s spiritual leader, the Dalai Lama.
The Chinese are building up military infrastructure and expanding a network of road, rail, and air links in the border areas. To meet these challenges, the BJP government has also committed to expanding infrastructure development along India’s disputed border with China, especially in the Indian states of Arunachal Pradesh and Sikkim. While China currently holds a decisive military edge over India, New Delhi is engaged in an ambitious military modernization program.
The Border Defense and Cooperation Agreement (BDCA) signed during then-Prime Minister Singh’s visit to China in October 2013 is unlikely to reduce border tensions significantly or lead to a broader settlement in the near future. The accord is aimed at putting into place institutional mechanisms for maintaining peace along the border, but several Indian analysts worry that it is part of China’s effort to keep in place the status quo, which favors the Chinese. Some have even contended that the Chinese intend to buy time on their border disputes with India through the BDCA while focusing on other territorial claims in the Asia–Pacific.45
The BDCA affirms that neither side will use its military capability against the other and proposes opening a hotline between the two countries’ military headquarters, instituting meetings between border personnel in all sectors, and ensuring that neither side tails the other’s patrols along the Line of Actual Control (LAC).46 The agreement also includes language stipulating that in the event the two sides come face-to-face, they “shall exercise maximum self-restraint, refrain from any provocative actions, not use force or threaten to use force against the other side, treat each other with courtesy, and prevent exchange of armed conflict.”47 the 2016 WWTA is silent on India–China relations.
Summary: American interest in India’s security is substantial and expanding. The threat to this interest from China is active, albeit part of a broader, multifaceted bilateral relationship that includes many cooperative dimensions. Both India and China apparently want to avoid allowing minor incidents to escalate into a more general war. The Chinese seem to use border tensions for limited diplomatic and political gain vis-à-vis India, and India responds in ways intended to contain minor incursions and maximize reputational damage to China. Despite limited aims, however, the unsettled situation and gamesmanship along the border could result in miscalculation, accidents, or overreaction.
Threats to the Commons
The U.S. has critical direct interests at stake in the East and South Asia commons that include sea, air, space, and cyber interests. These interests include an economic interest in the free flow of commerce and the military use of the commons to safeguard America’s own security and contribute to the security of its allies and partners.
Washington has long provided the security backbone in these areas, which in turn has supported the region’s remarkable economic development. However, China is taking increasingly assertive steps to secure its own interests in these areas independent of U.S. efforts to maintain freedom of the commons for all in the region. It cannot be assumed that China shares a common conception of international space with the United States or interest in perpetuating American predominance in securing the commons.
Maritime and Airspace Commons. The aggressiveness of the Chinese navy, maritime law enforcement forces, and air forces in and over the waters of the East and South China Sea, coupled with ambiguous, extralegal territorial claims and assertion of control there, poses an incipient threat to American and overlapping allied interests. Chinese military writings emphasize the importance of establishing dominance of the air and maritime domains in any future conflict.
East China Sea. Since 2010, China has intensified its efforts to assert claims of sovereignty over the Senkaku Islands of Japan in the East China Sea. Beijing asserts not only exclusive economic rights within the disputed waters, but also recognition of “historic” rights to dominate and control those areas as part of its territory.
Chinese and Japanese maritime law enforcement and coast guard vessels regularly operate in waters surrounding the Senkakus that are administered by Japan, raising the potential for miscalculation and escalation into a military clash. In the summer of 2016, China began to deploy naval units into the area, justifying its action as “freedom of navigation” operations.
In November 2013, China declared an air defense identification zone (ADIZ) in the East China Sea that largely aligned with its claimed maritime exclusive economic zone (EEZ). The People’s Liberation Army declared that it would “take defense emergency measures to respond to aircraft that do not cooperate in identification or refuse to follow orders.”48 The announcement was a provocative act and another Chinese attempt to change the status quo unilaterally. The ADIZ declaration is part of a broader Chinese pattern of using intimidation and coercion to assert expansive extralegal claims of sovereignty and/or control incrementally. In June 2016, a Chinese fighter made an “unsafe” pass near a U.S. RC-135 reconnaissance aircraft in the East China Sea area.
South China Sea. Roughly half of global trade in goods, a third of trade in oil, and over half of global liquefied natural gas shipments pass through the South China Sea, which also accounts for approximately 10 percent of global fish catch and may contain massive potential reserves of oil and natural gas. It is hotly contested by six countries, including Taiwan and the Philippines, an American security treaty ally.
Incidents between Chinese law enforcement vessels and other claimants’ fishing boats occur on a regular basis in the South China Sea, as do other Chinese assertions of administrative authority. The U.S. presence also has become an object of Chinese attention, from confrontations with the ocean surveillance ship USNS Impeccable and the destroyer USS John McCain in 2009 to the confrontation with the guided-missile cruiser USS Cowpens in December 2013 and a dangerous intercept of a U.S. Navy P-8 aircraft in August 2014.
The most serious inter-regional incidents in the South China Sea have occurred between China and the Republic of the Philippines. In 2012, a Philippine naval ship operating on behalf of the country’s coast guard challenged private Chinese poachers in waters around Scarborough Shoal. The resulting escalation left Chinese government ships in control of the shoal. In 2016, there have been reports that the Chinese intend to consolidate their gains in the area by reclaiming the sea around the shoal.49 Chinese government ships also have occasionally attempted to prevent the rotation of troops on and replenishment of Philippines-held Second Thomas Shoal.
The most significant development in the South China Sea over the past two years has been Chinese reclamation and militarization of seven artificial islands or outposts. In July 2016, an award issued by an arbitral panel constituted under the United Nations Convention on the Law of the Sea (UNCLOS) invalidated China’s sweeping claims to waters in the South China Sea and found its “island” reclamation to be in violation of Beijing’s commitments under UNCLOS. Speculation now centers on how Beijing will respond to this ruling. There is the possibility that it will declare an ADIZ above the South China Sea. There are also concerns that it will take action against vulnerable targets like Philippines-occupied Second Thomas Shoal, which the panel determined are part of the Philippines EEZ and continental shelf, or proceed with the reclamation at Scarborough. The latter development in particular would facilitate the physical assertion of its claims and enforcement of an ADIZ, regardless of the UNCLOS award.
Airpower. Although China is not yet in a position to enforce an ADIZ consistently in either area, the steady two-decade improvement of the PLA Air Force (PLAAF) and naval aviation will one day provide the necessary capabilities. Chinese observations of recent conflicts, including wars in the Persian Gulf, the Balkans, and Afghanistan, have emphasized the growing role of airpower and missiles in conducting “non-contact, non-linear, non-symmetrical” warfare.
China also seems to have made a point of publicizing its air force modernization, unveiling new aircraft prototypes, including two new stealthy fighters, on the eve of visits by American Secretaries of Defense. (Secretary Chuck Hagel’s visit in 2014 was preceded by the unveiling of the J-15 naval fighter.) Those aircraft have been flown much more aggressively, with Chinese fighters flying very close to Japanese aircraft in China’s East China Sea ADIZ and conducting armed combat air patrols in the skies over Tibet.50
The PLA has shed most of its 1960s-era aircraft, replacing them with much more modern systems. Today’s PLAAF is dominated by fourth- and 4.5th- generation fighter aircraft. These include the domestically designed and produced J-10, as well as the Su-27/Su-30/J-11 system, comparable to the F-15 or F-18, that dominates both the fighter and strike missions.51 Older airframes such as the J-7 are being steadily retired from the fighter inventory. China is also believed to be preparing to field two stealthy fifth-generation fighter designs. The J-20 is the larger aircraft, resembling the American F-22 fighter. The J-31 appears to resemble the F-35 but with two engines rather than one. The production of advanced combat aircraft engines remains one of the greatest challenges to Chinese fighter design.
China fields some long-range strike aircraft, largely the H-6 bomber based on the Soviet-era Tu-16 Badger. While this aircraft has little prospect of penetrating advanced air defenses, it is suitable as a cruise missile carrier. China also has used the H-6 as the basis for initial efforts to develop an aerial tanker fleet and seems to be examining other options as well. As China deploys more tankers, this will extend the range and loiter time of its fighter aircraft. China will then be better equipped to enforce its newly declared East China Sea Air Defense Identification Zone and any possible future South China Sea ADIZ.
A variety of modern support aircraft have also entered the PLAAF inventory, including airborne early warning (AEW), command and control (C2), and electronic warfare (EW) aircraft. At the Zhuhai Air Show, Chinese companies have displayed a variety of unmanned aerial vehicles (UAVs), reflecting substantial investments and research and development efforts. The surveillance and armed UAV systems include the Xianglong (Soaring Dragon) and Sky Saber systems. The 2014 DOD report on Chinese capabilities also reports that China has tested a stealthy flying-wing UAV, the Lijian.52
China’s air defenses, which are under the control of the PLAAF, have also been steadily modernizing. China has acquired the advanced S-300 surface-to-air missile (SAM) system (SA-10B/SA-20), which is roughly analogous to the American Patriot SAM system, and is developing its own advanced SAM (the HQ-9), which is deployed both on land and at sea. In early 2014, Russia announced that it would sell China the S-400 SAM system. This would mark a substantial improvement in PLAAF air defense capabilities, as the S-400 has anti-aircraft and anti-missile capabilities.53 China has deployed these SAM systems in a dense, overlapping belt along its coast, protecting the nation’s economic center of gravity. Key industrial and military centers such as Beijing are also heavily defended by SAM systems. Some of these systems have reportedly been deployed to the Paracel islands in the South China Sea.
A third component of the PLAAF is China’s airborne forces. The 15th Airborne Army is part of the PLAAF, with three divisions of 10,000–15,000 personnel each. These are not believed to be assigned to any of the Chinese military regions but are instead a strategic reserve as well as a rapid reaction force. In 2009, in the military review associated with the 60th anniversary of the founding of the PRC, Chinese airborne units paraded through Tiananmen Square with ZBD-03 mechanized airborne combat vehicles. These vehicles provide Chinese airborne forces with tactical mobility as well as some degree of protected fire support from their 30mm autocannon and HJ-73 anti-tank missile (a domestic version of the AT-3 Sagger)—something American airborne forces continue to lack.
One shortcoming of the Chinese airborne forces is the lack of military transport aircraft, although the PLAAF can undoubtedly call upon China’s substantial civilian fleet of airliners in time of crisis or war.
Sea power. As the world’s foremost trading state, China depends on the seas for its economic well-being. China’s factories are increasingly powered by imported oil, and Chinese diets contain a growing percentage of imported food. Chinese products rely on the seas to be moved to markets. At the same time, because China’s economic center of gravity is now in the coastal region, it has had to emphasize maritime power to defend key assets and areas. Consequently, China has steadily expanded its maritime power, including its merchant marine and maritime law enforcement capabilities, but especially the People’s Liberation Army Navy (PLAN).
The PLAN is no longer an unsophisticated coastal defense force. Instead, since the end of the Cold War, China’s navy has moved away from a reliance on mass toward incorporating advanced platforms and weapons. Most notably, the Chinese navy is the first in East Asia to deploy its own aircraft carrier since World War II. The Liaoning carries a mixed air group of J-15 fighters (based on the navalized Su-27) and helicopters and is believed to be fully operational.
Meanwhile, many obsolete vessels have been decommissioned, including scores of older, missile-armed, fast attack craft. In their place, China has produced a range of more capable combatants and is building each class in significant numbers. These range from the Type 022 Houbei missile-armed catamaran, armed with sea-skimming supersonic anti-ship cruise missiles, to the Type-052C Luyang-II destroyer, equipped with a phased-array radar for its HQ-9 SAM system. The HQ-9 is believed to be comparable to early model Patriot missiles, with its ability to combat most air-breathing systems and a limited anti–ballistic missile capability. Although these new ships are not replacing older Chinese surface combatants on a one-for-one basis, the overall capability of the PLAN surface force is steadily improving.
Similarly, the PLAN has been modernizing its submarine force. Since 2000, the PLAN has consistently fielded between 50 and 60 diesel-electric submarines, but the age and capability of the force has been improving as older boats, especially 1950s-vintage Romeo-class boats, are replaced with newer designs. These include a dozen Kilo-class submarines purchased from Russia and domestically designed and manufactured Song and Yuan classes. All of these are believed to be capable of firing not only torpedoes, but also anti-ship cruise missiles. The Chinese have also developed variants of the Yuan, with an air-independent propulsion (AIP) system that reduces the boats’ vulnerability by removing the need to use noisy diesel engines to recharge batteries.
The PLAN also has been augmenting its aerial maritime strike capability. In addition to more modern versions of the H-6 twin-engine bombers (a version of the Soviet/Russian Tu-16 Badger), the PLAN’s Naval Aviation force has introduced a range of other strike aircraft into the inventory. These include the JH-7/FBC-1 Flying Leopard, which can carry between two and four YJ-82 anti-ship cruise missiles, and the Su-30 strike fighter. Within Chinese littoral waters, the PLAN Air Force can bring a significant amount of firepower to bear.
The PLAN also has been working to improve its “fleet train.” The 2010 PRC defense white paper notes the accelerated construction of “large support vessels.” It also specifically notes that the navy is exploring “new methods of logistics support for sustaining long-time maritime missions.”54
As with other aspects of PLA modernization, even as the PLAN is upgrading its weapons, it is also improving its doctrine and training, including increased emphasis on joint operations and the incorporation of electronic warfare into its training regimen. Such improvements suggest that PLA Air Force assets, space and cyber operations, and even PLA Rocket Force units might support naval aviation strikes. The new anti-ship ballistic missile forces, centered on the DF-21D anti-ship ballistic missile (now reportedly at initial operational capability), should be seen as part of joint Chinese efforts to control the seas, complementing PLAAF and PLAN air, surface, and sub-surface forces.
WWTA: The WWTA does not address threats to the maritime and airspace commons. It does, however, say that China “seek[s] greater influence over” the region and “wants the United States to refrain from actions [it] perceive[s] as interfering with [its] interests—which will perpetuate the ongoing geopolitical and security competition around the peripher[y] of…China, to include the major sea lanes.” It further notes that the Chinese “will almost certainly eschew direct military conflict with the United States in favor of contests at lower levels of competition…that intentionally blur the distinction between peace and wartime operations.”55
Summary: In the absence of U.S. forces, China is increasingly capable of dominating the airspace across the East Asian littoral. Neither Taiwan nor any Southeast Asian nation can match the PLAAF’s number of high-performance aircraft. China’s military and party leaders appear to be intent on establishing a dominant position in regional air and maritime commons. There is a very similar dynamic in the maritime domain. In both domains, China is ever more capable of challenging American dominance, especially along its littoral.
Escalation of Territorial Disputes or Accidental Incidents at Sea. Because the PRC and other countries in the region see active disputes over the East and South China Seas not as differences regarding the administration of the commons, but rather as matters of territorial sovereignty, there exists the threat of armed conflict between China and American allies that are also claimants, particularly Japan and the Philippines.
Beijing prefers to accomplish its objectives quietly and through non-military means. In both the East and South China Seas, China has sought successfully to exploit “gray zones,” gaining control incrementally and deterring others without resort to lethal use of force. It uses military and economic threats, bombastic language, and enforcement through military bullying. Chinese paramilitary-implemented, military-backed encroachment in support of expansive extralegal claims could lead to an unplanned armed clash.
Rising nationalism is exacerbating tensions, making geostrategic relations in Asia increasingly complex and volatile. In the face of persistent economic challenges, nationalist themes are becoming an increasingly strong undercurrent, affecting policymaking. Although the nationalist phenomenon is not new, it is gaining force and complicating efforts to maintain regional stability.
Governments may choose to exploit nationalism for domestic political purposes, but they also run the risk of being unable to control the genie that they have released. Nationalist rhetoric is mutually reinforcing, which makes countries less likely to back down than in the past. The increasing power that the Internet and social media provide to the populace, largely outside of government control, adds an element of unpredictability to future clashes.
In case of armed conflict between China and the Philippines or between China and Japan, either by intention or as a result of an accidental incident at sea, the U.S. could be required to exercise its treaty commitments.56 Escalation of a direct U.S.–China incident is itself not unthinkable. Even keeping an inadvertent incident from escalating into a broader military confrontation would be difficult. This is particularly true in the East and South China Seas, where naval as well as civilian law enforcement vessels from both China and the U.S. operate in what the U.S. considers to be international waters.
WWTA: The WWTA states that “China will continue to pursue an active foreign policy” in the region, “highlighted by [among other things] a firm stance on competing territorial claims in the East and South China Seas.” It also predicts continuing regional tensions “as China pursues construction at its expanded outposts in the South China Sea.”57 It offers no judgment either on the threat that this poses to American interests or on the prospect for large-scale conventional conflict in the region.
Summary: The Chinese have a growing capacity to disrupt the freedom of the commons that benefits the entire region. Both territorial disputes related to what the U.S. considers the commons and accidental incidents could draw the U.S. into conflict. China likely does not intend to engage in armed conflict with its neighbors, particularly American treaty allies, or the U.S. itself. However, it will continue to press its territorial claims at sea in ways that, even if inadvertently, cause incidents that could escalate into more belligerent action.
Space. One of the key force multipliers for the United States is its extensive array of space-based assets. Through its various satellite constellations, the U.S. military can track opponents, coordinate friendly forces, engage in precision strikes against enemy forces, and conduct battle-damage assessments so that its munitions are expended efficiently.
The American military is more reliant than many others on space-based systems because it is also an expeditionary military (i.e., its wars are conducted far distant from the homeland). Consequently, it requires global rather than regional reconnaissance, communications and data transmission, and meteorological information and support. At this point, only space-based systems can provide this sort of information on a real-time basis. The U.S. can leverage space in ways that no other country can, and this is a major advantage, but this heavy reliance on space systems is also a key American vulnerability.
China fields an array of space capabilities, including its own navigation and timing satellites, the Beidou/Compass system, and has claimed a capacity to refuel satellites.58 It has three satellite launch centers, and a fourth is under construction. China’s interest in space dominance includes not only accessing space, but also denying opponents the ability to do the same. As one Chinese assessment notes, space capabilities provided 70 percent of battlefield communications, over 80 percent of battlefield reconnaissance and surveillance, and 100 percent of meteorological information for American operations in Kosovo. Moreover, 98 percent of precision munitions relied on space for guidance information. In fact, “It may be said that America’s victory in the Kosovo War could not be achieved without fully exploiting space.”59
To this end, the PLA has been developing a range of anti-satellite capabilities. These include both hard-kill and soft-kill systems. The former include direct-ascent kinetic-kill vehicles (DA-KKV), such as the system tested in 2007, but also more advanced systems that are believed capable of reaching targets in mid-Earth orbit and even geosynchronous orbit.60 The latter include anti-satellite lasers for either dazzling or blinding purposes.61 This is consistent with PLA doctrinal writings, which emphasize the need to control space in future conflicts. “Securing space dominance has already become the prerequisite for establishing information, air, and maritime dominance,” says one Chinese teaching manual, “and will directly affect the course and outcome of wars.”62
Soft-kill attacks need not come only from dedicated weapons, however. The case of Galaxy-15, a communications satellite owned by Intelsat Corporation, showed how a satellite could effectively disrupt communications simply by being in “switched on” mode all of the time.63 Before it was finally brought under control, it had drifted through a portion of the geosynchronous belt, forcing other satellite owners to move their assets and juggle frequencies. A deliberate such attempt by China (or any other country) could prove far harder to handle, especially if conducted in conjunction with attacks by kinetic systems or directed-energy weapons.
China has now created a single service, the PLA Strategic Support Force (PLASSF), with authority over China’s space, electronic warfare, and network warfare capabilities. In essence, this is a service that is focused on fighting in the information domain, striving to secure what the PLA terms “information dominance” for themselves while denying it to others. This service will probably combine electronic warfare, cyber warfare, and physical attacks against adversary space and information systems in order to deny them the ability to gather, transmit, and exploit information.
WWTA: The WWTA references an increase in threats to American “use of military, civil, and commercial space systems…as…China progress[es] in developing counterspace weapon systems to deny, degrade, or disrupt US space systems.” It further states that “China continue[s] to pursue weapons systems capable of destroying satellites on orbit, placing US satellites at greater risk in the next few years,” and cites probable Chinese “progress on the antisatellite missile system that it tested in July 2014.”64
Summary: The PRC poses a challenge to the United States that is qualitatively different from the challenge posed by any other potential adversary in the post–Cold War environment. It is the first nation to be capable of accessing space on its own while also jeopardizing America’s ability to do the same. This appears to be its intent.
Cyber. Threats in this area derive primarily from China and North Korea, and both are serious.
China. In 2013, the Verizon Risk Center identified China as the “top external actor from which [computer] breaches emanated, representing 30 percent of cases where country-of-origin could be determined.”65 Given the difficulties of attribution, country of origin should not necessarily be conflated with the perpetrator, but forensic efforts have identified at least one Chinese military unit with cyber intrusions.66 Similarly, the Verizon report concluded that China was the source of 95 percent of state-sponsored cyber-espionage attacks. Since the 2015 Xi–Obama summit where the two sides reached an understanding to reduce cyber economic espionage, Chinese cyber actions have shifted. While the overall level of activity appears to be unabated, the Chinese do appear to have moved toward more focused attacks mounted from new sites.
China’s cyber-espionage efforts are often aimed at economic targets, reflecting the much more holistic Chinese view of both security and information. Rather than creating an artificial dividing line between military security and civilian security, much less information, the PLA plays a role in supporting both aspects and seeks to obtain economic intellectual property as well as military electronic information.
This is not to suggest, however, that the PLA has not emphasized the military importance of cyber warfare. Chinese military writings since the 1990s have emphasized a fundamental transformation in global military affairs (shijie junshi gaige). Future wars will be conducted through joint operations involving multiple services rather than through combined operations focused on multiple branches within a single service. These future wars will span not only the traditional land, sea, and air domains, but also outer space and cyberspace. The latter two arenas will be of special importance, because warfare has shifted from an effort to establish material dominance (characteristic of Industrial Age warfare) to establishing information dominance (zhi xinxi quan). This is due to the rise of the Information Age and the resulting introduction of information technology into all areas of military operations.
Consequently, according to PLA analysis, future wars will most likely be “local wars under informationized conditions.” That is, they will be wars in which information and information technology not only will be widely applied, but also will be a key basis of victory. The ability to gather, transmit, analyze, manage, and exploit information will be central to winning such wars: The side that is able to do these things more accurately and more quickly will be the side that wins. This means that future conflicts will no longer be determined by platform-versus-platform performance and not even by system against system (xitong). Rather, conflicts are now clashes between rival arrays of systems of systems (tixi).67
Chinese military writings suggest that a great deal of attention has been focused on developing an integrated computer network and electronic warfare (INEW) capability. This would allow the PLA to reconnoiter a potential adversary’s computer systems in peacetime, influence opponent decision-makers by threatening those same systems in times of crisis, and disrupt or destroy information networks and systems by cyber and electronic warfare means in the event of conflict. INEW capabilities would complement psychological warfare and physical attack efforts to secure “information dominance,” which Chinese military writings emphasize as essential for fighting and winning future wars.
Attacks on computer networks in particular have the potential to be extremely disruptive. The recent indictment of five serving PLA officers on the grounds of cyber espionage highlights how active the Chinese military is in this realm.68
It is essential to recognize, however, that the PLA views computer network operations as part of information operations (xinxi zuozhan), or information combat. Information operations are specific operational activities that are associated with striving to establish information dominance. They are conducted in both peacetime and wartime, with the peacetime focus on collecting information, improving its flow and application, influencing opposing decision-making, and effecting information deterrence.
Information operations involve four mission areas:
- Command and Control Missions. An essential part of information operations is the ability of commanders to exercise control over joint operations by disparate forces. Thus, command, control, communications, computers, intelligence, surveillance, and reconnaissance structures are a key part of information operations, providing the means for collecting, transmitting, and managing information.
- Offensive Information Missions. These are intended to disrupt the enemy’s battlefield command and control systems and communications networks, as well as to strike the enemy’s psychological defenses.
- Defensive Information Missions. Such missions are aimed at ensuring the survival and continued operation of information systems. They include deterring an opponent from attacking one’s own information systems, concealing information, and combating attacks when they do occur.
- Information Support and Information-Safeguarding Missions. The ability to provide the myriad types of information necessary to support extensive joint operations and to do so on a continuous basis is essential to their success.69
Computer network operations are integral to all four of these overall mission areas. They can include both strategic and battlefield network operations and can incorporate both offensive and defensive measures. They also include protection not only of data, but also of information hardware and operating software.
Computer network operations will not stand alone, however, but will be integrated with electronic warfare operations, as reflected in the phrase “network and electronics unified [wangdian yiti].” Electronic warfare operations are aimed at weakening or destroying enemy electronic facilities and systems while defending one’s own.70 The combination of electronic and computer network attacks will produce synergies that affect everything from finding and assessing the adversary to locating one’s own forces to weapons guidance to logistical support and command and control. The creation of the PLASSF is intended to integrate these forces and make them more complementary and effective in future “local wars under informationized conditions.”
North Korea. In 2014, North Korea conducted a cyber attack on Sony Pictures in retaliation for the studio’s release of a satirical film depicting the assassination of Kim Jong-un. The cyber attack was accompanied by physical threats against U.S. theaters and citizens. Contrary to the perception of North Korea as a technologically backward nation, the regime has an active cyber warfare capability. In 2009, North Korea declared that it was “fully ready for any form of high-tech war.”71 According to South Korea’s National Intelligence Service, North Korean leader Kim Jong-un declared that cyber warfare was “a magic weapon” that empowered Pyongyang to launch “ruthless strikes” against South Korea.72
The Reconnaissance General Bureau, North Korea’s intelligence agency, oversees Unit 121 with almost 6,000 “cyber-warriors” dedicated to attacking Pyongyang’s enemies, up from 3,000 just two years ago. Defectors from the unit have told South Korean intelligence officials that hackers are sent to other countries for training as well as to conduct undercover operations. The unit’s hackers never operate primarily within North Korea because the country’s limited computer network would make it too easy to identify the source of the attack.73
Seoul concluded that North Korea was behind cyber attacks using viruses or distributed denial-of-service tactics against South Korean government agencies, businesses, banks, and media organizations in 2009, 2011, 2012, and 2013. The most devastating attack in 2013 against South Korean banks and media outlets deleted the essential Master Boot Record from 48,000 computers.74 North Korea also jammed GPS signals in 2012, posing a risk to hundreds of airplanes transiting Seoul’s Incheon airport. Lieutenant General Bae Deag-sig, head of South Korea’s Defense Security Command, stated that “North Korea is attempting to use hackers to infiltrate our military’s information system to steal military secrets and to incapacitate the defense information system.”75 In 2016, the threat to banks, in particular, became global with an attack on the SWIFT banking system.76
WWTA: The WWTA cites China’s continued “success in cyber espionage against the US Government, our allies, and US companies.” It also references Beijing’s selective use of cyberattacks against “targets it believes threaten Chinese domestic stability or regime legitimacy.”77 With regard to North Korea, the WWTA cites its probable responsibility for an attack on a South Korean nuclear plant and says that “North Korea probably remains capable and willing to launch disruptive or destructive cyberattacks to support its political objectives.”78
Summary: With obvious implications for the U.S., the PLA emphasizes the need to suppress and destroy an enemy’s information systems while preserving one’s own, as well as the importance of computer and electronic warfare in both the offensive and defensive roles. Methods to secure information dominance would include establishing an information blockade; deception (including through electronic means); information contamination; and information paralysis.79 China sees cyber as part of an integrated capability for achieving strategic dominance in the Western Pacific region. For North Korea, cybersecurity is an area in which even its limited resources can directly support discrete political objectives.
AfPak-Based Terrorism. There is a great deal of uncertainty surrounding the threat from AfPak. For the U.S., Pakistan is both a security partner and a security challenge. Pakistan provides a home and support to terrorist groups that are hostile to the U.S., other U.S. partners in South Asia like India, and the fledgling government of Afghanistan. Afghanistan is particularly vulnerable to destabilization efforts. Both Pakistan and Afghanistan are already among the world’s most unstable states. The instability of the former, given its nuclear arsenal, has a direct bearing on U.S. security.
The IISS Military Balance largely addresses the military capabilities of states. Its limited references to capabilities of non-state actors do not include those in the AfPak region. The 2016 edition contains no reference to the possibility of Pakistani nuclear weapons falling into hands that would threaten the American homeland or interests more broadly. The 2014 edition stated that Pakistan’s “nuclear weapons are currently believed to be well-secured against terrorist attack.”80 Pakistan’s Army Strategic Forces Command has 30 medium-range ballistic missiles, 30 short-range ballistic missiles, and land-attack cruise missiles.81 Previous editions of the Military Balance have also cited development of “likely nuclear capable” artillery. Pakistan also has “1–2 squadrons of F-16A/B or Mirage 5 attack aircraft that may be assigned a nuclear strike role.”82
This Index assesses the overall threat from AfPak-based terrorists, considering the range of contingencies, as “testing” for level of provocation of behavior and “gathering” for level of capability. This is notable because the 2016 Index assessed the level of provocative behavior emanating from this threat as “aggressive,” one level higher on the scale used.
China. China presents the United States with the most comprehensive security challenge in the region. It poses various threat contingencies across all three areas of vital American national interests: homeland; regional war (extending from attacks on overseas U.S. bases or against allies and friends); and the global commons. China’s provocative behavior is well documented. It is challenging the U.S. and its allies, like Japan, at sea and in cyberspace. It has raised concerns on its border with India and is a standing threat to Taiwan. While there may be a lack of official transparency, publicly available sources shed considerable light on its fast-growing military capabilities.
According to the IISS Military Balance, among the key weapons in China’s inventory are 62 Chinese ICBMs; 405 shorter-range ballistic missiles;83 four SSBNs; 77 satellites; 6,540 main battle tanks (300 fewer than 2014); 57 tactical submarines; 74 principal surface combatants (including one aircraft carrier and 19 destroyers); and 2,306 combat-capable aircraft in its air force. There are 1,600,000 members of the People’s Liberation Army.84
With regard to these capabilities, the 2014 Military Balance stated that “a lack of war-fighting experience, questions over training and morale, and key capability weaknesses in areas such as C4ISTAR and ASW, mean that [the PLA] remains qualitatively inferior, in some respects, to more technologically advanced armed forces in the region—such as South Korea and Japan—and it lags far behind the U.S.85 The IISS also points out that China’s aircraft carrier has “yet to demonstrate the capabilities that would enable carrier battle group operations” and limitations with regard to its capacity for “sustained conflict within the region” and deployment beyond the region.86 Neither the 2016 nor the 2015 edition of the Military Balance contains either of these caveats. The 2016 edition, however, does state that “without evidence from active operations…the actual extent of improvements…remain difficult to assess.”87
This Index assesses the overall threat from China, considering the range of contingencies, as “aggressive” for level of provocation of behavior and “gathering” for level of capability. These are the same levels as the 2016 Index.
North Korea. In the first instance, North Korea poses the most acute security challenge for American allies and bases in South Korea. However, it is also a significant challenge to U.S. allies in Japan and American bases there and in Guam.
North Korean authorities are very actively and vocally provocative toward the United States. While North Korea has used its missile and nuclear tests to enhance its prestige and importance—domestically, regionally, and globally—and to extract various concessions from the United States in negotiations over its nuclear program and various aid packages, such developments also improve North Korea’s military posture. North Korea likely has already achieved warhead miniaturization, the ability to place nuclear weapons on its medium-range missiles, and an ability to reach the continental United States with a missile.
According to the IISS Military Balance, key weapons in North Korea’s inventory include 3,500-plus main battle tanks, 560-plus light tanks, and 21,100 pieces of artillery. The navy has 73 tactical submarines, three frigates, and 383 patrol and coastal combatants.88 The air force has 545 combat-capable aircraft (58 fewer than 2014), including 80 H-5 bombers. The IISS counts 1,020,000 members of the North Korean army. Regarding the missile threat in particular, the 2016 Military Balance states that “U.S. officials now view the so-far-untested Hwasong-13 (KN-08) road-mobile ICBM as operational”89 and cites “the lack of a full flight test of the SLBM prototype.” More generally, the 2014 Military Balance carries a caveat that military “[e]quipment is mainly in a poor state, and training, morale and operational readiness all remain questionable.”90
This Index assesses the overall threat from North Korea, considering the range of contingencies, as “aggressive” for level of provocation of behavior and “gathering” for level of capability. It is noted that the provocation score for North Korea has dropped from “hostile” in the 2016 Index, but only because this score fell just below the numerical level assigned to that score and remains just short of “aggressive” and “hostile.” If the nation engages in further provocative actions toward U.S. interests, the level of provocation could return to the highest threat level.
Dan Lamothe, “‘Probably the Largest’ al-Qaeda Training Camp Ever Destroyed in Afghanistan,” The Washington Post,
October 30, 2015, https://www.washingtonpost.com/news/checkpoint/wp/2015/10/30/probably-the-largest-al-qaeda-training-camp-ever-destroyed-in-afghanistan/ (accessed August 4, 2016). ↩
James R. Clapper, Director of National Intelligence, “Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee,” February 11, 2014,
http://www.dni.gov/files/documents/2014%20WWTA%20SFR_SASC_11_Feb.pdf (accessed September 17, 2014). ↩
Mark Landler, “Obama Says He Will Keep More Troops in Afghanistan Than Planned,” The New York Times, July 6, 2016,
http://www.nytimes.com/2016/07/07/world/asia/obama-afghanistan-troops.html (accessed August 4, 2016). ↩
Rebecca Kheel, “General: ISIS in Afghanistan Potentially an ‘Enormous’ Threat,” The Hill, April 14, 2016,
http://thehill.com/policy/defense/276325-general-isis-in-afghanistan-potentially-enormous-threat (accessed August 4, 2016). ↩
“Terrorist Attacks Kill 1,079 People in Year 2015: PIPS Report,“ The News, January 5, 2016,
http://www.thenews.com.pk/latest/86585-Terrorist-attacks-kill-1079-people-in-year-2015-PIPS-report (accessed August 4, 2016). ↩
Reuters, “Pakistani Man Arrested on U.S. Terrorism Charges,” September 2, 2011,
http://www.reuters.com/article/2011/09/02/us-pakistan-usa-arrest-idUSTRE7815M920110902 (accessed September 17, 2014). ↩
Abha Shankar, “Trial’s First Week Reinforces Pakistani Intelligence Suspicions,” Investigative Project on Terrorism, IPT News,
May 27, 2011, http://www.investigativeproject.org/2919/trial-first-week-reinforces-pakistani (accessed September 17, 2014). ↩
Peter R. Lavoy, ed., Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict (Cambridge: Cambridge University Press, 2009), p. 10. ↩
Matthew Bunn, Securing the Bomb 2010: Securing All Nuclear Materials in Four Years (Cambridge, MA, and Washington, DC: Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard Kennedy School, and Nuclear Threat Initiative, April 2010), http://belfercenter.ksg.harvard.edu/publication/20068/securing_the_bomb_2010.html (accessed June 6, 2013). ↩
“Pakistan’s Future: Resilient Mess,” The Economist, February 11, 2012, http://www.economist.com/node/21547231
(accessed September 17, 2014). ↩
Stephen P. Cohen, “The Future of Pakistan,” The Brookings Institution, January 2011,
https://www.brookings.edu/wp-content/uploads/2016/06/01_pakistan_cohen.pdf (accessed August 9, 2016). ↩
James R. Clapper, Director of National Intelligence, “Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee,” February 9, 2016, pp. 26–27,
https://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf (accessed August 4, 2016). Cited hereafter as 2016 WWTA. ↩
Yonhap News Agency, “N.K. Calls Itself ‘Nuclear-armed State’ in Revised Constitution,” May 30, 2012,
(accessed August 4, 2016). ↩
Anna Fifield, “North Korea’s Making a Lot of Threats These Days. How Worried Should We Be?,” The Washington Post, March 11, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/03/11/north-koreas-making-a-lot-of-threats-these-days-how-worried-should-we-be/ (accessed August 4, 2016). ↩
Voice of America, “S. Korea Says Debris Reveals North’s ICBM Technology,” December 23, 2012,
http://www.voanews.com/content/north-korea-missile/1570703.html (accessed September 17, 2014). ↩
U.S. Department of Defense, “DOD News Briefing on Missile Defense from the Pentagon,” March 15, 2013,
http://archive.defense.gov/Transcripts/Transcript.aspx?TranscriptID=5205 (accessed December 23, 2014). ↩
General Curtis Scaparrotti, United States Army, Commander, United Nations Command/Combined Forces Command/U.S. Forces Korea, testimony in “Transcript: Senate Armed Services Committee Hearing on the U.S. Pacific Command & US Forces Korea,” April 17, 2015, http://www.pacom.mil/Media/SpeechesTestimony/tabid/6706/Article/585392/transcript-senate-armed-services-committee-hearing-on-the-us-pacific-command-us.aspx (accessed June 5, 2015). ↩
U.S. Department of Defense, “Department of Defense Press Briefing by Admiral Gortney in the Pentagon Briefing Room,”
April 7, 2015, http://www.defense.gov/Transcripts/Transcript.aspx?TranscriptID=5612 (accessed June 5, 2015). ↩
John Schilling, “A New Submarine-Launched Ballistic Missile for North Korea,” Johns Hopkins University, Paul H. Nitze School of Advanced International Studies, U.S.–Korea Institute, 38 North, April 25, 2016, http://38north.org/2016/04/jschilling042516/ (accessed August 4, 2016). ↩
Bruce Klingner, “Allies Should Confront Imminent North Korean Nuclear Threat,” Heritage Foundation Backgrounder No. 2913, June 3, 2014, http://www.heritage.org/research/reports/2014/06/allies-should-confront-imminent-north-korean-nuclear-threat. ↩
Andrew S. Erickson and Michael S. Chase, “China’s SSBN Forces: Transitioning to the Next Generation,” China Brief, Vol. 9, Issue 12 (June 12, 2009),
http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=35120#.U5G0OSjb5NQ (accessed September 17, 2014). ↩
For more information on China’s cruise missile program, see Dennis M. Gormley, Andrew S. Erickson, and Jongdong Yuan, A Low-Visibility Force Multiplier: Assessing China’s Cruise Missile Ambitions (Washington: National Defense University Press, 2014), http://ndupress.ndu.edu/Portals/68/Documents/Books/force-multiplier.pdf (accessed August 4, 2016). ↩
2016 WWTA, p. 7. ↩
2016 WWTA, pp. 6–7. ↩
International Crisis Group, “North Korea’s Nuclear and Missile Programs,” Asia Report No. 168, June 18, 2009,
http://www.crisisgroup.org/~/media/Files/asia/north-east-asia/north-korea/168_north_koreas_nuclear_and_missile_programs.ashx (accessed October 10, 2014). ↩
U.S. Department of Defense, Office of the Secretary of Defense, Military and Security Developments Involving the Democratic People’s Republic of Korea 2013, Annual Report to Congress, 2014,
http://www.defense.gov/Portals/1/Documents/pubs/North_Korea_Military_Power_Report_2013-2014.pdf (accessed August 5, 2016). ↩
Bruce E. Bechtol, Jr., “Understanding the North Korean Military Threat to the Security of the Korean Peninsula and Northeast Asia: Declined or Evolved?” Korea Observer, Vol. 40, No. 1 (Spring 2009), pp. 115–154. ↩
Bruce W. Bennett, “A Brief Analysis of the Republic of Korea’s Defense Reform Plan,” RAND Corporation Occasional Paper No. OP-165-OSD, December 2005, http://www.rand.org/content/dam/rand/pubs/occasional_papers/2006/RAND_OP165.pdf (accessed September 18, 2014). ↩
Yonhap News Agency, “N. Korea to Have 20 Nuke Bombs by 2016: U.S. Expert,” December 10, 2014,
http://english.yonhapnews.co.kr/national/2014/12/10/13/0301000000AEN20141210010100315F.html (accessed August 4, 2016). ↩
Joel S. Wit and Sun Young Ahn, “North Korea’s Nuclear Futures: Technology and Strategy,” Johns Hopkins University, Paul H. Nitze School of Advanced International Studies, U.S.–Korea Institute, North Korea’s Nuclear Futures Series, February 2015, http://38north.org/wp-content/uploads/2015/02/NKNF-NK-Nuclear-Futures-Wit-0215.pdf (accessed August 5, 2016). ↩
Bruce Klingner, “Allies Should Confront Imminent North Korean Nuclear Threat,” Heritage Foundation Backgrounder No. 2913, June 3, 2014, http://www.heritage.org/research/reports/2014/06/allies-should-confront-imminent-north-korean-nuclear-threat#_ftn30. ↩
Joby Warrick and Peter Slevin, “Libyan Arms Designs Traced Back to China,” The Washington Post, February 15, 2004,
http://www1.udel.edu/globalagenda/2004/student/readings/libya-chinaconnection.html (accessed August 5, 2016); David E. Sanger, “U.S. Sees More Arms Ties Between Pakistan and Korea,” The New York Times, March 14, 2014,
http://www.nytimes.com/2004/03/14/international/asia/14KORE.html (accessed October 10, 2014). ↩
David Albright, “North Korean Miniaturization,” Johns Hopkins University, Paul H. Nitze School of Advanced International Studies, U.S.–Korea Institute, 38 North, February 13, 2013, http://38north.org/2013/02/albright021313/ (accessed September 17, 2014). ↩
R. Jeffrey Smith and Joby Warrick, “Pakistani Scientist Depicts More Advanced Nuclear Program in North Korea,” The Washington Post, December 28, 2009, http://www.washingtonpost.com/wp-dyn/content/article/2009/12/27/AR2009122701205.html
(accessed October 10, 2014); Pervez Musharraf, In the Line of Fire: A Memoir (New York: Free Press, 2006), p. 296. ↩
North Korea Leadership Watch, “National Defense Commission, Foreign Ministry Issues Statements on Foal Eagle, Key Resolve,” March 6, 2016, https://nkleadershipwatch.wordpress.com/2016/03/06/national-defense-commission-foreign-ministry-issues-statements-on-foal-eagle-key-resolve/ (accessed August 5, 2016). ↩
Richard Engel, “Will North Korea Follow Through on Nuclear Threats?” NBC News, April 3, 2013,
http://www.nbcnews.com/video/nightly-news/51421978 (accessed September 17, 2014). ↩
2016 WWTA, pp. 6–7. ↩
Ibid., p. 17. ↩
International Institute for Strategic Studies, Strategic Survey 2013: The Annual Review of World Affairs (London: Routledge, 2013), p. 32. ↩
Ibid, p. 31; David J. Karl, “Nuclear South Asia Is More Stable Than You Think,” Foreign Policy, South Asia Channel, May 28, 2014, http://southasia.foreignpolicy.com/posts/2014/05/28/nuclear_south_asia_is_more_stable_than_you_think
(accessed September 17, 2014). ↩
“India Condemns Pak Support to Hafiz Saeed’s Rally in Lahore,” India Today, December 14, 2014,
http://indiatoday.intoday.in/story/hafiz-saeed-pakistan-lahore-rally-26-11-mumbai-attacks-jud-al-qaeda/1/405036.html (accessed August 5, 2016). ↩
“Spate of Violations: DGMOs to Reduce Cross-border, LoC Tensions,” Express Tribune, August 27, 2014,
http://tribune.com.pk/story/754176/spate-of-violations-dgmos-to-reduce-cross-border-loc-tensions/ (accessed August 5, 2016). ↩
International Institute for Strategic Studies, Strategic Survey 2013, p. 31. ↩
2016 WWTA, p. 27. ↩
Major General P.J.S. Sandhu (Retd), “Border Defence Cooperation Agreement—What Next?” United Service Institution of India, October 28, 2013, http://www.usiofindia.org/Article/?pub=Strategic%20Perspective&pubno=38&ano=2003
(accessed September 17, 2014). ↩
N.C. Bipindra, “India, China Skid on Visa, Ink Border Pact,” New Indian Express, October 24, 2013,
(accessed October 10, 2014). ↩
Nirupama Subramanian, “India, China Not to Use Force in Case of Face-offs,” The Hindu, October 24, 2013,
(accessed September 18, 2014).
WWTA: Unlike its 2015 assessment, which referenced both the likely pursuit of better economic relations and tensions along the border, ((James R. Clapper, Director of National Intelligence, “Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee,” February 26, 2015, p. 22,
http://www.armed-services.senate.gov/imo/media/doc/Clapper_02-26-15.pdf (accessed August 5, 2016). ↩
Madison Park, “Why China’s New Air Zone Incensed Japan, U.S.,” CNN, November 27, 2013,
http://www.cnn.com/2013/11/25/world/asia/china-japan-island-explainer/ (accessed September 17, 2014). ↩
David Brunnstrom and Andrea Shalal, “Exclusive: U.S. Sees New Chinese Activity Around South China Sea Shoal,” Reuters,
March 19, 2016, http://www.reuters.com/article/us-southchinasea-china-scarborough-exclu-idUSKCN0WK01B
(accessed August 5, 2016). ↩
Tim Hume, “Close Call as China Scrambles Fighter Jets on Japanese Aircraft in Disputed Territory,” CNN World, updated
May 26, 2014, http://www.cnn.com/2014/05/26/world/asia/china-japan-jets-scramble/ (accessed November 12, 2014). ↩
International Institute for Strategic Studies, The Military Balance 2014: The Annual Assessment of Global Military Capabilities and Defence Economics (London: Routledge, 2014), p. 292. ↩
U.S. Department of Defense, Office of the Secretary of Defense, Military and Security Developments Involving the People’s Republic of China 2014, Annual Report to Congress, 2014, p. 33,
http://www.defense.gov/Portals/1/Documents/pubs/2014_DoD_China_Report.pdf (accessed August 5, 2016). ↩
Zachary Keck, “Putin Approves Sale of S-400 to China,” The Diplomat, April 11, 2014,
http://thediplomat.com/2014/04/putin-approves-sale-of-s-400-to-china/ (accessed September 17, 2014). ↩
Xinhua, “Full Text: China’s National Defense in 2010,” March 31, 2011,
http://news.xinhuanet.com/english2010/china/2011-03/31/c_13806851.htm (accessed November 12, 2014). ↩
2016 WWTA, p. 16. ↩
While it has long been a matter of U.S. policy that Philippine territorial claims in the South China Sea lie outside the scope of American treaty commitments, the treaty does apply in the event of an attack on Philippine “armed forces, public vessels or aircraft in the Pacific.” Mutual Defense Treaty Between the United States and the Republic of the Philippines, August 30, 1951, Article V, http://avalon.law.yale.edu/20th_century/phil001.asp (accessed August 5, 2016). In any event, Article IV of the Treaty obligates the U.S. in case of such an attack to “meet the common dangers in accordance with its constitutional processes.” Regardless of formal treaty obligations, however, enduring U.S. interests in the region and perceptions of U.S. effectiveness and reliability as a check on growing Chinese ambitions would likely spur the U.S. to become involved. ↩
2016 WWTA, p. 16. ↩
Xinhua, “China Announces Success in Technology to Refuel Satellites in Orbit,” June 30, 2016,
http://news.xinhuanet.com/english/2016-06/30/c_135479061.htm (accessed August 5, 2016). ↩
Mei Lianju, Space Operations Teaching Materials (Beijing, PRC: Academy of Military Sciences Publishing House, 2013), p. 65. ↩
Brian Weeden, “Through a Glass Darkly: Chinese, American, and Russian Anti-Satellite Testing in Space,” The Space Review, March 17, 2014, http://www.thespacereview.com/article/2473/1 (accessed September 17, 2014). ↩
Ian Easton, The Great Game in Space: China’s Evolving ASAT Weapons Programs and Their Implications for Future U.S. Strategy, Project 2049 Institute, 2009, pp. 4–5. ↩
Mei Lianju, Space Operations Teaching Materials, p. 69. ↩
Peter B. de Selding, “Runaway Zombie Satellite Galaxy 15 Continues to Pose Interference Threat,” Space.com, October 15, 2010,
(accessed September 17, 2014). ↩
2016 WWTA, pp. 9–10. ↩
Stephanie Henry, “Verizon Report Describes Trends in International Data Breaches, China-Based Espionage,” US–China Business Council, http://www.uschina.org/washington-update/verizon-report-describes-trends-international-data-breaches-china-based-espionage (accessed August 5, 2016); Lucian Constantin, “Verizon: One in Five Data Breaches Are the Result of Cyberespionage,” PC World, April 23, 2013, http://www.pcworld.com/article/2036177/one-in-five-data-breaches-are-the-result-of-cyberespionage-verizon-says.html (accessed September 17, 2014). ↩
Dan McWhorter, “Mandiant Exposes APT1—One of China’s Cyber Espionage Units and 3,000 Indicators,” Mandiant,
February 18, 2013, https://www.mandiant.com/blog/mandiant-exposes-apt1-chinas-cyber-espionage-units-releases-3000-indicators/ (accessed October 12, 2014). ↩
Bai Bangxi and Jiang Lijun, “Systems of Systems Conflict Is Not the Same as Systems Conflict,” National Defense Newspaper, January 10, 2008. ↩
News release, “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage,” U.S. Department of Justice, May 19, 2014,
http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor (accessed November 12, 2014). ↩
Guo Ruobing, Theory of Military Information Security (Beijing, PRC: National Defense University Publishing House, 2013), pp. 12–21. ↩
Tan Rukan, Building Operational Strength Course Materials (Beijing, PRC: Academy of Military Sciences Publishing House, 2012),
p. 204. ↩
“Cyber Attack Retaliation Against Seoul’s Move to Join ‘Cyber Storm,’” The Korea Herald, July 7, 2009,
http://www.koreaherald.com/common_prog/newsprint.php?ud=20090710000075&dt=2 (accessed July 23, 2014). ↩
“N.Korea Boosting Cyber Warfare Capabilities,” Chosun Ilbo, November 5, 2013,
http://english.chosun.com/site/data/html_dir/2013/11/05/2013110501790.html (accessed July 23, 2014). ↩
Yoon Sangwon, “North Korea Recruits Hackers at School,” Al Jazeera, June 20, 2011,
http://www.aljazeera.com/indepth/features/2011/06/201162081543573839.html (accessed July 23, 2014). ↩
Kelly Beaucar Vlahos, “Special Report: The Cyberwar Threat from North Korea,” Fox News, February 14, 2014,
http://www.foxnews.com/tech/2014/02/14/cyberwar-experts-question-north-korea-cyber-capabilities/ (accessed August 8, 2014). ↩
Choi He-suk, “N.K. Third for Cyber War Capabilities,” The Korea Herald, June 7, 2012,
http://www.koreaherald.com/view.php?ud=20120607001276 (accessed August 5, 2016). ↩
Nicole Perlroth and Michael Corkery, “North Korea Linked to Digital Attacks on Global Banks,” The New York Times, May 26, 2016, http://www.nytimes.com/2016/05/27/business/dealbook/north-korea-linked-to-digital-thefts-from-global-banks.html
(accessed August 5, 2016). ↩
2016 WWTA, p. 3. ↩
Yuan Wenxian, Joint Campaign Information Operations Teaching Materials (Beijing, PRC: National Defense University Press, 2009), pp. 109–112. ↩
International Institute for Strategic Studies, The Military Balance 2014, p. 220. ↩
International Institute for Strategic Studies, The Military Balance 2016: The Annual Assessment of Global Military Capabilities and Defence Economics (London: Routledge, 2016), p. 280. ↩
Ibid. and International Institute for Strategic Studies, The Military Balance 2015: The Annual Assessment of Global Military Capabilities and Defence Economics (London: Routledge, 2015), pp. 276–277. ↩
International Institute for Strategic Studies, The Military Balance 2016, p. 240. The Pentagon’s annual report to Congress on PRC-related military and security developments, however, contains higher estimates, including 1,200 SRBMs. See U.S. Department of Defense, Office of the Secretary of Defense, Military and Security Developments Involving the People’s Republic of China 2016, Annual Report to Congress, 2016, p. 109, http://www.defense.gov/Portals/1/Documents/pubs/2016%20China%20Military%20Power%20Report.pdf (accessed August 5, 2016). ↩
International Institute for Strategic Studies, The Military Balance 2016, pp. 240–242, 245. ↩
International Institute for Strategic Studies, The Military Balance 2014, p. 231. ↩
International Institute for Strategic Studies, The Military Balance 2015, p. 237. ↩
International Institute for Strategic Studies, The Military Balance 2016, p. 265. ↩
Ibid., p. 264–246. ↩
International Institute for Strategic Studies, The Military Balance 2014, p. 254. ↩