{"id":167,"date":"2020-10-20T21:30:11","date_gmt":"2020-10-21T01:30:11","guid":{"rendered":"https:\/\/www.cognitivewarriorproject.com\/?p=167"},"modified":"2020-10-20T21:28:18","modified_gmt":"2020-10-21T01:28:18","slug":"non-kinetic-warfare-and-china","status":"publish","type":"post","link":"https:\/\/www.cognitivewarriorproject.com\/?p=167","title":{"rendered":"Re-post: Non-Kinetic Warfare and China"},"content":{"rendered":"<div class=\"boldgrid-section\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-sm-12\">\n<p class=\"\">I am getting a little bogged with work and home projects so I thought I would re-post a previously written article just to move my mug down a slot when I click to update the page.<\/p>\n<p class=\"\">A friend of mine has been helping me to try to summarize the purpose of this <a href=\"https:\/\/www.cognitivewarriorproject.com\/home\/\">Project<\/a> in a sentence or two. Boil it down to why I wanted to start this blog and why I think it is important for our current warfighters. War and warfare have always evolved and it is my belief that we are on the cusp of completely having to rethink how we fight. A full-on State to State competition will simply be too costly and no one really wants to fight toe to toe. Modern warfare must remain below the threshold of total war and a nuclear response. This may mean a return to a more historical, <a href=\"https:\/\/www.longdom.org\/open-access\/the-obsolescence-of-the-westphalian-model-and-the-return-to-amaximum-state-of-exception-2332-0761-1000S2-007.pdf\">pre-Westphalian<\/a> style of warfare. While I was studying at Penn State, I was introduced to the concept of <a href=\"https:\/\/globalsecurityreview.com\/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace\/\">Hybrid War<\/a> and how the traditional lines of battle will be blurred in ways never before seen. <a href=\"https:\/\/www.9-11commission.gov\/report\/911Report.pdf\">The 9-11 Commission Report<\/a> condemned our systemic \u2018<a href=\"https:\/\/www.csmonitor.com\/2004\/0723\/p01s03-uspo.html\">failure of imagination\u2019<\/a>. But is that true? Tom Clancy <a href=\"https:\/\/www.telegraph.co.uk\/culture\/books\/booknews\/10350806\/Tom-Clancy-the-writer-who-predicted-911.html\">predicted<\/a> a 9-11 style of attack in <em>Debt of Honor.<\/em> I am attempting to better prepare our warfighters for the modern <a href=\"https:\/\/www.thoughtco.com\/what-was-the-great-game-195341\">Great Game<\/a> by exposing them to a wide variety of information that they may not have considered. Simply put, the only limits to Hybrid Warfare, are our imagination.<\/p>\n<p class=\"\">To expound the concept of Hybrid Warfare today we are going to look more closely at China. But first, some grounding.<\/p>\n<p><strong>Hybrid Warfare<\/strong> &nbsp;<\/p>\n<p class=\"\"><a href=\"https:\/\/www.oxfordresearchgroup.org.uk\/blog\/interview-sascha-dov-bachmann\">Hybrid warfare<\/a> as <a href=\"https:\/\/theconversation.com\/explainer-what-is-hybrid-warfare-and-what-is-meant-by-the-grey-zone-118841\">defined<\/a> by Beth Daily on <a href=\"https:\/\/theconversation.com\/us\">The Conversation<\/a><\/p>\n<p class=\"\" style=\"padding-left: 40px;\"><em>Refers to the use of unconventional methods as part of a multi-domain warfighting approach.<\/em> <em>These methods aim to disrupt and disable an opponent\u2019s actions without engaging in open hostilities\u2026<\/em> [where]<em> Such warfare is conducted in the \u201cgrey zone\u201d of conflict, meaning operations may not clearly cross the threshold of war. That might be due to the ambiguity of international law, ambiguity of actions and attribution, or because the impact of the activities does not justify a response.<\/em><\/p>\n<p><strong>China<\/strong><\/p>\n<p class=\"\">Earlier this week we <a href=\"https:\/\/www.cognitivewarriorproject.com\/uncategorized\/new-york-times-china-limited-the-mekongs-flow-other-countries-suffered-a-drought\/\">discussed<\/a> a New York Times article where China was limiting the flow of the Mekong River Region deliberately causing the worst drought in living memory. Why? Does China seek or need more hydroelectric power or are they trying to pressure or influence the <em><a href=\"https:\/\/www.nytimes.com\/2020\/04\/13\/world\/asia\/china-mekong-drought.html?utm_source=pocket-newtab\">five<\/a> downstream nations \u2014 Myanmar, Thailand, Laos, Cambodia and Vietnam?<\/em><\/p>\n<p class=\"\">Then I read <a href=\"https:\/\/www.bild.de\/politik\/international\/bild-international\/bild-chief-editor-responds-to-the-chinese-president-70098436.bild.html\">this<\/a> by the Editor-in-Chief of <a href=\"https:\/\/www.bild.de\/\">Build<\/a>, a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bild\">daily<\/a> German Newspaper. I don\u2019t care if it\u2019s a tabloid the point he makes about China is this:<\/p>\n<ol class=\"\">\n<li><em>You rule by surveillance. You wouldn&#8217;t be president without surveillance.<\/em><\/li>\n<li><em>Surveillance is a denial of freedom. And a nation that is not free, is not creative. A nation that is not innovative, does not invent anything. This is why you have made your country the world champion in intellectual property theft.<\/em><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>China enriches itself with the inventions of others, instead of inventing on its own. The reason China does not innovate and invent is that you don&#8217;t let the young people in your country think freely. China\u2019s greatest export hit (that nobody wanted to have, but which has nevertheless gone around the world) is Corona.<\/em><\/p>\n<p class=\"\">Point number two reminded me of a paper I wrote in one of my core Homeland Security classes about Huawei (which I will post in several segments starting next week) and how they encourage intellectual property theft. If you don\u2019t understand how big of a problem this is, follow these links, <a href=\"https:\/\/www.chicagotribune.com\/business\/ct-biz-us-china-trade-war-ip-theft-20190221-story.html\">here<\/a>, <a href=\"https:\/\/www.prosperousamerica.org\/top_ten_cases_of_chinese_ip_theft\">here<\/a> and <a href=\"https:\/\/www.cnbc.com\/2019\/02\/28\/1-in-5-companies-say-china-stole-their-ip-within-the-last-year-cnbc.html\">here<\/a>. Simply put, 1 in 5 corporations say that China has stolen their intellectual property within the last year. Here is a list of the top 10 cases of Chinese theft which can be found and explained in more depth <a href=\"https:\/\/www.prosperousamerica.org\/top_ten_cases_of_chinese_ip_theft\">here<\/a>:<\/p>\n<ol class=\"\">\n<li><strong><em> The Wind Turbine Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>A decade ago, American Superconductor Corporation (AMSC) was a high-tech, high-growth software success story. Spun out of MIT and headquartered in Ayer, Massachusetts, AMSC developed world-class technology for software to control the wind turbines.<\/em><\/p>\n<ol start=\"2\">\n<li><strong><em> The Oreo White Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In 2014, federal prosecutors launched an industrial espionage case by showing the jury an Oreo, the famous Nabisco cookie. The white Oreo cream filling uses the chemical titanium dioxide (TiO<sub>2<\/sub>) to achieve that brilliant white color. &nbsp;Automotive paint and hundreds of other industrial products use TiO<sub>2, <\/sub>making it a highly valuable chemical. American manufacturer Dupont has long had a world-leading proprietary multi-stage process for producing titanium dioxide.&nbsp; In 2012, chemical engineer Walter Liew was charged with secretly conspiring to steal Dupont technology over the course of 14 years for the benefit of Chinese chemical manufacturers.<\/em><\/p>\n<ol start=\"3\">\n<li><strong><em>The Motorola Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>On February 28, 2007, a Motorola engineer named Hanjuan Jin was stopped by customs agents at O\u2019Hare Airport. They searched her and found she had $30,000 in cash, a carry-on bag full of Motorola documents marked \u201cconfidential and proprietary,\u201d and a one-way ticket for Beijing. She was arrested.<\/em><\/p>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In 2012, she was sentenced to four years in prison and a fine of $20,000. At the trial, the judge said: \u201cThe most important thing this country can do is protect its trade secrets.\u201d<\/em><\/p>\n<ol start=\"4\">\n<li><strong><em>The Iowa Seed Corn Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In 2014, six Chinese nationals were arrested for attempting to steal genetically modified corn seeds from Dupont and Monsanto experimental farms in Iowa. The conspirators were employed by Chinese conglomerate DBN and its corn seed subsidiary, Kings Nower Seed. The Chinese government puts a high priority on agricultural development to feed its large and growing population.<\/em><\/p>\n<ol start=\"5\">\n<li><em><strong>The Tappy the Robot Case<\/strong><\/em><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>When a telecom company allows engineers from its suppliers into its carefully guarded testing labs, those engineers are expected to obey all the rules laid down by their customer. Two engineers from Chinese supplier Huawei used a 2014 visit to T-Mobile\u2019s labs in Seattle to steal information and even a piece of confidential T-Mobile equipment, Tappy the Robot. T-Mobile used Tappy\u2019s fast-moving fingers to test the performance of the smartphones it sold. Not only did they take photos of Tappy, the Huawei engineers stole one of his fingertips.<\/em><\/p>\n<ol start=\"6\">\n<li><strong><em> The CLIFBAW case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In 2015, the federal government charged six Chinese citizens with stealing wireless communications technology from two Silicon Valley microchip makers, Avago and Skyworks, and launching their own company to sell that technology in China.&nbsp; (Avago is now known as Broadcom.)<\/em><\/p>\n<ol start=\"7\">\n<li><strong><em>The Allen Ho TVA\/Nuclear Power case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In August 2017, Taiwanese-American engineer Allen Ho was sentenced to two years in prison for providing nuclear energy technology information to China\u2019s state-owned China General Nuclear Power Company (CGNPC). According to the indictment, Ho, a naturalized American citizen, used his company Energy Technology International, which was based at his home in Wilmington, Delaware, to gather information on the production of nuclear material from American nuclear power developers including the Tennessee Valley Authority and pass that information to the CGNPC. &nbsp;Ho engaged in these activities between 1997 and 2016, through his own efforts and that of unnamed consultants he hired.<\/em><\/p>\n<ol start=\"8\">\n<li><strong><em> The File Storage and China National Health case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>According to a May 2017 Department of Justice press release, Chinese spy Xu Jiaqiang stole data storage technology from a US storage technology company for the benefit of China\u2019s health system, the National Health and Family Planning Commission. He then communicated with two undercover FBI agents and offered to sell them the so-called clustered file storage technology from the unnamed victim company. He explained to the undercover cops how to set up a network of servers and uploaded the proprietary storage software onto the servers. He offered to show them how to edit the software to eliminate any trace of the name of the victim company from the screen prompts. At a meeting in a hotel room on Dec. 7, 2015, Xu showed the undercover cops the proprietary software on his laptop and boasted of multiple other \u201ccustomers\u201d to whom he had provided the stolen software. He was arrested.<\/em><\/p>\n<ol start=\"9\">\n<li><strong><em>The Unit 61398 Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>In May 2014, federal prosecutors charged five members of the People\u2019s Liberation Army (PLA) of China with cyberhacking their way into the confidential computer files of four US companies and one labor union. The five military men were allegedly members of Unit 61398, a unit of the PLA dedicated to cyberhacking. The companies that were hacked included aluminum producer Alcoa, nuclear power plant producer Westinghouse, solar cell manufacturer SolarWorld, Allegheny Technologies Inc., and labor union United Steel Workers.&nbsp; SolarWorld said that a key proprietary technology for making solar cells more efficient was stolen in this hack and turned over to a Chinese competitor.<\/em><\/p>\n<ol start=\"10\">\n<li><strong><em>The Great Firewall Case<\/em><\/strong><\/li>\n<\/ol>\n<p class=\"\" style=\"padding-left: 40px;\"><em>The Great Wall of China was built to keep out invaders. The so-called Great Firewall is a network of software tools China uses to control what Internet information and websites Chinese citizens have access to. You would think that if a totalitarian Communist nation wanted to control what its citizens could see and read, it would carefully construct its own software.<\/em><\/p>\n<p class=\"\">Which brings me to what I was really going to write about today, how China is partially <a href=\"https:\/\/finance.yahoo.com\/news\/chinas-role-in-the-us-fentanyl-epidemic-152338423.html\">responsible<\/a> for the opioid crisis we are facing in America.<\/p>\n<p class=\"\">Several months ago, I listened to a Strategic Multilayer Assessment (<a href=\"https:\/\/nsiteam.com\/sma-publications\/\">SMA<\/a>) Program by <a href=\"https:\/\/nsiteam.com\/\">NSI<\/a> titled: <a href=\"https:\/\/nsiteam.com\/the-opioid-crisis-china-national-security-and-the-undeclared-conflict\/\">The Opioid Crisis: China, National Security, and the Undeclared Conflict<\/a>. It\u2019s about 30 minutes and discusses non-kinetic warfare and the whole of nation response but the key points are:<\/p>\n<ol class=\"\">\n<li>China is engaged in warfare with us by applying Sun Tzu&#8217;s principles\n<ol>\n<li>All warfare&#8217;s is based on deception<\/li>\n<li>The victorious warrior wins first then goes to war, while the defeated warrior goes to war first then seeks to win<\/li>\n<li>4 of the 9 elements of the 100-year war\n<ol>\n<li>Induce complacency to avoid alerting your opponent<\/li>\n<li>Be patient for decades or longer to achieve victory<\/li>\n<li>Steal your opponent\u2019s ideas and technology for strategic purposes<\/li>\n<li>Military might is not the critical factor for winning a long term competition.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<li>We are engaged in non-kinetic war China that costs the US more than the DoDs budget!<\/li>\n<li>War disguised as peace \u2013 Left of Bang<\/li>\n<li>Military&#8217;s Role \u2013 Border Enforcement \/ Drug interdiction<\/li>\n<li>Is this a worthy mission for the Military \u2013 Yes<\/li>\n<li>Non-kinetic warfare can be more destabilizing than a direct conflict<\/li>\n<li>What is a proportional response?<\/li>\n<li>Weapons of mass disruption \u2013 read that again, not a typo<\/li>\n<li>The larger border mission and involvement of the Military<\/li>\n<li>What is the impact of not using the Military to help secure the border?<\/li>\n<\/ol>\n<p class=\"\">The enemy often drives our actions, there are three warfare\u2019s that China is employing:<\/p>\n<ol class=\"\">\n<li>Psychological Operations<\/li>\n<li>Lawfare<\/li>\n<li>The use of Media<\/li>\n<\/ol>\n<p>How do you address this type of clandestine conflict?<\/p>\n<ol class=\"\">\n<li>Recognition \u2013 non-kinetic engagement are effective<\/li>\n<li>Close the void between kinetic and non-kinetic warfare<\/li>\n<li>Understand not a stand-alone operation<\/li>\n<\/ol>\n<p class=\"\">Other points: for the first time in US History the life expectancy dropped due to the opioid crisis and the amount of Fentanyl in the country is enough to kill every U.S. Citizen. Is this chemical warfare? The presentation goes far beyond this and discusses non-kinetic engagements and you really should check it out.<\/p>\n<p class=\"\"><strong>Conclusion<\/strong><\/p>\n<p>Where are the limits to how China is fighting a hybrid war with us? Are they limited to the above examples? This is not limited to China, who else do we need to be aware of? And ultimately, what do we do about it?<\/p>\n<p class=\"\">These are all complex questions that are only limited by our and our adversary\u2019s imagination. I believe that current warfighter needs to better understand the new battlefield that extends beyond tactics. These examples are everywhere. I just want to present them in a consumable form and do my part after my ruck has hit the ground and I have picked up a keyboard.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I am getting a little bogged with work and home projects so I thought I would re-post a previously written article just to move my mug down a slot when I click to update the page. A friend of mine has been helping me to try to summarize the purpose of this Project in a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"bgseo_title":"","bgseo_description":"","bgseo_robots_index":"index","bgseo_robots_follow":"follow","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[11],"tags":[21,32,34,31,33],"class_list":["post-167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presentaions-documentaries","tag-china","tag-hybrid-war","tag-intellecual-property-theft","tag-non-kinetic-war","tag-opiods"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.cognitivewarriorproject.com\/wp-content\/uploads\/2020\/04\/Hybrid-war-with-china.jpg","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/posts\/167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=167"}],"version-history":[{"count":2,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/posts\/167\/revisions"}],"predecessor-version":[{"id":525,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/posts\/167\/revisions\/525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=\/wp\/v2\/media\/168"}],"wp:attachment":[{"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cognitivewarriorproject.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}