The Secret War Against the United States: Cyber and Asymmetrical Warfare

ARMY CYBER INSTITUTE
WEST POINT
The Cyber Defense ReviewĀ 
ā€œThe Secret War Against the United Statesā€

The Top Threat to National Security and the American Dream
Cyber and Asymmetrical Hybrid Warfare
An Urgent Call to Action

Read the full Cyber Defense Review on Army.mil.

Download theĀ PDF.

ABSTRACT

Imagine if Pearl Harbor had been attacked and there had been no response from Washington. This is the actual case today due to a highly sophisticated, mature, and stealth strategy perpetrated against the United States (US) by advanced military methods leveled at every sector and organization in our society. This includes private sector businesses, all government agencies, the military, and academiaā€”every US organization operating with innovation, intellectual property, or sensitive data. The world is in significant conflict requiring the US government, military, and private sector to deliberately confront this national crisis or become permanently irrelevant. It is no longer ā€œbusiness as usual.ā€

Over the past three decades, as the US military trained in conventional, nuclear, and counterinsurgency warfare, the Chinese Communist Party (CCP) engaged and perfected over forty methods of warfare intended to permanently destabilize and weaken the US both economically and militarily. At the same time, China rapidly grew its economy and military without the required time or investment in innovation. The result is that the US is hemorrhaging its economic strength and relevance at the rate of $5 trillion in lost total value each year, or one-third of the U.S. Gross Domestic Product (GDP). General (Ret.) Keith Alexander, former Director of the National Security Agency (NSA) and Commander of U.S. Cyber Command, referred to Chinaā€™s the of American innovation and intellectual property as ā€œthe greatest transfer of wealth in history.ā€ Over time, a weakened US economy directly reduces the strength and effectiveness of the US military. Further, when a country is manipulated by an adversary to lose one-third of the value of its economy each year, it is at war.

ASYMMETRICAL HYBRID WARFARE

Clear and Present Existential Threat

Over the past thirty years, the US government and private sector have advanced their policy of full cooperation, including substantial financial and technological investment in China, under the belief that they were moving towards a more democratic, free-market society while China played intentional misdirection and deception. In 1986, month number three, the Communist Party of China (CCP) officially declared Asymmetrical Hybrid Warfare (AHW) against the US and its western allies in its nation-state Program 863. This strategy commits all of China with its strict Communist military rule to engage in any and all methods to become on par with, surpass, and dominate the West at any and all cost. Chinaā€™s ultimate objective is to harvest and perpetuate the Chinese Dream through the extraction and extinguishing of the American Dream, the American way of life and ending Western dominance. The Chinese strategy is that another 200 years of Western global dominance, it is their destiny to reverse roles with the US and to relegate it to a forced supplier with a much lower quality of life. To underscore this strategy, China refers to the last century as ā€œthe century of great humiliation.ā€ It must also be emphasized that AHW strategy is rooted in Unrestricted Warfare or ā€œwar without rules.ā€

DEATH BY A THOUSAND CUTS

The Modern Battlefield is Everywhere

AHW has been established as the future of modern warfare and business strategy across the globe. It is ultimate warfare that has many forms: economic warfare, transaction warfare, industrial warfare, drug warfare, and propaganda warfare, to name only a few. Each method is characterized by the non-utilization of military or conventional warfare that is typical of aircraft, ships, troops, and weapons. While China continues to aggressively develop and expand its military, it does so with the belief that if it must resort to the use of conventional or nuclear warfare, it has ultimately failed at achieving the enemyā€™s capitulation through the combined methods of AHW. In the business sector, AHW has become the ā€œNew Global Competitive Modelā€ where the ā€œwinner takes all.ā€ Soon, China will dictate transactions and pricing based on its market dominance. As businesses rush to move to ā€œdigital transformationā€ and ā€œBig Data,ā€ each must perform a 180Ā° cybersecurity transform- ation based on sensitive data protection and adversarial motives as a means to survive. Currently, AHW is the primary focus of our adversaries: China is, by far, the most successful at methodically executing all AHW methods, while Russia, North Korea, Iran, and India engage in relatively few methods at present. The strategy is to continuously inflict damage or cuts to every facet of American society just below the pain threshold where we choose not to act. We believe that China has achieved an estimated 750 cuts towards ā€œdeath by a thousand cuts.ā€ (Sun Tzu)

Definition

AHW is characterized as unconventional, non-military, multi-method strategic warfare that is based on deception and void of any rules between countries where economic and military power, strategy and tactics differ significantly. The attacking country exploits inherent weaknesses through numerous uneven and seemingly unrelated AHW methods that are designed to destabilize the unwitting target country for ultimate and complete economic and military submission. Extensive use of misinformation and plausible deniability are used to deceive and deflect suspicion of the strategy or its methodical advancement. Hybrid warfare is a military strategy that blends conventional warfare, asymmetric warfare, irregular warfare, offset warfare, non-linear warfare, and cyber warfare. AHW is rooted in unrestricted warfare (war without rules where ā€œeverything is fair playā€) which is also described as ā€œanything warfare.ā€Ā Source: BLACKOPS Partners Corporation ā€“ See Figure 1.

Culture Disparity as a Strategic Weapon

It is important to note the striking contrast be- tween the two cultures of the US and Communist China. It is this great divide that has contributed to Chinaā€™s manipulation and acceleration of AHW against the US. The CCP believes its ā€œlegalismā€ philosophy of supreme law and people are superior to Americaā€™s constitutional democracy underpinned by justice, religion, a Creator, and ā€œall men are created equal.ā€ Since 1949, the CCP have controlled all aspects of Chinaā€™s commerce, military, and daily life where intellectual property is state-owned, all data is controlled, and it is the national duty of all citizens to support the regime, including all aspects of espionage. The Communist culture is further defined not by ā€œwinning vs. losingā€; rather, ā€œliving vs. dying.ā€ It is this extreme belief that underscores Chinaā€™s support for AHW in its conflict with the US. Another distinction is that the CCP controls every business transaction with US companies. In many cases, the CCP resembles a powerful organized crime faction, through its shell business partnerships and facades. There is no distinction between Chinaā€™s organized crime, military, or government. This places every US business partnership or transaction with China at extreme risk.

Critical Role of Intelligence

Chinaā€™s uncompromising commitment to AHW demonstrates a national objective to destroy the US and its Western allies. The critical nucleus that drives the AHW strategy is the complete dependence on stolen innovation, intellectual property (IP), sensitive data, and military secrets ā€” namely intelligence. For over thirty years, China has orchestrated the most impressive and sophisticated strategy with an intricate global network of espionage and industrial the to fuel AHW. In recent years, an emboldened China has demanded the complete surrender of all intellectual property during the process of contracting current international business transactions. Conversely, intelligence plays a critical role for the US to gauge the executional success of AHW, changes in strategy, and individual and cumulative damages.

Cyber Warfare as the Key Accelerator

China has successfully intertwined Cyber warfare as the key AHW accelerator due to its relatively minimal investment and the di culty of attributing actions to a specific actor. At the same time, cybersecurity remains fundamentally broken in the US and the West due to failed cyber strategies, lack of awareness of AHW, lack of accountability, overconfidence, and overdependence on inherently fallible cybersecurity products. This is made clear by the ā€œnew normalā€ of the increased trend in number, frequency, and resulting total damages from cyberattacks.

Current estimates place global cyber losses at $6 trillion by 2021, with expectations that this will increase further in the future, according to Cybersecurity Ventures. Cyber warfare and cybersecurity have become a ā€œwhole of societyā€ challenge that requires a unified, elevated strategy and 180Ā° approach to combat the morphing threat. As we examine todayā€™s cybersecurity environment, we are looking through the wrong end of the telescope. It is only in the context of AHW that we can begin to fully understand cybersecurityā€™s critical role for successful defense, protection, and resolution. We have learned to treat cybersecurity first and foremost as a human problem and a senior leadership challenge, not solely an IT issue.

Call to Action

The US must immediately increase awareness, positive action, and accountability in all sectors and at all levels through creating a unified and aggressive approach in responding to the advancement and threat of AHW. The following recommendations are put forth:

  • Immediately establish the Asymmetrical Hybrid Warfare Center (AHWC)
    • Public-Private Partnership Center (P3C) coalition, U.S. university-based with Department of Defense (DoD) participation
    • Independent leadership and reporting structure as a resource-focused, support entity charged with maximum e ciency (reporting to the U.S. Executive Branch or U.S. Senate Select Committee on Intelligence)
    • Constituents: USG, Pentagon, Congress, private sector, academia, and US Allies
    • Mission: strategy, intelligence, counterintelligence, research, tracking, analysis, awareness, training, AHW-countering recommendations to constituents (e.g., foreign acquisition of assets determined to be harmful to US economy or military, false shell companies, espionage reporting database, misinformation generation, spyware)
    • Cybersecurity consortium clearinghouse with anonymity scrub: intelligence at a level higher than today with a focus on advanced attack methods for early warning and resolution
    • DarkNet research and triangulation, active surveillance as adversaries increasingly exploit this platform
    • Regular release of evolving cybersecurity attack methods and best practices
    • No organization or entity today is positioned for this center or mission
  • Transformational culture change to protect innovation, IP, and cybersecurityĀ sensitive data.
  • AHW executive briefing and exercise for key US and Allied organizations (government, military, private sector, and academia) to train in AHW strategy, methods, and countering techniques
Summary

The persistent engagement of Asymmetrical Hybrid Warfare (AHW) will continue to grow as the preeminent threat to US national security and will characterize the future focus of each of our adversaries. Asymmetrical / Conventional / Nuclear is the new continuum of modern warfare. The Russian hacking of the 2016 U.S. Presidential election clearly demonstrates the shift of AHW to the forefront and the relative effectiveness of a single act and method. All sectors of US society: private sector economy, the governmentā€” especially Congress, military, and academia must increase its awareness of highly advanced AHW, provide accountability, and routinely engage in effective countermeasures to secure and protect the future of the United States.

Read the full Cyber Defense Review on Army.mil.

Download theĀ PDF.

Ad

No posts to display