President Xi, Tear Down This “Great Firewall”

Connect--But, be very careful

A Disruptive Technology Solution for the 21st Century: “Voice of America 2.0”

Is this the same attitude that blindsided us to Imperial Japan, 1950s North Korea and the Vietcong? China is the real threat and why are we so oblivious?

Bill Gertz, in his book, iWar: War and Peace in the Information Age, outlined an “…information warfare strategy to mitigate the [cyber] threats,” (Gertz, 2017).  His overall approach toward worldwide cyber actors, to include China, relies on Soft Cyber Power (SCP).  SCP reverts to the military’s deep-dive in the 1990’s with the works of Alvin and Heidi Toffler regarding Information Operations (IO) and dominance. There work is still the basis of much of the US’s current approach to cybersecurity offensive and defensive thought-processes.

“Hard” and “Soft” Cyber Power Continuum

This used to be mandatory reading in DOD as the military grew into the Information Age


VOA 2.0

Gertz suggests that the US return to its place in information operation dominance as a major solution to capturing the “hearts and minds” of the enemy.  He suggests the reinvigoration of the US Information Agency (USIA) which its most notable role was broadcasting communications to varied global totalitarian nations under the name of “Voice of America” –it was abolished in 1999.  For the purposes of this discussion, the creation of a strategic next-step technical solution is identified as Voice of America 2.0 (VOA 2.0).

VOA 2.0 is an advanced technology and disruptive technological solution. It is designed to weaken Chinese leadership’s control of information dissemination to its citizenry.   It is intended to provide unfettered access to the Internet and bypass a dictatorial nations from interference by its censors or blocking technologies.

VOA 2.0 would provide global high-speed satellite Internet to the world, and more specifically the people of China.  The objective is to emplace a constellation of satellites that would provide secure and uninhibited communications to undermine the Communist Chinese’s “Great Firewall;” a firewall tightly controlled by the Chinese to manage the information flow entering and leaving its borders.

VOA 2.0 would also be the vehicle to “broadcast” a truthful—much as advocated by Bill Gertz–an honest representation of US core interests and values with respect to China. This is not about deception or False-Flag Operations (FFO).  It will not create less-than truthful narratives, (Schultz, 2015), that would undermine the long-term desired outcome of ending Communist China.  Any deception operation if too quickly attempted would be seen by the average Chinese as propaganda and falsehood.  If the US employed it too slowly, the US efforts would appear both inconsistent and insincere.  This would not meet the desired outcomes sought.  Any effort must be couched in the truth, and avoid any hyperbole or partial truths.

Additionally, a US governmental body would also need to be established—a rebirth of Voice of America via the global Internet. Such an organization would exploit the VOA 2.0 medium and such Internet resources to include social media and open news sources from across the globe. “[Social Media] is a powerful tool with great potential for information warfare,” (Gertz, 2017); this method reflects Gertz’s own plan to make this a war of ideas.  The disruption to the Communist Chinese government’s ability to control the information flow to its citizenry would be revolutionary.  It would create an open environment that would potentially end Chinese communism similarly to the demise of the former Soviet Union.

Defeating US threats require a new approach to both past strategies and technologies; both will not require armed conflict.  They require the avid and thoughtful employment of SCP, through an active IO plan, that holistically dissuades Chinese government hackers, and also their military forces to discontinue any current or future kinetic or virtual attack.  VOA 2.0 would be that much needed and more expansive core technological solution that would be the major means to weaken China ideologically.


Defeating an Ideology

So how does the US fight the Chinese Communist ideology?  The US should recognize and declare to the world that the ideology of communism is a failed one (once again) in any form.  It is important to convey this information as was once done regarding a failed former Soviet Union.  It can express that failure using ideas transmitted across an open and free Internet.  That battle must be executed at the highest levels of US government to include the communications from the president to the Chinese people directly.

Furthermore, as Reagan designated the Soviet Union, the current Administration should also declare a new “Evil in Cyberspace:” China.   The direct confrontation on ideology is not just the identification of enemies but the actual and perceived threats to their preeminence.  “In short, the United States has to help defeat an ideology, not just a group of people,” (Gorka, 2014).


Voice of America 2.0 Conceptual Graphic

The Tactical Fight

“Social Media is key to interdiction,” (Gorka & Gorka, 2015).  Similar to how the previous rendition of VOA existed after World War II to espouse democratic ideas freely across unrestricted airwaves, VOA 2.0 will employ experts in Chinese language and culture to communicate with the Chinese people openly and freely across Facebook, Twitter, Instagram, etc.  This effort would require the employment of individuals that can express freely the truths and failings of the communist ideology.

The ideas of freedom in a restrictive regime will help shift the Chinese from a centralized and plutocratic government to a more preferable free and “democratic” society. While the Chinese Communist Party espouses equality for all, the VOA 2.0 solution would erode the bedrock of this regime.  The objective is to ultimately neutralize the government’s efforts to quash the exchange of information and ideas freely within China’s borders and among its people.

The like tactics as described by Dr. Gorka: “truthfulness and bringing others into the fight,” should be used to defeat the Chinese.  Using the same tenets of exploiting social media against ISIS, the US can do the same against the Chinese.  It will help accelerate the defeat of China at the tactical through strategic level by the employment of elements of US power.  This would comprise all facets of US power to include especially the power of information over a truly open Internet for the Chinese.


Conclusion

As Bill Gertz suggested, the US cannot quietly stand by as the Chinese steal US ideas, innovations and technologies.  It will require a “soft”offensive response through a coordinated message and access to unfettered information by the Chinese people. “Unless we punch back, we will continue to get hit,” (Gertz, 2017).

Destroying the Chinese “machine” in cyber space will require attacking them strategically, ideologically, and tactically.  Strategically, it will require the US with its allies to deploy global Internet access via the VOA 2.0 solution.  It will require an ideological assault on the failures of communism through an open dialog across an open and uncensored Internet.  Finally, it will require a tactical communications plan designating China as the premier cyber enemy; doing such will erode their power.  It may also result in its like end much like that demise of the former Soviet Union.

It will be through an active, and non-kinetic cyber actions that will defeat the Chinese ongoing cyber threat to the US and the world. The introduction of a disruptive technological solution, such as VOA 2.0, will provide the Chinese people access to information and knowledge about their repressive government.  It potentially will provide the impetus to topple Beijing courtesy of cyberspace.


References

Andrew, N., & Scobell, A. (2012). China’s Search for Security. New York: Columbia University Press.

Applegate, S., Carpenter, C., & West, D. (2017). Searching for Digital Hilltops: A Doctrinal Approach to Identifying Key Terrain in Cyberspace. Joint Force Quarterly | Issue 84 | 1st Qtr., 18-23.

Campbell, C., & Salidjanova, N. (2016, July 12). South China Sea Arbitration Ruling: What Happened and What’s Next? Retrieved from U.S.-China Economic and Security Review Commission: http://origin.www.uscc.gov/sites/default/files/Research/Issue%20Brief_South%20China%20Sea%20Arbitration%20Ruling%20What%20Happened%20and%20What’s%20Next071216.pdf

Collins, K. (2015, September 22). Chinese leader denies hacks, opens door for cybersecurity accord. Retrieved from C|NET: https://www.cnet.com/news/chinese-president-denies-hack-attacks-opens-door-for-cybersecurity-accord/

Gertz, B. (2017). iWar: War and Peace in the Information Age. New York: Simon and Schuster.

This is not just about China. It is a good overview of many of the current nation-state threats

Gorka, S. (2017, January 5). China the True Cyber Threat. (M. Bartiromo, Interviewer)

Gorka, S. L. (2014). Understanding the Enemy. Special Warfare, Apr-Jun | Volume 27 | Issue 2, 8-11.

Gorka, S. L. (2016). Defeating Jihad: The Winnable War. Washington, DC: Regnery Publishing.

What can we learn from counter-terrorism that we can apply to cyber?

Gorka, S. L., & Gorka, K. C. (2015, November). ISIS: The Threat to the United States. Retrieved from Threat Knowledge Group: http://threatknowledge.org/wp-content/uploads/2015/11/TKG-Report_The-ISIS-Threat.pdf

Houck, C. (2017, March 10). ISIS War Generals to Congress: We Need the State Department. Retrieved from GovExec: http://www.govexec.com/defense/2017/03/isis-war-generals-congress-we-need-state-department/136062/?oref=river

Hu, H. C. (1944). The Chinese Concepts of “Face”. Retrieved from Wiley Online Library: http://onlinelibrary.wiley.com/doi/10.1525/aa.1944.46.1.02a00040/pdf

Iasiello, E. (2012). Is Cyber Deterrence an Illusory Course of Action? Journal of Strategic Security (7:1) , 54-67.

Infosec Institute. (2013, October 11). Hardware attacks, backdoors and electronic component qualification. Retrieved from Infosec Institute: http://resources.infosecinstitute.com/hardware-attacks-backdoors-and-electronic-component-qualification/

Jaffe, G. (2017, February 20). For a Trump adviser, An Odyssey from the Fringes of Washington to the Center of Power. Retrieved from Washington Post: https://www.washingtonpost.com/world/national-security/for-a-trump-adviser-an-odyssey-from-the-fringes-of-washington-to-the-center-of-power/2017/02/20/0a326260-f2cb-11e6-b9c9-e83fce42fb61_story.html?utm_term=.ad57ccb7063b

Joint Chiefs of Staff. (2014, November 20). Joint Publication 3-13: Information Operations. Retrieved from Defense Techinal Information Center (DTIC): http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf

Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. New York: Simon and Schuster.

As you can tell, I love books.  This is a deeper book, and has not gotten the positive attention it is due.

Keys, R., Winstead, C., & Simmons, K. (2010, July 20). Cyberspace Security and Attribution. Retrieved from National Security Cyberspace Institute: http://www.nsci-va.org/WhitePapers/2010-07-20-Cybersecurity%20Attribution-Keys-Winstead-Simmons.pdf

Mandiant. (2013, February 18). APT1: Exposing One of China’s Cyber Espionage Units. Retrieved from Mandiant: http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

Schultz, R. W. (2015, October 1). Countering Extremist Groups in Cyberspace. Retrieved from National Defense University Press | Joint Forces Quarterly | 4th Qtr: http://ndupress.ndu.edu/Media/News/News-Article-View/Article/621124/jfq-79-countering-extremist-groups-in-cyberspace/

US House of Representatives. (2012, October 8). Investigative Report on the US National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE. Retrieved from https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/Huawei-ZTE%20Investigative%20Report%20(FINAL).pdf