War by Other Means

How cyberattacks can stymie the US efforts to defend Taiwan against Chinese aggression. An extract

To illustrate how a cyberattack may implicate larger warfighting issues, consider a scenario that starts by Taiwan moving toward independence. China decides it is time to take the island but concedes that the United States will intervene on Taiwan’s side—so it tries to complicate and hence delay the transit of U.S forces over the Pacific. It hopes that by the time the United States does arrive, the war will be over, or at least the Chinese will have a secure lodgment on the island. To do this, the Chinese carry out a full-fledged operational cyberattack on U.S military information systems with the hopes of turning the data they contain into gibberish. Even before 2000, James Mulvenon, an authority on Chinese cyberwar, argued that the Chinese might corrupt the time-phased force deployment data accessible through DoD’s unclassified Internet.

To the extent that the United States might use force—which the Chinese, in this scenario, already assume is inevitable—a cyberattack on such a force (before it has started to fight) is an understandable use of military power. Because it is entirely possible that such a cyberattack never hits the news (at least not until after the lessons-learned analyses take place), it would not automatically evoke a narrative of attack and defense (as an opening Chinese attack on U.S critical infrastructure might). The workings of U.S military logistics may not be secret, but they are often esoteric. If such a cyberattack were to take place after Chinese forces had begun irrevocable moves toward Taiwan, and if the fact of U.S intervention was already determined, then the U.S. military would have little choice but to work around the disruption or corruption of its databases.

To make matters more complex, imagine further that the Chinese are holding back on using kinetic force while waiting to see how badly U.S forces have been delayed by the cyberattack. The Chinese may be looking for indications that are visible, but they may also be collecting from listening posts already emplaced within unclassified DoD networks. If these indicators reveal that the hoped-for effect has taken place, then the PLA may conclude that it has achie

Subscribe To Force

Fuel Fearless Journalism with Your Yearly Subscription

SUBSCRIBE NOW

We don’t tell you how to do your job…
But we put the environment in which you do your job in perspective, so that when you step out you do so with the complete picture.