- The Washington Times - Thursday, May 16, 2024

A version of this article appeared in the daily Threat Status newsletter from The Washington Times. Click here to receive Threat Status delivered directly to your inbox each weekday.

SEOUL, South Korea — Americans are at war but don’t realize it.

That was a key takeaway from a major security conference this week. Students of modern warfare noted that the current-generation, cross-domain conflict is, to borrow a phrase from Hollywood, “everything, everywhere, all at once.”

Adversarial states and non-state actors such as Islamic State and al Qaeda are deploying asymmetric assets that operate at low risk and low cost across real and virtual battlefields. Attendees at the annual Asan Plenum in Seoul heard that the U.S. and its allies have so far been unable to respond effectively to these assets.

While Western strategists promote the defense of the post-1945 “rules-based world order,” few, if any, rules or laws govern emerging domains such as cyberspace, outer space and “gray zone” tactics that stop short of shooting wars. A tradition-bound, high-cost U.S. military has not yet built effective tactical or sustainable technological counters to gray-zone tactics and low-tech, economical weapons, critics argue.

Conflict by computer

The advent of the internet, which straddles military, commercial and public spaces, is the central battleground for an invisible struggle. Big nations and big corporations are struggling to catch up.

“There are three kinds of companies,” said Lee Chung-min, an analyst with the Carnegie Foundation: “companies that have been hacked by China or North Korea, companies that have been hacked by China or North Korea and don’t know it, and companies that are going to be hacked by China and North Korea.”

National security networks are fortified with firewalls, but incompetence, malice and corruption offer infiltration routes to hostile players.

“Cybersecurity depends on everyone,” said Yang Uk of the Asan Institute, warning that PC and smartphone security is the responsibility of the individual. “The South Korean Ministry of National Defense has an intranet that is not connected to the internet, but it was hacked by North Korea.”

Analysts say the old ways of deterrence don’t always apply in modern conflicts and a giant defense budget doesn’t guarantee security.

“How do you compete in a constant competition/conflict continuum short of all-out war while ensuring deterrence is assured?” asked Diana Myers, a former fellow with the Rand Corp. “The things that keep me up are non-kinetic: the ability for malicious nations and non-aligned actors to challenge how we receive and process information.”

She rejected “Orwellian” solutions to this problem, such as policing speech and political content. “It puts us in a complicated situation,” she said.

Most are unaware of this stealthy conflict, but the seeds of mass destruction are built into the threat. Damage could be rapidly and massively escalated if a latent cyberwarfare intrusion, such as a sleeper agent, is fully activated.

“With cyber, you get inside a network and sit there and nobody knows you’re there,” said Peter Dean, director of foreign policy and defense at the United States Studies Center at the University of Sydney. “You won’t know until it escalates to a high level.”

Mr. Lee wondered about a response if a cyberattack were to strike a democracy’s nuclear power grid. Even if attackers are positively identified, a traditional military strike against the attackers would likely be unfeasible because of issues of legality and proportionality.

“What is a conventional military response — a proportional response — to a cyberattack?” asked Mr. Dean. “That is a question we don’t know the answer to.” He suggested that nation-states arm themselves with offensive cyberwarfare capabilities, allowing them to retaliate in kind.

“If you launch an offensive cyberattack, you risk a retaliation you do not know about,” Mr. Dean said. For that reason, counteroffensive cyberwarfare capabilities could act as deterrents.

From hot zone to gray zone

Even in more traditional domains such as sea power, creative tactics that play out below actual combat repeatedly outmaneuver the U.S. and its allies.

Michael Cunningham, an analyst at the Washington-based Heritage Foundation formerly based in China, described his “culture shock” upon returning to the U.S.

“The U.S. is hyperfocused on a traditional view of security, in particular numbers — how many warheads, how many ships, what percentage of GDP goes to security,” he told the conference.

Chinese forces are focusing on new technologies and avoiding direct military confrontations by “trying out small-scale, gray-zone tactics, constantly.”

These tactics are “not front and center among [U.S.] strategists,” said Mr. Cunningham, but “they cause you to constantly react. It takes a lot of money and manpower, and you are constantly on the defensive.”

He cited hostile disinformation campaigns designed to misinform voters and widen divisions in societies, the use of economic leverage, nonmilitary incursions into disputed territories or regions, and the use of proxies to carry out attacks. Such tactics are “very hard to confront,” he said.

Western or pro-Western forces proved they could compete in the new domains. The 2022 sabotaging of Russia’s Nord Stream energy pipeline to Europe undercut the Kremlin’s economic leverage, although the saboteurs remain unidentified.

China is thought to have been behind the 2023 cutting of undersea fiber-optic cables carrying internet services to Matsu, a Taiwanese-controlled island off China’s coast.

In both cases, the restraint and lack of fingerprints served the attacker well. “If you respond militarily, you are the one who started the war, and that goes down in history,” Mr. Cunningham said.

“We need developed rules and laws,” he said. “We have hard rules for traditional warfare, like what are war crimes, but we don’t have that for the gray zone.”

The consequences of failing to adjust to the new tactics can be just as effective as traditional military action.

China is building massive bases across disputed chunks of the South China Sea, inching forces closer to Taiwan and India, and using coast guards and fishing fleets to press territorial claims against Japan, the Philippines and Vietnam.

“The thinking in China is basically, ‘Use whatever means necessary that are safe, smart and risk-averse,’” Mr. Cunningham said. “They know if they get into a conflict with almost anyone in Asia, it will be a U.S. ally, and that makes it super-risky. But they see very little downside in these gray-zone tactics.”

Mr. Yang said China has crossed so many red lines that the Indo-Pacific is now a virtual “red carpet.”

Low cost, low tech

Emerging technologies present another challenge for those clinging to traditional military ideas.

“We are entering the first phase of ‘Iron Man’ wars or ‘Star Wars,’” said Mr. Lee, referring to armored “exoskeletons” and personal jet-propulsion units, and the space domain, which is proving vital for intelligence, surveillance and reconnaissance missions.

Many military technologies are low-tech, affordable systems that enable the weak to level the playing field with the strong. Improvised explosive devices (IEDs) proved deadly to expensive Western militaries fighting terrorist forces in Iraq and elsewhere. Ukraine has used drones to cripple Moscow’s Black Sea Fleet, devastate its armored forces and bypass air defenses to strike targets deep inside Russia.

In the Red Sea and across the Indo-Pacific region, U.S. forces face adversaries armed with equipment that is economical to build and tactics that minimize the risk of a major loss.

In Yemen, the use of low-cost drones and missiles by Houthi rebel fighters has forced Western navies to respond with high-cost missiles. Meanwhile, the Houthis’ dug-in positions have proven hard to hit with counterstrikes.

While Western naval “goalkeepers” continue to shoot down drones and missiles, the denial of the Suez Canal and the Red Sea to many international shippers is generating massive costs.

Likewise, repeatedly having to scramble advanced fighter jets to shoot down cheap Chinese “weather balloons” on suspected surveillance missions is not economically viable in the long run.

Mr. Dean said some arms in the pipeline, including sophisticated lasers and microwave weapons, may help restore the balance.

“We have yet to come up with a response. We have to use technology to solve some of these issues,” he said.

• Andrew Salmon can be reached at asalmon@washingtontimes.com.

Copyright © 2024 The Washington Times, LLC. Click here for reprint permission.

Please read our comment policy before commenting.

Click to Read More and View Comments

Click to Hide