12.07.2015 Views

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

dkrause on DSKHT7XVN1PROD with $$_JOB9• Continued improvements in <strong>China</strong>’s civil aviation capabilities,as first noted in the Commission’s 2010 Annual Report, enhanceChinese military aviation capabilities because of theclose integration of <strong>China</strong>’s commercial <strong>and</strong> military aviationsec<strong>to</strong>rs.• In an effort <strong>to</strong> calm regional fears, <strong>China</strong> attempts <strong>to</strong> broadcasta benign image of its growing military capabilities. Officialstatements from Beijing over the past year describe <strong>China</strong> asa status quo power <strong>and</strong> downplay its military modernizationefforts.• In <strong>2011</strong>, <strong>China</strong> continued a pattern of provocation in disputedareas of the South <strong>China</strong> Sea. <strong>China</strong>’s policy in the region appearsdriven by a desire <strong>to</strong> intimidate rather than cooperate.Many of <strong>China</strong>’s activities in the region may constitute violationsof the United Nations Convention on the Law of the Sea<strong>and</strong> the Declaration on the Conduct of Parties in the South<strong>China</strong> Sea. While <strong>China</strong> sometimes demonstrates a willingness<strong>to</strong> cooperate with other claimants <strong>to</strong> disputed waters in theSouth <strong>China</strong> Sea, it is unlikely that <strong>China</strong> will concede any ofits claims.• <strong>China</strong>’s government or military appeared <strong>to</strong> sponsor numerouscomputer network intrusions throughout <strong>2011</strong>. Additional evidencealso surfaced over the past year that the Chinese militaryengages in computer network attacks. These developmentsare consistent with the PLA’s known missions <strong>and</strong> organizationalfeatures, as noted by the Commission’s 2009 AnnualReport <strong>to</strong> Congress <strong>and</strong> contracted research study Capability ofthe People’s Republic of <strong>China</strong> <strong>to</strong> Conduct Cyber Warfare <strong>and</strong>Computer Network Exploitation.• <strong>China</strong>’s military strategy envisions the use of computer networkexploitation <strong>and</strong> attack against adversaries, including theUnited States. These efforts are likely <strong>to</strong> focus on operationalsystems, such as comm<strong>and</strong>, control, communications, computers,intelligence, surveillance, <strong>and</strong> reconnaissance assets.This could critically disrupt the U.S. military’s ability <strong>to</strong> deploy<strong>and</strong> operate during a military contingency. Chinese cyber attacksagainst strategic targets, such as critical infrastructure,are also possible.<strong>China</strong>’s ‘‘Area Control Military Strategy’’• The PLA’s military strategy is best described as an Area ControlStrategy. At its core, this strategy seeks <strong>to</strong> provide guidance<strong>to</strong> the PLA on how <strong>to</strong> defeat a technologically superior opponent.• In order <strong>to</strong> defeat a superior opponent, the Area Control Strategyemphasizes degrading an opponent’s technological advantages;striking first in a conflict; <strong>and</strong> establishing military controlover <strong>China</strong>’s periphery, especially the maritime region offof <strong>China</strong>’s eastern coast.VerDate Nov 24 2008 13:46 Nov 10, <strong>2011</strong> Jkt 067464 PO 00000 Frm 00021 Fmt 6633 Sfmt 6633 G:\GSDD\USCC\<strong>2011</strong>\067464.XXX 067464

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!