Considering the Chinese Air Force's Best Response

RAND released a report on the Chinese People's Liberation Army (PLA) asserting that "the main driver for Chinese military aerospace power development is the PLA's view that it needs to be prepared to deter and, if necessary, defeat the United States in a high-end clash." And, it states that the Chinese Air Force is closely following U.S. Air Force capabilities and copying or innovating in areas necessary to accomplish its objectives.

The author recommends that the U.S. Air Force should respond by monitoring advancements in Chinese military aerospace capability so it can exploit weaknesses and avoid further capability transfers. These are reasonable suggestions, but the U.S. should also consider how its own behavior may be encouraging Chinese military development.

If the Chinese are truly focused on developing their capability to compete with the U.S., it may be possible to reduce the impetus for additional Chinese military build-up by decreasing the negative rhetoric and providing less overt demonstrations of U.S. capability. The Chinese are responding to U.S. efforts to maintain Command of the Commons. In turn, the U.S. observes the increase in Chinese military capability and responds with additional investment that the Chinese then copy. We find ourselves in a tit for tat scenario of escalating responses. So, rather than overtly label China as a military threat which encourages further Chinese military modernization, the U.S. could preserve the effectiveness of its current capabilities by considering the best response of those concerned with U.S. military advantages. This is especially important at a time when the U.S. is already facing significant national security challenges.

"If you find yourself in a hole, stop digging."
—Will Rogers

Developing Cyber Deterrence

The premise of nuclear deterrence is based on Mutually Assured Destruction (MAD). In hindsight, this success of this framework seems apparent and is widely taken for granted. But, at the time of its creation, a great deal of effort went into its formulation, and many debated its effectiveness.

With the advent of new destructive capabilities comes the need for additional means of deterrence. And, as the world economy has come to depend on cyberspace, the need to deter nefarious actors from attacking in cyberspace is paramount. Furthermore, much (if not most) of the other forms of deterrence is reliant on cyberspace operations.

Game theoretic principles form the basis of MAD. But, many of these principles do not hold in cyber deterrence. In the spirit of game theory, let’s examine MAD using backward induction.

  1. Destruction: To deter, each player needs a strategy that includes the capability to Destroy the other. While it is clear that cyber attacks can be quite destructive, the extent to which these attacks harm others varies. Additionally, cyber attacks need not be indiscriminate.
  2. Assured: For the optimal strategy to be Not Destroy, it is necessary for each actor to:
    a) know that it has the ability to Destroy, and
    b) know that the other player has the ability to Destroy
    For this reason, much of the nuclear testing which led up to the MAD strategy was conducted openly so that each knew the other’s capability to Destroy. This alone is not sufficient. For sufficiency, each player must also be willing to Destroy. Willingness makes the strategy of Destroy credible. Both the necessary and sufficient conditions are difficult to meet in regards to cyber. Revealing cyber capability renders that capability moot in most circumstances. Once an exploit is known, the other player will update their systems to preclude its use. Hence, players’ strategies to date have been to signal capability without specificity. More concerning is the inability to meet the sufficiency condition. The key concern is attribution. In nuclear deterrence, the players are known and monitoring is in place to detect actions. But, in cyber, attribution is difficult (if not impossible) and not timely. Without attribution, a player under attack may not respond in kind (or in proportion).
  3. Mutual: The failings in this area are a result of the conditions above. Players are both known and unknown; willingness and ability are unclear; and destructive outcomes are not guaranteed. This makes it difficult to reach an equilibrium where no player is willing to employ the Destroy strategy.

Just as the rise of nuclear capability led to advancements in game theoretic thinking underpinning the MAD strategy, growing cyber threats will drive strategic thinkers to develop new frameworks for deterrence under these new dynamics.

Necessary and Sufficient Conditions

The Command of the Air
By Giulio Douhet

Giulio Douhet is an advocate of both airpower and the scientific approach to warfare. In The Command of Air he claims that "to assure an adequate national defense, it is necessary -- and sufficient -- to be in a position in case of war to conquer the command of the air."

I find this terminology interesting. Economists are well-versed in necessary and sufficient conditions in the development of theoretical mathematical models.

While I agree with Douhet that it is necessary for nations to have air superiority to provide national defense, I'm not convinced that air superiority is sufficient.

Is command of the air, or air superiority, both necessary and sufficient for national defense? If not, what is required for sufficiency?


Disclosure of Material Connection: Some of the links in the post above are “affiliate links.” This means if you click on the link and purchase the item, I will receive an affiliate commission. Regardless, I only recommend products or services I use personally and believe will add value to my readers. I am disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising.”