Reports
China鈥檚 Gambit for Total Information Dominance: A US-Australia Response
patrick-cronin
patrick-cronin
Asia-Pacific Security Chair
A visitor uses her phone at the Chinese Military Museum in Beijing. (Wang Zhao/AFP via Getty Images)
Caption
A visitor uses her phone at the Chinese Military Museum in Beijing. (Wang Zhao/AFP via Getty Images)

Full Report PDF

Key Points

* This report assesses China鈥檚 comprehensive approach to information power and its implications for the U.S.-Australia alliance. The purpose of the report is threefold: to enlarge alliance awareness of China鈥檚 whole-of-society information challenge; highlight critical responses to this challenge from Canberra and Washington; and deepen alliance thinking regarding strategy and policy.

* The scale and scope of China鈥檚 information enterprise distinguishes it from other countries. Overt persuasion campaigns and covert influence operations are thoroughly researched, carefully choreographed, and uninhibited by concerns over individual or sovereign rights. Beijing goes beyond the use of information and instead seeks to achieve primacy in discourse power by weaponizing narrative in ways analogous to asymmetric military strategies.

* China uses a distinctive whole-of-society approach to building a dazzling wealth of data and information. Aided by intellectual property theft, forced technology transfers, decades of education training abroad, and other forms of acquiring information, China鈥檚 industrial policy goes beyond protectionist measures like subsidies. When Military-Civil Fusion is considered, this development has far more than economic and technological ramifications.

Introduction

China鈥檚 reemergence as a major power is driving economic opportunities while simultaneously raising global security concerns. China is too important and its economy too large for it to be contained. However, blunting its more malign behavior should be a national security priority for the United States and key allies such as Australia. In particular, Beijing鈥檚 desire to achieve total information dominance in this area, catching up and overtaking the United States, should concern democratic Five Eyes intelligence-sharing allies and all others who wish to preserve their strategic autonomy. In the context of this study, total information dominance is defined as the ability of an actor to collect data and employ information and digital technology for political, economic, and military objectives with greater success than their rivals. Allowing China to gain information dominance could have far-reaching effects and pose new political, economic, and military risks. This report outlines the scope of China鈥檚 total information competition and proposes a starting point for an effective US-Australian response.

China鈥檚 national rejuvenation hinges on the power of information. Permeating every aspect of China鈥檚 total security strategy, information enables Beijing to harness all policy instruments short of war so as, ideally, to prevail without having to fight, but should fighting become necessary, to win. As it is essential for domestic political stability, the Chinese Communist Party (CCP) believes its survival depends on its having information, making its possession as not only an external priority. Driving foreign intelligence, diplomacy, and influence operations, information contributes to the creation of regional and global order鈥攁s well as international standards and institutions and thereby enables China to protect its interests and expand its clout. Since information undergirds economic strength, today鈥檚 economic competition hinges on advanced information and communications technology (ICT), artificial intelligence (AI), and quantum computing. Information-centric systems can also aid in securing a favorable military balance, since commercial technologies provide the basis for most military innovations. Amid an ongoing fourth industrial revolution, information plays an increasingly decisive role in prepping the battlefield, fielding superior military power, and, if necessary, winning a conflict in an informatized environment. But China鈥檚 dream centers less on winning war than owning the future.

Despite the importance of information power in the twenty-first century, this concept鈥檚 scope is large and difficult to grasp in its entirety. Moreover, studies in information power tend to concentrate on discrete issues rather than overall strategic implications, with analyses often balkanized into separate topics related to public diplomacy (influence operations), the Internet (cybersecurity), and military command and control (command, control, communications, computers, intelligence, surveillance, and reconnaissance or C4ISR). This report, which builds on earlier research, assesses China鈥檚 comprehensive approach to information power and this approach鈥檚 implications for the US-Australia alliance. Therefore, this report鈥檚 purposes are threefold:

1. Enlarge alliance awareness of China鈥檚 whole-of-society information challenge;
2. Highlight critical responses to this challenge from Canberra and Washington; and
3. Deepen alliance thinking regarding strategy and policy.

Because of the breadth of the impact on the alliance caused by China鈥檚 information power, this report underscores selected challenges and responses and is not encyclopedic. However, Australia and the United States would benefit from broad consideration of China鈥檚 growing information challenge and how the two allies can improve their ability to compete, be resilient, and defend against information-related threats.

At the outset, China鈥檚 goals and its capabilities do not necessarily match. Aspiring to total information dominance is not the same as achieving it. Beijing faces nearly insurmountable obstacles in seeking to accomplish all of its technological and policy ambitions. Many of China鈥檚 aspirations center on catching up with the United States, which, along with its allies, is not idle in this regard. Also, China鈥檚 focus on information reflects the CCP leadership鈥檚 extensive vulnerabilities, both real and perceived. Even if China achieves some of its goals of information dominance, that dominance does not necessarily translate into clear-cut victory. The information domain is vast and always contested, and there will always be a countervailing argument or lingering doubt about the actual 鈥渂alance of information power.鈥�

Notwithstanding these caveats, the threat from China鈥檚 pursuit of information dominance is palpable and mounting. As China swiftly emerges as an information superpower, consider the types of behavior that have been or are still underway:

* Use of cyber espionage and other means of intellectual property theft to close the technological gap with more advanced nations;

* Employment of a Military-Civil Fusion industrial policy designed to ensure that China鈥檚 national champion companies surpass foreign rivals in wealth and technological innovation;

* Buffeting Australia and other countries with caustic, 鈥渨olf warrior鈥� diplomacy to reinforce coercive economic pressure designed to bring about their acquiescence to Beijing鈥檚 policies;

* Mobilization of United Front Work Department organizations to silence unwanted criticism and policies from democratic societies;

* Hoovering big data and creation of the algorithmic means to influence opinions, interfere with decision-making, and build foreknowledge;

* Conducting global influence operations with Chinese narratives that depict China鈥檚 inexorable rise and America鈥檚 inevitable decline intended to divide democratic alliances and sap the political will to respond to China鈥檚 assertiveness; and

* In advance of a crisis, gaining access to information systems in ways that could embolden China鈥檚 policymakers and possibly pre-determine the outcome.

In short, even though China is 鈥渘ot hell-bent on world domination,鈥� its behavior of capturing greater information power at the expense of the United States and its allies is worrisome, as the PRC leverages information power to maximize its influence and control over an increasingly contested Indo-Pacific region. The stakes are high, and past responses have been insufficient to keep pace with China鈥檚 information technology and power juggernaut.

Examining the integrated components of China鈥檚 use of information power can aid in analyzing the challenge, and so this study dissects China鈥檚 use of information power into three broad categories: 1) diplomatic and political information; 2) economic and technological information; and 3) security and military. While connections across categories lead to some duplication, the binning of China鈥檚 actions into one or more of these groups highlights Beijing鈥檚 various interests and will help identify effective alliance responses. In addition, the recommendations provided in the final section of the report provide a specific agenda for the US-Australia alliance response.

Chapter 2 analyzes three related facets of China鈥檚 approach to diplomatic and political information鈥攑ersuasion, decentralized and covert influence operations, and discourse power. Chapter 3, which focuses on economic and technological elements of China's bid for information dominance, concentrates on Beijing鈥檚 industrial party-state policies such as Made in China 2025, Military-Civil Fusion, and Vision 2035. Chapter 4 considers China鈥檚 quest for security and military information through the prism of its total security paradigm, exploitation of gray zone competition below the threshold of traditional conflict, and system-versus-system warfare. Chapter 5 places an alliance response within the broader context of a democratic grand strategy comprised of collective strength, high-technology competitiveness, international leadership, offensive information operations, and collaborative innovation. Chapter 6 offers an alliance information agenda with thirteen actionable recommendations. As daunting as China鈥檚 gambit for information dominance is, there are numerous ways to overcome it.

Full Report PDF