STRATEGIC TRENDS 2019 - Key Developments in Global Affairs - CSS
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Center for Security Studies STRATEGIC TRENDS 2019 Key Developments in Global Affairs Editors: Jack Thompson, Oliver Thränert Series Editor: Andreas Wenger Authors: Michael Haas, Jeronim Perović, Jack Thompson, Lisa Watanabe CSS ETH Zurich
STRATEGIC TRENDS 2019 is also electronically available at: www.css.ethz.ch/publications/strategic-trends Editors STRATEGIC TRENDS 2019: Jack Thompson, Oliver Thränert Series Editor STRATEGIC TRENDS: Andreas Wenger Contact: Center for Security Studies ETH Zurich Haldeneggsteig 4, IFW CH-8092 Zurich Switzerland This publication covers events up to 1 March 2019. © 2019, Center for Security Studies, ETH Zurich Images © by Reuters ISSN 1664-0667 ISBN 978-3-905696-66-0
CHAPTER 2 The Eclipse of Western Military-Technological Superiority Michael Haas Ever since they grasped the promise of the information revolution in the late 1970s, the United States and its allies have enjoyed a sizeable military-tech- nological advantage over any plausible adversary. Now, as new technologies enter the limelight and competitors become more adept at appropriating or offsetting Western strengths, this qualitative superiority in armaments is eroding. With the underlying trends gathering steam and policy interven- tions already falling short, Western armed forces will increasingly face a choice of confronting revisionist challengers on even terms – or not at all. A US Air Force F-22 Raptor fighter jet performs ahead of the International Air and Space Fair at Santiago International Airport, March 28, 2016. Ivan Alvarado / Reuters 27
ST RAT EG I C T R EN DS 2 0 1 9 Even though they may sometimes ap- that resulted from late Cold War pear to operate in a world unto itself, defense programs have facilitated a military organizations tend to reflect US-centric distribution of power, important properties of the societies buttressed existing alliances, and en- that build and sustain them. Hence, abled wars of choice. They have also it should not come as a surprise that set a standard of military moderniza- Western approaches to conventional tion to which other countries aspire deterrence and military conflict, as – and spurred counter-innovation they have evolved in the late 20th and among those who feared that they early 21st centuries, have taken a pro- might find themselves at the receiving foundly techno-centric turn. While end of Western interventionism. the search for engineering solutions to national security problems appears to In both regards, Operation Desert be a persistent feature of the US cul- Storm – the eviction of Iraqi forces tural setting, in particular, other liber- from Kuwait – constituted a water- al democracies have exhibited a similar shed event. When President George tendency.1 In parallel with a deep-seat- H.W. Bush declared the end of ma- ed belief in the transformative power jor combat operations against Iraq on of technology in the civilian sphere, February 27, 1991, it became evident the recourse to high-tech solutions that US and allied forces had crushed across a broad spectrum of military one of the world’s largest armies at problem sets has become an essential astonishingly low cost to themselves. feature of force development and de- To other military powers, especially fense procurement in Western-style those organized according to Soviet armed forces. or other non-Western principles, the Gulf War appeared to serve notice of The considerable success the West a new era in military affairs, in which has enjoyed in establishing and – for Western force projection would be a time – upholding this paradigm of extremely difficult to resist by any military-technological pre-eminence means currently available to them, has had important consequences for short of nuclear weapons. the international order. During the 1980s, the financial impact of the in- The West’s adoption of a paradigm of tensifying competition in advanced guided weapons, signature-reduced conventional forces arguably hastened platforms like stealth aircraft, so- the fall of the Soviet Union. In the de- phisticated intelligence, surveillance cades since, the Western capabilities and reconnaissance (ISR) assets and 28
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY pervasive battlefield networking was, set in motion during the 1980s and as yet, in its early stages. But the mili- 1990s continue to bolster the capa- tary foundations of the United States’ bilities of Western-style armed forces, preeminent position in the interna- the so-called guided weapons revolu- tional system seemed assured for de- tion has entered the stage of global cades to come. While the promise of diffusion. And while some of the a more collaborative, US-led world greatest triumphs of late-Cold War order that the Gulf War coalition had engineering – such as long-range, appeared to foreshadow soon proved very-high-precision cruise missiles or illusory, the reality of Western mili- stealth aircraft – remain inaccessible tary superiority was inescapable. Ac- to all but the wealthiest and most cording to a 2011 Rand study, the technologically advanced countries, Chinese People’s Liberation Army they are no longer the exclusive do- (PLA) was particularly impressed by main of the United States and its what it had witnessed: “The 1991 closest allies. Persian Gulf War sent shockwaves throughout China’s military commu- Although this would in itself con- nity and accelerated the PLA’s mod- stitute a significant development, ernization and shifts in strategy. The it is the underlying shift in the pat- United States’ overwhelming dom- terns of innovation that should give inance in that conflict led Chinese pause to Western decision-makers. military leaders to push for advanced Whereas the late-Cold War advances military technologies.”2 The armed in military technology were critically forces of the newly formed Russian dependent on government-funded Federation also took notice, although research and development (R&D) to their ability to react was curtailed by a come to fruition, ongoing innovation chronic lack of resources. processes in fields such as biotech- nology, nanotechnology, quantum Almost three decades later, the so- computing, robotics, artificial intel- called Revolution in Military Affairs ligence (AI), augmented reality, and (RMA) touted by American theorists additive manufacturing are far more during the 1990s is following the fa- reliant on open knowledge econo- miliar trajectory of earlier spells of mies populated by private actors. military-technological innovation, in Because this knowledge ecosystem is that it has produced advantages of far more transparent and accessible limited extent and durability.3 While by design, the challengers of Western many of the innovation processes military preeminence find themselves 29
ST RAT EG I C T R EN DS 2 0 1 9 operating in an environment from another watershed will be reached which cutting-edge technologies can in the 2020s, with long-term impli- be extracted with relative ease. Foreign cations not just for Western military acquisitions, joint ventures, multina- policies and force development prior- tional research programs, and interna- ities, but for the international order tional student exchanges are all part of at large. In the following we will look the same toolbox in this regard, as are into the root causes of this dynamic, industrial espionage and other forms assess Western policy initiatives de- of intellectual property theft. signed to offset it, and consider the way forward. As a result, the odds that non-Western actors will not only catch up, but ac- The Crumbling Foundations of tually pull ahead of the United States Western Advantage and its allies in some areas of technol- To understand why the military su- ogy development are set to increase periority of Western democracies can dramatically. As a result of its striking no longer be taken for granted, as it economic growth over the last 20 – 30 long had been after 1991, one must years, this is true of the People’s Re- ultimately look beyond the field of public of China (PRC) in particular. defense innovation and reckon with Given that the Western advantage in two economic megatrends that are military forces is itself derived from a altering the underlying parameters limited portfolio of key technologies, of military technology development. the formation of pockets of Chinese The first has been the rapid growth advantage would amount to an im- of many non-Western economies, portant break with a pattern of incre- and the spectacular expansion of the mental progress in military technolo- Chinese economy in particular. The gy development that has marked the second concerns the ways in which past two to three decades. At the same new technologies are developed and time, the ability of other actors to shared within a globalized economic cancel out existing Western strengths environment. by combining less advanced technol- ogies and asymmetric doctrines has The rise of the non-Western econo- also increased, and this is a function mies constitutes, without a doubt, of raw economic power to a much the most consequential global trans- lesser extent. While advantages in formation of the early 21st century. military technology have never been In 1991, China’s share of the world static, it seems increasingly likely that economy was 4 percent. The United 30
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY States’ share was 21 percent. Today, observe significant knock-on effects China’s illiberal capitalist model ac- in the military sphere. Although the counts for close to 19 percent of the mechanisms that underpin this ex- global economy, whereas the US share pectation are complex, advances in has dropped to 15 percent – a trend military technology primarily depend which looks set to continue. Equally on two factors: A state’s capacity to impressively, the advanced economies extract financial resources from the of 1991 – most of them Western-style domestic economy and funnel them liberal democracies – collectively ac- into military modernization, and its counted for 63 percent of the gross competency in harnessing new tech- world product, while developing na- nologies through indigenous R&D or tions created the remaining 37 per- by acquiring them from abroad, and cent. Five years from now, according fielding them in a timely manner. to projections from the International Monetary Fund (IMF), these propor- The second overarching trend that tions will likewise have been reversed. is contributing to the relative mili- tary decline of the West is a radical While the relationship between eco- shift in the patterns of technological nomic potential and military capabil- innovation itself, which is likely to ity is not straightforward, they have further undermine existing relative usually been strongly correlated in advantages in the medium- to long- the long term. As Paul M. Kennedy term. During the 1970s, when the famously argued, “economic prosper- technological foundations of the so- ity does not always and immediately called Revolution in Military Affairs translate into military effectiveness, took form, cutting-edge R&D was for that depends on many other fac- preponderantly state-funded and ter- tors, from geography and national ritorially confined. More than half of morale to generalship and tactical all R&D funding in the United States competence. Nevertheless, the fact typically came out of the federal bud- remains that all of the major shifts get, and no less than 50 percent of ev- in the world’s military-power bal- ery federal R&D dollar went directly ances have followed alterations in into defense projects. As of 2018, the the productive balances.”4 Given the US federal government accounts for profound reversal of the global eco- less than a quarter of national R&D nomic balance of power that has been funding, and civilian applications underway for the last thirty years, it have overtaken defense projects in the would not be surprising to eventually public spending category.5 31
ST RAT EG I C T R EN DS 2 0 1 9 Over the last decade, the trend to- Gross Domestic Expenditure on R&D wards private funding has only be- In constant 2005 billion USD (PPP) come more distinct. In the United 400 USA States, the overall financial intensity China of R&D as a percentage of the GDP 300 has remained about the same, at ap- proximately 2.6 percent, but the share 200 of public funding has declined from 1.2 to 0.7 percent.6 In other words, 100 even though military R&D spending remains a well-funded aspect of the 0 US defense effort, the likelihood that 00 05 10 15 a cutting-edge technology will be de- 20 20 20 20 veloped using private rather than pub- Source: UN Educational, Scientific and Cultural Organization lic money – and, therefore, privately owned – is now much higher than it was forty years ago. Given that the US centered on manufacturing sites and federal tax base will be strained by es- service providers in China or other calating health care and other entitle- emerging economies. In many cases, ment costs, this downward trend is set these dependencies have resulted in to continue or even accelerate in the the transfer of proprietary knowledge 2020s. Predictably, similar patterns are as well as significant know-how, be it already asserting themselves in other surreptitiously or by design. During Western democracies. that same period, Chinese foreign direct investment (FDI), in the form At the same time, the private technol- of acquisitions of US companies or ogy companies that have taken on the assets, has increased from less than mantle of primary R&D funders have 50 million USD per year to a record become key players in a global eco- 44.2 billion in 2016 alone. While the nomic model that is based on open ex- largest influx of Chinese FDI has been change and non-discriminatory treat- into the real estate sector, investments ment. As part of deliberate offshoring in information and communications and outsourcing strategies pursued technology have come second.7 over the last three decades, many of these same companies have become Aside from economic activities, nar- dependent on complex and highly rowly defined, the transfer of spe- specialized global supply chains, often cialized knowledge from advanced, 32
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY Western-style economies to emerging academics and businessmen. These countries has been further accelerated intrusions have frequently been aid- by other forms of legitimate interna- ed by a naïve approach to informa- tional exchange, especially in tertiary tion security on the part of Western education and the applied sciences. entities, and a corresponding lack of While the net impact of the steady stringent precautionary measures, rise in the number of foreign students even among military organizations and researchers is difficult to quantify, and defense contractors.8 Although there is no doubt that government-run a small number of high-profile hacks initiatives such as China’s Thousand and human intelligence activities have Talents Plan have been designed to si- received most of the public attention, phon off high-value research findings the impact of economic espionage from abroad. Even without such care- goes far beyond these high-profile in- fully orchestrated activities, however, cidents. The boundaries between such the repatriation of Western-trained state-sanctioned theft and various scientists and engineers at the rate of non-state criminal undertakings are tens of thousands per year constitutes often fluid, and likely to remain so. one of the most impressive instances of global knowledge transfer ever un- These factors are rendering the idea dertaken. Because most cutting-edge of tightly controlled – let alone exclu- technologies are now ostensibly com- sive – government ownership of cut- mercial in nature, state tools such as ting-edge technologies obsolete and classification and export control are enabling far broader access to the bas- often inapplicable and the recourse es of future military innovation. By to effective restrictions difficult to the same token, they are contributing legitimize. to the emergence of potent indige- nous innovation hubs in a number of Lastly, Western government bureau- emerging economies, among which cracies, private companies, universi- China has profited the most. Even ties, and other entities are being sub- though other actors – India, Malaysia, jected to a panoply of intelligence and Indonesia, the Philippines, Thailand, criminal activities. This includes mas- Vietnam, and Brazil, to name a few sive cyber incursions as well as other – have also made significant gains, technical collection efforts, along with Beijing’s efficacious exploitation of more traditional approaches to indus- the open technology ecosystem’s op- trial espionage using trained agents or portunities and vulnerabilities is in a “non-traditional collectors,” such as category of its own. 33
ST RAT EG I C T R EN DS 2 0 1 9 International Students at US Universities 1,000,000 African European 800,000 Middle Eastern Other Americas Other Asian 600,000 Indian Chinese 400,000 200,000 0 20 /00 20 /01 20 /02 20 /03 20 /04 20 /05 20 /06 20 /07 20 /08 8 20 /09 20 /10 20 /11 20 /12 20 /13 20 /14 20 /15 20 /16 20 /17 /1 99 00 01 02 03 04 05 06 07 17 08 09 10 11 12 13 14 15 16 19 Source: Institute of International Education While concerns about relative gains The Limits of Policy have long been muted in the com- Interventionism mercial sphere and the efficiency of The trends sketched out above are the globalized model of technology structural and long-term in nature. development and high-tech manufac- If this were not the case, a solution turing remains widely accepted, West- to the problem of relative military ern democracies are being reminded decline might entail a selective accel- that the same set of principles may eration of Western technological ad- not be equally applicable to matters vances in the defense sector, without of national security. From the perspec- impinging on the civilian economy. tive of the long-term defense planner, This would mean that the attempts of the triumph of open, networked sup- strategic rivals to nullify or leapfrog ply chains and the prevalence of pri- current advantages would be rendered vate-sector R&D in promising fields ineffectual simply by outperforming such as artificial intelligence, biotech them in the defense segment, without or quantum computing take on a causing any undue collateral damage. different complexion. Unfortunately, Regrettably, such a straightforward the resulting dilemmas are not easily solution is not in the cards. To under- resolved. stand why, we must first explore the 34
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY relationship between commercial and internal components of the aircraft, is military technology development in a version of Apple’s civilian FireWire somewhat greater detail. standard. While contributions to the current de- What is of interest here, though, is bate sometimes seem to suggest other- not that the basic technologies un- wise, the dependence on commercial derpinning the F-22’s advanced data technology in defense innovation is processing were commercial in na- not a new phenomenon, although its ture. Rather, it is the extreme lengths full scale and consequences are only to which the prime contractor and now becoming apparent. In fact, ad- various subcontractors had to go to vanced weapon systems of the current fully embed these technologies and generation – generally fielded during make them suitable for combat-crit- the late 1990s and 2000s – have long ical military use.9 While it is tempt- relied on commercial products in key ing to assume that these intricate and areas. The backbone of the US advan- time-consuming requirements will tage in air-to-air warfare, the F-22A apply to a lesser extent to current Raptor air superiority fighter, is a case commercially-driven technologies in in point. The heart of the F-22’s ad- fields like computer vision and ma- vanced combat capabilities – its com- chine learning, the opposite is bound puting architecture – was originally to be true: as the level of complexity based on a microprocessor developed of embedded commercial technol- in the early 1980s and never released to ogies continues to rise, the need for the civilian market: the Intel i960MX. extensive adaptation, systems integra- However, this changed after the air- tion, and testing will further increase. craft became operational in the early Because the systems architectures of 2000s, with an upgrade of the entire advanced military platforms are at the architecture to the PowerPC standard. heart of their cutting-edge capabili- Launched by Apple, IBM, and Mo- ties, this work will be highly classified torola in the early 1990s, this was a and performed by specialized defense commercial technology, intended not contractors, as it has been in the past. for military use, but for the growing In other words, there is every reason personal computer market. PowerPC to believe that leading tech firms will microprocessors were used in iMacs continue to provide the technology and iBooks until 2006. Similarly, the base and the defense industry will F-22’s high-speed serial bus, which continue to provide the capabili- transfers data between the various ty. Whereas the former will spread 35
ST RAT EG I C T R EN DS 2 0 1 9 around the globe with ease, develop- bases may both be inefficient, but ment of the higher tiers of future com- Beijing’s tight grip on providers of bat systems will still require the costly strategic goods and services within a services of capable systems integrators framework of “civil-military fusion”10 and other specialized contractors that means that inefficiencies barely matter are available only to a select few in the once political priorities get in the way international system. of market mechanisms. Skyrocketing cost, in other words, may not function Although this may sound like good as an effective restraint on a system like news, it raises serious questions for China’s. Overall, state capitalism may the West’s attempt to prolong its mil- not be better at fostering innovation itary superiority. Even though many but it would appear to be more ef- Western observers assume that liberal fective at distorting specific segments democracies will continue to outper- of the economy in line with current form any strategic rival where the in- strategic priorities. While the net eco- tegration of commercial and military nomic impact of such distortions may technologies is concerned, this is not well be negative, in the context of this inevitable. Given that their econom- discussion, it is beside the point. ic model is based on free enterprise, limited state interference and the rule This should lead us to rethink West- of law, the ability of the Western de- ern policy interventions designed to mocracies to co-opt or coerce private arrest the ongoing slide in military corporations headquartered on their capability. The most obvious exam- territory to do their strategic bidding ple of such an initiative is the Penta- generally comes in the form of stan- gon’s so-called Third Offset Strategy. dard financial incentives. The same is Launched in 2014 by then-Secretary mostly true of their relationship with of Defense Chuck Hagel, it was de- major defense contractors. scribed as a “department-wide effort to identify and invest in innovative Unfortunately, this does not necessar- ways to sustain and advance America’s ily apply to rivals that may be able to military dominance for the 21st cen- combine the advantages of the market tury.”11 Modeled on two Cold War- in fostering innovation and allocating era offset strategies, which sought to resources with state interference to balance the numerical superiority of further a particular conception of the the Warsaw Pact, first with a broad national interest. Hence, the US and variety of nuclear weapons and later Chinese defense-relevant industrial with guided munitions, long-range 36
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY sensors and battle networks, this was able to mobilize, the ability of the US primarily intended to address growing defense bureaucracy to shape techno- US-China competition in the Western logical innovation in the commercial Pacific. sector appears limited. The controver- sy surrounding Google’s participation In 2015, the architect of the Third in the now infamous Project Maven – Offset, Deputy Secretary of Defense a machine learning initiative that was Robert O. Work, set out a number of publically linked to the United States’ technological priorities clustered in targeted killing programs – illustrates the fields of artificial intelligence, ma- the point.13 chine autonomy, learning systems, and human-machine interfacing. These Hence, those who had placed their were expected to play a central role, hopes in the technological deus ex especially during the first phase of the machina of a Third Offset have largely initiative. To gain direct access to the fallen silent. As Robert Work noted, commercial actors at the forefront of there is reason to believe that it is, in this anticipated revolution, the De- fact, still the United States that is be- partment of Defense set up a Defense ing offset in the Western Pacific.14 To Innovation Unit Experimental (DIUx) the extent that similar techno-centric in Silicon Valley. As of 2016, the De- efforts are under way in other Western partment expected to spend only 18 nations, their chances of success in- billion USD on Third Offset priorities spire even lower levels of confidence. over a five-year time frame. There is a chance, of course, that the Third Offset may be revitalized or As some observers have since noted, that more circumscribed initiatives the strategy appears to have shed its will succeed. primarily techno-centric approach in favor of nearer-term operational con- That said, the underlying issue may cerns, in accordance with the broader be more fundamental in nature than defense priorities of the Trump ad- many observers – in particular in the ministration.12 While it is not yet clear Euro-Atlantic sphere – acknowledge. in which direction the next Secretary Western-style market economies may of Defense will take the United States’ be capable of unsurpassed efficiency defense innovation efforts, four years in creating the conditions for rapid into the initiative its bureaucratic mo- commercial innovation. But when it mentum appears to have stalled. Given comes to mobilizing the commercial the limited resources it has so far been sector to advance the state’s strategic 37
ST RAT EG I C T R EN DS 2 0 1 9 priorities, the dirigiste measures avail- undergird a determined territorial able within the state capitalist frame- defense. This has included air-to-air work may prove more effective from missiles (AAMs) and surface-to-air the standpoint of medium-term ad- missiles (SAMs), but also convention- vances in military technology. ally armed ballistic and cruise missiles designed for attacks against enemy air The Future of the Military Balance bases, ports of entry, and command How will these trends impact the mil- and control facilities. itary correlation of forces and shape major combat operations? In this re- Though Russia has long been held gard, two aspects deserve particular at- back by its weak economy, late-Soviet tention: The first is the growing ability and Russian technology has played a of actors like China, Russia, and India key role in offsetting the Western ad- to press for parity in some established vantage in the air and at sea. Long- areas of Western advantage, such as air range, “double-digit” SAMs like the and missile power. The second con- SA-10 Grumble (S-300P) and SA-20 cerns the question of whether – and Gargoyle (S-300 PMU-1/2) form the to what extent – longer-term trends in backbone of the air defenses of many technology development can be offset non-Western military powers. The by effective force employment and su- newer SA-21 Growler (S-400) com- perior fighting skill. plex is now also being offered up for export. Similarly, Russian technol- The technological advantage of West- ogy has played a significant role in ern military forces has long been re- non-Western AAM development, in- flected in operational, if not always cluding the new Chinese PL-10 and in strategic, outcomes. As we have PL-15 missiles.15 Meanwhile, Russian seen, the Persian Gulf War was a cooperation with India has resulted landmark event in this regard. Nota- in the high-supersonic Brahmos an- ble operational successes have forced ti-ship missile and similar collabora- non-Western actors to come to terms tive armaments programs may enable with the realities of Western military the move towards hypersonic muni- dominance and to seek long-term tions in the coming decade.16 options to offset it that go beyond cheap, asymmetric fixes. One option Meanwhile, in the field of conven- has been to aim for an advantage or tionally armed ballistic missiles, for rough parity in at least some cat- China has made the most impressive egories of guided munitions that can advances. The PLA now fields a large 38
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY and diversified arsenal for potential the PLA’s capability level has evolved use against Taiwan as well against in line with the 750 percent increase US and allied air fields in the region. in its defense budget. According While many of these developments to one study, the US would still be have been discussed under the mon- able to wrest air superiority from the iker of anti-access/area denial (A2/ PLA Air Force, but as early as 2010 AD), China’s focus, in the event of a the forces required to do so had in- conflict, appears to have shifted from creased tenfold and the vulnerability raising the cost of any US intervention of US bases in the region had grown to defeating it outright.17 China also exponentially. By 2017, according to appears to have pulled ahead of Russia one RAND study, “continuous im- in stealth and counter-stealth technol- provements to Chinese air capabilities ogies. While the problems China has [made] it increasingly difficult for the encountered in pursuing these capa- United States to achieve air superior- bilities have long been touted as a sign ity within a politically and operation- of its inability to catch up, the innova- ally effective time frame, especially in tion dynamics of the past should not a scenario close to the Chinese main- be automatically extrapolated into the land. These developments also raise future. The recent advances the China the probable cost of a war in terms Electronics Technology Group Corpo- of lives and equipment.”19 Given that ration claims to have made in the field the PLA could achieve this shift while of quantum radar, which would ren- still relying on limited technological der current approaches in low-observ- means, most of which belonged to able aircraft design largely ineffectual, the era of the highly successful Sec- should serve as a wake-up call in this ond Offset Strategy, there is little regard.18 doubt that the relative standing of the United States in such a scenario will To get a sense of the past dynamic of continue to deteriorate. military capability development, the “pacing” Taiwan scenario continues to In this regard, it is useful to con- offer an excellent benchmark for the sider the United States’ reliance on growth of China’s regional military stealthy aircraft like the F-22 and the power. The shifting tone of Western semi-stealthy F-35, which is believed analyses of such a conflict over the past to have been compromised by PLA three decades is instructive. While the cyber espionage. While neither the Taiwan crisis of 1996 reinforced Chi- indigenous Chinese J-20 and J-31 nese vulnerability, two decades later, semi-stealth aircraft, nor the Russian 39
ST RAT EG I C T R EN DS 2 0 1 9 Su-57 are fully operational or avail- projected massive investments in the able in significant numbers, the US coming years, it has been argued that philosophy of “first look, first shot, China’s advances in a broad range first kill” is already being undermined of artificial intelligence technologies by improved air defense search radars should constitute a “Sputnik mo- operating outside the frequency range ment”21 for the United States, with that is effectively countered by current implications far beyond the defense stealth technology.20 Further increases field. Although their economic bases in processing power, long-range in- are less impressive, other non-West- frared sensors, passive radar, and im- ern actors are likely to follow suit. proved missile seekers are going to fur- While the use of long-range weapons, ther exacerbate this situation – even if unmanned and autonomous systems, the promise of quantum radar, which and improved electronic warfare and would rely on entangled photons for cyber support can all serve to lower unambiguous detection at longer costs and casualties, the upshot is that ranges, fails to materialize. similar options will likely be available to capable opponents. Moreover, a Given that air-to-air combat and military such as the PLA may be in a strike warfare have long been areas of position to employ the same technol- Western strength, it seems likely that ogies, with many fewer constraints, the overall exchange rates between than Western-style armed forces. Western and non-Western forces in fu- ture conflict scenarios would be more Technology-focused approaches may balanced than at any time since World not constitute the best solution to War II. Due to the growing lethality this dilemma. Given the high levels of opposing forces, Western militar- of education, technical competency, ies may become more likely to avoid and relatively high tolerance for in- costly confrontations and correspond- dependent decision-making that are ingly less likely to heed their alliance often seen as characteristic traits of commitments. Western democracies, an emphasis on superior combat training, distribut- Nor is the prospective decline of the ed command authority, and creative Western margin of superiority limit- force employment may represent a ed to these specific fields. Russia and more promising avenue for a new China are highly capable in the cyber offset strategy. Insofar as techno-cen- domain, and continue to invest in tric initiatives can contribute to such anti-satellite capabilities. Given the a shift, human-machine teaming has 40
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY Initiators and Defenders in Major Cyber Theft Incidents, 2000 – 2018 Initiations Defenses South Korea Ukraine India 9 6 North 4 Germany Korea 5 France 10 Japan 10 2 Iran 9 Russia 41 Israel China 9 South 6 Pakistan Korea 2 Russia 3 5 Australia 3 Vietnam Iran 2 6 USA 87 China 63 USA 12 Sources: CSIS; DCID the potential to amplify any pre-ex- are worth mentioning in this regard. isting skill differentials. That said, it For one, an increased application should not be taken for granted that of national security instruments to liberal societies will enjoy inherent ad- knowledge-intensive industries is al- vantages in the utilization of this par- ready taking shape, especially in the ticular cluster of technologies in the United States. Hence, the Trump future – nor should any one family of administration has taken a hard line emerging technologies be unduly em- on Chinese property theft and in- phasized over others. troduced measures to ensure a high- er level of protection for a so-called Protecting the Defense National Security Innovation Base.22 Knowledge Base The Trump approach is instructive, in While an exclusive focus on techno- that it has both increased the United logical solutions is unlikely to accom- States’ freedom of action in counter- plish the aim of maintaining Western ing Chinese intrusions and stoked a military superiority, the question of debate about the abuse of national whether an advantage in key areas can security instruments for commercial be retained in the long run remains advantage, or even to tactically shape relevant. Several recent developments the domestic political discourse. 41
ST RAT EG I C T R EN DS 2 0 1 9 A limited and targeted application longer term. Any further steps will be of additional protections designed to much more difficult to negotiate, in avoid the transfer of sensitive knowl- part due to increasingly effective for- edge to potentially hostile actors will eign lobbying efforts. be unavoidable if some level of eco- nomic and military advantage is to be It is likely that knowledge-based ad- retained in the long run. That said, the vantages in the defense field will danger that such instruments will be continue to decline, even though inappropriately applied to other, less the West retains options to minimize sensitive sectors of the economy clearly them. The combination of targeted cannot be discounted. A broad-based research in more tightly controlled recourse to state interference would environments, limited interven- almost certainly have a stifling effect tions in the market, and expanded on the civilian economy. The dilemma counterintelligence programs could of balancing national security and eco- contribute to the maintenance of nomic liberty is thus likely to remain narrower, but nonetheless meaning- with us for the foreseeable future. ful, advantages for the foreseeable future. Whether such programs can The ability of Western democracies be successfully implemented remains other than the United States to fol- to be seen, especially in the highly low suit and impose controls on their fragmented European context. Bal- knowledge ecosystems will be limited ancing state interventions in the free by pragmatic economic interests and exchange of knowledge with legiti- concerns about economic freedom. mate civilian imperatives will remain Nonetheless, the pressure to act will a delicate matter. Finally, while many continue to build. Following domes- in the West appear impervious to the tic initiatives in a number of member historical record in this regard, broad- states, the European Union has already based technological superiority is not resolved to implement additional a necessary precondition for main- measures to ensure better screening of taining highly capable armed forces. FDI. Since national security concerns remain for the individual member Although the danger should not be states to sort out, the impact of any overstated, a failure to arrest the on- such regulations will remain uneven. going slide towards conventional mil- While investment screening is a step itary parity could further weaken US forward, it appears unlikely that the alliance commitments and security proposed measures will suffice in the assurances in the face of revisionist 42
E C L I P S E O F W E ST E R N M I L I TA RY T E C H N O LO GY challengers. This may be true even in 4 Paul M. Kennedy, The Rise and Fall of the Great Powers: Economic Change and Military Conflict the absence of any major crises or mil- form 1500 to 2000 (London: William Collins, itary conflict. While the effects on the 2017), 762. international order would be primarily 5 American Association for the Advancement of indirect and difficult to fathom, grow- Science, “National R&D by Funder;” “Trends in Federal R&D, FY 1976 – 2018.” ing pressure for US military retrench- ment is difficult to reconcile with the 6 American Association for the Advancement of Science, “Federal R&D as a Percentage of maintenance of an alliance system GDP.” based on a presumption of indivisible 7 Rhodium Group et al., The US-China FDI security. A focus on the mechanisms Project. of technology diffusion will be nec- 8 National Counterintelligence and Security essary to minimize further losses in Center, Foreign Economic Espionage in Cyber- comparative military advantage. At space, Washington, DC: Office of the Director of National Intelligence, 2018. the same time, a techno-centric ap- proach may no longer be sufficient to 9 Carlo Kopp, “Lockheed-Martin / Boeing F-22 Raptor: Assessing the F-22A Raptor,” Air Power arrest this dynamic. How best to draw Australia. on non-material advantages in an age 10 Meia Nouwens and Helena Legarda, “China’s of intense technological competition, Pursuit of Advanced Dual-Use Technologies,” and how to emphasize them as a vi- IISS, December 18, 2018. able foundation for deterrence vis-à- 11 Chuck Hagel, “Reagan National Defense vis future peer competitors, should be Forum Keynote,” November 15, 2014. major concerns for strategic and oper- 12 Daniel Fiott, “America First, Third Offset ational-level theorists. Second?” in: RUSI Journal 163:4 (2018), 48. 13 Lee Fang, “Google Is Quietly Providing AI Technology for Drone Strike Targeting Proj- 1 Dima Adamsky, The Culture of Military Inno- ect,” in: The Intercept, March 6, 2018. vation: The Impact of Cultural Factors on the Revolution in Military Affairs in Russia, the US, 14 Robert O. Work, “So, This Is What It Feels and Israel (Standford, CA: Stanford University Like To Be Offset,” Presentation at the 2018 Press, 2010), 81 – 87. CNAS Annual Conference, June 21, 2018. 2 Roger Cliff et al., Shaking the Heavens and 15 “Chinese and Russian Air-launched Weapons: Splitting the Earth: Chinese Air Force Employment A Test for Western Air Dominance,” in: The Concepts in the 21st Century (Santa Monica, CA: Military Balance 2018 (London: Routledge/ RAND, 2011), 35. IISS), 7 – 9. 3 See, e.g. Michael O’Hanlon, A Retrospective 16 Richard H. Speier et al., Hypersonic Missile on the So-called Revolution in Military Affairs, Nonproliferation: Hindering the Spread of a New 2000 – 2020 (Washington, DC: Brookings, Class of Weapons (Santa Monica, CA: RAND, 2018). 2017). 43
ST RAT EG I C T R EN DS 2 0 1 9 17 Scott W. Harold, Defeat, Not Merely Compete: China’s View of Its Military Aerospace Goals and Requirements in Relation to the United States (Santa Monica, CA: RAND, 2018). 18 Martin Giles, “The US and China are in a Quantum Arms Race that Will Transform Warfare,” in: MIT Technology Review, January 3, 2019. 19 Eric Heginbotham et al, U.S. and Chinese Air Superiority Capabilities: An Assessment of Relative Advantage, 1996 – 2017 (Santa Monica, CA: RAND, 2015), 2 – 3. 20 Carlo Kopp, “Evolving Technological Strategy in Advanced Air Defense Systems,” in: Joint Forces Quarterly 57:2 (2010), 86 – 93. 21 David Ignatius, “China’s Application of AI Should be a Sputnik Moment for the U.S. But will it be?” in: Washington Post, November 6, 2018. 22 The White House, National Security Strategy of the United States (Washington, DC: The White House), December 2017, 21 – 22. 44
You can also read