
“Admiral, is China an adversary?” On July 30, Sen. Tom Cotton (R–AR) asked that question to Adm. John Richardson, who is President Barack Obama’s nominee to be the next chief of naval operations. Heretofore, the most common answer in official Washington to that question has been to describe China as a competitor, not an adversary. Richardson avoided a straight answer; he said China was “a complex nation,” doing some things that possessed an “adversarial nature.” But by declining to give the standard response, Richardson may have signaled a transition in official thinking to the view that China is in fact an adversary.
The Obama administration now faces a critical decision on two flashpoints created by Chinese aggression. The first is how the United States government will respond to the cyber intrusion into the Office of Personnel Management (OPM) database, an attack that resulted in the theft of over 20 million government personnel records. The administration has reached a series of conclusions regarding the OPM hack that represents a significant departure from past practices. The National Security Agency is confident that the Chinese government is responsible for the OPM hack. After the magnitude and audacity of the OPM hack became clear, the U.S. government decided to go beyond defensive cyber software and computer hygiene to defend against cyber challenges. Deterrence, created by a punishing response to this intrusion, will now be the U.S. government’s approach to such cyber attacks. As a result, President Obama is “clearly seeking leverage, [and] has asked his staff to come up with a more creative set of responses.”
In the wake of the OPM data breach, establishing cyber deterrence with China will require inflicting punishment on their decision-makers in a way that harms their interests (in order to demonstrate that it is possible to do so), and promising more to come if these decision-makers don’t change their behavior. And that will likely require much sterner measures than the diplomatic protests and Justice Department indictments that have thus far had no discernible effect. Critics of retaliation will protest that a response will only result in an escalating cyber war between the two countries, with the United States more exposed to the damage that would bring. But the boxing match is already underway, with China punching and the U.S. playing the punching bag. Ignoring the blows will not stop the pain they are inflicting.
The second flashpoint is of course Chinese activities in the South China Sea. According to a recent article in Politico, a civil-military dispute is now simmering between Navy officers and officials at U.S. Pacific Command (PACOM) and advisers at the White House. Military officials want a clear demonstration of freedom of navigation near China’s outposts in the Spratly Island chain but are meeting resistance from White House advisers, who are seemingly reluctant to create a flare-up in the region, especially in advance of Chinese President Xi Jinping’s visit to the United States in September.
U.S. officials refuse to say whether U.S. warships or aircraft have sailed or flown within 12 nautical miles of any of the seven Chinese artificial islands in the Spratlys. According to the United Nations Convention on the Law of the Sea (UNCLOS) (which China has ratified and the United States has not), artificial structures built on submerged features, which describes at least six of China’s seven outposts, do not possess the 12 nautical mile territorial right. Querulous Navy and PACOM officials are concerned that a failure to defend the law with a visible demonstration will result in the gradual acceptance of China’s territorial claims in the sea.
This is not a new issue but recent events have stepped up the urgency of a response. Having largely completed its dredging and land reclamation at its seven sites in the Spratlys, the next phase for China will be further structural improvements such as more offices, barracks, piers, warehouses, aircraft hangers, and military equipment. This will likely include the beginnings of an integrated air defense system (China already operates an early warning radar on Johnson South Reef). Once Chinese anti-ship and anti-aircraft missiles begin to sprout, freedom of navigation demonstrations become a more perilous decision for policymakers in Washington. That is what a fait accompli might look like. The United States and its partners will undoubtedly have to reckon some day with Chinese missiles in the Spratlys. But establishing the initial legal precedent of freedom of navigation by sailing and flying within 12 nautical miles of China’s sand piles will be an easier decision before those missile are installed.
The upcoming summit between Obama and Xi may be the last chance to prevent China’s slide from competitor to adversary. That chance is slim. China seems committed to both its cyber espionage program and its territorial expansion in East Asia on its “blue soil.” We can now see in retrospect that America’s long-standing, bipartisan policy of forbearance toward China has accelerated the slide and therefore should be seen as totally discredited.
Judging by media reporting, the Obama administration seems to have endorsed the principle of deterrence, enforced through punishment, to protect U.S. interests in cyberspace. What remains unknown is how much punishment, and in what forms, the United States will have to deliver in order to establish deterrence. Chinese leaders are likely to presume they possess significant comparative advantages in the cyber domain, which means that retaliation and escalating cyber duels are possible. Applying deterrence theory to the cyber domain presents far more questions than answers. This does not mean that deterrence is not the right approach for the U.S. government to take. But once on this course we should expect some surprising departures from past experiences. Finally, we should not be surprised if “cyber non-combatants” suffer some collateral damage once hostile network packets start flying in all directions.
In the South China Sea, four centuries of legal practice, America’s credibility as an ally and a stabilizing force, and the future of civil-military relations inside the Obama administration are in play. The upcoming Obama–Xi summit will for the moment freeze both sides. But once Xi has flown home, we should expect stepped-up Chinese building in the Spratlys. The White House will then come under intensifying pressure from Capitol Hill, its own military leaders, and other Democratic security thinkers to make a visible and formidable response.
As with the looming cyber war, such a U.S. demonstration in the South China Sea would be merely the next move in an open-ended game. What will follow are deeper examinations about whether the United States and its partners in the region are prepared to compete in the game, and how policymakers and military leaders on all sides expect to either control escalation or attempt to use escalation to their advantage.
A question no one will be asking at that point is whether China is an adversary.
Robert Haddick is an independent contractor at U.S. Special Operations Command. He writes here in a personal capacity. His book Fire on the Water: China, America, and the Future of the Pacific, is now out from Naval Institute Press.


A well written post but too much emphasis on the US perspective. While the hacks are a major concern we don’t know to much about them at this point. I’m not inclined to believe everything the NSA says. Also, were the attack retaliation for a US cyber attack on China or an ally? Since stuxnet it is clear the US is willing to engage in cyber warfare to further its interest.
And why wouldn’t China be inclined to expand its influence where it feels it has a vested interest. The US has been doing this for over half a century. The competition between China and the US is real but it is not nearly as dire as some people think. Could it reach that point eventually? Sure, but as trade grows it seems less and less likely.
I am not sure which planet you are on Pat. The more the world has traded with China, the more obstinate, determined and capable its political elite and military have become. The time to push back is now.
Please keep it civil, gentlemen.
Push back for what?
OPM’s incompentence and some artificial islands?
You can’t be serious.
I had a security clearance for 17 years, I am directly impacted by the data breach at OPM, so I’m as upset by the incident as anyone.
However, do you know who is to blame for the incident? It’s not China, it’s us, it’s our own fault that breach occurred.
If you’ve spent any time in the Intel field, then you know at some point in your career there is a possibility that you could become a target of a foreign intelligence service. That’s the nature of the business and everyone accepts that. They target us and we target them. So if the Chinese Intelligence Service is really behind the OPM data breach, well that’s the nature of the Intel business. If it were the Russians behind it, nobody we say a word, however since it’s China, everyone acts like we should go to war over this.
The reality is the breach happened, because a total failure by management in that organization. politics aside, Archuletta should have never been appointed as Director of OPM, sorry but she had ZERO qualifications for that role….ZERO…nada….a former school administrator and Director of the National Hispanic Cultural Center Foundation…..yeah give me a break…..
So that’s one issue, they there was a complete and utter failure by everyone in the management chain of the IT department, including the contracting officers and legal office that approved a contract with foreign companies . They failed to follow existing network security procedures, they couldn’t even account for all the hardware in their network, they failed to comply to audits. They outsourced IT work to foreign nationals and the list goes on and on.
Complete amateur hour over there, a couple high school script kiddies could have gotten to that data, let alone professionals.
So, really what do you propose we do in this case?
What are we going to do? Take them to international court? Over what espionage, the same thing we’re doing every single day?
Are we going to impose sanctions?
Military action?
The fact is we should be embarrassed this even happened. We should be focused on moving forward and how to protect our security clearance data in the future and the impact this is going to have on our operations.
“We have met the enemy and he is us!” Pogo
Sorry, Robert, but the commenters so far are correct. You’re not telling a complete story. It WAS our fault, plus, we have better hackers than China or Russia, and what are WE doing to them, but before and after the OPM attack? As to a bunch of rocks, who cares? Geographically they are simply fortifying their outer perimeter the same as we did. Hawaii (“first island chain”), Guam (“second island chain”), etc. Our defense perimeter extends completely across an ocean, all under the rubarb we are protecting navigation of the seas and opening commerce. Let’s see, China sending Chinese goods on Chinese ships to their Chinese customers (meaning Americans and Europeans) and building Chinese foreign reserves, now’s building a Chinese navy to help protect it all. Hummm,… What’s wrong with that perspective? After all, sounds like China is taking part in globalization to me!
It’s interesting that this Administration, with it professed devotion to conflict avoidance, is taking a tougher line on China now. Makes one wonder what they’re not speaking about publicly (could it be something all of us blog commenters don’t know — gah! say it ain’t so, I thought we were all omniscient).
Perhaps the retaliation will involve those Taylor Swift TS (Taylor Swift. Tiananmen Square, Taylor Swift,…you get the picture) 1989 tee shirts. The new one has Taylor singing in front of a column of tanks. I hear that several senior CPC officials lost control of their bladders while perusing the new shirt design online.