Skip to main content
Top

2018 | OriginalPaper | Chapter

7. Concluding Remarks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The final chapter draws out the book’s key findings, themes, and contribution to the existing literature. It begins with a brief review of the overarching arguments made by each of the case studies. Firmly grounded in the experience of the case studies, this chapter returns to the empirical and theoretical gaps in the literature, described in Chap. 2, and underscores the book’s contribution to the scholarly understanding of United States–China security relations. As a corollary, it affirms the continued relevance of the security dilemma concept to elucidate the deterioration of United States–China military and defense relations during the Obama presidency. Next, the chapter reflects on possible future directions for United States–China relations in the military realm under the stewardship of the new Trump administration. Early indications do not bode well for the trajectory of this crucial security dyad, or for strategic stability in the increasingly volatile, militarized, and crisis-prone Asia-Pacific. Finally, it highlights several implications that follow from the findings of this research, and suggests viable directions future research might take from where this book leaves off.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Jervis, R. (1976). Perception and misperception international politics. Princeton, NJ: Princeton University Press, 62.
 
2
Biddle, S. (2005). Military power: Explaining victory and defeat in modern war. Princeton, NY: Princeton University Press.
 
3
Jervis, R. (1978). Cooperation under the security dilemma. World Politics, 30(2), 167–214; Lynn-Jones, S.M. (1995). Offense-defense theory and its critics. Security Studies, 4(4), 660–691.
 
4
‘Dual-use’ features are also associated with several other related Chinese technologically advanced military capabilities analyzed in this book including cyberspace; EW; missile defense, ASATs; and long-range precision-guided cruise and ballistic missiles.
 
5
The Chinese concept of ‘strategic deterrence’ describes a broader and multifaceted version of deterrence that includes nuclear and conventional, as well as cyber, space, and EW domains. See Chase S.M., & Chan, A. (2016). China’s evolving approach to ‘integrated strategic deterrence’. Santa Monica, CA: RAND Corporation.
 
6
These warhead and targeting ambiguities could equally apply to other medium- and long-range ballistic and cruise missile systems fielded by China.
 
7
As Chap. 6 noted, to date no clear evidence has emerged to corroborate reports that China has deployed (or mated) tactical nuclear warheads with delivery vehicles.
 
8
Neoliberal IR scholars argue that the existence of democratic political structures can sustain peace between states precisely because they are able to alleviate the security dilemma. See Weinberger, S. (2003). Institutional signaling and the origins of the cold war. Security Studies, 12(4), 80–115.
However, signaling (resolve or benign strategic intentions) is more credible between democratic states; by contrast, nondemocratic states (such as China) tend to have less transparent decision-making processes, and this opacity is more likely to worsen the security dilemma. See Kydd, A. (1997). Sheep in sheep’s clothing: Why security seekers do not fight each other. Security Studies, 7(1), 114–155.
 
9
Acharya, S. (2007). Security dilemmas in Asia. International Studies, 44(1), 57–72.
Johnson, J.S. (2017). China’s vision of the future networked battlefield: Cyber, space and electronic warfare challenges to the US in the Western Pacific. The Diplomat, 27 April 2017. Available at: http://​thediplomat.​com/​2017/​04/​chinas-vision-of-the-future-networked-battlefield/​.
 
10
Sebenius, A. (2017, June 28). Writing the rules of cyber-war. The Atlantic, 28 June 2017. Available at: https://​www.​theatlantic.​com/​international/​archive/​2017/​06/​cyberattack-russia-ukraine-hack/​531957/​ (Accessed: 28 June 2017).
 
11
Hayden, M. (2017). Cutting cyber command’s umbilical cord to the NSA. The Cipher Brief. Available at: https://​www.​thecipherbrief.​com/​article/​tech/​cutting-cyber-commands-umbilical-cord-nsa-1092 (Accessed: 20 June 2017).
 
12
For example, an Israeli war game conducted in 2013 demonstrated how the use and threat of cyberattacks might very quickly escalate a crisis, in this case bringing the United States and Russia to the brink of conflict in a possible Middle East war. Opals-Rome, B. (2013, November 14). Israeli cyber game drags U.S., Russia to brink of mid-east war. Defense News, 14 November 2013. Available at: http://​www.​defensenews.​com/​article/​20131115/​C4ISRNET07/​311150020/​Israeli-Cyber-Game-Drags-US-Russia-Brink-Mideast-War (Accessed: 10 June 2017).
 
13
Chinese analysts seldom distinguish between peacetime and wartime uses of ‘cyber weapons’ or ‘cyber warfare’—others have advocated a ‘state of perpetual mobilization’. See Zheng, Y. (2013). Lectures on the science of information operations (in Chinese), Beijing: Military Science Press, 53. Lieber, K.A., & Press, D.G. (2017). The new era of counterforce: Technological change and the future of nuclear deterrence. International Security, 41(4), 9–49.
 
14
Xiao, W., & Li, Y. (2007). Computer networks and future warfare. Jiangsu Aviation, 1.
 
15
Zen, S. (2016). China to lead the world in A.I., says top Microsoft executive. South China Morning Post, 12 April 2016. Available at: http://​www.​scmp.​com/​tech/​enterprises/​article/​1935579/​china-lead-world-artificial-intelligence-says-top-microsoft (Accessed: 10 June 2017).
 
16
Cai, J. (2016). The impact of disruptive technologies in great power competition, and on the future battlefield. PLA Daily, 7 May 2016. Available at: http://​www.​81.​cn/​jwgz/​2016-05/​07/​content_​7036499.​htm (Accessed: 10 June 2017).
 
17
Drezner, D.W. (2016). So when will realists endorse Donald Trump? The Washington Post, 1 February 2016. Available at: https://​www.​washingtonpost.​com/​posteverything/​wp/​2016/​02/​01/​so-when-will-realists-endorse-donald-trump/​?​utm_​term=​.​67f18cf8fe1d (Accessed: 19 June 2017); Rieff, D. (2016). Will the next president restore US primacy?, The National Interest, 11 September 2016. Available at: http://​nationalinterest​.​org/​feature/​will-the-next-president-restore-us-primacy-17651 (Accessed: 19 June 2017). Blackwill, R.D., & Tellis, A.J. (2015). Revising U.S. grand strategy towards China. (No. 72). New York, NY: Council on Foreign Relations Press.
 
18
Stokes, B. (2016). American isolationism, with a very, very big stick. Foreign Policy, 17 May 2017. Available at: http://​foreignpolicy.​com/​2016/​05/​17/​american-isolationism-with-a-very-very-big-stick-trump-clinton-election/​ (Accessed: 1 June 2017); U.S. Department of Defense, Press Office. (2017). Remarks by secretary Mattis at Shangri-la dialogue: Secretary of defense Jim Mattis; John Chipman, IISS director-general and chief executive. 3 June 2017. Available at: https://​www.​defense.​gov/​News/​Transcripts/​Transcript-View/​Article/​1201780/​remarks-by-secretary-mattis-at-shangri-la-dialogue/​ (Accessed: 10 June 2017).
 
19
Porter, P. (2017). Even Donald can’t defeat the blob. The National Interest, 12 July 2017. Available at: http://​nationalinterest​.​org/​feature/​even-donald-trump-cant-defeat-the-blob-21515?​page=​show (Accessed: 13 July 2017).
 
20
Prior to Donald Trump’s inauguration in January 2017, the last major FONOP was authorized by the Obama administration in October 2016. Storey, I. (2017). Choppier waters ahead in the South China Sea? China-US Focus, 12 June 2017. Available at: http://​www.​chinausfocus.​com/​peace-security/​choppier-waters-ahead-in-the-south-china-sea (Accessed: 1 June 2017).
 
21
Gupta, S. (2017). Xi and Trump’s message from Mar-a-Lago: Yes we can. South China Morning Post, 8 April 2017. Available at: http://​www.​scmp.​com/​week-asia/​geopolitics/​article/​2086052/​xi-and-trumps-message-mar-lago-yes-we-can (Accessed: 10 June 2017).
 
22
U.S. Department of Defense, Press Office. (2017). Remarks by secretary Mattis at Shangri-La dialogue: Secretary of defense Jim Mattis; John Chipman, IISS director-general and chief executive. 3 June 2017. Available at: https://​www.​defense.​gov/​News/​Transcripts/​Transcript-View/​Article/​1201780/​remarks-by-secretary-mattis-at-shangri-la-dialogue/​ (Accessed: 10 June 2017).
 
23
Zhang, F. (2017). Can China take advantage of America’s strategic deficit? The Strategist, Australian Strategic Policy Institute. 15 June 2017. Available at: https://​www.​aspistrategist.​org.​au/​can-china-take-advantage-americas-strategic-deficit-asia-mind/​ (Accessed: 16 June 2017).
 
24
Schweller, R.L. (1994). Bandwagoning for profit: Bringing the revisionist state back in. International Security, 19(1), 72–107; Art, R.J. (2010). The United States and the rise of China: Implications for the long haul. Political Science Quarterly, 125(3), 359–391; Gray, C.S. (2010). The strategy bridge: Theory and practice. Oxford: Oxford University Press; Schelling, T.C. (1960). The strategy of conflict. Cambridge, MA; London: Harvard University.
 
25
Recent evidence suggests that the relentless modernization of China’s military forces has prompted Japan and South Korea to develop an offensive strike (or ‘counterstrike’) capability. See Lyon, R. (2017). The growth of offensive strike capabilities in Northeast Asia. The Strategist—Australian Strategic Policy Institute, 24 July 2017. Available at: https://​www.​aspistrategist.​org.​au/​growth-offensive-strike-capabilities-northeast-asia/​ (Accessed: 25 July 2017).
 
26
Chong, K.P. (2017). Progress on maritime code for South China Sea. The Straits Times, 23 May 2017. Available at: http://​www.​straitstimes.​com/​asia/​east-asia/​progress-on-maritime-code (Accessed: 10 June 2017).
 
27
In July 2017, for example, Indonesia renamed a resource-rich section of the North Natuna Islands, which overlaps with China’s ‘nine-dash line’ in the South China Seas. Additionally, Malaysia took on a more hawkish line against maritime encroachments in the South China Seas, particularly vis-à-vis China, despite its active engagement with Beijing on the ‘one belt, one road’ initiative. Parameswaran, P. (2017). Beware of the illusion of South China Sea calm. The Diplomat, 21 July 2017. Available at: http://​thediplomat.​com/​2017/​07/​beware-the-illusion-of-south-china-sea-calm/​ (Accessed: 24 July 2017).
 
28
The IISS Shangri-La Dialogue (2017). Key Note Address: Malcolm Turnbull, prime minister of Australia. IISS—The Asia Security Summit, 2 June 2017. Available at: https://​www.​iiss.​org/​en/​events/​shangri-la-dialogue/​archive/​shangri-la-dialogue-2017-4f77/​opening-remarks-and-keynote-address-fc1a/​keynote-address---malcolm-turnbull-4bbe (Accessed: 10 July 2017).
 
Metadata
Title
Concluding Remarks
Author
James Johnson
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-75838-1_7