
The sea bears some military strategic value to other nations as it provides the most expeditious sea route from the western Pacific to the Indian Ocean (Lee & Lee 2017). However, it is not just China who has a strategic interest in the South China Sea. The arrival of Chinese Luhu Class Destroyer (DDG112) to Sydney Harbour. China’s Economic Reliance on the South China Sea I will propose that the soft effects of information operations will lead to a shift in force posture towards units capable of countering or mimicking these effects to achieve their tactical objective. Weissmann (2015) asserts that a major kinetic conflict within the South China Sea is extremely unlikely. Information operations attack the electromagnetic spectrum, cyberspace and the human element, decreasing the combat effectiveness of a target unit and can influence government policy from the tactical to strategic level. This paper will discuss how the employment of directed information operations within the South China Sea (particularly in the immediate vicinity of the Spratly and Paracel Island groups) affects the force postures of the nation’s operating in the area now and in the immediate future. However, this interconnectedness can leave them vulnerable to information attacks. They are networked to allow collaborative engagement at far greater speeds and ranges than any single weapon system, and they are stealthy to avoid detection (Harrington & Marosko 2016). Photographer: LEUT Sarah Lucinsky.įifth generation weapons are unique in their information requirements, relying heavily on computer processing and potentially computer decision making in order to gain a tactical advantage (McInnes 2017). HMA Ships Ballarat and Parramatta conduct a replenishment-at-sea with HMAS Sirius as they sail through South China Sea.

As we move towards the deployment of fifth generation weapons and platforms in to theatres of war around the world, defending against these types of operations becomes paramount. The region is a hot bed of information operations from the tactical to the strategic. The United States maintains a strong presence and frequently conducts freedom of navigation exercises in the region by both sea and air (Lee & Lee 2017). A number of our regional neighbours claim sovereignty of various, often overlapping areas of the Sea (Elleman 2018 & US State Department 2014). The dispute in the South China Sea is complicated and enduring in nature. The compromise of information can have serious consequences at not just the tactical but also national strategic levels. Information exchange requirements are discussed at the very earliest stages of military planning and the assurance of information exchange occupies an entire staff within a military headquarters.

In the 21st century military, our reliance on information and the effective exchange and assurance of information, is paramount to the successful deployment of any force. Sun Tzu wrote of the importance of information supremacy to the military commander and of the importance of controlling information within the battle space.

Information operations have been conducted by militaries since the earliest days of warfare.
