logo
China's Research Masks A Military Agenda From Alaska To Manila

China's Research Masks A Military Agenda From Alaska To Manila

Forbesa day ago
China's global research agenda has some fishy findings. This week, the US Coast Guard chased off a Chinese research vessel operating near Alaska. The Philippines is currently tracking three Chinese research vessels inside its Exclusive Economic Zone. China has also been ramping up its research worldwide, leading to conflict with South Korea and other states. While China claims these research activities have benign, scientific purposes, these vessels' behavior suggests otherwise. China's use of these ships is also indicative of China's legal warfare–its use and abuse of international law to achieve military and strategic objectives.
Chinese-flagged vessels are collecting marine data on an unprecedented scale, from Australia to Alaska. A state fleet of 64 civilian survey vessels has conducted hundreds of thousands of hours of operations globally in the past four years. 80% of these vessels have some ties to China's military or geopolitical agenda. Japan, India, Taiwan, Australia, and others have also reported extensive marine data collection by Chinese vessels in their EEZs and continental shelves in the past several years.
Whether or not all of this activity was illegal, states fear China's potential military intentions. China can easily commandeer civilian research for military purposes. In 2020, Australia expressed concern that Chinese vessels, although they were operating legally, were mapping areas frequently used by Australian submarines to access the South China Sea. India has expressed worries that China has been using unmanned underwater vehicles to collect data for potential military use. Civilian research vessels have been accompanied by the Chinese Coast Guard and Chinese Navy, further calling into question their peaceful purposes. Some of the research vessels carry sophisticated manned submersibles, advanced sonar to scan the ocean floor, and buoys to study sea conditions. Some ships reportedly deploy sea drones and underwater glides. China has ramped up data collection near Taiwan, potentially seeking intelligence that could help with navigation and positioning in combat.
China's Standoff With South Korea In the Yellow Sea
In February, Chinese and South Korean vessels reached a standoff when Chinese research activities blocked a portion of the Yellow Sea. China recently expanded an aquaculture facility in the Provisional Measures Zone between China and South Korea. The installation consists of a decommissioned offshore oil-drilling rig and two large octagonal steel cages, one of which was in 2024. The PMZ was created by the two countries in 2001 to manage their overlapping EEZ claims in the narrow sea. The agreement allows fishing activities by both states but does not mention aquaculture, leaving China to operate its structure in a legal gray zone.
South Korea has expressed concerns about the facility's dual-use purposes. Satellite imagery reveals that the offshore oil platform has the potential for functionality beyond aquaculture. South Korean analysts have expressed concern that China's activities in the Yellow Sea echo its activities in the South China Sea, where Chinese research platforms and oil rigs eventually turned into artificial islands and illegal maritime claims.
In a two-hour standoff in February, a South Korean ocean survey vessel tried to inspect the installation, and was blocked by Chinese Coast Guard ships and civilian vessels. China soon expanded its claims elsewhere in the Yellow Sea. In May, a regional branch of the China Maritime Safety Administration declared a 'no-sail zone' and barred vessels from entering an area of the southern Yellow Sea. China concurrently established two zones designated for military exercises in the PMZ and in a zone overlapping with South Korea's EEZ.
US Chases Away China-Flagged Research Vessel Near Alaska This Week
China has also been spotted conducting research in U.S. waters. Last year, China conductive extensive surveys near Guam. The research could potentially have been for mineral exploration, but the ship routes suggest that China was seeking to better navigate the area with submarines. On July 26, the US Coast Guard responded to a Chinese research vessel in Arctic waters near Alaska, asserting the US's exclusive rights to manage the resources in its Extended Continental Shelf.
China's reaction to the US's chasing away of its research vessel near Alaska is revealing. In 2023, the US clarified its claim to an extended continental shelf, which included overlaps with Arctic claims by Russia and Canada. The US claim is based on well-established customary international law. When the US Coast Guard responded to China's research vessel near Alaska, the China blasted the US as an international lawbreaker. The Global Times, the mouthpiece of the Chinese Communist Party, reported that the US 'hyping up of the 'China threat' rhetoric is only to justify the US' evil deeds in the Arctic, revealing itself as a rule-breaker and global troublemaker . . . . ' The article then accused the US of politicizing and creating confrontation in the Arctic.What International Law Says About China's Maritime Research and Data Collection
Under the United Nations Convention on the Law of the Sea, marine data collection must be used for peaceful purposes. A coastal state must give permission for a foreign state to conduct marine scientific research or exploration for or exploitation of natural resources in its EEZ or continental shelf. The US takes the position, with which not all states agree, that military survey operations and operational oceanography (routine collection of ocean observations) do not require the consent of a coastal state.
The Chinese vessels discussed above are civilian vessels, and international law would forbid them from conducting military survey operations. Many, if not most, of their actions appear distinct from operational oceanography and fall into the categories that would require permission from coastal states. Some reported activities of these Chinese vessels, including those around oil and gas exploration areas, imply a commercial purposes that would require coastal states to grant research permissions. China's repeated and frequent use of scientific research vessels, particularly those with military capabilities, suggests its ships are being used to advance its excessive maritime claims—not for peaceful purposes. China routinely blurs the distinction between civilian and military vehicles, thereby eroding the principle of distinction that is core to the law of war.How To Protect Maritime Rights from China's 'Research'
The US and its allies must work together to assert their maritime rights against China. The US and its allies should share information about China's maritime data collection to determine the methods and purpose of these activities. They should scrutinize each vessel involved and the type of activities it is conducting to determine whether China's activities violate international law. The US and its allies and partners should collaborate on law enforcement when possible. And if China is mapping out potential conflict over Taiwan or in the region, the US and its allies must share intelligence–and figure out how to stop them.The US and its allies should also expose China's violations of international law. As this week's Global Times article shows, China deplores being cast as a lawbreaker. The US and its allies should not hesitate to use this against China, and to defend the rules-based international system loudly and proudly. The US and its allies must demand compliance with international law with words and actions. If we don't use our maritime rights, we will lose them to China and its competing narrative about US evils
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Beijing's hackers are playing the long game
Beijing's hackers are playing the long game

Axios

time7 minutes ago

  • Axios

Beijing's hackers are playing the long game

Chinese hackers are targeting more sensitive U.S. targets than ever — not to smash and grab, but to bide their time. Why it matters: Beijing is investing in stealthy, persistent access to U.S. systems — quietly building up its abilities to disrupt everything from federal agencies to water utilities in the event of escalation with Washington. Even the most routine spying campaign could leave China with backdoors to destruction for years to come. Driving the news: At least three China-based hacking groups exploited vulnerable SharePoint servers in the last month, according to Microsoft. Researchers at Eye Security, which first discovered the SharePoint flaws, estimates that more than 400 systems were compromised as part of the SharePoint attacks. In this case, hackers also stole machine keys. That means the attackers can regain access whenever they want — even after the system is patched — unless admins take rare manual steps to rotate keys. The big picture: China's state-linked hackers have been growing in sophistication over the last few years as they focus more on targeting technology and software providers with hundreds of customers, often including government agencies. By the numbers: More than 330 cyberattacks last year were linked to China, double the total from 2023, according to CrowdStrike data shared with the Washington Post. Those numbers continued to climb in early 2025, according to CrowdStrike. Between the lines: At least three major Chinese government teams have been targeting U.S. networks in recent years. Volt Typhoon has focused on breaking into endpoint detection tools to burrow deep into U.S. critical infrastructure, including pipelines, railways, ports and water utilities. Their goal is to maintain persistent access and be prepared to launch destructive attacks in the event of contingencies such as a war over Taiwan, experts say. Salt Typhoon, known for its compromises of global telecom networks, has focused on traditional espionage and spying. This group tapped cell phones belonging to President Trump, Vice President Vance and other top government officials. The FBI believes that threat is now "largely contained." Silk Typhoon — which has been linked to a recent breach of the U.S. Treasury Department and is known for the global 2021 Microsoft Exchange hacks — has been ramping up its work in recent months. The group uses previously undetected vulnerabilities, known as zero-days, to break into networks. Zoom in: Researchers at cybersecurity firm SentinelOne have uncovered more than 10 patents tied to Silk Typhoon's work — a rarity among nation-state hackers. The patents — detailed in a report published Thursday — suggest the group was at one point developing new offensive tools, including to encrypt endpoint data recovery, conduct phone and router forensics and decrypt hard drives. The researchers also found that Silk Typhoon has links to at least three private sector companies. The intrigue: Beijing's growing reliance on private contractors adds another layer of complexity — shielding state involvement while expanding capability. A DOJ indictment released last month details how the Shanghai State Security Bureau directed employees at tech companies to hack into computers across U.S. universities and businesses to steal information. A trove of leaked documents stolen from private Chinese contractor I-Soon early last year also highlighted how hired hackers targeted several U.S. government agencies, major newspapers and research universities. State of play: China's growing cyber prowess comes as the Trump administration has diminished resources for its own cyber defenses. At least a third of the workforce at the Cybersecurity and Infrastructure Security Agency has left through voluntary buyouts, early retirements or layoffs. The Trump administration also wants to cut its budget. Yes, but: The administration is expected to invest heavily in its own offensive cyber powers — with $1 billion from the "One Big Beautiful Bill" heading to the Pentagon for just that purpose.

Ukraine Claims Drone Attacks on Two Russian Oil Refineries
Ukraine Claims Drone Attacks on Two Russian Oil Refineries

Bloomberg

timean hour ago

  • Bloomberg

Ukraine Claims Drone Attacks on Two Russian Oil Refineries

Ukraine's military claimed strikes on two oil refineries and other infrastructure in Russia in what it said was a response to recent deadly attacks by Kremlin forces on Ukrainian cities. The Novokuibyshevsk plant in the Samara region and the Ryazan refinery were hit, the Ukrainian General Staff said in a Saturday Facebook post. Ukrainian drones also struck a fuel depot in Russia's Voronezh region and an electronics facility in Penza, it said. All the targets were part of Russia's war apparatus, the military said.

Why US Partners Are Giving In to Trump on Trade
Why US Partners Are Giving In to Trump on Trade

Bloomberg

timean hour ago

  • Bloomberg

Why US Partners Are Giving In to Trump on Trade

In Donald Trump's first term as president, Japan stood out as an exception in opting not to retaliate against his tariff hikes, as the late Prime Minister Shinzo Abe reckoned it was better to shrug them off in favor of maintaining the broader economic and security relationship. Most others did retaliate, however, and that experience conditioned economists to anticipate damaging tit-for-tat levies in Trump 2.0 if he proceeded with the aggressive trade actions he campaigned on. Except, something happened on the way to the global recession: Aside from China, American trading partners have largely accepted Trump's new duties.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store