Saturday, August 3, 2024

HAS CHINA 🇨🇳 WON?

 Has China Won?: The Chinese Challenge to American Primacy


The defining geopolitical contest of the twenty-first century is between China and the US. But is it avoidable? And if it happens, is the outcome already inevitable?


China and America are world powers without serious rivals. They eye each other warily across the Pacific; they communicate poorly; there seems little natural empathy. A massive geopolitical contest has begun.


America prizes freedom; China values freedom from chaos.


America values strategic decisiveness; China values patience.


America is becoming society of lasting inequality; China a meritocracy.


America has abandoned multilateralism; China welcomes it.

中国赢了吗?:中国挑战美国霸权

Zhōng-guó yíng-le ma?: Zhōng-guó tiǎo-zhàn měi-guó bà-quán


21 世纪决定性的地缘政治较量发生在中国和美国之间。但这场较量可以避免吗?如果发生了,结果是否已经不可避免?21 shìjì juédìngxìng dì dìyuán zhèngzhì jiàoliàng fāshēng zài zhōngguó hé měiguó zhī jiān. Dàn zhè chǎng jiàoliàng kěyǐ bìmiǎn ma? Rúguǒ fāshēngle, jiéguǒ shìfǒu yǐjīng bùkě bìmiǎn?


中国和美国都是没有严重对手的世界强国。他们在太平洋彼岸互相警惕地注视着对方;他们沟通不畅;似乎没有什么自然的同理心。一场大规模的地缘政治较量已经开始。Zhōngguó hé měiguó dū shì méiyǒu yánzhòng duìshǒu de shìjiè qiángguó. Tāmen zài tàipíngyáng bǐ'àn hùxiāng jǐngtì de zhùshìzhe duìfāng; tāmen gōutōng bù chàng; sìhū méiyǒu shé me zìrán de tóng lǐ xīn. Yī chǎng dà guīmó dì dìyuán zhèngzhì jiàoliàng yǐjīng kāishǐ.


美国珍视自由;中国珍视摆脱混乱的自由。Měiguó zhēnshì zìyóu; zhōngguó zhēnshì bǎituō hǔnluàn de zìyóu.


美国重视战略果断;中国重视耐心。Měiguó zhòngshì zhànlüè guǒduàn; zhōngguó zhòngshì nàixīn.


美国正在成为一个长期不平等的社会;中国是一个精英统治的社会。Měiguó zhèngzài chéngwéi yīgè chángqí bù píngděng de shèhuì; zhōngguó shì yīgè jīngyīng tǒngzhì de shèhuì.


美国已经放弃了多边主义;中国欢迎它。Měiguó yǐjīng fàngqìle duōbiān zhǔyì; zhōngguó huānyíng tā.


CONTENTS


CHAPTER 1 INTRODUCTION   1

CHAPTER 2 CHINA'S BIGGEST STRATEGIC MISTAKE            25

CHAPTER 3 AMERICA'S BIGGEST STRATEGIC MISTAKE                49

CHAPTER 4 IS CHINA 

EXPANSIONIST?     79

CHAPTER 5 CAN AMERICA 

MAKE U-TURNS?            105

CHAPTER 6 SHOULD CHINA 

BECOME DEMOCRATIC? 133

CHAPTER 7 THE ASSUMPTION 

OF VIRTUE                              183

CHAPTER 8 HOW WILL OTHER COUNTRIES CHOOSE?         211

CHAPTER 9 A PARADOXICAL CONCLUSION                     253


ACKNOWLEDGMENTS      283

APPENDIX: THE MYTH OF 

AMERICAN EXCEPTIONALISM       287

INDEX        297


CHAPTER 1

INTRODUCTION


ONE THING IS CERTAIN. 

The geopolitical contest that has broken out between America and China will continue for the next decade or two. Although President Donald Trump launched the first round in 2018, it will outlast his administration. The president has divided America on all his policies, except one: his trade and technological war against China. Indeed, he has received strong bipartisan support for it, and a strong consensus is developing in the American body politic that China represents a threat to America. General Joseph Dunford, chairman of the Joint Chiefs of Staff, has said that "China probably poses the greatest threat to our nation by about 2025." The summary of America's 2018 National Defense Strategy claims that China and Russia are "revisionist powers" seeking to "shape a world consistent with their authoritarian model gaining veto authority over other nations' economic, diplomatic, and security decisions."


* Ryan Browne, "Top US General: China Will Be 'Greatest Threat' to US by 2025," CNN, September 27, 2017, https://edition.cnn.com/2017/09/26/politics/dunford-us china-greatest-threat/index.html.


-1-

-2- HAS CHINA WON?

Christopher Wray, the FBI director, has said, "One of the things we're trying to do is view the China threat as not just a whole-of-government threat, but a whole-of-society threat and I think it's going to take a whole-of-society response by us." Even George Soros, who spent millions trying to prevent Trump from being elected, has praised Trump on China. He has said: "The greatest-and perhaps only-foreign policy accomplishment of the Trump administration has been the development of a coherent and genuinely bipartisan policy toward Xi Jinping's China.+ He also added that it was right for the Trump administration to declare China a strategic rival."


Yet, even though the American establishment has, by and large, enthusiastically supported Trump on China, it is curious that no one has pointed out that America is making a big strategic mistake by launching this contest with China without first developing a comprehensive and global strategy to deal with China.


The man who alerted me to this was one of America's greatest strategic thinkers, Dr. Henry Kissinger. I still remember vividly the one on-one lunch I had with him in a private room in his club in midtown Manhattan in mid-March 2018. On the day of the lunch, I was afraid that it would be canceled as a snowstorm was predicted. Despite the weather warning, he turned up. We had a wonderful conversation over two hours. To be fair to him, he didn't exactly say that America lacked a long-term strategy toward China, but that was the message he conveyed over lunch. This is also the big message of his own book, On China.



* Summary of the 2018 National Defense Strategy of the United States of America: Sharpening the American Military's Competitive Edge, https://dod.defense.gov/Portals /1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf.


+ Michael Kranz, "The Director of the FBI Says the Whole of Chinese Society Is a Threat to the US-and That Americans Must Step Up to Defend Themselves," Business Insider, February 13, 2018, https://www.businessinsider.sg/china-threat-to-america-fbi-director -warns-2018-2.


+ George Soros, "Will Trump Sell Out the U.S. on Huawei?," Wall Street Journal, Sep tember 9, 2019.

https://www.wsj.com/articles/will-trump-sell-out-the-u-s-on-huawei-11568068495


Introduction -3-


By contrast, America thought hard and deep before it plunged into the Cold War against the Soviet Union. The master strategist who formulated America's successful containment strategy against the Soviet Union was George Kennan. The strategy was first publicly spelled out in the famous essay he wrote in Foreign Affairs under the pseudonym Mr. X, derived from his "long telegram" written in February 1946. Kennan wrote this when he was serving in the critical post of director of the Policy Planning Staff in the State Department, whose key mission is long-term strategic planning.


The director of policy planning in the State Department from September 2018 to August 2019 was Professor Kiron Skinner of Carnegie Mellon University. In a public panel discussion on April 29, 2019, she revealed that in response to the resurgence of China, her department was still trying to work out a comprehensive strategy to match the one spelled out by her predecessor, Kennan.


When I served in the Singapore Foreign Service, I was also assigned to write long-term strategy papers for the Singapore government. The big lesson I learned from Singapore's three exceptional geopolitical masters (Lee Kuan Yew, Goh Keng Swee, and S. Rajaratnam) was that the first step to formulate any long-term strategy is to frame the right questions. If one gets the questions wrong, the answers will be wrong. Most importantly, as Rajaratnam taught me, in formulating such questions, one must always "think the unthinkable."


In this spirit of "thinking the unthinkable," I would like to suggest ten areas that provoke questions that the policy planning staff should address. Having met George Kennan once in his office in the Institute of Advanced Study in Princeton, New Jersey, in the late 1990s, I believe that he would favor confronting head-on the toughest issues that lie ahead.


THE BIG TEN


1. With 4 percent of the world's population, America's share of the global GDP was close to 50 percent at the end of World War II. Throughout the Cold War, the GDP of the Soviet Union came close in size to that of America, reaching only 40 percent that of America's at its peak." Could America's GDP become smaller than China 's in the next thirty years? If so, what strategic changes will America have to make when it no longer is the world's dominant economic power?


2. Should America's primary goal be to improve the livelihood of its 330 million citizens or to preserve its primacy in the international system? If there are contradictions between the goals of preserving primacy and improving well-being, which should take priority?


3. In the Cold War, America's heavy defense expenditures proved prudent as they forced the Soviet Union, a country with a smaller economy, to match America's military expenses. In the end, this helped to bankrupt the Soviet Union. China learned a lesson from the collapse of the Soviet Union. It is restraining its defense expenditures while focusing on economic development. Is it wise for America to continue investing heavily in its defense budget? Or should it cut down its defense expenses and its involvement in expensive foreign wars and instead invest more in improving social services and rejuvenating national infrastructure? Does China want America to increase or reduce its defense expenditures?


4. America did not win the Cold War on its own. It formed solid alliances with its Western partners in NATO and cultivated key


* Robert O. Work and Greg Grant, Beating the Americans at Their Own Game: An Offset Strategy with Chinese Characteristics, Center for a New American Society, 2019, https:// s3.amazonaws.com/files.cnas.org/documents/CNAS-Report-Work-Offset-final-B.pdf ?mtime=20190531090041.

Beating the Americans at their Own Game

An Offset Strategy with Chinese Characteristics


Authors: Robert O. Work and Greg Grant


CNAS    1/2


About the Authors

ROBERT O. WORK is the Distinguished  Senior Fellow for Defense and National Security at the Center for a New American Security and the owner of TeamWork, LLC, which specializes in national security affairs and future of warfare. Mr. Work. previously served as the Deputy Secretary of Defense, where he was responsible for overseeing the day-to-day business of the Pentagon and developing the department's $600 billion defense program. He is widely credited for his work with leaders in the department and the intelligence community on the "Third Offset Strategy," which aimed to restore U.S. conventional overmatch over its strategic rivals and adversaries. He was awarded DoD's Distinguished Public Service Award (twice), the National Intelligence Distinguished Public Service Award, and the Chairman of Joint Chiefs of Staff Joint Distinguished Civilian Service Award.


GREG GRANT is an Adjunct Senior Fellow for the Defense Program at the Center for a New American Security (CNAS). He brings eight years of experience working in the Department of Defense in addition to several years working as a journalist covering the wars in Iraq and Afghanistan. In his current role, he is a Senior Principal at MITRE's National Security Sector focused on the operational implications of emerging technologies and their impact on the changing character of warfare. Previously, he was Senior Director of Strategy at Defense Innovation Unit Experimental (DIUx). He also served as Special Assistant to Deputy Secretary of Defense Robert Work helping him develop the department's "Third Offset Strategy."


Acknowledgments

The authors would like to extend a special thanks to Susanna Blume for her tireless work in helping to get this report over the finish line. The authors would also like to thank Elbridge Colby, Loren DeJonge Schulman, Christopher Dougherty, Dr. Frank Hoffman, and anonymous reviewers for their helpful feedback on portions of this report. They would also like to thank Adam Routh, Molly Parrish, and Yashar Parsie for editing and designing the report. The statements made and views expressed are solely those of the authors. Any errors of fact, omission, or interpretation are the author's alone. CNAS does not take institutional positions.


About the Defense Program

Over the past 10 years, CNAS has defined the future of U.S. defense strategy. Building on this legacy, the CNAS Defense team continues to develop high-level concepts and concrete recommendations to ensure U.S. military preeminence into the future and to reverse the erosion of U.S. military advantages vis-à-vis China, and to a lessera extent Russia. Specific areas of study include concentrating on great-power competition, developing a force structure and innovative operational concepts adapted this more challenging era, and making hard choices to effect necessary change.


Introduction


During the Cold War, the U.S. military relied on technological superiority to "offset" the Soviet Union's advantages in time, space, and force size. Our military-technical edge allowed the U.S. Joint Force to adopt force postures and operational concepts that largely compensated for the Soviet military's numerical conventional advantage without needing to match it man-for-man or tank-for-tank. After the Cold War ended, this same military-technical advantage provided the U.S. military a decisive conventional overmatch against regional adversaries for over two decades.


Now, however, the "rogue" regional powers that have preoccupied U.S. attention for so long have been replaced by two great powers with substantially greater capabilities. A resurgent and revanchist Russia and a rising, increasingly more powerful China are taking aggressive actions that threaten regional security and stability and challenge the existing international order. Without question, of these two great-power competitors, China poses the greater challenge over the long term. Since about 1885, the United States never has faced a competitor or even group of competitors with a combined Gross Domestic Product (GDP) larger than its own. China surpassed the United States in purchasing power parity in 2014 and is on track to have the world's largest GDP in absolute terms by 2030. In comparison, our Cold War adversary, the Soviet Union, was hobbled by unsustainable economic contradictions that ultimately crumbled under pressure. At the height of its power, its GDP was roughly 40 percent the size of the United States'.¹

GDP (current US$ in trillions)¹

United States = USD$19 trillions 

China = USD$12 trillions 


The United States has not faced a competitor with a GDP greater than 40 percent of its own since 1885.² According to 2017 figures, China's economy measured roughly 63 percent of the U.S. economy when comparing GDP.³

If that is not concerning enough for U.S. strategic planners, Chinese technological capabilities are growing as rapidly as its economic power. The Soviets were never able to match, much less overcome, America's technological superiority. The same may not be true for China-certainly not for lack of trying. Indeed, China is keenly focused on blunting the U.S. military's technological superiority, even as it strives to achieve technological parity, and eventually technological dominance.


Chinese strategists do not explicitly describe their aims in this manner. Nevertheless, after considering what the Chinese military has accomplished technologically in little more than two decades and what they plan to do in the decades to come, any objective assessment must at least consider the possibility that the U.S. Joint Force is close to becoming the victim of a deliberate, patient, and robustly resourced military-technical offset strategy. The purpose of this paper is to describe this strategy and outline its key lines of effort.


Chinese technological capabilities are growing as rapidly as its economic power. The Soviets were never able to match, much less overcome, America's technological superiority. The same may not be true for China.


U.S. Cold War Offset Strategies


Since World War II, the United States has relied on a decisive edge in the military-technical balance to offset the numerical advantage in conventional forces often enjoyed by its adversaries and competitors. This preference grew out if its experience fighting the Axis powers. Dwight Eisenhower put it well, saying shortly after World War II, "While some of our Allies were compelled to throw up a wall of flesh and blood as their chief defense against the aggressors' onslaught, we were able to use machines and technology to save lives."⁴ With respect to state-on-state warfare, a military-technical advantage contributes to a comfortable conventional military overmatch at the tactical and operational levels of war. And the stronger the perceived conventional overmatch, the stronger one's conventional deterrence posture. Having a decisive overmatch is especially important when confronting nuclear-armed great powers, where a weakened conventional deterrence coulda prompt more aggressive strategic probing that might lead to an overt confrontation, with the attendant risks of nuclear escalation.


During the Cold War, the Soviet Union pursued a deterrent approach reliant on overwhelming numbers in conventional forces, embodied in the old military adage that "quantity has a quality all of its own." But from the outset of the Cold War, President Eisenhower refused to pay the economic penalty associated with trying to match the Soviet Union man-for-man or tank-for-tank. Instead, Ike* (the given name or nickname for Dwight D. Eisenhower (1890-1969)   leaned on his World War II experience-as well as the early U.S. nuclear monopoly-to confront Soviet conventional numerical superiority with a smaller military armed with missiles, rockets, and artillery shells tipped with low-yield atomic warheads. In other words, Eisenhower turned to battlefield atomic weapons to deter a Warsaw Pact conventional attack.⁵ This was America's first Cold War Offset Strategy.


By the early 1970s, the deterrent power of the First Offset Strategy was being undermined by two developments. The first was that the Soviet Union's nuclear arsenal was every bit as powerful as that of the United States. Under these circumstances, early use of tactical nuclear weapons was no longer a credible threat; the danger of nuclear escalation was simply too great. Second, during the 1960s and 1970s the Soviets modernized their already numerically superior conventional assault forces arrayed along the inter-German border, adding thousands of new tanks, armored personnel carriers, air-defense missiles, aircraft, and artillery that were qualitatively equal to their NATO counterparts.

The late Secretary of Defense Harold Brown (pictured here), together with Director for Defense Research and Engineering William Perry, recognized in the 1970s the need for a Second Offset Strategy, which centered around the revolution in precision-guided conventional munitions. (Department of Defense)


Secretary of Defense Harold Brown and William Perry, his Director for Defense Research and Engineering, therefore concluded NATO's deterrent posture eroding, and drastic action was needed to restore it. One idea was to attack and reduce the massed Warsaw Pact tank armies before they reached NATO's front-line defenses, making it more likely those defenses could hold. Brown and Perry thus looked to several emerging technologies then under development to give the U.S. Joint Force and its NATO allies the ability to "look deep and shoot deep." The result of these efforts is now referred to as the Second Offset Strategy.⁶


The Second Offset Strategy was the offspring of the Pentagon's Long-Range Research and Development Planning Program (LRRDPP). After considering and rejecting a new family of nuclear weapons and studying the use of conventional guided munitions in Vietnam and the Middle East, the members of the LRRDPP concluded that the United States should pursue conventional weapons capable of "near zero miss." Their report was complemented by a 1976 Defense Science Board study that proposed developing a "deep strike system" able to target and attack Warsaw Pact forces still far from NATO front lines with conventional guided munitions dispensing tank killing sub-munitions.⁷


U.S. AIR FORCE

Airborne targeting radar, such as that provided by the E-8 Joint Surveillance Target Attack Radar System, underwrote the Second Offset Strategy's deep strike kill chain. (Defense Advanced Research Projects Agency) 1991 . Details here .

Watch video here 


In 1978, Perry directed the Defense Advanced Research Projects Agency (DARPA) to integrate the various deep strike technologies and demonstrate their battlefield potential. The resulting "Assault Breaker" program combined the Pave Mover airborne targeting radar, missiles, and air-delivered bombs with guided anti-armor submunitions, and a ground-based data processing station that linked the two. The data processing or "attack coordination center" was derived from the joint services' developmental Battlefield Exploitation and Target Acquisition (BETA) project-an early attempt to demonstrate the feasibility of processing tactical battlefield information, fusing it into actionable intelligence, and passing accurate targeting information in near-real time to Army missile attack units.⁸


All these components came together in 1982, when Assault Breaker demonstrated on a small scale what U.S. force designers now refer to as an operational battle network employing conventional guided munitions. And, as historian Norman Friedman noted, Assault Breaker was nothing less than a disaster for Soviet strategists who now "believed that their American rivals were scientific magicians; what they said they could do, they could do." The Soviet General Staff concluded the appearance of operational battle networks that employed guided munitions- what they called reconnaissance-strike complexes-had triggered a new military-technical revolution. In this new warfighting regime, accurately directed conventional guided munitions could achieve battlefield effects comparable with tactical nuclear weapons. Its emergence thus helped strengthen NATO's conventional deterrence and end the Cold War without the need for a major NATO force buildup. As Brown put it: "[the U.S.] is better at technology than we are at mass."¹⁰ 

Thankfully, the U.S. military never had to test this proposition in an all-out battle against Soviet forces in Europe. But it did demonstrate the potential power of a guided munitions battle network against a capable Iraqi Army equipped with Russian and Chinese weapons and trained in Soviet doctrine. During Operation Desert Storm in 1991, Iraqi heavy formations were virtually reduced to an array of targets and aim-points waiting to be serviced. The 100-hour ground war that followed five weeks of aerial bombardment with both guided and unguided munitions was a rout. And even though only 8 percent of all conventional weapons employed in battle by the United States were guided, armies the world over immediately grasped that a new military paradigm had emerged-and the U.S. Joint Force had a powerful conventional warfighting advantage that would be hard to duplicate, much less match in scope and scale.


After the fall of the Soviet Union, the Second Offset Strategy served the U.S. military well; it afforded the Joint Force a dominant conventional overmatch over any potential regional opponent for more than two decades. But the nature of strategic competitions is that serious competitors do not simply cede military advantage to their rivals. This is especially true of emerging and great powers, which understood if they were to compete against U.S. operational battle networks they would have to develop a counter to them first, and then develop reconnaissance-strike complexes of their own. That is exactly what China, determined to break from its status as a second-rate military power, set out to accomplish.


A U.S. F-14A Tomcat aircraft flies over an oil well fire set by retreating Iraqi troops during Operation Desert Storm. The brief ground war demonstrated the might of U.S. operational battle networks to both the U.S. Joint Force and its adversaries. (Lt. Steve Gozzo, Department of Defense)


A PLA parade commemorates the force's 90th anniversary in September 2017. The PLA's massive modernization programs seek to counter U.S. technological advantages. (Defense Intelligence Agency) Watch video here . [The 2017 PLA Day parade was a military parade at Zhurihe Training Base in Inner Mongolia, on 1 August 2017 to celebrate the 90th anniversary of founding of the People's Liberation Army and the Nanchang uprising that caused its founding. ]


An Offset Strategy with Chinese Characteristics

Although China was a de facto strategic partner of the United States during the latter two decades of the Cold War, the collapse of the Soviet Union automatically made the United States the pacing strategic threat for Chinese military planners. Soon thereafter, in 1993, with America's impressive demonstration of military might in Desert Storm fresh in mind, President Jiang Zemin directed the People's Liberation Army (PLA) to prepare to fight "local wars under high technology conditions."" He did not have to name the country that represented the most likely potential adversary; the recent stunning results of Desert Storm made that plain.


Planning for local wars under high technology conditions would be shaped by two key assumptions, First, the wars would be limited in geographic scope, duration, and objectives. Second, the wars would be dominated by high-technology weaponry, particularly by guided weapon attacks like those demonstrated during Desert Storm. The implications of these two assumptions focused the subsequent development of PLA strategy and doctrine on short, intense, highly destructive wars. And a key lesson China took from the 1991 Desert Storm campaign was to strike hard and fast during war's earliest stages, as initiative once lost would be all but impossible to regain against an opponent capable of 24-hour, all weather guided munitions bombardment.²

From the very beginning, then, although not referred to in such a way, the Chinese decided to develop an offset strategy with Chinese characteristics. Instead of pursuing an offset to counter U.S. numerical advantages, it would instead aim to offset the American technological advantage in some way. These plans were given new urgency due to American actions early in the post Cold War era. In 1996, in response to Chinese missile tests over and into the waters surrounding Taiwan, the United States assembled the biggest naval show of force in the Western Pacific since Vietnam. It sent two carrier battle groups steaming through the Taiwan Strait, demonstrating in vivid fashion that the Chinese were incapable of even tracking U.S. naval surface groups, let alone possessing the means to stop a U.S. intervention to defend Taiwan.³ Then, on 7 May 1999, during the NATO bombing campaign against Serbia, the US. forces dropped five guided bombs on the Chinese embassy in Belgrade, killing three Chinese citizens and wounding another 20. The United States apologized for the incident, saying it had provided the bombs with incorrect coordinates. The Chinese rejected the apology, believing U.S. joint battle networks incapable of making such a mistake.¹⁴ 

Both national humiliation and anger caused Chinese leaders to accelerate their plans to offset the U.S. military-technical advantage. But the events in the Taiwan Strait and over Yugoslavia underscored to Chinese military planners just how far they had to go before they could hope to face the U.S. Joint Force on equal footing. Their sensor grids were incapable of long-range targeting; their command, control, communications, and intelligence (C3I) grids were incapable of sensor fusion and directing effects-based operations; and their effects grids relied almost entirely on unguided or unsophisticated guided weapons.¹⁵ Fixing all these problems would take time.


 ●YearMilitary expenditure (current USD in billions)

●1990 — $15 b

●1995 —$ 20 b

2000 —$ 30 b

2005 —$ 50 b

2010 —$ 120 b

●2015 —$ 222 b

●2017 —$ 235 b


PRC Defense Expenditures¹⁶

Annual Chinese defense spending jumped by at least 620 percent in real terms between 1996 and 2015 - an average annual increase of 11 percent.


With the benefit of hindsight, then, it seems evident a critical aspect of China's offset strategy was the recognition in the mid-1990s by PLA senior leadership that they were engaged in a long-term military-technical competition with the United States, and their strategic aims would necessarily be achieved through a series of distinct temporal phases:

■ Phase One would see the Chinese military compete with the United States from a position of technological inferiority. Chinese military writings in the late 1990s and early 2000s explored and emphasized ways to defeat a more technologically advanced adversary, until such time that their modernization efforts were able to narrow the advantages enjoyed by the U.S. military. In particular, the PLA would have to accommodate some period of time in which it lacked "deep and multi- directional strike capabilities" comparable to those of the U.S. military.¹⁷


■ Phase Two would occur when the Chinese achieved a position of rough technological parity in guided munitions and battle network warfare, making it far more likely China might be able to deter a U.S. military intervention in the East Asian littoral.


■And Phase Three would represent the desired end state, when the Chinese military would establish a position of outright technological superiority over U.S. military forces, enabling the PLA to confidently move out of its first island chain bastion and push U.S. forces out to the second island chain and even beyond.


The temporal phasing of China's military-technical offset strategy would be supported by a sustained, robust increase in Chinese military spending. Annual Chinese defense spending jumped by at least 620 percent in real terms between 1996 and 2015 - an average annual increase of 11 percent.¹⁸ Such a massive increase in military spending was bound to translate into real improvements in military capability and capacity. But these improvements proved strikingly more effective because the PLA's prioritization of approaches, systems and forces were shaped and guided by a disciplined and coherent military-technical offset strategy. The focus of that strategy was to dramatically raise the costs to the United States of intervening in Chinese military operations in the Western Pacific so that Washington would deem such action prohibitive. In this regard, an analysis of the precise investments made by the PLA since 1996 suggests China's offset strategy has five reinforcing lines of effort. These are:

■ Industrial and technical espionage and civil-military fusion to rapidly acquire comparable military capabilities to those developed over decades by the United States so that the PLA could compete operationally on something approaching an even footing. 

■ Developing the capabilities and concepts to conduct "systems destruction warfare," -the crippling of the U.S. battle network's command, control, communication, and intelligence systems.

■ Attacking effectively first by amassing an arsenal of long-range precision missiles and advanced targeting systems that provide a high probability of penetrating U.S. battle network defenses in the opening stages of a conflict.

■ Developing "Assassin's Mace" capabilities-what DoD terms "black capabilities"-that are held in reserve until unveiled in the event of war, to surprise the adversary with attacks from unexpected vectors.


Becoming the world leader in artificial intelligence and then deploying that technology for military superiority.


The following sections address each of these lines of effort in turn.


Industrial and Technical Espionage and Civil-Military Fusion


The central aim of the Chinese offset strategy was to catch up with the United States in the technological competition as quickly as possible. This goal established the foundation for all Chinese offset efforts: industrial and technical espionage.


As a recent report on Chinese industrial espionage stated, this leg of the Chinese offset strategy would be a "deliberate, state-sponsored [effort] to circumvent the costs of research, overcome cultural disadvantages and 'leapfrog' to the forefront by leveraging the creativity of other nations.¹⁹ Senior U.S. government officials recently reported that the Chinese penetrated the network of a U.S. defense contractor and recovered a trove of sensitive data on U.S. Navy undersea warfare capabilities.²º This is just the latest instance of one of the most widespread, relentless, and successful industrial and technological espionage programs in history. Espionage efforts are both supported and exploited by a process identified in Chinese writings as "civil-military fusion," whereby Chinese officials work to routinize licit and illicit transfers of technology for military applications through academic and commercial interactions with the United States and other technologically advanced Western states. As the U.S. State Department reported, since 2009, this effort has accelerated and is now a "whole-of-nation, national-level strategy to 'fuse' the Chinese military and civilian industrial complexes, from top to bottom."²¹


Chinese leaders are forthright about the aims of these efforts. Speaking to China's civil-military fusion, a State Department official recently said:


Driving this enormous effort is an acute Chinese perception that their country's 19th century downfall resulted from falling behind along the technology and doctrinal curves that defined the "revolutions in military affairs" (RMA) that dominated and shaped warfare across the 20th century . China is determined not to be left behind in the next RMA, which Chinese officials believe to be already under way.²²


In other words, Chinese leaders see industrial and technical espionage and civil-military fusion as the key means to jump-start Chinese technical advancements, without having to invest in costly R&D of new technologies. In this regard, studies have concluded that the time to move from a prototype to a fielded system takes about the same time in both China and the United States. For equivalent systems, however, industrial and technical espionage has helped the Chinese military reduce the time and money spent going from concept to research and development and prototyping. As a result, illicit transfers of cutting-edge technology, reverse engineering, and civil-military fusion have enabled the Chinese to field advanced technical capabilities much faster than U.S. intelligence agencies originally expected.²³ It's no coincidence that the PLA's newest front-line fighters mimic design features of the U.S. built F-22 Raptor or F-35 Lightning II, or that some of their unmanned aerial vehicles are the spitting image of the Predator and Reaper drones. In effect, by stealing and exploiting U.S. and Western technical secrets, they have been able to level the technological playing field with the U.S. Joint Force, in some key military capabilities, in little less than two decades-a relative blink of an eye in a peacetime, long-term strategic competition.²⁴


Illicit technology transfers and civil-military fusion have enabled China's rapid technological advances, including in fifth generation aircraft such as the Chengdu J-20. (Sino Defence)

Chengdu J-20 Vs. F-35 Lightning II Comparison, BVR & Dogfight (Who Wins) here  

Earlier this year, a Chinese paper claimed that its 5th-generation stealthy J-20 aircraft is superior to the US F-35, based on comments from an Air Force general following an incident in which US-35s had “close contact” with the Chinese fighter over the East China Sea.
0 of 2 minutes, 50 seconds
 Earlier this year, a Chinese paper claimed that its 5th-generation stealthy J-20 aircraft is superior to the US F-35, based on comments from an Air Force general following an incident in which US-35s had “close contact” with the Chinese fighter over the East China Sea.

J-20 vs. F-35

The Chinese government-backed 

Global Times newspaper describes 

an incident wherein the J-20 and 

F-35 flew in close proximity to one 

another as part of routine People’s 

Liberation Army exercises in the 

region. 

The paper quotes comments from 

Air Force Gen. Kenneth Wilsbach, 

Commander of US Pacific Air 

Forces, saying the US pilots were 

“impressed” with the J-20. The 

US general’s quote reportedly 

came from an online event 

broadcast on youtube, the paper 

says.

“We got relatively close to the J-20s 

along with our F-35s in the East 

China Sea, and we’re relatively 

impressed with the command and 

control that was associated with 

the J-20,” Wilsbach reportedly said, 

according to the Chinese paper.

Wilsbach also reportedly said the 

Chinese pilots were “flying the 

J-20s pretty well,” according to 

the paper.

However, when placed in a more 

complete context, Wilsbach’s 

comments are by no means 

unusual, as senior Air Force and 

Pentagon leaders often point out 

the technological abilities of 

Chinese weapons systems as part 

of a vital need to ensure continued 

US modernization. 

F-35s

F-35s

However, this by no means indicates 

that the Chinese 5th-generation 

aircraft actually outperforms or even 

rivals an F-35. Apart from the J-20s 

visible external configuration, and 

many Chinese press reports about 

its improved domestically-built 

engine and fast-improving 

performance, there may be little 

known information about the PLA 

aircraft’s mission systems, 

computing, sensors or weapons 

interfaces. 

Clearly its stealth exterior would 

suggest it may be an F-35 and F-22 

“copycat” in terms of its blended 

wing-body and rounded fuselage. 

However, apart from its apparent 

stealth properties, any true margin of 

difference between the two aircraft 

would likely reside in less visible 

technological variables such as 

sensor range and fidelity, on board 

data processing and weapons 

targeting precision, among other 

things.

Two J-20 fighters breaking formation

Two J-20 fighters breaking formation

Should Wilsbach’s comment about 

the J-20s command and control be 

accurate, that does introduce an 

interesting and rare window of 

observation into perhaps previously 

unknown elements of the J-20. If in 

fact the Chinese aircraft appeared to 

maneuver with an effective 

command and control system, that 

would indicate that perhaps at least 

some of the J-20s mission systems 

and computing are effective.

At the same time, it seems important 

to point out that regardless of 

potentially being “impressed” with 

the J-20 and its flying, Wilsbach 

offered no input or comment 

regarding the question as to whether 

he thinks the Chinese 5th-generation 

aircraft in anyway resembles the 

F-35.

 Nonetheless, China claims its 

fifth-generation, stealthy J-20 fighter 

jet is now taking yet another 

massive step toward war 

preparedness by flying in what 

could be referred to as “full stealth” 

mode.

A report from the Chinese-

government backed Global Times 

says the J-20 was “spotted” flying 

without a Luneburg lens, a small 

device used to intentionally expose a 

stealth aircraft to others in 

situations like training or 

non-combat flights.

Does this mean the aircraft has 

taken new steps toward combat and 

operational “readiness?” 

Furthermore, just how stealthy is it?

J-20 & F-22: Wingspan, Speed & 

Weapons

The Chinese J-20 certainly appears 

slightly larger than an F-22 or F-35 

stealth jet fighter, given its dual wing 

configuration, an engineering 

method employed to optimize air 

flow and achieve improved 

aerodynamic performance. 

While the wing configurations of a 

J-20 and F-22 are decidedly 

different, the J-20 fuselage itself 

appears to resemble that of an F-22 

with two engine exhaust and 

blended, curved or rounded main 

body exterior.

What would it mean to truly rival or 

surpass the F-22 stealth fighter? 

Now that the J-20 has been flow in 

full stealth capacity and modified 

slightly with the integration of a new 

engine, some might wonder if the 

Chinese aircraft could achieve any 

kind of “supercruise” capability that 

has—so far—been unique to the F-22.

The F-22 has a forty-four-foot wing

span and is, at certain high altitudes, 

able to hit speeds as fast as Mach 

2.25. Various data spec sheets and 

articles cite that, by comparison, a 

J-20 is several meters longer but 

built with a similar 44-ft wingspan. 

The articles, in Air Force Technology 

and The National Interest say the 

J-20 can reach speeds of Mach 2.55. 

It is unsure if this is confirmed per se 

and speed metrics don’t necessarily 

translate into maneuverability or 

sustained speed.



 

Video Above: Air War 2050: 

5th & 6th Gen Stealth Fighter 

Attacks to Continue

Regardless of a J-20’s speed, a key 

F-22 advantage is that it not only 

can reach supercruise speeds but 

also sustain them as well without 

needing afterburners, a major 

technical enhancement. Also, a 

slightly shorter, sleeker, and more 

streamlined fuselage, coupled with 

potentially unmatched levels of 

propulsion, thrust, and high-speed 

maneuverability, could very well give 

the F-22 a decisive advantage.

The F-22 is also armed with 

massively upgraded weapons such 

as the now software-enhanced 

AIM-120D and AIM-9X air-to-air and 

air-to-ground or surface weapons. 

Ultimately, the F-22’s advantage may 

reside in its often discussed role as 

an “aerial quarterback,” described by 

innovators as an ability to exchange 

real-time, two-way information amid 

warfare with both fourth-generation 

and fifth-generation American and 

allied warplanes

The Chinese People’s Liberation 

Army Air Force plans to continually 

modify the engine of their J-20 5th 

Gen stealth fighter to the point 

wherein it can match, rival, or 

potentially out-perform the U.S. F-22.

J-20 & F-22 Engines

Many U.S. engineers and military 

leaders maintain that the speed, 

maneuverability, technological 

sophistication and performance 

specs of the F-22 are simply 

unparalleled, yet many of course are 

acutely familiar with China’s fast-

growing technological sophistication.

A report months ago in the South 

China Morning Post quotes an 

unspecified “military insider” (seems 

to indicate a Chinese military insider) 

explaining that the Chinese military 

will no longer use the Russian 

AL-31F engine in its J-20 but rather 

replace it with the WS-10C, a 

modified version of its domestically-

built WS-10 engine.

“It’s impossible for China to rely on 

the Russian engine, because Russia 

asked China to purchase more Su-35 

fighter jets in exchange for the 

AL-31F engine deals,” the insider, 

who requested anonymity, said in the 

paper. “The key problem is – except 

for its longer combat range 

advantage – the radar, navigation 

system and other electronic 

components on the Su-35s are 

inferior to Chinese aircraft like the 

J-16 strike fighter.”

Interestingly, the modifications to the 

Chinese WS--10 do not, according to 

the insider, go far enough.

“The air force (presumably Chinese

is not happy with the final results, 

demanding that engine technicians 

modify it until it meets all standards, 

for example matching the F119 

engine used by the Americans’ 

F-22 Raptor,” the South China Sea 

Morning Post writes.

What would it mean to truly rival or 

surpass the F-22? Does this indicate 

that the emerging, or soon to 

emerge, modified Chinese engine 

would achieve an F-22-like 

“supercruise” ability to sustain Mach 

speeds for long periods of time 

without afterburners? Does it mean 

it can vector and maneuver in a 

manner somewhat analogous to 

an F-22?

J-20 & F-35 Fuselage

Well that may not be fully known, yet 

it seems there are a few things that 

can be observed; the J-20 fuselage, 

with its double-wing configuration, 

may be somewhat stealthy, yet it 

does appear larger and somewhat 

less maneuverable than a more 

streamlined F-22 fuselage.

The F-22 has a 44-ft wingspan and 

is, at certain high altitudes, able to 

hit speeds as fast as Mach 2.25. 

Various media reports cite that, by 

comparison, a J-20 is several meters 

longer but built with a similar 44-ft 

wingspan; the reports, from Air Force 

Technology and The National Interest 

say the J-20 can reach speeds of 

Mach 2.55.

Scroll to Continue


Chinas_Chengdu_J-20_and_FC-31_Fighter_Jets_Emerge_as_Rivals_to_US_F-35_in_Military_Aviation_Advancement_1920_001-260675bd

China Names FC-31 Carrier-Launched 

"Gyrfalcon" 5th-Gen Stealth Jet to Rival 

US Navy F-35C

china-navy-confirms-carrier-conducted-drills-in-south-china-sea-620x375

China, Russia Wrap Up Live-Fire Drills in 

South China Sea

USS Ronald Reagan

The US-Philippines Alliance in the 

South China Sea

Not sure if this can be or is 

confirmed per se, and speed metrics 

don’t necessarily translate into 

maneuverability or sustained speed.

A key F-22 advantage is that it not 

only can reach those speeds but can 

sustain them as well. Also, a slightly 

shorter, sleeker, and more 

streamlined fuselage, coupled with 

potentially unmatched levels of 

propulsion, thrust, and high-speed 

maneuverability, could very well give 

the F-22 a decisive advantage.

Weapons integration, sensor range, 

EW, and targeting are perhaps the 

most defining attributes likely to help 

distinguish which aircraft, the J-20 or 

F-22, would prevail in an air-to-air 

engagement or out-perform the 

other in combat.

An ability to see, attack, out-

maneuver, and destroy an enemy 

aircraft at further ranges and with 

more targeting precision and sensor 

fidelity would likely prove to perhaps 

be the most decisive factor in any 

combat engagement.

The F-22’s ongoing 3.2b software 

upgrade has produced 

now-operational weapons upgrades 

to the AIM-120D and AIM-9X air-fired 

weapons. The enhancements greatly 

improve targeting precision, 

accuracy, guidance systems, and 

range for the weapons, potentially 

bringing as-of-yet unseen combat 

advantages. Some of the 

enhancements to the weapons

perhaps of greatest significance, 

include anti-jamming RF 

technologies built to adjust 

frequency to sustain weapon 

targeting and thwart attempted 

jamming.

The real question then, is despite 

China’s known propensity for rapid 

technological advancements, does 

the J-20 have any kind of air-to-air 

thrust and maneuverability, 

supercruise sustained acceleration, 

or advanced sensors and weapons 

systems sufficient to rival an F-22?

J-20 Combat Threat

Regardless of its comparative status 

related to the F-22, the J-20 presents 

a wide-array of threats. Could the 

Chinese J-20 5th generation stealth 

fighter succeed in destroying crucial 

U.S. tankers, surveillance planes or 

airborne command posts?

The interesting question was posed 

by a London-based analyst cited in 

an article from Forbes magazine, 

raising the idea of whether such a 

prospect would, in fact, be true. The 

Forbes article makes the point that 

U.S. and allied air assets, at a deficit 

in terms of actual numbers, would 

rely heavily upon less stealthy 

surveillance assets such as an E-2D 

Hawkeye, Triton maritime drone or 

KC-46 tanker.

“In wartime, the People’s Liberation 

Army Air Force likely would sortie 

J-20s to fly through the clutter of 

raging air battles along the Chinese 

coast, in the hope that the Mighty 

Dragons might punch through to the 

open air space of the western Pacific 

Ocean,” the Forbes article states.

However, could this actually be 

possible? Most likely not for a 

range of possible reasons.

The analyst cited in the article, 

Justin Bronk with the London-based 

Royal United Service Institute, 

makes the point that J-20s would be 

outmatched in the air by U.S. F-22s 

deployed to challenge them.

Bronk writes that the J-20 “is a 

heavier, less agile aircraft that will be 

more expensive to build and operate. 

It also cannot compete with the 

extreme performance or agility of 

the F-22.”

Bronk makes what appears to be a 

valid point, as the J-20 does not 

appear by any estimation to operate 

with an ability to rival the U.S. F-22. 

However, what if there are not 

enough F-22s? Or they are not 

deployed in the right place at the 

right time? While the U.S. Air Force 

does have more than 180 F-22s, the 

F-22 production lines were 

truncated prematurely according to 

many observers and they certainly 

might not be in the right places at 

sufficient numbers in the event of 

war with China.

However, many Navy and Air Force 

war planners are exploring the idea 

of using F-22s to defend surface 

assets such as carriers, and Bronk’s 

point is strongly reinforced by the 

existence of the Navy’s emerging 

MQ-25 Stingray carrier launched 

re-fueler. Not only would this 

decrease the need for potentially 

vulnerable larger KC-46 tankers, but 

they could also massively extend the 

operational reach, and therefore 

dwell time, of F-22s looking to cover 

the seemingly endless expanse of 

the Pacific. The widely discussed 

“tyranny of distance” known to 

characterize the Pacific, making it 

essential to refuel assets such as an 

F-35C or F-22 needing to sustain 

operations well beyond ranges 

reachable without refueling in the air.

In the event that F-22 and F-35 

combat, attack, and defensive 

maneuvers were better enabled by 

sleek, fast, carrier-launched 

re-fuelers operating at sea in closer 

proximity to ongoing airwar, J-20s 

would be quite challenged to 

perform the missions envisioned by 

Bronk. Also, the Pentagon already 

operates some very stealthy drones 

and of course plans to operate even 

stealthier drones in the future, 

making forward surveillance more 

possible in hostile environments in 

which Chinese J-20s would try to 

attack reconnaissance drones.

J-20 & F-35 Design

Last year, an overhead satellite 

picture showed an interesting and 

significant view of the Chinese J-20 

stealth multi-role fifth-generation 

fighter, offering an informative view 

of the top of the fuselage.

The images can be seen in an 

overhead satellite picture 

published by The Aviationist.

The first thing that jumps out is the 

dual-wing configuration, meaning 

the aircraft has a short set of 

sloped, horizontal wings followed 

by larger structures aligning across 

the back end of the body. Perhaps 

this represents an effort to break 

up or smooth out the airflow 

passing on either side of the 

fuselage; airflow at high speeds 

can generate heat signatures 

potentially vulnerable to detection 

from enemy air defenses.

The F-35 and F-22by contrast, have

singular gradually sloped-horizontal

 wings. A shorter protruding, yet 

aligned or sloped wing, followed by 

longer wings, might represent an 

attempt to improve stealth 

performance.

A dual-wing formation could, it 

seems, interrupt the speed of the 

aerodynamic airflow on each side, potentially better managing 

temperature. Stealth properties can 

be optimized if temperatures 

emitting from or surrounding the 

aircraft align with or somewhat 

match the surrounding temperature,

 thereby concealing or removing 

thermal signature.


3 minutes, 22 seconds of 4 minutes, 37 seconds

03:21

 

The structure also includes the kind 

of conformal, blended wing-body 

shape of many fifth-generation 

fighters, complete with rounded 

back end exhaust emissions. 

Interestingly, the J-20 reveals a dual

-engine configuration, something 

which mirrors an F-22 as opposed 

to an F-35.

This may indicate an attempt to 

achieve an F-22-like supercruise 

technology that enables sustained 

speeds without needing an 

afterburner, something that helps 

expand mission time and improve 

aerial performance.

Also, the top of the J-20 has dual 

rounded “humps” that look nearly

identical to the top of an F-22. In 

contrast, the F-35 has a single 

rounded parabola like fuselage on 

top, whereas the J-20 and F-22 

reveal a flat upper fuselage blended 

into two separate rounded engine 

pathways. This kind of engineering 

might also be an effort to maximize 

maneuvering, vectoring and aerial 

dogfighting capabilities similar to 

those known to be possible with an 

F-22. 

All of this raises significant questions

 about various characteristics of the 

J-20, such as its speed, stealth

 performance and maneuverability. 

While much of the specifics of the 

J-20 could simply remain a mystery, 

the aircraft may not truly rival the 

F-22 or F-35, despite the apparent 

external similarities. After all, while 

a stealth fighter’s ultimate success 

is related to stealth configuration, 

its true margin of superiority may lie 

in its sensors, weapons, avionics, 

temperature management and 

internal construction.

Of course it is not yet clear just how 

many J-20s China will build, or how 

fast they plan to build them. 

Nonetheless, slower or smaller 

scale J-20 production by no means 

erases or largely minimizes the 

growing threat presented by 

China’s Air Force.

J-20 & F-35 Quantity

While debates and uncertainties 

continue to swirl around how agile, 

lethal, stealthy and advanced 

China’s J-20 stealth fighter may be, 

the country may simply have 

another challenge crippling its 

ability to rival the F-22 and F-35: 

There simply may not be enough 

J-20s.

Several interesting reports from last 

year cited production problems and 

delays with J-20 manufacturing, 

particularly centered around the 

J-20’s “high-thrust turbofan WS-15

 engine.” A report from the South 

China Morning Post says J-20 

engine work has “fallen behind 

schedule,” and that China was 

“thought to have built about 50 

J-20s by the end of 2019, but 

problems with the jets engines 

delayed production plans.”​

If China has in fact produced 50 or 

100 its highly touted J-20, that still 

falls way short of the U.S.’ current 

fleet of ready armed 5th Gen 

fighters. Lockheed statements 

given to The National Interest report 

that the firm has built and delivered 

195 F-22s, with 186 of them combat 

ready. Made by Lockheed Martin 

and Boeing, the F-22 uses two Pratt 

& Whitney F119-PW-100 turbofan 

engines with afterburners and two-

dimensional thrust vectoring 

nozzles, an Air Force statement said. 

It is 16-feet tall, 62-feet long and 

weighs 43,340 pounds. Its 

maximum take-off weight is 83,500; 

there is much interesting 

discussion comparing F-35 and 

F-22 engine thrust to China’s J-2 

engine. 


No comments: