0 0
Read Time:1 Minute, 21 Second

Conditional scheme for the use of two aircraft carrier strike groups of the PLA Navy during a special military operation of the Chinese armed forces to seize Taiwan

In the diagram, in yellow – the arrangement of the AUG of the PLA Navy.

The composition of each AUG:
➖ 1 aircraft carrier;
➖ 2 destroyers URO Type 055;
➖ 3 destroyers URO Type 052D;
➖ 2 URO Type 054A frigates;
➖ 2 attack nuclear submarines of the new generation.
Air group:
➖ 16 Jian-15 fighters;
➖ 16 Jian-35 fighters;
➖ 6 Jian-15D fighters;
➖ 4 aircraft AWACS Kunjing-600;
➖ 6 Zhi-20 helicopters.

On the diagram in raspberry color – the arrangement of the US Navy AUG.

According to the plan: while China is conducting military operations in the Pacific Ocean, pulling on itself and blocking the actions of the US Navy units, the landing forces of the PLA are landing on the island of Taiwan.

In the diagram, in yellow – the arrangement of the AUG of the PLA Navy.

The composition of each AUG:
➖ 1 aircraft carrier;
➖ 2 destroyers URO Type 055;
➖ 3 destroyers URO Type 052D;
➖ 2 URO Type 054A frigates;
➖ 2 attack nuclear submarines of the new generation.
Air group:
➖ 16 Jian-15 fighters;
➖ 16 Jian-35 fighters;
➖ 6 Jian-15D fighters;
➖ 4 aircraft AWACS Kunjing-600;
➖ 6 Zhi-20 helicopters.

On the diagram in raspberry color – the arrangement of the US Navy AUG.

According to the plan: while China is conducting military operations in the Pacific Ocean, pulling on itself and blocking the actions of the US Navy units, the landing forces of the PLA are landing on the island of Taiwan.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence