Conditional scheme for the use of two aircraft carrier strike groups of the PLA Navy during a special military operation of the Chinese armed forces to seize Taiwan

In the diagram, in yellow – the arrangement of the AUG of the PLA Navy.

The composition of each AUG:
➖ 1 aircraft carrier;
➖ 2 destroyers URO Type 055;
➖ 3 destroyers URO Type 052D;
➖ 2 URO Type 054A frigates;
➖ 2 attack nuclear submarines of the new generation.
Air group:
➖ 16 Jian-15 fighters;
➖ 16 Jian-35 fighters;
➖ 6 Jian-15D fighters;
➖ 4 aircraft AWACS Kunjing-600;
➖ 6 Zhi-20 helicopters.

On the diagram in raspberry color – the arrangement of the US Navy AUG.

According to the plan: while China is conducting military operations in the Pacific Ocean, pulling on itself and blocking the actions of the US Navy units, the landing forces of the PLA are landing on the island of Taiwan.

In the diagram, in yellow – the arrangement of the AUG of the PLA Navy.

The composition of each AUG:
➖ 1 aircraft carrier;
➖ 2 destroyers URO Type 055;
➖ 3 destroyers URO Type 052D;
➖ 2 URO Type 054A frigates;
➖ 2 attack nuclear submarines of the new generation.
Air group:
➖ 16 Jian-15 fighters;
➖ 16 Jian-35 fighters;
➖ 6 Jian-15D fighters;
➖ 4 aircraft AWACS Kunjing-600;
➖ 6 Zhi-20 helicopters.

On the diagram in raspberry color – the arrangement of the US Navy AUG.

According to the plan: while China is conducting military operations in the Pacific Ocean, pulling on itself and blocking the actions of the US Navy units, the landing forces of the PLA are landing on the island of Taiwan.

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service