0 0
Read Time:1 Minute, 9 Second

On November 12, the Chinese armed forces sent 36 aircraft and 3 ships to the Taiwan area.

18 aircraft and 3 PLA UAVs flew over the “median line” and the southern part of the air defense identification zone in the Taiwan Strait:
➖ 10 Jian-16 fighters;
➖ 1 reconnaissance and strike UAV CH-4;
➖ 4 Jian-10 fighters;
➖ 1 reconnaissance UAV BZK-005;
➖ 1 anti-submarine aircraft Kunqian-200;
➖ 1 reconnaissance UAV BZK-007;
➖ 3 Hun-6K bombers.

Directions of actions of the PLA in the event of an amphibious offensive operation in the Taiwan direction
Legend:
➖ areas on the coast of China for landing;
➖ areas of concentration of landing units in the Taiwan Strait for further operations as part of a single formation;
➖ potential PLA landing sites on the coast of Taiwan.

During the flights, the issues of organizing air defense (air defense), reconnaissance of the activities of the Taiwanese armed forces and a conditional strike on important objects of the island were worked out.

According to our assessment based on the flights of the PLA aviation, the main blow (red circle in the diagram) in the event of the start of the Chinese NMD will be delivered along the southern coast of the island in order to ensure the safe landing of the landing units.

In the northern part of the Taiwan Strait, China is likely to conduct a diversionary maneuver.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence