7 septembre 2018 | International, Aérospatial, Naval, Terrestre, C4ISR

Pentagon Report Shows China’s Continually Modernizing and Growing Military Capabilities

By Dean Cheng

The Department of Defense has released the latest edition of its report on Chinese military and security developments.

Mandated in the fiscal 2000 National Defense Authorization Act, the annual report is an important source of regular updates regarding China's growing military capabilities and its expanding range of security-related activities.

Since the People's Republic of China halted the publication of its biennial defense white papers in 2015, there are few other good sources of information on one of the world's largest militaries.

An important element of this year's report is the expanded discussion of China's security-related activities, providing a broader, fuller assessment. There is an extensive discussion of China's Belt and Road Initiative, its array of investment projects previously known as the “One Belt, One Road Initiative,” stretching from China to Europe, into the Indian Ocean to Africa, and even across the Pacific to South America.

The report discusses the security implications of the Belt and Road Initiative, even though it is primarily a set of economic and political initiatives with limited direct military impact.

Ad Feedback

This more comprehensive analysis is important, as it captures the Chinese whole-of-society approach to national security. To understand Beijing's challenge to the U.S., it is vital to incorporate not only concerns about the People's Liberation Army and the Chinese government, but also consideration of its diplomatic and economic engagement globally.

This year's report also exemplifies why issuing an annual report is important. It highlights the various changes that have been undertaken since the announcement in December 2015 of a series of fundamental overhauls and reforms of the People's Liberation Army. It thus provides a new snapshot of the various improvements and changes in the Chinese military as it continues to modernize all of its services.

Much discussed, for example, has been the steady extension of the People's Liberation Army's reach. News reports emphasized that it is acquiring systems that will allow it to strike the United States.

The report also notes that “one of the most significant [Navy] structural changes in 2017” has been the tripling of the size of the Chinese marine corps. Coupled with China's first official overseas military base (in Djibouti), it is clear that China is expanding its force-projection capacity.

As important, however, have been the changes in the People's Liberation Army's organization and doctrine. This year's report devotes substantial discussion to the evolving organization of PLA Army forces, as well as changes in the Central Military Commission, which manages the overall military.

These changes are fundamental, but have taken the past two years to become much more visible. The shift from divisions as the cornerstone of China's ground forces to brigades had long been discussed, but only now is there sufficient evidence to gauge Beijing's progress.

The changes in the Central Military Commission structure have been even more complex. When the changes were first announced, the commission initially appeared to be expanding from four general departments to 15 departments, commissions, and offices.

It is now clear, however, that in fact the commission has shrunk, with only seven members, rather than the pre-reform 10. Of particular note is the removal of the Logistics Work and Equipment Development departments from the main Central Military Commission structure.

Full article: https://www.cnsnews.com/commentary/dean-cheng/pentagon-report-shows-chinas-continually-modernizing-and-growing-military

Sur le même sujet

  • Contract Awards by US Department of Defense - February 11, 2019

    12 février 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Contract Awards by US Department of Defense - February 11, 2019

    U.S. SPECIAL OPERATIONS COMMAND Institute of Applied Engineering Inc. (IAE), University of South Florida (USF), Tampa, Florida, was awarded an $85,000,000 maximum indefinite-delivery/indefinite-quantity contract (H92405-20-D-0001) in support of U.S. Special Operations Command (USSOCOM) for access to applied research and advanced technology development. USSOCOM will collaborate with IAE to conduct research, hardware and software development, test and evaluation, demonstration, prototyping, and limited system production. Additionally, IAE will facilitate access to USF education and training resources. The work will be performed in Tampa and is expected to be completed by Feb. 9, 2025. The contract was awarded through other than full and open competition. USSOCOM headquarters, Tampa, Florida, is the contracting activity. (Awarded Feb. 10, 2020) L3Harris Technologies Inc., Clifton, New Jersey, was awarded a $48,715,001 modification on an indefinite-delivery/indefinite-quantity, firm-fixed-price, cost-plus-incentive-fee, and cost reimbursable contract (H9224120D0001) for the Suite of Integrated Radio Frequency Countermeasures program for U.S. Special Operations Command (USSOCOM). This modification for program management, contractor logistics support, field service representatives and travel raises the contract ceiling to $50,000,000. The majority of the work will be performed in Clifton, New Jersey. This contract is a non-competitive award in accordance with Federal Acquisition Regulation 6.302.1. USSOCOM headquarters, Tampa, Florida, is the contracting activity. NAVY Tekla Research Inc.,* Fredericksburg, Virginia, is awarded an $82,999,168 cost-plus-fixed-fee, cost reimbursable, indefinite-delivery/indefinite-quantity contract. This contract provides test and evaluation engineering, prototyping, and integration of warfare systems into Navy aircraft and aviation systems. In addition, this contract provides developmental test and evaluation of lab, ground, and flight-testing of newly installed or developmental systems and/or modifications to fleet-deployed systems as well as data gathering to support potentially new systems, improve existing systems, and experimentation and testing of prototypes. Work will be performed in Patuxent River, Maryland (96.5%); China Lake, California (1%); Point Mugu, California (1%); Norfolk, Virginia (1%); and Lakehurst, New Jersey (0.5%), and is expected to be completed in March 2025. No funds will be obligated at the time of award. Funds will be obligated on individual orders as they are issued. This contract was a small business set-aside, competitively procured via an electronic request for proposal; two offers were received. The Naval Air Warfare Center Aircraft Division, Patuxent River, Maryland, is the contracting activity (N00421-20-D-0024). The Boeing Co., St. Louis, Missouri is awarded $19,271,301 for a firm-fixed-priced delivery order N00383-20-F-0AY0 under a previously awarded basic ordering agreement (N00383-18-G-AY01) for the repair of various avionics equipment used on the F/A-18 aircraft. Work will be performed in Lemoore, California (99%); and Philadelphia, Pennsylvania (1%). Work will be completed by December 2022. Annual working capital funds (Navy) in the full amount of $19,271,301 will be obligated at the time of award and funds will not expire at the end of the current fiscal year. One source was solicited for this sole-source requirement pursuant to the authority set forth in 10 U.S. Code 2304 (c)(1) and one offer was received. Naval Supply Systems Command Weapon Systems Support, Philadelphia, Pennsylvania, is the contracting activity. AIR FORCE Lockheed Martin Corp., Fort Worth, Texas, has been awarded a $67,584,243 firm-fixed-price, cost-plus-fixed-fee modification (PZ0010) to contract FA8615-16-C-6048 for upgrading F-16s for the government of Singapore. Work will be performed at Lockheed Martin Aeronautics, Fort Worth, Texas; and in Singapore. This contract is expected to be completed by June 30, 2023, and is a Foreign Military Sales acquisition for the government of Singapore. This contract was a sole-source acquisition, and the total cumulative face value of the contract is $1,008,584,243. The Air Force Life Cycle Management Center, Wright Patterson Air Force Base, Ohio, is the contracting activity. Cyber Systems & Services Solutions, Bellevue, Nebraska, has been awarded a $17,590,503 firm-fixed-price and cost-plus-fixed-fee modification (P0009) to contract FA8773-18-D-0002 to exercise Option II for Defensive Cyber Realization, Integration, and Operational Support (DCRIOS) services. Work will be performed at Joint Base San Antonio-Lackland, Texas, and is expected to be completed Feb. 28, 2021. This modification is the result of a competitive acquisition and seven offers were received. Fiscal 2020 operations and maintenance funds in the amount of $10,934,344.00 are being obligated at the time of award. The 38th Contracting Squadron, Joint Base San Antonio-Lackland, Texas, is the contracting activity. ARMY Great Lakes Dredge & Deck Co. LLC, Old Brook, Illinois, was awarded a $17,573,575 firm-fixed-price contract for maintenance dredging of Baltimore Harbor and York Spit Channel, Chesapeake. Bids were solicited via the internet with four received. Work will be performed in Chesapeake, Virginia, with an estimated completion date of Aug. 9, 2020. Fiscal 2020 cost-share and civil operations and maintenance funds in the amount of $17,573,575 were obligated at the time of the award. U.S. Army Corps of Engineers, Baltimore, Maryland, is the contracting activity (W912DR-20-C-0006). Safariland LLC, Casper, Wyoming, was awarded an $8,944,506 firm-fixed-price contract for a 12-gauge, direct-fire, low-hazard, non-shrapnel producing shell. Bids were solicited via the internet with one received. Bids were solicited via the internet with one received. Work locations and funding will be determined with each order, with an estimated completion date of Feb. 11, 2025. U.S. Army Contracting Command, New Jersey, is the contracting activity (W15QKN-20-F-0161). Midwest Construction Co.,* Nebraska City, Nebraska, was awarded a $7,310,007 firm-fixed-price contract for levee rehabilitation. Bids were solicited via the internet with one received. Work will be performed in Papillion, Nebraska, with an estimated completion date of Sept. 30, 2020. Fiscal 2019 civil flood control and coastal emergencies funds in the amount of $7,310,007 were obligated at the time of the award. U.S. Army Corps of Engineers, Omaha, Nebraska is the contracting activity (W9128F-20-C-0012). *Small business https://www.defense.gov/Newsroom/Contracts/Contract/Article/2081595/source/GovDelivery/

  • The new ways the military is fighting against information warfare tactics

    22 juillet 2020 | International, C4ISR

    The new ways the military is fighting against information warfare tactics

    Mark Pomerleau One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have. Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think. “At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February. One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns. Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics. U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.” Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield. “Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.” The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves. One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm. “Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.” The military has had to think differently to combat for how adversaries are operating. “A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.” These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases. For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites. “We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.” Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya. “U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.” Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will. Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall. According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance. With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do. Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking. “We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.” https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

  • Norway to buy six Sikorsky helicopters for $1.1 bln to monitor its seas

    14 mars 2023 | International, Aérospatial

    Norway to buy six Sikorsky helicopters for $1.1 bln to monitor its seas

    Norway's military plans to buy six Seahawk helicopters for 12 billion crowns ($1.14 billion) from Lockheed Martin's Sikorsky, the defence minister said on Tuesday, to boost its ability to monitor its vast seas and Arctic territory.

Toutes les nouvelles