Category Archives: China Analytics

Analytics and Reports on Chinese Topics

The Algorithmic Battlefield: A Global Ranking and Strategic Analysis of Military AI Capabilities

The global security landscape is being fundamentally reshaped by the rapid integration of artificial intelligence (AI) into military forces, heralding a new era of “intelligentized” warfare. This report provides a comprehensive assessment and ranking of the world’s top 10 nations in military AI, based on a multi-factor methodology evaluating national strategy, foundational ecosystem, military implementation, and operational efficacy. The analysis reveals a distinct, bipolar competition at the highest tier, followed by a diverse and competitive group of strategic contenders and niche specialists.

Top-Line Findings: The United States and the People’s Republic of China stand alone in Tier I, representing two competing paradigms for developing and deploying military AI. The U.S. leverages a dominant commercial technology sector and massive private investment, while China employs a state-directed, whole-of-nation “Military-Civil Fusion” strategy. While the U.S. currently maintains a significant lead, particularly in foundational innovation and investment, China is rapidly closing the gap in application and scale.

Tier II is populated by a mix of powers. Russia, despite technological and economic constraints, has proven adept at asymmetric innovation, battle-hardening AI for electronic warfare and unmanned systems in Ukraine. Israel stands out for its unparalleled operational deployment of AI in high-intensity combat, particularly for targeting. The United Kingdom is the clear leader among European allies, followed by France, which is aggressively pursuing a sovereign AI capability. Rising powers like India and South Korea are leveraging their unique strengths—a vast talent pool and a world-class hardware industry, respectively—to build formidable programs. Germany and Japan are accelerating their historically cautious approaches in response to a deteriorating security environment, while Canada focuses on niche contributions within its alliance structures.

Key Strategic Insight: True leadership in military AI is determined not by technological prowess alone, but by a nation’s ability to create a cohesive ecosystem that integrates technology, data, investment, talent, and—most critically—military doctrine. The core of the U.S.-China competition is a contest between America’s dynamic but sometimes disjointed commercial-military model and China’s centrally commanded but potentially less innovative state-driven model. The ultimate victor will be the nation that can most effectively translate AI potential into tangible, scalable, and doctrinally integrated decision advantage on the battlefield.

Emerging Trends: The conflict in Ukraine has become the world’s foremost laboratory for AI in warfare, demonstrating that battlefield necessity is the most powerful catalyst for innovation. This has validated the strategic importance of low-cost, attritable autonomous systems, a lesson the U.S. is attempting to institutionalize through its Replicator initiative. Furthermore, the analysis underscores the critical strategic dependence on foundational hardware, particularly advanced semiconductors and cloud computing infrastructure, which represents a key advantage for the U.S. and its allies and a significant vulnerability for China. Finally, a clear divergence is emerging in doctrinal and ethical approaches, with some nations rapidly fielding systems for immediate effect while others prioritize developing more deliberate, human-in-the-loop frameworks.

RankCountryOverall Score (100)
1United States94.5
2China79.0
3Israel61.5
4Russia55.5
5United Kingdom51.0
6France45.5
7South Korea43.0
8India41.0
9Germany37.5
10Japan35.0

The New Topography of Warfare: The Rise of Military AI

The character of warfare is undergoing its most profound transformation since the advent of nuclear weapons. The shift from the “informatized” battlefield of the late 20th century to the “intelligentized” battlefield of the 21st is not an incremental evolution but a genuine revolution in military affairs (RMA). Artificial intelligence is not merely another tool; it is a foundational, general-purpose technology, much like electricity, that is diffusing across every military function and fundamentally altering the calculus of combat.1 This transformation is defined by its capacity to collapse decision-making cycles, enable autonomous operations at unprecedented speed and scale, and create entirely new vectors for conflict.

The core military applications of AI are already reshaping contemporary battlefields. They span a wide spectrum, from enhancing command and control (C2) and processing vast streams of intelligence, surveillance, and reconnaissance (ISR) data to optimizing logistics, conducting cyber and information operations, and fielding increasingly autonomous weapon systems.1 The war in Ukraine serves as a stark preview of this new reality. The widespread use of unmanned aerial vehicles (UAVs), often augmented with AI for targeting and navigation, is reported to account for 70-80% of battlefield casualties.4 AI-based targeting has dramatically increased the accuracy of low-cost first-person-view (FPV) drones from a baseline of 30-50% to approximately 80%, demonstrating a tangible increase in lethality.4

This proliferation of cheap, smart, and lethal systems is challenging the decades-long dominance of expensive, exquisite military platforms. A commercial drone enhanced with an AI targeting module costing as little as $25 can now threaten a multi-million-dollar main battle tank, creating an extreme cost-imbalance that upends traditional force-on-force calculations.4 This dynamic is forcing a strategic re-evaluation within the world’s most advanced militaries. The future battlefield may not be won by the nation with the most sophisticated fighter jet, but by the one that can most effectively deploy, coordinate, and sustain intelligent swarms of attritable systems. This reality is the direct impetus for major strategic initiatives like the U.S. Department of Defense’s (DoD) Replicator program, which aims to counter adversary mass with a new form of American mass built on thousands of autonomous systems.5

This technological upheaval is unfolding within a clear geopolitical context: an intensifying “artificial intelligence arms race”.7 This competition is most acute between the United States and China, both of which recognize AI as a decisive element of future military power and are racing to integrate it into their strategies.1 However, they are not the only actors. A host of other nations are making significant investments, developing niche capabilities, and in some cases, gaining invaluable operational experience, creating a complex and dynamic global landscape. Understanding this new topography of warfare is essential for navigating the strategic challenges of the coming decades.

Global Military AI Power Rankings, 2025

The following ranking provides a holistic assessment of national military AI capabilities. It is derived from a composite score based on the detailed methodology outlined in the Appendix of this report. The index evaluates each nation across four equally weighted pillars: National Strategy & Investment, Foundational Ecosystem, Military Implementation & Programs, and Operational Efficacy & Deployment. This structure provides a comprehensive view, moving beyond simple technological metrics to assess a nation’s complete capacity to translate AI potential into effective military power.

The scores reveal a clear two-tiered structure. Tier I is exclusively occupied by the United States and China, who are in a league of their own. Tier II comprises a competitive and diverse group of nations, each with distinct strengths and strategic approaches, from the battle-tested pragmatism of Israel and Russia to the alliance-focused innovation of the United Kingdom and the sovereign ambitions of France.

RankCountryOverall ScoreStrategy & InvestmentFoundational EcosystemMilitary ImplementationOperational Efficacy
1United States94.592989395
2China79.090857863
3Israel61.555655868
4Russia55.558455465
5United Kingdom51.060584541
6France45.557484235
7South Korea43.050523832
8India41.052473530
9Germany37.545443328
10Japan35.040423028

Tier I Analysis: The Bipolar AI World Order

The global military AI landscape is dominated by two superpowers, the United States and China. They are not merely the top two contenders; they represent fundamentally different models for harnessing a transformative technology for national power. Their competition is not just a race for better algorithms but a clash of entire systems—one driven by a vibrant, chaotic commercial ecosystem, the other by the centralized, unyielding will of the state.

United States: The Commercial-Military Vanguard

The United States holds the top position in military AI, a status derived from an unparalleled private-sector innovation engine, overwhelming financial investment, and a clear strategic pivot towards integrating commercial technology at unprecedented speed and scale. Its strength lies in its dynamic, bottom-up ecosystem. However, this model is not without friction; the U.S. faces significant challenges in overcoming bureaucratic acquisition hurdles, bridging the cultural gap between Silicon Valley and the Pentagon, and navigating complex ethical debates that can temper the pace of adoption.

National Strategy and Vision

The U.S. approach has matured from establishing foundational principles to prioritizing agile adoption. The 2018 DoD AI Strategy laid the groundwork, directing the department to accelerate AI adoption and establishing the Joint Artificial Intelligence Center (JAIC) as a focal point.9 This initial strategy emphasized the need to empower, not replace, servicemembers and to lead in the responsible and ethical use of AI.9

Building on this, the 2023 Data, Analytics, and AI Adoption Strategy, developed by the Chief Digital and AI Officer (CDAO), marks a significant evolution.10 It supersedes the earlier documents and shifts the focus from a handful of specific capabilities to strengthening the entire organizational environment for continuous AI deployment. The strategy’s central objective is to achieve and maintain “decision advantage” across the competition continuum.10 It prescribes an agile approach to development and delivery, targeting five specific outcomes:

  1. Superior battlespace awareness and understanding
  2. Adaptive force planning and application
  3. Fast, precise, and resilient kill chains
  4. Resilient sustainment support
  5. Efficient enterprise business operations 10

This strategic framework is supported by a clear hierarchy of needs: quality data, governance, analytics, and responsible AI assurance, all managed under the centralizing authority of the CDAO.10

Investment and Foundational Ecosystem

The scale of U.S. investment in AI is staggering and unmatched globally. In 2024, private AI investment in the U.S. reached $109.1 billion, a figure nearly twelve times greater than that of China.12 This torrent of private capital fuels a hyper-competitive ecosystem of startups and established tech giants, creating a vast wellspring of innovation from which the military can draw.

This private investment is mirrored by a dramatic increase in defense-specific spending. The potential value of DoD AI-related contracts surged by nearly 1,200% in a single year, from $355 million to $4.6 billion between 2022 and 2023, with the DoD driving almost the entire increase.14 The Pentagon’s fiscal year 2025 budget request includes over $12 billion for unmanned systems and AI autonomy programs, signaling a firm, top-level commitment.16

This financial dominance underpins a foundational ecosystem that leads the world in nearly every metric. The U.S. possesses the largest and highest-quality pool of AI talent, is home to the world’s leading research universities, and dominates open-source contributions.17 In 2023, U.S.-based institutions produced 61 notable machine learning models, compared to just 15 from China.19 Crucially, the U.S. and its close allies control the most critical chokepoints of the AI hardware supply chain, including high-end semiconductor design (Nvidia, Intel, AMD) and manufacturing, as well as the global cloud computing infrastructure (Amazon Web Services, Microsoft Azure, and Google Cloud), which provides the raw computational power necessary for training and deploying advanced AI models.20

Flagship Programs and Demonstrated Efficacy

The U.S. has moved beyond theoretical research to the development and operational deployment of key military AI systems.

  • Project Maven (Algorithmic Warfare Cross-Functional Team): Initially launched in 2017 to use machine learning for analyzing full-motion video from drones, Maven has evolved into the Pentagon’s flagship AI project for targeting.22 It is a sophisticated data-fusion platform that integrates information from satellites, sensors, and communications intercepts to identify and prioritize potential targets.22 Its effectiveness has been proven in the “Scarlet Dragon” series of live-fire exercises, where it enabled an AI-driven kill chain from target identification in satellite imagery to a successful strike by an M142 HIMARS rocket system.22 Maven has been deployed in active combat zones, assisting with targeting for airstrikes in Iraq, Syria, and Yemen, and has been used to provide critical intelligence to Ukrainian forces.22 In 2023, the geospatial intelligence (GEOINT) aspects of Maven were transferred to the National Geospatial-Intelligence Agency (NGA), signifying its maturation from a pilot project into an enterprise-level capability for the entire intelligence community.23
  • Replicator Initiative: Unveiled in August 2023, Replicator is the DoD’s doctrinal and industrial response to the lessons of the Ukraine war and the challenge of China’s military mass.5 The initiative’s stated goal is to field thousands of “all-domain, attritable autonomous” (ADA2) systems—small, cheap, and intelligent drones—by August 2025.5 Replicator has a dual purpose: to deliver a tangible warfighting capability that can overwhelm an adversary and to force a revolution in the Pentagon’s slow-moving acquisition process by leveraging the speed and innovation of the commercial sector.27 Approximately 75% of the companies involved are non-traditional defense contractors, a deliberate effort to break the traditional defense-industrial mold.27 However, the program has reportedly faced significant challenges, including software integration issues and systems that were not ready for scaling, highlighting the persistent “valley of death” between prototype and mass production that plagues DoD procurement.28

The development of these programs reveals a distinct philosophy of AI-enabled command. U.S. strategic documents and program designs consistently emphasize that AI is a tool to “empower, not replace” the human warfighter.9 The Army’s doctrinal approach to integrating AI into its targeting cycle explicitly maintains that human commanders must remain the “final arbiters of lethal force”.29 This “human-on-the-loop” model, where AI provides recommendations and accelerates analysis but a human makes the critical decision, is a core tenet of the American approach.

CategoryUnited States: Military AI Profile
National Strategy2023 Data, Analytics, & AI Adoption Strategy; focus on “decision advantage” through agile adoption.
Key InstitutionsChief Digital and AI Officer (CDAO), Defense Advanced Research Projects Agency (DARPA), Defense Innovation Unit (DIU), National Security Agency (NSA) AI Security Center.
Investment FocusMassive private sector investment ($109.1B in 2024); significant DoD budget increases for AI and autonomy ($12B+ in FY25 request).
Flagship ProgramsProject Maven (AI-enabled targeting), Replicator Initiative (attritable autonomous systems).
Foundational StrengthsWorld-leading AI talent, R&D, and commercial tech sector; dominance in semiconductors and cloud computing.
Demonstrated EfficacyProject Maven battle-tested in Middle East and used to support Ukraine; advanced exercises like Scarlet Dragon prove AI kill-chain concepts.
Key ChallengesBureaucratic acquisition processes (“valley of death”), ethical constraints slowing adoption, potential for C2 doctrine to be outpaced by adversaries.

China: The State-Directed Challenger

The People’s Republic of China is the only nation with the scale, resources, and strategic focus to challenge U.S. preeminence in military AI. Its approach is the antithesis of the American model: a top-down, state-directed effort that harnesses the entirety of its national power to achieve a singular goal. Through its “Military-Civil Fusion” strategy, a clear doctrinal commitment to “intelligentized warfare,” and access to vast data resources, China is rapidly developing and scaling AI capabilities. While it may lag the U.S. in foundational innovation and high-end hardware, its ability to direct and integrate technology for state purposes presents a formidable challenge.

National Strategy and Doctrine

China’s ambition is codified in a series of high-level strategic documents. The State Council’s 2017 “New Generation Artificial Intelligence Development Plan” serves as the national blueprint, with the explicit goal of making China the world’s “major AI innovation center” by 2030, identifying national defense as a key area for application.14

This national ambition is translated into military doctrine through the concept of “intelligentized warfare” (智能化战争). This is the official third stage of the People’s Liberation Army’s (PLA) modernization, following mechanization and informatization.1 It is not simply about adding AI to existing systems; it is a holistic vision for re-engineering the PLA to operate at machine speed, infusing AI into every facet of warfare to gain decision superiority over its adversaries.31 The PLA aims to achieve this transformation by 2035 and become a “world-class” military by mid-century.32

The engine driving this transformation is the national strategy of “Military-Civil Fusion” (军民融合). This policy erases the institutional barriers between China’s civilian tech sector and its military-industrial complex, compelling private companies, universities, and state-owned enterprises to contribute to the PLA’s technological advancement.8 This allows the PLA to directly leverage the innovations of China’s tech giants—such as Baidu, Alibaba, and Tencent (BAT)—for military purposes, creating a deeply integrated ecosystem designed to “leapfrog” U.S. capabilities.8

Investment and Foundational Ecosystem

While China’s publicly reported private AI investment ($9.3 billion in 2024) is an order of magnitude smaller than that of the U.S., this figure is misleading.12 The state plays a much more direct role, with government-backed guidance funds targeting a staggering $1.86 trillion for investment in strategic technologies like AI.14

This state-directed investment has cultivated a vast domestic ecosystem. China leads the world in the absolute number of AI-related scientific publications and patents, indicating a massive and active research base.12 It possesses the world’s second-largest pool of AI engineers and is making concerted efforts to retain this talent domestically.17 While U.S. institutions still produce more top-tier, notable AI models, Chinese models have rapidly closed the performance gap on key benchmarks to near-parity.12 A crucial advantage for China is its ability to generate and access massive, state-controlled datasets, particularly from its extensive domestic surveillance apparatus. While this data is not directly military in nature, the experience gained in deploying and scaling AI systems across a population of over a billion people provides invaluable, if morally troubling, operational expertise that can be indirectly applied to military challenges.37

Flagship Programs and Ambitions

The PLA’s pursuit of intelligentized warfare is centered on several key concepts and programs designed to contest U.S. military dominance.

  • “Command Brain” (指挥大脑): This is the PLA’s conceptual centerpiece for an AI-driven command and control system. It is designed to be the nerve center for “multi-domain precision warfare,” the PLA’s concept for defeating the U.S. military by attacking the networked nodes that connect its forces.32 The Command Brain would ingest and fuse immense quantities of ISR data at machine speed, identify adversary vulnerabilities in real-time, and generate or recommend optimal courses of action, thereby compressing the OODA loop and seizing decision advantage.32 The PLA has already begun testing AI systems to assist with artillery targeting and is reportedly using the civilian AI model DeepSeek for non-combat tasks like medical planning and personnel management, signaling a willingness to integrate commercial tech directly.32
  • Autonomous Systems and Swarming: Leveraging its world-leading position in commercial drone manufacturing, the PLA is aggressively pursuing military applications for autonomous systems, particularly drone swarms.32 It is also developing “loyal wingman” concepts, such as the FH-97A autonomous aircraft designed to fly alongside crewed fighters, mirroring U.S. efforts.32
  • Cognitive and Information Warfare: PLA strategists see AI as a critical tool for cognitive warfare, using it to shape the information environment and affect an adversary’s will to fight.8 This aligns with China’s broader strategic emphasis on winning wars without fighting, or shaping the conditions for victory long before kinetic conflict begins.

The Chinese approach to AI in command and control appears to diverge philosophically from the American model. While U.S. doctrine emphasizes AI as a decision-support tool for a human commander, PLA writings on intelligentization focus on using AI to overcome the inherent cognitive limitations of human decision-makers in complex, high-speed, multi-domain environments.8 The development of an “AI military commander” for use in large-scale wargaming simulations suggests an ambition to create a more deeply integrated human-machine command system, where the AI’s role extends beyond simple recommendation to active participation in planning and execution.2 This points toward a potential future where a PLA command structure, optimized for machine-speed analysis, could outpace a U.S. structure that remains doctrinally bound to human-centric decision cycles, creating a critical vulnerability in a crisis.

CategoryChina: Military AI Profile
National StrategyNew Generation AI Development Plan (2017); Military-Civil Fusion (MCF); doctrinal focus on “Intelligentized Warfare.”
Key InstitutionsCentral Military Commission (CMC), People’s Liberation Army (PLA) Strategic Support Force (SSF), state-owned defense enterprises, co-opted tech giants (BAT).
Investment FocusMassive state-directed investment through guidance funds; focus on dual-use technologies and domestic application.
Flagship Programs“Command Brain” (AI for C2), autonomous swarming systems, “loyal wingman” concepts (FH-97A), AI for cognitive warfare.
Foundational StrengthsWorld’s largest data pools, massive talent base, leads in AI publications/patents, world-leading drone manufacturing industry.
Demonstrated EfficacyExtensive deployment of AI for domestic surveillance provides scaling experience; testing AI for artillery targeting; DeepSeek model used for non-combat military tasks.
Key ChallengesLagging in foundational model innovation, critical dependency on foreign high-end semiconductors, potential for top-down system to stifle creativity.

Tier II Analysis: The Strategic Contenders and Niche Specialists

Beyond the bipolar competition of the United States and China, a diverse second tier of nations is actively developing and deploying military AI capabilities. These countries, while lacking the sheer scale of the superpowers, possess significant technological prowess, unique strategic drivers, and in some cases, invaluable combat experience that make them formidable players in their own right. This tier is characterized by a variety of approaches, from the asymmetric pragmatism of Russia to the battle-hardened agility of Israel and the alliance-integrated strategies of key U.S. allies.

Russia: The Asymmetric Innovator

Lacking the vast economic resources and deep commercial technology base of the U.S. and China, Russia has adopted a pragmatic and asymmetric approach to military AI. Its strategy is not to compete head-on in developing the most advanced foundational models, but to incrementally integrate “good enough” AI into its existing areas of military strength—namely electronic warfare (EW), cyber operations, and unmanned systems. The goal is to develop force-multiplying capabilities that can disrupt and debilitate a more technologically advanced adversary.38

Russia’s strategic thinking is guided by its “National Strategy on the Development of Artificial Intelligence until 2030” and the Ministry of Defense’s 2022 “Concept” for AI use, though its most important developmental driver is the ongoing war in Ukraine.39 The conflict has become Russia’s primary laboratory for testing and refining AI applications under combat conditions. This includes developing AI-powered drones, such as the ZALA Lancet loitering munition, that are more resilient to EW and capable of autonomous target recognition and even rudimentary swarming.39 AI is also being integrated into established platforms like the Pantsir, S-300, and S-400 air defense systems to improve target tracking and engagement efficiency against complex threats like drones and cruise missiles.39

Despite these battlefield adaptations, Russia faces significant headwinds. It lags considerably in foundational AI research and investment and is hampered by international sanctions that restrict its access to high-end hardware like semiconductors.40 Its domestic technology sector is a fraction of the size of its American and Chinese counterparts.39 A particularly concerning aspect of Russia’s program is its stated intent to integrate AI into its nuclear command, control, and communications (C3) systems, including the automated security for its Strategic Rocket Forces. This pursuit raises profound questions about strategic stability and the risk of accidental or automated escalation in a crisis.42

CategoryRussia: Military AI Profile
National StrategyPragmatic and utilitarian focus on asymmetric force multipliers; guided by 2030 National AI Strategy and 2022 MoD Concept.
Key InstitutionsMinistry of Defense (MOD), military-industrial complex (e.g., Kalashnikov Concern for drones), academic research network.
Investment FocusState-driven R&D focused on near-term military applications, particularly for unmanned systems and EW.
Flagship ProgramsAI-enabled Lancet loitering munitions, integration of AI into air defense systems (Pantsir, S-400), AI for nuclear C3.
Foundational StrengthsDeep experience in EW and cyber operations; ability to rapidly iterate based on combat experience in Ukraine.
Demonstrated EfficacyWidespread and effective use of AI-assisted drones and loitering munitions in Ukraine; demonstrated EW resilience.
Key ChallengesSignificant lag in foundational AI research and investment; dependence on foreign components and impact of sanctions; demographic decline.

Israel: The Battle-Hardened Implementer

Israel stands apart from all other nations in its unparalleled record of deploying sophisticated AI systems in high-intensity combat. Its military AI program is not defined by aspirational strategy documents but by a relentless, operationally-driven innovation cycle born of constant and existential security threats. This has allowed the Israel Defense Forces (IDF) to field effective, if highly controversial, AI capabilities at a pace that larger, more bureaucratic militaries cannot match.

The IDF’s Digital Transformation Division, established in 2019, is a key enabler of this effort, tasked with bringing cutting-edge civilian technology into the military.43 The results of this focus are most evident in the IDF’s targeting process. During the recent conflict in Gaza, Israel has made extensive use of at least two major AI systems:

  • “Habsora” (The Gospel): This AI-powered system analyzes vast amounts of surveillance data to automatically generate bombing target recommendations. It has reportedly increased the IDF’s target generation capacity from around 50 per year to over 100 per day, solving the long-standing problem of running out of targets in a sustained air campaign.2
  • “Lavender”: This is an AI database that has reportedly been used to identify and create a list of as many as 37,000 potential junior operatives affiliated with Hamas or Palestinian Islamic Jihad for targeting.2

The use of these systems marks the most extensive and systematic application of AI for target generation in the history of warfare.43 Beyond targeting, Israel integrates AI across its defense architecture. It is a key component of the Iron Dome and David’s Sling missile defense systems, where algorithms analyze sensor data to prioritize threats and calculate optimal intercept solutions.45 AI is also used for border surveillance, incorporating facial recognition and video analysis tools.45 This rapid and widespread implementation is fueled by Israel’s world-class technology ecosystem (“Silicon Wadi”), which boasts the highest per-capita density of AI talent in the world, and by deep technological partnerships with U.S. tech giants through programs like Project Nimbus.17

CategoryIsrael: Military AI Profile
National StrategyOperationally-driven, bottom-up innovation focused on immediate security needs rather than grand strategy documents.
Key InstitutionsIDF Digital Transformation Division, Unit 8200 (signals intelligence), robust defense industry (Elbit, Rafael), vibrant startup ecosystem.
Investment FocusStrong venture capital scene; targeted government investment in defense tech; deep partnerships with U.S. tech firms (Project Nimbus).
Flagship Programs“Habsora” (The Gospel) and “Lavender” (AI-assisted targeting systems), AI integration in missile defense (Iron Dome).
Foundational StrengthsWorld’s highest per-capita AI talent density; agile and innovative tech culture (“Silicon Wadi”); deep integration between military and tech sectors.
Demonstrated EfficacyUnmatched record of deploying AI systems (Habsora, Lavender) at scale in high-intensity combat operations.
Key ChallengesInternational legal and ethical scrutiny over AI targeting practices; resource constraints compared to superpowers.

United Kingdom: The Leading Ally

The United Kingdom is firmly positioned as the leader among European nations and a crucial Tier II power, combining a strong national AI ecosystem with a clear strategic defense vision and deep integration with the United States. Its approach seeks to leverage its strengths in research and talent to maintain influence and interoperability within key alliances.

The UK’s 2022 Defence Artificial Intelligence Strategy articulates a vision to become “the world’s most effective, efficient, trusted and influential Defence organisation for our size”.47 This is complemented by service-specific plans, such as the British Army’s Approach to Artificial Intelligence, which focuses on delivering decision advantage from the “back office to the battlefield”.48 The UK has also sought to position itself as a global leader in the normative and ethical dimensions of AI, hosting the world’s first AI Safety Summit in 2023, which enhances its diplomatic influence in the field.19

The UK’s foundational ecosystem is a key strength. It ranks third globally in AI talent depth and density, with world-renowned research hubs in London, Cambridge, and Oxford creating a steady pipeline of expertise.17 While its private investment in AI is a distant third to the U.S. and China, it significantly outpaces other European nations.12 The country is home to major defense primes like BAE Systems, which are actively integrating AI into electronic warfare and autonomous platforms, as well as a dynamic startup scene that includes leading AI companies like ElevenLabs and Synthesia.50 This combination of strategic clarity, a robust talent base, and strong alliance partnerships solidifies the UK’s position as a top-tier military AI power.

CategoryUnited Kingdom: Military AI Profile
National Strategy2022 Defence AI Strategy; focus on being “effective, efficient, trusted, and influential.” Strong emphasis on ethical leadership and alliance interoperability.
Key InstitutionsMinistry of Defence (MOD), Defence Science and Technology Laboratory (Dstl), major defense primes (BAE Systems), leading universities.
Investment FocusThird-largest private AI investment globally; government funding for defense R&D.
Flagship ProgramsFocus on cyber, stealth naval AI, and development of 6th-gen air power (Tempest program) with AI at its core.
Foundational StrengthsRanks 3rd globally in AI talent; world-class research universities (Oxford, Cambridge); strong defense-industrial base.
Demonstrated EfficacyActive in joint R&D and exercises with the U.S. and NATO; deploying AI-based cyber defense systems.
Key ChallengesBridging the gap between research and scaled military procurement; maintaining competitiveness with superpower investment levels.

France: The Sovereign Contender

France’s military AI strategy is defined by its long-standing pursuit of “strategic autonomy.” Wary of becoming technologically dependent on either the United States or China, Paris is investing heavily in building a sovereign AI capability that allows it to maintain its freedom of action on the world stage. This ambition is backed by a robust industrial base and a clear, state-led implementation plan.

AI is officially designated a “priority for national defence,” with a strategy that emphasizes a responsible, controlled, and human-in-command approach to its development and use.52 The most significant step in realizing this vision was the creation in 2024 of the

Ministerial Agency for Artificial Intelligence in Defense (MAAID). Modeled on the French Atomic Energy Commission, MAAID is designed to ensure France masters AI technology sovereignly.55 With an annual budget of €300 million and plans for its own dedicated “secret defense” supercomputer by 2025, MAAID represents a serious, centralized commitment to developing military-grade AI.55

This state-led effort is supported by a strong ecosystem. France is home to the Thales Group, a major European defense contractor heavily involved in integrating AI into radar and C2 systems, and a vibrant commercial AI scene.51 This includes Mistral AI, one of Europe’s most prominent foundational model developers and a direct competitor to U.S. giants like OpenAI and Anthropic, highlighting France’s capacity for cutting-edge innovation.50 By combining state direction with commercial dynamism, France is building a formidable and independent military AI capability.

CategoryFrance: Military AI Profile
National StrategyDriven by “strategic autonomy”; 2019 AI & Defense Strategy emphasizes sovereign capability and responsible, human-controlled use.
Key InstitutionsMinisterial Agency for Artificial Intelligence in Defense (MAAID), Direction générale de l’armement (DGA), Thales Group.
Investment FocusDedicated budget for MAAID (€300M annually); broader national investments to make France an “AI powerhouse.”
Flagship ProgramsMAAID is the central program, focusing on developing sovereign AI for C2, intelligence, logistics, and cyberspace.
Foundational StrengthsStrong defense-industrial base (Thales); leading commercial AI companies (Mistral AI); high-quality engineering talent.
Demonstrated EfficacyActive in European joint defense projects (e.g., FCAS); developing AI tools for intelligence analysis and operational planning.
Key ChallengesBalancing sovereign ambitions with the need for allied interoperability; scaling capabilities to compete with larger powers.

India: The Aspiring Power

Driven by acute strategic competition with China and a national imperative for self-reliance (“Atmanirbhar Bharat”), India is rapidly emerging as a major military AI power. It is building a comprehensive ecosystem from the ground up, leveraging its immense human capital and a growing defense-industrial base. While it currently faces challenges in infrastructure and bureaucratic efficiency, its trajectory is steep and its ambitions are clear.

India’s strategy is outlined in an ambitious 15-year defense roadmap that heavily features AI-driven battlefield management, autonomous systems, and cyber warfare capabilities.56 Institutionally, this is guided by the

Defence AI Council (DAIC) and the Defence AI Project Agency (DAIPA), which were established to coordinate research and guide project development.57 A notable aspect of India’s approach is its proactive development of a domestic ethical framework, known as ETAI (Evaluating Trustworthiness in AI), which is built on principles of reliability, safety, transparency, fairness, and privacy.57

India’s greatest asset is its vast and growing talent pool. It ranks among the top three nations globally for the number of AI professionals and the volume of AI research publications.35 The government is working to build the necessary infrastructure to support this talent, including through the AIRAWAT initiative, which provides a national AI computing backbone.57 On the implementation front, the Ministry of Defence has launched 75 indigenously developed AI products and is investing in a range of capabilities, including autonomous combat vehicles, robotic surveillance platforms, and drone swarms.41 These technological efforts are intended to be integrated within a broader military reform known as “theatreisation,” which aims to create the joint command structures necessary to conduct cohesive, AI-driven multi-domain operations.60

CategoryIndia: Military AI Profile
National StrategyAmbitious 15-year defense roadmap focused on AI, autonomy, and self-reliance (“Atmanirbhar Bharat”).
Key InstitutionsDefence AI Council (DAIC), Defence AI Project Agency (DAIPA), Defence Research and Development Organisation (DRDO).
Investment FocusGrowing defense budget with dedicated funds for AI projects; focus on nurturing a domestic defense startup ecosystem (DISC).
Flagship ProgramsDevelopment of autonomous combat vehicles, drone swarms, AI for ISR; national ethical framework (ETAI).
Foundational StrengthsMassive and growing AI talent pool; ranks 3rd in AI publications; strong and growing domestic software industry.
Demonstrated EfficacyDeployed 75 indigenous AI products; using AI in intelligence and reconnaissance systems; procuring AI-powered UAVs.
Key ChallengesBureaucratic procurement delays; infrastructure gaps; translating vast research output into scaled, fielded military capabilities.

South Korea: The Hardware Integrator

South Korea is leveraging its status as a global leader in hardware, robotics, and advanced manufacturing to pursue a sophisticated military AI strategy. Its approach is focused on integrating cutting-edge AI into next-generation military platforms to ensure a decisive technological overmatch against North Korea and to maintain a competitive edge in a technologically dense region.

The national goal is to become a “top-three AI nation” (AI G3), an ambition that extends directly to its defense sector.61 Military efforts are guided by the “Defense Innovation 4.0” project and the Army’s “TIGER 4.0” concept, which aim to systematically infuse AI across all warfighting functions.62 The Ministry of National Defense has outlined a clear, three-stage development plan, progressing from “cognitive intelligence” (AI for surveillance and reconnaissance) to “partially autonomous” capabilities, and ultimately to “judgmental intelligence” for complex manned-unmanned combat systems.63

South Korea’s primary strength is its world-class industrial and technological base. It is a dominant force in the global semiconductor market with giants like Samsung and SK Hynix, providing a critical hardware foundation.20 This is complemented by a robust robotics industry and a government committed to massive investments in AI computing infrastructure and R&D.61 This industrial prowess is being translated into tangible military projects, such as the development of the future

K3 main battle tank, which will feature an unmanned turret and an AI-assisted fire control system for autonomous target tracking and engagement. Another key initiative is the development of unmanned “loyal wingman” aircraft to operate in tandem with the domestically produced KF-21 next-generation fighter jet, a concept designed to extend reach and reduce risk to human pilots.62

CategorySouth Korea: Military AI Profile
National Strategy“Defense Innovation 4.0”; goal to become a “top-three AI nation”; phased approach from ISR to manned-unmanned teaming.
Key InstitutionsMinistry of National Defense (MND), Agency for Defense Development (ADD), Defense Acquisition Program Administration (DAPA), industrial giants (Hyundai Rotem, KAI).
Investment FocusSignificant government and private sector investment in AI, semiconductors, and robotics.
Flagship ProgramsAI integration into future platforms like the K3 tank (AI-assisted targeting) and unmanned wingmen for the KF-21 fighter.
Foundational StrengthsWorld-leading semiconductor industry (Samsung, SK Hynix); strong robotics and advanced manufacturing base.
Demonstrated EfficacyAdvanced development of AI-enabled military hardware; exporting sophisticated conventional platforms with increasing levels of automation.
Key ChallengesNational AI strategy has been described as vague on security specifics; coordinating roles between various ministries.

Germany: The Cautious Industrial Giant

As Europe’s largest economy and industrial powerhouse, Germany possesses a formidable technological base for developing military AI. However, its adoption has historically been cautious, constrained by political sensitivities and a strong societal emphasis on ethical considerations. The Zeitenwende (“turning point”) announced in response to Russia’s 2022 invasion of Ukraine has injected new urgency and funding into German defense modernization, significantly accelerating its military AI efforts.

Germany’s 2018 National AI Strategy identified security and defense as a key focus area, and the Bundeswehr (German Armed Forces) has since developed position papers outlining goals and fields of action for AI integration, particularly for its land forces.64 The German approach places a heavy emphasis on establishing a robust ethical and legal framework, rejecting fully autonomous lethal systems and mandating meaningful human control.67

This renewed focus is now translating into concrete programs. A key initiative is Uranos KI, a project to develop an AI-backed reconnaissance and analysis system to support the German brigade being deployed to Lithuania, directly addressing the Russian threat.68 Another significant effort is the

GhostPlay project, run out of the Defense AI Observatory (DAIO) at Helmut Schmidt University, which is developing AI for enhanced defense decision-making.69 Germany’s traditional defense industry is being complemented by a burgeoning defense-tech startup scene, most notably the Munich-based company

Helsing. Helsing specializes in developing AI software to upgrade existing military platforms and is a key supplier of AI-enabled reconnaissance and strike drones to Ukraine, demonstrating a newfound agility in the German defense ecosystem.68

CategoryGermany: Military AI Profile
National Strategy2018 National AI Strategy; strong focus on ethical frameworks and human control, accelerated by post-2022 Zeitenwende.
Key InstitutionsBundeswehr, Center for Digital and Technology Research (dtec.bw), Defense AI Observatory (DAIO), emerging startups (Helsing).
Investment FocusIncreased defense spending post-Zeitenwende; growing venture capital for defense-tech startups.
Flagship ProgramsUranos KI (AI reconnaissance), GhostPlay (AI for decision-making), development of AI-enabled drone capabilities.
Foundational StrengthsEurope’s leading industrial and manufacturing base; high-quality engineering and research talent.
Demonstrated EfficacyHelsing’s AI-enabled drones are being used by Ukraine; Uranos KI has shown promising results in initial experiments.
Key ChallengesOvercoming historical and cultural aversion to military risk-taking; streamlining slow procurement processes; navigating complex EU regulations.

Japan: The Alliance-Integrated Technologist

Japan’s approach to military AI is shaped by a unique combination of factors: its post-war pacifist constitution, a rapidly deteriorating regional security environment, and its status as a technological powerhouse. This has resulted in a rapid but cautious push to adopt AI, primarily for defensive, surveillance, and logistical purposes, all in close technological and doctrinal alignment with its key ally, the United States.

Increasing threats from China and North Korea have prompted Japan to explicitly identify AI as a critical capability in its National Security Strategy, particularly for enhancing cybersecurity and information warfare defenses.72 In July 2024, the Ministry of Defense released its first basic policy on the use of AI, which formalizes its human-centric approach. The policy emphasizes maintaining human control over lethal force and explicitly prohibits the development of “killer robots” or lethal autonomous weapon systems (LAWS).73

Japan’s implementation strategy focuses on leveraging AI as a force multiplier in non-lethal domains to compensate for its demographic challenges. This includes developing remote surveillance systems, automating logistics and supply-demand forecasting, and creating AI-powered decision-support tools.73 A cornerstone of its R&D effort is the

SAMURAI (Strategic Advancement of Mutual Runtime Assurance Artificial Intelligence) initiative, a formal project arrangement with the U.S. Department of War. This cooperative program focuses on developing Runtime Assurance (RTA) technology to ensure the safe and reliable performance of AI-equipped UAVs, with the goal of informing their future integration with next-generation fighter aircraft.76 This project highlights Japan’s strategy of deepening interoperability with the U.S. while advancing its own technological expertise in AI safety and assurance.

CategoryJapan: Military AI Profile
National StrategyCautious, defense-oriented approach guided by National Security Strategy and 2024 MoD AI Policy; explicitly bans LAWS and emphasizes human control.
Key InstitutionsMinistry of Defense (MOD), Acquisition, Technology & Logistics Agency (ATLA), strong partnership with U.S. DoD.
Investment FocusIncreasing defense R&D budget; focus on dual-use technologies and international collaboration, particularly with the U.S.
Flagship ProgramsSAMURAI initiative (AI safety for UAVs with U.S.), AI for cybersecurity, remote surveillance, and logistics.
Foundational StrengthsWorld-leading robotics, sensor, and advanced manufacturing industries; highly skilled technical workforce.
Demonstrated EfficacyAdvanced R&D in AI safety and human-machine teaming; deep integration into U.S.-led technology development and exercises.
Key ChallengesConstitutional and political constraints on offensive capabilities; aging demographics impacting recruitment; balancing alliance integration with sovereign development.

Canada: The Niche Contributor

As a committed middle power and a member of the Five Eyes intelligence alliance, Canada’s military AI strategy is not aimed at competing with global powers but at developing niche capabilities that enhance its contributions to collective defense and ensure interoperability with its principal allies, especially the United States. Its approach is strongly defined by a commitment to the responsible and ethical development of AI.

The Department of National Defence and Canadian Armed Forces (DND/CAF) AI Strategy lays out a vision to become an “AI-enabled organization” by 2030.78 The strategy is built on five lines of effort: fielding capabilities, change management, ethics and trust, talent, and partnerships.47 It is closely aligned with broader Government of Canada policies such as the Directive on Automated Decision Making and the Pan-Canadian AI Strategy.78

Canada’s implementation efforts are focused on specific, high-value problem sets, particularly in the ISR domain. Key R&D projects led by Defence Research and Development Canada (DRDC) include:

  • JAWS (Joint Algorithmic Warfighter Sensor): A suite of multi-modal sensors and AI models designed to automate the detection and tracking of objects, reducing the cognitive load on operators.81
  • MIST (Multimodal Input Surveillance and Tracking): An AI system for the automated analysis of full-motion video from aerial platforms to detect and localize objects of interest.81

These systems are being actively tested and refined in large-scale multinational exercises like the U.S. Army’s Project Convergence, demonstrating Canada’s focus on ensuring its technology is integrated and effective within an allied operational context.81 While Canada has a strong academic history as a pioneer in deep learning, it has faced a recognized “adoption problem” in translating this foundational research into scaled commercial and military applications, a challenge the government is actively working to address.82

CategoryCanada: Military AI Profile
National StrategyDND/CAF AI Strategy (AI-enabled by 2030); focused on niche capabilities, alliance interoperability, and ethical/responsible AI.
Key InstitutionsDepartment of National Defence (DND), Defence Research and Development Canada (DRDC), Innovation for Defence Excellence and Security (IDEaS) program.
Investment FocusTargeted funding for R&D through programs like IDEaS; leveraging the Pan-Canadian AI Strategy.
Flagship ProgramsJAWS (AI sensor suite), MIST (AI video analysis for ISR), participation in allied experiments like Project Convergence.
Foundational StrengthsStrong academic research base in AI; close integration with U.S. and Five Eyes partners.
Demonstrated EfficacySuccessful experimentation with JAWS and MIST in multinational exercises, proving interoperability concepts.
Key Challenges“Adoption problem” in scaling research to fielded capability; limited budget compared to larger powers; reliance on allied platforms for integration.

Honorable Mention: Ukraine, The Wildcard Innovator

While not a top-10 global power by traditional metrics, Ukraine’s performance since the 2022 Russian invasion warrants special mention. It has transformed itself into the world’s foremost laboratory for AI in modern warfare, demonstrating an unparalleled ability to rapidly adapt and deploy commercial technology for military effect under the intense pressure of an existential conflict. Its experience is actively shaping the doctrine and procurement strategies of every major military power.

Lacking a large, pre-existing defense-industrial base for AI, Ukraine has relied on agility, decentralization, and partnerships. The “Army of Drones” initiative is a comprehensive national program that encompasses international fundraising, direct procurement of commercial drones, fostering domestic production, and training tens of thousands of operators.83 Ukrainian forces, often working with civilian volunteer groups, have become masters of battlefield adaptation, integrating AI-based targeting software into low-cost commercial FPV drones.4 This has had a dramatic impact on lethality, with strike accuracy for these systems reportedly increasing from a baseline of 30-50% to around 80%.4 The Defense Intelligence of Ukraine (DIU) has also emerged as a sophisticated user of AI for analyzing vast amounts of intelligence data and for enabling long-range autonomous drone strikes deep into Russian territory.83 Ukraine’s experience provides a powerful lesson: in the age of AI, the ability to innovate and adapt at speed can be a decisive advantage, capable of offsetting a significant numerical and material disadvantage.

Comparative Strategic Assessment: Doctrines, Efficacy, and Future Trajectory

A granular analysis of individual national programs reveals a broader strategic landscape defined by competing visions, divergent levels of efficacy, and a critical dependence on the foundational layers of the digital age. The future of military power will be determined not just by who develops the best AI, but by who can best synthesize it with their doctrine, industrial base, and human capital.

A Clash of Strategic Visions

The world’s leading military AI powers are not converging on a single model; instead, they are pursuing distinct and often competing strategic philosophies:

  • The U.S. Commercial-Military Vanguard: Relies on a decentralized, bottom-up innovation ecosystem fueled by massive private capital. The strategic challenge is to harness this commercial dynamism for military purposes without being stifled by bureaucracy, a problem initiatives like Replicator are designed to solve. The doctrinal emphasis remains firmly on “human-on-the-loop” empowerment.9
  • China’s State-Directed Intelligentization: A top-down, centrally planned model that mobilizes the entire nation through Military-Civil Fusion. The goal is to achieve decision superiority through the deep integration of AI into a “Command Brain,” potentially affording the machine a more central role in the command process than in the U.S. model.8
  • Russia’s Asymmetric Disruption: A pragmatic approach focused on using “good enough” AI as a force multiplier in areas like EW and unmanned systems to counter a technologically superior foe. The war in Ukraine serves as a brutal but effective R&D cycle.38
  • Israel’s Operational Rapid-Fielding: An agile, threat-driven model that prioritizes getting effective capabilities into the hands of warfighters as quickly as possible, often accepting higher risks and bypassing the lengthy development cycles common in larger nations.43
  • The European Pursuit of Sovereignty and Ethics: Powers like France and Germany are driven by a desire for strategic autonomy and a strong commitment to developing AI within a robust ethical and legal framework, seeking a “third way” between the U.S. and Chinese models.55

This divergence between “battle-tested” powers like Israel, Russia, and Ukraine and more “theory-heavy” powers in Western Europe is a critical dynamic. The former are driving rapid, iterative development based on immediate combat feedback, while the latter are focused on building more deliberate, ethically-vetted systems. This creates a potential temporal disadvantage, where nations facing immediate threats are forced to accept risks and bypass traditional procurement, giving them a lead in practical application. A nation with a perfectly ethical and robustly tested AI system that arrives on the battlefield two years late may find the conflict has already been decided by an adversary who scaled a “good enough” system across their forces.

The Spectrum of Demonstrated Efficacy

When moving from strategic plans to tangible results, a clear spectrum of operational efficacy emerges.

  • High Deployment & Efficacy: Israel, Russia, and Ukraine stand at one end. Their AI systems are not experimental; they are core components of ongoing, high-intensity combat operations, directly influencing tactical and operational outcomes on a daily basis.4
  • Selective Deployment & Proving: The United States occupies the middle ground. Key programs like Project Maven are fully operational and battle-tested.22 However, broader, more transformative initiatives like Replicator are still in the process of proving their ability to deliver capability at scale, facing significant integration and production challenges.28
  • Development & Aspiration: Many other advanced nations, including the UK, France, Germany, and Japan, are at the other end of the spectrum. They have ambitious plans, strong foundational ecosystems, and promising pilot programs (e.g., Uranos KI, MAAID, SAMURAI), but have yet to deploy AI systems at a comparable scale or intensity in combat operations.55

The Hardware Foundation: A Strategic Chokepoint

The entire edifice of military AI rests on a physical foundation of advanced hardware: semiconductors for processing and cloud computing infrastructure for data storage and model training. Control over this foundation is a decisive strategic advantage.

The United States and its democratic allies—Taiwan (TSMC), South Korea (Samsung), and the Netherlands (ASML for lithography equipment)—dominate the design and fabrication of the world’s most advanced semiconductors.20 This creates a critical vulnerability for China, which, despite massive investment, remains dependent on foreign technology for the highest-end chips required to train and run state-of-the-art AI models. U.S. export controls are a direct attempt to exploit this chokepoint and slow China’s military AI progress.

Similarly, the global cloud infrastructure market is dominated by American companies. Amazon Web Services (AWS), Microsoft Azure, and Google Cloud collectively control approximately 63% of the market, with Chinese competitors like Alibaba and Tencent holding much smaller shares.21 This provides the U.S. military and its innovation ecosystem with access to a massive, secure, and scalable computational backbone that is difficult for any other nation to replicate.

The following matrix provides a comprehensive, at-a-glance comparison of the top 10 nations across these key strategic vectors.

CountryStrategic VisionKey ProgramsInvestment & ScaleTalent & R&D BaseHardware FoundationDeployed EfficacyDoctrinal Integration
United StatesCommercial-military vanguard; achieve “decision advantage.”Project Maven, Replicator InitiativeUnmatched public & private fundingWorld leader in talent & model developmentDominant (Semiconductors, Cloud)High (Maven deployed)High (Evolving)
ChinaState-directed “intelligentization”; Military-Civil Fusion.“Command Brain,” Drone SwarmsMassive state-directed fundsMassive scale, closing quality gapMajor vulnerability (Semiconductors)Medium (Scaling in non-combat)Very High (Central tenet)
IsraelOperationally-driven rapid fielding for immediate threats.Habsora, Lavender (AI targeting)Strong, focused on defense techWorld-leading per capitaStrong, deep U.S. integrationVery High (Combat-proven)High (Operationally embedded)
RussiaAsymmetric disruption of superior adversaries.AI-enabled Lancet drones, Air Defense AILimited, focused on near-term effectConstrained, practical focusHeavily constrained by sanctionsHigh (Battle-hardened in Ukraine)Medium (Adaptive)
United KingdomLeading ally; trusted, ethical, interoperable AI.6th-Gen Fighter (Tempest), Naval AIStrong, 3rd in private investmentStrong, top-tier research hubsModerate, reliant on alliesLow-Medium (Exercises, Cyber)Medium (Developing)
FranceSovereign capability; “strategic autonomy.”MAAID (central AI agency)Strong, state-led investmentStrong, with leading AI firmsModerate, pursuing sovereigntyLow (In development)Medium (Developing)
South KoreaHardware-led integration for technological overmatch.K3 Tank, KF-21 Unmanned WingmanStrong, industry-ledGood, focused on applicationWorld Leader (Semiconductors)Low (In advanced development)Medium (Platform-centric)
IndiaAspiring power; self-reliance and strategic competition.DAIPA/DAIC projects, ETAI frameworkGrowing rapidly, state-supportedMassive, but with infrastructure gapsLagging, but growingLow (Early deployments)Medium (Tied to reforms)
GermanyCautious industrial giant, accelerated by Zeitenwende.Uranos KI, GhostPlayIncreasing significantlyStrong industrial R&D baseStrong industrial baseLow (Early deployments)Low-Medium (Developing)
JapanAlliance-integrated technologist; defensive focus.SAMURAI (AI safety w/ U.S.)Cautious but growingStrong in robotics & sensorsStrong, reliant on alliesLow (R&D, exercises)Low (Constrained)

Conclusion: Navigating the Dawn of Intelligentized Conflict

The evidence is unequivocal: artificial intelligence is catalyzing a fundamental revolution in military affairs, and the global competition to master this technology is accelerating. The strategic landscape is solidifying into a bipolar contest between the United States and China, two powers with the resources, scale, and national will to pursue dominance across the full spectrum of AI-enabled warfare. Yet, the field is far from a simple two-player game. The agility and combat experience of nations like Israel and Ukraine, the asymmetric tactics of Russia, and the focused ambitions of key U.S. allies create a complex, multi-polar dynamic where innovation can emerge from unexpected quarters.

Looking forward over the next five to ten years, several trends will define the trajectory of military AI. First, the degree of autonomy in weapon systems will steadily increase, moving from decision support to human-supervised autonomous operations, particularly in contested environments like electronic warfare or undersea domains. Second, human-machine teaming will become a core military competency. The effectiveness of a fighting force will be measured not just by the quality of its people or its machines, but by the seamlessness of their integration. Third, the battlefield will continue to trend towards a state of hyper-awareness and hyper-lethality. The proliferation of intelligent sensors and autonomous weapons will compress the “detect-to-engage” timeline to mere seconds, making concealment nearly impossible and survival dependent on speed, dispersion, and countermeasures.4

The central conclusion of this analysis is that the nation that achieves a decisive and enduring advantage in 21st-century conflict will be the one that masters the difficult synthesis of technology, data, doctrine, and talent. Technological superiority in algorithms or hardware alone will be insufficient. Victory will belong to the power that can build a national ecosystem capable of rapidly innovating, fielding AI capabilities at scale, adapting its operational concepts to exploit those capabilities, and training a new generation of warfighters to trust and effectively command their intelligent machine partners. The race for military AI supremacy is not merely a technological marathon; it is a test of a nation’s entire strategic, industrial, and intellectual capacity.

Appendix: Military AI Capability Ranking Methodology

Introduction

The objective of this methodology is to provide a transparent, defensible, and holistic framework for assessing and ranking a nation’s military artificial intelligence (AI) capabilities. It moves beyond singular metrics to create a composite index that evaluates the entire national ecosystem required to develop, deploy, and effectively utilize AI for military purposes. The index is structured around four core pillars, each assigned a weight reflecting its relative importance in determining overall military AI power.

Pillar 1: National Strategy & Investment (25% Weight)

This pillar assesses the top-down strategic direction and financial commitment a nation dedicates to military AI. A clear strategy and robust funding are prerequisites for any successful national effort.

  • Metric 1.1: Strategic Clarity & Coherence (10%): Evaluates the quality, ambition, and implementation plan of national and defense-specific AI strategies. A high score is given for published, detailed strategies with clear objectives, timelines, and designated responsible institutions (e.g., U.S. 2023 AI Adoption Strategy, China’s New Generation AI Development Plan).10 A lower score is given for vague or purely aspirational statements.
  • Metric 1.2: Financial Commitment (15%): Quantifies direct and indirect investment in military AI. This includes analysis of national defense budgets, specific R&D allocations for AI and autonomy, the scale of state-backed technology investment funds, and the volume of government AI-related procurement contracts.14

Pillar 2: Foundational Ecosystem (25% Weight)

This pillar measures the underlying national capacity for AI innovation, which forms the bedrock of any military application. It assesses the raw materials of AI power: talent, research, and hardware.

  • Metric 2.1: Talent Pool (10%): Ranks countries based on the quantity and quality of their human capital. Data points include the absolute number of AI professionals, the concentration of top-tier AI researchers (e.g., authors at premier conferences like NeurIPS), and the quality of university pipelines producing AI graduates.17
  • Metric 2.2: Research & Innovation Output (10%): Measures a nation’s contribution to the global state-of-the-art in AI. This is assessed through the volume and citation impact of AI research publications, the number of AI-related patents filed, and, critically, the number of notable, state-of-the-art AI models produced by a country’s institutions.12
  • Metric 2.3: Hardware & Infrastructure (5%): Assesses sovereign or secure allied access to the critical enabling hardware for AI. This includes domestic capacity for advanced semiconductor design and manufacturing and the availability of large-scale, secure cloud computing infrastructure, which are essential for training and deploying large AI models.20

Pillar 3: Military Implementation & Programs (25% Weight)

This pillar evaluates a nation’s ability to translate strategic ambition and foundational capacity into concrete military AI programs and applications.

  • Metric 3.1: Flagship Program Maturity (15%): Assesses the scale, sophistication, and developmental progress of major, publicly acknowledged military AI programs (e.g., U.S. Project Maven, China’s “Command Brain,” France’s MAAID). High scores are awarded for programs that are well-funded, have moved beyond basic research into advanced development or prototyping, and are aimed at solving critical operational challenges.22
  • Metric 3.2: Breadth of Application (10%): Measures the diversity of AI applications being pursued across the full spectrum of military functions, including ISR, command and control, logistics, cybersecurity, electronic warfare, and autonomous platforms. A broad portfolio indicates a more mature and integrated approach to military AI adoption.3

Pillar 4: Operational Efficacy & Deployment (25% Weight)

This is the most critical pillar, assessing whether a nation’s military AI capabilities exist in practice, not just on paper. It measures the translation of programs into proven, operational reality.

  • Metric 4.1: Demonstrated Deployment (15%): Awards points for clear evidence of AI systems being used in active combat operations or large-scale, realistic military exercises. This is the ultimate test of a system’s effectiveness and reliability. Nations with battle-tested systems (e.g., Israel’s Habsora, Russia’s Lancet, U.S. Maven) receive the highest scores.4
  • Metric 4.2: Doctrinal Integration (10%): Assesses the extent to which AI is being formally integrated into military doctrine, training curricula, and concepts of operation (CONOPS). This metric indicates true institutional adoption beyond isolated technology projects and reflects a military’s commitment to fundamentally changing how it fights.29

Scoring and Normalization

For each of the eight metrics, countries are scored on a qualitative scale based on the available open-source evidence. These scores are then converted to a numerical value. The metric scores are then weighted according to the percentages listed above and aggregated to produce a final composite score for each country, normalized to a 100-point scale to allow for direct comparison and ranking. This multi-layered, weighted approach ensures that the final ranking reflects a balanced and comprehensive assessment of a nation’s true military AI power.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. The Coming Military AI Revolution – Army University Press, accessed October 4, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2024/MJ-24-Glonek/
  2. Military applications of artificial intelligence – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Military_applications_of_artificial_intelligence
  3. How to Orchestrate AI Deployment in Defense Infrastructures? – – Datategy, accessed October 4, 2025, https://www.datategy.net/2025/07/16/how-to-orchestrate-ai-deployment-in-defense-infrastructures/
  4. ARTIFICIAL INTELLIGENCE’S GROWING ROLE IN MODERN WARFARE – War Room, accessed October 4, 2025, https://warroom.armywarcollege.edu/articles/ais-growing-role/
  5. DOD Replicator Initiative: Background and Issues for Congress, accessed October 4, 2025, https://www.congress.gov/crs-product/IF12611
  6. DOD Replicator Initiative: Background and Issues for Congress, accessed October 4, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF12611/IF12611.9.pdf
  7. Artificial intelligence arms race – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  8. Militarizing AI: How to Catch the Digital Dragon? – Centre for …, accessed October 4, 2025, https://www.cigionline.org/articles/militarizing-ai-how-to-catch-the-digital-dragon/
  9. Summary of the 2018 Department of Defense Artificial … – DoD, accessed October 4, 2025, https://media.defense.gov/2019/feb/12/2002088963/-1/-1/1/summary-of-dod-ai-strategy.pdf
  10. DOD Releases AI Adoption Strategy > U.S. Department of War …, accessed October 4, 2025, https://www.war.gov/News/News-Stories/Article/Article/3578219/dod-releases-ai-adoption-strategy/
  11. Codifying and Expanding Continuous AI Benchmarking – Federation of American Scientists, accessed October 4, 2025, https://fas.org/publication/codifying-expanding-continuous-ai-benchmarking/
  12. The 2025 AI Index Report | Stanford HAI, accessed October 4, 2025, https://hai.stanford.edu/ai-index/2025-ai-index-report
  13. Economy | The 2025 AI Index Report | Stanford HAI, accessed October 4, 2025, https://hai.stanford.edu/ai-index/2025-ai-index-report/economy
  14. Breaking Down Global Government Spending on AI – HPCwire, accessed October 4, 2025, https://www.hpcwire.com/2024/08/26/breaking-down-global-government-spending-on-ai/
  15. U.S. Military Spending on AI Surges – Time Magazine, accessed October 4, 2025, https://time.com/6961317/ai-artificial-intelligence-us-military-spending/
  16. AI’s Role in World Defense Budget Market – MarketsandMarkets, accessed October 4, 2025, https://www.marketsandmarkets.com/ResearchInsight/ai-impact-analysis-on-world-defense-budget-industry.asp
  17. 10 Best Countries for AI Developers and Talent Pools 2025-26 – Index.dev, accessed October 4, 2025, https://www.index.dev/blog/top-countries-ai-developer-talent-pools
  18. The Global AI Talent Tracker 2.0 – MacroPolo, accessed October 4, 2025, https://archivemacropolo.org/interactive/digital-projects/the-global-ai-talent-tracker/
  19. Global AI Power Rankings: Stanford HAI Tool Ranks 36 Countries in AI, accessed October 4, 2025, https://hai.stanford.edu/news/global-ai-power-rankings-stanford-hai-tool-ranks-36-countries-ai
  20. Semiconductor industry – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Semiconductor_industry
  21. Cloud Market Share Q2 2025: Microsoft Dips, AWS Still Kingpin – CRN, accessed October 4, 2025, https://www.crn.com/news/cloud/2025/cloud-market-share-q2-2025-microsoft-dips-aws-still-kingpin
  22. Project Maven – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Project_Maven
  23. GEOINT Artificial Intelligence, accessed October 4, 2025, https://www.nga.mil/news/GEOINT_Artificial_Intelligence_.html
  24. Maven Smart System – Missile Defense Advocacy Alliance, accessed October 4, 2025, https://missiledefenseadvocacy.org/maven-smart-system/
  25. United States’ Project Maven And The Rise Of AI-Assisted Warfare – Global Defense Insight, accessed October 4, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  26. Replicator (United States military) – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Replicator_(United_States_military)
  27. The Replicator Initiative – Defense Innovation Unit, accessed October 4, 2025, https://www.diu.mil/replicator
  28. U.S. Military Is Struggling to Deploy AI Weapons | The work is being shifted to a new organization, called DAWG, to accelerate plans to buy thousands of drones : r/LessCredibleDefence – Reddit, accessed October 4, 2025, https://www.reddit.com/r/LessCredibleDefence/comments/1nrsxip/us_military_is_struggling_to_deploy_ai_weapons/
  29. Targeting at Machine Speed: The Capabilities—and Limits—of Artificial Intelligence, accessed October 4, 2025, https://mwi.westpoint.edu/targeting-at-machine-speed-the-capabilities-and-limits-of-artificial-intelligence/
  30. China’s ambitions in Artificial Intelligence – European Parliament, accessed October 4, 2025, https://www.europarl.europa.eu/RegData/etudes/ATAG/2021/696206/EPRS_ATA(2021)696206_EN.pdf
  31. China’s Military Employment of Artificial Intelligence and Its Security Implications, accessed October 4, 2025, https://www.iar-gwu.org/print-archive/blog-post-title-four-xgtap
  32. Military Artificial Intelligence, the People’s Liberation Army, and U.S.-China Strategic Competition | CNAS, accessed October 4, 2025, https://www.cnas.org/publications/congressional-testimony/military-artificial-intelligence-the-peoples-liberation-army-and-u-s-china-strategic-competition
  33. Dialogue | Episode 47: China’s Military Bet on the Future A Dialogue with Elsa B. Kania, accessed October 4, 2025, https://dkiapcss.edu/dialogue-episode-47-chinas-military-bet-on-the-future/
  34. China’s Military Reportedly Deploys DeepSeek AI for Non-Combat Duties – FDD, accessed October 4, 2025, https://www.fdd.org/analysis/policy_briefs/2025/03/27/chinas-military-reportedly-deploys-deepseek-ai-for-non-combat-duties/
  35. Global Total Number of Scientific Publications in Artificial Intelligence Share by Country (Units (Publications)) – ReportLinker, accessed October 4, 2025, https://www.reportlinker.com/dataset/c7a7f8eaeb968fd302788b2e529a126109612efb
  36. US and China Lead by a Wide Margin in Global AI Talent List – 36氪, accessed October 4, 2025, https://eu.36kr.com/en/p/3402121739913346
  37. China’s Pursuit of Defense Technologies: Implications for U.S. and Multilateral Export Control and Investment Screening Regimes – CSIS, accessed October 4, 2025, https://www.csis.org/analysis/chinas-pursuit-defense-technologies-implications-us-and-multilateral-export-control-and
  38. Advanced military technology in Russia | 06 Military applications of artificial intelligence: the Russian approach – Chatham House, accessed October 4, 2025, https://www.chathamhouse.org/2021/09/advanced-military-technology-russia/06-military-applications-artificial-intelligence
  39. Russia Capitalizes on Development of Artificial Intelligence in Its Military Strategy, accessed October 4, 2025, https://jamestown.org/program/russia-capitalizes-on-development-of-artificial-intelligence-in-its-military-strategy/
  40. The Role of AI in Russia’s Confrontation with the West | CNAS, accessed October 4, 2025, https://www.cnas.org/publications/reports/the-role-of-ai-in-russias-confrontation-with-the-west
  41. Which Countries Are Experimenting With AI-Powered Weapons? – 24/7 Wall St., accessed October 4, 2025, https://247wallst.com/military/2025/04/16/which-countries-are-experimenting-with-ai-powered-weapons/
  42. 532. Russia and the Convergence of AI, Battlefield Autonomy, and Tactical Nuclear Weapons – Mad Scientist Laboratory, accessed October 4, 2025, https://madsciblog.tradoc.army.mil/532-russia-and-the-convergence-of-ai-battlefield-autonomy-and-tactical-nuclear-weapons/
  43. How Israel’s military rewired battlefield for first AI war | The Jerusalem Post, accessed October 4, 2025, https://www.jpost.com/defense-and-tech/article-867363
  44. AI-assisted targeting in the Gaza Strip – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/AI-assisted_targeting_in_the_Gaza_Strip
  45. Israel – Hamas 2024 Symposium – Beyond the Headlines: Combat Deployment of Military AI-Based Systems by the IDF – Lieber Institute West Point, accessed October 4, 2025, https://lieber.westpoint.edu/beyond-headlines-combat-deployment-military-ai-based-systems-idf/
  46. As Israel uses US-made AI models in war, concerns arise about tech’s role in who lives and who dies – AP News, accessed October 4, 2025, https://apnews.com/article/israel-palestinians-ai-technology-737bc17af7b03e98c29cec4e15d0f108
  47. Defence Artificial Intelligence Strategy – GOV.UK, accessed October 4, 2025, https://www.gov.uk/government/publications/defence-artificial-intelligence-strategy
  48. BRITISH ARMY’S APPROACH TO ARTIFICIAL INTELLIGENCE, accessed October 4, 2025, https://www.army.mod.uk/media/24745/20231001-british_army_approach_to_artificial_intelligence.pdf
  49. Which Countries Are Investing Most in AI? – Investopedia, accessed October 4, 2025, https://www.investopedia.com/countries-investing-the-most-in-ai-11752340
  50. Forbes 2025 AI 50 List – Top Artificial Intelligence Companies Ranked, accessed October 4, 2025, https://www.forbes.com/lists/ai50/
  51. Top 10 Artificial Intelligence in Military Companies in Global 2025 | Global Growth Insights, accessed October 4, 2025, https://www.globalgrowthinsights.com/blog/top-artificial-intelligence-in-military-companies-in-global-updated-global-growth-insights-638
  52. FRANCE, accessed October 4, 2025, https://docs-library.unoda.org/General_Assembly_First_Committee_-Seventy-Ninth_session_(2024)/78-241-France-EN.pdf
  53. The Ministry of Armed Forces presents its new strategy for artificial intelligence (April 2019) – France OTAN, accessed October 4, 2025, https://otan.delegfrance.org/The-Ministry-of-Armed-Forces-presents-its-new-strategy-for-artificial
  54. French thinking on AI integration and interaction with nuclear command and control, force structure, and decision-making – European Leadership Network, accessed October 4, 2025, https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/French-bibliography_AI_Nuclear_Final.pdf
  55. French Minister of the Armed Forces at École Polytechnique to boost AI in Defense, accessed October 4, 2025, https://www.polytechnique.edu/en/news/french-minister-armed-forces-ecole-polytechnique-boost-ai-defense
  56. India unveils ambitious 15-year defence roadmap featuring nuclear carrier, hypersonics, and AI warfare, accessed October 4, 2025, https://defence.in/threads/india-unveils-ambitious-15-year-defence-roadmap-featuring-nuclear-carrier-hypersonics-and-ai-warfare.15458/
  57. AI in the military: India’s path to ethical and strategic leadership | Hindustan Times, accessed October 4, 2025, https://www.hindustantimes.com/ht-insight/future-tech/ai-in-the-military-india-s-path-to-ethical-and-strategic-leadership-101758966031936.html
  58. India’s Military AI Roadmap: Trust, Enforcement, and Global South Leadership, accessed October 4, 2025, https://completeaitraining.com/news/indias-military-ai-roadmap-trust-enforcement-and-global/
  59. Implementing Artificial Intelligence in the Indian Military – Delhi Policy Group, accessed October 4, 2025, https://www.delhipolicygroup.org/publication/policy-briefs/implementing-artificial-intelligence-in-the-indian-military.html
  60. Theatre command: How India is looking to integrate Air Force, Navy and Army operations under a new strategy, accessed October 4, 2025, https://m.economictimes.com/news/defence/indian-army-indian-air-force-theatre-command-indian-navy-operation-sindoor-india-pakistan-war-india-defence-integration-plan-modi/articleshow/124270382.cms
  61. National AI Strategy Policy Directions – Press Releases – 과학기술정보통신부 >, accessed October 4, 2025, https://www.msit.go.kr/eng/bbs/view.do?sCode=eng&mId=4&mPid=2&pageIndex=&bbsSeqNo=42&nttSeqNo=1040&searchOpt=ALL&searchTxt=&ref=newsletters.qs.com
  62. South Korea is successfully moving forward with the implementation of AI in the defense sector | DEFENSEMAGAZINE.com, accessed October 4, 2025, https://www.defensemagazine.com/article/south-korea-is-successfully-moving-forward-with-the-implementation-of-ai-in-the-defense-sector
  63. Will the One Ring Hold? Defense AI in South Korea – ResearchGate, accessed October 4, 2025, https://www.researchgate.net/publication/382372312_Will_the_One_Ring_Hold_Defense_AI_in_South_Korea
  64. BMWE – Artificial intelligence – bundeswirtschaftsministerium.de, accessed October 4, 2025, https://www.bundeswirtschaftsministerium.de/Redaktion/EN/Artikel/Technology/artificial-intelligence.html
  65. AI Strategies – Home – Plattform Lernende Systeme, accessed October 4, 2025, https://www.plattform-lernende-systeme.de/ai-strategies.html
  66. Artificial Intelligence in Land Forces – Bundeswehr, accessed October 4, 2025, https://www.bundeswehr.de/resource/blob/156026/79046a24322feb96b2d8cce168315249/download-positionspapier-englische-version-data.pdf
  67. Artificial Intelligence in the Armed Forces: On the need for regulation regarding autonomy in weapon systems | Bundesakademie für Sicherheitspolitik, accessed October 4, 2025, https://www.baks.bund.de/en/working-papers/2018/artificial-intelligence-in-the-armed-forces-on-the-need-for-regulation-regarding
  68. Battlefield Disruption: German Military Seeks to Adapt as AI …, accessed October 4, 2025, https://www.spiegel.de/international/germany/battlefield-disruption-german-military-seeks-to-adapt-as-ai-changes-warfare-a-ebb36190-8b79-4e85-bd21-e765a9fc9857
  69. DAIO – Defense AI Observatory, accessed October 4, 2025, https://defenseai.eu/english
  70. Helsing | Artificial intelligence to protect our democracies, accessed October 4, 2025, https://helsing.ai/
  71. German military seeks high-tech edge with AI and drones – Harici, accessed October 4, 2025, https://harici.com.tr/en/german-military-seeks-high-tech-edge-with-ai-and-drones/
  72. The peace of Japan and the AI – Japan Up Close, accessed October 4, 2025, https://japanupclose.web-japan.org/policy/p20250228_1.html
  73. Japan Sets Hard Line on Military AI: Humans Stay in Charge, accessed October 4, 2025, https://militaryai.ai/japan-military-ai-rules/
  74. Japan promotes stringent standards for defense AI, accessed October 4, 2025, https://ipdefenseforum.com/2025/09/japan-promotes-stringent-standards-for-defense-ai/
  75. Artificial Intelligence for the Defence of Japan: Cautious but Steady Progress – RSIS, accessed October 4, 2025, https://rsis.edu.sg/rsis-publication/rsis/artificial-intelligence-for-the-defence-of-japan-cautious-but-steady-progress/
  76. US, Japan formalize SAMURAI project arrangement to advance AI safety in unmanned aerial vehicles > Air Reserve Personnel Center > Article Display, accessed October 4, 2025, https://www.arpc.afrc.af.mil/News/Article-Display/Article/4311811/us-japan-formalize-samurai-project-arrangement-to-advance-ai-safety-in-unmanned/
  77. US, Japan formalize SAMURAI project arrangement to advance AI safety in unmanned aerial vehicles > Air Force > Article Display – AF.mil, accessed October 4, 2025, https://www.af.mil/News/Article-Display/Article/4311811/us-japan-formalize-samurai-project-arrangement-to-advance-ai-safety-in-unmanned/
  78. Strategic Alignment – Canada.ca, accessed October 4, 2025, https://www.canada.ca/en/department-national-defence/corporate/reports-publications/dnd-caf-artificial-intelligence-strategy/strategic-alignment.html
  79. ARTIFICIAL INTELLIGENCE STRATEGY – Canada.ca, accessed October 4, 2025, https://www.canada.ca/content/dam/dnd-mdn/documents/reports/ai-ia/dndcaf-ai-strategy.pdf
  80. Canadian Armed Forces Unveil Ambitious AI Strategy for 2030 – BABL AI, accessed October 4, 2025, https://babl.ai/canadian-armed-forces-unveil-ambitious-ai-strategy-for-2030/
  81. DRDC participates in multinational experiment Project Convergence …, accessed October 4, 2025, https://science.gc.ca/site/science/en/blogs/defence-and-security-science/drdc-participates-multinational-experiment-project-convergence-capstone-4
  82. AI minister denies that Canada needs to ‘catch up’ with global industry | Power & Politics, accessed October 4, 2025, https://www.youtube.com/watch?v=slqS4UUSQYo
  83. Understanding the Military AI Ecosystem of Ukraine – CSIS, accessed October 4, 2025, https://www.csis.org/analysis/understanding-military-ai-ecosystem-ukraine
  84. List of countries with highest military expenditures – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/List_of_countries_with_highest_military_expenditures
  85. Research and Development | The 2025 AI Index Report | Stanford HAI, accessed October 4, 2025, https://hai.stanford.edu/ai-index/2025-ai-index-report/research-and-development
  86. Semiconductor Market Size, Share, Growth & Forecast [2032] – Fortune Business Insights, accessed October 4, 2025, https://www.fortunebusinessinsights.com/semiconductor-market-102365
  87. Modernizing Military Decision-Making: Integrating AI into Army Planning, accessed October 4, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2025-OLE/Modernizing-Military-Decision-Making/
  88. (U) The PLA and Intelligent Warfare: A Preliminary Analysis – CNA.org., accessed October 4, 2025, https://www.cna.org/reports/2021/10/The-PLA-and-Intelligent-Warfare-A-Preliminary-Analysis.pdf

The Cognitive Contest: Deconstructing China’s ‘Military Brain’ and Forging America’s Path to AI Supremacy

The strategic competition between the United States and the People’s Republic of China (PRC) is increasingly defined by the race for artificial intelligence (AI) supremacy. This contest extends far beyond technological one-upmanship, representing a fundamental clash of military doctrines, organizational structures, and philosophical visions for the future of warfare. This report provides a comparative analysis of China’s multi-faceted military AI initiatives—collectively termed the “Military Brain”—and the United States’ efforts to secure a decisive technological edge. While the U.S. currently maintains a foundational lead in key technologies such as advanced semiconductors and aggregate computing power, China possesses a more cohesive, expansive, and arguably more revolutionary strategic vision. Beijing’s approach is not merely to field new weapons but to fundamentally alter the character of conflict, shifting the central arena from the physical battlefield to the cognitive domain. This presents a unique and asymmetric challenge that U.S. strategy, currently focused on achieving “decision advantage” within existing warfighting paradigms, is not yet fully configured to meet. Overcoming this requires the United States to not only accelerate its own technological integration but also to broaden its strategic vision to compete and win in the cognitive contest that has already begun.


I. Deconstructing the ‘China Military Brain’: From Cognitive Warfare to Intelligentization

The concept of a “China Military Brain” is not a single, monolithic program but rather a strategic constellation of advanced doctrine, ambitious technology projects, and novel operational concepts. It represents a “whole-of-society” endeavor aimed at achieving a revolutionary leap in military affairs, moving beyond the physical and informational to target the cognitive faculties of an adversary. This holistic vision is underpinned by a new warfighting paradigm, specific technological pursuits in brain-machine science, a focus on cognitive dominance, and a state-directed system for harnessing national innovation.

The Doctrine of Intelligentized Warfare (智能化战争): Charting the PLA’s New Paradigm

The People’s Liberation Army (PLA) is formally charting a new military paradigm centered on AI, viewing it as a historical shift on par with mechanization and informatization.1 PLA theorists conceptualize this evolution as a progression of military enhancement: mechanization extended the military’s “limbs,” informatization sharpened its “senses” (eyes and ears), and intelligentization will now augment its “brain”.4 This is not seen as a mere technological upgrade but as a fundamental change in the character of war.

Core to this doctrine is the concept of “intelligentized warfare” (智能化战争), which PRC writers describe as a new stage of conflict based on the extensive use of AI and autonomy, creating a hybrid of human and machine intelligence.1 This paradigm is built on three pillars: data, which is considered the “new oil”; algorithms, which will turn warfare into a contest between competing code; and massive computing power.5 In this vision, intelligent systems are expected to augment and, in some cases, partially replace human command functions to achieve unprecedented speed and efficiency.6

This doctrine extends into highly advanced theoretical constructs. One such concept, articulated by China’s Ministry of Defense, is “Dissipative Warfare” (耗散战). This framework views future conflict as a comprehensive, integrated confrontation across the physical, information, and cognitive domains.7 It explicitly merges military offense and defense with political maneuvering, economic competition, and cultural conflict, shifting the strategic center of gravity from an adversary’s military forces to its entire social system.7 This reveals a holistic approach to national power where victory is achieved by inducing systemic collapse in an opponent.

The ultimate culmination of this thinking is what PLA theorists call “Meta-War” (元战争). This concept links the physical battlefield with a parallel virtual battlefield and, most critically, the “brain battlefield” (头脑战场) of human perception and cognition.2 In this framework, human soldiers and their weapons function as “dual entities,” existing simultaneously in the physical world and as digital twins in a virtual space, able to switch between these realities to simulate, predict, and engage in combat.2

The China Brain Project (中国脑计划): The Technological Pillars

The technological heart of this strategic vision is the “China Brain Project” (中国脑计划), a 15-year national initiative approved in 2016.9 Its structure is deliberately dual-use, described as “one body, two wings.” The “body” is the core scientific goal of understanding the fundamental principles of the human brain. The “two wings” represent the project’s co-equal applications: treating brain disorders and developing brain-machine intelligence technologies.10 This structure provides a benign, publicly acceptable facade for research that directly feeds advanced military capabilities. By framing half of the initiative around medical benefits, Beijing gains access to international scientific collaboration and talent that a purely military program could not, while its Military-Civil Fusion strategy ensures all breakthroughs are immediately evaluated for defense applications. This represents a strategically shrewd approach to pursuing paradigm-shifting asymmetric capabilities.

The project is focused on three key research areas:

  1. Brain-Inspired Artificial Intelligence (BI-AI, 类脑智能): This research seeks to move beyond current machine learning by emulating the actual neuronal functioning and architecture of the biological brain, not just mimicking its behavioral outputs. The goal is to create AI that is far more efficient and capable of the high-order tasks that humans perform effortlessly.9
  2. Connectomics (“Brain Mapping,” 人脑连接组): This involves the empirical and computational effort to map and replicate the brain’s complex structure and functioning. AI is used both to test the resulting simulations and to interpret the vast amounts of data generated from imaging brain sections.9
  3. Brain-Computer Interfaces (BCI, 脑机接口): This is the most direct military application, aiming to create high-bandwidth pathways between the human brain and external machines.9 PLA-affiliated writings describe using BCIs to allow soldiers to control drones and other robotic systems with their thoughts, to have their sensory perception augmented with digital sensor data (achieving “千里眼,” or thousand-mile eyes), and even to enable a form of battlefield “telepathy” for silent, covert communication in high-risk environments.2

Cognitive Domain Operations: The War for the Mind

Perhaps the most ambitious and potentially disruptive element of China’s strategy is its explicit focus on the cognitive domain. The ultimate goal is to achieve “mind dominance” 12 by “controlling the brain” of an adversary to subdue their will to fight, thereby realizing Sun Tzu’s ancient ideal of winning without a single battle (“不战而屈人之兵”).8

This effort is a supercharged extension of the PLA’s long-standing “Three Warfares” doctrine, which targets public opinion, psychological states, and legal frameworks.8 AI and big data are seen as the catalysts that can elevate these concepts to a new level of precision and scale. By harvesting and analyzing massive datasets on populations, the PLA aims to conduct cognitive warfare at a granular level, crafting influence operations at machine speed that are tailored to specific demographics, groups, or even key individuals to shape perceptions, sow discord, and disrupt societal cohesion.8

This ambition extends to the development of what U.S. intelligence and PLA writings refer to as “neuro-strike” or “brain-control weaponry” (脑控武器).13 While the technological maturity of such concepts is uncertain, the clear intent is to research capabilities that can directly interfere with human cognitive functions, disrupt leadership decision-making, and demoralize entire populations. This represents a profound asymmetric threat that seeks to bypass conventional military strength entirely.

Military-Civil Fusion (MCF): The Engine of Advancement

The engine driving this entire enterprise is China’s national strategy of Military-Civil Fusion (MCF, 军民融合). Personally overseen by Xi Jinping, MCF is a state-directed, whole-of-society effort to eliminate all barriers between China’s civilian research institutions, its commercial technology sector, and its military-defense industrial base.16 The explicit goal is to ensure that any and all national innovation, particularly in dual-use fields like AI, directly serves the PLA’s modernization.19

Under MCF, the PLA is able to leverage China’s unique advantages, including its vast, state-accessible data resources for training AI models 21, and to tap into the dynamism of its private technology companies.19 The strategy also facilitates the acquisition of foreign technology and expertise through a variety of means, both licit and illicit, including talent recruitment programs, academic collaboration, and outright theft.16 While MCF faces its own internal bureaucratic and cultural hurdles 23, its top-down, state-directed nature provides a powerful mechanism for mobilizing national resources toward a singular strategic goal, creating a stark contrast with the U.S. innovation model.


II. The American Pursuit of Decision Advantage

The United States’ approach to military AI is philosophically and structurally distinct from China’s. It is rooted in a more pragmatic, capability-focused vision aimed at empowering the human warfighter rather than fundamentally redefining the nature of war. This vision is being pursued through a massive networking initiative, foundational research programs focused on trustworthiness, and a unique public-private innovation ecosystem that is both a source of immense strength and significant friction.

The JADC2 Imperative: A Networked Vision of Warfare

The central organizing concept for the U.S. military’s AI-enabled future is the pursuit of “Decision Advantage”.25 The core premise is that in a future conflict against a peer adversary, victory will belong to the side that can most rapidly and effectively execute the decision cycle: sensing the battlefield, making sense of the information, and acting upon it.27

The primary vehicle for achieving this is Joint All-Domain Command and Control (JADC2). JADC2 is not a single weapon system but a broad, conceptual approach to connect sensors, platforms, and personnel from all branches of the military—Army, Navy, Air Force, Marines, and Space Force—into a single, unified, AI-powered network.29 The goal is to break down traditional service stovepipes and deliver the right information to the right decision-maker at the “speed of relevance,” enabling commanders to act inside an adversary’s decision cycle.27 This effort is being built upon service-specific contributions, including the Army’s Project Convergence, the Navy’s Project Overmatch, and the Air Force’s Advanced Battle Management System (ABMS).29 Recognizing the importance of coalition warfare, the concept is evolving into

Combined JADC2 (CJADC2), which aims to integrate the command and control systems of key allies and partners into this network architecture.31

The U.S. approach is thus focused on perfecting its existing doctrine of joint, all-domain operations by developing a new set of technological capabilities. Where China’s doctrine speaks of a new conceptual state of being (“intelligentized warfare”), the U.S. focuses on a measurable, operational outcome (“decision advantage”). This makes the U.S. vision more pragmatic and quantifiable, but also potentially less strategically ambitious than China’s revolutionary aims.

Foundational Programs: From Maven to DARPA’s Moonshots

The technological underpinnings of JADC2 are driven by several key initiatives. Project Maven, officially the Algorithmic Warfare Cross-Functional Team, has served as a critical pathfinder for operationalizing AI.33 Its initial focus was on applying machine learning and computer vision to autonomously detect and classify objects of interest from the massive volume of full-motion video and imagery collected by ISR platforms.34 Project Maven has demonstrated real-world utility, having been used to support the 2021 Kabul airlift and to provide intelligence to Ukrainian forces, proving its value in turning data into actionable intelligence.33

While Maven operationalizes existing AI, the Defense Advanced Research Projects Agency (DARPA) pushes the technological frontier. DARPA’s multi-billion-dollar “AI Next” campaign was designed to move the field beyond the limitations of current (second-wave) machine learning toward a third wave of AI capable of “contextual reasoning,” with the goal of transforming AI from a mere tool into a true partner for human operators.36 Building on this, the subsequent

“AI Forward” initiative has pivoted to address what the Department of Defense (DoD) sees as the most critical barrier to widespread adoption: the need for trustworthy AI.38 This effort focuses on developing AI that is explainable, robust, and reliable, with an emphasis on foundational theory, rigorous AI engineering, and effective human-AI teaming.38 This deep institutional focus on trust and explainability represents a core philosophical divergence from China’s approach, which prioritizes performance and political control.

The Public-Private Ecosystem: Harnessing Commercial Innovation

The U.S. military AI strategy relies heavily on leveraging the nation’s world-leading commercial technology sector, a stark contrast to China’s state-centric MCF model.21 Programs like Project Maven have been built through partnerships with private industry leaders such as Palantir, Microsoft, and Amazon Web Services.33 This model provides the DoD with access to cutting-edge innovation, a dynamic and competitive ecosystem, and a massive advantage in private R&D investment, which dwarfed China’s by nearly a factor of ten in 2023 ($67.2 billion vs. $7.8 billion).21

However, this reliance on the private sector also introduces unique challenges. The cultural and ethical divides between Silicon Valley and the Pentagon can create friction, as exemplified by the employee protests that led Google to withdraw from Project Maven.33 It necessitates new and flexible partnership models, such as the General Services Administration’s landmark agreement to provide OpenAI’s enterprise tools across the federal government, to bridge these gaps.42

Implementation Realities: The Hurdles to a Unified Network

Despite its technological strengths, the full realization of the JADC2 vision is hindered by significant, primarily non-technological, barriers. The central U.S. challenge is not a lack of innovation but a persistent difficulty with integration. The DoD’s vast, federated structure has proven resistant to the kind of top-down, unified approach that JADC2 requires.

Key implementation hurdles include:

  • Inter-service Stovepipes: Deep-seated cultural and budgetary divisions between the military services have led to each developing its own interpretation of JADC2, resulting in a lack of alignment, common standards, and true interoperability.43
  • Data Governance and Sharing: A pervasive culture of “data ownership” within individual services and agencies prevents the free flow of information that is the lifeblood of JADC2. Shifting to an enterprise-wide “data stewardship” model has proven to be a major cultural and policy challenge.43
  • Bureaucratic and Acquisition Inertia: The DoD’s traditional, slow-moving acquisition system is ill-suited for the rapid, iterative development cycles of software and AI. Overcoming this inertia and moving away from legacy systems is a persistent struggle.45
  • Over-classification: The tendency to over-classify information creates unnecessary barriers to sharing data both within the joint force and with crucial international partners, directly undermining the goals of CJADC2.44

Reports from the Government Accountability Office confirm that the DoD remains in the early stages of defining the detailed scope, cost, and schedule for JADC2, underscoring the immense difficulty of implementing such a sweeping vision across a complex and often fragmented organization.46 This reveals the core asymmetry of the competition: the United States excels at creating superior individual components but struggles to integrate them into a coherent whole, whereas China’s state-directed model is designed for integration but faces challenges in innovating those foundational components.


III. Comparative Assessment: A Tale of Two Visions

A direct comparison of U.S. and Chinese military AI efforts reveals a complex landscape of asymmetric advantages. The question of “who is more advanced” cannot be answered with a single verdict; rather, it requires a multi-layered assessment of technology, data, integration, and strategic vision. The two nations are not simply running the same race at different speeds; they are pursuing fundamentally different goals, driven by divergent philosophies of warfare and national power.

Who is More Advanced? A Multi-Layered Analysis

The leadership in military AI is contested and varies significantly depending on the metric of evaluation:

  • Foundational Technology (Advantage: USA): The United States maintains a decisive lead in the most critical enabling technologies. This includes a multi-generational advantage in high-end semiconductor design and fabrication, a critical bottleneck for China.48 Furthermore, the U.S. possesses a substantial lead in aggregate compute capacity, which is essential not only for training advanced AI models but also for deploying and integrating them at scale across the military enterprise.49 While Chinese models are rapidly closing the gap on performance benchmarks, America’s underlying hardware and systems integration capacity provide a more durable and comprehensive advantage.49
  • Data Resources (Advantage: China): China possesses a significant advantage in the sheer volume of data available for training AI models. Its large population, centralized data collection systems, and lax privacy regulations create a vast reservoir of information, particularly for developing surveillance and recognition algorithms that have direct military applications in intelligence, surveillance, and reconnaissance (ISR) and automated targeting.21
  • Operational Integration and Procurement (Advantage: Contested/Leaning China): Analysis from the Center for Security and Emerging Technology (CSET) suggests the PLA has made “extraordinary progress” in procuring AI systems for combat and support functions, with annual spending estimated to be on par with that of the U.S. military.51 China’s state-directed MCF model may enable faster and more focused adoption of specific capabilities, such as drone swarms and autonomous undersea vehicles, compared to the bureaucratically encumbered U.S. JADC2 effort.50 However, some Chinese defense experts express their own concerns that the PLA remains behind the U.S. in fielding and effectively using AI-enabled systems, indicating this is a highly contested area.53
  • Doctrinal Absorption (Advantage: China): The PLA appears to be more deeply and holistically integrating AI-centric concepts into its highest levels of military doctrine and strategic thought.1 Concepts like “intelligentized warfare” are central to the PLA’s vision of the future. In contrast, the U.S. is still largely focused on fitting new AI capabilities into its existing doctrinal frameworks, wrestling with the organizational changes required for true transformation.46

Breadth and Logic of Vision: Holistic Transformation vs. Decisive Advantage

The most significant divergence lies in the scope and ambition of each nation’s strategic vision.

  • China’s Vision (Broader): China’s vision is a “whole-of-society” endeavor that is demonstrably broader and more holistic.20 It fuses military objectives with economic, political, and cognitive strategies, aiming not just for battlefield victory but for “mind dominance” and the systemic paralysis of an adversary.7 The logic is totalistic: to leverage every instrument of national power, amplified by AI, to achieve strategic goals and reshape the international order.15 Its primary strength is this top-down strategic alignment; its potential weakness is the rigidity and fragility inherent in a system dependent on a single point of political control.
  • U.S. Vision (More Focused): The U.S. vision is more focused, pragmatic, and centered on a military-operational problem: achieving “decision advantage” to win on the future battlefield.26 The logic is to use superior technology to sense, process, and act on information faster than an adversary, empowering human commanders to make better, quicker decisions.27 Its strength lies in its alignment with democratic values, its emphasis on human agency, and its ability to harness a dynamic commercial innovation base. Its primary weakness is its potential narrowness, which risks underestimating and failing to prepare for the broader cognitive and political dimensions of the competition that China is actively prioritizing.

The Ethical Divide: Political Control vs. Principled Responsibility

The ethical frameworks governing military AI in each country represent a fundamental and strategic point of contrast.

  • China’s Approach: The PLA’s primary ethical consideration is internal and political: how to reconcile the operational necessity of AI autonomy with the Chinese Communist Party’s (CCP) non-negotiable demand for absolute political control over all military assets.55 The PLA’s approach is highly pragmatic and opaque; “ethical” behavior is ultimately defined as that which aligns with Party guidance and maintains Party control.55 While China engages in international discussions on AI ethics, its core driver remains political reliability, not abstract principle.57
  • U.S. Approach: The DoD has publicly adopted a formal, principles-based framework for Responsible AI (RAI).59 This framework is explicitly grounded in pre-existing legal commitments, including the Law of War, and established ethical norms.60 It emphasizes concepts such as meaningful human control over lethal force, transparency, traceability, and accountability. The United States is actively promoting this framework on the world stage, seeking to establish it as a global standard for responsible military innovation.62

The question of which nation has the “best” or most logical vision is therefore contingent on one’s theory of future great power conflict. If that conflict remains primarily a contest of military force where the speed and precision of effects are decisive, the U.S. vision is well-calibrated. However, if future conflict is primarily a cognitive and political struggle where societal cohesion and the will to fight are the main targets, China’s doctrine is more explicitly designed for this reality. A truly resilient and logical strategy must be able to compete and win in both arenas. Currently, China’s vision is more comprehensive in its definition of the problem, creating a strategic imperative for the United States to broaden its own.

Table 1: Comparative Framework of U.S. and Chinese Military AI Strategies

AttributePeople’s Republic of ChinaUnited States
Overarching DoctrineIntelligentized Warfare / Meta-WarDecision Advantage / JADC2
Core VisionHolistic transformation of warfare; achieving “mind dominance”Empowering human decision-makers; achieving speed and precision
Key National ProgramChina Brain Project (BI-AI, BCI)DARPA AI Next / AI Forward (Trustworthy AI)
Organizational ModelMilitary-Civil Fusion (State-Directed)Public-Private Partnership (Commercially-Led)
Primary FocusCognitive domain, BCI, swarm autonomy, systems destructionNetworked C2, data fusion, human-machine teaming, ISR
Ethical FrameworkPragmatic; driven by the need for CCP political controlFormalized Responsible AI (RAI); driven by legal/ethical principles
Key StrengthsTop-down strategic alignment; rapid resource mobilization; vast data accessFoundational tech leadership (chips); superior compute; dynamic innovation ecosystem
Key WeaknessesTechnological chokepoints (chips); potential for systemic rigidity; the paradox of controlBureaucratic hurdles to adoption; inter-service stovepipes; integration challenges

IV. The Path Forward: A Five-Year Strategy for the United States

To counter China’s comprehensive strategy and secure a durable advantage in the AI era, the United States must pursue a multi-pronged strategy over the next five years. This strategy must address its primary internal weaknesses in integration while simultaneously expanding its asymmetric strengths and broadening its strategic vision to meet the full scope of the cognitive challenge.

Recommendation 1: Solidify the Foundations – Win the JADC2 Battle at Home

The most significant impediment to U.S. military AI dominance is the failure to effectively integrate its superior technological components. This internal challenge must be the first priority.

Actions:

  • Empower a JADC2 Authority: Establish a JADC2 “czar” or a fully empowered joint program office with genuine budgetary and requirements authority over the services’ JADC2-related programs. This body must be empowered to enforce common standards, break down stovepipes, and ensure true interoperability.43
  • Mandate Enterprise-Wide Data Sharing: The Secretary of Defense should issue a directive mandating a shift from a culture of “data ownership” to one of “data stewardship.” This must be enforced by a central DoD data governance body with the authority to compel services to make data assets visible, accessible, and intelligible across the joint force.43
  • Reform AI Acquisition: Aggressively expand the use of agile acquisition pathways, such as Other Transaction Authority (OTA), for all AI and software-intensive programs. This will create streamlined mechanisms to rapidly transition cutting-edge commercial innovation from the private sector to the warfighter, bypassing legacy bureaucratic hurdles.45

Recommendation 2: Expand the Asymmetric Advantage – Compute, Talent, and Alliances

The U.S. must widen its lead in the foundational elements of AI power where China remains most vulnerable and where the U.S. holds a distinct advantage.

Actions:

  • Dominate the Semiconductor Race: Double down on policies like the CHIPS and Science Act and coordinate with allies to not only onshore manufacturing but to accelerate R&D into next-generation semiconductor design and advanced packaging. The goal should be to maintain a multi-generational technological lead in the hardware that powers AI.21
  • Launch a National Defense AI Talent Initiative: Create a concerted national effort to attract and retain the world’s best AI talent. This should include streamlining security clearance processes for AI experts, establishing new talent exchange programs between the DoD and private industry, and reforming immigration policies to create a fast track for top-tier global AI researchers.16
  • Operationalize CJADC2 as a Diplomatic Priority: Elevate the “Combined” aspect of CJADC2 from a technical goal to a core diplomatic effort. This involves deepening collaborative AI R&D, establishing common data and ethical frameworks, and conducting regular, large-scale joint exercises with key allies (e.g., the Five Eyes, Japan, South Korea, and key NATO partners) to build a deeply integrated, networked coalition that China cannot replicate.31

Recommendation 3: Counter the Cognitive Threat

The U.S. must develop a comprehensive national strategy to defend against and deter China’s cognitive warfare operations, an area where current defenses are dangerously inadequate.

Actions:

  • Establish a National Cognitive Security Center: Create a new, inter-agency center co-led by the DoD, the Intelligence Community, and the Department of Homeland Security. Its mission would be to coordinate the detection, analysis, and countering of foreign, AI-driven disinformation and influence operations targeting the U.S. military and public.8
  • Spur Counter-Influence Technology: Launch a DARPA-led grand challenge to develop advanced, real-time technologies for detecting and attributing AI-generated deepfakes, synthetic media, and coordinated inauthentic behavior online.
  • Build Societal Resilience: Invest in public education and media literacy programs to inoculate the American populace against the divisive narratives that are the primary weapons of cognitive warfare, thereby strengthening the nation’s cognitive defenses from the ground up.

Recommendation 4: Beyond Decision Advantage – Crafting a Broader American Vision

To effectively compete with China’s holistic strategy, the U.S. must evolve its own military doctrine to formally recognize and address the broader dimensions of modern conflict.

Actions:

  • Develop a Doctrine for Integrated Cognitive-Domain Operations: The Joint Staff, in coordination with the National Security Council, should initiate a formal process to develop a U.S. doctrine for operations in the cognitive domain. This would recognize the human mind as a contested battlefield and articulate how the instruments of national power—diplomatic, informational, military, and economic (DIME)—can be integrated to defend against and conduct cognitive operations in a manner consistent with democratic principles.
  • This new doctrine must explicitly address the role of AI in both defending against and, where necessary and lawful, conducting influence and psychological operations to deter aggression and shape the strategic environment.

Recommendation 5: Weaponize Responsibility – Leveraging the Ethical High Ground

The U.S. commitment to Responsible AI should be transformed from a perceived constraint into a potent strategic advantage that distinguishes the U.S. and its allies from their authoritarian rivals.

Actions:

  • Lead on International Norms: Launch a major diplomatic initiative to build upon the U.S. Political Declaration on Responsible Military Use of AI, with the goal of making its principles the foundation for a binding international treaty or a widely adopted set of norms among the world’s democracies.62
  • Condition AI Sales and Transfers: In all foreign military sales and technology-sharing agreements involving AI-enabled systems, require partner nations to adopt and adhere to RAI principles as a condition of the transfer. This will help build a global military AI ecosystem based on U.S. standards of safety, ethics, and reliability.
  • Highlight the Authoritarian Contradiction: Use public diplomacy and strategic communications to consistently expose the fundamental weakness in China’s approach: the impossibility of guaranteeing safe, reliable, or ethical AI when a system’s ultimate arbiter is not objective law or principle, but the shifting political imperatives of the CCP.55

V. Conclusion

The contest for military AI supremacy between the United States and China is a competition between two profoundly different systems. The United States currently holds a critical advantage in foundational technology, talent, and innovation, but this lead is fragile. China’s broader, more cohesive, and more revolutionary strategic vision—which integrates technological development with a “whole-of-society” mobilization and a doctrine aimed at cognitive dominance—poses a long-term threat that cannot be countered by superior microchips alone.

China is preparing for a future war fought not just on land, at sea, and in the air, but in the virtual space of networks and the cognitive space of the human mind. The U.S., while building a formidable technological arsenal, is still primarily focused on winning a faster and more efficient version of the last war. The nation with the best vision for the future will not be the one with the single best algorithm, but the one that can most successfully integrate its technological prowess, its organizational structure, and its guiding principles into a coherent and resilient whole. The five-year strategy outlined in this report is designed to ensure that nation is the United States, by first fixing its critical internal integration challenges while simultaneously broadening its strategic vision to compete and win in every domain—physical, virtual, and, most decisively, cognitive.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. PLA’s Perception about the Impact of AI on Military Affairs*, accessed October 4, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/04.pdf
  2. The Path to China’s Intelligentized Warfare: Converging on the Metaverse Battlefield – The Cyber Defense Review, accessed October 4, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2024-Fall/Baughman_CDRV9N3-Fall-2024.pdf
  3. 463. Intelligentization and the PLA’s Strategic Support Force – Mad Scientist Laboratory, accessed October 4, 2025, https://madsciblog.tradoc.army.mil/463-intelligentization-and-the-plas-strategic-support-force/
  4. 从多维视角看智能化战争- 解放军报 – 中国军网, accessed October 4, 2025, http://www.81.cn/jfjbmap/content/2022-07/07/content_319277.htm
  5. The PLA and Intelligent Warfare: A Preliminary Analysis | CNA, accessed October 4, 2025, https://www.cna.org/analyses/2021/10/the-pla-and-intelligent-warfare-preliminary-analysis
  6. 智能化战争并不遥远 – 求是, accessed October 4, 2025, https://www.qstheory.cn/llwx/2019-08/08/c_1124851802.htm
  7. 耗散战:智能化战争典型方式- 中华人民共和国国防部, accessed October 4, 2025, http://www.mod.gov.cn/gfbw/jmsd/16222934.html
  8. 547. Challenging Reality: Chinese Cognitive Warfare and the Fight to Hack Your Brain, accessed October 4, 2025, https://madsciblog.tradoc.army.mil/547-challenging-reality-chinese-cognitive-warfare-and-the-fight-to-hack-your-brain/
  9. China’s “New Generation” AI-Brain Project > National Defense …, accessed October 4, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2846343/chinas-new-generation-ai-brain-project/
  10. Neurotechnology for National Defense: the U.S. and China – The …, accessed October 4, 2025, https://www.thecipherbrief.com/column_article/neurotechnology-for-national-defense-the-u-s-and-china
  11. 脑机接口的军事前景-瞭望周刊社, accessed October 4, 2025, https://lw.xinhuanet.com/20241021/8a1493f85c7249819ea1299c747f7bd2/c.html
  12. China’s mysterious Brain Project aims to turn science fiction into a reality – YouTube, accessed October 4, 2025, https://www.youtube.com/watch?v=L6ch9zs-ic0
  13. 脑控武器:亦真亦幻有点“玄” – 解放军报- 中国军网, accessed October 4, 2025, http://www.81.cn/jfjbmap/content/2018-06/01/content_207604.htm
  14. 攻击中国研发“脑控武器” 美制裁12家中国科研机构 – 新浪军事, accessed October 4, 2025, https://mil.sina.cn/zgjq/2021-12-17/detail-ikyamrmy9526429.d.html
  15. 报告:中国军方在脑部”神经打击”武器领域领先全球 – Radio Free Asia, accessed October 4, 2025, https://www.rfa.org/mandarin/Xinwen/8-07072023153947.html
  16. Military-Civil Fusion – State Department, accessed October 4, 2025, https://www.state.gov/wp-content/uploads/2020/05/What-is-MCF-One-Pager.pdf
  17. The Chinese Communist Party’s Military-Civil Fusion Policy – state.gov, accessed October 4, 2025, https://2017-2021.state.gov/military-civil-fusion/
  18. China’s Evolving Conception of Civil-Military Collaboration | Trustee China Hand – CSIS, accessed October 4, 2025, https://www.csis.org/blogs/trustee-china-hand/chinas-evolving-conception-civil-military-collaboration
  19. China Is Using the Private Sector to Advance Military AI | Center for Security and Emerging Technology, accessed October 4, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  20. SECTION 2: EMERGING TECHNOLOGIES AND MILITARY-CIVIL FUSION: ARTIFICIAL INTELLI- GENCE, NEW MATERIALS, AND NEW ENERGY, accessed October 4, 2025, https://www.uscc.gov/sites/default/files/2019-11/Chapter%203%20Section%202%20-%20Emerging%20Technologies%20and%20Military-Civil%20Fusion%20-%20Artificial%20Intelligence%2C%20New%20Materials%2C%20and%20New%20Energy.pdf
  21. The Artificial Intelligence Race: A US and China Comparison – Furt’Her, accessed October 4, 2025, https://www.furt-her.com/the-artificial-intelligence-race-a-us-and-china-comparison/
  22. Full article: Modernizing a giant: assessing the impact of military-civil fusion on innovation in China’s defence-technological industry – Taylor & Francis Online, accessed October 4, 2025, https://www.tandfonline.com/doi/full/10.1080/10242694.2025.2460458
  23. China’s Shift from Civil-Military Integration to Military-Civil Fusion – S. Rajaratnam School of International Studies, accessed October 4, 2025, https://www.rsis.edu.sg/wp-content/uploads/2022/05/Asia-Policy-16.1-Jan-2021-Richard-Bitzinger.pdf
  24. China’s Military-Civil Fusion Strategy: Development, Procurement, and Secrecy – National Bureau of Asian Research, accessed October 4, 2025, https://www.nbr.org/wp-content/uploads/pdfs/publications/ap16-1_china_mcf_rt_jan2021.pdf
  25. Modernizing Military Decision-Making: Integrating AI into, accessed October 4, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2025-OLE/Modernizing-Military-Decision-Making/
  26. DOD Releases AI Adoption Strategy – War.gov, accessed October 4, 2025, https://www.war.gov/News/News-Stories/Article/Article/3578219/dod-releases-ai-adoption-strategy/
  27. Summary of the Joint All-Domain Command and Control Strategy – DoD, accessed October 4, 2025, https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf
  28. JADC2 Explained: Transforming Joint All-Domain Operations for Modern Warfare – Parraid, accessed October 4, 2025, https://www.parraid.com/jadc2-explained/
  29. Joint All-Domain Command and Control – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Joint_All-Domain_Command_and_Control
  30. Joint All-Domain Command and Control (JADC2) – Congress.gov, accessed October 4, 2025, https://www.congress.gov/crs_external_products/IF/PDF/IF11493/IF11493.11.pdf
  31. Chief Digital and Artificial Intelligence Office > Initiatives > CJADC2, accessed October 4, 2025, https://www.ai.mil/Initiatives/CJADC2/
  32. Joint All-Domain Command and Control – JADC2 – SAIC, accessed October 4, 2025, https://www.saic.com/what-we-do/mission-it/jadc2
  33. Project Maven – Wikipedia, accessed October 4, 2025, https://en.wikipedia.org/wiki/Project_Maven
  34. Project Maven to Deploy Computer Algorithms to War Zone by Year’s End, accessed October 4, 2025, https://www.war.gov/News/News-Stories/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/
  35. Targeting the future of the DoD’s controversial Project Maven initiative – C4ISRNet, accessed October 4, 2025, https://www.c4isrnet.com/it-networks/2018/07/27/targeting-the-future-of-the-dods-controversial-project-maven-initiative/
  36. AI Next – DARPA, accessed October 4, 2025, https://www.darpa.mil/research/programs/ai-next
  37. DARPA’s Impact on Artificial Intelligence – AAAI Publications, accessed October 4, 2025, https://ojs.aaai.org/aimagazine/index.php/aimagazine/article/view/5294/7228
  38. AI Forward | DARPA, accessed October 4, 2025, https://www.darpa.mil/research/programs/ai-forward
  39. Summary of the 2018 Department of Defense Artificial Intelligence Strategy – DoD, accessed October 4, 2025, https://media.defense.gov/2019/feb/12/2002088963/-1/-1/1/summary-of-dod-ai-strategy.pdf
  40. AIQ: Artificial Intelligence Quantified – DARPA, accessed October 4, 2025, https://www.darpa.mil/research/programs/aiq-artificial-intelligence-quantified
  41. The Coming Military AI Revolution – Army University Press, accessed October 4, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2024/MJ-24-Glonek/
  42. GSA Announces New Partnership with OpenAI, Delivering Deep Discount to ChatGPT Gov-Wide Through MAS, accessed October 4, 2025, https://www.gsa.gov/about-us/newsroom/news-releases/gsa-announces-new-partnership-with-openai-delivering-deep-discount-to-chatgpt-08062025
  43. Solving the Hidden Challenges of JADC2 – Booz Allen, accessed October 4, 2025, https://www.boozallen.com/insights/jadc2/solving-the-hidden-challenges-of-jadc2.html
  44. Integration Challenges Hinder JADC2 Implementation, Air Force Leaders Say, accessed October 4, 2025, https://govciomedia.com/integration-challenges-hinder-jadc2-implementation-air-force-leaders-say/
  45. Pathways to Implementing Comprehensive and Collaborative JADC2, accessed October 4, 2025, https://www.csis.org/analysis/pathways-implementing-comprehensive-and-collaborative-jadc2
  46. SPECIAL REPORT: Joint All-Domain Command, Control A Journey, Not a Destination, accessed October 4, 2025, https://www.nationaldefensemagazine.org/articles/2023/7/10/joint-all-domain-command-control-a-journey-not-a-destination
  47. Battle Management: DOD and Air Force Continue to Define Joint Command and Control Efforts | U.S. GAO – Government Accountability Office, accessed October 4, 2025, https://www.gao.gov/products/gao-23-105495
  48. US Chips Are Paving China’s Path to AI Superiority and There’s No Easy Fix – Defense One, accessed October 4, 2025, https://www.defenseone.com/technology/2022/07/us-chips-are-paving-chinas-path-ai-superiority-and-theres-no-easy-fix/368906/
  49. China’s AI Models Are Closing the Gap—but America’s Real Advantage Lies Elsewhere, accessed October 4, 2025, https://www.rand.org/pubs/commentary/2025/05/chinas-ai-models-are-closing-the-gap-but-americas-real.html
  50. China’s Pursuit of Defense Technologies: Implications for U.S. and Multilateral Export Control and Investment Screening Regimes – CSIS, accessed October 4, 2025, https://www.csis.org/analysis/chinas-pursuit-defense-technologies-implications-us-and-multilateral-export-control-and
  51. Report: China’s PLA has made ‘extraordinary progress’ in procuring …, accessed October 4, 2025, https://therecord.media/report-chinas-pla-has-made-extraordinary-progress-in-procuring-ai-for-combat
  52. U.S. and Chinese Military AI Purchases | Center for Security and …, accessed October 4, 2025, https://cset.georgetown.edu/publication/u-s-and-chinese-military-ai-purchases/
  53. China’s Military AI Roadblocks | Center for Security and Emerging Technology – CSET, accessed October 4, 2025, https://cset.georgetown.edu/publication/chinas-military-ai-roadblocks/
  54. PLA’s Intelligentized Warfare: The Politics on China’s Military Strategy*, accessed October 4, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/05.pdf
  55. The PRC considers military AI ethics: Can autonomy be trusted …, accessed October 4, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC9640938/
  56. The PRC considers military AI ethics: Can autonomy be trusted? – PubMed, accessed October 4, 2025, https://pubmed.ncbi.nlm.nih.gov/36387011/
  57. Position Paper of the People’s Republic of China on Strengthening Ethical Governance of Artificial Intelligence (AI), accessed October 4, 2025, https://www.mfa.gov.cn/mfa_eng/zy/wjzc/202405/t20240531_11367525.html
  58. Position Paper of the People’s Republic of China on Regulating Military Applications of Artificial Intelligence (AI), accessed October 4, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-SixthReview_Conference_(2021)/CCW-CONF.VI-WP.2.pdf
  59. Responsible Artificial Intelligence Strategy and … – DoD, accessed October 4, 2025, https://media.defense.gov/2024/Oct/26/2003571790/-1/-1/0/2024-06-RAI-STRATEGY-IMPLEMENTATION-PATHWAY.PDF
  60. Ethics and regulation of AI in defence technology: navigating the legal and moral landscape, accessed October 4, 2025, https://www.taylorwessing.com/en/interface/2025/defence-tech/ethics-and-regulation-of-ai-in-defence-technology
  61. Responsible AI Symposium – Translating AI Ethical Principles into Practice: The U.S. DoD Approach to Responsible AI – Lieber Institute, accessed October 4, 2025, https://lieber.westpoint.edu/translating-ai-ethical-principles-into-practice-us-dod-approach/
  62. Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy, accessed October 4, 2025, https://www.state.gov/political-declaration-on-responsible-military-use-of-artificial-intelligence-and-autonomy-2
  63. Battlefield Singularity | CNAS, accessed October 4, 2025, https://www.cnas.org/publications/reports/battlefield-singularity-artificial-intelligence-military-revolution-and-chinas-future-military-power

Enter the Battleverse: China’s Pursuit of Intelligentized Warfare in the Metaverse

This report provides a comprehensive intelligence assessment of the People’s Republic of China’s (PRC) strategic endeavor to develop a military-specific metaverse, termed the “battleverse” (战场元宇宙). Analysis of authoritative Chinese military-technical literature and procurement data indicates that this initiative is not a speculative or isolated technological pursuit, but a core component of the People’s Liberation Army’s (PLA) future warfighting doctrine and a key project within the PRC’s national “Digital China” (数字中国) grand strategy. The battleverse is the logical and necessary culmination of the PLA’s concept of “Intelligentized Warfare” (智能化战争), the designated successor to modern “informatized” conflict.

The PLA envisions the battleverse as a persistent, high-fidelity, virtual-real fused environment that will fundamentally revolutionize military operations across all domains. Its primary purpose is to enable the PLA to achieve “cognitive dominance” over an adversary by seamlessly integrating the physical, virtual, and cognitive (“brain battlefield”) dimensions of conflict. While the comprehensive battleverse remains a future objective, its foundational technologies—particularly Artificial Intelligence (AI) and Digital Twins—are being actively researched, developed, and procured. The most mature applications are currently in advanced training and simulation, where VR/AR systems and AI-driven “Blue Army” adversaries are enhancing training realism and accelerating tactical development.

Concurrently, the PLA is aggressively exploring advanced conceptual frameworks for “Meta-War,” a new form of conflict waged within and through the battleverse. These concepts include combat conducted by virtual avatars, by remotely operated robotic “simulacrums,” and by human soldiers who exist as “dual entities” in both the physical and virtual worlds. This theoretical work, combined with tangible technological progress, presents a significant long-term challenge to the military-technological superiority of the United States and its allies. The PLA’s approach is distinguished by its top-down, doctrine-driven integration and its exploration of higher levels of AI-driven autonomy, creating a potential divergence in the character of future warfare.

This report assesses the strategic drivers behind the battleverse, deconstructs its conceptual architecture, details its current and future applications, provides a comparative analysis with U.S. efforts, and evaluates the associated challenges and strategic implications. The PLA’s pursuit of the battleverse signals a determined effort to master a new form of warfare, one that could provide significant asymmetric advantages in a future conflict, particularly in a scenario involving Taiwan.

I. The Strategic Imperative: From Informatization to Intelligentization

The PLA’s ambition to construct a battleverse is not an ad-hoc reaction to a technological trend. It is the product of a deliberate, decades-long strategic modernization effort, guided by a clear doctrinal vision for the future of warfare and supported by a whole-of-nation grand strategy. Understanding this context is critical to appreciating the depth and seriousness of the battleverse initiative.

The PLA’s Three-Step Modernization Framework

The PLA’s contemporary modernization is structured around a three-phase strategic framework articulated by senior leadership, including PRC President Xi Jinping.1 These overlapping phases are mechanization, informatization, and intelligentization.1

  • Mechanization (机械化), the process of incorporating advanced machinery, vehicles, and conventional platforms, was the primary focus through the early 21st century and was intended to be largely completed by 2020.1
  • Informatization (信息化), the current phase, involves the introduction of networks, information systems, and data into all facets of military operations, from command and control (C2) and intelligence, surveillance, and reconnaissance (ISR) to cyber operations.1
  • Intelligentization (智能化), first formally mentioned in 2019, is the PLA’s vision for the future. While still pursuing the goals of informatization, the PLA is doctrinally and technologically pivoting toward this next phase, which it sees as a new Revolution in Military Affairs.1 Intelligentization is defined by the transformative impact of emerging technologies—specifically Artificial Intelligence (AI), big data, quantum computing, virtual and augmented reality (VR/AR), autonomous systems, and the Internet of Things (IoT)—on 21st-century warfare.1

Recent PLA writings explicitly describe the culmination of this intelligentization phase as leading to “Metaverse War” or “Meta-War,” making the battleverse a defining feature of this future conflict paradigm.1

Defining “Intelligentized Warfare” (智能化战争)

Intelligentized warfare is the PLA’s core warfighting theory for the 21st century. It represents a fundamental shift in the character of conflict, driven primarily by the maturation of AI.3 PLA theorists draw a clear distinction between this new stage and its predecessors based on the human functions they augment. Whereas mechanized warfare enhanced the physical capabilities of the soldier—their “hands and feet”—and informatized warfare enhanced their sensory capabilities—their “ears and eyes”—intelligentized warfare is conceived as enhancing the cognitive function of the commander and the force itself—the “brain”.6 This enhancement is to be achieved through advanced brain-computer interaction and AI-human teaming.6

The central tenets of this doctrine reveal why a battleverse is not merely useful, but essential:

  • Shift to Cognitive Dominance: The primary objective in intelligentized warfare shifts from achieving information superiority to seizing “cognitive dominance” (制智权).6 This is a more profound concept, focused on fundamentally disrupting, degrading, and manipulating the adversary’s decision-making processes. The goal is to render the opponent cognitively paralyzed, effectively turning them into an “idiot” in the battlespace, unable to process information or make sound judgments.6
  • Expansion of the Battlefield: The domains of conflict expand beyond the traditional physical realms of land, sea, air, and space. Intelligentized warfare explicitly incorporates the virtual space and, most critically, the “cognitive domain” or “brain battlefield” (头脑战场) of commanders, soldiers, and even national leaders as primary arenas for confrontation.1 Victory in the virtual and cognitive spaces is seen as a prerequisite for victory in the physical world.6

This doctrinal framework, with its focus on cognitive paralysis and the fusion of physical and non-physical domains, creates a clear and compelling military requirement for a persistent, integrated, virtual-real environment. The PLA is not simply adopting metaverse technology because it is available; it is pursuing the technology because its pre-existing theory of victory demands it. This doctrinal pull, rather than a simple technological push, indicates a far more deliberate and strategically integrated approach, suggesting that the battleverse concept is deeply embedded in the PLA’s long-term institutional planning.

Linkage to the “Digital China” Grand Strategy

The PLA’s military ambitions are inextricably linked to and enabled by a broader national strategy. The battleverse initiative is explicitly framed within PLA literature as a central component of the PRC’s societal transformation under the “Digital China” (数字中国) grand strategy.1 Described as the world’s first “digital grand strategy,” this whole-of-nation effort is personally championed by Xi Jinping and aims to “win the future” by achieving comprehensive digital supremacy.1

The “Digital China” strategy, which has roots in regional initiatives like “Digital Fujian” and “Digital Zhejiang” that Xi oversaw as a local leader, aims for the complete digital transformation of the PRC’s economy, governance, and society.8 In this context, the metaverse is seen as the next evolutionary stage of the internet and a critical new frontier for national power.9 By leading in its development, Beijing seeks to achieve several national objectives:

  • Technological Self-Reliance: Reduce dependency on foreign technology and establish “first-mover advantages” in a critical future industry.9
  • Economic Growth: Dominate what is expected to be a multi-trillion-dollar global market, further fueling China’s digital economy.9
  • Norm Shaping: Position the PRC to guide the development of international norms, standards, and governance structures for the metaverse.9
  • Sovereignty and Control: Extend state sovereignty into the virtual domain, ensuring the digital “spiritual home” of its citizens operates according to the Chinese Communist Party’s (CCP) principles.9

This national-level strategic alignment creates a powerful symbiotic relationship, a prime example of the PRC’s Military-Civil Fusion (军民融合) strategy. The PLA’s demanding requirements for a high-fidelity, secure, AI-driven battleverse provide a clear strategic direction and a lucrative market for China’s civilian tech sector, driving national innovation in critical areas like AI, 5G, VR hardware, and advanced computing.11 In turn, the rapid growth of the civilian tech sector, such as China’s massive domestic VR market (estimated at 44% of the global market by late 2020), provides the PLA with a broad, resilient, and innovative industrial and R&D base from which to draw technology and talent.11 This whole-of-nation symbiosis provides a formidable strategic tailwind for the battleverse project, granting it a level of national priority and resource allocation that a purely military-siloed program could not achieve.

II. Deconstructing the Battleverse: Concept, Architecture, and Key Technologies

The PLA’s concept of the battleverse has evolved rapidly from a nascent idea into a sophisticated theoretical construct for future warfare. It is envisioned not as a single piece of software, but as a comprehensive military ecosystem with a specific architecture and a foundation built on the convergence of several key emerging technologies.

Defining the “Battleverse” (战场元宇宙)

The term “battleverse” (战场元宇宙) first entered the PLA’s public discourse in a November 2021 article in the official PLA Daily.1 Initially, the concept was framed in a defensive, soft-power context. The article proposed using the metaverse to create immersive reconstructions of historical battles to vividly depict the horrors of war, thereby deterring conflict and stimulating a desire for peace among the civilian population.1

This narrative, however, pivoted with remarkable speed. Within a matter of months, by early 2022, the discussion in official military media had shifted decisively toward building a separate, secure, and highly militarized metaverse designed explicitly to win future intelligentized wars.1 This rapid evolution from a public-facing deterrence tool to a core warfighting concept is significant. Such a fundamental shift in the official military newspaper is unlikely to be accidental; it strongly suggests that an internal consensus was reached at a high level to prioritize and accelerate the development of the metaverse as a primary warfighting domain. The initial “deterrence” framing may have served as strategic misdirection for external audiences, or it may reflect a genuine but quickly superseded initial thought.

In its current conception, the military metaverse is defined as a new and comprehensive military ecosystem that integrates the virtual and real worlds.17 It is distinguished from its civilian counterparts by a set of unique military requirements, including:

  • High Security: The system must handle highly classified information, requiring robust security protocols far beyond those of commercial platforms.17
  • High Credibility: Simulations and models must be of extremely high fidelity, based on real-world physics and validated data, to be useful for training and operational planning.17
  • Identity Determinacy: Users have pre-determined and authenticated military identities (e.g., commander, pilot, logistics officer) with clear roles and permissions.17

The Concept of “Meta-War”

Flowing from the battleverse concept is the PLA’s theory of “Meta-War.” This is defined as a new type of military activity that leverages the battleverse’s technological capabilities to achieve the strategic objective of conquering an opponent’s will.1 The architecture of Meta-War is designed to link three distinct but interconnected battlefields 1:

  1. The Physical Battlefield: The traditional domain of land, sea, air, and space where kinetic actions occur.
  2. The Virtual Battlefield: The digital space within the battleverse where simulations, cyber operations, and virtual combat take place.
  3. The “Brain Battlefield” (头脑战场): The cognitive space representing the conscious perceptions, situational awareness, and decision-making processes of soldiers and commanders.

The core function of the battleverse in Meta-War is to fuse these three domains, allowing personnel to seamlessly switch between the real-world battlefield and a virtual parallel battlefield as needed. This enables them to engage in live combat, run complex simulations of future actions, and predict outcomes in a fully immersive environment, all in real-time.1

Core Enabling Technologies

The PLA’s vision for the battleverse is predicated on the successful convergence and integration of a suite of advanced technologies.

  • Digital Twins: This technology is the architectural linchpin of the entire battleverse concept. A digital twin is a high-fidelity, virtual replica of a physical asset, process, or even an entire environment that is continuously updated with real-time data from its real-world counterpart.17 The PLA defines it as a mapping in virtual space that reflects the full life cycle of a piece of physical equipment.18 It is the digital twin that bridges the virtual and the real. Without accurate, persistent, real-time digital twins of weapon platforms, sensors, infrastructure, and geographical terrain, the battleverse would be merely a sophisticated but disconnected simulation. The digital twin provides the essential data-driven foundation that allows for realistic training, predictive maintenance, logistics optimization, and credible mission rehearsal.18 The PLA’s progress in creating a functional battleverse can, therefore, be most accurately measured by its progress in developing and integrating digital twin technology across its forces.
  • Artificial Intelligence (AI): If the digital twin is the skeleton of the battleverse, AI is its brain. AI is envisioned to perform a multitude of functions: generating rich and dynamic virtual scenes, providing real-time battlefield object recognition, powering intelligent “Blue Army” adversaries, and offering intelligent-assisted decision-making support to commanders.3 Crucially, AI systems themselves are expected to be trained within the battleverse through processes of “self-play and confrontational evolution,” allowing them to become “strategists” for conquering the virtual cognitive space without human intervention.6
  • Extended Reality (XR): XR technologies—including Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR)—serve as the primary human-machine interface for the battleverse.1 VR headsets, AR glasses, and haptic feedback suits are the tools that will provide the immersive, “on-site feeling” for soldiers in training, commanders directing battles, or maintainers repairing equipment.17
  • Supporting Infrastructure: A robust technological foundation is required to support these core components. This includes high-bandwidth, low-latency networking (such as 5G and beyond) to transmit vast amounts of data between the physical and virtual worlds; advanced computing (cloud for data storage and processing, and potentially quantum for complex calculations) to run the simulations; and a ubiquitous Internet of Things (IoT) to provide the constant stream of sensor data needed to keep the digital twins synchronized with reality.1 PLA theorists also explicitly mention brain-computer interfaces (BCIs) as a potential future interface for controlling systems directly.1

III. Applications and Concepts of Operation: Waging “Meta-War”

The PLA’s development of the battleverse is not purely theoretical. It is pursuing a dual-track approach: actively implementing mature, battleverse-related technologies for near-term gains while simultaneously developing radical new concepts of operation for future, fully-realized “Meta-War.”

A. Current and Near-Term Applications (The “Practice”)

The most tangible progress in implementing battleverse technologies is evident in areas that offer immediate improvements to readiness, efficiency, and force development.

  • Training and Education: This is the most mature and widely documented application area. The PLA is leveraging immersive technologies to create training environments that are more realistic, repeatable, cost-effective, and safer than traditional methods.9
  • Skill-Based VR Training: The PLA has fielded VR systems for specific tasks, such as parachute training. These systems use virtual simulation and spatial positioning to expose new paratroopers to a range of aerial emergencies and unfamiliar environments in a risk-free setting, improving their real-world performance and adaptability.9 Similar systems are used for training operators of man-portable air-defense systems (MANPADS), allowing them to practice engaging diverse aerial targets like helicopters, cruise missiles, and fighter jets in a virtual environment.23
  • Tactical VR Training: More advanced systems are emerging for collective training. The “Wisdom Commando VR Training System,” developed by the state-owned China Electronics Technology Group Corporation (CETC), is a prime example. It uses VR helmets, haptic feedback suits, and simulated weapons to immerse a squad of soldiers in a virtual battlefield where they can train alongside both their real teammates and AI-powered virtual teammates. The system leverages key technologies like large-space positioning to allow free movement and machine learning algorithms to evaluate performance.20
  • Psychological Conditioning: The PLA is also exploring the use of VR to conduct wartime psychological training. The goal is to create hyper-realistic, high-stress virtual combat environments to better prepare soldiers for the psychological shock of real battle.24
  • Wargaming and Simulation (The “Blue Army”): The PLA has long used simulations for wargaming, but is now investing heavily in creating a next-generation, AI-driven “Blue Army”—the PLA’s term for a simulated adversary force, akin to a U.S. “Red Team”.25 The objective is to move beyond scripted, service-level simulations to a dynamic, all-element joint combat simulation platform. The AI-powered Blue Army is intended to perfectly mimic the command decision-making behavior and tactics of a potential adversary, allowing the PLA to rigorously test its own operational concepts, identify weaknesses, and discover “possible blind spots” at a pace and scale impossible in live exercises.25 This effort is augmented by research at institutions like Xi’an Technological University, where AI models like DeepSeek are being used to autonomously generate tens of thousands of potential battlefield scenarios in seconds, transforming simulation from a static, pre-programmed system into an “autonomously evolving intelligent agent”.26
  • Equipment R&D, Maintenance, and Logistics: Digital twin technology is the centerpiece of efforts to modernize the entire lifecycle of military equipment.
  • Research & Development: The PLA envisions using digital twins to dramatically shorten the R&D cycle for complex platforms like warships and aircraft.17 By creating and testing virtual prototypes in a realistic, simulated combat environment, engineers can validate designs, assess combat effectiveness, and identify flaws before any physical manufacturing begins, saving immense time and resources.17
  • Maintenance and Logistics: In the sustainment phase, a digital twin of a platform, continuously fed with real-world performance data, can enable predictive maintenance, anticipating part failures before they occur.18 In logistics, digital twins of supply chains and transportation networks can create a system of “intelligent war logistics,” allowing for a more flexible, on-demand, and resilient supply chain that can adapt to the dynamic needs of the battlefield.18
  • Procurement and Development Ecosystem: The PLA’s commitment is reflected in its procurement activities and the emergence of a specialized development ecosystem. Analysis of PLA procurement records reveals a clear focus on acquiring “smart” and “intelligent” systems, including augmented reality sandboxes for training and intelligent interactive control systems.28 A 2020 analysis showed significant purchasing in intelligent and autonomous vehicles and AI-enabled ISR, sourced from a diverse ecosystem of both traditional state-owned defense enterprises and smaller, non-traditional vendors.15 Specialized entities are also emerging, such as the “Digital Twin Battlefield Laboratory,” which offers bespoke R&D services, consulting, and the construction of digital twin test ranges, indicating a professionalization of the field.30

B. Future Combat Concepts (The “Theory of Meta-War”)

Beyond near-term applications, PLA strategists are developing highly advanced, and in some cases radical, theories for how a fully realized battleverse will change the nature of combat itself. These concepts are detailed in an article titled “Meta-War: An Alternative Vision of Intelligentized Warfare” and represent the PLA’s theoretical end-state for metaverse-enabled conflict.1

  • The Three Methods of “Meta-War”:
  1. “(Virtual) Clone/Avatar [分身] Combat in the Virtual World”: This form of combat takes place entirely within the digital realm of the battleverse. It encompasses activities like cyber warfare, psychological operations, and the manipulation of public opinion, conducted from behind the scenes to shape the battlespace before and during a conflict.1 On the virtual “front lines,” combatants would use avatars to conduct highly realistic pre-battle training, mission rehearsals, and simulated combat exercises.1
  2. “Simulacrum/Imitation [仿身] Combat in the Real World”: This concept describes real-world combat where human soldiers are replaced on the front lines by weaponized “simulacrums.” These are not fully autonomous robots but rather platforms—such as humanoid robots, bionic machines, or mechs—that are controlled in real-time by human operators from a safe distance.1 These simulacrums would carry the human operator’s perception and intent onto the battlefield, allowing them to perform dangerous and complex tasks. The control interfaces could include remote controls, tactile devices, or even direct brain-computer interfaces.1 This concept represents a pragmatic approach to the challenges of fully autonomous AI. Instead of waiting for a breakthrough in artificial general intelligence that can handle the complexities and ethical dilemmas of combat, this model uses the human brain as the advanced processor, effectively “teleporting” a soldier’s cognitive abilities into an expendable, physically superior machine. It leverages the unique strengths of both humans (adaptability, creativity, ethical judgment) and machines (speed, endurance, resilience) to field a highly capable semi-autonomous force in the near-to-mid term.
  3. “Incarnation/Embodiment [化身] Combat in Parallel Worlds”: This is the ultimate synthesis of the first two concepts, representing the full fusion of the real and virtual. In this mode of combat, human soldiers, their virtual avatars, and their controlled simulacrums would operate in unison across parallel realities.1 A human soldier and their weapon system would function as a “dual entity,” existing simultaneously in the physical world and as a digital twin in the virtual world. They would be capable of switching between and interacting across these realities. In this paradigm, victory might not be determined solely by physical destruction but by which side first achieves a critical objective in the virtual world, such as discovering a hidden key or disabling a virtual command node, which then translates to a decisive advantage in the real world.1
  • The Centrality of the “Brain Battlefield” (头脑战场): Underlying all three methods of Meta-War is the focus on the “brain battlefield”—the cognitive state of the adversary.1 The ultimate purpose of fusing the virtual and real is to create an environment where the PLA can manipulate the enemy’s perception of reality. By using highly deceptive information, injecting false virtual targets into an enemy’s augmented reality display, or creating confusing scenarios, the PLA aims to directly attack the enemy’s cognitive processes, interfering with their judgment, slowing their decision-making, and inducing fatal errors.10 This represents a profound doctrinal shift away from a primary focus on physical attrition. The goal of Meta-War is not just to destroy the enemy’s forces, but to achieve a state of cognitive paralysis, shattering their will and ability to fight by making them incapable of trusting their own senses and systems. A successful campaign might result in an enemy force that is physically intact but rendered completely combat-ineffective, achieving victory with potentially less kinetic violence.

IV. The Geopolitical Battlefield: U.S.-China Competition in the Military Metaverse

The PLA’s pursuit of a battleverse is not occurring in a vacuum. It is a central element of its broader strategic competition with the United States, which is pursuing its own, parallel efforts to develop next-generation synthetic training and operational environments. While there are technological similarities, a comparative analysis reveals significant divergences in strategic vision, doctrinal approach, and organizational structure.

China’s Approach: Top-Down, Doctrine-Driven, and Integrated

As previously established, the PLA’s battleverse initiative is a key component of a unified, top-down national and military strategy.1 This provides a coherent vision that integrates technological development with a pre-defined warfighting doctrine—”Intelligentized Warfare.” The explicit goal is to leverage these technologies to generate “asymmetric advantages” against the United States, which the PLA regards as a “strong enemy” and its primary strategic competitor.29 A defining feature of this approach is the PLA’s doctrinal willingness to explore higher levels of AI autonomy. PLA writings suggest a desire to remove the human soldier from certain decision-making loops where possible, believing that machine-driven speed can provide a decisive edge in achieving “decision dominance”.31

The U.S. Approach: Bottom-Up, Technologically Focused, and Federated

The United States does not use the term “battleverse,” but its armed services and research agencies are developing a suite of highly advanced capabilities that aim to achieve similar outcomes in training and operations.33 The U.S. effort, however, is more federated and appears to be driven more by technological opportunity than by a single, overarching new doctrine.

  • U.S. Army Synthetic Training Environment (STE): This is one of the Army’s top modernization priorities, designed to revolutionize training by converging live, virtual, constructive, and gaming environments into a single, interoperable platform.11 The STE is software-focused, leverages cloud computing, and is designed to be accessible to soldiers at their “point of need,” from home station to deployed locations.34 Its goal is to allow soldiers to conduct dozens of “bloodless battles” in a realistic virtual world before ever seeing combat.34
  • U.S. Air Force Digital Twin Programs: The U.S. Air Force is a global leader in the practical application of digital twin technology. Notable projects include the creation of a complete, engineering-grade digital twin of the F-16 Fighting Falcon to streamline sustainment, modernization, and repairs 38, and the development of a massive, installation-scale digital twin of Tyndall Air Force Base in Florida. This virtual replica of the base is used to manage its multi-billion-dollar reconstruction after a hurricane, optimize planning, and run realistic security simulations, such as active shooter drills.39 These programs demonstrate a high level of maturity in deploying the foundational technology of any military metaverse.
  • DARPA Research: The Defense Advanced Research Projects Agency (DARPA) is pushing the technological frontier. Its programs are not only developing the building blocks of future synthetic environments but are also proactively researching defenses against the threats they might pose. Programs like Perceptually-enabled Task Guidance (PTG) are developing AI assistants that can guide personnel through complex physical tasks using augmented reality.41 More critically, there is a striking parallel between the PLA’s offensive cognitive warfare concepts and DARPA’s defensive research. The PLA is actively theorizing about using the metaverse to conduct cognitive attacks to “confuse the opponent’s cognition” and “mislead their decision-making”.10 In response, DARPA’s Intrinsic Cognitive Security (ICS) program is explicitly designed to build tactical mixed reality systems that can protect warfighters from precisely these kinds of “cognitive attacks,” such as “information flooding,” “injecting virtual data to distract personnel,” and “sowing confusion”.42 This indicates that U.S. defense planners are taking this threat vector seriously, and the competition is already well underway at the conceptual and R&D level. DARPA is, in effect, attempting to build the shield for a sword the PLA is still designing.

Comparative Analysis: Key Divergences

The competition between the U.S. and China in this domain is not a simple technology race but a clash of strategic philosophies. The U.S. appears to possess more advanced individual components and a more vibrant R&D ecosystem, but China’s top-down, integrated approach may allow for faster and more cohesive implementation of a unified vision. The strategic contest may hinge on which model proves more effective: the U.S. model of federated innovation and gradual integration into existing structures like Joint All-Domain Command and Control (JADC2), or China’s model of unified, doctrine-driven development.

The most critical point of divergence is the doctrinal approach to autonomy. U.S. military doctrine, policy, and ethics heavily prioritize a “human-in-the-loop” or human-machine teaming paradigm, where AI serves as an assistive tool to enhance, not replace, human decision-making.31 In contrast, PLA writings are more ambitious, exploring concepts of greater AI autonomy and explicitly discussing the potential advantages of removing the human from the decision-making process to achieve superior speed and “decision dominance”.31 This fundamental difference in philosophy could lead to two very different types of “intelligentized” forces in the future.

Table 1: Comparative Analysis of U.S. and PRC Military Metaverse Initiatives

FeatureU.S. Synthetic Training Environment (STE) & Related ProgramsPRC “Battleverse” (战场元宇宙)
Primary DoctrineJoint All-Domain Command and Control (JADC2); Human-Machine TeamingIntelligentized Warfare (智能化战争); Cognitive Dominance
Key ProgramsArmy STE, USAF Digital Twin (F-16, Tyndall AFB), DARPA research (ICS, PTG)CETC VR Systems, Digital Twin Battlefield Lab, AI-driven “Blue Army” Simulations
Technological FocusInteroperability, COTS integration, augmented reality (IVAS), cloud computingAI-driven autonomy, digital twins, VR immersion, brain-computer interfaces
Development StatusMultiple programs in advanced development and initial fielding (demonstrating high component maturity)Extensive conceptual work; foundational technologies in active development and procurement (demonstrating high strategic integration)
Approach to Autonomy“Human-in-the-loop” prioritized; AI as an assistive tool for human decision-makersExploration of higher degrees of AI autonomy; potential for machine-driven decision-making to gain speed

V. Assessment of Challenges, Vulnerabilities, and Strategic Implications

Despite the PLA’s ambitious vision and strategic commitment, the path to a fully functional battleverse is fraught with significant internal challenges and creates new strategic vulnerabilities. Realizing this complex ecosystem is a monumental undertaking, and its successful implementation has profound implications for regional security, particularly concerning a potential conflict over Taiwan.

Internal PLA Challenges

Chinese military experts and technical analysts are themselves candid about the significant barriers the PLA faces.

  • Technological and Integration Hurdles: The technical challenges are immense. In a comprehensive review of Chinese-language defense journals, PLA officers and defense industry researchers identified several key concerns. These include the ability to guarantee network and cyber security for such a complex system, the difficulty of maintaining robust communications in a high-intensity conflict, and the need to develop the high-end sensors required to feed the digital twins with accurate data.45 Integrating dozens of disparate, specialized AI systems from various vendors into a coherent, multi-domain “system of systems” is an enormous software and systems engineering challenge that no military has yet solved.46
  • Data and AI Trustworthiness: The entire concept of intelligentized warfare hinges on the reliability of data and the trustworthiness of AI. However, AI systems are notoriously vulnerable to flawed, biased, or maliciously manipulated input data, which can lead to catastrophic errors in judgment.46 Many Chinese experts express deep misgivings about deploying insufficiently trustworthy AI systems in lethal contexts, citing the risks of unintended escalation, civilian casualties, and friendly fire incidents.45 The inherent “black box” nature of some advanced AI models makes it difficult for human commanders to understand, verify, and ultimately trust their recommendations, a critical barrier to effective human-machine teaming.46
  • Systemic Vulnerability to Attack: The battleverse’s greatest strength—its hyper-connectivity and total integration—is also its greatest weakness. This creates a strategic paradox: while it promises unprecedented operational coherence, it also presents a systemic, single-point-of-failure vulnerability. PLA thinkers acknowledge that the algorithms and networks at the core of the battleverse are prime targets. A successful cyber or electronic attack that compromises the integrity of the battleverse’s data or manipulates its core algorithms could lead to a total loss of combat capability for the entire force.47 This suggests that a U.S. strategy should not necessarily be to build a mirror-image battleverse, but to develop the asymmetric capabilities required to disrupt, deceive, and disable the PLA’s version.
  • Ethical and Legal Dilemmas: The prospect of intelligentized warfare raises profound ethical and legal questions that Chinese strategists are beginning to grapple with. These include the morality of delegating life-and-death decisions to machines and the intractable problem of assigning legal accountability for war crimes committed by an autonomous system.48

Strategic Implications for the United States and Allies

The PLA’s development of a battleverse, even if only partially successful, will have significant strategic implications.

  • The Taiwan Scenario: The battleverse is a powerful tool for a potential Taiwan contingency. The PLA could leverage a high-fidelity digital twin of Taiwan and its surrounding environment to wargame an invasion scenario thousands of times, allowing them to meticulously test operational plans, identify weaknesses in Taiwan’s defenses, and perfect their joint force coordination at minimal cost and risk.18 This would enable the PLA to enter a conflict with a level of rehearsal and optimization previously unimaginable. Furthermore, the initial phase of an invasion could be non-kinetic, launched from within the battleverse. It could consist of massive, coordinated cyber, electronic, and cognitive attacks designed to paralyze Taiwan’s command and control, sow chaos and confusion, and degrade its will to fight before a single ship or plane crosses the strait.10 The battleverse also provides a new and potent platform for “gray zone” activities. In the years leading up to a potential conflict, the PLA could use the virtual space to conduct persistent, low-threshold operations against a digital twin of Taiwan—testing cyber defenses, mapping critical infrastructure, and running subtle cognitive influence campaigns, all below the threshold of armed conflict but effectively shaping the future battlefield.
  • Accelerated PLA Modernization: A functional battleverse would act as a powerful force multiplier for PLA modernization. It would create a virtual feedback loop, allowing the PLA to develop, test, and refine new technologies, tactics, and doctrine at a speed that cannot be matched by traditional, resource-intensive live exercises. This could dramatically shorten the timeline for the PLA to achieve its goal of becoming a “world-class” military capable of fighting and winning wars against a strong adversary.
  • Risk of Rapid Escalation: A key objective of intelligentized warfare is to accelerate the decision-making cycle (the OODA loop) to a speed that overwhelms an opponent. However, this reliance on AI-driven speed could have a destabilizing effect in a crisis. It could drastically shorten the time available for human deliberation and diplomacy, potentially leading to a rapid and unintended escalation from a regional crisis to a major conflict.46

Conclusion and Recommendations

The People’s Liberation Army’s pursuit of a military metaverse, or “battleverse,” is a serious, coherent, and long-term strategic endeavor that is deeply integrated with its national and military modernization goals. It is the designated operational environment for the PLA’s future warfighting doctrine of “Intelligentized Warfare.” While the vision of a fully fused virtual-real battlefield remains aspirational, and significant technical and systemic challenges persist, the conceptual groundwork is well-established, and foundational investments in enabling technologies like AI, digital twins, and VR are well underway. The most critical divergence from Western military development lies in the PLA’s doctrinal embrace of AI-driven autonomy and its explicit focus on achieving victory through cognitive dominance.

Over the next five years, the PLA will likely field advanced, networked VR/AR training and large-scale simulation systems across all services, significantly improving training realism, joint operational proficiency, and tactical development speed. Within a decade, it is plausible that the PLA will be experimenting with integrated “Meta-War” concepts in major exercises, fusing digital twin environments with live forces and testing rudimentary “simulacrum” platforms under direct human control. This trajectory presents a formidable challenge that requires a proactive and multi-faceted response from the United States and its allies.

Based on this assessment, the following recommendations are offered for the U.S. intelligence community, the Department of Defense, and associated policymakers:

  1. Prioritize Intelligence Collection on PLA Digital Twin Development: Intelligence collection and analysis should shift from a primary focus on individual hardware procurement to tracking the PLA’s progress in developing and integrating high-fidelity digital twins. Monitoring the creation of virtual replicas of key platforms (e.g., aircraft carriers, advanced destroyers, 5th-generation aircraft) and strategic locations (e.g., Taiwan, Guam, key U.S. bases in the Indo-Pacific) will serve as the most accurate barometer of the PLA’s true battleverse capability and its operational readiness for specific contingencies.
  2. Invest in “Red Team” Cognitive and Algorithmic Warfare Capabilities: The Department of Defense should fund and prioritize the development of offensive capabilities designed specifically to target the inherent vulnerabilities of a centralized, hyper-networked battleverse architecture. This includes advanced research in data poisoning, algorithm manipulation, network deception, and cognitive attacks designed to sow mistrust between PLA operators and their AI systems. The goal should be to develop the means to turn the battleverse’s greatest strength—its integration—into a critical vulnerability.
  3. Accelerate and Integrate U.S. Synthetic Environment Efforts: While maintaining a firm doctrinal commitment to human-centric command and control, the Department of Defense should accelerate the integration of its disparate synthetic environment programs (e.g., Army STE, Air Force digital twins, Navy trainers) into a coherent, JADC2-enabled operational environment. The strategic objective should be to outpace the PLA’s integration efforts by leveraging the U.S. technological advantage in areas like cloud computing, COTS software, and advanced AI to create a more flexible, resilient, and effective human-machine teaming ecosystem.
  4. Establish Ethical and Policy Guardrails for AI in Warfare: The United States should lead a robust and sustained dialogue with key allies to establish clear norms, ethical red lines, and policies for the use of AI and autonomous systems in combat. Codifying a commitment to meaningful human control will create a clear strategic and moral distinction from the PLA’s more ambiguous doctrinal path, strengthen allied cohesion on this critical issue, and provide a framework for future arms control discussions.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used:

  1. The Path to China’s Intelligentized Warfare: Converging on the Metaverse Battlefield – The Cyber Defense Review, accessed October 5, 2025, https://cyberdefensereview.army.mil/Portals/6/Documents/2024-Fall/Baughman_CDRV9N3-Fall-2024.pdf
  2. The Path to China’s Intelligentized Warfare: Converging on the Metaverse Battlefield – The Cyber Defense Review, accessed October 5, 2025, https://cyberdefensereview.army.mil/CDR-Content/Articles/Article-View/Article/4012231/the-path-to-chinas-intelligentized-warfare-converging-on-the-metaverse-battlefi/
  3. PLA’s Perception about the Impact of AI on Military Affairs* – IIDA Masafumi, accessed October 5, 2025, https://www.nids.mod.go.jp/english/publication/security/pdf/2022/01/04.pdf
  4. China’s Military Employment of Artificial Intelligence and Its Security Implications, accessed October 5, 2025, https://www.iar-gwu.org/print-archive/blog-post-title-four-xgtap
  5. 智能化战争,你准备好了吗? – 求是, accessed October 5, 2025, https://www.qstheory.cn/defense/2019-06/12/c_1124611640.htm
  6. 从多维视角看智能化战争- 解放军报- 中国军网, accessed October 5, 2025, http://www.81.cn/jfjbmap/content/2022-07/07/content_319277.htm
  7. 智能化战争作战体系前瞻 – 安全内参, accessed October 5, 2025, https://www.secrss.com/articles/71292
  8. Enhancing the Battleverse: The PLA’s Digital Twin Strategy – Digital China Wins the Future, accessed October 5, 2025, https://digitalchinawinsthefuture.com/2023/05/18/military-cyber-affairs-the-plas-digital-twin-strategy/
  9. Enter the Battleverse: China’s Metaverse War – Air University, accessed October 5, 2025, https://www.airuniversity.af.edu/Portals/10/CASI/documents/Research/Cyber/2022-05-02%20Enter%20the%20Battleverse.pdf
  10. 中国要将元宇宙军事化?解放军报“从和平到战争”构想见端倪 – 美国之音, accessed October 5, 2025, https://www.voachinese.com/a/china-metaverse-security-20220510/6565529.html
  11. Analysis of Military Metaverses: the Case of the USA, India and China – Journals, accessed October 5, 2025, https://en.nbpublish.com/library_read_article.php?id=40042
  12. Chinese Metaverse-enabled Military Training On the Rise | Red Dragon 1949 / 紅龍1949, accessed October 5, 2025, https://reddragon1949.com/chinese-military-cognitive-domain-operations/chinese-metaverse-enabled-military-training-on-the-rise/
  13. 觀察中國「元宇宙」之未來發展概況 – 國防安全研究院-國防安全雙週報, accessed October 5, 2025, https://indsr.org.tw/respublicationcon?uid=12&resid=1875&pid=1603
  14. China’s growing civilian-defence AI ties will challenge US, report says | Center for Security and Emerging Technology, accessed October 5, 2025, https://cset.georgetown.edu/article/chinas-growing-civilian-defence-ai-ties-will-challenge-us-report-says/
  15. U.S. and Chinese Military AI Purchases | Center for Security and Emerging Technology, accessed October 5, 2025, https://cset.georgetown.edu/publication/u-s-and-chinese-military-ai-purchases/
  16. CSET – U.S. and Chinese Military AI Purchases – Center for Security and Emerging Technology, accessed October 5, 2025, https://cset.georgetown.edu/wp-content/uploads/CSET-U.S.-and-Chinese-Military-AI-Purchases-1.pdf
  17. Study on military metaverse and applications, accessed October 5, 2025, https://www.worldscientific.com/doi/pdf/10.1142/s1793962323500538
  18. Enhancing the Battleverse: The People’s Liberation Army’s Digital …, accessed October 5, 2025, https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1091&context=mca
  19. 虚拟现实技术在军队任职教育院校实践教学中的应用构想, accessed October 5, 2025, http://library.ttcdw.com/uploadfiles/zk/1533890185.pdf
  20. 中国电科发布未来战场环境虚拟现实训练系统 – 国家国防科技工业局, accessed October 5, 2025, https://www.sastind.gov.cn/n10086200/n10086344/c10177264/content.html
  21. 虚拟现实技术使武器装备超前“参战” – 新华网, accessed October 5, 2025, http://news.xinhuanet.com/mil/2016-06/30/c_129104033.htm
  22. 元宇宙概念及其军事运用 – 系统仿真学报, accessed October 5, 2025, https://www.china-simulation.com/EN/article/downloadArticleFile.do?attachType=PDF&id=3174
  23. 解放军装备新型模拟训练系统用VR技术打飞机(图) – 新浪军事, accessed October 5, 2025, https://mil.sina.cn/sd/2017-12-22/detail-ifypvuqf1492623.d.html
  24. 虚拟现实技术在战时心理训练系统的应用研究 – 兵器装备工程学报, accessed October 5, 2025, https://bzxb.cqut.edu.cn/download.aspx?type=paper&id=7066
  25. MCPA – Baughman – China Blue Army Metaverse – Military Cyber Professionals Association, accessed October 5, 2025, https://public.milcyber.org/activities/magazine/articles/2022/baughman-china-blue-army-metaverse
  26. Chinese Researchers Deploy DeepSeek AI to Simulate Military Scenarios – Defense Mirror, accessed October 5, 2025, https://www.defensemirror.com/news/39508/Chinese_Researchers_Deploy_DeepSeek_AI_to_Simulate_Military_Scenarios
  27. 数字孪生技术在智能化战争中的应用 – 安全内参, accessed October 5, 2025, https://www.secrss.com/articles/46111
  28. Artificial Intelligence and the People’s Liberation Army | Datenna, accessed October 5, 2025, https://www.datenna.com/wp-content/uploads/2024/11/Report-Datenna-Artificial-Intelligence-and-the-Peoples-Liberation-Army-.pdf
  29. Report: China’s PLA has made ‘extraordinary progress’ in procuring AI for combat, accessed October 5, 2025, https://therecord.media/report-chinas-pla-has-made-extraordinary-progress-in-procuring-ai-for-combat
  30. 数字孪生战场实验室简要介绍(2025年更新) – 工业4.0研究院, accessed October 5, 2025, http://www.innobase.cn/?p=3312
  31. Army Cites China’s AI-Based “Intelligentized Warfare” As Growing Threat – Warrior Maven, accessed October 5, 2025, https://warriormaven.com/news/land/army-cites-chinas-ai-based-intelligentized-warfare-as-growing-threat
  32. The Impact Of The Latest Military Technologies On Soldiers In A Potential US-China Confrontation – Hoover Institution, accessed October 5, 2025, https://www.hoover.org/research/impact-latest-military-technologies-soldiers-potential-us-china-confrontation
  33. Enter the Battleverse: China’s Metaverse War – Digital Commons @ USF – University of South Florida, accessed October 5, 2025, https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1083&context=mca
  34. The Synthetic Training Environment – AUSA, accessed October 5, 2025, https://www.ausa.org/sites/default/files/publications/SL-20-6-The-Synthetic-Training-Environment.pdf
  35. The Synthetic Training Environment | AUSA, accessed October 5, 2025, https://www.ausa.org/publications/synthetic-training-environment
  36. Revolutionizing Military Training: The US Army’s Synthetic Training Environment (STE), accessed October 5, 2025, https://idstch.com/military/army/revolutionizing-military-training-the-us-armys-synthetic-training-environment-ste/
  37. Synthetic Training Environment (STE) | USC ICT, accessed October 5, 2025, https://ict.usc.edu/wp-content/uploads/2021/09/STE_Overview.pdf
  38. Air Force to develop F-16 ‘digital twin’ – AFLCMC, accessed October 5, 2025, https://www.aflcmc.af.mil/news/article-display/article/2677215/air-force-to-develop-f-16-digital-twin/
  39. Building DOD’s Largest-Ever Digital Twin of Its Kind – Booz Allen, accessed October 5, 2025, https://www.boozallen.com/insights/digital-twin/building-dods-largest-ever-digital-twin-of-its-kind.html
  40. ERDC uses digital twin technology to recreate damaged Air Force base, accessed October 5, 2025, https://www.erdc.usace.army.mil/Media/News-Stories/Article/3188133/erdc-uses-digital-twin-technology-to-recreate-damaged-air-force-base/
  41. Developing Virtual Partners to Assist Military Personnel – DARPA, accessed October 5, 2025, https://www.darpa.mil/news/2021/virtual-partners-military-personnel
  42. DARPA Taps LSU to Solve Cybersecurity Challenges in Virtual and Augmented Reality, accessed October 5, 2025, https://www.lsu.edu/mediacenter/news/2023/06/20-cyber-darpa.php
  43. DARPA Preps Program to Protect Mixed Reality Users from Cognitive Attacks – The Sociable, accessed October 5, 2025, https://sociable.co/military-technology/darpa-protect-mixed-reality-users-cognitive-attacks/
  44. DARPA Seeks to Protect Virtual Reality Against “Cognitive Attacks” – Futurism, accessed October 5, 2025, https://futurism.com/the-byte/darpa-vr-cognitive-attacks
  45. China’s Military AI Roadblocks | Center for Security and Emerging Technology – CSET, accessed October 5, 2025, https://cset.georgetown.edu/publication/chinas-military-ai-roadblocks/
  46. 人工智能对战场的影响- 安全内参| 决策者的网络安全知识库, accessed October 5, 2025, https://www.secrss.com/articles/13747
  47. 认清智能化战争的制胜要素 – 求是, accessed October 5, 2025, https://www.qstheory.cn/llwx/2020-06/18/c_1126130211.htm
  48. 关于智能化战争的基本认知_学术前沿_人民论坛网, accessed October 5, 2025, https://www.rmlt.com.cn/2021/0811/621409.shtml
  49. The Autonomous Arsenal in Defense of Taiwan: Technology, Law, and Policy of the Replicator Initiative | The Belfer Center for Science and International Affairs, accessed October 5, 2025, https://www.belfercenter.org/replicator-autonomous-weapons-taiwan

The Gray Dragon and the Archipelago: Five Scenarios for an Unconventional Conflict in the South China Sea

The strategic competition between the United States and the People’s Republic of China (PRC) is increasingly centered on the South China Sea, with the U.S.-Philippines alliance emerging as a critical focal point. While the prospect of conventional, high-intensity warfare often dominates strategic planning, the most probable form of conflict will be unconventional, waged across a spectrum of non-military domains. This report posits that an unconventional war between the U.S.-Philippines alliance and China will not be a singular, decisive event but a protracted, integrated campaign of coercion designed to test the alliance’s resilience, political will, and legal foundations. China’s strategy is calibrated to achieve strategic objectives below the threshold of what would traditionally constitute an “armed attack,” thereby complicating the invocation of the 1951 Mutual Defense Treaty (MDT) and placing the onus of escalation on Washington and Manila.

This analysis presents five plausible scenarios for such a conflict, each rooted in a different primary domain: maritime lawfare, cyber warfare, economic coercion, information warfare, and proxy conflict. These scenarios are not mutually exclusive; rather, they represent distinct but interconnected fronts in a single, cohesive strategy of integrated coercion. From a legally ambiguous “quarantine” of a Philippine outpost to a crippling cyberattack on critical infrastructure and an AI-driven disinformation blitz aimed at fracturing the alliance from within, these scenarios illustrate the multifaceted nature of the threat.

Key findings indicate a fundamental asymmetry in strategic philosophy. China pursues a patient, indirect strategy of accumulating advantages over time, akin to the game of Go, aimed at creating a new status quo. The U.S.-Philippines alliance, conversely, is postured to respond to discrete, escalatory events, a more reactive model. China deliberately exploits this doctrinal gap, employing gray-zone tactics to create strategic dilemmas that force the alliance into a perpetual state of reactive uncertainty, caught between the risks of overreaction and the erosion of credibility.

The report concludes with strategic recommendations for the alliance. These include bolstering integrated deterrence through multi-domain exercises, enhancing Philippine national resilience with a focus on cyber defense and societal immunity to disinformation, and, most critically, clarifying alliance commitments to address severe non-kinetic attacks. To prevail in this unconventional arena, the alliance must shift from a posture of event-based response to one of proactive, persistent, and integrated resistance across all domains of national power.

I. The Arena: Doctrines and Capabilities in the South China Sea

Understanding the nature of a potential unconventional conflict requires a foundational assessment of the competing doctrines, capabilities, and strategic philosophies of the primary actors. The South China Sea is not merely a geographic theater; it is an arena where fundamentally different approaches to statecraft and coercion collide. China’s actions are guided by a holistic doctrine of integrated coercion, while the U.S.-Philippines alliance is adapting a more traditional defense posture to confront these 21st-century challenges.

A. China’s Doctrine of Integrated Coercion

Beijing’s strategy is not predicated on winning a conventional military battle but on achieving its objectives—namely, the assertion of sovereignty over the South China Sea and the displacement of U.S. influence—without firing a shot. This is accomplished through a sophisticated, multi-layered approach that blurs the lines between war and peace.

The Gray Zone as the Primary Battlefield

The central feature of China’s strategy is its mastery of the “gray zone,” an operational space where actions are coercive and aggressive but deliberately calibrated to remain below the threshold of conventional armed conflict. This approach is designed to paralyze an adversary’s decision-making cycle. By using paramilitary and civilian assets, such as the China Coast Guard (CCG) and its vast maritime militia, Beijing creates a deliberate ambiguity that complicates a response under international law and the terms of existing defense treaties. Actions like ramming, the use of water cannons, and deploying military-grade lasers against Philippine vessels are designed to intimidate and assert control without constituting a clear “armed attack” that would automatically trigger a U.S. military response under the MDT. This strategy of “salami-slicing” allows China to gradually erode the sovereignty of other claimants and establish a new status quo, one incident at a time.

The “Three Warfares” in Practice

Underpinning China’s gray-zone operations is the People’s Liberation Army (PLA) doctrine of the “Three Warfares”: Public Opinion (Media) Warfare, Psychological Warfare, and Legal Warfare (“Lawfare”). This doctrine provides the intellectual framework for integrating non-kinetic efforts into a cohesive campaign.

  • Legal Warfare (Lawfare) involves using and manipulating domestic and international law to assert the legitimacy of China’s actions. Declaring vast swathes of the South China Sea as subject to Chinese domestic law and then using CCG vessels to “enforce” those laws against foreign vessels is a textbook example. This tactic seeks to reframe acts of coercion as legitimate law enforcement, putting the burden of challenge on other nations.
  • Public Opinion Warfare aims to shape domestic and international narratives to support China’s objectives. This involves a constant stream of state-sponsored media content that portrays China as a peaceful and constructive regional actor, while casting the United States as an external provocateur and the Philippines as an illegitimate claimant.
  • Psychological Warfare seeks to erode an adversary’s will to resist. This is achieved through demonstrations of overwhelming force, such as swarming disputed features with hundreds of militia vessels, or conducting provocative military exercises intended to signal inevitability and intimidate regional states into accommodation.

Key Actors and Their Tools

China employs a diverse set of state and parastatal actors to execute this strategy:

  • China Coast Guard (CCG) & Maritime Militia: These are the frontline forces in the gray zone. The CCG, now under the command of the Central Military Commission, is the world’s largest coast guard and acts as the primary enforcer of China’s maritime claims. It is supported by a state-subsidized maritime militia, comprised of fishing vessels trained and equipped by the military, which provides a deniable force for swarming, blockading, and harassing foreign ships. These forces operate from a well-established playbook of 18 core tactics, including bow-crossing, blocking, ramming, and using sonic and optical weapons.
  • PLA Strategic Support Force (SSF): Established in 2015, the SSF is the nerve center of China’s information-centric warfare. It integrates the PLA’s space, cyber, electronic, and psychological warfare capabilities into a single, unified command. The SSF is responsible for conducting sophisticated cyber operations against foreign military and civilian targets, as well as executing the disinformation campaigns that form the backbone of China’s Public Opinion Warfare.

Asymmetric Philosophy: “Warfare of Non-Matching Facets”

The Chinese approach is deeply rooted in an ancient strategic tradition that emphasizes asymmetry. Often translated as “warfare of non-matching facets,” this philosophy seeks to leverage a weaker party’s strengths against a stronger adversary’s vulnerabilities. Rather than attempting to match the U.S. military ship-for-ship or plane-for-plane, Chinese doctrine, influenced by strategists from Sun Tzu to Mao Zedong, focuses on “overcoming the superior with the inferior”. This explains the heavy investment in asymmetric capabilities like anti-ship ballistic missiles, cyber warfare, and gray-zone tactics. These tools are designed to counter America’s comprehensive power by targeting specific “pockets of excellence” and vulnerabilities, such as its reliance on digital networks and its legalistic, alliance-based approach to conflict.

B. The Alliance’s Evolving Defense Posture

In response to China’s integrated coercion, the U.S.-Philippines alliance is undergoing a significant modernization and recalibration, shifting its focus from decades of internal security operations to the pressing challenge of external territorial defense.

The MDT as Bedrock and Ambiguity

The 1951 Mutual Defense Treaty remains the “ironclad” foundation of the bilateral relationship, obligating both nations to defend each other against an external armed attack. For decades, the precise conditions for the treaty’s invocation remained ambiguous. However, facing escalating Chinese gray-zone aggression, both sides have worked to add clarity. The May 2023 Bilateral Defense Guidelines explicitly state that an armed attack in the Pacific, “including anywhere in the South China Sea,” on either nation’s armed forces, public vessels, or aircraft—including those of their Coast Guards—would invoke mutual defense commitments. This clarification was a crucial act of strategic signaling, intended to deter China from escalating its harassment of Philippine Coast Guard vessels, which are often on the front lines of encounters with the CCG.

Operationalizing the Alliance: EDCA and Joint Exercises

The alliance is being operationalized through tangible agreements and activities. The 2014 Enhanced Defense Cooperation Agreement (EDCA) grants U.S. forces rotational access to nine strategic locations within the Philippines. These sites are critical for prepositioning equipment for humanitarian assistance and disaster relief, and they also serve as vital forward staging points for U.S. forces, enhancing joint operational readiness and responsiveness in a crisis. This presence is complemented by increasingly complex and large-scale joint military exercises. Annual drills like Balikatan and KAMANDAG now involve thousands of U.S. and Philippine personnel, often joined by partners like Japan and Australia, training in amphibious operations, maritime security, and counterterrorism. These exercises are not merely for training; they are a powerful form of strategic messaging, demonstrating the alliance’s growing interoperability and collective resolve.

The AFP’s Strategic Pivot: From Internal to External Defense

For the Armed Forces of the Philippines (AFP), the current era represents the most significant strategic shift in its modern history. After decades of being primarily focused on internal counter-insurgency campaigns, the AFP is now reorienting toward external and territorial defense. This pivot is backed by the ambitious “Re-Horizon 3” modernization program, a decade-long, $35 billion initiative to acquire a credible deterrent capability. Key acquisitions include multi-role fighter jets like the FA-50, modern missile-capable frigates, offshore patrol vessels, and land-based anti-ship missile systems like the BrahMos. This effort aims to remedy decades of neglect and build a force capable of defending Philippine sovereignty in the maritime and air domains, moving beyond a reliance on decommissioned U.S. vessels for patrols.

U.S. Unconventional Warfare (UW) Doctrine

The U.S. military’s role in an unconventional conflict would be guided by its doctrine of Unconventional Warfare (UW). This doctrine is not about direct U.S. combat but focuses on enabling a partner force to “coerce, disrupt or overthrow an occupying power or government”. In the context of a conflict with China, U.S. Special Operations Forces (SOF) would apply this doctrine by advising, assisting, training, and equipping their AFP counterparts to counter Chinese gray-zone tactics, resist cyber intrusions, and combat disinformation. The U.S. role would be that of a force multiplier, supplementing and substituting for conventional forces in politically sensitive or denied areas, and working “through, with, and by” the AFP to build its capacity to resist Chinese coercion independently.

This doctrinal landscape reveals a fundamental mismatch. China’s strategy is holistic, patient, and indirect, seeking to win by accumulating small, non-military advantages over time to change the strategic environment—a philosophy comparable to the board game Go. The alliance, with its focus on the MDT, EDCA sites, and conventional modernization, is structured to deter and respond to discrete, escalatory events—a more direct, force-on-force approach reminiscent of Chess. China’s entire gray-zone playbook is designed to operate within this doctrinal gap, to probe and coerce in ways that fall just short of the “armed attack” that would trigger the alliance’s primary response mechanism. This creates a dangerous “MDT Trap”: if the U.S. responds to a non-military provocation (like a CCG water cannon) with a military asset (a U.S. Navy destroyer), it risks falling into China’s narrative of U.S. militarization and escalating the conflict on Beijing’s terms. If it fails to respond, it risks undermining the credibility of its “ironclad” security guarantee. The central challenge for the alliance is to adapt its event-response model to counter China’s process-oriented strategy of coercion.

II. Five Scenarios of Unconventional War

The following scenarios illustrate how an unconventional conflict between the U.S.-Philippines alliance and China could unfold. These narratives are designed to be plausible, grounded in current doctrines and capabilities, and representative of the multi-domain nature of modern coercion. They explore how conflict could be initiated and contested across the maritime, cyber, economic, information, and proxy domains.

Table 1: Scenario Summary Matrix

Scenario TitlePrimary Domain of ConflictTrigger EventKey Chinese ActorsKey Alliance RespondersPrimary Escalation Risk
1. The Quarantine of Second Thomas ShoalMaritime / LegalAFP completes major reinforcement of the BRP Sierra Madre, signaling permanence.China Coast Guard (CCG), Maritime Militia, Ministry of Foreign AffairsPhilippine Coast Guard (PCG), AFP, U.S. INDOPACOM, Dept. of State, Allied Navies (Japan, Australia)Miscalculation during enforcement leads to a kinetic clash between coast guard vessels.
2. The Cyber Pearl HarborCyberHeightened regional tension (e.g., major U.S. arms sale to Taiwan, start of Balikatan exercises).PLA Strategic Support Force (SSF), Ministry of State Security (MSS), APT groups (e.g., Volt Typhoon)DICT/CICC, AFP Cyber Group, U.S. Cyber Command, CISA, NSACascading failure of critical infrastructure leading to civil unrest; debate over MDT invocation.
3. The Economic Strangulation GambitEconomicPhilippines wins a new international tribunal ruling against China (e.g., on fishing rights).Ministry of Commerce, General Administration of Customs, CCG, Maritime MilitiaDept. of Trade and Industry, Dept. of Agriculture, Dept. of Foreign Affairs, U.S. Trade Representative, USAIDSevere economic pain creates domestic political instability in the Philippines, pressuring a policy change.
4. The Disinformation BlitzInformation / CognitiveLead-up to a Philippine national election with a pro-alliance candidate favored to win.PLA SSF, MSS, United Front Work Dept., State-controlled media, “Spamouflage” networksDICT/CICC, Presidential Comms Office, U.S. State Dept. (GEC), U.S. Intelligence CommunityErosion of public trust in democratic institutions and the U.S. alliance, regardless of the election outcome.
5. The Proxy IgnitionAsymmetric / ProxyA new EDCA site in a strategic northern province becomes fully operational.Ministry of State Security (MSS), PLA intelligence assetsArmed Forces of the Philippines (AFP), Philippine National Police (PNP), U.S. Special Operations ForcesAFP resources are diverted from external to internal defense, achieving a key Chinese objective without direct confrontation.

Scenario 1: The Quarantine of Second Thomas Shoal

Trigger: After months of escalating harassment during resupply missions, the Philippines, with covert U.S. Navy Seabee technical assistance and materials delivered in small, successive batches, successfully completes a major reinforcement of the BRP Sierra Madre. The operation reinforces the ship’s hull and living quarters, signaling to Beijing that Manila intends to maintain a permanent physical outpost on the shoal indefinitely.

China’s Move (Lawfare & Maritime Coercion): In response to what it calls an “illegal and provocative” alteration of the status quo, Beijing initiates a novel coercive measure. It avoids a military blockade, which is an unambiguous act of war under international law. Instead, it announces the establishment of a “temporary maritime traffic control and customs supervision zone” around Second Thomas Shoal, citing its domestic laws on maritime safety and customs enforcement. This is a carefully constructed “quarantine,” a law enforcement-led operation designed to control traffic rather than seal off the area completely, thereby creating legal and operational ambiguity.

Within hours, a flotilla of over a dozen CCG cutters and three dozen maritime militia vessels establish a persistent presence, forming a tight cordon around the shoal. They do not fire upon approaching vessels. Instead, they use their physical mass to block access, hailing all ships—including Philippine Coast Guard (PCG) patrols—on marine radio channels, informing them they have entered a “Chinese law enforcement zone” and must submit to “on-site safety and customs inspections” before proceeding. Any Philippine vessel that refuses to comply is subjected to escalating non-lethal harassment: aggressive bow-crossing, shadowing, and sustained high-pressure water cannon attacks.

Alliance Counter-Move (Diplomacy & Assertive Presence): The alliance, anticipating this move, refrains from sending a U.S. Navy warship to directly breach the quarantine line, thereby avoiding the “MDT Trap” of a military-on-civilian confrontation. Instead, the response is multi-layered and multilateral. The Philippines immediately launches a campaign of “assertive transparency,” embedding journalists from international news agencies onto its PCG vessels and live-streaming the CCG’s coercive actions to a global audience.

Diplomatically, the U.S. and the Philippines convene an emergency session of the UN Security Council and issue a joint statement with G7 partners condemning China’s actions as a violation of UNCLOS and a threat to freedom of navigation. Operationally, the U.S. organizes a multinational “maritime security patrol” consisting of a Philippine Coast Guard cutter, an Australian frigate, and a Japanese destroyer. The U.S. contribution is a Coast Guard cutter, emphasizing the law enforcement nature of the mission, while a U.S. Navy Arleigh Burke-class destroyer provides over-the-horizon intelligence, surveillance, and reconnaissance (ISR) support but remains outside the immediate area. This multinational flotilla escorts a Philippine supply ship toward the shoal, publicly declaring its mission is to ensure the “safe passage of humanitarian supplies consistent with international law.”

Strategic Implications: This scenario transforms the standoff from a simple maritime dispute into a high-stakes test of political will and legal narratives. China’s objective is to demonstrate it can control access to disputed features at will, using civilian means that make a military response from the U.S. appear disproportionate and aggressive. The alliance’s counter-move aims to internationalize the crisis, framing it as a defense of the global maritime order rather than a bilateral U.S.-China confrontation. The outcome hinges on the critical moment when the multinational escort flotilla approaches the Chinese quarantine line. If the CCG backs down, its lawfare gambit fails. If it uses force against the ships of multiple nations, it risks a significant diplomatic and potentially military escalation that it may not be prepared for.

Scenario 2: The Cyber Pearl Harbor

Trigger: Tensions in the region are at a peak following the announcement of a landmark U.S. arms sale to Taiwan. In the South China Sea, the annual U.S.-Philippines Balikatan exercises are underway, featuring live-fire drills and simulated retaking of islands, which Beijing publicly denounces as a “provocation.”

China’s Move (Cyber Warfare): The PLA’s Strategic Support Force, operating through a known advanced persistent threat (APT) group like Volt Typhoon, activates malware that has been covertly pre-positioned for months, or even years, within Philippine critical infrastructure networks. The attack is not a single event but a coordinated, cascading series of disruptions designed to induce panic and paralyze the country’s ability to respond to an external crisis.

The multi-vectored assault unfolds over 48 hours:

  • Maritime Logistics: The terminal operating systems at the Port of Manila and the strategic port of Subic Bay are targeted. Malware disrupts the software that manages container movements, causing cranes to freeze and creating massive backlogs that halt both commercial shipping and the logistical support for the ongoing Balikatan exercises.
  • Financial System: Several of the Philippines’ largest banks are hit with what appears to be a massive ransomware attack. Online banking portals go down, and ATMs cease to function. The attackers, using criminal fronts to maintain deniability, demand exorbitant ransoms, but their true goal is to shatter public confidence in the financial system and create widespread economic anxiety.
  • Military Command and Control (C2): Simultaneously, a massive distributed denial-of-service (DDoS) attack is launched against the AFP’s primary command-and-control networks and the Department of National Defense. Communications between military headquarters in Manila and naval and air units participating in the exercises become severely degraded, hampering operational coordination. The attack exploits known vulnerabilities in the Philippines’ underdeveloped and fragmented cybersecurity infrastructure.

Alliance Counter-Move (Cyber Defense & Attribution): The Philippine government activates its National Cybersecurity Plan 2023-2028 and its National Computer Emergency Response Team (NCERT). However, the scale and sophistication of the coordinated attack quickly overwhelm the nascent capabilities of these institutions.

Manila formally requests emergency cybersecurity assistance from the United States under the 2023 Bilateral Defense Guidelines, which specifically mandate cooperation to “secure critical infrastructure and build protection against attacks emanating from state and non-state actors”. In response, U.S. Cyber Command, in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), deploys “hunt forward” teams. These elite cyber defense experts work alongside their Philippine counterparts inside compromised networks to identify the malware, eject the intruders, and restore services.

Crucially, the U.S. intelligence community rapidly analyzes the malware’s code, tactics, and infrastructure, attributing the attack with high confidence to the Chinese state. The White House, in a coordinated action with the Philippines and other “Five Eyes” partners, publicly exposes China’s role, releasing detailed technical indicators of compromise and imposing a new round of economic and diplomatic sanctions against entities linked to the PLA’s SSF.

Strategic Implications: The “Cyber Pearl Harbor” exposes the extreme vulnerability of a key U.S. ally to modern, multi-domain warfare. It demonstrates that an adversary can inflict strategic-level damage and chaos comparable to a military strike without firing a single missile. The attack forces a critical and difficult debate within the alliance: does a state-sponsored cyberattack that cripples a nation’s economy and critical infrastructure constitute an “armed attack” under the MDT? The U.S. response—providing defensive assistance and leading a campaign of public attribution and sanctions—tests whether non-military countermeasures can effectively deter future cyber aggression.

Scenario 3: The Economic Strangulation Gambit

Trigger: The Philippines, building on its 2016 legal victory, wins another significant ruling at the Permanent Court of Arbitration. The new ruling holds China financially liable for causing massive environmental damage through its island-building activities and for systematically violating the traditional fishing rights of Filipinos around Scarborough Shoal. Manila announces its intention to enforce the ruling through all available diplomatic and legal channels.

China’s Move (Economic & Gray-Zone Coercion): Beijing, which rejects the tribunal’s authority, retaliates with a campaign of calibrated economic coercion designed to inflict maximum pain on key sectors of the Philippine economy and foment domestic opposition to the government’s foreign policy. The Ministry of Commerce announces an immediate and indefinite ban on all imports of Philippine bananas, mangoes, and other agricultural products, citing fabricated “phytosanitary concerns” and a sudden outbreak of “pests”. This move targets a politically sensitive industry and a major source of export revenue.

Simultaneously, the CCG and maritime militia escalate their gray-zone operations across the South China Sea. They shift from harassment to interdiction, systematically detaining Filipino fishing vessels in disputed waters. Boats are impounded, catches are confiscated, and crews are held for weeks at Chinese-controlled outposts in the Spratly Islands before being released. This campaign effectively paralyzes the Philippine fishing industry in the region, threatening the livelihoods of tens of thousands.

This economic pressure is amplified by a coordinated information campaign. Chinese state-controlled media and affiliated social media accounts run stories highlighting the plight of struggling Filipino farmers and fishermen, blaming their suffering directly on the Marcos administration’s “provocative” and “pro-American” policies. The narrative suggests that prosperity can only return if Manila abandons its legal challenges and adopts a more “cooperative” stance with Beijing.

Alliance Counter-Move (Economic Resilience & Diplomatic Pressure): The Philippine government immediately seeks emergency economic support. The Department of Trade and Industry works with diplomats from the U.S., Japan, South Korea, and the European Union to secure temporary alternative markets for its agricultural exports. The government also rolls out a program of direct subsidies to the thousands of farmers and fishermen affected by the Chinese actions, using emergency funds supported by U.S. development aid.

The United States leads a diplomatic counter-offensive. The U.S. Trade Representative, in concert with the G7, formally condemns China’s actions at the World Trade Organization as a blatant act of economic coercion and a violation of international trade norms. Washington provides the Philippines with a substantial economic support package, including grants and loan guarantees, explicitly designed to bolster its economic resilience against foreign pressure. To counter the maritime pressure, the U.S. Navy and Coast Guard significantly increase ISR patrols throughout the South China Sea. They use drones and patrol aircraft to meticulously document every instance of a Filipino fishing vessel being illegally detained, sharing the imagery and tracking data with international media to expose and publicize China’s actions, providing a steady stream of evidence for future legal challenges.

Strategic Implications: This scenario shifts the primary battlefield from the sea to the economy, testing the domestic political resilience of the Philippines. China’s objective is to create a pincer movement of economic pain and information pressure to generate a powerful domestic lobby within the Philippines that advocates for accommodation with Beijing. The goal is to demonstrate to the Philippines—and all other regional states—that closer alignment with the United States comes at an unacceptably high economic price. The success of the alliance’s response depends entirely on its speed and effectiveness in mitigating the economic damage and sustaining Manila’s political will to resist the coercion.

Scenario 4: The Disinformation Blitz and Leadership Crisis

Trigger: The Philippines is in the final, heated weeks of a presidential election campaign. The leading candidate is a staunch advocate for the U.S. alliance and has pledged to accelerate the AFP’s modernization and expand U.S. access to EDCA sites. Polling indicates a likely victory, which would solidify the pro-U.S. strategic alignment for another six years.

China’s Move (Information Warfare & Cognitive Manipulation): Beijing launches its most sophisticated and daring information operation to date, aiming to directly interfere in the democratic process and fracture the alliance from within. The operation is a multi-pronged “disinformation blitz” that leverages cutting-edge technology and a deep understanding of Philippine societal fissures.

The centerpiece is a series of hyper-realistic deepfake audio and video clips, generated using advanced AI. The first is an audio clip, “leaked” online, that appears to be a wiretapped phone call in which the pro-alliance candidate is heard promising a lucrative construction contract for a new EDCA facility to a family member. A week later, a deepfake video is released showing a high-ranking U.S. military official meeting with the candidate’s brother at a hotel bar, seemingly exchanging documents. The content is meticulously crafted to exploit long-standing Filipino sensitivities regarding corruption and national sovereignty vis-à-vis the U.S. military presence.

These deepfakes are not simply posted online; they are strategically disseminated. The initial release is on obscure forums to avoid immediate detection, then laundered through a vast network of thousands of automated and human-managed fake social media accounts—part of the “Spamouflage” network—that have been dormant for months. These accounts amplify the content, which is then picked up and promoted by pro-Beijing political influencers and alternative news websites in the Philippines. The narrative quickly spreads: the leading candidate is corrupt, selling out Philippine sovereignty to the Americans for personal gain.

Alliance Counter-Move (Rapid Debunking & Pre-bunking): The alliance, having war-gamed this exact scenario, executes a pre-planned counter-disinformation strategy. The Philippine Department of Information and Communications Technology (DICT) and its Cybercrime Investigation and Coordinating Center (CICC) immediately activate their rapid-response channel with Google, Meta, and X (formerly Twitter), flagging the deepfake content for immediate takedown based on violations of platform policies against manipulated media.

Simultaneously, the U.S. government provides critical support. The National Security Agency and FBI’s forensic analysis units work around the clock to analyze the digital artifacts of the video and audio files, producing a technical report within 24 hours that proves they are AI-generated fakes. This unclassified report is shared with the Philippine government and released to major international news organizations.

Both governments launch a joint public information campaign. The Philippine government holds a high-profile press conference, with the U.S. ambassador present, to present the forensic evidence and denounce the operation as foreign election interference. This is supported by a “pre-bunking” campaign, using social media and public service announcements to educate the public on how to spot deepfakes and reminding them of China’s documented history of using such tactics against Taiwan and other democracies.

Strategic Implications: This scenario represents a direct assault on the cognitive domain and the integrity of a democratic process. It is a test of a society’s resilience to sophisticated information manipulation. The primary challenge is the “liar’s dividend”—even after the content is definitively debunked, a significant portion of the population may continue to believe the fake narrative or become so cynical that they distrust all information. China’s goal is not necessarily to swing the election, but to sow chaos, erode public trust in democratic institutions, and poison the perception of the U.S. alliance for years to come, regardless of who wins. The success of the counter-operation is measured not just in how quickly the fakes are removed, but in how effectively the public can be inoculated against the lingering effects of the disinformation.

Scenario 5: The Proxy Ignition

Trigger: A new EDCA site in Cagayan, a province in the northern Philippines, becomes fully operational. Its strategic location, just 400 kilometers from Taiwan, allows the U.S. to position long-range precision missile batteries and an advanced air and missile defense radar system, giving the alliance a commanding view of the critical Bashi Channel, the waterway between the Philippines and Taiwan. Beijing views this as a direct threat and a key node in a U.S. strategy to intervene in a future Taiwan contingency.

China’s Move (Covert & Asymmetric Warfare): Recognizing that its past support for communist insurgencies in the Philippines is a defunct and counterproductive strategy from a bygone era , China adopts a modern, deniable proxy approach. Agents from the Ministry of State Security (MSS) make covert contact not with ideological rebels, but with a local, non-ideological grievance group—a radical environmental movement protesting the destruction of ancestral lands for the base construction, combined with a local political clan that lost influence due to the base’s establishment.

The support provided is carefully non-attributable. The MSS does not provide weapons or direct training. Instead, it supplies the group with advanced encrypted communication devices, funding laundered through a series of offshore shell corporations and charitable foundations, and critical intelligence, such as AFP patrol schedules and schematics of the local power grid, obtained via cyber espionage.

Empowered by this support, the proxy group launches an escalating campaign of sabotage and disruption. It begins with large-scale protests that block access roads to the EDCA site. This escalates to the sabotage of key infrastructure—blowing up a crucial bridge, toppling power transmission towers that supply the base, and contaminating a local water source used by AFP personnel. The campaign is designed to create a severe and persistent internal security crisis, making the EDCA site a logistical and political nightmare for both Manila and Washington.

Alliance Counter-Move (Partner-led Counter-Insurgency): The alliance response is deliberately calibrated to avoid validating the proxy group’s anti-American narrative. The AFP, leveraging its decades of hard-won counter-insurgency experience, takes the public lead in all security operations. The focus is on classic counter-insurgency tactics: winning the support of the local population to isolate the radical elements, conducting patient intelligence-gathering to uncover the network of external support, and using police action rather than overt military force where possible.

The U.S. role is strictly in the background, guided by its UW doctrine of enabling a partner force. Small, specialized U.S. Special Operations Forces teams are co-located with their AFP counterparts far from the crisis zone. They provide crucial, non-combat support: advanced training in intelligence analysis, signals intelligence (SIGINT) capabilities to help trace the encrypted communications back to their source, and ISR support from unmanned aerial vehicles to monitor the remote, mountainous terrain used by the saboteurs. No U.S. soldier engages in direct action.

Strategic Implications: This scenario achieves a key Chinese strategic objective without a single PLA soldier crossing a border. It forces the AFP to divert significant resources, attention, and political capital away from its primary mission of external territorial defense and back toward internal security, effectively bogging down a key U.S. ally. It creates a major political headache for the Marcos administration and tests the maturity of the alliance, requiring the United States to demonstrate strategic patience, trust its partner to lead the direct fight, and resist the temptation to intervene overtly. The ultimate goal for China is to make the strategic cost of hosting U.S. forces so high that future Philippine governments will reconsider the value of the alliance.

III. Cross-Domain Escalation and Alliance Red Lines

The five scenarios demonstrate that an unconventional conflict will not be confined to a single domain. China’s doctrine of integrated coercion ensures that actions in one sphere are designed to create effects in others. A successful cyberattack (Scenario 2) could degrade the AFP’s command and control, emboldening the CCG to be more aggressive at sea (Scenario 1). A U.S. diplomatic response to economic coercion (Scenario 3) could be met with a targeted disinformation campaign (Scenario 4) to undermine the U.S. position. This interconnectedness creates complex escalation pathways and forces the alliance to confront the fundamental, and dangerously ambiguous, question of what constitutes an “armed attack” in the 21st century.

A. The Escalation Ladder: From Gray Zone to Open Conflict

The primary risk in this environment is unintended escalation born from miscalculation. Each move and counter-move carries the potential to climb the escalation ladder. A confrontation between a PCG cutter and a CCG vessel over a “quarantine” could result in a collision and loss of life, pushing both sides toward a kinetic response. A RAND Corporation analysis on the nature of a potential U.S.-China conflict highlights that such wars could become protracted, with the opening unconventional phase setting the conditions for a much longer and more costly struggle than traditional force planning envisions.

The normalization of high-intensity military signaling, such as large-scale exercises and freedom of navigation operations, also contributes to escalation risk. While intended to deter, these actions can inflate both sides’ tolerance for risk over time, requiring ever-stronger signals to achieve the same effect and narrowing the space for de-escalation once a crisis begins. China’s strategy is to control this ladder, using non-military actions to force a military response from the alliance, thereby framing the U.S. as the escalator.

B. Defining an “Armed Attack” in the 21st Century

The central challenge for the U.S.-Philippines alliance is that the MDT was written for a different era of warfare. China’s unconventional tactics are deliberately designed to exploit the treaty’s 20th-century definition of an “armed attack.” The scenarios presented raise critical questions that the alliance must answer to maintain credible deterrence:

  • Maritime Coercion: Does a CCG-enforced “quarantine” that denies the Philippines access to its own territory and causes severe economic harm, but results in no casualties, meet the threshold for an armed attack? The 2023 Bilateral Defense Guidelines’ inclusion of the Coast Guard was a significant step, but the line between harassment and an “armed attack” remains dangerously blurry.
  • Cyber Warfare: Can a massive, state-sponsored cyber operation that cripples a nation’s financial system, disrupts its power grid, and paralyzes its transportation networks be considered an armed attack? Such an event could cause more damage, death, and chaos than a limited kinetic strike. The alliance guidelines call for cooperation on cyber defense, but do not specify where the red line for a collective defense response lies.
  • Information Warfare: At what point does a foreign-directed disinformation campaign that incites widespread civil unrest, paralyzes government function, and fundamentally subverts a democratic election constitute an attack on the sovereignty and political independence of the state?

Without clear, privately agreed-upon, and publicly signaled red lines for these non-kinetic actions, the deterrent power of the MDT is weakened. China is incentivized to continue pushing the boundaries, confident that its actions will not trigger a decisive response.

C. The Role of Third Parties and Off-Ramps

De-escalation in any of these scenarios will depend heavily on the actions of third parties. China’s diplomatic strategy consistently seeks to frame disputes as bilateral issues to be resolved between it and the other claimant, resisting external “interference”. This approach allows Beijing to leverage its immense comprehensive power against a smaller neighbor.

Conversely, the U.S. and Philippine strategy is to multilateralize the conflict, framing China’s actions as a threat to the entire rules-based international order. The active participation of allies like Japan, Australia, and partners in the EU and ASEAN is critical. By forming multinational maritime patrols, issuing joint diplomatic condemnations, and providing coordinated economic support, the alliance can amplify the costs of Chinese aggression and build a broader coalition to defend international law. The success of any de-escalation effort will hinge on which side more effectively shapes the international environment and isolates its adversary diplomatically.

IV. Strategic Recommendations for a Resilient Alliance

The challenges posed by China’s unconventional warfare strategy require the U.S.-Philippines alliance to move beyond traditional defense planning. Deterrence and defense in the 21st century demand a resilient, integrated, and proactive posture that spans all domains of statecraft. The following recommendations are designed to address the specific vulnerabilities identified in the preceding scenarios.

A. Bolstering Integrated Deterrence

The alliance’s current approach, while strengthening, often addresses threats in domain-specific silos. To counter a strategy of integrated coercion, the alliance must adopt a posture of integrated deterrence.

  • Recommendation 1: Conduct Integrated Alliance Exercises. The alliance should move beyond conventional, domain-specific exercises. It must design and regularly conduct complex, integrated exercises that simulate a multi-domain crisis. A future Balikatan or KAMANDAG should feature a scenario that combines a maritime standoff (Scenario 1) with a simultaneous cyberattack on critical infrastructure (Scenario 2) and a coordinated disinformation campaign (Scenario 4). This would force a whole-of-government response, training personnel from the AFP, PCG, DICT, Department of Foreign Affairs, and their U.S. counterparts to work together under pressure.
  • Recommendation 2: Establish a Joint Alliance Fusion Center. To break down intelligence and operational stovepipes, the U.S. and the Philippines should establish a joint “Alliance Fusion Center for Gray-Zone Threats.” This center would co-locate personnel from the AFP, PCG, DICT, U.S. INDOPACOM, NSA, and CISA to share and analyze real-time intelligence on maritime movements, cyber intrusions, and information operations. This would enable a common operating picture and facilitate a rapid, coordinated response to ambiguous threats before they escalate into a full-blown crisis.

B. Enhancing Philippine National Resilience

The primary target of China’s unconventional strategy is often not the AFP, but the stability and resilience of the Philippine state itself. Therefore, strengthening Philippine national resilience is a core component of collective defense.

  • Recommendation 1: Prioritize Cyber and C4ISR Modernization. While conventional platforms like jets and frigates are important, the scenarios reveal that the Philippines’ most immediate vulnerabilities lie in the cyber and command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) domains. The U.S. should prioritize Foreign Military Financing, Foreign Military Sales, and technical assistance toward hardening the Philippines’ critical infrastructure, securing military and government networks, and building a robust national cyber defense capability. This is the most likely “first front” in any future conflict.
  • Recommendation 2: Co-Invest in Societal Resilience to Disinformation. The alliance should jointly fund and support a nationwide media literacy and critical thinking program in the Philippines. Modeled on successful initiatives in states that have long faced information warfare, such as Taiwan and the Baltic nations, this program should be integrated into the national education curriculum and public information campaigns. Building societal “cognitive immunity” is the most effective long-term defense against information warfare and is essential for preserving democratic integrity and the political viability of the alliance itself.

C. Clarifying Alliance Commitments for the Gray Zone

Ambiguity is the currency of gray-zone warfare. To re-establish deterrence, the alliance must reduce the ambiguity surrounding its most solemn commitment.

  • Recommendation 1: Issue a Joint Supplementary Statement to the MDT. The 2023 Bilateral Defense Guidelines were a positive step, but further clarity is needed. The U.S. and the Philippines should negotiate and issue a formal joint supplementary statement to the Mutual Defense Treaty. This statement should not alter the treaty’s text but should explicitly clarify the alliance’s shared understanding that certain severe, non-kinetic actions could be considered tantamount to an armed attack. This could include, for example, a state-sponsored cyberattack that results in the sustained disruption of critical infrastructure leading to widespread societal harm. Such a declaration would reduce China’s perceived freedom of action in the gray zone and strengthen the deterrent power of the alliance for the unconventional challenges of the 21st century.

If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Sources Used

  1. Military Confrontation in the South China Sea | Council on Foreign Relations, accessed October 3, 2025, https://www.cfr.org/report/military-confrontation-south-china-sea
  2. GREY ZONE WARFARE IN CHINA’S STALLED SOUTH CHINA SEA AMBITIONS, accessed October 3, 2025, https://www.cyfirma.com/research/grey-zone-warfare-in-chinas-stalled-south-china-sea-ambitions/
  3. Combating the Gray Zone: Examining Chinese Threats to the Maritime Domain, accessed October 3, 2025, https://carnegieendowment.org/posts/2024/06/combating-the-gray-zone-examining-chinese-threats-to-the-maritime-domain?lang=en
  4. China’s Evolving Risk Tolerance and Gray-Zone Operations: From the East China Sea to the South Pacific | The Heritage Foundation, accessed October 3, 2025, https://www.heritage.org/defense/report/chinas-evolving-risk-tolerance-and-gray-zone-operations-the-east-china-sea-the-south
  5. How to Respond to China’s Tactics in the South China Sea | RAND, accessed October 3, 2025, https://www.rand.org/pubs/commentary/2024/06/how-to-respond-to-chinas-tactics-in-the-south-china.html
  6. Expect More U.S. Military in South China Sea – Du Lan, accessed October 3, 2025, https://www.chinausfocus.com/foreign-policy/expect-more-us-military-in-south-china-sea
  7. China’s Gray War on America – The Cipher Brief, accessed October 3, 2025, https://www.thecipherbrief.com/china-gray-zone-war
  8. Decoding Beijing’s Gray Zone Tactics: China Coast Guard Activities and the Redefinition of Conflict in the Taiwan Strait, accessed October 3, 2025, https://globaltaiwan.org/2024/03/decoding-beijings-gray-zone-tactics-china-coast-guard-activities-and-the-redefinition-of-conflict-in-the-taiwan-strait/
  9. APRSA 2024 | Chapter 5: Driving Wedges: China’s Disinformation Campaigns in the Asia-Pacific – The International Institute for Strategic Studies, accessed October 3, 2025, https://www.iiss.org/publications/strategic-dossiers/asia-pacific-regional-security-assessment-2024/chapter-5/
  10. driving wedges: china’s disinformation campaigns in the asia-pacific – The International Institute for Strategic Studies, accessed October 3, 2025, https://www.iiss.org/globalassets/media-library—content–migration/files/publications—free-files/aprsa-2024/aprsa24-chapter-5.pdf
  11. Introducing China’s Maritime Gray Zone Tactics Playbook – SeaLight, accessed October 3, 2025, https://www.sealight.live/posts/introducing-china-s-maritime-gray-zone-tactics-playbook
  12. China’s Cyber Playbook for the Indo-Pacific – Foreign Policy Research Institute, accessed October 3, 2025, https://www.fpri.org/article/2025/08/chinas-cyber-playbook-for-the-indo-pacific/
  13. WINNING THE HUNDRED BATTLES: CHINA AND ASYMMETRIC WARFARE A thesis presented to the Faculty of the US Army Command and General S, accessed October 3, 2025, https://cgsc.contentdm.oclc.org/digital/api/collection/p4013coll2/id/104/download
  14. Asymmetric War? Implications for China’s Information Warfare Strategies – UR Scholarship Repository, accessed October 3, 2025, https://scholarship.richmond.edu/polisci-faculty-publications/55/
  15. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China – DTIC, accessed October 3, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA429889.pdf
  16. Contrasting Chinese and American Approaches to Irregular Warfare …, accessed October 3, 2025, https://irregularwarfarecenter.org/publications/insights/contrasting-chinese-and-american-approaches-to-irregular-warfare/
  17. The Philippines | Congress.gov, accessed October 3, 2025, https://www.congress.gov/crs-product/IF10250
  18. U.S. Security Cooperation with the Philippines – United States Department of State, accessed October 3, 2025, https://www.state.gov/u-s-security-cooperation-with-the-philippines
  19. The United States and the Republic of the Philippines … – DoD, accessed October 3, 2025, https://media.defense.gov/2023/May/03/2003214357/-1/-1/0/THE-UNITED-STATES-AND-THE-REPUBLIC-OF-THE-PHILIPPINES-BILATERAL-DEFENSE-GUIDELINES.PDF
  20. The United States-Philippine Security Cooperation – CRDF Global, accessed October 3, 2025, https://www.crdfglobal.org/news/the-united-states-philippine-security-cooperation/
  21. Riding Unruly Waves: The Philippines’ Military Modernisation Effort, accessed October 3, 2025, https://www.crisisgroup.org/asia-pacific/south-east-asia/philippines-china-united-states/349-riding-unruly-waves-philippines-military-modernisation-effort
  22. AFP Modernization Act – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/AFP_Modernization_Act
  23. The Philippines’ Horizon 3 Military Modernisation Programme – MP-IDSA, accessed October 3, 2025, https://www.idsa.in/publisher/issuebrief/the-philippines-horizon-3-military-modernisation-programme
  24. Unconventional warfare (United States) – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Unconventional_warfare_(United_States)
  25. Unconventional warfare – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Unconventional_warfare
  26. Unconventional Warfare on the Conventional Battlefield – Army University Press, accessed October 3, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Nov-Dec-2024/Unconventional-Warfare/
  27. South China Sea | International Crisis Group, accessed October 3, 2025, https://www.crisisgroup.org/asia-pacific/south-east-asia/south-china-sea
  28. BLOCKADE TO QUARANTINE IN INTERNATIONAL LAW – HeinOnline, accessed October 3, 2025, https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/naval17§ion=32
  29. Blockade – Wikipedia, accessed October 3, 2025, https://en.wikipedia.org/wiki/Blockade
  30. How China Could Quarantine Taiwan – CSIS, accessed October 3, 2025, https://features.csis.org/chinapower/china-quarantine-taiwan/
  31. Imposing a Maritime Quarantine to Enforce the Houthi Arms Embargo – Lieber Institute, accessed October 3, 2025, https://lieber.westpoint.edu/imposing-maritime-quarantine-enforce-houthi-arms-embargo/
  32. Navigating the South China Sea: Key Developments in 2024 and What to Expect in 2025, accessed October 3, 2025, https://chinaus-icas.org/research/navigating-the-south-china-sea-key-developments-in-2024-and-what-to-expect-in-2025/
  33. Three ideas for countering China in the gray zone – Defense One, accessed October 3, 2025, https://www.defenseone.com/ideas/2024/03/how-can-deterrence-seize-initiative-three-approaches-countering-china-gray-zone/394748/
  34. U.S. Position on Maritime Claims in the South China Sea – state.gov, accessed October 3, 2025, https://2017-2021.state.gov/u-s-position-on-maritime-claims-in-the-south-china-sea/
  35. China-Linked Cyber Operations Targeting US Critical Infrastructure – NJCCIC – NJ.gov, accessed October 3, 2025, https://www.cyber.nj.gov/threat-landscape/nation-state-threat-analysis-reports/china-linked-cyber-operations-targeting-us-critical-infrastructure
  36. Chinese Government Poses ‘Broad and Unrelenting’ Threat to US Critical Infrastructure, FBI Director Says, accessed October 3, 2025, https://www.fbi.gov/news/stories/chinese-government-poses-broad-and-unrelenting-threat-to-u-s-critical-infrastructure-fbi-director-says
  37. PHILIPPINES THREAT OVERVIEW – CYFIRMA, accessed October 3, 2025, https://www.cyfirma.com/research/philippines-threat-overview/
  38. Cybersecurity in the Philippines: Global Context and Local Challenges – The Asia Foundation, accessed October 3, 2025, https://asiafoundation.org/wp-content/uploads/2022/03/Cybersecurity-in-the-Philippines-Global-Context-and-Local-Challenges-.pdf
  39. The Philippines’ National Cyber Security Plan 2023-2028: Roadmap to Cyberspace Resilience – Lumify Work, accessed October 3, 2025, https://www.lumifywork.com/en-ph/blog/the-philippines-national-cyber-security-plan-2023-2028-roadmap-to-cyberspace/
  40. Data Breaches Plague Philippines as Country Scrambles to Bolster Cyber Defences, accessed October 3, 2025, https://www.asiapacific.ca/publication/data-breaches-plague-philippines-country-scrambles-bolster
  41. Cyber Security in Philippine Organizations, accessed October 3, 2025, https://securityquotient.io/cyber-security-and-grc-use-cases/cyber-security-for-philippines
  42. Philippines’ National Cybersecurity Plan (NCSP) 2023-2028 | Digital Watch Observatory, accessed October 3, 2025, https://dig.watch/resource/philippines-national-cybersecurity-plan-ncsp-2023-2028
  43. National Cybersecurity Plan – Department of Information and Communications Technology, accessed October 3, 2025, https://dict.gov.ph/national-cyber-security-plan?utm
  44. NCSP 2023-2028 – FINAL-DICT, accessed October 3, 2025, https://cms-cdn.e.gov.ph/DICT/pdf/NCSP-2023-2028-FINAL-DICT.pdf
  45. Cybersecurity in the Philippines: Advancing a Cyber Defense Posture – FACTS Asia, accessed October 3, 2025, https://www.factsasia.org/blog/cybersecurity-in-the-philippines-advancing-a-cyber-defense-posture
  46. Cybersecurity features prominently in new US-Philippines bilateral defense guidelines, accessed October 3, 2025, https://defensescoop.com/2023/05/03/cybersecurity-features-prominently-in-new-us-philippines-bilateral-defense-guidelines/
  47. Shutdown guts U.S. cybersecurity agency at perilous time, accessed October 3, 2025, https://www.washingtonpost.com/technology/2025/10/02/cisa-shutdown-cybersecurity/
  48. People’s Republic of China Threat Overview and Advisories – CISA, accessed October 3, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/china
  49. China and the South China Sea Territorial Disputes – Dr Jorge’s World, accessed October 3, 2025, https://drjorge.world/2025/04/10/china-and-the-south-china-sea-territorial-disputes/
  50. AI-Generated Deepfake News Anchors Used in Pro-China Disinformation Campaigns, accessed October 3, 2025, https://oecd.ai/en/incidents/2023-02-07-addb
  51. Making Deepfakes With Chinese AI – China Media Project, accessed October 3, 2025, https://chinamediaproject.org/2024/10/16/making-deepfakes-with-chinese-ai/
  52. The Red Wave: How China Weaponizes Disinformation | ASP American Security Project, accessed October 3, 2025, https://www.americansecurityproject.org/the-red-wave-how-china-weaponizes-disinformation/
  53. Democracy disconnected: Social media’s caustic influence on Southeast Asia’s fragile republics – Brookings Institution, accessed October 3, 2025, https://www.brookings.edu/articles/democracy-disconnected-social-medias-caustic-influence-on-southeast-asias-fragile-republics/
  54. China’s AI-Powered Disinformation Tactics: Threats and Implications, accessed October 3, 2025, https://nspcbatten.org/chinas-ai-powered-disinformation-tactics-threats-and-implications/
  55. DICT, Google Unite to Fight Fake News; Expand Digital Bayanihan Nationwide, accessed October 3, 2025, https://dict.gov.ph/news-and-updates/19733
  56. How campaigns can protect themselves from deepfakes, disinformation, and social media manipulation – Brookings Institution, accessed October 3, 2025, https://www.brookings.edu/articles/how-campaigns-can-protect-themselves-from-deepfakes-disinformation-and-social-media-manipulation/
  57. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed October 3, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  58. How to Protect Yourself Against Deepfakes – National Cybersecurity Alliance, accessed October 3, 2025, https://www.staysafeonline.org/articles/how-to-protect-yourself-against-deepfakes
  59. 4 ways to future-proof against deepfakes in 2024 and beyond | World Economic Forum, accessed October 3, 2025, https://www.weforum.org/stories/2024/02/4-ways-to-future-proof-against-deepfakes-in-2024-and-beyond/
  60. The Weaponization of Deepfakes: Digital Deception on the Far-Right, accessed October 3, 2025, https://icct.nl/publication/weaponization-deepfakes-digital-deception-far-right
  61. Chinese Support for Communist Insurgencies in Southeast Asia during the Cold War+ – Institute of China Studies, accessed October 3, 2025, https://ics.um.edu.my/img/files/stanislav(1).pdf
  62. Philippine Communist Rebels Grow New Aid Sources as China Steps Away – VOA, accessed October 3, 2025, https://www.voanews.com/a/philippine-communists/4866210.html
  63. Don’t Bring a Knife to a Gunfight with China – The Strategy Bridge, accessed October 3, 2025, https://thestrategybridge.org/the-bridge/2020/6/2/dont-bring-a-knife-to-a-gunfight-with-china

Thinking Through Protracted War with China: Nine Scenarios – RAND, accessed October 3, 2025, https://www.rand.org/pubs/research_reports/RRA1475-1.html

How This Blog Is Being Threatened

For over a decade, the internet held a simple promise for creators: if you make good, helpful, or entertaining stuff, people will find it, and you can earn a living. Bloggers, independent writers, and small publishers invested thousands of hours researching, writing, and sharing their passion and expertise. The deal was straightforward: we provide quality content, search engines help people find us, and the resulting visitor traffic allows us to earn a small amount from advertising or affiliate links.

That deal is now broken. Two massive technological shifts, search engine features and artificial intelligence, are quietly siphoning the lifeblood from independent creators, threatening to turn the vibrant, diverse web into a bland echo chamber.

Think about the last time you Googled a simple question, like “how many ounces in a cup?” or “who was the 16th U.S. President?” The answer likely appeared in a neat box right at the top of the search results. Convenient, right?

For the user, yes. For the creator who wrote the article that Google pulled that answer from, it’s a disaster. This is called a “zero-click search.” You get the information you need without ever having to click on a link and visit a website.

Every time this happens, the creator of that information is cut out of the loop. We don’t get the page view, which means the ads on our site aren’t seen, and we earn nothing for our work. We did the research and wrote the article, only for a tech giant to skim the answer off the top and present it as their own, depriving us of the traffic that keeps our sites running. It’s like a library that reads you a single paragraph from a book, so you never have to check it out and the author never gets credit.

AI: The New Content Machine Built on Our Work

The second, and perhaps bigger, threat is the rise of generative AI like ChatGPT. These programs are incredibly powerful. You can ask them to write an essay, plan a vacation, or summarize a complex topic, and they’ll generate a surprisingly coherent answer in seconds.

But where does this AI get its information? It learns by reading, or “training on,” a massive snapshot of the internet. It reads our blog posts, our news articles, our how-to guides, and our reviews. It digitally digests the sum of human knowledge that people like us have painstakingly put online.

When you ask an AI for information, it doesn’t send you to the original sources. It combines what it has learned from thousands of creators and presents a brand-new piece of text. The original writers, the ones who did the actual work, become invisible. We are not credited, we are not compensated, and we are certainly not sent any traffic. Our content is being used as free raw material to build a product that directly competes with us, and it’s happening on an industrial scale.

Why This Matters to You

You might think this is just a problem for a few bloggers. But the long-term consequences will affect everyone who uses the internet. If independent creators can no longer afford to produce high-quality, niche content, they will simply stop.

The passionate hobbyists who review products with brutal honesty, the independent journalists who uncover local stories, and the experts who write detailed guides will disappear. What will be left? A web dominated by mega-corporations and AI-generated articles that are often bland, repetitive, and sometimes just plain wrong. The internet will lose its human touch, its diverse voices, and its soul.

We are at a critical point where the very architecture of how we find information online is undermining the people who create it.


A Direct Appeal

If you found this article helpful, or if you value the kind of independent content we strive to create, please consider supporting our work. The traditional models of funding online content are failing, and direct support from readers like you is becoming the only way for many of us to survive. Your contribution, no matter the size, is a lifeline that allows us to continue researching and writing.

Please help us keep the lights on and our voice alive by making a contribution through our donations page – click here. Thank you for your support.

The New Battlespace: Gray Zone Conflict in an Era of Great Power Competition

The primary arena for great power competition has shifted from conventional military confrontation to a persistent, multi-domain struggle in the “gray zone” between peace and war. This report provides a comprehensive analysis of the alternative forms of conflict employed by the United States, the Russian Federation, and the People’s Republic of China. It moves beyond theoretical frameworks to assess the practical application and effectiveness of economic warfare, cyber operations, information warfare, proxy conflicts, and legal warfare (“lawfare”). The analysis reveals distinct strategic approaches: the United States acts primarily as a defender of the existing international order, using its systemic advantages for targeted coercion; Russia operates as a strategic disrupter, employing asymmetric tools to generate chaos and undermine Western cohesion; and China functions as a systemic revisionist, patiently executing a long-term strategy to displace U.S. influence and reshape global norms in its favor.

The key finding of this report is that while these gray zone methods have proven effective at achieving discrete objectives and managing escalation, their long-term strategic success is mixed. Critically, they often produce significant unintended consequences that are actively reshaping the global security and economic order. The use of broad economic sanctions and tariffs, for example, has accelerated the formation of an alternative, non-Western economic bloc and spurred efforts to de-dollarize international trade. Similarly, persistent cyber and information attacks, while achieving tactical surprise and disruption, have hardened defenses and eroded the trust necessary for international cooperation. The gray zone is not a temporary state of affairs but the new, permanent battlespace where the future of the international order will be decided. Navigating this environment requires a fundamental shift in strategy from crisis response to one of perpetual, integrated competition across all instruments of national power.

Section I: The Strategic Environment: Redefining Conflict in the 21st Century

From Open War to Pervasive Competition

The 21st-century strategic landscape is defined by a distinct shift away from the paradigm of declared, conventional warfare between major powers. The overwhelming military and technological superiority of the United States and its alliance network has created a powerful disincentive for peer competitors to engage in direct armed conflict.1 Consequently, rivals such as Russia and China have adapted by developing and refining a sophisticated toolkit of alternative conflict methods. These strategies are designed to challenge the U.S.-led international order, erode its influence, and achieve significant strategic gains without crossing the unambiguous threshold of armed aggression that would trigger a conventional military response from the United States and its allies.1 This evolution does not signify an era of peace, but rather a transformation in the character of conflict to a state of persistent, pervasive competition waged across every domain of state power, from the economic and digital to the informational and legal.

Anatomy of the Gray Zone

This new era of competition is primarily conducted within a strategically ambiguous space known as the “gray zone.” The United States Special Operations Command defines this arena as “competitive interactions among and within state and non-state actors that fall between the traditional war and peace duality”.3 The central characteristic of gray zone operations is the deliberate calibration of actions to remain below the threshold of what could be legally and politically defined as a use of force warranting a conventional military response under international law (jus ad bellum).2

Ambiguity and plausible deniability are the currency of the gray zone. Actions are designed to be difficult to attribute and interpret, thereby creating confusion and sowing hesitation within an adversary’s decision-making cycle.4 This calculated ambiguity is particularly effective against democratic nations. The legal and bureaucratic structures of democracies are often optimized for a clear distinction between peace and war, making them slow to recognize and counter threats that defy this binary.3 This can lead to policy paralysis or responses that are either disproportionately escalatory or strategically insignificant, a vulnerability that actors like Russia and China consistently exploit.3 The toolkit for gray zone operations is extensive, including but not limited to information operations, political coercion, economic pressure, cyberattacks, support for proxies, and provocations by state-controlled forces.1 While many of these tactics are as old as statecraft itself, their integrated and synergistic application, amplified by modern information and communication technologies, represents a distinct evolution in the nature of conflict.1

The Hybrid Warfare Playbook

If the gray zone is the strategic arena, “hybrid warfare” is the tactical playbook used to compete within it. While not a formally defined term in international law, it is widely understood to describe the synchronized use of multiple instruments of power—military and non-military, conventional and unconventional, overt and covert—to destabilize an adversary and achieve strategic objectives.2 The objective is to create synergistic effects where the whole of the campaign is greater than the sum of its parts.2

The Russian strategic approach, often associated with Chief of the General Staff Valery Gerasimov, explicitly elevates the role of non-military means, viewing them as often more effective than armed force in achieving political and strategic goals.5 This doctrine was vividly demonstrated in the lead-up to the full-scale invasion of Ukraine, where Russia combined a massive military buildup with a sophisticated disinformation campaign, cyberattacks, economic pressure on European energy markets, and nuclear blackmail to shape the strategic environment.2

It is essential to distinguish between these two concepts: the gray zone describes the operational space where competition occurs, while hybrid warfare describes the methods employed within that space.2 Most hybrid tactics are deliberately applied in the gray zone precisely to exploit its ambiguity and avoid triggering a formal state of armed conflict as defined by international humanitarian law.3 This strategic choice is not an accident but a calculated effort to wage conflict in a manner that neutralizes the primary strengths of a conventionally superior adversary. The gray zone is, therefore, an asymmetric battlespace, deliberately crafted to turn the foundational pillars of the liberal international order—its commitment to the rule of law, open economies, and freedom of information—into exploitable vulnerabilities.

Section II: The Economic Arsenal: Geopolitics by Other Means

The US-China Tariff War: A Case Study in Economic Coercion

The economic competition between the United States and China escalated into open economic conflict in 2018, providing a clear case study in the use, effectiveness, and limitations of tariffs as a tool of modern statecraft.

Goals vs. Reality

The Trump administration initiated the trade war with a set of clearly articulated objectives: to force fundamental changes to what it termed China’s “longstanding unfair trade practices,” to halt the systemic theft of U.S. intellectual property, and to significantly reduce the large bilateral trade deficit.8 Beginning in January 2018 with tariffs on solar panels and washing machines, the conflict rapidly escalated. The U.S. imposed successive rounds of tariffs, eventually covering hundreds of billions of dollars of Chinese goods, citing Section 301 of the Trade Act of 1974 as its legal justification.8 China responded with immediate and symmetrical retaliation, targeting key U.S. exports with high political sensitivity, such as soybeans, pork, and automobiles, directly impacting the agricultural and manufacturing heartlands of the United States.8 This tit-for-tat escalation continued through 2019, culminating in a tense “Phase One” agreement in January 2020 that sought to de-escalate the conflict.8

Effectiveness Assessment: A Blunt Instrument

Despite the scale of the tariffs, the trade war largely failed to achieve its primary stated goals. The purchase commitments made by China in the Phase One deal were never fulfilled, with Beijing ultimately buying none of the additional $200 billion in U.S. exports it had pledged.8 Rigorous economic analysis has demonstrated that the economic burden of the tariffs was borne almost entirely by U.S. firms and consumers, not by Chinese exporters.11 This resulted in higher prices for a wide range of goods and was estimated to have reduced U.S. real income by $1.4 billion per month by the end of 2018.12

Furthermore, the pervasive policy uncertainty generated by the conflict had a chilling effect on global business investment and economic growth.13 Companies, unable to predict the future of the world’s most important trade relationship, delayed capital expenditures, disrupting global supply chains and slowing economic activity far beyond the borders of the two belligerents.13 The trade war thus serves as a powerful example of how broad-based tariffs function as a blunt and costly instrument, inflicting significant self-harm while yielding limited strategic gains.

Unintended Consequences

The most profound and lasting impacts of the trade war were not its intended effects but its unintended consequences. Rather than forcing a rebalancing of the U.S.-China economic relationship, the conflict accelerated a process of strategic decoupling. It compelled multinational corporations to begin the costly and complex process of diversifying their supply chains away from China, a trend that benefited manufacturing hubs in other parts of Asia, particularly Vietnam.15

Perhaps more significantly, the trade war reinforced Beijing’s conviction that it could not rely on an open, rules-based global economic system dominated by the United States. In response, China has intensified its national drive for technological self-sufficiency in critical sectors like semiconductors, a move that could, in the long term, diminish U.S. technological and economic leverage.16 By sidelining the World Trade Organization (WTO) in favor of unilateral action, the United States also weakened the very multilateral institutions it had built, encouraging a global shift toward protectionism and regional trade blocs.14

The Sanctions Regime Against Russia: Testing Economic Containment

The Western response to Russia’s 2022 full-scale invasion of Ukraine represents the most comprehensive and coordinated use of economic sanctions against a major power in modern history. This campaign serves as a critical test of the efficacy of economic containment in the 21st century.

Targeting the War Machine

The sanctions regime implemented by the United States and a broad coalition of allies was designed with a clear purpose: to cripple the Russian Federation’s ability to finance and technologically sustain its war of aggression.19 The measures were unprecedented in their scope and speed, targeting the core pillars of the Russian economy. Key actions included freezing hundreds of billions of dollars of the Russian Central Bank’s foreign reserves, disconnecting major Russian banks from the SWIFT financial messaging system, imposing a near-total ban on the export of high-technology goods like semiconductors, and implementing a novel price cap on Russian seaborne crude oil exports.21 This multi-pronged assault aimed to deny Moscow the revenue, financing, and technology essential for its military-industrial complex.20

The Limits of Efficacy and Russian Adaptation

While the sanctions have inflicted undeniable and significant damage on the Russian economy, they have failed to deliver a knockout blow or compel a change in Moscow’s strategic objectives. Estimates suggest that Russia’s GDP is now 10-12% smaller than it would have been without the invasion and subsequent sanctions.22 However, the Russian economy has proven far more resilient than initially expected.19

Moscow’s adaptation has been threefold. First, it transitioned its economy onto a full war footing, with massive increases in defense spending fueling industrial production and stimulating GDP growth, albeit in an unsustainable manner.19 Second, it proved adept at sanctions evasion. Russia successfully rerouted the majority of its energy exports from Europe to new markets in China and India, often selling at a discount but still generating substantial revenue.21 It also developed a “shadow fleet” of oil tankers operating outside of Western insurance and financial systems to circumvent the G7 price cap.22 Third, and most critically, it leveraged its partnership with China to procure essential dual-use technologies, such as microelectronics and machine tools, that were cut off by Western export controls.20

Strategic Realignment

The most significant long-term consequence of the sanctions regime has been a fundamental and likely irreversible strategic realignment of the Russian economy. Forced out of Western markets and financial systems, Moscow has dramatically deepened its economic, technological, and financial integration with China. Bilateral trade has surged to record levels, and the Chinese yuan has increasingly replaced the U.S. dollar in Russia’s trade and foreign reserves.17 This has accelerated the consolidation of a powerful Eurasian economic bloc positioned as a direct counterweight to the U.S.-led financial and trade system. The sanctions, intended to isolate Russia, have inadvertently catalyzed the creation of a more robust and resilient alternative economic architecture, thereby spurring global de-dollarization efforts and potentially weakening the long-term efficacy of U.S. financial power.19

This dynamic illustrates a central paradox of modern economic warfare: the aggressive use of systemic economic power, while effective at inflicting short-term pain, simultaneously provides a powerful incentive for adversaries to build parallel systems designed to be immune to that very power. Each application of sanctions against Russia or tariffs against China acts as a catalyst for the construction of an alternative global economic order, eroding the foundations of U.S. leverage over time.

China’s Belt and Road Initiative: Influence Through Investment

China’s Belt and Road Initiative (BRI) is a cornerstone of its foreign policy and a primary instrument of its economic statecraft. While often portrayed through a simplistic lens, its strategic function is nuanced and far-reaching.

Beyond the “Debt-Trap” Narrative

In Western strategic discourse, the BRI is frequently characterized as a form of “debt-trap diplomacy”.27 This narrative posits that China intentionally extends unsustainable loans to developing nations for large-scale infrastructure projects. When these nations inevitably default, Beijing allegedly seizes control of the strategic assets—such as ports or railways—thereby expanding its geopolitical and military footprint.27 The case of Sri Lanka’s Hambantota Port is consistently cited as the primary evidence for this strategy.27

A Nuanced Reality

A detailed examination of the Hambantota Port case, however, reveals a more complex reality that undermines the simplistic debt-trap thesis. The proposal for the port originated with the Sri Lankan government, not with Beijing, as part of a long-standing domestic development agenda.27 Furthermore, Sri Lanka’s severe debt crisis in the mid-2010s was not primarily caused by Chinese lending, but by excessive borrowing from Western-dominated international capital markets and unsustainable domestic fiscal policies.27 Chinese loans constituted a relatively small portion of Sri Lanka’s overall foreign debt.27

Crucially, the port was not seized in a debt-for-equity swap. Instead, facing a balance of payments crisis, the Sri Lankan government chose to lease a majority stake in the port’s operations to a Chinese state-owned enterprise for 99 years in exchange for $1.1 billion in hard currency.27 These funds were then used to shore up Sri Lanka’s foreign reserves and service its more pressing debts to Western creditors.27

While the debt-trap narrative is an oversimplification, it does not mean the BRI is benign. It is a powerful instrument of geoeconomic influence. By becoming the primary financier and builder of critical infrastructure across the developing world, China creates long-term economic dependencies, secures access to resources, opens new markets for its companies, and builds political goodwill that can be translated into diplomatic support on the international stage.30 The BRI allows China to systematically expand its global footprint and embed its economic and, increasingly, technological standards across Asia, Africa, and Latin America, thereby challenging the post-Cold War economic order.

Section III: The Digital Frontlines: Cyber and Electronic Warfare

The cyber domain has emerged as a central theater for great power competition, offering a low-cost, high-impact, and plausibly deniable means of projecting power and undermining adversaries. Russia and China have both developed sophisticated cyber capabilities, but they employ them in pursuit of distinct strategic objectives, reflecting their different geopolitical positions and long-term goals.

Russia’s Doctrine of Disruption

Russia’s approach to cyber warfare is fundamentally asymmetric and disruptive, designed to compensate for its relative weakness in the conventional military and economic domains. Its cyber operations prioritize psychological impact and the creation of societal chaos over permanent destruction.

This doctrine has been demonstrated through a series of high-profile operations against the United States. The cyberattacks on the Democratic National Committee (DNC) in 2015-2016 were not merely an act of espionage but an influence operation designed to disrupt the U.S. presidential election and erode public trust in the democratic process.32 The 2020 SolarWinds supply chain attack represented a new level of sophistication, compromising the networks of numerous U.S. government agencies and thousands of private sector companies by inserting malicious code into a trusted software update.34 This operation provided Russia with widespread, persistent access for espionage and potential future disruption. Similarly, the 2021 ransomware attack on Colonial Pipeline, while attributed to a criminal group, highlighted the profound vulnerability of U.S. critical infrastructure to disruptive cyberattacks, causing widespread fuel shortages along the East Coast.34

The strategic objective underpinning these actions is the generation of uncertainty and the degradation of an adversary’s will to act.37 By demonstrating the vulnerability of critical infrastructure and democratic institutions, Russia aims to create a psychological effect that far exceeds the direct technical damage, sowing division and decision-making paralysis within the target nation.37 Joint advisories from the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) repeatedly confirm that Russian state-sponsored actors are persistently targeting U.S. critical infrastructure sectors, including energy, finance, and defense, for both espionage and disruptive purposes.38

China’s Strategy of Espionage and Exploitation

In contrast to Russia’s disruptive tactics, China’s cyber strategy is characterized by its industrial scale, persistence, and systematic focus on long-term intelligence gathering and intellectual property (IP) theft. It is not primarily a tool of chaos but a core component of China’s comprehensive national strategy to supplant the United States as the world’s leading economic and military power.

The People’s Liberation Army (PLA) maintains dedicated units, such as the infamous Unit 61398 (also known as APT1), tasked with conducting large-scale cyber espionage campaigns against foreign targets.42 These operations have successfully exfiltrated vast quantities of sensitive data from the United States. Notable examples include the systematic theft of design data for numerous advanced U.S. weapons systems, including the F-35 Joint Strike Fighter, the F-22 Raptor, and the Patriot missile system.34 This stolen IP directly fuels China’s own military modernization, allowing it to reverse-engineer and replicate advanced technologies, thereby leapfrogging decades of costly research and development and rapidly eroding America’s qualitative military edge.34

Beyond military secrets, China’s cyber espionage targets a wide array of sectors to advance its economic goals. This includes the theft of trade secrets from leading U.S. companies in industries ranging from energy to pharmaceuticals.34 The massive 2015 breach of the U.S. Office of Personnel Management (OPM), which compromised the sensitive personal data of over 21 million current and former federal employees, provided Beijing with an invaluable database for identifying, targeting, and recruiting intelligence assets for decades to come.34 Recent intelligence reports indicate a dramatic surge in Chinese cyber espionage operations, with a 150% increase in 2024 alone, highlighting the unabated intensity of this campaign.44

Effectiveness and Asymmetry

Both Russia and China have successfully weaponized the cyber domain as a highly effective asymmetric tool. It allows them to contest U.S. power and impose significant costs while operating below the threshold of armed conflict and maintaining a degree of plausible deniability.45 The difficulty of definitive, public attribution for cyberattacks creates a permissive environment for aggression, allowing state sponsors to operate with relative impunity.45

This reality reveals a critical divergence in strategic timelines. Russia’s cyber doctrine is optimized for the short term, employing disruptive attacks to achieve immediate political and psychological effects that can shape a specific crisis or event. China, in contrast, is waging a long-term, strategic campaign of attrition. Its patient, industrial-scale espionage is designed to fundamentally alter the global balance of technological, economic, and military power over the course of decades. The United States, therefore, faces a dual cyber threat: Russia’s acute, shock-and-awe style disruptions and China’s chronic, corrosive campaign of exploitation. Effectively countering these divergent threats requires distinct strategies, mindsets, and capabilities.

Section IV: The War for Minds: Information and Influence Operations

In the gray zone, the cognitive domain is a primary battlefield. The strategic manipulation of information to shape perceptions, control narratives, and undermine societal cohesion has become a central pillar of modern conflict. Russia and China, while often collaborating in this space, pursue fundamentally different long-term objectives with their information and influence operations.

Russia’s “Active Measures 2.0”

Russia’s contemporary information warfare is a direct evolution of the Soviet Union’s “active measures,” updated for the digital age.37 The core strategy is not to persuade foreign audiences of the superiority of the Russian model, but to degrade and disrupt the political systems of its adversaries from within.37

The 2016 U.S. presidential election serves as the canonical example of this doctrine in practice. The operation, directed by President Vladimir Putin, was multifaceted, combining the cyber theft of sensitive information with a sophisticated social media campaign.33 The GRU, Russia’s military intelligence agency, hacked the computer networks of the DNC and Clinton campaign officials, subsequently leaking the stolen emails through fronts like Guccifer 2.0 and platforms like WikiLeaks to generate damaging news cycles.33

Simultaneously, the St. Petersburg-based Internet Research Agency (IRA), a state-sponsored “troll farm,” created thousands of fake social media accounts to impersonate American citizens and political groups.33 The IRA’s primary tactic was not to spread pro-Russian propaganda, but to identify and inflame existing societal fault lines in the United States, particularly those related to race, gun control, immigration, and religion.50 By creating and amplifying hyper-partisan content on both the far-left (e.g., supporting Black Lives Matter) and the far-right (e.g., supporting secessionist movements), the IRA’s goal was to deepen polarization, foster distrust in institutions, suppress voter turnout among targeted demographics, and ultimately undermine faith in the American democratic process itself.50 This approach is highly effective because it acts as a social parasite, feeding on and magnifying organic divisions within an open society, making it difficult for citizens and policymakers to distinguish foreign manipulation from authentic domestic discourse.37

China’s Quest for “Discourse Power”

China’s information strategy is more systematic, ambitious, and long-term than Russia’s. It is explicitly guided by the doctrine of the “Three Warfares”: public opinion warfare (shaping public perception), psychological warfare (influencing the cognition and decision-making of adversaries), and legal warfare (using law to seize the “legal high ground”).54 The ultimate goal of this integrated strategy is to achieve what the Chinese Communist Party (CCP) calls “discourse power” (话语权).56

Discourse power is the ability to shape global norms, values, and narratives to create consensus around a new, China-led international order.56 This involves a multi-pronged effort to legitimize China’s authoritarian governance model and present it as a superior alternative to what it portrays as the chaotic and declining system of Western liberal democracy.56 The CCP pursues this goal through several mechanisms:

  • Massive Investment in State Media: Beijing has poured billions of dollars into expanding the global reach of its state-controlled media outlets, such as CGTN and Xinhua, to broadcast the CCP’s narratives directly to international audiences.54
  • United Front Work: The CCP’s United Front Work Department orchestrates a vast, global effort to co-opt and influence foreign elites, including politicians, academics, business leaders, and media figures, to advocate for China’s interests and silence criticism.54
  • Digital Dominance: China seeks to shape the global digital ecosystem by exporting its model of “cyber sovereignty,” which prioritizes state control over the free flow of information, and by promoting its own technical standards for next-generation technologies like 5G and AI.56

While Russia’s information operations are often opportunistic and focused on tactical disruption, China’s are patient, strategic, and aimed at a fundamental, long-term revision of the global information order.58 Russia seeks to burn down the existing house; China seeks to build a new one in its place, with itself as the architect.

The U.S. Response: Public Diplomacy

The primary instrument for the United States in the information domain is public diplomacy, executed largely through the U.S. Agency for Global Media (USAGM). The USAGM oversees a network of broadcasters, including Voice of America (VOA), Radio Free Europe/Radio Liberty (RFE/RL), and Radio Free Asia (RFA).60 The stated mission of these entities is to provide accurate, objective, and comprehensive news and information to audiences in countries where a free press is restricted, thereby serving as a counterweight to state propaganda and supporting the principles of freedom and democracy.60 However, the USAGM has historically faced challenges, including internal political disputes and questions regarding its strategic effectiveness in a modern, saturated, and highly fragmented digital media landscape.61

This reveals a fundamental divergence in strategic approaches. Russian information warfare is a strategy of cognitive disruption, designed to confuse, divide, and ultimately paralyze an opponent by turning its own open information environment against it. Chinese information warfare is a strategy of cognitive displacement, a long-term project aimed at methodically replacing the norms, values, and narratives of the liberal international order with its own. Countering the former requires tactical resilience and societal inoculation against division, while countering the latter requires a sustained, global competition of ideas and a compelling reaffirmation of the value of the democratic model.

Section V: Conflict by Other Means: Proxies and Lawfare

Beyond the economic and digital realms, great powers continue to engage in conflict through indirect means, leveraging third-party actors and legal frameworks to advance their interests while avoiding direct confrontation. Proxy warfare and lawfare are two prominent tools in the gray zone playbook, used to alter the strategic landscape and impose costs on adversaries without resorting to open hostilities.

The Modern Proxy War

Proxy warfare, a hallmark of the Cold War, has been adapted to the contemporary environment. States support and direct non-state or third-party state actors to wage conflict, allowing the sponsoring power to achieve strategic objectives with limited direct risk and cost.

Syria as a Microcosm

The Syrian Civil War serves as a stark example of modern, multi-layered proxy conflict. The Russian Federation intervened militarily in 2015 with the explicit goal of preserving the regime of its client, Bashar al-Assad, which was on the verge of collapse.63 This intervention was a direct pushback against U.S. and Western influence, as it placed Russian forces and their proxies, including the Wagner Group, in direct opposition to various Syrian opposition groups that were receiving support from the United States and its regional partners.63 This created a complex and dangerous battlespace where the proxies of two nuclear powers were engaged in active combat. Throughout this period, the People’s Republic of China played a crucial supporting role for Russia, using its position on the UN Security Council to provide diplomatic cover. Beijing repeatedly joined Moscow in vetoing resolutions that would have condemned or sanctioned the Assad regime, demonstrating a coordinated Sino-Russian effort to thwart Western policy objectives in the Middle East.65

Ukraine and the “Proxy Supporter” Model

The war in Ukraine represents a different but equally significant model of proxy conflict. The United States and its NATO allies are engaged in a classic proxy war, providing massive military, financial, and intelligence support to Ukraine to enable its defense against direct Russian aggression.25 A critical evolution in this conflict is the role played by China as a “proxy supporter” for Russia. While Beijing has refrained from providing large quantities of direct lethal aid, its comprehensive economic and technological support has been indispensable to sustaining Russia’s war effort.25 China has become the primary destination for sanctioned Russian energy, the main supplier of critical dual-use components like microelectronics for Russia’s military-industrial complex, and a key diplomatic partner in shielding Moscow from international condemnation.17 This support, while falling short of a formal military alliance, effectively makes China a co-belligerent in a gray-zone context. The dynamic is further complicated by North Korea’s role as a direct arms supplier to Russia, providing vast quantities of artillery shells and even troops, illustrating a multi-layered proxy network designed to sustain Russia’s war and bleed Western resources.25

China’s Lawfare in the South China Sea

“Lawfare” is the strategic use of legal processes and instruments to achieve operational or geopolitical objectives.69 China has masterfully employed lawfare in the South China Sea as a primary tool to assert its expansive territorial claims and challenge the existing international maritime order.

Challenging the International Order

China’s strategy is centered on enforcing its “nine-dash line” claim, which encompasses nearly the entire South China Sea. This claim was authoritatively invalidated in 2016 by an arbitral tribunal under the United Nations Convention on the Law of the Sea (UNCLOS), a ruling that Beijing has rejected and ignored.69 China’s lawfare is a systematic effort to create a new legal reality that conforms to its territorial ambitions.

Tactics of Creeping Jurisdiction

Beijing’s lawfare tactics are methodical and multi-faceted, designed to create a state of perpetual contestation and gradually normalize its control:

  1. Domestic Legislation as International Law: China passes domestic laws that treat the international waters of the South China Sea as its own sovereign territory. For example, its 2021 Coast Guard Law authorizes its forces to use “all necessary means,” including lethal force, against foreign vessels in waters it claims, in direct contravention of UNCLOS.70
  2. Creating “Facts on the Water”: China has engaged in a massive campaign of land reclamation, building and militarizing artificial islands on submerged reefs and shoals. These outposts serve as forward operating bases for its military, coast guard, and maritime militia, allowing it to project power and physically enforce its claims.69
  3. Reinterpreting Legal Norms: China actively seeks to redefine long-standing principles of international law. It argues that the right to “freedom of navigation” applies only to commercial vessels and does not permit foreign military activities within its claimed Exclusive Economic Zone (EEZ), a position contrary to the consensus interpretation of UNCLOS.70

This strategy of lawfare is not merely a legal or diplomatic maneuver; it is a foundational element of China’s gray zone strategy. By passing domestic laws that criminalize the lawful activities of other nations in international waters, China is attempting to create the legal and political pretext for future military action. This approach aims to reframe a potential act of aggression—such as firing on a Philippine or Vietnamese vessel—not as a violation of international law, but as a legitimate domestic law enforcement action within what it defines as its own jurisdiction. This calculated ambiguity is designed to paralyze the decision-making of adversaries and their allies, most notably the United States, thereby achieving a key objective of gray zone conflict.

Section VI: Strategic Assessment and Outlook

The preceding analysis demonstrates that the contemporary security environment is characterized by persistent, multi-domain competition in the gray zone. The United States, Russia, and China have each developed distinct doctrines and toolkits to navigate this new battlespace, with varying degrees of success and significant long-term consequences for the international order.

Comparative Analysis of National Strategies

The strategic approaches of the three major powers can be synthesized into a comparative framework that highlights their overarching goals and preferred methods across the key domains of conflict. The United States generally acts to preserve the existing international system from which it derives significant benefit, using its power for targeted enforcement and coercion. Russia, as a declining power with significant conventional limitations, acts as a disrupter, seeking to create chaos and exploit divisions to weaken its adversaries. China, as a rising and patient power, acts as a systemic revisionist, seeking to methodically build an alternative order and displace U.S. leadership over the long term.

Conflict DomainUnited States ApproachRussian ApproachChinese Approach
EconomicSystemic dominance (dollar, SWIFT), targeted sanctions, alliance-based trade pressure.Asymmetric coercion (energy), sanctions evasion, strategic pivot to China, weaponization of food/commodities.Systemic competition (BRI), supply chain dominance, technological self-sufficiency, targeted economic coercion.
CyberIntelligence gathering, offensive/defensive operations, alliance-based threat sharing.Disruption of critical infrastructure, sowing chaos, psychological impact, election interference.Industrial-scale espionage for economic/military gain, IP theft, strategic pre-positioning in critical networks (Volt Typhoon).
InformationPublic diplomacy (USAGM), countering disinformation, promoting democratic values.“Active Measures 2.0”: Exploiting and amplifying existing societal divisions, tactical disinformation.“Discourse Power”: Long-term narrative shaping, censorship, promoting authoritarian model, co-opting elites.
ProxySupport for state/non-state partners (e.g., Ukraine, Syrian opposition) to uphold international order.Direct intervention with proxies (Wagner) and state forces to prop up clients and challenge U.S. influence.Economic/military support to partners (e.g., Russia), avoiding direct military entanglement, using proxies for resource access.
LegalUpholding international law (e.g., FONOPs), use of legal frameworks for sanctions.Manipulation of legal norms, undermining international bodies, using legal pretexts for aggression.“Lawfare”: Using domestic law to rewrite international law, creating new “facts on the ground” to legitimize claims.

What Works, What Doesn’t, and Why

A critical assessment of these strategies reveals clear patterns of effectiveness and failure.

What Works:

  • Asymmetric and Low-Cost Tools: For Russia and China, gray zone tools like cyber operations, information warfare, and the use of proxies have proven highly effective. They impose significant strategic, economic, and political costs on the United States and its allies at a relatively low cost and risk to the aggressor.73 These methods are particularly potent because they are designed to exploit the inherent openness and legal constraints of democratic societies.
  • Incrementalism and Patience: China’s strategy of “creeping” aggression, particularly its lawfare and island-building campaign in the South China Sea, has been effective at changing the physical and strategic reality on the ground. By avoiding any single, dramatic action that would demand a forceful response, Beijing has incrementally advanced its position over years, achieving a significant strategic gain through a thousand small cuts.74
  • Targeted, Multilateral Coercion: For the United States, economic and diplomatic actions are most effective when they are targeted, multilateral, and leverage the collective weight of its alliance network. The initial shock of the coordinated financial sanctions against Russia demonstrated the immense power of this collective approach, even if its long-term coercive power has been blunted by Russian adaptation.19

What Doesn’t Work:

  • Broad, Unilateral Economic Pressure: The U.S.-China trade war demonstrated that broad, unilateral tariffs are a blunt instrument that often inflicts more economic pain on the imposing country than on the target, while failing to achieve its core strategic objectives and producing negative unintended consequences for the global trading system.12
  • A Purely Defensive Posture: A reactive and defensive strategy is insufficient to deter persistent gray zone aggression. Russia’s continued campaign of sabotage and subversion in Europe, despite heightened defensive measures, indicates that without the credible threat of proactive and costly consequences, adversaries will continue to operate in the gray zone with relative impunity.47
  • Building Compelling Alternative Narratives: While Russia is effective at disruptive information warfare and China is effective at censorship and control, both have largely failed to build a compelling, positive narrative that resonates with audiences in democratic nations. Their influence operations are most successful when they are parasitic on existing grievances rather than when they attempt to promote their own models.59

Recommendations for the United States

To compete more effectively in this new battlespace, the United States must adapt its strategic posture. The following recommendations are derived from the analysis in this report:

  1. Embrace Pervasive Competition: The U.S. national security apparatus must shift from a traditional crisis-response model to a posture of continuous, proactive competition across all domains. This requires institutional and cultural changes that recognize the gray zone as the primary arena of conflict.
  2. Strengthen Societal Resilience: The most effective defense against information warfare and foreign influence is a resilient society. This requires a national effort to enhance media literacy, secure critical election infrastructure, and address the deep-seated domestic social and political divisions that adversaries so effectively exploit.
  3. Integrate All Instruments of National Power: Gray zone threats are inherently multi-domain; the response must be as well. The U.S. must break down bureaucratic silos and develop a national strategy that seamlessly integrates economic, financial, intelligence, diplomatic, legal, and military tools to impose coordinated costs on adversaries.
  4. Leverage Alliances Asymmetrically: The U.S. alliance network remains its greatest asymmetric advantage. This network must be leveraged not just for conventional military deterrence, but for gray zone competition. This includes building coalitions for coordinated cyber defense, developing joint strategies for economic security and supply chain resilience, and crafting unified diplomatic and informational campaigns to counter authoritarian narratives.

Future Trajectory of Conflict

The trends identified in this report are likely to accelerate and intensify. The proliferation of advanced technologies, particularly artificial intelligence, will supercharge gray zone conflict. AI will enable the creation of hyper-personalized disinformation campaigns, deepfakes, and autonomous cyber weapons at a scale and speed that will overwhelm current defenses.58 The ongoing fragmentation of the global economic and technological landscape will create more clearly defined blocs, turning the economic domain into an even more central and contentious battlefield. The gray zone is not a passing phase of international relations. It is the new, enduring reality of great power competition, a permanent battlespace where ambiguity is the weapon, attribution is the prize, and the contest for influence is constant.



If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Works cited

  1. Gray Zone Project | CSIS, accessed August 22, 2025, https://www.csis.org/programs/gray-zone-project
  2. Metaphors, Rules and War: Making Sense of Hybrid Threats and Grey Zone Conflict, accessed August 22, 2025, https://www.ejiltalk.org/metaphors-rules-and-war-making-sense-of-hybrid-threats-and-grey-zone-conflict/
  3. Grey-zone (international relations) – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  4. ‘Hybrid threats’, ‘grey zones’, ‘competition’, and ‘proxies’: When is it …, accessed August 22, 2025, https://blogs.icrc.org/law-and-policy/2025/01/16/hybrid-threats-grey-zones-competition-and-proxies-when-is-it-actually-war/
  5. Hybrid Warfare: Aggression and Coercion in the Gray Zone | ASIL, accessed August 22, 2025, https://www.asil.org/insights/volume/21/issue/14/hybrid-warfare-aggression-and-coercion-gray-zone
  6. “Hybrid Warfare: How to Escape the Conceptual Gray-Zone” by …, accessed August 22, 2025, https://digitalcommons.usf.edu/jss/vol17/iss1/1/
  7. Russia’s hybrid war against the West – NATO Review, accessed August 22, 2025, https://www.nato.int/docu/review/articles/2024/04/26/russias-hybrid-war-against-the-west/index.html
  8. China–United States trade war – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/China%E2%80%93United_States_trade_war
  9. A Timeline of the U.S.-China Trade War During Trump’s Second Term – Time Magazine, accessed August 22, 2025, https://time.com/7292207/us-china-trade-war-trump-tariffs-timeline/
  10. US-China Trade War | PIIE, accessed August 22, 2025, https://www.piie.com/research/trade-investment/us-china-trade-war
  11. Trade Wars: History, Pros & Cons, and U.S.-China Example – Investopedia, accessed August 22, 2025, https://www.investopedia.com/terms/t/trade-war.asp
  12. The Impact of the 2018 Trade War on U.S. Prices and Welfare – National Bureau of Economic Research, accessed August 22, 2025, https://www.nber.org/system/files/working_papers/w25672/w25672.pdf
  13. Five Economists Explain: Impacts of the U.S.-China Trade War – NCUSCR, accessed August 22, 2025, https://www.ncuscr.org/podcast/economists-explain-trade-war/
  14. The global costs of the US-China tariff war are mounting. And the worst may be yet to come – Down To Earth, accessed August 22, 2025, https://www.downtoearth.org.in/economy/the-global-costs-of-the-us-china-tariff-war-are-mounting-and-the-worst-may-be-yet-to-come
  15. Four years into the trade war, are the US and China decoupling? | PIIE, accessed August 22, 2025, https://www.piie.com/blogs/realtime-economics/2022/four-years-trade-war-are-us-and-china-decoupling
  16. The New U.S.-China Trade War: Strategic Motives, Domestic Consequences, and Global Ramifications | Beyond the Horizon ISSG, accessed August 22, 2025, https://behorizon.org/the-new-u-s-china-trade-war-strategic-motives-domestic-consequences-and-global-ramifications/
  17. A Protracted U.S.-China Trade War Would Be a Gift to Moscow, accessed August 22, 2025, https://carnegieendowment.org/russia-eurasia/politika/2025/05/russia-china-trade-wars-opportunities?lang=en
  18. Trade War – CEPR, accessed August 22, 2025, https://cepr.org/system/files/publication-files/60137-trade_war_the_clash_of_economic_systems_threatening_global_prosperity.pdf
  19. The Economic Impact of Russia Sanctions – Congress.gov, accessed August 22, 2025, https://www.congress.gov/crs-product/IF12092
  20. How Sanctions Have Reshaped Russia’s Future – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/how-sanctions-have-reshaped-russias-future
  21. Three Years of War in Ukraine: Are Sanctions Against Russia Making a Difference?, accessed August 22, 2025, https://www.cfr.org/in-brief/three-years-war-ukraine-are-sanctions-against-russia-making-difference
  22. Sanctions effectiveness: what lessons three years into the war on Ukraine?, accessed August 22, 2025, https://www.economicsobservatory.com/sanctions-effectiveness-what-lessons-three-years-into-the-war-on-ukraine
  23. US sanctions against Russia – Brookings Institution, accessed August 22, 2025, https://www.brookings.edu/collection/us-sanctions-against-russia/
  24. Sanctions and Russia’s War: Limiting Putin’s Capabilities | U.S. Department of the Treasury, accessed August 22, 2025, https://home.treasury.gov/news/featured-stories/sanctions-and-russias-war-limiting-putins-capabilities
  25. Ukraine Is Now a Proxy War for Asian Powers – RAND, accessed August 22, 2025, https://www.rand.org/pubs/commentary/2024/11/ukraine-is-now-a-proxy-war-for-asian-powers.html
  26. How the Latest Sanctions Will Impact Russia—and the World …, accessed August 22, 2025, https://carnegieendowment.org/russia-eurasia/politika/2024/06/finance-sanctions-russia-currency?lang=en
  27. Debunking the Myth of ‘Debt-trap Diplomacy’ | 4. Sri Lanka and the BRI, accessed August 22, 2025, https://www.chathamhouse.org/2020/08/debunking-myth-debt-trap-diplomacy/4-sri-lanka-and-bri
  28. China’s Debt-Trap Diplomacy in Central Asia – CACI Analyst, accessed August 22, 2025, https://www.cacianalyst.org/publications/analytical-articles/item/13823-chinas-debt-trap-diplomacy-in-central-asia.html
  29. Full article: Chinese debt trap diplomacy: reality or myth? – Taylor & Francis Online, accessed August 22, 2025, https://www.tandfonline.com/doi/full/10.1080/19480881.2023.2195280
  30. Debt Distress on the Road to “Belt and Road” – Wilson Center, accessed August 22, 2025, https://www.wilsoncenter.org/blog-post/debt-distress-road-belt-and-road
  31. Belt and Road Initiative – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Belt_and_Road_Initiative
  32. Democratic National Committee cyber attacks – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks
  33. Russian interference in the 2016 United States elections – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Russian_interference_in_the_2016_United_States_elections
  34. Cyber Clash with China (NSC) | CFR Education – Council on Foreign Relations, accessed August 22, 2025, https://education.cfr.org/learn/simulation/cyber-clash-china-nsc/background
  35. CrowdStrike Chaos Highlights Key Cyber Vulnerabilities with Software Updates | U.S. GAO, accessed August 22, 2025, https://www.gao.gov/blog/crowdstrike-chaos-highlights-key-cyber-vulnerabilities-software-updates
  36. Russian Cyber Threats to U.S. Critical Infrastructure – SecuLore, accessed August 22, 2025, https://seculore.com/resources/russian-cyber-threats-to-u-s-critical-infrastructure/
  37. Russian Cyber Information Warfare – Marine Corps University, accessed August 22, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-12-no-1/Russian-Cyber-Information-Warfare/
  38. Russia Threat Overview and Advisories | CISA, accessed August 22, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/russia
  39. Russia State-Sponsored Cyber Threat: Advisories – CISA, accessed August 22, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/russia/publications
  40. Russian Military Cyber Actors Target US and Global Critical Infrastructure – CISA, accessed August 22, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
  41. Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure – Department of Defense, accessed August 22, 2025, https://media.defense.gov/2024/Sep/05/2003537870/-1/-1/0/CSA-Russian-Military-Cyber-Target-US-Global-CI.PDF
  42. Cyberwarfare and China – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Cyberwarfare_and_China
  43. A Discussion on the Defense Department’s 2024 China Military Power Report – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/discussion-defense-departments-2024-china-military-power-report
  44. Significant Cyber Incidents | Strategic Technologies Program | CSIS, accessed August 22, 2025, https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
  45. Cyberwarfare and the United States – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Cyberwarfare_and_the_United_States
  46. CYBER THREATS FROM CHINA, RUSSIA, AND IRAN: PROTECTING AMERICAN CRITICAL INFRASTRUCTURE | Congress.gov, accessed August 22, 2025, https://www.congress.gov/event/113th-congress/house-event/LC801/text
  47. Russia’s Shadow War Against the West – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/russias-shadow-war-against-west
  48. Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident – DNI.gov, accessed August 22, 2025, https://www.dni.gov/files/documents/ICA_2017_01.pdf
  49. Report on the Investigation into Russian Interference in the 2016 Presidential Election – Department of Justice, accessed August 22, 2025, https://www.justice.gov/archives/sco/file/1373816/dl?inline=
  50. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed August 22, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  51. The IRA and Political Polarization in the United States – DemTech, accessed August 22, 2025, https://demtech.oii.ox.ac.uk/research/posts/the-ira-and-political-polarization-in-the-united-states/
  52. New Evidence Shows How Russia’s Election Interference Has Gotten More Brazen, accessed August 22, 2025, https://www.brennancenter.org/our-work/analysis-opinion/new-evidence-shows-how-russias-election-interference-has-gotten-more
  53. What’s Old Is New Again: Cold War Lessons for Countering Disinformation, accessed August 22, 2025, https://tnsr.org/2022/09/whats-old-is-new-again-cold-war-lessons-for-countering-disinformation/
  54. To Win without Fighting – Marine Corps University, accessed August 22, 2025, https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/To-Win-without-Fighting/
  55. Political Warfare against Intervention Forces – Air University, accessed August 22, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  56. CHINESE DISCOURSE POWER: AMBITIONS AND REALITY IN THE DIGITAL DOMAIN – Atlantic Council, accessed August 22, 2025, https://www.atlanticcouncil.org/wp-content/uploads/2022/11/Chinese-Discourse-Power-Ambitions-and-Reality-in-the-Digital-Domain.pdf
  57. Asked and Answered: China’s Strategy of Political Warfare – CSIS, accessed August 22, 2025, https://www.csis.org/analysis/asked-and-answered-chinas-strategy-political-warfare
  58. Chinese information operations and information warfare – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  59. Sino-Russian Convergence in Foreign Information Manipulation and Interference: A Global Threat to the US and Its Allies – CEPA, accessed August 22, 2025, https://cepa.org/comprehensive-reports/sino-russian-convergence-in-foreign-information-manipulation-and-interference/
  60. United States Agency for Global Media – U.S. Government Manual, accessed August 22, 2025, https://www.usgovernmentmanual.gov/Agency?EntityId=oPpn5fYQYfM=&ParentEId=+klubNxgV0o=&EType=jY3M4CTKVHY=
  61. United States Agency for Global Media – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/United_States_Agency_for_Global_Media
  62. U.S. Agency for Global Media: Background, Governance, and Issues for Congress, accessed August 22, 2025, https://www.congress.gov/crs-product/R46968
  63. Russian intervention in the Syrian civil war – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Russian_intervention_in_the_Syrian_civil_war
  64. Russia’s Strategic Success in Syria and the Future of Moscow’s Middle East Policy, accessed August 22, 2025, https://www.washingtoninstitute.org/policy-analysis/russias-strategic-success-syria-and-future-moscows-middle-east-policy
  65. China’s Role in the Middle East, accessed August 22, 2025, https://www.mei.edu/events/chinas-role-middle-east
  66. China’s Evolving Stance on Syria – Middle East Institute, accessed August 22, 2025, https://www.mei.edu/publications/chinas-evolving-stance-syria
  67. The potential and limitations of Russia-China cooperation in the Middle East, accessed August 22, 2025, https://www.mei.edu/publications/potential-and-limitations-russia-china-cooperation-middle-east
  68. US ambassador: China believes it is waging a proxy war through Russia – Atlantic Council, accessed August 22, 2025, https://www.atlanticcouncil.org/blogs/ukrainealert/us-ambassador-china-believes-it-is-waging-a-proxy-war-through-russia/
  69. What Has China’s Lawfare Achieved in the South China Sea? – ISEAS-Yusof Ishak Institute, accessed August 22, 2025, https://www.iseas.edu.sg/wp-content/uploads/2023/06/ISEAS_Perspective_2023_51.pdf
  70. Lawfare: China’s new gambit for global power – Universidad de Navarra, accessed August 22, 2025, https://www.unav.edu/web/global-affairs/lawfare-china-s-new-gambit-for-global-power
  71. 2023/51 “What Has China’s Lawfare Achieved in the South China Sea?” by Christian Schultheiss – ISEAS-Yusof Ishak Institute, accessed August 22, 2025, https://www.iseas.edu.sg/articles-commentaries/iseas-perspective/2023-51-what-has-chinas-lawfare-achieved-in-the-south-china-sea-by-christian-schultheiss/
  72. Chinese Lawfare in the South China Sea | Journal of Political Risk, accessed August 22, 2025, https://www.jpolrisk.com/chinese-lawfare-in-the-south-china-sea-a-threat-to-global-interdependence-and-regional-stability/
  73. Hybrid warfare – Wikipedia, accessed August 22, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  74. The Changing Face of Conflict: What is Hybrid Warfare? – Global Security Review, accessed August 22, 2025, https://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/
  75. Russia is Winning the Global Information War | Royal United Services Institute – RUSI, accessed August 22, 2025, https://www.rusi.org/explore-our-research/publications/commentary/russia-winning-global-information-war
  76. how the US, China, and Russia are using artificial intelligence in their information warfare and influence operations – ResearchGate, accessed August 22, 2025, https://www.researchgate.net/publication/378764079_Artificial_intelligence_and_information_warfare_in_major_power_states_how_the_US_China_and_Russia_are_using_artificial_intelligence_in_their_information_warfare_and_influence_operations

An Analysis of the Evolution of Chinese Special Operations Forces

The modern Special Operations Forces (SOF) of the People’s Liberation Army (PLA) are not a recent invention but the culmination of a long and evolutionary process rooted in the PLA’s foundational identity. The force’s origins as a guerrilla army instilled a deep-seated appreciation for the principles of infiltration, small-unit autonomy, and asymmetric tactics, which serve as the conceptual bedrock for contemporary special operations.1 However, the formal establishment of dedicated SOF was not a product of proactive innovation. Instead, it was a reactive development, forged in the crucible of battlefield setbacks and catalyzed by the observation of foreign military revolutions. The journey from elite infantry scouts to specialized operators was driven by the PLA’s gradual and often painful recognition of the changing character of warfare.

The Role of Elite Reconnaissance Units (Zhenchabing) in Early PLA Doctrine

The direct lineage of PLA SOF can be traced to its elite reconnaissance units, known as zhenchabing (侦察兵).3 From the PLA’s inception through its major conflicts—the Chinese Civil War, the Korean War, and border clashes—these units were composed of the most capable soldiers in the conventional force. They were selected for their superior physical fitness, mental resilience, and tactical acumen, and were tasked with the most hazardous missions.5

Doctrinally, the primary function of the zhenchabing was to serve as the “eyes and ears” of their parent formation’s commander.6 Their core tasks involved penetrating enemy lines to gather intelligence on troop dispositions, unit identification, logistical nodes, and defensive fortifications. This intelligence was critical for commanders to formulate operational plans. However, their role frequently extended beyond passive surveillance. These units were often tasked with direct action missions, including raids on enemy command posts, sabotage of key infrastructure, and the capture of high-value personnel.4 This dual-mission profile of reconnaissance and direct action led to them being widely regarded within the PLA as “the special forces of conventional units”.6

The operational methodology of the zhenchabing—deep penetration, long-duration missions with minimal support, and a reliance on individual fieldcraft and small-unit cohesion—established a cultural and practical foundation that would later be inherited by the first generation of formal SOF. The ethos of the reconnaissance soldier, emphasizing toughness, self-reliance, and the ability to operate in ambiguous and hostile environments, became the defining characteristic of the PLA’s nascent special operations capability.

Lessons from Conflict: The Sino-Vietnamese War as a Catalyst for Change

The 1979 Sino-Vietnamese War served as a profound strategic shock for the PLA and a critical catalyst for military modernization.8 The PLA, still largely configured for the “People’s War” doctrine of massed infantry assaults, suffered significant casualties against the battle-hardened and tactically adept People’s Army of Vietnam (PAVN).10 The conflict starkly revealed the deficiencies in the PLA’s command and control, logistics, combined arms coordination, and individual soldier equipment.

During this conflict, PLA reconnaissance units were deployed extensively, conducting deep-penetration missions behind Vietnamese lines to disrupt supply lines and gather intelligence.12 These operations highlighted the value of such specialized troops but also exposed the inadequacy of their equipment. In response to operational needs, reconnaissance units were among the first to receive specialized gear, including rudimentary camouflage uniforms. Ironically, due to China’s prior military aid to Vietnam, these uniforms were sometimes produced from the same fabric as those worn by PAVN reconnaissance troops, leading to dangerous instances of battlefield confusion.13

The war also served as a harsh testing ground for PLA small arms. The standard-issue Type 63 assault rifle, an ambitious but flawed attempt to combine the features of the SKS carbine and the AK-47, proved to be a failure in the field. Issues with quality control during mass production led to poor accuracy and reliability, forcing the PLA to withdraw it from service.14 This necessitated the rapid development of a “stopgap” weapon, the Type 81 assault rifle. The Type 81, a more robust and refined design, saw its first combat use in the latter stages of the border conflicts and proved to be a far more effective weapon.17 Specialized units also employed the Type 79 submachine gun for its compact size, though it too suffered from reliability issues in the harsh jungle environment.12

The cumulative lessons from Vietnam were clear: the PLA’s reliance on mass was no longer a substitute for quality, training, and technology. The conflict underscored the urgent need for smaller, more professional, and better-equipped units capable of executing complex missions with precision. This experience directly informed the PLA’s growing interest in Western special operations concepts throughout the 1980s and laid the groundwork for the formal establishment of its own SOF.4

The Doctrinal Shift: From “People’s War” to “Local Wars”

The operational lessons of the 1970s and 1980s, combined with a changing geopolitical landscape, prompted a fundamental re-evaluation of the PLA’s grand strategy. Under the leadership of Deng Xiaoping, the Central Military Commission (CMC) officially shifted the PLA’s guiding military doctrine in the mid-1980s. The focus moved away from preparing for an all-out, attritional “People’s War” against a potential Soviet invasion and toward the concept of fighting and winning “limited, local wars under modern conditions” (在高技术条件下打一场局部战争).19

This new doctrine acknowledged that future conflicts were unlikely to be total wars fought for national survival on Chinese soil. Instead, they were envisioned as short, intense, high-technology conflicts fought on China’s periphery to secure national interests.19 PLA planners recognized that the large, infantry-heavy formations of the past were ill-suited for this new paradigm, which demanded speed, precision, and rapid reaction capabilities.19 This doctrinal transformation was the single most important prerequisite for the birth of modern PLA SOF, as it created the strategic requirement and institutional justification for a new type of force—one that could provide the rapid, precise, and asymmetric capabilities needed to prevail in future “local wars.”

II. The Birth of Modern SOF: Establishment and Expansion (1988-2015)

The doctrinal shift of the mid-1980s created the strategic imperative for special operations forces, but the actual formation of these units was a deliberate, and later accelerated, process. It began with a single experimental unit, which served as a laboratory for developing tactics and training. The process was dramatically expedited by the 1991 Gulf War, which provided a shocking demonstration of the effectiveness of modern, high-technology warfare and the pivotal role of SOF within it. This period saw the rapid expansion of SOF from a niche army concept to a multi-service capability, with distinct units being established within the Navy, Air Force, and the paramilitary People’s Armed Police to address both external and internal security threats.

The First Unit: Guangzhou Military Region’s “South China Sword” (1988)

In 1988, the PLA took the first concrete step in creating a modern special operations capability by establishing its first official “special-mission rapid reaction unit” within the Guangzhou Military Region.21 This unit, which became known as the “South China Sword” (华南之剑) or “Sharp Sword of Southern China” (南国利剑), was the direct descendant of the elite reconnaissance groups that had proven their value in the preceding decades.22

The choice of the Guangzhou Military Region was significant. As one of China’s most economically developed regions and a key area for Deng Xiaoping’s “Reform and Opening Up” policy, the command had access to a higher quality pool of recruits and better technological resources than the more isolated inland regions.22 This allowed the “South China Sword” to serve as a testbed for the entire PLA. It became the incubator for developing the core doctrine, training methodologies, and operational concepts that would be disseminated throughout the force as other SOF units were established. Its initial missions were an evolution of the traditional reconnaissance role, focusing on special reconnaissance, direct action, and rapid response to regional contingencies.21

The Gulf War Shock: Accelerating the Creation of a Modern SOF Capability (1991-2000s)

If the Sino-Vietnamese War was a wake-up call, the 1991 Persian Gulf War was a seismic shock to the PLA’s strategic leadership. PLA observers watched in awe as a U.S.-led coalition dismantled the world’s fourth-largest army in a matter of weeks through the integrated use of precision-guided munitions, information dominance, and highly effective special operations forces.11 The performance of Coalition SOF, conducting deep reconnaissance, laser-designating targets for airstrikes, and hunting for Scud missile launchers far behind Iraqi lines, provided a powerful and undeniable demonstration of their role as a force multiplier in modern warfare.

This event was the primary catalyst that accelerated the PLA’s modernization and solidified the importance of SOF within its new strategic framework. The doctrinal concept of fighting “local wars under modern conditions” was rapidly updated to fighting “local wars under high-technology conditions” (and later, “informatized conditions”).20 In the wake of the Gulf War, the PLA embarked on a concerted, force-wide effort to establish SOF units. What had begun with a single experimental unit in 1988 became a military-wide priority. By the late 1990s, this expansion had progressed to the point where each of the PLA’s seven Military Regions commanded its own Army SOF or special reconnaissance group (dadui), each with a strength of approximately 1,000 personnel.24

Expansion Across the Services

The recognition of SOF’s importance was not confined to the ground forces. Throughout the late 1990s and 2000s, each of the PLA’s service branches, as well as the People’s Armed Police, established their own distinct special operations capabilities tailored to their specific domains and mission sets. This development followed a bifurcated path, with PLA units focusing on external military threats and PAP units focusing on internal security.

  • PLA Navy Marine Corps (PLANMC): The PLANMC’s premier SOF unit, the “Jiaolong Commandos” (蛟龙突击队, or “Sea Dragons”), was formally established in 2002, originating as the PLAN Special Operations Battalion.29 Tasked with maritime special operations including amphibious reconnaissance, direct action, combat diving, and Visit, Board, Search, and Seizure (VBSS), the Jiaolong Commandos gained international prominence with their first major public deployment in December 2008 as part of China’s inaugural anti-piracy task force in the Gulf of Aden.27
  • PLA Air Force Airborne Corps (PLAAFAC): The PLA’s airborne forces, organized under the 15th Airborne Corps, have long been considered a rapid reaction force, a designation made official in 1992.30 However, its dedicated SOF component, a unit known as the “Thunder Gods” (雷神), was not formally established until September 30, 2011.31 This unit specializes in airborne insertion, deep reconnaissance, and direct action missions in support of airborne campaigns.
  • PLA Rocket Force (PLARF): The branch responsible for China’s conventional and nuclear missile arsenal, the PLARF (formerly the Second Artillery Force), also created its own special forces. This regiment-sized unit, known as “Sharp Blade” (利刃), is primarily tasked with missions critical to the PLARF’s strategic role, including reconnaissance of potential launch sites, security for high-value missile assets, and terminal guidance for precision strikes.19
  • People’s Armed Police (PAP): Operating parallel to the PLA, the PAP is responsible for internal security, law enforcement, and counter-terrorism. It established its elite units well before the PLA’s main SOF expansion. The “Falcon Commando” (猎鹰突击队) was founded in 1982 as a specialized anti-hijacking unit, making it the PRC’s first modern special police force.32 Following the rise of global terrorism concerns after 9/11, the PAP established a second national-level counter-terrorism force, the “Snow Leopard Commando” (雪豹突击队), in December 2002.32 These units are explicitly focused on domestic hostage rescue, counter-terrorism, and other high-risk law enforcement missions.

This period of expansion solidified the role of special operations within China’s armed forces. The PLA’s approach was to develop SOF as a critical “force multiplier,” a high-precision tool designed not for independent strategic campaigns of unconventional warfare, but to be integrated into larger conventional operations to create decisive advantages on the battlefield.21

III. The Modern Force: Structure and Capabilities in the Theater Command Era (2015-Present)

The most transformative event in the modern history of the People’s Liberation Army began in late 2015 with the announcement of a sweeping series of military reforms under Chairman Xi Jinping. This reorganization was the most significant since the founding of the PRC, aimed at breaking down entrenched ground-force dominance, eliminating inter-service rivalries, and forging a military truly capable of conducting integrated joint operations in a high-tech, “informatized” environment.34 For the PLA’s Special Operations Forces, these reforms fundamentally altered their command structure, organizational size, and role within the broader warfighting system, elevating them from service-specific assets to key components of the PLA’s joint operational architecture.

Impact of the 2015 Military Reforms

The centerpiece of the 2015 reforms was the dissolution of the seven geographically-based, army-dominated Military Regions. In their place, the PLA established five joint Theater Commands (战区): the Eastern, Southern, Western, Northern, and Central Theater Commands.35 This restructuring was guided by a new central principle of command: “the CMC manages, the theater commands focus on warfighting, and the services focus on building [the forces]” (军委管总、战区主战、军种主建).35

This new philosophy fundamentally rewired the PLA’s command and control pathways. Previously, SOF units were largely under the administrative and operational control of their parent service and Military Region. Under the new system, the service headquarters (Army, Navy, Air Force, etc.) are primarily responsible for manning, training, and equipping their forces. However, operational command of these forces in a conflict is now vested in the joint Theater Commander.35 This means that SOF brigades are now assets to be employed by the Theater Commander as part of a unified, multi-service campaign plan, rather than as stovepiped service-specific units. The goal was to enable true integrated joint operations, where a PLAGF SOF team could, for example, be inserted by a PLAAF helicopter to designate a target for a PLAN vessel or a PLARF missile strike, all under the unified command of a single theater headquarters.26

In parallel with this command structure overhaul, the reforms also drove a significant organizational expansion. Most of the existing army SOF groups (dadui) and regiments were upgraded and expanded into full special operations brigades, typically comprising 2,000 to 3,000 personnel.24 This “brigadization” was part of a PLA-wide shift away from large, unwieldy divisions toward smaller, more agile, and modular combined-arms brigades (CA-BDEs).34 This indicates that SOF are now viewed not just as an elite niche capability, but as a core component of the PLA’s primary warfighting formations, with each of the PLA’s 13 Group Armies now having its own organic SOF brigade.19 While this structure is modeled on Western joint command systems, the PLA’s underlying command philosophy remains highly centralized, delegating less authority to junior leaders than is common in Western SOF and keeping these potent forces under the tight control of the theater commander.19

Current Order of Battle

The post-2015 reforms have resulted in a formidable and standardized SOF structure across the PLA and PAP. The brigade has become the standard unit of organization, providing a significant and scalable capability to each Theater Command and service branch.

Service BranchTheater Command / Command ElementParent FormationUnit DesignationUnit Nickname (Cognomen)Primary Mission Profile
PLAGFEastern Theater Command71st Group ArmySpecial Operations Brigade 71“Sharks” (海鲨)Ground DA/SR, Amphibious Operations
Eastern Theater Command72nd Group ArmySpecial Operations Brigade 72“Thunderbolts” (霹雳)Ground DA/SR, Urban Operations
Eastern Theater Command73rd Group ArmySpecial Operations Brigade 73“Flying Dragons of the East Sea” (东海飞龙)Ground DA/SR, Amphibious/Island Assault
Southern Theater Command74th Group ArmySpecial Operations Brigade 74“Southern Sharp Swords” (南国利剑)Ground DA/SR, Maritime/Jungle Operations
Southern Theater Command75th Group ArmySpecial Operations Brigade 75“Jungle Tigers” (丛林猛虎)Ground DA/SR, Jungle/Mountain Warfare
Western Theater Command76th Group ArmySpecial Operations Brigade 76“Snowy Maples” (雪枫) / “Sky Wolf Commandos” (天狼突击队)Ground DA/SR, Desert/High-Altitude Warfare
Western Theater Command77th Group ArmySpecial Operations Brigade 77“Southwest Cheetahs” (西南猎豹)Ground DA/SR, Mountain/High-Altitude Warfare
Northern Theater Command78th Group ArmySpecial Operations Brigade 78“Blood Wolves” (血狼)Ground DA/SR, Cold Weather/Forest Warfare
Northern Theater Command79th Group ArmySpecial Operations Brigade 79“Amur Tigers” (雄狮/东北虎)Ground DA/SR, Cold Weather/Forest Warfare
Northern Theater Command80th Group ArmySpecial Operations Brigade 80“Eagles” (雄鹰)Ground DA/SR, Amphibious Operations
Central Theater Command81st Group ArmySpecial Operations Brigade 81“Cheetahs” (猎豹)Ground DA/SR, Strategic Reserve
Central Theater Command82nd Group ArmySpecial Operations Brigade 82“Arrow” (响箭)Ground DA/SR, Strategic Reserve, Capital Defense
Central Theater Command83rd Group ArmySpecial Operations Brigade 83“Central Plains Tigers” (中原猛虎)Ground DA/SR, Strategic Reserve
Western Theater CommandXinjiang Military DistrictSpecial Operations Brigade 84“Kunlun Blade” (昆仑利刃)Counter-Terrorism, High-Altitude/Desert Warfare
Western Theater CommandTibet Military DistrictSpecial Operations Brigade 85“Highland Snow Leopards” (高原雪豹)High-Altitude Mountain Warfare
PLANMCSouthern Theater CommandPLA Navy7th Marine Brigade“Jiaolong Commandos” (蛟龙突击队)Maritime Interdiction, Amphibious Recon, VBSS
PLAAFAC(Strategic Reserve)PLA Air ForceSpecial Operations Brigade“Thunder Gods” (雷神)Airborne Insertion, Strategic Raids, Airfield Seizure
PLARF(Strategic Reserve)PLA Rocket ForceSpecial Operations Regiment“Sharp Blade” (利刃)Strategic Asset Security, Target Reconnaissance
PAP(Internal Security)1st Mobile CorpsSpecial Operations Detachment 1“Falcon Commando” (猎鹰突击队)National-Level CT, Anti-Hijacking, Hostage Rescue
(Internal Security)2nd Mobile CorpsSpecial Operations Detachment 1“Snow Leopard Commando” (雪豹突击队)National-Level CT, Urban Operations, Hostage Rescue
(Internal Security)Xinjiang PAP CorpsMountain Counter-Terrorism Detachment“Mountain Eagle Commando” (山鹰突击队)National-Level CT, Mountain/High-Altitude CT

Note: DA/SR refers to Direct Action/Special Reconnaissance. Unit nicknames and specific mission profiles are based on open-source reporting and official media portrayals.19

IV. Doctrinal and Tactical Evolution: From Guerrilla Roots to System-of-Systems Warfare

The evolution of PLA SOF doctrine and tactics mirrors the force’s broader technological and organizational transformation. Initial concepts were a direct extension of the traditional zhenchabing role, emphasizing infiltration and direct action with limited technological support. Over the past two decades, this has evolved into a sophisticated doctrine that positions SOF as a critical node within a complex, networked “system of systems.” This evolution is reflected in their expanding mission set, the increasing complexity of their training, and their formal integration into the PLA’s joint operations framework.

Mission Set Progression

The tasks assigned to PLA SOF have expanded significantly since their inception. In the 1990s, their missions were primarily an enhancement of the classic reconnaissance role: deep penetration for special reconnaissance, raids on high-value targets, sabotage of enemy infrastructure, and harassment of rear-echelon forces to disrupt enemy operations.24

By the 2000s and into the present day, this mission set has broadened to align with the PLA’s growing capabilities and strategic concerns. It now explicitly includes hostage rescue, counter-terrorism, and “decapitation” strikes against enemy political and military leadership.21 Perhaps the most significant evolution has been their integration into the PLA’s long-range precision strike complex. A primary role for SOF in a modern conflict is to act as forward sensors for the PLA Rocket Force and Air Force. Small, clandestine teams are tasked with infiltrating enemy territory to locate, identify, and provide terminal guidance for conventional ballistic and cruise missile strikes against critical targets.45 Furthermore, their role has expanded into the non-kinetic realm of information warfare. PLA texts describe SOF being tasked with seizing or destroying enemy media outlets and using captured facilities or prepositioned transmitters to broadcast propaganda, aiming to “disintegrate enemy resolve” and support broader psychological warfare campaigns.11

Training and Selection

To create operators capable of executing these demanding missions, the PLA has developed an exceptionally rigorous selection and training pipeline. The selection process has a high attrition rate, with some reports suggesting that 50% to 90% of volunteers fail to complete the initial training program.47

The training regimen is notoriously arduous, designed to push soldiers to their absolute physical and psychological limits. It incorporates elements common to Western SOF training, such as “Hell Week” style endurance tests where trainees must survive for days in the field on minimal sleep and rations while completing grueling physical tasks.48 Training also includes resistance to interrogation, preparing soldiers to withstand capture and exploitation.27 The curriculum is comprehensive, covering advanced individual combat skills, small-unit tactics, and proficiency with a wide array of both domestic and foreign weapon systems.44 A core competency for all PLA SOF is “triphibious” insertion—the ability to deploy by land, sea (including subsurface), and air—which is practiced extensively.24

Benchmarking through International Competitions

In the absence of modern combat experience since the Sino-Vietnamese border conflicts, the PLA has systematically used international military competitions as a substitute for battlefield validation and as a tool for military diplomacy. Since the early 2000s, teams from PLA and PAP special forces have become dominant fixtures at these events.27

They have consistently achieved top rankings at the Annual Warrior Competition in Jordan, an event considered the “Olympics” of special forces.19 They have also excelled at more specialized events, such as sniper competitions in Slovakia and Hungary and reconnaissance contests in Kazakhstan.19 While success in these competitions is a significant source of national and unit pride, heavily promoted by state media, their primary value is strategic. These events allow the PLA to benchmark its soldiers’ skills, tactics, and equipment against international peers, identify deficiencies, and absorb best practices in a highly competitive, if non-lethal, environment. This systematic approach represents a deliberate strategy to build proficiency and project an image of elite capability, mitigating a critical experience gap with Western counterparts.

Integration into Joint Operations

The ultimate goal of the PLA’s modernization is to achieve victory in “informatized” and, in the future, “intelligentized” warfare. Doctrinally, this is to be accomplished through “Integrated Joint Operations” (IJO), where effects from all services and domains are seamlessly combined to overwhelm an adversary.26 Within this framework, special operations are not seen as an independent activity but as a vital link in a “system of systems,” integrated with information warfare, firepower assault, maneuver, and psychological warfare.21

This doctrinal integration is put into practice through a series of large-scale joint training exercises. Exercises codenamed “Sharp Sword” (利刃) and “Cooperation” (合作) are specifically designed to test the joint command structures of the Theater Commands and practice the integration of SOF with conventional land, sea, and air forces.55 In these scenarios, SOF units are frequently tasked with missions that directly enable the main force, such as conducting reconnaissance for an amphibious landing, providing terminal guidance for artillery barrages, or seizing a critical bridge or airfield immediately prior to the arrival of conventional troops.44 This doctrinal emphasis on a supporting role, combined with their large brigade-level organization, indicates that the PLA’s primary conception of its SOF is as elite shock troops—akin to the U.S. Army Rangers—rather than as a force for clandestine, strategic-level unconventional warfare. They are the sharpest tip of the conventional spear, not a separate strategic instrument.

V. Armament and Technology: An Engineering Analysis of SOF Weaponry and Equipment

The evolution of small arms and individual equipment within the PLA’s special operations community provides a clear technical narrative of the force’s broader modernization. This progression can be analyzed in three distinct eras, moving from reliable but technologically simple Soviet-inspired systems to a proprietary small-caliber family of weapons, and culminating in the current generation of modular, networked systems designed for the “informatized” battlefield. This technological trajectory reflects a deliberate shift in design philosophy, increasingly prioritizing operator ergonomics, modularity, and systems integration in a manner that mirrors global SOF trends.

Era 1 (1970s-1980s): The Reconnaissance Soldier’s Kit

The equipment of the PLA’s elite zhenchabing during and after the Sino-Vietnamese War was pragmatic and robust, reflecting a design philosophy that prioritized reliability in harsh conditions over advanced features.

  • Primary Rifle: The Type 81 assault rifle, chambered in 7.62x39mm, was the workhorse of this era. Its key technical departure from the AK-47 platform was the use of a short-stroke gas piston system, in contrast to the AK’s long-stroke piston. This design change resulted in a smoother recoil impulse and reduced bolt carrier mass, contributing to significantly better practical accuracy than the Type 56 (AK-47 clone) it supplemented.17 The Type 81-1 variant, featuring a side-folding stock, was developed for paratroopers and other specialized units requiring a more compact weapon.18
  • Specialized Weapons: For close-quarters combat and infiltration, reconnaissance troops were issued the Type 79 submachine gun. A lightweight, stamped-steel weapon chambered in the high-velocity 7.62x25mm Tokarev cartridge, it was one of the first indigenous Chinese SMG designs. It utilized a gas-operated, rotating closed-bolt action, a complex mechanism for a submachine gun, intended to improve accuracy. However, it suffered from an excessively high rate of fire (around 1000 rpm) and reliability problems, particularly in jungle environments, and was eventually phased out of frontline military service.12 For clandestine operations requiring maximum sound suppression, units used the
    Type 67 integrally suppressed pistol. This weapon fired a proprietary 7.62x17mm subsonic cartridge and featured a slide-lock mechanism that allowed the operator to manually cycle the action for single shots, preventing any noise from the reciprocating slide and achieving maximum quietness.61

Era 2 (1990s-2010s): The 5.8mm Revolution

The 1990s marked a pivotal moment in Chinese small arms development with the introduction of an entirely new, indigenous cartridge and a family of weapons designed around it. This was a clear statement of China’s intent to break from Soviet-caliber dependency and develop a system tailored to its own doctrinal requirements.

  • The New Caliber: The PLA introduced the 5.8x42mm DBP87 cartridge, a small-caliber, high-velocity round intended to replace both the 7.62x39mm intermediate and 7.62x54mmR full-power cartridges in infantry use. Chinese sources claim the 5.8mm round possesses a flatter trajectory and superior penetration against body armor compared to both the NATO 5.56x45mm and the Russian 5.45x39mm rounds.65
  • Primary Rifle: The QBZ-95 (Type 95) assault rifle became the iconic weapon of this new generation. Its bullpup configuration, placing the action and magazine behind the trigger group, allowed for a full-length barrel in a compact overall package, a feature deemed advantageous for mechanized infantry, paratroopers, and special forces. First seen in public with the PLA Hong Kong Garrison in 1997, it was widely issued to SOF units.65 The later
    QBZ-95-1 variant addressed some of the original’s ergonomic shortcomings and added a small optics rail on the carrying handle. Customized versions with aftermarket rails and accessories were often seen in the hands of SOF operators, foreshadowing a demand for greater modularity.65
  • Designated Marksman Rifle (DMR): To provide precision fire at the squad level, the PLA adopted the QBU-88 (Type 88), the first dedicated DMR in its history. Also a bullpup chambered in 5.8x42mm, it was designed to fire a heavier, more accurate loading of the cartridge and was typically issued with a 3-9x magnified optic. Adopted in 1997, it gave SOF squads an organic capability to engage point targets beyond the effective range of their standard assault rifles.69
  • Sidearm: The standard sidearm became the QSZ-92 (Type 92) semi-automatic pistol. Uniquely, it was developed in two calibers for different roles. The military version, QSZ-92-5.8, is chambered in 5.8x21mm, a high-velocity, bottlenecked cartridge designed for armor penetration, and features a 20-round double-stack magazine. The police version, QSZ-92-9, is chambered in the ubiquitous 9x19mm Parabellum with a 15-round magazine.72

Era 3 (Present): The Modular and Integrated Generation

The current generation of PLA SOF equipment reflects a profound philosophical shift. Learning from two decades of experience with the QBZ-95 and observing global trends in small arms design, the PLA has moved away from a closed, proprietary system toward one that emphasizes modularity, ergonomics, and seamless integration with digital systems.

  • Primary Rifle: The QBZ-191 assault rifle represents a decisive return to a conventional rifle layout. This change addresses the inherent ergonomic limitations of the QBZ-95 bullpup, such as the awkward safety selector and difficulty for left-handed shooters. The QBZ-191 features a full-length Picatinny rail along the top of the receiver, an adjustable telescoping stock, and ambidextrous controls, allowing for a high degree of customization with various optics, lights, and lasers—a critical requirement for modern SOF.80 The weapon is being fielded as a complete family, including a standard 14.5-inch barrel rifle, a shorter carbine variant (
    QBZ-192), and a DMR variant (QBU-191), allowing units to tailor the weapon to the mission. True to form, SOF and other elite units are the first to receive the new rifle system.80
  • Precision Sniper Systems: The PLA has now fully embraced Western-style precision sniper systems. SOF snipers are no longer limited to semi-automatic DMRs. They are now equipped with high-precision, bolt-action rifles like the CS/LR4 (chambered in 7.62x51mm NATO) and its more advanced successors, which offer sub-MOA accuracy.85 For anti-materiel and extreme long-range engagements, units employ heavy semi-automatic rifles like the
    QBU-10, chambered in the powerful 12.7x108mm cartridge.49
Era / TimeframeWeapon TypeDesignationCartridgeAction TypeYear IntroducedKey Engineering/Tactical Characteristics
Era 1 (1970s-1980s)Assault RifleType 81-17.62×39mmShort-stroke gas piston, rotating bolt1981Improved accuracy and reduced recoil over AK platform; folding stock for compactness. 17
Submachine GunType 797.62×25mm TokarevGas-operated, rotating bolt1979Lightweight and compact for CQC; high rate of fire but suffered reliability issues. 12
Suppressed WeaponType 67 Pistol7.62×17mm Type 64Blowback, semi-auto w/ slide lock1967Integrally suppressed with manual slide-lock for maximum quietness. 61
Era 2 (1990s-2010s)Assault RifleQBZ-955.8×42mm DBP87Short-stroke gas piston, rotating bolt1995Compact bullpup design; proprietary small-caliber, high-velocity ammunition. 65
DMRQBU-885.8×42mm DBP87Short-stroke gas piston, rotating bolt1997Bullpup DMR for squad-level precision fire; fires heavier 5.8mm loading. 69
SidearmQSZ-92-5.85.8×21mm DAP92Short recoil, rotating barrel lock1998High-capacity (20 rds) military version with armor-piercing ammunition. 74
Era 3 (Present)Assault RifleQBZ-1915.8×42mm DBP191Short-stroke gas piston, rotating bolt2019Conventional layout with full-length Picatinny rail, adjustable stock, improved ergonomics. 80
Sniper RifleCS/LR47.62×51mm NATOBolt-action~2012High-precision bolt-action system for dedicated sniper role; sub-MOA accuracy. 85
Anti-Materiel RifleQBU-1012.7×108mmGas-operated, semi-auto~2010Semi-automatic rifle for engaging light vehicles, sensors, and other hard targets. 86

The Integrated Soldier Combat System

The culmination of this technological evolution is the PLA’s new Integrated Soldier Combat System (单兵综合作战系统), which is being fielded concurrently with the QBZ-191 rifle family. This system is designed to transform the individual soldier from a simple rifleman into a networked sensor and shooter, fully integrated into the PLA’s “informatized” command and control architecture.91

  • Helmet: The QGF-11 combat helmet is a modern, high-cut design made from advanced composite materials. It features an advanced “OPS-Core” style suspension system with a dial for precise fitting, ensuring stability when mounting accessories. The helmet is equipped with side rails and a front shroud for the seamless integration of night vision goggles, communication headsets, tactical lights, and video cameras that can transmit a soldier’s point-of-view back to command centers.75
  • Body Armor: The Type 19 Individual Carrying System is a modular plate carrier that replaces older, less adaptable vests. It features Kevlar lining and pockets for hard armor plates, providing protection against rifle threats. The system is covered in the new “Xingkong” (星空, or “Starry Sky”) family of digital camouflage patterns and includes a full suite of modular pouches for ammunition and equipment.75 A 2020 PLA procurement order for nearly 1.4 million sets of body armor plates signaled a commitment to making effective personal protection a standard-issue item for the entire ground force, not just elite units.96
  • Communications and C2: The system’s core is its digital component. Each operator is equipped with an individual soldier radio for voice and data transmission within the squad. This is linked to a chest- or wrist-mounted terminal, a ruggedized tablet-like device that displays a digital map with real-time position data for the operator and their teammates, fed by the Beidou satellite navigation system. This terminal can receive and display orders, intelligence updates, and imagery from command, giving the individual soldier unprecedented situational awareness. Conversely, it allows commanders to track the precise location and status of every soldier on the battlefield in real-time, enabling a highly centralized form of command and control.75 This heavy reliance on networked technology, however, also introduces a potential vulnerability to sophisticated electronic warfare or cyber-attack.

VI. Future Trajectory: The Intelligentized Operator in Multi-Domain Conflict

The future development of the People’s Liberation Army’s Special Operations Forces is inextricably linked to the PLA’s overarching strategic goal of becoming a “world-class” military capable of fighting and winning “intelligentized wars” (智能化战争) by mid-century.99 For PLA SOF, this means evolving beyond their current role as elite “informatized” units and becoming the vanguard of a new form of warfare characterized by the seamless fusion of human operators, artificial intelligence, and autonomous systems across multiple domains. Their future trajectory will be defined by their integration with unmanned platforms, their symbiotic relationship with the PLA’s new information-centric military branches, and their expanding role in protecting China’s global interests.

The Human-Machine Interface: Integration with Unmanned Systems

PLA doctrine explicitly anticipates that future conflicts will be increasingly “unmanned, intangible, and silent”.101 SOF, with their emphasis on small, technologically adept teams, are the natural pioneers for integrating unmanned systems at the tactical edge.

  • Unmanned Aerial Vehicles (UAVs): PLA SOF have already integrated small, tactical UAVs for reconnaissance and target acquisition missions.24 The future evolution of this capability will involve SOF operators not just receiving data from drones, but actively controlling them. This includes directing larger, armed UAVs for close air support, acting as forward controllers for “loyal wingman” type unmanned combat aerial vehicles (UCAVs) operating in conjunction with manned aircraft, and potentially deploying and directing autonomous drone swarms for reconnaissance or saturation attacks.102
  • Unmanned Ground Vehicles (UGVs): The PLA is actively developing a range of UGVs for logistics, reconnaissance, and direct-fire support roles. The indigenously developed “Lynx” (山猫) family of all-terrain vehicles, widely used by SOF, includes variants that can be remotely operated.104 This provides SOF teams with the ability to conduct “unmanned reconnaissance-in-force,” sending an armed robotic platform to probe enemy defenses, breach obstacles, or provide covering fire, all while the human operators remain in a secure position.105

The Information Domain: The Symbiotic Relationship with the Information Support Force

Perhaps the most significant development shaping the future of PLA SOF was the April 2024 reorganization of the Strategic Support Force (SSF). The SSF, created in 2015, centralized the PLA’s space, cyber, electronic warfare, and psychological warfare capabilities.106 Its dissolution and replacement by three new, more specialized arms—the Aerospace Force, the Cyberspace Force, and the Information Support Force (ISF)—represents a refinement of the PLA’s approach to multi-domain warfare.108

The ISF is now the PLA’s core strategic branch responsible for building, maintaining, and operating the network information systems that underpin all joint operations.110 This creates a direct, symbiotic relationship with SOF. In future conflicts, SOF will act as the premier forward sensors and kinetic effectors for the ISF. A SOF team, having infiltrated enemy territory, can provide the precise, on-the-ground intelligence needed for the ISF to execute a targeted cyber-attack against an enemy command node. Conversely, the ISF can provide direct support to a SOF mission by jamming enemy communications, disabling sensor grids, or conducting psychological operations through social media and broadcast networks to create confusion and deception that facilitates the SOF team’s success.107 This formalizes the integration of kinetic and non-kinetic effects, making SOF a key enabler for victory in the information domain.

From Regional Contingency to Global Projection

While the PLA’s primary modernization drivers remain regional contingencies, particularly a potential conflict over Taiwan or in the South China Sea, China’s expanding global economic and political interests are creating new requirements for military power projection.114 PLA SOF, particularly the PLANMC’s Jiaolong Commandos, are at the forefront of this shift.

The PLANMC is being explicitly designed and trained as an expeditionary force capable of operating far from mainland China to protect the country’s “overseas interests”.115 Their operational experience in anti-piracy missions in the Gulf of Aden and non-combatant evacuation operations in Yemen and Sudan demonstrates a growing capability for global deployment.29 As China’s global footprint continues to expand, potentially including more overseas military bases, PLA SOF will increasingly be called upon to conduct a wider range of missions abroad. These could include counter-terrorism operations to protect Chinese nationals, security for Belt and Road Initiative projects, and “gray zone” activities that fall below the threshold of conventional warfare.116

Concluding Assessment: Strengths, Challenges, and Implications

The evolution of the PLA’s special operations forces from humble reconnaissance scouts to technologically advanced, joint-capable brigades has been remarkable in its speed and scope. They represent the cutting edge of the PLA’s broader military modernization and provide the Chinese Communist Party with a potent and flexible tool of national power.

  • Strengths: PLA SOF are composed of highly disciplined, physically elite, and politically reliable soldiers. They are prioritized for the PLA’s most advanced individual weaponry and equipment, including the new Integrated Soldier Combat System. As a “new type” of combat force, they receive significant funding and political support from the highest levels of the CMC. The 2015 reforms have organizationally integrated them into a joint warfighting structure, theoretically enabling them to draw upon the full might of the PLA’s theater-level assets.
  • Challenges: The most significant weakness of PLA SOF is their profound lack of modern combat experience. Unlike their Western counterparts, who have been engaged in continuous combat operations for over two decades, the PLA’s last major conflict ended in the 1980s.27 Their rigid, top-down command culture may also stifle the initiative and adaptability at the small-unit level that is the hallmark of effective special operations.27 Finally, while their individual equipment is becoming world-class, they still lack the dedicated strategic airlift, specialized aviation support (like the U.S. 160th SOAR), and robust global logistics infrastructure that enable true long-range, long-duration special operations.21 Their increasing reliance on complex information networks also presents a critical vulnerability that a peer adversary with advanced EW and cyber capabilities could exploit.
  • Strategic Implications: The continued growth, professionalization, and technological advancement of Chinese SOF present a formidable capability for both regional conflict and global power projection. In a regional scenario, they are trained to be a decisive factor in the opening hours of a conflict, tasked with paralyzing an adversary’s command and control, disabling air defenses, and paving the way for a main assault. Globally, they provide Beijing with a scalable and deniable option for protecting its interests abroad. The evolution of these forces is a clear indicator of the PLA’s strategic ambitions, and their future development will serve as a key barometer of China’s progress toward its goal of becoming a world-class military power.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.


Works cited

  1. People’s Liberation Army | Chinese Military, Armed Forces, PLA – Britannica, accessed August 21, 2025, https://www.britannica.com/topic/Peoples-Liberation-Army-Chinese-army
  2. A brief noncredible overview of Chinese military history and doctrine for the last 75 years : r/NonCredibleDefense – Reddit, accessed August 21, 2025, https://www.reddit.com/r/NonCredibleDefense/comments/1htrzwo/a_brief_noncredible_overview_of_chinese_military/
  3. China’s Special Operations Forces: The cutting edge of the PLA – YouTube, accessed August 21, 2025, https://www.youtube.com/watch?v=ebVfd6s2o_8
  4. 敢入刀山火海的陆军特种部队 – 科普中国军事科技前沿, accessed August 21, 2025, https://junshi.gmw.cn/2022-07/29/content_35919348.htm
  5. 组图:解放军两栖侦察兵生存训练中生吃蛇胆 – 新华网, accessed August 21, 2025, http://www.xinhuanet.com/mil/2015-04/27/c_127736955.htm
  6. 侦察兵:常规部队里的“特种兵” (组图) – 新华网, accessed August 21, 2025, http://www.xinhuanet.com/mil/2015-11/25/c_128465882.htm
  7. 解放军报记者走进训练场体验侦察尖兵的“艰难一日” – 中国军网, accessed August 21, 2025, http://www.81.cn/2022zt/2022-03/28/content_10143952.htm
  8. Sino-Vietnamese War – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Sino-Vietnamese_War
  9. Sino-Vietnamese War 1979 – Để gió cuốn đi, accessed August 21, 2025, https://tamdiepblog.wordpress.com/2019/02/17/sino-vietnamese-war-1979/
  10. THE CHINESE PEOPLE’S LIBERATION ARMY: “SHORT ARMS AND SLOW LEGS” Russell D. Howard – Nuke, accessed August 21, 2025, https://nuke.fas.org/guide/china/doctrine/ocp28.htm
  11. Chinese Special Forces: Dragons of the East – Grey Dynamics, accessed August 21, 2025, https://greydynamics.com/chinese-special-forces-dragons-of-the-east/
  12. Type 79 submachine gun – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Type_79_submachine_gun
  13. PLA 1979 (Sino-Vietnamese War) : r/Impression_Kits – Reddit, accessed August 21, 2025, https://www.reddit.com/r/Impression_Kits/comments/1iajsmo/pla_1979_sinovietnamese_war/
  14. en.wikipedia.org, accessed August 21, 2025, https://en.wikipedia.org/wiki/Type_63_assault_rifle
  15. When an SKS and an AK have a baby… ( Type 63 assault rifle ) – Reddit, accessed August 21, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/1bma74b/when_an_sks_and_an_ak_have_a_baby_type_63_assault/
  16. Type 63: China Makes an AK/SKS Hybrid – YouTube, accessed August 21, 2025, https://www.youtube.com/watch?v=ba7mDVZYpSM
  17. The Type 81 Rifle Tested China’s Arms Prowess—Did It Impress? – The National Interest, accessed August 21, 2025, https://nationalinterest.org/blog/reboot/type-81-rifle-tested-chinas-arms-prowess-did-it-impress-181199/
  18. Type 81 assault rifle – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Type_81_assault_rifle
  19. 中国人民解放军特种部队 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/%E4%B8%AD%E5%9C%8B%E4%BA%BA%E6%B0%91%E8%A7%A3%E6%94%BE%E8%BB%8D%E7%89%B9%E7%A8%AE%E9%83%A8%E9%9A%8A
  20. The Evolution of China’s Military Strategy – MIT, accessed August 21, 2025, http://web.mit.edu/fravel/www/fravel.2005.evolution.china.military.strategy.pdf
  21. How special are PLA special forces? – ANI News, accessed August 21, 2025, https://www.aninews.in/news/world/asia/how-special-are-pla-special-forces20200130120235/
  22. photo.81.cn, accessed August 21, 2025, http://photo.81.cn/jrfc/2014-12/16/content_6270918_5.htm#:~:text=%E5%B9%BF%E5%B7%9E%E5%86%9B%E5%8C%BA%E7%89%B9%E7%A7%8D%E9%83%A8%E9%98%9F%EF%BC%8C%E5%8F%88,%E9%83%BD%E6%AF%94%E5%85%B6%E4%BB%96%E5%86%9B%E5%8C%BA%E9%AB%98%E3%80%82
  23. 解放军特种部队的帅气别名 – 中国军网, accessed August 21, 2025, http://photo.81.cn/jrfc/2014-12/16/content_6270918_5.htm
  24. PLA Special Operations Forces: Organizations, Missions and …, accessed August 21, 2025, https://jamestown.org/program/pla-special-operations-forces-organizations-missions-and-training/
  25. Modernising China’s Military, 1997-2012 – OpenEdition Journals, accessed August 21, 2025, https://journals.openedition.org/chinaperspectives/5701
  26. The PLA’s Pursuit of Enhanced Joint Operations Capabilities, accessed August 21, 2025, https://www.nids.mod.go.jp/publication/chinareport/pdf/china_report_EN_web_2022_A02.pdf
  27. People’s Liberation Army Special Operations Forces – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Special_Operations_Forces
  28. en.wikipedia.org, accessed August 21, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Special_Operations_Forces#:~:text=8.2%20Sources-,History,Somalia%20on%2026%20December%202008.
  29. Special Operations Brigade (PLA Navy Marine Corps) – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Special_Operations_Brigade_(PLA_Navy_Marine_Corps)
  30. China Maritime Report No. 19: The PLA Airborne Corps in a Joint Island Landing Campaign, accessed August 21, 2025, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1018&context=cmsi-maritime-reports
  31. People’s Liberation Army Air Force Airborne Corps – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Air_Force_Airborne_Corps
  32. 中国人民武装警察部队猎鹰突击队- 维基百科,自由的百科全书, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/%E4%B8%AD%E5%9B%BD%E4%BA%BA%E6%B0%91%E6%AD%A6%E8%A3%85%E8%AD%A6%E5%AF%9F%E9%83%A8%E9%98%9F%E7%8C%8E%E9%B9%B0%E7%AA%81%E5%87%BB%E9%98%9F
  33. 中國的21支特戰部隊 – 國防安全研究院, accessed August 21, 2025, https://indsr.org.tw/respublicationcon?uid=12&resid=727&pid=2799
  34. An Analysis of Chinese Military Reform – Towards the US Model? – RSIS, accessed August 21, 2025, https://rsis.edu.sg/rsis-publication/rsis/an-analysis-of-chinese-military-reform-towards-the-us-model/
  35. People’s Liberation Army Reforms and Their Ramifications | RAND, accessed August 21, 2025, https://www.rand.org/pubs/commentary/2016/09/pla-reforms-and-their-ramifications.html
  36. PLA Reforms and China’s Nuclear Forces – National Defense University Press, accessed August 21, 2025, https://ndupress.ndu.edu/Media/News/Article/969665/pla-reforms-and-chinas-nuclear-forces/
  37. Theater command – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Theater_command
  38. Theater Commands – China Military – China’s Ministry of National Defense, accessed August 21, 2025, http://eng.mod.gov.cn/xb/TheaterCommands/index.html
  39. THEATER COMMANDS OF CHINA – ORCA | Organisation for Research on China and Asia, accessed August 21, 2025, https://orcasia.org/theater-commands-of-china
  40. 深化国防和军队改革 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/%E6%B7%B1%E5%8C%96%E5%9B%BD%E9%98%B2%E5%92%8C%E5%86%9B%E9%98%9F%E6%94%B9%E9%9D%A9
  41. (U) The PLA’s New Joint Doctrine: The Capstone of the New Era Operations Regulations System – CNA.org., accessed August 21, 2025, https://www.cna.org/archive/CNA_Files/pdf/the-plas-new-joint-doctrine.pdf
  42. An Introduction to China’s High-Mobility Combined Arms Battalion Concept, accessed August 21, 2025, https://www.benning.army.mil/infantry/magazine/issues/2020/Fall/pdf/5_Arostegui-HIMOB.pdf
  43. 中华人民共和国特种部队 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/%E4%B8%AD%E8%8F%AF%E4%BA%BA%E6%B0%91%E5%85%B1%E5%92%8C%E5%9C%8B%E7%89%B9%E7%A8%AE%E9%83%A8%E9%9A%8A
  44. PLA Special Operations: Forces, Command, Training and Future …, accessed August 21, 2025, https://jamestown.org/program/pla-special-operations-forces-command-training-and-future-direction/
  45. (U) CHINA: PLAA COMBINED-ARMS BRIGADE’S RECONNAISSANCE OPERATIONS, accessed August 21, 2025, https://g2webcontent.z2.web.core.usgovcloudapi.net/OEE/China%20Landing%20Zone/PLAA-Combined-Arms-Brigade-Reconnaissance-Operations.pdf
  46. China Maritime Report No. 18: Chinese Special Operations in a Large-Scale Island Landing, accessed August 21, 2025, https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1017&context=cmsi-maritime-reports
  47. PLA Army Special Operations Forces – Boot Camp & Military Fitness Institute, accessed August 21, 2025, https://bootcampmilitaryfitnessinstitute.com/elite-special-forces/chinese-elite-special-forces/pla-army-special-operations-forces/
  48. 【中国军队】空中鹰陆地虎水中龙——中国陆军特种部队纪实 – 央视新闻, accessed August 21, 2025, http://m.news.cctv.com/2017/07/20/ARTIVjf3tMJgZcWmKwFziGhO170720.shtml
  49. 【庆祝中国人民解放军建军90周年】中国军队:国之利刃中国陆军特种部队 – 央视网, accessed August 21, 2025, http://military.cctv.com/2017/07/20/ARTIXrjq1OiuX4OdDPzOpPy7170720.shtml
  50. 第十届“勇士竞赛”国际特种兵比武落幕 – 国防部, accessed August 21, 2025, http://www.mod.gov.cn/gfbw/zt/gfbwzt/2018_213791/lbbzdzjbjl/scdb/wj/4821156.html
  51. 巅峰对决丨雪豹突击队勇士载誉归来 – 国防部, accessed August 21, 2025, http://www.mod.gov.cn/gfbw/gfjy_index/xjdx/4818316.html
  52. 第七届“勇士竞赛”国际特种兵比武落幕 – 时政- 人民网, accessed August 21, 2025, http://politics.people.com.cn/n/2015/0426/c70731-26905057.html
  53. Real-life CS: Experience elite snipers’ POV at ‘Sharp Blade-2025’ – YouTube, accessed August 21, 2025, https://m.youtube.com/watch?v=uU5q43lqJlg&pp=0gcJCcwJAYcqIYzv
  54. The PLA’s New Joint Doctrine – CNA.org., accessed August 21, 2025, https://www.cna.org/analyses/2021/09/the-plas-new-joint-doctrine
  55. PLA Joint Training and Implications for Future Expeditionary Capabilities – RAND, accessed August 21, 2025, https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT451/RAND_CT451.pdf
  56. 白皮书:中外联演联训十年超60次海陆空均获进展(图) – 时政- 人民网, accessed August 21, 2025, http://politics.people.com.cn/n/2013/0416/c362226-21154423.html
  57. 利刃演习特种部队不再“比武”全程嵌入体系作战-观察者网 – guancha.cn, accessed August 21, 2025, https://www.guancha.cn/military-affairs/2016_10_25_378267.shtml
  58. “利刃-2016·确山A”演习陆军特种部队全程嵌入体系作战 – 新华网, accessed August 21, 2025, http://news.xinhuanet.com/mil/2016-10/25/c_129336222.htm
  59. Type 79 submachine gun – Simple English Wikipedia, the free encyclopedia, accessed August 21, 2025, https://simple.wikipedia.org/wiki/Type_79_submachine_gun
  60. Type 79 SMG: China’s MP7 At Home – Forgotten Weapons, accessed August 21, 2025, https://www.forgottenweapons.com/type-79-smg-chinas-mp7-at-home/
  61. Type 67 (silenced pistol) – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Type_67_(silenced_pistol)
  62. Chinese Type 67 Integrally Suppressed Pistol : r/ForgottenWeapons – Reddit, accessed August 21, 2025, https://www.reddit.com/r/ForgottenWeapons/comments/d0lrtd/chinese_type_67_integrally_suppressed_pistol/
  63. Type-67 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Type-67
  64. Steam Workshop::Type 64 and Type 67 Silenced Pistols(CWP) – Steam Community, accessed August 21, 2025, https://steamcommunity.com/sharedfiles/filedetails/?id=2180853978
  65. QBZ-95 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QBZ-95
  66. QBZ-95 Chinese 5.8mm Assault Rifle – ODIN – OE Data Integration Network, accessed August 21, 2025, https://odin.tradoc.army.mil/WEG/Asset/QBZ-95_Chinese_5.8mm_Bullpup-Style_Assault_Rifle
  67. 95式自动步枪 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/95%E5%BC%8F%E8%87%AA%E5%8B%95%E6%AD%A5%E6%A7%8D
  68. 95步枪改进后令人眼睛一亮解放军特种兵用后都说好 – 新浪军事, accessed August 21, 2025, https://mil.sina.cn/sd/2017-12-13/detail-ifypnyqi4449881.d.html
  69. QBU-88 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QBU-88
  70. QBU-88 Chinese 5.8mm Sniper Rifle – OE Data Integration Network, accessed August 21, 2025, https://odin.tradoc.army.mil/WEG/Asset/QBU-88_Chinese_5.8mm_Sniper_Rifle
  71. 88式狙击步枪 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/88%E5%BC%8F%E7%8B%99%E6%93%8A%E6%AD%A5%E6%A7%8D
  72. List of infantry equipment of the People’s Liberation Army of China – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/List_of_infantry_equipment_of_the_People%27s_Liberation_Army_of_China
  73. PLA Infantry Weapons: Small Arms of the World’s Largest Army, accessed August 21, 2025, https://sadefensejournal.com/pla-infantry-weapons-small-arms-of-the-worlds-largest-army/
  74. QSZ-92 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QSZ-92
  75. List of equipment of the People’s Liberation Army Ground Force – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/List_of_equipment_of_the_People%27s_Liberation_Army_Ground_Force
  76. QSZ-92 (Type 92) Chinese 9mm/5.8mm Semi-Automatic Pistol – OE Data Integration Network, accessed August 21, 2025, https://odin.tradoc.army.mil/WEG/Asset/QSZ-92_(Type_92)_Chinese_9mm_Semi-Automatic_Pistol
  77. 92式手枪- 维基百科,自由的百科全书, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/92%E5%BC%8F%E6%89%8B%E6%A7%8D
  78. 92式手槍- 維基百科,自由的百科全書, accessed August 21, 2025, https://zh.wikipedia.org/zh-tw/92%E5%BC%8F%E6%89%8B%E6%A7%8D
  79. 详解中国92系列手枪外贸型畅销国际市场(组图) – 新浪军事, accessed August 21, 2025, http://mil.news.sina.com.cn/p/2007-02-02/0732429717.html?from=wap
  80. QBZ-191 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QBZ-191
  81. QBZ-191自动步枪 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/QBZ-191%E8%87%AA%E5%8A%A8%E6%AD%A5%E6%9E%AA
  82. QBZ-191自動步槍- 維基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-tw/QBZ-191%E8%87%AA%E5%8A%A8%E6%AD%A5%E6%9E%AA
  83. Standard-issue version of China’s QBZ-191 assault rifle revealed, accessed August 21, 2025, https://www.china-arms.com/2020/04/standard-qbz-191-rifle-revealed/
  84. 20式枪族各显神威狙击快狠准 – 大公网, accessed August 21, 2025, https://www.takungpao.com/news/232108/2023/0213/817884.html
  85. CS/LR4 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/CS/LR4
  86. 零距离揭秘中国高精度狙击步枪:狙击手训练细节曝光 – 央视网, accessed August 21, 2025, http://news.cctv.com/2019/05/18/ARTIxVO4wyC4cKJh80OcfGLT190518.shtml
  87. 中国特警装备新型高精度狙击步枪单价高达26万(图) – 新浪军事, accessed August 21, 2025, https://mil.sina.cn/sd/2019-08-13/detail-ihytcern0438416.d.html
  88. 央媒独家揭秘国产CS/LR4型高精度狙击步枪 – 新浪军事, accessed August 21, 2025, https://mil.sina.cn/zgjq/2021-09-16/detail-iktzqtyt6404492.d.html
  89. 独家揭秘国产CS/LR4型高精度狙击步枪 – 央视频- 央视网, accessed August 21, 2025, https://v.cctv.com/2021/09/16/VIDEcf56POcAkQNs4tq1WdvW210916.shtml
  90. QBU-10 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QBU-10
  91. 聚焦单兵作战系统④未来战场的信息化与智能化 – 科普中国军事科技前沿, accessed August 21, 2025, https://junshi.gmw.cn/2020-06/24/content_33928532.htm
  92. 一线部队单兵作战装备曝光细节设计更趋人性化 – 央视网, accessed August 21, 2025, http://military.cctv.com/2019/10/05/ARTImmFWY3o5U3ioveFs3Y3F191005.shtml
  93. Chinese Army in Tibet Equips Individual Soldiers with Tactical Information Kits, accessed August 21, 2025, https://www.defensemirror.com/news/28643/Chinese_Army_in_Tibet_Equips_Individual_Soldiers_with_Tactical_Information_Kits
  94. QGF-03 – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/QGF-03
  95. 我军换装新式头盔:曾做未来士兵标配可加挂各种设备 – 新浪军事, accessed August 21, 2025, https://mil.sina.cn/sd/2018-06-13/detail-ihcwpcmp9662572.d.html
  96. 解放军大规模采购防弹插板单兵防护达世界领先水平 – 新浪军事, accessed August 21, 2025, https://mil.sina.cn/sd/2020-02-24/detail-iimxxstf3973244.d.html
  97. 西藏解放军最新装备: 军官可远程启动士兵自毁? – Radio Free Asia, accessed August 21, 2025, https://www.rfa.org/mandarin/yataibaodao/junshiwaijiao/gf1-01042021054458.html
  98. 单兵作战装备、通信指挥系统- CN1715823A – Google Patents, accessed August 21, 2025, https://patents.google.com/patent/CN1715823A/zh
  99. Testing the Waters: Modernization of People’s Liberation Army | Small Wars Journal by Arizona State University, accessed August 21, 2025, https://smallwarsjournal.com/2025/08/04/testing-the-waters-modernization-of-peoples-liberation-army/
  100. China’s Future Military Capabilities – Strategic Studies Institute – Army War College, accessed August 21, 2025, https://ssi.armywarcollege.edu/SSI-Media/Recent-Publications/Article/3944838/chinas-future-military-capabilities/
  101. The PLA’s Unmanned Aerial Systems – Air University, accessed August 21, 2025, https://www.airuniversity.af.edu/Portals/10/CASI/documents/Research/PLAAF/2018-08-29%20PLAs_Unmanned_Aerial_Systems.pdf
  102. 装备:特种部队必备配件 – MSS Defence, accessed August 21, 2025, https://mssdefence.com/zh/%E5%8D%9A%E5%AE%A2/%E7%89%B9%E7%A7%8D%E9%83%A8%E9%98%9F%E5%BF%85%E5%A4%87%E8%A3%85%E5%A4%87/
  103. 从“特殊兵种”加速走向“独立成军”——全球无人机作战力量建设呈现新趋势 – 新华网, accessed August 21, 2025, http://www.news.cn/milpro/20250109/1b247485db93487cb6b138a51ef0095b/c.html
  104. 山猫系列全地形车 – 维基百科, accessed August 21, 2025, https://zh.wikipedia.org/zh-cn/%E5%B1%B1%E7%8C%AB%E7%B3%BB%E5%88%97%E5%85%A8%E5%9C%B0%E5%BD%A2%E8%BD%A6
  105. 无人系统将刷新未来战场补给方式- 解放军报 – 中国军网, accessed August 21, 2025, http://www.81.cn/jfjbmap/content/2019-10/15/content_245287.htm
  106. People’s Liberation Army Strategic Support Force – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/People%27s_Liberation_Army_Strategic_Support_Force
  107. China’s Strategic Support Force: A Force for a New Era – Digital Commons @ NDU, accessed August 21, 2025, https://digitalcommons.ndu.edu/china-strategic-perspectives/6/
  108. Farewell to China’s Strategic Support Force. Let’s meet its replacements – Defense One, accessed August 21, 2025, https://www.defenseone.com/ideas/2024/04/farewell-chinas-strategic-support-force-lets-meet-its-replacement/396143/
  109. 专栏| 军事无禁区: 信息支援部队成立-解放军联合作战的开始 – Radio Free Asia, accessed August 21, 2025, https://www.rfa.org/mandarin/zhuanlan/junshiwujinqu/mil-04252024151006.html
  110. China Introduces People’s Liberation Army-Information Support Force | TRADOC G2 Operational Environment Enterprise, accessed August 21, 2025, https://oe.tradoc.army.mil/product/china-introduces-peoples-liberation-army-information-support-force/
  111. 中国人民解放军信息支援部队、军事航天部队和网络空间部队, accessed August 21, 2025, https://sgzz.lzre.edu.cn/info/1122/1429.htm
  112. Chinese information operations and information warfare – Wikipedia, accessed August 21, 2025, https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare
  113. 透析信息化特种作战发展趋势 – 国防部, accessed August 21, 2025, http://www.mod.gov.cn/gfbw/jmsd/4822682.html
  114. Glimpses Of China’s New Air Combat Drones Emerge Ahead Of Massive Military Parade, accessed August 21, 2025, https://www.twz.com/air/glimpses-of-chinas-new-air-combat-drones-emerge-ahead-of-massive-military-parade
  115. The PLA Marine Corps (PLANMC) by Lt Gen P R Shankar (R) – Gunners Shot, accessed August 21, 2025, https://gunnersshot.com/2024/01/18/the-pla-marine-corps-planmc-by-lt-gen-p-r-shankar-r/
  116. Is it true the Chinese SOFs act more like “shock troops” compared to other SOFs who conduct unconventional warfare? And why is that? : r/WarCollege – Reddit, accessed August 21, 2025, https://www.reddit.com/r/WarCollege/comments/s8w4hk/is_it_true_the_chinese_sofs_act_more_like_shock/
  117. 未来特种作战发展趋势前瞻 – 中国社会科学网, accessed August 21, 2025, https://www.cssn.cn/jsx/jsx_xwzx/202401/t20240112_5727928.shtml

Small Arms of the People’s Republic of China: A Technical and Strategic Assessment

The People’s Liberation Army (PLA) of the People’s Republic of China is currently executing the most comprehensive and technologically ambitious small arms modernization program in its history. This transformation is centered on the system-wide adoption of the QBZ-191 modular weapon family, a development that signifies a profound strategic and doctrinal evolution. The prevailing trend is a decisive pivot away from the isolated, proprietary, and ergonomically challenged designs of the past, most notably the bullpup QBZ-95 family. In its place, the PLA is embracing a design philosophy rooted in modularity, superior ergonomics, and the seamless integration of advanced electro-optics and accessories, aligning Chinese infantry weapons with global design paradigms for the first time.

This report provides a detailed technical and strategic assessment of the small arms currently in service across all branches of China’s armed forces, including the PLA Ground Force (PLAGF), Navy (PLAN), Air Force (PLAAF), the paramilitary People’s Armed Police (PAP), and the China Coast Guard (CCG). The analysis indicates that the current modernization is far more than a simple equipment upgrade. It is a direct reflection of a deeper doctrinal shift towards information-centric, combined-arms warfare, where the individual soldier is a networked sensor and shooter. The new generation of weapons is engineered to enhance the lethality, tactical flexibility, and operational sustainability of small units, empowering them to fight and win on a complex, multi-domain battlefield.

While the new QBZ-191 system is being prioritized for frontline combat units, a vast inventory of legacy weapons, including millions of QBZ-95 family rifles and a significant reserve of Type 81 rifles, remains in service. This demonstrates a pragmatic, tiered, and cost-conscious approach to modernization. Equipment is cascaded from elite units to second-line troops, reserves, and internal security forces, maximizing the combat effectiveness of the entire force structure within realistic fiscal and logistical constraints. This report will dissect each major weapon system, analyze its role within the PLA’s evolving doctrine, and provide a concluding assessment of China’s defense-industrial capacity and the future trajectory of its small arms development.

II. The New Generation: The QBZ-191 Modular Weapon System

The centerpiece of the PLA’s infantry modernization is the weapon family officially designated the QBZ-191. Its introduction marks a definitive break with the preceding generation of bullpup rifles and represents a wholesale adoption of contemporary, conventional rifle design principles. This shift is not merely stylistic; it is a fundamental realignment of the infantryman’s weapon with the demands of modern, informationized warfare.

This is a photo of a QBZ-191 taken at the 2021 China Airshow. Photo by: By Dan3031949 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=112466629

Core Design Philosophy and Doctrinal Shift

The QBZ-191 (191式自动步枪, 191 Shì Zìdòng Bùqiāng, Type 191 Automatic Rifle) family abandons the bullpup configuration of its QBZ-95 predecessor in favor of a conventional layout. Mechanically, it operates on a short-stroke gas piston and rotating bolt system, a mechanism renowned for its reliability and adopted by many of the world’s most advanced assault rifles, such as the Heckler & Koch HK416 and the FN SCAR. The weapon’s architecture includes features now considered standard for a modern military rifle: a multi-position adjustable stock, improved ergonomics for varied shooting positions, and fully ambidextrous controls, including the fire selector and magazine release.

The decision to abandon the bullpup layout, after investing heavily in it for over two decades with the QBZ-95, is the most telling aspect of the new design philosophy. The QBZ-95, while offering the benefit of a long barrel in a compact overall length, was plagued by inherent design flaws that became increasingly untenable. These included a notoriously heavy and imprecise trigger due to the long linkage from the trigger to the rear-mounted action, awkward magazine changes that required breaking a firing grip, and ejection ports located close to the user’s face, making off-hand shooting difficult. Most critically, however, the QBZ-95 was a product of a different doctrinal era.

The most significant physical feature of the QBZ-191, and the clearest indicator of the new doctrine, is its full-length, monolithic MIL-STD-1913 Picatinny rail along the top of the receiver and handguard. The QBZ-95 featured only a short, proprietary dovetail mount that was poorly suited for mounting anything other than a single, specific optic. The adoption of the universal Picatinny standard is a revolutionary step for the PLA. This rail provides ample space for the flexible mounting of a suite of accessories in various combinations—for example, a variable-power magnified optic paired with a clip-on thermal or night vision sight, a laser aiming module, and backup iron sights. This physical change is the direct consequence of a profound doctrinal evolution. The PLA no longer views advanced optics as specialist equipment for designated marksmen but as standard-issue equipment for the common infantryman. This signals a massive parallel investment in the domestic electro-optics industry and a fundamental shift in training methodology. The PLA is moving from an “iron sights first” mentality to an “optics first” doctrine, aiming to increase the effective engagement range, first-hit probability, and all-weather, day/night fighting capability of every soldier. This, in turn, enhances small-unit lethality, situational awareness, and autonomy on the battlefield.

Ammunition: The DBP-191 5.8x42mm Cartridge

The development of the QBZ-191 rifle is inextricably linked to the simultaneous development of a new generation of ammunition: the DBP-191 5.8x42mm cartridge. The weapon and the cartridge were designed as a single, integrated system, with each component optimized to enhance the performance of the other. This holistic approach is a hallmark of a mature and sophisticated research and development process.

The original 5.8x42mm cartridge, DBP-87, was developed in the 1980s and was a contemporary of the 5.56x45mm NATO and 5.45x39mm Soviet rounds. While adequate for its time, it and its successor, the DBP-10, lacked the performance of modern intermediate cartridges, particularly at extended ranges. The DBP-191 was specifically designed to overcome these deficiencies. It features a heavier, longer, and more streamlined projectile with a superior ballistic coefficient. This results in a flatter trajectory, reduced wind drift, and greater retained energy at medium and long ranges. The projectile construction includes a hardened steel core for improved penetration against body armor and light barriers.

In weapons design, the internal and external ballistics of the cartridge are the foundational elements that dictate critical design parameters of the rifle, including barrel length, rifling twist rate, gas system tuning, and the practical effective range of the platform. The PLA’s ordnance establishment clearly identified a performance deficit in its existing 5.8mm ammunition and understood that a new rifle alone could not solve the problem. By developing a new, higher-performance round and then engineering a family of weapons optimized to fire it, they have achieved a synergistic leap in capability. The superior performance of the DBP-191 cartridge is precisely what enables the Designated Marksman Rifle variant of the family, the QBU-191, to be effective out to ranges of 600-800 meters and what gives the standard QBZ-191 rifle a tangible performance advantage over its predecessor.

System Variants

The QBZ-191 was designed from the outset as a modular family of weapons, sharing a common receiver and operating mechanism, to fulfill multiple battlefield roles.

  • QBZ-191 (191式自动步枪, 191 Shì Zìdòng Bùqiāng, Type 191 Automatic Rifle): This is the standard infantry rifle and the core of the family. It features a 14.5-inch (368mm) barrel, providing a good balance between ballistic performance and maneuverability. It is slated to become the most widely issued variant, systematically replacing the QBZ-95-1 in frontline PLAGF combined arms brigades and PLAN Marine Corps units.
  • QBZ-192 (192式短自动步枪, 192 Shì Duǎn Zìdòng Bùqiāng, Type 192 Short Automatic Rifle): This is the compact carbine variant, equipped with a shorter 10.5-inch (267mm) barrel. The reduced length makes it ideal for personnel operating in confined spaces, such as vehicle crews, special forces conducting close-quarters battle (CQB), and naval personnel aboard ships. It serves the same role as the American Mk 18 or the Russian AK-105.
  • QBU-191 (191式精确射手步枪, 191 Shì Jīngquè Shèshǒu Bùqiāng, Type 191 Precision Marksman Rifle): This is the Designated Marksman Rifle (DMR) variant of the family. It is designed to provide accurate semi-automatic fire at the squad level beyond the effective range of standard assault rifles. It achieves this through a longer, heavier, free-floated barrel for enhanced accuracy and consistency, an improved trigger mechanism, and the standard issuance of a new 3-8.6x variable power magnified optic, the QMK-191. The QBU-191 is specifically designed to leverage the superior long-range ballistic performance of the new DBP-191 ammunition, enabling effective engagements out to 600-800 meters.
  • QJB-201 (201式班用机枪, 201 Shì Bānyòng Jīqiāng, Type 201 Squad Machine Gun): While not officially designated as part of the ‘191’ family, the QJB-201 is a new-generation 5.8x42mm light machine gun whose development was concurrent with and complementary to the QBZ-191 program. It is designed to replace the magazine-fed QJB-95-1 Squad Automatic Weapon. The most significant improvement is its switch to a belt-feed mechanism, allowing for a much higher volume of sustained suppressive fire. This addresses a major deficiency of its predecessor and provides PLA squads with a true light machine gun capability comparable to the FN Minimi/M249.

III. Prevalent Service Rifles and Carbines: The QBZ-95 Era

Despite the rollout of the QBZ-191, the incumbent QBZ-95 family of bullpup rifles remains the most numerous and widely distributed weapon system in the PLA’s inventory. Its vast numbers ensure that it will continue to see service for at least another decade, particularly with second-line units, reserves, and the People’s Armed Police, as the PLA undertakes its phased modernization.

QBZ-95/95-1 Family (95/95-1式枪族, 95/95-1 Shì Qiāngzú, Type 95/95-1 Gun Family)

Introduced in the late 1990s to coincide with the handover of Hong Kong, the QBZ-95 was a radical departure for the PLA. It was a gas-operated, bullpup rifle chambered for the then-new, domestically developed 5.8x42mm DBP-87 cartridge. This move represented a major technological leap, transitioning the PLA from its lineage of 7.62x39mm Kalashnikov-derived platforms (the Type 56 and Type 81) to a proprietary design utilizing a modern small-caliber, high-velocity round. The bullpup configuration, placing the action and magazine behind the trigger, allowed for a full-length 18.2-inch barrel in an overall package shorter than many carbines, a significant advantage for mechanized infantry.

Around 2010, an upgraded version, the QBZ-95-1, was introduced. This model addressed some of the original’s ergonomic flaws, most notably by relocating the safety selector from the rear of the stock to a more accessible position above the pistol grip. It also featured a heavier barrel and was chambered for the improved DBP-10 ammunition, which used a heavier projectile for better long-range performance.

The rapid and expensive decision by the PLA to abandon the entire bullpup concept after only one major upgrade suggests that the perceived flaws of the QBZ-95 were not minor but fundamental to its design. The platform’s legacy is therefore complex. It should not be viewed simply as a failed rifle, but rather as a crucial and necessary transitional system. The QBZ-95 project achieved its primary strategic objective: it forced the Chinese defense industry to master modern rifle manufacturing techniques, including the use of engineering polymers, and successfully introduced a proprietary small-caliber cartridge, breaking the PLA’s long-standing dependence on Soviet calibers and designs. In this, it was an unqualified success. Its secondary goal, to be a world-class fighting rifle, was only partially met. The institutional flexibility demonstrated by the PLA and Norinco in critically evaluating their own flagship product and making the bold decision to replace it entirely is a sign of a mature and pragmatic military-industrial complex, one that prioritizes combat capability over institutional prestige.

  • Variants in Service:
  • QBZ-95/95-1: The standard rifle variant. For two decades, it has been the primary individual weapon of the PLAGF, PAP, and other branches.
  • QBZ-95B/95B-1: A compact carbine version with a significantly shorter barrel. It has been used by special forces, vehicle crews, and naval boarding parties, but its utility was hampered by a severe muzzle blast, flash, and a significant reduction in projectile velocity and effective range.
  • QJB-95/95-1: The Squad Automatic Weapon (SAW) variant. It is essentially a heavy-barreled version of the rifle, designed to be fed from a 75-round drum magazine. While providing more sustained fire capability than a standard rifle, it is not a true light machine gun. It is prone to overheating during prolonged firing and lacks the advantages of a quick-change barrel or a belt-feed system.

Legacy Systems in Reserve/Second-Line Service

The Type 81 (81式自动步枪, 81 Shì Zìdòng Bùqiāng) rifle, a 7.62x39mm weapon system, continues to serve with reserve formations, militia units, and some border defense forces. The Type 81, while visually resembling the Kalashnikov, is a distinct design featuring a short-stroke gas piston system (unlike the AK’s long-stroke piston), which contributed to its improved accuracy over the Type 56 (a direct Chinese copy of the AK-47). It is a robust, reliable, and simple weapon that remains effective for its intended role.

Tyoe 81 Rifle. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=114962053

The continued presence of the Type 81 and the gradual displacement of the QBZ-95 is not an indication of logistical failure or economic hardship, but rather the product of a deliberate and cost-effective strategy of tiered modernization. Equipping the entirety of China’s massive armed forces—including millions of active duty personnel, PAP, and reservists—with the latest QBZ-191 system simultaneously is financially prohibitive and logistically unfeasible. Instead, the PLA employs a cascading procurement model. New QBZ-191 systems are fielded to high-readiness, frontline combat brigades. Their displaced QBZ-95-1 rifles are then refurbished and re-issued to second-line units, garrison troops, or the PAP. This pushes older but still serviceable weapons like the Type 81 further down the chain to reserve and militia units. This methodical approach maximizes the overall combat power of the force structure by ensuring that even lower-tier units receive upgraded equipment, all while managing the immense cost of a full-scale re-equipment program.

IV. Precision Fire Systems: From Marksman to Anti-Materiel

The PLA has made significant strides in developing and fielding a range of precision fire systems, recognizing the critical importance of engaging targets accurately at ranges beyond that of a standard service rifle. This capability area has evolved from rudimentary sniper rifles to a sophisticated ecosystem of designated marksman, bolt-action sniper, and heavy anti-materiel systems.

Designated Marksman Rifles (DMRs)

  • QBU-191: As detailed previously, the QBU-191 is the PLA’s newest DMR and represents the future of squad-level precision fire. It is being fielded as an integral part of the new modular weapon family.
  • QBU-88 (Type 88) (88式狙击步枪, 88 Shì Jūjí Bùqiāng, Type 88 Sniper Rifle): The QBU-88 was the PLA’s first purpose-built DMR, introduced alongside the QBZ-95 family. It is a semi-automatic, bullpup rifle chambered for the 5.8x42mm “heavy round” (a predecessor to the DBP-10). While officially designated a “sniper rifle,” its performance characteristics and intended role place it squarely in the DMR category. For its time, the QBU-88 was a revolutionary concept for the PLA, introducing the principle of a squad-level precision rifle. However, it is based on the QBZ-95 action and suffers from many of the same limitations, including poor ergonomics, a heavy trigger, and inadequate provisions for mounting modern optics. Its accuracy is considered adequate for its role but is surpassed by more modern designs. The QBU-88 is being actively replaced by the superior QBU-191.

Bolt-Action Sniper Rifles

  • CS/LR4 (and variants): The CS/LR4 represents a significant departure in PLA small arms procurement philosophy. It is a modern, high-precision bolt-action sniper rifle system chambered in 7.62x51mm NATO. This system, used by PLAGF special operations forces and elite PAP counter-terrorism units like the Snow Leopard Commando Unit, is a direct equivalent to Western precision rifles like the Remington M24 or Accuracy International Arctic Warfare.
One of the Norinco NSG-1 / CS-LR4 Sniper Rifles that China donated to the Philippine armed forces last June 2017. Photo taken during the Philippine Army’s 121st Anniversary Exhibit at the Bonifacio High Street Activity Center. By Rhk111 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=67238847

The adoption of a foreign, NATO-standard caliber for a premier sniper rifle is a highly revealing decision. It breaks with the PLA’s long-standing doctrine of logistical self-sufficiency and reliance on domestic calibers. This choice was not made lightly. It indicates that the performance requirements for high-precision, long-range sniping—specifically, consistent sub-Minute of Angle (MOA) accuracy—were so stringent that existing domestic cartridges, such as the 5.8mm or the legacy 7.62x54mmR, were deemed insufficient. The PLA’s ordnance experts and procurement officers made a pragmatic choice, recognizing that the global commercial and military ecosystem for high-quality, match-grade 7.62x51mm ammunition was far more mature and offered superior performance compared to any domestic equivalent. This prioritization of raw capability over logistical purity for a specialized, high-value role suggests a sophisticated, two-tiered approach to ammunition philosophy. For general-issue weapons, domestic calibers are paramount for strategic independence during a major conflict. For elite, special-purpose units where mission success hinges on the highest possible performance, they will adopt the best available global standard.

Anti-Materiel Rifles

  • QBU-10 (10式大口径狙击步枪, 10 Shì Dàkǒujìng Jūjí Bùqiāng, Type 10 Large-Caliber Sniper Rifle): The QBU-10 is a semi-automatic anti-materiel rifle chambered in the powerful 12.7x108mm cartridge, the Eastern Bloc equivalent of the.50 BMG. This is a heavy, team-served weapon, typically deployed on a tripod or mounted on a vehicle. Its purpose is to engage and destroy high-value materiel targets at very long ranges (up to 1,500 meters), such as light armored vehicles, radar and communications equipment, parked aircraft, and enemy personnel behind substantial cover. A key feature of the QBU-10 system is its sophisticated, integrated day/night optic, which reportedly incorporates a laser rangefinder and a ballistic computer to aid the gunner in achieving first-round hits at extreme distances. This weapon provides PLA infantry units with an organic capability to defeat targets that would otherwise require dedicated anti-tank guided missiles or heavier fire support, making it a key asset for long-range interdiction and battlefield dominance.
A Chinese marine holding a QBU-10 in a Ghillie Suit. By Mil.ru, CC BY 4.0, https://commons.wikimedia.org/w/index.php?curid=109882081

V. Sidearms and Close-Quarters Systems

This category includes weapons designed for personal defense, urban combat, and special operations, where compactness, rate of fire, and specialized capabilities like sound suppression are paramount. Recent developments in this area show a clear trend towards standardization on globally accepted calibers.

Pistols (手枪, Shǒuqiāng)

  • QSZ-92 (92式手枪, 92 Shì Shǒuqiāng, Type 92 Pistol): The QSZ-92 has been the standard service pistol for the PLA and PAP for over two decades. It is a polymer-framed, short-recoil-operated pistol. Uniquely, it was produced in two distinct caliber variants. The primary military version fires the proprietary 5.8x21mm DAP-92 armor-piercing cartridge, issued to officers and combat troops. A second version, chambered in the ubiquitous 9x19mm Parabellum, was produced primarily for PAP units and for export. The 5.8mm version was designed with the specific doctrinal goal of defeating enemy body armor, a concept shared by the Western FN 5.7x28mm. However, like its Western counterparts, the small-caliber pistol round concept has been widely criticized for having questionable terminal ballistics and stopping power against unarmored targets compared to larger, heavier conventional pistol rounds.
QSZ92 Pistol. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=62580963
  • QSZ-193 (193式手枪, 193 Shì Shǒuqiāng, Type 193 Pistol): The QSZ-193 is a new, compact, striker-fired pistol that has been observed in service with PLAAF pilots and special forces units. Crucially, it is chambered in 9x19mm Parabellum. The emergence of this new 9mm pistol as the apparent next-generation sidearm for specialized roles effectively signals the end of the PLA’s two-decade experiment with the 5.8x21mm pistol cartridge. The decision to standardize on the globally dominant 9x19mm caliber for its new sidearm indicates that the PLA has reached the same conclusion as many Western militaries: modern 9mm ammunition, particularly with advanced hollow-point or controlled-expansion projectiles, offers a superior overall balance of terminal performance, magazine capacity, and controllability, while the perceived advantage of armor penetration from small-caliber pistol rounds is marginal in most real-world scenarios.

Submachine Guns (冲锋枪, Chōngfēngqiāng)

  • QCQ-171 (171式冲锋枪, 171 Shì Chōngfēngqiāng, Type 171 Submachine Gun): A modern, lightweight submachine gun (SMG) chambered in 9x19mm, the QCQ-171 is being issued to special operations forces and other units with a specific requirement for a compact, high-rate-of-fire weapon for close-quarters combat. It features a telescopic stock, accessory rails for optics and lights, and appears to be a direct competitor to Western designs like the Heckler & Koch MP5 or B&T APC9.
  • QCW-05 (05式轻型冲锋枪, 05 Shì Qīngxíng Chōngfēngqiāng, Type 05 Light Submachine Gun): The QCW-05 is a unique bullpup SMG chambered in the proprietary 5.8x21mm pistol cartridge. Its most notable feature is its large, integral sound suppressor, which makes the weapon very quiet. It is fed from a 50-round, four-column “quad-stack” magazine located in the pistol grip. While effective in its niche role for stealth operations, it suffers from the same ballistic limitations as the QSZ-92 pistol in the same caliber. Its use is primarily confined to PLA special forces and PAP counter-terrorism units. The fielding of the 9mm QCQ-171 in many frontline SOF roles further reinforces the PLA’s strategic move away from the 5.8x21mm cartridge ecosystem.
QCW-5 Bullpup Submachine Gun. By Tyg728 – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=62566026

VI. Crew-Served and Support Weapons

These weapons provide sustained fire support at the platoon and company level, giving infantry units the ability to suppress and destroy enemy positions and light vehicles. This category includes machine guns and automatic grenade launchers.

Machine Guns (机枪, Jīqiāng)

  • QJY-88 (88式通用机枪, 88 Shì Tōngyòng Jīqiāng, Type 88 General Purpose Machine Gun): The QJY-88 was developed as the PLA’s first true General Purpose Machine Gun (GPMG), intended to be fired from a bipod in the light machine gun role or from a tripod in the sustained-fire medium machine gun role. It was designed to replace the aging 7.62x54mmR Type 67 machine gun. However, in a highly unusual design choice, the QJY-88 was chambered in the 5.8x42mm “heavy round”. This decision represents a rare doctrinal mismatch in PLA weapon development. The GPMG concept, epitomized by the German MG3, the American M240, and the Russian PKM, is predicated on the use of a full-power rifle cartridge (e.g., 7.62x51mm or 7.62x54mmR). These powerful rounds are essential for providing effective, long-range suppressive fire and for penetrating cover, light vehicles, and field fortifications. By chambering their GPMG in an intermediate cartridge, even a heavy-for-caliber one, the PLA created a weapon that lacked a significant performance advantage in range and barrier penetration over a modern squad automatic weapon, yet was heavier and more cumbersome. The weapon has been widely criticized as being underpowered for its intended role, and the notable lack of a clear successor suggests that the PLA is re-evaluating its entire machine gun doctrine.
  • QJZ-89 (89式重机枪, 89 Shì Zhòng Jīqiāng, Type 89 Heavy Machine Gun): The QJZ-89 is the PLA’s standard heavy machine gun (HMG), chambered in 12.7x108mm. Its most remarkable feature is its exceptionally low weight. At approximately 26 kg (57 lbs) for the gun and tripod combined, it is the lightest HMG in service anywhere in the world, weighing significantly less than the American M2 Browning or the Russian Kord. This light weight is achieved through the use of advanced alloys and a hybrid direct-impingement/short-stroke piston operating system. This makes it more man-portable than its peers, allowing infantry units to reposition it on the battlefield more rapidly. It is used in both tripod-mounted infantry support roles and as a primary or secondary armament on a wide variety of PLA vehicles.

Automatic Grenade Launchers (榴弹发射器, Liúdàn Fāshèqì)

  • QLZ-87/11 (87/11式榴弹发射器, 87/11 Shì Liúdàn Fāshèqì, Type 87/11 Grenade Launcher): The QLZ-87 is a 35mm automatic grenade launcher (AGL) that provides devastating anti-personnel and light anti-materiel fire support for infantry units. It is a selectively-fired weapon that can be fired from an integral bipod in a direct-fire role or from a tripod for indirect fire. It is fed from 6- or 15-round drum magazines. The newer QLZ-11 is a lightened and improved version of the design. The 35mm grenades provide a significant area-effect capability, allowing a small infantry unit to suppress and neutralize enemy troops in trenches, behind cover, or in the open at ranges out to 1,700 meters.

VII. Armament by Service Branch: A Comparative Analysis

While there is increasing standardization around the new QBZ-191 family, the specific small arms loadouts vary between the different branches of China’s armed forces, reflecting their unique operational requirements and mission sets.

PLA Ground Force (PLAGF) (中国人民解放军陆军, Zhōngguó Rénmín Jiěfàngjūn Lùjūn)

  • Standard Infantry: The PLAGF’s frontline combined arms brigades are at the forefront of the modernization effort. Standard infantry squads are actively transitioning from the QBZ-95-1 to the new QBZ-191 as their primary service rifle. A typical squad will be augmented with the QBU-191 for designated marksman duties and the new belt-fed QJB-201 as the squad’s light machine gun. Officers and vehicle crews are typically issued the QSZ-92 pistol for personal defense. Second-line and garrison units will continue to operate the QBZ-95-1 for the foreseeable future.
  • Special Operations Forces (SOF): PLAGF special forces are among the first to receive the full suite of new-generation weapons. They are likely to be fully equipped with the compact QBZ-192 carbine for its maneuverability in direct action missions. Their specialized inventory also includes the high-precision CS/LR4 bolt-action sniper rifle for long-range engagements and the new 9mm QCQ-171 SMG for suppressed, close-quarters operations.

PLA Navy (PLAN) (中国人民解放军海军, Zhōngguó Rénmín Jiěfàngjūn Hǎijūn)

  • Marines (海军陆战队, Hǎijūn Lùzhànduì): As an elite expeditionary force analogous to the USMC, the PLAN Marine Corps is receiving the QBZ-191 family concurrently with the PLAGF’s frontline units. Given their focus on amphibious assault, littoral operations, and potential urban warfare scenarios, the compact QBZ-192 carbine is expected to be a common issue weapon alongside the standard QBZ-191 rifle.
  • Shipboard Personnel: For general security, anti-piracy, and visit, board, search, and seizure (VBSS) operations, compactness is the key driver of weapon selection. Personnel were historically armed with the QBZ-95B carbine, but are now likely transitioning to the superior QBZ-192 carbine. The QSZ-92 pistol remains the standard sidearm.

PLA Air Force (PLAAF) (中国人民解放军空军, Zhōngguó Rénmín Jiěfàngjūn Kōngjūn)

  • Base Security/Ground Personnel: PLAAF ground personnel, such as those in airfield security units, are typically equipped with standard infantry rifles. They currently operate the QBZ-95-1 and will likely be among the later recipients of the QBZ-191 as production ramps up.
  • Pilots: Aircrew are issued compact weapons for survival and self-defense in the event of an ejection over hostile territory. This role was historically filled by machine pistols like the Type 80, but is now transitioning to the new, more reliable, and compact QSZ-193 pistol in 9x19mm.

People’s Armed Police (PAP) (中国人民武装警察部队, Zhōngguó Rénmín Wǔzhuāng Jǐngchá Bùduì)

The PAP is a massive paramilitary force responsible for internal security, counter-terrorism, and border control. Its armament reflects this dual law enforcement and military role.

  • Internal Security Units: The vast majority of PAP units, tasked with roles like riot control and guarding critical infrastructure, widely use the QBZ-95-1 rifle and the QSZ-92 pistol (often the 9mm version).
  • Counter-Terrorism Units: Elite PAP units, such as the Beijing-based Snow Leopard Commando Unit and various regional special police units, maintain a diverse and highly specialized inventory. Their requirements overlap significantly with military SOF but with a greater emphasis on surgical urban operations. They utilize the CS/LR4 sniper rifle for precision hostage rescue shots, both the integrally suppressed 5.8mm QCW-05 and the new 9mm QCQ-171 SMGs for close-quarters battle, and specialized tactical shotguns like the QBS-09 (09式军用霰弹枪, 09 Shì Jūnyòng Xiàndànqiāng, Type 09 Military Shotgun).

China Coast Guard (CCG) (中国海警局, Zhōngguó Hǎijǐng Jú)

As a paramilitary maritime law enforcement agency, the CCG’s armament is more standardized and focused on its mission set. Boarding teams are typically equipped with compact weapons suitable for use on ships, primarily the QBZ-95B carbine and the QSZ-92 pistol. Their cutters and larger vessels are armed with deck-mounted heavy machine guns and autocannons.

VIII. Concluding Analysis: Industrial Capacity and Future Trajectory

The ongoing modernization of the PLA’s small arms inventory reveals several key strategic trends and provides a clear indication of the capabilities of China’s domestic defense industry. The trajectory points towards a force that is rapidly closing the technological and doctrinal gap with leading Western militaries at the level of the individual soldier.

The analysis synthesizes four dominant trends. First is the primacy of modularity and optics integration, exemplified by the QBZ-191’s conventional layout and full-length Picatinny rail. Second is the shift towards a holistic, systems-based design approach, where the rifle, cartridge (DBP-191), and optic (QMK-191) are developed concurrently as an optimized package. Third is the pragmatic adoption of international standards, such as the MIL-STD-1913 rail and the 9x19mm pistol caliber, when they offer a clear performance advantage over proprietary solutions. Fourth is the implementation of a deliberate, cost-effective, tiered modernization strategy that maximizes the combat power of the entire force structure during a prolonged transition period.

The development and mass production of the QBZ-191 family is a testament to the maturity of China’s state-owned defense industry, primarily represented by the corporate giant Norinco. It demonstrates a sophisticated capability for rapid, clean-sheet design, the use of modern materials and manufacturing methods (such as advanced polymers for furniture and aluminum forgings and extrusions for receivers), and the large-scale production and integration of complex electro-optics. The ability to identify the doctrinal shortcomings of a previous flagship system (QBZ-95) and execute a complete and rapid course correction speaks to an agile and capability-focused industrial base.

Looking forward, the full replacement of the QBZ-95 family in all frontline PLAGF and PLAN Marine Corps units is likely to be completed within the next 5-10 years. Future development will likely focus on addressing remaining gaps in the PLA’s small arms portfolio. A high-priority area will likely be the development of a new GPMG, probably chambered in a full-power cartridge, to rectify the doctrinal and performance shortcomings of the 5.8mm QJY-88. Furthermore, the PLA will almost certainly continue the trend of integrating “smart” technologies into the infantry weapon system, including networked sights that can share data, integrated command and control links, and other technologies that further embed the individual soldier into a digital battlefield network. The overall trajectory is clear: China is committed to equipping its infantry with small arms systems that are not merely sufficient, but are technologically on par with, and in some cases potentially superior to, those of any potential adversary.

IX. Appendix: Comprehensive Small Arms Summary Table

The following table provides a consolidated, at-a-glance reference for the primary small arms systems currently in service with the armed forces of the People’s Republic of China.

CategoryChinese Designation (Hanzi)Pinyin RomanizationU.S. English Name/TranslationManufacturerCaliberOperating PrincipleWeight (Unloaded)Overall LengthPrimary Users
Service Rifle191式自动步枪191 Shì Zìdòng BùqiāngType 191 Automatic RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~3.25 kg~950 mm (stock extended)PLAGF, PLAN Marines
Carbine192式短自动步枪192 Shì Duǎn Zìdòng BùqiāngType 192 Short Automatic RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~3.0 kg~810 mm (stock extended)SOF, Vehicle Crews, PLAN
Service Rifle95-1式自动步枪95-1 Shì Zìdòng BùqiāngType 95-1 Automatic RifleNorinco State Arsenals5.8x42mm DBP-10Short-stroke gas piston, rotating bolt3.25 kg745 mmPLAGF, PAP, PLAN, PLAAF
Legacy Rifle81式自动步枪81 Shì Zìdòng BùqiāngType 81 Automatic RifleNorinco State Arsenals7.62x39mmShort-stroke gas piston, rotating bolt3.4 kg955 mm (fixed stock)PLA Reserve, Militia
Pistol92式手枪92 Shì ShǒuqiāngType 92 PistolNorinco State Arsenals5.8x21mm / 9x19mmShort recoil, rotating barrel0.76 kg190 mmPLA, PAP
Pistol193式手枪193 Shì ShǒuqiāngType 193 PistolNorinco State Arsenals9x19mmShort recoil, striker-firedN/A (Compact)N/A (Compact)PLAAF Pilots, SOF
SMG171式冲锋枪171 Shì ChōngfēngqiāngType 171 Submachine GunNorinco State Arsenals9x19mmBlowback~2.8 kg~690 mm (stock extended)SOF, PAP
SMG05式轻型冲锋枪05 Shì Qīngxíng ChōngfēngqiāngType 05 Light Submachine GunNorinco State Arsenals5.8x21mmBlowback, integrally suppressed2.2 kg500 mmSOF, PAP
DMR191式精确射手步枪191 Shì Jīngquè Shèshǒu BùqiāngType 191 Precision Marksman RifleNorinco State Arsenals5.8x42mm DBP-191Short-stroke gas piston, rotating bolt~4.5 kg (est.)~1100 mm (est.)PLAGF, PLAN Marines
DMR88式狙击步枪88 Shì Jūjí BùqiāngType 88 Sniper RifleNorinco State Arsenals5.8x42mm (Heavy)Short-stroke gas piston, rotating bolt4.1 kg920 mmPLAGF, PAP
Sniper RifleCS/LR4CS/LR4CS/LR4 High-Precision Sniper RifleNorinco State Arsenals7.62x51mm NATOBolt-action6.5 kg1100 mmPLAGF SOF, PAP CTU
Anti-Materiel10式大口径狙击步枪10 Shì Dàkǒujìng Jūjí BùqiāngType 10 Large-Caliber Sniper RifleNorinco State Arsenals12.7x108mmGas-operated, semi-automatic13.3 kg1380 mmPLAGF
LMG201式班用机枪201 Shì Bānyòng JīqiāngType 201 Squad Machine GunNorinco State Arsenals5.8x42mm DBP-191Gas-operated, belt-fed< 5 kg (est.)N/APLAGF
SAW95-1式班用机枪95-1 Shì Bānyòng JīqiāngType 95-1 Squad Machine GunNorinco State Arsenals5.8x42mm DBP-10Short-stroke gas piston, rotating bolt3.95 kg840 mmPLAGF, PAP
GPMG88式通用机枪88 Shì Tōngyòng JīqiāngType 88 General Purpose Machine GunNorinco State Arsenals5.8x42mm (Heavy)Gas-operated, belt-fed11.8 kg (gun & bipod)1150 mmPLAGF
HMG89式重机枪89 Shì Zhòng JīqiāngType 89 Heavy Machine GunNorinco State Arsenals12.7x108mmGas-operated, belt-fed17.5 kg (gun only)1192 mmPLAGF
AGL87/11式榴弹发射器87/11 Shì Liúdàn FāshèqìType 87/11 Grenade LauncherNorinco State Arsenals35x32mmSRBlowback, semi/full auto12 kg (gun & bipod)970 mmPLAGF


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly contribute towards our continued reporting, please visit our funding page.