{"id":15388,"date":"2016-05-18T20:00:34","date_gmt":"2016-05-19T01:00:34","guid":{"rendered":"http:\/\/hcstx.org\/?p=15388"},"modified":"2016-05-18T20:00:34","modified_gmt":"2016-05-19T01:00:34","slug":"military-defense-news-latest-insights-into-chinese-military-tech","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/05\/18\/military-defense-news-latest-insights-into-chinese-military-tech\/","title":{"rendered":"Military Defense News: Latest Insights Into Chinese Military Tech"},"content":{"rendered":"<p class=\"selectionShareable\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-15389\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/05\/pla_report.jpg?w=620\" alt=\"PLA_Report\" width=\"620\" height=\"344\" \/><\/p>\n<p class=\"selectionShareable\">It\u2019s that time of year again, and the end of an era. On Friday, the Obama Administration released the <a href=\"http:\/\/www.andrewerickson.com\/2016\/05\/key-quotes-data-themes-from-2016-u-s-department-of-defense-report-on-chinas-military-security-developments\/\">last annual Pentagon China report under its watch<\/a>. Working the China military observers\u2019 graveyard shift this weekend, I published analyses of the report\u2019s <a href=\"http:\/\/blogs.wsj.com\/chinarealtime\/2016\/05\/15\/pentagon-report-aims-to-lay-out-chinese-military-goals\/\">overall content<\/a>, and its <a href=\"http:\/\/nationalinterest.org\/feature\/the-pentagons-2016-china-military-report-what-you-need-know-16209\">key omissions<\/a> \u2014 namely, any mention whatsoever of\u00a0<a href=\"http:\/\/www.andrewerickson.com\/2016\/05\/from-frontier-to-frontline-tanmen-maritime-militias-leading-role-part-2\/\">China\u2019s maritime militia<\/a> of \u201c<a href=\"http:\/\/amti.csis.org\/directing-chinas-little-blue-men-uncovering-the-maritime-militia-command-structure\/\">little blue men<\/a>\u201d trolling for territorial claims. Here, I\u2019ll focus on the report\u2019s greatest comparative advantage: insights concerning Beijing\u2019s military technology and its applications that no other public source offers with such official backing or reliable details.<\/p>\n<p class=\"selectionShareable\"><strong>Defense Industrial Dynamics<\/strong><\/p>\n<p class=\"selectionShareable\">The Pentagon\u2019s report offers extensive coverage of China\u2019s defense-industrial sector, including key policies and trends. Beijing clearly seeks a comprehensive indigenous defense industrial base, with strong commercial underpinnings. To that end, it is launching its third major round of post-Cold War reforms. Informed by extensive policy documents and a hierarchy of priority subjects, Beijing is funding extensive research, development, and acquisition throughout its sprawling defense industry and related organizations. Emphases include the widespread Chinese approach of civil-military integration and acquiring foreign technology by any means necessary \u2014 including extensive cyber and human espionage \u2014 while absorbing it and developing indigenous technology and systems in parallel. Characteristic of President Xi Jinping\u2019s structural reform efforts more generally, a new high-level advisory body will oversee these efforts: the Strategic Committee of Science, Technology, and Industry Development for National Defense. One indication of progress: $15 billion in arms export agreements signed between 2010 and 2014.<\/p>\n<p class=\"selectionShareable\">This systematic explication enhances the credibility and utility of the 145-page report. But what most of its most avid consumers really want to know is: How good is the military hardware that China can produce? And how do performance parameters and quality vary by type of weapon system? It is in the totality of such information that the report really shines.<\/p>\n<p class=\"selectionShareable\">However, in meeting its obligations to Congress, and, by extension, the public, the Pentagon\u2019s annual report had to address a wide range of disparate issues concerning Chinese military and security development. It had to do so in a format largely shaped by its previous <a href=\"http:\/\/www.andrewerickson.com\/2016\/05\/u-s-department-of-defense-annual-reports-to-congress-on-chinas-military-power-2002-16-download-complete-set-here\/\">14 iterations<\/a>. Allow me, therefore, to summarize and reconfigure its key findings to best address these pressing questions. I have worked here to distill insights into just how good various types of Chinese military hardware have become.<\/p>\n<p class=\"selectionShareable\">Read the Remainder at <strong><a href=\"http:\/\/warontherocks.com\/2016\/05\/how-good-are-they-the-latest-insights-into-chinas-military-tech\/\">War on the Rocks<\/a><\/strong><\/p>\n<p class=\"selectionShareable\"><b>\u00a0<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s that time of year again, and the end of an era. On Friday, the Obama Administration released the last annual Pentagon China report under its watch. Working the China military observers\u2019 graveyard shift this weekend, I published analyses of the report\u2019s overall content, and its key omissions \u2014 namely, any mention whatsoever of\u00a0China\u2019s maritime&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[3449,74,4479,4333,5429,2820,65,1898],"tags":[11731,11732,11733,1567],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/15388"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=15388"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/15388\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=15388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=15388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=15388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}