China’s Military Strategy: Basic Conceptsand Examples of its Use (Timothy L. Thomas)

(Click image to download book.)


Chinese retired Lieutenant General Li Jijun noted in 2006 that, from the vantage point of the People’s Liberation Army (PLA), “Therefore, in war direction, understanding the adversary’s ideological culture and strategic thinking method is as important as finding out the adversary’s military deployment.” This book seeks to address the concept of China’s military strategy in order to help US analysts better understand PLA motives and intent. While the People’s Republic of China (PRC) is not an enemy, it has developed into a powerful competitor worthy of closer examination. If we (the US) are to follow the advice of PLA analysts, and do what they are doing, then we should be using peacetime to contemplate how their strategic thought is developed and implemented. Keeping a finger on the pulse of the PLA’s thought process as it proceeds with confidence (and some degree of arrogance) into the second decade of the 21st century will allow the US to assess the probable direction (or uncover purposeful misdirection) inherent in PLA strategy. Accordingly, any required adjustments to US military strategy can be formulated.  The analysis merely suggests a way of considering or thinking about PLA strategy and not necessarily the way. The discussion and conclusions are almost solely based on the use of translated Chinese documents and, as such, attempt to offer a purely Chinese perspective on the content, goals, and implementation of strategy.


Three Faces of the Cyber Dragon: Cyber Peace Activist, Spook, Attacker (Timothy L. Thomas)

(Click image to download book.)


China’s cyber policy has become partly visible to foreign nations through observation, tracking, and inference. The policy appears to have three vectors. The first vector is in the public opinion or “soft power” arena, where China professes to be led by a policy of active defense and cooperation with other nations over cyber issues. The second and most prominent vector is China’s exhibited capability to conduct strong and stealthy intelligence and reconnaissance activities against nation’s worldwide, using the guise of anonymity to hide these efforts. The third vector is the offensive character of China’s cyber strategy. It contains the theoretical backing for preemptive cyber operations against other nations in times of crisis. These three aspects—peace activist, espionage activist, and attack planner—dominate China’s cyber policy. Some are always hidden from view while others are demonstrated daily. Three Faces of the Cyber Dragon is divided into sections that coincide with these vectors.


Fangs of the Lone Wolf: Chechen Tactics in the Russian-Chechen Wars, 1994-2009 (Dodge Billingsley with Dr. Lester Grau)

(Click image to download book.)


Books on guerrilla war are seldom written from the tactical perspective and from the guerrilla’s perspective. Fangs of the Lone Wolf: is an exception. These are the stories of low-level guerrilla combat as told by the survivors. They cover fighting from the cities of Grozny and Argun to the villages of Bamut and Serzhen-yurt, and finally the hills, river valleys and mountains that make up so much of Chechnya. Dodge Billingsley, the primary author was embedded with Chechen guerrilla forces after the first war, so he knows the country, the culture, the key actors and the conflict. Yet, as a Western outsider, he is able to maintain perspective and objectivity. He traveled extensively to interview Chechen former combatants who are now in hiding or on the run from Russian retribution and justice. Commissioned by the USMC, the military professional will appreciate the book’s crisp narration, organization by type of combat, accurate color maps and insightful analysis and commentary. The book is organized into vignettes that provide insight on the nature of both Chechen and Russian tactics utilized during the two wars. The vignettes show the chronic problem of guerrilla logistics, the necessity of fighting positions, the value of the correct use of terrain and the price paid in individual discipline and unit cohesion when guerrillas are not bound by a military code and law. Guerrilla warfare is probably as old as man, but has been overshadowed by maneuver war by modern armies and recent developments in the technology of war. Fangs of the Lone Wolf provides a unique insight into what is becoming modern and future war.


Recasting the Red Star: Russia Forges Tradition and Technology Through Toughness (Timothy L. Thomas)

(Click image to download book.)


Recasting the Red Star describes Russia’s modernization effort in a comprehensive fashion. The Defense Ministry’s military reform effort and the operational environment implied in Russia’s national security strategy (2009) and military doctrine (2010) are described. The Soviet culture of military thought is examined to include a short history of Tsarist and Soviet military traditions. These chapters serve as a reference point for the traditions behind Russia’s modernization effort. Next the author examines technological developments, such as Russia’s concept of high-technology deception, information war, reconnaissance- and information-strike systems (a C4ISR equivalent), and resulting future war construct. Finally, the book closely examines the Russian-Georgian conflict of August 2008. These chapters question why Russia and Georgia went to war, how information warfare figured into the conflict, and, most important of all, “who set the bear trap.”


Mountain Warfare and Other Lofty Problems: Foreign Perspectives on High-Altitude Combat (Les Grau and Charles Bartles)

(Click image to download book.)


There is long history of writings on mountain combat that include such luminaries as Clausewitz and Engels. Yet the allied force in Afghanistan frequently displayed a reluctance to go and remain in the mountains. Les Grau has been writing on mountain combat before the US invasion of Afghanistan. During a trip to Afghanistan, Les and Chuck Bartles decided to do a book on foreign perspectives of mountain combat. Their goal was to share this information with units deploying to Afghanistan and mountain training centers. This book is a collection of foreign articles and foreign source-based articles on mountain operations, tactics, movement, maneuver, training, artillery and aviation support, reconnaissance, communications and logistics. This book is not US Army doctrine, rather it offers alternative views to help forces adapt to a challenging environment and carry out their mission.


Passing It On: Fighting the Pushtun on Afghanistan’s Frontiers (General Sir Andrew Skeen. Les Grau and Robert Baer)

(Click image to download book.)


This is a reproduction of a 1932 book published by General Skeen, who began fighting the Pushtun in 1897. His military career took him to fighting Boxers in China, the “Mad Mullah” in Somaliland and Germans on the Western Front of World War I. He always returned to British India where fighting the fractious Pushtun continued to be a problem. He was a brigade commander during the Third-Anglo-Afghan War, commanded the Kohat-Kurran field force and fought in the Waziristan campaign. He commanded the Northwest Frontier District and in 1924-1928, served as the Chief of Staff of the Indian Army. He knew the Pushtun and frontier fighting better than almost any other British officer. He wrote this book as a guide for company-grade officers fighting the Pushtun. Les Grau had read General Skeen’s book during the Soviet-Afghan War and, after the United States invaded Afghanistan, decided that this would be a welcome addition to the field libraries of allied commanders who were fighting the Taliban-who are ethnic Pashtun. Les and Bob Baer added copious footnotes to General Skeen’s work to explain the “Britishisms” and terms and concepts. They also wrote an introduction to explain the history, context, geography and application of Skeen’s classic work.


Property & Peace: Insurgency, Strategy, and the Statute of Frauds (Geoff Demarest)

(Click image to download book.)


This book argues that the quality of foreign real property systems be made a priority issue in US diplomatic, military and intelligence thinking and strategy. The text does not argue that creating better land records will assure peaceful coexistence. Formal real property record systems correlate with peaceful societies, but the principle assertion here is in the negative. Even with formal records, functioning property courts, and a free and fluid market in land a place may still suffer violent dissention. However, a polity that does not formalize ownership rights and duties, especially rights and duties related to land, will not enjoy peace. Comprehensive, precise, transparent expression of real property is a necessary precondition of peace; places outside the lines of formal property necessarily slump toward possession by force. From this assertion others follow that bear on the way global security is pursued.


The Dragon’s Quantum Leap: Transforming from a Mechanized to an Informatized Force (Timothy L. Thomas)

(Click image to download book.)


Chinese observations of warfare in the information age have resulted in a widespread transformation and metamorphosis of the People’s Liberation Army (PLA) from a mechanized to an informatized force. This transformation has affected nearly every aspect of China’s military from strategy to logistics to educational development.The Dragon’s Quantum Leap intends to peel back the transformation process and uncover the impact of new modes of thought on several key segments of military development (culture, stratagems, crisis management, deception, and reconnaissance among other elements) that digital-age thought is affecting. It expands the scope but not the basic theoretical theme of the author’s two previous works on Chinese information warfare concepts. They were Dragon Bytes, which covered Chinese IW activities from 1999-2003; and Decoding the Virtual Dragon, which covered Chinese IW activities from 2003-2006. The Dragon’s Quantum Leap updates these concepts and activities to mid-2009 and completes the author’s trilogy on the topic. As with the author’s previous works, this book primarily uses original Chinese source material.


Future War (Makhmut Gareev and Vladimir Slipchenko)

(Click image to download book.)


In 2005, the Foreign Military Studies Office hosted a unique conference featuring two of Russia’s premier military thinkers, who provided their thoughts on the nature of future war. This publication is the bilateral, agreed-upon transcript of the lectures which answer the same question.  Major General Vladimir Slipchenko addresses the question “For what Kind of War Must Russia Be Prepared?” His observations capture technical and military-strategic context.  Army General Makhmut Gareev gives a historical and ideological perspective of “Russia in the Wars of the 20th Century.”  The introduction of these conference notes was authored by the Foreign Military Studies Office’s Director and moderator of the conference at that time, Dr. Jacob W. Kipp.  Slipchenko and Gareev’s comments here represent early insights and perspectives provided directly to their US military counterparts and remain foundational voices in Russian military science.


Decoding the Virtual Dragon: Critical Evolutions in the Science and Philosophy of China’s Information Operations and Military Strategy (Timothy L. Thomas)

(Click image to download book.)


This book expands upon Dragon Bytes, the author’s earlier work on Chinese information warfare (IW) activities from 1999-2003. Decoding the Virtual Dragon explains how Chinese IW concepts since 2003 fit into the strategic outlook, practices, and activities of the People’s Liberation Army (PLA). The book offers IW explanations directly from the pens of Chinese experts. There are few intermediate filters. In some cases direct translations of key Chinese terms are offered. The Chinese authors discuss the application or relation of IW to strategic thought, the transformation plans of the People’s Liberation Army (PLA), the revolution in military affairs (RMA), and the revolution in knowledge warfare and cognition. The book thus serves as a source for the fundamentals of Chinese military thought and demonstrates how IW/IO has been integrated into the art of war and strategy.