
Military Strategy & War Concepts and Chinese Stratagems for War
Military Strategy in Modern Context
The business landscape operates as a theater of war — not in violence, but in the ruthless application of strategic thinking honed across millennia of conflict. Every tactical concept from arms races to scorched earth finds its analog in boardrooms, product launches, and competitive positioning. The principles endure because the underlying dynamics — resource allocation, positioning, deception, timing — transcend their original context.
Consider the arms race. What began as nuclear stockpiling between superpowers now manifests in talent acquisition wars between tech giants, feature escalation between software platforms, or the infrastructure buildout race among cloud providers. Amazon and Microsoft aren't accumulating weapons; they're accumulating data centers, engineering talent, and service capabilities in an escalating competition that follows identical strategic logic.
The brute force approach, refined in cybersecurity, reveals itself everywhere competitors exhaust all possibilities rather than seeking elegant solutions. Venture capital operates on brute force principles — deploy capital across hundreds of startups rather than perfectly predicting winners. Dating apps use brute force matching algorithms. Even Tesla's approach to full self-driving relies partly on brute force data collection from millions of vehicles.
Strategic Positioning and Power Dynamics
Punching above your weight becomes the startup playbook. David didn't defeat Goliath through superior resources — he changed the rules of engagement. Guerrilla tactics translate directly: focus on mobility, speed, and asymmetric advantages. Netflix punched above its weight against Blockbuster not through more retail locations, but by eliminating the need for locations entirely.
The choke point concept illuminates why certain companies command disproportionate power. TSMC controls semiconductor manufacturing. The Suez Canal controls global shipping. AWS controls cloud infrastructure. These aren't accidents — they're strategic positions that force competitors through controlled passages where superior numbers can't be brought to bear.
Potemkin villages proliferate in modern business. Startup pitch decks with impressive user metrics that don't translate to revenue. Corporate headquarters designed to project success while the company burns cash. Product demonstrations that showcase future capabilities as current ones. The modern equivalent includes everything from inflated social media metrics to carefully curated investor presentations that mask underlying operational challenges.
Tactical Applications
The zero-tolerance policy appears throughout organizational management and platform governance. Amazon's treatment of third-party sellers, Apple's App Store policies, and workplace harassment protocols all rely on clear, consistent enforcement. The effectiveness hinges entirely on follow-through — credibility collapses the moment exceptions are made for strategic partners or high-performers.
Carrot and stick approaches dominate everything from employee compensation (equity upside with vesting cliffs) to platform ecosystem management (revenue sharing with policy enforcement). Economic sanctions represent the geopolitical version, though their efficacy remains contentious. The key insight: both the reward and punishment must be significant enough to alter behavior.
Shock and awe translates to product launches designed to paralyze competitive response. Apple's iPhone introduction didn't just present a new phone — it redefined the entire category so completely that competitors spent years catching up rather than innovating ahead. The goal isn't incremental advantage but psychological dominance that destroys competitors' will to fight in the existing paradigm.
Defensive Strategies and Timing
Defense in depth manifests in diversified revenue streams, multiple product lines, and distributed operational capabilities. Amazon doesn't rely on e-commerce alone — it has AWS, advertising, logistics, content, and hardware. Each layer absorbs competitive attacks while the core business remains protected.
The Fabian strategy — avoiding direct confrontation while wearing down opponents — appears throughout long-term competitive positioning. Google didn't attack Microsoft's office suite directly; it offered free alternatives and waited for cloud adoption to shift the battlefield to its advantage. Tesla didn't compete with established automakers on traditional metrics; it waited for battery costs to decline and environmental regulations to tighten.
Fog of war explains why successful companies preserve optionality rather than committing to rigid long-term plans. The most successful strategies emerge from systematic experimentation and rapid adaptation rather than perfect initial planning. Amazon's evolution from bookstore to everything store to cloud provider exemplifies strategic flexibility in uncertain environments.
The Chinese Strategic Tradition
Ancient Chinese military philosophy codified deception, misdirection, and psychological warfare into systematic approaches that remain remarkably applicable. The 36 Stratagems represent perhaps the most comprehensive catalog of tactical thinking ever compiled, organizing approaches by strategic context and power dynamics.
Commanding Superiority
When operating from strength, the stratagems focus on maintaining and extending advantages through misdirection rather than brute force.
Deceive the heavens and cross the ocean requires acting openly while concealing true intentions. Facebook's acquisition strategy exemplifies this — publicly emphasizing connection and openness while systematically acquiring potential competitors. Instagram and WhatsApp weren't just product acquisitions; they were competitive moats disguised as platform expansion.
Besiege Wei to rescue Zhao targets what the enemy values most rather than their strongest points. When Netflix faced content licensing restrictions from studios, it didn't compete directly for existing content rights — it attacked the studios' distribution monopoly by creating original programming, forcing them to negotiate from weakness.
Kill with a borrowed sword leverages others' strength against your target. Microsoft's approach to mobile wasn't direct competition with iOS and Android — it was partnering with hardware manufacturers who resented Google's control and Apple's exclusivity. The borrowed sword was existing manufacturer frustration with platform dependencies.
Confrontation and Misdirection
Create something from nothing manifests in everything from startup valuations based on potential rather than current performance to marketing campaigns that create perceived scarcity around abundant products. The stratagem works by exploiting the gap between perception and reality — a gap that market dynamics often amplify rather than correct.
Hide a knife behind a smile appears throughout partnership strategies where cooperation masks competitive intent. Amazon's marketplace approach exemplifies this perfectly — helping third-party sellers reach customers while simultaneously gathering intelligence on successful products to compete against them directly.
Watch the fires burning from across the river describes the strategic patience that allowed companies like Uber to enter markets after initial players exhausted themselves establishing regulatory frameworks and consumer education. Rather than pioneering ride-sharing globally, Uber let local companies fight regulatory battles, then entered with superior capital and operational capabilities.
Attack and Exploitation
Lure the tiger off its mountain lair recognizes that direct confrontation against entrenched advantages rarely succeeds. The solution involves changing the battlefield to neutralize positional strength. Netflix didn't attack Blockbuster's retail network — it eliminated the need for retail entirely. Tesla didn't attack Detroit's manufacturing capabilities — it redefined what automotive manufacturing could become.
Stomp the grass to scare the snake uses provocative actions to reveal competitive responses and strategic priorities. Amazon's frequent acquisition rumors and patent applications serve this function — forcing competitors to reveal their defensive priorities and strategic concerns through their reactive behavior.
Remove the firewood from under the pot focuses on eliminating resource dependencies rather than attacking capabilities directly. Google's Chrome browser didn't initially compete with Internet Explorer on features — it attacked Microsoft's control over web standards and user data, gradually undermining the foundation of their browser dominance.
Desperate Situations
The final category addresses tactics for disadvantaged positions — the startup playbook, essentially.
The empty fort strategy requires projecting strength when actually vulnerable. Early-stage companies routinely employ this through impressive headquarters, high-profile advisory boards, and confident public statements that mask underlying resource constraints. The key insight: competitors often won't attack what appears strongly defended, even when appearances deceive.
Injure yourself to gain the enemy's trust manifests in strategic vulnerability that lulls competitors into complacency. Netflix's early content licensing deals appeared disadvantageous — paying high fees to studios for limited content libraries. This apparent weakness convinced studios that Netflix posed no long-term threat, providing time to build original content capabilities that eventually eliminated their dependence entirely.
If all else fails, retreat acknowledges that strategic withdrawal often preserves options better than futile resistance. Google+ shutdown, Facebook's declining teen usage, Amazon's mobile phone failure — successful companies routinely abandon unsuccessful initiatives to redeploy resources more effectively. The stratagem recognizes that temporary defeat often enables ultimate victory.
Integration and Application
These frameworks share common principles: the importance of positioning over resources, timing over capability, and psychology over pure logical analysis. They recognize that competitive advantage often derives from superior strategic thinking rather than superior operational execution.
The most sophisticated practitioners combine multiple approaches simultaneously. Amazon's market entry strategy employs several stratagems concurrently — hiding true intentions behind customer obsession rhetoric, using regulatory compliance as a borrowed sword against competitors, and maintaining defensive depth across multiple business lines while systematically attacking adjacent markets.
The enduring relevance of these concepts suggests that competitive dynamics follow predictable patterns regardless of technological or social context. Understanding these patterns provides framework for both recognizing competitive threats and developing effective responses. The businesses that master these principles don't just compete more effectively — they often redefine the competitive landscape entirely, forcing others to react within frameworks of their choosing.