China Military Review of US Cyberspace Development Strategy // 中國軍事美國網絡空間發展戰略述評

中國軍事美國網絡空間發展戰略述評

发布日期: 2015 – 10 – 15

中國軍方人士

With the dependence on cyberspace continues to improve, the US cyberspace security into national security strategy category, has promulgated the “Cyberspace Policy Assessment”, “Cyberspace International Strategy”, “cyberspace operations strategy” and a series of policy file, accelerate the construction of cyberspace security strategy system, vigorously strengthen the network combat forces, to achieve hegemony in cyberspace control. April 2015, the US Department of Defense has issued “Cyberspace Strategy” (hereinafter referred to as “the new cyber strategy”) summary, for the first time publicly that the cyberspace operations as one of the options for future tactical military conflict that the United States has exceeded the network space combat preparation system, weapons and equipment, and a series of joint integration bottlenecks, forming an effective mode of network attack and defense, has all the ability to launch cyber war.

  First, the US Cyberspace Strategy Evolution
  Cyberspace security strategy of the United States began in the late 20th century, at the Clinton and the Bush administration has been further strengthened and developed, eventually forming a “national strategy for cyberspace security.” Since 2009, the Obama administration has issued a series of strategic documents for the United States constructed a three-dimensional network security strategy system, international politics and international security situation had a significant impact.
  (A) in the Clinton and the Bush administration, cyberspace into context of US national security strategy, issued its first “cyberspace national strategy.”
  The Clinton administration information industry as an emerging pillar industries and vigorously support, promote the rapid development of the Internet, but also to the United States to rely on the network rose to an unprecedented degree, the information industry has become the largest industry in 1995 – growth in the US economy during 1998 The actual contribution rate of more than 35%. Published by the end of 1999, “US National Security Strategy Report” for the first time defined the US cyberspace security interests that network security threats to US national security posed challenges presented initial ideas to prevent security risks of cyberspace through international cooperation and other means. In early 2000 the introduction of “defending America’s cyberspace – to protect the national information system plan”, became the first programmatic document of the United States to maintain network security space. Release of this document is another important motivation is the US government tried to develop new rules of the game, to ensure American power distribution of wealth in cyberspace, to build a strong, growing and innovative US economy.[12]
  The Bush administration since the “September 11” incident, the United States has changed the concept of security, network spatial development strategy adjustment from “development priority” to “Security First”, and promulgated the “National Cyberspace Security Strategy” in 2003. The strategy identifies strategic position cyberspace security, cyberspace is defined as “to ensure the nation’s critical infrastructure properly functioning ‘nervous system’ and the national control systems,” the security situation in cyberspace to make a new judgment, that the new situation combined with the hostile forces of terror and information technology to pose a serious threat to US national security, will clearly improve cyberspace security to national security strategic level. “US National Security Strategy,” the strategy report issued in 2002, “Homeland Security National Strategy” and other reports, constituted after the “9.11” incident the new US national security strategy system. [12]
  (B) The Obama administration efforts to build US cyberspace security strategy stereo system, and actively seek a higher degree of cyberspace world hegemony, to ensure that the three core interests prosperity, security, the US government values ​​determined in cyberspace
  President Obama took office, started the 60-day cyberspace security assessment, and in May 2009, issued a “cyberspace policy review.” In the report published ceremony, Obama delivered an important speech entitled “to protect the American network infrastructure”, specifies the development of new national cyberspace security strategy, led by the National Security Council, the integrated use of diplomatic, military, economic, intelligence and law enforcement “four in one” means ensuring security in cyberspace, so that the strategic concept of cyberspace Obama administration’s horizon.
  1, cyberspace security threats as an excuse to network infrastructure as a national strategic asset, by all means to protect the security of cyberspace
  US cyberspace strategy document, the threat is the highest frequency vocabulary appears. The United States believes in cyberspace Chiang Kai-shek himself facing a new invisible smoke of war, and has been at a disadvantage, worried about the future possible outbreak of “Network Pearl Harbor” or “medium” 9/11 “incident [10]. To this end, Obama came to power after repeatedly stressed, should the network security as part of national security strategy, the network infrastructure will be increased to protect national strategic asset. March 2009, the US Center for Strategic and International Studies, submitted to “ensure the new presidency cyberspace” first report’s recommendations is that the network is an important wealth of the country, “the United States will not hesitate to use all means of national power ensuring security in cyberspace. issued “cyberspace policy assessment report” in May 2009 that day, Obama said in a speech, cyber threats are “one of the most serious challenges to US economic and national security faced” network infrastructure will be regarded as a strategic national facility “to protect the facility will become a national security priority issue.” We can say that all US cyberspace strategy and policy documents are as a starting point.
  2, to improve leadership and command system as the focal point, accelerate the construction of cyberspace deterrence systems and to build capacity-building network attacks.
  Obama believes the US government cyberspace security agencies there strategic center of gravity is unknown, job functions overlap, lack of coordination and other issues, it is necessary to implement the leadership from the top, the overall coordination of network security mechanism. May 2009, the White House announced the formation of cyberspace security office, the president is responsible for the policy decision to provide cyberspace security, coordinate government policies and activities. A month later, the Defense Department announced the creation of Cyberspace Command, responsible for coordinating the US military deployment strategy and network security, unified US military command network warfare, network warfare forces to enter the United States so that harmonized development of the “fast track.” Thus, the United States to create an integrated and comprehensive national cybersecurity leadership system. Published in July 2011, “cyberspace operations strategy”, as the United States Department of Defense first report on cyberspace operations and comprehensive strategy to more effectively carry out military operations in cyberspace provides guidelines and a roadmap, marking the US military operations in cyberspace who has been officially transferred deployment and implementation phase. In 2012, US National Cyber ​​Range officially delivered military trial. In 2013, the United States Cyber ​​Command expanded from 900 people to 4900 people, announced the expansion of 40 network warfare units within three years. 2014, the US Department of Defense released the “Quadrennial Defense Review Report,” clearly put forward the “expansion of investment in new network capabilities, network building 133 task force.” It is noteworthy that from 2013 to the year 2014, the US declared war forces expansion of the network more than three times. Meanwhile, the US also increased efforts to carry out research and development of cyber weapons, arms only reached 2,000 kinds of viruses, and has already entered the US Weapon series. This series of actions that the objective to reach the US military in cyberspace than just ensure its own security in cyberspace, but to build a network to enhance deterrence system through cyberspace attack, towards the consolidation of its “system net power” in cyberspace . [2]
  3, in order to emphasize international cooperation in cyberspace as a means to change and influence the political system and values ​​of other countries, and strive to maintain US hegemony
  In May 2011 the United States issued “Cyberspace International Strategy”, the first time its foreign policy goals combined with cyberspace strategy, marking its focus has been disclosed by the ball itself will be extended to the entire range, while its output cyberspace has become an American an important platform for political models and values. Former Defense Secretary Robert Gates has publicly declared that the network is a “huge strategic American assets in favor of other countries to help promote democracy.” Since then the Department of Defense issued “cyberspace operations strategy” is the introduction of “collective defense” concept, showing the United States to establish a new military alliance in cyberspace intent. Obama Government has been changed over the years, the United States resisted, highly publicized international cooperation in cyberspace, partly because it recognizes that even a superpower like the United States, can not single-handedly solve the problems exist in cyberspace and, more importantly, the United States wants to use its strong network resources, through international action in cyberspace cyberspace control global leadership development, change and affect the political system and values ​​of other countries, to consolidate its hegemony in cyberspace . [4]
  Second, the US Department of Defense the main features of the new cyber strategy
  April 2015, the new cyber strategy US Department of Defense released a continuation of the Obama administration’s strategic vision of cyberspace, for the first time publicly that one should cyberwarfare as a future military conflict tactical options, an explicit proposal to improve cyberspace deterrence and offensive capability, put on active defense and deterrence posture initiative, reflects the next few years, the US space power network construction and distinctive features of related actions, highlighting the US attempts to dominate in cyberspace.
  (A) exaggerated the threat facing the United States in cyberspace, cyberspace has continued to spread fear destruction, wanton shaping cyberspace at the national level enemy
  The new cyber strategy with a larger strategic context described space, repeatedly stressed that the United States risks inherent in cyberspace environment, deliberately exaggerating the threat of cyberspace activities faced constantly looking for new threats, new enemy is the United States to shape the mindset of decision logic and tradition dictates . In the strategy paper publicly available, the “risk” and “threat” were two words appear up to 31 times and 46 times, claiming that the new cyber strategy risks and threats from both the basic structure of the Internet’s inherent ability to handle risks, but also from the interests of the enemies of the United States coveted American networks, systems and data intrusion and malicious damage. The new cyber strategy will be mainly determined by the previous target to prevent extremist network technology and combined adjusted to focus on the national level opponent, Russia, China, Iran, North Korea and other countries as the United States may constitute a threat to the network [1]. These presets national level opponents, both in order to show the necessity of the introduction of the new cyber strategy, but also the threat of the proliferation of network attacks fear of public opinion, and thus eliminate barriers for “Snowden” event generated between the private sector and , dilute the new cyber strategies on social interests and personal privacy violations, to further consolidate public support for DoD and government policies. This judgment with ideological bias and arbitrariness, high-handed and is a very dangerous act. In fact, the United States ahead of the field of security in cyberspace, no one country can be formed a fundamental threat to the United States.
  (B) expressly DoD cyberspace strategic tasks and objectives, publicly cyberspace operations as a future military conflict tactical options, highlighting the US military in cyberspace deterrence and offensive posture.
  The new cyber strategy identifies the Department of Defense “three major tasks” and “five strategic objectives,” first proposed to launch a cyber attack when US national interests are threatened, and asked the US Department of Defense “Developing viable network options into the DoD term plan “for the US president or secretary of defense to provide” full spectrum “of options, when it comes to their national interest to make a variety of decisions.Compared with 2011 the first release version of cyberspace emphasize defensive action by the major network security operations to “offensive action network” changes, and the new cyber strategy frequent word “deterrence”, a total appears 29 times, that the United States has gradually freedom “with precision-guided physical damage to cope with asymmetric means to deal with cyber attacks” on US deterrence into network attacks to protect US national cybersecurity strategy, squeezing US major strategic competitors cyberspace policy choices available. At the same time, the new cyber strategy first proposed holding cyberspace operations as a tactical option, option to control the use of network operations escalation of the conflict, create conflict environment. Visible, the new cyber strategy has been the traditional means of fighting the physical space and virtual cyberspace means of integration, clearly convey to the world the determination of the American retaliation and sufficient network capacity to implement retaliation, far beyond the active defense category, highlighting the United States will protect cyberspace, attacks and confrontation blend of deterrence and offensive posture. [1] [8]
  (Iii) strengthen the integration with traditional combat power, build a comprehensive system of joint operations, with the power to launch cyber warfare system
  US military cyberspace operations following the fifth field of land, sea, air, space after the new cyber cyberspace operations strategy requires the option into the Defense Department plans to ensure that all areas of military operations in cyberspace and physical space Action Action coordinated. The new cyber strategy proposed to mobilize all forces, build a comprehensive system of joint operations, including the Ministry of Defence led government departments, between government and enterprises and international concerted action. The new cyber strategy breakthrough in Cyberspace “civil-military separation” trend strategy, Cyberspace Command, National Security Agency, the organic integration of the Central Security Agency, the Ministry of Defence is responsible for network forces combat training and guidance to the intelligence network functions and network operations functions are distinguished by the Defense Department-led combat troops network. One important goal of the new cyber strategy is to build a 2018 offensive and defensive, flexible forms of cyberspace forces, including 133 teams from the 6200 Department of Defense and the military soldiers, civilian and contract employees and other components. Among them, 13 responsible for the national infrastructure network protection mandate national task forces and eight country support teams; 27 to assume the task of attacking the enemy’s network operations task force and 17 combat support units; 68 responsible for the protection of the United States Department of Defense and the military network protection force network and system security tasks. These actions show that the US military has been resolved cyberspace warfare establishment system, apparatus and equipment, and a series of joint integration bottlenecks, explore the formation of an effective mode of generating combat capabilities of network attack and defense, with the power to launch cyber warfare system. [7]
  (Iv) continue to strengthen basic research and applied research, consolidate US leadership in the world in the field of network information for its dominate cyberspace to provide technical support.
  For a long time, the US military has the advantage of science and technology as an important part of the national security strategy, and always will be technological innovation as the key to maintaining US military strength and capacity. As a network of information technology and the birthplace of the leader, the United States Department of Defense to maintain and expand the leading edge technologies that will continue to strengthen basic research and applied research, technology continues to improve deterrence and offensive capabilities in cyberspace. The new cyber strategy proposed, the Defense Department must build and command and control systems to increase investment, continues to accelerate technological innovation in the field of cyberspace, vigorously carry out research and development with significant advantages over the technology, focusing on staff training to improve cyberspace, effective organization basic research and applied research capacity for action needed to fully develop the required DoD cyberspace capabilities. In recent years, the United States looks to shape the full spectrum cyberspace operations capability can cope with all types of threats in the successful development of “chute”, “Fire” and “shock web” more than 2,000 kinds of network warfare weapons on the basis of increasing network space war frontier technology investment, and actively develop a new generation of network technology and virtual battlefield assault weapons, and network warfare weapons and conventional weapons integration, in order to achieve a variety of battlefield environment flexible ways to combat.The new cyber strategy conference selection in the birthplace of Silicon Valley Stanford University, in person at the Secretary of Defense Carter, will seek to show that the Ministry of Defence and a new mechanism between the private sector and research institutions, technology, people and information and cooperation, and develop a wide range of industries channel sector R & D cooperation, greatly enhance the ability to act in cyberspace, to provide a solid technical support for the United States to expand the network space interests, safeguarding cyberspace hegemony. [7]
  Third, the construction of cyberspace security forces Inspiration
  The new US Defense Department cyber strategy highlights the US military in cyberspace deterrence and offensive posture, releasing its attempt hegemony in cyberspace danger signal, and to our country as one of its main rivals in cyberspace, cyberspace is bound for China safety and national security have a profound impact. Faced with the threat of US cyberspace strategy, China should accelerate the pace of construction of power networks, and resolutely safeguard national sovereignty interests in cyberspace, safeguard national cyberspace security.
  (A) firmly established Cyberspace Security Strategy in national security, strengthen national security in cyberspace top-level design, in line with China’s national conditions to speed up the formation of a military cyberspace security strategy system
  President Xi pointed out that no network security is no national security, no information will be no modernization. This important exposition, clear cyberspace strategic position for the construction of the security forces of cyberspace provided a powerful impetus.Currently, the national cyberspace security forces involved in military dress, especially after fighting equipment sector, and national industry, finance, energy, transportation, education and other sectors. Therefore, we should focus on promoting the interdisciplinary, multisectoral cyberspace security system construction, the formation of strong guidance, perfect features, dynamic evolution of cyberspace security strategy system. National Cyberspace Security Strategy should carry out national cyberspace security situation assessment, clarify the department’s own cyberspace security policy, as well as the main tasks and the division of responsibilities in national security in cyberspace, military and civilian science linkage design, comprehensive coverage, responsive network space security forces system, organizational system and institutional system. Cyberspace military strategy should focus on military operations security, the implementation of self-defense and homeland defense needs collaboration, scientific planning cyberspace “reconnaissance, attack, defense, control” forces, specifically the construction of military use of cyberspace timing, principles and tasks, as well as synergies with local forces. Cyberspace International Strategy should focus oppose hegemony in cyberspace, cyberspace governance rights and fight for the right to speak, and resolutely safeguard national cyberspace sovereign interests and development interests, and actively promote the peaceful development and common prosperity of the international cyberspace.
  (Ii) accelerate the construction of an appropriate scale, combined offensive and defensive cyberspace security forces, and constantly improve the network space combat capability, to provide strategic support for the maintenance of national security in cyberspace
  To effectively respond to threats in cyberspace main rival joint operations and information technology support to high-quality compound talents as the main body, accelerate the construction of electricity network integration, hardware and software combination, both offensive and defensive cyberspace power system, focusing on the development of intelligence and reconnaissance capabilities, integrated attack, defense capabilities and affect the control system capacity to effectively meet the security and defense tasks require effective counterattack. At present, shall be in accordance with the strategic and operational level, based on the national and military security and electronic warfare forces network-based, command, reconnaissance, attack, defense, “three wars” and six security forces to focus the power of the network set up directly under the army’s troops and the attachment of various branches / departments of strategic and security reconnaissance, attack, defense, “three wars” four network power forces the enemy to achieve the Internet, critical infrastructure, national defense information network, information systems and other defense battlefield combat. Technical support base in accordance with cyberspace security needs, the establishment of core technology research and development equipment, offensive and defensive range, a number of joint combat exercises and other technical support base, to provide technical support for the network equipment research, development, testing and evaluation.
  (C) to strengthen cyberspace theoretical research, and actively explore cyberspace mode of generating combat, and strive to improve the combat capability of our army cyberspace
  In the process of the evolution of the war, military battlefield Game by plane, three-dimensional multi-dimensional virtual battlefield to battlefield extended form, combat and operational means of war is undergoing revolutionary change, to win victory in future wars but no longer rely on bullets and explosives byte strings and no longer rely on the military but on the scale of the number of botnets, will nurture and birth of a new doctrine. Accelerate innovation in cyberspace combat theory, system analysis of the historical evolution of human warfare, to find common characteristics and laws of war, exploring new ideas that may occur in the military field, the new theory, in-depth study of cyberspace doctrine, doctrine, combat styles, and elements cyberspace power system composed of the elements of its own scientific judgment and changes in the relationship between the shape of cyberspace changes and evolution. Increased interdependence cyberspace winning mechanism, system analysis cyberspace and physical space constraints and mutual enhancement of mutual relations, in-depth mechanism, attack and defense mechanism, the mechanism of the effect of war in cyberspace right, and the mechanism of self-organizing collaborative research, and actively explore cyberspace winning new mechanisms and new ways. Actively explore cyberspace combat formation mechanism, focusing on national cyberspace security strategies to enhance the combat effectiveness of troops starting point, the system analyzes cyberspace combat formation structure, composition and structure analysis of the interaction between the various elements of the fighting, a network of scientific space combat effectiveness the new model provides a solid theoretical innovation for our military in cyberspace can fight to win the war.
  (D) seize the new round of technological change information network a major opportunity, and vigorously promote the development of self-control cyberspace security core technology and key equipment, consolidate our network security space technology base.
  For a long time, the United States use of network information technology security threat to other countries, for the recent implementation of high-performance computing technology embargo, indicating that it will not easily give up the leading international cyberspace security right to speak. After the “Prism” incident, the world is generally recognized that there is no core technology, key equipment and self-controlled, cyberspace will be the lifeblood of the hands of others, have increased self-controlled information network construction. Currently, a new round of worldwide information network technology is ushering in a new wave of development, the development of large data, networking, quantum information, cutting-edge cloud computing and other emerging technologies are driving traditional information network technology to enter the replacement stage, to promote the network basis for, the system shape and space technology security mechanism profound changes. Should make full use of information network technology upgrading precious “time window”, to focus the forefront of key technologies in the emerging field of security basic, global impact of cyberspace, increase their own information network technology and independent information industry development efforts continue promoting the “nuclear high base” of major projects, and actively create the ecological environment of self-control application, determined to get rid of cyberspace security key technologies the kinds of passive situation, the lifeblood of the national cyberspace security technology and industrial development firmly in control of their own hands.
  (E) give full play to the advantages of our system, promote China’s cyberspace security forces and civilian integration development, to build military and civilian science linkage, peacetime and wartime national cyberspace security system
  Cyberspace has a “peacetime and wartime, civil-military one” determined by the characteristics of cyberspace security system must take military and civilian integration development model.Important features of the new US Department of Defense cyberspace security strategy is to mobilize the army of human, technical and industrial resources, accelerate the formation of cyberspace prominent military and technological superiority. China should give full play to the advantages of the system and network advantages of a big country, and actively promote the cyberspace combat forces military and civilian integration, fully absorb the military, local professional and technical strength and nurture talent in the private sector network attack and defense, national parties formed a unified command under the system of ” power system main force “and” guerrilla “a combination of; by improving the organization and leadership to build civil-military integration, program planning, collaborative innovation and industrial development at the national cyberspace security system, and promote the development of dual-use network information technology to optimize civil-military dual network information industry layout, accelerate the formation of “galloping market can not only battle-hardened” information technology industrial base; establish and improve civil-military integration network defense mobilization system, a clear linkage military and civilian cyberspace security system and operation mechanism, promote the integration of military and civilian network space action joint exercises, and actively explore how to play the power of the people’s war in cyberspace, condensed balance enemies, against tremendous energy hegemony, the realization of China’s power network by the network power to leap.
Original Mandarin Chinese:
隨著對網絡空間的依存度不斷提​​高,美國將網絡空間安全納入到國家安全戰略範疇,先後頒布《網絡空間政策評估》、《網絡空間國際戰略》、《網絡空間行動戰略》等一系列政策性文件,加快構建網絡空間安全的戰略體系,大力加強網絡作戰力量建設,以實現對網絡空間控制的霸權地位。 2015年4月,美國防部又發布《網絡空間戰略》(下文簡稱“新版網空戰略”)概要,首次公開表示將網絡空間行動作為今後軍事衝突的戰術選項之一,表明美國已突破了網絡空間作戰的編制體制、武器裝備、融入聯合等一系列瓶頸問題,形成了網絡攻防的有效模式,具備了發動網絡戰爭的全部能力。

一、美國網絡空間戰略演變
美國網絡空間安全戰略思想發端於20世紀中後期,在克林頓與布什政府時期得到進一步充實和發展,最終形成了《網絡空間安全國家戰略》。自2009年奧巴馬政府以來,先後發布了一系列戰略文件,為美國建構了一個立體的網絡安全戰略體系,對國際政治和國際安全局勢產生了重大影響。
(一)在克林頓及布什政府時期,網絡空間安全進入到美國國家安全戰略範疇,頒布了首份《網絡空間安全國家戰略》。
克林頓政府將信息產業作為新興支柱產業大力扶持,推動了互聯網的高速發展,也使美國對於網絡的依賴上升到了前所未有的程度,信息產業成為美國最大的產業,1995-1998年期間對美國經濟增長的實際貢獻率達35%以上。 1999年底公佈的《美國國家安全戰略報告》首次界定了美國網絡空間安全利益構成,認為網絡安全威脅對美國國家安全構成挑戰,提出了通過國際合作等方式防範網絡空間安全風險的初步設想。 2000年初出台《保衛美國的網絡空間——保護信息系統的國家計劃》,成為美國維護網絡空間安全的第一份綱領性文件。推出這份文件的另一個重要動因是美國政府試圖通過制定新的遊戲規則,確保美國在網絡空間中分配財富的權力,建立強大的、不斷增長的創新型美國經濟。 [12]
布什政府自“9·11”事件後,改變了美國的安全觀,將網絡空間發展戰略從“發展優先”調整為“安全優先”,並於2003年頒布了《網絡空間安全國家戰略》。該戰略明確了網絡空間安全的戰略地位,將網絡空間定義為“確保國家關鍵基礎設施正常運轉的’神經系統’和國家控制系統”,對網絡空間安全形勢做出了新的判斷,認為新形勢下恐怖敵對勢力與信息技術的結合對美國國家安全構成嚴峻威脅,明確將網絡空間安全提高到國家安全的戰略高度。該戰略報告與2002年頒布的《美國國家安全戰略》、《美國國土安全國家戰略》等報告,構成了“9·11”事件後美國新的國家安全戰略體系。 [12]
(二)奧巴馬政府著力打造美國網絡空間安全立體戰略體系,積極謀求更高程度的網絡空間世界霸權,確保美國政府在網絡空間所確定的繁榮、安全、價值觀三大核心利益
奧巴馬總統上任伊始,就啟動了為期60天的網絡空間安全評估,並於2009年5月,發布了《網絡空間政策評估報告》​​。在該報告的發布式上,奧巴馬發表了題為《保護美國網絡基礎設施》的重要講話,指定由國家安全委員會牽頭制定新的國家網絡空間安全戰略,綜合運用外交、軍事、經濟、情報與執法“四位一體”的手段確保網絡空間安全,從而使奧巴馬政府的網絡空間戰略構想初露端倪。
1、以網絡空間安全威脅為藉口,把網絡基礎設施上升為國家戰略資產,將不惜一切手段保護網絡空間安全
美國網絡空間戰略文件中,威脅是出現頻率最高的詞彙。美國認為,自己在網絡空間中正面臨著一場新的看不見硝煙的戰爭,且已處於劣勢,擔心未來可能爆發“網絡珍珠港”或是“網上‘9·11’”事件[10]。為此,奧巴馬上台後不斷強調,應把網絡安全作為國家安全戰略的一部分,將網絡基礎設施上升為國家戰略資產加以保護。 2009年3月,美國戰略與國際問題研究中心提交的《確保新總統任內網絡空間安全》報告提出的第一條建議就是,網絡是國家的重要財富,“美國將不惜動用一切國家力量之手段確保網絡空間安全。在2009年5月發布《網絡空間政策評估報告》​​的當日,奧巴馬發表講話稱,網絡威脅是“美國經濟和國家安全所面臨的最嚴重的挑戰之一”,網絡設施將被視為戰略性國家設施“保護該設施將成為國家安全的優先課題”。可以說,美國所有網絡空間戰略及相關政策文件都是以此為出發點。
2、以完善領導指揮體係為著力點,加快構建網絡空間威懾體系,著力打造網絡攻擊能力建設。
奧巴馬政府認為,美國政府網絡空間安全機構存在著戰略重心不明、工作職能重疊、缺乏協調配合等問題,因此必須從最高層實施領導,全面協調網絡安全機制。 2009年5月,白宮宣布組建網絡空間安全辦公室,負責為總統提供網絡空間安全方面的決策方針,協調政府相關政策與活動。一個月後,國防部宣布創建網絡空間司令部,負責協調美軍網絡安全策略及部署,統一指揮美軍網絡戰,使得美國網絡戰力量進入統一協調發展的“快車道”。由此,美國打造了一體化的綜合性國家網絡安全領導體制。 2011年7月公佈的《網絡空間行動戰略》,作為美國防部首份有關網絡空間作戰行動的綜合戰略,更為美軍有效開展網絡空間行動提供了指南和路線圖,標誌著美軍網絡空間軍事行動已正式轉人部署與實施階段。 2012年,美國家網絡靶場正式交付軍方試用。 2013年,美網絡司令部由900人擴編到4900人,宣布3年內擴建40支網絡戰部隊。 2014年,美國防部發布《四年防務評估報告》​​,明確提出“投資新擴展的網絡能力,建設133支網絡任務部隊”。值得關注的是,從2013年到2014年一年中,美軍宣稱網絡戰部隊擴編3倍以上。與此同時,美國還加大力度開展網絡武器的研發,僅病毒武器就達2000多種,且早已進入美軍武器序列。這一系列動作表明,美軍在網絡空間要達成的目標絕不僅僅是保證自身網絡空間安全,而是要通過提升網絡空間攻擊能力構建網絡威懾體系,實現鞏固其在網絡空間的“製網權” 。 [2]
3、以強調國際網絡空間合作為手段,改變和影響其他國家的政治體系和價值觀念,力求維護美國霸權地位
2011年5月美國出台《網絡空間國際戰略》,首次將其外交政策目標與網絡空間戰略結合在一起,標誌著其關注重點已公開由自身擴展到整個球範圍,同時網絡空間也成為其輸出美式政治模式和價值觀的重要平台。原國防部長蓋茨曾公開宣稱,網絡是“美國巨大的戰略資產,有利於幫助其他國家推進民主”。此後出台的國防部《網絡空間行動戰略》更是引入“集體防禦”理念,展現了美國要在網絡空間建立新軍事同盟的意圖。奧巴馬政府之所以一改美國多年來的抵制態度,高調宣傳網絡空間國際合作,一方面是因為它認識到,即使是美國這樣的超級大國,也不可能憑一己之力解決網絡空間存在的種種問題,更重要的是,美國希望利用自己雄厚的網絡資源,通過在網絡空間的國際行動掌控全球網絡空間發展領導權,改變和影響其他國家的政治體系和價值觀念,鞏固自身在網絡空間的霸權地位。 [4]
二、美國防部新版網空戰略主要特點
2015年4月,美國防部發布的新版網空戰略,延續了奧巴馬政府對網絡空間的戰略構想,首次公開表示要把網絡戰作為今後軍事衝突的戰術選項之一,明確提出要提高網絡空間的威懾和進攻能力,擺出積極防禦和主動威懾的姿態,折射出未來數年美軍網絡空間力量建設和相關行動的鮮明特點,彰顯了美國在網絡空間稱霸的圖謀。
(一)誇大美網絡空間面臨的威脅,不斷擴散網絡空間遭受破壞的恐懼,恣意塑造網絡空間國家層級的敵人
新版網空戰略用較大篇幅描述戰略背景,反復強調美國網絡空間環境蘊含的風險,蓄意誇大網絡空間活動面臨的威脅,不斷尋找新威脅、塑造新敵人是美國思維定勢和決策邏輯的傳統使然。在公開發布的戰略文件中,“風險”和“威脅”兩詞分別出現高達31次和46次,新版網空戰略聲稱這些風險和威脅既源於互聯網基本架構防範風險能力的先天不足,也源於覬覦美國利益的敵人對美國網絡、系統和數據的惡意入侵和破壞。新版網空戰略將主要目標確定由此前以防範網絡技術與極端主義結合為重點調整為國家層級的對手,將俄羅斯、中國、伊朗、朝鮮等列為可能對美國構成網絡威脅的國家[1]。預設這些國家層級的對手,既是為了顯示推出新版網空戰略的必要性,也是在公共輿論中擴散對網絡攻擊威脅的恐懼,進而消除因“斯諾登”事件與私營企業之間產生的隔閡,淡化新版網空戰略對社會利益和個人隱私的侵害,更進一步鞏固公眾對國防部和政府政策的支持。這種判斷帶有主觀隨意性和意識形態偏見,是一種霸道和非常危險的行徑。事實上,美國在網絡空間安全領域遙遙領先,沒有哪一個國家能對美國形成根本性威脅。
(二)明確國防部網絡空間戰略任務和目標,公開把網絡空間作戰作為今後軍事衝突的戰術選項,凸顯了美軍在網絡空間的威懾和進攻態勢。
新版網空戰略明確了國防部“三大任務”和“五項戰略目標”,首次提出美國國家利益受到威脅時可發動網絡攻擊,並要求美國防部“開發可行的網絡選項,融入國防部各項規劃”,為美國總統​​或者國防部長提供“全頻譜”的選擇方案,以便其在涉及國家利益的時候能夠做出各種決策。與2011年首次發布版本相比,網絡空間行動由主要強調防禦性的網絡安全行動向“採取進攻性網絡行動”轉變,並且新版網空戰略中頻繁出現“威懾”一詞,共出現29次,表明美國已經逐漸將“用精確制導的物理毀傷來應對網絡攻擊的不對稱應對手段”,納入到威懾對美國網絡攻擊、保障美國國家網絡安全戰略、擠壓美國主要戰略競爭對手的網絡空間行動自由的策略選擇之中。同時,新版網空戰略第一次提出將保持網絡空間行動作為戰術選項,運用網絡行動選項控制衝突升級,塑造衝突環境。可見,新版網空戰略已將傳統的物理空間作戰手段與虛擬的網絡空間作戰手段相融合,向世界清晰地傳遞了美國進行網絡報復的決心和實施報復的足夠能力,遠遠超出了主動防禦的範疇,凸顯了美國將網絡空間的保護、攻擊和對抗融為一體的威懾和進攻態勢。 [1] [8]
(三)加強與傳統作戰力量融合,構建全方位聯合作戰體系,具備了發動網絡戰爭的力量體系
網絡空間是美軍繼陸地、海洋、天空、太空後的第五作戰領域,新版網空戰略要求把網絡空間行動選項融入到國防部計劃中,確保軍事行動的所有領域中網絡空間行動與物理空間行動協調一致。新版網空戰略提出要動員各方力量,​​構建全方位的聯合作戰體系,包括由國防部主導政府部門間、政企間和國際間的協同行動。新版網空戰略突破了網絡空間戰略“軍民分隔”的態勢,將網絡空間司令部、國家安全局、中央安全署有機融合,由國防部負責網絡部隊的作戰訓練和指導,從而將網絡情報職能與網絡作戰職能進行區分,由國防部主導網絡作戰部隊。新版網空戰略的重要目標之一是至2018年建成一支攻防兼備、形式靈活的網絡空間部隊,包括由6200名國防部和軍事部門的軍人、文職人員和合同員工等組成的133支小組。其中,13支擔負國家基礎設施網絡防護任務的國家任務部隊和8支國家支援小組;27支擔負攻擊敵網絡系統任務的作戰任務部隊和17支作戰支援部隊;68支擔負保護美國國防部及軍隊網絡和系統安全任務的網絡保護部隊。這些動作表明,美軍已經解決了網絡空間戰的編制體制、裝備設備、融入聯合等一系列瓶頸問題,探索形成了網絡攻防戰鬥力生成的有效模式,具備了發動網絡戰爭的力量體系。 [7]
(四)繼續加強應用研究和基礎研究,鞏固美在網絡信息領域的世界領先優勢,為其稱霸網絡空間提供技術支撐。
長期以來,美軍一直將科學技術優勢作為國家安全戰略的重要組成部分,始終將科技創新作為維持美軍作戰優勢能力的關鍵。作為網絡信息技術的發源地和引領者,美國防部為保持和擴大技術領域的領先優勢,將繼續加強應用研究和基礎研究,不斷提升網絡空間的技術威懾和進攻能力。新版網空戰略提出,國防部必須在人員培訓、有效組織構建和指揮控制系統方面加大投入,繼續加速網絡空間領域的技術創新,大力開展具有重大優勢的跨越性技術的研發,聚焦提高網絡空間行動能力所需的基礎研究和應用研究,全面發展國防部所需的網絡空間作戰能力。近年來,美國著眼塑造可應對各類威脅的全頻譜網絡空間作戰能力,在成功研發“舒特”、“火焰”和“震網”等2000多種網絡戰武器的基礎上,不斷加大網絡空間作戰前沿技術投入,積極研發虛擬戰場技術和新一代網絡攻擊性武器,並將網絡戰武器與傳統武器進行整合,以實現在戰場環境中靈活的多種打擊方式。新版網空戰略發布會選擇在矽谷發源地的斯坦福大學進行,國防部長卡特親自前往,表明國防部將尋求與私營部門和研究機構間技術、人員和信息聯繫與合作的新機制,廣泛拓展與工業部門合作研發的渠道,大力提升網絡空間行動能力,為美國拓展​​網絡空間利益、維護網絡空間霸權提供堅實的技術支撐。 [7]
三、對我國網絡空間安全力量建設的啟示
美國國防部新版網空戰略凸顯了美軍在網絡空間的威懾和進攻姿態,釋放出其圖謀網絡空間霸權的危險信號,並把我國列為其網絡空間的主要對手之一,必將對我國網絡空間安全乃至國家安全帶來深刻影響。面對美國網絡空間戰略威脅,我國應加快網絡強國建設步伐,堅決捍衛國家網絡空間主權利益,維護國家網絡空間安全。
(一)牢固確立網絡空間安全在國家安全中的戰略地位,加強國家網絡空間安全的頂層設計,加快形成符合我國國情軍情的網絡空間安全戰略體系
習主席指出,沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化。這一重要論述,明確了網絡空間安全的戰略地位,為我國網絡空間安全力量建設提供了強大動力。當前,國家網絡空間安全涉及軍隊軍政後裝尤其是作戰、裝備部門,以及國家工業、金融、能源、交通、教育等部門。為此,應著眼推進跨領域、多部門網絡空間安全體系構建,形成指導有力、要素完善、動態演化的網絡空間安全戰略體系。國家網絡空間安全戰略應深入開展國家網絡空間安全態勢評估,明確各部門自身網絡空間安全策略,以及在國家網絡空間安全中的主要任務和職責分工,科學設計軍民聯動、覆蓋全面、反應敏捷的網絡空間安全力量體系、組織體系和製度體系。網絡空間軍事戰略應著眼軍事行動安全、實施自衛反擊和協同國土防禦需要,科學規劃網絡空間“偵、攻、防、控”力量建設,明確網絡空間軍事力量建設運用的時機、原則和任務,以及與地方力量的協同關係。網絡空間國際戰略應著眼反對網絡空間霸權、爭奪網絡空間治理權和話語權,堅決維護國家網絡空間主權利益、發展利益,積極推動國際網絡空間的和平發展和共同繁榮。
(二)加快建設一支規模適度、攻防結合的網絡空間安全力量,不斷提高網絡空間實戰能力,為維護國家網絡空間安全提供戰略支撐
著眼有效應對網絡空間主要對手威脅和支撐信息化聯合作戰,以高素質複合型人才隊伍為主體,加快構建網電一體、軟硬結合、攻防兼備的網絡空間力量體系,重點發展情報偵察能力、綜合攻擊能力、體系防禦能力和影響控制能力,有效滿足安全防禦和有效反擊任務需要。當前,應按照戰略和戰役層次,立足國家和軍隊網絡安全和電子對抗力量基礎,以指揮、偵察、攻擊、防禦、“三戰”和保障六支力量為重點,設置直屬全軍的網絡力量部隊和配屬各軍兵種/戰略和安全部門的偵察、攻擊、防禦、“三戰”四支網絡力量部隊,能夠實現對敵國際互聯網、關鍵基礎設施、國防信息網、戰場信息系統等進行防禦作戰。技術保障基地按照網絡空間作戰保障需要,建立核心裝備技術研發、攻防靶場、聯合作戰演練等若干技術保障基地,為網絡裝備研究、開發、試驗與評估提供技術支撐。
(三)加強網絡空間作戰理論研究,積極探索網絡空間戰鬥力生成模式,著力提高我軍網絡空間作戰能力
在戰爭發展演變的進程中,軍事博弈已由平面戰場、立體戰場向虛擬多維戰場延伸,戰爭的形態、作戰方式和作戰手段正發生革命性變革,贏得未來戰爭勝利不再依靠子彈和炸藥而是字節和字符串,不再依靠軍隊規模而是依靠殭屍網絡的數量,必將孕育和催生新的作戰理論。加快網絡空間作戰理論創新研究,系統分析人類戰爭的歷史演變,尋找戰爭的共同特點和規律,探索軍事領域可能出現的新思想、新理論,深入研究網絡空間作戰理論、作戰原則、作戰樣式,以及網絡空間作戰的力量體系的要素組成,科學判斷各要素自身及相互關係的變化對網絡空間作戰形態的變化和演進。加強網絡空間作戰制勝機理研究,系統分析網絡空間與物理空間的相互依存、相互制約和相互增強等關係,深入開展網絡空間制權機理、攻擊與防禦機理、作戰效果機理、自組織協同機理等方面的研究,積極探索網絡空間作戰制胜新機理、新途徑。積極探索網絡空間戰鬥力生成機理,著眼國家網絡空間安全戰略,以提高部隊戰鬥力為基點,系統剖析網絡空間戰鬥力生成結構,分析結構中各戰鬥力要素的組成和相互作用關係,科學形成網絡空間戰鬥力生成的新模式,為我軍在網絡空間能打仗打勝仗提供堅實的創新理論。
(四)抓住新一輪信息網絡技術變革重大機遇,大力推動網絡空間安全核心關鍵設備和技術的自主可控發展,夯實我國網絡空間安全的技術基礎。
長期以來,美國利用網絡信息技術優勢對別國進行安全威脅,近期針對我國高性能計算實施技術禁運,表明其不會輕易放棄主導國際網絡空間安全的話語權。 “棱鏡”事件後,世界各國普遍意識到,沒有核心關鍵設備和技術的自主可控,網絡空間安全的命脈就會掌握在別人手裡,紛紛加大自主可控信息網絡建設力度。當前,世界範圍內新一輪信息網絡技術正迎來新的發展浪潮,大數據、物聯網、量子信息、雲計算等新興前沿技術的發展,正推動傳統信息網絡技術進入更新換代階段,推動網絡空間的技術基礎、系統形態和安全機理髮生深刻變化。應充分利用信息網絡技術更新換代的寶貴“時間窗”,聚焦前沿新興領域中對網絡空間安全具有基礎性、全局性影響的核心關鍵技術,加大自主信息網絡技術和自主信息產業發展力度,持續推進“核高基”重大專項,積極營造自主可控應用的生態環境,下決心擺脫網絡空間安全核心關鍵技術受制於人的被動局面,將國家網絡空間安全的技術和產業發展的命脈牢牢掌控在自己手中。
(五)充分發揮我國製度優勢,推進我國網絡空間安全力量軍民融合式發展,科學構建軍民聯動、平戰結合的國家網絡空間安全體系
網絡空間具有“平戰結合、軍民一體”的特點,決定了網絡空間安全體系必須採取軍民融合發展模式。美國國防部新版網絡空間安全戰略的重要特點,就是廣泛動員軍民人力、技術和產業資源,加快在網絡空間形成突出的軍事和技術優勢。我國應充分發揮制度優勢和網絡大國的優勢,積極推動網絡空間作戰力量的軍民融合發展,充分吸納軍隊、地方專業技術力量以及孕育在民間的網絡攻防人才,形成國家統一指揮體制下的各方“主力軍”和“游擊隊”相結合的力量體系;通過完善構建軍民融合的組織領導、規劃計劃、協同創新和產業發展的國家網絡空間安全體系,推動軍民兩用網絡信息技術的發展,優化軍民兩用網絡信息產業佈局,加快形成“既能馳騁市場又能決戰沙場”的信息科技產業基礎;建立完善軍民融合網絡國防動員體系,明確網絡空間安全軍民聯動體制和運行機制,推動軍民融合的網絡空間行動聯合演習,積極探索如何在網絡空間中發揮人民戰爭威力,凝聚制衡強敵、反對霸權的巨大能量,實現我國由網絡大國向網絡強國的飛躍。

China Military Operational Use of Information Warfare Equipment //中國軍事信息戰裝備的作戰運用

中國軍事信息戰裝備的作戰運用

中國作家源

2004年12月06日

中國軍事信息戰

Information warfare is against C4ISR systems and C4ISR systems, information superiority is the competition, the main purpose is to ensure the normal operation of one’s own information systems, from the enemy’s use, paralysis and destruction; the same time, trying to use, paralysis and destruction of the enemy’s information systems, make paralyzed, confused state. Including strategic information warfare and information warfare battlefield information warfare two parts.

Strategic information warfare and information warfare battlefield

Strategic information warfare is the main features of a wide range of sectors covering all key political, economic, technological, military and special areas; special way, relates to psychological warfare, media warfare, deception warfare, media warfare and other special tools; special target, mainly through the decoy attack warfare, psychological warfare, information awareness enemy deterrence system and thinking system; great harm, make the whole country’s economic, political or military to a standstill, even regime change can make it happen; special person, not necessarily military combatants, computer experts, international crime syndicates, hacking or terrorist organizations with ulterior motives and so may become combatants.

Battlefield Information War battle took place in the space of information warfare, refers to the battle for the preparation and the integrated use of information technology tools and a variety of information weapons, information warfare platform and C4ISR systems, reconnaissance and early warning detection, information processing and transmission, arms control and guidance, operational command and control, deception and disguise interference and military strategy and other aspects of all-out confrontation and struggle. Battlefield Information War by interfering with or disrupting the enemy’s decision-making process, so that the enemy can not effectively coordinated action. Thus, the first enemy influence decisions, then the impact of their actions, which is to win air superiority electromagnetic, and then obtain air superiority, and finally the use of conventional forces to take combat operations. Seized control of information, seize the initiative on the battle space, and the competition for the right to make land, air, naval supremacy and control of space to lay a good foundation and a necessary condition.

Basic information warfare battlefield combat forces and means of information is digitized forces and weapons and equipment, the main contents include operational secrecy, military deception, electronic warfare, psychological warfare and firepower to destroy, core purpose is to fight for the right to access information battle space, control and use rights. Battlefield Information War is against information systems, which directly affects the entire battle space, processes, and success or failure of the entire war. The main battlefield information warfare style combat electronic warfare and cyber warfare. Electronic warfare is an important part of information warfare battlefield, mainly decoy for enemy communications, radar and other electromagnetic radiation sources of interference, sabotage and destruction activities. The Gulf War, not only the first large-scale use of electronic warfare, and formally adopted as a battle of the war and the particular stage of the battle action. Kosovo War, NATO used a lot of electronic warfare equipment, and the first use of electromagnetic pulse bombs and conducted the first network warfare. Cyber ​​warfare in cyberspace computer, using a network against the Internet activities, and for the first time in the Kosovo war. NATO cyber warfare measures include: network publicity; hacker attacks; attacks on financial networks. The main characteristics of the FRY cyberwarfare is people’s war mode, geek, geeks and computer enthusiasts spontaneously a lot of network operations, such as conduct online propaganda attack NATO website, use the Internet to pass intelligence.

War information warfare equipment, electronic warfare equipment.

Electronic warfare equipment, the development trend of increasing integration and universal, local wars under conditions of informatization, the electromagnetic environment on the battlefield increasingly complex, kind of separation from each other in the past, single-function electronic warfare equipment has been far can not meet the operational needs.Integration and generalization has become the focus of the development of electronic warfare equipment and electronic warfare equipment, the total future direction of development. In order to deal more effectively with the threat of information warfare electromagnetic complex, the next generation of electronic warfare equipment, the extensive use of advanced computer technology to significantly improve the automation of the entire system in order to have better real-time capabilities, since the adaptability and full power management capabilities. Working frequency electronic warfare equipment continuously expanding, increasing the transmission power, the development of millimeter-wave technology and photovoltaic technology, the modern electronic warfare equipment to keep the operating frequency band wider development.Overall, the future scope of work of electronic warfare equipment will be extended to the entire electromagnetic spectrum. GPS interference and anti-interference will be concerned about the practice of war has shown that, if they lose the support of GPS, information superiority will be greatly weakened, so that command and control, reconnaissance, combat, troop movement and other military links are facing a severe test, severely reduced combat effectiveness. Focus on the development of new anti-radiation and electronic warfare jamming aircraft, emphasis on the development of new, special electronic warfare technology and equipment, such as for anti-satellite laser weapons, high-energy particle beam weapons, and meteor burst communications, neutrino communication and the like.

Computer viruses as weapons

Within military information systems, battlefield information acquisition, transmission, processing and other functions required to complete computer and network, computer network is performed on the basis of information warfare and Pioneer. Use of software drivers and hardware magnetic induction sniffer sniffer network sniffer, etc. is an important way to attack networks. These sniffing tool was originally a test device, used to diagnose and repair assistance network, so it is a powerful tool for network administrators to monitor the network, but in the information war is a terrible computer virus weapons. It enables network “denial of service”, “information tampering” Information “halfway stealing” and so on. In addition, it will focus on design “trap door.” “Trap door” also known as “back door” is an agency computer system designers previously configured in the system, appear in the application or during the operating system, programmers insert some debugging mechanism. System Programmer For the purpose of attacking the system, deliberately left few trap door for a person familiar with the system to outdo each other to sneak into the normal system protection system. Network is an important infrastructure of information warfare, network centric warfare is mainly carried out based network, the network is reliable to determine the outcome of the war. Therefore, to strengthen the research network attack and defense operations for the win future information warfare is essential.

Electromagnetic pulse bomb

During the Iraq war, the US used a lot of electronic warfare equipment, and use of electromagnetic pulse bombs fell on Iraq and the Iraqi army broadcast television systems of various types of electronic radiation. Electromagnetic pulse bomb, also known as microwave pulse bomb, by a microwave beam into electromagnetic energy, a new type of directed energy weapons damage other electronic facilities and personnel.Its working principle is: after high power microwave antenna gathered into a bunch of very narrow, very strong electromagnetic waves toward each other, heat, ionizing radiation, etc. relying on the combined effect of electromagnetic waves generated by this beam, lethal voltages in electronic circuits inside the target and current, breakdown or burn sensitive components which, damage data stored in the computer, so that each other’s arms and paralyzed the command system, the loss of combat effectiveness. According to tests, a briefcase-sized microwave bomb, can produce up to 300 million watts of power pulse. After its plurality of coupling, then become adjustable radiation source, generating more than 2 billion watts of pulse waves. This is somewhat similar to pulse electromagnetic pulse generated when nuclear explosions, can easily enter the underground bunker from power and communication channels, which rely on radio to make, radar, computer, power grids and telephone modern weapons systems, biological and chemical weapons and their production Libraries workshop in an instant paralysis.

GPS jamming devices

Also in the Iraq war, the Iraqi use of GPS jamming device for Tomahawk cruise missiles were effective interference, this is the first time in actual combat on the GPS guidance system interference. GPS signal is weak, it is easy to interference. A Russian company to provide a 4-watt power handheld GPS jammers, less than $ 4,000 can buy.If purchased from retail electronic component assembly shops, you can spend $ 400 to create a disturbance over a radius of 16 km of GPS jammers. Before the war in Iraq war, the United States had expected to interfere with the GPS signal the Iraqi side. In fact, the United States had already given their GPS bombs and missiles loaded with anti-jamming technology to make these GPS-guided weapons to continue to use the GPS signal in the case of interference; even if the GPS signal is lost, they can also use their own weapons guidance systems other inertial navigation, laser-guided, so that their own to reach the target. Nevertheless, early in the war in Iraq, the US military more than a dozen Tomahawk cruise missiles due to interference or deviates from a predetermined route, fell Turkey, Syria and Iran. Small GPS jammers problem alerted the US government, Powell personally investigate the source of Iraq GPS jammers, Russia and other countries exerted considerable pressure.

During the first Gulf War, GPS navigator as a trial product for the first time issued to desert warfare personnel, the effect is obvious. At that time, all weapons, including cruise missiles, including not using the GPS navigation device. The war in Iraq, we see that almost all combat platforms, every man, almost all of missiles and bombs have adopted this navigation device, so that the tanks, planes, ships maneuver more accurate missiles and bombs original the probability of error reduced to 1-3 meters, maximum 10 meters range.   Everything there is a benefit must be a disadvantage. Disadvantages and drawbacks of GPS navigation information is the same weaponry, is the electronic interference.From the perspective of the development of weapons and equipment, the purchase of a cruise missile costs $ 100 million, while manufacturing a GPS jammer only a few hundred dollars, as a strategic defensive side, if a large number of development and the development of GPS jammers, not only for the US missile and the bomb is a threat to its tanks, planes, ships and navigation personnel will also have a huge impact. Of course, we should also see the US fight a battle, and further, after the end of the war in Iraq is bound according to the lessons of the war, improved GPS system. Is expected to be improved in three areas: First, the GPS satellites, satellite launch is mainly to enhance the signal and transmit as many GPS satellites; the second is to improve the guidance system, mainly to increase the combined guidance system, after interference in the GPS guidance, automatic recovery or transfer other inertial navigation mode to ensure the normal operation of the platform and weapons; the third is GPS anti-jamming, mainly to improve the GPS receiver anti-jamming capability, the development of new GPS receiver, in the theater of the local military and civilian GPS reception machines and electronic jammers and interference suppression.

Original Mandarin Chinese:

信息戰是C4ISR系統與C4ISR系統的對抗,是信息優勢的爭奪,主要目的是確保己方信息系統正常運行,免遭敵方利用、癱瘓和破壞﹔同時,設法利用、癱瘓和破壞敵人的信息系統,使之處於癱瘓、迷茫狀態。信息戰包括戰略信息戰和戰場信息戰兩大部分。

戰略信息戰和戰場信息戰

戰略信息戰主要特征是范圍廣泛,涉及國家政治、經濟、科技、軍事等各個要害部門和特殊領域﹔方式特殊,涉及心理戰、輿論戰、欺騙戰、媒體戰等特殊手段﹔目標特殊,主要是通過誘騙戰、心理戰、信息威懾等攻擊敵人的認識體系和思維體系﹔危害巨大,能使整個國家的經濟、政治或軍事陷入癱瘓,甚至能使其發生政權交替﹔人員特殊,參戰人員不一定軍人,計算機專家、國際犯罪集團、別有用心的黑客或恐怖組織等都可能成為參戰人員。

戰場信息戰是發生在戰斗空間內的信息戰,是指為准備和進行一場戰役,綜合運用信息技術手段和各種信息化武器、信息化作戰平台和C4ISR系統,在偵察探測及預警、信息處理與傳遞、武器控制和制導、作戰指揮與控制、偽裝欺騙與干擾以及軍事謀略等方面展開的全面對抗和斗爭。戰場信息戰是通過干擾或打亂敵方決策程序,使敵方無法有效採取協調一致的行動。因此,要先影響敵人決策,然后再影響其行動,即先贏得空中電磁優勢,再取得空中優勢,最后使用常規部隊採取作戰行動。奪取了制信息權,就奪取了戰斗空間的主動權,而且為爭奪制陸權、制空權、制海權和制天權奠定一個良好基礎和必要條件。

戰場信息戰的基本作戰力量和手段是數字化部隊及信息化武器裝備,主要內容包括作戰保密、軍事欺騙、電子戰、心理戰和火力摧毀,核心目的是爭奪戰斗空間的信息獲取權、控制權和使用權。戰場信息戰是信息體系的對抗,它直接影響到整個戰斗空間、整場戰爭的進程和成敗。戰場信息戰的主要作戰樣式是電子戰和網絡戰。電子戰是戰場信息戰的一個重要組成部分,主要是針對敵人通信、雷達等電磁輻射源進行的誘騙、干擾、破壞和摧毀活動。海灣戰爭中,電子戰不僅首次大規模使用,而且正式作為戰爭中的一個戰役階段和特定戰役行動。科索沃戰爭中,北約使用了大量電子戰裝備,並首次使用了電磁脈沖炸彈並首次進行了網絡戰。網絡戰是在計算機網絡空間,利用因特網進行的一種網絡對抗活動,並在科索沃戰爭中首次使用。北約網絡戰的措施包括:網絡宣傳﹔黑客攻擊﹔襲擊金融網絡等。南聯盟網絡戰的主要特征是人民戰爭模式,網迷、電腦迷和計算機愛好者自發地進行了大量網絡作戰行動,如開展網上宣傳、攻擊北約網站、利用網絡傳遞情報等。

戰爭中的信息戰裝備

電子戰裝備

電子戰裝備的發展趨勢日趨一體化和通用化,信息化條件下的局部戰爭中,戰場上的電磁環境日益復雜,以往那種彼此分立、功能單一的電子戰裝備已遠遠不能適應作戰需要了。一體化和通用化已成為當前電子戰裝備發展的重點和未來電子戰裝備總的發展方向。為了更有效地對付信息化戰爭中復雜多變的電磁威脅,未來新一代的電子對抗裝備,將廣泛採用先進的計算機技術,大幅度提高整個系統的自動化程度,以具備更好的實時能力、自適應能力和全功率管理能力。電子戰裝備的工作頻段不斷拓寬,發射功率不斷增大,毫米波技術和光電技術的發展,使現代電子戰裝備的工作頻率不斷向更寬的頻段發展。從整體上看,未來電子戰裝備的工作范圍必將擴展到整個電磁波頻譜。GPS干擾與反干擾將受到關注,戰爭實踐已經表明,如果失去GPS的支持,就會極大地削弱信息優勢,使指揮、控制、偵察、打擊、部隊機動等各個軍事環節都面臨嚴峻考驗,嚴重降低戰斗力。重點發展反輻射和新型電子戰干擾機,重視發展新型、特殊的電子戰技術裝備,如用於反衛星的激光武器、高能粒子束武器,以及流星余跡通信、中微子通信等等。

計算機病毒武器

在軍事信息系統中,戰場信息的獲取、傳遞、處理等功能需要計算機及網絡來完成,計算機網絡是進行信息戰的基礎和先鋒。利用軟件驅動嗅探器和硬件磁感應嗅探器等對網絡進行嗅探是進攻網絡的重要方法。這些嗅探工具原本是一種測試設備,用來診斷和協助修理網絡,因此它是網管人員管理網絡的一種得力工具,但在信息戰中卻是一種可怕的計算機病毒武器。它能使網絡“服務否認”、“信息篡改”、信息“中途竊取”等。另外,也將重視設計“門戶陷阱”。“門戶陷阱”又稱“后門”,是計算機系統設計者預先在系統中構造的一種機構,在應用出現或操作系統期間,程序員插入一些調試機構。系統程序員為了達到攻擊系統的目的,特意留下少數門戶陷阱,供熟悉系統的人員用以超越對方正常的系統保護而潛入系統。網絡是信息化戰爭的重要基礎設施,網絡中心戰主要是基於網絡而進行的,網絡是否可靠決定戰爭的勝負。因此,加強網絡攻防作戰的研究,對於贏得未來信息化戰爭至關重要。

電磁脈沖炸彈

伊拉克戰爭中,美軍使用了大量電子戰裝備,並使用電磁脈沖炸彈襲擊了伊拉克廣播電視系統及伊軍各類電子輻射源。電磁脈沖炸彈也稱微波脈沖炸彈,是通過把微波束轉化為電磁能,毀傷對方電子設施和人員的一種新型定向能武器。其工作原理是:高功率微波經過天線聚集成一束很窄、很強的電磁波射向對方,依靠這束電磁波產生的高溫、電離、輻射等綜合效應,在目標內部的電子線路中產生致命的電壓和電流,擊穿或燒毀其中的敏感元器件,毀損電腦中存貯的數據,從而使對方的武器和指揮系統陷於癱瘓,喪失戰斗力。據測試,一枚公文包大小的微波炸彈,可產生功率達3億瓦的脈沖波。將其多個聯接后,則能成為可調整的輻射源,產生20億瓦以上的脈沖波。這種脈沖波有點類似核爆炸時產生的電磁脈沖,可以輕易地從電力和通訊管道進入地下掩體,使其中依賴無線電、雷達、計算機、電網和電話等的現代化武器系統、生化武器庫及其生產車間在瞬間癱瘓。

GPS干擾設備

伊拉克戰爭中,伊軍利用GPS干擾儀對戰斧巡航導彈進行了有效的干擾,這是第一次在實戰中對GPS制導系統進行干擾。GPS信號很弱,很易於干擾。一家俄羅斯公司提供的一種4瓦功率的手持GPS干擾機,不到4000美元就能買到。如果從零售電子商店購買部件組裝,花400美元就可以制造一個干擾半徑16公裡以上的GPS干擾機。伊拉克戰爭開戰之前,美國就已經預料到伊拉克方面會干擾GPS信號。美國其實早已經給其GPS炸彈和導彈裝載了抗干擾技術,使這些GPS導引的武器能夠在干擾的情況下繼續使用GPS信號﹔即使GPS信號丟失,這些武器還可以使用自身的其他導引系統如慣性導航、激光制導等,使自己到達目標。盡管如此,伊拉克戰爭初期,美軍十幾枚戰斧式巡航導彈還是因受干擾偏離預定航線,落在土耳其、敘利亞和伊朗境內。小小的GPS干擾機問題驚動了美國朝野,鮑威爾親自出面調查伊拉克GPS干擾機的來源,對俄羅斯等國施加了不小的壓力。

海灣戰爭中,GPS導航儀作為試用品首次發放給沙漠作戰人員使用,效果明顯。當時,包括巡航導彈在內的所有武器都沒有採用GPS導航裝置。伊拉克戰爭中,我們看到幾乎所有的作戰平台,每一個單兵,幾乎全部的導彈和炸彈都採用了這種導航裝置,從而使坦克、飛機、艦艇的機動更加精確,使導彈和炸彈的原概率誤差縮小到1—3米,最大10米范圍之內。

凡事有一利必有一弊。GPS導航的弊端與信息化武器裝備的弊端是一樣的,就是電子干擾問題。從武器裝備發展角度來看,購買一枚巡航導彈需要100多萬美元,而制造一部GPS干擾機才幾百美元,作為戰略防御一方,如果能夠大量發展和研制GPS干擾機,不僅對於美軍導彈和炸彈是一種威脅,對其坦克、飛機、艦艇和人員的導航定位也將產生巨大影響。當然,也應看到美軍打一仗、進一步,伊拉克戰爭結束后必將根據戰爭中的教訓,改進GPS系統。預計將在三個方面進行改進:一是GPS衛星,主要是增強衛星發射信號,並盡可能多的發射GPS衛星﹔二是改進制導系統,主要是增加復合制導裝置,在GPS指導受到干擾之后,自動恢復或轉入慣性等其他導航方式,以保証平台和武器的正常運行﹔三是GPS反干擾,主要是提高GPS接收機抗干擾能力,研制新型GPS接收機,在戰區對地方軍民用GPS接收機和干擾機進行電子壓制和干擾等。

China Information Warfare – China’s Basic Form of a Future War //中國信息化戰爭—中國未來戰爭基本形態

中國信息化戰爭—中國未來戰爭基本形態

In the 21st century, the rapid development of high technology and extensive application, and promote the development and evolution of combat weapons and equipment, and promote the transformation and innovation and the development of institutional military doctrine, which triggered a new revolution in military affairs. Information warfare will eventually replace mechanized war, become the basic form of war. Information warfare refers to occur in the information age, information-based, using information technology as a tool of war weaponry of war. Information warfare does not change the nature of war, but the war must take into account the outcome of the mentor and the consequences of war, first in the pursuit of strategic guidance on how to achieve “the enemy without fighting the soldiers,” the strategic victory, the kind of large-scale physical destruction at the expense of traditional warfare will be greatly constraints and limitations.

Knowledge has become the main source of war to destroy the force  on the right in terms of information (quantity and quality) dependence, the past is not any war and information war. In conventional war, the two sides focus more on comprehensive contest on the basis of physical force. Such as mechanized war, mainly for steel contest, contest the whole country is full of large industrial machinery production capacity. Information war contest does not exclude physical force, but more important is the contest of knowledge, innovation ability and speed of innovation contest. Knowledge will become the main source of war to destroy force, “an ounce of effect of silicon computer generated perhaps more than a ton of uranium is also big.”

Firepower, mobility, information, constitute an important part of modern military combat capability, and the ability of information has become the primary indicator to measure the level of combat capability. Information capabilities, performance in terms of information acquisition, processing, transmission, and use of confrontation, to be manifested through information superiority and competition control. Information superiority, in essence, in the understanding of the enemy at the same time prevent the enemy to understand one’s own situation, confrontation is a dynamic process. It has become a fight for air supremacy, command of the sea, land control of the premise of a direct impact on the process and outcome of the war. Of course, people will always be the master of information warfare. Plan and organize and direct the war from people completely dominated increasingly dependent on technology to develop human-machine combination of military quality requirements are higher. Information from the advantages of competition to the final decision superiority into more competitive knowledge and wisdom.

War forces will move toward information, intelligence  forces of war are directly and indirectly referred to the various forces for war, to fight the information war, natural rely heavily on information, intelligence and information technology military weapons and equipment.

The most basic of war, the most significant feature is the use of the most advanced scientific and technological achievements to create the most advanced instruments of war. Information weapons and equipment is developed on the basis of mechanized equipment, such as C4ISR systems, precision-guided weapons, information warfare equipment and various high-tech combat platforms.They are highly knowledge-intensive tools of war, and thus can not be compared with the traditional tools of war performance, functionality, operational capabilities and effectiveness. At the same time, they play to the performance level and the operational level, directly restricted information, information systems and information capabilities.   The army is the army of information technology refers to using information technology to weapons armed with the information age. Its unprecedented level of integration will enhance the overall combat capability more powerful, emphasizing optimal combination of combat capability, the services are just part of joint combat forces. At the same time, the size of the forces become smaller, more flexible and diverse forms of grouping, vertical command structure will also benefit from the tree into a flat network architecture. From the subordinate command relationship changed multilayer horizontal communication, and down one command relationships, delayering, put as many combat units into the same level of information, information sharing, shorten the information flow to meet the real-time command decision Claim.

War mode will tend to systematic, precise  Technological development determines the evolution of tactics. With the development of weapons and equipment, the scale of war is also growing, the most prominent battlefield extended to three-dimensional space from the plane: from land to sea and air space, and then, from the visible to the invisible electromagnetic space and information space, it has formed armed day one dimensional, tangible and intangible space space Blending the new operational environment. This network battlefield is great depth, three-dimensional high, dilute the distinction between front and rear, major changes have taken place in time and space, both traditional air, naval, marine, electronic warfare, and more will be a new web-based attacks information warfare. Rely on the support of information networks, through the orderly flow of information, all combat operations within the space really blending together.

In the past, a new weapon tends to cause relatively large impact, obtain better operational effectiveness. But in the modern battlefield, the two sides are no longer hostile confrontation between a single or a few branches, but not a single weapon system confrontation, but confrontation between systems. In the information war, the extent of such a system of confrontation and even more will not emphasize the operational performance of tanks, aircraft, warships and other single combat platform, but rather to highlight the overall performance of information technology weaponry system, pay attention to multiple armed services, comprehensive combat effectiveness of a variety of weapons and equipment.

Destroy the enemy is an important part of the war. Mechanized warfare, anti-surface fire mostly destroyed, such as fire suppression, carpet bombing, saturation-type attacks. This operational mode corresponding to the extensive mode of production of the industrial age, reflecting the idea of a war of attrition, to victory in that time, space, energy, supplies and other aspects of continuous consumption and weaken the power of the enemy, and finally defeat the enemy. The precision strike in line with the characteristics and requirements of the information age, but also reflects the basic characteristics of information warfare. Intensive production model of the information age emphasizes effectiveness, efficiency, effectiveness. Weapons and equipment level of intelligence and combat accuracy was greatly improved, can be done “pinpoint” type of destroyed; also can be accurate, non-physical damage, such as psychological warfare and information warfare. In addition, the precision strike can also significantly reduce collateral damage, so that the development and the process of social civilization synchronization war, war means more conducive to play its unique role.

Course of the war would be short, controlled – the rhythm of information warfare significantly accelerated course of the war will become shorter and shorter, but the intensity is getting high, and humanity as a whole control of the war also significantly enhanced.   Army should pay more attention to the quality of the information age and effectiveness. Winning quality from quantity into winning, it is one of the significant change in the war. Such as the combination of high-tech precision-guided weapons and combat platforms used to enhance the ability of the enemy to combat the standoff embodiment, can greatly reduce the loss of one’s own operations; continually improve the accuracy of the attack, it can greatly reduce the number of weapons consumption. World War II in 9000 to use bombs to blow up a goal, now 1-2 as long as missiles or guided bombs can solve the problem, operational tempo and the natural process will be faster.

Layers of advancing successive war, set small victories, this contact, wire is typical of traditional methods of warfare combat visual feedback. In information warfare, from the contact, non-line operations will be the main form of combat operations will be launched simultaneously in all the whole depth of space combat and battlefield, the primary targets will point directly to the enemy center of gravity. Especially powerful information warfare, even in the enemy without the knowledge of the state, it is possible to make several hacker instant enemy paralyzed economic and social, to quickly achieve the purposes of war.

Source: http://www.china001.com/

Original Mandarin Chinese:

進入21世紀,高技術的迅猛發展和廣泛應用,推動了武器裝備的發展和作戰方式的演變,促進了軍事理論的創新和編制體制的變革,由此引發新的軍事革命。信息化戰爭最終將取代機械化戰爭,成為未來戰爭的基本形態。信息化戰爭是指發生在信息時代、以信息為基礎、以信息化武器裝備為戰爭工具的戰爭。信息化戰爭不會改變戰爭的本質,但戰爭指導者必須考慮到戰爭的結局和後果,在戰略指導上首先追求如何實現“不戰而屈人之兵”的全勝戰略,那種以大規模物理性破壞為代價的傳統戰爭必將受到極大的約束和限制。

知識成為戰爭毀滅力的主要來源

就對信息(數量和質量)的依賴程度而言,過去的任何戰爭都不及信息化戰爭。在傳統戰爭中,雙方更注重在物質力量基礎上的綜合較量。如機械化戰爭,主要表現為鋼鐵的較量,是整個國家機器大工業生產能力的全面競賽。信息化戰爭並不排斥物質力量的較量,但更主要的是知識的較量,是創新能力和創新速度的競賽。知識將成為戰爭毀滅力的主要來源,“計算機中一盎司矽產生的效應也許比一噸鈾還大”。

火力、機動、信息,是構成現代軍隊作戰能力的重要內容,而信息能力已成為衡量作戰能力高低的首要標誌。信息能力,表現在信息獲取、處理、傳輸、利用和對抗等方面,通過信息優勢的爭奪和控制加以體現。信息優勢,實質就是在了解敵方的同時阻止敵方了解己方情況,是一種動態對抗過程。它已成為爭奪制空權、制海權、陸地控制權的前提,直接影響著整個戰爭的進程和結局。當然,人永遠是信息化戰爭的主宰​​者。戰爭的籌劃和組織指揮已從完全以人為主發展到日益依賴技術手段的人機結合,對軍人素質的要求也更高。從信息優勢的爭奪到最終轉化為決策優勢,更多的是知識和智慧的競爭。

戰爭力量將走向信息化、智能化

戰爭力量是可直接和間接用於戰爭的各種力量的統稱,打信息化戰爭,自然離不開信息化、智能化的武器裝備和信息化軍隊。

戰爭最基本、最顯著的特徵,就是利用當時最先進的科學技術成果製造最先進的戰爭工具。信息化武器裝備是在機械化裝備基礎上發展起來的,如C4ISR系統、精確制導武器、信息戰裝備和各種高技術作戰平台等。它們都是知識高度密集型的戰爭工具,因而具備傳統戰爭工具無法比擬的性能、功能、作戰能力和效果。同時,它們作戰效能的高低和發揮程度,直接受到信息、信息系統和信息能力的製約。

信息化軍隊是指用信息化武器裝備武裝起來的信息時代的軍隊。其一體化程度將空前提高,整體作戰能力更強大,強調作戰能力的優化組合,各軍種都只是聯合作戰力量的一部分。同時,兵力規模將趨於小型化,編組形式更加靈活多樣,指揮體制也將從垂直樹狀結構轉變為扁平網絡結構。即從上下級多層指揮關係改為橫向溝通、上下一體的指揮關係,減少層級,把盡可能多的作戰單元納入同一個信息層次,實現信息共享,縮短信息流程,以滿足實時化指揮決策的要求。

戰爭模式將趨於體系化、精確化

技術的發展決定著戰術的演變。隨著武器裝備的發展,戰爭規模也在日益擴大,突出表現為戰場從平面向立體空間擴展:由陸地到海洋再到空中和太空,從有形空間到無形的電磁和信息空間,已形成了陸海空天四維一體、有形空間與無形空間相互交融的新型作戰環境。這種網絡化戰場是大縱深、高立體的,前後方區別淡化,時空觀都發生了重大變化,既有傳統的空戰、海戰、陸戰、電子戰,更會出現全新的以網絡攻擊為主的信息戰。依靠信息網絡的支撐,通過信息的有序流動,所有作戰空間內的作戰行動真正地融合為一體。

過去,一件新式武器往往會造成比較大的影響,獲得較好的作戰效果。但在現代戰場上,敵對雙方已不再是單一或少數軍兵種之間的對抗,更不會是單一武器系統的對抗,而是體係與體系的對抗。在信息化戰爭中,這種體系化對抗的程度更甚,將不再強調坦克、飛機、軍艦等單件作戰平台的作戰性能,而是突出信息化武器裝備體系的整體效能,注重發揮多個軍種、多種武器裝備的綜合作戰效能。

消滅敵人是戰爭的重要內容。在機械化戰爭中,火力摧毀主要是面殺傷,如火力壓制、地毯式轟炸、飽和式攻擊等。這種作戰方式對應於工業時代的粗放型生產模式,反映了消耗戰的思想,制勝之道在於從時間、空間、能源、補給等方面不斷消耗和削弱敵人的力量,最後戰勝敵人。而精確打擊符合信息時代的特徵和要求,也反映了信息化戰爭的基本特點。信息時代的集約型生產模式講求效能、效率、效益。武器裝備的智能水平和打擊精度也獲得極大的提高,可做到“點穴式”的摧毀;同時還可以進行精確的非物理性毀傷,如心理戰、信息戰等。另外,精確打擊還可以大幅度降低附帶毀傷,使戰爭的發展與社會文明進程同步,更有利於戰爭手段發揮其獨特作用。

戰爭進程將是短暫的、可控的

信息化戰爭的節奏明顯加快,戰爭進程將變得越來越短,但強度卻越來越高,而人類對戰爭的整體控制能力也在顯著增強。

信息時代的軍隊更注重質量和效能。由數量製勝轉變為質量製勝,是戰爭發生的顯著變化之一。如精確制導武器和高技術作戰平台的結合使用,增強了從敵人防區外實施打擊的能力,可大大降低己方的作戰損失;攻擊精度的不斷提高,可大大減少武器消耗數量。第二次世界大戰中要用9000枚普通炸彈才能炸毀一個目標,現在只要1-2枚導彈或製導炸彈就可以解決問題,作戰節奏和進程自然會越來越快。

層層推進,逐次交戰,集小胜為大勝,這種接觸式、線式作戰是傳統作戰方法的典型直觀反映。而在信息化戰爭中,脫離接觸式、非線式作戰將成為主要形式,作戰行動將在所有作戰空間和戰場全縱深同時展開,首要打擊目標將直接指向敵人重心。尤其是信息戰威力巨大,甚至在敵人毫不知情的狀態下,幾個黑客頃刻間就有可能令敵國經濟和社會陷入癱瘓,從而迅速達成戰爭目的。

China Military Review: Special Operations Forces: The “strategic dagger” of US Foreign Military Operations // 中國軍事評論特种作战部队:美对外军事行动的“战略尖刀”

中國軍事評論特种作战部队:美对外军事行动的“战略尖刀”

来源:解放军报   Since World War II, special operations on its unique flexibility, efficiency, asymmetry, is increasingly becoming an important means to safeguard the strategic interests of the United States the way to deal with the threat of challenges. In recent years, the US military special operations forces is the task type from traditional warfare to expand the area of ​​non-traditional field of battle, much to replace conventional forces to become the protagonist of battlefield information, acts as a US foreign military operations “strategy knife” of the situation.

    War sharpening “of the United States Blade”

Although modern special operations began in World War II, but its position fully aware of the role of the US military and is widely used in the practice of war after World War II. In almost all previous local wars and regional conflicts in the United States to intervene, or can be hidden or US Special Operations Forces found the figure, during record and failure of innovation and development have become the US military special operations “grindstone” so special operations the “United States of Blade,” the increasingly sharp.

Vietnam War can be said that the US large-scale, long the first attempt of special operations. During the war, US special operations forces are widely assumed to wipe out the guerrillas, special reconnaissance, sabotage attack, trainers and other “counter-insurgency” operations, and implementation of the attack, such as Vietnam prisoner of war camps Shanxi operations. Although the injustice of war and strategic guidance mistakes, tactical advantage the US has never been able to get the special operations strategy into a winning situation, sadly had to withdraw troops from Vietnam, but special operations forces in the war revealed adaptability, mobility, concealment, but be sure to get high-level US military, and has been the focus used in subsequent wars and armed conflicts.

In 1980, in order to rescue the detained American Embassy in Iran, more than 60 staff, 97 US special operations long-range raid from Cairo to Tehran. Since the aircraft suddenly encountered sandstorms and failures in the course of action, combined with ill emergency plan, the US military was forced to cancel plans. But the US military did not lose heart, but pay more attention to the lessons learned on the basis of a strong push development of special operations. April 1987, the US Special Operations Command was officially established, special operations forces govern the land, sea and air belongs marks SOF as an independent fighting force officially on the United States in war.

Subsequently, the invasion of Panama in 1989 action, the 1991 Gulf War, the war in Afghanistan in 2001, the 2003 Iraq war and the 2011 war in Libya, the US military will be more and more frequently used for special operations forces and strategic direction of the main season for completion one by one “mission impossible.” Especially in the war in Afghanistan, with the help of advanced information technology tools, the US special operations forces to work independently, creatively objective guidance, penetration strike, buy com collapse, US forces defeated the Taliban regime in a short time to achieve the purposes of war.

US special operations forces continue to promote the development, almost “every battle will be special,” The reason is: First, responsive, compiled capable, able to quickly respond to local emergencies and asymmetric threats; the second is action concealed, sudden strong often the enemy unexpectedly, with minimal resources quickly achieve strategic goals, action to reduce the risk; Third flexible means of warfare, as campaign “global strike” strategic concept important choice; four is better able to fight with other forces joint operations, conventional and unconventional forming closely integrated combat system.

 Great support system under the “sword easy road”

With the evolution of new military revolution in depth, US Special Operations increasingly showing the non-contact combat, to fight the elite fighting from the contact-scale operations, from strategic weapons platform support to support the system, from traditional areas to new areas of the rapidly evolving situation, special combat troops because it can carry out specific tasks to perform conventional forces should not be difficult to complete or to become military to defeat the enemy “killer.”

Trend direct command and control strategy. US Special Operations command and control consists of national and theater-level combat troops and three grade levels. Under normal circumstances, the national command authorities, Special Operations Command, Command theater, theater of military services under the command or function Command commander level performed by operational control. With the mandate of privacy, sensitivity continues to improve, more and more stressed by the US military strategic level special operations were “direct” type vertical command, enhanced controllability operational flexibility. For example, in 2011, and the residence of the US military in Pakistan killed Osama bin Laden raid, Obama and his decision-making team thousands of miles away from the White House situation room, through remote video, real-time synchronization command. This action fully reflects the strategic nature of special operations.

Special blitz highlighting system support. “Tactical operations, strategic support; elite action, system support; local action, global support” has become a significant feature of the US military special operations. Still killed Osama bin Laden, “Neptune Spear” raid, for example, in this battle, on the surface of the US military deployed only four helicopters, 24 “Seal” commandos, it took less than 40 minutes to kill al-Qaeda Osama bin Laden summit. But behind both heaven 35 satellites and more than 40 aircraft to provide a strong information security, there collusion aircraft carrier battle groups at sea, on land as well as support for two military bases in Central Asia, as well as various support ten thousand security personnel. This is a typical “large system support elite action” reflects the profound new form of war in the information age.

Towards a comprehensive joint operations. The US military believes, “joint” is one of the special nature of warfare requires the full participation of the military services and the depth of collaboration. Currently, the US Special Operations not only achieved with the Air Force from the “sensor to shooter” joint, greatly improving its “spike” combat capability, but also to break the union with CIA covert operations, the CIA intelligence-gathering capabilities and special operations forces strike capability combine complementary advantages. Especially after Afghanistan “Operation Enduring Freedom”, the US military special operations but will work with conventional forces from the joint campaign sink to the level of the tactical level, to achieve integrated operations teams level. According to statistics, code-named “Mountain Storm” military implementation of the 2004 crackdown, the US special operations troops with conventional forces conducted 62 joint tactical operations, 40 of which action is implemented in the company level, in action 22 battalion level performed.

The effect of a strike action to pursue the enemy. US Special Operations always attached importance to a direct attack on the enemy’s high-value targets in an attempt to speed up the process of speedy combat strategic objectives. From the recent local wars practice, often other US Special Operations Leadership Summit and pre-emphasis as targets, the implementation of the so-called “decapitation attack” by the sudden rapid surprise attacks, to “lock on”, a hit enemy’s strategic effect. For the first time on the war in Iraq from Saddam to use such tactics, the war in Libya Gaddafi trick, while not directly reach the goal, but the US military special operations against enemy decision-making psychological shock is immeasurable, greatly shaken each other’s will to resist, played a “strike hard” and “soft kill” double effect. It is envisioned that the US military this “sword pay” type of special operations will also continue to unfold.

 Efforts to forge “global power”

Currently, the US has special operations, combat drones and network operations as of great importance for the future operations of the “New Trinity” power, to focus on building, hoping to build a responsive, both small and hard, multi-dimensional and multi-functional special war “global power.”

Strengthening overseas deployment, to expand the number scale. Recently, the US significantly reduced military presence overseas, but the number of overseas US Special Operations forces have been continuously increased, but also a significant increase in the deployment of the number of countries and regions. According to reports, the end of the Bush administration, the US Special Operations Forces deployed in about 60 countries worldwide, to increase to 75 by 2010. As of 2015, the United States Special Operations Forces have been deployed to the world’s 135 countries. To meet the growing demand of the task, in the various branches of the background of widespread layoffs, the US special operations forces increased rather than decreased, the number from 2001 to 2014, 3.3 million to nearly 70,000 people, an increase of about one times, of which 80% deployed overseas. American executives believe scale special operations forces deployed abroad, will significantly improve the ability of US military intervention in global affairs in particular to respond to emergencies.

Optimizing operational grouping, build new units. In order to meet the diverse nature of the war on terror style, US special operations forces structure adjustment pace has accelerated noticeably. In recent years, the focus adjustment is: narrow special operations group size to achieve power “downsizing”; to add a new task forces have been established in the Civil Command, irregular warfare and psychological warfare wing brigade, enhance the combat capability of non-traditional areas, to achieve carry out the task “diversity”; optimization special operations units grouped according to the type of task, we will act flexibly experts, communications specialists, psychologists, explosives experts and other personnel mixed grouping of different expertise, improve the ability to adapt to complex battlefield, combat units to achieve “synthesis of . ”

Comprehensive update equipment, enhance the quality of new combat capability. In recent years, the US military continued to increase investment, research and development of new special operations equipment: First, “Individual Combat System”, mainly by the laser range finder, cameras, environmental sensors, ballistic computer and target tracking device component, with automatic transmission and shielding against was behind the target function, improve the combat capability independent of man; the second is a remote delivery tool to improve special operations MC-130H aircraft and purchase V-22 tilt-rotor aircraft, airborne accurate terrain-following radar, navigation systems and high-speed aircraft resistance, enhance special operations forces behind enemy lines and remote mobile penetration; the third is a new concept weapons, the main enemy is the destruction of electronic equipment computer viruses, electromagnetic pulse weapons. These new weapons once the troops will enable the US military special operations means richer, more diverse mission areas.XX

Not every commandos wore green berets

– Special Forces decryption

Chronicles Dazhaoweibin

In American terms, “special operations forces” (Special Operation Forces) and the “Special Forces” (Special Forces) are two concepts exist simultaneously. The former US Special Operations Command is under the jurisdiction of all forces referred to, including the Army Special Forces, 75 commandos, Navy Seals, “Delta” Force and SEAL Team 6; the latter refers specifically to the Army Special Forces, known as “Green Beret hat “forces. The force is due to Kennedy personally authorized to wear with other branches of the military are not the same Green Beret named.

It has a long history with the CIA origins very well. In 1952 the US created its first “Green Beret” troops, is to OSS (the predecessor of the CIA), “Jed fort” under the leadership of troops as a template. During World War II, “Jed fort” team was ordered to enter the territory of France, Belgium and the Netherlands were occupied, providing weapons and supplies for the resistance groups area, and act as the Supreme Allied Command with contact channels. Responsible for the formation of the force, Colonel Allen Burbank was a veteran of the Office of Strategic Services, the CIA after playing for, has a wealth of experience in covert operations. The task force was originally given is: Suppose the Soviet occupation of Western Europe, they will remain in the Soviet front organization behind the unconventional war. So far, unconventional warfare remains one of the core tasks of the Special Forces.Since the task often requires secrecy in times of peace or war before it started to prepare, and execute peacetime area of ​​responsibility belongs to the CIA’s covert operations mission, so often we need to work with the CIA when the Special Forces carry out such tasks or simply placed under the leadership of the CIA. CIA Special Operations agents are often recruited from the Special Forces veterans, it is not surprising.

Clear division of responsibility area worldwide. “Green Beret” troops now compiled five active duty brigades and two by the National Guard usually responsible for the supervision of trained reserve brigade. Five active-duty brigade Total Posts a million people, are responsible for the Pacific, Africa, the Middle East, Central Asia, the Americas and Europe in five regions, corresponding to the formation of the US theater setting.According to their topography, political ecology, military deployment, the local language and customs of their respective areas of responsibility, etc., to carry out targeted training.Some troops were deployed in a long-term task of the region belongs to the friendly countries to better combat environment where the familiar. Under the big division, and each brigade has a very fine internal division of labor. A Special Forces squad as the basic combat unit, and its 12 members are familiar with the operations, intelligence, weapons, engineering, medical, communications expertise in one of the six, and by cross-training to master one to two additional expertise.

Ability comprehensive, one play multiple roles. Compared to the commando skills to the extreme to show “Delta” force and “SEAL Team 6”, “Green Beret” troops skill players is more comprehensive and balanced, they not only have excellent commando skills, but also possess a the US military called a “diplomatic warrior” skills that language and culture skills, interpersonal skills and political sensitivity. Due to the wide implementation of anti-terrorism, reconnaissance, foreign internal defense, unconventional warfare task, they have to play a role not only heroic commandos, more mature, alert and flexible intelligence agents, coaches and diplomats. In the recruitment process, the “Green Berets” force requirements should recruit must go through foreign language skills tested, along with social communication, military training, weapons, operational and organizational aspects of directing talent. Taking into account the language and cultural skills through short-term training is difficult to obtain, often targeting special forces in recruiting those with an ethnic minority background or appearance, with skilled foreign language ability. Shortlisted players to accept the harsh physical and fighting skills, while also learning psychological warfare course and language intensive training to ensure that they are trained to play multiple comprehensive ability and quality possible.

Frequent use of the name rarely made public. Since the formation of the “green beret” troops will be frequently used, but in view of the confidentiality of their duties, as well as its inherent low profile style, the message about these tasks rarely made public, it is difficult to see in newspapers. For example, in the late 1950s, they have been sent to Thailand, Vietnam, the Philippines, South Korea, Indonesia and other places, for the training of local forces; in 1967 was sent to Bolivia, Bolivian Army responsible for training camp do not move, and to assist them killed the central figure of the Cuban revolution, Che Guevara; in 1989 a large-scale invasion of Panama participated in the “just cause” to overthrow Noriega regime. After the Cold War, the United States authorities for their use continues unabated. “Desert Storm” operation, they were deployed in advance to Kuwait and Iraq depth zone, execute several months of secret reconnaissance missions provided an important headquarters for the coalition military intelligence; aggression in Afghanistan “Enduring Freedom” operation, they had a beard riding a mule, local people dressed in costumes, under air fire support, the leadership of the Northern Alliance armed overthrow of the Taliban regime.

Original Mandarin Chinese:

    自从第二次世界大战以来,特种作战就以其独特的灵活性、高效性、不对称性,日益成为美国维护战略利益、应对威胁挑战的重要手段方式。近年来,美军特种作战部队更是将任务类型从传统作战领域拓展至非传统作战领域,大有取代常规部队成为信息化战场主角,充当美国对外军事行动“战略尖刀”之势。

    战火磨砺“美利坚之刃”

虽然现代特种作战发端于第二次世界大战,但其地位作用被美军充分认识并广泛应用于战争实践则在二战以后。几乎在美国插手的历次局部战争和地区冲突中,都能或隐或现地发现美军特种作战部队的身影,其间的战绩与败笔都成为美军创新发展特种作战的“磨刀石”,使特种作战这一“美利坚之刃”愈加锋利。

越南战争可以说是美军实施大规模、长时间特种作战行动的首次尝试。战争期间,美军特种作战部队广泛承担了清剿游击队、特种侦察、袭击破坏、培训人员等“反暴乱”作战任务,实施了诸如偷袭越南山西战俘营等作战行动。虽然由于战争的非正义性和战略指导的失误,美军始终无法将特种作战取得的战术优势转化为战略胜势,不得不从越南战场黯然撤兵,但特种作战部队在战争中显露出的适应性、机动性、隐蔽性,却获得美军高层肯定,并在随后的战争和武装冲突中得到重点使用。

1980年,为解救被扣押的60多名美国驻伊朗使馆人员,97名美军特战队员从埃及开罗长途奔袭德黑兰。由于在行动过程中突遇沙暴和飞机故障,加之应急预案不周,美军被迫取消计划。但美军并没有丧失信心,反而更加注重在总结经验教训的基础上强力推动特种作战发展。1987年4月,美军正式成立特种作战司令部,统辖陆、海、空所属的特种作战力量,标志着特种作战部队作为一支独立的作战力量正式登上美国战争舞台。

随后,在1989年入侵巴拿马行动、1991年海湾战争、2001年阿富汗战争、2003年伊拉克战争以及2011年利比亚战争中,美军越来越频繁地将特种作战部队用于主要战略方向和关键时节,完成了一个个“不可能的任务”。特别是在阿富汗战争中,借助先进的信息化手段,美军特种作战部队独当一面,创造性地将目标引导、渗透打击、收买瓦解融为一体,使美军在短时间内实现打垮塔利班政权的战争目的。

美军不断推动特种作战部队发展,几乎“每战必特”的原因在于:一是反应灵敏、编成精干,能够快速应对地区性突发事件及非对称威胁;二是行动隐蔽性、突然性强,往往出敌不意,能以最小资源快速达成战略目的,有效降低行动风险;三是作战手段灵活多样,可以作为“全球打击”战役战略构想的重要选择;四是能够较好地与其他作战力量联合行动,形成常规与非常规紧密结合的一体化作战体系。

 大体系支撑下的“剑走偏锋”

随着新军事变革深入演进,美军特种作战日益呈现出从接触作战向非接触作战、从规模作战向精兵作战、从武器平台支撑向战略体系支撑、从传统领域向新型领域快速演变的态势,特种作战部队因为能够遂行常规部队不宜执行或难以完成的特殊任务,成为美军克敌制胜的“杀手锏”。

指挥控制趋向战略直达。美军特种作战的指挥控制由国家级、战区级和作战部队级三个层次构成。通常情况下,由国家指挥当局、特种作战司令部、战区司令部、战区下属军种部队司令部或职能司令部的指挥官按级进行作战控制。随着所执行任务的隐秘性、敏感性不断提高,美军越来越强调由战略高层对特种作战进行“直达式”垂直指挥,增强行动的可控性灵活性。例如,2011年,美军在巴基斯坦突袭本·拉丹住所并将之击毙时,奥巴马和他的决策团队在万里之遥的美国白宫情报室,通过远程视频,进行实时同步指挥。这次行动充分体现了特种作战的战略特质。

特种闪击突出体系支撑。“战术行动,战略支撑;精兵行动,体系支撑;局部行动,全局支撑”已成为美军特种作战的显著特征。仍以击毙本·拉丹的“海王星之矛”突击行动为例,在这场战斗中,表面上美军仅出动4架直升机、24名“海豹”特战队员,用了不到40分钟就击毙了基地组织首脑本·拉丹。但在背后,既有天上35颗卫星、40余架飞机提供强大情报保障,又有海上航母编队接应,还有陆上2个美军驻中亚军事基地的支援,以及近万名各类支援保障人员。这是一次典型的“大体系支撑精兵行动”,深刻折射出信息时代的新战争样式。

作战行动走向全面联合。美军认为,“联合”是特种作战本质之一,需要各军种的全面参与和深度协作。目前,美军特种作战不但实现了与空军从“传感器到射手”的联合,大大提高了其“秒杀”作战能力,而且突破了与中央情报局秘密行动的联合,将中情局情报搜集能力与特种作战部队打击能力有机结合,实现优势互补。尤其是在阿富汗“持久自由行动”以后,美军特种作战更是将与常规部队的联合从战役层次下沉至战术层次,实现小分队一级的一体化作战。据统计,2004年美军实施的代号“山地风暴”清剿行动中,美特种作战部队就与常规部队进行了62次联合战术行动,其中40次行动是在连一级实施的,22次行动是在营一级进行的。

行动效果追求一击制敌。美军特种作战历来重视对敌方高价值目标的直接打击,企图以此加快作战进程迅速达成战略目的。从近期几场局部战争实践看,美军特种作战经常将对方首脑及领导层作为先期重点打击目标,实施所谓的“斩首攻击”,通过突然迅猛出其不意的攻击,达到“一剑封喉”、一击制敌的战略效果。从伊拉克战争首次对萨达姆使用这种战法,到利比亚战争对卡扎菲故技重施,虽然没有直接达成目的,但美军的特种作战对敌方决策层的心理震撼却是不可估量的,极大动摇了对方的抵抗意志,起到了“硬打击”与“软杀伤”的双重功效。可以预想,美军这种“剑走偏锋”式的特种作战还将会不断上演。

 着力锻造“全球力量”

当前,美军已将特种作战、无人机作战和网络作战列为对未来作战有重大意义的“新三位一体”力量,加以重点建设,希望打造一支反应灵敏、既小又狠、多维多能的特战“全球力量”。

强化海外部署,扩大规模数量。近期,美军大幅减少海外军事存在,但海外美军特种作战部队人数却在不断增加,部署国家和地区数量也在显著上升。据报道,小布什政府末期,美军特种作战部队大约部署在全球60个国家,到2010年增加至75个。截至2015年,美国特种作战部队已经部署到世界上135个国家。为了满足不断增长的任务需求,在各军兵种普遍裁员的大背景下,美军特种作战部队不减反增,人数从2001年的3.3万人增至2014年的近7万人,增加了约一倍,其中80%部署在海外。美军高层认为,扩大特种作战部队海外部署的规模,将显著提高美军介入全球事务特别是应对突发事件的能力。

优化作战编组,增建新型部队。为适应反恐战争样式多样化的特点,美军调整特种作战部队结构的步伐明显加快。近几年调整重点为:缩小特种作战小组规模,实现力量“小型化”;增加新的任务部队,陆续组建民事司令部、非正规战联队及心理战大队,增强非传统领域作战能力,实现遂行任务“多元化”;优化特种作战分队编组,根据任务类型,灵活将行动专家、通信专家、心理专家、爆破专家等不同专长人员进行混合编组,提高复杂战场适应能力,实现作战单元“合成化”。

全面更新装备,提升新质作战能力。近年来,美军不断加大投入,研发新型特种作战装备:一是“单兵战斗系统”,主要由激光测距仪、摄像机、环境传感器、弹道计算机以及目标跟踪装置组成,具有自动发射和打击遮蔽物背后目标的功能,提高单兵独立作战能力;二是远程投送工具,改进MC-130H特种作战飞机和采购V-22偏转翼飞机,利用机载精确的地形跟踪雷达、导航系统以及飞机高速性,提升特种作战部队远程机动和敌后渗透能力;三是新概念武器,主要是破坏敌电子设备的计算机病毒、电磁脉冲武器等。这些新武器一旦装备部队,将使美军特种作战手段更加丰富,任务领域更加多样。

不是每名特战队员都戴绿色贝雷帽

——美国陆军特种部队解密

史志达 赵蔚彬

在美军术语中,“特种作战部队”(Special Operation Forces)与“特种部队”(Special Forces)是同时存在的两个概念。前者是美军特种作战司令部下辖所有部队的统称,包括陆军特种部队、75突击队、海豹突击队、“三角洲”部队和海豹6队等;后者则专指陆军特种部队,即“绿色贝雷帽”部队。该部队因被肯尼迪亲自授权佩戴与其他兵种不一样的绿色贝雷帽而得名。

历史悠久,与中情局渊源甚深。1952年美军组建第一支“绿色贝雷帽”部队,便是以战略情报局(中情局前身)领导下的“杰德堡”部队为模板。二战期间,“杰德堡”队员曾受命进入被占领的法国、比利时和荷兰境内,为该地区抵抗组织提供武器和补给,并充当其与盟军最高指挥部的联系渠道。负责组建该部队的阿伦·班克上校曾是战略情报局的一名老兵,后效力于中情局,有着丰富的秘密行动经验。该部队最初被赋予的任务是:假设苏联占领西欧,他们将留在苏军战线后方组织非常规战。至今,非常规战依然是美国陆军特种部队的核心任务之一。由于该任务往往需要在和平时期秘密进行或在战争打响之前就做好准备,而和平时期执行秘密行动任务属于中情局的责任领域,所以特种部队执行此类任务时往往需要与中情局合作或干脆置于中情局的领导之下。中情局特别行动处的特工往往从特种部队老兵中招募,也就不足为奇。

分工明确,责任区域覆盖全球。“绿色贝雷帽”部队现编5个现役大队和2个平时由国民警卫队负责训练督导的后备役大队。5个现役大队总员额一万余人,分别负责太平洋、非洲、中东中亚、美洲和欧洲五个区域,与美国战区设置形成对应。他们根据各自责任区域的地形、政治生态、军事部署、当地语言和风土人情等特点,开展针对性训练。有些部队被长期部署在所属任务区域的某个友好国家,以更好地熟悉那里的作战环境。在大的分工之下,每个大队内部又有着极为精细的分工。作为特种部队最基本的作战单元的A小队,其12名队员分别谙熟作战、情报、武器、工程、医疗、通信六项专长中的一项,同时通过交叉训练掌握另外一到两项专长。

能力全面,一身扮演多重角色。相比将突击队技能展现到极致的“三角洲”部队和“海豹6队”,“绿色贝雷帽”部队队员的技能则更加全面和均衡,他们不仅拥有出色的突击队技能,还拥有一种被美军称为“外交勇士”的技能,即语言文化技能、人际交往能力和政治敏感性。由于广泛执行反恐、侦察、外国内部防卫、非常规战等任务,他们要扮演的角色不仅是英勇善战的突击队员,更是成熟、机警而灵活的情报员、教练员和外交官。在招募过程中,“绿色贝雷帽”部队要求应招人员必须经过外语技能测试,同时具备社会交际、军事训练、武器操作和组织指挥方面的天赋。考虑到语言和文化技能难以通过短期训练取得,特种部队在招募时往往瞄准那些具备少数民族背景或外貌、具备熟练外语能力的人。列入备选名单的队员在接受严酷的体能和战斗技能训练的同时,还要学习心理战课程并进行语言方面的强化训练,确保他们练就身兼多能的全面能力素质。

运用频繁,名字很少见诸报端。自组建以后,“绿色贝雷帽”部队便被频繁使用,但鉴于他们任务的保密性,以及其固有的低姿态作风,关于这些任务的消息很少公之于众,更是难见报端。比如上世纪50年代中后期,他们先后被派往泰国、越南、菲律宾、韩国、印尼等地,用于训练当地部队;1967年被派往玻利维亚,负责训练玻利维亚陆军别动营,并协助他们杀害了古巴革命核心人物切·格瓦拉;1989年大规模参与了入侵巴拿马的“正义事业”行动,推翻了诺列加政权。冷战结束后,美国当局对他们的运用有增无减。“沙漠风暴”行动中,他们被提前部署到科威特和伊拉克境内的纵深地带,执行为期数月的秘密侦察任务,为联军司令部提供了重要军事情报;在侵略阿富汗的“持久自由”行动中,他们留着胡须、骑着骡马、身着当地人民的服装,在空中火力的支援下,领导北方联盟武装推翻了塔利班政权。

来源:解放军报

2016 Development of China’s Network Security Law & Revised National Security Legislation // 中國今年制定网络安全法 修证券法

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

NPC Standing Committee work report of the Standing Committee Zhang Dejiang as the National People’s Congress. Xinhua News Agency issued

  Zhang Dejiang chairman of the NPC Standing Committee work report for

Second session of the Fourth Session of the 9th National People’s Congress held its second plenary meeting in the afternoon in the Great Hall, commissioned by the National People’s Congress, Zhang Dejiang chairman to report to the General Assembly. Conference and heard presentations on the draft law of charity. Xi Jinping, Li Keqiang, Yu Zhengsheng, Liu Yunshan, Wang Qishan, Zhang Gaoli, etc. on the rostrum. Executive meeting presided over by the President of the General Assembly, the Executive Chairman Zhang Ping.

2015

We have done what?

Zhang Dejiang said in the report, over the past year, the Standing Committee formulated five laws, and a decision to change the law on legal issues 37, decided to submit to the National People’s Congress for consideration a through decisions on legal issues 8 ; law enforcement inspection six cases heard and deliberated the State Council, the supreme people’s Procuratorate 17 report on the work carried out three times and three thematic inquiry special investigations by two resolutions; consideration of the motion on behalf of the outcome of the review by the special committee 8 report, the report of the Credentials Committee on behalf of the eligible individual representatives of six decided to approve the treaty between China and foreign states, international agreements and conventions to join 11, a number of decisions and approve the appointment and removal of state organs and the like.

In the area of ​​national security-related legislation, the Criminal Law Amendment (ix) by the five terrorist-related activities included in the Criminal Responsibility range.Legislation in the field of people’s livelihood, be revised Population and Family Planning Law, the implementation of “comprehensive two-child” policy since January 1, 2016.

Second session of the Third Session of the NPC Standing Committee to determine the tasks have been completed, the Standing Committee all aspects of work have made new progress, new results.

2016

General Rules of Civil developing market economy amend the Securities Act

Chairman Zhang Dejiang said in the report, 2016 will be legislation, supervision is the key. By 2016, the NPC Standing Committee will improve the socialist market economy legal system, including modifying the Securities Act, SME Promotion Law and the like. April 2015 and 12th National People’s Congress of the fourteenth session of the draft amendments to the Securities Act conducted the first consideration.

Report, focus of the market play a decisive role in the allocation of resources and better play the role of government, focus on improving the level of economic and social development of the rule of law and market economy. General Rules of Civil develop and improve basic civil legal system. Developing an environmental tax, tonnage tax, tobacco tax law, food law, asset valuation method, modify the Securities Act, SME Promotion Law and the like.

“Adhere to green development, promote the construction of ecological civilization, to build the most stringent environmental protection system, modify the Water Pollution Control Act, the Marine Environment Protection Law, Wildlife Law and other.” The report said.

Social and cultural development of network security law revision Red Cross Society

2016, the NPC Standing Committee will coordinate development of legislation in the field of social, cultural, etc., making medicine law, Community Corrections Act, modify Private Education Promotion Law, the Red Cross method.

Report, in terms of deepening the reform, the development of public cultural services security law, the promotion of the film industry and the like. To promote civil-military integration depth development, deepen reform of national defense and the armed forces, the development of national defense transportation law, amend law on military officers and so on. In promoting anti-corruption legislation, the development of international criminal judicial assistance law, revise study Administrative Supervision Law. Develop overseas NGO management method, network security law.

In addition, the report proposes reform of the authorization decision to do related work.

The implementation of the supervision and inspection of food safety inspection method

Zhang Dejiang said in the report, in 2016, the NPC Standing Committee will strengthen the supervision of the implementation of the law and check the implementation of the Food Safety Law and other six laws.

This six laws include: Food Safety Law, Water Law, promote scientific and technological achievements into law, the Environmental Protection Act, the Road Traffic Safety Law, Production Safety Law.

Meanwhile, the NPC Standing Committee will consider combining food safety law enforcement inspection report carried out three Environmental Protection Act, Production Safety Law and other topics upon request. Strengthen tracking supervision, to consider the report of the State Council to listen to feedback on research process rights of the elderly security law, food safety law enforcement inspection report and deliberations on the situation. Listen to consider the report of the State Council on the implementation of the Exit and Entry Management Law.Water Pollution Control Act to carry out the implementation of special investigations.

New initiative to review the filing and examination of administrative regulations

  By 2016, the NPC Standing Committee will strengthen the filing and examination of the development of new administrative regulations and judicial interpretations active review examined piece by piece.

Original Mandarin Chinese:

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

全国人大常委会委员长张德江作全国人民代表大会常务委员会工作报告。新华社发

张德江委员长作全国人大常委会工作报告

十二届全国人大四次会议9日下午在人民大会堂举行第二次全体会议,受全国人大常委会委托,张德江委员长向大会报告工作。会议并听取了关于慈善法草案的说明。习近平、李克强、俞正声、刘云山、王岐山、张高丽等在主席台就座。会议由大会主席团常务主席、执行主席张平主持。

2015年

都做了啥?

张德江在报告中说,一年来,常委会制定5部法律,修改37部法律和1个有关法律问题的决定,决定提请全国人民代表大会审议的法律案1件,通过有关法律问题的决定8个;检查6部法律实施情况,听取审议国务院、最高人民法院、最高人民检察院17个工作报告,开展3次专题询问和3项专题调研,通过2个决议;审议通过专门委员会关于代表议案审议结果的报告8个、代表资格审查委员会关于个别代表的代表资格的报告6个,决定批准我国与外国缔结的条约、协定以及加入的国际公约11件,决定和批准任免一批国家机关工作人员等。

在国家安全领域相关立法方面,通过的刑法修正案(九)中将五种恐怖相关活动列入刑事追责范围。在民生领域立法方面,及时修改人口与计划生育法,自2016年1月1日起实施“全面两孩”政策。

十二届全国人大三次会议确定的常委会各项任务已经完成,常委会各方面工作都取得了新进展、新成效。

2016年

将要做啥?

市场经济修改证券法制定民法总则

张德江委员长在报告中说,2016年将以立法、监督为重点。2016年,全国人大常委会将完善社会主义市场经济等方面法律制度,其中包括修改证券法、中小企业促进法等。2015年4月,十二届全国人大常委会第十四次会议对证券法修订草案进行了第一次审议。

报告提出,紧紧围绕使市场在资源配置中起决定性作用和更好发挥政府作用,着力提高经济社会发展和市场经济运行的法制化水平。制定民法总则,健全民事基本法律制度。制定环境保护税法、船舶吨税法、烟叶税法、粮食法、资产评估法等,修改证券法、中小企业促进法等。

“坚持绿色发展、促进生态文明建设,构建最严格的生态环境保护制度,修改水污染防治法、海洋环境保护法、野生动物保护法等。”报告中说。

社会文化制定网络安全法修改红十字会法

2016年全国人大常委会将统筹推进社会、文化等领域立法工作,制定中医药法、社区矫正法,修改民办教育促进法、红十字会法。

报告提出,在深化文化体制改革方面,制定公共文化服务保障法、电影产业促进法等。在促进军民融合深度发展、深化国防和军队改革方面,制定国防交通法,修改现役军官法等。在推进反腐败立法方面,制定国际刑事司法协助法,研究修改行政监察法。制定境外非政府组织管理法、网络安全法。

此外,报告提出做好改革试点授权决定相关工作。

监督检查检查食品安全法实施情况

张德江在报告中说,2016年,全国人大常委会将加强对法律实施情况的监督,检查食品安全法等6部法律的实施情况。

这6部法律包括:食品安全法、水法、促进科技成果转化法、环境保护法、道路交通安全法、安全生产法。

同时,全国人大常委会将结合审议食品安全法、环境保护法、安全生产法等3个执法检查报告开展专题询问。加强跟踪督办,听取审议国务院关于研究处理老年人权益保障法、食品安全法执法检查报告及审议意见情况的反馈报告。听取审议国务院关于出境入境管理法执行情况的报告。开展水污染防治法实施情况专题调研。

备案审查主动审查研究新的行政法规

2016年,全国人大常委会将加强备案审查工作,对新制定的行政法规、司法解释逐件进行主动审查研究。

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

China Military Space Power: War to Seize Commanding Heights // 中國網絡戰爭太空力量:抢占战争制高点

中國網絡戰爭太空力量:抢占战争制高点

With the continuous development of space technology, space, military applications increasingly widespread, more and more countries joined the ranks of the space race –

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29

 

    “Who controls the universe, whoever controls the earth; who controls the space, whoever controls the initiative in war.” Former US President John F. Kennedy is determined to promote the development of American space technology, space will also be incorporated into the great power game and competition category. With the development of space technology and space forces, military space is used widely in shaping the international strategic pattern, pushing the world’s new revolution in military affairs, and played a key role.

    Two-hegemony, the main purpose of the service strategy

July 1961, the United States has just successfully developed the use of “Samos” satellites, captured Soviet SS-7 and SS-8 deployed intercontinental ballistic missile tests, the Soviet Union opened a “missile gap” truth became the third the key Berlin crisis resolved smoothly, marking the space support forces boarded the stage of history.

Since then, the United States, the two superpowers, the Soviet Union from the strategic objective of global hegemony starting to build a more complete support for space power systems.

Since an important strategic position, it has been solely responsible for the construction of satellites by the US intelligence community, in order to facilitate confidential. US Department of Defense is leading the “Defense Satellite Communications System,” “Fleet Satellite Communication”, “Military Star” three communications satellite system construction, on this basis, build a “Air Force satellite communications” system for the US national command structure and strategic nuclear forces provided between the safe, reliable, high viability of the global two-way communications capability. Meanwhile, the US Department of Defense has also developed strategies for the deployment of ballistic missile early warning “Defense Support Program” satellite navigation for nuclear submarines “TRANSIT” satellite for global meteorological observation “DMSP” and other systems, the formation of a relatively complete system.

In order to compete with the United States, the Soviet Union launched a comprehensive space forces, from the development of “Zenith”, “amber” reconnaissance satellite “Lightning” communications satellite, “sail” navigation satellite, the “eye” early warning satellites and “Meteor” weather as the representative of satellite space power system.

Throughout the Cold War, the role of the US-Soviet space power is mainly reflected at the strategic level, both the use of near-real-time reconnaissance and early warning satellites to detect each other’s strategic dynamic use of communication satellites and navigation satellites for command and control of strategic nuclear forces, formation of an effective nuclear deterrence combat system, a profound impact on the world strategic pattern of the Cold war.

With space development focus to shift from military spacecraft launch vehicles, various military satellite systems gradually have the ability to use large-scale, the Soviet Union began to build a dedicated space forces command structure. In 1985, the US military set up a joint Space Command. Administration of the Soviet spacecraft in 1982, the formerly strategic rocket forces, responsible for the development of space power transfer scribe to support the Department of Defense, and later upgraded to bureau director of the spacecraft, so space support force directly under the arms of the Soviet Union became the Department of Defense.

    Pack and play, to expand the role of tactical action

The 1991 Gulf War, the US military space forces operations provided critical reconnaissance, early warning, communications, navigation, meteorological services, marking the beginning of space support from the strategic level into the tactical level.

Subsequently, the US military began to develop better able to support tactical space combat support forces launched a large-scale construction of various types of military satellites and upgrading. “Global Positioning System” fully completed “keyhole -12” “Future Imagery Architecture”, “space-based infrared system” and “Global Broadband Satellite Communication”, “Advanced Extremely High Frequency”, “Mobile User Objective System” and other new generation of satellites have been put into use. 2003 Iraq war, the total number up to 167 US satellite. By the end of 2015, US satellites in orbit nearly 400, of which more than 120 pieces of military satellites, forming a powerful space support operations capabilities.

In strengthening the power of construction, the US military in 2002, the Joint Space Command Strategic Command incorporated, unified management of the armed forces Space Command, in order to better organize and direct the power of space support strategic, operational and tactical military operations at all levels. The military services also formed their own space support forces and support the preparation of models to successfully achieve tactical level space support.

Russia’s lack of independence early strength, inherited the former Soviet space support force can maintain normal, resulting in a sharp decline in the number of satellites in orbit, and only 97 in orbit until 2002. In view of this situation, the Russian military space forces carried out the reform, the establishment of an independent space force in 2001, began to recover and rebuild its military satellite system. After the start of the “new look” reform, the Russian space force in 2011 to form the basis of the air and space defense troops, again in 2015 and the Air Force air and space defense troops merge to form air and space forces, responsible for the Russian spacecraft control, missile warning management system attacks and space monitoring system operation.

After the reform and adjustment, all kinds of Russian satellite system gradually restored. By the end of 2015, Russian satellites in orbit nearly 130, of which nearly 80 military satellites. But Russian military believes that blow from the air and space will be the main threat facing Russia, decide the future of air and space warfare has become the key to victory in the field, and therefore the full development of the Russian aerospace defense forces, space support forces in a subordinate position or service. In the previous reform, satellite surveillance, satellite communications, satellite navigation and other space support system construction management still the Russian Defense Ministry and General Staff Operations Department under the relevant commitment, the services are generally lacking space support personnel, operational and tactical levels than use low. During the Russia-Georgia war of 2008, the Russian military satellite reconnaissance had revealed not timely, satellite communication services and poor.

While the US and Russia to develop space forces, more and more countries joined the ranks of the space race. India announced in 2007 to establish the “Aerospace Defense Command”, to manage India’s national space assets, and space warfare weapon concept study, the Indian Air Force has been established aerospace brigade. Japan in 2009 adopted the “Basic Law Aviation”, the Japanese Air Self Defense Force to take advantage of space resources, and expand research-related policy formulation and planning to lay the legal basis for future space operations. Some other countries have also expressed varying degrees of military commitment to the development and use of space and plans.

    Defense against US efforts to seize the initiative

As more and more countries enter the field of space, space security environment has undergone significant changes. Especially in the US view, the space has a non-former “safe harbor.” US Joint Chiefs of Staff in 2013 edition of “space war” doctrine stated that the commander must take into account a malicious adversary action may be taken, and can continue to maintain military capability in the case of space capabilities downgrade. For this purpose, a step the US took the lead in the field of space, launched a series of offensive and defensive measures.

– Improve space surveillance capability. February 2015, the US Air Force and Lockheed – Martin launched the new “Space Fence” radar system construction work. The system can be monitored for the first time all over the United States via satellite from the master satellite elapsed time, attitude and orbit, etc., can also detect low orbit target as small as 10 cm in diameter, thereby greatly enhancing the US space situational awareness ability.The US Air Force ground-based photovoltaic system and deep space exploration systems, missile warning and space surveillance radar network system together constitute from low earth orbit to deep space orbit space surveillance systems perspective.

– Improve the existing space forces invulnerability. 2013 US military issued a “survivability and distributed space systems architecture” white paper proposes the use of structural separation, functional decomposition, load carrying, decentralized multi-track, multi-domain decomposition operations and other measures to improve the survivability of space systems support.

– Emphasis on the integrated use of space technology and traditional techniques. 2014 US release of “Towards a new strategy to offset the” proposed in the report, the US needs to soaring losses caused by the loss of the base system, the measures include accelerating the development of alternative GPS system, equipped with long endurance and / or aerial refueling capability. ” mixed level “intelligence surveillance and reconnaissance UAVs.

– The establishment of the development model construction space forces and civilian integration. US military plans to use leased wartime civil and commercial space systems and services, carrying a military payload on a commercial satellite, direct purchase of advanced commercial or commercial systems to the military, etc., to supplement the existing space support capabilities.

– By conducting military exercises in the development of space power construction using the theory. US Joint Staff, Air Force, Navy and Army space support operations in both the theme of military exercises. In 2001 the US Air Force Space Command began to dominate “Schriever” space war military exercises have been organized nine times.

– Strengthening Space Operations organization and command. September 2015, the US Defense Department and intelligence community established an inter-agency Joint Space Operations Center, responsible for the integration of satellite reconnaissance data, strengthening space reconnaissance capability, military satellite monitoring operation, to prevent potential adversaries to attack US space assets.

– Strengthening Space offensive forces. May 2015, the US X-37B flight test for the fourth time. Although the Americans called it “Orbital Test Vehicle,” but it remained silent on key information. Speculation, X-37B has the ability to take military action including control, capture and destroy enemy spacecraft, military reconnaissance on the enemy. In this sense, X-37B is likely to be the first human space fighter. In addition, the United States has stepped up the construction of space attack power laser, microwave, anti-satellite missiles, hoping to keep the lead in the space race in the future, continue to maintain its dominance.

    Overall, the world’s military powers have attached great importance to space support the construction and development of power, but the situation near several local wars, the only United States and Russia have a more comprehensive strategic, operational and tactical levels of space capabilities, other countries space is still the main force in the strategic use of the service. In the new space, the security situation, the US military has launched a new round of space forces change the face of the future US military space forces are likely to be a qualitative change occurs, information warfare appearance may therefore profoundly changed.

Original Manadrin Chinese:

随着太空技术不断发展,太空军事应用日益广泛,越来越多的国家加入了太空竞争行列

“谁控制了宇宙,谁就控制了地球;谁控制了空间,谁就控制了战争的主动权。”美国前总统肯尼迪的判断,推动了美国太空技术的发展,也将太空纳入了大国博弈和竞争的范畴。随着太空技术和太空力量的不断发展,太空军事应用日益广泛,在塑造国际战略格局、推动世界新军事变革等方面发挥了关键性作用。

    两强争霸,主要服务战略目的

1961年7月,美国利用刚刚研制成功的“萨莫斯”侦察卫星,拍摄到苏联SS-7和SS-8洲际弹道导弹试验部署情况,揭开了美苏“导弹差距”真相,成为第三次柏林危机顺利解决的关键,标志着太空支援力量登上了历史舞台。

此后,美、苏两个超级大国从全球争霸的战略目的出发,建起了较为完备的太空支援力量体系。

由于战略地位重要,侦察卫星的建设一直由美国情报界独立负责,以利保密。美国国防部则主导了“国防卫星通信系统”“舰队卫星通信”“军事星”三大通信卫星系统建设,在此基础上构建了“空军卫星通信”系统,为美国国家指挥机构和战略核部队之间提供安全、可靠、高存活性的双向全球通信能力。同时,美国国防部还研制部署了用于战略弹道导弹预警的“国防支援计划”卫星、用于核潜艇导航的“子午仪”卫星、用于全球气象探测的“国防气象卫星”等系统,形成了较为完备的体系。

为了与美国抗衡,苏联也开展了全面的太空力量建设,发展起以“天顶”“琥珀”侦察卫星、“闪电”通信卫星、“帆”导航卫星、“眼睛”预警卫星及“流星”气象卫星等为代表的太空力量体系。

整个冷战期间,美苏太空力量的作用主要体现在战略层面,双方利用侦察卫星和预警卫星近实时侦测对方的战略动态,利用通信卫星和导航卫星进行战略核部队指挥控制,形成了有效的核威慑作战体系,深刻影响了冷战时期的世界战略格局。

随着航天发展重点由运载火箭向军用航天器转变,各种军用卫星系统逐渐具备规模化运用能力,美苏开始组建专门的太空力量指挥机构。1985年,美军成立了联合太空司令部。苏联则于1982年把原属战略火箭军、负责发展太空支援力量的航天器总局转隶给国防部,而后又升格为航天器主任局,使太空支援力量成为了苏联国防部的直属兵种。

    群雄并起,作用向战役战术行动拓展

1991年的海湾战争中,太空力量为美军作战行动提供了关键的侦察、预警、通信、导航、气象等服务,标志着太空支援开始从战略层次进入到战役战术层次。

随后,美军开始大力发展能够更好地支持战役战术作战的太空支援力量,启动了各类军用卫星的大规模建设和升级换代。“全球定位系统”全面建成,“锁眼-12”“未来成像体系结构”“天基红外系统”“宽带全球卫星通信”“先进极高频”“移动用户目标系统”等新一代卫星相继投入使用。2003年的伊拉克战争中,美国使用卫星总数达167颗。截至2015年底,美国在轨卫星近400颗,其中军用卫星120余颗,形成了强大的太空支援作战能力。

在加强力量建设的同时,美军于2002年把联合太空司令部并入战略司令部,统管三军太空司令部,以更好地组织指挥太空支援力量战略、战役、战术各层次的军事行动。各军种也形成了各自的太空支援力量编制和支援模式,以顺利实现战役战术层次的太空支援。

俄罗斯独立初期国力不足,所继承的前苏联太空支援力量也无法正常维系,导致在轨卫星数量急剧下降,到2002年为止只有97颗在轨运行。针对这种局面,俄军进行了太空力量改革,于2001年成立了独立的航天兵,开始恢复和重建其军用卫星系统。“新面貌”改革开始后,俄于2011年以航天兵为基础组建了空天防御兵,2015年又把空军和空天防御兵合并组建了空天军,负责俄航天器发射控制、导弹预警袭击系统与太空监视系统的管理运行。

经过改革调整,俄各类卫星系统逐渐得到恢复。截至2015年底,俄在轨卫星近130颗,其中军用卫星近80颗。但俄军认为,来自空天的打击将是俄面临的主要威胁,空天已成为决定未来战争胜负的关键领域,因此俄全力发展空天防御力量,太空支援力量处于从属或服务地位。在历次改革中,卫星侦察、卫星通信、卫星导航等太空支援系统的建设管理仍由俄国防部及总参谋部下属的相关业务局承担,各军种也普遍缺乏太空支援人才,战役战术运用水平较低。在2008年俄格战争期间,俄军就曾暴露出卫星侦察不及时、卫星通信服务差等问题。

在美俄大力发展太空力量的同时,越来越多的国家加入了太空竞争的行列。印度2007年宣布要筹建“航空航天防御司令部”,以管理印度全国的空间资产,并对太空战武器进行概念研究,印度空军已经成立了航空航天大队。日本于2009年通过了《航空基本法》,使日本航空自卫队得以利用太空资源,并展开相关政策的研究、制定和规划,为未来太空行动奠定法理基础。其他一些国家也不同程度表达出军事开发和利用太空的决心和计划。

    攻防对抗,美国着力抢占先机

随着越来越多的国家进入太空领域,太空安全环境发生了显著变化。特别是在美军看来,太空已非昔日的“安全港”。美军参联会在2013年版《太空作战》条令中指出,指挥官必须考虑到敌对方可能采取的恶意行动,并能够在太空能力降级的情况下继续保持军事能力。为达到这一目的,美军率先一步,在太空攻防领域推出了一系列措施。

——提高太空监视能力。2015年2月,美空军和洛克希德-马丁公司启动了新型“太空篱笆”雷达系统建设工作。该系统可在第一时间监控到所有从美国上空经过的卫星,掌握卫星经过的时间、姿态和轨道等,还可探测直径小至10厘米的中低轨道目标,从而大大增强美国的太空态势感知能力。该系统与美空军陆基光电深空探测系统、导弹预警雷达网和太空监视系统共同构成从近地轨道到深空轨道的立体空间目标监视系统。

——提高现有太空力量的抗毁性。2013年美军发布了《抗毁性与分散式太空系统体系结构》白皮书,提出采用结构分离、功能分解、载荷搭载、多轨道分散、多作战域分解等措施,来提高太空支援系统生存能力。

——重视太空技术与传统技术的综合使用。2014年美发布的《迈向新抵消战略》报告中提出,美国需要对冲天基系统丧失所带来的损失,措施包括加快研发GPS替代系统、装备具有长持久力和/或空中加油能力的“高低混合”情报监视与侦察无人机等。

——建立军民融合的太空力量建设发展模式。美军计划采用战时租用民用与商用太空系统服务、在商业卫星上搭载军用载荷、直接购买先进的民用或商业系统转为军用等方式,补充现有太空支援能力的不足。

——通过开展军事演习发展太空力量建设运用理论。美军联合参谋部、空军、海军和陆军都有以太空支援作战为主题的军事演习。2001年美空军太空司令部开始主导“施里弗”太空战军事演习,迄今已举办9次。

——强化太空作战组织指挥。2015年9月,美国防部与情报界成立了机构间联合太空作战中心,负责整合卫星侦察数据、强化太空侦察能力,监控美军卫星运行情况,防范潜在对手攻击美国太空资产。

——加强太空进攻力量建设。2015年5月,美国X-37B进行了第四次飞行试验。虽然美国人将之称为“轨道试验飞行器”,但在关键信息上却三缄其口。外界猜测,X-37B有能力采取的军事行动包括控制、捕获和摧毁敌国航天器,对敌国进行军事侦察等。在这个意义上,X-37B很可能将是人类首架太空战斗机。此外,美国还加强了激光、微波、反卫星导弹等太空攻击力量的建设,希望在未来的太空竞赛中保持先机,继续维持其霸主地位。

总的看来,世界军事强国都高度重视太空支援力量的建设和发展,但就近几次局部战争情况来看,只有美、俄具备了较为完备的战略、战役和战术层次太空能力,其他国家的太空力量仍主要服务于战略运用。在新的太空安全形势下,美军又发起了新一轮太空力量变革,未来美军太空力量的面貌有可能会发生质的变化,信息化战争面貌也可能因此而发生深刻改变。

New Progress States space forces

    United States–

    Get rid of the GPS “dependency syndrome”

    Currently, almost all US military combat platforms and systems rely on GPS or GPS-based navigation system. However, GPS navigation presence signal is weak, poor penetration, vulnerable to interference, vulnerable to cyber attacks and other defects. To avoid huge risks due to excessive reliance GPS brought the US Defense Advanced Research Projects Agency (DARPA) in recent years have launched the “micro-positioning, navigation, timing and technology”, “adaptive navigation system,” “Quantum Perception and auxiliary readout technology “” ultrafast laser Science and Engineering “,” get in the fight against environmental space, time, and location information “and does not rely on GPS navigation, positioning, timing and technology research projects.

    Russia –

    Restart “satellite killer” program

    Russia has shelved the case in the official anti-satellite weapons program, the “satellite killer” plan, but the Russian side the key technology in the field has never been completely lost. According to media reports, the Russian military had for launch in 2013, code-named “2014-28E” (also known as the Universe 2499) of the mysterious object. The object was observed using a series of non-normal but the engine very precise orbit maneuver, it seems have the ability to be able to sneak up on other satellites.

    Japan –

    Establishment of space surveillance units

    August 28, 2014, Japan’s defense ministry revised the “development and utilization of the basic principle of the universe,” clearly pointed out that Japan will set up a special space surveillance forces of the universe and garbage run dynamic satellite tracking and analysis, in order to gradually strengthen the perception of space ability. The move aims to strengthen the Japan-US cooperation in space, to deal with weapons to attack from satellites will strengthen the capacity to collect pictures from space using satellites for ballistic missile launch early monitoring and analysis, to enhance early warning capabilities.

    India –

    Construction of Regional Satellite Navigation System

    March 28, 2015, India’s fourth-navigation satellites successfully launched India’s regional satellite navigation system gradually formed. India according to plan, the work of the network system will be divided into two steps: The first step is to launch geostationary satellites covering the whole territory of India’s regional satellite navigation system, the second step is from regional satellite navigation systems to the Indian version of the global satellite positioning system forward. The system will provide civilian and military both services.

 各国太空力量建设新进展

    美国——

    摆脱GPS“依赖症”

    目前,美军几乎所有的军用系统和作战平台都依靠GPS或基于GPS的组合导航系统。但是,GPS导航存在信号较弱、穿透能力差、易受干扰、易受网络攻击等缺陷。为避免由于过度依赖GPS而带来的巨大风险,美国防高级研究计划局(DARPA)近年来陆续开展了“微型定位、导航、授时技术”“自适应导航系统”“量子辅助感知与读出技术”“超快激光科学与工程”“在对抗环境下获得空间、时间和定位信息”等不依赖GPS的导航、定位、授时技术研究项目。

    俄罗斯——

    重启“卫星杀手”计划

    俄罗斯曾在官方场合搁置了反卫星武器计划,即“卫星杀手”计划,但俄方在该领域的关键技术从未完全丢失。据媒体报道,俄军方曾于2013年发射代号为“2014-28E”(或称宇宙2499)的神秘物体。该物体被观测到使用发动机进行一系列非正常但非常精准的机动变轨,似乎具备能悄悄接近其他卫星的能力。

    日本——

    设立太空监视部队

    2014年8月28日,日本防卫省修改了《宇宙开发利用基本方针》,明确指出,日本将成立专门的太空监视部队,对宇宙卫星和垃圾的运行动态进行跟踪和分析,以逐步加强太空感知能力。此举旨在加强日美在太空的合作,应对来自卫星的武器攻击,将加强从太空收集图片的能力,利用人造卫星对弹道导弹的发射进行早期的监控和分析,增强早期预警能力。

    印度——

    构建区域卫星导航系统

    2015年3月28日,印度第四颗导航卫星发射成功,印度区域卫星导航系统逐渐成形。按照印度的计划,该系统的组网工作将分为两大步骤:第一步是发射地球同步卫星组成覆盖印度全境的区域卫星导航系统,第二步是从区域卫星导航系统向印度版全球卫星定位系统迈进。该系统将提供民用和军用两种服务。

Libya war action in space
■ Wang Pingping

Libya is the second war in Afghanistan and the US-led war in Iraq is not a scale but the high degree of information technology local war, preparations for war, initiated and progression to reconnaissance, navigation, communications support for the core space power to effectively support the multinational force and strategic campaign decisions to protect the fine planning and real-time command and control task.
Before the war, the US-led NATO military operations on the basis of the need for a full assessment on the strength of existing space system was substantial adjustment, built up by the imaging and electronic reconnaissance, maritime surveillance and missile warning, command and communications, space support system navigation, meteorological observation system consisting of satellites and satellite systems for civil use functionally complement in individual areas. In addition, according to operational needs, with fast access to space capability supplementary firing several satellites.
Libyan war, the multinational force to implement the diversification of space support operations.
Access to information on the battlefield, the multinational force by the imaging reconnaissance spacecraft, aerospace electronic reconnaissance means supplemented by special reconnaissance and surveillance network means, Libya’s strategic target architecture, an important goal distribution, composition and deployment of air defense systems, command and control relationship , means of communication and frequency distribution of a comprehensive reconnaissance. War is in progress, the multinational force by aerospace electronic reconnaissance and avionics reconnaissance combining means, real-time capture and analysis of radiation target operating parameter Libyan army, master Libyan army air defense system deployment adjustment, dynamic intelligence command and communications work full time monitoring Libya’s mobile communications and satellite communications, intelligence screening important clues.
In terms of battlefield information distribution, multinational force operations in front of more than 1100 kilometers wide, over a wide area of ​​more than 600 kilometers in depth expansion; air force were deployed in the war zone from 700 to more than 2800 km range and nearly 20 airports on aircraft carriers, a variety of information through a wide range of command and control, high-speed, high-capacity, high security satellite communications system to distribute real-time data sharing within the multinational force, for a variety of combat forces and the overall offensive and defensive operations provide linkage strong support.
In terms of navigation and positioning, navigation and positioning information needed for precision air strike all provided by space power, accuracy of less than meter-level positioning information to ensure effective control of collateral damage when clearing precision strike urban targets.
Throughout the war in Libya, the space forces to the multinational force to provide 80% of the intelligence information to help them achieve battlefield transparent way, firmly grasp the battlefield initiative. There are pre-prepared in the intelligence area, the US military to grasp the dynamics of the battlefield and complete the property identified in less than 5 minutes. Space power efficient support from discovery, to combat identification, evaluation precision air strike chains. Combat action against Gaddafi fled from Sirte, that is, by the space surveillance system to grasp the dynamics and guide warplanes and drones successful wars against the blockade.

利比亚战争中的太空行动

■王平平

    利比亚战争是继阿富汗和伊拉克战争之后美国主导的一场规模不大但信息化程度很高的局部战争,战争的准备、发起和进展过程,以侦察情报、导航定位、通信保障为核心的太空力量,有效支持了多国部队的战略与战役决策,保障了精细任务筹划和实时指挥控制。

战前,以美国为首的北约在对军事行动需要进行充分评估的基础上,对既有的太空力量体系进行了充实调整,构建起了由成像及电子侦察、海洋监视及导弹预警、指挥通信、导航定位、气象观测等卫星系统构成的太空支援体系,并利用民用卫星系统在个别领域进行功能性补充。此外,根据作战的需要,利用快速进入太空能力补充发射数颗卫星。

利比亚战争中,多国部队实施了多样化的太空支援行动。

在战场信息获取方面,多国部队通过航天成像侦察、航天电子侦察手段,辅之以特种侦察和网络侦察手段,对利比亚境内的战略目标体系结构、重要目标分布、防空体系构成及部署、指挥控制关系、通信手段及频率分布情况进行全面的侦察。战争进行过程中,多国部队通过航天电子侦察与航空电子侦察相结合的手段,实时截获和分析利比亚军队的辐射目标工作参数,掌握利比亚军队防空系统部署调整、指挥通信工作的动态情报,全时段监控利比亚的移动通信及卫星通信,筛选重要情报线索。

在战场信息分发方面,多国部队的作战行动在正面宽1100余千米、纵深600余千米的广阔区域内展开;空中力量分别部署在距战区700~2800余千米范围内近20个机场及航空母舰上,指挥控制的各种信息通过大范围、高速度、大容量、高保密性的卫星通信系统实时分发,在多国部队内部实现数据共享,为各种作战力量及攻防作战行动的整体联动提供有力支持。

在导航定位方面,空中精确打击所需要的导航定位信息全部由太空力量提供,精度小于米级的定位信息确保了对城区目标进行空地精确打击时有效控制附带损伤。

整个利比亚战争中,太空力量为多国部队提供了80%的情报信息,帮助其实现战场单向透明,牢牢掌握战场主动。在有预先情报准备的区域内,美军掌握战场动态情况并完成属性识别的时间小于5分钟。太空力量高效支持了从发现、识别到打击、评估的空中精确打击链。对从苏尔特出逃的卡扎菲进行的打击行动,就是由太空侦察系统掌握动态情况,并引导战机和无人机进行阻滞打击的成功战例。

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29

China NPC Emphasis on Solving National Security System Issues//中國家安全體系「全國人大會議公布了《十三五規劃綱要(草案)》

中國家安全體系「全國人大會議公布了《十三五規劃綱要(草案)》

March 5, 2016 during the Chinese NPC and CPPCC, National People’s Congress announced the “Thirteen Five-Year Plan (draft)”, under the title “establishment of a national security system,” complete the chapter, first expounded on China’s implementation of “the country’s overall security View of concrete ideas “in. Prior to that, although related concepts to promote its fast, but in addition to the super-agency “National Security Council” has been officially running, as well as a small amount of the agency personnel arrangements, almost no more news.

The first place to prevent hostile forces subversive

From an international perspective, “Comprehensive security concept” for a class is not the first thought. After all, since the end of the Cold War, the security environment upheaval, insecurity diversification, already is a common phenomenon faced by countries. But domestic letters of “overall national security” still kill any world trend, because this piece can be described as all-encompassing grand – covering “political, land, military, economic, cultural, social, science and technology, information, ecology, resources …… and nuclear safety. ”

Although the “official stereotyped” perfect frame Description: “people-safe for the purpose, as the fundamental political security, economic security, based on the Social Security for the protection of military culture in order to promote international security as the basis”, but this piece is clearly ambitious where to start challenge.

When “KNB” first appeared in late 2013 eighteen Third Plenary Session of the resolution, only to see hastily put some “innovative social governance” at the end. Until five months later, the agency announced that it has officially running, trying to explain its official mouthpiece of great significance, it is still mainly externally or internally, vary.

During the two sessions, elaborate “Thirteen five Outline” published by the NPC session, so this kind of ambiguity resolved.

Although the outline, “national sovereignty security regime” concept beautifully, has made the world’s political circles unheard of, but more surprising is that in the fight against the three forces’ violent terror, ethnic separatism, religious extremism “previous activity, will also impressively “hostile forces infiltrate subversive activity” in the first place.

Obviously, to prevent subversion of urgency regime was as if beyond the anti-terrorism, anti-spyware and other traditional threats to national security.

Traditionally, law enforcement departments, the Ministry of Public Security and the famous “national security” system, and its huge cost “stability maintenance” system billions compared to only as a spy / Ministry of National Security Abwehr, more in line with narrowly “national security” concept. The system has also been set up at all levels of “national security leadership team,” leading narrow “national security” and its work force.

Jiang Zemin period, Beijing began to envy the role of the US National Security Council (NSC) at the highest decision-making. As president advisory body, NSC members including President, Vice President, Secretary of State, Minister of Finance, Minister of Defence and National Security Affairs Assistant to the President, the Chairman of the Joint Chiefs of highest operational commander and director of national intelligence, were appointed to act as the statutory military advisers and intelligence advisers, other government departments and competent officials, invited participants only when needed.

“The Central Leading Group for National Security,” in the year 2000, although the head of the pro-Jiang, but deputy head in charge of foreign affairs for the Central Committee, the Central Foreign Affairs Office director concurrently by the Office, in particular from the group and “Foreign Affairs Leading Group “under one roof, the main coordinating its national security and external affairs. Although not as good as NSC high level, because China and the US but the basic political structure fundamentally different, are also considered to meet the conditions of moderate learning.

Jiang later period, the Chinese domestic policy increasingly independent, and the West in the system of values ​​and rules of becoming the opposition, senior party growing emphasis on co-ordination “International and Domestic Situation.” After learning more individuals came to power centralization, theoretical innovation and the urgent need to safeguard stability of the regime. Thus, despite the increased legitimacy, the study of “KNB” is still brewing since Jiang Zemin claimed, but the design of the system may differ.

Thus, the Chinese Communist Party and the previous system separately, in order to avoid the party on behalf of the administration and other rare progress, is now being accused of “fragmentation, excessive power scattered.” By adding a permanent body, will the party, government, military, law, economics, culture and even social life, and where the “national security” detached power clean sweep, then became “the country to explore a new way of governance.”

Now, in “Baidu Encyclopedia” in terms of self-built, actually it was assumed added, “National Security Council People’s Republic of China” entry, content only involved “state security committee.”

Beijing whether through a constitutional amendment to set up a shadow-style “national KNB” hard to say. However, by the time the CPC Central Committee, the National Security Committee to get the full decision-making power for national security affairs, responsible only to the Politburo and its Standing Committee. As heads of the supreme legislative body of the People’s Congress, only its Vice-President, the National Security Committee of the degree of centralization, even beyond the Central Military Commission.In contrast, the United States NSC decisions, but also to exercise its statutory powers to rely on the President and subject to legislative, judicial checks and balances.

Further overhead Politburo and State Council

The current maximum suspense, or “KNB” materialized, decision-making and institutional settings large to what extent.

An analogy example, although in the network area, the original Central Propaganda Department, Ministry of Public Security, Ministry of State Security, the Ministry of Industry, the Central Foreign Affairs Office / State Council Information Office, Press and Publication Administration and other agencies bull management, but also from 18 Third Plenary session of the decision, the CPC network security and information technology leadership team established in 2014 (referred to as the “net channel group”) / national Internet information office of People’s Republic of China ( “the State Council informatization office”), and set up a separate large business functions, took a lot of network management and monitoring powers.

At the top of its home page, the two names are alternately displayed, complete with party and government bodies.

Rationale for establishing this institution, because the State Department is also the system’s “National Informatization Leading Group” and their offices, “the State Council Information Office” (also referred to as the “State Council Informatization Office”) is difficult to coordinate the CPC Central Committee, the Central Military Commission, the NPC, etc. authority. However, the greater the motivation or senior party controls the Internet public exigencies, and the use of information warfare means to challenge the United States needs. To promote the domestic information technology process, the agency more than the promotion of hand shackles.

Regression KNB, although it has been interpreted as “national security and crisis handling the national level a permanent establishment,” but until March 2016, in the list of institutions directly under the CPC Central Committee and the Communist Party of China Xinhua News Network, the former are still ” central leading group for national security, “and not see” KNB. ”

Although “KNB” was praised as “reduce rules, enhance decision-making efficiency,” but in what things must be raised to this level resolved, which can be left in the original POLITICAL, military and diplomatic level processing is difficult to untangle.

It is with the Central Political and Law Commission as “directly under the central authorities,” the division of labor? It as “directly under the central coordinating body of procedure” in policing governance, anti-anti-cult operations, stability, maritime rights and interests, possession of Xinjiang, financial security, Taiwan, Hong Kong and Macao, net letter, confidentiality, the working group password (Note: the full name of each team name how to end the relationship) is? In the end how it Ministry of National Security and other government departments, as well as relations with the National Commission on cross-border and coastal defense ministries overseas Chinese citizens and institutions security work inter-ministerial joint conference and many other bureaucracies? I’m afraid that deep-rooted concerns about its effect, less effective, was not excessive.

From The National People’s Congress issued the “Outline”, the more difficult to find: as the basic starting point for the study of governance, the starting point and one of the ultimate value, political, land, economy, society, resources and networks, and other key areas are security policy and called for long-term goals, important areas, major reforms, major projects, programs and policies, require safety risk assessment.

This means that, even if only partially materialized, due to the requirement that all focus areas, all national security coordination mechanism established to maintain, “KNB” already with “deep change Team” (Note: Comprehensively Deepening the Reform Leading Group) as tantamount to a indeed affect the whole body, brought together a large number of power “small government.”

In addition to further overhead Politburo and State Council, set in one of the highest authority, through several sets of much needless repetition mechanism, calling the shots. However executor, it is still the same set of ministries and local, its efficiency, and can really ensure the complex demands of national security in a reasonable portion, not optimistic.

March 5, 2016, Beijing, China, in front of the Great Hall of People’s Liberation Army soldiers walked.Photo: Damir Sagolj / REUTERS

Endanger the interests of the former National Security Systems division, to stimulate the “spy” Country

It can be expected that with the proposed “Thirteen five Outline” “overall national security”, and in the rise of influence “KNB”, the original continent “national security”, “national security” systems are at risk.

“National security” has recently been rumored to be canceled. It is believed that its intelligence gathering in the field of domestic politics to defend the building (social monitoring) hidden forces, investigation of cases against dissent, control ethnic / religious positions against cults and other functions, will disperse to more legalization of criminal investigation and law and order department. Entered into force in 1993, “National Security Law” in 2014 was much more narrowly “anti-spyware law” instead.

And “Thirteen five Outline”, requires the integration of monitoring and early warning systems in different areas, intelligence gathering and analysis capabilities. From the work of national intelligence to see the movements of specific legislation, “national security” system will inevitably lose power “national security” monopoly.

This stimulus, 2014, 2015, Ministry of State Security systems, proactive disclosure reports uncovered espionage significantly increased, but in the end these cases leaked it?

March 2015, published by the National Security Henan province since the first espionage case, a taxi driver observed the airborne unit of foreign institutional Airport, the surrounding circumstances and models; July Sichuan national security nearly a decade for the first time publicly disclosed the spy case, a military unit 4 leakers, provided some military types, quantity, special materials, setting the test time and fault conditions, some provide aerospace internal publications; November, Jilin Baishan Jun captured the partitions a foreign spy shooting and hand-painted Chinese border troops distribution.

These cases certainly have leaked military secrets, but the scope and extent been greatly exaggerated. In recent years, Beijing strengthened its online publication and transmission of state secrets supervision, the biggest problem is still the “secret infinity.” Although Beijing has in recent years to speed up the clear “given secret” work “secret” and “non-secret” boundaries, but because the concept of paranoia, coupled with bureaucratic agencies should rely on “secret” to eat, they do not want to bear responsibility for the secret too wide, Fuzzy boundaries situation no better.

In fact, some experts mainland when rendering espionage threat, has admitted “we take the initiative to trafficking intelligence” indicating that “China also collect / buy foreign intelligence”; an expert in the Ministry of State Security emphasis on “cyber espionage nearly the year more and more active, “to actually” see them from the Internet’s remarks can be found in a number of valuable intelligence “as an example, but the latter is completely unlawful.

Henan above case, there is the Baidu from China “high One” satellite photographs taken by the airport, accurate to 20 meters, “Baidu Panorama” provides a neighboring street to the nearest airport each shop, military fans in China understanding Air transporter models thousands; Sichuan cases, internal publications fuzzy nature, contained a lot of technical discussion with the same military production. And unavoidably, everything is secret practice is nothing more than a cover closed, inefficient, and defects behind Beijing’s military, these are not exposed and supervision, the harm is far more than this information about the outside world.

At the same time, the Confidentiality Commission / Secrets systems have long been cured departmental interests, such as to secrecy, mandatory use map products “Nonlinear confidential treatment technology”, is formed on the map with the location of the actual existence of 100 to 600 meters random deviations. Such an approach, in addition to the official mapping agencies to create huge gains, related to the national industries and national tremendous trouble, there are no secret role – because the location does not become a military objective entity, foreign intelligence agencies and the military does not rely on Chinese map, which judged and attacks unaffected.

Of course, this by no means departmental interests to “spy” Country situation all causes.Overall, Beijing also needed on the mainland society, frequently rendering national security is facing a critical situation, hidden front struggle intense, so trees enemy awareness, inspire patriotic enthusiasm and even xenophobic, secretly strengthen social control.

Moreover, since the Beijing powers and budget oversight from society, the party and the national government itself parents, as long as the name of security, from the whole to the details, any information can be disclosed only to those who choose favorable, remaining airtight, so that with “espionage “Ruling tool if fabulous.

At the same time, Beijing legislative activity in recent years, national security and social stability and other interests in the name of full citizens with increased surveillance, public security mandatory intervention of civil liberties and privileges of the investigation.

November 2015, the National Security Office Jilin even announced espionage and accepted nationwide hotline to report clues, for reasons that remain unknown. The department asked citizens to report suspicious persons “spy, traitor, instigation personnel, intelligence agents, the external agents”, etc., but this is only a political rather than a legal concept concepts also include standard suspicious signs purely surface, many of which are only legal status or the performance of speech, may be entirely unrelated espionage, where “sensitive issues” and “reactionary remarks” but not operational on legal concepts.

Obviously, not called for such a system to report the current espionage, but a wide range of East German-style citizen informers and mutual monitoring, did not say infringe on civil liberties, even in the “dictatorship” discourse system, misunderstanding, framed and frame risks are high.

Criminal Law Amendment (IX), adopted in August 2015, the night the new information network security management refused to fulfill the obligations crime, the crime of illegal use of the information network, information network to help crime and criminal activities, to disrupt the order of state organs crime, the crime of illegal financing of the organization gathering fabricated deliberately spreading false information crime, the crime should be no public disclosure of information on cases of crime reporting and disclosure of information should not be disclosed in the cases, the other 20 counts, terrifying.

The case of Gao Yu, and bookstores case Causeway Bay, but are just beginning.

All this shows that in China, “national security” concept epitaxial greatly expanded, not only to adapt to contemporary national security multifactor interwoven trend, and it is a power struggle and the rule of magic weapon too superficial. In essence, it is the Beijing regime concentrated outpouring of anxiety. The “Thirteen Five Outline” in “protect country” a new action also marks the communist countries in times of crisis, to strengthen the “police state” color of nature, is rapidly recovering.

Note: Team organization full name:

The Central Committee for Comprehensive Management of Social Security, the Central Cult Prevention and Handling of the Leading Group, the Central Leading Group for the maintenance of stability, the central leading group for marine rights and interests, the Central Tibetan Coordination Leading Group, the Central Coordination Group Xinjiang, the Central Steering Committee on Financial Security, the CPC central / State Department double identity Taiwan Affairs leading group, Hong Kong and Macao work coordination group, a centralized network security and information technology leading group, the central Committee and the central password confidentiality work leading group.

Original Mandarin Chinese:

3月5日,中國2016年兩會期間,全國人大會議公佈了《十三五規劃綱要(草案)》,以題為「建立國家安全體系」的完整一章,首次闡述了中國貫徹「總體國家安全觀」的具體設想。此前,儘管相關概念的宣傳風生水起,但除了超級機構「國家安全委員會」已正式運轉,以及該機構少量人事安排外,幾乎沒有更多消息。
將防止敵對勢力顛覆破壞放在首位
從國際範圍看,「綜合安全觀」一類思想並非首創。畢竟從冷戰結束起,安全環境劇變、不安全因素多樣化,就已是各國面臨的普遍現象。可是國內大書特書的「總體國家安全觀」,仍秒殺任何世界潮流,因為這幅宏圖可謂包羅萬象——覆蓋了「政治、國土、軍事、經濟、文化、社會、科技、信息、生態、資源和核安全……」。
儘管「官方八股」框架描述完美:「以人民安全為宗旨,政治安全為根本,經濟安全為基礎,軍事文化社會安全為保障,以促進國際安全為依託」,但是這幅宏圖從何下手顯然有挑戰。
「國安委」2013年底首次出現在十八屆三中全會決議中時,就僅見匆匆置於「創新社會治理」一段末尾。直到5個月後,該機構宣布已正式運轉,努力闡釋其偉大意義的官方喉舌,仍對它以對外還是對內為主,說法不一。
兩會期間,人大會議公佈的《十三五綱要》的闡述,讓這類歧義迎刃而解。
儘管綱要中,「國家政權主權安全」概念的粉墨登場,已經令世界政治學界聞所未聞,但更令人吃驚的是,在對付三股勢力「暴力恐怖、民族分裂、宗教極端」的活動之前,還赫然將「敵對勢力滲透顛覆破壞活動」放在首位。
顯然,防止政權被顛覆的迫切性儼然超越了反恐、反間諜等傳統國家安全威脅。
傳統上,在強力部門中,與大名鼎鼎的公安部「國內安全保衞」系統、及其耗資千億的龐大「維穩」體系相比,只有作為間諜/反間諜機關的國家安全部,更符合狹義的「國家安全」概念。該系統也曾在各級設立過「國家安全領導小組」,領導狹義「國安」工作及其隊伍。
到江澤民時期,北京開始羨慕美國國家安全委員會(NSC)在最高決策中的作用。作為總統諮詢機構,NSC成員包括總統、副總統、國務卿、財政部長、國防部長和總統國安事務助理,最高作戰指揮官參聯會主席和國家情報總監,分別充當該委法定軍事顧問和情報顧問,其他政府部門主管和高官,則只在需要時應邀參會。
「中央國家安全領導小組」於2000年產生,雖然江澤民親任組長,但副組長為分管外交事務的政治局委員,辦公室主任由中央外事辦公室主任兼任,特別是從該小組與「中央外事工作領導小組」合署辦公來看,它主要協調對外的國家安全事務。雖然其層級不如NSC高,但因為中美基本政治架構的根本不同,也算符合國情的適度學習。
江以後時期,中國國內政策日益特立獨行,與西方在價值觀和規則體系上漸趨對立,中共高層日益強調統籌「國際國內兩個大局」。習上台後更有個人集權、理論創新和政權維穩的迫切需要。因而,儘管為增加合法性,習的「國安委」仍自稱醖釀自江澤民,但在製度設計上可就大相徑庭了。
於是,中共原有體制中黨政分開、避免以黨代政等難得的進步,現在被指責為​​「條塊分割,權力過散」。通過增加一個常設機構,就將黨、政、軍、法、經、文乃至社會生活中,凡與「國家安全」沾邊的權力一網打盡,則成了「對國家治理方式的一種新探索」。
如今,在「百度百科」的自建詞條上,居然有人想當然地添加了「中華人民共和國國家安全委員會」詞條,內容卻只涉「中共國安委」。
北京是否經過修憲,來設立一個影子式的「國家國安委」還很難說。然而,經中共一次中央全會,國安委就獲得全部國家安全事務決策權,只向政治局及其常委會負責。作為最高立法機構的人大首腦,也只是其副主席,國安委的集權程度,甚至超越中央軍委。相比之下,美國NSC的決策,還只能靠總統行使其法定權力,並受立法、司法權制衡。
進一步架空政治局和國務院
當前最大的懸念,還是「國安委」的實體化、決策權和機構設置將大到何種程度。
一個可以比附的例子是,雖然在網絡領域,原有中宣部、公安部、國家安全部、工信部、中央外宣辦/國務院新聞辦、新聞出版總署等機構多頭管理,但同樣由十八屆三中全會決定、於2014年成立的中共中央網絡安全和信息化領導小組(簡稱「網信組」)/中華人民共和國國家互聯網信息辦公室(簡稱「國信辦」),又單獨設立了龐大的業務職能部門,接管了大量網絡管理和監控權力。
在其首頁頂部,兩個名稱交替顯示,黨政完全同體。
設立這一機構的理由,同樣是因為國務院系統的「國家信息化領導小組」及其辦事機構「國務院信息化工作辦公室」(也曾簡稱「國信辦」)難以協調黨中央、軍委、人大等權力機構。然而,其更大的動機,還是中共高層管制互聯網輿論的急迫需要,以及利用信息戰手段,挑戰美國的需要。對促進國內信息化進程,該機構反倒桎梏多於促進。
迴歸國安委,其雖然被解讀為「國家層面的國家安全和危機處理常設機構」,但直至2016年3月,在中國共產黨新聞網和新華網的中共中央直屬機構列表中,都仍有原「中央國家安全領導小組」而不見「國安委」。
儘管「國安委」被讚譽為「減少條條框框,提升決策效率」,然而在哪些事必須上升到這一層面議決,哪些可以留在原有政法、軍事和外交層面處理,則不易理清。
它與作為「中央直屬部門」的中央政法委如何分工?它與作為「中央直屬議事協調機構」的治安治理、防反邪教、維穩、海洋權益、藏疆、金融安全、對台、港澳、網信、保密、密碼等工作小組(注:各小組名稱全稱在文末)的關係如何?它與國家安全部等政府部門,以及與跨部委的國家邊海防委員會、境外中國公民和機構安全保護工作部際聯席會議等大批官僚機構的關係到底如何?恐怕擔憂其效果盤根錯節、事倍功半,並不為過。
而從本次人大會議公佈的《綱要》中,更不難發現:作為習治國理政的基本出發點、切入點和終極價值之一,政治、國土、經濟、社會、資源網絡等重點領域,均要求制訂安全政策和中長期目標,重要領域、重大改革、重大工程、項目和政策,都要求進行安全風險評估。
這意味著,哪怕只是部分​​實體化,由於要求所有重點領域,均建立維護國安工作協調機制,「國安委」已然同「深改小組」(注:全面深化改革領導小組)一樣,無異於一個牽一髮而動全身,匯聚大量權力的「小政府」。
在進一步架空政治局和國務院之外,集於一人的最高權力,通過疊床架屋的多套機制,來發號施令。然而執行者,則仍是同一套部委和地方,其效率,以及能否真正保證龐雜的國安訴求中的合理部分,不容樂觀。

2016年3月5日,中國北京,解放軍士兵在人民大會堂前走過。攝:Damir Sagolj/REUTERS
危及原國安系統部門利益,刺激以「諜」治國
可以預計,隨著《十三五綱要》的「總體國家安全觀」的提出,在「國安委」的崛起影響下,大陸原有「國保」、「國安」系統均岌岌可危。
「國保」近來盛傳將被取消。據信,其在國內政治保衞領域的蒐集情報、建設(社會監視)隱蔽力量、偵查異見反對案件、控制民族/宗教陣地、打擊邪教組織等職能,仍將分散到更加合法化的刑偵和治安等部門。從1993年生效的《國家安全法》,於2014年被狹義得多的《反間諜法》取代。
而《十三五綱要》,則要求整合不同領域的安全監測預警系統,及情報蒐集分析處理能力。從對國家情報工作專門立法的動向看,「國安」系統也必然失去對「國家安全」的權力壟斷。
受此刺激,2014、2015年的國家安全部系統,主動披露破獲間諜案的報道明顯增多,可是這些案例到底洩露了什麼?
2015年3月,河南國安公佈的該省首起間諜案中,一名的士司機為境外機構觀察空降兵某部的機場位置、週邊情況和​​機型;7月四川國安近十年首次公開披露的間諜案中,某軍工單位的4名洩密者,有的提供了軍品型號、產量、特殊材料、定型試驗時間和故障情況,有的提供了航空航天內部刊物;11月,吉林白山軍分區擒獲一名拍攝和手繪中國邊境兵力分佈的外籍間諜。
這些案例中洩露的當然有軍事機密,然而範圍和程度被嚴重誇大。近年北京加強了對網上發布和傳遞國家秘密的監管,最大問題仍是「密無邊際」。雖然北京近年一直要求加快明確「密」和「非密」界線的「定密」工作,但由於風聲鶴唳的觀念,加之官僚機關既要靠「密」吃飯,又不願擔責,秘密過寬、界限模糊的局面毫無改觀。
實際上,大陸有的專家在渲染間諜威脅時,也承認有「主動向我方販賣情報的」,這說明「中國也蒐集/收買外國情報」;國安部一專家在強調「網絡間諜活動近兩年越來越活躍」時,居然也以「他們從網上看到的言論中就可以發現若干有價值的情報」為例,然而後者完全是合法的行為。
上述河南案例中,百度上就有來自中國「高分一號」衞星拍攝的該機場照片,精確到20米,「百度全景」則提供了機場週邊精確到每家店鋪的街景,中國軍迷中認識空軍運輸機機型的數以萬計;四川案例中,內部刊物性質模糊,所載的大量技術探討同軍品生產一樣。而事無鉅細,一切皆密的做法,無非掩蓋了北京軍工的封閉、低效、落後和缺陷,這些問題得不到曝光和監督,其危害遠超這些情報被外界了解。
同時,保密委員會/保密局系統也早已固化了部門利益,比如以保密為由,強制要求地圖產品採用「非線性保密處理技術」,形成圖上位置與實際存在100~600米的隨機偏差。此種做法,除了給官方測繪機構創造鉅額收益,給本國相關產業和國民帶來巨大麻煩外,沒有任何保密作用——因為軍事目標實體位置並不會變,外國情報機構和軍方也不依靠中國地圖,其研判和攻擊絲毫不受影響。
當然,部門利益絕非這種以「諜」治國局面的全部原因。整體上,北京也需要在大陸社會,頻頻渲染國家安全面臨危局、隱蔽戰線鬥爭激烈,從而大樹敵情意識,激發愛國甚至仇外熱情,暗中強化社會控制。
而且,由於北京權力和預算不受社會監督,黨和政府以國民父母自居,只要以安全為名,從整體到細節,任何信息均可只擇有利者公開,其餘密不透風,使以「諜」治國工具如有神助。
同時,北京近年的立法活動,以國家安全和社會穩定等利益為名,全面增大了對公民配合監視、調查的強制性和公安干預公民自由的權限。
2015年11月,吉林省國家安全廳竟然公佈了接受全國範圍間諜行為和線索舉報的專線電話,原因至今不明。該部門要求公民舉報可疑人員「間諜、內姦、策反人員、情報員、外圍代理人」 等,但這只是政治概念而非法律概念,列舉的可疑標準也純屬表面跡象,很多是合法身份或僅表現為言論,完全可能與間諜毫無關係,其中的「敏感問題」和「反動言論」更不是法律上可操作的概念。
顯然,這種制度號召的絕非對現行間諜行為的舉報,而是東德風格的公民大範圍相互監視和告密,侵犯公民自由不說,即使在​​「專政」話語體系內,誤解、誣陷和栽贓風險也很高。
2015年8月通過的刑法修正案(九),一夜新增拒不履行信息網絡安全管理義務罪、非法利用信息網絡罪、幫助信息網絡犯罪活動罪、擾亂國家機關工作秩​​序罪、組織資助非法聚集罪、編造故意傳播虛假信息罪、洩露不應公開的案件信息罪和披露報道不應公開的案件信息罪,等20項罪名,令人恐怖。
而高瑜案、以及銅鑼灣書店案,均不過是才剛剛開始。
這一切表明,在中國,「國家安全」概念外延的大幅擴展,絕不只是為適應當代國家安全保障多要素交織的趨勢,而說它是權鬥利器和治國法寶也流於表面。實質上,它是北京政權焦慮的集中流露。而《十三五綱要》裏「保江山」的全新動作,也標誌著共產主義國家在危機時刻,強化「警察國家」色彩的天性,正快速復甦。
註:小組機構全稱為:
中央社會治安綜合治理委員會、中央防範和處理邪教問題領導小組、中央維護穩定工作領導小組、中央海洋權益工作領導小組、中央藏區工作協調領導小組、中央新疆工作協調小組、中央金融安全指導委員會,與有中共中央/國務院雙重身份的對台工作領導小組、港澳工作協調小組、中央網絡安全和信息化領導小組、中央保密委員會和中央密碼工作領導小組。

China Military Strategic High Ground of Information Warfare: Spatial Information Confrontation //中國軍事空間信息對抗:信息化戰爭的戰略制高點

中國軍事空间信息对抗:信息化战争的战略制高点

作者:穆志勇 李莉

來源:學習時報2015-06-15

信息化战争的战略制高点

Spatial information effectively combat weaponry put strategic position, pay attention to the fight against cross-border joint information space forces the leading role of the traditional power and strength and spatial information of conventional power, to achieve full-dimensional spatial information to flow freely.

All things Internet era, we must rethink the current and future military struggle in the forefront of what? We are talking about local information technology local war where?Information War made the strategic high ground right where?

All things Internet era, control of information has become the battlefield to win the right to the core of an integrated system, “no network without fighting,” “no victorious day” has become iron law, made ​​winning the war of spatial information right to become a strategic safeguarding national sovereignty, security and development interests ground. It extends to the battlefield where, where the initiative will expand the competition. The main countries in the world attach great importance to and respond to threats and challenges from outer space, the space around the right to development, ownership and control, in a fierce competition.

Spatial information against a new means of strategic deterrence quality checks and balances

Spatial information can play against fighting the enemy afraid, Gongdi key is a new means of strategic deterrence quality of checks and balances. On the one hand, with a strong spatial information attack capability, can effectively curb space power, space to defend the sovereignty, enhance the right to speak and the initiative in the international arena; on the other hand, has enough spatial information defense, deterrence and containment can launch the Iraq war opponents button, effectively resist the threat and destruction in outer space, to prevent loss of control of the space.

The United States will “Space confrontation” as a strategic deterrent capability and the “Global Strike” and “nuclear strike” both, and since 2001 has performed seven times, “Schriever” space combat computer simulation exercises; vigorously the development, testing and deployment of space information weapon, launching the world’s first reusable aircraft able to detect, control, capture, destroy the spacecraft his country “orbital test vehicle” X-37B space fighter, space fighter plans to deploy 2025 troops in outer space; “global commons domain intervention and joint mobility “concept vowed to quickly weaken the enemy space facilities capacity through non-kinetic measures to destroy its anti-space capabilities in key elements.Russia to develop “military space recovery plan,” President Putin has restarted “crown” anti-satellite project, focusing on the development of anti-satellite weapons, the “strategic air and space battles” as the basic style of air and space operations, three satellite launch last year and aerospace It is regarded by the United States’ aerospace killer “and ready after 2016 to establish a modern space combat system. Japan’s new “cosmic basic plan” clearly states “actively enter the field of space”, was “modern security”, expanded and enhanced features for satellites to monitor vessels at sea and ground facilities, and trying to build a set of positioning, communication and intelligence gathering and other functions in one of the new satellite systems, the scope of application of force to achieve the SDF land, sea, air, space-round leap.

Spatial information into a military confrontation priority areas for capacity-building

From the world’s military development, the right to take on the overall system of spatial information system other rights, the right to seize control of the spatial information is action battle for dominance of the main action. Local Wars practice, there is no right to make spatial information, the Air Force is difficult to combat, navy naval difficult, with even the best of other weapons and equipment may also be vulnerable to attack. Spatial Information confrontation multidimensional space operations provide important support, “new quality” of the combat system is the ability to generate combat multiplier, it will be the focus of capacity-building in the military field. From the fight for control of space means, the spatial information against strong controllability, flexibility, use of low threshold, a wide scope, with less damage, be cost-effective, it should be current and future space supremacy capacity-building period key development areas.

Currently, the United States actively promote Asia “rebalancing” strategy, trying to fight the development of spatial information capabilities, not only to develop electronic interference and covert soft kill hard against damage and other spatial information means, actively develop their own approach, rendezvous and docking and other space-based technology against the core , also focused on the development of satellite communications electronic jamming, near real-time detection, interference signal feature recognition, sources of interference positioning technology, efforts to develop a variety of space-based anti-satellite weapons, and has begun to deploy automated attacks, identity systems. November 14, 2012 the United States and Australia announced that the US will place a powerful Air Force C-band radar and space telescope in Australia, and it is clear that the United States will shift the strategic part of Asia.This will enable the US forward-deployed every day to keep better track of up to 200 confirmed over the Asia-Pacific and orbital spacecraft and potential anomalies. According to US media reports, the US Air Force and Lockheed Martin in February this year to start construction work in the future, “Space Fence” The new radar system, which also marks the United States started the S-band ground-based radar system, the radar system will replace the United States in the 1960s developed space surveillance systems. Russia’s “Military News” May 18 reported that Air Force Secretary James declared that the US Air Force budget of $ 5 billion has been requested to establish a defense system for the military space to prepare for a possible conflict. Japan’s space development strategy headquarters set up monitoring force and space, and proposed the next 10 years will be launched 45 satellites ambitious goals in the positive development of the second generation of IGS reconnaissance satellite system, while seeking cooperation with ASEAN countries, to build a Japan center, a network of 68 satellite Earth observation satellites, in an attempt to obtain information from other countries and share with the United States at the same time, strengthen the surrounding sea routes to Japan, the Diaoyu Islands and the adjacent waters of the maritime surveillance capability. According to Japan’s Kyodo News reported, the new “US-Japan defense cooperation guidelines” emphasize the importance of space situational awareness, Japan’s “quasi-zenith” satellite system with US satellite positioning system to achieve docking, the US and Japan will strengthen ocean surveillance satellite, by sharing global marine intelligence, to ensure maritime security channel. Russia already has “reconnaissance, attack, defense” against the ability of spatial information integration, particularly in the fight against satellite communications, missile and space defense confrontation, GPS confrontation, antagonism and kinetic energy anti-satellite laser, etc., with strong technical reserves. Indian space reconnaissance and surveillance satellite system has taken shape, the satellite communication network has covered South Asia and the surrounding area, it has achieved near-real-time satellite communication between the services.

Spatial information warfare against the construction and development should focus grasp

Do a good job preparing military struggle, we must make efforts to grasp the initiative in the military struggle space and cyberspace, problem-oriented and adhere to asymmetric development, according to the lean, joint, multi-energy, high efficiency requirements, to ensure the good spatial information focus of fighting against the construction.

Set the right strategic direction. On the basis of the importance of space supremacy, attaches great importance to the construction and development of spatial information against the problem, deal with spatial information science strength confrontational relationship with other strategic force for development, to ensure priority development of spatial information countervailing force. Implement the military strategy for the new period, co-ordination within and outside Xinjiang Xinjiang, preparing for war with the stop, deter and combat, constantly important areas and key links to achieve new breakthroughs; spatial information against the building into the overall layout of the army information construction, improve space iNFORMATION wARFARE development strategy planning; constantly improve the system of operational doctrines, promote space information against the construction work and orderly conduct.

Adhere to military and civilian integration. Strengthening military and civilian integration concept, the basic role of market in resource allocation, according to civil-military integration path of development, through laws, and rich integration of forms and expand the scope of integration, improve the level of integration in the scientific research and technology, weaponry, personnel training, etc. aspects, all-round, multi-domain integration, spatial information against the construction of rich resources and development potential. Pay attention to the military think tank function, strengthen the theoretical study of spatial information confrontation and practical issues, exploration of space information confrontation theoretical system, a clear focus on the construction, development of specific plans, enrich and develop operational guidance to ensure that the substantive work forward.

Construction expertise system. According to aim at the forefront, major breakthroughs require leapfrog development, accelerate the building space information confrontation power system, the formation of spatial information ability to fight as soon as possible. Spatial information effectively combat weaponry put strategic position, pay attention to the fight against cross-border joint information space forces the leading role of the traditional power and strength and spatial information of conventional power, to achieve full-dimensional spatial information to flow freely. Actively promote the use of force against spatial information, spatial information to support real-time navigation information reconnaissance operations exercises, testing and training, the formation of combat capability as soon as possible.

Focus on technological innovation. Strengthen technology research efforts, emphasis on spatial information against key technological innovation, stepping up confrontation frontier exploration of space information technology, focusing on the development of advanced satellite communications confrontation, confrontation reconnaissance and surveillance, target feature recognition, information processing technology, and make breakthroughs can promote space information confrontation key technology and equipment updates; attention, independent research and development may change combat style, disruptive technology group rules of engagement, to prevent enemies of my technical strategy formulation sudden, efforts to form the enemy I have, I have no enemy some non symmetrical technological superiority.

Original Mandarin Chinese:

把空間信息對抗武器裝備切實擺上戰略位置,注重發揮空間信息對抗力量對傳統力量的帶動作用和空間信息力量與傳統力量的跨域聯合,實現信息在全維空間自由流動。

萬物互聯的時代,我們必須重新思考,當前和未來軍事鬥爭的前沿在哪?我們所說的信息化局部戰爭的局部在哪?信息化戰爭制權的戰略制高點在哪?
萬物互聯的時代,制信息權成為奪取戰場綜合製權的核心,“無網不戰”“無天不勝”成為戰爭制勝的鐵律,制空間信息權成為維護國家主權、安全和發展利益的戰略制高點。戰場延伸到哪裡,哪裡就會展開主動權的爭奪。世界主要國家高度重視和應對來自外層空間的威脅與挑戰,圍繞太空發展權、主導權和控制權,展開了激烈角逐。
空間信息對抗成為戰略威懾制衡的新質手段
空間信息對抗作戰能打敵所怕、攻敵要害,是戰略威懾制衡的新質手段。一方面,具備強大的空間信息攻擊能力,就可有效遏制太空霸權、捍衛空間主權,提昇在國際舞台的話語權和主動權;另一方面,擁有足夠的空間信息防禦能力,就可威懾和遏制對手輕啟戰爭按鈕,有效抵禦外層空間的威脅和破壞,防止失去對太空的控制權。
美將“空間對抗行動”視為與“全球打擊”和“核打擊”並重的戰略威懾能力,2001年以來先後進行7次“施里弗”太空作戰計算機模擬演習;大力研製、試驗和部署空間信息作戰武器,發射全球首架可重複使用的能夠偵察、控制、捕獲、摧毀他國航天器的“軌道試驗飛行器”X-37B空天戰機,計劃2025年在外層空間部署太空戰鬥機部隊;“全球公域介入與機動聯合”概念宣稱要通過非動能措施迅速弱化敵太空設施能力,破壞其反太空能力中的關鍵要素。俄羅斯制定“太空軍事復興計劃”,總統普京已重啟“樹冠”反衛星項目,重點發展反衛武器,把“戰略性空天戰役”作為空天作戰的基本樣式,去年發射的3顆衛星和航天器被美視為“航天殺手”,並準備在2016年前後建成現代太空作戰系統。日本新《宇宙基本計劃》明確指出要“積極進入太空領域”,獲得“現代化的安全保障”,擴充和強化用於監視海上船舶和地面設施的偵察衛星的功能,試圖通過構建一個集測位、通信和情報蒐集等多功能於一體的新衛星系統,實現自衛隊力量運用範圍的陸、海、空、天全方位跨越。
空間信息對抗成為軍事能力建設重點領域
從世界軍事發展看,制空間信息權統攬其他制權,奪取制空間信息權行動是爭奪戰爭主導權的主體行動。從局部戰爭實踐看,沒有製空間信息權,空軍難以空戰,海軍難以海戰,擁有再好的其他武器裝備也可能被動挨打。空間信息對抗為多維空間作戰行動提供重要支撐,是作戰體系的“新質”,是作戰能力生成的倍增器,必將是軍事能力建設的重點領域。從爭奪制天權的手段看,空間信息對抗可控性強、靈活性好,運用門檻低、作用範圍廣、附帶損傷小、效費比高,應是當前和今後一個時期制天權能力建設發展的重點領域。
目前,美積極推進亞太“再平衡”戰略,竭力發展空間信息對抗能力,不僅大力發展電子乾擾軟殺傷和隱性硬毀傷等空間信息對抗手段,積極發展自主逼近、交會對接等天基對抗核心技術,還重點研製衛星通信電子乾擾、近實時探測、干擾信號特徵識別、干擾源定位技術,努力發展各種天基反衛星武器,且已開始部署自動攻擊、識別系統。 2012年11月14日美國和澳大利亞聯合宣布,美軍將在澳大利亞安置功能強大的空軍C波段雷達和太空望遠鏡,並明確表示這是美國將戰略轉向亞洲的一部分。這一前沿部署將使美每天能夠更好地跟踪確認多達200個亞太上空航天器及其軌道和潛在的異常現象。據美國媒體披露,美國空軍與洛克希德馬丁公司在今年2月啟動了未來“太空籬笆”新型雷達系統的建設工作,這也標誌著美國開始啟動了S波段地基雷達系統,該雷達系統將取代美國20世紀60年代研發的太空監視系統。俄羅斯《軍工新聞網》5月18日報導,美國空軍部長詹姆斯宣稱,美空軍已要求50億美元的預算以建立一個防禦系統,為可能發生的太空軍事衝突做準備。日本成立宇宙開發戰略總部和太空監測部隊,並提出今後10年將發射45顆衛星的宏偉目標,在積極發展第二代IGS偵察衛星系統的同時,正在謀求與東盟國家合作,構建一個以日本為中心、由68顆衛星組成的地球觀測衛星網絡,企圖從他國獲得情報並與美國共享的同時,加強對日本周邊海上要道、釣魚島及其附近海域的海洋監視能力。據日本共同社報導,新版《美日防衛合作指針》強調太空態勢感知的重要性,日本“準天頂”衛星系統與美國衛星定位系統將實現對接,美日將利用衛星加強海洋監視,通過共享全球海洋情報,確保海上通道安全等。俄已具備“偵、攻、防”一體的空間信息對抗能力,特別是在衛星通信對抗、導彈和空間防禦對抗、GPS對抗、激光對抗和動能反衛等方面,擁有雄厚的技術儲備。印度空間偵察監視衛星系統已初具規模,衛星通信網已覆蓋南亞及周邊地區,各軍種之間已實現近實時衛星通信。
空間信息對抗作戰建設發展應把握的著力點
抓好軍事鬥爭準備,必須努力掌握太空和網絡空間軍事鬥爭主動權,堅持問題導向和非對稱發展,按照精幹、聯合、多能、高效的要求,切實把好空間信息對抗作戰建設的著力點。
確立正確戰略指導。在重視制天權的基礎上,高度重視空間信息對抗建設發展問題,科學處理空間信息對抗力量與其他戰略力量發展的關係,保證優先重點發展空間信息對抗力量。貫​​徹新時期軍事戰略方針,統籌疆內與疆外、備戰與止戰、威懾與實戰,不斷實現重要領域和關鍵環節的新突破;把空間信息對抗建設納入軍隊信息化建設總體佈局,搞好空間信息對抗發展戰略籌劃;不斷完善作戰條令體系,促進空間信​​息對抗各項建設和工作有序開展。
堅持軍民融合發展。強化軍民融合發展觀念,發揮市場在資源配置中的基礎性作用,按照軍民融合式發展路子,通過法規建設,豐富融合形式、拓寬融合範圍、提高融合層次,在科研技術、武器裝備、人才培養等方面,進行全方位、多領域融合,為空間信息對抗建設提供豐富資源和發展後勁。注重發揮軍地智庫功能,加強空間信息對抗的理論和實踐問題研究,探索空間信息對抗理論體系,明確建設重點、制定具體計劃,豐富和發展行動指導,確保各項工作實質性推進。
構建專業力量體系。按照瞄準前沿、重點突破、跨越式發展的要求,加速構建空間信息對抗力量體系,盡快形成空間信息對抗能力。把空間信息對抗武器裝備切實擺上戰略位置,注重發揮空間信息對抗力量對傳統力量的帶動作用和空間信息力量與傳統力量的跨域聯合,實現信息在全維空間自由流動。積極推進空間信息對抗力量運用,進行空間信息偵察實時支援引導信息作戰行動的演習、試驗和訓練,盡快形成體係作戰能力。
關注技術創新。加強技術攻關力度,重視空間信息對抗關鍵技術創新,加緊探索空間信息對抗前沿技術,注重發展先進的衛星通信對抗、偵察和監視對抗、目標特徵識別、信息處理等技術,著力突破能夠推動空間信息對抗裝備更新的關鍵技術;高度關注、自主研發可能改變作戰樣式、作戰規則的顛覆性技術群,防止強敵對我形成技術上的戰略突然性,努力形成敵有我有、敵無我有的非對稱技術優勢。

China’s Future Wars: Seize Control of Information with Big Data // 中國未來戰爭:用大數據奪取制信息權

中國未來戰爭:用大數據奪取制信息權

Source: 《中国科学报

Information warfare is the flow of information to fight the war. From the conversion of the entire information flow point of view, who controls the most real flow of information, whoever controls the initiative in the war. Seize control of information has become the air superiority prerequisites command of the sea, it is the decisive factor in the future outcome of a war.

■ reporter Hu Min Qi

With the continuous development of information technology, human society has entered a letter of “big data era.” Every day, in every corner of the world sensors, mobile devices, social networks and online trading platform to generate hundreds of gigabytes of data.Obama administration even large data called a “future of the new oil,” Who will come to control the flow of data will dominate the future of the world. As we all know, in the military field has been mankind’s most advanced technology laboratory, big data will no doubt shape the future of the war brought a huge change.

Big Data “big” Where

US Global Institutes define big data as: a large scale in the acquisition, storage, management, analysis far beyond the capabilities of traditional database software tool data set (datasets).

Chinese Academy of Sciences researcher Wang Weiping told the computer “China Science News” reporter, big data, “big”, of course, first of all refers to the unprecedentedly large volume of data, far beyond the traditional level of computer processing data volume.

With the current popularity of high-speed computer network technology and the rapid development of the Internet, the information data by TB (1TB = 1024GB) level was raised to PB (1PB = 1024TB), EB (1EB = 1024PB), ZB (1ZB = 1024EB) level , and is still explosive growth. It is reported that, in 2010, officially entered the global era ZB 2012 global data reaches 5.2ZB, 2020, the world will have a total amount of data 35ZB. There is a vivid metaphor can help people understand the scale of the data. If 35ZB to burn all the data capacity of a 9GB disc superimposed height will reach 2.33 million km, equivalent to three round-trip between the Earth and the Moon.

Secondly, Wang Weiping said, “big” is also reflected in the type of data processing diversification, far beyond the traditional format and data analysis tools can handle.

Most of the conventional two-dimensional data structure presentation, but with the Internet, the rapid development of multimedia technology and the popularity of video, audio, images, e-mail, HTML, RFID, GPS and sensors to generate unstructured data, every year 60 % growth rate. We expected to account for over 80% of the amount of data in unstructured data.

In addition, he believes that big data also requires real-time data processing. Big data stream is often a high-speed real-time data streams, and often require rapid, continuous real-time processing, to seize the important events that occurred in the first time.

If you look from the military field, command and control systems, space-based support systems, information processing systems, various reconnaissance, surveillance, increasing the amount of information detection system, big data management in the command structure of the complex and also more important than ever . How massive battlefield data storage and in-depth analysis, how to determine the authenticity of the data, the reliability of data sources to ensure the security of data transmission is a key issue facing the warring parties.

Information warfare against large data requirements

Military theorists generally believe that, as early as the 90s of last century, the information war began to rise. It is a weapon of war by the use of information technology affect adversary information and information systems, to protect one’s own information and information systems, to obtain information superiority battlefield combat style. It is essentially by means of information operations, “information flow” control “energy flow” and “material flow”, depriving the enemy of information superiority, information superiority to maintain one’s own, thus seize control of information battlefield.

Military commentator 宋忠平 to “China Science News” reporter explained, the traditional network of information warfare include battle, conventional combat interference and anti-interference system under criminal investigation as well as detection and anti-detection and other content. “Information warfare is the flow of information to fight the war from the point of view convert the entire flow of information, who controls the most real flow of information, whoever controls the initiative in the war.” 宋忠平 he said, “to seize control of information air superiority has become a prerequisite for command of the sea, it is the decisive factor in the future outcome of a war. ”

But he also said that traditional information warfare in dealing with information and data encountered various challenges. The first is the limited traditional information channels, you can not get a lot of information. At the same time, not only a substantial increase in the amount of data, including various types of data in the form of situational awareness data, images, video intelligence, relying on existing information technology, can not be effectively analyze and process the data.

According to reports, the day of the outbreak of the war in Iraq, the US military forward command post in Qatar and Kuwait because the security agencies can not handle large amounts of data have to turn off the device, resulting in correspondence with some assault command post direction almost interrupted.

In addition, Song Zhongping pointed out, data sharing capabilities of traditional information system is relatively weak. “War is the traditional way of fighting off state, superior to subordinate assignments and perform offline, last victories to report a higher level. And only control one army general command of a division, because they tend to be as an independent combat units, which also led to the relevant departments are often their own business, the impact of coordinated operations efficiency. ”

In this context, information war on large data transfer, storage, analysis yielded specific requirements.

The first is the real-time requirements of data processing. Information warfare ultimately generated vast amounts of data collection and processing center to the command center at all levels, the steady stream of gathering data from a variety of sensors, intelligence agencies and the information transmitted to the center together, these data to be processed in real time. Song Zhongping believe that all the information even if it is a battlefield soldier needs to spread information command and control center through the large data to understand the situation frontline, under special circumstances even for a soldier’s equipment orders. Because he may be at the most favorable terrain, you can get maximum advantage.

Followed by data fusion. Song Zhongping proposed by datalink even pull a short road that used to take four to five orders of management skills, the future may only need to complete the three-level management, so as to contribute to the integration of operations, rather than individual branches of the military to fight alone anywhere, anytime to adjust operational command.

Moreover, in his view, the era of big data, in particular to increase the difficulty of defense information, for higher data security requirements. In general, the information war against information security requirements for data transmission is mainly reflected in addressing anti-eavesdropping, jamming and prevent the problem of false information to deceive. I am afraid the future needs a new defense mechanisms to ensure information security.

Thus, in the information war era of big data, the system of military confrontation countries will rely on a variety of military information systems, software and data to a greater extent, at the right time, the right place for the right decisions, directing control and provide the correct information. Leaving the information provided to achieve a reasonable distribution of fast, it is to have the data and unified management, so that the most immediate battlefield information to the department most urgently needed. With the increasing amount of data the battlefield, and efficient mass data storage and analysis, identify the enemy situation changes from the data, the most reasonable prediction of operational programs to better serve the massive data information war military service is a large data processing aims.

Military data mining challenge

However, Wang Weiping noted that a major challenge facing the era of big data is the low value of the density of information. Whether or intelligent systems analysts need to “needle in a haystack” to find useful information from massive data. “It also fully reflects the importance of data mining.” He stressed.

Data mining is a use in massive data analysis tools discovery process between model and data relationships that can help decision-makers to find a correlation between potential data, by discovering the hidden, overlooked factors, it is possible in data storage and management process, dig out important intelligence information, as a basis for decision-making and action.

According 宋忠平 revealed before the “September 11” incident, intelligence officers are judged to master a lot of data, but it ignores the valuable information.

Thus, after the “September 11” incident, the US Defense Advanced research projects in the following year’s annual technology conference, explains how to use the data in a unified and integrated database mining techniques.

The so-called new data sources is the “transaction space.” If the terrorists to plan and execute a terrorist activity, they will certainly leave some kind of “data footprint” in the information space. That is, they need to “deal.” Data records of such transactions, which can be communications, finance, education, health care, can also travel, transportation, immigration, housing and so on all other data records. It is the application data in the United States “transaction” space mining technology to detect and track terrorists.

It is understood that, in 2002, the big drug lords in Afghanistan preparing to provide funding for al-Qaeda and other terrorists, US military intelligence analysts is through data mining, data funds operational plan with the Al-Qaida Curry Curry’s case data in real time, independent association to guide the US military before the enemy further action.

So, how to enhance the ability of data mining technically. Wang Weiping told the “China Science News” reporter, at the entrance of the control of data quality is critical. That is, the data preparation is an important prerequisite for data mining, because it directly affects the accuracy and efficiency of data mining. “If all the data of varying quality into the channel, it is difficult and then the quality is not high, data processing, they will cause serious interference of useful information.”

In short, the data preparation phase, the need for data cleansing, and secondly, the need to analyze the selected data, reduction processing range. In data preprocessing stage, including the elimination of duplicate data, remove noise, missing data processing, data type conversion, etc. The purpose is to process the data into a form suitable for data mining, and on the basis of data selected on mining data for further reduction to reduce processing time and memory resources, making mining more efficient.

Future wars will change shape

The Obama administration on March 29, 2012 issued a “big data research and development initiatives” (Big Data Research and DevelopmentInitiative), will enhance the development of big data for national policy. The US Big Data project is an important part of the US national projects. It is understood that the United States Department of Defense and the Defense Advanced Research Projects Agency under the existing big data projects a total of 10, wherein the data to decision-making, internal network threats, video search and analysis, X- and other project data are representative.

The most important data to decision-making projects, mainly refers to a variety of new ways to take advantage of huge amounts of data, integrate perception, cognition and decision support systems to create a truly autonomous system, making it possible to customize the motorized operation and decision-making ; video search and analysis; network project aimed at internal threats through the use of new cyber threats judgment technology to improve the accuracy of Discovery network spying activities, frequency and speed, so early exposure and prevent sabotage opponents, and enhance network security level of one’s own Once the project is successful, analysts massive video library will be able to quickly and accurately retrieve specific video content, thereby enabling fully, efficiently mine the useful information hidden in the image; X- data project mainly through the development of large capacity scalable data analysis algorithms needed to handle distributed data repository irregular data. Through the development of efficient human-computer interaction devices and visual user interface technology, in order to better diversify tasks, perform operations more quickly.

With the implementation and realization of large data projects, future wars revolutionary change may occur.

Song Zhongping considered one of the most important large-value data is predicted that the data algorithm is applied to a mass of data to predict the likelihood happening up, therefore, the ability to command and decision-making future war can produce a great leap forward.

He told the “China Science News” reporters, for example, as early as in the first Gulf War, the US military before the war with improved civil war games, war process, outcomes and casualties were deduction, the deduction results and the actual results of the war are basically the same. And before the war in Iraq, the US military use of computer systems wargame exercises, deduction “against Iraq” war plan. Then the reality of the invasion of Iraq and the US military victory actions, and also the results of war games are almost exactly the same. At this point, combat simulations have changed from manual mode to computer mode.

“Relying on big data and cloud computing platform, pre-war simulation deduction, from the use of weapons, to play war command means, it can be clearly revealed, as a basis for decision-making during the war.” 宋忠平 said, “Once operational plan has question, can adjust to ensure a minimum combat casualties and win. ”

Secondly, the integration of data is expected to break the barriers between the military services. Big Data can solve troops across military services, cross-sectoral coordination problems, truly integrated operations.

In addition, Song Zhongping believe big data can change the future form of war. In particular, the pursuit of large US data have supported autonomy unmanned combat platform.For example, currently the world’s most advanced unmanned reconnaissance aircraft, “Global Hawk”, to continuously monitor the moving target, to accurately identify the various types of aircraft ground, missiles, and vehicles, and even can clearly distinguish gear car tires. Song Zhongping pointed out that UAVs the ability to do real-time image transmission is critical. Currently, the US is using a new generation of very high frequency communications satellite as a support big data platform.

Future, UAVs could even get rid of human control to achieve full autonomy of action. US unmanned experimental aircraft X-47B is the representative of that already in the case of fully human intervention, automatically take off and land on aircraft carriers and perform combat missions.

“Global Hawk” unmanned aerial vehicles

Further reading  From Data to Decisions

Speed ​​of information processing information systems, target acquisition time situation, the decision cycle and fast response time determines the success of military operations. In the background of big data, speed up the transfer of battlefield information, shortening “from sensor to shooter” cycle, and “discovery that is destroyed,” the operational objectives, the most important issue information system must address. Therefore, the “Data to Decisions project” has become a big data project in the US the most critical one.Currently, the US Army has increased its massive information fusion capability, combat is building intelligent decision support system has made some achievements.

US Army Distributed Common Ground System

The end of 2012, the US Army has begun to deploy combat-proven through intelligence systems in the world. December 14, “the Army Distributed Common Ground System” (D6A) approved the Defense Acquisition Executive Committee (DAE) is responsible for implementation by.

Previously, D6A just as a quick reaction capability, successfully used in Iraq and Afghanistan. Currently D6A been approved for all Army troops, and has been deployed to all brigade-level units. “Rapid reaction capability” refers to a rapid deployment to meet the most immediate and most urgent needs of the system, such as combat environment, but it does not get the approval of the full deployment.

D6A task for the entire federal army and its intelligence agencies and between the Allies, processing, development and dissemination of information, instead of nine different types of legacy systems, an important part of the Army’s modernization program. D6A can help users to share applications, text files, graphics, photographs, maps, etc. Compared with the old system, D6A in 2012 and 2017 savings of $ 300 million. In the whole life cycle (2012 – 2034), D6A savings of approximately $ 1.2 billion.

“Titan” certification Tactical Network Information Technology

“Titan” certification Tactical Network Information Technology (Tactical Information Technology for Assured Networks, TITAN) functions similar to Web search engine application software, commanders for tactical operations center to monitor the received instruction information and publish updated. “Titan” to filter information according to specific mission requirements, clearing commander computer screen (desktop), providing topographic maps, pictures, and text links concise instruction template to form a common operational picture. “Titan” also provides a command post of the future (CPOF) and Force XXI Battle Command Brigade and Below / Blue Force Tracking Support (FBCB2-BFT) systems can be integrated with data from other critical areas.

Intelligent network control software mobile command center

Intelligent network control software mobile command center (Command and Control Mobile Intelligent Net-Centric Software) is a handheld mission command systems, can receive and publish one’s own and enemy forces location information, integrated from the tactical unattended ground sensors various types of sensors and radar detection system information to the enemy in order to achieve progress in real-time monitoring and protection of the weak areas.

Combatants companion artificial intelligence software

Warfighter partner (Warfighter Associate) artificial intelligence software that can automatically search for information about the dialogue between the various types of sensitive target text chat tool to detect soldiers advance will be reported to the command post of the future common operational picture, for example, when a troop of soldiers found minefields, usually manually enter the relevant information on the various information systems, the software can automatically extract the grid coordinates minefields will automatically enter the next command post system, 15 to 20 minutes in advance, in the common operating picture generate relevant information, otherwise the message will be delayed or submerged. Driving artificial intelligence technology, operational and tactical knowledge database theory, the “combatants partner” to complete the cleanup command post next screen, highlight important information, provide warnings and recommendations, and other auxiliary functions users perform the correct decision and action programs.

Original mandarin Chinese:

中國未來戰爭:用大數據奪取制信息權

信息戰打的就是信息流的戰爭。從整個信息流的轉換來看,誰控制了最真實的信息流,誰就控制了這場戰爭的主導權。奪取制信息權已經成為奪取制空權、制海權的先決條件,是未來戰爭勝敗的決定性因素。

■本報記者 胡珉琦

隨著信息化不斷發展,人類社會已經進入了一個不折不扣的“大數據時代”。每天,遍布世界各個角落的傳感器、移動設備、社交網絡和在線交易平台生成上百萬兆字節的數據。美國奧巴馬政府甚至將大數據稱為“未來的新石油”,誰掌控了數據流誰就將主宰未來世界。眾所周知,軍事領域一直都是人類最先進科技的實驗室,大數據無疑將給未來戰爭形態帶來巨大的改變。

大數據“大”在哪兒

麥肯錫全球研究所對大數據的定義是:一種規模大到在獲取、存儲、管理、分析方面大大超出了傳統數據庫軟件工具能力範圍的數據集合(datasets)。

中科院計算機所研究員王偉平告訴《中國科學報》記者,大數據的“大”,理所當然,首先指的是數據體量空前巨大,遠遠超出傳統計算機處理數據量的級別。

當前伴隨著計算機網絡技術的迅速發展和互聯網的高速普及,信息數據量已由TB(1TB=1024GB)級升至PB(1PB=1024TB)、EB(1EB=1024PB)、ZB(1ZB=1024EB)級,並仍在呈爆炸式地增長。據悉,全球在2010 年正式進入ZB 時代,2012 年全球數據量達到5.2ZB,預計到2020年,全球將總共擁有35ZB 的數據量。有一個形象的比喻可以幫助人們理解這些數據的規模。如果把35ZB 的數據全部刻錄到容量為9GB 的光盤上,其疊加的高度將達到233 萬公里,相當於在地球與月球之間往返三次。

其次,王偉平表示,“大”也體現在處理的數據類型多樣化,遠遠超出傳統數據格式和分析工具能處理的範疇。

以往數據大都以二維結構呈現,但隨著互聯網、多媒體等技術的快速發展和普及,視頻、音頻、圖片、郵件、HTML、RFID、GPS 和傳感器等產生的非結構化數據,每年都以60 %的速度增長。預計,非結構化數據將佔數據總量的80%以上。

此外,他認為大數據還要求數據處理的實時性。大數據的數據流往往為高速實時數據流,而且往往需要快速、持續的實時處理,能在第一時間抓住重要事件發生的信息。

如果從軍事領域看,指揮控制系統、天基支持系統、信息處理系統,各種偵察、監視、探測系統的信息量越來越大,大數據在指揮機構中的管理也變得空前重要和復雜。如何對海量戰場數據進行存儲與深度分析,如何判別數據的真實性,數據來源的可靠性,確保數據傳輸的安全性,是未來戰爭雙方面臨的問題。

信息化戰爭對大數據的要求

軍事理論界普遍認為,早在上個世紀​​90年代,信息化戰爭開始崛起。它是一種通過使用信息化戰爭武器影響敵方信息與信息系統,保護己方信息與信息系統,從而取得戰場信息優勢的作戰樣式。它本質上是通過信息作戰手段,以“信息流”控制“能量流”和“物質流”,剝奪敵方的信息優勢、保持己方的信息優勢,從而奪取戰場製信息權。

軍事評論員宋忠平向《中國科學報》記者解釋,傳統的信息戰包括了網絡攻防戰,常規作戰中的干擾與反干擾,還有刑偵系統下的偵測與反偵測等內容。 “信息戰打的就是信息流的戰爭。從整個信息流的轉換來看,誰控制了最真實的信息流,誰就控制了這場戰爭的主導權。”宋忠平說,“奪取制信息權已經成為奪取制空權、制海權的先決條件,是未來戰爭勝敗的決定性因素。”

但他也表示,傳統信息戰在處理信息以及數據方面遭遇到了各種挑戰。首先是傳統信息通道有限,無法一次獲取大量信息。同時,不僅僅是數據量大幅增加,數據形式包括了戰場感知數據、影像、視頻情報等各種類型,僅僅依靠現有信息技術,不能及時高效地分析和處理這些數據。

據報導,伊拉克戰爭爆發當日,美軍駐卡塔爾和科威特前進指揮所由於無法處理保障機構提供的海量數據,不得不關閉設備,從而造成指揮所與部分突擊方向的通信聯繫幾乎中斷。

此外,宋忠平指出,傳統信息系統的數據分享能力比較弱。 “傳統戰爭是一種離線狀態下的作戰方式,上級給下級分配任務,並在離線狀態下執行,最後向上級匯報一個戰果。而且命令一般只能管一個軍一個師,因為他們往往是作為一個獨立的作戰單位。這也導致了相關部門往往各自為營,影響協同作戰的效率。”

在這樣的背景下,信息化戰爭對大數據傳輸、存儲、分析產生了特殊的要求。

首先是數據處理的實時性要求。信息化戰爭中產生的海量數據最終要匯集到各級指揮中心和處理中心,這些數據源源不斷地從各種傳感器、情報機構以及信息中心傳輸匯聚到一起,要對這些數據進行實時處理。宋忠平認為,戰場所有信息哪怕是一個單兵的信息都需要通過大數據傳到指揮控制中心,以了解前線情況,特殊狀況下甚至可以對某個單兵的裝備下達命令。因為,他可能正處在最有利的地形,可以獲取最大的優勢。

其次是數據融合。宋忠平提出,通過使數據鏈的連路拉短,以前需要四至五級的管理才能下達命令,未來可能只需要三級管理完成,這樣才能有助於一體化作戰,而不是各個軍兵種單獨作戰,隨時隨地調整作戰指揮。

此外,在他看來,大數據時代,信息防禦難度尤其加大,對於數據安全要求更高。一般而言,信息化戰爭對數據傳輸的信息安全要求主要體現在解決防竊聽、抗干擾和防止虛假信息欺騙的問題上。未來恐怕需要一套新的防禦機制,以確保信息安全。

由此可見,在大數據時代的信息化戰爭中,各國軍事體系的對抗將在更大程度上依靠各種軍事信息系統、軟件和數據,在正確的時間、正確的地點為正確的決策、指揮和控制提供正確的信息。而使信息實現快速合理分發的前提,是要有對數據的統一調度和管理,讓最即時的戰場信息傳遞到最迫切需要的部門。隨著戰場數據量的增大,高效存儲與分析海量數據,從數據中發掘敵我態勢的變化,預測出最合理的作戰方案,使海量數據更好地為信息化戰爭服務是軍事大數據處理的目標。

軍事數據挖掘面臨挑戰

不過,王偉平指出,大數據時代面臨的一大挑戰是信息的價值密度低。無論是分析人員還是智能係統都需要“大海撈針”,從海量數據中找到有用信息。 “這也充分體現了數據挖掘的重要性。”他強調。

數據挖掘是一個在海量數據中利用各種分析工具發現模型與數據間關係的過程,它可以幫助決策者尋找數據間潛在的某種關聯,通過發現被隱藏的、被忽略的因素,就能夠在數據存儲和管理過程中,挖掘出重要的情報信息,作為決策和行動的依據。

據宋忠平透露,在“9·11”事件發生前,情報研判人員是掌握了大量數據的,但卻忽視了其中有價值的情報。

因此,在“9·11”事件之後,美國國防部高級項目研究在次年的技術年會上,闡述瞭如何在統一集成的數據庫中應用數據挖掘技術。

所謂新的數據資源就是“交易空間”。如果恐怖分子要計劃、執行一次恐怖活動,他們必定會在信息空間留下某種“數據腳印”。也就是說,他們需要“交易”。這種交易的數據記錄,可以是通訊、財務、教育、醫療,也可以是旅行、交通、出入境、房屋等等其他一切數據記錄。美國正是在“交易”空間中應用數據挖掘技術,從而發現和追踪恐怖分子的。

據了解,2002年,阿富汗境內的大毒梟準備為基地組織等恐怖分子提供資金時,美軍的情報分析人員正是通過數據挖掘,把作戰方案庫裡的數據與有關基地組織情況庫裡的資金數據進行實時、自主關聯,從而指導美軍先敵一步採取行動。

那麼,如何從技術上提升數據挖掘的能力。王偉平告訴《中國科學報》記者,在入口處對數據質量進行把控是非常關鍵的。也就是說,數據準備是數據挖掘的重要前提,因為它直接影響到數據挖掘的效率和精準度。 “如果質量參差不齊的數據統統進入通道,便很難再對質量不高的數據進行處理,他們將對有用信息造成嚴重的干擾。”

簡言之,在數據準備階段,需要對數據進行清洗,其次,選出需要分析的數據,縮小處理範圍。而在數據預處理階段,包括了消除重複數據、消除噪聲、遺漏數據處理、數據類型轉換等,目的是把數據處理成適合於數據挖掘的形式,並在數據選擇的基礎上對挖掘數據作進一步的約簡減少內存資源和處理時間,使挖掘更有效。

未來戰爭形態將發生改變

奧巴馬政府於2012年3月29日發布了《大數據研發倡議》(Big Data Research and DevelopmentInitiative),將大數據研發提升為國家政策。而美軍大數據項目正是美國國家項目的重要組成部分。據了解,美國國防部及其下屬國防高級研究計劃局現有的大數據項目共有10個,其中,數據到決策、網絡內部威脅、影像檢索與分析、X-數據項目等是具有代表性的。

最重要的數據到決策項目,主要指的是通過各種新途徑充分利用海量數據,整合感知、認知和決策保障系統,以創造一種真正自主的系統,使之可以自主機動作業並作出決策;網絡內部威脅項目目的是通過採用新式網絡威脅判斷技術,提高探知網絡刺探活動的精度、頻度和速度,從而及早暴露和防範對手的破壞活動,並提升己方的網絡安全水平;影像檢索與分析項目一旦取得成功,分析人員將能從海量視頻庫中快速、精確地檢索特定的視頻內容,由此便能充分、高效地挖掘影像中隱藏的有用信息; X-數據項目主要是通過開發大容量數據分析所需的可擴展算法, 以便處理分佈式數據存儲庫中的不規則數據。通過開發高效的人機互動設備和可視用戶界面技術,以便在多樣化任務中更好、更快地執行操作。

有了大數據項目的實施和實現,未來戰爭可能發生革命性的變化。

宋忠平認為,大數據最重要的價值之一是預測,把數據算法運用到海量的數據上來預測事情發生的可能性,因此,未來戰爭的指揮決策能力可以產生很大的飛躍。

他向《中國科學報》記者舉例,早在第一次海灣戰爭中,美軍戰前利用改進的民間兵棋,對戰爭進程、結果及傷亡人數進行了推演,推演結果與戰爭的實際結果基本一致。而在伊拉克戰爭前,美軍利用計算機兵棋系統進行演習,推演“打擊伊拉克”作戰預案。隨後美軍現實中進攻伊拉克並取得勝利的行動,也和兵棋推演的結果幾乎完全一致。至此,作戰模擬已經從人工模式轉變為計算機模式。

“依託大數據和雲計算平台,戰前的模擬推演,從武器使用、戰爭打法到指揮手段,都可以清晰地顯現,作為戰時決策的依據。”宋忠平說,“一旦發現作戰計劃有問題,可以及時調整,以確保實戰傷亡最小並取得勝利。”

其次,數據的融合有望打破軍種之間的壁壘。大數據可以解決軍隊跨軍種、跨部門協作的問題,真正實現一體化作戰。

除此之外,宋忠平認為,大數據可以改變未來的戰爭形態。美軍尤其追求大數據支撐的擁有自主能力的無人作戰平台。例如,目前全世界最先進的無人偵查機“全球鷹”,能連續監視運動目標,準確識別地面的各種飛機、導彈和車輛的類型,甚至能清晰分辨出汽車輪胎的齒輪。宋忠平指出,無人機能否做到實時地對圖像進行傳輸非常關鍵。目前,美國正使用新一代極高頻的通訊衛星作為大數據平台的支撐。

未來,無人機甚至有可能擺脫人的控制實現完全的自主行動。美軍試驗型無人戰鬥機X-47B就是這一代表,它已經可以在完全無人干預的情況下,自動在航母上完成起降並執行作戰任務。

“全球鷹”無人機

 

延伸閱讀

從數據到決策

信息系統的信息處理速度、目標態勢獲取時間、決策週期以及快速響應時間決定著軍事行動的成敗。在大數據背景下,加快戰場信息流轉,縮短“從傳感器到射手”的周期,實現“發現即摧毀”的作戰目標,成為信息系統建設必須解決的首要問題。因此,“數據到決策項目”成為了美軍大數據項目中最為關鍵的一個。目前,美陸軍已經提高了對海量信息的融合處理能力,正在建設的智能化作戰決策支持系統也取得了一些成果。

美陸軍分佈式通用地面系統

2012年底,美國陸軍開始在全球全面部署經過作戰驗證的情報系統。 12月14日,“陸軍分佈式通用地面系統”(D6A)獲得批准,並由國防採辦執行委員會(DAE)負責實施。

此前,D6A只是作為一種快速反應能力,成功用於伊拉克和阿富汗。目前D6A已獲批用於陸軍所有部隊,並已部署到所有旅級單位。 “快速反應能力”是指一種可以快速部署,以滿足最直接、最迫切需要的系統,比如作戰環境,但它不一定獲得了全面部署的批准。

D6A用於整個陸軍以及它與聯邦情報機構和盟軍之間的任務、處理、開發和傳播情報,取代了9種不同類型的舊系統,成為陸軍現代化計劃的重要組成部分。 D6A可以幫助用戶共享應用程序、文本文件、圖表、照片、地圖等等。與舊系統相比,D6A在2012~2017年可節約3億美元。而在整個壽命週期中(2012~2034年),D6A可節約大約12億美元。

“泰坦”認證網絡戰術信息技術

“泰坦”認證網絡戰術信息技術(Tactical Information Technology for Assured Networks, TITAN)的功能類似於網絡搜索引擎應用軟件,指揮官用於在戰術作戰中心監控接收到的信息和發布更新後的指令。 “泰坦”可根據具體任務需求過濾信息,清理指揮官的計算機屏幕(桌面),提供與地形圖、圖片和文本鏈接的簡明指令模板,以形成通用作戰圖。 “泰坦”還提供了對未來指揮所(CPOF)和21世紀部隊旅及旅以下作戰指揮/藍軍跟踪(FBCB2-BFT)系統的支持,可融合來自其他領域的關鍵數據。

智能式網絡中心移動指揮控制軟件

智能式網絡中心移動指揮控制軟件(Command and Control Mobile Intelligent Net-Centric Software)是一種手持式任務指揮系統,可接收和發布己方和敵軍部隊的位置信息,綜合來自戰術無人值守地面傳感器等各類傳感器和雷達探測系統的信息,從而實現對敵軍進展的實時監控和對薄弱區域的防護。

作戰人員伴侶人工智能軟件

作戰人員伴侶(Warfighter Associate)人工智能軟件,可自動搜尋各類文本交談工具,探測士兵之間有關敏感目標的對話信息,提前將其反饋給未來指揮所的通用作戰圖,例如當某部隊的士兵發現地雷場後,通常會在各類信息系統上人工輸入相關信息,該軟件能夠自動提取地雷場的網格坐標,將其自動輸入未來指揮所繫統,提前15~20分鐘,在通用作戰圖上生成相關信息,否則該信息會延遲或被淹沒。在人工智能技術、作戰理論與戰術知識數據庫的驅動下,“作戰人員伴侶”能完成清理未來指揮所顯示屏、突出重要信息、提供警告和建議等輔助用戶決策和執行正確的行動方案的功能。

Source: 《中国科学报

China Options and the New US Network Warfare Strategy // 中国的选项和新的美国网络战战略

中国的选项和新的美国网络战战略

来源: 中国电子报

中国的选项和新的美国网络战战略

April 23, the US Department of Defense released a new web strategy to replace in 2011 issued a “cyberspace operations strategy.” The new network strategy clearly reflects the “war to end war”, “pre-emptive” thinking explicit proposal to strengthen the construction of the network deterrence, and under what circumstances you can use cyber weapons against network attacks, and lists the greatest threat to countries China, Russia, Iran, North Korea thinks it. The US strategy is bound to intensify the arms race in cyberspace, increasing the likelihood of cyber war broke out, bring more unrest to cyberspace, our response should be prepared in advance, to prepare for contingencies.

The new network strategy “new” Where?

First, a clear network deterrence as a strategic objective. Prior to this, the US has been pursuing a strategy of active defense, the Department of Defense in 2011 issued a “cyberspace operations strategy” in spite of the new network to be deployed weapons, but still mainly focus on cyber defense. The new network strategy will focus on the network as a deterrent, will build the power of the Internet to deal with cyber war as a key objective, and clearly the network architecture includes 133 troops teams. As US Secretary of Defense Carter said, the new network strategy will show the determination of the American cyber attacks to retaliate, “We need to prove to the world that we will protect themselves.”

Second, a clear expansion of the coverage of the network of national defense. The United States has multiple departments, including the Department of Defense, Department of Homeland Security and the National Security Bureau in network security, while the United States a lot of critical information infrastructure by the private sector operators, in order to protect the network security of government departments closely between public and private institutions Cooperation.Although the 2011 “cyberspace operations strategy” in the proposed public-private partnership to strengthen, also referred to strengthen cooperation between the Department of Homeland Security, but the new strategy will be directly “to protect local interests are not destructive and core network attack “the department of Defense and other written tasks, network infrastructure, private sector operators are also included in the scope of protection of the department of Defense, but also proposes strengthening cybersecurity information sharing among government departments and between public and private institutions.

The third is clearly cyber war adversary. Although the United States has been an enemy list, but its previous strategy documents are rarely directly named 2011 “cyberspace operations strategy” in only a general reference to rival cyberspace. But the new network strategy was to dedicate China, Russia, Iran and North Korea and other countries put forward, which is the number of countries in recent years has repeatedly accused. In fact, the United States has been through a variety of ways to find a reasonable excuse for network monitoring, network armaments and other acts taken against cyber attacks accusing China, Russia and other countries are most common in the United States in April 2015 the company released a FireCam accused China and Russia were two reports of cyber attacks.

What impact will the world?

First, the network will be further intensified competition in armaments. According to the United Nations Institute for Disarmament Research in 2013 statistics, there are 47 countries, announced the formation of a network warfare units, 67 countries set up a network of non-military security agencies. With further exacerbated cyberspace security threats, data still growing, new network strategy to attack the United States and deterrence as the core will further aggravate the situation. As the world network of the most powerful country, the United States continued to increase network armaments efforts, other countries will inevitably increase its own power into the network.

Second, large-scale networks will continue to increase the risk of war. In recent years, cyber conflict between nations has been emerging, but the conflict is still the main non-governmental forces, the conflict broke out between the network such as Malaysia and the Philippines, North Korea and South Korea, although part of the conflict emerge out of the shadow of national power, but there is no State publicly acknowledged. US network to the new network strategy war on its head, and set trigger conditions for cyber attacks, in the current absence of international standards related to cyberspace, cyber war risk between countries will continue to increase.

Third, the network will become the fuse of conflict in the real world war. In recent years, the United States has been trying to set a standard network warfare, from the 2011 “cyberspace operations strategy” to 2013’s “Tallinn Manual”, to the new network strategy, the United States has been as a response to the reality of armed combat cyber attacks a means. However, due to technical limitations, network attacks traced still difficult to achieve, the US government and corporate network attacks blamed the lack of direct evidence, or even need to confirm whether the other attacks by cyber attacks, such as the media reported that the United States finds that a North Korean attack from Sony Sony Korea nearly 10 years of network attacks. In this case, it is the United States armed attacks as an excuse to invade his country may occur.

How should China respond?

First, the introduction of national cybersecurity strategy. Based on important principles and national positions to protect national security in cyberspace, the formation of a clear framework for strategic action in cyberspace, improve top-level design Cyberspace national strategic layout.Key areas and key elements for the development of integrated package of cyberspace action plan, including countries such as the protection of critical information infrastructure, the establishment of a sound network and information security system.

The second is to establish a network of space defense forces. Established under the Ministry of Defence into the establishment of the network unit, identify core functions and the main task of the network forces, formed a dedicated network security personnel training and selection of channels, rapid formation of cyberspace defense capability. Set up in the National Technology Plan network security technology projects, research network attack and defense technology and equipment, the establishment of Cyber ​​Range, conduct regular network attack and defense drills, form a network combat capability.

Third, actively participate in international cooperation in cyberspace. Participation in the intergovernmental process of network security cooperation, strengthen dialogue between Russia and the United States, European Union and other countries and regions, forming a major cyber security incident communication and coordination mechanisms. Actively promote bilateral and multilateral cooperation within the framework of the United Nations, the promotion of international conventions to resist the formation of cyber war, the establishment of a unified network of weapons found, network attacks and other recognized international standards.Actively participate in international exchanges and publicly announced our attitude to cyber war, emphasized that States have the responsibility and obligation to protect its cyberspace and critical infrastructure from threats, interference and sabotage attacks.

Original Mandarin Chinese:

4月23日,美国国防部发布了新的网络战略,以替换于2011年发布的《网络空间行动战略》。新的网络战略明显体现了“以战止战”、“先发制人”的思想,明确提出要强化网络威慑力量的建设,以及在何种情况下可以使用网络武器来对付网络攻击者,并列出了中国、俄罗斯、伊朗、朝鲜等其自认为威胁最大的国家。美国这一战略势必加剧网络空间军备竞赛,增加网络战争爆发的可能性,给网络空间安全带来更多不安定因素,我国应提前做好应对措施,以备不时之需。

新版网络战略“新”在何处?

一是明确将网络威慑作为战略目标。在此之前,美国一直推行积极防御战略,2011年国防部发布的《网络空间行动战略》中虽然提出要部署一些新的网络武器,但仍主要以网络防御为重点。而新的网络战略中则将网络威慑作为重点,将建设应对网络战争的网络力量作为重点目标,并明确了包含133个小组的网络部队架构。正如美国国防部长卡特所说,新的网络战略展示了美国将对网络攻击进行报复的决心,“我们有必要向世界证明,我们将保护自己。”

二是明确扩大网络国防的覆盖范围。美国在网络安全方面有多个部门负责,包括美国国防部、国土安全部和国家安全局等,同时美国大量关键信息基础设施由私营机构运营,以保障网络安全有政府部门、公私机构间的紧密合作。虽然2011年的《网络空间行动战略》中就提出要加强公私合作,也提到了要加强与国土安全部之间的合作,但新的战略则直接将“保障本土和核心利益不受破坏性网络攻击”等写入了国防部的任务,私营机构运营的网络基础设施也纳入了国防部保护的范畴,同时也提出加强政府各部门间以及公私机构间的网络安全信息共享等。

三是明确提出网络战争假想敌。虽然美国一直有一个假想敌名单,但其之前的战略文件中很少直接点名,2011年的《网络空间行动战略》中也只是笼统地提到网络空间的对手。但新的网络战略却专门将中国、俄罗斯、伊朗和朝鲜等国提了出来,这也是其近年来不断指责的一些国家。实际上,美国一直通过多种途径为其采取的网络监控、网络军备等行为寻找合理借口,针对中国、俄罗斯等国的网络攻击指责则最为普遍,在2015年4月份美国火眼公司就发布了指责中国和俄罗斯进行网络攻击的两份报告。

将给世界带来什么影响?

一是网络军备竞争将进一步加剧。据联合国裁军研究所2013年的统计,有47个国家宣布组建了网络战部队,67个国家组建了非军方网络安全机构。随着网络空间安全威胁的进一步加剧,相关数据还在不断增加,美国以进攻和威慑为核心的新网络战略将进一步加剧这一情况。作为世界上网络力量最强大的国家,美国仍不断加大网络军备力度,其他国家也不可避免地加大自身网络力量投入。

二是大规模网络战争风险将不断加大。近年来,国家间的网络冲突已经不断出现,但冲突仍以民间力量为主,如马来西亚和菲律宾、朝鲜和韩国等之间爆发的网络冲突,虽然部分冲突浮现出国家力量的影子,但尚没有国家公开承认。美国新的网络战略把网络战争提到了台面上,并为网络攻击设定了触发条件,在当前缺乏国际网络空间相关标准的情况下,国家间的网络战争风险将不断加大。

三是网络冲突将成为现实世界战争的导火索。近年来,美国一直试图设定网络战的标准,从2011年的《网络空间行动战略》到2013年的《塔林手册》,再到新的网络战略,美国一直将现实武装打击作为应对网络攻击的一种手段。但由于技术所限,网络攻击追溯仍较难实现,美国政府及企业的网络攻击指责都缺乏直接证据,甚至需要通过网络攻击来确认对方是否攻击,如媒体报道称美国认定朝鲜攻击索尼公司源于索尼对朝鲜网络近10年的攻击。在这种情况下,很可能出现美国以网络攻击为借口武装入侵他国的现象。

中国应如何应对?

一是推出网络安全国家战略。基于保障国家网络空间安全的重要原则和国家立场,形成清晰的网络空间战略行动的框架,完善网络空间国家战略布局的顶层设计。针对网络空间关键领域和关键要素统筹制定一揽子行动计划,包括国家关键信息基础设施的保护工作等,建立完善的网络和信息安全保障体系。

二是建立网络空间防御力量。在国防部下设立成建制的网络部队,明确网络部队的核心职能和主要任务,形成专门的网络安全人才培养和选拔通道,快速形成网络空间防御能力。在国家科技计划中设立网络安全技术专项,研究网络攻防技术设备,建立网络靶场,开展定期网络攻防演习,形成网络实战能力。

三是积极参与国际网络空间合作。参与政府间网络安全合作进程,加强与俄罗斯、美国、欧盟等国家和地区间的对话,形成重大网络安全事故沟通和协调机制。积极推动联合国框架下的双边与多边合作,推动形成抵制网络战争的国际公约,建立统一的网络武器认定、网络攻击认定等国际标准。积极参与国际交流,公开宣布我国对网络战争的态度,强调各国有责任和义务保护本国网络空间和关键基础设施免受威胁、干扰和攻击破坏。