All posts by admin

Communist China Giving Priority to Development of Military Network Strategy // 中共優先發展網絡戰略力量

Communist China Giving Priority to Development of Military Network Strategy

中共優先發展網絡戰略力量

Cyberspace has become the national comprehensive security of the door. Network warfare reality, the network battlefield globalization, network confrontation normalization, network attack heart white hot, the network to build the army of the general trend, no one can block. Give priority to the development of network strategy, and actively seize the commanding heights of network strategy, for my army building is of great significance.

  The main features of network strategy

Network strategic strength refers to the ability to achieve the desired results through cyberspace. From the current development and possible future trends, mainly with the following characteristics.

Composed of multiple. In recent years, the major network events in the world have shown that the strategic power of the military network is the main force of cyberspace competition. The strategic power of the government departments and the private sector is an important part of the cyberspace competition. The “cyber warrior” An important addition.

Strong professionalism. Network strategy strength has a strong latent and difficult to predict, and the speed of light, instantaneous effect, monitoring and early warning is difficult; once the action is effective, damage effect superimposed amplification or non-linear step, with a typical “butterfly effect.” In 2010, the “shock net” virus attacked the centrifuges of the Iranian Bushehr nuclear power plant and the Natanz uranium enrichment plant, resulting in nearly a thousand centrifuge scrapped, forcing Iran’s nuclear capacity building to delay 2 to 3 years, opened the network attack soft means Destroy the country’s hard facilities.

Destructive. The strategic power of the network is no less than the weapons of mass destruction. Russia and Georgia in 2008, “the five-day war”, the Russian military to Georgia’s television media, government websites and transportation systems as the goal, to carry out a comprehensive “bee group” type network paralysis attacks, leading to grid government agencies operating chaos, Logistics and communication system collapse, much-needed war materials can not be delivered in a timely manner, the potential of the war has been seriously weakened, a direct impact on the grid of social order, operational command and troop scheduling. The Russian military doctrine has identified cybercrime as a weapon of mass destruction and has retained the right to use weapons of mass destruction or nuclear weapons to counterattack.

Advanced technology and phase. Network strategy strength development speed, replacement fast, technical materialization for the equipment cycle is short. At present, the speed of the microprocessor doubles every 18 months, the backbone bandwidth doubled every six months, a variety of new electronic information equipment after another, all kinds of application software dizzying. Cyber ​​space confrontation is the field of information in the field of offensive and defensive struggle, the use of network strategy forces in the confrontation of the phase with grams, constantly renovated. The development of the firewall and the information monitoring technology makes the software of the anti-wall software upgrade continuously. The development of the firewall and the information monitoring technology is the development of the firewall and the information monitoring technology. , Can be described as “a foot high, magic high ten feet.”

  The Developing Trend of Network Strategic

From the subordinate force to the development of key forces. In the past, the network strategic power is mainly for other forces to provide information security, in a subordinate position; with the development of network information technology, network system control of other rights, network strategic forces from the subordinate status to the dominant position to accelerate into the maintenance of national The key to safety. There is no network security there is no sovereign security, “no net” to become a new law of war, the world’s major countries around the network space development rights, dominance and control of a new round of competition, especially the United States and Russia adhere to the practice In the use and continue to develop.

From the maintenance of force to the development of specialized forces. In the past, the network strategy is mainly to maintain the network information system and all kinds of network transmission system, network attack and defense attributes are not clear. At present, all areas of the network space in depth, the world’s major countries are hard to build cyberspace offensive and defensive capabilities, the main military power of the network strategy has become a network of reconnaissance, network attacks, network defense and other clear division of labor, professional regular military forces. The United States has so far built the world’s most complete and powerful network of the army, and held a series of “network storm” series of exercises. The new “cyberspace strategy” in the United States, the first public to cyberspace combat as one of the tactical options for future military conflict, clearly proposed to improve the US military in the cyberspace of deterrence and offensive capability. In order to adapt to the new strategy, the US Department of Defense proposed 2018 to build a offensive and defensive, flexible form, with full combat capability of the network forces construction goals.

From the military to the integration of military and civilian development. The development of the strategic power of the military network started relatively late compared with the civil field, and because of the confidentiality of military confrontation and the specificity of the operational objectives, it is often developed independently. With the development of network technology, the military’s own network strategic strength is difficult to meet the needs of diversified tasks, we must learn from local folk technical means, integrate local network resources, realize the integration of military and civilian development. Network space capacity building on the talent, intelligence, experience and other software environment is extremely high, coupled with the local convergence of a wealth of network resources, military and civilian forces to promote the development of cyberspace capabilities become the strong tone of the times.

From a single model to the “network integration” development. At present, the network includes both the computer IP system network and the non-computer IP system network including a large number of complex early warning detection network, satellite communication network and tactical data link. The traditional single network confrontation model is difficult to meet the challenge of cyberspace. With the development of information technology, especially the Internet of Things technology, the relationship between the network and the power of the battlefield network more and more closely, which for the “network integration” in the technical means to provide the possibility. The use of electronic warfare and network warfare means, for different systems around the open bow, broken chain broken network, to achieve complementary advantages, system damage, as the latest guidance on the construction of network space. Data show that the US military typical network of integrated attack equipment “Shu special” system has been from the “Shu-1” to the current development of “Shu-5”. According to reports, “Shute” system through the enemy radar antenna, microwave relay station, network processing nodes to invade the enemy air defense network system, real-time monitoring of enemy radar detection results, even as a system administrator to take over the enemy network, Control of the sensor.

From non-state actors to state actors. At present, the network attack has developed from a single hacker behavior for the national, political, military confrontation, the attack object has been developed from the personal website to the country, the army’s important information system, attack “unit” has grown from stand-alone to tens of thousands Hundreds of thousands of terminals, and can instantly release the amazing attack energy. Although many of the intentions of malicious acts of non-State actors are non-state, the consequences are national, whether they are espionage, political opinions, or personal discontent, or terrorist activities , Have a direct impact on social stability, disrupt the economic order, endanger the stability of state power. Once the relevant reaction is made, the subject of the act must be the state and the army, and not the non-state actors themselves.

  The Construction of Network Strategic Strength

Strengthen strategic planning. Cyberspace competition is the first strategic battle of the contest. From the national level, the network strategy of the power of the main function is to reduce the risk of cyberspace, maintaining the normal operation of the country. We must understand the extreme importance and realistic urgency of cyberspace security from the perspective of national security, raise the focus of cyberspace capacity building to the strategic level, and try to solve the problem of how to make good use of cyberspace while trying to reduce the national cyberspace security Risk, so that cyberspace security has become an important support for national prosperity and security. From the military level, the network strategy is mainly to seize the system of network power. We must expand the military vision, the cyberspace as an important area of ​​action, to seize the system as the core, change the military ideas and ideas, adjust the structure and composition of armed forces, the development of weapons and equipment and take a new tactics.

Speed ​​up the construction of the power system. Maintain cyberspace security in the final analysis depends on the strength. We must base ourselves on the characteristics and laws of cyberspace capacity building, focus on the core elements of network capability system and the overall layout of network strategy strength, and systematically design the system structure which conforms to the law and characteristics of cyberspace confrontation in our country, and perfect the system of leadership and command Functional tasks, straighten out the relationship between command and management. We should take the network strategic power as an important new combat force, from the organization construction, personnel training, equipment development, elements of training and other aspects, to take extraordinary measures to give priority construction, focus on protection. To normalize the national network of offensive and defensive exercises, test theory, tactics, equipment and technology effectiveness, and comprehensively enhance the comprehensive prevention of cyberspace capabilities.

Promote technological innovation. The essence of cyberspace confrontation is the competition of core technology, and it is necessary to accelerate the independent innovation of network information technology. We should focus on improving the capability of independent innovation as a strategic basis, relying on the national innovation system as the basic support, concentrating on breaking the frontier technology of network development and the key core technology with international competitiveness, ahead of deployment and focusing on the development of information technology and information industry. To speed up the process of localization of key core technologies, strengthen the construction of safety testing and active early warning means, and gradually improve the equipment system of cyberspace in China, and comprehensively improve our network space capability. To follow the basic laws of cyberspace confrontation, in accordance with the “asymmetric checks and balances” strategy, increase the quantum technology, Internet of things and cloud computing and other new technology research and development efforts to create unique combat capability, master the initiative of cyberspace security development The

Promote the integration of military and civilian development. The integration of military and spatial ability of military and civilian development is not only the overall situation of national security and development strategy, but also the objective fact that cyberspace security can not be avoided by the overall planning of national defense and economic and social development. We must actively promote the deep integration of military and civilian development, to promote China’s network space capacity supporting the construction. It is necessary to formulate top-level planning in the form of policies and regulations, clarify the objectives and tasks, methods, organizational division and basic requirements of the deepening development of cyberspace in the form of policies and regulations, and make the integration of military and civilian development into law enforcement and organizational behavior; To establish a sound military coordination, demand docking, resource sharing mechanism, through a unified leadership management organization and coordination of military needs and major work, to achieve risk sharing, resource sharing, and common development of the new situation. We should pay attention to the distinction between the boundaries of military and civilian integration, clear the concept of development-oriented people and the main idea of ​​the army-based, and actively explore the military and the people, the advantages of complementary channels.

 

Original Communist Mandarin Chinese 🙂

網絡空間成為國家綜合安全的命門。網絡戰爭現實化、網絡戰場全球化、網絡對抗常態化、網絡攻心白熱化、網絡建軍正規化的大勢,無人可擋。優先發展網絡戰略力量,積極搶占網絡戰略制高點,對於我軍隊建設具有重要意義。

網絡戰略力量的主要特點

網絡戰略力量,是指通過網絡空間來實現預期結果的能力。從當前發展及未來可能的走勢看,主要有以下特點。

組成多元。近年來發生在全球範圍內的重大網絡事件表明,軍隊網絡戰略力量是網絡空間競爭的主力軍,政府部門、私營機構網絡戰略力量是網絡空間競爭的重要部分,民間“網絡戰士”是網絡空間競爭的重要補充。

專業性強。網絡戰略力量具有極強的潛伏性和難預測性,且以光速進行、瞬時產生效果,監測預警難度大;一旦行動奏效,損害效果疊加放大或非線性階躍,具有典型的“蝴蝶效應”。 2010年,“震網”病毒攻擊了伊朗布什爾核電站和納坦茲鈾濃縮廠的離心機,造成近千台離心機報廢,迫使伊朗核能力建設延遲2至3年,開啟了網絡攻擊軟手段摧毀國家硬設施的先河。

破壞性大。網絡戰略力量破壞力不亞於大規模殺傷性武器。 2008年俄國與格魯吉亞“五日戰爭”中,俄軍以格方的電視媒體、政府網站和交通系統等為目標,開展全面的“蜂群”式網絡阻癱攻擊,導致格政府機構運作混亂,物流和通信系統崩潰,急需的戰爭物資無法及時投送,戰爭潛力受到嚴重削弱,直接影響了格的社會秩序、作戰指揮和部隊調度。俄羅斯軍事學說已將網絡攻擊手段定性為大規模毀滅性武器,並保留了運用大規模毀滅性武器或核武器反擊的權利。

技術先進且相生相剋。網絡戰略力量發展速度快、更新換代快,技術物化為裝備的周期短。當前,微處理器的速度每18個月翻一番,主幹網帶寬每6個月增加一倍,各種新型電子信息設備層出不窮,各種應用軟件目不暇接。網絡空間對抗是信息領域的攻防鬥爭,網絡戰略力量使用的手段在對抗中相生相剋、不斷翻新。常規通信受干擾催生了跳、擴頻通信體制,跳、擴頻通信的出現又催生了頻率跟踪干擾、相關信號干擾等新型電子乾擾手段;防火牆、信息監控技術的發展,使翻牆軟件不斷升級,可謂“道高一尺,魔高一丈”。

網絡戰略力量的發展趨勢

由從屬性力量向關鍵性力量發展。以往網絡戰略力量主要是為其他力量提供信息保障,處於從屬地位;隨著網絡信息技術的發展,製網權統攬其他制權,網絡戰略力量由從屬地位向主導地位加速轉進,成為維護國家安全的關鍵。沒有網絡安全就沒有主權安全,“無網不勝”成為戰爭的新定律,世界各主要國家圍繞網絡空間的發展權、主導權和控制權展開了新一輪的角逐,特別是美俄堅持在實踐中運用並不斷發展。

由維護型力量向專業化力量發展。以往網絡戰略力量主要是維護網絡化信息系統和各類網絡傳輸系統,網絡攻擊和防禦屬性均不鮮明。當下各領域對網絡空間深度依賴,世界主要國家無不竭力打造網絡空間攻防能力,主要軍事強國的網絡戰略力量業已成為集網絡偵察、網絡攻擊、網絡防禦等分工明確、專業化的正規軍事力量。美國迄今已建成全球編制最齊全、力量最龐大的網軍,並多次舉行“網絡風暴”系列演習。美國新版《網絡空間戰略》,首次公開把網絡空間作戰作為今後軍事衝突的戰術選項之一,明確提出要提高美軍在網絡空間的威懾和進攻能力。為適應新戰略,美國防部提出2018年建成一支攻防兼備、形式靈活,具備全面作戰能力的網絡部隊的建設目標。

由軍地自主向軍民融合發展。軍隊網絡戰略力量的發展相對於民用領域起步較晚,且由於軍事對抗的保密性和作戰目標的特定性,往往自主發展。隨著網絡技術的發展,軍隊自身的網絡戰略力量難滿足多樣化任務的需要,必須學習借鑒地方民間技術手段,整合地方網絡資源,實現軍民融合發展。網絡空間能力建設對人才、智力、經驗等軟件環境要求極高,加上地方匯聚了豐富的網絡資源,軍民聯手推進網絡空間能力發展成為時代的強音。

由單一模式向“網電一體”發展。現階段,網絡既包括計算機IP體製網絡,更包含大量複雜的預警探測網、衛星通信網、戰術數據鍊等非計算機IP體製網絡,傳統的單一網絡對抗模式難以應對網絡空間的挑戰。隨著信息技術特別是物聯網技術的發展,戰場網中網與電的關係越來越緊密,這為“網電一體”在技術手段上提供了可能。綜合運用電子戰與網絡戰手段,針對不同體制的網絡左右開弓、斷鍊破網,實現優勢互補、體系破擊,成為網絡空間能力建設的最新指導。有資料顯示,美軍典型網電一體攻擊裝備“舒特”系統已從“舒特-1”發展到目前的“舒特-5”。據報導,“舒特”系統可通過敵方雷達天線、微波中繼站、網絡處理節點入侵敵方防空網絡系統,能夠實時監視敵方雷達的探測結果,甚至以系統管理員身份接管敵方網絡,實現對傳感器的控制。

由非國家行為體向國家行為體發展。目前,網絡攻擊已從單個的黑客行為發展為國家、政治、軍事上的對抗行為,攻擊對像已從個人網站發展到國家、軍隊的重要信息系統,攻擊“單元”已從單機發展到數万乃至數十萬台終端,且能在瞬時釋放驚人的攻擊能量。儘管非國家行為體的惡意網絡行為目的許多是非國家的,但由此所造成的後果卻是國家的,無論是進行間諜活動,還是發表政治主張,或是發洩個人不滿情緒,或是進行恐怖活動,都直接影響社會穩定、擾亂經濟秩序、危及國家政權穩固。一旦因之作出相關反應,其行為主體一定是國家和軍隊,而不再是非國家行為體本身。

網絡戰略力量的建設指向

加強戰略統籌謀劃。網絡空間競爭首先是戰略運籌的較量。從國家層面看,網絡戰略力量的職能主要是降低網絡空間的風險,維護國家正常運轉。必須從國家安全的視角認清網絡空間安全的極端重要性和現實緊迫性,將網絡空間能力建設的著眼點上升到戰略層面,在著力解決如何利用好網絡空間的同時,努力降低國家網絡空間安全風險,使網絡空間安全成為國家繁榮與安全的重要支撐。從軍隊層面看,網絡戰略力量主要是奪取製網權。必須拓展軍事視野,把網絡空間作為製權行動的一個重要領域,以奪取製網權為核心,變革軍事思想和觀念,調整武裝力量結構與構成,發展武器裝備並採取新的戰法。

加快力量體系構建。維護網絡空間安全說到底要靠實力。必須立足於網絡空間能力建設的特點、規律,圍繞我國網絡能力體系核心要素和網絡戰略力量建設總體佈局,以系統思維設計符合我國網絡空間對抗規律和特點的體系架構,健全領導指揮體制機制,明確職能任務,理順指揮管理關係。要把網絡戰略力量作為重要的新型作戰力量突出出來,從組織建設、人才培養、裝備發展、要素演訓等各方面,採取超常舉措,給予重點建設、重點保障。要常態化開展國家級網絡攻防演練,檢驗理論、戰法、裝備及技術的有效性,全面提升網絡空間綜合防範能力。

推進技術自主創新。網絡空間對抗的實質是核心技術的比拼,必須加快推進網絡信息技術自主創新。要把提高自主創新能力作為戰略基點,以國家創新體係為基本依托,集中力量突破網絡發展的前沿技術和具有國際競爭力的關鍵核心技術,超前部署和重點發展信息技術和信息產業。要加速關鍵核心技術的國產化進程,加強安全測試和主動預警手段的建設,逐步完善我國網絡空間的裝備體系,全面提高我國網絡空間能力。要遵循網絡空間對抗的基本規律,按照“非對稱制衡”方略,加大對量子科技、物聯網和雲計算等新技術的研發力度,以獨創技術塑造實戰能力,掌握網絡空間安全發展的主動權。

推動軍民融合發展。網絡空間能力的軍民融合式發展,既是站在國家安全與發展的戰略全局,對國防和經濟社會發展統籌謀劃,也是網絡空間安全不能迴避的客觀事實。必須積極推動軍民深度融合發展,全力推進我國網絡空間能力配套建設。要綜合軍民需求制定頂層規劃,以政策法規的形式明確網絡空間軍民融合深度發展的目標任務、方法路徑、組織分工和基本要求等關係全局的重大問題,變軍民融合發展為執法行為、組織行為;要建立健全軍地協調、需求對接、資源共享機制,通過統一的領導管理機構組織協調軍地的各類需求和重大工作,達成風險共擔、資源共享、共同發展的新局面。要注重軍民融合的界限區分,明確以民為主的發展理念和以軍為主的作戰理念,積極探索軍民一體、優勢互補的可行性渠道。

Referring URL:

http://theory.people.com.cn/n1/2016/1226/c40531-28977153.html

Chinese Military Applications & Use of Bitcoin in Future Wars // 中國軍事應用與比特幣在未來戰爭中的應用

Chinese Military Applications & Use of Bitcoin in Future Wars //

中國軍事應用與比特幣在未來戰爭中的應用

Can you imagine that Bitcoin can show up in military applications? Recently, Estonia and NATO are trying to use block-chain technology to develop next-generation systems to modernize NATO’s network defense platform. In order to collect effective information against terrorists, the US military is trying to “reward” the bit as a reward for intelligence providers. Such as “brain hole open” block chain technology military applications, gradually “Starfire can start a prairie fire” trend. In the future, the block chain technology can not only be used for intelligence personnel performance performance incentives, but also for weapons and equipment life tracking, military human resources management, military supplies procurement, intelligent military logistics and many other aspects. Block chain of this future war “alternative dancers”, most likely quietly subvert the future war. Detailed explanation Please pay attention to today’s published “Liberation Army Daily”

How does the block chain create “currency” for the world?

If you want to read the block chain in the future battlefield on the “unique dance”, have to start from the bit currency. The name of the bit as much as the earliest in 2009, once launched quickly set off the Internet platform investment and trading boom, and thus become the most typical block block technology applications.

Despite the fact that people are mixed, but the block chain technology behind it has shown great interest. Block-chain technology is a decentralized digital book system that contains a complete transaction record for Bitcoin since the start-up of the bitcoin system. It is based on the new de-centricization of the block chain. People can safely store or trade bitmaps. The relevant information can not be forged or tampered with. It can automatically execute smart contracts without any central agency.

The birth of block chain technology, derived from the name of “Byzantine General” computer science problem solving. In layman’s terms, it is a question of how to achieve a credible consensus in a network of nodes that lack trust. By introducing the dynamic cycle of “competition-verification-synchronization-competition” to solve the problem, the block chain technology eventually becomes a new technology platform that allows individuals to carry out effective and credible cooperation without third party certification.

In the Bitcoin system, the generation and trading of “money” is closely related to the block chain. The dynamic process of the block chain is the process of generating and circulating the new currency, which is the basis for the safe, orderly and credible operation of the whole bitcover system. Need to constantly update and maintain the block chain, such as “Mint”, you can package the latest transaction records loaded into the end of the chain, and then the formation of new blocks.

Block chain technology is the technical support behind Bitcoin, which itself consists of multiple connected blocks, each of which is like a page in the book, records the relevant transactions for a period of time, and through different areas Block before and after the point of the relationship between all the blocks are connected in order to form a block chain. At present, the block chain technology uses P2P technology, such as P2P data transmission, file sharing, asymmetric encryption and distributed storage technology, which is accelerating the development of technology bottlenecks and application popularization.

你能想象到比特币可以在军事应用上大显身手吗?日前,爱沙尼亚和北约正尝试使用区块链技术开发下一代系统,以实现北约网络防御平台的现代化。美军为了收集打击恐怖分子的有效情报,正尝试向情报提供者“打赏”比特币作为酬劳。诸如此类“脑洞大开”的区块链技术军事应用,渐有“星星之火可以燎原”之势。未来,区块链技术不仅可用于情报人员工作绩效激励,还可用于武器装备全寿命跟踪、军事人力资源管理、军用物资采购、智能军事物流等诸多方面。区块链这个未来战争的“另类舞者”,极有可能悄无声息地颠覆未来战争。详细解读请关注今日出版的《解放军报》——

石破天惊——

区块链如何为世界“造货币”

若想读懂区块链在未来战场上的“独特舞姿”,得先从比特币开始。名噪一时的比特币最早于2009年提出,一经推出便迅速掀起了互联网平台投资和交易热潮,也因此成为区块链技术当下最为典型的应用。

尽管人们对比特币褒贬不一,但对其背后的区块链技术却表现出极大兴趣。区块链技术是一个去中心化的数字账簿系统,包含了比特币系统开始运行以来比特币的完整交易记录。正是基于区块链这种新型去中心化协议,人们才能安全地存储或交易比特币,相关信息不可伪造和篡改,可自动执行智能合约,无需任何中心化机构的审核。

区块链技术的诞生,源自对名为“拜占庭将军”的计算机科学问题的求解。通俗地讲,就是在一个由相互缺乏信任的节点组成的网络中,各节点如何达成可信共识的问题。通过引入“竞争-验证-同步-竞争”的动态循环解决该问题,区块链技术最终成为允许个体不经过第三方认证而开展有效可信合作的新型技术平台。

在比特币系统中,“货币”的产生和交易与区块链紧密相关。区块链的动态变化过程就是新币生成和流转的过程,是支撑整个比特币系统安全、有序和可信运行的基础。需要不断更新和维护的区块链,好比“造币机”,可以将最新的交易记录打包加载到链的末端,进而形成新的区块。

区块链技术正是比特币背后的技术支撑,它本身由多个相连的区块构成,每个区块好比“账本”中的一页,记录了一段时间内相关交易情况,并通过不同区块之间的前后指向关系,将所有区块按序相连构成区块链。目前,区块链技术综合运用了P2P数据传输、文件共享、非对称加密和分布式存储等技术,正向着技术底层化和应用普及化方向加速发展。

Of course, the block-chain technology, which has long been implemented on the algorithm, is somewhat difficult to understand because of its abstraction. In fact, the block chain is similar to a “trust manufacturing machine”, it is the emergence of mutual understanding for both sides to create trust. Block-chain technology can generate a set of record time, can not be tampered with a trusted database, through this technology, even if there is no neutral third-party institutions, between the nodes can also achieve cooperation. At present, the block chain technology has been from a single digital currency, and gradually extended to the intelligent contract, Internet of things, authentication, e-commerce, social communications, file storage and other fields.

Among them, the international financial giants have begun to try to use the block chain technology to deal with complex accounting business, IBM and other companies claim that the block chain is to solve the Internet of things information security, data storage, interactive processing of the core technology. Block chain technology is designed to achieve cross-network distribution, which makes it an ideal choice for cross-organizational business networks. Block chain to trust the characteristics of its bring scalability, data encryption standards to ensure that the content can not be tampered with the decentralization of data processing to further enhance the security of the data. In addition, the block chain can also encourage people to get out of the firewall protection circle, sharing data. It is the block chain technology “maverick” characteristics, it makes it seem so different.

The successful use of Bitcoin, fully demonstrated the block chain technology open and transparent, safe and trustworthy, distributed sharing and other excellent features. Inspired by the fact that dozens of international technology giants are jointly developing the “super books” project, trying to create a transparent, open, decentralized distributed books, so that more applications can be more easily built in the block Chain technology. In the future, “trust manufacturing machine” will also bring us, including basic applications, upgrade applications and extended applications and many other “surprise.”

The basic application mainly relies on the existing bit coin system, with the exchange of money for the intermediary, as the value of the carrier between the users to pass. Including shopping, payment, transfer, liquidation and other network transactions can take the block chain technology “ride” to further enhance the safety of financial life. The upgrade application is the transplantation, upgrading and transformation of the block chain technology, and then fully exploits the technical advantages of the block chain to realize the secure storage of the data. The future, personal electronic file management, charitable donation registration, data permanent curing and disaster recovery can see the block chain technology figure. Expanded application is the innovation, generalization and popularization of the block chain technology. The “trust manufacturing machine” will reconstruct the existing network rules, establish a perfect network credit system, and then in the future world of things to show their talents.

Of course, the block chain technology, although the prospects are broad, but still need to address information security and confidentiality, network construction and regulatory control and many other issues. Although you can use asymmetric encryption technology to obtain a strong information security, but does not mean that the security of the block chain technology on the “impregnable”. How to build a decentralized peer-to-peer network, how to achieve effective monitoring of user information is an urgent need to solve the problem.

犹抱琵琶——

“信任制造机”原来如此与众不同

当然,早已在算法上实现的区块链技术由于过于抽象,理解起来有些困难。其实,区块链类似一台“信任制造机”,它的出现就是为互不相识的双方制造信任。区块链技术可以生成一套记录时间先后、不可篡改的可信任数据库,通过这项技术,即便是没有中立的第三方机构,各节点之间也能实现合作。目前,区块链技术已经从单一的数字货币,逐步延伸到智能合约、物联网、身份验证、电子商务、社交通讯、文件存储等各个领域。

其中,国际金融巨头已经开始尝试使用区块链技术处理繁杂的记账业务,IBM等公司宣称区块链是解决物联网信息安全、数据存储、交互处理的核心技术。区块链技术的设计初衷就是实现跨网络分布,这就让它成为了跨组织业务网络的理想选择。区块链去信任化的特点为其带来了可扩展性,数据加密标准确保了不可实现内容篡改,对数据的分散化处理进一步提升了数据的安全性。此外,区块链还能鼓励人们走出防火墙的保护圈,共享数据。正是区块链技术“特立独行”的特征,才让它显得如此与众不同。

比特币的成功使用,充分展示了区块链技术公开透明、安全可信、分布共享等优良特性。受此启发,目前已有数十家国际科技巨头正在联合开发“超级账本”项目,试图打造一个透明、公开、去中心化的分布式账本,让更多的应用能更容易地建立在区块链技术之上。未来,“信任制造机”还将为我们带来包括基础应用、升级应用和扩展应用等诸多“惊喜”。

基础应用主要依托现有的比特币系统,以有价币为交换中介,作为价值载体在用户之间进行传递。包括购物、支付、转账、清算等网络交易都可搭上区块链技术的“顺风车”,进一步增强金融生活的安全性。升级应用是对区块链技术的移植、升级和改造,进而充分发掘区块链的技术优势,实现数据的安全可信存储。未来,个人电子档案管理、慈善捐赠登记、数据永久固化和容灾备份等都可见到区块链技术的身影。扩展应用是对区块链技术的革新、泛化和推广,“信任制造机”将重构现有网络规则,建立起完善的网络信用体系,进而在未来的物联网世界中大显身手。

当然,区块链技术虽然前景广阔,但依旧需要解决信息安全保密、网络构建和监管控制等诸多问题。尽管可以使用非对称加密技术获得较强的信息安全保障,但并不意味着区块链技术的安全性就“固若金汤”。如何构建去中心化的对等网络,如何实现用户信息的有效监管都是亟须解决的难题。

In the field of military applications, “natural” with information integrity and many other features of the block chain technology, from the beginning to achieve the data storage and data encryption of the organic combination, will be in the military field flex its muscles.

Battlefield information protection. No matter how the war form changes, information integrity and confidential information protection are the key to determine the outcome of the war. Although the modern military system has established a number of verification, separate preservation, multiplayer operation and a series of security initiatives, but directly break the existing system issued a fake command is not impossible. With the block chain technology, to a certain extent, to enhance the security of battlefield information protection. At present, the US Department of Defense Advanced Research Projects Agency is through the block chain technology to create a secure information platform to study the block chain can protect the highly sensitive data to help and study its military satellites, nuclear weapons and other scenes Of the potential of the application, the future is likely to be used to support the forces of combat.

Weapon and Equipment Management. Weapons and equipment from the project demonstration, development and production, delivery service to retirement retirement, the need for the entire life cycle, including design, test results, technical status and other large data records for the record. The current use of paper and electronic media security is difficult to protect, transfer transfer difficulties, the lack of effective supervision and other security risks. Through the introduction of block chain technology, can form a party can participate in the preservation of the distributed, supervised file registration network, to further improve the safety of weapons and equipment management, convenience and credibility. Similarly, in the process of military human resources management, but also through the block chain records of each soldier’s resume, the formation of electronic files can not be tampered with, technically completely solve the problem of archives management system.

Intelligent military logistics. Modern military logistics is moving towards the intelligent era, intelligent warehousing, intelligent packaging, intelligent transportation and intelligent distribution and other intelligent network will cover the whole process of military logistics. The use of block chain technology can effectively solve the intelligent military logistics network communication, data preservation and system maintenance and other problems, to further improve the viability of the logistics system to achieve free exchange of information to ensure the orderly and efficient operation of the system. With the block chain technology, it will realize the qualitative change from free transmission to free notarization, which is very likely to become the “subversive” technology of the future network infrastructure agreement and credit paradigm.

Information hidden incentive. In recent years, the US military fully excavated the block chain in the record of the anonymous characteristics of the transaction, and its application to the field of intelligence gathering, to achieve information to provide incentives for the incentive to pay gold. As we all know, intelligence providers or “informants” need a secret identity and whereabouts, the traditional transfer, cash and other payment methods can easily be tracked locked. Through Bitcoin as a payment intermediary, you can cleverly break the payment channel, so that information flow is difficult to trace, and thus effectively protect the security of intelligence personnel. Among them, the bit currency trading platform in the entire payment process plays a “black box” role, to achieve the hidden information between the two sides of the transaction hidden.

在军事领域应用前景广阔

在军事应用领域,“天生”拥有信息完整性等诸多特性的区块链技术,从一开始就实现了数据存储和数据加密的有机结合,将在军事领域大展拳脚。

战场信息保护。不论战争形态如何改变,信息完整性和机要信息保护都是决定战争胜败的关键。虽说现代军事体系中已建立了多重验证、分开保存、多人操作等一系列安全举措,但直接突破现有体系下达假命令并不是没有可能。借助区块链技术,能在一定程度上提升战场信息保护的安全性。目前,美国国防部高级研究计划局正通过区块链技术创造一个安全的信息平台,研究区块链能否在保护高度敏感数据上提供帮助,并研究其在军用卫星、核武器等数个场景中的应用潜力,未来极有可能用来支持部队作战。

武器装备管理。武器装备从立项论证、研制生产、交付服役到退役报废,需要对全寿命周期内包括设计方案、试验结果、技术状态等大量数据资料进行记录备案。目前采用的纸质和电子媒介存在安全难以保障、转移交接困难、缺乏有效监管等安全隐患。通过引入区块链技术,可以形成一个各方均可参与保存的分布式、受监督的档案登记网络,进一步提高武器装备管理的安全性、便利性和可信度。同样,在军事人力资源管理过程中,也可通过区块链记录每名军人的任职履历,形成无法篡改的个人电子档案,从技术上彻底解决档案管理系统存在的问题。

智能军用物流。现代军用物流正向智能时代迈进,智能仓储、智能包装、智能运输和智能配送等智能化物联网络将涵盖军事物流全过程。利用区块链技术可有效解决智能化军用物流面临的组网通信、数据保存和系统维护等难题,进一步提高物流系统的生存能力,实现信息自由交互,保证了系统的有序高效运转。借助区块链技术,将实现信息从自由传输到自由公证的质变,极有可能成为未来网络基础协议和信用范式的“颠覆性”技术。

情报隐蔽激励。近年来,美军充分挖掘区块链在记录交易时的匿名性特征,并将其应用到情报收集领域,实现情报提供激励金的隐蔽定向支付。众所周知,情报提供者或“线人”需要隐秘的身份和行踪,传统的转账、现金等支付方式极易被跟踪锁定。通过比特币作为支付中介,就可巧妙断裂支付通路,让情报资金流转难以追溯,进而有效保护情报人员的安全。这其中,比特币交易平台在整个支付流程中扮演了“黑箱”的角色,实现了交易双方关键信息的隐藏。

The concept of Bitcoin was originally proposed by Nakamoto in 2009, according to the idea of ​​the open source of the open source software and the construction of its P2P network. Bitcoin is a digital currency in the form of P2P. Point-to-point transmission means a decentralized payment system.

Unlike most currencies, Bitcoin does not rely on a specific currency institution, which is generated by a large number of calculations based on a particular algorithm. The bit currency economy uses a distributed database of many nodes in the entire P2P network to confirm and record all transactions, And the use of cryptographic design to ensure that all aspects of currency circulation security. P2P de-centricity and the algorithm itself can ensure that the currency can not be manipulated by a large number of manufacturing bits. A cryptographic-based design allows a bit currency to be transferred or paid only by the real owner. This also ensures that the ownership of money and the anonymity of circulation transactions. Bitcoin is the biggest difference from other virtual currencies, and its total quantity is very limited and has a strong scarcity. The monetary system has had no more than 10.5 million in four years, and the total number will be permanently limited to 21 million.

Bitcoin can be used to cash, can be converted into the currency of most countries. Users can use some coins to buy some virtual items, such as online games among the clothes, hats, equipment, etc., as long as someone accepts, you can also use the bitcover to buy real life items.

比特币的概念最初由中本聪在2009年提出,根据中本聪的思路设计发布的开源软件以及建构其上的P2P网络。比特币是一种P2P形式的数字货币。点对点的传输意味着一个去中心化的支付系统。

与大多数货币不同,比特币不依靠特定货币机构发行,它依据特定算法,通过大量的计算产生,比特币经济使用整个P2P网络中众多节点构成的分布式数据库来确认并记录所有的交易行为,并使用密码学的设计来确保货币流通各个环节安全性。P2P的去中心化特性与算法本身可以确保无法通过大量制造比特币来人为操控币值。基于密码学的设计可以使比特币只能被真实的拥有者转移或支付。这同样确保了货币所有权与流通交易的匿名性。比特币与其他虚拟货币最大的不同,是其总数量非常有限,具有极强的稀缺性。该货币系统曾在4年内只有不超过1050万个,之后的总数量将被永久限制在2100万个。

比特币可以用来兑现,可以兑换成大多数国家的货币。使用者可以用比特币购买一些虚拟物品,比如网络游戏当中的衣服、帽子、装备等,只要有人接受,也可以使用比特币购买现实生活当中的物品。

Block chain technology, also known as distributed book technology, is an Internet database technology, which is characterized by decentralized, open and transparent, so that everyone can participate in database records.

Interpretation

The earliest is the basic technology of Bitcoin, the world is in the study, can be widely used in various fields such as finance.

Fundamental

The basic principles of block chains are not difficult to understand. The basic concepts include:

A transaction that causes a change in the state of the book, such as the addition of a record;

Block: record a period of time transactions and status of the results of the current state of the book is a consensus;

Chain: by a block in the order of occurrence in series, is the state changes in the log records.

If the block chain is used as a state machine, each transaction is an attempt to change the state once, and each time the consensus is generated, the participant confirms the result of the change in the status of all the transactions in the block.

区块链技术,也被称之为分布式账本技术,是一种互联网数据库技术,其特点是去中心化、公开透明,让每个人均可参与数据库记录。

释义

最早是比特币的基础技术,目前世界各地均在研究,可广泛应用于金融等各领域。

基本原理

区块链的基本原理理解起来并不难。基本概念包括:

交易:一次操作,导致账本状态的一次改变,如添加一条记录;

区块:记录一段时间内发生的交易和状态结果,是对当前账本状态的一次共识;

链:由一个个区块按照发生顺序串联而成,是整个状态变化的日志记录。

如果把区块链作为一个状态机,则每次交易就是试图改变一次状态,而每次共识生成的区块,就是参与者对于区块中所有交易内容导致状态改变的结果进行确认。

Original referring URL: http://www.81.cn/jmywyl/2017-06/02

China’s Military Taking Action to Defend Nation’s Network // 中國軍事行動維護國家網絡

China’s Military Taking Action to Defend Nation’s Network //

中國軍事行動維護國家網絡

網絡營門”走向守衛“網絡國門

Original title: from the guard “network camp” to guard the “network country”

Original: “National Defense Reference” 2017 No. 3

Cyber ​​space was born in the military field, such as the first computer, Apache and GPS navigation systems are all derived from the military, today, cyberspace security has been closely related with national security, the military has once again become the maintenance of national cyberspace security , Whether it is the face of normalized network penetration, or large-scale network attacks, are an urgent need for the military from the guard “network camp” to guard the “network country”, breaking the traditional mission of the military mission, breaking the traditional battle preparation mode, To a new network of national defense thinking, casting the network era of the firm.

From the “network camp” to “network country”, a new era of military mission to bring new trends

Internet space is not only related to the maintenance of national strategic interests, a direct impact on political, economic, cultural security and social development, has become a modern battlefield joint war blood and ties. The Chinese army can not be limited to maintaining the internal security of the barracks, but also take the initiative to adapt to the trend of the times, the courage to take the “network of countries,” the country to play. Network strength is an important part of the network power construction, from the “network gate” to “network country” is the information age situation at home and abroad the inevitable trend of development.

Guarding the “network country” is the cyberspace security situation forced. China as the first network power, the security situation is not optimistic, the strategic opponent has never stopped preparing for my network operations. The United States, Britain, France and other countries actively preparing for cyberspace, through the cyberspace security legislation to give the military functions, the development of network warfare forces, research and development of network warfare weapons equipment, the war will advance to the human “fifth space”, especially in China increasingly strong In the process of rising history, the western countries under the auspices of the Cold War mentality and containment subversion strategy, the use of network technology and means of communication to implement uninterrupted harassment, subversion and cyber attacks, seriously affecting my country’s security and social development, China has become Network security threats to the hardest hit, the virus attack the test field, the penetration of awareness of the destination, the national security is facing a huge risk.

In the coming period, China, as a big emerging country, will intensify its conflicts of interest, strengthen the network defense strategy and strengthen the cyberspace war preparation. It is an inevitable way to actively strive for the dominance and discourse of cyberspace. The only way to go. As the main force of national security and stability, the army must meet the requirements of cyberspace characteristics and become the backbone and main force against cyber invasion, network subversion and safeguard national security and social stability.

Winning the network war is the new military change in the information age. As one of the most advanced productive forces in the information age, network technology has made cyber space combat become the dominant factor to guide the evolution of modern warfare, which affects the whole situation of war. In recent years, from the Iranian “earthquake network” attack, Russia and Georgia conflict network warfare, the Ukrainian power grid was a large number of paralysis and the US military on the IS network attacks, cyberspace in combat show a huge role in the emergence of a sign that the network Has become an important model for future joint operations.

The US military attaches great importance to the construction of cyberspace armaments, the establishment of cyberspace headquarters, the introduction of cyberspace joint operations, a substantial expansion of network warfare forces, and strive to maintain its cyberspace hegemony, the control of cyberspace as a “third offset strategy “Absolute advantage of the most important content of competition.

The world has followed up the country, the military space militarization trend is obvious. Severe cyberspace The situation of military struggle requires the Chinese army to focus on the network battlefield space changes, to meet the requirements of the era of information warfare, to achieve in the cyberspace can fight, win the battle of the strong military goals.

Effective network of deterrence is to speed up the construction of the network power inherent. In China by the network power to the network power development process, can not do without a strong network space military power as a guarantee. The international competition of cyberspace is a comprehensive game of national comprehensive strength. Among them, the network military capability construction is directly related to the national security and stability, and the whole body is the core factor of the whole national security field.

At present, the interests of the world in the cyberspace mutual penetration, there “you have me, I have you, mutual cooperation and common development” situation. But this common development is not equal, the United States and Western powers to use cyberspace dominance, has made a certain degree of network deterrence, so that my network development and interests subject to others. How the army in the construction of the network to complete the mission of reorganization of the mission, the premise is to be able to contain the crisis, deter opponents of the network offensive and defensive ability to ensure the peaceful development of the network environment.

Therefore, the army needs to establish a deterrent strategic goal of effective deterrence, form a strategic balance with the enemy “destroy each other”, so as to enhance the strategic competitiveness, deter cyber space aggression and ensure the smooth development of the network power strategy.

From the “defensive responsibility” to “protect the network defenders”, the new situation requires the army to undertake new tasks

The army is to defend the national security of the main and pillars, cyberspace is no exception. The National Security Act of July 1, 2015 stipulates that “citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and other organizations and other social organizations have the responsibility to safeguard national security And obligations. “The Network Security Act promulgated in November 2016 emphasized the need to maintain cyberspace sovereignty and national security.

On the basis of the laws of the two countries, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was formally introduced on December 27, 2016, providing overall guidance for creating a new model of network power at a new starting point. Basically follow, clearly put forward nine strategic tasks, and further reflects the army in the process of building a network of power in the mission task.

Full of network of national mission, the army to defend the sovereignty of cyberspace strong pillars. “Strategy” listed in the nine strategic task is the first “firmly defend cyberspace sovereignty,” made it clear that “including economic, administrative, scientific and technological, legal, diplomatic, military and all other measures, unswervingly maintain our network Space sovereignty “. It can be seen that the military must assume the national mission of using the physical means of the physical space to defend the sovereign security and interests of the virtual cyberspace.

Internet space sovereignty is the core interests of the country, is an important component of national sovereignty, that the state in the cyberspace owned by the independent, equal rights, self-defense and management rights. Once the hostile forces have violated my cyberspace sovereignty, it is equivalent to violating the sovereignty of the landspace and other physical space, China will have the right to take all measures, including military means to give a strong fight back.

At the international level, the United States has long proposed a cyberspace deterrence strategy, declared the attack on the US network information facilities is equivalent to the war, the United States will take military strike measures to retaliate. Military means is the fundamental means of safeguarding national sovereignty, and plays a vital role in safeguarding national cyberspace security. Therefore, the historical forces of land, sea and air, should be given the historical mission of protecting the sovereignty of cyberspace, must rely on the powerful physical space to defend the national interests of cyberspace, a powerful deterrent to the hostile forces of the network destruction attempt.

According to the era of network security to play, the army to do to defend the national security of the ballast. The second focus of the “strategy” task emphasizes the need to resolutely safeguard national security, prevent, stop and punish any act of using the Internet for treason, secession, incitement to rebellion, subversion or incitement to subvert the people’s democratic dictatorship.

In the era of information network, the world’s military has become an important participant in cyberspace. The level of cyberspace capability has become one of the main indexes to evaluate the modernization degree of a country’s army. It is one of the main responsibilities of the information security army to carry out the task of network space mission.

From the historical process of China’s development, it is necessary to be highly vigilant about the national security strategy needs of the successful completion of the well-off society. It is necessary to be highly vigilant about the risk of being invaded, subversive and divided by cyberspace. The development of the overall situation of the danger of being destroyed, a high degree of vigilance of the development process of socialism with Chinese characteristics is disturbed, the risk of destruction.

Take preventive measures, requiring the state must have the means to deal with and deal with these dangerous measures, with the prevention, suppression and punishment of cyberspace according to the law of the powerful forces of destruction. The defense of the country has always been an unshirkable historical responsibility of the army. The inherent mission task determines that the Chinese army must take on the various measures taken in cyberspace to maintain national politics, economy, cultural security and social stability.

Offensive and defensive both strategic tasks, the army to enhance the ability to enhance the network space strong backing. The third and eighth of the nine major tasks in the Strategy make it clear that all necessary measures should be taken to protect critical information infrastructures and their important data from attack and destruction, and that both technology and management should be adhered to both protection and deterrence. Construction and international status commensurate with the network power to adapt to the network space protection, and vigorously develop the network security and defense means to detect and resist the network invasion, casting and maintenance of national network security strong backing. In all the state’s political, diplomatic, military, scientific and technological capacity to maintain security, military power has always been the foundation and support of all abilities. It is the fundamental guarantee of all ability and the ultimate guarantee of national security.

Therefore, the army must assume the strategic task of strengthening the national network space protection ability strong backing. In the real world, the army is the reassurance of safeguarding national security. In cyberspace, it should also become the safe dependency and guarantee of the people. As an important part of the national network space protection ability, the army must be both offensive and defensive, and have the ability to firmly safeguard the interests and security of the country and the people in the cyberspace, and can effectively eliminate the various crises and ideological turbulence caused by the network security threat So that people can truly feel the production and life to be effectively protected, as the people of the country’s network protection capacity of confidence in the emboldened.

The global responsibility of the joint defense, the military to do to maintain the important support of global network security. The final mandate of the Strategy explicitly proposes to strengthen international cooperation in cyberspace and to support the United Nations in its leading role in promoting the development of international rules for cyberspace, international cyberspace international counter-terrorism conventions that are universally accepted, and a sound mechanism for combating cybercrime Policy and law, technological innovation, standards, emergency response, key information infrastructure protection and other areas of international cooperation.

Cybercrime and cybercrime are the new forms of global threat catalyzed by information network fermentation, posing a great threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of government and civil society. And other Western countries have given the military the responsibility to protect the network security and the right to combat cyber terrorism. Maintaining global cyberspace security and stability is in line with the fundamental interests of China and the rest of the world. The army should be an important defender of cyberspace security and become an important force in combating global cybercrime and cybercrime.

The globalization and unboundedness of the network determines the international demand for combating cyber-terrorism and transnational cybercrime. The army should promote inter-State network governance and military cooperation within the framework of the UN Security Council, and use the strategy and technology of the Internet age to establish a joint defense Mechanism, and effectively safeguard the national and world cyberspace security.

From the “battlefield training” to “network preparation”, the new areas need to prepare for the military new initiatives

In the new historical situation, the cyberspace put forward new requirements to the military training mode, should adapt to the new features of the cyberspace and the new mission of the army to innovate and reform the traditional model, aim at the goal of strengthening the country and strengthening the macro- Focus on cyberspace military action legal needs, closely linked to cyberspace “military and civilian one” of the natural properties, the construction of “peace and war” network security attack and defense system, to create “military dual-use” network defense force.

Legislative empowerment, for the military to carry out functional mission to provide legal basis. Countries in the world, especially the Western developed countries in the network security legislation attaches great importance to network defense issues. The United States has promulgated the “National Security No. 16 Presidential Decree” “cyberspace action strategy” and a series of policies and regulations on how to protect the national network security in the field of national network security has been deepening norms.

At present, it is necessary to clarify the duties of the cyberspace army from the legal level. It should be based on the “National Security Law” and “Network Security Law”, and introduce the network defense law and relevant cyberspace military warfare regulations for network defense construction and military Action to provide regulatory support and action programs, so that the military in cyberspace responsibilities and mission more specific and specific.

First, through the network of national defense legislation to further define the network sovereignty and network frontier, clear the scope of the military duties.

Second, through the construction of network operations laws and regulations, clear the military to defend the national network space security action authority, to distinguish between network intrusion, network damage and other military means of behavior. Third, through the international cooperation policy of cyberspace, clear military cooperation with other countries, civil forces and other international networks to combat terrorism, cybercrime function tasks.

Military and civilian integration, for the construction of network power to provide innovative power. The integration of military and civilian integration is the main practice of enhancing the competitiveness of cyberspace in the world. For the construction of China’s network power, it is necessary to construct military and civilian defense and defense system, and to develop military and national defense information infrastructure. Source.

First, the co-ordination of national, military and all levels of government and other military and civilian integration functional departments, set up a special command and coordination agencies, mobilize all national network power, building “military and civilian” “peace and war” network security attack and defense system.

Second, as soon as possible the introduction of network security integration of civil and military development of the guiding ideology, and gradually expand the integration of basic legal research and demonstration, to guide the long-term integration of military and civilian development.

Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and the people to build a nationwide information infrastructure, to achieve military and civilian unity, in charge of sharing.

The fourth is to establish a joint emergency response mechanism for military and civilian personnel, to increase the capacity of the training departments to control the situation, to strengthen the expertise of experts and emergency professionals to enhance the ability to quickly restore damaged networks or information systems.

Military and civilian training, for the cyberspace military capabilities to provide a realistic environment. The common characteristics of military and civilian space in the network space make the military and civilian training become an important way of military military training in cyberspace all over the world. The United States and NATO and other countries of the network space military and civilian joint exercises have been a series of “network storm” “network guards” and other training activities to attract the government, enterprises, research institutions and even private hackers extensive participation. Our military cyberspace military strength training also requires extensive participation in civil forces.

First, do a good job of military and political cooperation, the establishment of military and civilian joint attack and defense exercise mechanism, learn from the United States and other developed countries in the network warfare exercises in the red and blue confrontation training methods, and actively build the “national network shooting range”, planning the government, civil society series of joint exercises to enhance military and civilian , Officials and one network of offensive and defensive level.

Second, do a good job in military and military cooperation, relying on the Internet to set up a network of enterprises to improve the training area, to promote military and civilian ability to run between the offensive and defensive, and jointly improve the ability to prevent unknown risks.

Third, the organization of civil network security companies and hackers talent, to carry out network security competition and other activities, mutual confirmation, and jointly improve the level of network security technology and tactics.

Network reserve, to build a strong network of troops to provide the source of strength. Reserve as a reserve force of national defense, both military and civilian dual characteristics, is to achieve cyberspace economic development and national defense construction of organic unity of the powerful initiatives.

First, the national security sector as the leading, according to the national interests of the overall planning, the introduction of the network defense reserve is conducive to the construction of a series of laws and regulations, from the top to solve the network defense reserve construction in the construction of the main division of labor, promotion strategy, problem.

Second, innovative reserve organization and leadership system and comprehensive coordination mechanism, there are plans to reserve construction into the national network of information development at all levels and various fields.

Third, focus on the military and local management reform of the two models to the provincial and municipal governments, military and local enterprises and institutions under the management mechanism to establish a network of national defense reserve personnel to jointly use the mechanism, improve the national emergency mobilization mechanism, the establishment of national network defense professionals Database, the network militia and reserve forces into the scope of the people’s armed mobilization, usually in accordance with the provisions of the militia emergency unit into the training, the urgent selection of elite personnel with the team to participate in the task of non-war military operations, wartime, So that the national defense potential into national defense strength. (An Weiping, deputy chief of staff of the northern theater)

Original Mandarin Chinese:

原題:從守衛“網絡營門”走向守衛“網絡國門”

原載:《國防參考》2017年第3期

網絡空間誕生於軍事領域,如首台計算機、阿帕網和GPS導航系統等都源於軍方,時至今日,網絡空間安全已與國家安全息息相關,軍隊又再次成為維護國家網絡空間安全的主角,無論是面對常態化的網絡滲透,還是大規模的網絡攻擊,都迫切需要軍隊從守衛“網絡營門”走向守衛“網絡國門”,突破傳統的軍隊使命任務,突破傳統的應戰備戰模式,以全新的網絡國防思維,鑄造網絡時代國之堅盾。

從“網絡營門”到“網絡國門”,新時代帶來軍隊使命新趨勢

網絡空間不僅事關國家戰略利益維護,直接影響政治、經濟、文化安全和社會發展,也成為現代戰場聯合作戰的血脈和紐帶。中國軍隊不能局限於維護軍營內部網絡安全,更要主動適應時代趨勢,勇於承擔把守“網絡國門”的國家擔當。網絡強軍是網絡強國建設的重要一環,從“網絡營門”走向“網絡國門”是信息時代國內外形勢發展的必然趨勢。

守衛“網絡國門”是網絡空間安全形勢所迫。中國作為第一網絡大國,安全狀況不容樂觀,戰略對手從未停止對我網絡作戰准備。美、英、法等國積極備戰網絡空間,通過網絡空間安全立法賦予軍隊職能,發展網絡戰部隊,研發網絡戰武器裝備,將戰爭推進到了人類的“第五空間”,特別是在中國日益強大崛起的歷史進程中,西方國家在冷戰思維和遏制顛覆戰略的主導下,利用網絡技術手段和傳播方式實施不間斷的騷擾、顛覆和網絡攻擊行動,嚴重影響我國家安全與社會發展,中國逐漸成為網絡安全威脅的重災區、病毒攻擊的試驗場、意識滲透的目的地,國家安全面臨著巨大風險。

未來一段時期內,中國作為新興大國,與各方利益沖突還將加劇,堅定推進網絡國防戰略,加強網絡空間的作戰准備,是積極爭取網絡空間的主導權和話語權的必然途徑,也是中國崛起的必由之路。軍隊作為國家安全穩定的主要力量,必須適應網絡空間特點要求,成為抗擊網絡入侵、網絡顛覆的中堅和主力,維護國家安全和社會穩定。

打贏網絡戰爭是信息時代新軍事變革所趨。網絡技術作為信息時代最先進生產力之一,使得網絡空間作戰成為引導現代戰爭形態演變的主導因素,影響著戰爭全局。近年來,從伊朗“震網”攻擊、俄格沖突網絡戰、烏克蘭電網遭大規模阻癱以及美軍對IS的網絡攻擊,網絡空間在實戰中所展現出的巨大作用逐漸顯現,預示著網絡作戰已成為未來聯合作戰重要樣式。

美軍高度重視網絡空間軍備建設,成立網絡空間司令部,推出網絡空間聯合作戰條令,大幅度擴編網絡戰部隊,極力維護其在網絡空間霸權,把對網絡空間控制能力作為形成“第三次抵消戰略”絕對優勢最重要的競爭內容。

世界多國紛紛跟進,網絡空間軍事化趨勢明顯。嚴峻的網絡空間軍事斗爭形勢要求中國軍隊著眼網絡戰場空間變化,適應信息化戰爭時代要求,實現在網絡空間能打仗、打勝仗的強軍目標。

有效網絡懾戰是加速網絡強國建設內在所需。在中國由網絡大國向網絡強國發展過程中,離不開強大的網絡空間軍事力量作為保障。網絡空間國際競爭表現為國家綜合實力的全面博弈,其中,網絡軍事能力建設的好壞,直接關系到國家安全與穩定,牽一發而動全身,是整個國家安全領域的核心要素。

當前,世界各國在網絡空間的利益互相滲透,出現“你中有我、我中有你,互相合作,共同發展”的局面。但是這種共同發展是不對等的,美國及西方強國利用網絡空間主導權,已經取得了一定的網絡懾戰優勢,使我網絡發展及利益受制於人。軍隊如何在網絡強國建設中完成守土有責的使命重托,前提就是要形成能夠遏制危機、懾控對手的網絡攻防能力,確保和平發展的網絡環境。

因此,軍隊需要確立有效懾戰的威懾戰略目標,形成能與敵“相互摧毀”的戰略制衡能力,從而增強戰略競爭力,懾止網絡空間侵略,保障網絡強國戰略順利推進。

從“守土有責”到“護網衛國”,新形勢要求軍隊承擔新任務

軍隊是保衛國家安全的主力和柱石,網絡空間也不例外。2015年7月1日施行的《國家安全法》規定:“中華人民共和國公民、一切國家機關和武裝力量、各政黨和各人民團體、企業事業組織和其他社會組織,都有維護國家安全的責任和義務。”2016年11月頒布的《網絡安全法》強調了要維護網絡空間主權和國家安全。

在這兩個國家法律的基礎上,2016年12月27日,《國家網絡空間安全戰略》(下文簡稱《戰略》)正式出台,為在新的起點上開創網絡強國新格局提供了總體指導和基本遵循,明確提出了九大戰略任務,進一步體現了軍隊在建設網絡強國進程中的使命任務。

全力護網的國家使命,軍隊要做捍衛網絡空間主權的堅強柱石。《戰略》中列出的九大戰略任務首項就是“堅定捍衛網絡空間主權”,明確提出要“採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權”。可見,軍隊須承擔起運用實體空間的軍事手段,保衛虛擬網絡空間主權安全和利益的國家使命。

網絡空間主權是國家的核心利益,是國家主權的重要組成,表明國家在網絡空間所擁有的獨立權、平等權、自衛權和管理權。一旦敵對勢力侵犯了我網絡空間主權,就等同於侵犯了我陸海空等實體空間的國家主權,中國將有權利採取包括軍事手段在內的一切措施給予堅決回擊。

在國際上,美國早就提出網絡空間威懾戰略,宣告對美國網絡信息設施的攻擊等同於戰爭行為,美國會採取軍事打擊措施進行報復。軍事手段是維護國家主權的保底手段,在維護國家網絡空間安全中發揮著至關重要的作用。因此,陸海空天軍事力量理所應當地被賦予了保護網絡空間主權的歷史使命,必須憑借強大的實體空間武力保衛網絡空間的國家利益,有力震懾敵對勢力的網絡破壞企圖。

依網衛國的時代擔當,軍隊要做保衛國家安全的壓艙石。《戰略》任務的第二項著力強調要堅決維護國家安全,防范、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為。

信息網絡時代,世界各國軍隊都已經成為網絡空間重要參與者,網絡空間能力水平成為評估一個國家軍隊現代化程度的主要指標,遂行網絡空間使命任務、維護國家安全成為信息化軍隊的主要職責之一。

從中國發展所處的歷史進程來看,要適應全面建成小康社會決勝階段的國家安全戰略需求,必須高度警惕國家在網絡空間被侵略、被顛覆、被分裂的危險,高度警惕由網絡空間引發改革發展大局被破壞的危險,高度警惕中國特色社會主義發展進程被干擾、破壞的危險。

防患於未然,要求國家必須具有應對和處置這些危險的手段措施,具有防范、制止和依法懲治網絡空間違法破壞行為的強大力量。保衛國家歷來是軍隊不可推卸的歷史責任,固有的使命任務決定了中國軍隊必須承擔起在網絡空間採取各種措施,維護國家政治、經濟、文化安全和社會穩定的時代擔當。

攻防兼備的戰略任務,軍隊要做提升網絡空間防護能力的堅強后盾。《戰略》中九大任務的第三項和第八項明確提出,要採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞,要堅持技術和管理並重、保護和震懾並舉;要建設與我國國際地位相稱、與網絡強國相適應的網絡空間防護力量,大力發展網絡安全防御手段,及時發現和抵御網絡入侵,鑄造維護國家網絡安全的堅強后盾。在國家所有維護安全的政治、外交、軍事、科技能力中,軍事力量歷來是所有能力的基礎和支撐,是所有能力的根本保障,是國家安全的最終依托。

因此,軍隊必須承擔起提升國家網絡空間防護能力堅強后盾的戰略任務。現實社會中,軍隊是維護國家安全的定心丸,在網絡空間也同樣應成為人民群眾的安全依賴和保障。軍隊作為國家網絡空間防護能力生成的重要一環,必須做到攻防兼備、懾戰一體,有能力堅決維護國家和人民在網絡空間的利益和安全,能夠有效消除網絡安全威脅造成的各種危機和思想動蕩,使人民能夠切實感受到生產生活得到有效保護,成為全國人民對國家網絡防護能力充滿信心的底氣所在。

聯防聯治的全球責任,軍隊要做維護全球網絡安全的重要支撐。《戰略》任務最后一項明確提出要強化網絡空間國際合作,支持聯合國發揮主導作用,推動制定各方普遍接受的網絡空間國際規則、網絡空間國際反恐公約,健全打擊網絡犯罪司法協助機制,深化在政策法律、技術創新、標准規范、應急響應、關鍵信息基礎設施保護等領域的國際合作。

網絡恐怖主義和網絡犯罪是經過信息網絡發酵催化出的全球威脅新形態,對世界上所有國家的政治、經濟、軍事、文化安全都構成巨大威脅,僅僅依靠政府和民間的力量是不夠的,美國等西方國家紛紛賦予軍隊保護網絡安全的職責和打擊網絡恐怖主義的權限。維護全球網絡空間安全與穩定符合中國以及世界各國的根本利益,軍隊應成為全球網絡空間安全的重要維護者,成為打擊全球網絡恐怖主義和網絡犯罪的重要力量。

網絡的全球化、無界性決定了打擊網絡恐怖主義和跨國網絡犯罪的國際需求,軍隊應在聯合國安理會的框架下,推進國家間網絡治理軍事合作,利用網絡時代的戰略和技術,建立聯防聯治機制,切實維護國家和世界網絡空間安全。

從“沙場練兵”到“網絡備戰”,新領域需要軍隊備戰新舉措

在新的歷史形勢下,網絡空間對軍隊練兵備戰模式提出了全新的要求,應適應網絡空間新特點和軍隊新使命對傳統模式進行創新改革,以強國強軍目標為統攬,加強宏觀統籌,著眼網絡空間軍事行動的法理需求,緊扣網絡空間“軍民一體”的天然屬性,建設“平戰結合”的網絡安全攻防體系,打造“軍地兩用”的網絡國防力量。

立法賦權,為軍隊遂行職能使命提供法理依據。世界各國尤其是西方發達國家在網絡安全立法上高度重視網絡國防問題。美國先后出台了《國家安全第16號總統令》《網絡空間行動戰略》等一系列政策法規,對如何在網絡國防領域保護國家網絡安全進行了不斷的深化規范。

當前,從法律層面厘清網絡空間軍隊的職責任務非常必要,應以《國家安全法》《網絡安全法》為依據,出台網絡國防法和有關網絡空間軍事作戰條令法規,為網絡國防領域建設和軍事行動提供法規支撐和行動綱領,使軍隊在網絡空間的職責和使命更加明確具體。

一是通過網絡國防立法進一步界定網絡主權和網絡邊疆,清晰軍隊的職責范圍。

二是通過網絡作戰法規建設,明確軍隊遂行保衛國家網絡空間安全的行動權限,區分應對網絡入侵、網絡破壞等行為的軍事手段。三是通過網絡空間國際合作政策,明確軍隊協同他國、民間力量等打擊國際網絡恐怖主義、網絡犯罪的職能任務。

軍民融合,為網絡強國建設提供創新動力。軍民融合是世界強國提升網絡空間競爭力的主要做法,對於中國網絡強國建設來說,構建軍民融合網絡安全攻防體系,開發軍地兩用的國防信息基礎設施,是激發軍隊網絡空間作戰能力創新的源泉。

一是統籌國家、軍隊和各級政府等軍民融合職能部門,設置專門的指揮協調機構,調動一切國家網絡力量,建設“軍民一體”“平戰結合”的網絡安全攻防體系。

二是盡快出台網絡安全軍民融合深度發展指導性意見,逐步展開軍民融合基本法律研究論証,指導中長期軍民融合發展。

三是依托國家現有公共移動通信網、光纖通信網及衛星系統,軍民共建覆蓋全國全軍的信息基礎設施,實現軍民統建、分管共享。

四是建立軍民聯合的應急響應機制,加大培訓軍地主管部門控制事態的能力,加強專家和應急專業力量,提升快速恢復受損網絡或信息系統的能力。

軍民聯訓,為網絡空間軍事能力生成提供實戰化環境。網絡空間的軍民共用特性使得軍民聯訓成為世界各國網絡空間軍事演訓的重要方式。美國及北約等國家的網絡空間軍民聯合演習已經形成系列化,“網絡風暴”“網絡衛士”等演練活動吸引了政府、企業、研究機構甚至民間黑客的廣泛參與。我軍網絡空間軍事力量訓練也需要廣泛吸引民間力量參與。

一是搞好軍政合作,建立軍民聯合攻防演練機制,借鑒美國等發達國家網絡戰演練中的紅藍對抗訓練方法,積極建設“國家網絡靶場”,策劃政府、民間機構系列聯合演習,提升軍民一體、官民一體的網絡攻防水平。

二是搞好軍企協作,在互聯網上依靠網信企業設置演練場區,促進軍民之間攻防能力磨合,共同提高防范未知風險能力。

三是組織民間網絡安全公司和黑客人才,開展網絡安全競賽等活動,互相印証,共同提高網絡安全防護技戰術水平。

網絡預備役,為建設強大網軍提供力量源泉。預備役作為國防力量的后備補充,兼有軍事和民用雙重特點,是實現網絡空間經濟發展與國防建設有機統一的有力舉措。

一是以國家安全部門為主導,依據國家利益進行統籌規劃,出台有利於網絡國防預備役建設的系列法規政策,從頂層上解決網絡國防預備役建設中軍民共建的主體分工、推進策略、利益協調等問題。

二是創新預備役組織領導體制和綜合協調機制,有計劃地把預備役建設融入國家網絡信息化發展的各個層面和各個領域。

三是著眼軍隊和地方兩頭管理模式改革,以各省市政府、軍隊和地方企事業單位的管理機制為依托,建立網絡國防預備役人才聯合培養使用機制,完善國家應急動員機制,建立國家網絡防御專用人才數據庫,將網絡民兵和預備役部隊建設納入人民武裝動員的范圍,平時按規定編入民兵應急分隊進行訓練,急時挑選精干人員隨隊參加遂行非戰爭軍事行動任務,戰時按需要成建制征召使用,使國防潛力轉變為國防實力。

 

Referring URL:

http://military.people.com.cn/BIG5/n1/2017/0417/c1011-29215670.html

中國政府要求公開評論保護中國關鍵基礎設施 // Chinese Government Requests Public Comment on Securing China Critical Infrastructure

中國政府要求公開評論保護中國關鍵基礎設施

Chinese Government Requests Public Comment on Securing China Critical Infrastructure

Notice of the National Internet Information Office on the Public Opinion on the Protection of Key Information Infrastructure Security Regulations (Draft for Soliciting Opinions)

    In order to ensure the security of key information infrastructure, according to the “Internet Security Law of the People’s Republic of China”, we will draft the “Key Information Infrastructure Safety Protection Regulations (draft)” with the relevant departments. The relevant units and people of all walks of life may submit their views by August 10, 2017 by:

First, by mail to the views sent to: Xicheng District, Beijing Chegongzhuang Street on the 11th National Internet Information Office Network Security Coordination Bureau, Zip code 100044, and in the envelope marked “comments”.

Second, by e-mail to: security@cac.gov.cn.

 

Annex: Key information infrastructure security regulations (draft)

 

National Internet Information Office

 July 10, 2017

Key information infrastructure security regulations

(Draft)

Chapter 1 General Provisions

    Article 1 These Regulations are enacted in accordance with the Network Security Law of the People’s Republic of China in order to ensure the safety of key information infrastructures.

Article 2 These Regulations shall apply to the planning, construction, operation, maintenance and use of key information infrastructures within the territory of the People’s Republic of China and the protection of key information infrastructures.

Article 3 The key information infrastructure security protection adhere to the top design, overall protection, coordination, division of labor is responsible for the principle, give full play to the role of the main operation, the active participation of all parties to jointly protect the key information infrastructure security.

Article 4 The competent department of national industry or the supervisory department shall be responsible for guiding and supervising the protection of key information infrastructure in the industry and in the field in accordance with the division of responsibilities stipulated by the State Council.

State network letter department is responsible for coordinating the key information infrastructure security protection and related supervision and management work. The State Council public security, national security, state secrecy administration, national password management and other departments within their respective responsibilities are responsible for the relevant network security protection and supervision and management work.

The relevant departments of the local people’s governments at or above the county level shall carry out the key information infrastructure safety protection work in accordance with the relevant provisions of the State.

Article 5 The operator of the key information infrastructure (hereinafter referred to as the operator) shall bear the responsibility for the security of the key information infrastructure of the unit, perform the obligation of network security protection, accept the government and social supervision, and bear social responsibility.

The country encourages network operators outside key information infrastructures to participate voluntarily in critical information infrastructure protection systems.

Article 6 Key information infrastructure In the network security level protection system, based on the implementation of key protection.

Article 7 Any person or organization who discovers the safety of the infrastructure of the critical information infrastructure shall have the right to report to the department of the letter, telecommunications, public security and industry supervisors or supervisors.

The department that receives the report shall handle it in a timely manner and if it does not belong to the duties of the department, it shall promptly transfer the department to be handled.

The relevant departments shall keep the relevant information of the whistleblower and protect the legitimate rights and interests of the whistleblower.

 

Chapter II Support and Safeguard

    Article 8 The State shall take measures to monitor, defend and dispose of network security risks and threats arising from the territory of the People ‘s Republic of China, protect the critical information infrastructure from attack, intrusion, interference and destruction, and punish the criminal activities of the Internet according to law.

Article 9 The State shall formulate policies such as industry, finance, taxation, finance and personnel, support the innovation of key information infrastructure related technologies, products and services, promote safe and reliable network products and services, train and select network security personnel, and improve key information The level of safety of the infrastructure.

Article 10 The State shall establish and improve the network security standard system and use standard guidance to standardize the work of key information infrastructure security protection.

Article 11 The people ‘s governments at or above the municipal level shall incorporate the key information infrastructure security protection into the overall planning of the economic and social development of the district, increase the investment and carry out the evaluation and evaluation of the work performance.

Article 12 The State encourages government departments, operators, scientific research institutions, network security services, industry organizations, network products and service providers to carry out key information infrastructure security cooperation.

Article 13 The competent department of industry or the supervisory department of the State shall set up or clarify the institutions and personnel who are responsible for the protection of key information infrastructure in the industry and in this field, and compile and organize the implementation of the industry, the network security planning in the field, and establish a sound work Funding protection mechanism and supervise the implementation.

Article 14 Energy, telecommunications, transportation and other industries shall provide key support and support for power supply, network communication, transportation and other aspects of emergency management and network function restoration of key information infrastructure network security incidents.

Article 15 Public security organs and other departments shall, according to law, investigate and punish illegal and criminal activities against and use key information infrastructures.

Article 16 Any individual or organization shall not engage in any of the following activities and actions that endanger the critical information infrastructure:

(I) attacks, intrusion, interference, and destruction of critical information infrastructures;

(B) illegally obtaining, selling or unauthorized access to information such as technical information that may be used exclusively for the safety of critical information infrastructures;

(Iii) unauthorized penetration of critical information infrastructures, aggressive scanning detection;

(D) knowing that others are engaged in activities that endanger the security of key information infrastructure and still provide assistance such as Internet access, server hosting, network storage, communication transmission, advertising promotion, payment settlement and so on;

(E) other activities and actions that endanger the critical information infrastructure.

Article 17 The State shall safeguard the network security based on the open environment and actively carry out international exchanges and cooperation in the field of key information infrastructure security.

 

Chapter 3 Key Information Infrastructure Scope

    Article 18 The network facilities and information systems operated and managed by the following units shall be included in the scope of protection of key information infrastructures in the event of damage, loss of function or data leakage, which may seriously endanger the national security, the people’s livelihood and the public interest.

(A) government agencies and energy, finance, transportation, water conservancy, health care, education, social security, environmental protection, public utilities and other sectors of the unit;

(B) telecommunications networks, radio and television networks, the Internet and other information networks, and provide cloud computing, large data and other large public information network services units;

(3) scientific research and production units in the fields of national defense science and technology, large-scale equipment, chemical industry, food and medicine industry;

(4) news units such as radio stations, television stations and news malls;

(5) other key units.

Article 19 The State Network Letter Department shall, in conjunction with the competent departments of telecommunications under the State Council and the public security departments, formulate guidelines for the identification of key information infrastructure.

National industry supervisors or regulators organize identification of the industry and key information infrastructures in the field in accordance with the key information infrastructure identification guidelines and submit the identification results according to the procedures.

Key information infrastructure identification process, should give full play to the role of experts, improve the identification of key information infrastructure identification accuracy, rationality and scientific.

Article 20 If a major change in the key information infrastructure or key information infrastructure has occurred, the operator shall promptly report the relevant situation to the national competent or supervisory department.

The national industry supervisor or the supervisory department shall promptly carry out the identification and adjustment according to the situation reported by the operator and submit the adjustment according to the procedure.

 

Chapter IV Operator Safety Protection

    Article 21 The construction of a key information infrastructure shall ensure that it has the performance of supporting the stable and continuous operation of the business and ensures that the safety and technical measures are synchronized, synchronized and synchronized.

Article 22 The principal responsible person of the operator is the first person responsible for the safety protection work of the key information infrastructure of the unit. It is responsible for establishing and perfecting the network security responsibility system and organizing the implementation, and is fully responsible for the security protection of the key information infrastructure of the unit.

Article 23 The operator shall, in accordance with the requirements of the network security level protection system, perform the following security protection obligations to protect the critical information infrastructure from interference, damage or unauthorized access to prevent the leakage or theft of the network data:

(1) to formulate internal safety management systems and operating procedures, strict identity authentication and rights management;

(B) to take technical measures to prevent computer viruses and network attacks, network intrusion and other hazards to network security behavior;

(3) to take technical measures to monitor and record the operation status of the network and the network security incident, and keep the relevant network log in accordance with the regulations for not less than six months;

(D) to take data classification, important data backup and encryption authentication and other measures.

Article 24 In addition to Article 23 of these Regulations, the operator shall perform the following safety and protection obligations in accordance with the requirements of national laws and regulations and the mandatory requirements of the relevant national standards:

(A) set up a dedicated network security management and network security management, and the person in charge and key positions for security background review;

(2) regularly carry out network security education, technical training and skills assessment for employees;

(C) of the important systems and databases for disaster recovery, in time for system vulnerabilities and other security risks to take remedial measures;

(D) the development of network security incident contingency plans and regular exercise;

(5) other obligations stipulated by laws and administrative regulations.

Article 25 The person in charge of network security management of the operator shall perform the following duties:

(1) to formulate network security rules and regulations, operational procedures and supervise the implementation;

(2) organizing the skills assessment of key positions;

(3) to formulate and implement the network safety education and training program of the unit;

(4) to organize network security checks and emergency drills to deal with the handling of network security incidents;

(5) to report to the relevant departments of the country on network security important matters, events.

Article twenty-sixth operators of network security key positions of professional and technical personnel to implement the system of certificates.

The specific provisions of the promulgation of posts by the State Council human resources and social security departments in conjunction with the State Network letter and other departments to develop.

Article 27 Operators shall organize the training of network safety education for employees. Each year, the training time shall not be less than one working day, and the number of professional and technical personnel in key positions shall not be less than 3 working days per year.

Article 28 The operator shall establish and improve the safety assessment and evaluation system for the key information infrastructure, and carry out the safety inspection and evaluation when the key information infrastructure is on or after the major changes.

The operator shall, at its own expense, entrust the network security service organization to carry out at least one annual inspection and evaluation of the safety and possible risk of the key information infrastructure, rectify the problems found in time and report the relevant situation to the national industry supervisor or the supervisory department The

Article 29 Personal information and important data collected and produced by the operator in the operation of the People’s Republic of China shall be stored in the territory. For business needs, it is necessary to provide overseas, should be in accordance with personal information and important data outbound security assessment methods to assess; laws, administrative regulations otherwise provided, in accordance with its provisions.

 

Chapter 5 Product and Service Security

    Article 30 The key equipment and network security special products purchased and used by the operators shall comply with the requirements of laws and administrative regulations and the mandatory requirements of relevant national standards.

Article 31 Where an operator purchases a network product and service that may affect the security of the State, it shall, through the network security review, sign a security confidentiality agreement with the provider in accordance with the requirements of the safety inspection method of the network product and service.

Article 32 Operators shall carry out safety testing on the system, software, and donated network products that have been developed for outsourcing.

Article 33 Where an operator finds that there is a risk of security defects or loopholes in the use of the network products and services, it shall promptly take measures to eliminate the risks and involve significant risks in reporting to the relevant departments.

Article 34 The operation and maintenance of key information infrastructures shall be implemented in the territory. Due to business needs, do need to remote maintenance, should be reported to the national industry executives or regulatory authorities and the State Council public security departments.

Article 35 Institutions that carry out safety assessment and evaluation, publish security threats such as system vulnerabilities, computer viruses, and network attacks for key information infrastructures, provide services such as cloud computing and information technology outsourcing, shall meet the relevant requirements.

The specific requirements by the State Network letter department in conjunction with the relevant departments of the State Council to develop.

 

Chapter 6 Monitoring, Early Warning, Emergency Handling and Testing

    Article 36 The national network communication department shall co-ordinate the establishment of the key information infrastructure network security monitoring and early warning system and the information communication system, organize and guide the relevant agencies to carry out the network security information summary, analyze and judge the report, and publish the network security monitoring and early warning information according to the regulations The

Article 37 The competent department of industry or the supervisory department of the State shall establish and improve the network security monitoring and early warning and information reporting system of the key information infrastructure in this industry, and keep abreast of the industry, the operation status of the key information infrastructure in the field and the security risks, Inform the operator about safety risks and related work information.

The national industry supervisor or the supervisory department shall organize the judgment of the safety monitoring information, and if it is necessary to take immediate preventive measures, it shall promptly issue the early warning information and emergency preventive measures to the relevant operators and, in accordance with the requirements of the national network security incident contingency plan, Relevant departments report.

Article 38 The national network communication department shall coordinate the relevant departments, operators and relevant research institutions and network security service agencies to establish a network information sharing mechanism for key information infrastructure and promote the sharing of network security information.

Article 39 In accordance with the requirements of the national network security incident contingency plan , the State Network shall, in accordance with the requirements of the national network security incident contingency plan, coordinate the relevant departments to establish and perfect the key information infrastructure network security emergency coordination mechanism, strengthen the network security emergency power construction, and coordinate the relevant departments to organize cross- Regional network security emergency drills.

National industry supervisors or regulators should organize the development of the industry, the field of network security incident contingency plans, and regularly organize exercises to enhance the network security incident response and disaster recovery capabilities. After major network security incidents or early warning information received by the network letter department, should immediately start the contingency plan to respond, and timely report on the situation.

Article 40 The competent department of national industry or the regulatory department shall regularly organize the inspection and inspection of the safety risks of the industry and the key information infrastructure in the field and the performance of the operators’ performance of safety protection, and propose measures to improve the supervision and supervision of the operators in time The problems found in the assessment.

State network letter department co-ordinate the relevant departments to carry out the spot checks to prevent cross-testing and evaluation.

Article 41 The relevant departments shall organize the assessment and evaluation of the key information infrastructure safety, and shall adhere to the principle of objectivity, impartiality, efficiency and transparency, adopt a scientific evaluation and evaluation method, standardize the inspection and evaluation process and control the risk of testing and evaluation.

Operators should be carried out by the relevant departments to implement the assessment and assessment to the assessment of the problems found in time for rectification.

Article 42 The relevant departments may organize the following measures to carry out the safety inspection and evaluation of key information infrastructure:

(1) requiring the relevant personnel of the operator to make a statement on the examination and evaluation;

(B) access to, retrieval, reproduction and safety protection related documents, records;

(C) to view the network security management system development, implementation and network security technical measures planning, construction, operation;

(4) to use the testing tools or commissioned by the network security services for technical testing;

(5) other necessary means agreed by the operator.

Article 43 The information obtained by the relevant departments and the network security service organizations in the assessment of key information infrastructure safety inspection and evaluation can only be used for the maintenance of network security and shall not be used for other purposes.

Article 44 The relevant departments shall organize the assessment of the security of the key information infrastructure, and shall not charge the units to be tested and tested, and shall not require the persons to be tested and appraised to purchase the designated brand or the products and services of the designated production and sales units.

 

Chapter VII Legal Liability

    Article 45 An operator shall fail to perform the provisions of Article 20, Paragraph 1, Article 21, Article 23, Article 24, Article 26, Article 27, and Article 2 Article 18, Article 30, Article 32, Article 33, Article 34 of the network security protection obligations, by the relevant authorities in accordance with their duties ordered to correct, give a warning; refused to correct or Resulting in damage to the network security and other consequences, at a fine of more than 100,000 yuan a million yuan, the person in charge directly responsible for more than 10,000 yuan more than 100,000 yuan fine.

Article 46 Where an operator violates the provisions of Article 29 of these Regulations, he or she shall, in accordance with his / her duties, make corrections, give a warning, confiscate the illegal income, And shall be ordered to suspend the relevant business, suspend business for rectification, close the website, revoke the relevant business license; the person directly in charge and other directly responsible persons shall be fined not less than 10,000 yuan but not more than 100,000 yuan The

Article 47 Where an operator violates the provisions of Article 31 of these Regulations and uses the network products or services that have not passed the security examination or security examination, the relevant competent department of the State shall order it to cease to use and double the purchase amount More than ten times the fine; the person in charge directly responsible and other directly responsible persons at a fine of not less than 10,000 yuan but not more than 100,000 yuan.

Article 48 Where an individual violates the provisions of Article 16 of these Regulations and does not constitute a crime, the public security organ shall confiscate the illegal gains and shall be detained for less than five days and shall be fined not less than 50,000 yuan but not more than 500,000 yuan; Shall be imposed a fine of not less than 100,000 yuan but not more than one million yuan; if the case constitutes a crime, the criminal responsibility shall be investigated according to law.

If the unit has any of the acts mentioned in the preceding paragraph, the public security organ shall confiscate the illegal gains and impose a fine of not less than 100,000 yuan but not more than one million yuan and impose penalties on the directly responsible person in charge and other directly responsible persons in accordance with the provisions of the preceding paragraph.

Violation of the provisions of Article XVI of the Ordinance, the criminal punishment of personnel, life shall not be engaged in key information infrastructure security management and network operations key positions in the work.

Article 49 Where the operator of a key information infrastructure of a state organ fails to perform the obligations of the network security protection provided for in these Regulations, the superior organ or the relevant organ shall order it to make corrections; and the person directly in charge and other directly responsible persons shall be punished according to law.

Article 50 Where any of the following departments and their staff members commits any of the following acts, the directly responsible person in charge and other directly responsible persons shall be punished according to law; if a crime is constituted, criminal responsibility shall be investigated according to law:

(A) in the work of the use of authority to obtain, accept bribes;

(B) neglect of duty, abuse of authority;

(Iii) unauthorized disclosure of relevant information, information and data files of key information infrastructures;

(4) other acts that violate statutory duties.

 Article 51 Where a major cyber security incident occurs in a critical information infrastructure, the responsibility for the investigation shall be identified, and the responsibility for the relevant network security service and relevant departments shall be identified in addition to the investigation of the responsibility of the operating unit and the investigation , For dereliction of duty, dereliction of duty and other violations, shall be held accountable.

Article 52 If the organs, organizations and individuals engaged in attack, intrusion, interference, or damage to the key information infrastructure of the People’s Republic of China cause serious consequences, they shall be investigated for legal responsibility according to law; the public security department of the State Council and the State security organ And the relevant departments and may decide to impose a frozen property or other necessary sanctions on the institution, organization or individual.

 

Chapter VIII Supplementary Provisions

    Article 53 The security protection of key information infrastructures involved in the storage and handling of information concerning state secrets shall also be subject to the provisions of confidentiality laws and administrative regulations.

Critical information infrastructure in the use and management of passwords, should also comply with the password laws and administrative regulations.

 Article 54 The security protection of military key information infrastructures shall be separately stipulated by the Central Military Commission.

Article 55 These Regulations shall enter into force on the date of ****.

Original Mandarin Chinese:

關鍵信息基礎設施安全保護條例
(徵求意見稿)

第一章 總則
第一條 為了保障關鍵信息基礎設施安全,根據《中華人民共和國網絡安全法》,制定本條例。
第二條 在中華人民共和國境內規劃、建設、運營、維護、使用關鍵信息基礎設施,以及開展關鍵信息基礎設施的安全保護,適用本條例。
第三條 關鍵信息基礎設施安全保護堅持頂層設計、整體防護,統籌協調、分工負責的原則,充分發揮運營主體作用,社會各方積極參與,共同保護關鍵信息基礎設施安全。
第四條 國家行業主管或監管部門按照國務院規定的職責分工,負責指導和監督本行業、本領域的關鍵信息基礎設施安全保護工作。
國家網信部門負責統籌協調關鍵信息基礎設施安全保護工作和相關監督管理工作。國務院公安、國家安全、國家保密行政管理、國家密碼管理等部門在各自職責範圍內負責相關網絡安全保護和監督管理工作。
縣級以上地方人民政府有關部門按照國家有關規定開展關鍵信息基礎設施安全保護工作。
第五條 關鍵信息基礎設施的運營者(以下稱運營者)對本單位關鍵信息基礎設施安全負主體責任,履行網絡安全保護義務,接受政府和社會監督,承擔社會責任。
國家鼓勵關鍵信息基礎設施以外的網絡運營者自願參與關鍵信息基礎設施保護體系。
第六條 關鍵信息基礎設施在網絡安全等級保護製度基礎上,實行重點保護。
第七條 任何個人和組織發現危害關鍵信息基礎設施安全的行為,有權向網信、電信、公安等部門以及行業主管或監管部門舉報。
收到舉報的部門應當及時依法作出處理;不屬於本部門職責的,應當及時移送有權處理的部門。
有關部門應當對舉報人的相關信息予以保密,保護舉報人的合法權益。

第二章 支持與保障
第八條 國家採取措施,監測、防禦、處置來源於中華人民共和國境內外的網絡安全風險和威脅,保護關鍵信息基礎設施免受攻擊、侵入、干擾和破壞,依法懲治網絡違法犯罪活動。
第九條國家製定產業、財稅、金融、人才等政策,支持關鍵信息基礎設施安全相關的技術、產品、服務創新,推廣安全可信的網絡產品和服務,培養和選拔網絡安全人才,提高關鍵信息基礎設施的安全水平。
第十條 國家建立和完善網絡安全標準體系,利用標準指導、規範關鍵信息基礎設施安全保護工作。
第十一條 地市級以上人民政府應當將關鍵信息基礎設施安全保護工作納入地區經濟社會發展總體規劃,加大投入,開展工作績效考核評價。
第十二條 國家鼓勵政府部門、運營者、科研機構、網絡安全服務機構、行業組織、網絡產品和服務提供者開展關鍵信息基礎設施安全合作。
第十三條國家行業主管或監管部門應當設立或明確專門負責本行業、本領域關鍵信息基礎設施安全保護工作的機構和人員,編制並組織實施本行業、本領域的網絡安全規劃,建立健全工作經費保障機制並督促落實。
第十四條 能源、電信、交通等行業應當為關鍵信息基礎設施網絡安全事件應急處置與網絡功能恢復提供電力供應、網絡通信、交通運輸等方面的重點保障和支持。
第十五條 公安機關等部門依法偵查打擊針對和利用關鍵信息基礎設施實施的違法犯罪活動。
第十六條 任何個人和組織不得從事下列危害關鍵信息基礎設施的活動和行為:
(一)攻擊、侵入、干擾、破壞關鍵信息基礎設施;
(二)非法獲取、出售或者未經授權向他人提供可能被專門用於危害關鍵信息基礎設施安全的技術資料等信息;
(三)未經授權對關鍵信息基礎設施開展滲透性、攻擊性掃描探測;
(四)明知他人從事危害關鍵信息基礎設施安全的活動,仍然為其提供互聯網接入、服務器託管、網絡存儲、通訊傳輸、廣告推廣、支付結算等幫助;
(五)其他危害關鍵信息基礎設施的活動和行為。
第十七條 國家立足開放環境維護網絡安全,積極開展關鍵信息基礎設施安全領域的國際交流與合作。

第三章 關鍵信息基礎設施範圍
第十八條 下列單位運行、管理的網絡設施和信息系統,一旦遭到破壞、喪失功能或者數據洩露,可能嚴重危害國家安全、國計民生、公共利益的,應當納入關鍵信息基礎設施保護範圍:
(一)政府機關和能源、金融、交通、水利、衛生醫療、教育、社保、環境保護、公用事業等行業領域的單位;
(二)電信網、廣播電視網、互聯網等信息網絡,以及提供雲計算、大數據和其他大型公共信息網絡服務的單位;
(三)國防科工、大型裝備、化工、食品藥品等行業領域科研生產單位;
(四)廣播電台、電視台、通訊社等新聞單位;
(五)其他重點單位。
第十九條 國家網信部門會同國務院電信主管部門、公安部門等部門製定關鍵信息基礎設施識別指南。
國家行業主管或監管部門按照關鍵信息基礎設施識別指南,組織識別本行業、本領域的關鍵信息基礎設施,並按程序報送識別結果。
關鍵信息基礎設施識別認定過程中,應當充分發揮有關專家作用,提高關鍵信息基礎設施識別認定的準確性、合理性和科學性。
第二十條 新建、停運關鍵信息基礎設施,或關鍵信息基礎設施發生重大變化的,運營者應當及時將相關情況報告國家行業主管或監管部門。
國家行業主管或監管部門應當根據運營者報告的情況及時進行識別調整,並按程序報送調整情況。

第四章 運營者安全保護
第二十一條 建設關鍵信息基礎設施應當確保其具有支持業務穩定、持續運行的性能,並保證安全技術措施同步規劃、同步建設、同步使用。
第二十二條 運營者主要負責人是本單位關鍵信息基礎設施安全保護工作第一責任人,負責建立健全網絡安全責任制並組織落實,對本單位關鍵信息基礎設施安全保護工作全面負責。
第二十三條 運營者應當按照網絡安全等級保護製度的要求,履行下列安全保護義務,保障關鍵信息基礎設施免受干擾、破壞或者未經授權的訪問,防止網絡數據洩漏或者被竊取、篡改:
(一)制定內部安全管理制度和操作規程,嚴格身份認證和權限管理;
(二)採取技術措施,防範計算機病毒和網絡攻擊、網絡侵入等危害網絡安全行為;
(三)採取技術措施,監測、記錄網絡運行狀態、網絡安全事件,並按照規定留存相關的網絡日誌不少於六個月;
(四)採取數據分類、重要數據備份和加密認證等措施。
第二十四條 除本條例第二十三條外,運營者還應當按照國家法律法規的規定和相關國家標準的強制性要求,履行下列安全保護義務:
(一)設置專門網絡安全管理機構和網絡安全管理負責人,並對該負責人和關鍵崗位人員進行安全背景審查;
(二)定期對從業人員進行網絡安全教育、技術培訓和技能考核;
(三)對重要係統和數據庫進行容災備份,及時對系統漏洞等安全風險採取補救措施;
(四)制定網絡安全事件應急預案並定期進行演練;
(五)法律、行政法規規定的其他義務。
第二十五條 運營者網絡安全管理負責人履行下列職責:
(一) 組織製定網絡安全規章制度、操作規程並監督執行;
(二)組織對關鍵崗位人員的技能考核;
(三)組織製定並實施本單位網絡安全教育和培訓計劃;
(四)組織開展網絡安全檢查和應急演練,應對處置網絡安全事件;
(五)按規定向國家有關部門報告網絡安全重要事項、事件。
第二十六條 運營者網絡安全關鍵崗位專業技術人員實行執證上崗制度。
執證上崗具體規定由國務院人力資源社會保障部門會同國家網信部門等部門製定。
第二十七條 運營者應當組織從業人員網絡安全教育培訓,每人每年教育培訓時長不得少於1個工作日,關鍵崗位專業技術人員每人每年教育培訓時長不得少於3個工作日。
第二十八條 運營者應當建立健全關鍵信息基礎設施安全檢測評估制度,關鍵信息基礎設施上線運行前或者發生重大變化時應當進行安全檢測評估。
運營者應當自行或委託網絡安全服務機構對關鍵信息基礎設施的安全性和可能存在的風險隱患每年至少進行一次檢測評估,對發現的問題及時進行整改,並將有關情況報國家行業主管或監管部門。
第二十九條 運營者在中華人民共和國境內運營中收集和產生的個人信息和重要數據應當在境內存儲。因業務需要,確需向境外提供的,應當按照個人信息和重要數據出境安全評估辦法進行評估;法律、行政法規另有規定的,依照其規定。

第五章 產品和服務安全
第三十條 運營者採購、使用的網絡關鍵設備、網絡安全專用產品,應當符合法律、行政法規的規定和相關國家標準的強制性要求。
第三十一條 運營者採購網絡產品和服務,可能影響國家安全的,應當按照網絡產品和服務安全審查辦法的要求,通過網絡安全審查,並與提供者簽訂安全保密協議。
第三十二條 運營者應當對外包開發的系統、軟件,接受捐贈的網絡產品,在其上線應用前進行安全檢測。
第三十三條 運營者發現使用的網絡產品、服務存在安全缺陷、漏洞等風險的,應當及時採取措施消除風險隱患,涉及重大風險的應當按規定向有關部門報告。
第三十四條 關鍵信息基礎設施的運行維護應當在境內實施。因業務需要,確需進行境外遠程維護的,應事先報國家行業主管或監管部門和國務院公安部門。
第三十五條 面向關鍵信息基礎設施開展安全檢測評估,發布系統漏洞、計算機病毒、網絡攻擊等安全威脅信息,提供雲計算、信息技術外包等服務的機構,應當符合有關要求。
具體要求由國家網信部門會同國務院有關部門製定。

第六章 監測預警、應急處置和檢測評估
第三十六條國家網信部門統籌建立關鍵信息基礎設施網絡安全監測預警體系和信息通報製度,組織指導有關機構開展網絡安全信息匯總、分析研判和通報工作,按照規定統一發佈網絡安全監測預警信息。
第三十七條國家行業主管或監管部門應當建立健全本行業、本領域的關鍵信息基礎設施網絡安全監測預警和信息通報製度,及時掌握本行業、本領域關鍵信息基礎設施運行狀況和安全風險,向有關運營者通報安全風險和相關工作信息。
國家行業主管或監管部門應當組織對安全監測信息進行研判,認為需要立即採取防範應對措施的,應當及時向有關運營者發布預警信息和應急防範措施建議,並按照國家網絡安全事件應急預案的要求向有關部門報告。
第三十八條 國家網信部門統籌協調有關部門、運營者以及有關研究機構、網絡安全服務機構建立關鍵信息基礎設施網絡安全信息共享機制,促進網絡安全信息共享。
第三十九條國家網信部門按照國家網絡安全事件應急預案的要求,統籌有關部門建立健全關鍵信息基礎設施網絡安全應急協作機制,加強網絡安全應急力量建設,指導協調有關部門組織跨行業、跨地域網絡安全應急演練。
國家行業主管或監管部門應當組織製定本行業、本領域的網絡安全事件應急預案,並定期組織演練,提升網絡安全事件應對和災難恢復能力。發生重大網絡安全事件或接到網信部門的預警信息後,應立即啟動應急預案組織應對,並及時報告有關情況。
第四十條國家行業主管或監管部門應當定期組織對本行業、本領域關鍵信息基礎設施的安全風險以及運營者履行安全保護義務的情況進行抽查檢測,提出改進措施,指導、督促運營者及時整改檢測評估中發現的問題。
國家網信部門統籌協調有關部門開展的抽查檢測工作,避免交叉重複檢測評估。
第四十一條 有關部門組織開展關鍵信息基礎設施安全檢測評估,應堅持客觀公正、高效透明的原則,採取科學的檢測評估方法,規範檢測評估流程,控制檢測評估風險。
運營者應當對有關部門依法實施的檢測評估予以配合,對檢測評估發現的問題及時進行整改。
第四十二條 有關部門組織開展關鍵信息基礎設施安全檢測評估,可採取下列措施:
(一)要求運營者相關人員就檢測評估事項作出說明;
(二)查閱、調取、複製與安全保護有關的文檔、記錄;
(三)查看網絡安全管理制度製訂、落實情況以及網絡安全技術措施規劃、建設、運行情況;
(四)利用檢測工具或委託網絡安全服務機構進行技術檢測;
(五)經運營者同意的其他必要方式。
第四十三條 有關部門以及網絡安全服務機構在關鍵信息基礎設施安全檢測評估中獲取的信息,只能用於維護網絡安全的需要,不得用於其他用途。
第四十四條 有關部門組織開展關鍵信息基礎設施安全檢測評估,不得向被檢測評估單位收取費用,不得要求被檢測評估單位購買指定品牌或者指定生產、銷售單位的產品和服務。

第七章 法律責任
第四十五條運營者不履行本條例第二十條第一款、第二十一條、第二十三條、第二十四條、第二十六條、第二十七條、第二十八條、第三十條、第三十二條、第三十三條、第三十四條規定的網絡安全保護義務的,由有關主管部門依據職責責令改正,給予警告;拒不改正或者導致危害網絡安全等後果的,處十萬元以上一百萬元以下罰款,對直接負責的主管人員處一萬元以上十萬元以下罰款。
第四十六條運營者違反本條例第二十九條規定,在境外存儲網絡數據,或者向境外提供網絡數據的,由國家有關主管部門依據職責責令改正,給予警告,沒收違法所得,處五萬元以上五十萬元以下罰款,並可以責令暫停相關業務、停業整頓、關閉網站、吊銷相關業務許可證;對直接負責的主管人員和其他直接責任人員處一萬元以上十萬元以下罰款。
第四十七條運營者違反本條例第三十一條規定,使用未經安全審查或安全審查未通過的網絡產品或者服務的,由國家有關主管部門依據職責責令停止使用,處採購金額一倍以上十倍以下罰款;對直接負責的主管人員和其他直接責任人員處一萬元以上十萬元以下罰款。
第四十八條個人違反本條例第十六條規定,尚不構成犯罪的,由公安機關沒收違法所得,處五日以下拘留,可以並處五萬元以上五十萬元以下罰款;情節較重的,處五日以上十五日以下拘留,可以並處十萬元以上一百萬元以下罰款;構成犯罪的,依法追究刑事責任。
單位有前款行為的,由公安機關沒收違法所得,處十萬元以上一百萬元以下罰款,並對直接負責的主管人員和其他直接責任人員依照前款規定處罰。
違反本條例第十六條規定,受到刑事處罰的人員,終身不得從事關鍵信息基礎設施安全管理和網絡運營關鍵崗位的工作。
第四十九條 國家機關關鍵信息基礎設施的運營者不履行本條例規定的網絡安全保護義務的,由其上級機關或者有關機關責令改正;對直接負責的主管人員和其他直接負責人員依法給予處分。
第五十條 有關部門及其工作人員有下列行為之一的,對直接負責的主管人員和其他直接責任人員依法給予處分;構成犯罪的,依法追究刑事責任:
(一)在工作中利用職權索取、收受賄賂;
(二)玩忽職守、濫用職權;
(三)擅自洩露關鍵信息基礎設施有關信息、資料及數據文件;
(四)其他違反法定職責的行為。
第五十一條關鍵信息基礎設施發生重大網絡安全事件,經調查確定為責任事故的,除應當查明運營單位責任並依法予以追究外,還應查明相關網絡安全服務機構及有關部門的責任,對有失職、瀆職及其他違法行為的,依法追究責任。
第五十二條境外的機構、組織、個人從事攻擊、侵入、干擾、破壞等危害中華人民共和國的關鍵信息基礎設施的活動,造成嚴重後果的,依法追究法律責任;國務院公安部門、國家安全機關和有關部門並可以決定對該機構、組織、個人採取凍結財產或者其他必要的製裁措施。

第八章 附則
第五十三條 存儲、處理涉及國家秘密信息的關鍵信息基礎設施的安全保護,還應當遵守保密法律、行政法規的規定。
關鍵信息基礎設施中的密碼使用和管理,還應當遵守密碼法律、行政法規的規定。
第五十四條 軍事關鍵信息基礎設施的安全保護,由中央軍事委員會另行規定。
第五十五條 本條例自****年**月**日起施行。

Referring URL:

http://www.cac.gov.cn/2017-07/11/c_1121294220.htm

中國軍隊分析北韓軍隊朝鲜先军时代军事战略问题研究 // Chinese Military Analysis of North Korean Army

中國軍隊分析北韓軍隊朝鲜先军时代军事战略问题研究 //

Chinese Military Analysis of North Korean Army

The first part of the preface

In the late 1980s and early 1990s, the drastic changes in the Eastern Europe, the disintegration of the Soviet Union and the socialist camp suffered great setbacks. In the mid-1990s, the Korean economy suddenly plunged into recession. In July 1994, Kim Il Sung died. At that time, people generally believe that North Korea is facing a serious crisis, the development prospects of North Korea is quite worrying. Nevertheless, North Korea has experienced three years of “mourning mourning”, and continue to missile test and nuclear test activities, and constantly strengthen its military power.

Into 2000, the DPRK has provoked the second, third Western war, carried out two nuclear tests, and the implementation of several missile test firing. In 2010, the DPRK in the West Sea (Korean Peninsula in the western waters) to create a “Cheonan ship incident” and “Yin Ping Island shelling incident.” North Korea’s military provocation, not only to South Korea, back to the surrounding countries to bring unease, but also to the security situation in Northeast Asia has brought great variables, and become an important factor in the regional arms competition.

September 1998, Kim Jong Il in the introduction of its regime, held high the banner of building a “strong power”, put forward a new political slogan – “first army politics.” To December 17, 2011 Kim Jong-il died, he had a long-17 years of strong rule of the DPRK. Kim Jong Il’s “first army politics” refers to all military work as the first, all military work as the most important, under the principle of military advance, to solve all the problems in the revolution and national construction, the people’s army as a pillar of the revolution , The political way of advancing the whole of socialism. It can be said that the first army politics is Kim Jong-Japanese political way. Its core content is that under the leadership of Kim Jong Il, the DPRK’s army actively responded to economic difficulties, social problems and security crisis, and strive to maintain the Korean-style socialist system. “Military strategy” is the DPRK in order to “first army politics” rooted in the Korean society, all to give priority to the development of national defense forces for all purposes, to give priority to the protection of national defense for the purpose of Kim Jong-Japanese military forces use.

In this paper, after the death of Kim Il Sung, Kim Jong-il system under the Korean military strategy development changes in the study, in particular, the DPRK in spite of the strong opposition from the international community, is still nuclear development and has a certain nuclear weapons after the strategic changes as a study Focus.

The second part of the Korean military strategy

First, the formation of the Korean military strategy background

The military strategy of the DPRK is gradually formed on the basis of Kim Il Sung’s military strategic thinking. Kim Il Sung’s military strategic thinking can be said to be the integration of formal warfare and guerrilla warfare. In the process of anti-Japanese activities in China and the former Soviet Union, Kim Il Sung accumulated a wealth of practical experience, which laid a solid foundation for the formation of its military strategic thinking. On the basis of these military experiences, Kim Il Sung put forward the “main tactics”, and stressed that “the main tactics” is the DPRK’s unique military strategy. In order to fully understand the DPRK’s military strategy, the study of Kim Il Sung’s military experience is very important.

In 1928, Kim Il Sung joined the Communist Youth League of China. Later, Kim Il Sung as a member of the Communist Party of China, in the East Manchuria, coastal state area carried out anti-Japanese activities behind enemy lines. Through the small Wangqing, the old Montenegro, Putian Fort fighting and other guerrilla warfare, Kim Il Sung from Mao Zedong’s military thinking to draw a wealth of wisdom and nutrition, and gradually realize the penetration war, guerrilla warfare, night war, behind enemy lines, large forces and small forces With the importance of tactics. Kim Il Sung was led behind the enemy’s anti-Japanese activities, the main fighting style for the ambush, raid, etc., but belong to the tactical category of guerrilla warfare. However, the DPRK will be these guerrilla warfare style exaggerated, propaganda into a large-scale battle, that is, a typical war in the revolutionary war. Because of this, today’s North Korean army still attaches great importance to guerrilla warfare.

In the late 1940s, Kim Il Sung had to flee to the former Soviet Union and was incorporated into the Red Army of the Soviet Union due to the encroachment of the Japanese Kwantung Army. At that time, Kim Il-sheng by learning Mikhail Nikolayevich Tukachevsky (1893 – 1939) prepared by the Marshal of the “workers and peasants Red Army field”, the military-style military organization , With the mobile combat-based battle compiled, the fire as the center of the weapons and equipment system and other content of the Soviet army’s regular war thinking has a certain understanding. Kim Il Sung’s military struggle in China and the former Soviet Union has played a very important role in the development of the military-based military forces in North Korea and the formation of military tactics such as speed warfare, raid warfare and cooperation. Through the Korean War, the DPRK in its military strategy to increase the annihilation of enemy forces surrounded by war, to promote political work, to ensure that the contents of war materials and so on. Through local conflicts, North Korea recognizes the need to strengthen the ability to cooperate with the war, strengthen the mechanized forces and air force. Based on the above, the DPRK continued to carry out the war to supplement and improve the method.

Figure 1: The formation of the Korean military strategy.

2
Figure 1: The formation of the Korean military strategy. [Save to album]

Source: Park Jung Pao, “North Korea’s Military Strategy Research”, “Korean Studies” Volume 6 (Seoul: Dongguo University, 2010), p.123.

Second, Kim Il Sung military strategy

1, preemptive attack strategy

Preemptive strategy is to choose the enemy completely unpredictable, or even if it can be expected but there is no time to respond to the timing, places and methods to attack each other’s strategy. Preemptive attack strategy can maximize the play to a sudden, fast, secret, camouflage, etc.. Often, the implementation of surprise operations, you can at the lowest cost, get the maximum combat effect. Kim Il Sung has repeatedly stressed that to do surprise success, usually must maintain a good fighting situation. Not only that, the combat troops have to really have the ability to completely destroy each other’s combat capability. This means that the purpose of pre-emptive surprise strategy is through the efficient and fast combat operations, in a short time focus on fighting forces, the complete destruction of enemy combat forces.

In order to implement pre-emptive surprise attacks, North Korea will be the deployment of most of the military forces in the front area. In the structure of the troops, but also highlights the rapid response, flexible and flexible features. It is particularly worth mentioning that North Korea will be about 70% of the military forces deployed in Pyongyang – Yuan Shan line south, if the DPRK made surprise attack decision, then the North Korean troops do not have another combat deployment, you can directly to South Korea to take military action.

2, with the strategy

“Coordination strategy” refers to a battle, two or more combat forms of mutual cooperation, mutual coordination strategy. On the basis of Mao Zedong ‘s guerrilla war ideas, summed up the experience of the Vietnam War, and fully considered the characteristics of the Korean Peninsula after the so – called “main tactics. The core of the war is in the large-scale regular warfare and guerrilla warfare, large forces and small forces with the launch of various forms of attack operations, such a battlefield will be no front and rear, making the other completely into a state of chaos.

In order to implement the war, North Korea has established the world’s largest special forces, and has AN-2 machine, hovercraft, submarines and other sea, air penetration means. In addition, the North Korean Navy, the Air Force also set up a sniper brigade, taking into account the characteristics of different services, and constantly strengthen the combat capability building. North Korea may take the type of war with a combination of regular warfare and guerrilla warfare, cooperation between large forces and small forces, cooperation between different services (land and sea air force), between different arms (arms), military and people force (Military and folk resources) and so on.

3, quick fix strategy

In the traditional military strategy theory, quick fix strategy has been highly valued by all parties. Quick tactical strategy is to focus on superior forces, each break the other main force, in a short time, with rapid tactical victory, the end of the war strategy. To this end, North Korea attaches great importance to the rapid development strategy, from the 20th century, 80 years, North Korea focused on the construction of armored forces, mechanized forces. In order to achieve the speed of war, North Korea’s military structure is also fully highlighted the rapid response, flexible and flexible features. The main combat forces of the warlords are tanks, armored vehicles, fighters, standing forces, compared with South Korea, in addition to armored vehicles, the DPRK in the number of obvious dominant. Therefore, if the DPRK launched a speed war on South Korea, then within a few days, the Korean army may sweep the whole of South Korea, and block the US military reinforcements involved.

Third, the evaluation of Kim Il Sung’s military strategy

Kim Il Sung’s military strategy is to sum up Kim Il Sung’s experience of military struggle in China and the former Soviet Union, taking into account the terrain characteristics of the Korean Peninsula and the gradual formation of local warfare. It can be said that Kim Il Sung’s military strategy is offensive offensive strategy. It is particularly worth emphasizing that the use of conventional combat power to occupy the number of advantages, the attack on South Korea launched a surprise attack, and then master the war dominance, and in the external reinforcements arrived in the Korean Peninsula before the end of the war speed strategy is Kim Il Sung’s military strategy core.

At present, the local war style is changing from long-term war, war of attrition, ground warfare to ground combat, maritime combat, air combat, space operations, network operations and other integrated all-round, multi-level modern three-dimensional operations. In addition, with the development of science and technology, the destruction of weapons and equipment, remote precision strike capability increased significantly, making the war style is developing into a rapid focus on precision strike style. In the past, the focus of the war was to use conventional military forces to win the victory of war and compete for the dominance of war. The focus of modern warfare is based on cutting-edge weapons and equipment system, to achieve the battlefield digital, efficient play the overall effectiveness of combat effectiveness. However, Kim Il Sung’s military strategy only embodies the conventional combat power of the implementation of the war, North Korea’s nuclear and missile areas are not included. Obviously, Kim Il Sung’s military strategy is very obvious, can not adapt to the needs of modern warfare. The army is an effective means for the DPRK to maintain its regime and to combat the threat of the system. Therefore, in order to give full play to the role of the military, Kim had to put forward a new military strategic concept.

The third part of the military era of military strategy and military strength construction

First, the military strategy

Kim Jong-il pointed out that the modern war was a new form of war, characterized by a highly expanded three-dimensional warfare, information warfare (reconnaissance, electronic warfare, cyber warfare, psychological warfare) Non-symmetrical warfare, non-contact warfare, precision strike, short time war decisive battle. In addition, Kim Jong Il also stressed that to do a good job in preparing for the new battle. It can be seen that Kim Jong-il has fully recognized that the modern war style is subject to qualitative changes, and that continue to use the existing conventional war tactics, can not guarantee the victory of future war. Therefore, in full consideration of the modern war style at the same time, in order to develop can cope with the United States and South Korea joint military forces, Kim Jong Il conceived the “large-scale destruction strategy”, “quick decision strategy”, “network strategy.”

(A), large-scale destruction strategy

Large-scale destruction strategy is to bring a huge destructive strategy to each other, is a “serious retaliation strategy” of a. To achieve a large-scale destruction strategy, need to have beyond the other side of the military power or have to give each other a decisive loss of military means. North Korea for large-scale destruction of the strategic forces, including nuclear weapons, including weapons of mass destruction and artillery units.

The massive destruction strategy is a strategy developed by the DPRK in order to protect the “victorious” battle of victory. In 1994, the DPRK was facing a major crisis because of the US threat to military attacks on North Korea’s nuclear facilities. It can be said that the emergence of this crisis directly promoted Kim Jong Il from the containment level to develop large-scale destruction of the military strategy.

The massive destruction strategy is the most representative strategy adopted by countries with nuclear weapons. In order to make up for the “blockade strategy” deficiencies, the former US President Eisenhower has proposed a “large-scale revenge strategy.” The United States, on the basis of its absolute nuclear superiority, pursued a large-scale retaliation strategy, reduced defense spending and established military hegemony in the international community. Former Soviet leader Khrushchev argues that the Soviet Union had failed in the “Cuban Missile Crisis” in 1962, mainly because the Soviet Union was at a disadvantage in terms of nuclear warfare compared with the United States. Therefore, Khrushchev actively promote nuclear weapons as the main force of large-scale retaliation strategy, trying to have the military strength with the United States. In 1964, China’s first atomic bomb after the success of China’s international influence, political status has been significantly improved. It can be said that through the nuclear development, to take a deterrent revenge strategy, China protects the security of its own country and establishes the status of the Asian military power based on it.

As mentioned above, countries with nuclear weapons, as a military power, can occupy a dominant position in the international community. Not only that, but also nuclear weapons as a primary means to promote large-scale retaliation strategy, in order to ensure their own national security. Therefore, the DPRK may be through the possession of nuclear weapons to promote large-scale destruction strategy. In other words, large-scale destruction strategy can not only make North Korea effective response to a variety of external threats, but also in the “something” to ensure that North Korea to win. 6.25 After the war, North Korea and the United States has maintained a truce. In recent years, the DPRK-US relations, due to nuclear problems, human rights issues, counterfeiting problems and other contradictions, the contest continued. In this context, the DPRK that at any time possible with the United States outbreak of war. Therefore, the DPRK’s massive destruction strategy is likely to play an important role in the future DPRK-US relations.

In 2006, the DPRK Labor Party Propaganda Department Deputy Minister has said that once the war broke out, the whole of Seoul will be 30 minutes into a flames, 100,000 US troops, 70% of South Korean residents face death, South Korea’s economic 90% Above into ashes. July 24, 2010, the DPRK National Defense Commission has also issued a threat that will be necessary when the start of nuclear-based North Korean retaliation “jihad”. This means that “something” when North Korea will use weapons of mass destruction to launch attacks.

(2) quick fix strategy

Kim Jong Il’s “quick fix strategy” is in the external forces reinforce the Korean Peninsula before the end of the war strategy, is Kim Il Sung’s strategy of succession, continuation and development. The Gulf War, the war in Afghanistan, the war in Iraq, the “quick fix strategy” has been widely used. Obviously, through the “quick fix strategy”, you can focus on attack and destroy hostile country command facilities and the main force, to master the war dominance, and in a very short time to end the war victory. The reason why North Korea will use quick fix strategy, the main reasons are as follows:

1, North Korea has a considerable scale can start the speed of combat forces

North Korea’s armored forces and mechanized forces with a high degree of mobility, can give each other a strong impact and deterrence, artillery forces can focus on the enemy’s core targets, can cause great losses and damage to each other. North Korea’s main battle of the speed of war – armored forces is 1.7 times the Han Jun, artillery units are Han Jun 2.5 times.

2, North Korea’s military system as a whole is conducive to maneuver

Despite North Korea’s economic difficulties, North Korea has been building military power. In recent years, not only the strength of military forces and equipment continued to increase, the army structure adaptation, also pay great attention to the construction of mobile combat capability. According to South Korea’s defense paper published in 2010, in order to improve the combat effectiveness of the troops, the DPRK reorganized part of the army, the two mechanized army reorganized as mechanized division, a tank army reorganized as armored division, an artillery army reorganized as artillery division. In addition, the DPRK has also strengthened the front forces of firepower building capacity. These changes in the Korean army provide a reliable guarantee for its speed warfare.

3, the Korean army most of the combat effectiveness deployed in the front area

North Korea has deployed more than 10 troops and more than 60 divisions / brigades in Pyongyang – south of Wonsan Line, accounting for about 70% of the overall combat effectiveness of the Korean army. In this way, as long as the North Korean leadership determined, then the North Korean troops do not have to re-adjust the deployment, you can always put into the South invasion. In November 2009, after the third naval battle in the Western Seas (Korean Peninsula), the Korean army deployed a 240-mm rocket launcher on its west coast, posing a direct threat to the South West and the capitals. It can be said that North Korea in front of the deployment of a large number of troops in order to focus on the early war to launch attacks, through the speed of war hit the Korean army.

North Korea stressed that with the traditional war style changes, non-linear combat, non-contact operations and other new combat methods are emerging, modern war may be in front and rear at the same time start. This means that the DPRK regular forces in front of a positive attack at the same time, the Korean special forces may be to the south of the region to launch interference operations. Undeniably, the battlefield before and after the start at the same time, the war will be quick to play a decisive role.

4, network strategy

Network attack refers to the use of computer networks exist loopholes and security flaws, the enemy military, administrative, personnel and other major systems and resources to attack, usually also known as “no gunfire.” With the rapid development of computer technology and the concept of network-centric warfare, the center of modern warfare is moving from the traditional combat platform to the network. From recent years, the local war style can also be seen, network combat is as one of the main forms of war, played a very important role.

In 2009, Kim Jong Il held a speech at the senior parliamentary conference of the Korean army that the war of the twentieth century was a war of oil and shells, and that war in the twenty-first century was an information war. It can also be seen that North Korea attaches great importance to cyber warfare.

There are two main ways to network attacks. The first for the illegal invasion of each other’s information systems, steal the system confidential information, damage to the target system data. The second is not invade the other side of the information system, the external destruction of the other information system, so that its function can not play a role.

From the 90s of the 20th century, North Korea in Pyongyang command automation university, computer technology university, Jinze Industrial University, and so vigorously cultivate professional network warfare talent. Pyongyang command automation university under the People’s Army General Staff, is North Korea’s most representative network warfare personnel training institutions, each year for the army to train more than 100 computer professional and technical personnel. It is speculated that the Korean army has a professional hacker scale of 500 to 600.

The military strategy of the United States, South Korea and other developed countries is heavily dependent on the computer network. If North Korea launched a network attack, it is easy to lead to South Korea’s network system confusion, affecting the transmission and sharing of information. At the crucial moment, and even may paralyze the entire network, so that South Korea missed the opportunity to deal with, so as to bring a fatal blow to South Korea. Before the outbreak of the war, the DPRK may attack the government of the Korean government at home or abroad through hacking. During the war, the DPRK may also interfere with the destruction of Han Jun’s computer network, leading to the entire computer network data transmission interruption and system paralysis.

North Korea’s network strategy will also have a positive impact on the psychological warfare. With regard to the war in Iraq, the DPRK believes that the US imperialists have been able to win in the war in Iraq, not so much the role of high-tech weapons, as it is the psychological warfare in the role, and from the ideological collapse of Iraq results. It can be seen that North Korea attaches great importance to the psychological warfare, and that in the future war conditions, the psychological war will run through the whole process of war. North Korea through the network to carry out the psychological warfare style mainly includes: in hostile countries or support the national network spread to the DPRK is conducive to the spread of information and gossip, and even false information (bacterial warfare, chemical warfare, the use of nuclear weapons, large casualties) Thus bringing panic to the public in hostile countries and weakening the will of the hostile countries. For the support of the country, through the efforts to create anti-war public opinion, forcing the support of the state to stop the reinforcements, and the early withdrawal of troops have been invested.

Figure 2: Military strategy of the army.

2
Figure 2: Military strategy of the army. [Save to album]

The main feature of the military strategy of the army is based on Kim Il Sung’s aggressive strategy, in order to maintain the regime, increase the content of the protective strategy. In other words, Kim Jong Il through the army to establish a military strategy, will be his successor Kim Jong-un faithfully inheritance, continuation and carry forward.

Although Kim Il Sung’s military strategy – pre-emptive attack strategy, with the strategy, quick fix strategy is based on conventional combat power to develop, but taking into account the status of North Korea’s weapons and equipment system and changes in modern war style, these military strategy will Will continue to continue. Based on the pre-emptive strike strategy, most of the troops of the Korean army are deployed in the front area. This will reduce the time required for the deployment, movement and take-over of the troops, thereby increasing the mobility of the force. Based on the strategy of cooperation, we can realize the effective cooperation between the Korean troops and the regular combat forces. This can improve operational effectiveness, weaken the other side of the military power, and then achieve the purpose of quick fix.

Second, the military characteristics of the military strategy: the pursuit of military adventurism

After the death of Kim Il Sung, North Korea’s biggest change in the military field is that North Korea has carried out nuclear development. North Korea, despite the strong opposition from the international community, is still engaged in nuclear development, its purpose is to the United States, the relationship between Korea, through the pursuit of military adventurism to take the initiative.

In December 2010, the Democratic People’s Armed Forces Minister Kim Yong-chun pointed out that the Korean Revolutionary Armed Forces had been prepared to launch the “nuclear-based jihad-based jihad” when necessary. North Korea’s revolutionary armed forces not only to resist aggression, but also sweep the enemy base camp, to eliminate the root causes of war, and then realize the reunification of the motherland history. In addition, the DPRK in 2009 set up a new reconnaissance General Administration, to further strengthen the role of external intelligence departments and functions. As can be seen from these initiatives in the DPRK, North Korea is strengthening military adventurism on the Korean Peninsula, based on the evolving military power.

North Korea’s pursuit of military adventurism, mainly for the following reasons: First, the historical experience to tell North Korea, the pursuit of military adventurism is very necessary. North Korea believes that the late 20th century, the late 60s to capture the US armed spy ship “Pueblo” incident and shot down the US EC-121 reconnaissance plane incident, North Korea and the United States confrontation made a major victory. Therefore, it can be said that these two events have become North Korea continue to promote the main cause of military adventurism. Second, trying to urge the international community to recognize North Korea as a military power. The DPRK believes that public military demonstrations or military provocation can be carried out to demonstrate to the international community its military power. In other words, North Korea in advocates, have a strong military strength in order to attract people’s attention, building a strong army is the power of the country. Thirdly, a powerful army can be used as an effective means of strengthening internal unity within its system. North Korea believes that a military provocation in the vicinity of the northern limit line or the armistice can create a military crisis within the DPRK, and this sense of crisis can effectively enhance unity within North Korea.

In the following circumstances, North Korea is likely to take military adventurism action: First, the North-South exchange is interrupted, further escalation of military tensions. Second, the DPRK nuclear issue has not progressed, the DPRK-US relations have stalled and the relationship has deteriorated seriously. Third, Kim Jong-un system is unstable. Military adventurist actions include: the implementation of nuclear tests, the launch of long-range missiles, in the West Sea (South Korea’s western waters) and near the stop line to launch local provocation. North Korea believes that through these provocative activities, can enhance the unity of the people, consolidate and improve the Kim Jong-un system.

Third, the military strength of the military construction

(A) to maintain the military superiority of South Korea

Although North Korea is facing serious economic difficulties, it is still actively promoting the modernization of weapons and equipment, vigorously developing nuclear weapons, chemical weapons, missiles and other weapons of mass destruction, and strive to build a strategic weapon system, and promote a strong military power based on the construction of a strong power. Into 2000, North Korea not only to strengthen the standing forces, artillery units, armored forces, special operations forces have also been rapid development. According to South Korea’s 2010 Defense White Paper, compared with 2008, North Korea ground forces added four divisions and one motor brigade, an increase of more than 200 tanks.

Table 1: Comparison of North and South Military Forces.

1
Table 1: Comparison of North and South Military Forces. [Save to album]

* In order to facilitate the comparison of military forces between the North and the South, the Marine Corps equipment into the Army troops equipment project was calculated.

Source: Defense Department, Defense White Paper 2010 (Seoul: Republic of Korea Ministry of Defense, 2010) p.271.

North Korea believes that as long as the US military to withdraw from the Korean Peninsula, South Korea to maintain military superiority in the case, the DPRK can achieve the “unity of the South.” There is no doubt that North Korea has strengthened its military power and provided a reliable guarantee for its large-scale destruction and speed warfare. In addition, the DPRK also believes that the collapse of the former Soviet Union and China’s reform and opening up, resulting in North Korea’s back-up forces weakened. Based on this judgment, the DPRK began to strengthen the military building for the South Triangular Military Relations (Korea, the United States and Japan) to enhance its autonomous military response capability.

(B) to strengthen the containment strategy

1, nuclear development

North Korea received 10 kilograms to 15 kilograms of plutonium from the start of the 5 MWe nuclear reactor in Ningxia before the International Atomic Energy Agency (IAEA) verification in June 1992. According to the analysis, North Korea has been using these plutonium to promote nuclear weapons research and development program. At present, North Korea has about 40 kilograms to 50 kilograms of plutonium, which can produce 6 to 9 nuclear weapons (the manufacture of a nuclear weapon requires 6 kg to 8 kg of plutonium). In addition, North Korea’s uranium (for the manufacture of atomic reactor nuclear fuel) reserves are very rich, the total burial of about 26 million tons, of which the amount of 4 million tons.

With regard to North Korea’s nuclear capabilities, the former head of the US National Nuclear Institute, Dr. Heck, wrote in the article “North Korea’s Lessons Learned in the Core Crisis” that North Korea has nuclear weapons manufacturing that is as powerful as the United States in Nagasaki, Japan ability. From the current situation, the DPRK is likely to have 4-8 pieces of primary nuclear weapons. On April 9, 2010, US Secretary of State Hillary Clinton said in a speech titled “Nuclear Nonproliferation” at the University of Louisville, Kentucky, that North Korea has six thousand nuclear weapons. This is the first time that US government officials have formally addressed the number of nuclear weapons owned by the DPRK in public. In March 2010, when he participated in political studies, political instructors pointed out that “North Korea is a country with nuclear weapons, although the United States is the world,” the Korean People’s Army in South Korea, in March 2010, Power, but not provoke North Korea, entirely because North Korea has nuclear weapons. ”

Therefore, North Korea can be considered independent of nuclear weapons manufacturing capacity, with the number of nuclear weapons for the 1-8. But so far, it is not clear to the extent to which the DPRK will carry nuclear weapons on its missiles to launch nuclear weapons technology to what extent.

On the issue of highly enriched uranium (HEU), on September 3, 2009, the former representative of the DPRK in the United States, Park Ji-yuan, pointed out that North Korea has successfully pilot uranium enrichment, the test has entered the final stage. If uranium enrichment is successful, it means that it can be produced with less, continuous mass production, and is not easily perceived by the outside world. The use of uranium in comparison with the way in which plutonium is used to make nuclear weapons is relatively simple and easy to achieve the miniaturization of nuclear weapons. In order to be able to carry nuclear weapons on field artillery or short-range missiles as tactical nuclear weapons to use, many nuclear-owned countries often choose to use uranium to create nuclear weapons. Compared with the development of conventional combat power, the development of nuclear weapons investment costs less, and can effectively compensate for the military power of the disadvantages. Therefore, the more weak national defense forces, in order to have the means to contain the war, with the military to carry out military confrontation, the more vigorously develop nuclear weapons.

It is not difficult to predict that North Korea will strive to improve its ability to strike short-range military targets by developing small-scale nuclear weapons. Han Peninsula battlefield lack of depth, so in the Korean Peninsula battlefield environment, compared with the long-range nuclear weapons, can be close combat tactical nuclear weapons can play a full role. In addition, the DPRK will also build a large-scale nuclear weapons production system, trying to establish its military power status.

2, chemical and biological weapons

From the 20th century, 80 years, the DPRK independent production of gas bombs and bacteriological weapons, with a certain degree of chemical and biological weapons attack capability. Since the 1990s, the DPRK has started to develop, produce and stockpile the chemical and biological (radioactive) weapons and materials, and has the capability of biochemical radiative warfare. At present, North Korea will 2,500 tons to 5,000 tons of chemical agents dispersed in six storage facilities, chemical weapons, the average annual production capacity of 4,500 tons. In addition, North Korea can also cultivate and produce 13 kinds of biological weapons such as anthrax, smallpox, cholera, typhoid, plague and so on. It is reported that these biological weapons training about 10 days, you can directly put into use.

North Korea’s biochemical weapons will use artillery, missiles, aircraft and other delivery tools. At the beginning of the war, the DPRK is likely to focus on the use of chemical weapons in the area, in order to destroy Han Jun’s defensive positions, to create favorable conditions for its attack. North Korea is also likely to use chemical and biological weapons to South Korea’s capitals, large cities and other densely populated areas to launch indiscriminate attacks, by triggering public panic to interfere with military operations.

3, missile development

In 1985, the DPRK experimented with an improved Scud-B missile with a range of 320 km to 340 km. In 1989, the Scout-500 missile with a range of 500 km was tested. In May 1993, the shooting range was 1,300 km Of the missile No. 1, in August 1998, a test of a 1,600 km to 2,500 km Dapu dong 1 missile, in July 2006 and April 2009 test of the intercontinental ballistic missile (ICBM) level of the Taipu hole 2 Missiles.

In 2004, North Korea successfully developed a range of 120 km KN-02-type short-range missiles, and carried out a combat deployment. In 2007, North Korea also deployed a medium-range ballistic missile (IRBM) with a range of more than 3,000 km using a mobile launcher. In 2010, the DPRK created a “new IRBM division”, the division under the People’s Army General Staff Missile Guidance Bureau. The reason why North Korea continues to develop a range of 3,000 km or more medium-range missiles, is to “something” to fight against the Korean Peninsula reinforcements, to prevent the US military and the Pacific region in the external combat power to the Korean Peninsula. Although the Korean missile range has increased significantly, but the accuracy is not high. As a result, the DPRK had to increase the number of missiles in order to strike the target effectively.

Table 2: North Korean missile development status quo.

1
Table 2: North Korean missile development status quo. [Save to album]

Source: Ministry of Defense, “Encyclopedia of weapons of mass destruction” (Seoul: Ministry of Defense, 2004), p.35; reference to “Defense White Paper 2010”.

North Korea’s ballistic missiles, not only able to attack South Korea, Japan, and even the United States are under its threat. North Korea in accelerating the development of the missile at the same time, but also actively promote nuclear development, which has aroused great concern of the international community. Because the DPRK once the ability to carry nuclear weapons on the missile, the threat range and destructive power will be greatly increased. In other words, if North Korea to achieve the miniaturization of nuclear weapons, that is, to create a nuclear weapons below 1 ton, it means that North Korea can be equipped with nuclear weapons in the use of ballistic missiles.

North Korea’s missile production capacity in the former Soviet Union and China’s technical guidance, through independent research and development has reached a considerable level. It is widely believed that North Korea’s missile manufacturing capacity ranks sixth in the world.

(C) to enhance the speed of quick fix

North Korea from the 20th century, 80 years, in order to implement the speed war, focus on strengthening the armored forces, mechanized troops. The late 1980s, the DPRK began to produce the former Soviet Union T-62 tank imitation – “Tianma” tank, this tank in the water depth of 5.5 meters can also successfully wading river. In addition, the DPRK also introduced, produced, deployed a 23 mm air gun. In 2009, North Korea successfully developed “Tianma” tank improved – “storm” tank, and the actual deployment of two “storm” tank brigade. The reason why North Korea attaches importance to the construction of mechanized forces, mainly in order to use the mechanized forces of the motor power and the impact of the speed of war. Over the past decade, North Korea has increased the deployment of more than 2,000 rockets (more than 3,100 doors to more than 5,100 doors) and more than 300 long-range artillery deployments in the vicinity of the Armed Forces (DME). The reason why the DPRK forward deployment of rockets and long-range artillery, is to the beginning of the war on the South Korean capital to focus on the fight.

The North Korean Navy is equipped with more than 810 ships, including combat ships, submarines, support ships and so on. Among them, about 60% of the ships deployed in front of the base. There are more than 290 ships, such as the ship’s combat ship, the missile boat, the torpedo boat, the fire support boat and so on. The support ship has more than 290 ships such as landing craft and hovercraft. The submarine has more than 70 vessels such as Romeo class submarine, shark class submarine and south class submarine The

With the technical support of Russia, the Korean Air Force assembled the MIG-29 fighter from the early 1990s. Since 1999, North Korea has introduced more than 40 MIG-21s from Kazakhstan. In addition, the DPRK has also introduced a new MI-8 helicopter from Russia. Including the main models MIG-19/21, IL-28, SU-7/25 and other 470 aircraft, including the Korean Air Force has a total of 1,650 aircraft.

Into 2000, the DPRK created a light infantry division, light infantry division under the front army. In addition, the former division of the light infantry brigade expansion for the light infantry regiment. In this way, the strength of the special forces of the DPRK significantly enhanced, the number of more than 20 million. The reason why North Korea strengthened the construction of special forces was to make a decision after taking full account of the reality of the Korean-American Joint Forces and the lessons learned from the war in Iraq. Most of the Korean special forces were deployed in Pyongyang and south of the mountain, so they could be used immediately in the early stages of the war. In order to train officers and men of the special combat capability, the DPRK in the division, military forces set up a special combat training ground. According to the Korean Peninsula combat environment continue to strengthen the night war, mountain warfare, street fighting and other special subjects training, making the troops of the special combat capability has been significantly improved. It is not difficult to predict that in the early days of the war, the DPRK will be through the tunnel, air, sea and other infiltration, the special forces focused on the rear area of ​​Korea. In this way, through the active match, the war developed into a speed war.

North Korean troops to the front of the troops as the center, to strengthen the ground forces fire configuration. In addition, special forces are created or expanded. Through these efforts, the army’s first echelon of combat power can be greatly enhanced. This laid the groundwork for the Korean army to focus on the fighting in the early stages of the war.

After the death of Kim Il Sung, the DPRK in the development of nuclear weapons, missiles and other strategic weapons at the same time, the number and level of conventional combat power has also improved. It is widely believed that North Korea’s military power has grown rapidly. The DPRK has provided the necessary military capabilities and means to realize its military strategy by vigorously strengthening the quantity and quality of military forces.

The fourth part of the DPRK military action outlook

First, the Korean crisis situation evaluation

In the late 1980s and early 1990s, the socialist countries of Eastern Europe changed drastically. Today, the democratization of anti-dictatorship is spreading and spreading. In this complex international environment, has always been to maintain the dictatorship of the DPRK unprecedented unprecedented difficulties and pressure. The collapse of the former Soviet Union and China’s reform and opening up began to let North Korea doubt its powerful host country. 2011 in Egypt and Libya and other Middle East jasmine revolution occurred, so that North Korea’s sense of crisis further aggravated. At present, North Korea is building the hereditary system of the Jinjia dynasty, but also faces a series of internal and external crises.

Table 3: North Korea may face the crisis index may occur.
Table 3: North Korea may face the crisis index may occur. [Save to album]

From the perspective of the internal crisis of the DPRK, as long as the Kim Jong-un regime is unstable, then around the control of the regime, at any time there may be internal fighting. In addition, economic difficulties, food shortages and other issues may also lead to the discontent of the DPRK residents, leading to distraught inside the DPRK, social unrest.

From the DPRK’s external crisis level, the DPRK nuclear crisis worsened, the international community to increase sanctions against North Korea, will inevitably lead to North Korea’s economy is facing more serious difficulties. North Korea’s military provocation to South Korea has led to further tension in North-South relations, disruption of North-South exchanges and the possible occurrence of new North-South military conflicts. In addition, the communist circle, the collapse of long-term dictatorship, etc., at any time may spread to North Korea, and affect the stability of the Korean system.

When North Korea faces a crisis index, North Korea is more likely to take military action in order to maintain its institutional security. On the other hand, when North Korea faces a relatively low crisis index, North Korea is more likely to focus on strengthening its internal solidarity than military action. In other words, when the internal and external crisis is serious, North Korea will be through military action to strengthen internal control, to resist external threats and pressures, and strive to maintain its political stability. When the internal and external crises are moderate, North Korea will put the army into economic activity in order to get rid of serious economic difficulties. When the external crisis is serious, but the internal crisis is moderate, North Korea will take concrete military action to deal with external threats, and thus strengthen internal solidarity. When the external crisis is eased and the internal crisis is serious, the DPRK will use the army to strengthen its control over the population and ensure its stability.

Second, the military action outlook

If the DPRK launched a military provocation based on weapons of mass destruction, the DPRK’s crisis index would determine North Korea’s military operations. North Korea may take the military action can be divided into four types.

Figure 3: Military operations in North Korea in different crisis situations.

1
Figure 3: Military operations in North Korea in different crisis situations. [Save to album]

In the “situation I”, the DPRK will launch a comprehensive war. In this situation, the DPRK’s internal and external environment is extremely bad, in addition to launching a comprehensive war, there is no other way to choose. In other words, because of the issue of power inheritance, food problems, North Korea into a serious chaos, the North Korean system is facing a crisis of collapse. In addition, the DPRK-US relations are stalled by the DPRK nuclear issue, and there is no room for maneuver. In this case, the DPRK is likely to choose a comprehensive war that extreme behavior. At this time, North Korea will use strategic weapons – nuclear weapons and missiles threat to South Korea and the United States, and the use of conventional combat power to South Korea launched a large-scale destruction war and speed war. For North Korea, it is necessary to have a prerequisite for launching a comprehensive war, that is, the need for pre-approval and active assistance from China and Russia.

In the “situation II”, the DPRK will launch a local provocation to South Korea. In this situation, North Korea, although facing external and internal crises, but the external crisis is not very serious. In other words, although the DPRK faces external pressures due to nuclear problems, but this external crisis has not intensified. From the internal situation of the DPRK, the DPRK residents due to food difficulties and other issues, dissatisfaction. The whole regime was controlled by Kim Jong-un, but there was a trace of power struggle. At that time, the DPRK launched a military provocation in the area of ​​the Armistice Line and the North Boundary Line (NLL), attempting to divert domestic contradictions, strengthen internal solidarity and further consolidate the Kim Jong-un system. 2010 “Cheonan ship incident” and “Yin Ping Island shelling incident”, is two typical examples. At that time, Kim Jong Il in order to establish its power inheritance system, launched a military provocation to South Korea.

Under “situation III”, the DPRK will take measures to ease military tension. In this situation, both the external crisis, or the internal crisis is not serious, tensions tend to ease. In other words, speaking abroad, the DPRK nuclear issue is moving in the direction of favoring the DPRK, and the economic problem has been solved to a certain extent. On the inside, Kim Jong-un system has been established and consolidated, political stability in North Korea, social stability, there is no power struggle. At this time, North Korea will promote similar to China’s reform and opening up the line, while taking measures to reduce armaments and other positive measures to establish a new relationship between Korea and the United States.

Under “condition IV”, the DPRK will carry out military force demonstrations. In this situation, North Korea’s external crisis is serious, and the internal crisis is not obvious. In other words, despite the existence of food problems within North Korea, but its internal control is very successful. To the outside world, the international community has intensified its pressure on the DPRK due to the nuclear issue, the export of illegal arms and human rights. The DPRK’s friendly forces – China and Russia, have stopped their support for North Korea or taken careless measures. Will be through nuclear tests and missile test to seek foreign political consultation approach. In addition, in order to highlight the role of Kim Jong-un, internal and external display of strong achievements in the construction of a strong country, North Korea may also continue to carry out nuclear tests or missile test activities.

From the above four conditions, the most likely to happen is the “situation II”, that is, North Korea launched a local provocation. At present, North-South relations are stalled. After the death of Kim Jong Il, Kim Jong-un system is full of instability and uncertainty. In order to alleviate the internal contradictions, North Korea is likely to launch a provocation to South Korea. In particular, if there is a power struggle within North Korea or the Kim Jong-un system is provocative or shocked, Kim Jong-un is likely to launch a provocative activity against South Korea in order to demonstrate his strong leadership while eradicating opposition. North Korea may choose to provoke the main way: the peninsula in the western waters or eastern waters using submarines to attack; occupation or shelling the West Sea (South Korea Sea) five islands; in the armistice zone manufacturing military conflict; the implementation of terrorist activities to create chaos in South Korea society Wait.

The most unlikely is “situation I”, that is, North Korea launched a comprehensive war. North Korea is very clear to launch a comprehensive war, means that joint efforts with the ROK and the United States to combat. Obviously, the level of combat effectiveness of the Korean army compared with the United States and South Korea, compared with the absolute disadvantage. Therefore, if the DPRK wants to launch a comprehensive war, is bound to need China and Russia’s full support and help. However, from the reality of the situation, Russia and China will not easily intervene in the Korean Peninsula war. After the disintegration of the former Soviet Union, the Russian national power injury, has not recovered. Therefore, it is difficult for Russia to carry out effective assistance to the DPRK. Although China stressed that North Korea and China are close neighbors, but China is unswervingly promoting reform and opening up, and actively promote economic growth. In this context, China is clearly reluctant to oppose the United States, involved in the Korean Peninsula war, destroy the hard-won peace and stability of the development environment.

Part 5 concluding remarks

Kim Jong Il regime in order to maintain the advantages of the military field of Korea, focusing on the development of nuclear weapons, missiles and other asymmetric combat capability. It can be said that the construction of military forces in North Korea fully embodies the large-scale destruction strategy, quick fix strategy, network strategy.

The “mass destruction strategy” is a strategy established to ensure that “something” is victorious. In 1994, the United States threatened to bomb North Korea’s nuclear facilities. This crisis has prompted the DPRK to establish a “mass destruction strategy” from the containment level has played a decisive role. “Quick war strategy” is based on Kim Il Sung’s military strategy established, the North Korean aviation forces, armored forces, mechanized forces, etc. will play a full role in the speed of war, the military structure is also around the military is conducive to maneuver And the preparation of the. Taking into account these factors, the DPRK will continue to maintain a quick strategy in the future for a long time. “Network strategy” is also the DPRK may adopt the military strategy. At present, North Korea has a considerable number of professional hackers, coupled with the United States, South Korea and other developed countries, military strategy is heavily dependent on computer networks. If North Korea’s “network strategy” can play a role, will directly affect the Korean-American joint forces to play.

The military strategy of the army is based on the military strategy of Kim Il Sung’s offensive concept, adding the military strategy of Kim Jong Il’s defense concept. That is, the military strategy of the army is Kim Jong-il in order to maintain its political stability and socialist system security made a specific choice. Kim Jong-il has repeatedly stressed that the modern war is a new form of war, which is characterized by a highly expanded three-dimensional warfare, information warfare, asymmetric warfare, non-contact warfare, precision combat, short time and decisive battle, and asked the troops to adapt Modern warfare ready to fight. It can be seen that Kim Jong-il has recognized the need to change the conventional tactics of the past and argues that it is possible to win in the future war only if he has adopted a new tactic that can deal with modern warfare. Therefore, it can be said that the DPRK’s military strategy fully reflects the Kim Jong-il military ideology of the war to carry out the method.

From the DPRK’s military strategic changes and the direction of the development of military forces, the DPRK’s most likely future military action is to launch a local provocation to South Korea. In the case of the instability of the Kim Jung-en regime and the stalemate in North-South relations, it is possible for the DPRK to launch local provocations in the vicinity of the Western Seas (South Korea’s western waters) or near the armistice, as well as possible long-range missile tests, nuclear tests, etc. To seek institutional security. Through these military and military actions, the DPRK tried to divert internal contradictions, strengthen internal solidarity and consolidate the regime. As South Korea, in the face of various threats and complex situations, the need to develop a specific, effective and practical response to the program.

Original Mandarin Chinese:

第一部分 前 言

20世纪八十年代末90年代初,东欧剧变,苏联解体,社会主义阵营遭受巨大挫折。20世纪90年代中期,朝鲜经济突然陷入衰退。1994年7月,金日成逝世。当时,人们普遍认为朝鲜面临着严重危机,对朝鲜发展前景颇为堪忧。尽管如此,朝鲜经历了三年“苦难的行军”,并继续进行导弹试射与核试验等活动,不断强化其军事力量。

进入2000年后,朝鲜先后挑起了第2次、第3次西海交战,进行了两次核试验,并实施了数次导弹试射。2010年,朝鲜又在西海(韩半岛西部海域)制造了“天安舰事件”和“延坪岛炮击事件”。朝鲜的这些军事挑衅行动,不但给韩国,还给周边国家带来不安,同时也给东北亚的安全形势带来了很大的变数,并成为引发地区军备竞争的重要因素。

1998年9月,金正日在其政权出台之际,高举建设“强盛大国”的旗帜,提出了新的政治口号-“先军政治”。至2011年12月17日金正日去世为止,他对朝鲜进行了长达17年的强权统治。金正日提出的“先军政治”是指一切以军事工作为先,一切以军事工作为重,在军事先行的原则下,解决革命和国家建设中的所有问题,把人民军队作为革命的栋梁,推进整个社会主义伟业的政治方式 。可以说,先军政治是金正日式的政治方式。其核心内容为,在金正日的领导下,朝鲜的军队积极应对经济困难、社会问题和安全危机,努力维护朝鲜式社会主义体制。“先军军事战略”是朝鲜为了让“先军政治”植根于朝鲜社会,一切以优先发展国防力量为目的,一切以优先保障国防建设为目的的金正日式的军事力量运用方法。

本文针对金日成去世后,金正日体制下的朝鲜军事战略发展变化情况展开研究,特别是将朝鲜不顾国际社会的强烈反对,依然进行核开发并拥有一定的核武器后的战略变化作为研究的重点。

第二部分 朝鲜军事战略

一、朝鲜军事战略的形成背景

朝鲜的军事战略是在金日成的军事战略思想基础上逐渐形成的。金日成军事战略思想可以说是正规战思想和游击战思想的融合。在中国和前苏联的抗日活动过程中,金日成积累了丰富的实践经验,这些为其军事战略思想的形成奠定了坚实的基础。在这些军事经验的基础上,金日成提出了“主体战法 ”,并强调“主体战法”是朝鲜特有的军事战略。为了充分理解朝鲜的军事战略,研究金日成的军事经历是非常重要的。

1928年,金日成加入中国共产党青年同盟。之后,金日成作为中国共产党的一员,在东满洲、沿海州一带开展了敌后抗日活动。通过小汪清、老黑山、普天堡战斗等游击战,金日成从毛泽东军事思想中汲取了丰富的智慧和营养,逐步认识到渗透战、游击战、夜间战、敌后抗日活动、大部队和小部队间配合战术的重要性。金日成当时领导的敌后抗日活动,主要战斗样式为设伏、突袭等,只是属于战术范畴的游击战。但是,朝鲜将这些游击战样式一味夸大,宣传成大规模的战斗,即革命战争中的典型战例。正因为如此,今天的朝鲜军队依然非常重视游击战 。

20世纪40年代后期,迫于日本关东军的围剿扫荡,金日成不得不逃往前苏联,并被编入苏联红军。当时,金日成通过学习米哈伊尔•尼古拉耶维奇•图哈切夫斯基(1893年-1939年)元帅编写的《工农红军野外条令》,对统合军式的军事组织结构、以机动作战为主的战斗编成、火力为中心的武器装备体系等内容的苏联军队的正规战思想有了一定的认识。金日成在中国及前苏联的军事斗争经历,对于朝鲜发展以数量为主的军事力量,形成实施速度战、突袭战、配合战等的军事战略起到了非常重要的作用。通过韩国战争,朝鲜在其军事战略中增加了歼灭敌有生力量 的包围战,推进政治工作,确保战争物资等内容。通过局部冲突,朝鲜认识至增强配合战执行能力,强化机械化部队及空军力量的必要性。基于上述内容,朝鲜不断对遂行战争的方法加以补充与完善。

图-1:朝鲜军事战略的形成。

2
图-1:朝鲜军事战略的形成。 [保存到相册]

出处:朴容丸,“朝鲜军事战略问题研究”,《朝鲜学研究》第6卷1号(首尔:东国大学,2010), p.123。

二、金日成军事战略

1、先发制人奇袭战略

先发制人奇袭战略是指选择敌人完全无法预料,或者即便可以预料但是也没有时间做出反应的时机、场所和方法,向对方发动攻击的战略。先发制人奇袭战略可以最大限度地发挥突然性,以快速、秘密、伪装等方式进行。通常,实施奇袭作战,可以以最小的代价,获得最大的作战效果 。金日成曾多次强调,要做到奇袭成功,平时必须保持良好的战斗态势。不但如此,作战部队还要真正具备能够完全摧毁对方的作战能力。这意味着先发制人奇袭战略的目的是通过高效、快速的作战行动,在短时间内集中战斗力量,彻底摧毁敌作战力量。

为了实施先发制人的奇袭战,朝鲜将大部分的军事力量部署在前方地区。在部队编制结构上,也突出了快速反应、机动灵活的特点。特别值得一提的是,朝鲜将约70%的军事力量部署在平壤-元山线以南,如果朝鲜做出奇袭战的决定,那么朝鲜军队不用另外进行作战部署,就可以直接对韩国采取军事行动。

2、配合战略

“配合战略”是指在一次战斗中,两个以上的作战形态相互配合、相互协同的战略。配合战是金日成在毛泽东的游击战争思想基础上,总结越南战争的经验教训,并充分考虑韩半岛地形特点后,提出的所谓“主体战法”。配合战的核心是在大规模的正规战与游击战,大部队与小部队配合下,发动多种形式的攻击作战,这样的战场将无前后方可言,使得对方完全陷入混乱状态。

为了实施配合战,朝鲜建立了世界上最大规模的特种部队,并拥有AN-2机、气垫船、潜艇等多种海上、空中渗透手段。另外,朝鲜海军、空军还分别成立了狙击旅,考虑到不同军种的特点,不断加强配合战能力建设。朝鲜可能采取的配合战类型有正规战与游击战的配合,大部队与小部队间的配合,不同军种间的配合(陆海空军),不同兵种间的配合(兵种间),军队与人民武力间的配合(军队和民间资源)等。

3、速战速决战略

在传统的军事战略理论中,速战速决战略一直受到各方面的高度重视。速战速决战略是集中优势兵力,各个击破对方主力部队,在短时间内,以快速的战术取得胜利、结束战局的战略 。为此,朝鲜非常重视速战速决战略的发展,从20世纪80年代起,朝鲜集中力量建设装甲部队、机械化部队。为了实现速度战,朝鲜的部队结构编制也充分突出了快速反应、机动灵活的特点。朝军发动速度战的主要战力有坦克、装甲车、战斗机、常备兵力,与韩国相比,除了装甲车外,朝鲜在数量上明显占据优势。因此,如果朝鲜对韩国发动速度战,那么在数日内,朝鲜军队就可能席卷整个韩国,并阻断美军增援部队的介入。

三、对金日成军事战略的评价

金日成的军事战略是总结金日成在中国及前苏联的军事斗争经验基础上,综合考虑韩半岛的地形特征及局部战争作战样式后逐渐形成的。可以说,金日成的军事战略是攻势的进攻战略。特别值得强调的是,利用占据数量优势的常规战力,对韩国发动突袭攻击,进而掌握战争主导权,并在外部增援兵力抵达韩半岛之前结束战争的速战速决战略是金日成军事战略的核心。

目前,局部战争样式正在由长期战、消耗战、地面战为主转变为地面作战、海上作战、空中作战、太空作战、网络作战等一体化的全方位、多层次现代立体作战。另外,随着科学技术的发展,武器装备的破坏能力、远程精确打击能力大幅提升,使得战争样式正在发展成为快速集中精确打击样式。过去,战争的重点是利用常规军事力量赢得战争的胜利,争夺战争的主导权。而现代战争的重点是基于尖端的武器装备体系,实现战场数字化,高效发挥战斗力的整体效能。但是,金日成时期的军事战略只体现了常规战力的战争执行方式,朝鲜的核及导弹领域未被纳入其中。显然,金日成军事战略的局限性非常明显,无法适应现代战争的需要。军队是朝鲜维持政权,打击体制威胁势力的有效手段。因此,为了充分发挥军队的作用,金正日不得不提出全新的军事战略构想。

第三部分 先军时代的军事战略和军事力量建设

一、先军军事战略

金正日在向人民军下达的《学习提纲》中指出,现代战争是新的形态的战争,其特征为高度扩大的立体战、信息战(侦察战、电子战、网络战、心理战)、非对称战、非接触战、精确打击战、短时间速决战 。此外,金正日还强调,要做好新的战斗准备。从中可以看出,金正日已经充分认识到现代战争样式正在发生质的变化,并认为继续采用现有的常规战战法,无法保证未来战争的胜利。因此,在充分考虑现代战争样式的同时,为了发展可以应对韩美联合战力的军事力量,金正日构想了“大规模破坏战略”、“速战速决战略”、“网络战略”。

(一)、大规模破坏战略

大规模破坏战略是给对方带来巨大破坏力的战略,是“严惩报复战略”的一种。实现大规模破坏战略,需要具备超出对方的军事力量或者是具备能给对方带来决定性损失的军事手段。朝鲜用于大规模破坏战略的战力包括核武器在内的大规模杀伤性武器和炮兵部队。

大规模破坏战略是朝鲜为了保障“有事时”的作战胜利而制定的战略。1994年,朝鲜曾因美国威胁要对朝鲜的核设施进行军事打击而面临重大危机。可以说,这次危机的出现直接推动了金正日从遏制层面上制订大规模破坏的军事战略。

大规模破坏战略是拥有核武器的国家采取的最具代表性的战略。为了弥补“封锁战略”的不足,美国前总统艾森豪威尔曾提出了“大规模报复战略”。美国在拥有绝对核优势的基础上推行大规模报复战略,减少了国防开支,并在国际社会中确立了军事霸权地位。前苏联领导人赫鲁晓夫认为,在1962年的“古巴导弹危机”中,前苏联之所以遭到失败,主要原因是苏联与美国相比在核战力方面处于劣势。因此,赫鲁晓夫积极推进以核武器为主要战力的大规模报复战略,试图拥有与美国对等的军事实力。1964年,中国的第一颗原子弹爆炸成功后,中国的国际影响力、政治地位得到明显提升。可以说,通过核开发,采取遏制的报复战略,中国保护了自己国家的安全,并基于此确立了亚洲军事强国的地位。

如上所述,拥有核武器的国家,作为军事强国,可以在国际社会中占据优势地位。不但如此,还可以将核武器作为主要手段来推进大规模报复战略,以此来保证自己国家的安全。因此,朝鲜有可能会通过拥有核武器来推进大规模破坏战略。也就是说,大规模破坏战略不但可以使朝鲜有效应对各种外部威胁,还可以在“有事时”确保朝鲜取得胜利。6.25战争结束后,朝鲜与美国一直保持着停战状态。近几年,朝美关系因核问题、人权问题、伪钞问题等矛盾迭出、较量不断。在这种背景下,朝鲜认为随时都有可能与美国爆发战争。因此,朝鲜的大规模破坏战略极有可能在未来的朝美关系中发挥重要作用。

2006年,朝鲜劳动党宣传部副部长曾发表谈话称,一旦战争爆发,整个首尔将在30分钟内变成一片火海,10万名美军、70%的南朝鲜居民面临死亡,韩国经济的90%以上化为灰烬 。2010年7月24日,朝鲜国防委员会也曾发出威胁称,将在必要的时候启动基于核遏制力的朝鲜式的报复“圣战”。这意味着,“有事时”朝鲜将会利用大规模杀伤性武器来发动攻击。

(二)速战速决战略

金正日时期的“速战速决战略”是在外部势力增援韩半岛前结束战争的战略,是金日成战略的继承、延续与发展。海湾战争、阿富汗战争、伊拉克战争中,“速战速决战略”曾被广泛使用。很明显,通过“速战速决战略”,可以集中攻击并摧毁敌对国家的指挥设施及主力部队,掌握战争主导权,并在很短时间内胜利结束战争。之所以认为朝鲜将采用速战速决战略,主要理由如下:

1、朝鲜拥有相当规模的可以发动速度战的作战力量

朝鲜的装甲部队和机械化部队具备高度的机动能力,能够给对方造成强烈的冲击力与威慑力,炮兵部队可以集中打击敌核心目标,能够给对方造成极大的损失和破坏。朝鲜速度战的主要战力—装甲部队是韩军的1.7倍,炮兵部队是韩军的2.5倍。

2、朝鲜的部队编制整体上有利于机动作战

尽管朝鲜经济上面临诸多困境,但是朝鲜一直在加强军事力量建设。近年来,不但朝军的兵力规模和装备持续增加,部队结构改编时,也非常注重机动作战能力的建设。据韩国2010年发表的国防白皮书称,为提高部队战斗力,朝鲜整编部分军队,将两个机械化军整编为机械化师,将1个坦克军整编为装甲师,将1个炮兵军整编为炮兵师。此外,朝鲜还加强了前方部队的火力打击能力建设 。朝鲜军队的这些变化,为其实施速度战提供了可靠的保证。

3、朝鲜军队的大部分战斗力部署在前方地区

朝鲜在平壤-元山线以南地区前进部署了10多个军、60多个师/旅,约占朝鲜军队总体战斗力的70%。这样,只要朝鲜领导层下定决心,那么朝鲜军队不用重新调整部署,就可以随时投入到南侵作战中。2009年11月,第三次西海(韩半岛西部海域)海战发生后,朝鲜军队在其西海岸集中部署了240毫米火箭炮,对韩国西海及首都圈构成了直接威胁。可以说,朝鲜在前方部署大量军队的目的是为了在开战初期集中发动攻击,通过速度战重创韩国军队。

朝鲜强调,随着传统战争样式的变化,非线性作战、非接触作战等新的作战方式正在出现,现代战争可能会在前方和后方同时展开。这意味着朝鲜正规部队在前方发动正面攻击的同时,朝鲜特种部队可能向韩国后方地区发动干扰作战。不可否认,战场前后方同时展开,将对战争的速战速决起到决定性的作用。

4、网络战略

网络攻击是指利用计算机网络存在的漏洞和安全缺陷,对敌方军事、行政、人事等主要系统和资源发动的攻击,通常也被称为“没有枪声的战争”。随着计算机技术的快速发展及网络中心战概念的提出,现代战争的中心正在由传统的作战平台转向网络。从近几年的局部战争样式中也可以看出,网络作战正在作为战争的主要形态之一,起到了非常重要的作用。

2009年,金正日在朝鲜军队高级将领演讲会上发表谈话称,二十世纪的战争是油和炮弹的战争,二十一世纪的战争是信息战争。由此也可以看出,朝鲜非常重视网络战争。

网络攻击主要有两种方式 。第一种为非法侵入对方的信息系统,窃取系统保密信息、破坏目标系统数据的方式。第二种为不侵入对方信息系统,在外部破坏对方信息系统,使其功能无法发挥作用的方式。

从20世纪90年代起,朝鲜在平壤指挥自动化大学、计算机技术大学、金策工业综合大学等大力培养专业网络战人才。平壤指挥自动化大学隶属于人民军总参谋部,是朝鲜最具代表性的网络战人才培训机构,每年为军队培养出100多名计算机专业技术人员。据推测,朝鲜军队拥有的专业黑客规模达500名至600名。

美国、韩国等发达国家的军事战略严重依赖计算机网络。如果朝鲜发动网络攻击,就很容易导致韩国的网络系统出现混乱,影响到信息的传递与共享。在关键时刻,甚至还可能瘫痪整个网络,使韩国错过应对时机,从而给韩国带来致命的打击。在战争爆发前,朝鲜可能会在国内或海外,通过黑客入侵方式攻击韩国政府机关的网络。在战争期间,朝鲜还有可能干扰、破坏韩军的计算机网络,导致军队的整个计算机网络数据传输中断和系统瘫痪。

朝鲜的网络战略同样会对心理战产生积极影响。关于伊拉克战争,朝鲜认为,美帝之所以能够在伊拉克战争中取得胜利,与其说是高新技术武器发挥作用,不如说是心理战在发挥作用,并从思想上瓦解伊拉克导致的结果。从中可以看出,朝鲜非常重视心理战,并认为在未来战争条件下,心理战将贯穿于战争的全过程。朝鲜通过网络展开的心理战样式主要包括:在敌对国家或者支援国家网络上散布有利于朝鲜的信息及流言蜚语,甚至是假情报(细菌战、化学战、使用核武器、出现大规模伤亡)等,从而给敌对国家的公众带来恐慌,削弱敌对国家的战争意志。对于支援国家,通过大力制造反战舆论,迫使支援国家中止兵力增援,并尽早撤出已投入的兵力。

图-2:先军军事战略。

2
图-2:先军军事战略。 [保存到相册]

先军军事战略的主要特征是在金日成攻击性战略的基础上,为了维持政权,增加了防护性战略的内容。也就是说,金正日通过先军政治建立起来的先军军事战略,将由他的继承人金正恩去忠实地传承、延续和发扬。

虽然金日成时期的军事战略—先发制人奇袭战略、配合战略、速战速决战略是在常规战力基础上制定的,但是考虑到朝鲜武器装备体系的现状以及现代战争样式的变化,这些军事战略将会继续维持下去。基于先发制人奇袭战略,朝鲜军队的大部分兵力部署在前方地区。这样可以缩短部队部署、移动及接敌需要的时间,从而提高部队的机动性。基于配合战略,可以实现朝鲜军队正规战兵力与非正规战兵力的有效配合。这样可以提高作战效能,弱化对方军事力量,进而达成速战速决的目的。

二、先军军事战略的特征:追求军事冒险主义

金日成去世后,朝鲜在军事领域的最大变化是朝鲜进行了核开发。朝鲜不顾国际社会的强烈反对依然进行核开发,其目的就是在对美、对韩关系中,通过追求军事冒险主义来占据主动地位。

2010年12月,朝鲜人民武力部部长金永春指出,朝鲜革命武装已做好各种准备,在必要的时候将展开“基于核遏制力的朝鲜式圣战”。朝鲜革命武装不但要抵御侵略,还要扫荡敌大本营,消除战争根源,进而实现祖国统一的历史伟业 。此外,朝鲜在2009年新组建了侦察总局 ,进一步强化对外谍报部门的作用和职能。从朝鲜的这些举措中可以看出,朝鲜基于不断发展的军事力量,正在强化在韩半岛的军事冒险主义。

朝鲜之所以追求军事冒险主义,主要有如下原因:第一、历史的经验告诉朝鲜,追求军事冒险主义是非常必要的。朝鲜认为,20世纪60年代后期发生的捕获美国武装间谍船“普韦布洛”号事件和击落美国EC-121侦察机事件,是朝鲜与美国对峙中取得的重大胜利。因此,可以说,这两起事件成为朝鲜继续推进军事冒险主义的主要动因。第二、试图促使国际社会承认朝鲜是军事强国。朝鲜认为,公开进行军事武力示威或者发动军事挑衅活动,可以向国际社会展示其军事力量。也就是说,朝鲜在主张,拥有强大的军事实力才能引起人们的重视,建设强大的军队才是强国之本。第三、强大的军队可以用作强化其体制内部团结的有效手段。朝鲜认为,在北方限界线或者停战线附近发动军事挑衅,可以在朝鲜内部营造军事危机局面,而这种危机意识可以有效增强朝鲜内部的团结。

在如下情况下,朝鲜有可能采取军事冒险主义行动:第一、南北交流中断,军事紧张局势进一步升级。第二、朝鲜核问题毫无进展,朝美关系陷入僵局,关系严重恶化。第三、金正恩体制不稳定。军事冒险主义行动包括:实施核试验、发射远程导弹、在西海(韩国西部海域)及停战线附近发动局部挑衅。朝鲜认为,通过这些挑衅活动,可以增进人民内部团结,巩固与完善金正恩体制。

三、先军时代军事力量建设

(一)维持对韩国的军事优势

尽管朝鲜面临严重的经济困难,但是依然积极推进武器装备现代化建设,大力发展核武器、化学武器、导弹等大规模杀伤性武器,努力构建战略武器体系,推进基于强大军事力量的强盛大国建设。进入2000年后,朝鲜不但加强常备兵力建设,炮兵部队、装甲部队、特种作战部队等也得到了快速发展。据韩国2010年国防白皮书称,与2008年相比,朝鲜地面部队新增了4个师和1个机动旅,增加200多辆坦克。

表-1:南北军事力量比较。

1
表-1:南北军事力量比较。 [保存到相册]

*为了方便南北军事力量比较,将海军陆战队装备纳入陆军部队装备项目中进行了计算。

出处:国防部,《国防白皮书2010》(首尔:大韩民国国防部,2010)p.271.

朝鲜认为,只要美军撤出韩半岛 ,在保持对韩军事优势的情况下,朝鲜就可以实现“对南赤化统一”。无疑,朝鲜强化军事力量,为其实施大规模破坏战和速度战提供了可靠的保证。另外,朝鲜还认为前苏联崩溃和中国的改革开放,造成朝鲜的后援势力变弱。基于这种判断,朝鲜开始针对南方三角军事关系(韩国、美国、日本)大力加强军备建设,以提高其自主的军事应对能力。

(二)强化遏制战略

1、核开发

朝鲜从启动宁边5MWe核反应堆,到1992年6月接受国际原子能机构(IAEA)核查前,共获得了10 公斤至15 公斤的钚 。据分析,朝鲜一直利用这些钚来推进核武器研发计划。目前,朝鲜大约拥有40 公斤至50 公斤的钚,这些可以生产6枚至9枚核武器(制造1枚核武器需要 6 公斤至8 公斤的钚)。另外,朝鲜的铀(用于制造原子反应堆核燃料)储量非常丰富,整个埋藏量约2,600万吨,其中可采量为400万吨。

关于朝鲜的核能力,美国前国立核研究所所长赫克博士在《朝鲜在核心危机中学到的教训》一文中指出,朝鲜具备与美国在日本长崎投放的那颗原子弹相同威力的核武器制造能力。从目前的情形来看,朝鲜极有可能拥有初级核武器4-8枚。2010年4月9日,时任美国国务卿希拉里•克林顿在肯塔基州路易斯维尔大学发表题为《核不扩散》的演讲中称,据判断,朝鲜拥有 1-6枚核武器。这是美国政府官员首次在公开场合正式论及朝鲜拥有的核武器数量。2010年3月,通过东部战线归顺韩国的朝鲜人民军***在证词中称,2010年1月,他在参加政治学习时,政治教官曾指出“朝鲜是拥有核武器的国家,美国虽然是世界强国,但是不敢招惹朝鲜,完全是因为朝鲜拥有核武器”。

因此,可以认为朝鲜具备自主的核武器制造能力,拥有的核武器数量为1-8枚。但是,到目前为止,尚不清楚朝鲜将核武器搭载于导弹上进行发射的核武器小型化技术究竟发展到什么程度。

关于高浓缩铀(HEU)问题,2009年9月3日,朝鲜驻联合国前任代表朴吉渊曾指出,朝鲜已成功进行试验性铀浓缩,试验已进入最后阶段。铀浓缩若取得成功,意味着可以以较少的投入,连续进行大量生产,而且还不易被外界察觉 。与使用钚制造核武器的方式相比,使用铀的话,核武器的起爆装置制造起来会相对简单,而且还便于实现核武器小型化。为了能够将核武器搭载于野战炮或短程导弹上作为战术核武器来使用,很多核拥有国往往会选择使用铀来制造核武器。与发展常规战力相比,发展核武器投入的费用较少,并且能够有效弥补军事力量上的劣势。因此,越是国防力量薄弱的国家,为了具备遏制战争的手段,能够与大国进行军事对抗,越会大力发展核武器。

不难预计,朝鲜今后将努力通过发展小型化核武器,来提升对近距离军事目标的打击能力。韩半岛战场缺乏纵深,因此在韩半岛战场环境下,与远程核武器相比,能够进行近距离打击的战术核武器更能充分发挥作用 。另外,朝鲜还将通过构筑大规模的核武器生产体系,试图确立其军事强国的地位。

2、生化武器

从20世纪80年代起,朝鲜自主生产毒气弹和细菌武器,具备了一定程度的生化武器攻击能力。20世纪90年代起,朝鲜开始研发、生产及储备化生放(化学、生物、放射性) 武器和物资,具备了生物化学放射战执行能力。目前,朝鲜将2,500吨到5,000吨的化学作用剂分散保管在6个储藏设施中 ,化学武器的年均生产能力为4,500吨。另外,朝鲜还能够培养和生产炭疽菌、天花、霍乱、伤寒、瘟疫等13种生物武器。据悉,这些生物武器培养10天左右,就能直接投入使用。

朝鲜的生化武器将使用火炮、导弹、飞机等各种投放工具。开战初期,朝鲜极有可能在停战线一带集中使用化学武器,以此来摧毁韩军的防御阵地,为其发动攻击创造有利条件。朝鲜还有可能使用生化武器对韩国的首都圈、大城市等人口密集区发动无差别攻击,通过引发公众的恐慌心理来干扰军事作战。

3、导弹开发

朝鲜于1985年试射了射程为320公里至340公里的改进型飞毛腿-B型导弹,1989年试射了射程为500公里的飞毛腿-C型导弹,1993年5月试射了射程为1,300公里的劳动1号导弹,1998年8月试射了射程为1,800公里至2,500公里的大浦洞1号导弹,2006年7月和2009年4月试射了洲际弹道导弹(ICBM)水平的大浦洞2号导弹。

2004年,朝鲜成功研发射程为120公里的KN-02型地对舰短程导弹,并进行了实战部署。2007年,朝鲜又实战部署了利用移动式发射架发射的射程超过3,000公里的中程弹道导弹(IRBM)。2010年,朝军创建了“新型IRBM师”,该师隶属于人民军总参谋部导弹指导局。朝鲜之所以持续研发射程3,000公里以上的中程导弹,就是为了“有事时”打击向韩半岛增援的兵力,阻止美军及在太平洋地区活动的外部战力向韩半岛移动。虽然朝鲜的导弹射程有了明显增加,但是精确度并不高。因此,朝鲜为了对目标实施有效打击,不得不增加导弹的拥有数量。

表-2:朝鲜导弹开发现状。

1
表-2:朝鲜导弹开发现状。 [保存到相册]

出处:国防部,《大规模杀伤性武器问答百科》(首尔:国防部,2004年), p.35;参考《国防白皮书2010》。

朝鲜的弹道导弹,不但能够攻击韩国、日本,甚至包括美本土都在其威胁之下。朝鲜在加快导弹开发的同时,还积极推进核开发,这已引起了国际社会的高度关注。因为朝鲜一旦有能力在导弹上搭载核武器,其威胁范围及破坏力将会大幅增加。也就是说,朝鲜若能实现核武器小型化,即制造出1吨以下的核武器时,那就意味着朝鲜可以将核武器搭载在弹道导弹上来使用。

朝鲜的导弹生产能力在前苏联和中国的技术指导下,通过自主研发已达到相当的水平。普遍认为,朝鲜的导弹制造能力位居世界第六位。

(三)提升速战速决能力

朝鲜从20世纪80年代起,为了实施速度战,集中加强装甲部队、机械化部队建设。20世纪80年代末期,朝鲜开始生产前苏联T-62型坦克的仿制型-“天马号”坦克,这种坦克在水下5.5米深度也能够成功涉水渡河。此外,朝鲜还引进、生产、部署了23毫米对空火炮。2009年,朝鲜成功研制“天马号”坦克的改进型-“暴风号”坦克,并实战部署了2个“暴风号”坦克大队。朝鲜之所以重视机械化部队建设,主要是为了利用机械化部队的机动力和冲击力展开速度战。最近十年,朝鲜又增加部署了2,000多门火箭炮(从3,100多门增加到5,100多门),另外还在非武装地带(DME)附近地区部署了300多门远程火炮。朝鲜之所以前进部署火箭炮和远程火炮,就是为了在开战初期对韩国的首都圈进行集中打击 。

朝鲜海军装备有810多艘舰艇,包括战斗舰、潜艇、支援舰等。其中,约60%的舰艇部署在前方基地。水面战斗舰有警备舰、导弹艇、鱼雷艇、火力支援艇等420多艘,支援舰有登陆舰、气垫船等290多艘,潜艇有罗密欧级潜艇、鲨鱼级潜艇、南联级潜艇等70多艘。

在俄罗斯的技术支援下,朝鲜空军从20世纪90年代初起组装生产MIG-29最新式战斗机。1999年起,朝鲜从哈萨克斯坦引进了40多架MIG-21。另外,朝鲜还从俄罗斯引进了新型MI-8直升机。包括主力机种MIG-19/21, IL-28,SU-7/25等470多架飞机在内,朝鲜空军共拥有1,650架飞机。

进入2000年后,朝鲜创建了轻步兵师,轻步兵师隶属于前方军。另外,前方师的轻步兵大队扩编为轻步兵团。这样,朝鲜的特种部队实力明显增强,人数达20多万名。朝鲜之所以加强特种部队建设,是在充分考虑韩美联合部队战力优势现实及吸取伊拉克战争教训后,做出的决定。朝鲜特种部队大部分部署在平壤和元山以南地区,因此在开战初期就能马上投入使用。为了训练官兵的特种作战能力,朝军在师、军级部队设立了特种作战训练场。朝军根据韩半岛作战环境不断加强夜战、山岳战、巷战等特种科目的训练,使得部队的特种作战能力得到了明显提升。不难预计,在战争初期,朝鲜将通过地道、空中、海上等渗透方式,把特种兵力集中投放到韩国后方地区。这样,通过积极的配合战,使战争发展为速度战。

朝鲜军队以前方部队为中心,加强地面部队火力配置。另外,还创建或扩建特种部队。通过这些努力,朝军第一梯队的作战力量得以大幅增强。这为朝鲜军队在战争初期集中战斗力实施速度战打下了基础。

金日成去世后,朝鲜在发展核武器、导弹等战略武器的同时,常规战力的数量和水平也有所提升。普遍认为,朝鲜的军事力量得到了快速增长 。朝鲜通过大力加强军事力量的数量、质量建设,为实现其先军军事战略提供了必要的军事能力和手段。

第四部分 朝鲜军事行动展望

一、朝鲜危机状况评价

20世纪80年代末90年代初,东欧社会主义国家发生剧变。今天,反独裁政权的民主化抵抗运动正在蔓延和扩散。在这种复杂的国际环境下,一直以来维持独裁政权的朝鲜空前感到了巨大的困难和压力。前苏联的崩溃和中国的改革开放,开始让朝鲜怀疑其强大的后援国。2011年在埃及和利比亚等中东地区发生的茉莉花革命 ,使朝鲜的危机感进一步加重。目前,朝鲜正在构建金家王朝的世袭体制,但也面临着一系列的内外危机。

表-3:朝鲜面临的危机指数 可能出现的情况。
表-3:朝鲜面临的危机指数 可能出现的情况。 [保存到相册]

从朝鲜的内部危机层面来看,只要金正恩政权不稳定,那么围绕控制政权,随时都有可能发生内部争斗。另外,经济困难、粮食短缺等问题还可能引发朝鲜居民的不满情绪,从而导致朝鲜内部人心涣散、社会动荡不安。

从朝鲜的外部危机层面来看,朝鲜核危机恶化,国际社会加大对朝鲜的制裁力度,必将导致朝鲜经济面临更加严重的困难。朝鲜对韩发动军事挑衅活动,导致南北关系进一步紧张,南北交流中断,并可能发生新的南北军事冲突。另外,共产圈国家、长期独裁国家的崩溃等,随时都有可能波及朝鲜,并影响到朝鲜体制的稳定。

当朝鲜面临的危机指数升高时,为了维持其体制安全,朝鲜更有可能采取军事行动。与此相反,当朝鲜面临的危机指数相对较低时,比起采取军事行动,朝鲜更可能将精力放在加强其内部团结上。也就是说,当内部、外部危机严重时,朝鲜将会通过军事行动来加强内部管制,抵御外部威胁及压力,努力维护其政权稳定。当内部、外部危机出现缓和时,朝鲜将会把军队投入到经济活动中去,以期摆脱严重的经济困境。当外部危机严重,但是内部危机缓和时,朝鲜将会采取具体的军事行动来应对外部威胁,并以此加强内部团结。当外部危机出现缓和,内部危机严重时,朝鲜将会利用军队加强对居民的管制,并确保其体制稳定。

二、军事行动展望

如果朝鲜基于大规模杀伤性武器发动军事挑衅的话,朝鲜的危机指数将决定朝鲜的军事行动类型。朝鲜可能采取的军事行动大体上可分为四种类型。

图-3:朝鲜不同危机状况下的军事行动。

1
图-3:朝鲜不同危机状况下的军事行动。 [保存到相册]

在“状况I”下,朝鲜将发动全面战争。在这种状况下,朝鲜的对内、对外环境极度恶化,除了发动全面战争之外,别无其他方法可以选择。也就是说,因权力继承问题、粮食问题等,朝鲜陷入严重混乱,朝鲜体制面临崩溃的危机。另外,朝美关系因朝核问题陷入僵局,无回旋余地。这种情形下,朝鲜极有可能会选择全面战这种极端的行为。这时,朝鲜将利用战略武器—核武器和导弹威胁韩国和美国,并使用常规战力对韩国发动大规模破坏战和速度战。对于朝鲜而言,若要发动全面战还需要一个前提条件,即需要获得中国和俄罗斯的事前同意和积极援助。

在“状况II”下,朝鲜将对韩国发动局部挑衅。在这种状况下,朝鲜虽面临外部及内部危机,但是外部危机情况并非十分严峻。也就是说,尽管朝鲜因核问题等面临外部压力,但是这种外部危机并没有激化。从朝鲜的内部情况来看,朝鲜居民因粮食困难等问题,不满情绪高涨。政权整体上虽由金正恩所控制,但是出现了权力斗争的迹向。这时,朝鲜在停战线和北方限界线(NLL)一带发动军事挑衅,试图转移国内矛盾,加强内部团结,进一步巩固金正恩体制。2010年的“天安舰事件”和“延坪岛炮击事件”,就是两个典型的例子。当时,金正日为了确立其权力继承体制,发动了对韩军事挑衅活动。

在“状况III”下,朝鲜将采取缓解军事紧张的措施。在这种状况下,无论是外部危机,还是内部危机均不严重,紧张局势趋于缓和。也就是说,对外来讲,朝核问题朝着有利于朝鲜的方向发展,经济问题得到了一定程度的解决。对内来讲,金正恩体制得到了确立及巩固,朝鲜政治稳定,社会安定,内部没有权力斗争。这时,朝鲜将会推进类似于中国的改革开放路线,同时采取裁减军备等积极措施,以确立新的对韩、对美关系。

在“状况Ⅳ”下,朝鲜将进行军事武力示威。在这种状况下,朝鲜的外部危机严重,而内部危机不明显。也就是说,尽管朝鲜内部存在着粮食困难等问题,但是其内部管制非常成功。对外来讲,国际社会因核问题、非法武器出口问题、人权问题等加大了对朝鲜的施压力度,朝鲜的友好势力—中国和俄罗斯中止对朝鲜的支援或采取不理睬措施时,朝鲜将会通过核试验及导弹试射来寻求对外政治协商的途径。另外,为了凸显金正恩的作用,对内对外展示强盛大国建设的辉煌成就,朝鲜也有可能会继续进行核试验或导弹试射活动。

从以上四种状况来看,最有可能发生的是“状况II”,即朝鲜发动局部挑衅活动。目前,南北韩关系陷入僵局。金正日去世后,金正恩体制充满了不稳定性和不确定性。为了缓解内部矛盾,朝鲜很有可能发动对韩挑衅活动。特别地,如果朝鲜内部出现权力斗争,或者金正恩体制受到挑衅或冲击,金正恩为了展示其强大的领导力,在铲除反对势力的同时,极有可能会发动对韩国的挑衅活动。朝鲜可能选择的挑衅方式主要有:在半岛西部海域或东部海域利用潜艇发动攻击;占领或炮击西海(韩国西部海域)五岛;在停战线一带制造军事冲突;实施恐怖活动,给韩国社会制造混乱等。

最不可能发生的是“状况I”,即朝鲜发动全面战争。朝鲜很清楚发动全面战争,意味着与韩美联合战力进行作战。显然,朝鲜军队的战斗力水平与韩美联合战力相比,处于绝对劣势。因此,朝鲜若想发动全面战争,势必需要得到中国和俄罗斯的全力支持和大力帮助。但是,从现实的情况来看,俄罗斯和中国都不会轻易介入韩半岛战争。前苏联解体后,俄罗斯国力大伤, 一直没有恢复元气。因此,俄罗斯很难对朝鲜进行有效的援助。中国虽然强调朝鲜与中国是唇齿相依的友好邻邦,但是中国正在坚定不移地推进改革开放,积极促进经济增长。在这种背景下,中国显然不愿意与美国对立,介入韩半岛战争,破坏来之不易的和平稳定发展环境。

第五部分 结束语

金正日政权为了保持对韩军事领域的优势,重点发展核武器、导弹等非对称战力。可以说,朝鲜的军事力量建设充分体现了大规模破坏战略、速战速决战略、网络战略。

“大规模破坏战略”是为了确保“有事时”作战胜利确立起的战略。1994年,美国威胁要对朝鲜的核设施进行轰炸。这一危机,促使朝鲜从遏制层面确立“大规模破坏战略”起到了决定性的作用。“速战速决战略”是在金日成军事战略的基础上确立的,朝鲜的航空部队、装甲部队、机械化部队等将在速度战时充分发挥作用,朝军的部队结构也是围绕有利于机动作战而编制的。综合考虑这些因素,朝军将在今后相当长的时间内,继续维持速战速决战略。“网络战略”同样是朝鲜可能会采用的军事战略。目前,朝鲜拥有相当数量的专业黑客,再加上美国、韩国等发达国家的军事战略严重依赖计算机网络。如果朝鲜的“网络战略”能够发挥作用,将会直接影响韩美联合部队作战力的发挥。

先军军事战略是在金日成攻势概念的军事战略基础上,增添了金正日防御概念的军事战略。即,先军军事战略是金正日为了维护其政权稳定和社会主义体制安全做出的具体选择。金正日曾多次强调,现代战争是新的形态的战争,其特征是高度扩大的立体战、信息战、非对称战、非接触战、精确打击战、短时间速决战,并要求部队为适应现代战争做好战斗准备。从中可以看出,金正日已认识到改变过去那种常规战法的必要性,认为只有采取能够应对现代战争的新的战法,才有可能在未来战争中取得胜利。因此,可以说,朝鲜的先军军事战略充分反映了金正日军事思想的战争遂行方法。

从朝鲜的军事战略变化和军事力量发展方向来看,朝鲜今后最有可能采取的军事行动是发动对韩国的局部挑衅。在金正恩政权不稳定、南北关系陷入僵局的情况下,朝鲜有可能在西海(韩国西部海域)或者停战线附近发动局部挑衅活动,也有可能进行远程导弹试射、核试验等来展示武力,以此来谋求体制安全。朝鲜通过这些军事武力行动,试图转移内部矛盾,加强内部团结,巩固金正恩政权。作为韩国,面对各种威胁及复杂情况,需制订具体的、有效的、切实可行的应对方案。

Original URL:

http://mil.sohu.com/20130701/

美國軍事網絡戰:黑客入侵防禦成為無菸的戰爭 // American military network warfare: hackers attack and defense creating a war without smoke

美國軍事網絡戰:黑客入侵防禦成為無菸的戰爭

American military network warfare: hackers attack and defense creating a war without smoke

Hackers may also be soldiers. Recently, the US Internet security company and the government issued a series of reports that “the Chinese military to participate in hacking.” With the “China hacker threat theory”, the US government immediately announced the latest anti-hacking strategy, although the Chinese Ministry of Foreign Affairs and the Ministry of Defense in a timely manner to make a refutation, but for a time, hacker news from the army or aroused everyone’s interest. In fact, the United States is the world’s largest Internet hacker location, has a huge network of troops.

As the daily consumption from the physical store to the transfer of electricity, and now the war has also moved from the line to the line. Not only the United States, Europe and the United States and Asia, many countries have begun to set up their own “network forces” – hackers is to become a frequent visitor to this service. And how these countries are leading the “formal” network of the army.

In 007 “skyfall” in the lovely Mr. Q is a network war master.

In May 2010, the US Department of Defense set up a network warfare headquarters officially launched, the US military strategic headquarters in September 1, 2010 before the development of a network warfare philosophy and plans, and plans in the next few years to expand the network security forces to 4900 people. This marks the United States intends to military hegemony from the land, sea, sky and space to the so-called “fifth field” of the network space extension.

It is reported that the United States is currently recruiting 2,000 to 4,000 soldiers, set up a “network special forces.” This unit not only to assume the task of network defense, but also to other countries of the computer network and electronic systems for secret attacks. According to Xinhua reported that a former US Air Force Major John Bradley at a meeting in 2002, said the United States spent on network attacks on the study than the network defense much more, because the senior staff of the former more Interested. And, the US military network attack time may be much earlier than we imagined.

In the Iraq war that began in 2003, the US military used the cyber warfare more widely. Before the war, thousands of Iraqi military and political officials in their e-mail mailbox received the US military sent the “persuade the letter”, resulting in a great psychological impact. Less than four hours after the war, Al Jazeera English website will be the US military “ban”, can not function properly.

In addition, the United States also in 2006 and 2008 has held two code-named “network storm” large-scale network war exercises.

Japan and South Korea: already set up a “network army”

At the end of 2009, the Ministry of Defense of Japan decided to establish a special “cyber space defense team” in 2011 to guard against hacker attacks and strengthen the ability to protect confidential information. According to the Japanese “Yomiuri Shimbun” reported on May 1, 2011, “cyberspace defense team” plan is set in the SDF command communications system under the initial number of about 60 people. This “network force” is responsible for collecting and analyzing the latest virus information, and anti-hacker attack training.

Japan’s network warfare is through the master “system of network” to paralyze the enemy combat system. Japan in the construction of network combat system, emphasizing the “offensive and defensive”, allocated large sums of money into the network hardware and “network warfare” construction, respectively, the establishment of the “defense information communication platform” and “computer system common platform”, to achieve the SDF Organs, forces network system of mutual exchange and resource sharing. And set up by the 5000 people of the “cyberspace defense team”, developed the network operations “offensive weapons” and network defense system, now has a strong network attack combat strength.

The DPRK this “enemy”, South Korea in 1999 put forward the overall vision of the future information construction, announced in 2009 will be the formation of “network command”, and officially launched in 2010. At present, South Korea already has about 20 million received professional training of the huge personnel, and 5% of annual defense funds are used to develop and improve the implementation of the core technology of network warfare.

Britain and Russia: enlisted hackers

Network forces hackers preferred, as early as 1998, because of the successful invasion of the US Pentagon computer system, Israel’s 18-year-old boy hacker Tenenbaum put on uniforms to become an Israeli soldier. Subsequently, the British government also in 2009, including former hackers, including network elite to defend the network security. They are young, diverse in background, some have been hackers, and even minor cybercrime.

On June 25, 2009, the UK government introduced its first national cybersecurity strategy and announced the establishment of two new departments of cybersecurity, the Network Security Office and the Network Security Operations Center, which are responsible for coordinating government security and coordination of government and government The security of the main computer system of civil society.

India in 2007 formed a land, sea and air armed forces joint emergency team, and enlisted hackers. At the same time, by absorbing the civil master enlisted and the cadet students “hacker” technical training, etc., and gradually complete the future network war talent pool.

Military power Russia in the 1990s on the establishment of the Information Security Committee, specifically responsible for network information security, launched in 2002, “Russian Federal Information Security Theory”, the network information warfare compared to the future “sixth generation of war.” Russia already has a large number of network elite, anti-virus technology is walking in the forefront of the world, in the event of a threat or need, these talents and technology will soon be transferred to military use.

“Black door”: ridiculous blame

Although there is no factual basis, but the US Internet security companies and the government is still often create “hacker door”, directed at China, not only involving colleges and universities, enterprises, as well as technical schools such as Shandong Lan Xiang, there are network individuals, now point to the Chinese military, Even to provide “hacker headquarters building” photos. However, the relationship between the IP address alone, “the source of the attack from China,” highlighting the ignorance of the relevant US people.

How do hackers use their own computer to attack? How can I leave a registered IP address? They usually through the springboard control of third-party computer to form a botnet and then attack. Take the initiative to expose the IP address left traces, is it a professional hacker!

China’s Ministry of Defense International Bureau of Communications Deputy Director Meng Yan wrote that the United States in the transformation of the way to render the Chinese hacker attack trick, even ignore itself is the network virtual space “rule makers.” 2012, 73,000 foreign IP addresses as Trojans and botnet control server to participate in the control of more than 1,400 million hosts in China, 32,000 IP through the implantation of the back door of China’s nearly 38,000 sites in the implementation of remote control, which originated in the United States The number of network attacks ranked first.

Hacker attack and defense: no smoke of the war

Only a few minutes, the domestic password experts, Tsinghua University Distinguished Professor Wang Xiaoyun and her research team with ordinary personal computers, will be able to crack MD5 password algorithm. Before her, even with the fastest giant computer, but also to calculate more than 1 million years to crack.

If this is a war, you can not hear the sound and can not see the smoke. Hackers often through the acquisition of passwords, place Trojan horse program, e-mail attacks, node attacks, network monitoring, find system vulnerabilities, steal privileges and so on, and the use of WWW spoofing technology, the use of account attacks, etc. to launch network attacks.

Reporters learned that the current “hanging horse” (that is, in the page to load Trojan virus), “phishing” (forged WEB site or e-mail, etc.) and other ways to become the mainstream of hacker attacks.

Original Mandarin Chinese:

 

黑客也可能是戰士。近日,美國網絡安全公司和政府接連發布報告稱“中國軍方參與黑客攻擊”。借助“中國黑客威脅論”,美國政府隨即公佈最新反黑客戰略,儘管中國外交部和國防部及時對此做出駁斥,但一時間,黑客從軍的消息還是激起大家的興趣。其實,美國才是世界上最大的網絡黑客所在地,擁有龐大的網絡大軍。

如同日常消費從實體店向電商轉移,如今戰爭也已經從線下搬到線上。不僅是美國,歐美亞等洲許多國家都已經著手建立本國的“網絡部隊”——黑客更是成為此軍種的常客。而這些國家又是如何領導這批“正規”的網絡大軍。

在007《skyfall》中可愛的Q先生就是一名網絡戰的高手。

2010年5月,美國國防部組建網絡戰司令部正式啟動,美軍戰略司令部要求在2010年9月1日前製訂出網絡戰作戰理念和計劃,併計劃在隨後幾年把網絡安全部隊擴編到4900人。這標誌著美國打算將軍事霸權從陸地、海洋、天空和太空向號稱“第五領域”的網絡空間延伸。

據悉,美國目前正在招募2000至4000名士兵,組建一支“網絡特種部隊”。這支部隊不僅要承擔網絡防禦的任務,還將對他國的電腦網絡和電子系統進行秘密攻擊。據新華網報導,一位前美國空軍少校約翰·布萊德利在參加2002年一次會議時就表示,美國花在網絡攻擊上的研究比網絡防禦上要多得多,因為高層人員對前者更感興趣。並且,美軍實施網絡攻擊的時間可能比大家想像的要早得多。

而在2003年開始的伊拉克戰爭中,美軍更為廣泛地使用網絡戰手段。戰前,數千名伊拉克軍政要員在他們的電子郵件信箱中收到美軍發來的“勸降信”,造成很大的心理影響。開戰後不到4個小時,半島電視台英語網站便被美軍“封殺”,不能正常運作。

另外,美國還於2006年和2008年先後舉行了兩次代號為“網絡風暴”的大規模網絡戰演習。

日韓:早已組建“網絡軍隊”

2009年底日本防衛省即決定,在2011年度建立一支專門的“網絡空間防衛隊”,以防備黑客攻擊,加強保護機密信息的能力。據日本《讀賣新聞》2011年5月1日報導,“網絡空間防衛隊”計劃設置於自衛隊指揮通信系統部之下,初期人數約60人。這支“網絡部隊”負責收集和分析研究最新的病毒信息,並進行反黑客攻擊訓練。

日本網絡戰是通過掌握“製網權”達到癱瘓敵人作戰系統。日本在構建網絡作戰系統中強調“攻守兼備”,撥付大筆經費投入網絡硬件及“網戰部隊”建設,分別建立了“防衛信息通信平台”和“計算機系統通用平台”,實現了自衛隊各機關、部隊網絡系統的相互交流和資源共享。並成立由5000人組成的“網絡空間防衛隊”,研製開發的網絡作戰“進攻武器”和網絡防禦系統,目前已經具備了較強的網絡進攻作戰實力。

而對朝鮮這個“敵人”,韓國在1999年提出了未來信息建設的總體設想,2009年宣布將組建“網絡司令部”,並於2010年正式啟動。目前,韓國已經擁有了約20萬接受過專業訓練的龐大的人才隊伍,而且每年國防經費的5%被用來研發和改進實施網絡戰的核心技術。

英俄:徵召黑客入伍

網絡部隊黑客優先,早在1998年,因為成功入侵美國五角大樓電腦系統,以色列18歲的少年黑客Tenenbaum穿上軍裝成為一名以色列士兵。隨後,英國政府也於2009年徵召包括前黑客在內的網絡精英保衛網絡安全。他們年輕,背景多樣,有的曾經是黑客,甚至有輕度網絡犯罪行為。

在2009年6月25日,英國政府出台首個國家網絡安全戰略,並宣布成立兩個網絡安全新部門,即網絡安全辦公室和網絡安全行動中心,分別負責協調政府各部門網絡安全和協調政府與民間機構主要電腦系統安全保護工作。

印度則在2007年組建了陸、海、空三軍聯合計算機應急分隊,並徵召黑客入伍。同時,通過吸納民間高手入伍和對軍校學員進行“黑客”技術培訓等方式,逐步完成未來網絡戰的人才儲備。

軍事大國俄羅斯上世紀90年代就設立了信息安全委員會,專門負責網絡信息安全,2002年推出《俄聯邦信息安全學說》,將網絡信息戰比作未來的“第六代戰爭”。俄羅斯已經擁有了眾多的網絡精英,反病毒技術更是走在了世界的前列,在遇到威脅或有需要時,這些人才和技術將能很快地轉入軍事用途。

“黑客門”:可笑的指責

雖然沒有事實依據,但美國網絡安全公司和政府仍然屢屢製造“黑客門”,矛頭直指中國,不僅涉及高校、企業,還有技校如山東藍翔,也有網絡個體,如今則指向中國軍方,甚至提供“黑客總部大樓”照片。然而,僅憑IP地址的關係就得出“攻擊源頭來自中國”,凸顯美國相關人士的無知。

黑客怎麼用自己的電腦發動攻擊?又怎麼會留下註冊IP地址?他們通常是通過跳板控制第三方電腦形成殭屍網絡再展開攻擊。主動暴露IP地址留下痕跡,豈是專業黑客所為!

中國國防部國際傳播局副局長孟彥日前撰文稱,美國各界在變換手法渲染中國黑客攻擊把戲時,竟然無視自身才是網絡虛擬空間的“規則制定者”。 2012年,7.3萬個境外IP地址作為木馬和殭屍網絡控制服務器參與控制中國境內1400餘萬台主機,3.2萬個IP通過植入後門對中國境內近3.8萬個網站實施遠程控制,其中源自美國的網絡攻擊數量名列第一。

黑客攻防:無硝煙的戰爭

只需要幾分鐘,國內密碼專家、清華大學特聘教授王小雲和她的研究小組用普通的個人電腦,就能破解MD5密碼算法。在她之前,即使採用最快的巨型計算機,也要運算100萬年以上才能破解。

如果這是戰爭,則聽不到聲音看不到硝煙。黑客往往通過獲取口令、放置特洛伊木馬程序、電子郵件攻擊、節點攻擊、網絡監聽、尋找系統漏洞、偷取特權等以及利用WWW欺騙技術、利用賬號攻擊等方式發起網絡攻擊。

記者了解到,目前“網頁掛馬”(即在網頁中加載木馬病毒)、“網絡釣魚”(偽造WEB站點或電子郵件等)等方式成為黑客攻擊的主流行為。

Russian Ministry of Defense set up information operations forces to deal with Western networks – psychological attacks // 俄國防部組建信息作戰部隊 應對西方網絡-心理攻擊

Russian Ministry of Defense set up information operations forces to deal with Western networks – psychological attacks // 俄國防部組建信息作戰部隊 應對西方網絡-心理攻擊

With the Russian and Western cyber space in the game is becoming increasingly fierce, especially in the 2018 Russian presidential election near the background, the Western countries for Russia’s network and information / psychological attacks increasing. To this end, Russia to strengthen the network and information security construction. At the end of 2016, the revision of the new edition of the Russian Federation Information Security Theory. February 27, 2017, Russian Defense Minister Shaoyou announced the formation of information operations forces, accelerate the construction of information combat forces, clear its functional mission.

First, the new theory clearly set up the purpose of information combat forces and their functions

December 6, 2016, Russian President Vladimir Putin approved the new version of “Russian Federation information security theory.” It points out that the main objectives of information security in the field of defense include the implementation of strategic containment and prevention of military conflicts caused by information technology, the improvement of the Russian armed forces information security system, the development of information confrontation forces and equipment, the forecasting, inspection and evaluation of the Russian armed forces Threats in the field of information; elimination of information / psychological effects aimed at destabilizing national history and patriotic traditions.

The formation of information combat forces is one of Russia’s important initiatives to achieve these goals. First of all, the Russian information combat forces is to contain and prevent the field of network information conflict or the main force of war. Second, the formation of information combat forces is the Russian armed forces information security system construction and the Russian new military reform an important step, will take into account the strength of construction and equipment development. Once again, the information warfare forces ensure that Russian armed forces are protected from cyber attacks and information security threats, ensuring wartime command and control and operational capability. Finally, the information warfare forces will also confront and counter the Western countries of the anti-Russian information penetration and psychological impact, to maintain the fighting morale and national stability.

Second, the troops named on the network attack and information penetration of the “two-handedly”

Russian Defense Minister Shao Yigu pointed out that the main functions of the information combatants include: centralized management of network operations; protection of Russian military networks and nodes, military command systems and communications systems from hackers; to ensure reliable access to information; Russian military capacity to expand its ability to act in cyberspace; against the Western anti-Russian information / psychological propaganda and penetration.

Russian military experts believe that the future of military struggle in the information combat objectives not only include the armed forces allegation system, the government administrative system and the financial system and other hard targets, more strategic is the soldiers and public psychology and other soft targets. An attack on the implementation of soft targets such as soldiers and people can lead to dislocation and disintegration. Information combat forces should not only have to protect their own side and attack each other hard targets and other capabilities, but also have to confront and oppose the enemy information / psychological attack and penetration. At present, countries with network dominance use different means to implement information operations against different objectives. For the use of special information weapons, such as computer viruses, information bombs, logic bombs, computer chips that are given special missions, explosive devices that generate electromagnetic pulses, UHF generators, and electronic biological weapons. And for the soldiers and the public psychological and other soft targets, create provocative or intimidating false information and spread through the information media to achieve military and political purposes.

Therefore, Russia will be named the “information combat forces” rather than the network combat forces fully embodies the scope of its combat both soft and hard targets.

Third, the integration of active elite forces and the recruitment of new forces simultaneously

The force will integrate the existing Russian armed forces network operations, electronic reconnaissance and electronic confrontation and other departments and functions, while absorbing the Ministry of Internal Affairs and security system of network information security and related experts, including mathematicians, programmers, engineers, cryptographers , Communications experts, electronic confrontation experts, translators and so on.

Russian military arms and institutions in 2013 has set up a “technology even”, and from college graduates in the recruitment of professionals, which is the key components of the military system / unit reserves and training professionals specializing in technology research and development and information security team. According to statistics, this force mainly includes the Air Force’s second science and technology even the space and defense forces of the third technology even under the Army’s fifth technology even, under the Military Academy of Sciences, the seventh technology even Wait. Each with 2 to 3 rows, each with about 20 people. To the air days of military science and technology, for example, the troops regularly recruit college graduates, give priority to the use of computer security, communications systems, information security, special radio systems, cryptography, electronic optoelectronic special equipment and other professionals, by the Air Force Academy of Military Academy training and education The center is responsible for training new people.

Fourth, the force commander has not yet determined, Gracimov is the most likely candidate

Russian Defense Minister Shaoyou clear, information warfare force commander will be general rank. Western countries believe that the Russian armed forces, the current chief of staff, Mr. Grazimov served as the commander of the information operations the possibility of the largest. He has proposed the Russian version of the “mixed war” concept, and received the approval of President Putin. He pointed out that “the current principle of war itself has undergone substantial changes, the realization of political and strategic objectives of the non-military means of the status of a series of events show that the effect of non-military means sometimes more than the use of weapons.” In his description of the “civil war in Ukraine” and “the spring of Arabia”, he pointed out that the information / psychological warfare could “turn a peaceful and prosperous country into a brutal armed struggle in months or even days”. March 4, 2017, Grazimov in military academy, asked the Russian Academy of Military Sciences to intensify the study of the new model of confrontation between countries and effective counter-measures. In addition, the West speculated that Gerasimov’s another reason is that he has served as the Russian armed forces network information warfare the highest commander. In 2010, the Russian Armed Forces commanded a powerful message / psychological offensive, and it was Gracimov who had recaptured the Crimea.

Five, conclusion

At present, the Russian Defense Ministry official website has not yet put information warfare troops, and the existing army, air force, navy and strategic missile soldiers, airborne soldiers of these five arms tied. The forces become separate forces or scattered in the existing five arms and key sectors are not yet known. However, the formation of information combat forces is not only a key step in the construction of Russian network information security forces, but also an important step in the reform of the Russian army in the context of the increasingly fierce network security of information security and the increasingly complex environment of security. Information operations forces will defend Russia’s cyberspace and information in the field of soft and hard targets, to achieve their own attack and defense functions, maintaining national network security and political and military security.

Original Mandarin Chinese:

隨著俄羅斯與西方在網絡空間的博弈日趨激烈,特別在2018年俄總統大選臨近的大背景下,西方國家針對俄羅斯的網絡和信息/心理攻擊日益增多。為此,俄羅斯加強網絡和信息安全建設。 2016年底,修訂頒布新版《俄羅斯聯邦信息安全學說》。 2017年2月27日,俄國防部長紹伊古宣布組建信息作戰部隊,加快推進信息作戰力量建設,明確其職能使命。

一、新版學說明確組建信息作戰部隊的目的及其職能

2016年12月6日,俄總統普京批准新版《俄羅斯聯邦信息安全學說》。其中指出,國防領域信息安全保障的主要目標包括:對利用信息技術導致的軍事衝突實施戰略遏制和預防;完善俄武裝力量信息保障體系,發展信息對抗力量和裝備;預測、檢查和評估俄武裝力量在信息領域的威脅;消除旨在動搖國家歷史觀念和愛國傳統的信息/心理影響等。

組建信息作戰部隊是俄實現上述目標的重要舉措之一。首先,俄羅斯信息作戰部隊是遏制和預防網絡信息領域衝突或戰爭的主要力量。其次,組建信息作戰部隊是俄武裝力量信息保障體系建設和俄羅斯新軍事改革的重要步驟,將兼顧力量建設和裝備發展。再次,信息作戰部隊確保俄武裝力量免受網絡攻擊和信息安全威脅,保證戰時指揮控制和作戰行動能力。最後,信息作戰部隊還將對抗和反制西方國家的反俄信息滲透和心理影響,保持士兵鬥志和國民思想穩定。

二、部隊命名體現對網絡攻擊和信息滲透的“兩手抓”

俄國防部長紹伊古指出,信息作戰部隊主要職能包括:對網絡作戰行動進行集中統一管理;保護俄羅斯軍用網絡和節點、軍事指揮系統和通信系統免受黑客攻擊;確保實現可靠的信息傳遞通道;檢驗俄軍的網絡能力,拓展其在網絡空間的行動能力;對抗西方的反俄信息/心理宣傳和滲透等。

俄軍事專家認為,未來軍事鬥爭中的信息作戰目標不僅包括武裝力量指控系統、政府行政管理系統和金融系統等硬目標,更具戰略意義的是士兵和民眾心理等軟目標。對士兵和民眾等軟目標實施的信息攻擊,可導致人心渙散和瓦解。信息作戰部隊不僅要具備保護己方和攻擊對方硬目標等能力,還要具備對抗和反制敵方信息/心理的攻擊與滲透。當前,擁有網絡主導權的國家針對不同目標運用不同手段實施信息作戰。針對硬目標使用特殊的信息武器,如計算機病毒、信息炸彈、邏輯炸彈、被賦予特殊使命的計算機芯片、能產生電磁脈衝的爆炸裝置、超高頻發生器、電子生物武器等。而針對士兵和民眾心理等軟目標,製造煽動性或恐嚇性的虛假消息並通過信息媒介傳播,以達到軍事政治目的。

因此,俄將該部隊命名為“信息作戰部隊”而非網絡作戰部隊充分體現了其作戰範圍兼顧軟硬兩類目標。

三、整合現役精銳力量和招募高校新生力量並舉

該部隊將整合現有俄羅斯武裝力量網絡作戰、電子偵察和電子對抗等部門人員和職能,同時吸收內務部和安全系統的網絡信息安全及相關專家,包括數學家、程序員、工程師、密碼學家、通信專家、電子對抗專家、翻譯人員等。

俄各軍兵種和機關在2013年先後組建“科技連”,並從高校畢業生中招募專業人才,這是軍隊系統各關鍵部門/單位儲備和培養的專門從事技術研發和信息安全保障的隊伍。據資料顯示,這支力量主要包括隸屬於空天軍的空軍第二科技連和空天防禦部隊的第三科技連、隸屬於陸軍的第五科技連、隸屬於軍事通訊科學院的第七科技連等。每個連有2~3個排,每個排約20人。以空天軍“科技連”為例,部隊定期招收高校畢業生,優先錄用計算機安全、通訊系統信息安全、特種無線電系統、密碼學、電子光電特種設備等專業人員,並由空軍軍事科學院培訓教育中心負責培養新人。

四、部隊司令尚未確定,格拉西莫夫是最大可能人選

俄國防部長紹伊古明確,信息作戰部隊司令將是大將軍銜。西方國家認為,俄武裝力量現任總參謀長格拉西莫夫大出任信息作戰部隊司令的可能性最大。他曾提出俄版“混合戰爭”概念,並得到普京總統的認同。他指出,“目前的戰爭原則本身已發生實質性改變,實現政治和戰略目標的非軍事手段的地位在上升。一系列事件表明,非軍事手段的效果有時超過了使用武器”。他在對“烏克蘭內戰”和“阿拉伯之春”等事件的描述中指出,信息/心理戰能夠將“一個祥和繁榮的國家在幾個月甚至幾天之內變成殘酷武裝鬥爭的戰場”。 2017年3月4日,格拉西莫夫在參加軍事學術會議時,要求俄軍事科學院加緊研究國家間對抗的新模式及有效反製手段。此外,西方推測格拉西莫夫的另一原因是,他此前一直擔任俄武裝力量網絡信息作戰的最高指揮官。 2014年指揮俄武裝力量發動強大信息/心理攻勢,兵不血刃收復克里米亞的正是格拉西莫夫。

五、結語

目前,俄國防部官方網站還沒有將信息作戰部隊,與現有的陸軍、空天軍、海軍和戰略導彈兵、空降兵這五大軍兵種並列放置。該部隊成為單列軍兵種亦或散佈於現有五大軍兵種和關鍵部門還未可知。但信息作戰部隊的組建不僅是俄羅斯網絡信息安全力量建設的關鍵舉措,更是在大國網絡信息安全博弈日益激烈和安全環境日益複雜的大背景下俄軍改革的重要步驟。信息作戰部隊將保衛俄羅斯網絡空間和信息領域的軟、硬目標,實現自身的攻、防職能,維護國家網絡信息安全和政治軍事安全。

 

作者:易鑫磊 來源:中國日報網

http://world.chinadaily.com.cn/2017-06/19/content_29801583.htm

網絡空間治理的力量博弈、理念演變與中國戰略 // Power Game of Network Space Governance, Evolution of Ideas & China’s Strategy

網絡空間治理的力量博弈、理念演變與中國戰略

Power Game of Network Space Governance, Evolution of Ideas & China’s Strategy

Introduction
The global cyberspace governance process involves not only the complex game of information developed countries and information developing countries in the fields of Internet key resources, network power and network security, but also the mutual game between government, private sector and civil society. “Prism door incident” in the intensification of cyberspace governance game at the same time, but also to promote the policy position of the parties continue to adjust to increase the possibility of governance cooperation. At the same time, the cyberspace game also reflects the Internet governance and cyberspace governance and other related governance concepts of mutual conflict and integration trend. At present, China’s participation in global cyberspace governance still faces many challenges. China needs to be based on the development trend of network space game and the evolution of governance concept. Combining with the strategy of network power in the “13th Five-Year Plan”, this paper constructs long-term, complete and comprehensive aspects of international mechanism shaping, talent cultivation and technology development as the core Participation strategy.
In June 2013, former US National Security Agency (NSA) former employee Edward Snowden disclosed the council’s “prism” monitoring program. The event [1] made cyberspace governance in the international agenda in the priority of the re-ascension, but also exacerbated the differences in the position of the parties, leading to cyberspace governance in trouble, for the network space management system to create a great challenge The In addition, the international community on the complexity of cyberspace and its governance lack of clear, unified awareness, resulting in one-sided position and a single policy to further exacerbate the governance dilemma. In the face of the complex situation, Joseph Nye tries to explain the practice of cyberspace governance by referring to the theory of mechanism complex in the field of environmental governance, and analyzes the cyberspace management through the loosely coupled complex composed of many different governance mechanisms The [2] This provides a useful perspective for the analysis of cyberspace governance, that is, cyberspace governance is composed of multiple rather than a single governance mechanism, the interaction between the various mechanisms have an impact on governance. This paper intends to examine the development of cyberspace governance from a more macro perspective, and try to explore the evolution of the concept behind cyberspace game, and analyze the complex relationship between government, private sector and civil society in international and domestic levels The On this basis, to explore China’s response measures and participate in cyberspace governance strategy.

First, the power of cyberspace governance Game

network space management process with the government between the game process. According to the situation of network technology, network capacity and network utilization, governments can be divided into three categories: information developed countries, information developing countries and information undeveloped countries. [③] There are also international organizations to use the network readiness (Readiness) as an indicator to measure the degree of information technology. This ranking basically overlaps with the traditional developed, developing and underdeveloped countries, and of course there is also the level of informationization in individual developing countries rising to the ranks of developed countries, or the level of information in some developing countries The level of the developed countries. Therefore, in accordance with the information developed countries, developing countries and underdeveloped countries to divide the three points in the academic more accurate. There are three aspects of the power game of cyberspace governance: one is the game between the developed countries and the information developing countries in the network ownership, the network resource allocation; the second is the non-governmental actors and the government on the Internet key resource control, network security And freedom and other issues of the game; Third, as the dominant space in cyberspace, the US government in its own private sector, civil society and other countries in the Internet between the key resources and other issues on the game (Figure 1).

First of all, information between developed countries and information-developing countries around the network space between the key infrastructure and network technology between the game. According to the behavior, the topic and the characteristic of the power game in cyberspace management, it can be divided into three stages.
The first stage is the early period of Internet governance, which is roughly from the beginning of the formation of the Internet to the United Nations World Summit on Information Society (World Summit on Information Society, WSIS), which is divided into two phases: the Geneva Conference in 2003 and the Tunis Agenda in 2005. The World Summit on the Information Society appears to be a struggle between governments and the private sector and civil society, in essence, the game between the United States and other countries on Internet control.
This period is the stage of rapid development of the Internet, a large number of new technical and technical standards have been created, the US government took the opportunity to vigorously promote the development of information technology, and developed a series of international technical standards, industry and industry norms. And information developing countries are still in the study, learn from the stage, which makes the United States and other developed countries in the field in an absolute strong position. [4] This stage of Internet governance mainly around the Internet domain name registration and analysis and its corresponding 13 root server control, Internet Protocol (IP) address allocation and other key resources to compete. The United States has almost controlled all international organizations and core businesses that have developed and managed Internet standards and refused to internationalize the relevant management functions or to the United Nations specialized agencies. [⑤] Therefore, at the World Summit on the Information Society, despite the pressure from the United Nations, the developing countries and even the European countries, the United States still refused to hand over the Internet management rights. Into the 21st century, the information represented by China’s developing countries to enhance the network technology, they have the domain name, users and other Internet resources have exceeded the information developed countries, but the representation in the Internet governance is far from enough, So the existing Internet governance reflects the legitimacy of the questioned.
The second stage is the stage of political competition and sovereignty competition of cyberspace governance, which is called the “return” stage of the government in cyberspace. This stage from the Information Society World Summit to 2011. In 2011, China, Russia and other countries to the 66th session of the General Assembly to submit the “International Code of Conduct for Information Security”, advocated the United Nations in cyberspace governance play a leading role. In the same year, the United States and Britain and other governments dominated the global network space management conference (Global Cyberspace Conference), also known as the London process (London Process) was held. <A The network space has become the “fifth strategic space” of human society. With the continuous breakthrough of network technology and its disruptive transformation of real society, cyberspace has become the fifth strategic space of human society. The distribution of order, power and wealth in cyberspace, the developed countries and information developing countries have serious differences on the following issues: whether the cyberspace attribute is “global public domain” or “sovereignty”; governance is government-led “Multilateral governance”, or a multi-stakeholder model dominated by non-governmental actors; governance culture is a “multicultural” or “multicultural” that is dominated by the West. [⑥] The focus of this period is also reflected in the free flow of information content in the field, when Hillary Clinton took the US Secretary of State, the Internet for the freedom of many speeches, advocating the US Internet freedom strategy. The role of the US government and social media sites in the wake of the turbulence in North Africa, which began at the end of 2010, has aroused widespread concern in the developing countries and strengthened the management of the Internet. [⑦] The third stage from the “Prism Gate incident” until now, this stage of the competition more focused on cyberspace security governance. “Prism door incident” to the United States in the field of cyberspace governance moral high ground questioned, leadership decline, forcing it to promote cyberspace governance in the low posture. At the same time, cyberspace security situation is further deteriorating, and the security threats facing countries are further increased. After experiencing the fierce confrontation of the “prism gate incident”, the developed countries and the information developing countries are aware that the maintenance of cyberspace requires the participation of all countries, and no country can lead the cyberspace governance process alone. Information developed countries and information development countries in the cognitive level of the gap gradually narrowed, the reduction of confrontational initiatives, cooperation began to grow space. Second, the “prism gate incident” caused the government and the private sector, civil society between the network security, privacy and other issues on the fierce game. Former US National Security Agency former employee Edward Snow led to expose a including “prism”, “X key points” (X-Keyscore), “Fair” (Fairview), “core” (Main Core) and other monitoring systems, including 10 monitoring systems, the monitoring system by the National Security Agency, the Central Intelligence Agency, the Federal Bureau of Investigation and other intelligence agencies to participate in almost cover the cyberspace of social networks, e-mail, instant messaging, Web pages, videos, photos, and so on. [8] National Security Agency requires Microsoft, Google, Facebook and other nine major global Internet companies to open the database to monitor the project to carry out data monitoring. In the “Prism Gate incident” exposure, Microsoft, Google, Facebook and other companies to the court to prosecute the federal government. [⑨] civil society have also acted against large-scale data monitoring. The American Civil Society Alliance launched a “Stop Watch Us” action on the Internet, putting pressure on the US government to get tens of thousands of Internet users’ signatures, messages and responses from hundreds of civic groups by organizing parades Demonstrations, petition to Congress, launch network initiatives, etc. to cooperate with the action. [⑩] In the “prism door incident” triggered the other countries with the US government to carry out monitoring projects ICT enterprises dissatisfaction, countries have taken new measures to protect cyberspace security. For example, the Chinese government has accelerated the process of legalization of cyberspace and began to discuss the guiding ideology of cybersecurity equipment, and formulated the network security review method. After the introduction of the “national security law”, “anti-terrorism law” “Network Security Law (Draft)” and “Criminal Law Amendment (9)” have significantly increased the terms involved in network security. These initiatives have aroused serious concern about US ICT companies and lobbyed the US government to put pressure on China to require the Chinese government to cancel the relevant provisions, such as Article 18 of the Anti-Terrorism Act provides that “telecom operators, Internet services Providers should be for the public security organs, the state security organs in accordance with the law to prevent and investigate terrorist activities to provide technical interface and decryption technical support and assistance. [11] Although from the government point of view, these initiatives help to maintain network security and national security, but in the private sector, the above-mentioned initiatives will not only increase the technical input, but also a substantial increase in costs. As long as cyberspace governance does not achieve a breakthrough, the government and the private sector, civil society between the game will continue to exist, and to a certain extent, will evolve into a national game. <A Finally, the US government and its private sector, civil society alliance with other countries in the Internet key resources on the issue of the game. Internet key resources include: IP address allocation, protocol parameter registration, gTLD system management, ccTLD system management and root server system management and time zone database management. Some scholars use the “cyberspace” in cyberspace to describe the status of Internet Corporation for Assigned Names and Numbers (ICANN) in cyberspace governance. [12] For historical reasons, these resources have been by the National

Telecommunications and Information Administration (National Telecommunication and Information Administration, NTIA) under the Internet Digital Distribution Agency (Internet Assigned Numbers Authority, IANA) is responsible for managing, and NTIA authorizes its management of IANA functions through regular engagement with ICANN. Therefore, it can be argued that the US government controls the key resources of the Internet. The United Nations-appointed Working Group on Internet Governance (WGIG) noted in its report that the US government unilaterally controls the Internet’s key resources, such as root zone documents. [13] The international community has been dissatisfied with this situation, and the WGIG report has proposed four options to replace the existing structure, hoping to take over the Internet’s critical resources through intergovernmental organizations or global institutions. [14] For ICANN, although it has been seeking independence from the US government and has repeatedly contested it, it is more concerned with how to avoid other intergovernmental organizations or institutions to take over or replace their status. Milton Muller described the phenomenon as “some network liberals even eventually turned into secret supporters of nationalism, because as long as the challenged countries were their motherland, they turned to defend the United States, allowing Its control, leading the Internet. “[15] Thus, in some cases, ICANN chooses to” align “with the US government to prevent other countries or intergovernmental organizations from influencing their governance structures. In ICANN’s organizational structure and decision-making system, the Government Advisory Committee (Government Advisory Committee, GAC) is eligible to nominate a liaison who does not have the right to vote. Information developing countries believe that as an international mechanism for Internet governance, the lack of representation in ICANN from information developing countries should reflect government responsibilities and powers in their future management structures and increase the authority of the Governmental Advisory Committee The But ICANN has repeatedly said it will not accept this change. In this case, the US government representatives are highly consistent with ICANN’s official position, both in the government advisory committee and at ICANN’s plenary meetings. Until the “Prism Gate Event” broke out, the US government was forced to restart the process of internationalization of ICANN’s efforts to guide the cyberspace governance game to a new stage. Second, the future development of cyberspace management trend With the advancement of the network space management process, the parties to the understanding of the spatial properties of the network gradually reached a consensus, and thus in the governance approach, the path of the differences narrow. Especially at the cognitive level, the cognition of cyberspace from various countries is based on different political, economic and cultural backgrounds, emphasizing their uniqueness to objective properties and laws based on cyberspace, emphasizing the integration between different views. [16] Internet space interconnection, sharing attributes determine the zero-sum game does not apply to cyberspace, cyberspace security, development, freedom is the government, the private sector and civil society to pursue the common goal. At the same time, the mutual restraint of the three issues of security, development and freedom makes it impossible for either party to ignore the interests of other actors and pursue their own absolute interests. As President Xi Jinping on December 16, 2015 at the Second World Internet Conference (World Internet Conference, WIC) said: “There is no double standard in the field of information, countries have the right to maintain their own information security, not a national security while other countries are not safe, part of the national security and another part of the country is not safe, but not Sacrifice the security of other countries to seek their own so-called absolute security. ” [17] This position reflects the above special properties of cyberspace governance. As a result, the international community has gradually realized that no one can dominate the process of cyberspace governance. First, the US cyberspace strategy adjustment and ICANN internationalization will drive a major transformation of the cyberspace governance architecture. Facing the pressure, the United States by part of the Internet to give up the key resources of direct control, for its network space to adjust the international strategy to prepare. [18] On March 14, 2014, NTIA, a subsidiary of the US Department of Commerce, announced that it would give up control of ICANN and pointed out in its transfer statement that ICANN’s management would organize global multi-stakeholder discussions on receiving issues, but explicitly United Nations or other intergovernmental organizations. [19] ICANN has been seeking its own independent position since its inception, and ICANN’s internationalization goal is not only to get rid of the constraints of the US government, but also to ensure that the US government will not be taken over by other countries and intergovernmental organizations. Therefore, ICANN needs to reach an agreement with the US government to ensure their independence, but also with other governments to start a game, to avoid its internationalization was strongly opposed. Second, the role of the United Nations in cyberspace governance continues to improve, will effectively promote the network space management structure and norms of the pace of construction. Through the efforts of the United Nations Group of Governmental Experts on Information Security (GGE), the international community has also made important breakthroughs in cyberspace codes of conduct and confidence-building measures. In June 2013, the United Nations published a report of the Group of Experts, composed of representatives of 15 countries. The report clarifies for the first time that “national sovereignty and sovereign international norms and principles apply to national communications technology activities and the jurisdiction of the State in its territory for communications technology infrastructure.” At the same time, the report further recognizes the Charter of the United Nations In the applicability of cyberspace “. [20] “While efforts to address the security of communications technology, States must respect the human rights and fundamental freedoms contained in the Universal Declaration of Human Rights and other international instruments.” [21] Compared with the 2010 expert group report, the above contents were presented as sections 20 and 21 of the 2013 report, which is a significant improvement in the compatibility of information developed countries and information developing countries in cyberspace governance Sex continues to improve.
In July 2015, the United Nations Group of Governmental Experts on the Development of Information and Telecommunications from the Perspective of International Security published a third report on the Code of Conduct for Cyberspace. This report has reached a consensus on the protection of cyberspace-critical infrastructure, confidence-building measures, and international cooperation. The network sovereignty of the developing countries is further clarified, and the application of international law, especially the law of armed conflict, which is advocated by the developed countries, is also included in the application of cyberspace. [22] Finally, the competition and cooperation model between government and non-state actors in cyberspace governance will undergo a major change, and multi-level game will become the “new normal” of cyberspace governance. In terms of governance and path, countries’ policy positions in cyberspace governance also place greater emphasis on reality, especially in dealing with the relationship between government and other actors. All parties are aware that the responsibilities of the government and other actors should be divided according to the problems in cyberspace governance. For the multi-stakeholder governance model, the information developed countries and information development countries gradually unified awareness, the government and the private sector, civil society according to their respective functions to participate in cyberspace governance. The narrowing of cognition means that one party is more aware of the concerns of the other party. The game between the developed countries and the developing countries in cyberspace governance will be more targeted, and competition and cooperation will be carried out synchronously to promote cooperation through competition. Of course, this has increased the investment in cyberspace, and the increase in the right to speak on cyberspace governance. Brazil, China has established a network space multi-stakeholder meeting (NetMundial) and the World Internet Conference mechanism to explore the network and national security, network sovereignty and other core issues, the voice of developing countries will be more and more, more and more Big. Third, the evolution of the concept of cyberspace governance <a In the information developed countries and information development countries, governments, the private sector and civil society around the network space governance game from conflict to integration behind, reflecting the continuous evolution of the concept of cyberspace governance. Although the game around cyberspace governance is mainly to compete for the power and wealth of cyberspace, the different cognition of actors, objects and methods of governance has had an important influence on the conflict and fusion of governance. Craig Mundie, Microsoft’s chief research and strategy officer, pointed out at the 7th China-US Internet forum that “the misunderstanding of cyberspace in both China and the United States is largely due to ‘Internet governance’ and ‘ ‘Cyberspace governance’ caused by the confusion of the two concepts. [23] Similarly, cyberspace governance game and conflict also reflect the conflict between the two governance concepts. Internet governance is considered to be a multi-stakeholder governance model that is dominated by non-governmental actors, but cyberspace governance also requires the participation and coordination of government and intergovernmental organizations. Internet Governance Project (Internet Governance Project, IGP) defines Internet governance as a network-related decision that is linked by an Internet protocol, including the establishment of a dispute resolution mechanism for policies, rules, and technical standards that are common to the owner, operator, developer, and user. Distribution and global Internet standards of human behavior. “[24] The above definition includes three aspects, namely the acceptance and recognition of technical standards and agreements, the allocation of Internet resources such as domain names and IP addresses, spam generated by human Internet behavior, Cybercrime, copyright and trademark disputes, consumer protection issues, public sector and private security issues, rules and policies. Laura DeNardis (Laura DeNardis) proposed to be in accordance with the Internet transmission TCP / IP protocol level, and according to different levels of different functions to build Internet mode, based on the function, tasks and actors were discussed Internet resource control, standard settings , Network access, network security management, information flow, intellectual property protection and other six levels of Internet governance content. [25] Cyberspace governance has shifted from the professional and technical fields that have been emphasized by the original Internet governance to a wider range of political, security and economic sectors, and the importance of government and intergovernmental organizations in cyberspace governance has become increasingly prominent. Cyberspace is a broader field that includes not only the Internet, but also the data that is transmitted in the network, the users of the network, and the interaction between real society and virtual society. The corresponding cyberspace governance is a broader concept, which is “a category of cyberspace infrastructure, standards, law, social culture, economy, development and so on.” [26] It contains more diverse governance issues and challenges that are increasing. Such as the “Prism Gate Incident”, the government’s high-level threat (APT) due to network action in cyberspace, the Digital Divide and Data Poverty ), Cyber ​​terrorism, online business theft and more and more governance issues have gone beyond the scope of the traditional concept of Internet governance. <A The conflict between “global public domain” and “network sovereignty”, “network autonomy” and “state dominance” in cyberspace governance game reflects that people can not understand “Internet governance” and “network Space governance “between the different governance subjects, objects and methods, trying to use a single governance approach to solve the multiple issues. The bottom-up, open and transparent governance model, which is advocated by the Internet governance subject represented by ICANN, is concerned with the high risk of cyber warfare, large-scale data monitoring and theft, and cyber terrorism. Lack of effectiveness and relevance. At the same time, the state-centered, top-down cyberspace governance philosophy can not effectively deal with the real problems of the current Internet governance and can not replace the dominance of Internet international organizations in the field. With the advance of the network space management process, the two governance ideas and methods in the collision also began to integrate. Joseph Chennai believes that cyberspace is composed of multiple governance mechanisms, in which Internet governance focuses on the technical level and is a subset of cyberspace governance. Should be based on different governance issues, to build a different governance mechanism, so that different actors to play a leading role. [27] The integration of governance concepts is also reflected in the increasing consensus among the parties on the multi-stakeholder governance model. ICANN uses a bottom-up, consensus-based decision-making process that advocates a governance model that limits the role of government. [28] Many developing countries initially opposed the multi-stakeholder governance model, stressing that government-led multilateral governance models should be adopted. With the deepening of the governance process, the information-developing countries have gradually accepted the multi-stakeholder governance model, which is gaining more and more consensus in the private sector and civil society as long as the role of the government is well reflected. The government, the private sector and the civil society participate in the decision-making process according to their respective functions and responsibilities, do not deliberately exclude other actors, nor deliberately pursue the leadership of individual actors, reflecting a more objective and balanced approach to cyberspace governance. Fourth, China’s strategic response <a The Chinese government has put forward the two goals of global governance of cyberspace, namely, to build a peaceful, safe, open and cooperative cyberspace and to establish a multilateral, democratic and transparent international Internet governance system. Important strategic objectives into the “thirteen five” plan recommendations. The former advocates foreign participation in the international network space management process, in order to establish a favorable international governance system; the latter advocates the development of network technology, nurture the network industry, enhance the national network strength. The mutual support and mutual promotion between the two requires an international strategy that can co-ordinate internal and external situations in response to complex cyberspace. Although the Chinese government has not published a specific international cyberspace strategy document, but by analyzing the existing relevant policies, can still be found in China’s international strategy of cyberspace is still in the exploratory stage. Therefore, it is necessary to analyze and discuss the international strategy of cyberspace in China according to the characteristics of cyberspace power game and the strategy of network power. (A) China’s cyberspace international policy practice Since 1994 access to the Internet, China has developed a variety of forms of international network policy into the international network space system. This aspect is to expand the needs of opening up, hope that through international cooperation in learning, the introduction of foreign advanced technical standards; the other is the driving force of information technology, integration into the globalization must be all-round participation in the international system. [29] In addition, with China’s growing influence in international affairs and increased dependence on the network, active participation in cyberspace governance is also an important way to maintain national interests and ways. China’s network policy is largely influenced by the situation of international cyberspace governance and developed and promoted in the interaction with the international cyberspace management system, showing the characteristics of multi-domain, multi-level and multi-subject. <A First, the international policy of the Chinese government network covers international cooperation in international technical standards, information and communication technology industry cooperation, global Internet governance, combating cybercrime, network economy, digital divide and other fields, and the development trend of global network governance Generally consistent. First of all, from the early technology, industry and Internet standards to gradually expand the cooperation to a wider range of network-related policy cooperation, many policy areas in fact beyond the scope of the Internet itself, and international economic, political and security. Secondly, after the “prism door incident”, with the cyberspace security governance become the main issue in governance, the focus of China’s network policy is also focused on the network security governance, and based on the establishment of national security, political security, Safety and social security. China not only vigorously oppose large-scale network monitoring in the international arena, advocate the maintenance of national network sovereignty, but also pay more attention to the legislative work related to cybersecurity in domestic policy and maintain national security and sovereignty in practice. Second, China’s cyberspace international policy covers bilateral, regional, multilateral and international levels. From the bilateral level, China has established intergovernmental dialogue and cooperation mechanisms with countries such as South Korea, Britain and Australia. These cooperation not only covers the contents of network security, digital economy and development, but also become an important content and support for bilateral diplomatic relations. In addition, China and the United States, between China and Russia in the field of network security to carry out a different degree of confidence-building measures (Confidence Building Measures, CBMs). [30] At the regional level, China and ASEAN, the SCO, the European Union, the Arab League and other regional organizations and countries to establish a variety of forms of network dialogue and cooperation mechanism. In 2009, the Chinese government signed the Cooperation Framework of the China-ASEAN Telecommunications Regulatory Commission on Network Security and the Intergovernmental Agreement on Safeguarding International Information Security of Member States of the Association of Southeast Asian Nations (ASEAN) and ASEAN Member States. [31] China also actively participated in the work of the ASEAN Regional Network Security Working Group, and in September 2013 held in Beijing, the ASEAN Regional Forum “to strengthen the network security measures seminar – legal and cultural perspective.” Conference development The development of the Internet requires the guidance of legal rules and the need to promote and respect cultural diversity. All parties should strengthen exchanges in the field of cybersecurity, promote mutual trust, promote cooperation and jointly build peace, security, openness and cooperation. [32] Finally, China is also actively involved in the multilateral and international level of cyberspace governance mechanisms, both within the United Nations Framework for Information Security, the International Telecommunication Union, the World Summit on the Information Society, the Internet Governance Forum, or the United Nations Framework London process, cyberspace multi-stakeholder meetings and other mechanisms, China is the main participant; in addition, China also through the World Internet Conference to carry out cyber space home diplomacy. China has also submitted two versions of the International Code of Conduct for Information Security to the United Nations General Assembly, together with representatives of OECD countries such as Russia and Uzbekistan. [33] China is also a major participant in the Global Internet Governance Consortium, where the head of the National Internet Information Office (NYSE), Lu Wei and Alibaba Group Chairman Ma, was elected as a member of the Alliance. <A Third, with the cyberspace governance covered by more and more widely, China’s cyberspace international policy to participate in the main body from the traditional Ministry of Foreign Affairs, Ministry of Industry and further expanded to the Ministry of Public Security, Ministry of Commerce, Ministry of Finance and the new The establishment of the network letter Office, the Ministry of Foreign Affairs set up a “network affairs office” to deal with cyberspace of foreign affairs. Among them, the Ministry of Foreign Affairs is mainly responsible for bilateral, regional, multilateral and international level of network diplomacy, it is China’s docking under the framework of the United Nations network governance mechanism of the main forces, especially from the Ministry of Foreign Affairs arms control officials throughout the four United Nations information security Working Group of Experts. Net letter office as the central network security and information leading group of permanent institutions, China is to co-ordinate the network security and information management of the newly established important institutions. Since the role of network management as a co-ordination and coordination of China’s network affairs is becoming more and more important in the international policy of the network, it has not only carried out multi-level international network security and digital economic cooperation, but also established the governance mechanism of the World Internet Conference.
In addition, the Ministry of Public Security in the fight against cyber security crime, network anti-terrorism, the Ministry of Commerce in the information and communication technology market access, the Ministry of Finance in the network infrastructure external assistance and other areas of work will be China’s future implementation of cyberspace international strategy a solid foundation. It can be seen that China has formed a more comprehensive and in-depth international strategic framework of cyberspace, including pluralistic participant, wide-ranging problem coverage and multi-level participation path, which laid a good foundation for the international strategic construction of cyberspace governance basis. With the development of China from the network power to the network power, China will establish a comprehensive and perfect international strategy of cyberspace. (2) Challenges in the international strategy of cyberspace The evolution of cyberspace governance has brought many challenges to China’s cyberspace international strategy: First, the information developed countries will continue to dominate the network space governance game, which is the network of China The international strategy of space poses a challenge; the second is due to the lack of advanced Internet governance talent, leading to China’s Internet international organization in the serious shortage of the third is the network space governance game to emphasize capacity building (Capacity Building), best practice (Best Practice) And so on, will bring competitive pressure to China. These issues and challenges will have a greater impact on China’s cyberspace international strategy, if handled properly, will have a negative impact on the implementation of the network strategy. <A I = 35> First, the information developed countries continue to dominate the network space governance game direction on China’s international strategic challenges. The global governance of cyberspace is played through various forms of governance, and the construction of the mechanism depends on the negotiation between the actors. The bargaining of the negotiations depends not only on the size of the powers of the actors, but also on the global governance of cyberspace In the agenda set the ability to be closely related. [34] According to Joseph Nye’s definition, the former can be called “hard power”, the latter is “soft power”. [35] The advantages of the developed countries in these two areas are obvious, especially in the mechanism of selective or prioritizing the discussion of cyberspace governance. For example, in cybersecurity governance, the United States relies on its agenda setting capacity to prevent the international community from making large-scale data monitoring a governance agenda, while setting its network economy to focus on priority agendas. In addition, the information developed countries in the establishment of the network of human rights agenda, will focus on the field of freedom, and democracy (one country one vote), equality (the size of the country has the same discourse) and other equally important issues are excluded from the agenda. Not only that, for countries in the “prism door incident” after the request to strengthen the exercise of network sovereignty trend, the United States put forward the “data localization” (Data Localization) this agenda to circumvent the global governance mechanism to discuss network sovereignty. Compared with the information developed countries, information development countries in the agenda setting capacity there is still a big gap, the lack of initiative to set the agenda. In recent years, with China, Brazil, India and other countries have established a variety of cyberspace governance mechanism, emerging powers in the global management of cyberspace in the agenda set the ability to continue to increase. But in general, the gap between China and the information developed countries in governance capacity still exists, and will affect China through international mechanisms to safeguard their own national interests, as well as express their concerns. <
Secondly, due to the lack of advanced cyberspace governance talent, leading to China in the Internet international organizations in the representation of a serious shortage. The trend of cyberspace governance game shows that the control of Internet key resources by international organizations such as ICANN, IETF and other international organizations will not be challenged by government and intergovernmental organizations. As the US government abandons its control over ICANN, the latter will have greater independence. Network space is built on the basis of the Internet, the basis of cyberspace governance is also Internet governance. Therefore, China’s cyberspace international strategy must be in the field of Internet governance to achieve a breakthrough, while enhancing the international organizations in the Internet in the influence and representation. For the majority of developing countries, including China, it is necessary to increase the representation in international organizations such as ICANN, so that more voices from China and other developing countries appear in ICANN. Third, the network space governance game to emphasize the ability to build, best practice and other direction, which will bring China’s severe competitive pressure. The convergence of the cyberspace governance game concept has led to the international community’s focus on cyberspace governance to operational and enforceable areas such as capacity building, best practices, including the provision of network infrastructure to information developing countries and underdeveloped countries; Training in technology, law, and policy related to cyberspace governance; and providing best practices for solving specific problems in cyberspace governance. This is China’s participation in cyberspace governance of the international strategy put forward higher requirements, information developed countries in the field of resources, talent advantage is difficult to shake in the short term, which not only requires the Chinese government to invest more resources, but also China’s Internet companies , Industry associations, legal experts of the common and active participation. (C) China’s strategic thinking of cyberspace governance The basic path of China’s cyberspace international strategy is consistent with the overall macro strategy of China’s integration into the international system and the reform of the international system. [36] In response to the complex cyberspace governance game, China on the one hand to strengthen capacity-building, and focus on the ability to participate in the global control of cyberspace influence; the other hand, between the network security and openness to seek a balance, International cyberspace to establish their own legitimate rights and interests, to avoid the negative impact of excessive security; and strengthen the network strategy and cyberspace international strategy between the strategic interaction, the formation of mutually supportive cyberspace strategy system. <A I = 40> First, combined with the new and future development of cyberspace governance, to strengthen the shaping of international mechanisms. In the cyber space global governance level, the struggle around the governance platform is becoming increasingly fierce. Including the Internet forum, the International Telecommunication Union, the London process, the Brazilian cyberspace multi-stakeholder meeting and China’s World Internet Congress, all platforms have their dominant forces, actors involved in the subject matter and the impact of the play Are not the same. China should explore ways to enhance its own capacity-building programs to the international community in the areas of cybersecurity, cybercrime, capacity building, network economy, cyber culture and the digital divide, in conjunction with the World Internet Forum and other cyberspace governance mechanisms involved. Good practice and solutions such as the ability of public goods. Second, focus on training to participate in cyberspace governance of international talent.
Internet governance organizations are mostly non-governmental organizations, and their multi-stakeholder governance model usually requires the selection of senior management personnel from the Internet community, and the corresponding high-level management, based on the contribution of the selection object to Internet technology and governance Management positions, rather than a traditional intergovernmental organization of a country or vote in accordance with the population, economic ratio to allocate places. In the case of ICANN, its existing management structure is comprised of the Board of Directors and three support organizations, three advisory committees and two technical advisory bodies. The Board consists of 16 voting members and 5 non-voting liaison officers, with the exception of the ICANN President, the remaining 15 places from the Supporting Organizations, the General Members Advisory Committee, the Regional General Membership Organization and the Nominating Committee. To be elected as a member of the voting, must pass the bottom-up nomination and election. Therefore, China should rationalize the system and mechanism, and actively to ICANN and other international non-governmental organizations to transport talent to encourage Internet companies, industry organizations and academic institutions to actively participate in ICANN, IETF, Internet Architecture Board (Internet Architecture Board, IAB) and other institutions to select the talent in order to enhance the international organizations in the Internet in the representation and voice, and to improve China’s influence on Internet governance. Third, to strengthen the network strategy and cyberspace international strategy between the strategic interaction. China has put forward the strategy of strengthening the network power in the “13th Five-Year Plan”, and proceeded from five aspects: technological innovation, network culture, network infrastructure, network security and information construction and international cooperation. [37] Network power strategy has repeatedly referred to the opening up, and actively participate in the Internet governance, and even international cooperation as a separate chapter. This shows that the international strategy of cyberspace and network power strategy between the integration of mutual support. The effective interaction between the two is related to China’s openness to cyberspace, the relationship between security and development. From the perspective of the two-tier game, any country’s strategy is faced with the external situation and the internal interests of the double constraints, excessive emphasis on openness or security are not conducive to the overall national security and interests. Strengthening the interaction between the network strategy and the international strategy of cyberspace helps to improve the awareness of the decision-makers on the security and opening of cyberspace, the security of cyberspace, the development and the relationship between opening and breaking, Consistent with the objective laws of the policy. From a technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy. At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy. At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy. At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy. At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy.
At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy. At the technical level, the network strategy can better support China’s participation in global cyberspace governance. The main competition in the current cyberspace governance has shifted from the cognitive, conceptual level of the game to the provision of solutions, best practices, capacity building and other specific areas of cooperation. Lack of effective support, cyberspace international strategy is difficult to sustain, and won the recognition of the international community. At the same time, cyberspace international strategy will also help to create a favorable external environment for the network power strategy, providing external advanced experience and lessons to the domestic ICT enterprises to provide a broad international market. Finally, we can learn from the field of foreign aid experience, through foreign aid in the field of ICT to ease or even eliminate the digital divide in cyberspace governance issues, on the one hand can contribute to the network space management of Chinese power, on the other hand also contribute to China’s ICT enterprises Internationalization strategy.

 

Original Mandarin Chinese:

簡介
全球網絡空間治理進程不僅涉及信息發達國家與信息發展中國家在互聯網關鍵資源、網絡權力和網絡安全等領域的複雜博弈,還包括政府、私營部門和市民社會等行為體之間的相互博弈。 “棱鏡門事件”在加劇網絡空間治理博弈的同時,也推動各方政策立場持續調整,增加了治理合作的可能性。與此同時,網絡空間領域的博弈也反映出互聯網治理與網絡空間治理等相關治理理念的相互衝突與相互融合趨勢。目前,中國在全球網絡空間治理上的參與仍面臨諸多挑戰。中國需要以網絡空間博弈的發展趨勢和治理理念的演進為基礎,結合“十三五”規劃提出的網絡強國戰略,以國際機制塑造、人才培養及技術發展等為核心建構長遠、完備和全面的參與戰略。
正文
2013年6月,美國國家安全局(NSA)前僱員愛德華·斯諾登披露了該局的“棱鏡”監聽項目。該事件[①] 使網絡空間治理在國際議程中的優先次序再度提升,但也加劇了各方立場的分化,導致網絡空間治理陷入困境,為網絡空間治理的建章立制帶來極大挑戰。另外,國際社會對網絡空間及其治理的複雜性缺乏清晰、統一的認知,由此而造成的片面立場和單一政策進一步加劇了治理困境。面對上述複雜情勢,約瑟夫·奈(Joseph Nye)試圖通過借鑒環境治理領域的機制複合體理論來解釋網絡空間治理的實踐,通過多個不同的治理機制組成的鬆散耦合複合體來分析網絡空間治理。 [②] 這為分析網絡空間治理形勢提供了一個有益的視角,即網絡空間治理是由多個而非單一的治理機制組成,各種機制之間的相互作用對治理產生影響。本文擬從更加宏觀的視角來審視網絡空間治理髮展的進程,並試圖探索網絡空間博弈背後的理念演變,同時分析政府、私營部門、公民社會等治理行為體在國際、國內兩個層面的複雜關係。在此基礎之上,探討中國的應對措施和參與網絡空間治理的戰略。

一、網絡空間治理的力量博弈

網絡空間治理的進程伴隨著各國政府之間的博弈過程。根據各國政府在網絡技術、網絡能力和網絡使用度等方面的情況,可以將其劃分為信息發達國家、信息發展中國家和信息不發達國家三類。 [③] 也有國際組織以網絡就緒度(Readiness)為指標衡量各國的信息化程度。這種排名基本上與傳統的發達、發展中以及不發達國家的三分法相重疊,當然也存在個別發展中國家的信息化水平上升到發達國家行列,或部分發展中國家的信息化水平跌落到不發達國家的水平。因此,按照信息發達國家、發展中國家和不發達國家的三分法來劃分在學術上更加精確。網絡空間治理的力量博弈主要有三個方面:一是信息發達國家與信息發展中國家在網絡權歸屬、網絡資源分配方面的博弈;二是非政府行為體與政府之間就互聯網關鍵資源控制、網絡安全與自由等問題的博弈;三是作為網絡空間中的主導國家,美國政府聯合其境內的私營部門、市民社會與其他國家之間在互聯網關鍵資源歸屬等問題上的博弈(圖1)。

首先,信息發達國家與信息發展中國家圍繞著網絡空間的關鍵基礎設施和網絡技術之間的博弈。根據網絡空間治理領域力量博弈的行為體、議題和特點,可以將其劃分為三個階段。
第一階段是早期的互聯網治理時期,這大致從國際互聯網的形成初期到聯合國召開信息社會世界峰會(World Summit on Information Society, WSIS)為止;該峰會分為2003年日內瓦會議和2005年突尼斯議程兩個階段。信息社會世界峰會表面上表現為各國政府與私營部門和市民社會之間的鬥爭,實質上則是美國與其他國家就互聯網控制權而展開的博弈。
這一時期是互聯網快速發展的階段,大量新的技術及技術標準被創造出來,美國政府藉機大力推動信息技術發展,並製定了一系列國際技術標準、行業和產業規範。而信息發展中國家還處於學習、借鑒階段,這使美國等發達國家在該領域處於絕對強勢地位。 [④] 這一階段的互聯網治理主要圍繞互聯網域名註冊與解析及其相應的13台根服務器控制權、互聯網協議(IP)地址分配等關鍵資源展開爭奪。美國幾乎控制了互聯網標準制定和管理的所有國際組織和核心企業,並拒絕將相關管理職能國際化或交由聯合國專門機構管理。 [⑤] 因此,在信息社會世界峰會上,儘管面臨來自聯合國、信息發展中國家甚至歐洲國家的壓力,美國依然拒絕交出國際互聯網管理權。進入21世紀後,以中國為代表的信息發展中國家的網絡科技力量不斷提升,它們所擁有的域名、用戶等互聯網資源已經超過了信息發達國家,但在互聯網治理中的代表性遠遠不足,因此對現有互聯網治理體現的合法性提出了質疑。
第二階段是網絡空間治理的政治競爭和主權競爭階段,有人稱之為政府在網絡空間的“回歸”階段。這一階段從信息社會世界峰會到2011年。 2011年,中國、俄羅斯等國向第66屆聯大提交了“信息安全國際行為準則”,主張聯合國在網絡空間治理中發揮主導作用。同年,美英等國政府主導的全球網絡空間治理大會(Global Cyber​​space Conference),又稱倫敦進程(London Process)正式召開。
這一階段網絡空間治理博弈的特點是,隨著網絡技術的不斷突破及其對現實社會的顛覆性變革,網絡空間已經成為人類社會的“第五戰略空間”。圍繞網絡空間中秩序、權力與財富的分配,信息發達國家與信息發展中國家在下列問題上產生了嚴重分歧:網絡空間屬性是“全球公域”還是“主權領域”;治理手段是政府主導的“多邊治理”,還是非政府行為體主導的多利益攸關方(Multi-stakeholder)模式;治理文化是西方主導的“一元文化”,還是平等協商的“多元文化”。 [⑥] 這一時期的矛盾焦點還集中體現在信息內容的自由流通領域,希拉里·克林頓就任美國國務卿時,針對互聯網自由發表了多次講話,鼓吹美國的互聯網自由戰略。在始於2010年年底的西亞北非動蕩之中,美國政府與社交媒體網站在背後所扮演的角色引起了信息發展中國家的廣泛關注,並加強了對互聯網的管理。 [⑦]
第三階段從“棱鏡門事件”之後一直到現在,這一階段的競爭更加聚焦網絡空間的安全治理。 “棱鏡門事件”使美國在網絡空間治理領域的道德製高點遭受質疑、領導力下降,迫使其在推動網絡空間治理中放低姿態。與此同時,網絡空間安全形勢進一步惡化,各國面臨的安全威脅進一步加大。在經歷了“棱鏡門事件”初期的激烈對抗之後,信息發達國家與信息發展中國家均意識到維護網絡空間的安全需要各國的共同參與,沒有任何國家可以單獨主導網絡空間治理進程。信息發達國家與信息發展中國家在認知層面的差距逐漸縮小,對抗性舉措減少,合作的空間開始增長。
其次,“棱鏡門事件”引起了政府與私營部門、市民社會之間在網絡安全、公民隱私等問題上的激烈博弈。美國國家安全局前僱員愛德華·斯諾登揭露了一個包括“棱鏡”、“X關鍵分”(X-Keyscore)、“美景”(Fairview)、“核心”(Main core)等近10個監控項目在內的監控體系,該監控體係由國家安全局、中央情報局、聯邦調查局等多個情報機構參與,幾乎覆蓋了網絡空間的社交網絡、郵件、即時通訊、網頁、影片、照片等所有信息。 [⑧] 國家安全局要求微軟、谷歌、臉譜等9家主要全球互聯網企業向監控項目開放數據庫以便開展數據監控。在“棱鏡門事件”曝光後,微軟、谷歌、臉譜等企業向法院公開起訴聯邦政府。 [⑨] 市民社會也紛紛行動起來,反對大規模數據監控。美國市民社會聯盟在網上發起“停止監視我們”(Stop Watch Us)的行動,向美國政府施加壓力,得到數万網民在網站上的簽名、留言及數百個公民團體的響應,他們通過組織遊行示威、向國會請願、發起網絡倡議等方式配合該行動。 [⑩]
在“棱鏡門事件”引發了其他國家對與美國政府合作開展監控項目ICT企業的不滿,各國紛紛採取新的措施保障網絡空間安全。例如,中國政府加快了網絡空間的法制化進程,並開始討論網絡安全設備自主可控的指導思想、制定了網絡安全審查辦法,在先後出台的《國家安全法》、《反恐怖主義法》、 《網絡安全法(草案)》和《刑法修正案(九)》中都大幅增加了涉及網絡安全的條款。這些舉措引起了美國信息通信技術企業的嚴重關切,並遊說美國政府對中國施壓,要求中國政府取消相關規定,如《反恐怖主義法》第十八條中規定“電信業務經營者、互聯網服務提供者應當為公安機關、國家安全機關依法進行防範、調查恐怖活動提供技術接口和解密技術支持和協助”。 [11] 儘管從政府角度看,這些舉措有助於維護網絡安全和國家安全,但在私營部門看來,上述規定的舉措不僅將增加技術上的投入,也會大幅度增加成本。只要網絡空間治理未實現突破,政府與私營部門、市民社會之間的博弈會繼續存在,並在一定程度上將演變為國家間博弈。
最後,美國政府與其境內的私營部門、市民社會之間結盟與其他國家在互聯網關鍵資源歸屬問題上的博弈。互聯網關鍵資源包括:IP地址分配、協議參數註冊、通用頂級域名(gTLD)系統管理,國家和地區頂級域名(ccTLD)系統的管理及根服務器系統的管理和時區數據庫管理等。有學者形像地用掌握網絡空間中的“封疆權”來形容互聯網名稱與數字地址分配機構(Internet Corporation for Assigned Names and Numbers, ICANN)在網絡空間治理中的地位。 [12]

由於歷史的原因,這些資源一直由美國國家通信與信息管理局(National Telecommunication and Information Administration, NTIA)下屬的互聯網數字分配機構(Internet Assigned Numbers Authority, IANA)負責管理,NTIA通過定期與ICANN簽訂合同,授權其管理IANA的職能。因此,可以認為美國政府控制著互聯網的關鍵資源。聯合國任命的互聯網治理工作組(WGIG)在報告中指出,美國政府單方面控制著如根區文件在內的互聯網關鍵資源。 [13] 國際社會對這種情況一直不滿,WGIG報告中提出了四種方案以取代既有架構,希望通過政府間組織或全球性機構來接管互聯網關鍵資源。 [14] 對於ICANN來說,雖然一直尋求獨立於美國政府之外並與之開展了多次爭奪,但它更關注的是如何避免其他政府間組織或機構接管或取代其地位。彌爾頓·穆勒將這種現象描述為“一些網絡自由主義者甚而最終轉變成了國家主義的秘密支持者,因為只要被挑戰的國家是他們的祖國,他們就轉而為美國辯護,允許其控制、主導互聯網。”[15]
因此,在一些情況下,ICANN選擇與美國政府“結盟”共同阻止其他國家或政府間組織影響其治理結構。在ICANN的組織架構和決策體制中,各國政府代表所在的政府諮詢委員會(Government Advisory Committee, GAC)只有資格提名一名不具有表決權的聯絡員。信息發展中國家認為,作為一種互聯網治理的國際機制,在ICANN中來自信息發展中國家的代表性不足,在其未來的管理架構中,應當體現政府的職責和權力,增加政府諮詢委員會的權限。但ICANN多次表示不會接受這種改變。對於這種情況,無論是在政府諮詢委員會中,還是在ICANN的全體會議上,美國政府代表與ICANN的官方立場高度一致。直到“棱鏡門事件”爆發,美國政府才迫於多方面壓力宣布重啟ICANN的國際化進程,這將網絡空間治理博弈導向了新的階段。

二、網絡空間治理未來的發展態勢

隨著網絡空間治理進程的推進,各方對網絡空間屬性的認知逐漸達成共識,並由此使其在治理方法、路徑上的分歧縮小​​。特別是在認知層面,各國對網絡空間的認知由基於不同的政治、經濟、文化背景,強調各自的獨特性轉向基於網絡空間的客觀屬性和規律,強調不同觀點之間的融合。 [16] 網絡空間的互聯、共享屬性決定了零和博弈不適用於網絡空間,網絡空間的安全、發展、自由是政府、私營部門和市民社會所追求的共同目標。同時,安全、發展、自由這三個議題的相互制約關係,使得任何一方都不能忽視其他行為體的利益,而追求自身的絕對利益。正如習近平主席2015年12月16日在第二屆世界互聯網大會(World Internet Conference, WIC)開幕式的主題演講中指出:“在信息領域沒有雙重標準,各國都有權維護自己的信息安全,不能一個國家安全而其他國家不安全,一部分國家安全而另一部分國家不安全,更不能犧牲別國安全謀求自身所謂絕對安全”。 [17] 這一立場反映了網絡空間治理的上述特殊屬性。由此,國際社會也逐步意識到,沒有任何一方可以主導網絡空間治理進程。
首先,美國的網絡空間戰略調整與ICANN國際化進程將推動網絡空間治理架構的重大轉型。面臨重重壓力,美國通過部分放棄互聯網關鍵資源的直接控制權,為其網絡空間國際戰略的調整做準備。 [18] 2014年3月14日,美國商務部下屬的NTIA宣布將放棄對ICANN的控制,並在移交聲明中指出,將由ICANN管理層組織全球多利益攸關方討論接收問題,但明確拒絕由聯合國或其他政府間組織接管。 [19] ICANN自成立以來一直在尋求自己的獨立地位,ICANN國際化的目標不僅是要擺脫美國政府的製約,同時還要確保在美國政府放權後,不會被其他國家和政府間組織接管。因此,ICANN既需要與美國政府達成協議以保證自己的獨立性,也要與其他國家政府展開博弈,避免其國際化遭到強烈反對。
其次,聯合國在網絡空間治理中的作用持續提升,將有力地推動網絡空間治理架構和規範的建設步伐。通過聯合國信息安全政府專家組(GGE)的努力,國際社會在網絡空間的行為規範和建立信任措施等方面也取得了重要突破。 2013年6月,聯合國發表了一份由15個國家的代表組成的專家組的報告。報告首次明確了“國家主權和源自主權的國際規範及原則適用於國家進行的通信技術活動,以及國家在其領土內對通信技術基礎設施的管轄權。”同時,報告進一步認可了“聯合國憲章在網絡空間中的適用性”。 [20] “各國在努力處理通信技術安全問題的同時,必須尊重《世界人權宣言》和其他國際文書所載的人權和基本自由。”[21] 與2010年的專家組報告相比,上述內容分別作為2013年報告的第20和21條款出現,這是一個巨大的進步,表明信息發達國家和信息發展中國家在網絡空間治理認知理念的兼容性不斷提高。 2015年7月,聯合國關於從國際安全的角度看信息和電信領域的發展政府專家組公佈了第三份關於網絡空間國家行為準則的報告。這份報告在保護網絡空間關鍵基礎設施、建立信任措施、國際合作等領域達成了原則性共識。信息發展中國家關心的網絡主權進一步得到明確,信息發達國家主張的國際法特別是武裝衝突法在網絡空間中的適用也寫入其中。 [22]
最後,政府與非國家行為體在網絡空間治理中的競爭與合作模式將發生重大轉變,多層次博弈將成為網絡空間治理的“新常態”。在治理方式和路徑方面,各國在網絡空間治理中的政策立場也更強調從實際出發,特別是在處理政府與其他行為體的關係上。各方都意識到應當根據網絡空間治理中的問題來劃分政府與其他行為體的職責。對於多利益攸關方治理模式,信息發達國家與信息發展中國家的認知逐步統一,政府與私營部門、市民社會根據各自的職能參與網絡空間治理。認知縮小意味著一方對另一方的關切更加了解,信息發達國家與信息發展中國家在網絡空間治理中的博弈將更具針對性,表現為競爭與合作同步進行,以競爭促進合作。當然,這與信息發展中國家加大了對網絡空間建章立制的投入,在網絡空間治理的話語權上的增長有關。巴西、中國先後建立了網絡空間多利益攸關方會議(NetMundial)和世界互聯網大會機制,探討網絡與國家安全、網絡主權等核心問題,信息發展中國家的聲音將越來越多、越來越大。

三、網絡空間治理的理念演變

在信息發達國家與信息發展中國家,政府、私營部門和市民社會等圍繞網絡空間治理的博弈從衝突轉向融合的背後,反映了網絡空間治理理念的持續演變。儘管圍繞網絡空間治理的博弈主要是為了爭奪網絡空間的權力與財富,但行為體對治理的主體、客體和方法的不同認知對治理的衝突與融合產生了重要影響。微軟首席研究及戰略官克瑞格·蒙迪(Craig Mundie)在第七屆中美互聯網論壇上就曾指出,“中美雙方在網絡空間的誤解很大程度上是由於對’互聯網治理’和’網絡空間治理’兩個概念的混淆所導致”。 [23] 同樣,網絡空間治理博弈和衝突也反映了上述兩種治理概念之間的衝突。
互聯網治理被認為屬於一種由非政府行為體主導的多利益攸關方治理模式,但網絡空間治理也需要政府和政府間組織的參與和協調。互聯網治理項目(Internet Governance Project, IGP)將互聯網治理定義為“所有者、運營商、開發者和用戶共同參與的一個由互聯網協議所聯接起來的與網絡相關的決策,包括確立政策、規則和技術標準的爭端解決機制,制定資源分配和全球互聯網中人類行為的標準。”[24] 上述定義包括三個方面,即技術標準和協議的接受和認可,域名和IP地址等互聯網資源的分配,人類的互聯網行為產生的垃圾郵件、網絡犯罪、版權和商標爭議、消費者保護問題、公共部門和私人的安全問題等相關的規定、規則和政策等。勞拉·迪娜尼斯(Laura DeNardis)提出要按照互聯網傳輸的TCP/IP協議的層級,並根據不同層級的不同功能構建互聯網模式,依據功能、任務和行為體分別討論互聯網資源控制、標准設定、網絡接入、網絡安全治理、信息流動、知識產權保護等六個層面的互聯網治理內容。 [25]
網絡空間治理從原先互聯網治理所強調的專業性、技術性領域轉向更廣泛的政治、安全和經濟範疇,政府和政府間組織在網絡空間治理中的重要性也日益凸顯。網絡空間是一個更廣泛的領域,它不僅包括互聯網,還包括網絡中傳輸的數據,網絡的用戶以及現實社會與虛擬社會的交互等。相對應的網絡空間治理則是一個更加寬泛的概念,它是“包括網絡空間基礎設施、標準、法律、社會文化、經濟、發展等多方面內容的一個範疇”。 [26] 它所包含的治理議題更加多元,面臨的挑戰也在不斷增加。如“棱鏡門事件”引發的對大規模數據監控的關注、政府在網絡空間開展的網絡行動導致的高持續性威脅(APT)、全球範圍內的數字鴻溝(Digital Divide)與數據貧困(Data Poverty )、網絡恐怖主義、網絡商業竊密等越來越多的治理議題已經超越了傳統的互聯網治理理念的範疇。
網絡空間治理博弈中涉及的“全球公域”與“網絡主權”、“網絡自治”與“國家主導”等衝突反映出人們未能客觀、正確地理解“互聯網治理”與“網絡空間治理”之間不同的治理主體、客體和方法,試圖用單一的治理方法去解決其中的多元議題。以ICANN為代表的互聯網治理主體所推崇的自下而上、公開透明的治理模式,對於國家在應對網絡戰、大規模數據監控、竊密等高可持續性威脅、網絡恐怖主義等問題而言,缺乏有效性和針對性。與此同時,以國家為中心、自上而下的網絡空間治理理念也無法有效應對當前國際互聯網治理的現實問題,不能取代互聯網國際組織在該領域的主導地位。
隨著網絡空間治理進程的推進,上述兩種治理理念和方法在碰撞中也開始不斷融合。約瑟夫·奈認為,網絡空間是由多個治理機制組成,其中互聯網治理聚焦於技術層面,是網絡空間治理的一個子集。應當根據不同的治理議題,構建不同的治理機制,讓不同的行為體來發揮主導作用。 [27] 治理觀念的融合還表現在各方對多利益攸關方治理模式共識的增加。 ICANN採用的是一種自下而上、基於共識基礎的決策過程,並主張限制政府作用的治理模式。 [28] 很多信息發展中國家最初對多利益攸關方治理模式持反對態度,強調應當採用政府主導的多邊治理模式。隨著治理進程的深入,信息發展中國家逐步接受多利益攸關方治理模式,只要政府的作用得到合理體現,這種觀點也在私營部門和市民社會代表中獲得越來越多的共識。政府、私營部門和市民社會根據各自的功能與責任來參與決策過程,不刻意將其他行為體排除在外,也不刻意追求個別行為體的領導權,體現出更加客觀和平衡的網絡空間治理理念。

四、中國的戰略應對

中國政府提出了網絡空間全球治理的兩大目標,即共同構建和平、安全、開放、合作的網絡空間和建立多邊、民主、透明的國際互聯網治理體系,同時還將網絡強國戰略作為重要戰略目標納入“十三五”規劃建議中。前者主張對外參與國際網絡空間治理進程,以此來建立有利的國際治理體系;後者主張發展網絡技術力量,培育網絡產業,增強國家網絡實力。兩者之間的相互支持和相互促進需要有一個能夠統籌內外、應對複雜網絡空間形勢的國際戰略。儘管中國政府並未公佈具體的網絡空間國際戰略文件,但通過分析現有的相關政策,仍可以發現中國的網絡空間國際戰略還處於摸索階段。因此,有必要對照網絡空間力量博弈的特點和網絡強國戰略來分析和探討中國的網絡空間國際戰略。
(一)中國網絡空間國際政策實踐
自1994年接入國際互聯網起,中國就制定了各種形式的網絡國際政策融入國際網絡空間體系。這一方面是擴大開放的需要,希望通過國際合作學習、引進國外先進的技術標準;另一方面是信息技術的驅動,融入全球化必須要全方位參與國際體系。 [29] 此外,隨著中國在國際事務中的影響力越來越大以及對網絡的依存度上升,主動參與網絡空間治理也是維護國家利益的重要路徑和方式。中國的網絡政策在很大程度上受到國際網絡空間治理形勢的影響,並在與國際網絡空間治理制度的互動中得到發展和提升,呈現出多領域、多層次和多主體的特點。
第一,中國政府網絡國際政策覆蓋了國際技術標準合作、信息通信技術產業合作、全球互聯網治理、打擊網絡犯罪、網絡經濟、數字鴻溝等多個領域,與全球網絡治理的發展趨勢總體上保持一致。首先,從早期的技術、產業和互聯網標準的合作逐步拓展至更加廣泛的網絡相關政策合作,很多政策領域實際上已經超出了互聯網本身的範疇,與國際經濟、政治、安全相結合。其次,“棱鏡門事件”之後,隨著網絡空間安全治理成為治理中的主要議題,中國網絡政策的關注點也相應聚焦於網絡安全治理,及建立在此基礎上的國家安全、政治安全、經濟安全和社會安全。中國不僅在國際上大力反對大規模網絡監控,提倡維護國家網絡主權,而且在國內政策上也更加註重與網絡安全相關的立法工作,在實踐中維護國家安全和主權。
第二,中國的網絡空間國際政策覆蓋了雙邊、地區、多邊和國際等多個層級。從雙邊層面來看,中國與韓國、英國、澳大利亞等國家建立了政府間對話合作機制,這些合作不僅覆蓋網絡安全、數字經濟和發展等內容,還成為雙邊外交關係的重要內容和支撐。此外,中美、中俄之間在網絡安全領域開展了不同程度的建立信任措施(Confidence Building Measures, CBMs)。 [30] 在地區層面,中國與東盟、上合組織、歐盟、阿盟等地區組織和國家之間建立了多種形式的網絡對話合作機制。 2009年中國政府分別與東盟和上合組織成員國簽訂了《中國—東盟電信監管理事會關於網絡安全問題的合作框架》和《上合組織成員國保障國際信息安全政府間合作協定》。 [31] 中國還積極參與東盟地區論壇網絡安全工作組的工作,並於2013年9月在北京召開了東盟地區論壇“加強網絡安全措施研討會——法律和文化視角”。會議倡議互聯網的發展需要法律規則的引領,也需要促進和尊重文化多樣性,各方應在網絡安全領域加強交流、增進互信、推進合作,共同構建和平、安全、開放、合作的網絡空間。 [32] 最後,中國還積極參與多邊和國際層面的網絡空間治理機制,無論是聯合國框架下的信息安全政府專家組、國際電信聯盟、信息社會世界峰會、互聯網治理論壇,還是聯合國框架之外的倫敦進程、網絡空間多利益攸關方會議等機制,中國都是主要參與者;此外,中國還通過召開世界互聯網大會來開展網絡空間的主場外交。中國還與俄羅斯、烏茲別克斯坦等上合組織成員國共同向聯合國大會提交了兩個版本的“信息安全國際行為準則”。 [33] 中國也是全球互聯網治理聯盟的主要參與方,國家互聯網信息辦公室(網信辦)主任魯煒和阿里巴巴集團董事局主席馬雲當選為該聯盟的委員。
第三,隨著網絡空間治理所覆蓋的內容越來越廣泛,中國網絡空間國際政策參與的主體也從傳統的外交部、工信部進一步擴展到公安部、商務部、財政部以及新成立的網信辦,外交部專門設立了“網絡事務辦公室”來應對網絡空間的外交事務。其中,外交部主要負責雙邊、地區、多邊和國際層面的網絡外交工作,它還是中國對接聯合國框架下網絡治理機制的主要力量,特別是來自外交部軍控司的官員全程參與四屆聯合國信息安全專家組的工作。網信辦作為中央網絡安全與信息化領導小組的常設機構,是中國為了統籌應對網絡安全與信息化新設立的重要機構。網信辦作為統籌、協調中國網絡事務的機構在網絡國際政策中的角色越來越重要,不僅開展了多層級的國際網絡安全與數字經濟合作,還建立了世界互聯網大會治理機制。此外,公安部在打擊網絡安全犯罪、網絡反恐,商務部在信息通信技術市場准入,財政部在網絡基礎設施對外援助等領域的工作都將是中國今後實施網絡空間國際戰略的堅實基礎。
由此可見,中國已經形成了一個較為全面、深入的網絡空間國際戰略架構,包括多元的參與主體、寬領域的議題覆蓋和多層級的參與路徑,這為網絡空間治理的國際戰略構建奠定了良好基礎。伴隨著中國從網絡大國向網絡強國的發展,中國將會建立一個全面、完善的網絡空間國際戰略。
(二)網絡空間國際戰略面臨的挑戰
網絡空間治理的力量博弈變化給中國的網絡空間國際戰略帶來了多重挑戰:一是信息發達國家將繼續主導網絡空間治理博弈的方向,這對中國的網絡空間國際戰略構成挑戰;二是由於缺乏高級互聯網治理人才,導致中國在互聯網國際組織中的代表性嚴重不足;三是網絡空間治理博弈轉向強調能力建設(Capacity Building)、最佳實踐(Best Practice)等方向,將給中國帶來競爭壓力。這些問題和挑戰對中國網絡空間國際戰略將產生較大衝擊,若處理不當,會對網絡強國戰略的實施造成負面影響。
第一,信息發達國家繼續主導網絡空間治理博弈方向對中國國際戰略構成的挑戰。網絡空間全球治理是通過各種形式的治理機制發揮作用,機制的構建取決於各行為體之間的談判,談判的籌碼不僅取決於各行為體的權力大小,還與各方在網絡空間全球治理中的議程設置能力息息相關。 [34] 按照約瑟夫·奈的定義,前者可稱之為“硬權力”,後者是“軟權力”。 [35] 信息發達國家在這兩個領域的優勢明顯,特別是在通過選擇性或者優先設置議程左右網絡空間治理的機制構建。比如在網絡安全治理中,美國依靠其議程設置能力阻止國際社會將大規模數據監控列為治理議程,同時將其重點關切的網絡經濟竊密設置為優先議程。此外,信息發達國家在設置網絡人權議程時,將重點置於自由領域,而民主(一國一票)、平等(大小國家擁有同等話語權)等同樣重要的議題則被排除在議程之外。不僅如此,對於各國在“棱鏡門事件”後要求加強行使網絡主權的趨勢,美國則提出“數據本地化”(Data Localization)這一議程以規避在全球治理機制中討論網絡主權。與信息發達國家相比,信息發展中國家在議程設置能力上還存在較大差距,缺乏主動設置議程的能力。近年來,隨著中國、巴西、印度等國先後建立了各種網絡空間治理機制,新興大國在網絡空間全球治理中的議程設置能力不斷增強。但總體而言,中國與信息發達國家在治理能力方面的差距依舊存在,並將影響中國通過國際機制維護自身國家利益,以及表達自身關切。

第二,由于缺乏高级网络空间治理人才,导致中国在互联网国际组织中的代表性严重不足。网络空间治理博弈的趋势表明,ICANN、IETF等国际组织对互联网关键资源的控制权不会受到政府和政府间组织的挑战。随着美国政府放弃对ICANN的控制权,后者将具有更大的独立性。网络空间建立在互联网基础之上,网络空间治理的基础也是互联网治理。因此,中国的网络空间国际战略必须要在互联网治理领域实现突破,同时提升在互联网国际组织中的影响力和代表性。对包括中国在内的广大信息发展中国家而言,必须增加在ICANN等国际组织中的代表性,让更多来自中国和其他发展中国家的声音出现在ICANN中。
第三,网络空间治理博弈转向强调能力建设、最佳实践等方向,这将给中国带来严峻的竞争压力。网络空间治理博弈理念的融合使得国际社会对网络空间治理的焦点转向了能力建设、最佳实践等可操作和可落实的领域,包括向信息发展中国家和信息不发达国家提供网络基础设施;提供与网络空间治理相关的技术、法律、政策等人才的培训;提供网络空间治理中遇到的解决各种具体问题的最佳实践。这对于中国参与网络空间治理的国际战略提出了更高的要求,信息发达国家在上述领域的资源优势、人才优势短期内难以撼动,这不仅需要中国政府投入更多资源,也需要中国的互联网企业、行业协会、法律专家的共同和积极参与。
(三)中国参与网络空间治理的战略思路
确立中国网络空间国际战略的基本路径与中国整体对外战略强调的融入国际体系,并推动改革国际体系的宏观目标相一致。[36] 为应对复杂的网络空间治理博弈,中国一方面要加强能力建设,并注重将能力转化为参与网络空间全球治理的影响力;另一方面在网络安全与开放之间寻求平衡,通过参与国际网络空间建章立制来维护自己的合法权益,避免过度安全化带来的负面影响;并加强网络强国战略与网络空间国际战略之间的战略互动,形成相互支持的网络空间战略体系。
第一,结合网络空间治理的新近和未来发展态势,强化对国际机制的塑造能力。在网络空间全球治理层面,围绕治理平台的斗争日趋激烈。包括互联网论坛、国际电信联盟、伦敦进程、巴西网络空间多利益攸关方会议以及中国的世界互联网大会在内,各个平台都有其主导力量,参与的行为体所关注的议题和发挥的影响力均不相同。中国应结合世界互联网论坛以及参与的其他网络空间治理机制,在网络安全、网络犯罪、能力建设、网络经济、网络文化、数字鸿沟等议题中,探索如何提升自身向国际社会提供能力建设方案、最佳实践和解决方案等公共产品的能力。
第二,着重培养参与网络空间治理的国际化人才。国际互联网治理组织多为非政府组织,其采用的多利益攸关方治理模式通常要求从互联网社群中选拔高级管理人才,根据选拔对象对互联网技术、治理所作出的贡献来来担任相应的高级管理职务,而非传统政府间组织的一国一票或按照人口、经济比例来分配名额。以ICANN为例,其现有的管理架构是由董事会和3个支持组织、3个咨询委员会及2个技术咨询机构组成。董事会由16名具有表决权的成员和5名不具有表决权的联络员组成,除ICANN总裁之外,其余15个名额分别来自支持组织、一般会员咨询委员会、区域一般会员组织和提名委员会。要想当选为有投票权的委员,必须要通过自下而上的提名和选举。因此,中国应当理顺体制和机制,积极向ICANN等国际非政府组织输送人才,鼓励互联网企业、行业组织和学术机构积极参与ICANN、IETF、互联网架构委员会(Internet Architecture Board, IAB)等机构的人才选拔,以此来提升在互联网国际组织中的代表性和发言权,并提高中国对互联网治理的影响力。
第三,加强网络强国战略与网络空间国际战略之间的战略互动。中国在“十三五”规划建议中正式提出网络强国战略,并从技术创新、网络文化、网络基础设施、网络安全和信息化建设、国际合作五个方面着手,推进网络强国建设。[37] 网络强国战略中多次提到了对外开放、积极参与国际互联网治理,甚至将国际合作作为单独一章。由此可见,网络空间国际战略与网络强国战略之间相互融合、相互支撑。两者的有效互动,关系到中国对网络空间的开放、安全与发展关系的处理。从双层博弈的角度来看,任何一个国家的战略都面临外部形势和内部利益集团的双重约束,过度强调开放或者安全都不利于整体国家安全和利益。强化网络强国战略与网络空间国际战略之间的互动,有助于提高决策者对于网络空间的安全与开放,网络空间的安全、发展、与开放之间关系的认知,打破双重约束,制定更加符合客观规律的政策。
从技术层面来说,网络强国战略可以更好地为中国参与全球网络空间治理提供支撑。当前网络空间治理的主要竞争已经从认知、理念层面的博弈,转向提供解决方案、最佳实践、能力建设等具体的议题合作领域。缺乏有效的支撑,网络空间国际战略难以持续,并赢得国际社会的认可。与此同时,网络空间国际战略也有助于为网络强国战略营造有利的外部环境、提供外部先进的经验和教训,向国内的ICT企业提供广阔的国际市场。最后,还可借鉴对外援助领域的经验,通过ICT领域的对外援助缓解甚至消除网络空间治理中的数字鸿沟问题,一方面可以为网络空间治理贡献中国力量,另一方面也有助于中国ICT企业的国际化战略.

Original URL: http://www.siis.org.cn/Research/Info/629

 

中央網信辦發布《國家網絡安全事件應急預案》Communist Chinese Party issues National Network Security Incident Contingency Plans

中央網信辦發布《國家網絡安全事件應急預案》

Communist Chinese Party issues National Network Security Incident Contingency Plans

2017年06月27日 17:16中国网信网

Notice of the Central Network Office on Printing and Distributing the Emergency Plan for National Network Security Incidents

China Network Office issued a document [2017] No. 4

Provinces, autonomous regions and municipalities, Xinjiang Production and Construction Corps Party Committee Network Security and Information Leading Group, the central and state organs of the ministries, the people’s organizations:

“National network security incident contingency plans” has been the central network security and information leading group agreed, is now issued to you, please carefully organize the implementation.

Central Network Security and Information Leading Group Office

January 10, 2017

National network security incident contingency plans

table of Contents

1 General

1.1 Purpose of preparation

1.2 Preparation basis

1.3 Scope of application

1.4 Event rating

1.5 working principle

Organizational Structure and Responsibilities

2.1 Leadership and Responsibilities

2.2 offices and responsibilities

2.3 Responsibilities of various departments

2.4 duties of provinces (autonomous regions and municipalities)

3 monitoring and early warning

3.1 Early warning classification

3.2 Early warning monitoring

3.3 Early warning judgment and release

3.4 Early warning response

3.5 warning release

4 emergency treatment

4.1 Event report

4.2 Emergency response

4.3 Emergency end

5 Investigation and evaluation

6 to prevent work

6.1 Daily management

6.2 Walkthrough

6.3 Advocacy

6.4 Training

Precautions during important events

7 safeguards

7.1 Institutions and personnel

7.2 technical support team

7.3 expert team

7.4 Social resources

7.5 base platform

7.6 Technology research and development and industry promotion

7.7 International cooperation

7.8 material security

7.9 Funds protection

7.10 Responsibility and rewards and punishments

8 Annex

8.1 Project Management

8.2 Explanation of the plan

8.3 Implementation time of the plan

1 General

1.1 Purpose of preparation

Establish and improve the national network security incident emergency mechanism to improve the ability to deal with network security events, prevent and reduce network security incidents caused by the loss and harm, protect the public interest, safeguard national security, public safety and social order.

1.2 Preparation basis

“People’s Republic of China Incident Response Law”, “People’s Republic of China Network Security Law”, “National General Public Emergency Plan”, “Emergency Emergency Plan Management Measures” and “Information Security Technology Information Security Event Classification Classification Guide “(GB / Z 20986-2007) and other relevant provisions.

1.3 Scope of application

The cybersecurity incident referred to in this plan refers to events that cause adverse effects to the society due to human causes, hardware and software defects or failures, natural disasters, etc., which cause harm to the network and the information system or the data in it, Network attack events, information corruption events, information content security incidents, device facility failures, catastrophic events, and other events.

This plan applies to the work of network security events. Among them, the information content security incident response, to develop a special plan.

1.4 Event rating

Network security events are divided into four levels: particularly significant network security events, major network security incidents, larger network security events, and general network security events.

(1) meets one of the following scenarios for a particularly significant cyber security incident:

① Significant network and information systems suffer from particularly serious system losses, resulting in large paralysis of the system and loss of business processing capacity.

② State secret information, important sensitive information and key data loss or theft, tampering, counterfeiting, constitute a particularly serious threat to national security and social stability.

③ other network security incidents that pose a particularly serious threat to national security, social order, economic construction and public interest, causing particularly serious impact.

(2) meets one of the following scenarios and does not meet significant network security incidents for significant network security incidents:

① important network and information systems suffered serious system losses, resulting in a long time the system interrupted or partial paralysis, business processing capacity has been greatly affected.

② State secret information, important sensitive information and key data loss or theft, tampering, counterfeiting, posing a serious threat to national security and social stability.

③ other serious threats to national security, social order, economic construction and public interest, causing serious impact on network security incidents.

(3) meet one of the following conditions and does not meet significant network security incidents for larger network security events:

① important network and information systems suffer from greater system loss, resulting in system interruption, significantly affect the system efficiency, business processing capacity is affected.

② State secret information, important sensitive information and key data loss or theft, tampering, counterfeiting, posing a serious threat to national security and social stability.

③ other on the national security, social order, economic construction and public interests constitute a more serious threat, resulting in more serious impact of network security incidents.

(4) In addition to the above, the national security, social order, economic construction and public interests constitute a certain threat, resulting in a certain impact on the network security incidents for the general network security incidents.

1.5 working principle

Adhere to the unified leadership, grading responsibility; adhere to the unified command, close coordination, rapid response, scientific treatment; adhere to the prevention of prevention, prevention and emergency combination; adhere to who is responsible for who, who is responsible for running, give full play to all forces together Prevention and disposal of network security incidents.

Organizational Structure and Responsibilities

2.1 Leadership and Responsibilities

Under the leadership of the Central Network Security and Information Leading Group (hereinafter referred to as the “Leading Group”), the Office of the Central Network Security and Information Leading Group (hereinafter referred to as the “Central Network Office”) coordinates the organization of national network security incident response, Establish and improve the cross-sectoral linkage mechanism, the Ministry of Industry and Information Technology, the Ministry of Public Security, the State Secrecy Bureau and other relevant departments in accordance with the division of responsibilities responsible for the relevant network security incident response. If necessary, the establishment of national network security incident emergency headquarters (hereinafter referred to as “the headquarters”), responsible for the special major network security incident handling organization and coordination and coordination.

2.2 offices and responsibilities

National Network Security Emergency Office (hereinafter referred to as “emergency office”) is located in the central network letter office, the specific work by the central network letter to do Network Security Coordination Bureau. Emergency Office is responsible for the network security emergency cross-sectoral, cross-regional coordination of the work and the headquarters of the transactional work, organization and guidance of national network security emergency technical support team to do emergency technical support work. The relevant departments are responsible for the relevant work of the Secretary-level comrades as liaison officers, contact emergency office work.

2.3 Responsibilities of various departments

The central and state departments and departments in accordance with their duties and authority, responsible for the sector, the industry network and information systems network security incident prevention, monitoring, reporting and emergency response.

2.4 duties of provinces (autonomous regions and municipalities)

The administrative departments of the provinces (autonomous regions and municipalities) shall coordinate and organize the prevention, monitoring, reporting and emergency handling of network security incidents in the regional network and information systems under the unified leadership of the Party Committee’s Network Safety and Information Leading Group.

3 monitoring and early warning

3.1 Early warning classification

The network security event warning level is divided into four levels: from high to low, followed by red, orange, yellow and blue, respectively, corresponding to occur or may occur particularly significant, significant, large and general network security events.

3.2 Early warning monitoring

The units in accordance with the “who is responsible for who is responsible for who who is responsible for” the requirements of the organization of the unit construction and operation of the network and information systems to carry out network security monitoring. Focus on industry executives or regulatory organizations to guide the organization to do the work of network security monitoring. The provinces (autonomous regions and municipalities) network letter department with the actual situation in the region, the organization of the region to carry out the network and information systems security monitoring. Provinces (autonomous regions and municipalities), the departments will be important monitoring information reported to be urgent, emergency office to carry out inter-provincial (district, city), cross-sectoral network security information sharing.

3.3 Early warning judgment and release

Provinces, autonomous regions and municipalities, departments of the monitoring of information on the judge, that the need for immediate preventive measures, should promptly notify the relevant departments and units, may occur on major and above network security incidents in a timely manner to the emergency response report. Provinces (autonomous regions and municipalities), the departments can be based on monitoring and judging the situation, the release of the region, the industry’s orange and the following warning.

Emergency organization to determine, determine and publish red warning and involving multi-province (district, city), multi-sectoral, multi-industry early warning.

Early warning information includes the category of the event, the level of the alert, the starting time, the possible scope, the warning, the measures and time limits that should be taken, the issuing authority, and so on.

3.4 Early warning response

3.4.1 Red warning response

(1) the emergency response organization organization early warning response work, contact experts and relevant agencies, organizations to track the development of the situation to study and formulate preventive measures and emergency work program, coordination of resource scheduling and departmental linkage of the preparatory work.

(2) the relevant provinces (autonomous regions and municipalities), the Department of network security incident emergency command agencies to implement 24 hours on duty, the relevant personnel to maintain communication links. Strengthen the network security incident monitoring and development of information collection work, organize and guide the emergency support team, the relevant operating units to carry out emergency treatment or preparation, risk assessment and control work, the important situation retribution urgent.

(3) the national network security emergency technical support team into the standby state, for the early warning information research to develop a response program, check emergency vehicles, equipment, software tools, to ensure a good condition.

3.4.2 Orange warning response

(1) the relevant provinces (autonomous regions and municipalities), departmental network security incident emergency command agencies to start the corresponding contingency plans, organize early warning response, do risk assessment, emergency preparedness and risk control.

(2) the relevant provinces (autonomous regions and municipalities), departments in a timely manner to the situation of the situation reported to the emergency response. The Emergency Office is closely following the development of the matter and timely notification of the relevant provinces (autonomous regions and municipalities) and departments.

(3) the national network security emergency technical support team to keep in touch, check emergency vehicles, equipment, software tools, to ensure that in good condition.

3.4.3 yellow, blue warning response

The relevant regional and departmental network security incident emergency command agencies to start the corresponding contingency plans to guide the organization to carry out early warning response.

3.5 warning release

Early warning release departments or regions according to the actual situation, to determine whether to lift the warning, timely release warning release information.

4 emergency treatment

4.1 Event report

After the network security incident occurs, the incident unit should immediately start the emergency plan, the implementation of disposal and timely submission of information. The relevant regions and departments immediately organize the early disposal, control the situation, eliminate hidden dangers, at the same time organization and judgment, pay attention to save the evidence, do a good job of information communication. For the primary judgment is particularly significant, major network security incidents, and immediately report to the emergency office.

4.2 Emergency response

The network security incident emergency response is divided into four levels, corresponding to particularly significant, significant, large and general network security events. Level I is the highest response level.

4.2.1 Class I response

Is a particularly important network security incidents, timely start I-level response, the establishment of the headquarters, the implementation of emergency response to the unified leadership, command and coordination responsibilities. Emergency Office 24 hours on duty.

The relevant departments (district, city), the department emergency response agencies into the emergency state, in the command of the unified leadership, command and coordination, responsible for the province (district, city), the department emergency work or support security work, 24 hours on duty, And sent to participate in emergency office work.

The relevant provinces (autonomous regions and municipalities), departments to track the development of the situation, check the scope of the impact of the situation in time to change the situation, the progress of the report retribution. The headquarters of the response to the work of the decision-making arrangements, the relevant provinces (autonomous regions and municipalities) and departments responsible for the organization and implementation.

4.2.2 Class II response

The level response of the network security incident is determined by the relevant province (district, city) and the department according to the nature and circumstances of the incident.

(1) the incident occurred in the province (district, city) or department of the emergency command agencies into the emergency state, in accordance with the relevant emergency plans to do emergency work.

(2) the incident occurred in the province (district, city) or departments in a timely manner to change the situation developments. The emergency office will keep the relevant matters and the relevant departments and departments in a timely manner.

(3) the disposal of the need for other relevant provinces (autonomous regions and municipalities), departments and national network security emergency technical support team with the support and business emergency response to be coordinated. Relevant provinces (autonomous regions and municipalities), departments and national network security emergency technical support team should be based on their respective responsibilities, and actively cooperate to provide support.

(4) The relevant provinces (autonomous regions and municipalities) and departments shall, in accordance with the notification of the emergency office, strengthen the prevention and prevent the greater impact and losses on the basis of their actual and targeted efforts.

4.2.3 Class Ⅲ, Ⅳ level response

Event areas and departments in accordance with the relevant plans for emergency response.

4.3 Emergency end

4.3.1 End of class I response

Emergency Office to make recommendations, reported to the headquarters after approval, timely notification of the relevant provinces (autonomous regions and municipalities) and departments.

4.3.2 Level II response ends

(Autonomous regions and municipalities) or departments, the emergency response, emergency response to the relevant provinces (autonomous regions and municipalities) and departments.

5 Investigation and evaluation

Special major network security incidents by the emergency branch of the relevant departments and provinces (autonomous regions and municipalities) to investigate and summarize the assessment, according to the procedures reported. Significant and the following network security incidents are organized by the event area or department to organize their own investigation and summary assessment, including the major network security incident related to the summary report of the report retribution. Summary of the investigation report should be the cause of the event, nature, impact, responsibility analysis and evaluation, put forward the views and improvement measures.

The investigation and summary of the incident is carried out in principle within 30 days after the end of the emergency response.

6 to prevent work

6.1 Daily management

All localities and departments should do a good job in the day-to-day prevention of network security incidents, formulate and improve relevant emergency plans, do a good job of network security inspection, risk investigation, risk assessment and disaster recovery, improve the network security information notification mechanism, take timely and effective measures, Reduce and avoid the occurrence and harm of network security incidents, improve the ability to deal with network security incidents.

6.2 Walkthrough

Central Network letter to coordinate the relevant departments to organize regular exercises, test and improve the plan to improve the actual combat capability.

The provinces (autonomous regions and municipalities), departments at least once a year to organize a plan exercise, and the exercise situation reported to the central network letter to do.

6.3 Advocacy

All localities and departments should make full use of various media and other effective propaganda forms to strengthen the publicity and disposal of relevant laws, regulations and policies for the prevention and disposal of sudden network security incidents and carry out propaganda activities on basic knowledge and skills of network security.

6.4 Training

All localities and departments should regard the emergency knowledge of cyber security incidents as the training content of leading cadres and relevant personnel, strengthen the training of network security, especially network security contingency plans, and improve awareness and skills.

Precautions during important events

In the national important activities, during the meeting, the provinces (autonomous regions and municipalities), various departments to strengthen the network security incidents to prevent and emergency response to ensure network security. Emergency Office to coordinate the work of network security, according to the requirements of the relevant provinces (autonomous regions and municipalities), departments to start the red warning response. The relevant provinces (autonomous regions and municipalities), departments to strengthen network security monitoring and analysis of judgments, timely warning may cause significant impact on the risks and risks, key departments, key positions to maintain 24 hours on duty, timely detection and disposal of network security incidents.

7 safeguards

7.1 Institutions and personnel

All localities and departments, units to implement the network security emergency work responsibility system, the responsibility to implement specific departments, specific positions and individuals, and establish a sound emergency working mechanism.

7.2 technical support team

Strengthen the network security emergency technical support team building, do a good job of network security incident monitoring and early warning, prevention and protection, emergency response, emergency technical support work. Support network security enterprises to improve emergency response capabilities, to provide emergency technical support. The central network to do assessment of the development of accreditation standards, organizational assessment and identification of national network security emergency technical support team. All provinces (autonomous regions and municipalities), departments should be equipped with the necessary network security professional and technical personnel, and strengthen the national network security related technical units of communication, coordination, the establishment of the necessary network security information sharing mechanism.

7.3 expert team

The establishment of national network security emergency expert group, for the network security incident prevention and disposal of technical advice and decision-making recommendations. All regions and departments to strengthen their own team of experts, give full play to the role of experts in the emergency response.

7.4 Social resources

From the educational research institutions, enterprises and institutions, associations in the selection of network security personnel, pooling technology and data resources, the establishment of network security incident emergency service system to improve the response to particularly significant, major network security incidents.

7.5 base platform

All regions and departments to strengthen the network security platform and management platform for emergency management, so early detection, early warning, early response, improve emergency response capability.

7.6 Technology research and development and industry promotion

Relevant departments to strengthen network security technology research, and constantly improve the technical equipment, emergency response to provide technical support. Strengthen the policy guidance, focus on supporting network security monitoring and early warning, prevention and protection, disposal of rescue, emergency services and other directions to enhance the overall level of network security industry and core competitiveness, and enhance the prevention and disposal of network security event industry support capabilities.

7.7 International cooperation

Relevant departments to establish international cooperation channels, signed a cooperation agreement, if necessary, through international cooperation to deal with sudden network security incidents.

7.8 material security

Strengthen the network security emergency equipment, tools, reserves, timely adjustment, upgrade software hardware tools, and constantly enhance the emergency technical support capabilities.

7.9 Funds protection

The financial department provides the necessary financial guarantee for the emergency disposal of the network security incident. Relevant departments to use the existing policies and funding channels to support the network security emergency technical support team building, expert team building, basic platform construction, technology research and development, planning exercises, material security and other work carried out. All regions and departments for the network security emergency work to provide the necessary financial protection.

7.10 Responsibility and rewards and punishments

Implementation of Responsibility System for Emergency Work of Network Security Incident.

The central network letter office and the relevant regional and departmental network security incident emergency management work to make outstanding contributions to the advanced collective and individuals to commend and reward.

The central network and the relevant departments and departments do not follow the provisions of the formulation of plans and organizations to carry out exercises, late, false, concealed and owe the network security incidents important or emergency management work in other misconduct, dereliction of duty, in accordance with the relevant Provides for the responsible person to be punished; constitute a crime, shall be held criminally responsible.

8 Annex

8.1 Project Management

The plan is evaluated in principle once a year and revised in a timely manner according to the actual situation. The revision work is handled by the central network.

All provinces (autonomous regions and municipalities), departments and units shall, according to the plan, formulate or revise the contingency plans for the network security incidents in the region, the department, the industry and the unit.

8.2 Explanation of the plan

The plan is interpreted by the central network letter office.

8.3 Implementation time of the plan

The plan has been implemented since the date of issuance.

Attachment:

1. Network security event classification

2. Terminology

3. Network and information system loss degree description

attachment1

Network Security Event Classification

Network security events are classified as unwanted program events, network attack events, information corruption events, information content security incidents, device facility failures, catastrophic events, and other network security incidents.

(1) Harmful program events are classified into computer virus events, worm events, Trojan events, botnet events, mixed program attack events, web embedded malicious code events, and other unwanted program events.

(2) network attacks are divided into denial of service attacks, backdoor attacks, vulnerability attacks, network scanning eavesdropping events, phishing events, interference events and other network attacks.

(3) information destruction events are classified as information tampering events, information fake events, information disclosure incidents, information theft events, information loss events and other information destruction events.

(4) Information content security incidents refer to the dissemination of laws and regulations through the Internet to prohibit information, organize illegal series, incite rallies or hype sensitive issues and endanger national security, social stability and public interest events.

(5) equipment and equipment failure is divided into hardware and software failure, peripheral protection facilities failure, man-made damage and other equipment and equipment failure.

(6) Disastrous events refer to network security incidents caused by other emergencies such as natural disasters.

(7) Other events refer to network security events that can not be classified as above.

Annex 2

Terminology

First, the important network and information systems

The network and information systems that are closely related to national security, social order, economic construction and public interest.

(Reference: “Information Security Technology Information Security Event Classification and Classification Guide” (GB / Z 20986-2007))

Second, the important sensitive information

Information that is not related to national secrets but is closely related to national security, economic development, social stability and corporate and public interest, which, once unauthorized, is disclosed, lost, misused, tampered with or destroyed, may have the following consequences:

A) damage to national defense, international relations;

B) damage to State property, public interest and personal property or personal safety;

C) affect the state to prevent and combat economic and military spies, political infiltration, organized crime;

D) affect the administrative organs to investigate and deal with illegal, dereliction of duty, or suspected of illegal, dereliction of duty;

E) interfere with government departments to carry out administrative activities such as supervision, management, inspection and auditing impartially, hinder government departments from performing their duties;

F) endanger the national key infrastructure, government information system security;

G) affect the market order, resulting in unfair competition, undermining the laws of the market;

H) can be inferred from the state secret matter;

I) infringement of personal privacy, corporate trade secrets and intellectual property rights;

J) damage to the country, business, personal other interests and reputation.

(Reference: “Information Security Technology Cloud Computing Service Security Guide” (GB / T31167-2014))

Annex 3

Network and Information System Losses

Network and information system loss refers to the network security incidents due to network hardware and software, functions and data damage, resulting in system business interruption, so as to the loss caused by the organization, the size of the main consideration to restore the normal operation of the system and eliminate security incidents Negative effects are deducted as particularly serious system losses, severe system losses, greater system losses, and minor system losses, as follows:

A) Particularly serious systemic damage: a large area of ​​paralysis of the system, loss of business processing capacity, or confidentiality, integrity, availability of critical data, serious damage to the system, normal operation of the system and elimination of the negative impact of security incidents The price paid is very great, for the incident is unbearable;

B) Serious system loss: causing the system to be interrupted for a long time or partially paralyzed, greatly compromising its business processing capacity, or the confidentiality, integrity, availability of the critical data, the recovery of the system and the elimination of security incidents Negative effects are huge, but are affordable for the organization;

C) Larger system losses: causing system outages, significantly affecting system efficiency, affecting the operational capacity of important information systems or general information systems, or the confidentiality, integrity, availability of system critical data, and the restoration of the system The cost of running and eliminating the negative effects of security incidents is greater, but it is entirely affordable for the organization;

D) Smaller system losses: causing system interruption, affecting system efficiency, affecting system operational capacity, or confidentiality, integrity, availability of system critical data, restoring system uptime and eliminating security incidents The cost of the impact is less.

Original Mandarin Chinese:

中央網信辦關於印發《國家網絡安全事件應急預案》的通知

中網辦發文〔2017〕4號

各省、自治區、直轄市、新疆生產建設兵團黨委網絡安全和信息化領導小組,中央和國家機關各部委、各人民團體:

《國家網絡安全事件應急預案》已經中央網絡安全和信息化領導小組同意,現印發給你們,請認真組織實施。

中央網絡安全和信息化領導小組辦公室

2017年1月10日

國家網絡安全事件應急預案

目 錄

1 總則

1.1 編制目的

1.2 編制依據

1.3 適用範圍

1.4 事件分級

1.5 工作原則

2 組織機構與職責

2.1 領導機構與職責

2.2 辦事機構與職責

2.3 各部門職責

2.4 各省(區、市)職責

3 監測與預警

3.1 預警分級

3.2 預警監測

3.3 預警研判和發布

3.4 預警響應

3.5 預警解除

4 應急處置

4.1 事件報告

4.2 應急響應

4.3 應急結束

5 調查與評估

6 預防工作

6.1 日常管理

6.2 演練

6.3 宣傳

6.4 培訓

6.5 重要活動期間的預防措施

7 保障措施

7.1 機構和人員

7.2 技術支撐隊伍

7.3 專家隊伍

7.4 社會資源

7.5 基礎平台

7.6 技術研發和產業促進

7.7 國際合作

7.8 物資保障

7.9 經費保障

7.10 責任與獎懲

8 附則

8.1 預案管理

8.2 預案解釋

8.3 預案實施時間

1 總則

1.1 編制目的

建立健全國家網絡安全事件應急工作機制,提高應對網絡安全事件能力,預防和減少網絡安全事件造成的損失和危害,保護公眾利益,維護國家安全、公共安全和社會秩序。

1.2 編制依據

《中華人民共和國突發事件應對法》、《中華人民共和國網絡安全法》、《國家突發公共事件總體應急預案》、《突發事件應急預案管理辦法》和《信息安全技術信息安全事件分類分級指南》(GB/Z 20986-2007)等相關規定。

1.3 適用範圍

本預案所指網絡安全事件是指由於人為原因、軟硬件缺陷或故障、自然災害等,對網絡和信息系統或者其中的數據造成危害,對社會造成負面影響的事件,可分為有害程序事件、網絡攻擊事件、信息破壞事件、信息內容安全事件、設備設施故障、災害性事件和其他事件。

本預案適用於網絡安全事件的應對工作。其中,有關信息內容安全事件的應對,另行製定專項預案。

1.4 事件分級

網絡安全事件分為四級:特別重大網絡安全事件、重大網絡安全事件、較大網絡安全事件、一般網絡安全事件。

(1)符合下列情形之一的,為特別重大網絡安全事件:

①重要網絡和信息系統遭受特別嚴重的系統損失,造成系統大面積癱瘓,喪失業務處理能力。

②國家秘密信息、重要敏感信息和關鍵數據丟失或被竊取、篡改、假冒,對國家安全和社會穩定構成特別嚴重威脅。

③其他對國家安全、社會秩序、經濟建設和公眾利益構成特別嚴重威脅、造成特別嚴重影響的網絡安全事件。

(2)符合下列情形之一且未達到特別重大網絡安全事件的,為重大網絡安全事件:

①重要網絡和信息系統遭受嚴重的系統損失,造成系統長時間中斷或局部癱瘓,業務處理能力受到極大影響。

②國家秘密信息、重要敏感信息和關鍵數據丟失或被竊取、篡改、假冒,對國家安全和社會穩定構成嚴重威脅。

③其他對國家安全、社會秩序、經濟建設和公眾利益構成嚴重威脅、造成嚴重影響的網絡安全事件。

(3)符合下列情形之一且未達到重大網絡安全事件的,為較大網絡安全事件:

①重要網絡和信息系統遭受較大的系統損失,造成系統中斷,明顯影響系統效率,業務處理能力受到影響。

②國家秘密信息、重要敏感信息和關鍵數據丟失或被竊取、篡改、假冒,對國家安全和社會穩定構成較嚴重威脅。

③其他對國家安全、社會秩序、經濟建設和公眾利益構成較嚴重威脅、造成較嚴重影響的網絡安全事件。

(4)除上述情形外,對國家安全、社會秩序、經濟建設和公眾利益構成一定威脅、造成一定影響的網絡安全事件,為一般網絡安全事件。

1.5 工作原則

堅持統一領導、分級負責;堅持統一指揮、密切協同、快速反應、科學處置;堅持預防為主,預防與應急相結合;堅持誰主管誰負責、誰運行誰負責,充分發揮各方面力量共同做好網絡安全事件的預防和處置工作。

2 組織機構與職責

2.1 領導機構與職責

在中央網絡安全和信息化領導小組(以下簡稱“領導小組”)的領導下,中央網絡安全和信息化領導小組辦公室(以下簡稱“中央網信辦”)統籌協調組織國家網絡安全事件應對工作,建立健全跨部門聯動處置機制,工業和信息化部、公安部、國家保密局等相關部門按照職責分工負責相關網絡安全事件應對工作。必要時成立國家網絡安全事件應急指揮部(以下簡稱“指揮部”),負責特別重大網絡安全事件處置的組織指揮和協調。

2.2 辦事機構與職責

國家網絡安全應急辦公室(以下簡稱“應急辦”)設在中央網信辦,具體工作由中央網信辦網絡安全協調局承擔。應急辦負責網絡安全應急跨部門、跨地區協調工作和指揮部的事務性工作,組織指導國家網絡安全應急技術支撐隊伍做好應急處置的技術支撐工作。有關部門派負責相關工作的司局級同志為聯絡員,聯絡應急辦工作。

2.3 各部門職責

中央和國家機關各部門按照職責和權限,負責本部門、本行業網絡和信息系統網絡安全事件的預防、監測、報告和應急處置工作。

2.4 各省(區、市)職責

各省(區、市)網信部門在本地區黨委網絡安全和信息化領導小組統一領導下,統籌協調組織本地區網絡和信息系統網絡安全事件的預防、監測、報告和應急處置工作。

3 監測與預警

3.1 預警分級

網絡安全事件預警等級分為四級:由高到低依次用紅色、橙色、黃色和藍色表示,分別對應發生或可能發生特別重大、重大、較大和一般網絡安全事件。

3.2 預警監測

各單位按照“誰主管誰負責、誰運行誰負責”的要求,組織對本單位建設運行的網絡和信息系統開展網絡安全監測工作。重點行業主管或監管部門組織指導做好本行業網絡安全監測工作。各省(區、市)網信部門結合本地區實際,統籌組織開展對本地區網絡和信息系統的安全監測工作。各省(區、市)、各部門將重要監測信息報應急辦,應急辦組織開展跨省(區、市)、跨部門的網絡安全信息共享。

3.3 預警研判和發布

各省(區、市)、各部門組織對監測信息進行研判,認為需要立即採取防範措施的,應當及時通知有關部門和單位,對可能發生重大及以上網絡安全事件的信息及時向應急辦報告。各省(區、市)、各部門可根據監測研判情況,發布本地區、本行業的橙色及以下預警。

應急辦組織研判,確定和發布紅色預警和涉及多省(區、市)、多部門、多行業的預警。

預警信息包括事件的類別、預警級別、起始時間、可能影響範圍、警示事項、應採取的措施和時限要求、發布機關等。

3.4 預警響應

3.4.1 紅色預警響應

(1)應急辦組織預警響應工作,聯繫專家和有關機構,組織對事態發展情況進行跟踪研判,研究制定防範措施和應急工作方案,協調組織資源調度和部門聯動的各項準備工作。

(2)有關省(區、市)、部門網絡安全事件應急指揮機構實行24小時值班,相關人員保持通信聯絡暢通。加強網絡安全事件監測和事態發展信息蒐集工作,組織指導應急支撐隊伍、相關運行單位開展應急處置或準備、風險評估和控制工作,重要情況報應急辦。

(3)國家網絡安全應急技術支撐隊伍進入待命狀態,針對預警信息研究制定應對方案,檢查應急車輛、設備、軟件工具等,確保處於良好狀態。

3.4.2 橙色預警響應

(1)有關省(區、市)、部門網絡安全事件應急指揮機構啟動相應應急預案,組織開展預警響應工作,做好風險評估、應急準備和風險控制工作。

(2)有關省(區、市)、部門及時將事態發展情況報應急辦。應急辦密切關注事態發展,有關重大事項及時通報相關省(區、市)和部門。

(3)國家網絡安全應急技術支撐隊伍保持聯絡暢通,檢查應急車輛、設備、軟件工具等,確保處於良好狀態。

3.4.3 黃色、藍色預警響應

有關地區、部門網絡安全事件應急指揮機構啟動相應應急預案,指導組織開展預警響應。

3.5 預警解除

預警發布部門或地區根據實際情況,確定是否解除預警,及時發布預警解除信息。

4 應急處置

4.1 事件報告

網絡安全事件發生後,事發單位應立即啟動應急預案,實施處置並及時報送信息。各有關地區、部門立即組織先期處置,控制事態,消除隱患,同時組織研判,注意保存證據,做好信息通報工作。對於初判為特別重大、重大網絡安全事件的,立即報告應急辦。

4.2 應急響應

網絡安全事件應急響應分為四級,分別對應特別重大、重大、較大和一般網絡安全事件。 I級為最高響應級別。

4.2.1 Ⅰ級響應

屬特別重大網絡安全事件的,及時啟動I級響應,成立指揮部,履行應急處置工作的統一領導、指揮、協調職責。應急辦24小時值班。

有關省(區、市)、部門應急指揮機構進入應急狀態,在指揮部的統一領導、指揮、協調下,負責本省(區、市)、本部門應急處置工作或支援保障工作,24小時值班,並派員參加應急辦工作。

有關省(區、市)、部門跟踪事態發展,檢查影響範圍,及時將事態發展變化情況、處置進展情況報應急辦。指揮部對應對工作進行決策部署,有關省(區、市)和部門負責組織實施。

4.2.2 Ⅱ級響應

網絡安全事件的Ⅱ級響應,由有關省(區、市)和部門根據事件的性質和情況確定。

(1)事件發生省(區、市)或部門的應急指揮機構進入應急狀態,按照相關應急預案做好應急處置工作。

(2)事件發生省(區、市)或部門及時將事態發展變化情況報應急辦。應急辦將有關重大事項及時通報相關地區和部門。

(3)處置中需要其他有關省(區、市)、部門和國家網絡安全應急技術支撐隊伍配合和支持的,商應急辦予以協調。相關省(區、市)、部門和國家網絡安全應急技術支撐隊伍應根據各自職責,積極配合、提供支持。

(4)有關省(區、市)和部門根據應急辦的通報,結合各自實際有針對性地加強防範,防止造成更大範圍影響和損失。

4.2.3 Ⅲ級、Ⅳ級響應

事件發生地區和部門按相關預案進行應急響應。

4.3 應急結束

4.3.1 Ⅰ級響應結束

應急辦提出建議,報指揮部批准後,及時通報有關省(區、市)和部門。

4.3.2 Ⅱ級響應結束

由事件發生省(區、市)或部門決定,報應急辦,應急辦通報相關省(區、市)和部門。

5 調查與評估

特別重大網絡安全事件由應急辦組織有關部門和省(區、市)進行調查處理和總結評估,並按程序上報。重大及以下網絡安全事件由事件發生地區或部門自行組織調查處理和總結評估,其中重大網絡安全事件相關總結調查報告報應急辦。總結調查報告應對事件的起因、性質、影響、責任等進行分析評估,提出處理意見和改進措施。

事件的調查處理和總結評估工作原則上在應急響應結束後30天內完成。

6 預防工作

6.1 日常管理

各地區、各部門按職責做好網絡安全事件日常預防工作,制定完善相關應急預案,做好網絡安全檢查、隱患排查、風險評估和容災備份,健全網絡安全信息通報機制,及時採取有效措施,減少和避免網絡安全事件的發生及危害,提高應對網絡安全事件的能力。

6.2 演練

中央網信辦協調有關部門定期組織演練,檢驗和完善預案,提高實戰能力。

各省(區、市)、各部門每年至少組織一次預案

,並將演練情況報中央網信辦。

6.3 宣傳

各地區、各部門應充分利用各種傳播媒介及其他有效的宣傳形式,加強突發網絡安全事件預防和處置的有關法律、法規和政策的宣傳,開展網絡安全基本知識和技能的宣傳活動。

6.4 培訓

各地區、各部門要將網絡安全事件的應急知識列為領導幹部和有關人員的培訓內容,加強網絡安全特別是網絡安全應急預案的培訓,提高防範意識及技能。

6.5 重要活動期間的預防措施

在國家重要活動、會議期間,各省(區、市)、各部門要加強網絡安全事件的防範和應急響應,確保網絡安全。應急辦統籌協調網絡安全保障工作,根據需要要求有關省(區、市)、部門啟動紅色預警響應。有關省(區、市)、部門加強網絡安全監測和分析研判,及時預警可能造成重大影響的風險和隱患,重點部門、重點崗位保持24小時值班,及時發現和處置網絡安全事件隱患。

7 保障措施

7.1 機構和人員

各地區、各部門、各單位要落實網絡安全應急工作責任制,把責任落實到具體部門、具體崗位和個人,並建立健全應急工作機制。

7.2 技術支撐隊伍

加強網絡安全應急技術支撐隊伍建設,做好網絡安全事件的監測預警、預防防護、應急處置、應急技術支援工作。支持網絡安全企業提升應急處置能力,提供應急技術支援。中央網信辦製定評估認定標準,組織評估和認定國家網絡安全應急技術支撐隊伍。各省(區、市)、各部門應配備必要的網絡安全專業技術人才,並加強與國家網絡安全相關技術單位的溝通、協調,建立必要的網絡安全信息共享機制。

7.3 專家隊伍

建立國家網絡安全應急專家組,為網絡安全事件的預防和處置提供技術諮詢和決策建議。各地區、各部門加強各自的專家隊伍建設,充分發揮專家在應急處置工作中的作用。

7.4 社會資源

從教育科研機構、企事業單位、協會中選拔網絡安全人才,匯集技術與數據資源,建立網絡安全事件應急服務體系,提高應對特別重大、重大網絡安全事件的能力。

7.5 基礎平台

各地區、各部門加強網絡安全應急基礎平台和管理平台建設,做到早發現、早預警、早響應,提高應急處置能力。

7.6 技術研發和產業促進

有關部門加強網絡安全防範技術研究,不斷改進技術裝備,為應急響應工作提供技術支撐。加強政策引導,重點支持網絡安全監測預警、預防防護、處置救援、應急服務等方向,提升網絡安全應急產業整體水平與核心競爭力,增強防範和處置網絡安全事件的產業支撐能力。

7.7 國際合作

有關部門建立國際合作渠道,簽訂合作協定,必要時通過國際合作共同應對突發網絡安全事件。

7.8 物資保障

加強對網絡安全應急裝備、工具的儲備,及時調整、升級軟件硬件工具,不斷增強應急技術支撐能力。

7.9 經費保障

財政部門為網絡安全事件應急處置提供必要的資金保障。有關部門利用現有政策和資金渠道,支持網絡安全應急技術支撐隊伍建設、專家隊伍建設、基礎平台建設、技術研發、預案演練、物資保障等工作開展。各地區、各部門為網絡安全應急工作提供必要的經費保障。

7.10 責任與獎懲

網絡安全事件應急處置工作實行責任追究制。

中央網信辦及有關地區和部門對網絡安全事件應急管理工作中作出突出貢獻的先進集體和個人給予表彰和獎勵。

中央網信辦及有關地區和部門對不按照規定制定預案和組織開展演練,遲報、謊報、瞞報和漏報網絡安全事件重要情況或者應急管理工作中有其他失職、瀆職行為的,依照相關規定對有關責任人給予處分;構成犯罪的,依法追究刑事責任。

8 附則

8.1 預案管理

本預案原則上每年評估一次,根據實際情況適時修訂。修訂工作由中央網信辦負責。

各省(區、市)、各部門、各單位要根據本預案製定或修訂本地區、本部門、本行業、本單位網絡安全事件應急預案。

8.2 預案解釋

本預案由中央網信辦負責解釋。

8.3 預案實施時間

本預案自印發之日起實施。

附件:

1. 網絡安全事件分類

2. 名詞術語

3. 網絡和信息系統損失程度劃分說明

附件1

網絡安全事件分類

網絡安全事件分為有害程序事件、網絡攻擊事件、信息破壞事件、信息內容安全事件、設備設施故障、災害性事件和其他網絡安全事件等。

(1)有害程序事件分為計算機病毒事件、蠕蟲事件、特洛伊木馬事件、殭屍網絡事件、混合程序攻擊事件、網頁內嵌惡意代碼事件和其他有害程序事件。

(2)網絡攻擊事件分為拒絕服務攻擊事件、後門攻擊事件、漏洞攻擊事件、網絡掃描竊聽事件、網絡釣魚事件、干擾事件和其他網絡攻擊事件。

(3)信息破壞事件分為信息篡改事件、信息假冒事件、信息洩露事件、信息竊取事件、信息丟失事件和其他信息破壞事件。

(4)信息內容安全事件是指通過網絡傳播法律法規禁止信息,組織非法串聯、煽動集會遊行或炒作敏感問題並危害國家安全、社會穩定和公眾利益的事件。

(5)設備設施故障分為軟硬件自身故障、外圍保障設施故障、人為破壞事故和其他設備設施故障。

(6)災害性事件是指由自然災害等其他突發事件導致的網絡安全事件。

(7)其他事件是指不能歸為以上分類的網絡安全事件。

附件2

名詞術語

一、重要網絡與信息系統

所承載的業務與國家安全、社會秩序、經濟建設、公眾利益密切相關的網絡和信息系統。

(參考依據:《信息安全技術信息安全事件分類分級指南》(GB/Z 20986-2007))

二、重要敏感信息

不涉及國家秘密,但與國家安全、經濟發展、社會穩定以及企業和公眾利益密切相關的信息,這些信息一旦未經授權披露、丟失、濫用、篡改或銷毀,可能造成以下後果:

a) 損害國防、國際關係;

b) 損害國家財產、公共利益以及個人財產或人身安全;

c) 影響國家預防和打擊經濟與軍事間諜、政治滲透、有組織犯罪等;

d) 影響行政機關依法調查處理違法、瀆職行為,或涉嫌違法、瀆職行為;

e) 干擾政府部門依法公正地開展監督、管理、檢查、審計等行政活動,妨礙政府部門履行職責;

f) 危害國家關鍵基礎設施、政府信息系統安全;

g) 影響市場秩序,造成不公平競爭,破壞市場規律;

h) 可推論出國家秘密事項;

i) 侵犯個人隱私、企業商業秘密和知識產權;

j) 損害國家、企業、個人的其他利益和聲譽。

(參考依據:《信息安全技術雲計算服務安全指南》(GB/T31167-2014))

附件3

網絡和信息系統損失程度劃分說明

網絡和信息系統損失是指由於網絡安全事件對系統的軟硬件、功能及數據的破壞,導致系統業務中斷,從而給事發組織所造成的損失,其大小主要考慮恢復系統正常運行和消除安全事件負面影響所需付出的代價,劃分為特別嚴重的系統損失、嚴重的系統損失、較大的系統損失和較小的系統損失,說明如下:

a) 特別嚴重的系統損失:造成系統大面積癱瘓,使其喪失業務處理能力,或系統關鍵數據的保密性、完整性、可用性遭到嚴重破壞,恢復系統正常運行和消除安全事件負面影響所需付出的代價十分巨大,對於事發組織是不可承受的;

b) 嚴重的系統損失:造成系統長時間中斷或局部癱瘓,使其業務處理能力受到極大影響,或系統關鍵數據的保密性、完整性、可用性遭到破壞,恢復系統正常運行和消除安全事件負面影響所需付出的代價巨大,但對於事發組織是可承受的;

c) 較大的系統損失:造成系統中斷,明顯影響系統效率,使重要信息系統或一般信息系統業務處理能力受到影響,或系統重要數據的保密性、完整性、可用性遭到破壞,恢復系統正常運行和消除安全事件負面影響所需付出的代價較大,但對於事發組織是完全可以承受的;

d) 較小的系統損失:造成系統短暫中斷,影響系統效率,使系統業務處理能力受到影響,或系統重要數據的保密性、完整性、可用性遭到影響,恢復系統正常運行和消除安全事件負面影響所需付出的代價較小。

Original referring URL:

http://www.cac.gov.cn/2017-06/27/c_1121220113.htm

 

中國網絡安全防禦將是量子計算…未來將面臨這些網絡攻擊威脅 // China network security defense will be quantum computing… The future will face these cyber-attack threats

中國網絡安全防禦將是量子計算…未來將面臨這些網絡攻擊威脅

China network security defense will be quantum computing… The future will face these cyber-attack threats

 

Quantum computers can give attackers the ability to crack the current encryption standard overnight and steal personal data. Imagine, if you wake up and lose all the important information, what kind of helpless?

Experts predict that by 2026, commercial quantum computers can crack the code we now rely on. “IEEE Spectrum” magazine reported last year that quantum computers were fast enough to crack the level of RSA encryption.

The nine years from 2026 are not long and the consequences of failing to update the security technology through quantum security solutions are not yet clear. In order to ensure that the arrival of quantum computers to protect data security, need to upgrade from now on to quantum security needs.

What is a quantum computer?

Quantum computer (quantum computer) is a class of quantum mechanics to follow the law of high-speed mathematical and logical operations, storage and processing of quantum information, physical devices. When a device processes and computes quantum information, it is a quantum computer when it runs a quantum algorithm.

It can be achieved for each superposition of the transformation of the equivalent of a classic calculation, all of these classic calculations at the same time, and according to a certain probability amplitude superimposed, given the output of quantum computers. This calculation is called quantum parallel computing, but also the most important advantages of quantum computers. (Source Baidu)

Quantum computer can invade daily network activities

If an attacker uses a quantum computer to successfully crack the encryption technology that we currently trust and rely on, then sensitive data may be vented, giving serious consequences to users and organizations. As a technical user, people may perform the following common activities on any day:

Send an e-mail: The user logs on to the laptop and sends several e-mails, whose information may be read by the attacker and published publicly for everyone to read.

Check the online banking account: the user login bank account and transfer, the financial data will be attacked by the attacker, and the account balance looted.

Update the social media account information: user login microblogging and other social media publishing dynamic, share family photos, etc., if the user only choose to share these dynamic friends, the attacker can all photos and personal information “everyone visible”, and in addition to The user himself, others can arbitrarily tamper with.

Updating software on the smartphone: If the user receives a software update notification and accepts the update, it is not aware that the verification process from a trusted source (such as Google or Apple’s official download) will also be compromised. Malware may enter the smartphone, disguised as a trusted update, so that the attacker gets the application’s login credentials and data.

Driving the network car: the network will automatically accept the software update. These updates may come from an attacker, the user without the knowledge of the circumstances, may allow third parties to control the car’s embedded system, undermine navigation, cut off the car power and so on.

In addition, many other day-to-day transactions may be vulnerable to attack.E.g:

Use the original security of the Internet equipment: thermostat, home security system or baby monitor;

Transfer funds to public transport as prepaid expenses;

Use VPN to log on to the corporate network.

Public transport, security systems, and physical access systems can also have many public safety risks.

As the networking equipment provides more attack surface, data leakage events are frequent. As companies and governments continue to prevent cyber security attacks through technological advances, quantum computing may make cybercriminals more arbitrary and unscrupulous.

The key to quantum secure encryption solutions will be to update the vulnerable quantum solution in a timely manner, which means that it is now necessary to understand which systems will be affected by quantum risk and plan to migrate to quantum security solutions (including appropriate testing and test).

This transition can be done from a hybrid solution, enabling flexible encryption, and the classic encryption technology used today.

Quantum computers or will change the pattern of artificial intelligence research

Source: Artificial Intelligenceologist

Summary: Chinese scientists have built quantum computers that are “natural photonics” by reviewers called “ENIAC in Quantum Computers”.

Chinese scientists have built quantum computers that are “natural photonics” by reviewers called “ENIAC in Quantum Computers.” Quantum computer of this achievement and the subsequent development, it is possible to change the current pattern of artificial intelligence research.

First, it may mean strong, weak artificial intelligence, and “quantum” approach of the three technical paradigm of confluence. Second, it is possible to open up the traditional Chinese culture “programming” approach, as well as more to explore the Chinese and Eastern traditions and pre-traditional culture of resources. Third, in the human cognitive structure can not keep up with the pace of technological development, the quantum computer may help the human hand, set up from the original understanding of the future of the world bridge.

Although all this can not change the fate of mankind will eventually be replaced by “singularity”, but may change in the singularity of the continuation of the “human” connotation.

Competition and confluence of three paradigms

Artificial intelligence The current research mainly exists strong artificial intelligence, weak artificial intelligence two kinds of technical paradigm.

The strong artificial intelligence paradigm follows the development of technology along the form of movement from low to high order, by the first industrial revolution in the basic physical movement (mechanical, thermal and electromagnetic motion), by the second industrial revolution of chemical movement (organic synthesis ), The end of the 20th century high-tech life movement (genetic engineering, gene editing), and then into the human brain and consciousness of the field; technology step by step, all the way to follow the natural to the human footprint. The human brain is the highest achievement of the evolution of nature, the nature of consciousness is far from being revealed.Artificial intelligence will continue to follow this trajectory, there is no reason to leave this path of success.

In this journey, “physical and mental” relationship is an insurmountable peak. Polanyi’s knowledge of congregation is well known, and IQ and EQ are inseparable. “Artificial intelligence is no more intelligent and only emotionally.”

Weak artificial intelligence paradigm is taking the “smart is intelligent” path. Science and technology may not follow the people as a whole, emotional intelligence and IQ, heart and brain synchronization of the path of evolution, but can take the path of heart and brain separation. Artificial intelligence is only “wisdom”, is the “cylinder in the brain” (“three body” as the envoy of the earth Cheng Tianming), rather than “love” non-human; because of this, artificial intelligence beyond the situation ( Including all kinds of ideological struggle) the trapped people’s intelligence, regardless of “emotional” when things do better, more absolutely. Through the repeated game and the evolution of the game, the development of in-depth learning, step by step, migration learning, learn by analogy, and even into the rules and boundaries across the “Texas poker” to achieve a major breakthrough in artificial intelligence.

The achievement of these results follows the pace of the West since Descartes. “Epistemological turn”, “brain” debut, “head to the ground.”Intelligence is intelligent, do not care about the heart; one to do, do not do all-around champion; step by step to do, do not think people are people. Why should artificial intelligence be based on human beings as a reference system?Get rid of anthropocentrism.

The development of artificial intelligence will eventually go beyond the basic weakness of human nature: people are self-interested, people are limited.The development of artificial intelligence has nothing to do with dignity, but to follow the law. Not to overcome, but to bypass the weakness of human nature.No self-consciousness, means that does not matter “self-interest”, for all the emotions “do not feel”; and in time and space endless large data and extraordinary computing power is beyond the “limited.”

Strong artificial intelligence and weak artificial intelligence combination model, perhaps “God’s return to God, Caesar’s return to Caesar”. Please take care of the soul of God, and I take care of the flesh of men. People, take care of their own souls, make decisions; machine, artificial intelligence in the calculation, to provide decision-making basis and options. “Mind machine brain”.

“Quantum paradigm” can be said to be strong, weak artificial intelligence outside the two paradigms of the third paradigm, related to the relationship between consciousness or free will and quantum entanglement, and quantum computer. “From this point of view, not to quantum up before, that is less than the era of quantum artificial intelligence, I was not worried about artificial intelligence will replace humans.” Pan Jianwei said. Ma Zhaoyuan holds the same view, before understanding by the nano-scale consciousness, “artificial intelligence at least three hundred years there is no chance to go beyond the human brain.”

From the perspective of quantum cut, there may be more than other ways to approach the nature of consciousness, which is “strong artificial intelligence” paradigm of the pursuit of the goal. At this point these two paradigms came together. However, even if this paradigm is a breakthrough, from the current trend, “quantum paradigm” hardware is not “complete life form”, may lead to “strong artificial intelligence” paradigm of dissatisfaction.

This breakthrough in the quantum computer highlights the strength of the artificial intelligence technology paradigm outside the third paradigm. On the one hand it is possible in a sense to set up a bridge between the two paradigms.If you can manipulate more than 1000 quantum, you may be able to study the generation of consciousness. Pan Jianwei predicted that quantum computers will eventually expand into the field of quantum artificial intelligence.

On the other hand, the purpose of studying quantum computers is not to replace existing computers. Quantum computing is suitable for discrete optimization, and high performance computing systems (HPC) perform better in large-scale numerical simulations. Need to determine what problems are suitable for quantum computing, the two complement each other. There are many examples of quantum computer assisting high performance computing systems. In a certain sense, the classic computer with universal, quantum computer may be “earmarked.”From the standard computing power, the D-Wave quantum computer is still much slower than the traditional computer, but in solving some specific engineering problems, the quantum computer is several thousand times faster than the existing supercomputer.

China ‘s Resources and Opportunities

With the development of the Internet, a virtual world has been generated and is continuing to develop and improve. Everything in the real world is constantly moving to the virtual world. From the center, intervene, embedding, blurring, conferencing, going to the center, non-embedding, precision and coding; real world in virtual world reconstruction. As the real world moves to the virtual world, the weight of the virtual world is growing, and non-participants will be marginalized.

From the real to the virtual link is the core of programming. Virtual world is not a real world simple mapping, projection, but selective reconstruction.Not everything in the real world can move to the virtual world. Any programming language written by the instructions on the current computer must be accurate without any ambiguity to ensure that under the same conditions, this code is executed in accordance with established procedures. This is what the so-called software defines everything. All kinds of software, defined the data, the model, the function, the machine, the definition of the process, the rules, the network, the definition can define everything [1].

“People are the sum of social relations.” When the social relations continue to move from the real world to the virtual world, and even the latter as the most important, the status of people in the real world will be affected. Stay in the real world is only a personal secret of the faith, can not be part of the software definition [2]. Can not be moved to the virtual world, can not be mapped, but can not operate the real world, there may be dismissed in the virtual world “ball”, and even come back to the real world can not interact with others. The rapid development of the block chain further highlights the importance of being virtual and real. Human beings continue to enter the orderly degree of machine and society [3]. In society, the order of the carrier is also more and more by the machine to complete. When the basic contract of mankind, such as education, economy and law, its normal operation is carried by the machine, the mission of human beings as an orderly transfer has been completed.The society of machines will replace the real society that can not be moved.

The so-called “programming”, in other words is the code, through programming, the real world projection to the virtual world.

In a sense it can be said that Western culture is “coding culture”. Science and technology, industrial revolution, market economy, universal value, contractual relationship, and so on, all without coding. It is important to note that the first day of computer birth, the development of computer language is infiltrated in the Western coding culture. Computer language is the most basic statement is if-else, as the switchcase statement can be replaced with if else statement, in the if-else behind that is either: 0, or 1, orthogonal. Thus, relatively speaking, the already “encoded” Western society easier to “programming” into the virtual world, and in turn accept the virtual world of the real world norms and constraints.

In contrast, Chinese culture is clearly “conception culture”. Road to Road, very Avenue. “Road”, how to encode? TOEFL IELTS, 20,000 words; Chinese, 5000 words is enough, the word polysemy. So the United Nations documents can not prevail in Chinese, even if the feelings of the Chinese people hurt. Words made up of words are more ambiguous. Winter, how much can wear to wear how much; summer, how much can wear to wear how much. Contextual correlation. In the face of such Chinese examinations, foreign candidates can only be “kneeling”. China’s various levels of documents must be “in principle” three words, the back is endless and not for example and case handling. The highest state is simply: “do not say”. Such a society and its operation process, not if-else, also far from the switchcase can be included, can be exhausted. Can not be programmed, does it mean that China’s traditional culture and social operation can not be mapped to the virtual world?

Quantum computer may be the traditional Chinese culture, the way for the operation of Chinese society programming.

The key to quantum computers is the essential nature of quantum mechanics, such as the superposition and coherence of quantum states. Superposition, coherence, entanglement, so that some concepts and the meaning of knowledge have the same place. The input and output states of the quantum computer are generally superimposed states of multiple states between 0 and 1, which are usually not orthogonal to each other. The quantum computer transforms each superimposed component, where each “component” can be considered to correspond to one of the “cases” in Chinese society.

But in real life these cases are difficult to compare with the same standard, and in the quantum computer, all of these transformations at the same time, and according to a certain probability of superposition, give the results.Quantum computers are probabilistic rather than deterministic, and return to the user may be multiple sets of values, not only to provide the system to find the best solution, but also provide other alternative alternatives. The user can specify the number of systems that the system sends to itself.

The classic way of solving a problem by a classic computer is similar to trying to escape a maze – try all possible aisle, on the way will encounter a dead end until the final find the exit. The magic of the superposition state is that it allows the quantum computer to try all the paths at the same time, that is, it will quickly find a shortcut. In a sense, it can be said that the quantum computer not only contains the highly complex and “conception” characteristics of Chinese traditional culture and real society, but also gives the possibility of coding and programming. The former retains the particularity of China to a certain extent , Which makes this particularity compatible with the universality of human society.

In turn, China has special resources, such as hieroglyphics, language, and traditional culture, which may be another way for the development of quantum computers.

Quantum computers operate in much the same way as classic computers, and now quantum computing is very early, and even specialized programming languages ​​are not [4]. Since non-orthogonal, or if-else? When the need to compare the more things, or a lot of other control process, with if else statement control will be very cumbersome, and poor readability, and the switch statement is more simple and intuitive, more readable and more. But if it is further fragmented, embedded in the infinite number of specific contexts? Quantum computer is completely different from today’s CPU mechanism, nor is the if-else mechanism, can not use the current computer language for its programming. Otherwise it may be as Sokal triggered the science war in the “post-modern text generator”, with a series of contradictory words superimposed together, so that the reader in the fog, no solution.

“The scientific revolution in the 21st century will show two main themes, one is” the convergence of physics and life sciences “; the second is” the confluence of modern science and Chinese philosophy ” The Quantum computer development, it is possible to let the latter “confluence” down the philosophy of the altar, to a certain extent, into the operational level. The advent of quantum computers suggests that it is possible to look at Chinese words and grammar from a new perspective. Perhaps, the ancient “Book of Changes”, River map book, there may be in the dialogue with the quantum computer complement each other.

3 Human reversion and continuation

In the Qiwen “decarburization into the silicon”, the author of the Czech Republic, there are four sets of human cognitive system: the original reptile cognitive system, 50,000 years ago when the language developed, 5000 years ago, after the development of the text, And 500 years ago after the rise of science and development. Each set is more than the previous set of “natural”, more energy consumption, slower. So people tend to use low-level cognitive systems.Every time the cognitive system is advanced, some people are thrown off. Here you can also add the fifth set of cognitive systems, 50 years ago the rise of programming + computing + learning +.

Everyone is a combination of multiple cognitive methods, the difference is the proportion of a variety of cognitive methods. The overall population, in 90% of the human brain “machine”, is that the original cognition at work. The majority of the population as a whole tends to “do not mind” in most of the time. Analysis, symbols and rationality are enemies of the brain, and must be used to fight them all the time.

In this sense, Bao Jie to “stupid” under a definition. Stupid is a human inertia of inertia, the individual is more inclined to use 50,000 years ago mature set of thinking system, rather than 5000 years ago, and five years ago after the development of science and development of these two sets of thinking system, more Not 50 years ago programming. This is the advertising and other means of marketing and election canvassing and so the effectiveness of the human nature of the foundation. Artificial intelligence goes beyond human intelligence and does not need to be smarter than people, just to avoid people’s stupid enough. The machine is just stupid and people are stupid. Stupid can rule, stupid from the human physiological basis, no medicine to save.

The advent of quantum computers, it is possible for humans to open the “sixth set of cognitive systems.” The new cognitive system may emerge within five years if the fifth set of 50-year rhythms are added in the “decarburization of silicon” in the range of 50,000 to 5,000 to 500, and by the experts, Five years, the computing power of quantum computers may catch up with the current supercomputer). The classical computer is linear, and all input states are orthogonal to each other. And thinking is often parallel, pluralistic, and even jumping. With quantum computers, it is possible to understand the human behavior based on the first and second sets of cognitive systems, changes in mind, and even emotional changes.

What is the “cognitive system” of the so-called “first and second sets of cognitive systems”? Levi’s “original thinking” and Levi-Strauss’s “wild thinking” made a profound study of this.

Levi – Boulei stressed that the original thinking of the “mutual infiltration”, both specific to trivial, natives can recognize the footprints of each acquaintance, after the rain, the pit of water retained the longest; and by mutual penetration and care of the whole The For example, call a name or name, also implicated it or he embedded everything. Embedded in every detail, all have the object of all the information. The original logical thinking is essentially a comprehensive thinking, different from the logical thinking of the synthesis, does not require pre-analysis. “The logical thinking of the original logic is broader than our thinking, if we do not say it’s better than our rich.” The idea of ​​D-Wave America’s president, BoEwald, is that “the traditional computer will always get the same answer, and the answer to the quantum computer Is a probability, just like the principles of the universe, “says David Mermin, a physicist at Cornell University, in a related argument:” Close your mouth and calculate your mind! ”

Levi-Strauss argues that [5] that the concrete thinking of uncivilized people and the enlightening thinking of the enlightened people are not different from those of “primitive” and “modern” or “primary” and “advanced” Thinking mode, but the history of mankind has always been the existence of two parallel development, the Secretary of different cultural functions, complement each other to infiltrate the way of thinking. As the plants have “wild” and “garden” two categories, the way of thinking can be divided into “wild” (or “wild”) and “civilized” two categories.

It seems that the human “stupid” may not be really stupid, but there is no corresponding means and means to understand the original and wild cognitive system, when not yet. The advent of quantum computers may indicate that time has arrived.

The knowledge of the traditional society is the starting point of human knowledge, both the object of non-embedded coding knowledge denial, and the goal of dialectical reversion of the 21st century. In the original state of knowledge, is the source of human knowledge inexhaustible, which contains the endless treasure to be excavated.

Primitive thinking or wild thinking, human first and second sets of cognitive systems, although the rise of words and technology, especially the “fifth set” of cognitive system after the rise of such as the clogs, but also may be 21 The Object of Dialectical Return of Human Cognitive System in the Century. Fundamentally, Bao Jie’s view of four sets of cognitive systems implied a certain linear implication. Similarly, Kevin Kelly thinks [6] that the most common misconception about artificial intelligence is that natural intelligence is a single dimension that does not have a smart ladder to say. The different parts of the mind, or the interdependence of the “five sets” of cognitive methods, are thus proposed.

 

Original Mandarin Chinese:

量子計算機能賦予攻擊者能力,一夜之間破解當前加密標準,並竊取個人數據。想像一下,如果一覺醒來丟失了所有重要信息,這將是一種怎樣的無助?

專家預計,到2026年,商用量子計算機能破解我們如今依賴的密碼。 《IEEE Spectrum》雜誌去年報告稱,量子計算機快達到可以破解RSA加密的水平。
距離2026年的9年時間並不算長,無法通過量子安全解決方案更新安全技術所帶來的後果目前尚不明確。為了確保量子計算機到來時能保護數據安全,需要從現在開始升級到量子安全需。
什麼是量子計算機?
量子計算機(quantum computer)是一類遵循量子力學規律進行高速數學和邏輯運算、存儲及處理量子信息的物理裝置。當某個裝置處理和計算的是量子信息,運行的是量子算法時,它就是量子計算機。
它能對每一個疊加分量實現的變換相當於一種經典計算,所有這些經典計算同時完成,並按一定的概率振幅疊加起來,給出量子計算機的輸出結果。這種計算稱為量子並行計算,也是量子計算機最重要的優越性。 (來源百度)

量子計算機能入侵日常網絡活動
如果攻擊者利用量子計算機成功破解當前我們所信任和依賴的加密技術,那麼敏感數據可能會被洩,從而給用戶和機構帶來嚴重後果。作為技術用戶,人們可能會在任何一天執行以下常見活動:
發送電子郵件:用戶登錄筆記本電腦,發送幾封電子郵件,其信息可能會被攻擊者讀取,並公開發布供所有人閱讀。
查看網銀賬號:用戶登錄銀行賬號並轉賬,財務數據會被攻擊者獲取,並將賬戶餘額洗劫一空。
更新社交媒體賬戶信息:用戶登錄微博等社交媒體發布動態,分享家人的照片等,如果用戶僅選擇將這些動態分享給好友,攻擊者可以將所有照片和個人信息“所有人可見”,且除了用戶自己,其它人可以任意篡改。
更新智能手機上的軟件:如果用戶收到軟件更新通知,並接受更新,而並未意識到是否來自可信源(例如Google或Apple官方下載)的驗證過程也會被入侵。惡意軟件可能會進入智能手機,偽裝成可信任的更新,從而使攻擊者獲取應用程序的登錄憑證以及數據。
駕駛聯網汽車:聯網汽車會自動接受軟件更新。這些更新可能來自攻擊者,用戶在不知情的情況下,可能會允許第三方控制車內的嵌入式系統、破壞導航、切斷汽車動力等。
此外,許多其它日常交易可能易於遭受攻擊。例如:
使用原本安全的物聯網設備:恆溫器、家庭安全系統或嬰兒監視器;
將資金轉入公共交通系統作為預付費用;
使用VPN登錄公司網絡等。
公共交通工具、安全系統和物理訪問系統遭遇攻擊也會帶來許多公共安全風險。
由於聯網設備提供了更多的攻擊面,因此,數據洩露事件頻發。隨著公司和政府不斷通過技術進步防範網絡安全攻擊,量子計算可能會讓網絡犯罪分子更加隨心所欲,肆無忌憚。
量子安全加密解決方案的關鍵將是及時更新易受攻擊的量子解決方案,這就意味著,現在要理解哪些系統將會受到量子風險影響,併計劃遷移到量子安全解決方案(包括適當的測試和試驗)。
這種過渡可以從混合解決方案開始,實現靈活加密,強化如今使用的經典加密技術。
量子計算機或將改變人工智能的研究格局
來源: 人工智能學家

概要:中國科學家建造出了被《自然·光子學》的審稿人稱之為“量子計算機中的ENIAC”的量子計算機。
中國科學家建造出了被《自然·光子學》的審稿人稱之為“量子計算機中的ENIAC”的量子計算機。量子計算機的這一成果及而後的發展,有可能改變當下人工智能的研究格局。
其一,可能意味著強、弱人工智能,以及“量子”途徑三種技術範式的合流。其二,有可能開拓將中國傳統文化“編程”的途徑,以及更多發掘中國與東方的傳統和前傳統文化中的資源。其三,在人類認知結構跟不上科技發展的腳步之時,量子計算機有可能助人類一臂之力,架起由原始認知到未來世界的橋樑。
這一切雖然不能改變人類終將被“奇點人”所取代的命運,但可能改變在奇點人中所延續下來的“人類”的內涵。
1三種範式的競爭與合流
人工智能目前的研究主要存在強人工智能、弱人工智能兩種技術範式。
強人工智能範式沿襲技術的發展沿運動形式由低到高的次序,由第一次工業革命中的基本物理運動(機械、熱和電磁運動),經第二次工業革命的化學運動(有機合成),20世紀末高技術中的生命運動(基因工程、基因編輯),接著進入人腦和意識的領域;技術亦步亦趨,一路跟隨由自然到人的足跡。人腦是自然界演化的最高成果,意識的本質遠未揭示。人工智能將繼續追隨這一軌跡,沒有理由脫離這一成功的路徑。
在這一征途上,“身心”關係是難以逾越的高峰。波蘭尼關於意會知識的研究廣為人知,智商與情商不可分割。 “人工智能再聰明也沒有情感,只是機器而已。”
弱人工智能範式走的是“智能就是智能”路徑。科學技術未必沿著人作為整體,情商與智商,心腦同步進化的路徑,而是可以走心腦分離的路徑。人工智能之所求原本只是“智”,是“缸中大腦”(《三體》中作為地球人使節的程天明),而非“情”非人;正因為此,人工智能超越為情(包括形形色色的意識形態之爭)所困的人的智能,在不顧及“情感”之時把事情做得更好,更絕。通過重複博弈而演進博弈,開發深度學習,步步為營,遷移學習,舉一反三,乃至進入跨越規則與邊界的“德州撲克”,實現人工智能的重大突破。
這些成果的取得沿襲了西方自笛卡爾以來的步點。 “認識論轉向”,“腦”登場,“以頭立地”。智能就是智能,不在乎心;一項一項去做,不做全能冠軍;一步一步去做,不去想人之為人。人工智能為什麼一定要以人類為參照系,為追趕的目標?擺脫人類中心主義的思路。
人工智能的發展將最終超越人性的基本弱點:人是自利的,人是有限的。人工智能的發展無關尊嚴,而是遵循規律。不是克服,而是繞過人性的弱點。沒有自我意識,意味著無所謂“自利”,對於所有的情感“沒感覺”;而在時空上無窮無盡的大數據和超凡脫俗的計算能力則超越人之“有限”。
強人工智能與弱人工智能結合的模式,或許是“上帝的歸上帝,凱撒的歸凱撒”。請上帝照看人的靈魂,我來照看人的肉體。人,照看自己的靈魂,做出決策;機,人工智能從事計算,提供決策的依據和選項。 “人心機腦”。
“量子範式”可以說是強、弱人工智能這兩種範式之外的第三種範式,關係到意識或自由意志與量子糾纏的關係,以及量子計算機。 “從這個角度上來講,沒有到量子用上去之前,即不到量子人工智能的時代,我是一點兒不擔心人工智能會取代人類。”潘建偉說道。馬兆遠持同樣的觀點,在由納米尺度理解意識之前,“人工智能至少在三百年內還沒什麼機會超越人腦”。
由量子的角度切入,有可能較之其他途徑更加逼近意識的本質,這也是“強人工智能”範式所追求的目標。在這一點這兩種範式走到了一起。然而,即使這一範式獲得某種突破,從目前趨勢來看,“量子範式”的硬件並非“完整的生命形態”,可能招致“強人工智能”範式的不滿。
這次量子計算機的突破凸現了強弱人工智能技術範式之外的第三種範式。一方面有可能在某種意義上架起強弱兩種範式的橋樑。如果能操縱1000個量子以上,或許可以研究意識的產生。潘建偉預測,量子計算機最終將拓展到量子人工智能領域。
另一方面,研究量子計算機的目的不是要取代現有的計算機。量子計算適合離散優化,高性能計算系統(HPC) 則在大規模數值模擬中表現更好。需要判斷哪些問題適合量子計算,二者相互補充。有很多量子計算機協助高性能計算系統的例子。在一定意義上,經典計算機具有普適性,量子計算機可能是“專款專用”。從標準的計算能力來看,D-Wave量子計算機還是會比傳統計算機慢得多,但在解決某些特定的工程問題方面,量子計算機要比現有超級計算機快幾千倍。
2中國的資源與機遇
隨著互聯網的發展,一個虛擬世界已經生成並正在繼續發展和完善。現實世界的一切正在不斷遷移到虛擬世界。從中心、干預、嵌入、模糊、意會,到去中心化、非嵌入、精確和編碼;現實世界在虛擬世界重構。隨著越來越大的現實世界移到虛擬世界,虛擬世界的權重越來越大,不參加者將自我邊緣化。
由實到虛的轉換環節的核心是編程。虛擬世界不是現實世界簡單的映射、投射,而是選擇性重構。不是現實世界的一切都可以移到虛擬世界。任何編程語言寫好的指令,對目前的計算機必須準確無誤沒有歧義,以保證在同樣的條件下,這段代碼按既定步驟執行。這就是所謂軟件定義一切。形形色色、大大小小、不同用途的軟件,定義了數據、模型、功能、機器,定義了過程、規則、網絡,定義了可以定義的一切[1]。
“人是社會關係的總和”。當社會關係不斷由現實世界遷移到虛擬世界,乃至以後者為重,人在現實世界的地位就受到影響。留在現實世界的只是個人隱秘的信仰,是不能被軟件定義的部分[2]。沒法移到虛擬世界,不能映射,更不能操作的現實世界,有可能被開除在虛擬世界的“球籍”,以至回過頭來沒法在現實世界與他人交往。區塊鏈的快速發展進一步凸現了由實到虛,以虛馭實的重要性。人類源源不斷地把有序度輸入機器和社會[3]。在社會中,有序度的載體也越來越多的由機器來完成。當人類的基礎契約,如教育、經濟和法律,其正常運作都是由機器來承載時,人類作為有序度轉移者的使命已經完成了。機器構成的社會將取代移不過去的現實社會。
所謂“編程”,換言之就是編碼,經由編程,把現實世界投射到虛擬世界。
在某種意義上可以說,西方文化就是“編碼文化”。科學技術、工業革命、市場經濟、普適價值、契約關係等等,無一不編碼。有必要指出,從計算機誕生的第一天起,計算機語言的發展就浸潤在西方的編碼文化之中。計算機語言最基本的語句是if-else,至於switchcase語句完全可以用if else語句來替換掉,在if-else的背後即非此即彼:0,或1,正交。由此可見,相對而言,本已“編碼”的西方社會較容易“編程”而進入虛擬世界,以及反過來接受虛擬世界對現實世界的規範與製約。
相比之下,中國文化顯然是“意會文化”。道可道非常道。 “道”,如何編碼?考托福雅思,2萬單詞;漢語,5000單詞足矣,一詞多義。所以聯合國文件不能以中文為準,即使傷害了中國人民的感情。由單詞組成的語句更多歧義。冬天,能穿多少就穿多少;夏天,能穿多少就穿多少。語境相關。面對這樣的中文考題,外國考生也只能是“跪了”。中國的各級文件中必有“原則上”三個字,其背後是無窮無盡的下不為例和個案處理。最高境界乾脆是:“盡在不言中”。這樣的社會及其運作過程,絕非if-else,亦遠非switchcase可以囊括,可以窮盡。不能編程,是否意味著中國的傳統文化與社會運行不能映射到虛擬世界?
量子計算機有可能為中國傳統文化,為中國社會的運行方式編程。
量子計算機的關鍵是用到量子力學的本質特性,如量子態的疊加性和相干性。疊加、相干、糾纏,這樣一些概念與意會知識有相通之處。量子計算機的輸入態和輸出態為一般為0到1之間的多個狀態的疊加態,相互之間通常不正交。量子計算機對每一個疊加分量進行變換,這裡的每一個“分量”或可認為對應於中國社會中的一個個“個案”。
但在現實生活中這些個案難以以同一標準相互比較,而在量子計算機,所有這些變換同時完成,並按一定的概率幅疊加起來,給出結果。量子計算機是概率性的而非確定性的,返回給用戶的可能是多組數值,不僅能提供系統尋找到的最佳解決方案,同時也提供其他可供選擇的優秀替代方案。用戶可以指定係統向自己發送解決方案的數量。
經典計算機解決一個問題的方式就類似於試圖逃離一個迷宮——嘗試所有可能的走道,途中會遇到死路,直到最終找到出口。而疊加態的魔力則在於,允許量子計算機在同一時間嘗試所有的路徑,也就是說,它會迅速的找到一條捷徑。在某種意義上可以說,量子計算機既包容中國傳統文化與現實社會的高度複雜性和“意會”特徵,又賦予其編碼和編程的可能性;前者在一定程度上保留了中國的特殊性,後者使這種特殊性與人類社會的普遍性兼容。
反過來,中國所具有的特殊資源,如像形文字、語言以及傳統文化有可能為量子計算機的發展另闢蹊徑。
量子計算機的運行方式與經典計算機大為不同,現在的量子計算還非常早期,甚至連專門的編程語言都沒有[4]。既然非正交,還是if-else嗎?當需要比較的事項較多,或者很多其他控制流程的時候,用if else語句控制起來就會很麻煩,且可讀性太差,而用switcase可以囊括,可以窮盡。不能編程,是否意味著中國的傳統文化與社會運行不能映射到虛擬世界?
量子計算機有可能為中國傳統文化,為中國社會的運行方式編程。
量子計算機的關鍵是用到量子力學的本質特性,如量子態的疊加性和相干性。疊加、相干、糾纏,這樣一些概念與意會知識有相通之處。量子計算機的輸入態和輸出態為一般為0到1之間的多個狀態的疊加態,相互之間通常不正交。量子計算機對每一個疊加分量進行變換,這裡的每一個“分量”或可認為對應於中國社會中的一個個“個案”。
但在現實生活中這些個案難以以同一標準相互比較,而在量子計算機,所有這些變換同時完成,並按一定的概率幅疊加起來,給出結果。量子計算機是概率性的而非確定性的,返回給用戶的可能是多組數值,不僅能提供系統尋找到的最佳解決方案,同時也提供其他可供選擇的優秀替代方案。用戶可以指定係統向自己發送解決方案的數量。
經典計算機解決一個問題的方式就類似於試圖逃離一個迷宮——嘗試所有可能的走道,途中會遇到死路,直到最終找到出口。而疊加態的魔力則在於,允許量子計算機在同一時間嘗試所有的路徑,也就是說,它會迅速的找到一條捷徑。在某種意義上可以說,量子計算機既包容中國傳統文化與現實社會的高度複雜性和“意會”特徵,又賦予其編碼和編程的可能性;前者在一定程度上保留了中國的特殊性,後者使這種特殊性與人類社會的普遍性兼容。
反過來,中國所具有的特殊資源,如像形文字、語言以及傳統文化有可能為量子計算機的發展另闢蹊徑。
量子計算機的運行方式與經典計算機大為不同,現在的量子計算還非常早期,甚至連專門的編程語言都沒有[4]。既然非正交,還是if-else嗎?當需要比較的事項較多,或者很多其他控制流程的時候,用if else語句控制起來就會很麻煩,且可讀性太差,而用switch語句就更加簡潔直觀,可讀性也更強。但要是進一步碎片化,嵌入於不可勝數的特定語境之中呢?量子計算機完全不同於今天的CPU機理,也不是if-else機理,沒法用現在的計算機語言為其編程。否則很可能如索卡爾引發的科學大戰中的“後現代文本發生器”,用一連串互相矛盾的詞彙疊加在一起,讓讀者云裡霧裡,不得其解。
中國科學院大學已故數學教授牛實為先生認為,21世紀的科學革命將呈現出兩個主旋律,其一是“物理學與生命科​​學的合流”;其二是“現代科學與中國哲學的合流” 。量子計算機的發展,有可能讓後一個“合流”走下哲學的聖壇,在一定程度上步入操作的層面。量子計算機的問世提示,或許可以從一個新的視角審視中文的單詞和語法。或許,古老的《易經》,河圖洛書,有可能在與量子計算機的對話中相得益彰。
3人類的複歸與延續
在奇文“脫碳入矽”中,作者鮑捷提出人類有四套認知系統:原始的爬行動物認知系統,5萬年前語言成熟時發展的,5000年前文字發明後發展的,和500年前科學興起後發展的。每一套都比前一套更不“自然”,更耗費能量,速度更慢。所以人總是傾向於用低層次的認知系統。認知系統的每一次進階,都甩下一部分人。在這裡還可以再加上第五套認知系統,50年前興起的編程+計算+學習+。
每個人都是多種認知方式的綜合,區別是多種認知方式的比例不同。而人群的總體,在90%的人腦“機時”裡,是那些原始的認知在起作用。總體人群的大多數在大多數時間傾向於“不動腦子”。分析、符號和理性都是大腦的敵人,必須無時無刻不和本能做鬥爭才能運用它們。
在此意義上,鮑捷給“愚蠢”下了一個定義。愚蠢是人類的一種認知的惰性,個體比較偏向於使用5萬年前成熟的那套思維繫統,而不是5000年前文字發明和500年前科學發展後發展的這兩套思維繫統,更不是50年前的編程。這是廣告之類營銷手段和選舉拉票等之所以奏效的人性基礎。人工智能超越人的智能,並不需要比人聰明,只需要避免人的愚蠢就夠了。機器只是笨,人是愚蠢。笨可以治,蠢源於人的生理基礎,無藥可救。
量子計算機的問世,有可能為人類開啟“第六套認知系統”。如果按“脫碳入矽”中5萬-5千-5百,以及筆者加上的第五套50年的節奏,新的認知系統可能在5年內出現(順便說,有專家指出,在五年之內,量子計算機的計算能力就可能赶超當前的超級計算機)。經典計算機是線性的,所有的輸入態均相互正交。而思維往往是並行、多元、甚至跳躍。借助量子計算機,以人類思考方式進行超高速計算,有可能理解人類基於第一、二套認知系統的群體性行為、思想變化,甚至情緒變化。
所謂“第一、二套認知系統”究竟是什麼樣的“認知系統”?列維-布留爾的《原始思維》和列維-斯特勞斯的《野性的思維》對此作了深刻的研究。
列維-布留爾強調了原始思維的“互滲”,既具體到瑣碎,土人能認出每個熟人的足跡,雨後,那個坑里的水留存最久;又經由互滲而關照整體。譬如呼喚一個名稱或名字,也就牽連它或他所嵌入的一切。嵌入的每一個細節,都擁有對象的全部信息。原邏輯思維本質上是綜合的思維,不同於邏輯思維的綜合,不要求預先的分析。原邏輯思維“比我們的思維廣闊,如果不說比我們的豐富。”D-Wave美國區總裁BoEwald的觀點是:“傳統計算機求解相同問題總會得到相同的答案,而量子計算機得到的答案卻是一種概率,就像宇宙的運行原理。”康奈爾大學物理學家David Mermin在一次相關的爭論中說:“閉上你的嘴,用心作計算吧!”
列維-斯特勞斯認為[5],未開化人的具體性思維與開化人的抽象性思維不是分屬“原始”與“現代”或“初級”與“高級”這兩種等級不同的思維方式,而是人類歷史上始終存在的兩種互相平行發展、各司不同文化職能、互相補充互相滲透的思維方式。正如植物有“野生”和“園植”兩大類一樣,思維方式也可分為“野性的”(或“野生的”)和“文明的”兩大類。
由此看來,人類的“蠢”,未必就是真的蠢,而是沒有相應的手段和途徑來理解原始及野性的認知系統,時候未到。量子計算機的問世,可能預示,時候已到。
前傳統社會的知識是人類知識的起點,既是而後非嵌入編碼知識否定的對象,也是21世紀的知識辯證復歸的目標。處於原始狀態的知識,是人類知識取之不盡的源泉,其中蘊藏了有待挖掘的無窮無盡的寶藏。
原始思維或野性的思維,人類的第一和第二套認知系統,雖然在文字與科技興起,特別是“第五套”認知系統興起後被棄之如敝屐,卻同樣可能是21世紀人類認知系統辯證復歸的對象。從根本上說,鮑捷關於四套認知系統的觀點隱含了某種線性的意味。類似的,凱文凱利認為[6],關於人工智能最常見的誤解是,自然智能是一個單一的維度,沒有智能階梯之說。思維的不同組成部分,或者說人猿相揖別以來的“五套”認知方式之間相互依賴,是共同創造的。

Original URL: http://wemedia.ifeng.com/17222299/wemedia.shtml