All posts by admin

Chinese Military: Drones Possessing Swarm Intelligence What Combat Advantages Exist?

中國軍方:具備群體智慧的無人機有哪些作戰優勢?

現代英語:

A drone is an unmanned aerial vehicle that uses radio remote control equipment or autonomous control devices to control its flight.

Compared with manned aircraft, unmanned aircraft have advantages such as greater flexibility and higher cost-effectiveness in combat.

However, in system-of-systems warfare, due to the complex battlefield environment, dispersed resource allocation, and multi-dimensional combat styles, a single UAV is difficult to perform diverse combat missions.

By leveraging swarm intelligence to conduct intelligent drone swarm operations, the numerical advantage of drones can be transformed into an asymmetric warfare advantage.

Intelligent combat style of drone swarm

In recent years, unmanned aerial vehicle (UAV) swarms have played an increasingly important role in combat missions such as collaborative detection, all-domain strikes, and tactical deception, becoming one of the key development directions in the military field.

Based on the current level of collective intelligence and combat style of drone swarms, they can be divided into three types:

—Pseudo-swarm. This is a type of “swarm” where multiple drones are controlled separately by ground personnel. While the drones appear to be in a swarm, they are actually independent and do not interact or coordinate with each other.

In 2016, the U.S. Navy conducted hundreds of simulation tests of drone swarm attacks against the Aegis defense system. The results showed that when a swarm of eight drones launched a penetration attack, the defense system struggled to allocate firepower effectively, with an average of about 2.8 drones managing to evade the interception system and carry out the attack each time.

In the above cases, the drones appear to be in a “swarm” but lack collective intelligence; their combat capabilities are only enhanced by the numerical advantage brought about by the aggregation of multiple drones.

—Centralized Cluster. This is a clustering approach where a ground command center acts as the cluster’s brain, and drones operate independently, all under the unified command and control of this brain. In November 2020, the U.S. military conducted a two-hour autonomous, coordinated flight test using ground-based software to drive a cluster of Avenger drones. This project utilizes software to determine the optimal combat strategy, improving the flexibility and survivability of existing unmanned combat forces.

Centralized clusters have low levels of intelligence and face potential problems such as single-chain failures and poor reliability. When the communication link between the ground command center and the cluster is damaged, the entire cluster will lose its combat capability due to loss of control.

In 2018, Syrian opposition forces deployed a concentrated swarm of 13 fixed-wing drones to harass and attack a Russian airbase. Russia responded using electronic warfare combined with firepower to intercept the drones, ultimately capturing six and shooting down seven.

—Distributed Cluster. This is a cluster approach where there is no central controller, and drones collaborate and cooperate to execute combat missions through information sharing. This approach has advantages such as decentralization, low complexity, and self-organization, greatly improving the ability to perform complex tasks.

In 2017, the United States used three F/A-18 fighter jets to launch 103 drones, forming a distributed swarm for flight tests. The tests demonstrated functions such as aircraft launch and formation changes, achieving the expected combat results.

Compared to centralized clusters, distributed clusters possess a distributed architecture, and inter-machine information interaction provides the necessary conditions for the emergence of swarm intelligence. Unmanned aerial vehicle (UAV) swarms with swarm intelligence exhibit high autonomy and good security, representing a major development direction for swarm warfare.

Empowering clusters with intelligence by leveraging group behavior characteristics

In the magnificent natural world, there exist biological communities such as schools of fish, herds of mammals, swarms of bees, and flocks of birds. These individual organisms are fragile, but the groups they form through interaction and cooperation possess stronger abilities in foraging, seeking advantage and avoiding harm, and migration.

Biological communities achieve efficient collaboration through simple communication, exhibiting behavioral characteristics such as collaborative aggregation, target attraction, and collision avoidance and repulsion, thus achieving a win-win cluster effect.

This macroscopic intelligent behavior, exhibited by social organisms through cooperation, is known as swarm intelligence. Swarm intelligence is an important research area in artificial intelligence.

By combining unmanned aerial vehicle (UAV) system technology with research on the theory and methods of swarm intelligence, it is hoped that UAV swarms with more autonomous intelligence characteristics can be explored, thus forming advanced swarm intelligence.

—Based on the characteristics of collaborative aggregation behavior, distributed operation of UAV swarms is achieved. In nature, schools of fish foraging for food can gather through local information exchange to improve foraging efficiency. When encountering predators, they can quickly disperse and escape, distracting the predators and reducing the risk of being preyed upon. Similarly, the flight control of UAV swarms, through information exchange between adjacent UAVs, designs a UAV collaborative control protocol, enabling each member in the swarm to reach a “consensus” on global consistency, directional convergence, and desired formation, truly realizing distributed operation of the swarm. Just like the phenomenon of wave motion, information is transmitted rapidly and accurately between them, thereby achieving consistency in action.

—Utilizing target attraction behavior, drone swarms can achieve formation tracking. Just as a wolf pack, led by an alpha wolf, can divide tasks and cooperate closely to hunt prey, with the alpha wolf tracking the target and issuing commands, while the pack members perform different roles and work together efficiently to complete the hunt, drone swarms can follow a similar model. The alpha drone, with its strong detection, identification, and analysis capabilities, is responsible for tracking the target and generating its trajectory. Leveraging its high performance and situational awareness, it achieves real-time target tracking. Follower drones not only track the alpha drone’s trajectory in real time but also form the necessary swarm configuration through inter-drone collaboration, improving payload distribution efficiency and enhancing mission execution.

—Based on collision avoidance and repulsion behavior characteristics, intelligent collision avoidance is achieved for UAV swarms. Intelligent collision avoidance is a fundamental requirement for ensuring the flight safety and successful execution of missions by UAV swarms during combat operations. “Intelligent collision avoidance for swarms” aims to enable individual UAVs to avoid obstacles in the battlefield environment in real time, while preventing collisions between swarm members. To achieve this, an “intelligent repulsive potential field” can be constructed between UAVs and between the swarm and obstacles: when the relative distance is too small, a collision avoidance and repulsion mechanism is triggered, effectively coping with complex environments and combat modes.

Intelligent clusters lead to a new style of system-of-systems warfare

Judging from the development trends of the world’s military powers, with the application of information, unmanned and intelligent technologies on the battlefield, the ability to conduct systematic combat will become an important factor in determining the success or failure of a war.

The development of swarm intelligence technology will greatly promote the transformation of unmanned aerial vehicle (UAV) swarm warfare, and is an important means for future militaries to adapt to complex battlefield environments and enhance their combat capabilities. UAV swarms will revolutionize traditional warfare and become a new type of combat style for winning future battlefields.

Unmanned aerial vehicle (UAV) swarms possessing a certain degree of coordination and autonomy can carry different types of payloads and perform diverse combat missions. Experimental results from UAV swarm collaboration verification projects such as the US’s “Gremlins” and “Partridges” demonstrate that miniaturized, low-cost UAV swarms are expected to achieve collaborative capabilities in detection, perception, identification, communication, and attack in the short term through inter-UAV information sharing.

In light of this, major military powers continue to develop unmanned aerial vehicle (UAV) swarm warfare capabilities, hoping to use systematic, low-cost UAV swarms to harass relatively isolated, high-value military targets and leverage the advantages of asymmetric warfare.

With the continuous upgrading of artificial intelligence technology, drone swarms with collective intelligence can leverage their advantages of strong environmental adaptability, flexible deployment, functional integration, small size and high efficiency to achieve intelligent networking, collaborative combat and strategic confrontation, implement all-round penetration against defense systems, form a “reconnaissance-resistance-strike-assessment” combat closed loop, and defeat the enemy in future multi-domain and multi-dimensional systemic warfare.

現代國語:

無人機蜂群作戰系統示意圖。

無人機是一種利用無線電遙控設備或者自主控制裝置操縱飛行狀態的無人飛行器。

與有人機相比,無人機在作戰中具備靈活性強、作戰效費比高等優勢。

然而,在體系化作戰中,由於戰場環境復雜、要素配置分散、作戰樣式多維,單一無人機難以勝任多樣化作戰任務。

依托群體智能開展智能化無人機集群作戰,可將無人機數量優勢轉化為非對稱作戰優勢。

無人機集群智能化作戰樣式

近年來,無人機集群在協同探測、全域打擊、戰術騙擾等作戰任務中,逐漸發揮出越來越重要的作用,成為軍事領域重點發展方向之一。

按照目前無人機集群的群體智能化程度與作戰樣式,可將其劃分為3種類型:

——偽集群。這是一種由地面人員分別操控多架無人機構成的“集群”方式。無人機看上去是集群,其實相互獨立,並不存在信息交互協同。

2016年,美國海軍進行了數百次無人機“集群”進攻“宙斯盾”防御系統的模擬試驗。結果表明,當由8架無人機組成的“集群”突防攻擊時,防御系統難以合理分配火力,平均每次約有2.8架無人機可避開攔截系統實施打擊。

上述案例,無人機在形式上表現為“集群”,但不存在群體智能,僅靠多架無人機集聚帶來的數量優勢提高作戰能力。

——集中式集群。這是一種以地面指揮中心作為集群大腦、無人機之間無交互、統一受集群大腦指揮調度的集群方式。2020年11月,美軍通過地面軟件驅動“復仇者”無人機組成集群,進行了約2小時的自主協同飛行試驗。該項目利用軟件確定最優作戰方案,提高了現有無人作戰力量的靈活性和生存能力。

集中式集群智能化程度低,面臨單鏈失效、可靠性差等潛在問題。當地面指揮中心與集群通信鏈路遭到破壞時,整個集群將因失去控制而喪失作戰能力。

2018年,敘利亞反對派出動13架固定翼無人機構成集中式集群,對俄羅斯空軍基地進行襲擾攻擊。俄方利用電子戰加火力殺傷的手段實施攔截,最終俘獲6架無人機,擊落7架無人機。

——分布式集群。這是一種不存在中心控制器、各無人機通過機間信息共享、協同配合執行作戰任務的集群方式。該方式具有去中心化、低復雜度和自組織性等優勢,極大提高了遂行復雜任務能力。

2017年,美國利用3架F/A-18戰斗機釋放了103架無人機,形成分布式集群進行飛行試驗,實現了載機發射、隊形變換等功能,達到了預期作戰效果。

相比於集中式集群,分布式集群具備了分布式體系結構,機間信息交互為群體智能的產生提供了必要條件。擁有群體智能的無人機集群,自主性高、安全性好,是集群作戰的主要發展方向。

利用群體行為特征為集群賦智

在瑰麗的自然界中,存在著魚群、獸群、蜂群和鳥群等生物群落。這些生物個體本身是脆弱的,但通過交互協作聚集而成的群體,則擁有更強的覓食、趨利避害和遷徙等能力。

生物群落通過簡單通信實現高效協同,表現出協同聚集、目標吸引和避撞排斥等行為特征,能夠達成合作共贏的集群效果。

這種由群居性生物通過協作表現出的宏觀智能行為特征,即為群體智能。群體智能是人工智能的一個重要研究方向。

結合無人機系統技術,研究群體智能的理論與方法,有望探求到更具自主智能特性的無人機集群,形成高級群體智能。

——根據協同聚集行為特征,實現無人機集群的分布式作業。在自然界中,覓食的魚群能通過局部信息交流聚集,提高覓食效率。在遭遇捕食者時,又可快速散開逃逸,分散捕食者注意力,降低被捕食風險。與之類似,無人機集群的飛行控制,通過相鄰無人機的信息交互,設計無人機協同控制協議,使得集群中的每一成員就全局一致、方向趨同和期望隊形等達成“共識”,真正實現集群的分布式作業。就像波動現象一樣,相互間迅速准確地傳導信息,從而達成行動的一致性。

——利用目標吸引行為特征,實現無人機集群的編隊跟蹤。狼群能在頭狼帶領下進行任務分工,密切配合圍捕獵物。頭狼負責追蹤目標並發布命令,狼群則擔負不同職責共同協作高效完成捕獵任務。無人機集群可參照狼群模式,利用目標吸引行為特征,形成領航跟隨任務模式。領航機探測識別與分析處理能力較強,負責跟蹤目標生成航跡,發揮高性能優勢和態勢感知能力,實現對目標的實時跟蹤,跟隨機既能實時跟蹤領航機航跡,又能通過機間協同形成任務所需的集群構型,提高載荷分布配置效能,強化任務執行力。

——依據避撞排斥行為特征,實現無人機集群的智能防撞。無人機集群在執行作戰任務時,實現智能防撞是保證自身飛行安全和順利執行任務的基本要求。“集群智能防撞”,就是要讓各無人機實時規避戰場環境中的障礙物,同時集群間不發生碰撞。要實現這一效果,可構建無人機之間和集群與障礙物之間的“智能斥力勢場”:當相對距離過小時,觸發避撞排斥機制,有效應對復雜環境和作戰模式。

智能集群引領體系化作戰新樣式

從世界軍事強國發展趨勢來看,隨著信息化、無人化和智能化技術應用於戰場,是否具備體系化作戰能力將成為決定戰爭成敗的重要因素。

群體智能技術的發展,將極大推動無人機集群作戰模式的變革,是未來軍隊適應復雜戰場環境、提升作戰能力的重要手段。無人機集群將顛覆傳統戰爭形態,成為制勝未來戰場的新型作戰樣式。

具備一定協同能力與自主性的無人機集群,可搭載不同種類載荷,執行多樣化作戰任務。從美國的“小精靈”“山鶉”等無人機集群協同作戰驗證項目的實驗效果來看,小型化、低成本的無人機集群,在短期內有望通過機間信息共享,形成探測、感知、識別、通信和攻擊等協同能力。

鑑於此,各軍事強國持續發展無人機集群作戰力量,期望以成體系的低成本無人機集群,襲擾相對孤立的高價值軍事目標,發揮出非對稱作戰優勢。

隨著人工智能技術的不斷升級,擁有群體智能的無人機集群,可發揮其環境適應能力強、部署靈活、功能集成、小型高效的優勢,實現智能組網、協同作戰與博弈對抗,對防御系統實施全向突防,形成“偵-抗-打-評”作戰閉環,在未來多域多維的體系化作戰中克敵制勝。

中國原創軍事資源:http://www.81.cn/yw_208788827/10085732.html

Analysis of Chinese Military Development Trend of Collaborative Combat in the Era of Intelligentization

智能化時代中國協同作戰軍事發展趨勢分析

現代英語:

Operational coordination is a key element in modern warfare for achieving system-of-systems operations, unleashing overall effectiveness, and achieving operational objectives. In recent years, with breakthroughs in military science and technology, particularly artificial intelligence, the empowering and efficiency-enhancing role of technology has become increasingly prominent. While profoundly changing the nature of warfare and operational styles, it has also given rise to a new operational coordination model—autonomous coordination. Currently, we should scientifically grasp the opportunities and challenges of the new military revolution, dynamically coordinate the development of autonomous coordination, and thus accelerate the transformation and upgrading of operational methods.

Transforming towards intelligent empowerment and autonomous collaboration

Future warfare will be a comprehensive confrontation between opposing sides employing “human + intelligent equipment.” Limited by military technology, system platforms, and combat capabilities, traditional combat coordination, with its fixed cycles and low fault tolerance, is no longer suitable for the rapidly changing modern battlefield. With the powerful support of advanced technologies such as artificial intelligence and big data, the autonomy and automation of combat coordination will be greatly enhanced, and intelligently empowered autonomous coordination will become key to victory.

Wide-area ubiquitous collaboration. In recent years, the profound development of communication and intelligent technologies, along with the accumulation and superposition of data, algorithms, and computing power, has promoted the interconnection and aggregation of people, machines, things, and energy. This has extended the military Internet of Things (IoT) to many fields such as situational awareness, command and control, information and fire strikes, and logistical support. While promoting the iterative upgrading of combat capabilities, it has also provided more options for modern combat collaboration. It is foreseeable that the military IoT will shine on the future battlefield, serving not only as a key infrastructure supporting combat operations but also as a crucial hub for maintaining combat collaboration. Based on this, ubiquitous warfare characterized by wide-area dispersion of forces, modular organizational structures, and highly coordinated actions will emerge, characterized by being omnipresent, ubiquitous, and autonomous without control.

Deep human-machine collaboration. In the Nagorno-Karabakh conflict, the Azerbaijani army leveraged its drone advantage to build a strong battlefield advantage, marking the beginning of “robot warfare.” In future warfare, unmanned combat forces such as drones, unmanned vehicles, and unmanned ships are rapidly moving from back-end support to the front lines, becoming the “protagonists” of the battlefield. Compared to traditional combat collaboration, manned-unmanned intelligent collaboration exhibits characteristics such as decentralized command, de-division of labor in combat processes, advanced skill operation, and blurred lines between the front and rear, placing greater emphasis on human-machine collaboration and algorithmic victory. Especially in recent years, intelligent unmanned swarms have emerged as a powerful force, strongly impacting the modern battlefield. Faced with these new situations and changes, we should comprehensively utilize swarm formation algorithms, formation control algorithms, and complex scenario optimization algorithms to promote networked communication and intelligent collaboration between unmanned and manned systems, facilitating the integrated operation of the intelligence chain, command chain, mobility chain, strike chain, and support chain, and accelerating the generation of comprehensive precision-based combat capabilities.

Data-driven collaboration. The traditional operational collaboration model under hierarchical command is no longer suitable for the multi-dimensional and fast-paced nature of modern warfare. In future warfare, intelligence is key, and data is king. The deep integration of big data, cloud computing, and artificial intelligence enables the storage, analysis, fusion, and application of massive amounts of battlefield data, making command and control more scientific and operational collaboration more efficient. Leveraging powerful resource integration, computing power, and data analysis capabilities, battlefield intelligence can be rapidly integrated, battlefield situation awareness can be achieved in real time, collaborative plans can be efficiently formulated, and threat levels can be assessed instantly. This allows for the integrated planning of predicting combat actions, analyzing typical scenarios, deploying combat forces, and allocating combat resources, thereby comprehensively improving the overall effectiveness of command and control, firepower strikes, and integrated support, and driving a revolutionary change in operational collaboration.

Towards Multi-Domain Collaborative Autonomous Evolution

Future warfare will feature complex and diverse participating forces, a mix of advanced and less sophisticated weaponry, and a hybrid application of combat methods. It will exhibit distinct characteristics such as intelligent, dynamically decentralized command and control, intelligent and wide-area deployment of combat forces, and intelligent allocation and dynamic differentiation of combat missions. It is foreseeable that multi-domain联动 (interconnected and autonomous) collaboration will become a crucial component of operational coordination.

System self-restructuring and collaboration. Future warfare will involve a multi-domain battlefield space that combines virtual and real elements, with diverse military operations interacting and constraints and collaboration shifting randomly. Only an engineered and systematic organizational model can adapt to the complex needs of multi-domain collaboration. The essence of this collaboration model is to form a wide-area holographic support architecture for system self-restructuring and collaboration. Specifically, this means emphasizing the concept of system-of-systems warfare, comprehensively resolving practical contradictions in organizational system construction, institutional mechanism establishment, and collaborative rule formulation; focusing more on the system integration effect, achieving beyond-visual-range and cross-domain collaborative operations for combat units across a wide area; emphasizing efficient and flexible command, refining command relationships and clarifying command responsibilities from multiple dimensions; and paying more attention to data-driven precision, integrating network system platforms at all levels to establish a dynamic optimization network for reconnaissance, control, strike, assessment, and support missions. Once this collaboration model is formed, it will undoubtedly be able to analyze and predict typical confrontation scenarios based on the operational environment, adversaries, and missions, dynamically select action collaboration links, and plan operational actions across various domains in an integrated manner.

Tactical Adaptive Collaboration. Recent local wars have repeatedly demonstrated that the complexity and systemic nature of operational collaboration have increased exponentially due to the extension of operational data and information sharing to the tactical level. Only by achieving efficient processing, integration, and sharing of operational data and information can adaptive and autonomous collaboration among operational users be guaranteed. This collaborative model places greater emphasis on scientific planning and innovative methods to form a universal battlefield situation map with full-dimensional coverage. It supports hierarchical, cross-level, and cross-domain sharing and collaboration among users deployed across a wide area, enabling command elements and operational units to jointly perceive the battlefield situation and ensuring self-synchronous operations within a unified strategic intent, operational guidance, and collaborative planning framework. This collaborative model further emphasizes vertical integration of strategy, operations, and tactics, and horizontal integration of land, sea, air, space, and cyberspace. It provides powerful information sharing services in detection, early warning, and surveillance, and promotes the extension of operational-level joint operations to tactical-level joint operations through information media. This collaborative model further highlights the standardized operation of command and control, and the use of cutting-edge technologies such as big data and cloud computing to promote the connection of operational command levels, cross-domain linkage, element interaction, and situational awareness sharing. It achieves intelligent collaboration among command systems, weapon platforms, and sensors, and implements the key to victory through speed.

Complementary and Synergistic Advantages. In future warfare, operations in space, cyberspace, and other domains will be deeply integrated into the traditional battlefield, requiring higher standards and more stringent planning and design for the overall operation. Only by clarifying the complementary relationships and proportions of input and output across different operational domains, and then outlining the operational relationships for cross-domain collaboration, can we bridge the gaps in domain operations and achieve multi-dimensional battlefield complementarity. Essentially, this is also a concentrated reflection of the concept of war effectiveness. From another perspective, in a war, when local battlefield advantages are not obvious or harbor hidden dangers, overall victory can still be achieved by gaining local advantages in other domains to compensate and achieve comprehensive superiority. In future informationized and intelligent warfare, this will be even more prominent and complex, requiring comprehensive strategies targeting military, political, public opinion, legal, psychological, and diplomatic fields, leveraging each other to fully unleash maximum operational effectiveness; requiring close cooperation between traditional and new-type forces, building an integrated operational system based on network information systems, and maximizing overall effectiveness through synergistic advantages.

Towards Dynamic Coupling and Autonomous Collaborative Transition

In the era of artificial intelligence, with the profound changes in information technology and weaponry, combat operations place greater emphasis on breaking down traditional force formations, integrating the functions of traditional platforms, and dismantling traditional offensive and defensive boundaries, so as to achieve all-weather dynamic control of combat operations through dynamic coupling and autonomous collaboration.

Dynamic convergence and coordination. Future warfare will see more intense adversarial confrontations and more volatile battlefield situations, rendering the static, extensive, and methodical coordination methods of the past inadequate. It is imperative to pay close attention to key operational nodes, closely monitoring the overall situation, anchoring operational tasks, and focusing on operational objectives. This requires assessing the situation, seizing opportunities, and swiftly changing coordination partners, flexibly adjusting coordination strategies, and autonomously negotiating coordinated actions based on predetermined coordination rules. It is important to note that this coordination method based on key operational nodes particularly emphasizes the ability of combat forces to overcome structural barriers and organically aggregate operational effectiveness. Through the flexible structure of the coordination organization, conflicts can be self-coupled and autonomously resolved, gaps in cooperation can be bridged, and the precise release of the combined forces of the operational system can be promoted.

Dynamic control and coordination. The battlefield situation in future warfare is constantly changing, and the course of operations often deviates from the predetermined plan, resulting in significant uncertainty. This implicitly requires us to break through traditional operational thinking and closely monitor changes in the battlefield situation to implement real-time, flexible, and autonomous coordination of the operational process. This coordination method, through real-time assessment of changes in the battlefield situation, the extent of damage to enemy targets, and the scale and effectiveness of operational operations, enables rapid command and control and precise coordination in areas such as force projection, fire support, and comprehensive support, ensuring that we always maintain the initiative on the battlefield. This coordination method requires relying on advanced intelligent auxiliary means to quickly divide the operational phases, predict the duration of operational operations, analyze the overall deployment of operational forces, calculate the allocation of operational resources, and accordingly precisely control the decision-making cycle and operational rhythm, accurately coordinating troop actions and the operational process to ensure effective response to various randomness and uncertainties in combat.

Dynamic Response and Coordination. The unpredictable nature of future warfare, coupled with the profound effects of asymmetric warfare, hybrid games, and system emergence, means that planned operations will inevitably encounter various unforeseen circumstances during execution. Therefore, dynamic coordination in response to unforeseen situations is an effective strategy for resolving these contradictions. This coordination method emphasizes dynamically adjusting actions based on different situations. When unforeseen circumstances arise in a local battlefield or operation, with minimal impact on the overall operation and sufficient time, the operational system automatically responds, partially adjusting operational deployments and actions to ensure the achievement of expected operational objectives. When multiple urgent and non-urgent situations coexist on the battlefield and partially affect the overall situation, operations are dynamically and instantly coordinated according to the principle of prioritizing urgent matters, pushing the battle situation in our favor. When multiple major unexpected situations or unforeseen changes occur in the overall battle situation, coordination is carried out according to the principle of prioritizing primary directions and then secondary directions, rapidly generating new coordinated response measures to effectively address various unforeseen battlefield situations. (Wu Siliang, Jia Chunjie, Hou Yonghong)

Source: PLA Daily

(Editors: Wang Xiaoxiao, Ren Yilin)

現代國語:

2025年04月01日08:59 |

小字号

引言

作战协同是现代战争中实现体系作战、释放整体效能、达成作战目标的关键要素。近年来,随着以人工智能为代表的军事科学技术取得突破性进展,科技的赋能增效作用进一步凸显,在深刻改变战争形态、作战样式的同时,也催生出一种新的作战协同模式——自主协同。当前,应科学把握新军事革命的机遇挑战,动态统筹好自主协同发展走向,从而推动作战方式加速转型升级。

向智能赋能自主协同蜕变

未来战争将是对抗双方采用“人+智能装备”展开的全方位对抗。受军事技术、系统平台、作战能力等限制,传统作战协同因为存在周期固化、容错率低等局限,已难以适应战机转瞬即逝的现代战场。在人工智能、大数据等先进技术手段的强力支撑下,作战协同的自主性、自动化水平将极大提升,智能赋能下的自主协同亦将成为克敌制胜的关键。

广域泛在协同。近年来,通信技术、智能技术的深度发展,数据、算法、算力的积累叠加,促进了人、机、物、能的互联聚合,将军事物联网延伸扩展至态势感知、指挥控制、信火打击、后装保障等诸多领域,在促进作战能力迭代升级的同时,也为现代作战协同提供了更多选项。可以预见,军事物联网将在未来战场大放异彩,不仅是支撑作战行动的关键性基础设施,也是维系作战协同的关节枢纽。以此为依托,将催生出力量广域分散、组织模块构成、行动高度协同的泛在式作战,无时不在、无处不在、无控自主。

人机深度协同。纳卡冲突中,阿塞拜疆军队凭借无人机优势构建起强大战场优势,某种程度也宣告“机器人战争”登场。未来战争,无人机、无人车、无人舰等无人作战力量,正加速从后台支援保障走向一线作战前台,开始担当战场“主角”。较之传统作战协同,有人无人智能协同呈现出作战指挥“去中心化”、作战过程“去分工化”、技能操作高端化、前沿与后方模糊化等特点,更加强调人机协同、算法取胜。尤其是近年来,智能无人集群异军突起,开始强烈冲击现代战场。面对这些新情况新变化,应统筹运用集群编队算法、队形控制算法以及复杂场景优化算法等,推动无人与有人组网通信、智能协同,促进情报链、指挥链、机动链、打击链和保障链一体运转,加快生成精确制敌综合作战能力。

数智驱动协同。逐层递进指挥下的传统作战协同模式,已难以适应现代战争的多维度快节奏。未来战争,智能为要,数据为王。大数据、云计算、人工智能等深度融合,实现了对海量战场数据的存储、分析、融合和运用,从而使得指挥控制更加科学、作战协同更加高效。借助强大的资源整合、计算处理和数据分析能力,可以快速融合战场情报、实时感知战场态势、高效制订协同计划、瞬时评估威胁等级,将预测作战行动、解剖典型场景、布势作战力量和配置作战资源一体统筹,从而全面提升指挥控制、火力打击、综合保障等方面的综合质效,推动作战协同革命性变革。

向多域联动自主协同演进

未来战争,参战力量复杂多元、武器装备高低搭配、作战方法混合运用,呈现作战指挥智能动态分散、作战力量智联广域部署、作战任务智配动态区分等鲜明特征。可以预见,多域联动自主协同将成为作战协同的重要构成。

体系自重塑协同。未来战争多域战场空间虚实结合、多样军事行动交互作用,约束与协作随机转化,只有采取工程化、系统化的组织模式,才能适应庞杂的多域协同需要。这种协同模式,其实质是要形成体系自重塑协同的广域全息支撑架构。具体来看,就是更加突出体系作战理念,从整体上破解组织体系构建、制度机制设立、协同规则制订等现实矛盾;更加注重体系融合效应,从广域上实现作战单元超视距作战、跨域协同作战;更加强调高效灵活指挥,从诸维度细化指挥关系、厘清指挥权责;更加关注数据精准驱动,从各层级整合网络系统平台,建立侦控打评保任务动态优化网。这种协同模式一旦形成,无疑能够针对作战环境、作战对手和作战任务等,研判预测典型对抗态势场景,动态选择行动协同链路,一体规划各领域作战行动。

战术自适应协同。近年来的局部战争冲突一再表明,由于作战数据信息向战术层共享应用延伸,作战协同的复杂性系统性呈指数级跃升。只有实现作战数据信息的高效处理、融合共享,才能保证作战用户间自适应、自主化协同。这种协同模式,更加注重科学规划、创新手段,形成全维覆盖的通用战场态势图,支持广域分散部署的各级各类用户间按级、越级、跨域共享协作,实现指挥要素、作战单元共同感知战场态势,确保在统一的战略意图、战役指导、协同计划框架内自同步作战。这种协同模式,更加强调纵向贯通战略、战役、战术,横向融汇陆海空天电,在探测、预警、监视等方面提供强力信息共享服务,依托信息介质推动战役级联合向战术级联合延伸。这种协同模式,更加突出指挥运行、力量运用等的标准化运行,借助大数据、云计算等前沿技术推动作战指挥层级衔接、跨域联动、要素交互、态势共享,实现指挥系统、武器平台、传感器间的智能化协同,落地落实以快制慢制胜关键。

优势智互补协同。未来战争,太空、网络等领域作战行动深度融入传统战场空间,要求对作战全局实施更高标准更高要求的规划设计。只有搞清各作战域优势互补关联、投入成效比重,进而梳理出跨领域协同的运行关系,才能弥合领域作战缝隙,实现多维战场优势互补。从本质上看,这也是战争效益观的集中反映。从另一视角来看,一场战争,当战场局部优势不明显或暗藏危机时,通过在其他领域取得局部优势予以弥补并达成综合优势,同样可以实现整体制胜目的。未来信息化智能化战争,这一点将体现得更为突出也更为复杂,要求针对军事、政治、舆论、法理、心理、外交等领域综合施策,相互借力充分释放最大作战效能;要求传统力量、新质力量密切配合,依托网络信息体系打造一体化作战体系,通过优势协同实现整体效能最大化。

向动态耦合自主协同变迁

人工智能时代,伴随信息技术和武器装备的深度变革,作战行动更加强调打散传统力量编组、打通传统平台功能、打破传统攻防界限,通过动态耦合自主协同实现对作战行动的全时动态可控。

动态聚点协同。未来战争敌我对抗更加激烈、战场态势更为多变,以往那种静态粗放、按部就班的协同方式将难以适应。必须对作战的关键节点给予高度关注,在紧盯整体态势、锚定作战任务、聚焦作战目标的基础上,审时度势把握战机,依据预定的协同规则,敏捷变换协同对象、灵活调整协同策略、自主协商协同行动。需要注意的是,这种基于关键作战节点的协同方式,尤为强调作战力量跨越结构壁垒、有机聚合作战效能,通过协同组织的弹性结构,自耦合自主化消解矛盾冲突、弥合作战缝隙,促进作战体系合力精准释放。

动态调控协同。未来战争战场态势瞬息万变,作战进程往往难以按照预定作战计划推进,作战行动有着极大的不确定性。在无形中,这也要求我们突破传统作战思维,紧盯战场态势变化对作战进程实施即时灵活自主协同。这种协同方式,通过实时评估战场态势变化、敌方目标毁伤程度、作战行动规模效益等,从而在力量投送、火力支援、综合保障等方面实现快速指控、精准协同,始终把握战场主动权。这种协同方式,要求依托智能辅助先进手段,快速切分作战阶段,预测作战行动持续时间,研判作战力量整体布势,计算作战行动资源分配,据此精准控制决策周期和作战节奏,精准协调部队行动和作战进程,确保能够有效应对作战中的各种随机性、不确定性。

动态响应协同。未来战争作战机理变化莫测,非对称作战、混合博弈、体系涌现等的深层作用,使得预定作战方案计划在执行中必然遇到各类突发情况。为此,针对突发情况动态协同是解决上述矛盾问题的有效策略。这种协同方式,更加强调依据不同情况动态调整协同行动。当局部战场或局部行动出现突发情况,对作战全局影响不大且时间充裕时,作战体系自动响应,部分调整作战部署和作战行动,确保实现预期作战目标。当战场出现多个急缓并存情况且部分影响战场态势时,根据具体情况按照先急后缓原则动态即时协调作战行动,推动战局向着有利于我的方向发展。当战局整体发展出现多个重大意外情况或出现未曾预想的变化时,按先主要方向、后次要方向的原则展开协同,快速生成新的协同处置措施,有效应对战场各类突发情况。(吴思亮、贾春杰、侯永红)

来源:解放军报

(责编:王潇潇、任一林)

中國原創軍事資源:https://military.people.com.cn/n1/2025/0401/c1011-40451255888.html

Chinese Military Research Application of Quantum Technology for Warfare Uses

中國軍方研究量子技術在戰爭中的應用

現代英語:

Quantum technology is considered one of the world-changing technologies of the 21st century and is a cutting-edge field of scientific and technological development, encompassing multiple aspects such as quantum communication, quantum computing, and quantum detection. In recent years, significant progress has been made in the preparation of quantum entangled states, the realization of quantum communication, and quantum computing. The latest advancements in quantum technology have brought revolutionary changes to the military field, and major military forces worldwide are paying close attention to its development and application. To this end, the National Strategy Research Institute of Shanghai Jiao Tong University has conducted a special study on the application of quantum technology in the military field. Excerpts of some of the research results are presented below:

I. Some major applications of quantum technology in the military field

1. Encrypted communication

Quantum communication technology utilizes the quantum entanglement effect for information transmission, offering unparalleled confidentiality compared to traditional communication methods. Quantum key distribution (QKD) is a secure communication technology based on the principles of quantum mechanics, ensuring the security of information during transmission. The U.S. military has been operating an experimental quantum key distribution network since 2003, and the White House and the Pentagon have also installed and are using quantum communication systems.

Research on the application of quantum technology in the military field 2.png

2. Navigation and Positioning

Quantum positioning technology is an emerging navigation and positioning technology that utilizes quantum accelerators and quantum gyroscopes to provide high-precision, lightweight navigation devices. These devices do not require periodic position correction via navigation satellites, significantly improving the autonomous navigation capabilities of military platforms. For example, the Royal Navy found that its submarine’s quantum navigation system had a positioning error of only 1 meter over 24 hours during testing.

Research on the application of quantum technology in the military field 3.png

Scientists are testing quantum gyroscopes.

3. Intelligence reconnaissance

Quantum imaging technology has important applications in military intelligence reconnaissance. It can simultaneously detect and identify multiple targets, offering advantages such as high imaging speed, anti-jamming capabilities, and anti-radiation properties. Furthermore, quantum imaging can precisely track and monitor moving targets, improving the efficiency and accuracy of intelligence gathering.

4. Data Processing

Quantum computing boasts the advantage of parallel processing, enabling the rapid aggregation and analysis of massive amounts of battlefield data. Following the laws of quantum mechanics, quantum computers utilize physical properties such as quantum superposition and entanglement, using qubits (quantum bits) composed of microscopic particles as their basic units, and achieving computational processing through the controlled evolution of quantum states. This will drive the real-time and efficient connection of battlefield IoT and various information terminals, realizing the intelligent and networked upgrade of the battlefield.

5. Battlefield decision support

Quantum technology can enhance the confidentiality of military network information, improve the accuracy of military navigation and positioning, and enable the efficient processing of massive amounts of intelligence, thus providing strong support for battlefield decision-making. The ultrafast computing power of quantum computers can help analyze complex battlefield situations, provide more accurate battlefield simulations and predictions, and assist commanders in making more informed strategic decisions.

The application of quantum technology in the military field will have a significant impact on the future form of warfare and combat methods. As quantum technology continues to develop and mature, its application in the military will become increasingly widespread, providing strong technical support for improving military operational efficiency, ensuring information security, and enhancing battlefield command capabilities.

II. Application Prospects of Quantum Technology in the Civilian Field

1. Quantum communication

Quantum communication is an important application area of ​​quantum technology, utilizing quantum entanglement and the no-cloning principle to achieve secure information transmission. Quantum key distribution (QKD) is a secure communication technology based on quantum mechanics principles, ensuring the security of information during transmission. Through quantum communication, metropolitan quantum communication networks, intercity quantum networks, and even long-distance quantum communication via satellite relay can be realized, providing secure data and information transmission for fields such as finance and government.

2. Quantum computing

Quantum computing leverages the superposition and entanglement properties of qubits to significantly surpass the computational capabilities of traditional computers for specific problems. Quantum computers have potential applications in areas such as cryptography, optimization problems, drug discovery, and materials science. For example, quantum factorization algorithms can break the widely used RSA encryption system, while quantum search algorithms can provide exponential speedups in areas such as database queries.

Research on the application of quantum technology in the military field 4.jpg

The same superconducting quantum computer as the “Zu Chongzhi” series

3. Quantum precision measurement

Quantum precision measurement leverages the hypersensitivity of quantum states to achieve measurement accuracy surpassing classical methods. This can be applied to gravitational wave detection, geophysics, biology, and other scientific fields, as well as improving the accuracy and reliability of navigation systems. For example, new approaches to gravitational wave detection can be achieved through quantum entangled light sources and precise optical clocks, or quantum mechanical nonlocality tests can be conducted over distances on the order of light seconds between the Earth and the Moon.

4. Quantum Simulation

Quantum simulators can simulate complex quantum systems, providing new tools for research in fields such as physics, chemistry, and materials science. Through quantum simulators, scientists can explore complex phenomena such as high-temperature superconductivity and quantum phase transitions, accelerating the development of new materials and drugs.

5. Quantum Networks

Quantum networks combine quantum communication and quantum computing, enabling the efficient transmission and processing of quantum information. The development of quantum networks will drive the formation of a quantum internet, providing a new platform for applications such as information security, telemedicine, and intelligent transportation.

6. Quantum Imaging

Quantum imaging technology utilizes the principles of quantum entanglement and quantum interference to achieve high-resolution imaging in low-light or high-noise environments. This has important applications in fields such as medical imaging, night vision systems, and remote sensing.

7. Quantum Sensing

Quantum sensors utilize the properties of quantum states to achieve extremely high-precision measurements of physical quantities. Quantum sensing technology can be applied to fields such as precision measurement, environmental monitoring, and geological exploration, improving the accuracy and reliability of measurements.

現代國語:

量子技術被認為是21世紀改變世界的技術之一,也是科技發展的前沿領域,涉及量子通訊、量子計算和量子探測等多個面向。近年來,量子糾纏態的製備、量子通訊的實現和量子計算等方面取得了顯著的進展,量子技術的最新進展為軍事領域帶來了革命性的變革可能,世界主要軍事力量高度關注量子技術的發展與應用。為此,上海交通大學國家戰略研究院對量子技術在軍事領域的應用進行了專題研究,現在將部分研究成果摘錄如下:

一、量子技術在軍事領域的一些主要應用方向

1.加密通信

量子通訊技術利用量子糾纏效應進行資訊傳遞,具有傳統通訊方式無法比擬的保密性。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。美軍自2003年起開始運行實驗性量子金鑰分發網絡,而白宮和五角大廈也已安裝使用量子通訊系統。

量子技術在軍事領域的應用研究2.png

2.導航定位

量子定位技術是近年來新興的導航定位技術,利用量子加速器和量子陀螺儀,可以提供高精度、重量輕的導航設備。這些設備無需定期通過導航衛星校正位置,大大提高了軍事平台的自主導航能力。例如,英國皇家海軍在測試潛水艇的量子導航系統時發現,其在24小時內的定位誤差僅1公尺。

量子技術在軍事領域的應用研究3.png

科學家在測試測試量子陀螺儀

3.情報偵察

量子成像技術在軍事情報偵察領域有重要應用。量子成像技術可以同時對多個目標進行探測識別,具有成像速度快、抗干擾、反輻射等優勢。此外,量子成像還可以對動態目標進行精確追蹤監視,並提高情報收集的效率和準確性。

4.數據處理

量子運算具有平行運算優勢,能夠實現對戰場海量資料的快速匯聚與分析計算。量子電腦遵循量子力學規律,利用量子疊加和糾纏等物理特性,以微觀粒子構成的量子位元為基本單元,透過量子態的受控演化實現計算處理。這將推動戰場物聯網及各類資訊終端即時高效連接,實現戰場智慧化、網路化升級。

5.戰場決策支持

量子技術可增強軍事網路資訊保密性,提高軍事導航定位精度,實現大量情報高效處理,進而為戰場決策提供強而有力的支援。量子電腦的超快運算能力可以幫助分析複雜的戰場情況,提供更精確的戰場模擬和預測,輔助指揮官做出更明智的戰略決策。

量子科技在軍事領域的應用將對未來戰爭形態和作戰方式產生重要影響。隨著量子技術的不斷發展和成熟,其在軍事領域的應用將越來越廣泛,為提高軍事作戰效率、保障資訊安全和提升戰場指揮能力提供強大的技術支援。

二、量子技術在民用領域的應用前景

1.量子通信

量子通訊是量子技術的一個重要應用領域,它利用量子糾纏和量子不可複製原理來實現資訊的安全傳輸。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。透過量子通信,可以實現城域量子通訊網路、城際量子網絡,甚至透過衛星中轉實現遠距離量子通信,為金融、政務等領域提供資料和資訊的安全傳輸。

2.量子計算

量子運算利用量子位元的疊加和糾纏特性,能夠在特定問題上大幅超越傳統電腦的運算能力。量子電腦在破解密碼、最佳化問題、藥物發現、材料科學等領域具有潛在的應用價值。例如,量子因數分解演算法可以破解目前廣泛使用的RSA加密體系,而量子搜尋演算法則能夠在資料庫查詢等方面提供指數級的加速。

量子技術在軍事領域的應用研究4.jpg

「祖沖之號」同款超導量子計算機

3.量子精密測量

量子精密測量利用量子態的超敏感性來實現超越經典方法的測量精度。這可以應用於重力波探測、地球物理學、生物學和其他科學領域,以及提高導航系統的精度和可靠性。例如,透過量子糾纏光源和精準的光鐘,可以實現重力波探測的新途徑,或在地球和月球之間進行光秒量級距離的量子力學非定域性檢驗。

4.量子模擬

量子模擬器可以模擬複雜的量子系統,為物理學、化學和材料科學等領域的研究提供新的工具。透過量子模擬器,科學家可以探索高溫超導、量子相變等複雜現象,加速新材料和藥物的開發。

5.量子網絡

量子網路結合了量子通訊和量子運算,可以實現量子資訊的高效傳輸和處理。量子網路的發展將推動量子網路的形成,為資訊安全、遠距醫療、智慧交通等應用提供新的平台。

6.量子成像

量子成像技術利用量子糾纏和量子乾涉原理,可以在低光照或高雜訊環境下實現高解析度成像。這在醫學影像、夜視系統、遙感偵測等領域有重要應用。

7.量子感測

量子感測器利用量子態的特性來實現對物理量的極高精度測量。量子感測技術可應用於精密測量、環境監測、地質探勘等領域,提升測量的準確性與可靠性。

中國原創軍事資源:https://niss.sjtu.edu.cn/web/main/cgcp/600ad41bb50841d2bb9283642a4d14d888e

The Chinese Communist Party’s Application of Quantum Technology in Warfare

中國共產黨在戰爭中應用量子技術

現代英語:

On November 1, 2022, Huawei, a major Chinese mobile phone manufacturer, announced its patent for a superconducting quantum chip, stating that the invention reduced crosstalk between quantum bits. Huawei has been investing in quantum chip research and development for more than 5 years and has published a number of quantum technology patents. In addition, it is rumored that the Chinese quantum computer “Wukong” will be unveiled soon, and the first quantum chip production line is being rushed to completion, using the “NDPT-100 non-destructive probe electrical measurement platform” developed by Origin Quantum in Hefei to improve yield. At the same time, the University of Science and Technology of China also announced on November 20 that it has achieved quantum storage of photons in the communication band, which can be directly connected to the existing fiber optic network, and may be able to build a long-distance, large-scale fiber optic quantum network in the future. [1]

On the other hand, the U.S. Department of Defense released the 2022 China Military Power Report on November 29, pointing out that the CCP discussed a new core operational concept in 2021—”Multi-Domain Precision Warfare”—using big data and artificial intelligence technologies to identify vulnerabilities in the opponent’s combat system and then carry out precise strikes. At the same time, the CCP has also acquired emerging technologies for both military and civilian use through its military-civilian integration strategy, such as artificial intelligence, autonomous systems, quantum technology, biotechnology, and advanced materials. [2]

Although quantum technology is still in the “proof of concept” (POC) stage and will take a considerable amount of time before it can be put into practical use, China’s quantum technology continues to make progress despite the strong technological blockade by the United States, and its application in combat may be prioritized, which deserves our special attention.II. Safety ImplicationsI. The CCP will take the lead in establishing a global quantum communication network.Quantum technology[3] is mainly divided into three major fields: quantum computing, quantum communication and quantum sensing.[4]

China’s quantum communication technology currently holds a leading position in the world and may be the first to complete industrialization.[5] Following the opening of the world’s first quantum communication network, the Hefei Metropolitan Area Quantum Communication Experimental Demonstration Network, in 2012, China successfully launched the world’s first quantum satellite, Micius, in 2016.

Subsequently, it achieved three major technological breakthroughs: quantum key distribution (QKD) between satellite and ground, quantum teleportation between ground and satellite, and quantum entanglement key distribution over a thousand kilometers. In 2017, the CCP opened the Beijing-Shanghai quantum communication line, which is more than 2,000 kilometers long. With the connection between the satellite “Micius” and the Beijing-Shanghai quantum communication line, the world’s first intercontinental (Beijing-Vienna) quantum communication video call was completed through the collaboration between Austrian scholar Anton Zeilinger[6] and Chinese quantum expert Pan Jianwei.The successful distribution of “space-to-ground quantum key” enables the CCP to use “low orbit satellites” (LEO) as relay stations to share keys between any two locations in the world.

If further combined with ground fiber optic quantum communication networks, a quantum communication network covering the whole world can be established. Currently, the CCP is planning to build a “national quantum internet” with a length of 35,000 kilometers, extending to Urumqi in Xinjiang and Lhasa in Tibet. In addition to ensuring that the content of messages is not intercepted or eavesdropped on, [7] “Quantum Digital Signature” (QDS) and “Quantum Secure Identification” (QSI) can also improve communication security. In military applications, in addition to ensuring the security of military communications, quantum communication networks can also be used as military 6G technology to assist quantum communication between space, special forces and different military branches, and solve the problem of underwater communication being susceptible to interference, thereby improving underwater combat capabilities. [8]

II. China’s quantum computing technology will accelerate the realization of unmanned intelligent warfare.The global quantum computing market is currently led by the United States and China, which are driving the development of related system software and algorithms. There are multiple technical approaches, with superconductivity and “ion trap” technology being the most advanced. On May 8, 2020, the CCP unveiled the superconducting quantum computer prototype “Zu Chongzhi”; on December 4 of the same year, it announced the successful construction of the photonic quantum computer prototype “Jiuzhang”. Currently, it is using ion trap technology to improve the computing power of photonic quantum chips. [9]

Quantum computers can combine artificial intelligence and big data analysis to process large amounts of information quickly, and are mainly used in chemical analogy, system optimization, password cracking, machine learning and other fields. In the military, in addition to being able to quickly crack public key cryptography and improve network combat capabilities,[10] quantum computing can also be used in battlefield simulation, wireless spectrum analysis, logistics management, energy management and other fields. It can also optimize existing combat command, deployment, decision-making, war game simulation, system verification, predictive analysis and other fields, and significantly shorten the time for weapon design and manufacturing, new material development and military battery research and development. Quantum edge computing can be applied to the collaborative operations of unmanned vehicles or unmanned weapons (see attached table). In addition, if the CCP can establish a battlefield “Internet of Military Things” (IoMT), it can realize precise, fast and highly complex unmanned intelligent operations in advance.

III. Quantum radar and quantum navigation capabilities will reverse the course of war.Quantum sensing technology uses quantum measurement of physical properties such as magnetic fields, electric fields, and gravity, which can greatly improve the accuracy of existing measurements. The main types include quantum radar, quantum navigation, and quantum imaging. Quantum sensing technology can identify targets in complex environments such as high noise, low light, and underwater, and the advantages of current ballistic missiles, stealth aircraft, and underwater nuclear submarines will no longer exist. [11]

In 2017, the CCP claimed that its “quantum imaging technology” (QI) could enable spy satellites to track US B-2 bombers and identify stealth fighters at night. [12]

China Electronics Technology Group Corporation (CETC) showcased the world’s first single-photon quantum radar prototype at the 2018 Zhuhai Airshow and recently claimed that it had completed a target detection test at a range of 100 kilometers in a real atmospheric environment, implying that its quantum radar was about to be launched. [13]

In addition, quantum positioning, timing and navigation (PNT) systems based on high-precision quantum clocks determine the coordinates of ground users by obtaining the time difference between the transmission of entangled photon pairs between the satellite and the ground through quantum satellites. [14]

Since it does not rely on the Global Positioning System (GPS), infrared or radar navigation, quantum navigation can not only greatly enhance the existing Global Navigation Satellite System (GNSS), but also function in environments where GPS cannot work, such as underwater, underground or in environments severely interfered with by electromagnetic waves. Once it is put into practical use, the CCP’s quantum navigation technology will improve the hit rate of its various weapons.

3. Trend Analysis

I. The CCP may be developing “quantum warfare”.Although the CCP acknowledges that its quantum technology still has many shortcomings and that it will take a considerable amount of time before it is commercialized, it has already identified quantum technology as a key technology for breaking through the US’s technological encirclement and establishing itself as a technologically powerful nation. The “second quantum revolution” will overturn existing technological, economic, and military models. It is conceivable that the CCP will continue to invest heavily in quantum technology development through a nationwide system. Under this general direction, the quantum industry and quantum military applications will be accelerated. In the future, as existing computers move towards miniaturization, cloud computing, and edge computing, quantum computers or quantum sensors may be deployed on smaller weapons and equipment, such as satellites, drones, or individual soldier mobile phones, and even for “quantum warfare” (see attached diagram).

II. Taiwan may need to develop quantum defense capabilities in advance.China’s quantum communication technology is currently ranked first in the world, and its quantum computing and quantum sensing technologies are ranked second in the world. Therefore, if China uses quantum technology to fight against us, our country may not have any ability to retaliate. In March 2022, China established a quantum national team, selected 17 industry-academia-research teams, and pointed out the development direction of quantum technology in the next 5 years. [15]

However, its plans are mostly biased towards the technological and economic aspects, and there are no defense measures against the Chinese Communist Party’s possible future attacks on us, such as password cracking, quantum navigation, quantum radar, and even quantum network warfare, quantum space warfare and quantum underwater warfare. Perhaps the Chinese Academy of Sciences should join the quantum national team in advance and cooperate with private industry-academia-research personnel to think about how to defend against the Chinese Communist Party’s future quantum warfare.Appendix: Examples of Military Applications of Quantum Technology

 fieldPossible applications
Quantum CommunicationQuantum key distribution ( QKD )Quantum communication technology is the most mature and is already commercially available.Long -distance quantum communication can be achieved through repeaters such as satellites.
Post-quantum cryptographyUsed to defend against attacks from quantum computersThe United States expects to complete standardization in 2023-2024.
Quantum Communication NetworkQuantum networks: quantum-secure direct communication in space, special forces, and between different military branches → military 6GQuantum digital signature ( QDS )Quantum Identity Recognition ( QSI )Quantum cryptography technology that requires specific locations to transmit and receive: military satellite communicationsQuantum clocks enable more precise time synchronization: C4ISR collaborative action
Quantum computingQuantum simulationBattlefield    simulation, weapon development, simulation and verification
Quantum optimizationOptimize    current operational deployments, exercises, system verification, predictive analysis, etc.Cracking    existing passwords
Big Data Analytics/Machine LearningWireless    spectrum analysis, logistics management, energy managementDecision    Analysis and Reference
Edge computingConsistency of action of unmanned    vehicles or unmanned weapons within the same time period   Cooperative operations between different military branches
Quantum sensingQuantum positioning, navigation, and timing ( PNT )High -precision quantum clockQuantum inertial navigation and quantum-enhanced navigation can be deployed on autonomous unmanned vehicles or missiles.Quantum navigation that does not rely on a global satellite navigation system
Quantum intelligence surveillanceSurface and subsurface monitoring: Quantum sensing technology deployed on low-Earth orbit satellites and unmanned vehicles
Quantum imaging: quantum 3D cameras, quantum gas sensors, low signal-to-noise ratio battlefield vision equipment, quantum rangefinders, quantum ghost imaging, etc.
Quantum Underwater WarfareQuantum inertial navigation can be applied to large submarines and underwater vehicles.Quantum magnetometers can assist in mapping the seabed, detecting underwater mines, and, in conjunction with other sensors, perform underwater detection and analysis.
Quantum radar and quantum laser radar, etc.Quantum laser radar: Short-range target illumination, applicable to anti-drone surveillance, short-range air defense, and small satellite detection in space.Quantum -enhanced radar: A high-precision, low-noise quantum radar that can be used to detect small, slow-moving objects such as drones.
otherCombat Applications Quantum electronic warfareSmaller general-purpose quantum antennas and array-type quantum radio frequency sensorsQuantum computing and quantum clocks can enhance the capabilities of existing electronic warfare systems.Quantum electronic warfare can interfere with, deceive, and obstruct the enemy.
Quantum Space WarfareDeployment and development of technologies such as quantum radar, quantum electronic warfare, quantum sensing, and quantum communication on low-Earth orbit satellites
Biochemical Simulation and DetectionAt least 200 qubits and more logic bits are required for simulation.It can be installed on drones and ground vehicles for detecting biochemical toxins in the environment.
quantum materialsDeveloping new military materials for camouflage, stealth, and high-temperature resistance by utilizing quantum properties such as superconductivity and topology.

Source: Table compiled by author Wang Xiuwen based on the literature. Michal Krelina, “Quantum Technology for Military Application,” EPJ Quantum Technology, (2021) 8:24,

Wang Xu Wen

https://reurl.cc/DXYWaj.

現代國語:

壹、新聞重點

2022年11月1日,中共手機大廠「華為」公司公布其「超導量子晶片」專利,指出該項發明降低了量子比特串擾。「華為」投入量子晶片研發超過5年,已公開多項量子技術專利。此外,據聞中共量子電腦「悟空」即將公開,第一條量子晶片產線正加緊趕工,並採用合肥「本源量子」公司研發的「NDPT-100無損探針電學測量平台」來提高良率。同時,中國科學技術大學也在11月20日宣布已實現通訊波段光子之量子存儲,可直接對接現行的光纖網路,未來可能建構出長距離、大尺度的光纖量子網。 [1]

另一方面,美國國防部11月29日公布《2022年中國軍力報告》(2022 China Military Power Report),指出中共在2021年曾討論新核心作戰概念──「多領域精確作戰」(Multi-Domain Precision Warfare),以大數據和人工智慧等技術,找出對手作戰系統之脆弱點後予以精準打擊。同時,中共也透過軍民融合戰略取得軍民兩用的新興技術,如:人工智慧、自主系統、量子技術、生物技術、先進材料等。[2]

儘管量子技術目前仍處於「概念驗證」(Proof of Concept, POC)階段,距離實用化尚需相當的時間,但是中共量子技術在美國強力的科技圍堵下仍持續進展,且作戰應用可能優先落實,值得我國特別注意。

貳、安全意涵

一、中共將率先建立全球量子通訊網

量子技術 [3]主要分為「量子計算」、「量子通訊」、「量子感測」三大領域,[4] 中共量子通訊技術目前持世界牛耳,且可能最先完成產業化。[5] 繼2012年開通全球第一個量子通訊網路「合肥城域量子通信試驗示範網」之後,中共2016年成功發射全球第一顆量子衛星「墨子號」,其後陸續達成「星地(衛星─地面)量子密鑰分發」(Quantum Key Distribution, QKD)、「地星(地面─衛星)量子隱形傳態」及「千公里級量子糾纏密鑰分發」三大技術突破。2017年,中共開通全長2,000餘公里的量子通訊線路「京滬幹線」,並在「墨子號」與「京滬幹線」之星地鏈結下,透過奧地利學者柴林格(Anton Zeilinger)[6] 和中國量子專家潘建偉之師徒合作,完成全球首次跨洲(北京─維也納)量子通訊之視訊通話。

「星地量子密鑰」分發成功,使中共能以「低軌衛星」(LEO)為中繼站,進行全球任意兩個地點之間的密鑰共享。若進一步結合地面光纖量子通訊網路,可建立覆蓋全球的量子通訊網。目前中共正計畫建構長達35,000公里的「全國量子互聯網」,範圍擴及新疆烏魯木齊和西藏拉薩。量子通訊除可確保訊息內容不被半途截取或竊聽之外,[7] 「量子數位簽名」(Quantum Digital Signature, QDS)和「量子身份識別」(Quantum Secure Identification, QSI)也可提高通訊安全。在軍事應用上,量子通訊網除了保障軍事通訊安全之外,也可作為軍用6G技術協助太空、特種部隊及不同軍種之間的量子通訊,並解決水下通訊易受到干擾之問題,提高水下作戰能力。 [8]

二、中共量子計算技術將加速無人智慧化戰爭之實現

全球量子計算市場目前以美國和中國為兩大領先者,推動相關系統軟體和演算法之發展,並有多種技術途徑,以超導和「離子陷阱」(Ion Trap)技術之發展較為超前。2020年5月8日,中共公開超導量子電腦原型機「祖沖之號」;同年12月4日又宣布光子量子電腦原型機「九章」建構成功,目前正運用離子陷阱技術提升光量子晶片之計算能力。 [9]

量子電腦可結合人工智慧和大數據分析,快速處理大量資訊,主要應用在化學類比、系統優化、密碼破解、機器學習等方面。在軍事上,量子計算除了可快速破解公鑰密碼、提高網路作戰能力之外,[10] 還可運用於戰場模擬、無線頻譜分析、後勤管理、能源管理等,也可優化現有的作戰指揮、部署、決策、兵棋推演、系統驗證、預測分析等,並大幅縮短武器設計製造、新材料開發、軍用電池研發之時間;量子邊緣運算則可應用於無人載具或無人武器之協同作戰(參見附表)。此外,中共若能建立戰場「軍事物聯網」(Internet of Military Things, IoMT),可提早實現精準快速且高度複雜的無人智慧化作戰。

三、量子雷達及量子導航等能力將扭轉戰爭態勢

量子感測技術是以量子測量磁場、電場、重力等物理性質,可大幅提昇現有測量之精度,主要有:量子雷達、量子導航、量子成像等。量子感測技術可在高噪音、光線微弱、水下等複雜環境中辨識出目標,現行彈道飛彈、隱形飛機、水下核潛艦等武器優勢將不復存在。[11]

中共2017年宣稱,其「量子成像技術」(Quantum Imaging,QI)已可使間諜衛星在夜間追蹤美國B-2轟炸機和辨識隱形戰機。[12] 「中國電科集團」則在2018年珠海航展中展示全球第一台單光子量子雷達樣機,最近更宣稱已在真實大氣環境下完成百公里級的目標探測試驗,暗指其量子雷達即將問世。 [13]

此外,以高精度量子時鐘為基礎的量子定位、授時和導航(PNT)系統,是透過量子衛星取得衛星與地面間傳遞糾纏光子對之時間差,來確定地面用戶座標。[14] 由於不依賴全球定位系統(GPS)、紅外線或雷達導航,量子導航除了可大幅增強現行全球衛星導航系統(GNSS)之外,在GPS無法作用之環境如:水下、地表下或被電磁波嚴重干擾之環境中也能發揮功能。一旦進入實用化,中共量子導航技術將提高其各種武器之命中率。

參、趨勢研判

一、中共或將發展出「量子戰爭」(Quantum Warfare)

雖然中共亦承認自身的量子技術仍有許多「短板」,且量子技術距離市場化仍需要不短的時間,但是量子技術已被中共視為突破美國科技圍堵、建立科技強國之關鍵技術。「第二次量子革命」將翻轉現有的科技、經濟和作戰模式,可以想見,中共未來仍將以舉國體制,加碼投入各種資源發展量子技術。在此大方向之下,量子產業及量子軍事應用都將加速落實。未來,隨著搭配現有電腦朝小型化、雲端化、邊緣運算方向發展,量子電腦或量子感測器可能部署在更小型的武器裝備上,如:衛星、無人機或單兵手機等,甚至進行「量子戰爭」(參見附圖)。

二、我國恐需預先發展量子防禦能力

中共量子通訊技術目前位居世界第一、量子計算和量子感測技術均居世界第二。因此,中共若將量子技術用於對我作戰,我國恐無任何還擊能力。我國在2022年3月成立量子國家隊,選出17個產學研團隊,並指出未來5年量子科技發展方向。[15] 但是,其規劃多半偏向科技面和經濟面,對於中共未來可能對我進行的密碼破解、量子導航、量子雷達,甚至量子網路戰、量子太空戰和量子水下戰等,沒有任何防禦對策。或許中科院應優先且早期加入量子國家隊,和民間產學研人士合作,共思如何防禦中共未來的量子作戰。

附表、量子技術軍事應用之例

 領域可能應用
量子通訊量子密鑰分發(QKD)ž 是量子通訊技術中最為成熟者,已可商用ž 透過衛星等中繼器,可進行遠距離量子通訊
後量子密碼ž 用於防禦量子電腦之攻擊ž 美國預計2023-2024年完成標準化
量子通訊網ž 量子網絡:太空、特種部隊、不同軍種間的量子安全直接通訊→軍用6Gž 量子數位簽名(QDS)ž 量子身份識別(QSI)ž 特定位置才能收發的量子密碼技術:軍事衛星通信ž 量子時鐘更精確的時間同步:C4ISR協同行動
量子計算量子模擬ž   戰場模擬、武器之開發、模擬和驗證
量子優化ž   優化現行作戰部署、演習、系統驗證、預測分析等ž   破解現有密碼
大數據分析∕機器學習ž   無線頻譜分析、後勤管理、能源管理ž   決策分析及參考
邊緣運算ž   無人載具或無人武器同一時間內之行動一致性ž   不同軍種之協同作戰
量子感測量子定位、導航及定時(PNT)ž 高精度量子時鐘ž 量子慣性導航、量子增強導航,可部署在自主無人載具或飛彈上ž 不需要依賴全球衛星導航系統之量子導航
量子情監偵ž 地表與地下監測:部署於低軌衛星、無人載具之量子感測技術
ž 量子成像:量子3D相機、量子氣體感測器、低信噪比之戰場視覺裝備、量子測距儀、量子鬼成像等
量子水下作戰ž 量子慣性導航可應用於大型潛艦和水下載具ž 量子磁力計可協助繪製海底地圖、探測水下水雷,配合其他感測器進行水下探測和分析
量子雷達與量子雷射雷達等ž 量子雷射雷達:短距離之目標照明,可運用於反無人機監視、短程防空、太空之小衛星探測ž 量子增強雷達:高精度低噪音量子雷達,可用於探測無人機等小型慢速移動物體
其他作戰應用 量子電子戰ž 更小型的通用量子天線、陣列式量子射頻感測器ž 量子計算及量子時鐘可增強現有的電子戰系統能力ž 量子電子作戰可對敵進行干擾、欺騙和阻攔
量子太空戰ž 量子雷達、量子電子戰、量子感測、量子通訊等技術在低軌衛星之部署和研發
生化模擬與檢測ž 至少需要200個以上的量子比特和更多的邏輯比特數量才可進行模擬ž 可安裝在無人機和地面車輛上,用於檢測環境中的生化毒物等
量子材料利用超導、拓樸等量子特性開發偽裝、隱形、耐高溫等新軍用材料

中國原創軍事資源:https://indsr.org.tw/respublicationcon?uid=12&resid=1928&pid=3582

Chinese Military & the Emerging Potential of Quantum Computing in Unconventional Warfare

中國軍事與量子運算在非常規戰爭中的新興潛力

現代英語:

The following article is from Zhuanzhi Intelligent Defense , authored by Zhuanzhi Defense.

Quantum computing represents a paradigm shift in computing technology, promising to revolutionize various industries, including national security and defense. While the capabilities of quantum computing remain largely theoretical, significant progress is underway. Experiments by companies like Google and IBM have demonstrated early instances of quantum supremacy, where quantum computers outperform classical systems in specific tasks. These breakthroughs suggest that quantum computing is not only imminent but is considered an inevitable advancement, and stakeholders should prepare now.

Unlike classical computers, which rely on binary bits (1s and 0s) to process information in a linear or symmetric manner, quantum computers utilize qubits, or “qubits,” which can exist in multiple states simultaneously. This may be a difficult concept to grasp, but this capability enables quantum computers to perform complex calculations at unprecedented speeds, solving problems that even the most powerful supercomputers currently cannot. As irregular warfare and gray-zone conflicts increasingly rely on advanced technologies, the application of quantum computing in these areas has the potential to pose new threats, but also new strategic advantages. Quantum computing may fundamentally change the way conflicts are managed and resolved in the 21st century.

Understanding Quantum Computing

Classical computing, the backbone of today’s digital infrastructure, operates on a binary system where data is represented by “bits” of “0” or “1”. These bits are processed sequentially, and classical computers execute tasks step by step. While powerful, this approach faces significant limitations when dealing with complex problems requiring vast amounts of computational resources. Quantum computing, however, utilizes the principles of quantum mechanics, allowing qubits (also known as “qubits”) to exist in multiple states simultaneously through a phenomenon called superposition. Essentially, classical bits must choose between 0 and 1, while qubits can represent both states at the same time. Entanglement, another quantum property, connects qubits so that the state of one qubit directly influences the state of another, regardless of distance.

To better understand the power of quantum computing, it’s helpful to intuitively see how it solves problems compared to classical computing. The podcast “Ask A Spaceman” uses a very relatable analogy to illustrate this. Imagine you have a complex task that requires searching through a vast number of possibilities, like finding a mouse hiding somewhere in a huge mansion. What better way to find the mouse than with a cat? In this scenario, a classical computer is like a cat, methodically searching room by room. The cat can only stay in one room at a time, and it must explore each room sequentially until it finds the mouse. If the mansion is large, this process is extremely time-consuming. Now imagine a quantum computer as a cat with a unique ability: it can be in every room of the mansion simultaneously. You could call it a “q cat.” This “q cat” doesn’t need to search room by room; instead, it can examine every possible location in the mansion at the same time. The mouse’s location can be found almost instantly, without the need for methodical exploration of each room. This analogy captures the essence of quantum computing: the ability to perform multiple computations simultaneously. By utilizing the principles of superposition and entanglement, quantum computers can solve problems several times faster than classical computers.

The impact of quantum computing on irregular warfare

As quantum computing moves from theoretical research into practical applications, it has the potential to dramatically alter the landscape of irregular warfare and gray-zone conflicts. For example, adversaries possessing quantum-enhanced decryption capabilities could intercept and decrypt military communications, weakening security operations and exposing critical intelligence. Similarly, quantum-based data processing allows adversaries to analyze massive amounts of intercepted data in real time, uncovering patterns of action or vulnerabilities. With the continued development of quantum computing, the ability to rapidly process and analyze massive amounts of data could shift the balance of power, introducing previously unimaginable new methods of conflict. The promise of quantum computing lies not only in strengthening existing strategies but also in its potential to create new methods of engagement, forcing state and non-state actors to rethink their modus operandi. Understanding the potential applications of quantum computing in irregular warfare is crucial for predicting future threats and developing effective countermeasures, especially when adversaries attempt to exploit these technologies for their own strategic gain.

Feasible applications of quantum computing in irregular warfare

The following section explores some of the most viable applications of quantum computing in irregular warfare, highlighting how this emerging technology can enhance strategic capabilities and provide a competitive advantage in increasingly complex and unpredictable conflict environments.

  • Enhanced cryptographic capabilities

One of the most anticipated applications of quantum computing is its ability to break traditional cryptographic systems. Classical encryption, the foundation for secure communications and intelligence, relies on the computational difficulty of factoring large prime numbers, a method easily cracked by quantum algorithms like the Shor algorithm. This will have profound implications, as state and non-state actors could potentially intercept and decrypt sensitive communications, disrupting operations on multiple levels. This emerging threat has sparked a global race in “post-quantum cryptography” to develop encryption methods resistant to quantum attacks. This arms race between offensive quantum decryption capabilities and defensive quantum-resistant encryption is expected to be a decisive aspect of the future conflict landscape. As the U.S. and our adversaries develop increasingly sophisticated tools, the stakes for national security, espionage, and the protection of critical infrastructure are higher than ever.

  • Optimize actions and decisions

The potential of quantum computing in optimizing complex operations is particularly relevant to the logistical and decision-making needs of irregular warfare. Quantum algorithms can process massive datasets simultaneously, thus simplifying logistics, resource allocation, and strategic planning. Just as the advent of radar during World War II revolutionized military operations, providing near real-time intelligence on enemy movements and fundamentally altering the nature and outcome of battles, quantum computing could also transform modern conflict by enabling predictive conflict management. This involves simultaneously analyzing geopolitical, economic, and social variables to predict potential conflict zones or flashpoints. A study published in *Stability* within the *International Journal of Security and Development* demonstrates the feasibility and added value of machine learning in conflict prediction, primarily using classical computational methods. However, the principles explored in this study can be directly applied to quantum computing, offering a glimpse into how advanced quantum algorithms can enhance predictive conflict management. This capability will enable military and intelligence agencies to preemptively deploy resources and personnel, reducing reaction time and managing conflict in a more proactive manner. As these technologies advance, quantum-enhanced decision-making processes could allow operators to navigate the unpredictability of conflicts with greater confidence and precision.

  • Simulation and Modeling: The ability to simulate and model complex battlefield environments is another key area where quantum computing promises to have a significant impact. Traditional simulation methods often struggle to capture the unpredictability inherent in conflicts employing decentralized and variable tactics. Quantum-enhanced war games can revolutionize this process, enabling military strategists to run countless potential scenarios in parallel, exploring not only known strategies but also new and unforeseen outcomes. These simulations will provide unprecedented insights into adversary behavior, operational risks, and tactical opportunities, leading to more effective strategic planning. Beyond battlefield tactics, quantum computing can also simulate highly interconnected cyber-physical systems, such as power grids, transportation networks, and communication infrastructure. This helps identify vulnerabilities caused by unconventional threats like cyberattacks or sabotage and predict cascading failures. This ability to test the resilience of critical infrastructure in real time will provide decision-makers with actionable insights to mitigate risks and strengthen defenses, ensuring operational stability even under mixed or gray zone pressures.
  • Influence operations and information warfare

Quantum computing’s unparalleled data processing capabilities can significantly enhance influence operations and information warfare, which are central to modern irregular warfare and gray-zone conflicts. Quantum computing can analyze massive amounts of social media and information network data to identify patterns, trends, and anomalies that may indicate an adversary’s attempts to manipulate public opinion or spread disinformation. Beyond identifying these activities, quantum-enhanced disinformation countermeasures can go even further. By simulating how disinformation spreads in networks, quantum computers can generate counter-narratives on a massive scale in real time, dismantling adversary influence operations before they gain traction. This would mark a significant advancement in countering cognitive warfare tactics and information manipulation.

  • Addressing hybrid threats

Hybrid threats, often combining conventional warfare, cyberattacks, misinformation, and irregular tactics, are particularly challenging to address due to their multifaceted nature. Quantum computing offers a powerful solution through quantum-enhanced human topography mapping—a capability distinct from battlefield simulation. Unlike simulations that primarily focus on operational and tactical scenarios, human topography mapping centers on the socio-political and economic environment at the time of conflict. This speculative yet feasible application can rapidly analyze large datasets, such as demographic sentiment, resource distribution, and political instability, to identify patterns and trends indicating social unrest, insurgency, or emerging cross-regional conflicts.

For example, quantum-enhanced systems can integrate data from social media, economic reports, and historical conflict patterns to map areas of escalating tensions and predict where hybrid threats are most likely to occur. By providing a nuanced understanding of the human environment, military and intelligence organizations can develop tailored strategies to mitigate risks before they escalate. This capability will complement battlefield simulations, addressing the broader contextual factors driving conflict and providing a more comprehensive approach to addressing hybrid threats. These advances in human topography mapping, along with the continued development of quantum computing, could transform how policymakers navigate the complexities of gray zone conflicts, where the lines between peace and war are intentionally blurred.

Future Applications

While many of the potential uses of quantum computing in irregular warfare are near-term viability, some speculative ideas push the boundaries of current technology. These unconventional concepts offer glimpses into how quantum computing could radically alter future conflicts, introducing capabilities currently unattainable but potentially becoming a reality as technology advances.

  • Quantum autonomous systems

One of the most intriguing yet fascinating applications of quantum computing in irregular warfare is the development of quantum-driven artificial intelligence (AI)-controlled autonomous systems. Unlike current AI models that rely on the limitations of classical computing, quantum AI can process and adapt to massive amounts of battlefield data in real time. This will enable autonomous drones or ground systems to operate with unprecedented agility, making decisions faster and more accurately in highly dynamic and unpredictable operational environments. These systems can evolve and learn in ways that current machine learning models cannot match, leading to a new generation of adaptive warfare technologies. Such quantum-driven autonomous systems could alter the balance of power in conflict zones, creating advantages where rapid adaptability is crucial. Furthermore, these systems can operate across decentralized networks, coordinating seamlessly without continuous human intervention, further enhancing their effectiveness in conflict scenarios.

  • Quantum-supported surveillance evasion

A more speculative yet equally transformative application may involve quantum entanglement to develop untraceable communication networks. Quantum-supported surveillance evasion would leverage the principles of quantum mechanics to create detection systems that can evade traditional surveillance methods. By using entangled particles, information can be transmitted in such a way that any attempt to intercept or observe the communication alters its state, effectively rendering the transmission undetectable. This would provide a game-changing stealth capability, enabling agents or military assets to communicate and maneuver without fear of detection. This would have profound potential implications for covert operations, intelligence gathering, and reconnaissance missions. If fully realized, this technology would render traditional surveillance methods obsolete, requiring adversaries to develop entirely new methods to counter these stealthy quantum systems.

  • Strategic deception at the quantum levelQuantum mechanics elevates the concepts of false alarms and deception to a whole new level. It allows for the creation of false alarms or decoy signals that appear legitimate before being observed—a phenomenon deeply rooted in quantum mechanics itself. This will revolutionize deception operations. By exploiting the unique property of quantum superposition, quantum-based deception can simultaneously present multiple layers of false information, making it nearly impossible for the adversary to distinguish between real and fabricated data. Quantum-level strategic deception will provide a tactical advantage, forcing the adversary to waste resources and time on misleading targets. Furthermore, quantum-based deception can be used to manipulate decision-making processes, creating confusion or hesitation within enemy ranks. In an era where perception is often as important as reality, quantum mechanics can provide a powerful tool to shape the information environment in unpredictable and deceptive ways.

Quantum Limitations and Challenges

While quantum computing holds great promise, several major technical challenges must be addressed to fully realize its potential, particularly in military applications. The most significant of these is scalability. Current quantum computers remain experimental, with most systems capable of handling only a limited number of qubits. This limitation restricts their ability to handle the large-scale computations required for complex defense scenarios. Furthermore, quantum systems are highly sensitive to environmental factors such as temperature and electromagnetic interference, which can cause qubits to lose their quantum states during decoherence. This instability severely impacts the reliability of quantum computers, posing a significant obstacle to their widespread adoption.

Error correction is another key challenge. While error correction techniques in classical computing are quite mature, the situation is different for quantum systems. Due to the inherent fragility of qubits, quantum systems require much more complex methods. However, significant progress is being made in this area, and researchers are developing new quantum error correction techniques to mitigate these challenges. Although these advances show promise, creating scalable, stable quantum systems capable of real-time error correction remains crucial for deploying quantum systems in future warfare environments.

Beyond the technological challenges, the application of quantum computing in warfare raises significant strategic questions, particularly the potential for a quantum arms race. As nations strive to develop advanced quantum capabilities, the rapid pace of technological innovation risks escalating into a competition for quantum dominance. This competition could lead to instability, as nations prioritize offensive quantum technologies such as encryption breaking systems and autonomous combat capabilities, while others rush to build defensive systems to counter these emerging threats. The ability to decrypt secure communications, manipulate information on an unprecedented scale, or deploy autonomous quantum systems could disrupt the balance of power, putting pressure on nations to outpace each other technologically. Furthermore, quantum technologies could be misused for disinformation campaigns, elusive surveillance, or sabotage of critical infrastructure, further complicating the global security landscape. As quantum computing continues to advance, establishing an international framework to regulate its use in conflict is crucial to mitigating the risks posed by the unchecked development of quantum technologies.

in conclusion

As quantum computing continues its transition from theoretical exploration to practical applications, a comprehensive understanding of its potential and risks is crucial to shaping the future of irregular warfare. Integrating quantum technology into conflict scenarios will not only redefine strategic capabilities but also necessitate the establishment of robust international norms, regulatory frameworks, and multilateral agreements. These structures are essential to ensuring that the rapid development of quantum computing does not trigger an out-of-control arms race, exacerbate global tensions, or undermine geopolitical stability. While the full impact of quantum computing on irregular warfare remains to be seen, its disruptive potential is undeniable. As nations grapple with the opportunities and challenges presented by this revolutionary technology, quantum computing is poised to become a central element in the ongoing evolution of conflict dynamics in the 21st century.

Reference source: irregular warfare center

Reprinted from: Zhuanzhi Intelligent Defense

現代國語:

以下文章來自專知智能國防 ,作者專知國防

量子運算代表著運算技術的典範轉移,有望徹底改變包括國家安全和國防在內的各行各業。儘管量子運算的能力在很大程度上仍停留在理論層面,但它正在取得重大進展。谷歌和 IBM 等公司的實驗已經展示了量子優越性的早期實例,即量子電腦在特定任務中的表現優於經典系統。這些突破表明,量子計算不僅即將到來,而且被認為是一種不可避免的進步,而利益相關者現在就應該做好準備。

與依靠二進位位元(1 和 0)以線性或對稱方式處理資訊的經典電腦不同,量子電腦利用的是量子位元或 “量子位元”,它們可以同時以多種狀態存在。這可能是一個很難理解的概念,但這種能力使量子電腦能夠以前所未有的速度進行複雜計算,解決目前即使是最強大的超級電腦也無法解決的問題。隨著非正規戰爭和灰色地帶衝突越來越依賴先進技術,量子運算在這些領域的應用有可能帶來新的威脅,同時也有可能帶來新的戰略優勢。量子運算可能從根本上改變 21 世紀管理和解決衝突的方式。

了解量子計算
經典計算是當今數位基礎設施的支柱,它在二進位系統上運行,數據的 “比特 ”以 “0 ”或 “1 ”表示。這些比特按順序處理,經典計算機按部就班地執行任務。這種方法雖然功能強大,但在面對需要大量運算資源的複雜問題時,卻面臨很大的限制。然而,量子運算利用量子力學原理,透過一種稱為疊加的現象,允許量子位元(也稱為 “量子位元”)同時存在於多種狀態中。從本質上講,經典位元必須在 0 或 1 之間做出選擇,而量子位元則可以同時代表這兩種狀態。糾纏是量子的另一個特性,它使量子位元相互連接,使一個量子位元的狀態直接影響另一個量子位元的狀態,而不受距離的影響。

要更理解量子計算的威力,直觀地了解它與經典計算相比是如何解決問題的,會很有幫助。播客 「Ask A Spaceman 」使用了一個非常貼近生活的比喻來說明這一點。想像一下,你有一項複雜的任務,需要在大量的可能性中進行搜索,就像在一座巨大的豪宅中尋找一隻藏在某處的小老鼠。有什麼辦法比用一隻貓在大宅裡找到老鼠更好呢?在這種情況下,經典計算機就像一隻貓,有條不紊地一個房間一個房間地搜索。貓一次只能待在一個房間裡,它必須按順序探索每個房間,直到找到老鼠為止。如果豪宅面積很大,這個過程就會非常耗時。現在把量子電腦想像成一隻具有獨特能力的貓:它可以同時出現在大宅的每個房間裡。可以說是一隻 “q 貓”。這隻 「q 貓 」不需要一個房間一個房間地搜索,而是可以同時檢查大宅中每一個可能的位置。老鼠的位置幾乎可以瞬間找到,而不需要有條不紊地探索每個房間。這個比喻抓住了量子計算的精髓:同時執行多項計算的能力。利用疊加和糾纏原理,量子電腦解決問題的速度是經典電腦的數倍。

量子計算對非正規戰爭的影響
隨著量子計算開始從理論研究進入實際應用,它有​​可能極大地改變非正規戰爭和灰色地帶衝突的模式。例如,擁有量子增強解密能力的敵對國家可以攔截和解密軍事通信,使安全行動變得脆弱,並揭露關鍵情報。同樣,量子化數據處理可以讓對手即時分析大量截獲的數據,發現行動模式或漏洞。隨著量子運算的不斷發展,快速處理和分析大量資料的能力可能會改變力量平衡,為衝突引入以前無法想像的全新方法。量子運算的前景不僅在於加強現有策略,還在於有可能創造新的交戰方法,迫使國家和非國家行為者重新考慮他們的行動方式。了解量子運算在非正規戰爭中的可能應用,對於預測未來威脅和製定有效對策至關重要,尤其是在對手試圖利用這些技術為自己謀取戰略利益的時候。

量子計算在非正規戰爭中的可行應用
下文探討了量子運算在非正規戰爭中的一些最可行的應用,重點介紹了這項新興技術如何在日益複雜和不可預測的衝突環境中增強戰略能力並提供競爭優勢。

增強密碼能力

量子運算最受期待的應用之一是其破解傳統密碼系統的能力。經典加密方法是確保通訊和情報安全的基礎,它依賴大素數因式分解的計算難度,而像肖爾這樣的量子演算法可以輕鬆破解這種方法。這將產生深遠的影響,因為國家和非國家行為者有可能攔截和解密敏感的通信,從而在多個層面上破壞行動。這種新出現的威脅引發了一場全球性的 “後量子密碼學 ”競賽,旨在開發能夠抵禦量子攻擊的加密方法。這種進攻性量子解密能力與防禦性抗量子加密技術之間的軍備競賽預計將成為未來衝突格局的決定性面向。隨著美國和我們的對手開發出越來越複雜的工具,國家安全、間諜活動和關鍵基礎設施保護的利害關係比以往任何時候都要大。

優化行動和決策

量子運算在優化複雜行動的潛力與非正規戰爭的後勤和決策需求特別相關。量子演算法能夠同時處理龐大的資料集,因此可以簡化後勤、資源分配和策略規劃。二戰期間雷達的出現徹底改變了軍事行動,它提供了關於敵機動向的近乎即時的情報,從根本上改變了戰鬥的方式和勝負。同樣,量子計算也可以透過實現預測性衝突管理,對地緣政治、經濟和社會變數進行同步分析,預測潛在的衝突地區或爆發點,從而徹底改變現代衝突。國際安全與發展期刊》(International Journal of Security and Development)在《穩定》(Stability:國際安全與發展期刊》(International Journal of Security and Development)上發表的一項研究證明了機器學習在衝突預測中的可行性和附加價值,該研究主要使用經典計算方法。突管理。

模擬和建模 模擬和建模複雜戰場環境的能力是量子運算有望產生重大影響的另一個關鍵領域。傳統的模擬方法往往難以捕捉到採用分散和多變戰術的衝突所固有的不可預測性。量子增強的戰爭博弈可以徹底改變這個過程,使軍事戰略家能夠並行運行無數潛在的場景,不僅探索已知的戰略,而且探索新的、不可預見的結果。這些模擬將為了解對手行為、作戰風險和戰術機會提供前所未有的洞察力,從而製定更有效的戰略計劃。除戰場戰術外,量子運算還能模擬高度互聯的網路實體系統,如電網、交通網路和通訊基礎設施,這有助於識別網路攻擊或破壞等非常規威脅造成的漏洞並預測連鎖故障。這種即時測試關鍵基礎設施復原力的能力將為決策者提供可操作的見解,以降低風險並加強防禦措施,確保即使在混合或灰色地帶壓力下也能保持行動穩定。

影響力行動與資訊戰

量子運算無與倫比的資料處理能力可以大大增強影響行動和資訊戰,而影響行動和資訊戰是現代非正規戰爭和灰色地帶衝突的核心。量子運算可以分析大量社群媒體和資訊網路數據,識別可能表明對手試圖左右公眾輿論或傳播虛假訊息的模式、趨勢和異常現象。除了辨識這些活動,量子增強的假訊息反制措施還能更進一步。透過模擬假訊息在網路中的傳播方式,量子電腦可以即時大規模地產生反擊敘事,在對手的影響行動獲得牽引力之前就將其瓦解。這將標誌著在抵禦認知戰戰術和資訊操縱方面取得了重大進展。

應對混合威脅

混合威脅往往融合了常規戰爭、網路攻擊、錯誤訊息和非正規戰術,由於其多面性,應對起來尤其具有挑戰性。量子運算可以透過量子增強的人體地形圖繪製提供強大的解決方案–這種能力有別於戰場模擬。與主要關注作戰和戰術場景的模擬不同,人類地形測繪以衝突發生時的社會政治和經濟環境為中心。這種推測性但可行的應用可以快速分析大量資料集,如人口情緒、資源分佈和政治不穩定性,以確定顯示社會動盪、叛亂活動或跨地區新興衝突的模式和趨勢。

例如,量子增強系統可以整合來自社群媒體、經濟報告和歷史衝突模式的數據,繪製緊張局勢加劇地區的地圖,並預測混合威脅最有可能在哪些地方發生。透過提供對人類環境的細緻入微的了解,軍事和情報組織可以製定量身定制的策略,在風險升級之前將其降低。這種能力將補充戰場模擬,解決驅動衝突的更廣泛的背景因素,為應對混合威脅提供更全面的方法。隨著量子運算的不斷發展,人類地形測繪的這些進步可能會改變決策者駕馭灰色地帶衝突複雜性的方式,因為在灰色地帶衝突中,和平與戰爭的界限被有意地模糊了。

未來應用
雖然量子計算在非正規戰爭中的許多潛在用途都具有近期可行性,但也有一些推測性想法突破了當前技術的界限。這些突破常規的概念讓我們得以一窺量子運算如何徹底改變未來的衝突,引入目前無法企及的能力,但隨著技術的發展,這些能力可能很快就會成為現實。

量子自主系統

量子運算在非正規戰爭中的一個最令人猜測但最引人入勝的應用是開發由量子驅動的人工智慧(AI)控制自主系統。與目前依賴經典運算限制的人工智慧模型不同,量子人工智慧可以即時快速處理和適應大量戰場數據。這將使自主無人機或地面系統以前所未有的敏捷性運行,在高度動態和不可預測的作戰環境中更快更準確地做出決策。這些系統可以以當前機器學習模型無法比擬的方式進化和學習,從而產生新一代自適應戰爭技術。這種量子驅動的自主系統可以改變衝突地區的力量平衡,在快速適應性至關重要的情況下創造優勢。此外,這些系統還可以在分散的網路中運行,無需人類持續幹預即可無縫協調,進一步提高其在衝突場景中的有效性。

量子支援的監控規避

一種更具猜測性但同樣具有變革性的應用可能涉及量子糾纏,以開發不可追蹤的通訊網路。量子支援的監控規避將利用量子力學原理來創建可​​規避傳統監控方法的探測系統。透過使用糾纏粒子,訊息可以這樣的方式傳輸,即任何試圖攔截或觀察通訊的嘗試都會改變其狀態,從而有效地使傳輸變得無法檢測。這將提供一種改變遊戲規則的隱形能力,使特工或軍事資產能夠在不擔心被發現的情況下進行通訊和機動。這將對秘密行動、情報收集和偵察任務產生深遠的潛在影響。如果完全實現,這項技術將使傳統的監視手段變得過時,這就要求對手開發全新的方法來對抗這些隱身的量子化系統。

量子層面的戰略欺騙

量子力學將誤報和欺騙的概念提升到了一個全新的高度,可以利用量子力學製造誤報或誘餌訊號,這些訊號在被觀察到之前看起來是合法的,這種現象深深植根於量子力學本身。這將徹底改變欺騙行動。透過利用量子疊加的特殊性質,基於量子的欺騙行動可以同時呈現多層次的虛假訊息,使對手幾乎無法區分真實數據和偽造數據。量子層面的戰略欺騙將提供戰術優勢,迫使對手將資源和時間浪費在誤導目標上。此外,基於量子的欺騙還可用於操縱決策過程,在敵方隊伍中製造混亂或猶豫。在這個感知往往與現實同等重要的時代,量子力學可以提供一個強大的工具,以不可預測和迷惑性的方式塑造資訊環境。
量子限制與挑戰
雖然量子運算前景廣闊,但要充分發揮其潛力,特別是在軍事應用方面,還必須解決幾個重大的技術挑戰。其中最主要的是可擴展性。目前的量子電腦仍處於實驗階段,大多數系統只能處理有限數量的量子位元。這種限制限制了它們處理複雜防禦場景所需的大規模計算的能力。此外,量子系統對溫度和電磁幹擾等環境因素高度敏感,會導致量子位元在退相干過程中失去量子態。這種不穩定性嚴重影響了量子電腦的可靠性,對其廣泛應用構成了巨大障礙。

糾錯是另一個關鍵挑戰。經典計算的糾錯技術已經非常成熟,而量子系統則不同,由於量子位元本身的脆弱性,量子系統需要更複雜的方法。不過,這一領域正在取得顯著進展,研究人員正在開發新的量子糾錯技術,以減輕這些挑戰。雖然這些進展顯示了前景,但創建可擴展、穩定且能即時糾錯的量子系統對於未來在戰爭環境中部署量子系統仍然至關重要。

除了技術挑戰,量子運算在戰爭中的應用也引發了重要的戰略問題,特別是量子軍備競賽的可能性。隨著各國努力發展先進的量子能力,技術創新的快速步伐有可能升級為量子主導地位的競爭,這種風險越來越大。這種競爭可能會導致不穩定,因為各國會優先發展進攻性量子技術,如加密破解系統和自主作戰能力,而其他國家則急於建立防禦系統,以應對這些新興威脅。解密安全通訊、以前

中國原創軍事資源:https://www.c2.org.cn/h-nd-1667.html

Chinese Military’s Exploration Regarding Evolution of Intelligent Warfare Practices

中國軍隊對智慧化戰爭實踐演進的探索

現代英語:

Recent global regional wars and military conflicts demonstrate that modern warfare practice is gradually evolving toward an information-based, intelligent form. Facing a new wave of military revolution, to fully explore the evolutionary laws of intelligent warfare practice, we need to further clarify the fundamental underpinnings of this evolution, fully assess the technological advantages of warfare practice, and identify the key challenges driving the current evolution of warfare practice.

  The evolution of intelligent warfare practice requires the support of social practice foundation

  As an important part of social activities, military activities have a very close relationship with social activities. Similarly, as a specific form of military activities, war practice cannot be examined in isolation from the larger system of social practice.

  The level of development of productive forces determines the height of practical evolution. Warfare is part of human social practice and always aligns with the level of social production. How humans conduct material production often determines how they organize war; the way humans conduct warfare reflects their mode of production. Engels argued that victory through violence is based on the production of weapons, which in turn is based on the entire production system. Therefore, with the development of productive forces, the means of warfare are also constantly evolving. Just as it was impossible to find a weapon from the information age in the cold weapon age, it is difficult to use typical cold weaponry on the battlefields of the information age. Even daggers produced in the information age differ from those of the cold weapon age. From the alloy composition to the forging and molding technology, they embody the technological advancements of the information age and are weapons of the information age.

  Changes in the production relations system influence the outcomes of practical evolution. As a special form of social practice, the development and changes in war practice closely revolve around the direction and speed of social practice evolution. In other words, behind every transformation in war practice, a similar social transformation is also taking place simultaneously, and success requires the completion of a systemic transformation of production relations as a whole. Marx insightfully pointed out that in all social forms, a certain type of production determines the status and influence of all other types of production, and thus its relations also determine the status and influence of all other relations. This is a pervasive light that obscures all other colors and alters their characteristics. Concepts of war practice that are too far ahead of their time often struggle to succeed due to a lack of hardware and software support that aligns with the development of contemporary social practice. For example, the concept of joint operations was unlikely to emerge in the era of cold weapons. Even if military theorists had anticipated this concept a priori, they would have been unable to apply it in practice. Modern joint operations, however, are in fact a microcosm of large-scale socialized joint production in military practice. Therefore, the design of war should return to social practice itself, seeking inspiration and reflection from it. Ignoring the overall level of development in production relations and prematurely designing war scenarios for the intelligent era can lead to scenarios and objectives that become sci-fi, game-like, and fictional.

  The winning effect of intelligent warfare practice requires further testing in war

  The goal of the evolution of warfare practice is always to enhance operational superiority and achieve victory. However, this does not mean that the evolutionary process will naturally lead to this goal. Sometimes, in the early stages of a change in warfare practice, the effectiveness of victory is not obvious, and the effectiveness of various combat methods must be continuously evaluated during the development process.

  A first-mover advantage does not guarantee victory on the battlefield. While it’s undeniable that whoever first masters the latest winning strategies will be able to seize the initiative on the battlefield through technical and tactical advantages, this first-mover advantage does not necessarily lead to ultimate victory. While a first-mover advantage does have a significant impact on winning wars, the history of warfare demonstrates that technical and tactical advantages can be offset by mistakes or disadvantages in other areas. In World War II, the German army, which was the first to master the winning strategies of mechanized warfare, gained an advantage in the initial battles on the Western Front in Europe and the Eastern Front between the Soviet Union and Germany. However, this initial advantage was quickly eroded by strategic errors and overall disadvantages.

  First-mover advantage rarely creates an absolutely overwhelming advantage. In the era of globalization, human social practices are closely interconnected, and technological innovations from one country or region quickly spread abroad. Therefore, technological and tactical advantages in the intelligent era are often short-term and localized, making it difficult for a single country or region to establish a long-term, global, monopolistic lead. Currently, the rapid development of network communications technology is bringing humans closer than ever before. Similarly, in the practice of intelligent warfare, various advanced reconnaissance methods will continue to penetrate the secrecy of both sides. Sometimes, after the emergence of a new weapon, countervailing weapons or methods will quickly be invented.

  The advantages of intelligence don’t necessarily create optimal combat situations. Currently, the intelligence content of war practice has yet to become a decisive factor in determining victory or defeat. Currently, the practice of intelligent warfare is still in its infancy. The mechanisms of victory in war require in-depth research, many equipment require further development and verification, and various experimental pre-war practices require further testing and improvement. In comparison, the practice of informationized warfare is relatively mature, with various types of weapons and equipment, as well as supporting operational and tactical means, becoming more stable. This leaves much room for the application of informationized warfare methods. Therefore, as war practice evolves, we must continuously innovate the means of intelligent warfare practice while fully tapping the operational potential of informationized warfare practice.

  The development and transformation of intelligent warfare practice requires the integrated promotion of people and technology

  There are many factors that drive the evolution of intelligent practice. On the premise of clarifying development support and evaluating the effectiveness of combat methods, it is necessary to comprehensively analyze various contradictions, grasp the key points, distinguish the main points, and highlight the leading role of people.

  Technological change is the most dynamic factor. Science and technology are core combat capabilities. As the most revolutionary factor in the development of war practice, every major scientific and technological innovation has a profound impact on the nature of warfare. Engels once pointed out that once technological advances can be applied to military purposes and have already been applied to military purposes, they immediately and almost forcibly, and often against the will of the commander, lead to changes or even revolutions in combat methods. However, equating the intelligent military revolution with the high-tech revolution, leading to an overemphasis on intelligent technology and an excessive pursuit of the development of various intelligent weapons, undoubtedly fails to correctly grasp the essence of the evolution of intelligent warfare practice. While technology plays an important role, it is not the only decisive factor; culture, politics, and individuals themselves also play a role. In his book A History of World Wars, British historian Jeremy Black repeatedly reminds readers not to fall into the trap of technological determinism and simply attribute all major changes in military history to technological innovation.

  Institutional innovation is a challenge. To fully leverage the combat effectiveness of equipment in the evolution of intelligent warfare, all operational elements must be integrated into a unified system, integrating ideology, combat methods, organizational structures, education and training, and military technology. Renowned military theorist Dupuy argued in his book The Evolution of Weapons and Warfare that no matter how much a weapon’s lethality improves, its compatibility with military tactics and organizational structure is far more important than its invention and adoption. Only when the advantages of equipment are integrated into scientific organizational structures can optimal combat effectiveness be achieved. Historically, Britain was the first country to possess aircraft carriers and tanks, but it was not the country that successfully led the mechanized warfare revolution. While the most easily achieved transformation in warfare practice is the upgrading of weaponry and equipment, comprehensive innovation in warfare practice requires holistic innovation at the institutional level to achieve a comprehensive effect. A military that only upgrades equipment without institutional reform will struggle to develop sustained and effective combat effectiveness and cannot truly lead a revolution in warfare practice.

  The integration of people and weapons is crucial. People are the primary actors in the practice of warfare. In the era of intelligent warfare, the decisive role of people in warfare remains unchanged and remains the driving force behind its evolution. From the perspective of the two major categories of people and weapons, military technology falls more heavily on the “weapons” side, while other elements of warfare, such as military strategy, organizational structure, strategic tactics, and combat methods, fall more heavily on the “people” side. The more advanced high-tech equipment becomes, the more it requires human expertise to master and utilize it. In the era of intelligent warfare, greater emphasis must be placed on the importance of wisdom and strategy, relying more heavily on individuals equipped with the concepts and thinking of the intelligent era to direct and design operations. Therefore, promoting the evolution of warfare requires focusing on people as the decisive factor, fully integrating “people” and “weapons,” vigorously developing joint education within the context of intelligent warfare, and focusing on cultivating scientific and technical personnel and command personnel who meet the requirements of intelligent warfare.

現代國語:

近年來的世界局部戰爭和軍事衝突表明,現代戰爭實踐正逐步朝向資訊化智慧化形態演變。面對新一波軍事革命浪潮,為充分探究智慧化戰爭實踐演進規律,需要進一步釐清戰爭實踐演進的基礎支撐,充分評估戰爭實踐的技術優勢,找準推動當前戰爭實踐演進的重難。

智能化戰爭實踐的演進需要社會實踐基礎作為支撐

作為社會活動的重要組成部分,軍事活動與社會活動有著十分密切的關係。同樣,作為軍事活動的一種具體形式,戰爭實踐也不能離開社會實踐的大系統去孤立地考察。

生產力發展水準決定實踐演進的高度。戰爭實踐是人類社會實踐的一部分,始終與社會生產水準相適應。人類怎樣進行物質生產活動,往往就怎樣組織戰爭,人類從事戰爭的方式,反映了它們的生產方式。恩格斯提出,暴力的勝利是以武器生產為基礎的,而武器的生產又是以整個生產為基礎的。因此,伴隨生產力的發展,戰爭實踐手段也不斷發展。正如在冷兵器時代無法尋覓到一件資訊化時代武器一樣,在資訊化時代的戰場上也難以運用典型的冷兵器時代的武器。即使是資訊化時代生產的匕首,也已然不同於冷兵器時代的匕首,從合金成分比例到鍛造造成型技術,它本身蘊含了資訊化時代的工藝水平,屬於資訊化時代的武器。

生產關係系統變化影響實踐演進的結果。作為一種特殊形式的社會實踐,戰爭實踐發展變化緊緊圍繞著社會實踐演進方向和速度。也就是說,一場戰爭實踐變革背後,也同步進行著相似的社會變革實踐,需要伴隨整個生產關係的系統變革完成才能成功。馬克思精闢地指出,在一切社會形式中都有一種一定的生產決定其他一切生產的地位和影響,因而它的關係也決定其他一切關係的地位和影響,這是一種普照的光,它掩蓋了一切其他色彩,改變著它們的特點。過於超越時代的戰爭實踐設想,往往會因缺乏符合同時代社會實踐發展所匹配的軟硬體支撐而難以成功。例如聯合作戰概念很難在冷兵器時代出現,即使有軍事理論家先驗地預想到這種理念,也無法在實踐中運用。而現代聯合作戰實踐其實正是社會化聯合大生產在軍事上的縮影。因此,設計戰爭應回歸社會實踐本身,從中尋找靈感與鏡像。若忽略生產關係的整體發展水平,超前設計智慧化時代戰爭場景,將可能使場景目標變得科幻化、遊戲化和虛構化。

智能化戰爭實踐的勝利效果需要戰爭的進一步檢驗

戰爭實踐演進的目標總是瞄準提高作戰優勢和勝利效果展開,然而這並不意味著演進過程會自然指向這一目標。有時候在戰爭實踐變革初期,其致勝效果並不明顯,需要在發展的過程中持續評估各種作戰手段的效果。

先發優勢不等於戰場上的必勝之勢。毫無疑問,誰先掌握了最新戰爭制勝機理,誰就能夠憑藉技戰術優勢掌握戰場主動權,但這種先發優勢並不會必然導致戰爭最終勝利。先發優勢的確對贏得戰爭有巨大影響,但戰爭實踐發展史表明,技戰術先發優勢會被其他方面的失誤或劣勢抵消。在第二次世界大戰中,率先掌握了機械化戰爭制勝機理的德軍,儘管在西線歐洲戰場以及東線蘇德戰場的最初較量中獲得了優勢,然而這種初始優勢很快因其戰略上的失誤以及總體實力上的劣勢而被消耗殆盡。

先發優勢難以構成絕對的壓倒性態勢。在全球化時代,人類社會實踐緊密相連,一個國家或地區的技術創新很快就會被外溢傳播,所以智慧化時代的技戰術優勢往往是短期局域性的,一個國家或一個地區很難形成長期全局性的壟斷式領先。目前,網路通訊技術迅速發展,讓人類空前地彼此接近。同樣,在智慧化戰爭實踐中,各類先進偵察手段將不斷洞穿作戰雙方的保密堡壘,有時一種新型武器出現以後,其製衡性武器或手段很快會被發明創造出來。

智能化優勢未必造成最佳作戰局勢。從目前來看,戰爭實踐的智慧化含量尚未成為影響戰爭勝負的決定因素。目前,智慧化戰爭實踐尚處於不成熟的萌芽期,戰爭制勝機理有待深入研究,許多裝備有待進一步開發驗證,各類試驗性的戰爭預實踐有待進一步檢驗和完善。相較而言,資訊化戰爭實踐已相對成熟,各類武器裝備以及配套的戰役戰術手段已趨於穩定,資訊化作戰方式仍有很大應用空間。因此在戰爭實踐演進中,要在不斷創新智慧化戰爭實踐手段的同時,充分發展資訊化戰爭實踐的作戰潛能。

智能化戰爭實踐的發展變革需要人與技術綜合推動

推動智慧化實踐演進的因素很多,需要在釐清發展支撐、評估作戰方式成效的前提下,綜合分析各類矛盾,抓住關鍵、區分要點,突顯人的主導作用。

技術變革是最活躍因素。科技是核心戰鬥力。作為戰爭實踐發展中最具革命性的因素,每一次重大科技創新都會對戰爭形態產生深遠影響。恩格斯曾指出,一旦技術上的進步可以用於軍事目的並且已經用於軍事目的,它們便立刻幾乎強制地,而且往往是違反指揮官的意志而引起作戰方式上的改變甚至變革。但是,將智能化軍事革命等同於高新技術革命,以至於過於注重對智能化技術的強調,過於追求各類智能化武器的研發,無疑是沒能正確掌握智能化戰爭實踐的演進本質。科技雖然發揮重要作用,但並非起決定性的唯一因素,文化、政治以及人本身都在發揮作用。英國歷史學家傑瑞米·布萊克在《世界戰爭史》一書中不斷提醒讀者,不要掉進技術決定論的陷阱,不能簡單地把軍事史上所有重大變革都歸因於科技革新。

制度化創新是難點。為充分發揮好智慧化戰爭演進中的裝備作戰效能,需要將所有作戰要素凝聚為一個體系,將思想理論、作戰方式、編制體制、教育訓練等與軍事技術融為一體。著名軍事理論家杜普伊在《武器與戰爭的演變》一書中提出,無論兵器的殺傷力有多大提高,新兵器跟軍事戰術和編制的兼容統一,要比新兵器的發明和採用重要得多。裝備的優勢只有融入科學的組織形態,才能創造出最佳戰鬥力。從歷史實踐來看,英國是第一個擁有航空母艦和坦克的國家,但並不是成功引領機械化戰爭革命的國家。戰爭實踐變革中,最容易實現的是武器裝備的更新換代,但戰爭實踐全面創新需要在製度層面進行整體創新,形成整體效應。只有裝備更新而無制度變革的軍隊,是難以形成持久有效戰鬥力的,也無法真正引領戰爭實踐革命。

人與武器結合是關鍵。人是戰爭實踐的主體。在智慧化戰爭時代,人對戰爭實踐的決定性作用絲毫沒有改變,仍是推動戰爭實踐演進的主導。從人與武器這兩大範疇看,軍事技術比較屬於「武器」這一方面,而戰爭實踐中的其他要素,如軍事謀略、編制體制、組織結構、戰略戰術、作戰方式等則更屬於「人」這一方面。高新技術裝備越先進,越需要有人去掌握運用,智能化戰爭時代需要更多關注智慧和謀略的重要性,需要更多依靠具備智能化時代觀念和思維的人去指揮和設計。因此,推動戰爭實踐演進要聚焦人這一決定性要素,把「人」和「武器」充分結合起來,大力發展智能化戰爭背景下的聯合教育,聚力培養符合智能化戰爭要求的科技人才、指揮人才。 (沈文科 宋騰淵 岳明峰)

中國原創軍事資源:http://www.xinhuanet.com/milpro/20250313/e495926c8f4d41f8bf0350a4c5b93f8e/c888.html

Chinese Military Exclusive Requirements for Strategies & Tactics of People’s War in The New Era

新時代中國軍隊對人民戰爭戰略戰術的獨特要求

現代英語:

Looking back on its glorious combat history, the People’s Army has consistently adhered to the absolute leadership of the Party, proposing and implementing a comprehensive set of strategies and tactics for people’s war. These strategies and tactics are a crucial weapon for the People’s Army to defeat the strong with the weak and to conquer the enemy. Over the past 98 years, with the changing times and evolving forms of warfare, the specific content and manifestations of the strategies and tactics for people’s war have continuously evolved. To confront the challenges of information-based and intelligent warfare, we must firmly grasp the essential requirements and value orientations of the strategies and tactics for people’s war amidst the rapidly evolving global trends and practices, unifying the inherently unchanging laws of conduct with the external realities of change, and continuously innovating and developing the strategies and tactics for people’s war in the new era.

President Xi Jinping emphasized that no matter how the situation develops, the magic weapon of people’s war must never be lost. However, we must grasp the new characteristics and new requirements of people’s war in the new era, innovate its content, methods and approaches, and unleash its overall power. Currently, facing profound challenges brought about by changes in science and technology, warfare, and our adversaries, we must not only inherit and carry forward the fine traditions of people’s war, but also be sensitive to changes, actively respond to them, and proactively seek change. We must accurately grasp the inherent requirements of the strategies and tactics of people’s war in the new era, consciously update our thinking and concepts, and innovate strategic guidance, so that this magic weapon of defeating the enemy can be demonstrated on future battlefields.

Adhere to relying on the people and deeply rooted

In the long practice of revolutionary war, the people are the most profound force for victory. The people are the primary force behind the strategies and tactics of people’s war, a magic weapon for victory. People’s war has its roots deeply rooted in the people, and its confidence comes from the people. Regardless of how the times change or how the war evolves, relying closely on the people and fully mobilizing them will always be the fundamental condition and the only way to carry out people’s war. Developing the strategies and tactics of people’s war in the new era requires adhering to the mass perspective of history and the fundamental requirement that soldiers and civilians are the foundation of victory. We must integrate the traditional strategic advantages of people’s war with the mass line, broaden the sources of vitality for the strategies and tactics of people’s war, draw strategic wisdom and tactical methods from the people, and develop an intellectual advantage for people’s war in the new era. We must solidly carry out national defense education throughout the nation, continuously foster a strong sense of patriotism, inspire patriotism, strengthen awareness of potential dangers, and enhance national defense awareness. We must guide the masses to actively care about and support national defense, thereby infusing powerful spiritual strength into people’s war in the new era. We must focus on promoting high-quality population development, comprehensively improve the cultural, scientific, and innovative qualities of the entire population, accelerate the development of a modern human resource base of high quality, sufficient in volume, optimized in structure, and rationally distributed, and promote the shift of the dominant force in people’s war from quantitative to qualitative. Further improve the national defense mobilization system and mechanism, promote the establishment of a rapid response system that is connected with the national emergency response mechanism and integrated with the joint combat system, fully tap and gather the unlimited war potential contained in the people, and give full play to the resource aggregation and value-added effect.

Focus on overall planning and full-area offense and defense

In the long-term practice of revolutionary warfare, the strategies and tactics of people’s war require the comprehensive mobilization of diverse forces and resources in the political, economic, cultural, diplomatic, and military sectors, and the integrated use of various forms of struggle and methods of operation. This holistic approach compensates for local deficiencies and disadvantages, ultimately defeating powerful adversaries. Modern warfare is not only a fierce confrontation in the military sphere, but also a comprehensive struggle in the political, economic, and diplomatic spheres, exhibiting the distinct characteristics of hybrid warfare. To develop the strategies and tactics of people’s war in the new era, we must establish a broad systemic mindset, relying on the national strategic system and supported by the joint operations system, explore the implementation methods of people’s war strategies and tactics, and win the total war of people’s war in the new era. We should fully leverage the advantages of the new national system, relying on the integrated national strategic system and capabilities, efficiently aggregate superior resources across the board, fully activate the country’s national defense potential, and weave various forces and resources into a network. We should integrate and plan the subsystems of people’s war, including leadership, organization, personnel, command, technology, equipment, and support, to maximize the effectiveness of holistic linkage and systemic operation, and achieve the maximum benefits of all-round effort and multiplied energy. We must strengthen comprehensive coordination across the physical, information, and social domains, focusing on seeking breakthroughs in new domains and new qualities, and making achievements in new dimensions such as unmanned warfare, human-machine collaborative warfare, network and electronic warfare, space and deep-sea warfare, and intelligent and autonomous warfare. Military and non-military means must be coordinated, integrating various forms of struggle, including political, economic, diplomatic, public opinion, and military. Comprehensive measures must be implemented to effectively wage diplomatic offensive and defensive battles, financial and trade battles, psychological defense battles, and public opinion and legal battles. We must leverage the combined effectiveness of political offensives and armed strikes to effectively fight the political and military battles.

Strengthen active defense and take the initiative

Through the long practice of revolutionary warfare, the People’s Army has developed a comprehensive strategic philosophy of active defense, emphasizing, for example, the unity of strategic defense and offensive action in campaigns and battles, the principles of defense, self-defense, and preemptive strike, and the principle of “if no one offends me, I will not offend; if someone offends me, I will certainly offend.” Active defense is fundamentally defensive, its essence lies in activeness, and its inherent characteristic is proactiveness. Currently, profound changes have taken place in the international, national, and Party, military, and political landscapes. The strategies and tactics of people’s war in the new era generally adhere to the fundamental principle of defense and are not aimed at hegemony, aggression, or oppression of other countries. Consequently, they will win the support and endorsement of the vast majority of the Chinese people, as well as the understanding and assistance of peace-loving and justice-loving countries and peoples around the world. Developing the strategies and tactics of people’s war in the new era must adapt to the times and circumstances. We must adhere to a defensive national defense policy, implement the military strategic guidelines of the new era, excel at observing and analyzing issues from a political perspective, and be adept at considering and applying strategies from regional and global perspectives to consolidate the political foundation for victory in people’s war. We must persist in neither provoking trouble nor fearing it, strengthen the regular and diversified use of military force, firmly and flexibly carry out military struggle, and while adhering to the strategic preemptive strike, we must not give up campaign and combat offensives under favorable conditions and when necessary. We must advance steadily, make progress within stability, and be proactive within stability, effectively shape the security situation, contain crises and conflicts, and firmly grasp the initiative in the struggle.

Highlight new quality dominance and technological empowerment

In the long practice of revolutionary warfare, while emphasizing that victory in war is primarily determined by people, not objects, the People’s Army has also placed great emphasis on the research and development of advanced military technology, particularly weaponry. Comrade Mao Zedong once emphasized that without modern equipment, it would be impossible to defeat the armies of imperialism. The technological content of modern warfare has undergone a qualitative leap, with advanced technologies and new weaponry such as artificial intelligence, big data, quantum computing, unmanned aerial vehicles, and brain control being widely applied in the military. While the people remain the decisive force in determining victory in war, the manifestation of this power has undergone significant changes. Science and technology are core combat power, and People’s War will place greater emphasis on the application of scientific and technological means and rely even more heavily on the wisdom and creativity of the people. Developing the strategies and tactics of People’s War in the new era should prioritize winning information-based and intelligent warfare. We should deeply study the essential characteristics, winning mechanisms, and strategies and tactics of high-end warfare, accelerate the shift from “winning by numbers” to “winning by talent,” and from “winning by manpower” to “winning by intelligence,” effectively enhance our ability to win through scientific and technological empowerment and digital intelligence, and truly unleash the crucial role of science and technology and talent in People’s War in the new era. We will accelerate the development of high-tech industries, vigorously strengthen the construction of new forces in new domains such as ocean, space, cyberspace, artificial intelligence, and quantum technology, increase military-civilian collaboration in high-tech fields, accelerate the transformation and application of new productive forces into new combat capabilities, and promote the expansion of war potential reserves into emerging fields and the focus on new forces. We will integrate and coordinate military and civilian scientific and technological advantages, shifting the focus from traditional support and guarantee elements such as human and material resources to new support and guarantee elements such as information, technology, and intelligence. We will build information, resource, and technology pools with profound foundations and rich reserves, actively cultivate capable, strong, and professional professional support units, and continuously expand the breadth and depth of people’s participation in the war and scientific and technological support.

Emphasis on flexibility, maneuverability, innovation and checks and balances

In the long-term practice of revolutionary warfare, the strategies and tactics of People’s War are highly flexible and maneuverable. Their most essential requirement is to prioritize self-reliance, attacking the enemy without being attacked by them. Based on the actual situation of both sides, we fight the battles based on our weapons, against the enemy, and at the right time and place. We identify the enemy’s weaknesses and vulnerabilities, leverage our strengths and advantages, and defeat the enemy with our own strengths, always seizing the initiative on the battlefield. Flexible and maneuverable strategies and tactics are the magic weapon for defeating an enemy with superior equipment with inferior equipment. “You fight yours, I fight mine” is a summary and generalization of the long-term experience of China’s revolutionary war and the soul and essence of the strategies and tactics of People’s War. Developing the strategies and tactics of People’s War in the new era must grasp the methodological requirements of asymmetric checks and balances, leverage innovative operational concepts, adhere to the mechanisms of victory in modern warfare, and continuously develop practical and effective tactics to defeat the enemy. We must proceed from the actual circumstances of both sides, gaining a deep understanding of operational missions, adversaries, and the evolving operational environment. We must thoroughly grasp the concepts, elements, and methods of victory, objectively analyze and study the strengths and weaknesses, advantages and disadvantages of both sides, know the enemy and ourselves, adapt to the situation, and flexibly utilize various combat forces and methods, striving to achieve maximum results at the lowest cost. We must adhere to the principle of “attacking the enemy without being attacked by them,” capitalize on strengths and avoid weaknesses, avoid the real and attack the weak, attack where the enemy is least prepared, and attack where they must be defended. We must proactively create opportunities, flexibly maneuver the enemy, and fight wherever we are most advantageous and wherever we are most skilled. We must adhere to the principle of “using what we can to defeat what we cannot,” advancing the research and application of military theory, operational guidance, tactics, and training methods in a timely manner, innovating core operational concepts, and developing new types of combat methods. We must fight against the enemy’s tactics, targeting their weaknesses, and leveraging our military’s strengths, thus creating new winning advantages in people’s war through asymmetric checks and balances.

Emphasis on accumulating small things into big things and focusing on unity of purpose

Throughout the long practice of revolutionary warfare, our army has been at an overall disadvantage for considerable periods. Therefore, the strategies and tactics of people’s war emphasize leveraging strength against weakness locally, persisting in accumulating small victories into larger ones, and concentrating forces to wage annihilation campaigns. This has become a key strategy for the people’s army to defeat powerful foes. Compared to previous eras, modern warfare often unfolds across multiple dimensions and domains, providing greater scope for implementing this strategy of “accumulating small victories into larger ones.” Developing the strategies and tactics of people’s war in the new era requires strengthening the concept of “dispersed in appearance, yet focused in spirit; dispersed in form, yet united in strength.” This involves dynamically consolidating and uniting the numerous combat forces distributed across the multidimensional battlefield. Through the fusion of capabilities and immediate optimization, we can launch rapid localized focused-energy attacks, wide-area guerrilla harassment, and deliver annihilating and destructive strikes against key enemy locations. This not only creates a hammering effect, but also continuously wears down the enemy, gradually depriving them of the initiative on the battlefield. This highly integrated distributed warfare emphasizes the wide-area dispersion of troop deployment and the discrete distribution of capabilities. Based on the needs of achieving operational intent, objectives, and missions, it prioritizes the best operational elements, units, and forces. Through the integration of operational capabilities and the accumulation of operational impacts, it aggregates optimal operational effects, unleashes maximum operational potential, maximizes operational effectiveness, and achieves optimal operational results. This distributed warfare has evolved from “geographical dispersion” to “dynamic coupling across all domains and dimensions”: no longer limited to the physical dispersion of personnel and equipment, it extends to multi-dimensional battlefields such as cyber, electromagnetic, and cognitive. Relying on data links, artificial intelligence, and distributed command systems to achieve cross-domain collaboration, it significantly enhances battlefield survivability and multiplies strike effectiveness.

現代國語:

編者按

回望輝煌戰鬥歷程,人民軍隊始終堅持在黨的絕對領導下,提出並實施了一整套人民戰爭戰略戰術,這是人民軍隊以弱勝強、克敵制勝的重要法寶。 98年來,隨著時代變遷和戰爭形態演變,人民戰爭戰略戰術的具體內容和表現形式不斷發展變化。直面資訊化智慧化戰爭挑戰,我們要在快速變化發展的世界大勢和實踐樣態中,牢牢把握人民戰爭戰略戰術的本質要求和價值取向,把內在不變的規律性特徵與外在變化的現實性特徵統一起來,不斷創新發展新時代人民戰爭戰略戰術。

習主席強調指出,無論形勢如何發展,人民戰爭這個法寶永遠不能丟,但要把握新的時代條件下人民戰爭的新特點新要求,創新內容和方式方法,充分發揮人民戰爭的整體威力。當前,面對科技之變、戰爭之變、對手之變帶來的深刻挑戰,我們既要繼承發揚人民戰爭優良傳統,也要敏銳識變、積極應變、主動求變,準確把握新時代人民戰爭戰略戰術內在要求,自覺更新思維理念,創新戰略指導,讓克敵制勝的法寶顯威未來戰場。

堅持依靠人民、深根基

在長期革命戰爭實踐中,人民群眾是戰爭勝利最深厚的偉力。人民戰爭戰略戰術,人民是構成這一制勝法寶的主體,人民戰爭的根基深植於人民、底氣來自於人民,無論時代如何發展、戰爭如何演進,緊緊依靠人民、充分動員群眾,永遠是開展人民戰爭的基礎條件和不二法門。新時代條件下發展人民戰爭戰略戰術,必須堅持群眾史觀和兵民是勝利之本的根本要求,把人民戰爭的傳統謀略優勢和群眾路線結合起來,拓展人民戰爭戰略戰術的源頭活水,從人民群眾中汲取戰略智慧和策略方法,形成新時代人民戰爭的智力優勢。札實開展全民防衛教育,不斷厚植家國情懷,激發愛國動力,強化憂患意識,增強國防觀念,引導廣大群眾主動關心國防事業、支持國防建設,為新時代人民戰爭注入強大精神力量。聚力推進人口高品質發展,全面提升全民文化素質、科技素質和創新能力,加速塑造素質優良、總量充裕、結構優化、分佈合理的現代化人力資源,推動人民戰爭主體由數量優勢向質量優勢轉變。進一步完善國防動員體制機制,推動建立與國家應急響應機制相銜接、與聯合作戰體系相融合的快速響應制度,把內含於人民群眾中的無限戰爭潛力充分挖掘出來、聚攏起來,充分發揮資源集聚增值效應。

注重整體運籌、全域攻防

在長期革命戰爭實踐中,人民戰爭戰略戰術要求整體動員政治、經濟、文化、外交、軍事等多方面的力量資源,綜合運用多種鬥爭形式和作戰方式,以整體合力彌補局部的不足和劣勢,從而戰勝強大對手。現代戰爭既是軍事領域的激烈對抗,也是政治、經濟、外交等領域的全面角力,整體呈現混合戰爭的鮮明特徵。新時代條件下發展人民戰爭戰略戰術,必須確立大體系思維模式,以國家戰略體係為依托,以聯合作戰體係為支撐,探索人民戰爭戰略戰術的實現形式,打贏新時代人民戰爭總體戰。應充分發揮新型舉國體制優勢,依託一體化國家戰略體系與能力,高效能聚合全域優勢資源,全方位激活國家國防潛力,將各種力量資源擰線成繩、結繩成網,把人民戰爭的領導要素、組織要素、人員要素、指揮要素、技術要素、裝備要素、保障要素等分系統結合起來,統合、統合方式要加強物理域、資訊域、社會域等領域全面統籌,重點在新域新質上尋求突破,在無人作戰、人機協同作戰、網電作戰、太空深海作戰、智慧自主作戰等新維度有所作為。軍事與非軍事手段相互配合,把政治、經濟、外交、輿論和軍事鬥爭等多種形式結合起來,綜合施策著力打好外交攻防戰、金融貿易戰、心理防護戰、輿論法理戰等,發揮政治攻勢和武裝打擊的綜合效能,統籌打好政治軍事仗。

強化積極防禦、主動進取

在長期革命戰爭實踐中,人民軍隊形成了一整套積極防禦戰略思想,如堅持戰略上防禦與戰役戰斗上進攻的統一,堅持防禦、自衛、後發製人的原則,堅持“人不犯我,我不犯人;人若犯我,我必犯人”,等等。積極防禦,根本在防禦、要義在積極,主動進取是其內在特質。當前,世情國情黨情軍情發生深刻變化,新時代人民戰爭的戰略戰術在總體上堅持防禦性的根本原則,不以霸道霸權和侵略欺壓他國為目的,因此也會贏得國內最廣大人民群眾擁護和支持以及世界上愛好和平與正義的國家和人民的理解和幫助。新時代條件下發展人民戰爭戰略戰術,須應時而變、應勢而動。堅持奉行防禦性國防政策,貫徹落實新時代軍事戰略方針,善於從政治高度出發觀察和分析問題,善於從地區和全球視角來思考和運用策略,夯實人民戰爭制勝的政治基礎。堅持不惹事也不怕事,加強軍事力量常態化多樣化運用,堅定靈活開展軍事鬥爭,在堅持戰略上後發製人的同時,不放棄有利條件下和必要時的戰役戰鬥進攻,穩紮穩打、穩中有進、穩中有為,有效塑造安全態勢,遏止危機沖突,牢牢把握爭鬥主動權。

突顯新質主導、科技賦能

在長期革命戰爭實踐中,人民軍隊在強調決定戰爭勝負的主要因素是人而不是物的同時,同樣高度重視對先進軍事技術特別是武器裝備的研發。毛澤東同志就曾強調,沒有現代的裝備,要戰勝帝國主義的軍隊是不可能的。現代戰爭的科技含量發生了質的飛躍,人工智慧、大數據、量子計算、無人自主、腦控等高新技術與新型武器裝備廣泛應用於軍事領域。雖然人民群眾依然是戰爭勝負的決定性力量,但是這種力量的表現形式發生了重要變化。科技是核心戰鬥力,人民戰爭將更重視科技手段的運用,更依賴人民群眾的智慧和創造力。新時代條件下發展人民戰爭戰略戰術,應把打贏資訊化智能化戰爭作為戰爭準備的著眼點,深研高端戰爭的本質特徵、制勝機理、戰略戰法,加速推動從「人多製勝」向「人才制勝」、從「人力製勝」向「智力製勝」轉變,切實提高新科技賦能、數智者發揮勝利能力、數智性的科技人才、新人民主義中的關鍵人民發揮作用。加速推進高新產業發展,大力加強海洋、太空、網路空間、人工智慧、量子科技等新域新質力量建設,加大高新技術領域軍地協作力度,加速新質生產力向新質戰鬥力轉化運用,推動戰爭潛力儲備向新興領域拓展、向新質力量聚焦。聚合協同軍地科技優勢,由聚焦人力物力等傳統支撐保障要素向聚焦資訊、技術、智慧等新質支撐保障要素轉變,建設底蘊深厚、儲備豐富的資訊池、資源池、技術池,積極打造精幹強能、專業性強的專業支前分隊,不斷拓展人民參戰與科技支前的廣度與深度。

講究靈活機動、創新制衡

在長期革命戰爭實踐中,人民戰爭戰略戰術是高度靈活機動的戰略戰術,最本質的要求是堅持以我為主,致人而不致於人,根據敵我雙方的實際情況,有什麼武器打什麼仗,對什麼敵人打什麼仗,在什麼時間地點打什麼時間地點的仗,找準敵之弱點和軟肋,發揚我之長主動和優勢,能永遠不能掌握戰場。靈活機動的戰略戰術是以劣勢裝備戰勝優勢裝備之敵的致勝法寶。 “你打你的、我打我的”,是中國革命戰爭長期經驗的總結和概括,是人民戰爭戰略戰術的靈魂和精髓。新時代條件下發展人民戰爭戰略戰術,必須掌握非對稱制衡的方法論要求,以作戰概念創新為抓手,遵循現代戰爭制勝機理,不斷推出實用管用的克敵制勝招法。堅持一切從敵我雙方的實際情況出發,深刻洞悉作戰任務、作戰對手、作戰環境變化,深刻把握制勝觀念、制勝要素、制勝方式發展,客觀分析研究敵我雙方的強弱、優劣,知彼知己、因勢而變,靈活運用各種作戰力量和作戰方法,努力以最小代價取得最大戰果。堅持“致人而不致於人”,揚長避短、避實就虛,出其不趨、攻其必救,主動創造戰機,靈活調動敵人,怎麼有利就怎麼打,怎麼擅長就怎麼打。堅持“以能擊不能”,與時俱進推進軍事理論、作戰指導、戰法訓法研究運用,創新核心作戰概念,發展新質作戰手段,不按敵人套路打、盯著敵人軟肋打、發揮我軍優長打,在非對稱制衡中創造人民戰爭新的製勝優勢。

重視積小為大、神聚力合

在長期革命戰爭實踐中,我軍在相當長的時間內都是處於全局上的劣勢地位,所以人民戰爭戰略戰術重視局部上以強對弱,堅持積小勝為大勝,集中力量打殲滅戰,這成為人民軍隊戰勝強敵的關鍵一招。相較於以往,現代戰爭作戰往往在多維多域中展開,為實施「積小勝為大勝」提供了更加廣闊空間。新時代條件下發展人民戰爭戰略戰術,要強化「貌散而神聚,形散而力合」的理念,將分佈在多維戰場的諸多作戰力量動態集中聯合起來,通過效能融合、即時聚優,實施局部快速聚能攻擊、廣域遊擊襲擾,對敵分佈的要點實施殲這種神聚力合的分散式作戰更強調兵力部署廣域分散、能力狀態離散分佈,根據實現作戰企圖、達成作戰目的、遂行作戰任務需要,優選最佳作戰要素、單元、力量,通過作戰能力融合、行動作用累積,聚合最優作戰效應,激發最大作戰潛能,實現作戰效益最大化,達成最佳作戰效果。這種分散式作戰已經從「地理空間的分散」上升為「全局全維的動態耦合」:不再局限於人員裝備在物理空間的分散,而是拓展到網絡、電磁、認知等多維戰場;依託數據鏈、人工智能和分佈式指揮系統實現跨域協同,既極大提升了戰場生存力,又倍增了打擊效能。

中國原創軍事資源:http://www.81.cn/szb_223187/szbxq/index.html?paperName=jfjb&paperDate=2025-08-01&paperNumber=07&articleid=960384888

Space and the Internet China’s Battlegrounds for Military Strategists: Discussion of Mysterious Strategic Support Force Capabilities of the Chinese People’s Liberation Army

太空與互聯網 中國軍事戰略家的戰場:探討中國人民解放軍神秘的戰略支援部隊能力

現代英語:

With the continuous advancement of space technology and the rapid spread of the Internet world, space and the Internet have almost become a battleground for military strategists. America Establish a space force Japan A Space Operations Team was established, the Russian Air Force was renamed the Aerospace Forces, and the French Air Force followed suit and incorporated into the mission establishment of space operations. And China Then established Strategic Support Force , and after the Rocket Force, it became the fifth largest service branch of the Chinese People’s Liberation Army.

Simply put, the Strategic Support Force has jurisdiction over new areas such as space, electromagnetism, and the Internet that are not part of the traditional land, sea, and air battlefields. In addition to focusing on the development of space combat capabilities, it also brings together electronic combat units, cyber offensive and defensive units and intelligence reconnaissance systems scattered across various services in the past to establish a unified command system and integrate these different fields. Its most important purpose is to use this new non-traditional combat method to support front-line troops and gain future battlefield advantages.

Since China is an opaque country and the People’s Liberation Army has always been mysterious, the outside world’s understanding of strategic support forces is still very limited. However, judging from the publicly available information, the Strategic Support Force has several main components, including the “Space Systems Department”, “Cyber Systems Department”, “Political Work Department” and related administrative units, which are responsible for “space development”, “electronic confrontation”, “cyber offensive and defensive”, “cognitive operations”, and “intelligence reconnaissance” respectively.

The PLA’s Strategic Support Force: Space Development Contending with the United States

The “Aerospace Systems Department” responsible for “space development” has jurisdiction over the past satellite research, production, launch, and ground control centers, and is currently the backbone of China’s development of space combat capabilities. It is mainly divided into three major directions, covering space image reconnaissance, anti-satellite operations, and the construction and maintenance of navigation and communication satellite systems. It also uses a large number of “military-civilian integration” strategies, uses civilian use as cover, and introduces, steals or imitates space technology from European and American countries. For military purposes. For example, general civilian communication satellites are also of great help to the People’s Liberation Army’s drone development or combat communications.

The best examples are Beidou satellite This space navigation system independently developed by China has now developed into the third generation, and its signal service scope covers the world. Although the Beidou satellite has high commercial value, it is widely used in automobile navigation, maritime shipping, land surveying, etc. But more importantly, in the military field, it can significantly increase the PLA’s missile accuracy, assist troops and military unmanned vehicles in positioning and navigation, and become the basis for information-based joint operations together with communication satellites. Leaving the strategic support force responsible for maintaining and operating these satellite systems will undoubtedly further coordinate with the People’s Liberation Army’s combat tasks and development direction, and can also ensure the safety of these satellites.

In addition, China has frequently launched various resource detection and scientific research satellites in recent years, many of which are suspected to be related to military purposes. Like Ocean Satellite Series , ostensibly used for ocean research, but because this series of satellites has the ability to monitor, identify and track maritime targets, it is also a powerful weapon for the People’s Liberation Army to carry out anti-access operations at sea in the future, and will have a great impact on China’s control of disputed waters such as the South China Sea and the East China Sea. Great help. Another series High-score satellite It has reconnaissance capabilities. Although it is euphemistically used for resource protection and improving land planning efficiency, it is actually an out-and-out spy satellite. More than 20 have been launched into space.

China’s strategic support forces not only operate and protect their own satellites, but are also actively studying how to attack other countries’ satellites. For example, China’s long-term development of kinetic energy series anti-satellite weapons has successfully shot down abandoned Chinese satellites. In recent years, China has continuously tested new anti-ballistic missile systems and is also considered to have the ability to attack space satellites. The recently launched Shijian-21 satellite was also found in space orbit, directly grabbing a retired Beidou navigation satellite with a robotic arm, towing it to a higher orbit and discarding it, which attracted the attention of foreign media. Beautiful National Army General Fang has long stated in his testimony before Congress that China has the ability to use these technologies to destroy American satellites during wartime and compete with the United States on the space battlefield.

PLA’s Strategic Support Force: Capturing the Advantage of the Cyber Area

The “Network Systems Department” responsible for “electronic operations” and “cyber offensive and defensive” was restructured from the electronic listening and electronic warfare units of the past, and integrated the network forces established in recent years to specialize in electromagnetic space and virtual space. offensive and defensive. In terms of electronic warfare, it is divided into two parts: passive electronic signal interception and analysis, and active interference destruction. The two are actually two sides of the same coin. For example, the J-16D and J-15D electric fighters of the Chinese Air Force are equipped with electronic warfare systems that rely on electronic reconnaissance aircraft and electronic signal intelligence collected by spy ships on weekdays. Because this information will be analyzed by the “Network Systems Department” to develop countermeasures and interference methods, it has become a key basis for electronic warfare systems to launch attacks.

Cyber warfare is the latest and hottest field, and China is also developing very vigorously in this regard. On more than one occasion, the United States has directly accused hackers related to the People’s Liberation Army of hacking into sensitive units to steal data. In this information age, it has long been common to use the far-reaching characteristics of the Internet to carry out theft, destruction and psychological warfare. The theft of data online is not limited to military secrets, but is more about business technology and even personal privacy. It is not news that China systematically steals foreign information on a large scale to assist domestic technological development. It is a common method to use stealing the privacy of overseas dissidents or officials to achieve the purpose of threatening and inducing.

In addition to stealing information in peacetime, in wartime, you can directly attack the enemy’s infrastructure through the Internet. Such as electricity, communications, water supply and transportation networks, etc., to create chaos, slow down the enemy’s response speed and counterattack ability, and even supplement it with psychological warfare to disintegrate the enemy’s will to resist. Take the recent conflict between Armenia and Azerbaijan as an example. After the war broke out, the two countries continued to publish videos of destroying each other’s fighter planes or armored vehicles on the Internet, supplemented by news that it was difficult to distinguish between true and false, in order to boost each other’s morale. This new model of “cognitive warfare” has received more and more attention as the Internet spreads pervasively.

The use of psychological warfare to achieve military or political goals has been a common tactic since ancient times, and China is particularly good at using united front methods. It can even be said to be one of the keys to the People’s Liberation Army’s victory in the civil war between the Kuomintang and the Communist Party. In recent years, the tactic of integrating public opinion warfare, psychological warfare, and legal warfare has been developed, referred to as the “Three Wars”, and is also written into the political and labor regulations of the People’s Liberation Army. Its highest command unit is the “Political Work Department” of the Central Military Commission. The “Political Work Department” of the Strategic Support Force accepts orders from superiors to monitor the troops internally and ensure the loyalty of personnel. To the outside world, it uses its own satellite communication channels and electronic warfare. Interference and destruction technology, online public opinion guidance skills, etc. to support the “Three Wars”. Various infiltrations were carried out at the same time to carry out “intelligence reconnaissance” work.

Increase alertness to new combat modes

This new war, which combines information gathering, destruction and theft, public opinion infiltration, and cognitive warfare, is something we have never seen before. From state-of-the-art space and electronics to the oldest gossip, everything is used to help frontline combat forces gain an advantage. At the same time, the Strategic Support Force also has jurisdiction over the “Strategic Support Force Aerospace Engineering University” and the “Strategic Support Force Information Engineering University”, merging many colleges and universities in the past to cultivate talents for the “Aerospace Systems Department” and “Network Systems Department”. And use these academic units to develop the latest tactics and tactics. The threat to Taiwan cannot be underestimated.

Such as a few that have been exposed Strategic Support Force Base 311 Fuzhou City, located in Fujian Province, is responsible for conducting the People’s Liberation Army’s “Three Wars”. It is only separated from Taiwan by one water, and the targets it targets are self-evident. In addition to preventing regular military attacks, Taiwan must also be more vigilant against this new form of aggression. In recent years, the National Army has also actively developed this invisible combat power and established the “Information and Telecommunications Army”, which is responsible for operations in the fields of network, communications, electronic warfare and other fields, and is positioned as the fourth service. However, due to national strength, it has not been able to invest significantly in the space field. In addition, Taiwan is a democratic country, and the military is unable to use the Internet to develop public opinion warfare and psychological warfare, which puts Taiwan at a great disadvantage in this competition.

China’s strategic support forces support front-line combat forces from various fields. This concept is worth learning from Taiwan, because although the government’s slogan of “National Defense for All” is often shouted at sky-high prices, ministries other than the Ministry of National Defense often lack the concept of enemy situation and fail to think about whether it will have an impact on national security when formulating policies.

Hybrid warfare in the new era is a battlefield everywhere and is no longer something that the Ministry of National Defense can deal with or deal with alone. Taiwanese society faces a huge threat from the enemy, but its failure to establish a universal national defense concept is really frustrating, let alone integrate resources and provide strategic support to the national army.

現代國語:

隨著太空技術的不斷進步、網路世界的快速普及,太空與網路幾乎已成為兵家必爭之地。美國設立太空軍,日本設立宇宙作戰隊,俄羅斯空軍更名為航空太空軍,法國空軍也隨之跟進,納入太空作戰的任務編制。而中國則成立戰略支援部隊,並在火箭軍之後,成為中國人民解放軍的第五大軍種。

簡單來說,戰略支援部隊管轄太空、電磁、網路等不屬於傳統陸、海、空戰場的全新領域。除了重點發展的太空戰力,還匯集過去散布於各軍種的電子作戰部隊、網路攻防單位與情報偵察系統,以建立統一的指揮體系,整合這些不同領域。其最重要的目的,是利用這種新型態的非傳統作戰方式,來支援第一線部隊,取得未來戰場上的優勢。

由於中國是個不透明的國家,解放軍也一向神秘,因此外界對於戰略支援部隊的瞭解仍非常有限。但從可以公開取得的資料來看,戰略支援部隊擁有幾個主要組成部分,包括「航天系統部」、「網路系統部」、「政治工作部」與相關行政單位,分別負責「太空發展」、「電子對抗」、「網路攻防」、「認知作戰」、「情報偵察」五大方面。

解放軍的戰略支援部隊:與美國抗衡的太空發展

負責「太空發展」的「航天系統部」,下轄過去的衛星研究、生產、發射、地面控制中心,是目前中國發展太空戰力的骨幹。主要分為三大方向,涵蓋太空影像偵察、反衛星作戰、導航與通信衛星系統的建置與維護,並大量運用「軍民融合」策略,以民用為掩護,引進、竊取或仿製歐美等國的太空技術,用於軍事用途。例如一般的民用通訊衛星,對於解放軍的無人機發展或作戰通訊也有極大的助益。

最好的例子是北斗衛星,這套中國自行研發的太空導航系統,目前已經發展到第三代,訊號服務範圍涵蓋全球。雖然北斗衛星擁有很高的商業價值,在汽車導航、海上航運、土地測量等方面用途廣泛。但更重要的是在軍用領域,能大幅增加解放軍的飛彈精確度,協助部隊與軍用無人載具進行定位與導航,並與通訊衛星一起成為資訊化聯合作戰的基礎。交由戰略支援部隊來負責維護與操作這些衛星系統,無疑能進一步配合解放軍的作戰任務與發展方向,也可確保這些衛星的安全。

此外,中國近年來頻繁發射各種資源探測與科學研究衛星,許多都被懷疑與軍事用途有關。如海洋衛星系列,表面上用於海洋研究,但由於這一系列衛星具備監視、識別與追蹤海上目標的能力,也是解放軍未來在海上執行反介入作戰的利器,對中國控制南海、東海等爭議海域,有極大的助益。另一系列的高分衛星,具備偵照能力,雖然美其名是用於資源保護,提升國土規劃效率,但其實是不折不扣的間諜衛星,已發射二十餘枚進入太空之中。

中國的戰略支援部隊不止操作與保護自己的衛星,也正在積極研究如何攻擊別國的衛星。如中國長期發展的動能系列反衛星武器,已成功擊落過廢棄的中國衛星,而中國近年來不斷測試新型的反彈道飛彈系統,也被認為有攻擊太空衛星的能力。最近剛發射的實踐21號衛星,還被發現在太空軌道中,直接以機械手臂抓取一顆退役的北斗導航衛星,拖往更高的軌道上丟棄,引起國外媒體的關注。美國軍方將領在國會作證時早已表示,中國有能力運用這些技術,於戰時破壞美國的衛星,在太空戰場上與美國分庭抗禮。

解放軍的戰略支援部隊:奪得網路區域的優勢

負責「電子作戰」與「網路攻防」的「網路系統部」,是由過去的電子監聽與電戰單位改制而來,並整合近年來設立的網路部隊,專精電磁空間與虛擬空間的攻防。在電子作戰方面,分為被動的電子訊號截收與分析,與主動的干擾破壞兩大部分,兩者其實是一體兩面。如中國空軍的殲-16D、殲-15D電戰機,配備的電戰系統,就仰賴電子偵察機與間諜船平日所蒐集的電子訊號情報。因為這些資料會交由「網路系統部」進行分析,以研發出反制與干擾的辦法,成為電戰系統發動攻擊時的關鍵依據。

網路戰則是最新、最熱門的領域,中國在這方面也有非常蓬勃的發展。美國已經不只一次,直接指控與解放軍有關的駭客,入侵敏感單位竊取資料。在這個資訊時代,利用網路無遠弗屆的特性,來進行竊取、破壞與心理戰,早已屢見不鮮。網路竊取資料並不侷限於軍事機密,更多的是商業技術,甚至是個人的隱私。中國有計畫地大規模竊取國外資訊,以協助國內的科技發展,並不是什麼新聞。利用竊取海外異議分子或官員的隱私,來達成威脅利誘的目的,更是常見的手法。

除了在承平時期竊取資訊外,在戰時則可直接透過網路,攻擊敵方的各項基礎設施。如電力、通訊、供水與交通網等,以製造混亂,拖慢敵方的應變速度與反擊能力,甚至輔以心理戰,瓦解敵方的抵抗意志。以近期亞美尼亞與亞塞拜然的衝突為例,兩國在戰事爆發後,不斷把擊毀對方戰機或裝甲車的影片公布在網路上,輔以真假難辨的消息,以打擊對方的士氣。這種「認知作戰」的新模式,已隨著網路傳播的無孔不入,越來越受到重視。

利用心理戰來達成軍事或政治目的,是自古以來很常見的戰術,而中國又特別擅長運用統戰手段,甚至可以說是國共內戰中,解放軍致勝的關鍵之一。在近年來更發展出整合輿論戰、心理戰、法律戰的戰術,簡稱為「三戰」,還寫入解放軍的政工條例中。其最高指揮單位是中央軍委會的「政治工作部」,戰略支援部隊的「政治工作部」接受上級命令,對內監控部隊,確保人員的忠誠,對外則利用本身所掌握的衛星通訊傳播管道、電戰干擾破壞技術、網路輿論引導技巧等,來支援「三戰」。同時進行各種滲透,執行「情報偵察」工作。

提高對全新作戰模式的警覺

這種結合資訊情蒐、破壞竊取、輿論滲透、認知作戰的全新戰爭,是我們過去所未曾見過的。從最先進的太空與電子技術,到最古老的流言蜚語,無所不用其極地協助第一線作戰部隊取得優勢。同時,戰略支援部隊還下轄「戰略支援部隊航天工程大學」與「戰略支援部隊信息工程大學」,合併過去多所院校,專為「航天系統部」與「網路系統部」培養人材。並利用這些學術單位,發展最新的戰術戰法,對台灣的威脅不容小覷。

如少數已曝光的戰略支援部隊311基地,位於福建省的福州市,負責進行解放軍的「三戰」,與台灣只有一水之隔,所針對的目標已不言可喻。台灣除了要防範正規的軍事攻擊,對於這種新形態的侵略,更要提高警覺。國軍近年來也積極發展這種看不見的戰力,成立「資通電軍」,負責網路、通訊、電戰等領域的作戰,並定位為第四軍種。但受限於國力,未能大幅投資太空領域,再加上台灣是個民主國家,軍方無法利用網路來發展輿論戰、心理戰,都讓台灣在這場競爭中處於極不利的處境。

中國的戰略支援部隊,從各個領域來支援第一線的作戰部隊,這樣的概念值得台灣學習,因為政府「全民國防」的口號雖然常喊得震天價響,但國防部以外的部會,卻往往缺少敵情觀念,在擬定政策時未能思考是否會對國家安全造成衝擊。

新時代的混合式戰爭,無處不是戰場,早已經不是國防部可以獨自應付或處理的。台灣社會面臨巨大的敵情威脅,卻未能建立普遍的國防觀念,實在令人扼腕,更遑論整合資源,給予國軍戰略支援了。

中國原創軍事資源:https://opinion.udn.com/opinion/story/120873/6088490

Enhanced Development of Chinese Military’s Network Information System

中國軍隊網路資訊系統建置取得新進展

現代英語:

At present, a new round of scientific and technological revolution and military revolution is developing rapidly, the evolution of war forms towards informatization and intelligence is accelerating, and the status and role of network information systems in modern warfare is unprecedentedly prominent. President Xi Jinping pointed out that the information support force is first and foremost a combat team. It must stand at the height of a strong army and win the battle, fully recognize the extreme importance of the construction of the network information system, recognize the historical responsibilities it has shouldered, and accelerate the construction of the network information system and services. Support the ability to prepare for war. In-depth study and implementation of the spirit of President Xi’s important speech should grasp the characteristics and laws of the current network information system construction and improvement of war preparation capabilities, do a solid job in various tasks, and promote the leapfrog development of the military network information system construction.

   Provide systematic support and guarantee for future wars

  The network information system is a complex giant system with network center, information leadership, system support, etc. as its main features. By systematically integrating combat units, combat forces and combat elements, it can achieve rapid acquisition, analysis and processing of battlefield situation information, Decision-making and recommendation deepen the ability of precise strikes, joint operations, and independent coordination between services and arms to provide systematic support and guarantee for future wars.

  The network information system continues to evolve with the development of military science and technology. After World War II, the development of electronic technology prompted the gradual modernization of military means of communication. The military uses radio communication technology to build a basic command and communication network. In the mid-20th century, computer technology emerged in the military field and was used for data processing such as military logistics management and intelligence file storage. The rapid development of information technology and the accelerated spread of Internet applications have had a great impact on the world’s military development. In the 1970s, as the complexity of military operations increased, the concept of C3I systems (command, control, communications and intelligence) was proposed and developed. After the Gulf War, the C4ISR system (Command, Control, Communications, Computers, Intelligence and Surveillance and Reconnaissance) matured. At the turn of the century, the concept of network-centered warfare emerged, emphasizing network-centeredness and connecting various combat forces and combat units into an organic whole through the network to achieve information sharing and coordinated operations. With the emergence of new technologies such as big data, artificial intelligence, cloud computing, and the Internet of Things, network information continues to integrate these new technologies and play an important role in the Nagorno-Karabakh conflict, the Russia-Ukraine conflict, and the Palestinian-Israeli conflict in recent years. Currently, some countries are integrating land, sea, air, space, network and other multi-domain combat capabilities through the concept of “Joint Global Command and Control ”JADC2“” to build seamlessly connected combat networks, while promoting 5G militarization tests and exploring quantum communication technologies, verify the feasibility of global quantum Internet, etc., and create a new trend in network information construction.

  The network information system is an important innovation in the party’s military guidance theory in the new era. Since the new era, President Xi has based himself on the practice of military construction, reform and military struggle preparations, innovatively proposed “network information system” to guide the cause of strengthening the military in the new era. The report of the 19th National Congress of the Communist Party of China pointed out that the development of military intelligence should be accelerated and joint combat capabilities and all-region combat capabilities based on network information systems should be improved. The report of the 20th National Congress of the Communist Party of China emphasized that the construction and application of the network information system should be coordinated. The Third Plenary Session of the 20th Central Committee of the Communist Party of China called for strengthening the overall planning of the construction and application of the network information system. When inspecting the information support force, President Xi emphasized the need to implement the idea of strengthening the military in the new era, implement the military strategic policy in the new era, strengthen mission responsibility, have the courage to innovate and make breakthroughs, consolidate the foundation of the force, strive to build a strong modern information support force, and promote Our military’s network information system construction has developed by leaps and bounds. This important speech further highlighted the important position and role of the network information system in modern warfare.

  The network information system is an important guide in promoting the modernization of our military. In the 1970s, our army began to command automation construction, carrying out stand-alone applications and network construction in the fields of communications, intelligence, command and other fields. In the 1990s, with the rapid development of information technology, our military’s informatization construction began to accelerate. It deployed and developed in the fields of military communications, intelligence reconnaissance, command and control, and initially established a series of military information systems. At the beginning of the 21st century, the Central Military Commission included “military informatization construction” in its strategic deployment. Informatization construction continued to accelerate, and a new generation of information transmission network was built with optical fiber communications as the mainstay and satellite and shortwave communications as supplements. The construction of information systems has made great progress, the army’s systematic combat capabilities based on information systems have been strengthened. Since the 18th National Congress of the Communist Party of China, the construction of our military’s network information system has entered a new stage of development. Accelerate the integrated development of informatization, mechanization and intelligence, strengthen the top-level design and overall planning of the network information system, and promote the innovative development of the network information system. Actively carry out the practical application of the network information system and improve its joint and all-territory combat capabilities based on the network information system.

   “strategic shield” for national security

  The rapid development of network information technology has profoundly changed the national security environment and the form of military struggle. In view of the international situation, the world’s major military powers have stepped up their efforts to build their forces in cyberspace and are competing fiercely around the advantages of cyber information, which has become a central element in taking the initiative in war. The security threats facing our country are increasingly complex and diverse, with traditional and non-traditional security threats intertwined. To safeguard national sovereignty, security and development interests, an advanced network information system must be developed.

  In recent years, global cyberattacks have become frequent, posing a serious threat to critical information infrastructure. Building an autonomous and controllable network information system is both a “firewall” against external infiltration and a “strategic shield” for maintaining national security. By building a robust network information system, it can effectively counter external cyberattacks, cyberespionage and other threats, and ensure the security of the country’s critical information infrastructure. At the same time, the advanced network information system is a reflection of the country’s strategic deterrence capabilities. It can not only provide precise command control and information support for strategic weapons systems, but also curb the military adventures of potential adversaries through the deterrent power of network information, thereby maintaining peace and stability in the region and the world.

  To build a network information system and lead comprehensive changes in national defense and military construction concepts, organizational forms, and combat methods. In terms of combat concept, the transition from platform-centric to network-centric emphasis is placed on system confrontation and information dominance. In terms of organizational form, it optimizes combat power through network information systems to maximize combat effectiveness. In terms of combat methods, electromagnetic space becomes the main battlefield, and cognitive domain confrontation intensifies. The development of network information systems is inseparable from the research and development of key information technologies, including high-performance chips, advanced communication technologies, and military applications of artificial intelligence. Build a network information system to drive a jump in national defense science and technology innovation capabilities, promote military scientific research institutions and military industrial enterprises to increase investment in research and development, strengthen independent innovation capabilities, and make full use of the advantages of network information technology to improve national defense science and technology levels.

  The level of construction and application of the network information system determines the effectiveness of the joint combat command system, intelligence and reconnaissance system, fire strike system, and comprehensive support system. In modern warfare, the ability of various services and arms to obtain, process, and share battlefield information in real time determines joint operational effectiveness. Joint operations require the command system to have millisecond-level decision-making capabilities, and the network information system provides a digital bridge for cross-domain collaboration for multi-dimensional battlefields such as land, sea, air, space, and the Internet. By building a complete network information system, situation sharing, autonomous linkage, integrated integration and cross-domain energy gathering can be achieved among the various combat forces, combat elements and combat units distributed in a wide area, and then at the time, place and space required for combat. Form a system to optimize and give full play to joint combat effectiveness.

   Building a network information system with the characteristics of our military

  The network information system is the most intensive area for high-tech applications, and it is also an important position for competition among military powers. The network information system has become a key point in the military’s combat effectiveness, and the level of its construction determines the initiative in future wars. We must deeply understand President Xi’s series of important expositions on the network information system, based on the actual construction and application of our military’s network information system, follow the laws of military science and technology development, and accelerate the construction of a network information system that meets the requirements of modern warfare and has our military’s characteristics.

  Theoretical lag is the bottleneck that restricts the effectiveness of the system. The speed of theoretical innovation determines the height of system construction, and theoretical breakthroughs must be used to seize the commanding heights of network information system construction. Research on major issues in network information system combat preparation, innovate military scientific research paradigms, strengthen technology-driven theoretical innovation, and build a network information system theory with Chinese characteristics. Focusing on new combat concepts such as “multi-domain collaboration ”“intelligent gaming”, we will develop joint combat theories supported by network information systems, strengthen the transformation and application of theories, and provide support and guidance for the decisive victory in future wars.

  Strengthen research on core technologies to form an independent and controllable network information technology ecological chain; accelerate infrastructure construction and build a network information system infrastructure covering the entire region. Break down the barriers of departmental interests, deepen the mechanism of joint construction and joint use of services and arms, and form an ecology of “co-construction, sharing and sharing”. We should pay attention to building the cyber and information capacity of our troops at the grass-roots level, and formulate appropriate construction plans based on the characteristics and actual needs of our troops to meet the overall requirements for the development of joint operations. Adhere to the integration of construction and application to improve actual combat effectiveness, use “development— test —combat” closed-loop feedback mechanism, and continuously optimize system functions through simulation deductions and actual military drills to ensure anti-interference, anti-damage, and anti-interference in complex electromagnetic environments and network offensive and defensive confrontations. Paralysis ability. Relying on military academies and scientific research institutions, we will train composite commanders and fighters who are proficient in network information technology and familiar with joint operations, improve relevant mechanisms, and attract all types of high-end talents to participate in the construction of the network information system.

  ”Victory” depends on information communication, and strength depends on the system. The construction of the network information system of the world’s military powers is showing a trend “technology-driven, system integration, and security first”. Its core lies in improving joint combat effectiveness through standardization, intelligence, and actual combat. Standing in a new historical position, the construction of our military’s network information system faces rare opportunities and has to cope with complex challenges. It is necessary to “coordinate the overall strategic situation of strengthening the country through science and technology and strengthening the military through science and technology with the spirit of historical initiative, and achieve high-quality development of network information system construction with the realm of “success does not have to be mine” and the responsibility of “success must be mine”; adhere to innovation-driven, demand-driven, military-civilian collaboration, accelerate the construction of a network information system that meets the requirements of modern warfare and has the characteristics of our military” Laying a solid foundation for winning future wars.

   (Author: Dong Junlin, unit: Institute of Military Political Work, Academy of Military Sciences)

現代國語:

目前,新一輪科技革命和軍事革命迅速發展,戰爭形態加速向資訊化、智慧化演變,網路資訊體系在現代戰爭中的地位作用空前凸顯。習近平主席指出,資訊支援部隊首先是一個戰鬥隊,要站在強軍勝戰的高度,充分認清網路資訊體系建設的極端重要性,認清擔負的歷史重任,加快把網路資訊體系建設和服務支撐備戰打仗能力搞上去。深入學習貫徹習主席重要講話精神,應當把握當前網路資訊體系建構與提升備戰打仗能力的特色規律,紮實做好各項工作,推動軍隊網路資訊體系建置跨越發展。

為未來戰爭提供體系化支撐與保障

網路資訊體係是以網路中心、資訊主導、體系支撐等為主要特徵的複雜巨系統,透過將作戰單元、作戰力量以及作戰要素進行系統集成,進而實現戰場態勢資訊的快速取得、分析處理、決策推薦,深化軍兵種之間的精準打擊、聯合作戰、自主協同保障,為未來戰爭提供系統化支援。

網路資訊體系伴隨軍事科技發展不斷演進。二戰後,電子技術的發展促使軍事通訊手段逐步現代化。軍隊利用無線電通訊技術建構基本的指揮通訊網路。 20世紀中葉,電腦科技在軍事領域嶄露頭角,用於軍事後勤管理、情報檔案儲存等資料處理工作。資訊科技快速發展,網路應用加速普及,對世界軍事發展帶來巨大影響。 1970年代,隨著軍事行動複雜性的增加,C3I系統(指揮、控制、通訊與情報)概念被提出並發展。海灣戰爭後,C4ISR系統(指揮、控制、通訊、電腦、情報及監視與偵察)逐漸成熟。世紀交接,出現了網路中心戰理念,強調以網路為中心,將各種作戰力量、作戰單元透過網路連結成一個有機的整體,實現資訊共享和協同作戰。隨著大數據、人工智慧、雲端運算、物聯網等新興技術的湧現,網路資訊不斷融合這些新技術,在近年來的納卡衝突、俄烏衝突、巴以衝突中發揮重要作用。目前,部分國家透過「聯合全域指揮控制(JADC2)」概念,整合陸、海、空、天、網等多域作戰能力,建構無縫連接的作戰網絡,同時推進5G軍事化試驗,探索量子通訊技術,驗證全球「量子互聯網」可行性等,打造網路資訊建置新態勢。

網路資訊體係是新時代黨的軍事指導理論的重要創新。新時代以來,習主席立足於軍隊建設、改革和軍事鬥爭準備實踐,創新性提出“網路資訊體系”,指導新時代強軍事業。黨的十九大報告指出,加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力。黨的二十大報告強調,統籌網路資訊體系建置運用。黨的二十屆三中全會要求,加強網路資訊體系建構運用統籌。習主席在視察資訊支援部隊時強調,要貫徹新時代強軍思想,貫徹新時代軍事戰略方針,強化使命擔當,勇於創新突破,夯實部隊基礎,努力建設一支強大的現代化信息支援部隊,推動我軍網絡信息體系建設跨越發展。這重要講話,進一步凸顯了網路資訊體系在現代戰爭中的重要地位與角色。

網路資訊體係是推動我軍現代化建設的重要領導。 1970年代,我軍開始指揮自動化建設,在通訊、情報、指揮等領域進行單機應用與網路建設。 90年代,隨著資訊科技的快速發展,我軍資訊化建設開始加速,在軍事通訊、情報偵察、指揮控制等領域佈局發展,初步建立一系列軍事資訊系統。 21世紀初,中央軍委將「軍隊資訊化建設」列入戰略部署,資訊化建設持續提速,建成以光纖通信為主,以衛星、短波通信為輔的新一代信息傳輸網絡,信息系統建設取得長足進步,部隊基於信息系統的體係作戰能力得到加強。自黨的十八大以來,我軍網路資訊體系建構進入新的發展階段。加速資訊化與機械化、智慧化融合發展,強化網路資訊體系的頂層設計與統籌規劃,推動網路資訊體系創新發展。積極進行網路資訊體系實戰化應用,提升基於網路資訊體系的聯合作戰能力及全域作戰能力。

維護國家安全的“戰略盾牌”

網路資訊科技的快速發展深刻改變國家安全環境與軍事鬥爭形態。從國際情勢來看,世界主要軍事強國紛紛加強網路空間力量建設,圍繞網路資訊優勢展開激烈競爭,網路資訊體系成為掌握戰爭主動權的核心要素。我國面臨的安全威脅日益複雜多樣,傳統安全威脅與非傳統安全威脅交織在一起。要維護國家主權、安全和發展利益,必須發展先進的網路資訊系統。

近年來,全球網路攻擊事件頻傳,關鍵資訊基礎設施面臨嚴峻威脅。建立自主可控的網路資訊體系,既是抵禦外部滲透的“防火牆”,也是維護國家安全的“戰略盾牌”。透過建構強大的網路資訊體系,能夠有效應對外部網路攻擊、網路間諜活動等威脅,確保國家關鍵資訊基礎設施的安全。同時,先進的網路資訊體系更是國家戰略威懾能力的體現,不僅為戰略武器系統提供精確的指揮控制和資訊支持,還能夠透過網路資訊的威懾力量遏制潛在對手的軍事冒險行為,從而維護地區和世界的和平穩定。

建構網路資訊體系,引領國防及軍隊建設理念、組織形態、作戰方式等方面的全面變革。在作戰理念上,從以平台為中心轉向以網路為中心轉變,強調體系對抗和資訊主導。在組織形態上,透過網路資訊體系優化作戰力量,實現作戰效能的最大化。在作戰方式上,電磁空間成為主戰場,認知域對抗加劇。網路資訊體系發展,離不開關鍵資訊科技的研發,包括高效能晶片、先進通訊技術、人工智慧軍事應用等領域。建置網路資訊體系,帶動國防科技創新能力躍升,推動軍事科研機構及軍工企業加強研發投入,加強自主創新能力,充分利用網路資訊技術優勢提升國防科技水準。

網路資訊體系的建設運用水平,決定著聯合作戰指揮系統、情報偵察系統、火力打擊系統、綜合保障系統等方面的效能。在現代戰爭中,各軍兵種即時取得、處理、分享戰場資訊的能力決定了聯合作戰效能。聯合作戰更是要求指揮系統具備毫秒級決策能力,網路資訊體系則為陸、海、空、天、網等多維戰場提供跨域協同的數位橋樑。透過建構完善的網路資訊體系,廣域分佈的各作戰力量、作戰要素、作戰單元之間才能實現態勢共享、自主聯動、一體融合和跨域聚能,進而在作戰需要的時間、地點、空間形成體系聚優,充分發揮出聯合作戰效能。

建構具有我軍特色的網信體系

網路資訊體係是高新科技應用最密集的領域,也是軍事強國競爭的重要立場。網路資訊體系已成為軍隊戰鬥力的關鍵點,其建設水準決定未來戰爭的主動權。必須深刻領悟習主席關於網路資訊體系的系列重要論述,立足我軍網路資訊體系建構運用實際,遵循軍事科技發展趨勢規律,加快建設符合現代戰爭要求、具有我軍特色的網路資訊體系。

理論滯後是限制體系效能的瓶頸。理論創新的速度決定體系建構的高度,要以理論突破搶佔網路資訊體系建設制高點。扭轉網路資訊體系在戰建備中的重大問題研究,創新軍事科研範式,強化技術驅動型理論創新,建構具有中國特色的網路資訊體系理論。圍繞著「多域協同」「智慧博弈」等新型作戰概念,發展以網路資訊體系為支撐的聯合作戰理論,加強理論轉化運用,為決勝未來戰爭提供支撐引領。

強化核心技術攻關,形成自主可控的網信技術生態鏈;加速基礎建設,建構覆蓋全域的網信體系基礎設施。打破部門利益藩籬,深化軍兵種聯建聯用機制,形成「共建共用共享」的生態。重視基層部隊網信能力建設,結合部隊特徵與實際需求,制定相適應的建設計劃,以適應聯合作戰發展的整體要求。堅持建用一體,提升實戰效能,運用「研製—試驗—作戰」閉環回饋機制,透過模擬推演、實兵演練不斷優化體系功能,確保在複雜電磁環境、網路攻防對抗中具備抗干擾、抗毀傷、抗癱瘓能力。依托軍隊院校及科研機構,培養精通網信技術、熟悉聯合作戰的複合型指戰員,完善相關機制,吸引各類高端人才參與網路資訊體系建置。

勝由資訊通,強由體系興。世界軍事強國的網路資訊體系建構正呈現出「技術驅動、體系融合、安全優先」的趨勢,其核心在於透過標準化、智慧化和實戰化來提升聯合作戰效能。站在新的歷史方位,我軍網路資訊體系建構面臨難得機遇,也要應付複雜挑戰。要以歷史主動精神統籌科技強國和科技強軍戰略全局,以「功成不必在我」的境界和「功成必定有我」的擔當,實現網絡資訊體系建設高品質發展;堅持創新驅動、需求牽引、軍地協同,加快建設符合現代戰爭要求、具有我軍特色的網絡信息體系,為打贏未來戰爭奠定基礎。

(作者:董俊林,單位:軍事科學院軍事政治工作研究院)

中國原創軍事資源:https://military.cctv.com/2025/06/08/ARTI5vEDwX94cVXXAUlwGbDX250608.shtml

Dissipation Conflict: The Typical Methodology of Chinese Military Intelligent Warfare

耗散衝突:中國軍事智慧化戰爭的典型方法論

現代英語:

Wang Ronghui

Introduction

With the rapid development of intelligent technology and its widespread military application, intelligent warfare is becoming a new form of warfare after information warfare, while dissipative warfare has become a typical way of intelligent warfare. The so-called “dissipative warfare” refers to the combat method in which an intelligent warfare system achieves a comprehensive combat capability that integrates material consumption, energy release and information diffusion by enriching and integrating internally and suddenly emerging externally. Strengthening research on dissipative warfare will help us deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.

Dissipation warfare is the inevitable result of the development of the times

Dissipative warfare is manifested in the comprehensive confrontation of physical domain, information domain and cognitive domain in the intelligent era. It is reflected in the high degree of unity in the form of political competition, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the intelligent warfare system. The openness, complexity and emergence of.

Adapting to the requirements of the security situation in the intelligent era. Entering the era of intelligence, technologies such as wide networks, big data, large models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and ethnic groups are even broader. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and become intertwined with traditional threats. Intelligent war subjects and categories have continued to expand, war time and space have continued to extend, and war and peace have followed each other like a shadow. And intertwined, the war system will further transcend local geographical restrictions, move from relatively closed to more open, and form a higher-level and larger-scale confrontation. Dissipative warfare emphasizes the comprehensive efforts of intelligent warfare systems in the physical domain, information domain and cognitive domain, and highly unifies and incorporates political competitions, economic competitions, military offensive and defensive, cultural conflicts and diplomatic checks and balances into the category of confrontation between ourselves and the enemy, adapting to the world. The requirements of the times as the security situation develops.

In line with the objective laws of the evolution of the war forms. The dissipation phenomenon of the war system has always existed since the emergence of war. However, before the emergence of intelligent war forms, due to technological constraints, it was always in a relatively low-level and simple state. War confrontation can only manifest itself in material consumption and energy. A certain form of dispersion and information diffusion. During the agricultural era, the forms of warfare were mainly represented by cold weapon warfare dominated by material elements and centered on the human body. During the industrialization era, the forms of warfare were mainly represented by thermonuclear weapons and mechanized warfare dominated by energy elements and centered on platforms. In the age of informatization, the forms of warfare are mainly characterized by information warfare dominated by information elements and centered on the network information system. Entering the era of intelligence, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between ourselves and the enemy. In essence, it highly unifies matter, energy and information. Through intelligent empowerment, intelligent energy gathering, and Intelligent energy release has formed an intelligent war form dominated by intelligent elements and centered on intelligent algorithms The main form of expression is dissipative warfare that reflects the confrontation of complex systems of intelligent warfare.

With solid support of philosophical theoretical foundation. Social form is the matrix of war form. To explore and understand intelligent war, we must comprehensively examine the evolution of war form and the social form in which intelligent war is located based on the basic principles of historical materialism and dialectical materialism, and build a new concept of war. and contextual system. From a philosophical point of view, matter, energy and information are the three elements that make up the world. Matter embodies the existence of origin, energy embodies the existence of movement, and information embodies the existence of connection. The progressive alternation of the three dominates the evolution and operation of social forms and war forms. According to the negative principle of the negation of dialectical materialism, in the intelligent era after the information age, the elements that dominate society will take the turn of matter again after matter, energy, and information. However, this matter is formed after a highly informatized spiral. The main feature of new substances is that they have intelligent technical attributes. Thus, in essence, dissipative warfare is the highly unified nature of the intelligent element in terms of the characteristic advantages of matter, energy, and information in previous low-order war forms, and the highly unified nature of forms such as material consumption, energy release, and information diffusion prevalent in warfare, reflecting the typical characteristics of intelligent warfare.

Deeply grasp the inner essence of dissipative warfare

Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of the main body and scope of warfare, and presents many new features.

Antisynthetic game. As the intelligent war form accelerates to a higher depth and breadth, and the political, economic, cultural, diplomatic and other fields become more interconnected and influence more widely, the focus of war begins to shift from the military system to the social system, and the war stakeholders Confrontation will be reflected in various forms of comprehensive games such as political competition, economic competition, military offensive and defensive, cultural conflicts, and diplomatic checks and balances The war superiority pursued is no longer limited to the field of military confrontation. The winner of the war must adapt to the requirements of openness, complexity and emergence of the war system, and shift from the extensive consumption and use of a single substance, energy and information to the dissipation of the war system dominated by intelligent advantages, striving to win initiative and advantage in a multi-field comprehensive game.

Subjects cross-domain multivariate. The subjects of intelligent warfare are becoming increasingly general, and the potential forces of war that traditional warfare needs to mobilize will be in a state of normalized confrontation. Political forces, institutions and personnel of all kinds, together with troops and servicemen fighting on the battlefield in the traditional sense, constitute the main body of the war. Diversified war subjects will span the real and virtual domains and appear in multiple spatial domains such as land, sea, air, sky, electricity, and psychology, covering physical domains, information domains, cognitive domains, etc., and covering political, economic, cultural, diplomatic and other social domains. For example, “civilians in society can use smartphones to collect information on the military battlefield and transmit it to war stakeholders, causing the proliferation of key information about war, thereby affecting war decisions or the victory or defeat of a battle and battle”.

Enrichment. The virtual and real forces are one. Around the purpose of war, all possible real and virtual forces will be integrated with the support of intelligent technology, performing duties and acting according to regulations on parallel battlefields; with or without force. Unmanned combat forces will achieve a high degree of autonomy after going through the stages of manual operation, manual authorization, and human supervision, and can be deployed and combined with various types of manned forces on demand, effectively synergizing and coexisting in parallel under the constraints of common war rules; multi-party forces are integrated. Based on the broad contacts in various fields and the common purpose of the war system, all parties, including the party, government, military, police and civilians, closely cooperate and act in a unified manner between military operations and political, economic, diplomatic, public opinion and legal struggles to form a comprehensive combat force. In short, under the integrated planning of countries or political groups, the diverse participating forces in intelligent warfare, although physically dispersed, can focus on common war purposes to achieve logical concentration, instant enrichment, complementary advantages, and integration.

Efficacy cumulative emergence. The high-order war forms, while having new qualitative technical characteristics, still include the characteristic advantages of the low-order war forms. Dissipation warfare emphasizes continuous comprehensive confrontation in multiple domains, which includes both the consumption of ammunition, supplies, equipment and even combatants at the material level, as well as the continuous collection and release of energy levels, including through data, knowledge, algorithms at the information level. The diffusion and fusion of etc. have an unlimited impact on people’s thinking and cognition, value pursuit, moral concepts, emotional will, behavior patterns, etc. Under the normal deterrence of nuclear weapons, intelligent warfare has shown a downward trend of bleeding, but political isolation, economic blockade, cultural conflicts, diplomatic strangulation, etc. will become more severe and intense. When the role of various systems such as military, political, economic, cultural, and diplomatic systems continues to play, and the accumulation of effectiveness reaches a certain level, the war system will increase negative entropy, thereby achieving sudden changes in combat power and the emergence of system effectiveness, thereby gaining war advantages.

Fight a good dissipative war in the “select the right combat focus”

By enriching and integrating internally, the intelligent warfare system suddenly emerges externally, increasing efficiency across domains, and dissipating intelligence to maximize the combat effectiveness of the system. This is the winning mechanism contained in dissipative warfare. To win the victory in intelligent warfare, it is necessary to clarify the combat focus of dissipative warfare, identify the focus of war preparations based on the shortcomings and weaknesses of the opponent’s system.

Focusing on the openness of the system, closing off and isolating the opponent’s war system. To cut off the exchange of material, energy and information between the adversary’s war system and the outside battlefield environment, so that it lacks channels for the source of material, energy and information, and gradually moves towards isolation, closure and weakness. For example, “At the strategic level, political isolation is used to isolate the opponent’s war system, causing the system entropy to increase”. At the “campaign level”, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to comprehensively use soft and hard means to force the war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.

Focusing on the complexity of the system, it breaks down the adversary’s war system in different domains. The more and more closely connected the elements of an intelligent warfare system are, the less reliable the architecture will be. Using the principle that each layer in a complex system is relatively independent, strategic overall, campaign local and tactical action strategies can be formulated to achieve hierarchical and domain-based attack on the enemy’s war system. For example, “At the strategic level, the use of economic blockade greatly weakens the opponent’s war strength and development potential”. At the “campaign level”, we take advantage of the vulnerability of the combat system communication network, use network-to-electric composite attacks as the basic path and means, and use methods such as “destroying terminals, attacking elements, isolated groups, disconnecting networks, and breaking clouds” to break through the opponent’s combat system structure and promote The opponent’s war system “collapse”.

Focus on “system emergence and dismantle the system of evacuation of opponents”. Only when there are sudden changes and emergent effects in the intelligent warfare system can the system’s effectiveness be quickly formed and exerted, and the advantage of dissipative warfare be gained. It is not possible to form an emergence of advantages if only individual components or elements come into play. It is foreseeable that the current emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide new ways of thinking to understand and discover the operating behaviors, states and laws of complex systems of war, as well as new means to explore objective laws and transform nature and society, the superior party in war confrontation will reduce the coupling degree of the opponent’s war system through a parallel confrontation method that combines virtuality and reality Achieving the purpose of dismantling the system of evacuation of enemy warfare.

現代國語:

王榮輝

引 言

隨著智慧化技術快速發展及在軍事上的廣泛應用,智慧化戰爭正成為資訊化戰爭後的新戰爭形態,而耗散戰則成為智慧化戰爭的典型方式。所謂耗散戰,是指智慧化戰爭體系透過對內富聚融合,對外突變湧現,達成集物質消耗、能量釋散和資訊擴散於一體的綜合戰力的作戰方式。加強耗散戰研究,有利於我們深入揭示智慧化戰爭制勝機理,贏得未來戰爭賽局主動權。

耗散戰是時代發展的必然結果

耗散戰表現在智慧化時代中物理域、資訊域和認知域的綜合對抗,體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式的高度統一,反映了智能化戰爭體系所具有的開放性、複雜性和湧現性。

適應智慧化時代的安全情勢要求。進入智慧化時代,寬網路、大數據、大模型、雲端運算、深度學習等技術快速發展,各政治集團、國家、民族之間的聯繫更加廣泛。在政治多元、經濟交織、社會開放、技術革命等多重因素作用下,非傳統安全興起並與傳統威脅交織,智能化戰爭主體和範疇不斷拓展,戰爭時間與空間不斷外延,戰爭與和平如影相隨並交織一體,戰爭體系將進一步超越局部地域限制,從相對封閉走向更加開放,形成更高層次和更大範圍的對抗。耗散戰強調智慧化戰爭體系在物理域、資訊域和認知域的綜合發力,把政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式高度統一併納入敵我對抗範疇,適應了世界安全形勢發展的時代要求。

符合戰爭形態演變的客觀法則。戰爭體系的耗散現象自戰爭產生以來便始終存在,只不過在智能化戰爭形態出現之前,由於技術的製約,一直處於較為低級的、簡單的狀態,戰爭對抗僅能表現為物質消耗、能量釋散和信息擴散中的某一種形式。農業時代,戰爭形態主要表現為以物質要素為主導的、以人體為中心的冷兵器戰爭。工業化時代,戰爭形態主要表現為以能量要素為主導的、以平台為中心的熱核兵器和機械化戰爭。在資訊化時代,戰爭形態主要表現為以資訊要素為主導的、以網信體系為中心的資訊化戰爭。進入智能化時代,智能化技術將敵我對抗中的認知優勢、決策優勢和行動優勢高度統一起來,實質是將物質、能量和資訊三者高度統一,透過以智賦能、以智聚能、以智釋能,形成了以智能要素為主導的、以智能算法為中心的智能化戰爭形態,主要表現為反映智能化戰爭體系即為反映智能化複雜體系的耗散戰。

具有堅實的哲學理論基礎支撐。社會形態是戰爭形態的母體,探索和認識智能化戰爭,必須基於歷史唯物主義和辯證唯物主義的基本原理,綜合考察戰爭形態的演進和智能化戰爭所處的社會形態,構建新的戰爭概念和語境體系。從哲學角度來看,物質、能量和資訊是構成世界的三大要素,物質體現本源的存在,能量體現運動的存在,訊息則體現連結的存在,三者遞進交替主導著社會形態和戰爭形態的演進和運作。依照辯證唯物論的否定之否定原理,在資訊時代之後的智慧時代,主導社會的要素將繼物質、能量、資訊後再次輪到物質,只不過這個物質是高度資訊化後螺旋式上升後形成的新型物質,其主要特徵就是具有了智慧化技術屬性。因此,從本質上講,耗散戰是智慧要素將以前低階戰爭形態中物質、能量和資訊的特性優勢高度統一起來,將戰爭中普遍存在的物質消耗、能量釋散和資訊擴散等形式高度統一起來,反映了智能化戰爭的典型特徵。

深刻把握耗散戰的內在要義

耗散戰基於現實世界、涵蓋虛擬世界,適應了智慧化技術快速發展、非傳統安全威脅興起、戰爭主體和範疇不斷拓展的趨勢,呈現出許多新特性。

對抗綜合博弈。隨著智慧化戰爭形態加速向更高深度和廣度發展,政治、經濟、文化、外交等領域相互聯繫和影響更具廣泛性,戰爭重心開始從軍事系統向社會系統偏移,戰爭利益攸關方的對抗將體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等多種形式的綜合博弈,追求的軍事優勢不再僅限於戰爭優勢。戰爭制勝方必須適應戰爭體系的開放性、複雜性和湧現性要求,從單一物質、能量和資訊的粗放式消耗和運用轉變到以智能優勢主導戰爭體系的耗散,力爭在多領域的綜合博弈中贏得主動和優勢。

主體跨域多元。智慧化戰爭的主體日益泛化,傳統戰爭需要動員的戰爭潛在力量將處於常態化對抗狀態。政治力量、各類機構和人員與傳統意義上在戰場廝殺的部隊和軍人一起構成戰爭的主體。多元化戰爭主體將跨越現實域和虛擬域,出現在陸、海、空、天、電、心理等多個空間域,涵蓋物理域、資訊域、認知域等,涵蓋政治、經濟、文化、外交等多類社會域。如社會平民可以用智慧型手機收集軍事戰場上的信息並傳遞給戰爭利益攸關方,造成對戰爭關鍵訊息的擴散,進而影響戰爭決策或一場戰役和戰鬥的勝敗。

力量一體富聚。虛實力量一體。圍繞著戰爭目的,一切可能運用的現實力量和虛擬力量將在智能化技術支撐下實現一體化,在平行戰場上按職履責、按規行動;有無力量一體。無人作戰力量將在經歷人工操作、人工授權、人為監督階段後,實現高度的自主性,並可與各類有人力量按需部署、按需組合,在共同的戰爭規則約束下有效協同、並行共生;多方力量一體。基於各領域的廣泛聯繫和戰爭體系的共同目的,黨政軍警民等各方力量將軍事行動與政治、經濟、外交、輿論、法理鬥爭密切配合、統一行動,形成綜合戰力。總之,在國家或政治集團的一體籌劃下,智慧化戰爭的多元參戰力量雖然物理分散,但能夠圍繞共同的戰爭目的,實現邏輯集中、即時富聚,優勢互補、一體聚優。

效能累積湧現。高階戰爭形態在具有新質技術特徵的同時,仍涵括低階戰爭形態的特徵優勢。耗散戰強調在多域持續進行綜合對抗,這既包括物質層面的彈藥、物資、器材甚至作戰人員的消耗,也包括能量層面的不斷匯集和釋放,更包括透過資訊層面的數據、知識、演算法等的擴散與融合,對人的思維認知、價值追求、道德觀念、情感意志、行為模式等產生不可限量的影響。在核武的常態嚇阻下,智慧化戰爭呈現出血腥味下降,但政治孤立、經濟封鎖、文化衝突、外交扼殺等將更加嚴峻激烈的局面。當軍事、政治、經濟、文化、外交等各系統角色持續發揮,效能累積達到某一程度,戰爭體係就會增加負熵,進而實現戰力突變和體系效能湧現,從而獲得戰爭優勢。

在選準作戰重心中打好耗散戰

智慧化戰爭體系透過對內富聚融合,對外突變湧現,跨域增效、以智耗散,達成體係作戰效能最大化,這是耗散戰蘊含的製勝機理。要在智慧化戰爭中贏得勝勢,必須明確耗散戰的作戰重心,針對對手體系短板弱點,找準戰爭準備的發力點。

著眼體系開放性,封閉孤立對手戰爭體系。截斷對手戰爭體系與外在戰場環境的物質、能量和資訊交流,使之缺乏物質、能量和資訊來源管道,逐漸走向孤立、封閉和虛弱狀態。如在戰略層面,採取政治孤立的方式,使對手戰爭體系處於孤立狀態,造成體系熵增。在戰役層面,可利用切斷資料來源、毀滅資料備份、資料作假、竄改資訊等方法,綜合採用軟硬手段,迫其戰爭體係向封閉狀態轉化,進而降低對方體系效能。

著眼體系複雜性,分域破擊對手戰爭體系。智慧化戰爭體係要素間連結越多、連結程度越緊密,體系結構可靠性就越低。運用複雜系統中各分層相對獨立的原理,可製訂戰略全局、戰役局部和戰術行動策略,實現對敵戰爭體系的分層分域破擊。如在戰略層面,採用經濟封鎖的方式,大大削弱對手的戰爭實力和發展潛力。在戰役層面,利用作戰系統通訊網路的脆弱性,以網電複合攻擊為基本路徑與手段,採用「毀端、擊元、孤群、斷網、破雲」等方式,破擊對方作戰系統結構,促使對方戰爭體系「坍塌」。

著眼體系湧現性,拆解疏散對手戰爭體系。智慧化戰爭體系只有出現突變和湧現效應,才能快速形成發揮體系效能,獲得耗散戰優勢。如果只是單一組分或要素發揮作用,不可能形成優勢湧現。可以預見,當前興起的ChatGPT等技術以及未來更高級的智能化技術,將提供理解和發現戰爭複雜體系運行行為、狀態和規律的全新思維方式,以及探知客觀規律、改造自然和社會的新手段,戰爭對抗優勢方將透過虛實結合、平行一體的對抗方式,降低對手戰爭體系的耦合度,達成拆解敵方戰爭體系的目的。

中國原創軍事資源: