All posts by admin

China Faces Challenge of Combat Interpretation of Latest US Military Information Warfare // 中國面臨美軍最新信息戰作戰解讀挑戰中國網絡戰能力

China Faces Challenge of Combat Interpretation of Latest US Military Information Warfare

中國面臨美軍最新信息戰作戰解讀挑戰

中國網絡戰能力

Soure: X

中國網絡戰

中國網絡戰能力

Reaching aspects during Chinese President Xi Jinping’s visit, the two countries to combat cybercrime and promote the development of codes of conduct in cyberspace consensus, developed a number of cooperation initiatives to maintain network security, the formation of some dispute settlement mechanism, it is intended to address global network security issues. However, the US military in cyber warfare, information warfare is a fight, and actively adjust operational concepts, organizational system, forms of organization, operational processes and information culture, accelerate the development of the field of information warfare capabilities to ensure the Navy to get in a confrontation with major combat rival China’s dominance.

First, information warfare establishment of institution-building

In 2013, the US Navy Intelligence and Communication Networks merged unit information superiority by a Deputy Minister of Naval Operations is responsible for matters related to information superiority, with seven officers and some senior civilian fleet, as well as many professionals engaged in information warfare work in the field of change exist between intelligence gathering and fleet operations during the Cold war barriers, the US Navy to ensure safe use of the network environment to support access to information among the various operations. US Navy Fleet at Fort Dmitry set up Cyber ​​Command, the merger of the former Naval Network Warfare Command in Norfolk, Virginia naval base, he served as deputy commander of the Chief of Naval Operations is responsible for the integration of capabilities and resources, is responsible for the network attack and defense, management, operation and defense of the Navy’s network, as well as other activities related to cyber war, as both the US Cyber ​​Command, the Navy branch, to provide information to the US military combat support.

In the army building, the US Navy established the first 10 Fleet responsible for information warfare, information superiority as the US Navy forces, the development and delivery of information superiority capability to support operational requirements of the US Navy and allies, has formed intelligence, surveillance and reconnaissance, full operational capacity of the network, command and control, communications, intelligence, electronic warfare, aerospace and other aspects of the transition to the information operations after the US Navy intelligence and cyber warfare important step.

From US Navy surface ships, submarines and aviation sector includes allocated funds to ensure the daily operation of the Ministry of information superiority, training, equipment and procurement, taking into account the construction and development of unmanned aerial systems and electronic warfare systems. Although electronic warfare department, said the electronic attack items (such as the next generation of jammers) transferred from the Air Operations Department to the Ministry of information superiority will weaken budgetary support for electronic attack system, but the Navy said it had recognized that strengthening the field of electronic warfare offensive the importance of strengthening investment in the field of electronic warfare.

Second, the “joint information environment” guarantee the right to information system at sea

According to the US Department of Defense in September 2013 issued a “joint information environment implementation strategies”, “joint information environment” (JIE) is by far one of the largest joint military information technology operations, with the goal of network integration within the DoD overall IT footprint and infrastructure costs of the construction of the Ministry of Defence, the “chimney” of information systems development for the flat network of dynamic information system, providing interoperability of cloud-based enterprise network infrastructure and services, reduce to ensure that the US military battlefield obtain control of information, enhance the capacity of the Ministry of Defence to deal with cyber threats in the field.

“Joint Information Environment” construction focus is to strengthen information sharing and cooperation, the establishment of enterprise-class shared security protocol for configuration standardization, optimizing the routing of data, at the time and place needed to deliver confidential voice, data and information, including almost all joint information DoD information technology work. “Joint information environment” universal, global, based on cloud properties, including network operations center, data center and cloud-based applications and services, identity management systems, based data storage and sharing capabilities cloud structure and review computer technical support, allows the use of any device to achieve the edge of the network operator, to accelerate the integration of command and control network nodes, can guarantee the daily operations and administration while reducing the cost of network operation and management.

Defense Information Systems Agency (DISA) is responsible for technical management of a joint information environment, the development of the overall architecture of the safety standards, access issues and identity management. July 2013, the US European Command in Stuttgart established its first enterprise-class Operations Center (EOC), responsible for managing the access management information environment within the Joint Command of the US system in Europe and Africa, dozens of command and control nodes under the jurisdiction of merger . In 2014, the US Pacific Command, and enterprise-class operations center in the United States have also launched joint information environment “Delta 1” have reached initial operational capability.

US Department of Defense Joint Information Environment has given a total of $ 239 million to ensure funding for the purchase of core routers, optical network equipment, fiber optic, network devices, storage devices, security tools and other infrastructure, management and maintenance of the Defense Information Systems Network. In the context of budget cuts, the US military had more dependent on commercial space field, planned in 2016 by the local company responsible for global broadband communications satellite (WGS) in daily operations. In the civil-military cooperation in space operations, DISA need to focus on the potential threat so bring, make up the vulnerability of the physical transmission layer.

Third, the face of major combat operations rivals Applications

Navy Information Warfare future construction operations targeting China and other major rivals, based on the field of cyberspace under serious threat in the Western Pacific battlefield environment construction and operation of information and operational deployment to focus on the formation of forward-deployed real deterrent. US military flexibility and emphasizes the use of reliable satellite communications, to support joint information environment physical transport layer, especially for mobile and forward-deployed forces, command and control and ISR equipment to deal with the growing threat of space.

The initial stage of “joint information environment” design applications, the US Navy had stressed in its response cyber threats using a single security architecture (SSA) to reduce the Navy’s networks “cyber attack surface,” the US military response in the face of network damage, theft data and other forms of cyber attacks, to ensure that the US military’s combat information through various channels to secure smooth transmission. If the intruder’s goal is simply to prevent or delay transmission of information, there is no need to pursue a unified security architecture and security code.

Optical Fiber Communication Security System Operation Command Decision Support System is another focus of attention Navy. Currently, 99% of international data traffic through submarine cable transmission, optical fiber communication is the US military’s “joint information environment” an important transport route for the United States to protect allies and overseas military bases of communication and contact. Naval activities is the greatest threat to the submarine cable, submarine cable on the other side of the attack is difficult to prevent, once destroyed will take a long time to repair. Therefore, the Defense Information Systems Agency “Network infrastructure requirements” (NIPR) requires operators to repair the damaged cable within three days, the US Navy underwater submarine cable project team is also responsible for the maintenance and repair tasks to ensure safe and smooth optical fiber communication .

Fourth, call our army building appropriate information warfare capabilities

Faced with aggressive information warfare against the US military posture, Chinese military information warfare must face the challenge to build offensive and defensive information warfare system. Recently, Chinese President Xi Jinping has said it will vigorously promote the revolution in military affairs, the development of “information warfare” new strategies, innovative new military doctrine to fulfill the mission requirements of the system and setup, system equipment, strategy and tactics, management mode. Specific to the field of information warfare is to aim at the US military weaknesses, focusing on the development of anti-satellite missiles, land-based electronic jamming of satellite monitoring and control, high-energy laser to attack satellites and space-based weapons killer weapons, improve the ability of information systems most vulnerable to attack opponents nodes, enhanced network integrated Defense level clouds and terminal element transport layer, dependent on the US military “joint information environment” to implement the most damaging effect, in order to gain the initiative in the local military confrontation or war.

Origianl Mandarin Chinese:

中国国家主席习近平访美期间,中美两国就打击网络犯罪、推动制定网络空间行为准则等方面达成共识,制定了维护网络安全的若干合作举措,形成了某些争端解决机制,意图共同解决全球网络安全问题。然而,美军在网络战、信息战方面正在大动干戈,积极调整作战概念、编制体制、组织形式、作战流程和信息文化,加快发展信息领域作战能力,确保海军能够在与主要作战对手中国的对抗中取得优势地位。

一、信息战编制体制建设

2013年,美国海军将情报部和通信网络部合并成立信息优势部,由一名海军作战部副部长负责信息优势相关事务,配备7名舰队军官和一些高级文职,以及众多的专业人员从事信息战领域的工作,改变了冷战时期情报搜集和舰队作战之间存在的壁垒,保证美国海军利用安全的网络环境获取信息支持各种作战行动之中。美国海军在梅德堡组建了舰队赛博司令部,合并了弗吉尼亚州诺福克海军基地的原海军网络战司令部,由负责能力和资源整合的海军作战部副部长任司令,主要负责网络进攻和防御,管理、运作和保卫海军的网络,以及与赛博作战相关的其它活动,同时作为美军赛博司令部的海军分支,向美军提供信息作战支持。

在部队建设方面,美国海军成立了第10舰队专门负责信息战,作为美国海军的信息优势部队,发展和投送优势信息能力,支援美海和盟军的作战需求,目前已经形成情报监视与侦察、网络、指挥控制、通信情报、电子战、航天等方面的完全作战能力,向信息作战转型之后成为美国海军情报和网络战的重要步骤。

美国海军从水面舰艇、潜艇和航空兵部门划拔经费,保障信息优势部的日常运行、训练、装备和采购,兼顾无人航空系统和电子战系统的建设发展。尽管电子战部门表示将电子攻击项目(如下一代干扰器)从空中作战部门转移到信息优势部将削弱对电子攻击系统的预算支持,但是美国海军表示已经认识到在电子战领域加强攻击性的重要性,加强电子战领域的投入。

二、“联合信息环境”保证海上制信息权

根据美国国防部2013年9月发布的《联合信息环境实施战略》,“联合信息环境”(JIE)是美军迄今为止最大的联合信息技术行动之一,其目标是在国防部范围内进行网络一体化化建设,将“烟囱式”的信息体系发展为扁平网络化的动态信息体系,提供互联互通的基于云的网络基础架构和企业级服务,减少国防部整体的信息技术占用空间和基础设施成本,确保美军获得战场制信息权,提高国防部应对赛博领域威胁的能力。

“联合信息环境”的建设重点是加强信息共享和合作,建立企业级的共享安全协议,实现配置标准化,优化数据路由,在需要的时间和地点交付保密的语音、数据和情报,包括了几乎所有的国防部信息技术工作的联合信息。“联合信息环境”具有通用性、全球性、基于云的特性,包括网络作战中心、数据中心和基于云应用程序和服务的身份管理系统,提供基于云结构的数据存储和共享能力和可回顾的计算机技术支持,允许使用任何设备实现边缘网络操作,加速网络指挥与控制节点的融合,能够保障作战行动和日常行政管理,同时减少网络运行管理成本。

国防信息系统局(DISA)负责联合信息环境的技管理,制定整体架构中的安全标准、准入问题和身份管理等。2013年7月,美军欧洲司令部在斯图加特建立了首个企业级作战中心(EOC),负责管理美国欧洲和非洲司令部内联合信息环境系统的访问管理,合并下辖的几十个指挥和控制节点。2014年,美军太平洋司令部和美国本土的企业级作战中心也相继展开,联合信息环境“增量1”陆续达到初始作战能力。

美国国防部对联合信息环境建设给予了总计2.39亿美元的经费保证,用于采购核心路由器、光网设备、光纤、网络设备、存储设备、安全工具等基础设施,管理维护国防信息系统网。在预算削减的背景下,美军不得不更加倚重商业空间领域,计划在2016年由地方公司负责宽带全球通信卫星(WGS)的日常运营。在军民合作的空间运营中,DISA需要关注因此带来的潜在威胁,弥补物理传输层的脆弱性。

三、面对主要作战对手展开作战应用

美国海军未来信息战建设瞄准中国等主要作战对手,立足赛博领域严重威胁下的西太平洋战场,进行信息环境建设运营和作战部署,以前沿部署为重点形成现实威慑。美军强调使用弹性和可靠的卫星通信,支持联合信息环境物理传输层,特别是对机动和前沿部署的部队、指挥控制和ISR装备,应对日益增加的空间威胁。

“联合信息环境”设计应用的最初阶段,美国海军就强调以其应对赛博威胁,利用单一安全架构(SSA)减少海军网络面临的“赛博攻击面”,应对美军面对的网络破坏、窃取数据等多种形式的赛博攻击,保证美军的作战信息通过各种渠道安全通畅地传输。如果入侵者的目标只是阻止或迟滞信息传输,就没有必要追求统一的安全架构和保密码。

作战指挥辅助决策系统的体系结构光纤通信安全是美国海军关注的另一个重点。目前,99%的国际数据通信通过海底光缆传输,美军的光纤通信是“联合信息环境”的重要传输途径,用来保障美国本土与盟国和海外军事基地的通信联络。舰艇活动对是海底光缆的最大威胁,对方的对海底光缆的攻击很难防范,一旦遭到破坏需要很长时候修复。因此,国防信息系统局的“网络基础设施需求”(NIPR)要求运营商在3天之内修复受损光缆,美国海军水下工程队也担负海底光缆的维护和抢修任务,保证光纤通信安全顺畅。

四、呼唤我军建设相应的信息战能力

面对美军咄咄逼人的信息战对抗姿态,中国军队的信息战也要直面挑战,建设攻防兼备的信息战体系。日前,习近平主席已经表示中国将大力推进军事变革,制定“信息化战争”新战略,创新履行使命要求的新的军事理论、体制编制、装备体系、战略战术、管理模式。具体到信息作战领域,就是要瞄准美军弱点,重点发展反卫星导弹、陆基电子干扰卫星测控、高能激光攻击和天基卫星武器等杀手锏武器,提高攻击对手信息系统最脆弱节点的能力,增强网络云和终端元件传输层的综合攻防水平,对美军依赖的“联合信息环境”实施最大效应的破坏,才能在军事对抗或局部战争中占据主动。

US Cyber ​​Command established to respond to future cyber war // 美軍建立網絡司令部應對未來網絡戰爭

US Cyber ​​Command established to respond to future cyber war //

美軍建立網絡司令部應對未來網絡戰爭

四星上将基斯·亚历山大将出任美国网络司令部的首位司令员

From Zhuhai Security Bureau, People’s Republic of China

May 21, 2010, the US Department of Defense announced that in order to fight hostile countries and hacker attacks, the US Cyber ​​Command was officially launched. The US Air Force Combat Command and the same level of the unit by a former intelligence officer Alexander Keith four-star general in charge. As early as June last month, US Defense Secretary Robert Gates ordered the formation of Cyber ​​Command, after a year of preparation, Cyber ​​Command is now fully operational. This initiative of the US, indicating that the network will be an important piece of the future war position, “cyberwarfare” This unconventional war will be inevitable.

US forces have been brewing for a long time

  The United States as a global network of organizers, was the first country to apply real network, the establishment and operation of its network warfare units already brewing for some time, media reports from the outside world can be roughly about 12.

  First, conventional offensive and defensive team growing. According to the US cyber war years of defense experts Joel Harding assessment, the US Department of Defense has more than 15,000 computer networks in more than 4,000 military bases in 88 countries and regions, a total of more than 5,000 information warfare specialists, 5 ~ 70,000 soldiers involved in cyber warfare, coupled with the original electronic warfare officer, the number of American combat troops should be in the network of about 88700 people, which means that the number of US network warfare units have been the equivalent of 7 101 airborne division, as the network commander establishing unit, I believe that this figure will surge. This force must not only bear the task of network defense, other countries will also network and electronic systems for covert attacks, the United States access to a variety of intelligence information needed, and can quickly invade the enemy in wartime network system paralyzed the enemy command networks and electronic weapons systems.

Second, the unified command superior forces continue to integrate. Currently, the US network warfare units formed by relatively scattered, the armed forces have a certain strength, and has long competition for the services network warfare dominance, competition has been fierce. Such as: in 2002 in Virginia, Naval Network Warfare Command was established, the preparation of 60 people, the Navy Fleet Command Information Warfare Center worldwide, Navy networks and space operations and the Navy Command, computer network defense commando teams cyber warfare units 7,000 officers and men. US Air Force Network Warfare Command Territories 4 NWW, including the famous 67th NWW. The wing has five intelligence brigade, 35 Intelligence Squadron, a total of more than 8000 soldiers, resident in more than 100 locations worldwide, personnel and equipment throughout the “other continents except Antarctica.” US Army from July 2008 officially launched the construction of army battalions network, currently distributed network operations personnel in Iraq, Afghanistan and other places, to assist the local US network warfare activities, cyber warfare experts have thousands of people. Now, the formal establishment of Network Warfare Command, these advantages is to be effective and reasonable integration of forces, the US network warfare units to improve the organizational system, to achieve a high degree of unity of command and management, improve the operational effectiveness.

The third is capable of practical tactics and equipment continue to improve. US troops have been developed more than 2,000 kinds of computer viruses weapons, such as “logic bombs” and “trap door”, etc., hardware, electromagnetic pulse bombs, infrasound weapon system, the kinetic energy interceptor and high-power microwave weapons, other countries can network physical attack vector. According to reports, the US military in 2008 bombed a facility in Syria, on the use of an airborne system, airborne invasion by the enemy and operate network sensors, so that the loss of the enemy early warning function. Over the years, the US military cyber warfare tactics and constantly enrich and improve, from the media point of view, the early offensive tactics “backdoor”, “bomb attack”, in recent years has studied the “botnet”, “cast a wide net” and other . Thus, it is easy to see the US network warfare units “tip of the iceberg”, and its emphasis on cyberwarfare.

Inspiration

US Cyber ​​Command to build us a profound revelation. We should speed up the pace of global military development to adapt to, and actively play and use network advantages, strengthen the network supervision and active defense, to build a network can attack and defend the shield.

A revelation: to clarify understanding. In recent years, not only the United States established a Cyber ​​Command, several countries Israel, Russia, Britain, Germany, France, Japan, South Korea and India have been established or are planning to set up a network command system and mechanisms of war. Allegedly, Taiwan in early 2001 formally established what is known as “Tiger Force” network information warfare units, the main task is to sneak through the network related sites, to collect all kinds of confidential information and intelligence collection and development of various secret computer virus, to create “electronic bomb” attack the target network. Faced with serious challenges, we can only turn pressure into motivation, the real renew our concept, calm response, rapid response, to explore with Chinese characteristics cyberspace to victory as soon as possible.”Scholars Sushi, fitters who cares Junjie,” the army as mighty undefeated division, should be thought of cyberwarfare have a clear understanding of height, to a set of effective countermeasures, have a professional reliable team to adapt to new changes in the new military confrontation in the new situation.

Revelation II: build a strong foundation. Anti-sense of confidentiality between laws and regulations and information security officers are doing the work of the foundation. Really good job between anti-army under the condition of information security work, and the headquarters of the Central Military Commission has formulated a series of laws and regulations of confidentiality from the “People’s Liberation Army Secrets Act” and “the rule of confidentiality ’10 allowed ” to ‘prevention crime Ordinance, “” military computers connected Internet regulations, “and” military regulations on the Internet, “and” strictly guard against network leak ‘ten ban,’ “and so on. Currently, the regulations should integrate our military resources, to build full list of information security regulations, while increasing by between anti-secrecy, to guide the officers and men “correct knowledge network, regulate online” really lay a solid foundation of information security from the end.

Revelation 3: Aggregate talent. In recent years, the CIA and the military attaches great importance to cultivate high-tech talent, and even recruit hackers for their own use, constantly stealing his country’s secret and are ready to do the vanguard of conventional forces, to combat damage other network systems. US National Defense University military historian Daniel Kool noted that the Pentagon’s interest in cyber warfare has reached a degree of “religious fanaticism” in this frenzy, groups of hackers amnesty, are trained to the new professional military hackers. Reserve personnel is a necessary condition to deal with high-tech development, at present, we should actively search for network technicians to build a formal, professional, the strength of the team to respond to current and future needs of the network security cyber war.

Inspiration Four: to strengthen the defense. “Art of War” said: “No it does not rely just sit on there is also pending; it does not rely attack, something I can not rely attack also.” Strong defense against foreign invasion is the most effective means of building a solid sturdy defense can keep the enemy thousands of miles away, which rely on the continuous development of network technology and improve. We should therefore innovation in the development of advanced and useful technology network protection efforts, as I hold up an umbrella network system to ensure the safety and combat consolidated.

Revelation five: as active. Although the US Department of Defense stressed that the main task of Cyber ​​Command is defensive operations, but its covert intelligence to steal his country under the surface rhetoric, his country’s intention to attack the essence of network information system, has long been self-evident. During the Iraq war, Iraq top-level domain “.iq” application and analytical work is terminated America, all URLs with “.iq” suffix from the Internet site all evaporated in the Internet can not see any information from Iraq, which the US military quickly and efficiently to win the war in Iraq provides an important prerequisite. Information age, cyber warfare has become a “bear the brunt, full use” in the true sense of the style of warfare, to national security has brought new and unprecedented challenges, we want to provide intellectual support for the safe and stable development of the country and the army, in order to conventional war wartime to provide “security win” a prerequisite for the battle ill-prepared to deal with future networks.

Original Mandarin Chinese:

四星上将基斯·亚历山大将出任美国网络司令部的首位司令员

2010年5月21日,美國國防部對外宣布,為了打擊敵對國家和黑客的網絡攻擊,美軍網絡司令部正式啟動。這一與美空軍作戰司令部平級的單位,由情報軍官出身的四星上將基斯·亞歷山大執掌。早在去年6月,美國防部長羅伯特·蓋茨就下令組建網絡司令部,歷經一年的籌備,網絡司令部現已全面開始運轉。美軍的這一舉措,預示著網絡將是未來戰爭中的一塊重要陣地,“網絡戰”這種非常規戰爭將在所難免。

美軍此舉已醞釀多時

美國作為全球網絡化的組織者,是最早將網絡運用於實戰的國家,其網絡戰部隊的建立與運轉早已醞釀多時,從外界媒體的報導大致能夠了解一二。
一是攻守兼備的常規隊伍不斷增強。根據研究美軍網絡戰多年的防務專家喬爾·哈丁評估,美國國防部在全球88個國家和地區的4000多個軍事基地內擁有超過1.5萬個電腦網絡,共有5000餘名信息戰專家,5 ~7萬名士兵涉足網絡戰,再加上原有的電子戰人員,美軍網絡戰部隊人數應該在88700人左右,這意味著美軍網絡戰部隊人數已相當於7個101空降師,隨著網絡司令部的建立,相信這個數字還將激增。這支部隊不但要承擔網絡防禦的任務,還將對別國的網絡和電子系統進行秘密攻擊,獲取美國所需要的各種情報信息,並能在戰時迅速侵入敵方網絡系統,癱瘓敵方的指揮網絡和電子武器系統。
二是統一指揮的優勢力量不斷整合。當前,美軍所形成的網絡戰部隊相對比較分散,在海陸空三軍都有一定的力量,而且長期以來各軍種為爭奪網絡戰的主導權,一直競爭激烈。如:於2002年在弗吉尼亞州成立的海軍網絡戰司令部,編制60人,指揮全球範圍內的海軍艦隊信息戰中心、海軍網絡和太空行動司令部及海軍計算機網絡防禦特攻隊等網絡戰單位的7000名官兵。美空軍網絡戰司令部管轄4個網絡戰聯隊,包括大名鼎鼎的第67網絡戰聯隊。該聯隊有5個情報大隊、35個情報中隊,總計超過8000名官兵,駐地分佈在全球100多個地點,人員和裝備遍及“除南極洲之外的其他大陸”。美陸軍從2008年7月正式啟動陸軍網絡作戰營建設,目前網絡戰人員分佈在伊拉克、阿富汗等地,協助當地美軍進行網絡戰活動,擁有的網絡戰專家也達數千人。現在,正式成立網絡戰司令部,就是要將這些優勢力量進行有效合理的整合,來完善美軍網絡戰部隊的建制,實現指揮和管理的高度統一,提高作戰效能。
三是精幹實用的裝備戰法不斷完善。美軍現已研製出2000多種計算機病毒武器,如“邏輯炸彈”和“陷阱門”等,硬件方面,有電磁脈衝彈、次聲波武器系統、動能攔截彈和高功率微波武器,可對別國網絡的物理載體進行攻擊。據報導,美軍在2008年轟炸敘利亞某設施時,就使用了一種機載系統,通過空降侵入並操作敵方網絡傳感器,使敵方喪失預警功能。這些年,美軍網絡戰戰術不斷豐富和完善,從媒體報導來看,早期的進攻戰術有“後門程序”、“炸彈攻擊”等,近年來又研究了“殭屍網絡”、“廣泛撒網”等。由此,不難看出美軍網絡戰部隊的“冰山一角”,及其對網絡戰的重視程度。

幾點啟示

美軍建立網絡司令部給我們帶來了深刻的啟示。我們應加快適應世界軍事發展的步伐,積極發揮和利用網絡優勢,加強對網絡的監管和主動防禦,構建可攻可守的網絡盾牌。
啟示一:釐清認識。近年來,不僅美國建立了網絡司令部,以色列、俄羅斯、英國、德國、法國、日本、韓國、印度等多個國家都已經建立或正在籌劃建立網絡戰爭的指揮體系和機制。據稱,台灣也早在2001年就正式建立了被稱為“老虎部隊”的網絡信息戰部隊,主要任務就是通過網絡潛入相關網站,蒐集各種機密信息與情報,秘密收集與研發各種電腦病毒,製造“電子炸彈”攻擊目標網絡系統。面對嚴峻挑戰,我們唯有變壓力為動力,真正解放思想、更新觀念、冷靜應對、迅速反應,盡快探索出有中國特色的網絡空間制勝之道。 “儒生俗士,識時務者,在乎俊傑”,我軍作為威武不敗之師,應從思想上對網絡戰有高度清晰的認識,要有一套行之有效的應對之策,要有一支專業的可靠隊伍,以適應新軍事對抗中的新情況新變化。
啟示二:築牢根基。法規制度和官兵的防間保密意識是做好信息安全工作的根基。為切實做好信息化條件下我軍防間保密工作,軍委和總部先後製定出台了一系列保密法規制度,從《中國人民解放軍保密條例》及“保密守則’十不准’”,到《預防犯罪工作條例》、《軍隊計算機連接國際互聯網管理規定》以及“軍人上互聯網的規定”,再到“嚴密防範網絡洩密’十條禁令’”等。當前,應當整合我軍法規資源,構建完整齊備的信息安全保密法規體系,同時通過加大防間保密教育,引導官兵“正確識網、規範上網”,真正從末端打牢信息安全的根基。
啟示三:聚合人才。近年來,美國中央情報局及軍方非常注重培養高科技人才,甚至招募黑客為自己所用,不斷竊取他國秘密並隨時準備為常規部隊做好先鋒隊,打擊破壞對方網絡系統。美國國防大學軍事史專家丹尼爾·庫爾指出,五角大樓對於網絡戰的興趣已經達到了“宗教狂熱”的程度,在這種狂熱下,一批批黑客被招安,被訓練成新的專業軍事黑客。人才的儲備是應對高科技發展的必要條件,當前,我們應積極搜尋網絡技術人才,構建一支正規、專業、有實力的隊伍,以應對現在網絡安全防範和未來網絡戰爭的需求。
啟示四:加強防禦。 《孫子兵法》曰:“無恃其不來,恃吾有以待也;無恃其不攻,恃吾有所不可攻也。”堅強的防範是抵禦外侵最有效的手段,築實一條堅固的防線可以御敵於千里之外,這就要靠網絡技術的不斷發展和提高。因此,我們應當在自主創新研發先進、有用的網絡防護技術上下功夫,為我網絡系統撐起一把保護傘,確保安全和戰鬥力鞏固。
啟示五:主動作為。雖然美國防部強調網絡司令部的主要任務是防禦作戰,但是其隱蔽於表面辭藻之下的竊取他國情報、攻擊他國網絡信息系統的實質意圖,早已不言自明。伊拉克戰爭期間,伊拉克頂級域名“.iq”的申請和解析工作被美國終止,所有網址以“.iq”為後綴的網站全部從互聯網蒸發,在互聯網無法看到來自伊拉克的任何信息,這為美軍迅速高效打贏伊戰提供了重要前提。信息化時代,網絡戰已經成為真正意義上的“首當其衝、全程使用”的作戰樣式,給國家安全帶來了嶄新的、空前的挑戰,我們要為國家和軍隊的安全穩定發展提供智力支撐,為戰時的常規戰爭提供“保打贏”的先決條件,為應對未來網絡攻防戰做足準備。

 

Original Source X

Russian cyberwarfare the “people’s war” in cyberspace an important battleground // 中國軍方認為俄軍網絡戰擅長打”人民戰爭” 網絡空間成重要戰場

中國軍方認為俄軍網絡戰擅長打”人民戰爭” 網絡空間成重要戰場

Russian cyberwarfare the “people’s war” in cyberspace an important battleground 

俄羅斯網絡戰爭

2016年03月11日

Information war era, control of information warfare is the first to compete. Network warfare from soft kill to the physical destruction of its implementation hidden, accurate, rapid, controllable, and low cost but high return, both offensive and defensive, with the political war, diplomatic warfare, economic warfare, media warfare, psychological warfare, and other non-legal battle be combined with military means, it is possible to obtain the effect of traditional military means difficult to obtain.

Russia attaches great importance to network warfare troops, the Russian military will “Network Attack” treated as equivalent to fire assault combat style. In 2007 the Red Army statue in Estonia event, the 2008 Russia – Georgia war in 2014, the crisis in Crimea and eastern Ukraine, and in 2015 the Turkish warplanes shot down Russian event, cyberspace is an important battleground.

Today, cyberspace is the most important way to disseminate information, interconnection of the global information network and expand the connotation of the national security interests of the extension. Russia attaches great importance to information security and network security closely related, that the social stability, civil rights, freedom and democracy, order and the rule of law, the wealth of nations, territorial integrity, depends largely on information and network security.

Putin pointed out many times, information resources and political and economic infrastructure plays a decisive role for the country’s future, vital interests and security, we must be prepared to deal with the threat of information, enhance the related infrastructure facilities, especially the strategic defense capabilities information warfare and cyber warfare have been used in various countries to achieve military and political objectives, its power is even greater than conventional weapons.

Russia’s new “National Security Strategy” to enhance the status of network warfare

Russia’s new “National Security Strategy” that the global fight against big nowadays between countries, to take a more “indirect” route, the West provoked Russia’s domestic political turmoil, rise to social conflicts, to impose economic and financial sanctions, support for separatism, nationalism, religious extremism and the local armed forces, the network is one of the main tools.

Russian more use of “information warfare” that term. Information warfare includes intelligence and counter-intelligence, information deception, electronic warfare, communications interference, and navigation warfare, psychological warfare, computer sabotage warfare. Under conditions of modern warfare, information warfare is to ensure the effectiveness of nuclear deterrence, accounting basis against conventional superiority, and network warfare capability is the core of information warfare.

By using a network of weapons of mass repression, civil disturbance or military command, communications system, has become an important part of modern local wars and armed conflicts. Information warfare is not only used by the military for countries, extremist and terrorist organizations are also widely used.

As we all know, Russia’s implementation of the “strategy of containment” strategy and “nuclear deterrence” to “containment strategy” of the highest priority, which is a realistic choice based on its own strength and the international balance of power, but Russia also believes that the prevention of external armed conflict, nuclear deterrence is not always effective in preventing internal conflicts, nuclear deterrence is completely ineffective.

In recent years, many cases of local wars and armed conflicts exhibit remarkable feature is their integrated use of military and non-military means, against the extensive use of information and network attack and defense, in order to achieve military and political objectives. Russia’s new “military doctrine” Emphasizing and enhancing the “non-nuclear containment” status and role in the “containment strategy” in, and information warfare and network warfare capability is an important part of non-nuclear containment capability.

In North Africa and the Middle East countries “color revolutions”, the social networks are the primary means of insurgent groups and proliferation.”Color Revolution” in these countries caused internal conflicts, upgrade to bloodshed and armed conflict, bring down the government, to the detriment of national sovereignty and territorial integrity. Russia’s new “military doctrine” that, in the foreseeable future, Russia is also facing the same danger.

Russia’s new “military doctrine” that, in order to ensure national security and military, against the West in the field of information and ideological offensive penetration, Russia will closely follow the development of information and network technology, to take concrete measures to continuously improve and upgrade the national and military information infrastructure, defense and protection.

Cyberwar is “hybrid war” major combat style

Russia’s actions in Crimea crisis in eastern Ukraine dispute, the distinction between military and non-military actions indistinguishable from conventional and unconventional means integrated use, combines formal and informal style of warfare, and there are large conventional war the difference between this style of warfare by NATO military experts called “hybrid war.”

Mixing the war, through the adoption of small-scale military actions have a decisive effect, with the use of non-military means of diplomacy, energy, economy, network, etc., is applied to the other decision-makers as well as people with physical, practical information can affect the feelings of the other party’s leadership shake the confrontation will thus reach a political purpose of war.

In a mixed war, cyber attacks can give each other military and civilian targets causing destruction of hard and soft, reducing resistance in one’s own military operations. Disseminate targeted information on the network, international and domestic public opinion, create favorable conditions for political, military, diplomatic and economic struggle.

Russia in Syria against ISIS military operations, always firmly occupy the moral high ground, using the Internet to play the battle of public opinion, uphold justice of military operations, effective impact of the international community, national and public opinion to the relevant country to obtain an international community support, reducing the opposition, with the network consensus warfare effective military operations.

Russia fears NATO NATO war will be mixed for the surrounding, especially in the frontier with Russia against the Baltic States. Latvian Defense Minister Weiyuenisi believe that the first phase of hybrid warfare is information warfare, information and network attacks. In 2007, the Estonian government agencies and banks suffered large-scale cyber attacks, Russia was accused launched the attacks. In recent years, large-scale NATO exercises held in the Baltic region, will be “defensive cyber attacks” as a drill subjects, Estonia NATO also established a network warfare command center.

Russia and the United States, between NATO, the possibility of the outbreak of conventional war and nuclear war in the foreseeable future is extremely small, the two sides are also no such intention. But the Russian mixed war can solve political consultations between the military and control them better grasp of the US and NATO “without splitting” the propriety, while it also makes NATO’s collective defense mechanism is not the focal point.

In recent years, Russia has accumulated rich experience in cyber warfare

Like other fighting styles, including network warfare offensive and defensive aspects. Russia is facing a severe situation of network security, in fact, almost all of the information networks in developed countries the situation is the same, and, along with social development and technological progress, the network security situation also deteriorated sharply.

According to the Russian Federal Security Bureau statistics, since 2005, the Russian State authorities has been the site every year nearly 100 million times attacks, the President, the State Duma, strong institutions, banks and other sites is the focus of attack.

In the early 1990s, Russia on the establishment of a committee responsible for information security of network information security. In 1995, the information security management be included in the scope of national security of Russia, Russia has also promulgated the “Russian Federation information, information technology and information networks Protection Act.” In 2002, the Information Security Committee passed the “Information Security Doctrine of the Russian Federation”, put forward the guiding principles for information security.

In 2011, the International Convention on the Russian initiative to develop behavioral norms in cyberspace – “ensuring international information security”, which defined the network security threats and the precautionary principle, proposed a ban on the use of networking and communications technology interfere in internal affairs. The initiative with the US network strategy there is a big difference, so by the US boycott.

The following year, the Russian Armed Forces Chief of Staff Makarov said that in the development of the concept of cyber war, which Russia must be evaluated in order to respond to threats and challenges of Western military powers in the field of network to bring, preparing for cyber warfare. Russian military will focus on the development of network offensive and defensive capabilities, network-building combat power, with the ability to network deterrence, war methods and other research networks.

In 2013, Russian security forces set up the network, one year after the establishment of Network Warfare Command. In more than local wars and armed conflicts, the Russian military has accumulated a wealth of practical experience in the network, with a strong network reconnaissance and anti-reconnaissance, network penetration and reverse osmosis, network attacks and sabotage mental capacity, with advanced logic bomb network warfare weapons.

 Network warfare is combat system, requires the participation and collaboration of relevant sectors of society, Network Warfare Command and the network more combat troops is a leadership, guidance, mobilize and organize the action. Russia has a large number of hackers, software elite and many famous high-tech companies, if necessary, can quickly mobilize a network army, playing the “people’s war” in a space on the network, more than its power in local wars and armed conflicts It has been fully demonstrated.

Compared to land, sea, air, space, power and other battlespace, benefiting from the growing popularity of the global information network, tactics and enter the “threshold” cyberwar almost the lowest and technically distinct “latecomer” characterized in the short term there may be a breakthrough in one area, the formation of “asymmetric” advantage.

Russian conform to the form of war and military technology trends, strengthen capacity building in information warfare as the core network warfare, when participating in the surrounding local wars and armed conflicts, the combat cyber warfare as a supplement to traditional style, is an alternative to strengthen even battlefield While reducing the smoke, but the combat efficiency has increased, and more conducive to shorten the course of the war and to promote a political settlement of the conflict.

Original Mandarin Chinese:

俄羅斯網絡戰爭

信息化戰爭時代,制信息權是戰爭中首先要爭奪的。網絡戰從軟殺傷到物理摧毀,其實施隱蔽、精確、迅速、可控、成本低但回報高、攻防兼備,可與政治戰、外交戰、經濟戰、輿論戰、心理戰、法律戰等非軍事手段結合進行,能夠獲得傳統軍事手段難以取得的效果。

俄羅斯軍隊極為重視網絡戰,俄軍將“網絡突擊”視作等同於火力突擊的作戰樣式。 2007年愛沙尼亞紅軍銅像事件、2008年俄羅斯-格魯吉亞戰爭、2014年克里米亞和烏克蘭東部地區危機以及2015年土耳其擊落俄軍戰機事件,網絡空間都是重要戰場。

如今,網絡空間是最重要的信息傳播途徑,互聯互通的全球信息網絡擴展了國家安全和利益的內涵、外延。俄羅斯非常重視信息安全以及與其密切相關的網絡安全,認為社會穩定、公民權利、自由民主、秩序法制、國家財富、領土完整等,很大程度上取決於信息和網絡安全。

普京多次指出,信息資源和基礎設施對政治和經濟起決定性作用,對國家前途、利益和安全至關重要,必須做好準備應對信息威脅,提升對相關基礎設施尤其是戰略性設施的防護能力,信息戰和網絡戰已被各國用於達成軍事和政治目的,其威力甚至會大於常規武器。

俄新版《國家安全戰略》提升網絡戰地位

俄新版《國家安全戰略》認為,當今全球性大國之間的對抗,多采取“間接”路線,西方挑起俄國內政治動盪,激發社會矛盾,實施經濟和金融制裁,支持分裂主義、民族主義、極端宗教主義和地方武裝,網絡是主要工具之一。

俄軍更多的使用“信息戰”這一術語。信息戰內容包括情報和反情報、信息​​欺騙、電子戰、通信干擾、導航戰、心理戰、計算機破壞戰等。現代戰爭條件下,信息戰能力是保證核威懾有效性、佔據常規對抗優勢的基礎,而網絡戰能力是信息作戰的核心。

通過大規模使用網絡武器壓制、干擾民用或軍用的指揮、通訊體系,成為現代局部戰爭和武裝衝突的重要內容。信息戰不僅為各國軍隊使用,也被極端和恐怖主義組織廣泛使用。

眾所周知,俄羅斯實施“戰略遏制”戰略,並將“核遏制”置於“戰略遏制”的最高優先權,這是基於自身實力和國際力量對比的現實選擇,但同時俄羅斯也認為,在防止外部武裝衝突中,核遏制並不總是有效的,而在防止國內衝突中,核遏制則完全無效。

近年來的多起局部戰爭和武裝衝突呈現出的顯著特徵就是它們綜合運用軍事和非軍事手段,大量採用信息對抗和網絡攻防,以達成軍事和政治目的。俄新版《軍事學說》強調,提高“非核遏制”在“戰略遏制”中的地位和作用,而信息戰和網絡戰能力是非核遏制能力的重要組成部分。

在北非和中東一些國家的“顏色革命”中,社交網絡是暴亂組織和擴散的主要手段。 “顏色革命”造成這些國家國內矛盾激化,升級為流血和武裝衝突,導致政府垮台,進而損害國家主權和領土完整。俄新版《軍事學說》認為,在可預見的將來,俄羅斯也面臨同樣的危險。

俄新版《軍事學說》指出,為保證國家和軍事安全,對抗西方在信息以及意識形態領域的進攻滲透,俄將密切跟踪信息和網絡技術的發展,採取具體措施,不斷完善、升級國家和軍事信息基礎設施的防禦體系和防護能力。

網絡戰是“混合戰爭”的主要作戰樣式

俄羅斯在克里米亞危機、烏克蘭東部爭端的行動中,軍事和非軍事行動的界限難以區分,常規和非常規手段綜合使用,融合了正規和非正規的作戰樣式,與傳統戰爭存在著較大區別,這種作戰樣式被北約軍事專家稱為“混合戰爭”。

混合戰爭中,通過採取具有決定性效果的小規模軍事行動,配合使用外交、能源、經濟、網絡等非軍事手段,施加給對方決策層以及民眾以切實可感受的物質、信息影響,動搖對方領導層的對抗意志,進而達成戰爭的政治目的。

在混合戰爭中,網絡攻擊可給對方軍事和非軍事目標造成軟硬殺傷,減少己方在軍事行動中的阻力。在網絡上傳播有針對性的信息,可影響國際國內輿論,為政治、軍事、外交和經濟鬥爭創造有利條件。

俄在敘利亞打擊ISIS的軍事行動中,始終牢牢佔據道義高地,利用網絡大打輿論戰,堅持軍事行動的正義性,有效影響了國際社會、本國和相關國家的輿論走向,從而獲得了國際社會支持,減少了反對聲音,網絡輿論戰有效配合了軍事行動。

北約擔憂俄羅斯會將混合戰爭用於周邊的北約成員國,尤其是處在與俄對抗前沿的波羅的海國家。拉脫維亞國防部長維約尼斯認為,混合戰爭的第一階段是信息戰、宣傳和網絡攻擊。 2007年,愛沙尼亞政府機構和銀行遭受大規模網絡攻擊,俄羅斯被指控發動了此次網絡攻擊。近年來,北約在波羅的海地區舉行的大規模演習中,都將“防禦網絡攻擊”作為演練課目,北約還在愛沙尼亞設立了一個網絡戰指揮中心。

俄與美國、北約之間,在可預見的將來爆發常規戰爭和核​​戰爭的可能性極小,雙方也都無此意願。但俄進行混合戰爭,可在軍事解決與政治磋商之間進退自如,更好地把握與美國和北約“鬥而不破”的分寸,同時,這也使得北約的集體防禦機制沒有著力點。

俄近年來積累了豐富的網絡戰經驗

如同其他作戰樣式一樣,網絡戰也包括進攻和防禦兩個方面。俄羅斯面臨著嚴峻的網絡安全形勢,事實上,幾乎所有信息網絡發達國家的處境都是一樣的,而且,隨著社會發展和科技進步,網絡安全形勢還在急劇惡化。

據俄聯邦安全局統計,自2005年以來,俄國家機關網站每年都會遭到近100萬次網絡攻擊,總統、國家杜馬、強力機構、銀行等網站是攻擊重點。

早在20世紀90年代初,俄就設立了專門負責網絡信息安全的信息安全委員會。 1995年,信息安全被納入俄國家安全管理範疇,俄羅斯還頒布了《俄聯邦信息、信息化和信息網絡保護法》。 2002年,信息安全委員會通過了《俄聯邦信息安全學說》,提出了保障信息安全的指導原則。

2011年,俄羅斯倡議制定規範網絡空間行為的國際公約——《保障國際信息安全》,其中,明確了網絡安全威脅及其防範原則,提議禁止利用網絡和通信技術干涉別國內政。該倡議與美國網絡戰略存在較大分歧,因此受到美國抵制。

次年,俄武裝力量總參謀長馬卡羅夫表示,網絡戰爭的概念在發展,俄須對此進行評估,以應對西方軍事強國在網絡領域帶來的威脅和挑戰,為網絡戰做準備。俄軍將重點放在了發展網絡攻防能力、建設網絡作戰力量、具備網絡威懾能力、研究網絡戰戰法等。

2013年,俄軍組建網絡安全部隊,一年後成立網絡戰司令部。在多場局部戰爭和武裝衝突中,俄軍積累了豐富的網絡實戰經驗,具備較強的網絡偵察與反偵察、網絡滲透與反滲透、網絡心理攻擊和網絡破擊能力,擁有邏輯炸彈等先進的網絡戰武器。
網絡戰是體係作戰,需要社會相關部門的參與和協作,網絡戰司令部和網絡作戰部隊更多是起到領導、引導、動員和組織作用。俄羅斯擁有大量的黑客、軟件精英和許多著名的高技術公司,一旦需要,可迅速動員起一支網絡大軍,打一場網絡空間上的“人民戰爭”,其威力在多場局部戰爭和武裝衝突中已經充分展示。

相比陸、海、空、天、電等戰場空間,受益於日益普及的全球信息網絡,網絡戰的技戰術和進入“門檻”幾乎是最低的,且在技術上具有鮮明的“後發”特徵,短期內有可能在某一領域取得突破,形成“不對稱”優勢。

俄軍順應戰爭形態和軍事科技發展趨勢,大力加強以網絡戰為核心的信息戰能力建設,在參與周邊局部戰爭和武裝衝突時,將網絡戰作為傳統作戰樣式的補充、加強甚至是替代,戰場上的硝煙雖然減少了,但作戰效能卻提高了,且更有利於縮短戰爭進程和促進衝突的政治解決。

Source: 中國青年報

Cyberspace Adminstration of China: Strategic High Ground of Information Warfare: spatial information confrontation // 中央網絡安全和信息勇空間管理空間信息對抗:信息化戰爭的戰略制高點

中央網絡安全和信息勇空間信息對抗:信息化戰爭的戰略制高點

中央網絡安全和信息勇

2015年06月15日

中國網絡空間管理

    All things Internet era, we must rethink the current and future military struggle in the forefront of what? We are talking about local information technology local war where? Information War made the strategic high ground right where?

All things Internet era, control of information has become the battlefield to win the right to the core of an integrated system, “no network without fighting,” “no victorious day” has become iron law, spatial information system for winning the right to become a strategic war to safeguard national sovereignty, security and development interests ground. It extends to the battlefield where, where the initiative will expand the competition. The main countries in the world attach great importance to and respond to threats and challenges from outer space, the space around the right to development, ownership and control, in a fierce competition.

    Spatial information against a new means of strategic deterrence quality checks and balances

Spatial information can play against fighting the enemy afraid, Gongdi key is a new means of strategic deterrence quality of checks and balances. On the one hand, with a strong spatial information attack capability, can effectively curb space power, space to defend the sovereignty, enhance the right to speak and the initiative in the international arena; on the other hand, has enough spatial information defense, deterrence and containment can launch the Iraq war opponents button, effectively resist the threat and destruction in outer space, to prevent loss of control of the space.

The United States will “Space confrontation” as a strategic deterrent capability and the “Global Strike” and “nuclear strike” both, and since 2001 has performed seven times, “Schriever” space combat computer simulation exercises; vigorously the development, testing and deployment of space information weapon, launching the world’s first reusable aircraft able to detect, control, capture, destroy the spacecraft his country “orbital test vehicle” X-37B space fighter, space fighter program in 2025 to deploy troops in outer space; “global commons domain intervention and joint mobility “concept vowed to quickly weaken the enemy space facilities capacity through non-kinetic measures to destroy its anti-space capabilities in key elements. Russia to develop “military space recovery plan,” President Putin has restarted “crown” anti-satellite project, focusing on the development of anti-satellite weapons, the “strategic air and space battles” as the basic style of air and space operations, three satellite launch last year and aerospace It is regarded by the United States’ aerospace killer “and ready after 2016 to establish a modern space combat system. Japan’s new “cosmic basic plan” clearly states “actively enter the field of space”, was “modern security”, expanded and enhanced features for satellites to monitor vessels at sea and ground facilities, and trying to build a set of positioning, communication and intelligence gathering and other functions in one of the new satellite systems, the scope of application of force to achieve the SDF land, sea, air, space-round leap.

    Spatial information into a military confrontation priority areas for capacity-building

From the world’s military development, the right to take on the overall system of spatial information system other rights, the right to seize control of the spatial information is action battle for dominance of the main action. Local Wars practice, there is no right to make spatial information, the Air Force is difficult to combat, navy naval difficult, with even the best of other weapons and equipment may also be vulnerable to attack.Spatial Information confrontation multidimensional space operations provide important support, “new quality” of the combat system is the ability to generate combat multiplier, it will be the focus of capacity-building in the military field. From Seizing Control of the means, the space combat information control, and flexibility, the use of low threshold, a wide scope, with less damage, be cost-effective, it should be current and future space supremacy capacity-building period key development areas.

Currently, the United States actively promote Asia “rebalancing” strategy, trying to fight the development of spatial information capabilities, not only to develop electronic interference and covert soft kill hard against damage and other spatial information means, actively develop their own approach, rendezvous and docking and other space-based technology against the core , also focused on the development of satellite communications electronic jamming, near real-time detection, interference signal feature recognition, sources of interference positioning technology, efforts to develop a variety of space-based anti-satellite weapons, and has begun to deploy automated attacks, identity systems. November 14, 2012 the United States and Australia announced that the US will place a powerful Air Force C-band radar and space telescope in Australia, and it is clear that the United States will shift the strategic part of Asia. This will enable the US forward-deployed every day to keep better track of up to 200 confirmed over the Asia-Pacific and orbital spacecraft and potential anomalies. According to US media reports, the US Air Force and Lockheed Martin in February this year to start construction work in the future, “Space Fence” The new radar system, which also marks the United States started the S-band ground-based radar system, the radar system will replace the United States in the 1960s developed space surveillance systems. Russia’s “Military News” May 18 reported that Air Force Secretary James declared that the US Air Force budget of $ 5 billion has been requested to establish a defense system for the military space to prepare for a possible conflict. Japan’s space development strategy headquarters set up monitoring force and space, and proposed the next 10 years will be launched 45 satellites ambitious goals in the positive development of the second generation of IGS reconnaissance satellite system, while seeking cooperation with ASEAN countries, to build a Japan center, a network of 68 satellite Earth observation satellites, in an attempt to obtain information from other countries and share with the United States at the same time, strengthen the surrounding sea routes to Japan, the Diaoyu Islands and the adjacent waters of the maritime surveillance capability. According to Japan’s Kyodo News reported, the new “US-Japan defense cooperation guidelines” emphasize the importance of space situational awareness, Japan’s “quasi-zenith” satellite system with US satellite positioning system to achieve docking, the US and Japan will strengthen ocean surveillance satellite, by sharing global marine intelligence, to ensure maritime security channel. Russia already has “reconnaissance, attack, defense” against the ability of spatial information integration, particularly in the fight against satellite communications, missile and space defense confrontation, GPS confrontation, antagonism and kinetic energy anti-satellite laser, etc., with strong technical reserves. Indian space reconnaissance and surveillance satellite system has taken shape, the satellite communication network has covered South Asia and the surrounding area, it has achieved near-real-time satellite communication between the services.

    Spatial information warfare against the construction and development should focus grasp

Do a good job preparing military struggle, we must make efforts to grasp the initiative in the military struggle space and cyberspace, problem-oriented and adhere to asymmetric development, according to the lean, joint, multi-energy, high efficiency requirements, to ensure the good spatial information focus of fighting against the construction.

Set the right strategic direction. On the basis of the importance of space supremacy, attaches great importance to the construction and development of spatial information against the problem, deal with spatial information science strength confrontational relationship with other strategic force for development, to ensure priority development of spatial information countervailing force. Implement the military strategy for the new period, co-ordination within and outside Xinjiang Xinjiang, preparing for war with the stop, deter and combat, constantly important areas and key links to achieve new breakthroughs; spatial information against the building into the overall layout of the army information construction, improve space iNFORMATION wARFARE development strategy planning; constantly improve the system of operational doctrines, promote space information against the construction work and orderly conduct.

Adhere to military and civilian integration. Strengthening military and civilian integration concept, the basic role of market in resource allocation, according to civil-military integration path of development, through laws, and rich integration of forms and expand the scope of integration, improve the level of integration in the scientific research and technology, weaponry, personnel training, etc. aspects, all-round, multi-domain integration, spatial information against the construction of rich resources and development potential. Pay attention to the military think tank function, strengthen the theoretical study of spatial information confrontation and practical issues, exploration of space information confrontation theoretical system, a clear focus on the construction, development of specific plans, enrich and develop operational guidance to ensure that the substantive work forward.

Construction expertise system. According to aim at the forefront, major breakthroughs require leapfrog development, accelerate the building space information confrontation power system, the formation of spatial information ability to fight as soon as possible. Spatial information effectively combat weaponry put strategic position, pay attention to the fight against cross-border joint information space forces the leading role of the traditional power and strength and spatial information of conventional power, to achieve full-dimensional spatial information to flow freely. Actively promote the use of force against spatial information, spatial information to support real-time navigation information reconnaissance operations exercises, testing and training, the formation of combat capability as soon as possible.

Focus on technological innovation. Strengthen technology research efforts, emphasis on spatial information against key technological innovation, stepping up confrontation frontier exploration of space information technology, focusing on the development of advanced satellite communications confrontation, confrontation reconnaissance and surveillance, target feature recognition, information processing technology, and make breakthroughs can promote space information confrontation key technology and equipment updates; attention, independent research and development may change combat style, disruptive technology group rules of engagement, to prevent enemies of my sudden formation of a technical strategy, efforts to form the enemy I have, I have no enemy and some non symmetrical technological superiority.

Original Mandarin Chinese:

萬物互聯的時代,我們必須重新思考,當前和未來軍事鬥爭的前沿在哪?我們所說的信息化局部戰爭的局部在哪?信息化戰爭制權的戰略制高點在哪?
萬物互聯的時代,制信息權成為奪取戰場綜合製權的核心,“無網不戰”“無天不勝”成為戰爭制勝的鐵律,制空間信息權成為維護國家主權、安全和發展利益的戰略制高點。戰場延伸到哪裡,哪裡就會展開主動權的爭奪。世界主要國家高度重視和應對來自外層空間的威脅與挑戰,圍繞太空發展權、主導權和控制權,展開了激烈角逐。
空間信息對抗成為戰略威懾制衡的新質手段
空間信息對抗作戰能打敵所怕、攻敵要害,是戰略威懾制衡的新質手段。一方面,具備強大的空間信息攻擊能力,就可有效遏制太空霸權、捍衛空間主權,提昇在國際舞台的話語權和主動權;另一方面,擁有足夠的空間信息防禦能力,就可威懾和遏制對手輕啟戰爭按鈕,有效抵禦外層空間的威脅和破壞,防止失去對太空的控制權。
美將“空間對抗行動”視為與“全球打擊”和“核打擊”並重的戰略威懾能力,2001年以來先後進行7次“施里弗”太空作戰計算機模擬演習;大力研製、試驗和部署空間信息作戰武器,發射全球首架可重複使用的能夠偵察、控制、捕獲、摧毀他國航天器的“軌道試驗飛行器”X-37B空天戰機,計劃2025年在外層空間部署太空戰鬥機部隊;“全球公域介入與機動聯合”概念宣稱要通過非動能措施迅速弱化敵太空設施能力,破壞其反太空能力中的關鍵要素。俄羅斯制定“太空軍事復興計劃”,總統普京已重啟“樹冠”反衛星項目,重點發展反衛武器,把“戰略性空天戰役”作為空天作戰的基本樣式,去年發射的3顆衛星和航天器被美視為“航天殺手”,並準備在2016年前後建成現代太空作戰系統。日本新《宇宙基本計劃》明確指出要“積極進入太空領域”,獲得“現代化的安全保障”,擴充和強化用於監視海上船舶和地面設施的偵察衛星的功能,試圖通過構建一個集測位、通信和情報蒐集等多功能於一體的新衛星系統,實現自衛隊力量運用範圍的陸、海、空、天全方位跨越。
空間信息對抗成為軍事能力建設重點領域
從世界軍事發展看,制空間信息權統攬其他制權,奪取制空間信息權行動是爭奪戰爭主導權的主體行動。從局部戰爭實踐看,沒有製空間信息權,空軍難以空戰,海軍難以海戰,擁有再好的其他武器裝備也可能被動挨打。空間信息對抗為多維空間作戰行動提供重要支撐,是作戰體系的“新質”,是作戰能力生成的倍增器,必將是軍事能力建設的重點領域。從爭奪制天權的手段看,空間信息對抗可控性強、靈活性好,運用門檻低、作用範圍廣、附帶損傷小、效費比高,應是當前和今後一個時期制天權能力建設發展的重點領域。
目前,美積極推進亞太“再平衡”戰略,竭力發展空間信息對抗能力,不僅大力發展電子乾擾軟殺傷和隱性硬毀傷等空間信息對抗手段,積極發展自主逼近、交會對接等天基對抗核心技術,還重點研製衛星通信電子乾擾、近實時探測、干擾信號特徵識別、干擾源定位技術,努力發展各種天基反衛星武器,且已開始部署自動攻擊、識別系統。 2012年11月14日美國和澳大利亞聯合宣布,美軍將在澳大利亞安置功能強大的空軍C波段雷達和太空望遠鏡,並明確表示這是美國將戰略轉向亞洲的一部分。這一前沿部署將使美每天能夠更好地跟踪確認多達200個亞太上空航天器及其軌道和潛在的異常現象。據美國媒體披露,美國空軍與洛克希德馬丁公司在今年2月啟動了未來“太空籬笆”新型雷達系統的建設工作,這也標誌著美國開始啟動了S波段地基雷達系統,該雷達系統將取代美國20世紀60年代研發的太空監視系統。俄羅斯《軍工新聞網》5月18日報導,美國空軍部長詹姆斯宣稱,美空軍已要求50億美元的預算以建立一個防禦系統,為可能發生的太空軍事衝突做準備。日本成立宇宙開發戰略總部和太空監測部隊,並提出今後10年將發射45顆衛星的宏偉目標,在積極發展第二代IGS偵察衛星系統的同時,正在謀求與東盟國家合作,構建一個以日本為中心、由68顆衛星組成的地球觀測衛星網絡,企圖從他國獲得情報並與美國共享的同時,加強對日本周邊海上要道、釣魚島及其附近海域的海洋監視能力。據日本共同社報導,新版《美日防衛合作指針》強調太空態勢感知的重要性,日本“準天頂”衛星系統與美國衛星定位系統將實現對接,美日將利用衛星加強海洋監視,通過共享全球海洋情報,確保海上通道安全等。俄已具備“偵、攻、防”一體的空間信息對抗能力,特別是在衛星通信對抗、導彈和空間防禦對抗、GPS對抗、激光對抗和動能反衛等方面,擁有雄厚的技術儲備。印度空間偵察監視衛星系統已初具規模,衛星通信網已覆蓋南亞及周邊地區,各軍種之間已實現近實時衛星通信。
空間信息對抗作戰建設發展應把握的著力點
抓好軍事鬥爭準備,必須努力掌握太空和網絡空間軍事鬥爭主動權,堅持問題導向和非對稱發展,按照精幹、聯合、多能、高效的要求,切實把好空間信息對抗作戰建設的著力點。
確立正確戰略指導。在重視制天權的基礎上,高度重視空間信息對抗建設發展問題,科學處理空間信息對抗力量與其他戰略力量發展的關係,保證優先重點發展空間信息對抗力量。貫​​徹新時期軍事戰略方針,統籌疆內與疆外、備戰與止戰、威懾與實戰,不斷實現重要領域和關鍵環節的新突破;把空間信息對抗建設納入軍隊信息化建設總體佈局,搞好空間信息對抗發展戰略籌劃;不斷完善作戰條令體系,促進空間信​​息對抗各項建設和工作有序開展。
堅持軍民融合發展。強化軍民融合發展觀念,發揮市場在資源配置中的基礎性作用,按照軍民融合式發展路子,通過法規建設,豐富融合形式、拓寬融合範圍、提高融合層次,在科研技術、武器裝備、人才培養等方面,進行全方位、多領域融合,為空間信息對抗建設提供豐富資源和發展後勁。注重發揮軍地智庫功能,加強空間信息對抗的理論和實踐問題研究,探索空間信息對抗理論體系,明確建設重點、制定具體計劃,豐富和發展行動指導,確保各項工作實質性推進。
構建專業力量體系。按照瞄準前沿、重點突破、跨越式發展的要求,加速構建空間信息對抗力量體系,盡快形成空間信息對抗能力。把空間信息對抗武器裝備切實擺上戰略位置,注重發揮空間信息對抗力量對傳統力量的帶動作用和空間信息力量與傳統力量的跨域聯合,實現信息在全維空間自由流動。積極推進空間信息對抗力量運用,進行空間信息偵察實時支援引導信息作戰行動的演習、試驗和訓練,盡快形成體係作戰能力。
關注技術創新。加強技術攻關力度,重視空間信息對抗關鍵技術創新,加緊探索空間信息對抗前沿技術,注重發展先進的衛星通信對抗、偵察和監視對抗、目標特徵識別、信息處理等技術,著力突破能夠推動空間信息對抗裝備更新的關鍵技術;高度關注、自主研發可能改變作戰樣式、作戰規則的顛覆性技術群,防止強敵對我形成技術上的戰略突然性,努力形成敵有我有、敵無我有的非對稱技術優勢。

China Military Review of US Cyberspace Development Strategy // 中國軍事美國網絡空間發展戰略述評

中國軍事美國網絡空間發展戰略述評

发布日期: 2015 – 10 – 15

中國軍方人士

With the dependence on cyberspace continues to improve, the US cyberspace security into national security strategy category, has promulgated the “Cyberspace Policy Assessment”, “Cyberspace International Strategy”, “cyberspace operations strategy” and a series of policy file, accelerate the construction of cyberspace security strategy system, vigorously strengthen the network combat forces, to achieve hegemony in cyberspace control. April 2015, the US Department of Defense has issued “Cyberspace Strategy” (hereinafter referred to as “the new cyber strategy”) summary, for the first time publicly that the cyberspace operations as one of the options for future tactical military conflict that the United States has exceeded the network space combat preparation system, weapons and equipment, and a series of joint integration bottlenecks, forming an effective mode of network attack and defense, has all the ability to launch cyber war.

  First, the US Cyberspace Strategy Evolution
  Cyberspace security strategy of the United States began in the late 20th century, at the Clinton and the Bush administration has been further strengthened and developed, eventually forming a “national strategy for cyberspace security.” Since 2009, the Obama administration has issued a series of strategic documents for the United States constructed a three-dimensional network security strategy system, international politics and international security situation had a significant impact.
  (A) in the Clinton and the Bush administration, cyberspace into context of US national security strategy, issued its first “cyberspace national strategy.”
  The Clinton administration information industry as an emerging pillar industries and vigorously support, promote the rapid development of the Internet, but also to the United States to rely on the network rose to an unprecedented degree, the information industry has become the largest industry in 1995 – growth in the US economy during 1998 The actual contribution rate of more than 35%. Published by the end of 1999, “US National Security Strategy Report” for the first time defined the US cyberspace security interests that network security threats to US national security posed challenges presented initial ideas to prevent security risks of cyberspace through international cooperation and other means. In early 2000 the introduction of “defending America’s cyberspace – to protect the national information system plan”, became the first programmatic document of the United States to maintain network security space. Release of this document is another important motivation is the US government tried to develop new rules of the game, to ensure American power distribution of wealth in cyberspace, to build a strong, growing and innovative US economy.[12]
  The Bush administration since the “September 11” incident, the United States has changed the concept of security, network spatial development strategy adjustment from “development priority” to “Security First”, and promulgated the “National Cyberspace Security Strategy” in 2003. The strategy identifies strategic position cyberspace security, cyberspace is defined as “to ensure the nation’s critical infrastructure properly functioning ‘nervous system’ and the national control systems,” the security situation in cyberspace to make a new judgment, that the new situation combined with the hostile forces of terror and information technology to pose a serious threat to US national security, will clearly improve cyberspace security to national security strategic level. “US National Security Strategy,” the strategy report issued in 2002, “Homeland Security National Strategy” and other reports, constituted after the “9.11” incident the new US national security strategy system. [12]
  (B) The Obama administration efforts to build US cyberspace security strategy stereo system, and actively seek a higher degree of cyberspace world hegemony, to ensure that the three core interests prosperity, security, the US government values ​​determined in cyberspace
  President Obama took office, started the 60-day cyberspace security assessment, and in May 2009, issued a “cyberspace policy review.” In the report published ceremony, Obama delivered an important speech entitled “to protect the American network infrastructure”, specifies the development of new national cyberspace security strategy, led by the National Security Council, the integrated use of diplomatic, military, economic, intelligence and law enforcement “four in one” means ensuring security in cyberspace, so that the strategic concept of cyberspace Obama administration’s horizon.
  1, cyberspace security threats as an excuse to network infrastructure as a national strategic asset, by all means to protect the security of cyberspace
  US cyberspace strategy document, the threat is the highest frequency vocabulary appears. The United States believes in cyberspace Chiang Kai-shek himself facing a new invisible smoke of war, and has been at a disadvantage, worried about the future possible outbreak of “Network Pearl Harbor” or “medium” 9/11 “incident [10]. To this end, Obama came to power after repeatedly stressed, should the network security as part of national security strategy, the network infrastructure will be increased to protect national strategic asset. March 2009, the US Center for Strategic and International Studies, submitted to “ensure the new presidency cyberspace” first report’s recommendations is that the network is an important wealth of the country, “the United States will not hesitate to use all means of national power ensuring security in cyberspace. issued “cyberspace policy assessment report” in May 2009 that day, Obama said in a speech, cyber threats are “one of the most serious challenges to US economic and national security faced” network infrastructure will be regarded as a strategic national facility “to protect the facility will become a national security priority issue.” We can say that all US cyberspace strategy and policy documents are as a starting point.
  2, to improve leadership and command system as the focal point, accelerate the construction of cyberspace deterrence systems and to build capacity-building network attacks.
  Obama believes the US government cyberspace security agencies there strategic center of gravity is unknown, job functions overlap, lack of coordination and other issues, it is necessary to implement the leadership from the top, the overall coordination of network security mechanism. May 2009, the White House announced the formation of cyberspace security office, the president is responsible for the policy decision to provide cyberspace security, coordinate government policies and activities. A month later, the Defense Department announced the creation of Cyberspace Command, responsible for coordinating the US military deployment strategy and network security, unified US military command network warfare, network warfare forces to enter the United States so that harmonized development of the “fast track.” Thus, the United States to create an integrated and comprehensive national cybersecurity leadership system. Published in July 2011, “cyberspace operations strategy”, as the United States Department of Defense first report on cyberspace operations and comprehensive strategy to more effectively carry out military operations in cyberspace provides guidelines and a roadmap, marking the US military operations in cyberspace who has been officially transferred deployment and implementation phase. In 2012, US National Cyber ​​Range officially delivered military trial. In 2013, the United States Cyber ​​Command expanded from 900 people to 4900 people, announced the expansion of 40 network warfare units within three years. 2014, the US Department of Defense released the “Quadrennial Defense Review Report,” clearly put forward the “expansion of investment in new network capabilities, network building 133 task force.” It is noteworthy that from 2013 to the year 2014, the US declared war forces expansion of the network more than three times. Meanwhile, the US also increased efforts to carry out research and development of cyber weapons, arms only reached 2,000 kinds of viruses, and has already entered the US Weapon series. This series of actions that the objective to reach the US military in cyberspace than just ensure its own security in cyberspace, but to build a network to enhance deterrence system through cyberspace attack, towards the consolidation of its “system net power” in cyberspace . [2]
  3, in order to emphasize international cooperation in cyberspace as a means to change and influence the political system and values ​​of other countries, and strive to maintain US hegemony
  In May 2011 the United States issued “Cyberspace International Strategy”, the first time its foreign policy goals combined with cyberspace strategy, marking its focus has been disclosed by the ball itself will be extended to the entire range, while its output cyberspace has become an American an important platform for political models and values. Former Defense Secretary Robert Gates has publicly declared that the network is a “huge strategic American assets in favor of other countries to help promote democracy.” Since then the Department of Defense issued “cyberspace operations strategy” is the introduction of “collective defense” concept, showing the United States to establish a new military alliance in cyberspace intent. Obama Government has been changed over the years, the United States resisted, highly publicized international cooperation in cyberspace, partly because it recognizes that even a superpower like the United States, can not single-handedly solve the problems exist in cyberspace and, more importantly, the United States wants to use its strong network resources, through international action in cyberspace cyberspace control global leadership development, change and affect the political system and values ​​of other countries, to consolidate its hegemony in cyberspace . [4]
  Second, the US Department of Defense the main features of the new cyber strategy
  April 2015, the new cyber strategy US Department of Defense released a continuation of the Obama administration’s strategic vision of cyberspace, for the first time publicly that one should cyberwarfare as a future military conflict tactical options, an explicit proposal to improve cyberspace deterrence and offensive capability, put on active defense and deterrence posture initiative, reflects the next few years, the US space power network construction and distinctive features of related actions, highlighting the US attempts to dominate in cyberspace.
  (A) exaggerated the threat facing the United States in cyberspace, cyberspace has continued to spread fear destruction, wanton shaping cyberspace at the national level enemy
  The new cyber strategy with a larger strategic context described space, repeatedly stressed that the United States risks inherent in cyberspace environment, deliberately exaggerating the threat of cyberspace activities faced constantly looking for new threats, new enemy is the United States to shape the mindset of decision logic and tradition dictates . In the strategy paper publicly available, the “risk” and “threat” were two words appear up to 31 times and 46 times, claiming that the new cyber strategy risks and threats from both the basic structure of the Internet’s inherent ability to handle risks, but also from the interests of the enemies of the United States coveted American networks, systems and data intrusion and malicious damage. The new cyber strategy will be mainly determined by the previous target to prevent extremist network technology and combined adjusted to focus on the national level opponent, Russia, China, Iran, North Korea and other countries as the United States may constitute a threat to the network [1]. These presets national level opponents, both in order to show the necessity of the introduction of the new cyber strategy, but also the threat of the proliferation of network attacks fear of public opinion, and thus eliminate barriers for “Snowden” event generated between the private sector and , dilute the new cyber strategies on social interests and personal privacy violations, to further consolidate public support for DoD and government policies. This judgment with ideological bias and arbitrariness, high-handed and is a very dangerous act. In fact, the United States ahead of the field of security in cyberspace, no one country can be formed a fundamental threat to the United States.
  (B) expressly DoD cyberspace strategic tasks and objectives, publicly cyberspace operations as a future military conflict tactical options, highlighting the US military in cyberspace deterrence and offensive posture.
  The new cyber strategy identifies the Department of Defense “three major tasks” and “five strategic objectives,” first proposed to launch a cyber attack when US national interests are threatened, and asked the US Department of Defense “Developing viable network options into the DoD term plan “for the US president or secretary of defense to provide” full spectrum “of options, when it comes to their national interest to make a variety of decisions.Compared with 2011 the first release version of cyberspace emphasize defensive action by the major network security operations to “offensive action network” changes, and the new cyber strategy frequent word “deterrence”, a total appears 29 times, that the United States has gradually freedom “with precision-guided physical damage to cope with asymmetric means to deal with cyber attacks” on US deterrence into network attacks to protect US national cybersecurity strategy, squeezing US major strategic competitors cyberspace policy choices available. At the same time, the new cyber strategy first proposed holding cyberspace operations as a tactical option, option to control the use of network operations escalation of the conflict, create conflict environment. Visible, the new cyber strategy has been the traditional means of fighting the physical space and virtual cyberspace means of integration, clearly convey to the world the determination of the American retaliation and sufficient network capacity to implement retaliation, far beyond the active defense category, highlighting the United States will protect cyberspace, attacks and confrontation blend of deterrence and offensive posture. [1] [8]
  (Iii) strengthen the integration with traditional combat power, build a comprehensive system of joint operations, with the power to launch cyber warfare system
  US military cyberspace operations following the fifth field of land, sea, air, space after the new cyber cyberspace operations strategy requires the option into the Defense Department plans to ensure that all areas of military operations in cyberspace and physical space Action Action coordinated. The new cyber strategy proposed to mobilize all forces, build a comprehensive system of joint operations, including the Ministry of Defence led government departments, between government and enterprises and international concerted action. The new cyber strategy breakthrough in Cyberspace “civil-military separation” trend strategy, Cyberspace Command, National Security Agency, the organic integration of the Central Security Agency, the Ministry of Defence is responsible for network forces combat training and guidance to the intelligence network functions and network operations functions are distinguished by the Defense Department-led combat troops network. One important goal of the new cyber strategy is to build a 2018 offensive and defensive, flexible forms of cyberspace forces, including 133 teams from the 6200 Department of Defense and the military soldiers, civilian and contract employees and other components. Among them, 13 responsible for the national infrastructure network protection mandate national task forces and eight country support teams; 27 to assume the task of attacking the enemy’s network operations task force and 17 combat support units; 68 responsible for the protection of the United States Department of Defense and the military network protection force network and system security tasks. These actions show that the US military has been resolved cyberspace warfare establishment system, apparatus and equipment, and a series of joint integration bottlenecks, explore the formation of an effective mode of generating combat capabilities of network attack and defense, with the power to launch cyber warfare system. [7]
  (Iv) continue to strengthen basic research and applied research, consolidate US leadership in the world in the field of network information for its dominate cyberspace to provide technical support.
  For a long time, the US military has the advantage of science and technology as an important part of the national security strategy, and always will be technological innovation as the key to maintaining US military strength and capacity. As a network of information technology and the birthplace of the leader, the United States Department of Defense to maintain and expand the leading edge technologies that will continue to strengthen basic research and applied research, technology continues to improve deterrence and offensive capabilities in cyberspace. The new cyber strategy proposed, the Defense Department must build and command and control systems to increase investment, continues to accelerate technological innovation in the field of cyberspace, vigorously carry out research and development with significant advantages over the technology, focusing on staff training to improve cyberspace, effective organization basic research and applied research capacity for action needed to fully develop the required DoD cyberspace capabilities. In recent years, the United States looks to shape the full spectrum cyberspace operations capability can cope with all types of threats in the successful development of “chute”, “Fire” and “shock web” more than 2,000 kinds of network warfare weapons on the basis of increasing network space war frontier technology investment, and actively develop a new generation of network technology and virtual battlefield assault weapons, and network warfare weapons and conventional weapons integration, in order to achieve a variety of battlefield environment flexible ways to combat.The new cyber strategy conference selection in the birthplace of Silicon Valley Stanford University, in person at the Secretary of Defense Carter, will seek to show that the Ministry of Defence and a new mechanism between the private sector and research institutions, technology, people and information and cooperation, and develop a wide range of industries channel sector R & D cooperation, greatly enhance the ability to act in cyberspace, to provide a solid technical support for the United States to expand the network space interests, safeguarding cyberspace hegemony. [7]
  Third, the construction of cyberspace security forces Inspiration
  The new US Defense Department cyber strategy highlights the US military in cyberspace deterrence and offensive posture, releasing its attempt hegemony in cyberspace danger signal, and to our country as one of its main rivals in cyberspace, cyberspace is bound for China safety and national security have a profound impact. Faced with the threat of US cyberspace strategy, China should accelerate the pace of construction of power networks, and resolutely safeguard national sovereignty interests in cyberspace, safeguard national cyberspace security.
  (A) firmly established Cyberspace Security Strategy in national security, strengthen national security in cyberspace top-level design, in line with China’s national conditions to speed up the formation of a military cyberspace security strategy system
  President Xi pointed out that no network security is no national security, no information will be no modernization. This important exposition, clear cyberspace strategic position for the construction of the security forces of cyberspace provided a powerful impetus.Currently, the national cyberspace security forces involved in military dress, especially after fighting equipment sector, and national industry, finance, energy, transportation, education and other sectors. Therefore, we should focus on promoting the interdisciplinary, multisectoral cyberspace security system construction, the formation of strong guidance, perfect features, dynamic evolution of cyberspace security strategy system. National Cyberspace Security Strategy should carry out national cyberspace security situation assessment, clarify the department’s own cyberspace security policy, as well as the main tasks and the division of responsibilities in national security in cyberspace, military and civilian science linkage design, comprehensive coverage, responsive network space security forces system, organizational system and institutional system. Cyberspace military strategy should focus on military operations security, the implementation of self-defense and homeland defense needs collaboration, scientific planning cyberspace “reconnaissance, attack, defense, control” forces, specifically the construction of military use of cyberspace timing, principles and tasks, as well as synergies with local forces. Cyberspace International Strategy should focus oppose hegemony in cyberspace, cyberspace governance rights and fight for the right to speak, and resolutely safeguard national cyberspace sovereign interests and development interests, and actively promote the peaceful development and common prosperity of the international cyberspace.
  (Ii) accelerate the construction of an appropriate scale, combined offensive and defensive cyberspace security forces, and constantly improve the network space combat capability, to provide strategic support for the maintenance of national security in cyberspace
  To effectively respond to threats in cyberspace main rival joint operations and information technology support to high-quality compound talents as the main body, accelerate the construction of electricity network integration, hardware and software combination, both offensive and defensive cyberspace power system, focusing on the development of intelligence and reconnaissance capabilities, integrated attack, defense capabilities and affect the control system capacity to effectively meet the security and defense tasks require effective counterattack. At present, shall be in accordance with the strategic and operational level, based on the national and military security and electronic warfare forces network-based, command, reconnaissance, attack, defense, “three wars” and six security forces to focus the power of the network set up directly under the army’s troops and the attachment of various branches / departments of strategic and security reconnaissance, attack, defense, “three wars” four network power forces the enemy to achieve the Internet, critical infrastructure, national defense information network, information systems and other defense battlefield combat. Technical support base in accordance with cyberspace security needs, the establishment of core technology research and development equipment, offensive and defensive range, a number of joint combat exercises and other technical support base, to provide technical support for the network equipment research, development, testing and evaluation.
  (C) to strengthen cyberspace theoretical research, and actively explore cyberspace mode of generating combat, and strive to improve the combat capability of our army cyberspace
  In the process of the evolution of the war, military battlefield Game by plane, three-dimensional multi-dimensional virtual battlefield to battlefield extended form, combat and operational means of war is undergoing revolutionary change, to win victory in future wars but no longer rely on bullets and explosives byte strings and no longer rely on the military but on the scale of the number of botnets, will nurture and birth of a new doctrine. Accelerate innovation in cyberspace combat theory, system analysis of the historical evolution of human warfare, to find common characteristics and laws of war, exploring new ideas that may occur in the military field, the new theory, in-depth study of cyberspace doctrine, doctrine, combat styles, and elements cyberspace power system composed of the elements of its own scientific judgment and changes in the relationship between the shape of cyberspace changes and evolution. Increased interdependence cyberspace winning mechanism, system analysis cyberspace and physical space constraints and mutual enhancement of mutual relations, in-depth mechanism, attack and defense mechanism, the mechanism of the effect of war in cyberspace right, and the mechanism of self-organizing collaborative research, and actively explore cyberspace winning new mechanisms and new ways. Actively explore cyberspace combat formation mechanism, focusing on national cyberspace security strategies to enhance the combat effectiveness of troops starting point, the system analyzes cyberspace combat formation structure, composition and structure analysis of the interaction between the various elements of the fighting, a network of scientific space combat effectiveness the new model provides a solid theoretical innovation for our military in cyberspace can fight to win the war.
  (D) seize the new round of technological change information network a major opportunity, and vigorously promote the development of self-control cyberspace security core technology and key equipment, consolidate our network security space technology base.
  For a long time, the United States use of network information technology security threat to other countries, for the recent implementation of high-performance computing technology embargo, indicating that it will not easily give up the leading international cyberspace security right to speak. After the “Prism” incident, the world is generally recognized that there is no core technology, key equipment and self-controlled, cyberspace will be the lifeblood of the hands of others, have increased self-controlled information network construction. Currently, a new round of worldwide information network technology is ushering in a new wave of development, the development of large data, networking, quantum information, cutting-edge cloud computing and other emerging technologies are driving traditional information network technology to enter the replacement stage, to promote the network basis for, the system shape and space technology security mechanism profound changes. Should make full use of information network technology upgrading precious “time window”, to focus the forefront of key technologies in the emerging field of security basic, global impact of cyberspace, increase their own information network technology and independent information industry development efforts continue promoting the “nuclear high base” of major projects, and actively create the ecological environment of self-control application, determined to get rid of cyberspace security key technologies the kinds of passive situation, the lifeblood of the national cyberspace security technology and industrial development firmly in control of their own hands.
  (E) give full play to the advantages of our system, promote China’s cyberspace security forces and civilian integration development, to build military and civilian science linkage, peacetime and wartime national cyberspace security system
  Cyberspace has a “peacetime and wartime, civil-military one” determined by the characteristics of cyberspace security system must take military and civilian integration development model.Important features of the new US Department of Defense cyberspace security strategy is to mobilize the army of human, technical and industrial resources, accelerate the formation of cyberspace prominent military and technological superiority. China should give full play to the advantages of the system and network advantages of a big country, and actively promote the cyberspace combat forces military and civilian integration, fully absorb the military, local professional and technical strength and nurture talent in the private sector network attack and defense, national parties formed a unified command under the system of ” power system main force “and” guerrilla “a combination of; by improving the organization and leadership to build civil-military integration, program planning, collaborative innovation and industrial development at the national cyberspace security system, and promote the development of dual-use network information technology to optimize civil-military dual network information industry layout, accelerate the formation of “galloping market can not only battle-hardened” information technology industrial base; establish and improve civil-military integration network defense mobilization system, a clear linkage military and civilian cyberspace security system and operation mechanism, promote the integration of military and civilian network space action joint exercises, and actively explore how to play the power of the people’s war in cyberspace, condensed balance enemies, against tremendous energy hegemony, the realization of China’s power network by the network power to leap.
Original Mandarin Chinese:
隨著對網絡空間的依存度不斷提​​高,美國將網絡空間安全納入到國家安全戰略範疇,先後頒布《網絡空間政策評估》、《網絡空間國際戰略》、《網絡空間行動戰略》等一系列政策性文件,加快構建網絡空間安全的戰略體系,大力加強網絡作戰力量建設,以實現對網絡空間控制的霸權地位。 2015年4月,美國防部又發布《網絡空間戰略》(下文簡稱“新版網空戰略”)概要,首次公開表示將網絡空間行動作為今後軍事衝突的戰術選項之一,表明美國已突破了網絡空間作戰的編制體制、武器裝備、融入聯合等一系列瓶頸問題,形成了網絡攻防的有效模式,具備了發動網絡戰爭的全部能力。

一、美國網絡空間戰略演變
美國網絡空間安全戰略思想發端於20世紀中後期,在克林頓與布什政府時期得到進一步充實和發展,最終形成了《網絡空間安全國家戰略》。自2009年奧巴馬政府以來,先後發布了一系列戰略文件,為美國建構了一個立體的網絡安全戰略體系,對國際政治和國際安全局勢產生了重大影響。
(一)在克林頓及布什政府時期,網絡空間安全進入到美國國家安全戰略範疇,頒布了首份《網絡空間安全國家戰略》。
克林頓政府將信息產業作為新興支柱產業大力扶持,推動了互聯網的高速發展,也使美國對於網絡的依賴上升到了前所未有的程度,信息產業成為美國最大的產業,1995-1998年期間對美國經濟增長的實際貢獻率達35%以上。 1999年底公佈的《美國國家安全戰略報告》首次界定了美國網絡空間安全利益構成,認為網絡安全威脅對美國國家安全構成挑戰,提出了通過國際合作等方式防範網絡空間安全風險的初步設想。 2000年初出台《保衛美國的網絡空間——保護信息系統的國家計劃》,成為美國維護網絡空間安全的第一份綱領性文件。推出這份文件的另一個重要動因是美國政府試圖通過制定新的遊戲規則,確保美國在網絡空間中分配財富的權力,建立強大的、不斷增長的創新型美國經濟。 [12]
布什政府自“9·11”事件後,改變了美國的安全觀,將網絡空間發展戰略從“發展優先”調整為“安全優先”,並於2003年頒布了《網絡空間安全國家戰略》。該戰略明確了網絡空間安全的戰略地位,將網絡空間定義為“確保國家關鍵基礎設施正常運轉的’神經系統’和國家控制系統”,對網絡空間安全形勢做出了新的判斷,認為新形勢下恐怖敵對勢力與信息技術的結合對美國國家安全構成嚴峻威脅,明確將網絡空間安全提高到國家安全的戰略高度。該戰略報告與2002年頒布的《美國國家安全戰略》、《美國國土安全國家戰略》等報告,構成了“9·11”事件後美國新的國家安全戰略體系。 [12]
(二)奧巴馬政府著力打造美國網絡空間安全立體戰略體系,積極謀求更高程度的網絡空間世界霸權,確保美國政府在網絡空間所確定的繁榮、安全、價值觀三大核心利益
奧巴馬總統上任伊始,就啟動了為期60天的網絡空間安全評估,並於2009年5月,發布了《網絡空間政策評估報告》​​。在該報告的發布式上,奧巴馬發表了題為《保護美國網絡基礎設施》的重要講話,指定由國家安全委員會牽頭制定新的國家網絡空間安全戰略,綜合運用外交、軍事、經濟、情報與執法“四位一體”的手段確保網絡空間安全,從而使奧巴馬政府的網絡空間戰略構想初露端倪。
1、以網絡空間安全威脅為藉口,把網絡基礎設施上升為國家戰略資產,將不惜一切手段保護網絡空間安全
美國網絡空間戰略文件中,威脅是出現頻率最高的詞彙。美國認為,自己在網絡空間中正面臨著一場新的看不見硝煙的戰爭,且已處於劣勢,擔心未來可能爆發“網絡珍珠港”或是“網上‘9·11’”事件[10]。為此,奧巴馬上台後不斷強調,應把網絡安全作為國家安全戰略的一部分,將網絡基礎設施上升為國家戰略資產加以保護。 2009年3月,美國戰略與國際問題研究中心提交的《確保新總統任內網絡空間安全》報告提出的第一條建議就是,網絡是國家的重要財富,“美國將不惜動用一切國家力量之手段確保網絡空間安全。在2009年5月發布《網絡空間政策評估報告》​​的當日,奧巴馬發表講話稱,網絡威脅是“美國經濟和國家安全所面臨的最嚴重的挑戰之一”,網絡設施將被視為戰略性國家設施“保護該設施將成為國家安全的優先課題”。可以說,美國所有網絡空間戰略及相關政策文件都是以此為出發點。
2、以完善領導指揮體係為著力點,加快構建網絡空間威懾體系,著力打造網絡攻擊能力建設。
奧巴馬政府認為,美國政府網絡空間安全機構存在著戰略重心不明、工作職能重疊、缺乏協調配合等問題,因此必須從最高層實施領導,全面協調網絡安全機制。 2009年5月,白宮宣布組建網絡空間安全辦公室,負責為總統提供網絡空間安全方面的決策方針,協調政府相關政策與活動。一個月後,國防部宣布創建網絡空間司令部,負責協調美軍網絡安全策略及部署,統一指揮美軍網絡戰,使得美國網絡戰力量進入統一協調發展的“快車道”。由此,美國打造了一體化的綜合性國家網絡安全領導體制。 2011年7月公佈的《網絡空間行動戰略》,作為美國防部首份有關網絡空間作戰行動的綜合戰略,更為美軍有效開展網絡空間行動提供了指南和路線圖,標誌著美軍網絡空間軍事行動已正式轉人部署與實施階段。 2012年,美國家網絡靶場正式交付軍方試用。 2013年,美網絡司令部由900人擴編到4900人,宣布3年內擴建40支網絡戰部隊。 2014年,美國防部發布《四年防務評估報告》​​,明確提出“投資新擴展的網絡能力,建設133支網絡任務部隊”。值得關注的是,從2013年到2014年一年中,美軍宣稱網絡戰部隊擴編3倍以上。與此同時,美國還加大力度開展網絡武器的研發,僅病毒武器就達2000多種,且早已進入美軍武器序列。這一系列動作表明,美軍在網絡空間要達成的目標絕不僅僅是保證自身網絡空間安全,而是要通過提升網絡空間攻擊能力構建網絡威懾體系,實現鞏固其在網絡空間的“製網權” 。 [2]
3、以強調國際網絡空間合作為手段,改變和影響其他國家的政治體系和價值觀念,力求維護美國霸權地位
2011年5月美國出台《網絡空間國際戰略》,首次將其外交政策目標與網絡空間戰略結合在一起,標誌著其關注重點已公開由自身擴展到整個球範圍,同時網絡空間也成為其輸出美式政治模式和價值觀的重要平台。原國防部長蓋茨曾公開宣稱,網絡是“美國巨大的戰略資產,有利於幫助其他國家推進民主”。此後出台的國防部《網絡空間行動戰略》更是引入“集體防禦”理念,展現了美國要在網絡空間建立新軍事同盟的意圖。奧巴馬政府之所以一改美國多年來的抵制態度,高調宣傳網絡空間國際合作,一方面是因為它認識到,即使是美國這樣的超級大國,也不可能憑一己之力解決網絡空間存在的種種問題,更重要的是,美國希望利用自己雄厚的網絡資源,通過在網絡空間的國際行動掌控全球網絡空間發展領導權,改變和影響其他國家的政治體系和價值觀念,鞏固自身在網絡空間的霸權地位。 [4]
二、美國防部新版網空戰略主要特點
2015年4月,美國防部發布的新版網空戰略,延續了奧巴馬政府對網絡空間的戰略構想,首次公開表示要把網絡戰作為今後軍事衝突的戰術選項之一,明確提出要提高網絡空間的威懾和進攻能力,擺出積極防禦和主動威懾的姿態,折射出未來數年美軍網絡空間力量建設和相關行動的鮮明特點,彰顯了美國在網絡空間稱霸的圖謀。
(一)誇大美網絡空間面臨的威脅,不斷擴散網絡空間遭受破壞的恐懼,恣意塑造網絡空間國家層級的敵人
新版網空戰略用較大篇幅描述戰略背景,反復強調美國網絡空間環境蘊含的風險,蓄意誇大網絡空間活動面臨的威脅,不斷尋找新威脅、塑造新敵人是美國思維定勢和決策邏輯的傳統使然。在公開發布的戰略文件中,“風險”和“威脅”兩詞分別出現高達31次和46次,新版網空戰略聲稱這些風險和威脅既源於互聯網基本架構防範風險能力的先天不足,也源於覬覦美國利益的敵人對美國網絡、系統和數據的惡意入侵和破壞。新版網空戰略將主要目標確定由此前以防範網絡技術與極端主義結合為重點調整為國家層級的對手,將俄羅斯、中國、伊朗、朝鮮等列為可能對美國構成網絡威脅的國家[1]。預設這些國家層級的對手,既是為了顯示推出新版網空戰略的必要性,也是在公共輿論中擴散對網絡攻擊威脅的恐懼,進而消除因“斯諾登”事件與私營企業之間產生的隔閡,淡化新版網空戰略對社會利益和個人隱私的侵害,更進一步鞏固公眾對國防部和政府政策的支持。這種判斷帶有主觀隨意性和意識形態偏見,是一種霸道和非常危險的行徑。事實上,美國在網絡空間安全領域遙遙領先,沒有哪一個國家能對美國形成根本性威脅。
(二)明確國防部網絡空間戰略任務和目標,公開把網絡空間作戰作為今後軍事衝突的戰術選項,凸顯了美軍在網絡空間的威懾和進攻態勢。
新版網空戰略明確了國防部“三大任務”和“五項戰略目標”,首次提出美國國家利益受到威脅時可發動網絡攻擊,並要求美國防部“開發可行的網絡選項,融入國防部各項規劃”,為美國總統​​或者國防部長提供“全頻譜”的選擇方案,以便其在涉及國家利益的時候能夠做出各種決策。與2011年首次發布版本相比,網絡空間行動由主要強調防禦性的網絡安全行動向“採取進攻性網絡行動”轉變,並且新版網空戰略中頻繁出現“威懾”一詞,共出現29次,表明美國已經逐漸將“用精確制導的物理毀傷來應對網絡攻擊的不對稱應對手段”,納入到威懾對美國網絡攻擊、保障美國國家網絡安全戰略、擠壓美國主要戰略競爭對手的網絡空間行動自由的策略選擇之中。同時,新版網空戰略第一次提出將保持網絡空間行動作為戰術選項,運用網絡行動選項控制衝突升級,塑造衝突環境。可見,新版網空戰略已將傳統的物理空間作戰手段與虛擬的網絡空間作戰手段相融合,向世界清晰地傳遞了美國進行網絡報復的決心和實施報復的足夠能力,遠遠超出了主動防禦的範疇,凸顯了美國將網絡空間的保護、攻擊和對抗融為一體的威懾和進攻態勢。 [1] [8]
(三)加強與傳統作戰力量融合,構建全方位聯合作戰體系,具備了發動網絡戰爭的力量體系
網絡空間是美軍繼陸地、海洋、天空、太空後的第五作戰領域,新版網空戰略要求把網絡空間行動選項融入到國防部計劃中,確保軍事行動的所有領域中網絡空間行動與物理空間行動協調一致。新版網空戰略提出要動員各方力量,​​構建全方位的聯合作戰體系,包括由國防部主導政府部門間、政企間和國際間的協同行動。新版網空戰略突破了網絡空間戰略“軍民分隔”的態勢,將網絡空間司令部、國家安全局、中央安全署有機融合,由國防部負責網絡部隊的作戰訓練和指導,從而將網絡情報職能與網絡作戰職能進行區分,由國防部主導網絡作戰部隊。新版網空戰略的重要目標之一是至2018年建成一支攻防兼備、形式靈活的網絡空間部隊,包括由6200名國防部和軍事部門的軍人、文職人員和合同員工等組成的133支小組。其中,13支擔負國家基礎設施網絡防護任務的國家任務部隊和8支國家支援小組;27支擔負攻擊敵網絡系統任務的作戰任務部隊和17支作戰支援部隊;68支擔負保護美國國防部及軍隊網絡和系統安全任務的網絡保護部隊。這些動作表明,美軍已經解決了網絡空間戰的編制體制、裝備設備、融入聯合等一系列瓶頸問題,探索形成了網絡攻防戰鬥力生成的有效模式,具備了發動網絡戰爭的力量體系。 [7]
(四)繼續加強應用研究和基礎研究,鞏固美在網絡信息領域的世界領先優勢,為其稱霸網絡空間提供技術支撐。
長期以來,美軍一直將科學技術優勢作為國家安全戰略的重要組成部分,始終將科技創新作為維持美軍作戰優勢能力的關鍵。作為網絡信息技術的發源地和引領者,美國防部為保持和擴大技術領域的領先優勢,將繼續加強應用研究和基礎研究,不斷提升網絡空間的技術威懾和進攻能力。新版網空戰略提出,國防部必須在人員培訓、有效組織構建和指揮控制系統方面加大投入,繼續加速網絡空間領域的技術創新,大力開展具有重大優勢的跨越性技術的研發,聚焦提高網絡空間行動能力所需的基礎研究和應用研究,全面發展國防部所需的網絡空間作戰能力。近年來,美國著眼塑造可應對各類威脅的全頻譜網絡空間作戰能力,在成功研發“舒特”、“火焰”和“震網”等2000多種網絡戰武器的基礎上,不斷加大網絡空間作戰前沿技術投入,積極研發虛擬戰場技術和新一代網絡攻擊性武器,並將網絡戰武器與傳統武器進行整合,以實現在戰場環境中靈活的多種打擊方式。新版網空戰略發布會選擇在矽谷發源地的斯坦福大學進行,國防部長卡特親自前往,表明國防部將尋求與私營部門和研究機構間技術、人員和信息聯繫與合作的新機制,廣泛拓展與工業部門合作研發的渠道,大力提升網絡空間行動能力,為美國拓展​​網絡空間利益、維護網絡空間霸權提供堅實的技術支撐。 [7]
三、對我國網絡空間安全力量建設的啟示
美國國防部新版網空戰略凸顯了美軍在網絡空間的威懾和進攻姿態,釋放出其圖謀網絡空間霸權的危險信號,並把我國列為其網絡空間的主要對手之一,必將對我國網絡空間安全乃至國家安全帶來深刻影響。面對美國網絡空間戰略威脅,我國應加快網絡強國建設步伐,堅決捍衛國家網絡空間主權利益,維護國家網絡空間安全。
(一)牢固確立網絡空間安全在國家安全中的戰略地位,加強國家網絡空間安全的頂層設計,加快形成符合我國國情軍情的網絡空間安全戰略體系
習主席指出,沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化。這一重要論述,明確了網絡空間安全的戰略地位,為我國網絡空間安全力量建設提供了強大動力。當前,國家網絡空間安全涉及軍隊軍政後裝尤其是作戰、裝備部門,以及國家工業、金融、能源、交通、教育等部門。為此,應著眼推進跨領域、多部門網絡空間安全體系構建,形成指導有力、要素完善、動態演化的網絡空間安全戰略體系。國家網絡空間安全戰略應深入開展國家網絡空間安全態勢評估,明確各部門自身網絡空間安全策略,以及在國家網絡空間安全中的主要任務和職責分工,科學設計軍民聯動、覆蓋全面、反應敏捷的網絡空間安全力量體系、組織體系和製度體系。網絡空間軍事戰略應著眼軍事行動安全、實施自衛反擊和協同國土防禦需要,科學規劃網絡空間“偵、攻、防、控”力量建設,明確網絡空間軍事力量建設運用的時機、原則和任務,以及與地方力量的協同關係。網絡空間國際戰略應著眼反對網絡空間霸權、爭奪網絡空間治理權和話語權,堅決維護國家網絡空間主權利益、發展利益,積極推動國際網絡空間的和平發展和共同繁榮。
(二)加快建設一支規模適度、攻防結合的網絡空間安全力量,不斷提高網絡空間實戰能力,為維護國家網絡空間安全提供戰略支撐
著眼有效應對網絡空間主要對手威脅和支撐信息化聯合作戰,以高素質複合型人才隊伍為主體,加快構建網電一體、軟硬結合、攻防兼備的網絡空間力量體系,重點發展情報偵察能力、綜合攻擊能力、體系防禦能力和影響控制能力,有效滿足安全防禦和有效反擊任務需要。當前,應按照戰略和戰役層次,立足國家和軍隊網絡安全和電子對抗力量基礎,以指揮、偵察、攻擊、防禦、“三戰”和保障六支力量為重點,設置直屬全軍的網絡力量部隊和配屬各軍兵種/戰略和安全部門的偵察、攻擊、防禦、“三戰”四支網絡力量部隊,能夠實現對敵國際互聯網、關鍵基礎設施、國防信息網、戰場信息系統等進行防禦作戰。技術保障基地按照網絡空間作戰保障需要,建立核心裝備技術研發、攻防靶場、聯合作戰演練等若干技術保障基地,為網絡裝備研究、開發、試驗與評估提供技術支撐。
(三)加強網絡空間作戰理論研究,積極探索網絡空間戰鬥力生成模式,著力提高我軍網絡空間作戰能力
在戰爭發展演變的進程中,軍事博弈已由平面戰場、立體戰場向虛擬多維戰場延伸,戰爭的形態、作戰方式和作戰手段正發生革命性變革,贏得未來戰爭勝利不再依靠子彈和炸藥而是字節和字符串,不再依靠軍隊規模而是依靠殭屍網絡的數量,必將孕育和催生新的作戰理論。加快網絡空間作戰理論創新研究,系統分析人類戰爭的歷史演變,尋找戰爭的共同特點和規律,探索軍事領域可能出現的新思想、新理論,深入研究網絡空間作戰理論、作戰原則、作戰樣式,以及網絡空間作戰的力量體系的要素組成,科學判斷各要素自身及相互關係的變化對網絡空間作戰形態的變化和演進。加強網絡空間作戰制勝機理研究,系統分析網絡空間與物理空間的相互依存、相互制約和相互增強等關係,深入開展網絡空間制權機理、攻擊與防禦機理、作戰效果機理、自組織協同機理等方面的研究,積極探索網絡空間作戰制胜新機理、新途徑。積極探索網絡空間戰鬥力生成機理,著眼國家網絡空間安全戰略,以提高部隊戰鬥力為基點,系統剖析網絡空間戰鬥力生成結構,分析結構中各戰鬥力要素的組成和相互作用關係,科學形成網絡空間戰鬥力生成的新模式,為我軍在網絡空間能打仗打勝仗提供堅實的創新理論。
(四)抓住新一輪信息網絡技術變革重大機遇,大力推動網絡空間安全核心關鍵設備和技術的自主可控發展,夯實我國網絡空間安全的技術基礎。
長期以來,美國利用網絡信息技術優勢對別國進行安全威脅,近期針對我國高性能計算實施技術禁運,表明其不會輕易放棄主導國際網絡空間安全的話語權。 “棱鏡”事件後,世界各國普遍意識到,沒有核心關鍵設備和技術的自主可控,網絡空間安全的命脈就會掌握在別人手裡,紛紛加大自主可控信息網絡建設力度。當前,世界範圍內新一輪信息網絡技術正迎來新的發展浪潮,大數據、物聯網、量子信息、雲計算等新興前沿技術的發展,正推動傳統信息網絡技術進入更新換代階段,推動網絡空間的技術基礎、系統形態和安全機理髮生深刻變化。應充分利用信息網絡技術更新換代的寶貴“時間窗”,聚焦前沿新興領域中對網絡空間安全具有基礎性、全局性影響的核心關鍵技術,加大自主信息網絡技術和自主信息產業發展力度,持續推進“核高基”重大專項,積極營造自主可控應用的生態環境,下決心擺脫網絡空間安全核心關鍵技術受制於人的被動局面,將國家網絡空間安全的技術和產業發展的命脈牢牢掌控在自己手中。
(五)充分發揮我國製度優勢,推進我國網絡空間安全力量軍民融合式發展,科學構建軍民聯動、平戰結合的國家網絡空間安全體系
網絡空間具有“平戰結合、軍民一體”的特點,決定了網絡空間安全體系必須採取軍民融合發展模式。美國國防部新版網絡空間安全戰略的重要特點,就是廣泛動員軍民人力、技術和產業資源,加快在網絡空間形成突出的軍事和技術優勢。我國應充分發揮制度優勢和網絡大國的優勢,積極推動網絡空間作戰力量的軍民融合發展,充分吸納軍隊、地方專業技術力量以及孕育在民間的網絡攻防人才,形成國家統一指揮體制下的各方“主力軍”和“游擊隊”相結合的力量體系;通過完善構建軍民融合的組織領導、規劃計劃、協同創新和產業發展的國家網絡空間安全體系,推動軍民兩用網絡信息技術的發展,優化軍民兩用網絡信息產業佈局,加快形成“既能馳騁市場又能決戰沙場”的信息科技產業基礎;建立完善軍民融合網絡國防動員體系,明確網絡空間安全軍民聯動體制和運行機制,推動軍民融合的網絡空間行動聯合演習,積極探索如何在網絡空間中發揮人民戰爭威力,凝聚制衡強敵、反對霸權的巨大能量,實現我國由網絡大國向網絡強國的飛躍。

China Military Operational Use of Information Warfare Equipment //中國軍事信息戰裝備的作戰運用

中國軍事信息戰裝備的作戰運用

中國作家源

2004年12月06日

中國軍事信息戰

Information warfare is against C4ISR systems and C4ISR systems, information superiority is the competition, the main purpose is to ensure the normal operation of one’s own information systems, from the enemy’s use, paralysis and destruction; the same time, trying to use, paralysis and destruction of the enemy’s information systems, make paralyzed, confused state. Including strategic information warfare and information warfare battlefield information warfare two parts.

Strategic information warfare and information warfare battlefield

Strategic information warfare is the main features of a wide range of sectors covering all key political, economic, technological, military and special areas; special way, relates to psychological warfare, media warfare, deception warfare, media warfare and other special tools; special target, mainly through the decoy attack warfare, psychological warfare, information awareness enemy deterrence system and thinking system; great harm, make the whole country’s economic, political or military to a standstill, even regime change can make it happen; special person, not necessarily military combatants, computer experts, international crime syndicates, hacking or terrorist organizations with ulterior motives and so may become combatants.

Battlefield Information War battle took place in the space of information warfare, refers to the battle for the preparation and the integrated use of information technology tools and a variety of information weapons, information warfare platform and C4ISR systems, reconnaissance and early warning detection, information processing and transmission, arms control and guidance, operational command and control, deception and disguise interference and military strategy and other aspects of all-out confrontation and struggle. Battlefield Information War by interfering with or disrupting the enemy’s decision-making process, so that the enemy can not effectively coordinated action. Thus, the first enemy influence decisions, then the impact of their actions, which is to win air superiority electromagnetic, and then obtain air superiority, and finally the use of conventional forces to take combat operations. Seized control of information, seize the initiative on the battle space, and the competition for the right to make land, air, naval supremacy and control of space to lay a good foundation and a necessary condition.

Basic information warfare battlefield combat forces and means of information is digitized forces and weapons and equipment, the main contents include operational secrecy, military deception, electronic warfare, psychological warfare and firepower to destroy, core purpose is to fight for the right to access information battle space, control and use rights. Battlefield Information War is against information systems, which directly affects the entire battle space, processes, and success or failure of the entire war. The main battlefield information warfare style combat electronic warfare and cyber warfare. Electronic warfare is an important part of information warfare battlefield, mainly decoy for enemy communications, radar and other electromagnetic radiation sources of interference, sabotage and destruction activities. The Gulf War, not only the first large-scale use of electronic warfare, and formally adopted as a battle of the war and the particular stage of the battle action. Kosovo War, NATO used a lot of electronic warfare equipment, and the first use of electromagnetic pulse bombs and conducted the first network warfare. Cyber ​​warfare in cyberspace computer, using a network against the Internet activities, and for the first time in the Kosovo war. NATO cyber warfare measures include: network publicity; hacker attacks; attacks on financial networks. The main characteristics of the FRY cyberwarfare is people’s war mode, geek, geeks and computer enthusiasts spontaneously a lot of network operations, such as conduct online propaganda attack NATO website, use the Internet to pass intelligence.

War information warfare equipment, electronic warfare equipment.

Electronic warfare equipment, the development trend of increasing integration and universal, local wars under conditions of informatization, the electromagnetic environment on the battlefield increasingly complex, kind of separation from each other in the past, single-function electronic warfare equipment has been far can not meet the operational needs.Integration and generalization has become the focus of the development of electronic warfare equipment and electronic warfare equipment, the total future direction of development. In order to deal more effectively with the threat of information warfare electromagnetic complex, the next generation of electronic warfare equipment, the extensive use of advanced computer technology to significantly improve the automation of the entire system in order to have better real-time capabilities, since the adaptability and full power management capabilities. Working frequency electronic warfare equipment continuously expanding, increasing the transmission power, the development of millimeter-wave technology and photovoltaic technology, the modern electronic warfare equipment to keep the operating frequency band wider development.Overall, the future scope of work of electronic warfare equipment will be extended to the entire electromagnetic spectrum. GPS interference and anti-interference will be concerned about the practice of war has shown that, if they lose the support of GPS, information superiority will be greatly weakened, so that command and control, reconnaissance, combat, troop movement and other military links are facing a severe test, severely reduced combat effectiveness. Focus on the development of new anti-radiation and electronic warfare jamming aircraft, emphasis on the development of new, special electronic warfare technology and equipment, such as for anti-satellite laser weapons, high-energy particle beam weapons, and meteor burst communications, neutrino communication and the like.

Computer viruses as weapons

Within military information systems, battlefield information acquisition, transmission, processing and other functions required to complete computer and network, computer network is performed on the basis of information warfare and Pioneer. Use of software drivers and hardware magnetic induction sniffer sniffer network sniffer, etc. is an important way to attack networks. These sniffing tool was originally a test device, used to diagnose and repair assistance network, so it is a powerful tool for network administrators to monitor the network, but in the information war is a terrible computer virus weapons. It enables network “denial of service”, “information tampering” Information “halfway stealing” and so on. In addition, it will focus on design “trap door.” “Trap door” also known as “back door” is an agency computer system designers previously configured in the system, appear in the application or during the operating system, programmers insert some debugging mechanism. System Programmer For the purpose of attacking the system, deliberately left few trap door for a person familiar with the system to outdo each other to sneak into the normal system protection system. Network is an important infrastructure of information warfare, network centric warfare is mainly carried out based network, the network is reliable to determine the outcome of the war. Therefore, to strengthen the research network attack and defense operations for the win future information warfare is essential.

Electromagnetic pulse bomb

During the Iraq war, the US used a lot of electronic warfare equipment, and use of electromagnetic pulse bombs fell on Iraq and the Iraqi army broadcast television systems of various types of electronic radiation. Electromagnetic pulse bomb, also known as microwave pulse bomb, by a microwave beam into electromagnetic energy, a new type of directed energy weapons damage other electronic facilities and personnel.Its working principle is: after high power microwave antenna gathered into a bunch of very narrow, very strong electromagnetic waves toward each other, heat, ionizing radiation, etc. relying on the combined effect of electromagnetic waves generated by this beam, lethal voltages in electronic circuits inside the target and current, breakdown or burn sensitive components which, damage data stored in the computer, so that each other’s arms and paralyzed the command system, the loss of combat effectiveness. According to tests, a briefcase-sized microwave bomb, can produce up to 300 million watts of power pulse. After its plurality of coupling, then become adjustable radiation source, generating more than 2 billion watts of pulse waves. This is somewhat similar to pulse electromagnetic pulse generated when nuclear explosions, can easily enter the underground bunker from power and communication channels, which rely on radio to make, radar, computer, power grids and telephone modern weapons systems, biological and chemical weapons and their production Libraries workshop in an instant paralysis.

GPS jamming devices

Also in the Iraq war, the Iraqi use of GPS jamming device for Tomahawk cruise missiles were effective interference, this is the first time in actual combat on the GPS guidance system interference. GPS signal is weak, it is easy to interference. A Russian company to provide a 4-watt power handheld GPS jammers, less than $ 4,000 can buy.If purchased from retail electronic component assembly shops, you can spend $ 400 to create a disturbance over a radius of 16 km of GPS jammers. Before the war in Iraq war, the United States had expected to interfere with the GPS signal the Iraqi side. In fact, the United States had already given their GPS bombs and missiles loaded with anti-jamming technology to make these GPS-guided weapons to continue to use the GPS signal in the case of interference; even if the GPS signal is lost, they can also use their own weapons guidance systems other inertial navigation, laser-guided, so that their own to reach the target. Nevertheless, early in the war in Iraq, the US military more than a dozen Tomahawk cruise missiles due to interference or deviates from a predetermined route, fell Turkey, Syria and Iran. Small GPS jammers problem alerted the US government, Powell personally investigate the source of Iraq GPS jammers, Russia and other countries exerted considerable pressure.

During the first Gulf War, GPS navigator as a trial product for the first time issued to desert warfare personnel, the effect is obvious. At that time, all weapons, including cruise missiles, including not using the GPS navigation device. The war in Iraq, we see that almost all combat platforms, every man, almost all of missiles and bombs have adopted this navigation device, so that the tanks, planes, ships maneuver more accurate missiles and bombs original the probability of error reduced to 1-3 meters, maximum 10 meters range.   Everything there is a benefit must be a disadvantage. Disadvantages and drawbacks of GPS navigation information is the same weaponry, is the electronic interference.From the perspective of the development of weapons and equipment, the purchase of a cruise missile costs $ 100 million, while manufacturing a GPS jammer only a few hundred dollars, as a strategic defensive side, if a large number of development and the development of GPS jammers, not only for the US missile and the bomb is a threat to its tanks, planes, ships and navigation personnel will also have a huge impact. Of course, we should also see the US fight a battle, and further, after the end of the war in Iraq is bound according to the lessons of the war, improved GPS system. Is expected to be improved in three areas: First, the GPS satellites, satellite launch is mainly to enhance the signal and transmit as many GPS satellites; the second is to improve the guidance system, mainly to increase the combined guidance system, after interference in the GPS guidance, automatic recovery or transfer other inertial navigation mode to ensure the normal operation of the platform and weapons; the third is GPS anti-jamming, mainly to improve the GPS receiver anti-jamming capability, the development of new GPS receiver, in the theater of the local military and civilian GPS reception machines and electronic jammers and interference suppression.

Original Mandarin Chinese:

信息戰是C4ISR系統與C4ISR系統的對抗,是信息優勢的爭奪,主要目的是確保己方信息系統正常運行,免遭敵方利用、癱瘓和破壞﹔同時,設法利用、癱瘓和破壞敵人的信息系統,使之處於癱瘓、迷茫狀態。信息戰包括戰略信息戰和戰場信息戰兩大部分。

戰略信息戰和戰場信息戰

戰略信息戰主要特征是范圍廣泛,涉及國家政治、經濟、科技、軍事等各個要害部門和特殊領域﹔方式特殊,涉及心理戰、輿論戰、欺騙戰、媒體戰等特殊手段﹔目標特殊,主要是通過誘騙戰、心理戰、信息威懾等攻擊敵人的認識體系和思維體系﹔危害巨大,能使整個國家的經濟、政治或軍事陷入癱瘓,甚至能使其發生政權交替﹔人員特殊,參戰人員不一定軍人,計算機專家、國際犯罪集團、別有用心的黑客或恐怖組織等都可能成為參戰人員。

戰場信息戰是發生在戰斗空間內的信息戰,是指為准備和進行一場戰役,綜合運用信息技術手段和各種信息化武器、信息化作戰平台和C4ISR系統,在偵察探測及預警、信息處理與傳遞、武器控制和制導、作戰指揮與控制、偽裝欺騙與干擾以及軍事謀略等方面展開的全面對抗和斗爭。戰場信息戰是通過干擾或打亂敵方決策程序,使敵方無法有效採取協調一致的行動。因此,要先影響敵人決策,然后再影響其行動,即先贏得空中電磁優勢,再取得空中優勢,最后使用常規部隊採取作戰行動。奪取了制信息權,就奪取了戰斗空間的主動權,而且為爭奪制陸權、制空權、制海權和制天權奠定一個良好基礎和必要條件。

戰場信息戰的基本作戰力量和手段是數字化部隊及信息化武器裝備,主要內容包括作戰保密、軍事欺騙、電子戰、心理戰和火力摧毀,核心目的是爭奪戰斗空間的信息獲取權、控制權和使用權。戰場信息戰是信息體系的對抗,它直接影響到整個戰斗空間、整場戰爭的進程和成敗。戰場信息戰的主要作戰樣式是電子戰和網絡戰。電子戰是戰場信息戰的一個重要組成部分,主要是針對敵人通信、雷達等電磁輻射源進行的誘騙、干擾、破壞和摧毀活動。海灣戰爭中,電子戰不僅首次大規模使用,而且正式作為戰爭中的一個戰役階段和特定戰役行動。科索沃戰爭中,北約使用了大量電子戰裝備,並首次使用了電磁脈沖炸彈並首次進行了網絡戰。網絡戰是在計算機網絡空間,利用因特網進行的一種網絡對抗活動,並在科索沃戰爭中首次使用。北約網絡戰的措施包括:網絡宣傳﹔黑客攻擊﹔襲擊金融網絡等。南聯盟網絡戰的主要特征是人民戰爭模式,網迷、電腦迷和計算機愛好者自發地進行了大量網絡作戰行動,如開展網上宣傳、攻擊北約網站、利用網絡傳遞情報等。

戰爭中的信息戰裝備

電子戰裝備

電子戰裝備的發展趨勢日趨一體化和通用化,信息化條件下的局部戰爭中,戰場上的電磁環境日益復雜,以往那種彼此分立、功能單一的電子戰裝備已遠遠不能適應作戰需要了。一體化和通用化已成為當前電子戰裝備發展的重點和未來電子戰裝備總的發展方向。為了更有效地對付信息化戰爭中復雜多變的電磁威脅,未來新一代的電子對抗裝備,將廣泛採用先進的計算機技術,大幅度提高整個系統的自動化程度,以具備更好的實時能力、自適應能力和全功率管理能力。電子戰裝備的工作頻段不斷拓寬,發射功率不斷增大,毫米波技術和光電技術的發展,使現代電子戰裝備的工作頻率不斷向更寬的頻段發展。從整體上看,未來電子戰裝備的工作范圍必將擴展到整個電磁波頻譜。GPS干擾與反干擾將受到關注,戰爭實踐已經表明,如果失去GPS的支持,就會極大地削弱信息優勢,使指揮、控制、偵察、打擊、部隊機動等各個軍事環節都面臨嚴峻考驗,嚴重降低戰斗力。重點發展反輻射和新型電子戰干擾機,重視發展新型、特殊的電子戰技術裝備,如用於反衛星的激光武器、高能粒子束武器,以及流星余跡通信、中微子通信等等。

計算機病毒武器

在軍事信息系統中,戰場信息的獲取、傳遞、處理等功能需要計算機及網絡來完成,計算機網絡是進行信息戰的基礎和先鋒。利用軟件驅動嗅探器和硬件磁感應嗅探器等對網絡進行嗅探是進攻網絡的重要方法。這些嗅探工具原本是一種測試設備,用來診斷和協助修理網絡,因此它是網管人員管理網絡的一種得力工具,但在信息戰中卻是一種可怕的計算機病毒武器。它能使網絡“服務否認”、“信息篡改”、信息“中途竊取”等。另外,也將重視設計“門戶陷阱”。“門戶陷阱”又稱“后門”,是計算機系統設計者預先在系統中構造的一種機構,在應用出現或操作系統期間,程序員插入一些調試機構。系統程序員為了達到攻擊系統的目的,特意留下少數門戶陷阱,供熟悉系統的人員用以超越對方正常的系統保護而潛入系統。網絡是信息化戰爭的重要基礎設施,網絡中心戰主要是基於網絡而進行的,網絡是否可靠決定戰爭的勝負。因此,加強網絡攻防作戰的研究,對於贏得未來信息化戰爭至關重要。

電磁脈沖炸彈

伊拉克戰爭中,美軍使用了大量電子戰裝備,並使用電磁脈沖炸彈襲擊了伊拉克廣播電視系統及伊軍各類電子輻射源。電磁脈沖炸彈也稱微波脈沖炸彈,是通過把微波束轉化為電磁能,毀傷對方電子設施和人員的一種新型定向能武器。其工作原理是:高功率微波經過天線聚集成一束很窄、很強的電磁波射向對方,依靠這束電磁波產生的高溫、電離、輻射等綜合效應,在目標內部的電子線路中產生致命的電壓和電流,擊穿或燒毀其中的敏感元器件,毀損電腦中存貯的數據,從而使對方的武器和指揮系統陷於癱瘓,喪失戰斗力。據測試,一枚公文包大小的微波炸彈,可產生功率達3億瓦的脈沖波。將其多個聯接后,則能成為可調整的輻射源,產生20億瓦以上的脈沖波。這種脈沖波有點類似核爆炸時產生的電磁脈沖,可以輕易地從電力和通訊管道進入地下掩體,使其中依賴無線電、雷達、計算機、電網和電話等的現代化武器系統、生化武器庫及其生產車間在瞬間癱瘓。

GPS干擾設備

伊拉克戰爭中,伊軍利用GPS干擾儀對戰斧巡航導彈進行了有效的干擾,這是第一次在實戰中對GPS制導系統進行干擾。GPS信號很弱,很易於干擾。一家俄羅斯公司提供的一種4瓦功率的手持GPS干擾機,不到4000美元就能買到。如果從零售電子商店購買部件組裝,花400美元就可以制造一個干擾半徑16公裡以上的GPS干擾機。伊拉克戰爭開戰之前,美國就已經預料到伊拉克方面會干擾GPS信號。美國其實早已經給其GPS炸彈和導彈裝載了抗干擾技術,使這些GPS導引的武器能夠在干擾的情況下繼續使用GPS信號﹔即使GPS信號丟失,這些武器還可以使用自身的其他導引系統如慣性導航、激光制導等,使自己到達目標。盡管如此,伊拉克戰爭初期,美軍十幾枚戰斧式巡航導彈還是因受干擾偏離預定航線,落在土耳其、敘利亞和伊朗境內。小小的GPS干擾機問題驚動了美國朝野,鮑威爾親自出面調查伊拉克GPS干擾機的來源,對俄羅斯等國施加了不小的壓力。

海灣戰爭中,GPS導航儀作為試用品首次發放給沙漠作戰人員使用,效果明顯。當時,包括巡航導彈在內的所有武器都沒有採用GPS導航裝置。伊拉克戰爭中,我們看到幾乎所有的作戰平台,每一個單兵,幾乎全部的導彈和炸彈都採用了這種導航裝置,從而使坦克、飛機、艦艇的機動更加精確,使導彈和炸彈的原概率誤差縮小到1—3米,最大10米范圍之內。

凡事有一利必有一弊。GPS導航的弊端與信息化武器裝備的弊端是一樣的,就是電子干擾問題。從武器裝備發展角度來看,購買一枚巡航導彈需要100多萬美元,而制造一部GPS干擾機才幾百美元,作為戰略防御一方,如果能夠大量發展和研制GPS干擾機,不僅對於美軍導彈和炸彈是一種威脅,對其坦克、飛機、艦艇和人員的導航定位也將產生巨大影響。當然,也應看到美軍打一仗、進一步,伊拉克戰爭結束后必將根據戰爭中的教訓,改進GPS系統。預計將在三個方面進行改進:一是GPS衛星,主要是增強衛星發射信號,並盡可能多的發射GPS衛星﹔二是改進制導系統,主要是增加復合制導裝置,在GPS指導受到干擾之后,自動恢復或轉入慣性等其他導航方式,以保証平台和武器的正常運行﹔三是GPS反干擾,主要是提高GPS接收機抗干擾能力,研制新型GPS接收機,在戰區對地方軍民用GPS接收機和干擾機進行電子壓制和干擾等。

China Information Warfare – China’s Basic Form of a Future War //中國信息化戰爭—中國未來戰爭基本形態

中國信息化戰爭—中國未來戰爭基本形態

In the 21st century, the rapid development of high technology and extensive application, and promote the development and evolution of combat weapons and equipment, and promote the transformation and innovation and the development of institutional military doctrine, which triggered a new revolution in military affairs. Information warfare will eventually replace mechanized war, become the basic form of war. Information warfare refers to occur in the information age, information-based, using information technology as a tool of war weaponry of war. Information warfare does not change the nature of war, but the war must take into account the outcome of the mentor and the consequences of war, first in the pursuit of strategic guidance on how to achieve “the enemy without fighting the soldiers,” the strategic victory, the kind of large-scale physical destruction at the expense of traditional warfare will be greatly constraints and limitations.

Knowledge has become the main source of war to destroy the force  on the right in terms of information (quantity and quality) dependence, the past is not any war and information war. In conventional war, the two sides focus more on comprehensive contest on the basis of physical force. Such as mechanized war, mainly for steel contest, contest the whole country is full of large industrial machinery production capacity. Information war contest does not exclude physical force, but more important is the contest of knowledge, innovation ability and speed of innovation contest. Knowledge will become the main source of war to destroy force, “an ounce of effect of silicon computer generated perhaps more than a ton of uranium is also big.”

Firepower, mobility, information, constitute an important part of modern military combat capability, and the ability of information has become the primary indicator to measure the level of combat capability. Information capabilities, performance in terms of information acquisition, processing, transmission, and use of confrontation, to be manifested through information superiority and competition control. Information superiority, in essence, in the understanding of the enemy at the same time prevent the enemy to understand one’s own situation, confrontation is a dynamic process. It has become a fight for air supremacy, command of the sea, land control of the premise of a direct impact on the process and outcome of the war. Of course, people will always be the master of information warfare. Plan and organize and direct the war from people completely dominated increasingly dependent on technology to develop human-machine combination of military quality requirements are higher. Information from the advantages of competition to the final decision superiority into more competitive knowledge and wisdom.

War forces will move toward information, intelligence  forces of war are directly and indirectly referred to the various forces for war, to fight the information war, natural rely heavily on information, intelligence and information technology military weapons and equipment.

The most basic of war, the most significant feature is the use of the most advanced scientific and technological achievements to create the most advanced instruments of war. Information weapons and equipment is developed on the basis of mechanized equipment, such as C4ISR systems, precision-guided weapons, information warfare equipment and various high-tech combat platforms.They are highly knowledge-intensive tools of war, and thus can not be compared with the traditional tools of war performance, functionality, operational capabilities and effectiveness. At the same time, they play to the performance level and the operational level, directly restricted information, information systems and information capabilities.   The army is the army of information technology refers to using information technology to weapons armed with the information age. Its unprecedented level of integration will enhance the overall combat capability more powerful, emphasizing optimal combination of combat capability, the services are just part of joint combat forces. At the same time, the size of the forces become smaller, more flexible and diverse forms of grouping, vertical command structure will also benefit from the tree into a flat network architecture. From the subordinate command relationship changed multilayer horizontal communication, and down one command relationships, delayering, put as many combat units into the same level of information, information sharing, shorten the information flow to meet the real-time command decision Claim.

War mode will tend to systematic, precise  Technological development determines the evolution of tactics. With the development of weapons and equipment, the scale of war is also growing, the most prominent battlefield extended to three-dimensional space from the plane: from land to sea and air space, and then, from the visible to the invisible electromagnetic space and information space, it has formed armed day one dimensional, tangible and intangible space space Blending the new operational environment. This network battlefield is great depth, three-dimensional high, dilute the distinction between front and rear, major changes have taken place in time and space, both traditional air, naval, marine, electronic warfare, and more will be a new web-based attacks information warfare. Rely on the support of information networks, through the orderly flow of information, all combat operations within the space really blending together.

In the past, a new weapon tends to cause relatively large impact, obtain better operational effectiveness. But in the modern battlefield, the two sides are no longer hostile confrontation between a single or a few branches, but not a single weapon system confrontation, but confrontation between systems. In the information war, the extent of such a system of confrontation and even more will not emphasize the operational performance of tanks, aircraft, warships and other single combat platform, but rather to highlight the overall performance of information technology weaponry system, pay attention to multiple armed services, comprehensive combat effectiveness of a variety of weapons and equipment.

Destroy the enemy is an important part of the war. Mechanized warfare, anti-surface fire mostly destroyed, such as fire suppression, carpet bombing, saturation-type attacks. This operational mode corresponding to the extensive mode of production of the industrial age, reflecting the idea of a war of attrition, to victory in that time, space, energy, supplies and other aspects of continuous consumption and weaken the power of the enemy, and finally defeat the enemy. The precision strike in line with the characteristics and requirements of the information age, but also reflects the basic characteristics of information warfare. Intensive production model of the information age emphasizes effectiveness, efficiency, effectiveness. Weapons and equipment level of intelligence and combat accuracy was greatly improved, can be done “pinpoint” type of destroyed; also can be accurate, non-physical damage, such as psychological warfare and information warfare. In addition, the precision strike can also significantly reduce collateral damage, so that the development and the process of social civilization synchronization war, war means more conducive to play its unique role.

Course of the war would be short, controlled – the rhythm of information warfare significantly accelerated course of the war will become shorter and shorter, but the intensity is getting high, and humanity as a whole control of the war also significantly enhanced.   Army should pay more attention to the quality of the information age and effectiveness. Winning quality from quantity into winning, it is one of the significant change in the war. Such as the combination of high-tech precision-guided weapons and combat platforms used to enhance the ability of the enemy to combat the standoff embodiment, can greatly reduce the loss of one’s own operations; continually improve the accuracy of the attack, it can greatly reduce the number of weapons consumption. World War II in 9000 to use bombs to blow up a goal, now 1-2 as long as missiles or guided bombs can solve the problem, operational tempo and the natural process will be faster.

Layers of advancing successive war, set small victories, this contact, wire is typical of traditional methods of warfare combat visual feedback. In information warfare, from the contact, non-line operations will be the main form of combat operations will be launched simultaneously in all the whole depth of space combat and battlefield, the primary targets will point directly to the enemy center of gravity. Especially powerful information warfare, even in the enemy without the knowledge of the state, it is possible to make several hacker instant enemy paralyzed economic and social, to quickly achieve the purposes of war.

Source: http://www.china001.com/

Original Mandarin Chinese:

進入21世紀,高技術的迅猛發展和廣泛應用,推動了武器裝備的發展和作戰方式的演變,促進了軍事理論的創新和編制體制的變革,由此引發新的軍事革命。信息化戰爭最終將取代機械化戰爭,成為未來戰爭的基本形態。信息化戰爭是指發生在信息時代、以信息為基礎、以信息化武器裝備為戰爭工具的戰爭。信息化戰爭不會改變戰爭的本質,但戰爭指導者必須考慮到戰爭的結局和後果,在戰略指導上首先追求如何實現“不戰而屈人之兵”的全勝戰略,那種以大規模物理性破壞為代價的傳統戰爭必將受到極大的約束和限制。

知識成為戰爭毀滅力的主要來源

就對信息(數量和質量)的依賴程度而言,過去的任何戰爭都不及信息化戰爭。在傳統戰爭中,雙方更注重在物質力量基礎上的綜合較量。如機械化戰爭,主要表現為鋼鐵的較量,是整個國家機器大工業生產能力的全面競賽。信息化戰爭並不排斥物質力量的較量,但更主要的是知識的較量,是創新能力和創新速度的競賽。知識將成為戰爭毀滅力的主要來源,“計算機中一盎司矽產生的效應也許比一噸鈾還大”。

火力、機動、信息,是構成現代軍隊作戰能力的重要內容,而信息能力已成為衡量作戰能力高低的首要標誌。信息能力,表現在信息獲取、處理、傳輸、利用和對抗等方面,通過信息優勢的爭奪和控制加以體現。信息優勢,實質就是在了解敵方的同時阻止敵方了解己方情況,是一種動態對抗過程。它已成為爭奪制空權、制海權、陸地控制權的前提,直接影響著整個戰爭的進程和結局。當然,人永遠是信息化戰爭的主宰​​者。戰爭的籌劃和組織指揮已從完全以人為主發展到日益依賴技術手段的人機結合,對軍人素質的要求也更高。從信息優勢的爭奪到最終轉化為決策優勢,更多的是知識和智慧的競爭。

戰爭力量將走向信息化、智能化

戰爭力量是可直接和間接用於戰爭的各種力量的統稱,打信息化戰爭,自然離不開信息化、智能化的武器裝備和信息化軍隊。

戰爭最基本、最顯著的特徵,就是利用當時最先進的科學技術成果製造最先進的戰爭工具。信息化武器裝備是在機械化裝備基礎上發展起來的,如C4ISR系統、精確制導武器、信息戰裝備和各種高技術作戰平台等。它們都是知識高度密集型的戰爭工具,因而具備傳統戰爭工具無法比擬的性能、功能、作戰能力和效果。同時,它們作戰效能的高低和發揮程度,直接受到信息、信息系統和信息能力的製約。

信息化軍隊是指用信息化武器裝備武裝起來的信息時代的軍隊。其一體化程度將空前提高,整體作戰能力更強大,強調作戰能力的優化組合,各軍種都只是聯合作戰力量的一部分。同時,兵力規模將趨於小型化,編組形式更加靈活多樣,指揮體制也將從垂直樹狀結構轉變為扁平網絡結構。即從上下級多層指揮關係改為橫向溝通、上下一體的指揮關係,減少層級,把盡可能多的作戰單元納入同一個信息層次,實現信息共享,縮短信息流程,以滿足實時化指揮決策的要求。

戰爭模式將趨於體系化、精確化

技術的發展決定著戰術的演變。隨著武器裝備的發展,戰爭規模也在日益擴大,突出表現為戰場從平面向立體空間擴展:由陸地到海洋再到空中和太空,從有形空間到無形的電磁和信息空間,已形成了陸海空天四維一體、有形空間與無形空間相互交融的新型作戰環境。這種網絡化戰場是大縱深、高立體的,前後方區別淡化,時空觀都發生了重大變化,既有傳統的空戰、海戰、陸戰、電子戰,更會出現全新的以網絡攻擊為主的信息戰。依靠信息網絡的支撐,通過信息的有序流動,所有作戰空間內的作戰行動真正地融合為一體。

過去,一件新式武器往往會造成比較大的影響,獲得較好的作戰效果。但在現代戰場上,敵對雙方已不再是單一或少數軍兵種之間的對抗,更不會是單一武器系統的對抗,而是體係與體系的對抗。在信息化戰爭中,這種體系化對抗的程度更甚,將不再強調坦克、飛機、軍艦等單件作戰平台的作戰性能,而是突出信息化武器裝備體系的整體效能,注重發揮多個軍種、多種武器裝備的綜合作戰效能。

消滅敵人是戰爭的重要內容。在機械化戰爭中,火力摧毀主要是面殺傷,如火力壓制、地毯式轟炸、飽和式攻擊等。這種作戰方式對應於工業時代的粗放型生產模式,反映了消耗戰的思想,制勝之道在於從時間、空間、能源、補給等方面不斷消耗和削弱敵人的力量,最後戰勝敵人。而精確打擊符合信息時代的特徵和要求,也反映了信息化戰爭的基本特點。信息時代的集約型生產模式講求效能、效率、效益。武器裝備的智能水平和打擊精度也獲得極大的提高,可做到“點穴式”的摧毀;同時還可以進行精確的非物理性毀傷,如心理戰、信息戰等。另外,精確打擊還可以大幅度降低附帶毀傷,使戰爭的發展與社會文明進程同步,更有利於戰爭手段發揮其獨特作用。

戰爭進程將是短暫的、可控的

信息化戰爭的節奏明顯加快,戰爭進程將變得越來越短,但強度卻越來越高,而人類對戰爭的整體控制能力也在顯著增強。

信息時代的軍隊更注重質量和效能。由數量製勝轉變為質量製勝,是戰爭發生的顯著變化之一。如精確制導武器和高技術作戰平台的結合使用,增強了從敵人防區外實施打擊的能力,可大大降低己方的作戰損失;攻擊精度的不斷提高,可大大減少武器消耗數量。第二次世界大戰中要用9000枚普通炸彈才能炸毀一個目標,現在只要1-2枚導彈或製導炸彈就可以解決問題,作戰節奏和進程自然會越來越快。

層層推進,逐次交戰,集小胜為大勝,這種接觸式、線式作戰是傳統作戰方法的典型直觀反映。而在信息化戰爭中,脫離接觸式、非線式作戰將成為主要形式,作戰行動將在所有作戰空間和戰場全縱深同時展開,首要打擊目標將直接指向敵人重心。尤其是信息戰威力巨大,甚至在敵人毫不知情的狀態下,幾個黑客頃刻間就有可能令敵國經濟和社會陷入癱瘓,從而迅速達成戰爭目的。

China Military Review: Special Operations Forces: The “strategic dagger” of US Foreign Military Operations // 中國軍事評論特种作战部队:美对外军事行动的“战略尖刀”

中國軍事評論特种作战部队:美对外军事行动的“战略尖刀”

来源:解放军报   Since World War II, special operations on its unique flexibility, efficiency, asymmetry, is increasingly becoming an important means to safeguard the strategic interests of the United States the way to deal with the threat of challenges. In recent years, the US military special operations forces is the task type from traditional warfare to expand the area of ​​non-traditional field of battle, much to replace conventional forces to become the protagonist of battlefield information, acts as a US foreign military operations “strategy knife” of the situation.

    War sharpening “of the United States Blade”

Although modern special operations began in World War II, but its position fully aware of the role of the US military and is widely used in the practice of war after World War II. In almost all previous local wars and regional conflicts in the United States to intervene, or can be hidden or US Special Operations Forces found the figure, during record and failure of innovation and development have become the US military special operations “grindstone” so special operations the “United States of Blade,” the increasingly sharp.

Vietnam War can be said that the US large-scale, long the first attempt of special operations. During the war, US special operations forces are widely assumed to wipe out the guerrillas, special reconnaissance, sabotage attack, trainers and other “counter-insurgency” operations, and implementation of the attack, such as Vietnam prisoner of war camps Shanxi operations. Although the injustice of war and strategic guidance mistakes, tactical advantage the US has never been able to get the special operations strategy into a winning situation, sadly had to withdraw troops from Vietnam, but special operations forces in the war revealed adaptability, mobility, concealment, but be sure to get high-level US military, and has been the focus used in subsequent wars and armed conflicts.

In 1980, in order to rescue the detained American Embassy in Iran, more than 60 staff, 97 US special operations long-range raid from Cairo to Tehran. Since the aircraft suddenly encountered sandstorms and failures in the course of action, combined with ill emergency plan, the US military was forced to cancel plans. But the US military did not lose heart, but pay more attention to the lessons learned on the basis of a strong push development of special operations. April 1987, the US Special Operations Command was officially established, special operations forces govern the land, sea and air belongs marks SOF as an independent fighting force officially on the United States in war.

Subsequently, the invasion of Panama in 1989 action, the 1991 Gulf War, the war in Afghanistan in 2001, the 2003 Iraq war and the 2011 war in Libya, the US military will be more and more frequently used for special operations forces and strategic direction of the main season for completion one by one “mission impossible.” Especially in the war in Afghanistan, with the help of advanced information technology tools, the US special operations forces to work independently, creatively objective guidance, penetration strike, buy com collapse, US forces defeated the Taliban regime in a short time to achieve the purposes of war.

US special operations forces continue to promote the development, almost “every battle will be special,” The reason is: First, responsive, compiled capable, able to quickly respond to local emergencies and asymmetric threats; the second is action concealed, sudden strong often the enemy unexpectedly, with minimal resources quickly achieve strategic goals, action to reduce the risk; Third flexible means of warfare, as campaign “global strike” strategic concept important choice; four is better able to fight with other forces joint operations, conventional and unconventional forming closely integrated combat system.

 Great support system under the “sword easy road”

With the evolution of new military revolution in depth, US Special Operations increasingly showing the non-contact combat, to fight the elite fighting from the contact-scale operations, from strategic weapons platform support to support the system, from traditional areas to new areas of the rapidly evolving situation, special combat troops because it can carry out specific tasks to perform conventional forces should not be difficult to complete or to become military to defeat the enemy “killer.”

Trend direct command and control strategy. US Special Operations command and control consists of national and theater-level combat troops and three grade levels. Under normal circumstances, the national command authorities, Special Operations Command, Command theater, theater of military services under the command or function Command commander level performed by operational control. With the mandate of privacy, sensitivity continues to improve, more and more stressed by the US military strategic level special operations were “direct” type vertical command, enhanced controllability operational flexibility. For example, in 2011, and the residence of the US military in Pakistan killed Osama bin Laden raid, Obama and his decision-making team thousands of miles away from the White House situation room, through remote video, real-time synchronization command. This action fully reflects the strategic nature of special operations.

Special blitz highlighting system support. “Tactical operations, strategic support; elite action, system support; local action, global support” has become a significant feature of the US military special operations. Still killed Osama bin Laden, “Neptune Spear” raid, for example, in this battle, on the surface of the US military deployed only four helicopters, 24 “Seal” commandos, it took less than 40 minutes to kill al-Qaeda Osama bin Laden summit. But behind both heaven 35 satellites and more than 40 aircraft to provide a strong information security, there collusion aircraft carrier battle groups at sea, on land as well as support for two military bases in Central Asia, as well as various support ten thousand security personnel. This is a typical “large system support elite action” reflects the profound new form of war in the information age.

Towards a comprehensive joint operations. The US military believes, “joint” is one of the special nature of warfare requires the full participation of the military services and the depth of collaboration. Currently, the US Special Operations not only achieved with the Air Force from the “sensor to shooter” joint, greatly improving its “spike” combat capability, but also to break the union with CIA covert operations, the CIA intelligence-gathering capabilities and special operations forces strike capability combine complementary advantages. Especially after Afghanistan “Operation Enduring Freedom”, the US military special operations but will work with conventional forces from the joint campaign sink to the level of the tactical level, to achieve integrated operations teams level. According to statistics, code-named “Mountain Storm” military implementation of the 2004 crackdown, the US special operations troops with conventional forces conducted 62 joint tactical operations, 40 of which action is implemented in the company level, in action 22 battalion level performed.

The effect of a strike action to pursue the enemy. US Special Operations always attached importance to a direct attack on the enemy’s high-value targets in an attempt to speed up the process of speedy combat strategic objectives. From the recent local wars practice, often other US Special Operations Leadership Summit and pre-emphasis as targets, the implementation of the so-called “decapitation attack” by the sudden rapid surprise attacks, to “lock on”, a hit enemy’s strategic effect. For the first time on the war in Iraq from Saddam to use such tactics, the war in Libya Gaddafi trick, while not directly reach the goal, but the US military special operations against enemy decision-making psychological shock is immeasurable, greatly shaken each other’s will to resist, played a “strike hard” and “soft kill” double effect. It is envisioned that the US military this “sword pay” type of special operations will also continue to unfold.

 Efforts to forge “global power”

Currently, the US has special operations, combat drones and network operations as of great importance for the future operations of the “New Trinity” power, to focus on building, hoping to build a responsive, both small and hard, multi-dimensional and multi-functional special war “global power.”

Strengthening overseas deployment, to expand the number scale. Recently, the US significantly reduced military presence overseas, but the number of overseas US Special Operations forces have been continuously increased, but also a significant increase in the deployment of the number of countries and regions. According to reports, the end of the Bush administration, the US Special Operations Forces deployed in about 60 countries worldwide, to increase to 75 by 2010. As of 2015, the United States Special Operations Forces have been deployed to the world’s 135 countries. To meet the growing demand of the task, in the various branches of the background of widespread layoffs, the US special operations forces increased rather than decreased, the number from 2001 to 2014, 3.3 million to nearly 70,000 people, an increase of about one times, of which 80% deployed overseas. American executives believe scale special operations forces deployed abroad, will significantly improve the ability of US military intervention in global affairs in particular to respond to emergencies.

Optimizing operational grouping, build new units. In order to meet the diverse nature of the war on terror style, US special operations forces structure adjustment pace has accelerated noticeably. In recent years, the focus adjustment is: narrow special operations group size to achieve power “downsizing”; to add a new task forces have been established in the Civil Command, irregular warfare and psychological warfare wing brigade, enhance the combat capability of non-traditional areas, to achieve carry out the task “diversity”; optimization special operations units grouped according to the type of task, we will act flexibly experts, communications specialists, psychologists, explosives experts and other personnel mixed grouping of different expertise, improve the ability to adapt to complex battlefield, combat units to achieve “synthesis of . ”

Comprehensive update equipment, enhance the quality of new combat capability. In recent years, the US military continued to increase investment, research and development of new special operations equipment: First, “Individual Combat System”, mainly by the laser range finder, cameras, environmental sensors, ballistic computer and target tracking device component, with automatic transmission and shielding against was behind the target function, improve the combat capability independent of man; the second is a remote delivery tool to improve special operations MC-130H aircraft and purchase V-22 tilt-rotor aircraft, airborne accurate terrain-following radar, navigation systems and high-speed aircraft resistance, enhance special operations forces behind enemy lines and remote mobile penetration; the third is a new concept weapons, the main enemy is the destruction of electronic equipment computer viruses, electromagnetic pulse weapons. These new weapons once the troops will enable the US military special operations means richer, more diverse mission areas.XX

Not every commandos wore green berets

– Special Forces decryption

Chronicles Dazhaoweibin

In American terms, “special operations forces” (Special Operation Forces) and the “Special Forces” (Special Forces) are two concepts exist simultaneously. The former US Special Operations Command is under the jurisdiction of all forces referred to, including the Army Special Forces, 75 commandos, Navy Seals, “Delta” Force and SEAL Team 6; the latter refers specifically to the Army Special Forces, known as “Green Beret hat “forces. The force is due to Kennedy personally authorized to wear with other branches of the military are not the same Green Beret named.

It has a long history with the CIA origins very well. In 1952 the US created its first “Green Beret” troops, is to OSS (the predecessor of the CIA), “Jed fort” under the leadership of troops as a template. During World War II, “Jed fort” team was ordered to enter the territory of France, Belgium and the Netherlands were occupied, providing weapons and supplies for the resistance groups area, and act as the Supreme Allied Command with contact channels. Responsible for the formation of the force, Colonel Allen Burbank was a veteran of the Office of Strategic Services, the CIA after playing for, has a wealth of experience in covert operations. The task force was originally given is: Suppose the Soviet occupation of Western Europe, they will remain in the Soviet front organization behind the unconventional war. So far, unconventional warfare remains one of the core tasks of the Special Forces.Since the task often requires secrecy in times of peace or war before it started to prepare, and execute peacetime area of ​​responsibility belongs to the CIA’s covert operations mission, so often we need to work with the CIA when the Special Forces carry out such tasks or simply placed under the leadership of the CIA. CIA Special Operations agents are often recruited from the Special Forces veterans, it is not surprising.

Clear division of responsibility area worldwide. “Green Beret” troops now compiled five active duty brigades and two by the National Guard usually responsible for the supervision of trained reserve brigade. Five active-duty brigade Total Posts a million people, are responsible for the Pacific, Africa, the Middle East, Central Asia, the Americas and Europe in five regions, corresponding to the formation of the US theater setting.According to their topography, political ecology, military deployment, the local language and customs of their respective areas of responsibility, etc., to carry out targeted training.Some troops were deployed in a long-term task of the region belongs to the friendly countries to better combat environment where the familiar. Under the big division, and each brigade has a very fine internal division of labor. A Special Forces squad as the basic combat unit, and its 12 members are familiar with the operations, intelligence, weapons, engineering, medical, communications expertise in one of the six, and by cross-training to master one to two additional expertise.

Ability comprehensive, one play multiple roles. Compared to the commando skills to the extreme to show “Delta” force and “SEAL Team 6”, “Green Beret” troops skill players is more comprehensive and balanced, they not only have excellent commando skills, but also possess a the US military called a “diplomatic warrior” skills that language and culture skills, interpersonal skills and political sensitivity. Due to the wide implementation of anti-terrorism, reconnaissance, foreign internal defense, unconventional warfare task, they have to play a role not only heroic commandos, more mature, alert and flexible intelligence agents, coaches and diplomats. In the recruitment process, the “Green Berets” force requirements should recruit must go through foreign language skills tested, along with social communication, military training, weapons, operational and organizational aspects of directing talent. Taking into account the language and cultural skills through short-term training is difficult to obtain, often targeting special forces in recruiting those with an ethnic minority background or appearance, with skilled foreign language ability. Shortlisted players to accept the harsh physical and fighting skills, while also learning psychological warfare course and language intensive training to ensure that they are trained to play multiple comprehensive ability and quality possible.

Frequent use of the name rarely made public. Since the formation of the “green beret” troops will be frequently used, but in view of the confidentiality of their duties, as well as its inherent low profile style, the message about these tasks rarely made public, it is difficult to see in newspapers. For example, in the late 1950s, they have been sent to Thailand, Vietnam, the Philippines, South Korea, Indonesia and other places, for the training of local forces; in 1967 was sent to Bolivia, Bolivian Army responsible for training camp do not move, and to assist them killed the central figure of the Cuban revolution, Che Guevara; in 1989 a large-scale invasion of Panama participated in the “just cause” to overthrow Noriega regime. After the Cold War, the United States authorities for their use continues unabated. “Desert Storm” operation, they were deployed in advance to Kuwait and Iraq depth zone, execute several months of secret reconnaissance missions provided an important headquarters for the coalition military intelligence; aggression in Afghanistan “Enduring Freedom” operation, they had a beard riding a mule, local people dressed in costumes, under air fire support, the leadership of the Northern Alliance armed overthrow of the Taliban regime.

Original Mandarin Chinese:

    自从第二次世界大战以来,特种作战就以其独特的灵活性、高效性、不对称性,日益成为美国维护战略利益、应对威胁挑战的重要手段方式。近年来,美军特种作战部队更是将任务类型从传统作战领域拓展至非传统作战领域,大有取代常规部队成为信息化战场主角,充当美国对外军事行动“战略尖刀”之势。

    战火磨砺“美利坚之刃”

虽然现代特种作战发端于第二次世界大战,但其地位作用被美军充分认识并广泛应用于战争实践则在二战以后。几乎在美国插手的历次局部战争和地区冲突中,都能或隐或现地发现美军特种作战部队的身影,其间的战绩与败笔都成为美军创新发展特种作战的“磨刀石”,使特种作战这一“美利坚之刃”愈加锋利。

越南战争可以说是美军实施大规模、长时间特种作战行动的首次尝试。战争期间,美军特种作战部队广泛承担了清剿游击队、特种侦察、袭击破坏、培训人员等“反暴乱”作战任务,实施了诸如偷袭越南山西战俘营等作战行动。虽然由于战争的非正义性和战略指导的失误,美军始终无法将特种作战取得的战术优势转化为战略胜势,不得不从越南战场黯然撤兵,但特种作战部队在战争中显露出的适应性、机动性、隐蔽性,却获得美军高层肯定,并在随后的战争和武装冲突中得到重点使用。

1980年,为解救被扣押的60多名美国驻伊朗使馆人员,97名美军特战队员从埃及开罗长途奔袭德黑兰。由于在行动过程中突遇沙暴和飞机故障,加之应急预案不周,美军被迫取消计划。但美军并没有丧失信心,反而更加注重在总结经验教训的基础上强力推动特种作战发展。1987年4月,美军正式成立特种作战司令部,统辖陆、海、空所属的特种作战力量,标志着特种作战部队作为一支独立的作战力量正式登上美国战争舞台。

随后,在1989年入侵巴拿马行动、1991年海湾战争、2001年阿富汗战争、2003年伊拉克战争以及2011年利比亚战争中,美军越来越频繁地将特种作战部队用于主要战略方向和关键时节,完成了一个个“不可能的任务”。特别是在阿富汗战争中,借助先进的信息化手段,美军特种作战部队独当一面,创造性地将目标引导、渗透打击、收买瓦解融为一体,使美军在短时间内实现打垮塔利班政权的战争目的。

美军不断推动特种作战部队发展,几乎“每战必特”的原因在于:一是反应灵敏、编成精干,能够快速应对地区性突发事件及非对称威胁;二是行动隐蔽性、突然性强,往往出敌不意,能以最小资源快速达成战略目的,有效降低行动风险;三是作战手段灵活多样,可以作为“全球打击”战役战略构想的重要选择;四是能够较好地与其他作战力量联合行动,形成常规与非常规紧密结合的一体化作战体系。

 大体系支撑下的“剑走偏锋”

随着新军事变革深入演进,美军特种作战日益呈现出从接触作战向非接触作战、从规模作战向精兵作战、从武器平台支撑向战略体系支撑、从传统领域向新型领域快速演变的态势,特种作战部队因为能够遂行常规部队不宜执行或难以完成的特殊任务,成为美军克敌制胜的“杀手锏”。

指挥控制趋向战略直达。美军特种作战的指挥控制由国家级、战区级和作战部队级三个层次构成。通常情况下,由国家指挥当局、特种作战司令部、战区司令部、战区下属军种部队司令部或职能司令部的指挥官按级进行作战控制。随着所执行任务的隐秘性、敏感性不断提高,美军越来越强调由战略高层对特种作战进行“直达式”垂直指挥,增强行动的可控性灵活性。例如,2011年,美军在巴基斯坦突袭本·拉丹住所并将之击毙时,奥巴马和他的决策团队在万里之遥的美国白宫情报室,通过远程视频,进行实时同步指挥。这次行动充分体现了特种作战的战略特质。

特种闪击突出体系支撑。“战术行动,战略支撑;精兵行动,体系支撑;局部行动,全局支撑”已成为美军特种作战的显著特征。仍以击毙本·拉丹的“海王星之矛”突击行动为例,在这场战斗中,表面上美军仅出动4架直升机、24名“海豹”特战队员,用了不到40分钟就击毙了基地组织首脑本·拉丹。但在背后,既有天上35颗卫星、40余架飞机提供强大情报保障,又有海上航母编队接应,还有陆上2个美军驻中亚军事基地的支援,以及近万名各类支援保障人员。这是一次典型的“大体系支撑精兵行动”,深刻折射出信息时代的新战争样式。

作战行动走向全面联合。美军认为,“联合”是特种作战本质之一,需要各军种的全面参与和深度协作。目前,美军特种作战不但实现了与空军从“传感器到射手”的联合,大大提高了其“秒杀”作战能力,而且突破了与中央情报局秘密行动的联合,将中情局情报搜集能力与特种作战部队打击能力有机结合,实现优势互补。尤其是在阿富汗“持久自由行动”以后,美军特种作战更是将与常规部队的联合从战役层次下沉至战术层次,实现小分队一级的一体化作战。据统计,2004年美军实施的代号“山地风暴”清剿行动中,美特种作战部队就与常规部队进行了62次联合战术行动,其中40次行动是在连一级实施的,22次行动是在营一级进行的。

行动效果追求一击制敌。美军特种作战历来重视对敌方高价值目标的直接打击,企图以此加快作战进程迅速达成战略目的。从近期几场局部战争实践看,美军特种作战经常将对方首脑及领导层作为先期重点打击目标,实施所谓的“斩首攻击”,通过突然迅猛出其不意的攻击,达到“一剑封喉”、一击制敌的战略效果。从伊拉克战争首次对萨达姆使用这种战法,到利比亚战争对卡扎菲故技重施,虽然没有直接达成目的,但美军的特种作战对敌方决策层的心理震撼却是不可估量的,极大动摇了对方的抵抗意志,起到了“硬打击”与“软杀伤”的双重功效。可以预想,美军这种“剑走偏锋”式的特种作战还将会不断上演。

 着力锻造“全球力量”

当前,美军已将特种作战、无人机作战和网络作战列为对未来作战有重大意义的“新三位一体”力量,加以重点建设,希望打造一支反应灵敏、既小又狠、多维多能的特战“全球力量”。

强化海外部署,扩大规模数量。近期,美军大幅减少海外军事存在,但海外美军特种作战部队人数却在不断增加,部署国家和地区数量也在显著上升。据报道,小布什政府末期,美军特种作战部队大约部署在全球60个国家,到2010年增加至75个。截至2015年,美国特种作战部队已经部署到世界上135个国家。为了满足不断增长的任务需求,在各军兵种普遍裁员的大背景下,美军特种作战部队不减反增,人数从2001年的3.3万人增至2014年的近7万人,增加了约一倍,其中80%部署在海外。美军高层认为,扩大特种作战部队海外部署的规模,将显著提高美军介入全球事务特别是应对突发事件的能力。

优化作战编组,增建新型部队。为适应反恐战争样式多样化的特点,美军调整特种作战部队结构的步伐明显加快。近几年调整重点为:缩小特种作战小组规模,实现力量“小型化”;增加新的任务部队,陆续组建民事司令部、非正规战联队及心理战大队,增强非传统领域作战能力,实现遂行任务“多元化”;优化特种作战分队编组,根据任务类型,灵活将行动专家、通信专家、心理专家、爆破专家等不同专长人员进行混合编组,提高复杂战场适应能力,实现作战单元“合成化”。

全面更新装备,提升新质作战能力。近年来,美军不断加大投入,研发新型特种作战装备:一是“单兵战斗系统”,主要由激光测距仪、摄像机、环境传感器、弹道计算机以及目标跟踪装置组成,具有自动发射和打击遮蔽物背后目标的功能,提高单兵独立作战能力;二是远程投送工具,改进MC-130H特种作战飞机和采购V-22偏转翼飞机,利用机载精确的地形跟踪雷达、导航系统以及飞机高速性,提升特种作战部队远程机动和敌后渗透能力;三是新概念武器,主要是破坏敌电子设备的计算机病毒、电磁脉冲武器等。这些新武器一旦装备部队,将使美军特种作战手段更加丰富,任务领域更加多样。

不是每名特战队员都戴绿色贝雷帽

——美国陆军特种部队解密

史志达 赵蔚彬

在美军术语中,“特种作战部队”(Special Operation Forces)与“特种部队”(Special Forces)是同时存在的两个概念。前者是美军特种作战司令部下辖所有部队的统称,包括陆军特种部队、75突击队、海豹突击队、“三角洲”部队和海豹6队等;后者则专指陆军特种部队,即“绿色贝雷帽”部队。该部队因被肯尼迪亲自授权佩戴与其他兵种不一样的绿色贝雷帽而得名。

历史悠久,与中情局渊源甚深。1952年美军组建第一支“绿色贝雷帽”部队,便是以战略情报局(中情局前身)领导下的“杰德堡”部队为模板。二战期间,“杰德堡”队员曾受命进入被占领的法国、比利时和荷兰境内,为该地区抵抗组织提供武器和补给,并充当其与盟军最高指挥部的联系渠道。负责组建该部队的阿伦·班克上校曾是战略情报局的一名老兵,后效力于中情局,有着丰富的秘密行动经验。该部队最初被赋予的任务是:假设苏联占领西欧,他们将留在苏军战线后方组织非常规战。至今,非常规战依然是美国陆军特种部队的核心任务之一。由于该任务往往需要在和平时期秘密进行或在战争打响之前就做好准备,而和平时期执行秘密行动任务属于中情局的责任领域,所以特种部队执行此类任务时往往需要与中情局合作或干脆置于中情局的领导之下。中情局特别行动处的特工往往从特种部队老兵中招募,也就不足为奇。

分工明确,责任区域覆盖全球。“绿色贝雷帽”部队现编5个现役大队和2个平时由国民警卫队负责训练督导的后备役大队。5个现役大队总员额一万余人,分别负责太平洋、非洲、中东中亚、美洲和欧洲五个区域,与美国战区设置形成对应。他们根据各自责任区域的地形、政治生态、军事部署、当地语言和风土人情等特点,开展针对性训练。有些部队被长期部署在所属任务区域的某个友好国家,以更好地熟悉那里的作战环境。在大的分工之下,每个大队内部又有着极为精细的分工。作为特种部队最基本的作战单元的A小队,其12名队员分别谙熟作战、情报、武器、工程、医疗、通信六项专长中的一项,同时通过交叉训练掌握另外一到两项专长。

能力全面,一身扮演多重角色。相比将突击队技能展现到极致的“三角洲”部队和“海豹6队”,“绿色贝雷帽”部队队员的技能则更加全面和均衡,他们不仅拥有出色的突击队技能,还拥有一种被美军称为“外交勇士”的技能,即语言文化技能、人际交往能力和政治敏感性。由于广泛执行反恐、侦察、外国内部防卫、非常规战等任务,他们要扮演的角色不仅是英勇善战的突击队员,更是成熟、机警而灵活的情报员、教练员和外交官。在招募过程中,“绿色贝雷帽”部队要求应招人员必须经过外语技能测试,同时具备社会交际、军事训练、武器操作和组织指挥方面的天赋。考虑到语言和文化技能难以通过短期训练取得,特种部队在招募时往往瞄准那些具备少数民族背景或外貌、具备熟练外语能力的人。列入备选名单的队员在接受严酷的体能和战斗技能训练的同时,还要学习心理战课程并进行语言方面的强化训练,确保他们练就身兼多能的全面能力素质。

运用频繁,名字很少见诸报端。自组建以后,“绿色贝雷帽”部队便被频繁使用,但鉴于他们任务的保密性,以及其固有的低姿态作风,关于这些任务的消息很少公之于众,更是难见报端。比如上世纪50年代中后期,他们先后被派往泰国、越南、菲律宾、韩国、印尼等地,用于训练当地部队;1967年被派往玻利维亚,负责训练玻利维亚陆军别动营,并协助他们杀害了古巴革命核心人物切·格瓦拉;1989年大规模参与了入侵巴拿马的“正义事业”行动,推翻了诺列加政权。冷战结束后,美国当局对他们的运用有增无减。“沙漠风暴”行动中,他们被提前部署到科威特和伊拉克境内的纵深地带,执行为期数月的秘密侦察任务,为联军司令部提供了重要军事情报;在侵略阿富汗的“持久自由”行动中,他们留着胡须、骑着骡马、身着当地人民的服装,在空中火力的支援下,领导北方联盟武装推翻了塔利班政权。

来源:解放军报

2016 Development of China’s Network Security Law & Revised National Security Legislation // 中國今年制定网络安全法 修证券法

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

NPC Standing Committee work report of the Standing Committee Zhang Dejiang as the National People’s Congress. Xinhua News Agency issued

  Zhang Dejiang chairman of the NPC Standing Committee work report for

Second session of the Fourth Session of the 9th National People’s Congress held its second plenary meeting in the afternoon in the Great Hall, commissioned by the National People’s Congress, Zhang Dejiang chairman to report to the General Assembly. Conference and heard presentations on the draft law of charity. Xi Jinping, Li Keqiang, Yu Zhengsheng, Liu Yunshan, Wang Qishan, Zhang Gaoli, etc. on the rostrum. Executive meeting presided over by the President of the General Assembly, the Executive Chairman Zhang Ping.

2015

We have done what?

Zhang Dejiang said in the report, over the past year, the Standing Committee formulated five laws, and a decision to change the law on legal issues 37, decided to submit to the National People’s Congress for consideration a through decisions on legal issues 8 ; law enforcement inspection six cases heard and deliberated the State Council, the supreme people’s Procuratorate 17 report on the work carried out three times and three thematic inquiry special investigations by two resolutions; consideration of the motion on behalf of the outcome of the review by the special committee 8 report, the report of the Credentials Committee on behalf of the eligible individual representatives of six decided to approve the treaty between China and foreign states, international agreements and conventions to join 11, a number of decisions and approve the appointment and removal of state organs and the like.

In the area of ​​national security-related legislation, the Criminal Law Amendment (ix) by the five terrorist-related activities included in the Criminal Responsibility range.Legislation in the field of people’s livelihood, be revised Population and Family Planning Law, the implementation of “comprehensive two-child” policy since January 1, 2016.

Second session of the Third Session of the NPC Standing Committee to determine the tasks have been completed, the Standing Committee all aspects of work have made new progress, new results.

2016

General Rules of Civil developing market economy amend the Securities Act

Chairman Zhang Dejiang said in the report, 2016 will be legislation, supervision is the key. By 2016, the NPC Standing Committee will improve the socialist market economy legal system, including modifying the Securities Act, SME Promotion Law and the like. April 2015 and 12th National People’s Congress of the fourteenth session of the draft amendments to the Securities Act conducted the first consideration.

Report, focus of the market play a decisive role in the allocation of resources and better play the role of government, focus on improving the level of economic and social development of the rule of law and market economy. General Rules of Civil develop and improve basic civil legal system. Developing an environmental tax, tonnage tax, tobacco tax law, food law, asset valuation method, modify the Securities Act, SME Promotion Law and the like.

“Adhere to green development, promote the construction of ecological civilization, to build the most stringent environmental protection system, modify the Water Pollution Control Act, the Marine Environment Protection Law, Wildlife Law and other.” The report said.

Social and cultural development of network security law revision Red Cross Society

2016, the NPC Standing Committee will coordinate development of legislation in the field of social, cultural, etc., making medicine law, Community Corrections Act, modify Private Education Promotion Law, the Red Cross method.

Report, in terms of deepening the reform, the development of public cultural services security law, the promotion of the film industry and the like. To promote civil-military integration depth development, deepen reform of national defense and the armed forces, the development of national defense transportation law, amend law on military officers and so on. In promoting anti-corruption legislation, the development of international criminal judicial assistance law, revise study Administrative Supervision Law. Develop overseas NGO management method, network security law.

In addition, the report proposes reform of the authorization decision to do related work.

The implementation of the supervision and inspection of food safety inspection method

Zhang Dejiang said in the report, in 2016, the NPC Standing Committee will strengthen the supervision of the implementation of the law and check the implementation of the Food Safety Law and other six laws.

This six laws include: Food Safety Law, Water Law, promote scientific and technological achievements into law, the Environmental Protection Act, the Road Traffic Safety Law, Production Safety Law.

Meanwhile, the NPC Standing Committee will consider combining food safety law enforcement inspection report carried out three Environmental Protection Act, Production Safety Law and other topics upon request. Strengthen tracking supervision, to consider the report of the State Council to listen to feedback on research process rights of the elderly security law, food safety law enforcement inspection report and deliberations on the situation. Listen to consider the report of the State Council on the implementation of the Exit and Entry Management Law.Water Pollution Control Act to carry out the implementation of special investigations.

New initiative to review the filing and examination of administrative regulations

  By 2016, the NPC Standing Committee will strengthen the filing and examination of the development of new administrative regulations and judicial interpretations active review examined piece by piece.

Original Mandarin Chinese:

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

全国人大常委会委员长张德江作全国人民代表大会常务委员会工作报告。新华社发

张德江委员长作全国人大常委会工作报告

十二届全国人大四次会议9日下午在人民大会堂举行第二次全体会议,受全国人大常委会委托,张德江委员长向大会报告工作。会议并听取了关于慈善法草案的说明。习近平、李克强、俞正声、刘云山、王岐山、张高丽等在主席台就座。会议由大会主席团常务主席、执行主席张平主持。

2015年

都做了啥?

张德江在报告中说,一年来,常委会制定5部法律,修改37部法律和1个有关法律问题的决定,决定提请全国人民代表大会审议的法律案1件,通过有关法律问题的决定8个;检查6部法律实施情况,听取审议国务院、最高人民法院、最高人民检察院17个工作报告,开展3次专题询问和3项专题调研,通过2个决议;审议通过专门委员会关于代表议案审议结果的报告8个、代表资格审查委员会关于个别代表的代表资格的报告6个,决定批准我国与外国缔结的条约、协定以及加入的国际公约11件,决定和批准任免一批国家机关工作人员等。

在国家安全领域相关立法方面,通过的刑法修正案(九)中将五种恐怖相关活动列入刑事追责范围。在民生领域立法方面,及时修改人口与计划生育法,自2016年1月1日起实施“全面两孩”政策。

十二届全国人大三次会议确定的常委会各项任务已经完成,常委会各方面工作都取得了新进展、新成效。

2016年

将要做啥?

市场经济修改证券法制定民法总则

张德江委员长在报告中说,2016年将以立法、监督为重点。2016年,全国人大常委会将完善社会主义市场经济等方面法律制度,其中包括修改证券法、中小企业促进法等。2015年4月,十二届全国人大常委会第十四次会议对证券法修订草案进行了第一次审议。

报告提出,紧紧围绕使市场在资源配置中起决定性作用和更好发挥政府作用,着力提高经济社会发展和市场经济运行的法制化水平。制定民法总则,健全民事基本法律制度。制定环境保护税法、船舶吨税法、烟叶税法、粮食法、资产评估法等,修改证券法、中小企业促进法等。

“坚持绿色发展、促进生态文明建设,构建最严格的生态环境保护制度,修改水污染防治法、海洋环境保护法、野生动物保护法等。”报告中说。

社会文化制定网络安全法修改红十字会法

2016年全国人大常委会将统筹推进社会、文化等领域立法工作,制定中医药法、社区矫正法,修改民办教育促进法、红十字会法。

报告提出,在深化文化体制改革方面,制定公共文化服务保障法、电影产业促进法等。在促进军民融合深度发展、深化国防和军队改革方面,制定国防交通法,修改现役军官法等。在推进反腐败立法方面,制定国际刑事司法协助法,研究修改行政监察法。制定境外非政府组织管理法、网络安全法。

此外,报告提出做好改革试点授权决定相关工作。

监督检查检查食品安全法实施情况

张德江在报告中说,2016年,全国人大常委会将加强对法律实施情况的监督,检查食品安全法等6部法律的实施情况。

这6部法律包括:食品安全法、水法、促进科技成果转化法、环境保护法、道路交通安全法、安全生产法。

同时,全国人大常委会将结合审议食品安全法、环境保护法、安全生产法等3个执法检查报告开展专题询问。加强跟踪督办,听取审议国务院关于研究处理老年人权益保障法、食品安全法执法检查报告及审议意见情况的反馈报告。听取审议国务院关于出境入境管理法执行情况的报告。开展水污染防治法实施情况专题调研。

备案审查主动审查研究新的行政法规

2016年,全国人大常委会将加强备案审查工作,对新制定的行政法规、司法解释逐件进行主动审查研究。

中國今年制定网络安全法 修证券法

2016年03月10日01:40 北京晨报

China Military Space Power: War to Seize Commanding Heights // 中國網絡戰爭太空力量:抢占战争制高点

中國網絡戰爭太空力量:抢占战争制高点

With the continuous development of space technology, space, military applications increasingly widespread, more and more countries joined the ranks of the space race –

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29

 

    “Who controls the universe, whoever controls the earth; who controls the space, whoever controls the initiative in war.” Former US President John F. Kennedy is determined to promote the development of American space technology, space will also be incorporated into the great power game and competition category. With the development of space technology and space forces, military space is used widely in shaping the international strategic pattern, pushing the world’s new revolution in military affairs, and played a key role.

    Two-hegemony, the main purpose of the service strategy

July 1961, the United States has just successfully developed the use of “Samos” satellites, captured Soviet SS-7 and SS-8 deployed intercontinental ballistic missile tests, the Soviet Union opened a “missile gap” truth became the third the key Berlin crisis resolved smoothly, marking the space support forces boarded the stage of history.

Since then, the United States, the two superpowers, the Soviet Union from the strategic objective of global hegemony starting to build a more complete support for space power systems.

Since an important strategic position, it has been solely responsible for the construction of satellites by the US intelligence community, in order to facilitate confidential. US Department of Defense is leading the “Defense Satellite Communications System,” “Fleet Satellite Communication”, “Military Star” three communications satellite system construction, on this basis, build a “Air Force satellite communications” system for the US national command structure and strategic nuclear forces provided between the safe, reliable, high viability of the global two-way communications capability. Meanwhile, the US Department of Defense has also developed strategies for the deployment of ballistic missile early warning “Defense Support Program” satellite navigation for nuclear submarines “TRANSIT” satellite for global meteorological observation “DMSP” and other systems, the formation of a relatively complete system.

In order to compete with the United States, the Soviet Union launched a comprehensive space forces, from the development of “Zenith”, “amber” reconnaissance satellite “Lightning” communications satellite, “sail” navigation satellite, the “eye” early warning satellites and “Meteor” weather as the representative of satellite space power system.

Throughout the Cold War, the role of the US-Soviet space power is mainly reflected at the strategic level, both the use of near-real-time reconnaissance and early warning satellites to detect each other’s strategic dynamic use of communication satellites and navigation satellites for command and control of strategic nuclear forces, formation of an effective nuclear deterrence combat system, a profound impact on the world strategic pattern of the Cold war.

With space development focus to shift from military spacecraft launch vehicles, various military satellite systems gradually have the ability to use large-scale, the Soviet Union began to build a dedicated space forces command structure. In 1985, the US military set up a joint Space Command. Administration of the Soviet spacecraft in 1982, the formerly strategic rocket forces, responsible for the development of space power transfer scribe to support the Department of Defense, and later upgraded to bureau director of the spacecraft, so space support force directly under the arms of the Soviet Union became the Department of Defense.

    Pack and play, to expand the role of tactical action

The 1991 Gulf War, the US military space forces operations provided critical reconnaissance, early warning, communications, navigation, meteorological services, marking the beginning of space support from the strategic level into the tactical level.

Subsequently, the US military began to develop better able to support tactical space combat support forces launched a large-scale construction of various types of military satellites and upgrading. “Global Positioning System” fully completed “keyhole -12” “Future Imagery Architecture”, “space-based infrared system” and “Global Broadband Satellite Communication”, “Advanced Extremely High Frequency”, “Mobile User Objective System” and other new generation of satellites have been put into use. 2003 Iraq war, the total number up to 167 US satellite. By the end of 2015, US satellites in orbit nearly 400, of which more than 120 pieces of military satellites, forming a powerful space support operations capabilities.

In strengthening the power of construction, the US military in 2002, the Joint Space Command Strategic Command incorporated, unified management of the armed forces Space Command, in order to better organize and direct the power of space support strategic, operational and tactical military operations at all levels. The military services also formed their own space support forces and support the preparation of models to successfully achieve tactical level space support.

Russia’s lack of independence early strength, inherited the former Soviet space support force can maintain normal, resulting in a sharp decline in the number of satellites in orbit, and only 97 in orbit until 2002. In view of this situation, the Russian military space forces carried out the reform, the establishment of an independent space force in 2001, began to recover and rebuild its military satellite system. After the start of the “new look” reform, the Russian space force in 2011 to form the basis of the air and space defense troops, again in 2015 and the Air Force air and space defense troops merge to form air and space forces, responsible for the Russian spacecraft control, missile warning management system attacks and space monitoring system operation.

After the reform and adjustment, all kinds of Russian satellite system gradually restored. By the end of 2015, Russian satellites in orbit nearly 130, of which nearly 80 military satellites. But Russian military believes that blow from the air and space will be the main threat facing Russia, decide the future of air and space warfare has become the key to victory in the field, and therefore the full development of the Russian aerospace defense forces, space support forces in a subordinate position or service. In the previous reform, satellite surveillance, satellite communications, satellite navigation and other space support system construction management still the Russian Defense Ministry and General Staff Operations Department under the relevant commitment, the services are generally lacking space support personnel, operational and tactical levels than use low. During the Russia-Georgia war of 2008, the Russian military satellite reconnaissance had revealed not timely, satellite communication services and poor.

While the US and Russia to develop space forces, more and more countries joined the ranks of the space race. India announced in 2007 to establish the “Aerospace Defense Command”, to manage India’s national space assets, and space warfare weapon concept study, the Indian Air Force has been established aerospace brigade. Japan in 2009 adopted the “Basic Law Aviation”, the Japanese Air Self Defense Force to take advantage of space resources, and expand research-related policy formulation and planning to lay the legal basis for future space operations. Some other countries have also expressed varying degrees of military commitment to the development and use of space and plans.

    Defense against US efforts to seize the initiative

As more and more countries enter the field of space, space security environment has undergone significant changes. Especially in the US view, the space has a non-former “safe harbor.” US Joint Chiefs of Staff in 2013 edition of “space war” doctrine stated that the commander must take into account a malicious adversary action may be taken, and can continue to maintain military capability in the case of space capabilities downgrade. For this purpose, a step the US took the lead in the field of space, launched a series of offensive and defensive measures.

– Improve space surveillance capability. February 2015, the US Air Force and Lockheed – Martin launched the new “Space Fence” radar system construction work. The system can be monitored for the first time all over the United States via satellite from the master satellite elapsed time, attitude and orbit, etc., can also detect low orbit target as small as 10 cm in diameter, thereby greatly enhancing the US space situational awareness ability.The US Air Force ground-based photovoltaic system and deep space exploration systems, missile warning and space surveillance radar network system together constitute from low earth orbit to deep space orbit space surveillance systems perspective.

– Improve the existing space forces invulnerability. 2013 US military issued a “survivability and distributed space systems architecture” white paper proposes the use of structural separation, functional decomposition, load carrying, decentralized multi-track, multi-domain decomposition operations and other measures to improve the survivability of space systems support.

– Emphasis on the integrated use of space technology and traditional techniques. 2014 US release of “Towards a new strategy to offset the” proposed in the report, the US needs to soaring losses caused by the loss of the base system, the measures include accelerating the development of alternative GPS system, equipped with long endurance and / or aerial refueling capability. ” mixed level “intelligence surveillance and reconnaissance UAVs.

– The establishment of the development model construction space forces and civilian integration. US military plans to use leased wartime civil and commercial space systems and services, carrying a military payload on a commercial satellite, direct purchase of advanced commercial or commercial systems to the military, etc., to supplement the existing space support capabilities.

– By conducting military exercises in the development of space power construction using the theory. US Joint Staff, Air Force, Navy and Army space support operations in both the theme of military exercises. In 2001 the US Air Force Space Command began to dominate “Schriever” space war military exercises have been organized nine times.

– Strengthening Space Operations organization and command. September 2015, the US Defense Department and intelligence community established an inter-agency Joint Space Operations Center, responsible for the integration of satellite reconnaissance data, strengthening space reconnaissance capability, military satellite monitoring operation, to prevent potential adversaries to attack US space assets.

– Strengthening Space offensive forces. May 2015, the US X-37B flight test for the fourth time. Although the Americans called it “Orbital Test Vehicle,” but it remained silent on key information. Speculation, X-37B has the ability to take military action including control, capture and destroy enemy spacecraft, military reconnaissance on the enemy. In this sense, X-37B is likely to be the first human space fighter. In addition, the United States has stepped up the construction of space attack power laser, microwave, anti-satellite missiles, hoping to keep the lead in the space race in the future, continue to maintain its dominance.

    Overall, the world’s military powers have attached great importance to space support the construction and development of power, but the situation near several local wars, the only United States and Russia have a more comprehensive strategic, operational and tactical levels of space capabilities, other countries space is still the main force in the strategic use of the service. In the new space, the security situation, the US military has launched a new round of space forces change the face of the future US military space forces are likely to be a qualitative change occurs, information warfare appearance may therefore profoundly changed.

Original Manadrin Chinese:

随着太空技术不断发展,太空军事应用日益广泛,越来越多的国家加入了太空竞争行列

“谁控制了宇宙,谁就控制了地球;谁控制了空间,谁就控制了战争的主动权。”美国前总统肯尼迪的判断,推动了美国太空技术的发展,也将太空纳入了大国博弈和竞争的范畴。随着太空技术和太空力量的不断发展,太空军事应用日益广泛,在塑造国际战略格局、推动世界新军事变革等方面发挥了关键性作用。

    两强争霸,主要服务战略目的

1961年7月,美国利用刚刚研制成功的“萨莫斯”侦察卫星,拍摄到苏联SS-7和SS-8洲际弹道导弹试验部署情况,揭开了美苏“导弹差距”真相,成为第三次柏林危机顺利解决的关键,标志着太空支援力量登上了历史舞台。

此后,美、苏两个超级大国从全球争霸的战略目的出发,建起了较为完备的太空支援力量体系。

由于战略地位重要,侦察卫星的建设一直由美国情报界独立负责,以利保密。美国国防部则主导了“国防卫星通信系统”“舰队卫星通信”“军事星”三大通信卫星系统建设,在此基础上构建了“空军卫星通信”系统,为美国国家指挥机构和战略核部队之间提供安全、可靠、高存活性的双向全球通信能力。同时,美国国防部还研制部署了用于战略弹道导弹预警的“国防支援计划”卫星、用于核潜艇导航的“子午仪”卫星、用于全球气象探测的“国防气象卫星”等系统,形成了较为完备的体系。

为了与美国抗衡,苏联也开展了全面的太空力量建设,发展起以“天顶”“琥珀”侦察卫星、“闪电”通信卫星、“帆”导航卫星、“眼睛”预警卫星及“流星”气象卫星等为代表的太空力量体系。

整个冷战期间,美苏太空力量的作用主要体现在战略层面,双方利用侦察卫星和预警卫星近实时侦测对方的战略动态,利用通信卫星和导航卫星进行战略核部队指挥控制,形成了有效的核威慑作战体系,深刻影响了冷战时期的世界战略格局。

随着航天发展重点由运载火箭向军用航天器转变,各种军用卫星系统逐渐具备规模化运用能力,美苏开始组建专门的太空力量指挥机构。1985年,美军成立了联合太空司令部。苏联则于1982年把原属战略火箭军、负责发展太空支援力量的航天器总局转隶给国防部,而后又升格为航天器主任局,使太空支援力量成为了苏联国防部的直属兵种。

    群雄并起,作用向战役战术行动拓展

1991年的海湾战争中,太空力量为美军作战行动提供了关键的侦察、预警、通信、导航、气象等服务,标志着太空支援开始从战略层次进入到战役战术层次。

随后,美军开始大力发展能够更好地支持战役战术作战的太空支援力量,启动了各类军用卫星的大规模建设和升级换代。“全球定位系统”全面建成,“锁眼-12”“未来成像体系结构”“天基红外系统”“宽带全球卫星通信”“先进极高频”“移动用户目标系统”等新一代卫星相继投入使用。2003年的伊拉克战争中,美国使用卫星总数达167颗。截至2015年底,美国在轨卫星近400颗,其中军用卫星120余颗,形成了强大的太空支援作战能力。

在加强力量建设的同时,美军于2002年把联合太空司令部并入战略司令部,统管三军太空司令部,以更好地组织指挥太空支援力量战略、战役、战术各层次的军事行动。各军种也形成了各自的太空支援力量编制和支援模式,以顺利实现战役战术层次的太空支援。

俄罗斯独立初期国力不足,所继承的前苏联太空支援力量也无法正常维系,导致在轨卫星数量急剧下降,到2002年为止只有97颗在轨运行。针对这种局面,俄军进行了太空力量改革,于2001年成立了独立的航天兵,开始恢复和重建其军用卫星系统。“新面貌”改革开始后,俄于2011年以航天兵为基础组建了空天防御兵,2015年又把空军和空天防御兵合并组建了空天军,负责俄航天器发射控制、导弹预警袭击系统与太空监视系统的管理运行。

经过改革调整,俄各类卫星系统逐渐得到恢复。截至2015年底,俄在轨卫星近130颗,其中军用卫星近80颗。但俄军认为,来自空天的打击将是俄面临的主要威胁,空天已成为决定未来战争胜负的关键领域,因此俄全力发展空天防御力量,太空支援力量处于从属或服务地位。在历次改革中,卫星侦察、卫星通信、卫星导航等太空支援系统的建设管理仍由俄国防部及总参谋部下属的相关业务局承担,各军种也普遍缺乏太空支援人才,战役战术运用水平较低。在2008年俄格战争期间,俄军就曾暴露出卫星侦察不及时、卫星通信服务差等问题。

在美俄大力发展太空力量的同时,越来越多的国家加入了太空竞争的行列。印度2007年宣布要筹建“航空航天防御司令部”,以管理印度全国的空间资产,并对太空战武器进行概念研究,印度空军已经成立了航空航天大队。日本于2009年通过了《航空基本法》,使日本航空自卫队得以利用太空资源,并展开相关政策的研究、制定和规划,为未来太空行动奠定法理基础。其他一些国家也不同程度表达出军事开发和利用太空的决心和计划。

    攻防对抗,美国着力抢占先机

随着越来越多的国家进入太空领域,太空安全环境发生了显著变化。特别是在美军看来,太空已非昔日的“安全港”。美军参联会在2013年版《太空作战》条令中指出,指挥官必须考虑到敌对方可能采取的恶意行动,并能够在太空能力降级的情况下继续保持军事能力。为达到这一目的,美军率先一步,在太空攻防领域推出了一系列措施。

——提高太空监视能力。2015年2月,美空军和洛克希德-马丁公司启动了新型“太空篱笆”雷达系统建设工作。该系统可在第一时间监控到所有从美国上空经过的卫星,掌握卫星经过的时间、姿态和轨道等,还可探测直径小至10厘米的中低轨道目标,从而大大增强美国的太空态势感知能力。该系统与美空军陆基光电深空探测系统、导弹预警雷达网和太空监视系统共同构成从近地轨道到深空轨道的立体空间目标监视系统。

——提高现有太空力量的抗毁性。2013年美军发布了《抗毁性与分散式太空系统体系结构》白皮书,提出采用结构分离、功能分解、载荷搭载、多轨道分散、多作战域分解等措施,来提高太空支援系统生存能力。

——重视太空技术与传统技术的综合使用。2014年美发布的《迈向新抵消战略》报告中提出,美国需要对冲天基系统丧失所带来的损失,措施包括加快研发GPS替代系统、装备具有长持久力和/或空中加油能力的“高低混合”情报监视与侦察无人机等。

——建立军民融合的太空力量建设发展模式。美军计划采用战时租用民用与商用太空系统服务、在商业卫星上搭载军用载荷、直接购买先进的民用或商业系统转为军用等方式,补充现有太空支援能力的不足。

——通过开展军事演习发展太空力量建设运用理论。美军联合参谋部、空军、海军和陆军都有以太空支援作战为主题的军事演习。2001年美空军太空司令部开始主导“施里弗”太空战军事演习,迄今已举办9次。

——强化太空作战组织指挥。2015年9月,美国防部与情报界成立了机构间联合太空作战中心,负责整合卫星侦察数据、强化太空侦察能力,监控美军卫星运行情况,防范潜在对手攻击美国太空资产。

——加强太空进攻力量建设。2015年5月,美国X-37B进行了第四次飞行试验。虽然美国人将之称为“轨道试验飞行器”,但在关键信息上却三缄其口。外界猜测,X-37B有能力采取的军事行动包括控制、捕获和摧毁敌国航天器,对敌国进行军事侦察等。在这个意义上,X-37B很可能将是人类首架太空战斗机。此外,美国还加强了激光、微波、反卫星导弹等太空攻击力量的建设,希望在未来的太空竞赛中保持先机,继续维持其霸主地位。

总的看来,世界军事强国都高度重视太空支援力量的建设和发展,但就近几次局部战争情况来看,只有美、俄具备了较为完备的战略、战役和战术层次太空能力,其他国家的太空力量仍主要服务于战略运用。在新的太空安全形势下,美军又发起了新一轮太空力量变革,未来美军太空力量的面貌有可能会发生质的变化,信息化战争面貌也可能因此而发生深刻改变。

New Progress States space forces

    United States–

    Get rid of the GPS “dependency syndrome”

    Currently, almost all US military combat platforms and systems rely on GPS or GPS-based navigation system. However, GPS navigation presence signal is weak, poor penetration, vulnerable to interference, vulnerable to cyber attacks and other defects. To avoid huge risks due to excessive reliance GPS brought the US Defense Advanced Research Projects Agency (DARPA) in recent years have launched the “micro-positioning, navigation, timing and technology”, “adaptive navigation system,” “Quantum Perception and auxiliary readout technology “” ultrafast laser Science and Engineering “,” get in the fight against environmental space, time, and location information “and does not rely on GPS navigation, positioning, timing and technology research projects.

    Russia –

    Restart “satellite killer” program

    Russia has shelved the case in the official anti-satellite weapons program, the “satellite killer” plan, but the Russian side the key technology in the field has never been completely lost. According to media reports, the Russian military had for launch in 2013, code-named “2014-28E” (also known as the Universe 2499) of the mysterious object. The object was observed using a series of non-normal but the engine very precise orbit maneuver, it seems have the ability to be able to sneak up on other satellites.

    Japan –

    Establishment of space surveillance units

    August 28, 2014, Japan’s defense ministry revised the “development and utilization of the basic principle of the universe,” clearly pointed out that Japan will set up a special space surveillance forces of the universe and garbage run dynamic satellite tracking and analysis, in order to gradually strengthen the perception of space ability. The move aims to strengthen the Japan-US cooperation in space, to deal with weapons to attack from satellites will strengthen the capacity to collect pictures from space using satellites for ballistic missile launch early monitoring and analysis, to enhance early warning capabilities.

    India –

    Construction of Regional Satellite Navigation System

    March 28, 2015, India’s fourth-navigation satellites successfully launched India’s regional satellite navigation system gradually formed. India according to plan, the work of the network system will be divided into two steps: The first step is to launch geostationary satellites covering the whole territory of India’s regional satellite navigation system, the second step is from regional satellite navigation systems to the Indian version of the global satellite positioning system forward. The system will provide civilian and military both services.

 各国太空力量建设新进展

    美国——

    摆脱GPS“依赖症”

    目前,美军几乎所有的军用系统和作战平台都依靠GPS或基于GPS的组合导航系统。但是,GPS导航存在信号较弱、穿透能力差、易受干扰、易受网络攻击等缺陷。为避免由于过度依赖GPS而带来的巨大风险,美国防高级研究计划局(DARPA)近年来陆续开展了“微型定位、导航、授时技术”“自适应导航系统”“量子辅助感知与读出技术”“超快激光科学与工程”“在对抗环境下获得空间、时间和定位信息”等不依赖GPS的导航、定位、授时技术研究项目。

    俄罗斯——

    重启“卫星杀手”计划

    俄罗斯曾在官方场合搁置了反卫星武器计划,即“卫星杀手”计划,但俄方在该领域的关键技术从未完全丢失。据媒体报道,俄军方曾于2013年发射代号为“2014-28E”(或称宇宙2499)的神秘物体。该物体被观测到使用发动机进行一系列非正常但非常精准的机动变轨,似乎具备能悄悄接近其他卫星的能力。

    日本——

    设立太空监视部队

    2014年8月28日,日本防卫省修改了《宇宙开发利用基本方针》,明确指出,日本将成立专门的太空监视部队,对宇宙卫星和垃圾的运行动态进行跟踪和分析,以逐步加强太空感知能力。此举旨在加强日美在太空的合作,应对来自卫星的武器攻击,将加强从太空收集图片的能力,利用人造卫星对弹道导弹的发射进行早期的监控和分析,增强早期预警能力。

    印度——

    构建区域卫星导航系统

    2015年3月28日,印度第四颗导航卫星发射成功,印度区域卫星导航系统逐渐成形。按照印度的计划,该系统的组网工作将分为两大步骤:第一步是发射地球同步卫星组成覆盖印度全境的区域卫星导航系统,第二步是从区域卫星导航系统向印度版全球卫星定位系统迈进。该系统将提供民用和军用两种服务。

Libya war action in space
■ Wang Pingping

Libya is the second war in Afghanistan and the US-led war in Iraq is not a scale but the high degree of information technology local war, preparations for war, initiated and progression to reconnaissance, navigation, communications support for the core space power to effectively support the multinational force and strategic campaign decisions to protect the fine planning and real-time command and control task.
Before the war, the US-led NATO military operations on the basis of the need for a full assessment on the strength of existing space system was substantial adjustment, built up by the imaging and electronic reconnaissance, maritime surveillance and missile warning, command and communications, space support system navigation, meteorological observation system consisting of satellites and satellite systems for civil use functionally complement in individual areas. In addition, according to operational needs, with fast access to space capability supplementary firing several satellites.
Libyan war, the multinational force to implement the diversification of space support operations.
Access to information on the battlefield, the multinational force by the imaging reconnaissance spacecraft, aerospace electronic reconnaissance means supplemented by special reconnaissance and surveillance network means, Libya’s strategic target architecture, an important goal distribution, composition and deployment of air defense systems, command and control relationship , means of communication and frequency distribution of a comprehensive reconnaissance. War is in progress, the multinational force by aerospace electronic reconnaissance and avionics reconnaissance combining means, real-time capture and analysis of radiation target operating parameter Libyan army, master Libyan army air defense system deployment adjustment, dynamic intelligence command and communications work full time monitoring Libya’s mobile communications and satellite communications, intelligence screening important clues.
In terms of battlefield information distribution, multinational force operations in front of more than 1100 kilometers wide, over a wide area of ​​more than 600 kilometers in depth expansion; air force were deployed in the war zone from 700 to more than 2800 km range and nearly 20 airports on aircraft carriers, a variety of information through a wide range of command and control, high-speed, high-capacity, high security satellite communications system to distribute real-time data sharing within the multinational force, for a variety of combat forces and the overall offensive and defensive operations provide linkage strong support.
In terms of navigation and positioning, navigation and positioning information needed for precision air strike all provided by space power, accuracy of less than meter-level positioning information to ensure effective control of collateral damage when clearing precision strike urban targets.
Throughout the war in Libya, the space forces to the multinational force to provide 80% of the intelligence information to help them achieve battlefield transparent way, firmly grasp the battlefield initiative. There are pre-prepared in the intelligence area, the US military to grasp the dynamics of the battlefield and complete the property identified in less than 5 minutes. Space power efficient support from discovery, to combat identification, evaluation precision air strike chains. Combat action against Gaddafi fled from Sirte, that is, by the space surveillance system to grasp the dynamics and guide warplanes and drones successful wars against the blockade.

利比亚战争中的太空行动

■王平平

    利比亚战争是继阿富汗和伊拉克战争之后美国主导的一场规模不大但信息化程度很高的局部战争,战争的准备、发起和进展过程,以侦察情报、导航定位、通信保障为核心的太空力量,有效支持了多国部队的战略与战役决策,保障了精细任务筹划和实时指挥控制。

战前,以美国为首的北约在对军事行动需要进行充分评估的基础上,对既有的太空力量体系进行了充实调整,构建起了由成像及电子侦察、海洋监视及导弹预警、指挥通信、导航定位、气象观测等卫星系统构成的太空支援体系,并利用民用卫星系统在个别领域进行功能性补充。此外,根据作战的需要,利用快速进入太空能力补充发射数颗卫星。

利比亚战争中,多国部队实施了多样化的太空支援行动。

在战场信息获取方面,多国部队通过航天成像侦察、航天电子侦察手段,辅之以特种侦察和网络侦察手段,对利比亚境内的战略目标体系结构、重要目标分布、防空体系构成及部署、指挥控制关系、通信手段及频率分布情况进行全面的侦察。战争进行过程中,多国部队通过航天电子侦察与航空电子侦察相结合的手段,实时截获和分析利比亚军队的辐射目标工作参数,掌握利比亚军队防空系统部署调整、指挥通信工作的动态情报,全时段监控利比亚的移动通信及卫星通信,筛选重要情报线索。

在战场信息分发方面,多国部队的作战行动在正面宽1100余千米、纵深600余千米的广阔区域内展开;空中力量分别部署在距战区700~2800余千米范围内近20个机场及航空母舰上,指挥控制的各种信息通过大范围、高速度、大容量、高保密性的卫星通信系统实时分发,在多国部队内部实现数据共享,为各种作战力量及攻防作战行动的整体联动提供有力支持。

在导航定位方面,空中精确打击所需要的导航定位信息全部由太空力量提供,精度小于米级的定位信息确保了对城区目标进行空地精确打击时有效控制附带损伤。

整个利比亚战争中,太空力量为多国部队提供了80%的情报信息,帮助其实现战场单向透明,牢牢掌握战场主动。在有预先情报准备的区域内,美军掌握战场动态情况并完成属性识别的时间小于5分钟。太空力量高效支持了从发现、识别到打击、评估的空中精确打击链。对从苏尔特出逃的卡扎菲进行的打击行动,就是由太空侦察系统掌握动态情况,并引导战机和无人机进行阻滞打击的成功战例。

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29