All posts by admin

Chinese Military Adhering to Integrated Development of Mechanization, Informatization & Intelligence

中國軍隊堅持機械化、資訊化、智慧化融合發展

現代英語:

Adhere to the integrated development of mechanized informatization and intelligence

——Seriously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China

The report to the 20th CPC National Congress emphasized “upholding the integrated development of mechanization, informatization, and intelligence,” elevating the requirement for the integrated development of mechanization, informatization, and intelligence (hereinafter referred to as the “three modernizations”) to a new strategic level. To thoroughly study, publicize, and implement the spirit of the 20th CPC National Congress and strive to achieve the goals of the PLA’s centenary, we must focus on understanding and grasping the primary characteristics, profound mechanisms, basic principles, and strategic measures of the integrated development of the “three modernizations,” and effectively promote their implementation.

Recognize the main characteristics of the integrated development of the “three transformations”

Mechanization, informatization, and intelligence are progressive and interdependent. From a chronological perspective, the three transformations did not originate simultaneously. Without the prerequisites and foundations of the previous transformations, the subsequent transformations could not occur and develop. For example, without mechanization, there would be no informatization. Informatization requires the physical substance provided by mechanization. Without mechanized combat platforms and ammunition as carriers of information nodes, the “connectivity” of informatization would be lost. Informatization is the nucleus of intelligence. Without the sufficient computing power and data provided by advanced informatization, the next generation of artificial intelligence cannot achieve the chain breakthroughs it promises. Without a solid foundation of mechanization, a military cannot advance informatization, and without a solid foundation of mechanization and informatization, it cannot effectively advance intelligence.

Based on this understanding, it’s difficult to leapfrog mechanization and informatization to embrace intelligence. Generally speaking, the latter can only replace the former in specific areas, not completely replace or surpass it. If the foundation of the former’s core technologies, foundational areas, and key stages is not solid, bottlenecks and shortcomings will be difficult to address quickly. Not only will these bottlenecks be difficult to address with the latter, but their weak foundation will also hinder the latter’s development, hindering overall development. If we skip mechanization and informatization and shift our focus entirely to intelligence, haste may lead to failure.

Mechanization, informatization, and intelligence will overlap and coexist for a long time. The term “basic mechanization” generally refers to the fact that mechanization has reached a late stage of development, with its contribution to combat effectiveness having already experienced diminishing returns. Further investment in mechanization will significantly reduce the cost-effectiveness. This does not mean that there will be no more mechanization construction tasks; it simply means that the proportion of investment in informatization and intelligence will gradually decrease compared to informatization and intelligence. Informatization is not the end of mechanization; a certain degree of mechanization will continue during the informatization process. Similarly, intelligence is not the end of mechanization and informatization; a certain degree of informatization and mechanization will continue during the intelligence process. Each of the “three transformations” is only a construction focus for a specific historical period; no one “transformation” is exclusive to any given period.

Based on this understanding, we cannot pursue a “starting from scratch” approach, overthrowing mechanization and informatization in favor of intelligentization. The “three transformations” cannot be viewed in isolation. They are meant to be inclusive, integrated, and mutually exclusive, not selective. The subsequent transformation does not negate or terminate the previous one, nor does it mean discarding the achievements of the previous one and starting over with a new one. We must ensure a smooth transition and gradual upgrade of the combat system from mechanization to informatization and then to intelligentization. Taking intelligentization as an example, intelligentization does not mean completely overthrowing the existing informatized combat system and establishing a completely new, independent intelligent combat system.

Intelligent informationization uses the virtual to control the real, empowering and increasing efficiency in mechanization. The “real” here primarily refers to “hardware,” represented by physical entities such as combat platforms and ammunition, while the “virtual” primarily refers to “software,” centered around combat data and algorithms. While mechanization primarily relies on hardware development, informationization and intelligentization primarily rely on software development, optimizing and upgrading hardware and increasing its efficiency through software. In terms of development priorities, payloads surpass platforms, software surpasses payloads, and algorithms surpass software. Software costs in informationization and intelligentization far exceed hardware costs.

Based on this understanding, we must not pursue development that prioritizes hardware over software or creates a disconnect between the virtual and the real. In the era of intelligence, if the supporting software and core algorithms that serve as the “brains” of weapons and equipment lag behind, even the highest hardware performance indicators will be merely “inflated,” and it will be difficult to realize its combat potential in actual combat. Military combat practice demonstrates that in the era of intelligence, we should prioritize the development of general-purpose chips and core algorithms for military intelligence technology from the outset to avoid being caught in a passive position.

Clarify the profound mechanism of the integrated development of the “three transformations”

The integrated development of the “three transformations” is not a simple mixing, combination, or compounding of the “three transformations,” but rather a process of mutual inclusion, mutual penetration, and mutual promotion. From “you are you, I am me” to “you are in me, I am in you,” and then to “you are me, I am you,” achieving a seamless blend and unity, generating cumulative, aggregate, and multiplier effects, and achieving a qualitative leap in overall combat effectiveness. The integrated development of the “three transformations” primarily follows the following mechanisms:

Advantage-overlaying mechanism. Whether mechanization, informatization, or intelligentization, the supporting technology clusters for each “transformation” will give rise to a series of new weaponry and equipment, generate new combat forces, and ultimately form new combat capabilities with different operational mechanisms. The combined advantages of these new combat capabilities with existing combat capabilities can produce a systemic emergence effect, greatly enhancing the overall combat capability of the military; it can enrich one’s own combat means, methods, and approaches, and put the enemy in a dilemma of multiple difficulties.

Upgrade and expansion mechanism. Informatization, through the digital transformation and networking of various mechanized combat platforms, aggregates and upgrades mechanized combat systems into informationized combat systems, resulting in a qualitative leap in combat effectiveness. Intelligence can also be integrated with mechanization and informatization through upgrades and expansions. On the one hand, intelligent technologies are used to upgrade the control systems of mechanized combat platforms, continuously enhancing the autonomous combat capabilities of individual weapons and equipment. On the other hand, intelligent technologies are used to optimize and upgrade informationized combat systems, significantly enhancing their capabilities in information acquisition, transmission, processing, sharing, and security, and comprehensively improving the combat capabilities of the system.

A mechanism for addressing shortcomings and replacing them. The history of military development shows that as a particular “industry” develops, it often encounters bottlenecks that are difficult to resolve with its own technological system alone. This necessitates the urgent need for innovative solutions using the technical means and development strategies of other “industries.” Currently, machinery is becoming increasingly sophisticated and complex, making its design and control increasingly difficult. Informatization has led to an “information explosion,” making it increasingly difficult to quickly translate this information into decision-making information. These problems are difficult to effectively address within the technological systems of mechanization and informatization alone. However, the application of intelligent technology can effectively overcome bottlenecks in mechanical control and information processing capabilities. Furthermore, technological breakthroughs in the first “industry” can offset the shortcomings of the second. For example, hypersonic missiles can outpace the response capabilities of networked and informationized defense systems, enabling rapid penetration, which to some extent offsets an adversary’s information advantage.

Grasp the basic principles of the integrated development of the “three transformations”

In promoting the integrated development of the “three transformations”, we should focus on the following basic principles:

The principle of mutual promotion and symbiosis. Each “transformation” differs fundamentally in its combat effectiveness generation mechanisms and development goals. The simultaneous and parallel development of the three transformations presents both favorable conditions for mutual enhancement, mutual promotion, and mutual support, but also unfavorable factors such as competition over development areas, resource allocation, and investment volume. We must ensure that the three transformations form a healthy symbiotic relationship within the overall development process, avoiding conflicts, frictions, and constraints that could lead to a situation where 1+1+1 is less than 3, and strive to achieve systemic emergence and synergistic effects.

The principle of overall coordination. The importance of the “three transformations” is not ranked in order of importance. We should not emphasize one at the expense of the others. Instead, the three transformations should be considered as a system, coordinated and advanced as a whole. While informatization and intelligentization appear more advanced and complex, we should not assume that mechanization is low-end, simple, and easy to implement, or that the importance of mechanization can be ignored with the advent of informatization and intelligentization. On the one hand, if mechanization is not fully implemented, it will hinder progress and become a bottleneck restricting overall development. Similarly, without the sufficient computing power and data provided by full informatization, the next generation of artificial intelligence cannot achieve a series of breakthroughs. On the other hand, mechanization also has high-end cutting-edge fields such as hypersonic aircraft and deep-sea submersibles that can have a disruptive effect.

The principle of prioritizing key areas. Total investment in national defense and military development is limited. Given a relatively fixed overall budget, investing more in one area will inevitably result in less investment in others. We should accurately assess the contribution of each area to combat effectiveness over the coming period, identify the area that will most significantly increase combat effectiveness as the priority for development, rationally allocate resources in a prioritized manner, and scientifically determine the direction and amount of investment. Failure to prioritize the development of the “three areas” and applying a “sprinkle pepper” approach to each area can easily result in a low input-output ratio and may even cause military development to stray from its correct trajectory.

Strengthening strategic measures for the integrated development of “three transformations”

In practice, we should strive to change the inertial thinking of relying on latecomer advantages and unconsciously falling into the habit of following development, strive to get out of the passive catch-up development model, and turn to the pursuit of concurrent advantages and first-mover advantages. We should develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to drive mechanization and informatization to a higher level. We should use the integrated development of the “three transformations” as a powerful engine to promote the transformation and development of the military and achieve a comprehensive leap in the overall construction level.

We must effectively strengthen top-level design and overall coordination for the integrated development of the “three transformations.” We must fully recognize the long-term, complex, and arduous nature of the integrated development of the “three transformations,” adhere to the unity of technological and conceptual integration, and avoid simply applying the existing mechanization and informatization construction model to the integrated development of the “three transformations.” We must also avoid generalization and labeling of the “three transformations.” We must strengthen top-level design and overall coordination with strong organizational leadership, streamline multiple relationships, pool the strengths of all parties, and create a positive synergy.

Proactively plan key areas for the integrated development of the three transformations. First, address areas where one transformation affects and constrains the development of others. Quickly identify technical bottlenecks within each transformation, compile a list of these bottlenecks, and increase investment in focused research to address these shortcomings as quickly as possible. Second, address areas where one transformation could potentially offset the achievements of others. During the integrated development of the three transformations, even after one has become dominant, we should still prioritize developing new operational mechanisms within the others, potentially disrupting the strategic balance and generating disruptive impacts, potentially even offsetting the achievements of the others. Third, address areas where the three transformations intersect and intersect. The “edge zones, intersections, and junctions” of the three transformations are also crucial for rapidly generating new qualitative combat capabilities. Currently, we should particularly proactively plan for areas such as “ubiquitous network plus” and “artificial intelligence plus.”

(Author’s unit: Academy of Military Science, Institute of War Studies)

中國軍網 國防部網
2022年11月10日 星期四

現代國語:

黨的二十大報告強調“堅持機械化信息化智能化融合發展”,把機械化信息化智能化(以下簡稱“三化”)融合發展要求提升到新的戰略高度。深入學習宣傳貫徹黨的二十大精神,奮力實現建軍一百年奮鬥目標,應著力認清把握「三化」融合發展的主要特徵、深刻機理、基本原則和戰略舉措,切實推動「三化」融合發展落地落實。

認清「三化」融合發展的主要特徵

機械化資訊化智能化逐次遞進有序依存。從時序來看,「三化」不是同時起源的,沒有前一「化」作為前提和基礎,就沒有後一「化」的發生和發展。例如,沒有機械化就沒有資訊化。資訊化建設需要機械化建設提供物理實體,沒有機械化作戰平台和彈藥作為資訊節點的載體,資訊化的「聯」就失去了物件。資訊化是智慧化的孕育母體。沒有高度資訊化提供足夠的算力和數據,新一代人工智慧也不可能產生鍊式突破。一支軍隊沒有一定的機械化基礎,就無法推進資訊化,沒有一定的機械化資訊化基礎,也無法很好地推進智慧化。

基於這個認識,我們難以跨越機械化資訊化直接擁抱智慧化。通常說來,後一「化」對前一「化」只有在個別領域可以替代,而不可能全局替代或全面跨越。如果前一「化」的核心技術、基礎領域和關鍵階段的「底子」打得不牢,出現瓶頸和短板時將無法在短時間內彌補,不但難以被後一「化」解決,反而會因基礎不牢影響後一「化」發展,進而拖累整體發展。如果跳過機械化、資訊化,把建設重點全面轉向智慧化,可能欲速則不達。

機械化資訊化智能化相互​​交疊長期並存。通常所說的基本實現機械化,意思是機械化發展到後期,其戰鬥力貢獻已經產生了邊際遞減效應,繼續加大機械化投入,效費比將大大降低。但這並不意味著此後就沒有任何機械化建設任務了,只是與資訊化、智慧化相比對其投入比重將逐步降低。資訊化不是機械化的終結,資訊化過程中還有一定的機械化,智能化也不是機械化、資訊化的終結,智能化過程中還有一定的資訊化、機械化。 「三化」中的每一「化」都只是某一歷史時期的建設重點,不存在某一時期被某一「化」排他性獨佔的情況。

基於這個認識,我們不能搞推翻機械化資訊化,專搞智慧化的「另起爐灶」式發展。不能以割裂的觀點看待“三化”,“三化”是“三合一”式的兼容並蓄,不是“三選一”式的互斥排他。後一「化」不是對前一「化」的否定和終結,不是摒棄前一「化」所取得的發展成果推倒重來另搞一套,必須確保作戰體係由機械化到資訊化再到智能化的平滑過渡和漸進升級。以智慧化為例,智慧化絕不是顛覆性地推倒原有資訊化作戰體系,另建一個全新的獨立的智慧化作戰體系。

智慧化資訊化對機械化以虛控實、賦能增效。這裡所說的“實”主要是指以作戰平台、彈藥等物理實體為代表的“硬體”,“虛”主要是指以作戰數據、演算法等為核心的“軟體”。機械化以硬體建置為主,資訊化和智慧化則以軟體建置為主,透過軟體對硬體進行最佳化升級和賦能增效。在建置優先順序上,載重超越平台、軟體超越載重、演算法超越軟體,資訊化和智慧化建設中的軟體成本遠超硬體成本。

基於這個認識,我們不能搞「重硬輕軟」或「虛實脫節」式發展。進入智能化時代,如果作為武器裝備“大腦”的配套軟體和核心演算法落後,其硬體性能指標再高都只是“虛高”,實戰中很難發揮出作戰潛能。軍事鬥爭實踐表明,進入智慧化時代,應在一開始就注重軍事智慧技術的通用晶片和核心演算法研發,避免陷入被動。

明晰「三化」融合發展的深刻機理

「三化」融合發展,不是「三化」簡單的混合、化合或複合,而是相互包容、相互滲透、相互促進。從“你是你、我是我”變成“你中有我、我中有你”,進而變成“你就是我、我就是你”,達到水乳交融、合而為一的程度,並產生疊加效應、聚合效應和倍增效應,實現整體戰鬥力質的躍升。 「三化」融合發展主要遵循以下機制:

優勢疊加機理。不管是機械化、資訊化或智慧化,每一「化」的支援技術群都會催生出一系列新型武器裝備,產生新型作戰力量,最終形成具有不同作戰機理的新質作戰能力。這些新質作戰能力與原有作戰能力綜合運用優勢疊加,能夠產生系統湧現效應,大大提升軍隊整體作戰能力;能夠豐富己方作戰手段、作戰方式和方法,使敵方陷入顧此失彼的多重困境。

升級拓展機理。資訊化透過對各類機械化作戰平台進行數位化改造和網路化鏈接,將機械化作戰體系聚合升級為資訊化作戰體系,催生戰鬥力產生質的飛躍。智慧化也可透過升級拓展方式,與機械化、資訊化融為一體。一方面,運用智慧技術升級機械化作戰平台的操控系統,不斷提升其單件武器裝備的自主作戰能力。另一方面,運用智慧技術優化升級資訊化作戰體系,使其資訊取得、傳輸、處理、共享、安全等能力均大幅增強,體係作戰能力全面提升。

補短替代機理。從軍隊建設歷史來看,某一「化」在深化發展過程中,往往會出現僅靠自身技術體系難以解決的瓶頸問題,迫切需要其他「化」的技術手段和發展思路另闢蹊徑來解決。目前,機械越來越精密複雜,設計和控制難度越來越大;資訊化導致“資訊爆炸”,快速轉化為決策資訊的難度越來越大,這些問題在機械化、資訊化自身技術體系內難以得到有效解決,而運用智慧技術可有效突破機械操控能力、資訊處理能力的瓶頸。此外,前一「化」所產生的技術突破也可能抵消後一「化」的不​​足。如高超音波飛彈速度可以超出網路化資訊化防禦體系的反應能力實現快速突防,這在一定程度上抵消了對手的資訊優勢。

掌握「三化」融合發展的基本原則

在推動「三化」融合發展過程中,應著重於以下基本原則:

互促共生原則。各「化」在戰鬥力生成機制、建設發展目標等方面有著本質不同,「三化」同時並行發展,既存在著相互提升、相互促進、相互支撐的有利條件,也可能存在著發展領域方向、資源投向投量之爭等不利因素。應確保「三化」在建設全局形成良性共生關係,避免相互衝突、摩擦、掣肘造成1+1+1<3的不良後果,力求產生系統湧現及協同效應。

整體協調原則。 “三化”的重要性並不分高下,不能只強調某一“化”,而忽視其他“化”,應把“三化”視為一個體系整體協調推進。雖然資訊化、智慧化似乎更為高級和複雜,但不能認為機械化就是低端、簡單和易於實現的,或者說有了資訊化和智慧化,機械化的重要性就可以忽略。一方面,如果機械化完成度不高,就會拖後腿,成為限制整體發展的瓶頸。同樣,沒有充分資訊化後提供的足夠算力和數據,新一代人工智慧也不可能產生鍊式突破。另一方面,機械化也存在高超音波速飛行器、深海潛水器等可產生顛覆性效果的高端前緣領域。

突出重點原則。國防和軍隊建設的總投入是有限的,在「大盤子」相對固定的情況下,在某一「化」上投入得多,必然在其他「化」上投入得少。應準確評估今後一段時期每一「化」對戰力的貢獻率,把最能提升戰鬥力增量的一「化」確定為建設重點,有主有次地合理分配資源,科學確定投向投量。 「三化」建設重點不突出,對各「化」建設採取「撒胡椒麵」式平均用力,容易造成投入產出比不高,甚至可能導致軍隊建設偏離正確的發展方向。

強化「三化」融合發展的策略性舉措

實踐中,應努力轉變依賴後發優勢、不自覺陷入跟隨發展的慣性思維,努力走出被動追趕的發展模式,轉向追求並發優勢、先發優勢,在現有機械化和信息化基礎上來發展智能化,同時用智能化牽引機械化和信息化向更高層次發展,把“三化”集成發展作為軍隊發展的強躍水平,實現整體建設的整體水平的全面建設。

切實加強「三化」融合發展的頂層設計和統籌協調。應充分認識「三化」融合發展的長期性複雜性艱鉅性,堅持技術融合與理念融合相統一,防止簡單套用機械化資訊化原有建設模式抓「三化」融合發展,避免「三化」融合被「泛化」和「貼標籤」。應以強而有力的組織領導加強頂層設計和統籌協調,理順多重關係,匯聚各方力量,形成正向合力。

前瞻佈局「三化」融合發展重點領域。一是某一「化」影響限制其他「化」發展的短板弱項領域。盡快整理各「化」中的技術瓶頸,拉出「卡脖子」技術清單,並加大投入集中攻關,盡快補齊短板。二是某一「化」可能抵銷其他「化」建設成果的質變顛覆領域。在「三化」融合發展過程中,當某一「化」成為主導後,仍應高度注重發展其他「化」中採用新的作戰機理,可能打破戰略平衡並產生顛覆性影響,甚至可能在一定程度上抵消其他「化」建設成果的技術領域。三是「三化」相互交叉鄰接領域。 「三化」的「邊緣帶、交叉點、接合部”,同樣也是快速催生新質戰鬥力的重要領域,當前尤其應前瞻佈局「泛在網路+」和「人工智慧+」等領域。

(作者單位:軍事科學學院戰爭研究院)

中國軍網 國防部網
2022年11月10日 星期四

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4926673.html

China’s Military Effectively Creating a Solid Foundation for Informatization Warfare Construction

我軍切實打造資訊化戰爭建設堅實基礎

現代英語:

Effectively lay a solid foundation for informatization

■Li Zhanliang

The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informatization and intelligence. From the perspective of the relationship between mechanization, informatization and intelligence, mechanization is the foundation of informatization, and intelligence is the sublimation of informatization. Without mechanization there is no informatization, and without adequate informatization, no major breakthrough in intelligence is possible. At present, to vigorously promote military intelligence, we must first effectively lay a solid foundation for informatization construction and strive to improve the level of informatization of our troops.

Solidifying the material base. “It’s hard for a clever woman to make a meal without rice”. In order to shorten the gap with powerful enemies “system gap”, information construction should closely follow the mission and tasks, keep up with cutting-edge technology, do a good job in top-level design, and promote peace and war in an integrated manner. First, upgrade and improve all types of information systems. It is necessary to “focus on the construction of the accusation center and use information infrastructure as a platform to coordinate the construction of sub-systems and the linkage construction of various systems, promote the construction of all elements and systems in areas such as command and control, and realize the integration of information networks in each sub-domain.” Real-time command and control. Secondly, we should build a good operational database. In accordance with the principles of “integration of peacetime and wartime, overall planning, and classified implementation”, we will build a comprehensive combat database to achieve information sharing, data support, and auxiliary decision-making, and support “command chain” with “information flow”. Again, a preset backup mobile command post. We should actively draw on the useful practices of foreign military forces and vigorously strengthen civil defence projects, so as to form a mobile command capability with a multi-point layout, complementary movements and static forces, and rapid configuration.

Build a “strong team”. To win local information wars with intelligent characteristics, building a strong information force is an important guarantee. On the whole, efforts should be made to train four types of talents: first, information command talents. Frontline mid – and senior-level commanders should study information and data like troops, the construction of information systems like battle breakthroughs, and the use of electromagnetic spectrum like ammunition performance. Second, information warfare talent. Cultivate a group of intelligent staff officers, operational planners, cognitive operations and other talents who are competent in information-based operations. Third, information security talents. With the “information assurance department and information assurance operation and maintenance professional technical team personnel” as the main targets, we will continue to increase professional training and improve network management, system use, inspection and maintenance capabilities. Fourthly, information research and development talents. Adopt methods such as “invite in, go out, etc., let go of burdens, and hand in tasks, cultivate a group of expert technical talents with strong system research and development capabilities, establish an information-based high-end talent mobile station, and form “not for me, but for me”” Use a virtuous cycle.

Change command philosophy. Modern warfare is about system, and joint combat command is a key part of it. In order to respond to real threats and challenges, it is necessary to establish a new concept of command that is compatible with future wars. First, the establishment of a solid integrated command concept. Overcoming the narrow concept of command of a single service and arms, comprehensively coordinating multi-dimensional battlefield operations such as land, sea, air, space, electricity, and networks, and integrating various combat elements to effectively improve the combat effectiveness of overall victory and joint victory. Second, establish a solid digital command concept. Transform from “extensive to precise command”, concretize and refine mission distinction, force use, time and space division, goal determination, etc., standardize the command procedures, command methods, command content and other processes of joint combat forces, and standardize reconnaissance intelligence, weapons The platform, command and control and other networked and real-time operations shorten the command process and improve the command timeliness. Third, we need to establish a solid and intelligent command concept. Actively explore the systematic application of artificial intelligence technology, accelerate the development and application of new technologies such as intelligent decision-making, digital twins, big data, and cloud computing, improve the level of complex information processing on the battlefield, and enable commanders to control combat units and various types of weapons with the support of intelligent cloud brains. Task-based command of the platform.

Advancing innovative practices. In order to adapt to changes in science and technology, changes in war, and changes in opponents, we should speed up the construction of “three systems” to win the information war. First, the system of innovative tactics. In-depth study of the real strategies of preventing enemy information attacks, resisting enemy information interference, and counterattacking enemy information in the case of all-round information strikes and firepower destruction by powerful enemy opponents, and strive to achieve precise enemy control. Secondly, the system of innovative training. Focusing on “strong enemy opponents and combat tasks, set up an information combat environment, conduct in-depth research and training on command coordination, tactical application, system construction, comprehensive support and other topics, and promote actual combat deployment and application”. Innovation management systems again. Adhere to the integration of peacetime and wartime management and the combination of virtual and real management, establish a demand-driven mechanism, a plan-led mechanism, and an inspection and evaluation mechanism led by war, create an independent and controllable industrial chain, supply chain, and guarantee chain, and ensure “peace management ”“wartime Use” seamless connection to help continuously improve information combat capabilities.

(Author’s unit: Central Theater Command)

現代國語:

切實打牢資訊化建設基礎

■李佔良

黨的二十大報告強調,堅持機械化資訊化智慧化融合發展。從機械化、資訊化和智慧化之間的關係來看,機械化是資訊化的基礎,智能化是資訊化的昇華。沒有機械化就沒有資訊化,沒有充分的資訊化,智慧化也不可能有重大突破。目前,大力推動軍事智慧化,首先必須切實打牢資訊化建設基礎,著力提升部隊資訊化水準。

夯實物質基礎。巧婦難為無米之炊。為縮短與強敵的“體系差”,資訊化建設應緊貼使命任務,緊跟前沿科技,搞好頂層設計,平戰一體推進。首先,升級完善各類資訊系統。要以指控中心建設為重點,以資訊基礎設施為平台,統籌抓好分系統建設及諸系統聯動建設,全要素、成體系推進指揮控制等領域建設,實現各分域資訊網路一體化、指揮控制即時化。其次,建好用好作戰資料庫。依照「平戰一體、統籌規劃、分類實施」的原則,建好作戰綜合資料庫,實現資訊共享、資料支援、輔助決策,以「資訊流」支援「指揮鏈」。再次,預置備份機動指揮所。積極借鏡外軍有益做法,大力加強人防工程,形成多點佈局、動靜互補、快速配置的機動指揮能力。

建強力量隊伍。打贏具有智慧化特徵的資訊化局部戰爭,建強資訊力量隊伍是重要保證。綜合來看,應著力培養四類人才:一是資訊指揮人才。一線中高級指揮員,應該像研究用兵一樣研究資訊與數據,像研究戰役突破口一樣研究資訊系統的構建,像研究彈藥性能一樣研究電磁頻譜的使用。二是資訊作戰人才。培養一批勝任資訊化作戰的智慧參謀、作戰規劃、認知作戰等人才。三是資訊保障人才。以資訊保障部門及資訊保障維運專業技術分隊人員為主要對象,持續加強專業訓練力度,提升網路管理、系統使用、偵測維修等能力。四是資訊研發人才。採取請進來、走出去等方式,放手壓擔子、交任務,培養一批具有較強系統研發能力的專家型技術人才,建立資訊化高端人才流動站,形成「不為我有、但為我用」的良性循環。

變革指揮理念。現代戰爭拼的是體系,聯合作戰指揮是其中關鍵一環。為因應現實威脅挑戰,需確立與未來戰爭相適應的新型指揮觀。一是樹牢一體化指揮觀。克服狹隘的單一軍兵種指揮觀,全面協調陸、海、空、天、電、網等多維戰場行動,綜合整合各種作戰要素,實際提升整體制勝、聯合製勝的作戰效能。二是樹牢數位化指揮觀。由粗放式向精確化指揮轉變,將任務區分、力量使用、時空劃分、目標確定等具體化精細化,將聯合作戰力量的指揮程序、指揮方法、指揮內容等流程化標準化,將偵察情報、武器平台、指揮控制等網絡化實時化,縮短指揮流程,提高指揮時效。三是樹牢智能化指揮觀。積極探索人工智慧技術成體系應用,加速智慧決策、數位孿生、大數據、雲端運算等新型技術開發運用,提升戰場複雜資訊處理水平,實現指揮者在智慧雲腦支撐下對作戰分隊及各類武器平台的任務式指揮。

推進創新實踐。為適應科技之變、戰爭之變、對手之變,應加速建構打贏資訊化戰爭的「三個體系」。首先是創新戰法體系。在深入研討強敵對手全方位資訊打擊與火力硬破壞的情況下,防敵資訊攻擊、抗敵訊息幹擾、對敵訊息反擊的真招實策,努力實現精準制敵。其次是創新訓法體系。圍繞強敵對手及作戰任務,設置資訊作戰環境,深度研練指揮協同、戰法運用、體系建構、綜合保障等課題,推動實戰化部署運用。再次是創新管理體系。堅持平戰一體管、虛實結合管,建立以戰領建的需求牽引機制、計畫主導機制、檢驗評估機制,打造自主可控的產業鏈、供給鏈、保障鏈,確保「平時管」「戰時用」無縫銜接,助力資訊化作戰能力不斷提升。

(作者單位:中部戰區)

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4926263888.html

Chinese Military Dissipation Warfare: China’s Successful Method of Intelligent Warfare

中國軍事分散戰:中國智慧化戰爭的成功之道

現代英語:

With the rapid development of intelligent technology and its widespread military application, intelligent warfare is becoming a new form of warfare after information warfare, while dissipative warfare has become a typical way of intelligent warfare. The so-called “dissipative warfare” refers to the combat method in which an intelligent warfare system achieves a comprehensive combat capability that integrates material consumption, energy release and information diffusion by enriching and integrating internally and suddenly emerging externally. Strengthening research on dissipative warfare will help us deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.

Dissipation warfare is the inevitable result of the development of the times

Dissipative warfare is manifested in the comprehensive confrontation of physical domain, information domain and cognitive domain in the intelligent era. It is reflected in the high degree of unity in the form of political competition, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the intelligent warfare system. The openness, complexity and emergence of.

Adapting to the requirements of the security situation in the intelligent era. Entering the era of intelligence, technologies such as wide networks, big data, large models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and ethnic groups are even broader. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and become intertwined with traditional threats. Intelligent war subjects and categories have continued to expand, war time and space have continued to extend, and war and peace have followed each other like a shadow. And intertwined, the war system will further transcend local geographical restrictions, move from relatively closed to more open, and form a higher-level and larger-scale confrontation. Dissipative warfare emphasizes the comprehensive efforts of intelligent warfare systems in the physical domain, information domain and cognitive domain, and highly unifies and incorporates political competitions, economic competitions, military offensive and defensive, cultural conflicts and diplomatic checks and balances into the category of confrontation between ourselves and the enemy, adapting to the world. The requirements of the times as the security situation develops.

In line with the objective laws of the evolution of the war forms. The dissipation phenomenon of the war system has always existed since the emergence of war. However, before the emergence of intelligent war forms, due to technological constraints, it was always in a relatively low-level and simple state. War confrontation can only manifest itself in material consumption and energy. A certain form of dispersion and information diffusion. During the agricultural era, the forms of warfare were mainly represented by cold weapon warfare dominated by material elements and centered on the human body. During the industrialization era, the forms of warfare were mainly represented by thermonuclear weapons and mechanized warfare dominated by energy elements and centered on platforms. In the age of informatization, the forms of warfare are mainly characterized by information warfare dominated by information elements and centered on the network information system. Entering the era of intelligence, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between ourselves and the enemy. In essence, it highly unifies matter, energy and information. Through intelligent empowerment, intelligent energy gathering, and Intelligent energy release has formed an intelligent war form dominated by intelligent elements and centered on intelligent algorithms The main form of expression is dissipative warfare that reflects the confrontation of complex systems of intelligent warfare.

With solid support of philosophical theoretical foundation. Social form is the matrix of war form. To explore and understand intelligent war, we must comprehensively examine the evolution of war form and the social form in which intelligent war is located based on the basic principles of historical materialism and dialectical materialism, and build a new concept of war. and contextual system. From a philosophical point of view, matter, energy and information are the three elements that make up the world. Matter embodies the existence of origin, energy embodies the existence of movement, and information embodies the existence of connection. The progressive alternation of the three dominates the evolution and operation of social forms and war forms. According to the negative principle of the negation of dialectical materialism, in the intelligent era after the information age, the elements that dominate society will take the turn of matter again after matter, energy, and information. However, this matter is formed after a highly informatized spiral. The main feature of new substances is that they have intelligent technical attributes. Thus, in essence, dissipative warfare is the highly unified nature of the intelligent element in terms of the characteristic advantages of matter, energy, and information in previous low-order war forms, and the highly unified nature of forms such as material consumption, energy release, and information diffusion prevalent in warfare, reflecting the typical characteristics of intelligent warfare.

Deeply grasp the inner essence of dissipative warfare

Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of the main body and scope of warfare, and presents many new features.

Antisynthetic game. As the intelligent war form accelerates to a higher depth and breadth, and the political, economic, cultural, diplomatic and other fields become more interconnected and influence more widely, the focus of war begins to shift from the military system to the social system, and the war stakeholders Confrontation will be reflected in various forms of comprehensive games such as political competition, economic competition, military offensive and defensive, cultural conflicts, and diplomatic checks and balances The war superiority pursued is no longer limited to the field of military confrontation. The winner of the war must adapt to the requirements of openness, complexity and emergence of the war system, and shift from the extensive consumption and use of a single substance, energy and information to the dissipation of the war system dominated by intelligent advantages, striving to win initiative and advantage in a multi-field comprehensive game.

Subjects cross-domain multivariate. The subjects of intelligent warfare are becoming increasingly general, and the potential forces of war that traditional warfare needs to mobilize will be in a state of normalized confrontation. Political forces, institutions and personnel of all kinds, together with troops and servicemen fighting on the battlefield in the traditional sense, constitute the main body of the war. Diversified war subjects will span the real and virtual domains and appear in multiple spatial domains such as land, sea, air, sky, electricity, and psychology, covering physical domains, information domains, cognitive domains, etc., and covering political, economic, cultural, diplomatic and other social domains. For example, “civilians in society can use smartphones to collect information on the military battlefield and transmit it to war stakeholders, causing the proliferation of key information about war, thereby affecting war decisions or the victory or defeat of a battle and battle”.

Enrichment. The virtual and real forces are one. Around the purpose of war, all possible real and virtual forces will be integrated with the support of intelligent technology, performing duties and acting according to regulations on parallel battlefields; with or without force. Unmanned combat forces will achieve a high degree of autonomy after going through the stages of manual operation, manual authorization, and human supervision, and can be deployed and combined with various types of manned forces on demand, effectively synergizing and coexisting in parallel under the constraints of common war rules; multi-party forces are integrated. Based on the broad contacts in various fields and the common purpose of the war system, all parties, including the party, government, military, police and civilians, closely cooperate and act in a unified manner between military operations and political, economic, diplomatic, public opinion and legal struggles to form a comprehensive combat force. In short, under the integrated planning of countries or political groups, the diverse participating forces in intelligent warfare, although physically dispersed, can focus on common war purposes to achieve logical concentration, instant enrichment, complementary advantages, and integration.

Efficacy cumulative emergence. The high-order war forms, while having new qualitative technical characteristics, still include the characteristic advantages of the low-order war forms. Dissipation warfare emphasizes continuous comprehensive confrontation in multiple domains, which includes both the consumption of ammunition, supplies, equipment and even combatants at the material level, as well as the continuous collection and release of energy levels, including through data, knowledge, algorithms at the information level. The diffusion and fusion of etc. have an unlimited impact on people’s thinking and cognition, value pursuit, moral concepts, emotional will, behavior patterns, etc. Under the normal deterrence of nuclear weapons, intelligent warfare has shown a downward trend of bleeding, but political isolation, economic blockade, cultural conflicts, diplomatic strangulation, etc. will become more severe and intense. When the role of various systems such as military, political, economic, cultural, and diplomatic systems continues to play, and the accumulation of effectiveness reaches a certain level, the war system will increase negative entropy, thereby achieving sudden changes in combat power and the emergence of system effectiveness, thereby gaining war advantages.

Fight a good dissipative war in the “select the right combat focus”

The intelligent warfare system maximizes the combat effectiveness of the system by enriching and integrating internally, suddenly emerging externally, increasing efficiency across domains, and dissipating intelligence. This is the winning mechanism contained in dissipative warfare. To win the victory in intelligent warfare, it is necessary to clarify the combat focus of dissipative warfare, identify the focus of war preparations based on the shortcomings and weaknesses of the opponent’s system.

Focusing on the openness of the system, closing off and isolating the opponent’s war system. Interrupting the exchange of material, energy and information between the adversary’s war system and the external battlefield environment, so that it lacks channels for the source of material, energy and information, and gradually moves towards isolation, closure and weakness. For example, “At the strategic level, political isolation is used to isolate the opponent’s war system, causing the system entropy to increase”. At the “campaign level”, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to comprehensively use soft and hard means to force the war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.

Focusing on the complexity of the system, it breaks down the adversary’s war system in different domains. The more and more closely connected the elements of an intelligent warfare system are, the less reliable the architecture will be. Using the principle that each layer in a complex system is relatively independent, strategic overall, campaign local and tactical action strategies can be formulated to achieve hierarchical and domain-based attack on the enemy’s war system. For example, “At the strategic level, the use of economic blockade greatly weakens the opponent’s war strength and development potential”. At the “campaign level”, we take advantage of the vulnerability of the combat system communication network, use network-to-electric composite attacks as the basic path and means, and use methods such as “destroying terminals, attacking elements, isolated groups, disconnecting networks, and breaking clouds” to break through the opponent’s combat system structure and promote The opponent’s war system “collapse”.

Focus on “system emergence and dismantle the system of evacuation of opponents”. Only when there are sudden changes and emergent effects in the intelligent warfare system can the system’s effectiveness be quickly formed and exerted, and the advantage of dissipative warfare be gained. It is not possible to form an emergence of advantages if only individual components or elements come into play. It is foreseeable that the current emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide new ways of thinking to understand and discover the operating behaviors, states and laws of complex systems of war, as well as new means to explore objective laws and transform nature and society, the superior party in war confrontation will reduce the coupling degree of the opponent’s war system through a parallel confrontation method that combines virtuality and reality Achieving the purpose of dismantling the system of evacuation of enemy warfare.

現代國語:

王荣辉

2023-05-09 11:48:00

来源:中国军网-解放军报

隨著智慧化技術快速發展及在軍事上的廣泛應用,智慧化戰爭正成為資訊化戰爭後的新戰爭形態,而耗散戰則成為智慧化戰爭的典型方式。所謂耗散戰,是指智慧化戰爭體系透過對內富聚融合,對外突變湧現,達成集物質消耗、能量釋散和資訊擴散於一體的綜合戰力的作戰方式。加強耗散戰研究,有利於我們深入揭示智慧化戰爭制勝機理,贏得未來戰爭賽局主動權。
耗散戰是時代發展的必然結果
耗散戰表現在智慧化時代中物理域、資訊域和認知域的綜合對抗,體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式的高度統一,反映了智能化戰爭體系所具有的開放性、複雜性和湧現性。
適應智慧化時代的安全情勢要求。進入智慧化時代,寬網路、大數據、大模型、雲端運算、深度學習等技術快速發展,各政治集團、國家、民族之間的聯繫更加廣泛。在政治多元、經濟交織、社會開放、技術革命等多重因素作用下,非傳統安全興起並與傳統威脅交織,智能化戰爭主體和範疇不斷拓展,戰爭時間與空間不斷外延,戰爭與和平如影相隨並交織一體,戰爭體系將進一步超越局部地域限制,從相對封閉走向更加開放,形成更高層次和更大範圍的對抗。耗散戰強調智慧化戰爭體系在物理域、資訊域和認知域的綜合發力,把政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式高度統一併納入敵我對抗範疇,適應了世界安全形勢發展的時代要求。
符合戰爭形態演變的客觀法則。戰爭體系的耗散現象自戰爭產生以來便始終存在,只不過在智能化戰爭形態出現之前,由於技術的製約,一直處於較為低級的、簡單的狀態,戰爭對抗僅能表現為物質消耗、能量釋散和信息擴散中的某一種形式。農業時代,戰爭形態主要表現為以物質要素為主導的、以人體為中心的冷兵器戰爭。工業化時代,戰爭形態主要表現為以能量要素為主導的、以平台為中心的熱核兵器和機械化戰爭。在資訊化時代,戰爭形態主要表現為以資訊要素為主導的、以網信體系為中心的資訊化戰爭。進入智能化時代,智能化技術將敵我對抗中的認知優勢、決策優勢和行動優勢高度統一起來,實質是將物質、能量和資訊三者高度統一,透過以智賦能、以智聚能、以智釋能,形成了以智能要素為主導的、以智能算法為中心的智能化戰爭形態,主要表現為反映智能化戰爭體系即為反映智能化複雜體系的耗散戰。
具有堅實的哲學理論基礎支撐。社會形態是戰爭形態的母體,探索和認識智能化戰爭,必須基於歷史唯物主義和辯證唯物主義的基本原理,綜合考察戰爭形態的演進和智能化戰爭所處的社會形態,構建新的戰爭概念和語境體系。從哲學角度來看,物質、能量和資訊是構成世界的三大要素,物質體現本源的存在,能量體現運動的存在,訊息則體現連結的存在,三者遞進交替主導著社會形態和戰爭形態的演進和運作。依照辯證唯物論的否定之否定原理,在資訊時代之後的智慧時代,主導社會的要素將繼物質、能量、資訊後再次輪到物質,只不過這個物質是高度資訊化後螺旋式上升後形成的新型物質,其主要特徵就是具有了智慧化技術屬性。因此,從本質上講,耗散戰是智慧要素將以前低階戰爭形態中物質、能量和資訊的特性優勢高度統一起來,將戰爭中普遍存在的物質消耗、能量釋散和資訊擴散等形式高度統一起來,反映了智能化戰爭的典型特徵。
深刻把握耗散戰的內在要義
耗散戰基於現實世界、涵蓋虛擬世界,適應了智慧化技術快速發展、非傳統安全威脅興起、戰爭主體和範疇不斷拓展的趨勢,呈現出許多新特性。
對抗綜合博弈。隨著智慧化戰爭形態加速向更高深度和廣度發展,政治、經濟、文化、外交等領域相互聯繫和影響更具廣泛性,戰爭重心開始從軍事系統向社會系統偏移,戰爭利益攸關方的對抗將體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等多種形式的綜合博弈,追求的軍事優勢不再僅限於戰爭優勢。戰爭制勝方必須適應戰爭體系的開放性、複雜性和湧現性要求,從單一物質、能量和資訊的粗放式消耗和運用轉變到以智能優勢主導戰爭體系的耗散,力爭在多領域的綜合博弈中贏得主動和優勢。
主體跨域多元。智慧化戰爭的主體日益泛化,傳統戰爭需要動員的戰爭潛在力量將處於常態化對抗狀態。政治力量、各類機構和人員與傳統意義上在戰場廝殺的部隊和軍人一起構成戰爭的主體。多元化戰爭主體將跨越現實域和虛擬域,出現在陸、海、空、天、電、心理等多個空間域,涵蓋物理域、資訊域、認知域等,涵蓋政治、經濟、文化、外交等多類社會域。如社會平民可以用智慧型手機收集軍事戰場上的信息並傳遞給戰爭利益攸關方,造成對戰爭關鍵訊息的擴散,進而影響戰爭決策或一場戰役和戰鬥的勝敗。
力量一體富聚。虛實力量一體。圍繞著戰爭目的,一切可能運用的現實力量和虛擬力量將在智能化技術支撐下實現一體化,在平行戰場上按職履責、按規行動;有無力量一體。無人作戰力量將在經歷人工操作、人工授權、人為監督階段後,實現高度的自主性,並可與各類有人力量按需部署、按需組合,在共同的戰爭規則約束下有效協同、並行共生;多方力量一體。基於各領域的廣泛聯繫和戰爭體系的共同目的,黨政軍警民等各方力量將軍事行動與政治、經濟、外交、輿論、法理鬥爭密切配合、統一行動,形成綜合戰力。總之,在國家或政治集團的一體籌劃下,智慧化戰爭的多元參戰力量雖然物理分散,但能夠圍繞共同的戰爭目的,實現邏輯集中、即時富聚,優勢互補、一體聚優。
效能累積湧現。高階戰爭形態在具有新質技術特徵的同時,仍涵括低階戰爭形態的特徵優勢。耗散戰強調在多域持續進行綜合對抗,這既包括物質層面的彈藥、物資、器材甚至作戰人員的消耗,也包括能量層面的不斷匯集和釋放,更包括透過資訊層面的數據、知識、演算法等的擴散與融合,對人的思維認知、價值追求、道德觀念、情感意志、行為模式等產生不可限量的影響。在核武的常態嚇阻下,智慧化戰爭呈現出血腥味下降,但政治孤立、經濟封鎖、文化衝突、外交扼殺等將更加嚴峻激烈的局面。當軍事、政治、經濟、文化、外交等各系統角色持續發揮,效能累積達到某一程度,戰爭體係就會增加負熵,進而實現戰力突變和體系效能湧現,從而獲得戰爭優勢。
在選準作戰重心中打好耗散戰
智慧化戰爭體系透過對內富聚融合,對外突變湧現,跨域增效、以智耗散,達成體係作戰效能最大化,這是耗散戰蘊含的製勝機理。要在智慧化戰爭中贏得勝勢,必須明確耗散戰的作戰重心,針對對手體系短板弱點,找準戰爭準備的發力點。
著眼體系開放性,封閉孤立對手戰爭體系。截斷對手戰爭體系與外在戰場環境的物質、能量和資訊交流,使之缺乏物質、能量和資訊來源管道,逐漸走向孤立、封閉和虛弱狀態。如在戰略層面,採取政治孤立的方式,使對手戰爭體系處於孤立狀態,造成體系熵增。在戰役層面,可利用切斷資料來源、毀滅資料備份、資料作假、竄改資訊等方法,綜合採用軟硬手段,迫其戰爭體係向封閉狀態轉化,進而降低對方體系效能。
著眼體系複雜性,分域破擊對手戰爭體系。智慧化戰爭體係要素間連結越多、連結程度越緊密,體系結構可靠性就越低。運用複雜系統中各分層相對獨立的原理,可製訂戰略全局、戰役局部和戰術行動策略,實現對敵戰爭體系的分層分域破擊。如在戰略層面,採用經濟封鎖的方式,大大削弱對手的戰爭實力和發展潛力。在戰役層面,利用作戰系統通訊網路的脆弱性,以網電複合攻擊為基本路徑與手段,採用「毀端、擊元、孤群、斷網、破雲」等方式,破擊對方作戰系統結構,促使對方戰爭體系「坍塌」。
著眼體系湧現性,拆解疏散對手戰爭體系。智慧化戰爭體系只有出現突變和湧現效應,才能快速形成發揮體系效能,獲得耗散戰優勢。如果只是單一組分或要素發揮作用,不可能形成優勢湧現。可以預見,當前興起的ChatGPT等技術以及未來更高級的智能化技術,將提供理解和發現戰爭複雜體系運行行為、狀態和規律的全新思維方式,以及探知客觀規律、改造自然和社會的新手段,戰爭對抗優勢方將透過虛實結合、平行一體的對抗方式,降低對手戰爭體系的耦合度,達成拆解敵方戰爭體系的目的。

中國原創軍事資源:http://www.81it.com/2023/0509/14260888.html

[Chinese National Defense] Establishing Correct Awareness to Contain China and Conduct Cognitive Warfare Operations

[中國國防]建立正確的意識,以遏制中國並進行認知戰爭行動

現代英語:

As the world continued to actively combat the COVID-19 pandemic, the British newspaper The Guardian reported in late May 2021 that Fazze, a public relations and marketing agency with close ties to Russian officials, was accused of providing funding to influential YouTubers, bloggers, and other opinion leaders in France, Germany, and other European countries to spread false information claiming that vaccines like Pfizer (BNT) and AstraZeneca (AZ) had caused hundreds of deaths. The false information also criticized the EU vaccine procurement system for harming public health in European countries, with the goal of sowing public distrust of Western vaccines and shifting public acceptance toward Russia’s Sputnik V vaccine. This is the most significant example of “perception warfare” in recent international history.

 In fact, human society has always adhered to the principle of “conquering the enemy without fighting” as the guiding principle for optimal military operations. While traditional warfare still primarily takes place in physical space, victory requires the physical capture of cities and territories, as well as the destruction of enemy forces. However, as humanity’s understanding of the nature of war deepens, the use of information technology has become a new trend in warfare, enabling the achievement of traditional combat effectiveness without the need for physical engagement. Given the increasing attention paid to “information warfare” and “hybrid warfare,” this article discusses the closely related concept of “cognitive warfare,” exploring the emerging threats facing our country and our national defense response strategy.

 Whether it’s what the US calls “hybrid warfare” or what Russia calls “information warfare,” the implications are quite similar: centered on the cognitive realm, the use of information to influence and manipulate targets, encompassing both peacetime public opinion and wartime decision-making. The rise of Nazi Germany after World War I was arguably the first modern regime to master the use of information to shape perceptions within its own country and even abroad. Its successful use of propaganda and lies, delivered through various communication technologies, was highly successful. Principles such as “repetition is power” and “negative information is more easily accepted and remembered than positive information” would later profoundly influence authoritarian governments, including Russia.

 Using information capabilities to subvert national regimes

 At the beginning of the 21st century, Russia began to pay attention to the situation where international discourse power was completely controlled by Western countries. It successively put forward theories such as “Information Warfare Theory” and “Sixth Generation Warfare Theory”, arguing that the sixth generation of warfare is a non-contact war that uses precision weapons and information warfare to traverse the battlefield. The purpose of war is no longer a devastating global war, but to achieve effects that cannot be achieved through traditional warfare by exploiting the enemy’s information capabilities to exploit its weaknesses, including changing social and cultural orientations and values, and thus subverting national regimes.

 In 2005, Russia established the international news channel “Russia Today.” Initially focused on soft power propaganda, it shifted its focus after the 2008 Georgian War to attacking negative aspects of Western society and fostering conspiracy theories. The 2014 Ukraine crisis became a training ground for Russian information warfare forces. Using electronic jamming and cyber theft, they intercepted Ukrainian communications, inferring subsequent Ukrainian actions and releasing damaging information at critical moments. They also targeted sensitive issues in eastern Ukraine, including the status of ethnic Russians and economic downturn, distributing a large amount of carefully selected, targeted information to resonate with the public, influencing their perceptions and behavior and gaining control of media opinion. In terms of “cognitive warfare,” Russia’s approach has been successful, and has become a model for the Chinese Communist Party.

 Manipulating “brain control” to control the public

 In 2014, the Chinese Communist Party (CCP) proposed the cognitive operational concept of “brain control,” building on its past “three warfares” of psychological warfare, legal warfare, and public opinion warfare, as well as Russia’s theoretical framework of “information warfare.” It states that a nation’s cognitive space is composed of the superposition of countless individuals, and that “brain control” uses national languages, propaganda media, and cultural products as weapons to comprehensively infiltrate and control the cognition, emotions, and consciousness of the general public and national elites, ultimately distorting, disintegrating, and reshaping their national spirit, values, ideology, history, and culture, thereby achieving the strategic goal of winning without fighting.

 Therefore, the CCP’s “cognitive operations” fall under the broad category of psychological warfare. In the era of information globalization, it integrates information warfare, psychological warfare, and public opinion warfare, becoming the core of the CCP’s overall strategy. Since the 2016 military reform, it has been led by the newly formed “Strategic Support Force” and implemented at all political and military levels. On the one hand, the PLA has adopted American operational thinking in the field of “cognitive operations,” using units such as the 311 Base, the National University of Defense Technology, and the Academy of Military Sciences to develop tactics such as “psychological operations,” “ideological operations,” “consciousness manipulation,” and “strategic communication” to strengthen the “cognitive operations” capabilities jointly constructed by military-civilian integration and joint combat systems. On the other hand, it uses professional personnel to operate media platforms, shape the public opinion environment, and introduce “cognitive operations” into the actual combat application stage.

 The CCP’s recent “cognitive warfare” offensive against Taiwan reveals its methods and tactics. First, the CCP primarily uses the internet to collect personal data from Taiwanese citizens, using big data databases to categorize information by target group, based on political leanings, age, occupation, and other factors. Second, it leverages intelligence gathering to launch targeted cognitive attacks on specific social media platforms, influencing the psychology of the targeted groups, particularly by releasing disinformation to weaken and distract Taiwanese society. Third, it employs online virtual organizations to set up fake social media accounts, infiltrate online communities, and disguise themselves as whistleblowers, deliberately spreading fabricated information to create confusion. Cybertroopers then massively repost and discuss this information, manipulating audience perceptions and creating a cycle of disrupting information retention, manipulating cognitive psychology, and altering thinking patterns.

 Identify fake news and fight back together

 At this stage, the CCP’s campaign for “brain control” over Taiwan aims to influence Taiwanese society’s cognition, distorting public opinion, devaluing democratic values, intensifying opposition, disrupting political conditions, and undermining public trust in the government. The following preventive measures can be taken within the national defense system:

 1. Strengthening educational functions

 Through national defense education in schools, institutions, and society, we will raise the public’s awareness of the threat posed by the CCP’s “cognitive warfare” and their ability to identify false information, and cultivate the habit of rationality, verification, and calmness.

 2. Follow the constraints

 Although there are currently no internationally accepted legal rules that can clearly define the extent to which cognitive warfare constitutes an act of war, making it even more difficult to hold people accountable, media platforms can still strengthen the review of their own reporting content in accordance with existing regulations, and the public can also refrain from spreading suspicious information and following the trend of tennis melee, so as to facilitate the establishment of information verification measures and mechanisms.

 3. Combining Military and Civilian Strength

 Incorporate information and communication-related institutions and industries into the national defense mobilization mechanism, coordinate in peacetime the review, analysis, and disposal of fake news, strengthen talent training and research cooperation, and enhance the capabilities of professional units of the government and the national army; in wartime, cooperate with the overall national actions and carry out countermeasures.

 Currently, Taiwan already has the National Security Bureau’s National Security Operations Center responsible for responding to controversial information from hostile foreign forces. There’s also the non-profit Taiwan Fact-Checking Center. Facing the challenges of cognitive warfare, we must continue to integrate various sectors, strive for international intelligence exchange and experience sharing, optimize the media environment, collaborate across multiple channels, and instantly identify the authenticity and source of information, jointly building our offensive capacity to respond to cognitive warfare.

 Conclusion

 In reality, all countries around the world face threats related to cognitive warfare and information-based psychological warfare. However, democratic and free societies are by no means vulnerable to cognitive warfare attacks and must instead rely on diverse strategies and methods to protect them. We aim to establish a more comprehensive and substantive framework, build a powerful counterforce, and enhance the quality and discernment of our citizens, thereby gaining immunity from the CCP’s cognitive warfare campaign to seize control of our minds.

(The author is a PhD candidate at the Institute of Strategic Studies, Tamkang University)

現代國語:

在全球持續積極對抗新冠疫情之際,英國《衛報》2021年5月下旬報道,與俄羅斯官員關係密切的公關和營銷機構Fazze被指控向法國、德國和其他歐洲國家頗具影響力的YouTube用戶、博主和其他意見領袖提供資金,用於傳播虛假信息,聲稱輝瑞(BNTAZ)和阿斯特利康(BNTAZ)和阿斯特疫苗已導致數百人死亡。這些假訊息也批評歐盟疫苗採購體系損害了歐洲國家的公共衛生,目的是挑起大眾對西方疫苗的不信任,並促使大眾接受俄羅斯的Sputnik V疫苗。這是近代國際史上最顯著的「感知戰」案例。

事實上,人類社會自古以來,均以「不戰而屈人之兵」作為最佳軍事行動指導原則,儘管傳統戰爭主要仍在物理空間進行,需透過實際攻城掠地、消滅敵有生力量,才能獲得勝利。然隨人類對戰爭本質認知深化,利用資訊科技,於不需實體短兵相接的情況下,卻能達到傳統戰爭效果,已成為新型態戰爭趨勢。鑑於「資訊戰」、「混合戰」日益受重視,謹就與其密切相關的「認知作戰」概念進行論述,並探討我國所面臨的新型威脅及全民國防因應策略。

無論是美國所稱的「混合戰」,或俄國所說的「資訊戰」,其實指涉意涵很相似,即以認知領域為核心,利用訊息影響、操控對象目標涵蓋承平時期輿論及戰時決策的認知功能。一戰後,逐漸興起的納粹德國,可謂當代首個擅長運用資訊形塑本國,甚至外國民眾認知的政權,其透過各種傳播技術的政治宣傳與謊言包裝,相當成功;而所謂「重複是一種力量」、「負面訊息總是比正面訊息,更容易讓人接受和印象深刻」等實踐原則,日後更深刻影響專制極權政府與現在的俄羅斯。

藉資訊能力 顛覆國家政權

俄國於進入21世紀初,開始注意國際話語權遭西方國家完全掌控的情形,陸續提出「資訊戰理論」、「第6代戰爭理論」等論述,主張第6代戰爭是以精確武器及資訊戰,縱橫戰場的非接觸式戰爭,戰爭目的不再是毀滅性的全球大戰,而是藉利用敵方弱點的資訊能力,達成傳統戰爭無法實現的效果,包括改變社會文化取向、價值觀,進而顛覆國家政權等。

2005年,俄國成立國際新聞頻道「Russia Today」,起初主要是軟實力宣傳,2008年「喬治亞戰爭」後,轉為攻擊西方社會負面問題與製造陰謀論;2014年「烏克蘭危機」,成為俄軍資訊戰部隊的練兵場,透過電子干擾、網路竊密等手段,截收烏國對外通聯訊息,依此推判烏方後續舉動,並選擇在關鍵時機,釋放對烏國政府不利消息;另選定烏東地區敏感議題,包括俄裔民族地位、經濟不振等,投放大量經篩選的特定資訊,引發民眾共鳴,從而影響烏東人民認知與行為,取得媒體輿論主動權。就「認知作戰」言,俄國作法是成功的,更成為中共的效法對象。

操弄「制腦權」 控制社會大眾

中共2014年於過去心理戰、法律戰、輿論戰等「三戰」基礎,以及俄國「資訊戰」理論架構上,提出「制腦權」認知操作概念,指國家認知空間係由無數個體疊加而成,「制腦」是以民族語言、宣傳媒體、文化產品為武器,全面滲透、控制社會大眾與國家精英之認知、情感與意識,最終扭曲、瓦解、重塑其民族精神、價值觀念、意識形態、歷史文化等,達致不戰而勝的戰略目標。

是以,中共「認知作戰」屬於廣義心理戰範疇,是資訊全球化時代,融合資訊戰、心理戰及輿論戰的戰法,成為中共整體戰略主軸,並自2016年「軍改」後,由新組建的「戰略支援部隊」操盤,在各政略、軍事層次開展執行。一方面,共軍擷取美國在「認知作戰」領域的操作思維,以311基地、國防科技大學、軍事科學院等單位研提「心理作戰」、「思想作戰」、「意識操縱」、「戰略傳播」等戰法,以加強軍民融合及聯戰體系共同建構的「認知作戰」能力;另一方面,則以專業人員操作媒體平臺,形塑輿論環境,將「認知作戰」導入實戰運用階段。

從近年中共對臺進行的「認知作戰」攻勢,可拆解其途徑與手段。首先,中共主要係以網路蒐集國人個資,透過大數據資料庫,劃分政治傾向、年齡、職業等不同目標族群資訊;其次,配合情報偵蒐,針對個別社群媒體展開認知精準打擊,影響目標群眾心理,尤其釋放假訊息,以削弱、分散臺灣社會注意力;再次,則運用網路虛擬組織設置社群媒體假帳號,打入網路族群,偽裝成揭密者、吹哨者,刻意傳散變造資訊,製造混亂,再由網軍大量轉傳、討論,操弄受眾認知,進入阻斷資訊記憶、操縱認知心理、改變思考模式的運作循環。

識別假訊息 全民齊反制

基於現階段,中共對臺「制腦權」作戰,影響臺灣社會認知的目的,在於扭曲輿論、貶低民主價值、激化對立、擾亂政情、減損民眾對政府信任等,於全民國防體系可採取的防制辦法包括:

一、強化教育功能

分別透過全民國防之學校教育、機關教育、社會教育途徑,提高公眾對中共「認知作戰」威脅的認識,與對假訊息識別能力,養成理性、查證、冷靜習慣。

二、遵循約束規範

儘管目前尚無國際通用的法律規則,可明確定義何種程度的認知作戰已構成戰爭行為,更難以究責;然各媒體平臺仍可按既有規範,對自身報導內容加強審查,民眾也可做到不傳播可疑訊息、不跟風網壇混戰,俾利訊息查證措施與機制建立。

三、結合軍民力量

將資訊與傳播相關機構、產業,納入全民防衛動員機制,平時協調因應假訊息審查、分析、處置,加強人才培訓、研究合作,提升政府、國軍專業單位能力;戰時則配合國家整體作為,執行反制任務。

目前我國已有國安局「國家安全作業中心」執行對境外敵對勢力爭議訊息應處有關工作,民間亦有非營利組織成立的「臺灣事實查核中心」。面對「認知作戰」挑戰,仍應持續整合各界力量,爭取國際情報交流與經驗共享,優化媒體環境,多管道合作,即時辨識訊息真偽與來源,共同建設應處「認知作戰」攻勢能量。

結語

事實上,世界各國都同樣面臨「認知作戰」、「資訊心理戰」等相關威脅,然民主自由的社會環境,絕非易受「認知作戰」攻擊的溫床,更需仰賴多元策略與方式守護。期以更完善周全的實質架構,建構強而有力的反制力量,並提升我國公民素質及識別能力,於中共奪取「制腦權」的認知作戰中,獲得免疫。

(作者為淡江大學戰略研究所博士)

中國原創軍事資源:https://www.ydn.com.tw/news/newsInsidePage?chapterID=1431550

Chinese Military Exercises Focused on Taiwan Conclude Signaling Joint Containment Strategy

中國軍事演習的重點是台灣結束信號的聯合遏制策略

現代英語:

The Chinese Communist Party announced the “Strait Thunder-2025A” exercise on the 2nd. The Ministry of National Defense detected 13 Chinese warships, 10 Coast Guard ships, and 8 ships from the Shandong aircraft carrier formation.

(Central News Agency reporter Wu Shuwei, Taipei, 2nd) The two-day Chinese Communist Party military exercise has concluded. Military scholars analyzed that the Chinese Communist Party’s military exercise is still led by politics, using a 70% political and 30% military approach to put pressure on Taiwan, raising the strategic level of “joint blockade” and enhancing the mission role of the Chinese Coast Guard.

The Eastern Theater Command of the People’s Liberation Army of China announced yesterday that it would organize the army, navy, air force, and rocket force to conduct joint exercises around Taiwan. Today, it said that the army will conduct long-range live-fire exercises in relevant waters of the East China Sea in accordance with the “Strait Thunder-2025A” exercise plan.

Regarding the characteristics of the CCP’s military exercise that are worthy of Taiwan’s attention, Chen Wenjia, a senior consultant at the National Policy Research Institute, told a Central News Agency reporter that the PLA’s exercise mobilized the army, navy, air force and rocket force to conduct joint combat drills to test the PLA’s coordinated combat capabilities and enhance the overall effectiveness of operations against Taiwan. Secondly, it is an operational practice exercise, including precision strikes on key infrastructure, blockades of ports and other practical subjects, and simulates scenarios of actual military operations against Taiwan, showing that the PLA’s combat preparations against Taiwan are becoming increasingly mature.

Chen Wenjia said that the Chinese Coast Guard also participated in the military exercise and carried out law enforcement patrols and other operations. The purpose was to exert pressure on Taiwan through gray zone harassment and increase the effectiveness of the “three warfares” of public opinion warfare, psychological warfare, and legal warfare against Taiwan.

Su Ziyun, director of the Institute of Defense Strategy and Resources at the National Defense Security Research Institute, said that the CCP’s military exercise this time is still 70% political and 30% military. Compared with the past “Joint Sword” military exercises against Taiwan, this time the CCP has raised the status of the coast guard and the implementation of “joint blockade” to a strategic level, and announced today that the exercises will practice verification and identification, warning and expulsion, and interception and detention. It is to think about non-war military actions with strategic thinking, and when necessary, cut off Taiwan’s sea transportation lines through isolation to force Taiwan to surrender.

Regarding the warning that the CCP’s military exercises send to Taiwan, Chen Wenjia said that as the PLA continues to conduct high-intensity military exercises around Taiwan, it shows that the military threat to Taiwan is escalating, and Taiwan needs to strengthen its own defense capabilities to ensure the security of the Taiwan Strait; secondly, the pressure in the gray zone is increasing, especially the participation of the coast guard force, which means that China is exerting more pressure in the gray zone. Taiwan needs to increase its vigilance against this non-traditional security threat and should formulate corresponding strategies as soon as possible.

Su Ziyun stated that the Chinese Communist Party’s military exercises highlight the importance of “air defense being the most urgent of all.” Whether the CCP intends to attack Taiwan’s ports or energy facilities, it will need to resort to air strikes, such as missile attacks. This means Taiwan’s air defense capabilities need to be strengthened. In response to Chinese Communist Party gray zone harassment, the Navy currently relies on destroyers and frigates as its main combat vessels. The Navy should emulate the British Navy’s deployment of surveillance vessels, such as River-class patrol vessels, to counter gray zone harassment and preserve the availability and capacity of its main combat vessels. (Editor: Yang Lanxuan) 1140402

現代國語:

中共2日宣布「海峽雷霆-2025A」演練,國防部偵獲共艦13艘、海警船10艘及山東號航艦編隊8艘。 (中央社製圖)

(中央社記者吳書緯台北2日電)中共兩天軍演落幕,軍事學者分析,中共此次軍演仍以政治掛帥,採7分政治、3分軍事的方式對台施壓,拉高「聯合封控」的戰略位階,提升中國海警的任務角色。

中國人民解放軍東部戰區昨天稱組織陸海空軍與火箭軍等兵力,在台灣週邊展開聯合演訓,今天則是稱陸軍部隊按「海峽雷霆-2025A」演練計畫,在東海相關海域實施遠程火力實彈射擊演練。

針對中共此次軍演值得台灣關注的特點,國策研究院資深顧問陳文甲告訴中央社記者,共軍此次演習動用了陸海空軍與火箭軍進行聯合作戰演練,測試共軍的協同作戰能力,提升對台作戰的整體效能,其次是操作實戰化科目演練,包括對關鍵基礎設施的精確打擊、封鎖港口等實戰化科目,並模擬對台灣進行實際軍事行動的場景,顯示共軍針對台灣的作戰整備日益成熟。

陳文甲表示,中國海警也參與此次軍演,並進行執法巡查等行動,目的在透過灰色地帶襲擾施加對台灣的壓力,增加對台灣進行輿論戰、心理戰、法律戰的「三戰」效果。

國防安全研究院國防戰略與資源研究所長蘇紫雲說,中共此次軍演仍是7分政治、3分軍事,和過去對台「聯合利劍」軍演相比,這次中共將海警與執行「聯合封控」的位階提高至戰略位階,並在今天宣稱演習演練查證識別、警告驅離及攔截扣押等課目,就是以戰略思維來思考非戰爭的軍事行動,在必要的時候透過隔離手段,切斷台灣的海上運輸線,來逼迫台灣投降。

對於中共此次軍演對台灣的警訊,陳文甲表示,隨著共軍持續在台灣週邊進行高強度軍事演習,顯示對台灣的軍事威脅不斷升級,台灣需強化自身防衛能力確保台海安全;其次是灰色地帶壓力增加,尤其是海警力量的參與,意味著中國在灰色地帶施加更多壓力,台灣需提高對此非傳統安全威脅的警覺,應盡速制定相應的策略。

蘇紫雲表示,中共軍演凸顯「萬事莫如防空急」,無論是中共要攻擊台灣港口或能源設施,都需要透過飛彈攻擊等空襲手段,代表台灣的防空能力還需加強,而在應對中共灰色地帶襲擾活動,海軍目前仍是以驅逐艦、巡防艦等主戰艦艇應對,應仿效英國海軍建置河級巡邏艦(River-class patrol vessel)等監視性質的艦艇,來應對共軍灰色地帶襲擾,保存主戰艦艇的妥善率和能量。 (編輯:楊蘭軒)1140402

中國原創軍事資源:https://www.cna.com.tw/news/aipl/202504020405.aspx

China’s Weaponized Communication in International Public Opinion Warfare: Scenarios and Risk Responses

中國在國際公眾輿論戰爭中的武器交流:場景和風險回應

現代英語:

【Abstract】 In the international public opinion war, weaponized communication has penetrated into military, economic, diplomatic and other fields, bringing imagination and practice “everything can be weaponized”. Weaponized communication manipulates public perception through technology, platforms, and policies, reflecting the complex interaction of power distribution and cultural games. Driven by globalization and digitalization, cognitive manipulation, social fragmentation, emotional polarization, digital surveillance, and information colonization have become new means of influencing national stability, which not only exacerbates competition between information-powerful and weak countries, but also provides information-weak countries with the opportunity to achieve reversal through flexible strategies and technological innovation. Under the global asymmetric communication landscape, how to find a point of convergence and balance between technological innovation and ethical responsibility, strategic goals and social balance will be key elements that will influence the future international public opinion landscape.

【Keywords】 Public opinion warfare; weaponized communication; information manipulation; asymmetric communication; information security

If “propaganda is a rational recognition of the modern world” [1], then weaponized communication is a rational application of modern technological means. In the “public opinion war”, each participating subject achieves strategic goals through different communication methods, making them superficially reasonable and concealed. Unlike traditional military conflicts, modern warfare involves not only physical confrontation, but also competition in several fields, including information, economics, psychology, and technology. With the advancement of technology and globalization, the shape of war has changed profoundly, and traditional physical confrontations have gradually shifted to multi-dimensional and multi-field integrated warfare. In this process, weaponized communication, as a modern form of warfare, becomes an invisible means of violence that affects the psychology, emotions and behavior of the opposing enemy or target audience by controlling, guiding and manipulating public opinion, thereby achieving political, military or strategic ends.》 “On War” believes that war is an act of violence that makes the enemy unable to resist and subservient to our will. [ 2] In modern warfare, the realization of this goal not only relies on the confrontation of military forces, but also requires support from non-traditional fields such as information, networks, and psychological warfare. Sixth Generation Warfare heralds a further shift in the shape of warfare, emphasizing the application of emerging technologies such as artificial intelligence, big data, and unmanned systems, as well as comprehensive games in the fields of information, networks, psychology, and cognition. The “frontline” of modern warfare has expanded to include social media, economic sanctions, and cyberattacks, requiring participants to have stronger information control and public opinion guidance capabilities.

At present, the spread of weaponization has penetrated into the military, economic, diplomatic and other fields, bringing with it the apprehension that “everything can be weaponized”. In the sociology of war, communication is seen as an extended tool of power, with information warfare penetrating deeply and accompanying traditional warfare. Weaponized communication is precisely under the framework of information control, by shaping public perceptions and emotions, consolidating or weakening the power of states, regimes or non-state actors. This process not only occurs in wartime, but also affects power relations within and outside the state in non-combatant states. In international political communication, information manipulation has become a key tool in the great power game, as countries try to influence global public opinion and international decision-making by spreading disinformation and launching cyberattacks. Public opinion warfare is not only a means of information dissemination, but also involves the adjustment of power games and diplomatic relations between countries, directly affecting the governance structure and power pattern of the international community. Based on this, this paper will delve into the conceptual evolution of weaponized communication, analyze the social mentality behind it, elaborate on the specific technical means and the risks they entail, and propose multidimensional strategies to deal with them at the national level.

1. From weaponization of communication to weaponization of communication: conceptual evolution and metaphor

Weapons have been symbols and tools of war throughout human history, and war is the most extreme and violent form of conflict in human society. Thus, “weaponized” refers to the use of certain tools for confrontation, manipulation or destruction in warfare, emphasizing the way in which these tools are used.“ Weaponization ”(weaponize) translated as“ makes it possible to use something to attack an individual or group of people”. In 1957, the term “weaponization” was proposed as a military term, and Werner von Braun, leader of the V-2 ballistic missile team, stated that his main work was “weaponizing the military’s ballistic missile technology‘ [3].

“Weaponization ”first appeared in the space field, during the arms race between the United States and the Soviet Union, and the two major powers tried to compete for dominance in outer space.“ Weaponization of space ”refers to the process of using space for the development, deployment or use of military weapons systems, including satellites, anti-satellite weapons and missile defense systems, etc., with the purpose of conducting strategic, tactical or defensive operations. From 1959 to 1962, the United States and the Soviet Union proposed a series of initiatives to ban the use of outer space for military purposes, especially the deployment of weapons of mass destruction in outer space orbit. In 2018, then-U.S. President Trump signed Space Policy Directive-3, launching the construction of the “Space Force” and treating space as an important combat area on the same level as land, air, and ocean. In 2019, the “Joint Statement of the People’s Republic of China and the Russian Federation on Strengthening Contemporary Global Strategic Stability” proposed “prohibiting the placement of any type of weapons in outer space” [4].

In addition to weaponization in the space sector, there is also a trend towards weaponization in the military, economic and diplomatic fields.“ Military weaponization” is the use of resources (such as drones, nuclear weapons, etc.) for military purposes, the deployment of weapons systems, or the development of military capabilities. During the Russo-Ukrainian War in 2022, a report from the Royal United Services Institute showed that Ukraine lost approximately 10,000 drones every month due to the impact of Russian jamming stations. [ 5] “weaponization” also often appears in expressions such as “financial war ”“diplomatic battlefield”. In the economic sphere, weaponization usually refers to the use of shared resources or mechanisms in the global financial system by countries or organizations; diplomatic weaponization is manifested in countries pursuing their own interests and exerting pressure on other countries through economic sanctions, diplomatic isolation, and manipulation of public opinion. Over time, the concept of “weaponization” has gradually expanded into the political, social, cultural and other fields, especially in the information field, and since the 2016 United States presidential election, manipulation of public opinion has become a universal tool in political struggles. David Petraeus, a former director of the CIA in the United States, once said at a National Institute for Strategic Studies conference that the time has come for “the weaponization of everything”.[ 6]

As a metaphor, “weaponization” not only refers to the use of actual physical tools, but also symbolizes the transformation of adversarial and aggressive behavior, emphasizing how the concept of “weapons” permeates daily life, cultural production, and political strategies, showing how social actors use various tools to achieve strategic goals. Nowadays, many areas that should remain neutral, such as the media, law and government agencies, are often described as “weaponized” to criticize their excessive politicization and improper use, highlighting their illegality and negative impact on society. Influence. Through this metaphor, one unconsciously contrasts the current political environment with an idealized and seemingly more moderate past, making one think that the political climate of the past was more rational and civilized, while the present appears too extreme and oppositional.[ 7] Therefore, the essence of “weaponization” is the process of political mediation, which is the use of various means and channels by political forces to influence or control areas that should remain neutral, making them political purposes and tools of political struggle.

In the field of information, the weaponization of communication is a long-standing and strategic means. During World War I and II, propaganda and public opinion warfare were widely used in various countries, and means of communication were used as a psychological tactic. Weaponized communication is the embodiment of the weaponization of communication in the modern information society. It uses algorithms and big data analysis to accurately control the speed and scope of information dissemination, and then controls public opinion and emotions. It reflects the combination of technology, platforms and strategies, making Political forces can more accurately and efficiently control the public perception and public opinion environment. As the ontology of public opinion, information is “weaponized” and used to influence social cognition and group behavior, and the concept of “war” has changed accordingly, no longer just traditional military confrontation, but also includes psychological warfare and cognitive warfare through information dissemination and public opinion manipulation. This shift has led to a range of new terms such as unrestricted warfare, new generation warfare, asymmetric warfare, and irregular warfare. Almost all of these terms are borrowed from “warfare” (warfare) to emphasize diverse conflicts in the information field, and information becomes the core content of “weaponization”.

Although there is some view that the term “war” does not apply to situations where hostilities are not formally declared [8], weaponized communication extends the concept of “war” by weakening the traditional political attributes of war and treating overt or covert forces and forms in various fields in general terms. as an act of communication. It is important to note that in English terms “weaponization” there are two formulations: one is “weaponized noun ”noun“, which means that something has been ”weaponized“ with a weapon function or purpose, and the other is ”weaponization of noun, which refers to the process of converting something into a weapon or having the nature of a weapon. In the academic sphere, Chinese translations differ, although weaponized communication and weaponization of communication are not yet strictly distinguished.“ Weaponized communication ”which focuses more on the means of communication or the message itself“ being weaponized” in order to achieve a certain strategic goal, and “weaponization of communication”, which emphasizes the process of communication itself as a transformation process of weapons. When discussing specific technical means, most academic papers adopt weaponized or weaponizing as a prefix to modify specific means of dissemination.

This article focuses on specific communication strategies in the international public opinion war, focusing on describing the weaponization phenomenon that has occurred, so unified use “weaponized communication” is a method of using communication means, technical tools and information platforms to accurately control information flow, public cognition and emotional response, a strategic communication method to achieve specific military, political or social purposes. Weaponized communication is also not a simple state of war or wartime, but a continuous communication phenomenon. It reflects the interaction and game between various subjects and is the flow of information sharing and meaning space.

2. Application scenarios and implementation strategies of weaponized communication

If at the end of the 1990s, weaponization in the information field was still a “dead topic”, and countries were mainly chasing upgrading competitions for physical weapons such as missiles and drones, then entering the 21st century, cyber wars have truly entered the public eye, and deeply embedded in people’s daily lives, through social media and smart devices, the public will inevitably be involved in the war of public opinion and unconsciously become participants or communication nodes. With the spread of technology, weaponized means gradually expanded from state-led instruments of war to socialized and politicized areas, and control over individuals and society shifted from explicit state apparatus to more covert conceptual manipulation. The exposure of Project Prism (PRISM) has raised strong global concerns about privacy breaches, highlighting the potential for states to use advanced technology for surveillance and control, seen as a new type of weaponization. Since Trump was elected President of the United States in 2016, the large-scale application of information weapons such as social robots has become a common phenomenon in the global political game. Information warfare ——including electronic warfare, computer network warfare, psychological warfare, and military deception—— is widely used to manipulate the flow of information and influence the landscape of public opinion. Not only do these methods work in military wars and political elections, but they also gradually permeate cultural conflicts, social movements and transnational games, perpetuating the traditional logic of information warfare. Nowadays, weaponized communication, as a socio-political tool, profoundly affects the ecology of public opinion, international relations and the daily lives of individuals.

(1) Information manipulation warfare in the military field

Information flow can directly influence the direction of military conflicts, shaping public and military perceptions and decisions, which in turn affects morale, strategic judgment, and social stability. In modern warfare, information is no longer a mere aid, and the field of information has become a central battleground. By manipulating the flow of information, the enemy’s situation assessment may be misled, the will to fight is weakened, and the trust and support of the people are shaken, which in turn affects the decision-making process and continuity of the war.

The Gulf War is regarded as the beginning of modern information warfare. In this war, the United States carried out systematic strikes against Iraq through high-tech means ——including electronic warfare, air strikes, and information operations——. The U.S. military used satellites and AWACS early warning aircraft to monitor the battlefield situation in real time, and induced the Iraqi army to surrender from a psychological level by airdropping leaflets and radio stations to convey to Iraqi soldiers the advantages of the U.S. military and its preferential treatment policy after surrender. The war marked the key place of information control in military conflicts, demonstrating the potential of information warfare in modern warfare. In the 21st century, cyberwarfare has become an important part of information warfare. Cyberwarfare involves not only the dissemination and manipulation of information, but also control over enemy social functions through attacks on critical infrastructure. In 2007, Estonia suffered a large-scale DDoS (Distributed Denial of Service Attack) attack, demonstrating a trend towards the fusion of information manipulation and cyberattacks. In the WannaCry ransomware incident in 2017, attackers used a Windows system vulnerability (EternalBlue) to encrypt the files of approximately 200,000 computers in 150 countries around the world and demanded a ransom, seriously affecting the British National Health Service (NHS) and causing the interruption of emergency services. and hospital system paralysis, further revealing the threat of cyber warfare to critical infrastructure. In addition, in long-term conflicts, infrastructure control is widely used to undermine the strategic capabilities of adversaries to compete for public information space due to its ability to directly determine the speed, scope, and direction of information dissemination. Israel has effectively weakened Palestinian communications capabilities by restricting the use of radio spectrum, controlling Internet bandwidth and disrupting communications facilities. At the same time, Israel also restricts the development of the Palestinian telecommunications market through economic sanctions and legal frameworks, suppresses Palestinian competitiveness in the flow of information, and consolidates its own strategic advantage in the conflict [9] in order to maintain the unequal flow of information.

Social media provides an immediate and extensive channel for information manipulation, allowing it to cross borders and influence global public sentiment and political situations, as well as shifting the focus of war from mere physical destruction to manipulation of public opinion. During the Russo-Ukrainian War, deepfake technology was used as a visual weapon, which significantly interfered with public perception and public opinion about the war. On March 15, 2022, a fake video of Ukrainian President Volodymyr Zelenskyy was circulated on Twitter, in which he “called” Ukrainian soldiers to lay down their weapons, triggering public confusion for a short period of time. Similarly, fake videos of Russian President Vladimir Putin have been used to confuse the public. Although the videos were promptly annotated “Stay informed” by the platform (pending instructions on understanding the situation), they still caused obvious interference to public emotions and perceptions within a short period of time. These events highlight the critical role of social media in modern information warfare, where state and non-state actors can exert interference in military conflicts through disinformation, emotional manipulation, and other means.

The complexity of information manipulation warfare is also reflected in its dual nature ——both a tool for attack and a means of defense. In the military sphere, states ensure national security, protect critical infrastructure, maintain military secrets, and in some cases influence adversary combat effectiveness versus decision-making by defending against and countering cyberattacks. In 2015 and 2017, Russian hackers launched large-scale cyber attacks against Ukraine (such as BlackEnergy and NotPetya). Ukraine successfully resisted some attacks and took countermeasures by quickly upgrading its cyber defense systems, avoiding larger-scale infrastructure paralysis. In addition, units such as the NATO Center of Excellence for Strategic Communications and the British 77th Brigade focus on researching public opinion shaping in peacetime [10], using strategic communications, psychological warfare, and social media monitoring to expand strategic control in the information field and strengthen defense and public opinion shaping capabilities, further increasing the strategic height of information warfare.

Today, information manipulation warfare is a key link in modern military conflicts. Through the high degree of integration of information technology and psychological manipulation, it not only changes the rules of traditional warfare, but also profoundly affects public perception and the global security landscape. By taking control of critical infrastructure and social media platforms, countries, multinational corporations or other actors can gain strategic advantages in the global information ecosystem by restricting the flow of information and manipulating communication paths.

(2) Public opinion intervention in political elections

Political elections are the most direct field of competition for power in democratic politics, and the dissemination of information has an important influence on voter decision-making in the process. By calculating propaganda and other means, external forces or political groups are able to manipulate the sentiments of voters and mislead the public, thereby influencing the results of elections, destabilizing politics or weakening the democratic process, and elections are thus the most effective application scenario for weaponized communication.

In recent years, global political elections have shown a trend towards polarization, with large ideological differences between groups with different political affiliations. Polarization leads the public to selectively accept information that is consistent with their own views, while excluding other information, and this “echo chamber effect” intensifies the public’s one-sided perception of positions, giving greater scope for public opinion intervention. And the rise of information dissemination technology, especially computational propaganda, has enabled external forces to more accurately manipulate public opinion and influence voter decision-making. Computational Propaganda refers to the use of computing technology, algorithms and automated systems to control the flow of information to disseminate political information, interfere with election results and influence public opinion. Its core characteristics are algorithm-driven accuracy and the scale of automated communication. By breaking through The limitations of traditional manual communication have significantly enhanced the effect of public opinion manipulation. In the 2016 U.S. presidential election, the Trump team analyzed Facebook user data through Cambridge Analytica and pushed customized political advertisements to voters, accurately affecting voters’ voting intentions [11]. This incident was seen as a classic case of computational propaganda interfering in elections, and also provided an operational template for other politicians, driving the widespread use of computational propaganda worldwide. In the 2017 French presidential election, candidate Emmanuel Macron’s team was hacked, and internal emails were stolen and made public, claiming that Macron had secret accounts overseas and was involved in tax evasion in an attempt to discredit his image. During the 2018 Brazilian presidential election, the team of candidate Jair Bolsonaro used WhatsApp groups to spread inflammatory political content, targeting and pushing a large number of images, videos and inflammatory messages to influence voter sentiment. According to statistics, from 2017 to 2019, the number of countries using computing for propaganda worldwide increased from 28 to 70, and in 2020 this number rose to 81. This suggests that computational propaganda is redefining the rules of public opinion in global elections through technical means and communication strategies.

Computational propaganda is also an important tool for state actors in the war of public opinion intervention. In 2011, the U.S. Defense Advanced Research Projects Agency (DARPA) launched Operation “Voice of Ernest” in the Middle East to distort conversations on Arabic-language social media by establishing and managing multiple false identities (sockpuppets). Russia also frequently uses computational propaganda to intervene, operating about 200,000 social media accounts in Canada, using far-right and far-left movements to spread pro-Russian rhetoric, create false social hot spots, and try to undermine Canada’s support for Ukraine [12]. As an important part of computing propaganda, social robots create the heat of public opinion through automation and scale, increase the exposure of information on social platforms through specific tags, and control the priority of issues. During the 2016 U.S. election, Russia used social robots to post content supporting Putin and attacking the opposition, covering up the opposition’s voice through information overload, and strengthening the pro-Putin public opinion atmosphere. [ 13] During the 2017 Gulf crisis, Saudi Arabia and Egypt used Twitter bots to create anti-Qatar hashtags#AlJazeeraInsultsKingSalman, which made it a hot topic and fictionalized the peak of anti-Qatar sentiment, which in turn affected global public opinion attitudes towards Qatar. [ 14] Deepfake technology further improves the accuracy and concealment of computing propaganda. In 2024, a fake video of U.S. President Joe Biden went viral on X (formerly Twitter), showing him using offensive language in the Oval Office, sparking controversy in public opinion and influencing voter sentiment. According to a survey by cybersecurity firm McAfee, 63% of respondents had watched a political deepfake video within two months, and nearly half said the content influenced their voting decisions.[ 15]

Globally, computing propaganda has infiltrated public opinion wars in various countries, affecting social stability and national security. The Israel Defense Forces waged a public opinion war against Palestine through digital weapons, Turkey cultivated “a patriotic troll army” to manipulate public opinion at home and abroad, and the Mexican government used botnets to influence public opinion. Computational propaganda is changing the landscape of global political communication as an important means of modern public opinion intervention warfare. With the development of technologies such as artificial intelligence and quantum computing, computing propaganda may also interfere with electoral processes through more covert and efficient means, or even directly threaten the core operating logic of democratic institutions.

(3) Symbolic identity war in the cultural field

Weaponized communication attempts to influence the public’s thoughts, emotions, and behaviors by manipulating information, symbols, and values, which in turn shapes or changes society’s collective cognition and cultural identity. This mode of communication consists not only in the transmission of information, but also in promoting the transmission and identification of a specific ideological or political idea through a specific narrative framework, cultural symbols and emotional resonance. Through the manipulation of cultural symbols, social emotions and collective memory, weaponized communication interferes with social structure and cultural identity in the cultural field, becoming a core means of symbolic identity warfare.

Memes, as a cultural symbol that combines visual elements and concise words, stimulate the emotional response of the audience in a humorous, satirical or provocative way, affecting their political attitudes and behaviors. Pepe the Frog began as a harmless comic book character that was repurposed and weaponized by far-right groups to spread hate speech, gradually evolving into a racist and anti-immigrant symbol. Memes transform complex political sentiments into easy-to-spread visual symbols that quickly stir up public distrust and anger over policy, seen as “weaponized iconoclastic weaponization” (Iconoclastic Weaponization). This process, by manipulating cultural symbols in order to achieve the purpose of political or social struggle [16], aggravates the public’s division of society and politics. For example, during Brexit, memes bearing the words “Take Back Control” Take Back Control spread rapidly, reinforcing nationalist sentiments.

In addition to the manufacture of cultural symbols, the screening and shielding of symbols are equally capable of shaping or deepening a certain cultural identity or political stance. Censorship has been an important means for power to control information since ancient times, and as early as the ancient Greek and Roman periods, governments censored public speeches and literary works to maintain social order and power stability. Entering the digital age, the rise of the Internet and social media has driven the modernization of censorship, and platform censorship has gradually replaced traditional censorship methods as a core tool for contemporary information control and public opinion guidance. Algorithm review detects sensitive topics, keywords, and user behavior data through artificial intelligence, automatically deletes or blocks content deemed “violations”, and the review team of social media manually screens user-generated content to ensure its compliance with platform policies and laws and regulations. The role of platform censorship is not only to limit the dissemination of certain content, but also to guide public opinion and shape the public perception framework through push, deletion and blocking. Although mainstream social platforms control the spread of information through strict content moderation mechanisms, some edge platforms such as Gab, Gettr, Bitchute, and others have become hotbeds of extreme speech and malicious information due to the lack of effective censorship. These platforms do not place sufficient restrictions on content publishing, allowing extreme views and disinformation to spread wantonly. For example, Gab has been repeatedly criticized for its extremist content and is accused of promoting violence and hatred. In the “echo chamber”, users can only access information that is consistent with their own views. This information environment further strengthens extreme ideas and leads to increased antagonism among social groups.[ 17]

Language, as a carrier and tool for information dissemination, can profoundly influence group behavior and cultural identity through emotional manipulation, symbolic politics, and social mobilization. The weaponization of language focuses on how language forms and cultural contexts affect the way information is received, emphasizing how language can be used to manipulate, guide or change people’s cognition and behavior. This involves not only the use of specific lexical and rhetorical devices, but also the construction of specific social meanings and cultural frameworks through linguistic representations. As another important tool of symbolic identity warfare, language shapes the narrative framework “of antagonism between the enemy and the enemy”. The Great Translation Movement spread the nationalist rhetoric of Chinese netizens to international social media platforms through selective translation, triggering negative perceptions of China. This language manipulation amplifies controversial content through emotional expression and deepens the cultural bias of the international community.

The deep logic of the weaponization of language lies in emotional and inflammatory forms of language. Western countries often justify acts of intervention by using the labels of justice such as “human rights” and “democracy”, legitimizing political or military action. White supremacists reshape ideologies using vague labels such as “alt-right”, transforming traditional “white supremacist” with strongly negative connotations into a more neutral concept, reducing the vocabulary’s social resistance, broadening the base of its supporters with a broad “umbrella” identity. Through the infiltration of secular discourse, hate politics and extreme speech are justified, gradually creating a political normality. Language is truly weaponized after the public routineizes this politics.[ 18] In Nigeria, hate-mongering content spreads through racial, religious and regional topics, profoundly deteriorating social relations. [ 19] Linguistic ambiguity and reasonable denial strategies have also become powerful tools for communicators to circumvent their responsibilities and spread complex social and political issues in simplified narratives. Through negative labeling and emotional discourse, Trump’s America First policy deliberately puts forward views that are opposed to mainstream opinions by opposing globalization, questioning climate change science, and criticizing traditional allies, stimulating public distrust of globalization, reshaping the cultural identity of national interests first. [ 20]

III Risks and challenges of weaponized dissemination: legitimacy and destructiveness

Although weaponized communication poses a great risk to the international public opinion landscape, it may be given some legitimacy by certain countries or groups through legal, political or moral frameworks in specific situations. For example, after the “9/11” incident, the United States passed the Patriot Act to expand the surveillance authority of intelligence agencies and implement extensive information control in the name of “anti-terrorism”. This “legitimacy” is often criticized as undermining civil liberties and eroding the core values of democratic society.

In the international political game, weaponized transmission is more often seen as a means of “Gray Zone” (Gray Zone). Confrontations between countries are no longer limited to economic sanctions or diplomatic pressure, but are waged through non-traditional means such as information manipulation and social media intervention. Some States use “the protection of national interests” as a pretext to disseminate false information, arguing that their actions are compliant and, although they may be controversial under international law, are often justified as necessary means “to counter external threats”. In some countries where the regulation of information lacks a strict legal framework, interference in elections is often tolerated or even seen as a “justified” political exercise. At the cultural level, certain countries attempt to shape their own cultural influence on a global scale by disseminating specific cultural symbols and ideologies. Western countries often promote the spread of their values in the name of “cultural sharing” and “communication of civilizations”, but in actual operations, they weaken the identity of other cultures by manipulating cultural symbols and narrative frameworks, leading to global cultural ecology. imbalance. The legal framework also provides support, to a certain extent, for the justification of weaponized dissemination. In the name of “counter-terrorism” and “against extremism”, some countries restrict the dissemination of so-called “harmful information” through information censorship, content filtering and other means. However, this justification often pushes moral boundaries, leading to information blockades and suppression of speech. Information governance on the grounds of “national security”, although internally recognized to a certain extent, provides space for the proliferation of weaponized communications.

Compared to legitimacy, the spread of weaponization is particularly devastating. At present, weaponized communication has become an important tool for power structures to manipulate public opinion. It not only distorts the content of information, but also profoundly affects public perception, social emotions, and international relations through privacy violations, emotional mobilization, and cultural penetration.

(1) Information distortion and cognitive manipulation

Distortion of information means that information is deliberately or unintentionally distorted during dissemination, resulting in significant differences between what the public receives and the original information. On social media, the spread of disinformation and misleading content is rampant, and generated content from artificial intelligence models (such as GPT) may be exacerbated by bias in training data. Gender, race, or social bias may be reflected in automatically generated text, amplifying the risk of information distortion. The fast-spreading nature of social media also makes it difficult for traditional fact-checking mechanisms to keep up with the spread of disinformation. Disinformation often dominates public opinion in a short period of time, and cross-platform dissemination and anonymity complicate clarification and correction. The asymmetries in communication undermine the authority of traditional news organizations, and the public’s preference for trusting instantly updated social platform information over in-depth coverage by traditional news organizations further diminishes the role of news organizations in resisting disinformation.

In addition to the distortion of the information itself, weaponized communication makes profound use of the psychological mechanisms of cognitive dissonance. Cognitive dissonance refers to the psychological discomfort that occurs when an individual is exposed to information that conflicts with their pre-existing beliefs or attitudes. By creating cognitive dissonance, communicators shake the established attitudes of their target audience and even induce them to accept new ideologies. In political elections, targeted dissemination of negative information often forces voters to re-examine their political positions or even change their voting tendencies. Weaponized communication further intensifies the formation of “information cocoon houses” through selective exposure, allowing audiences to tend to access information consistent with their own beliefs, ignoring or rejecting opposing views. This not only reinforces the cognitive biases of individuals, but also allows disinformation to spread rapidly within the group, making it difficult to be broken by external facts and rational voices, and ultimately forming a highly homogeneous ecology of public opinion.

(2) Privacy leakage and digital monitoring

In recent years, the abuse of deepfakes has exacerbated the problem of privacy violations. In 2019, the “ZAO” face-changing software was removed from the shelves due to default user consent to portrait rights, revealing the risk of overcollection of biometric data. Photos uploaded by users that have been processed through deep learning can either generate an accurate face-changing video or become a source of privacy leaks. What’s more, techniques such as deepfakes are abused for gender-based violence, the faces of multiple European and American actresses are illegally planted with fake sex videos and widely distributed, and although the platforms remove this content in some cases, the popularity of open-source programs makes it easy for malicious users to copy and share forged content. In addition, when users use social media, they tend to authorize the platform by default to access their devices’ photos, cameras, microphones and other app permissions. Through these rights, the platform not only collects a large amount of personal data, but also analyzes users’ behavioral characteristics, interest preferences, and social relationships through algorithms, allowing it to accurately deliver ads, recommend content, and even implement information manipulation. This large-scale data acquisition drives global discussion of privacy protections. In Europe, the General Data Protection Regulation attempts to strengthen the protection of individuals’ right to privacy through strict regulations on data collection and use. However, due to “implicit consent” or complex user agreements, platforms often bypass regulations that make the data-processing process less transparent, making it difficult for regular users to understand what the data is actually used for. Section 230 of the U.S. Communications Decency Act provides that online platforms are not legally responsible for user-generated content, a provision that has fueled the development of content moderation on platforms but has also left them with little incentive to respond to privacy infringements. Platforms, motivated by commercial interests, often lag behind in dealing with disinformation and privacy issues, leading to ongoing shelving of audit responsibilities.

In terms of digital surveillance, social platforms work with governments to make user data a core resource “of surveillance capitalism”. The National Security Agency (NSA) implements mass surveillance through phone records, Internet communications, and social media data, and works with large enterprises such as Google and Facebook to obtain users’ online behavioral data for intelligence gathering and behavioral analysis worldwide. The abuse of transnational surveillance technologies is what pushes privacy violations to an international level. Pegasus spyware developed by the Israeli cybersecurity company NSO, which compromises target devices through “zero-click attacks”, can steal private information and communication records in real time. In 2018, in the case of the murder of Saudi journalist Jamal Khashoggi, the Saudi government monitored its communications through Pegasus, revealing the profound threat this technology poses to individual privacy and international politics.

(3) Emotional polarization and social division

Emotions play a key role in influencing individual cognition and decision-making. Weaponized communication influences rational judgment by inciting feelings of fear, anger, sympathy, etc., and pushes the public to react irrationally, driven by emotions. War, violence and nationalism often become the main content of emotional mobilization. Through carefully designed topics, communicators implant elements such as patriotism and religious beliefs into information dissemination, quickly arousing public emotional resonance. The widespread adoption of digital technologies, particularly the combination of artificial intelligence and social media platforms, further amplifies the risk of emotional polarization. The rapid spread of disinformation and extreme speech on the platform comes not only from the sharing behavior of ordinary users, but is also driven by algorithms. Platforms tend to prioritize the push of emotional and highly interactive content, which often contains inflammatory language and extreme views, thus exacerbating the spread of hate speech and extreme views.

Social media hashtags and algorithmic recommendations play a key role in emotional polarization. After the Charlie Hebdo incident, the #StopIslam hashtag became a communication tool for hate speech, with the help of which users posted messages of hatred and violent tendencies. During the 2020 presidential election in the United States, extreme political rhetoric and misinformation on social platforms were also amplified in a bitter partisan struggle. Through precise emotional manipulation, weaponized communication not only tears apart public dialogue, but also greatly affects the democratic process of society. Another particular extremist mobilization tactic is “Weaponized Autism”, where far-right groups use the technical expertise of autistic individuals to implement emotional manipulation. These groups recruit technically competent but socially challenged individuals, transforming them into enforcers of information warfare by giving them a false sense of belonging. These individuals, guided by extremist groups, are used to spread hate speech, carry out cyberattacks and promote extremism. This phenomenon reveals not only the deep-seated mechanisms of emotional manipulation, but also how technology can be exploited by extremist groups to serve the larger political and social agenda.[ 21]

(4) Information colonization and cultural penetration

“Weaponized Interdependence” theory Weaponized Interdependence Theory reveals how states use key nodes in political, economic, and information networks to exert pressure on other states. [ 22] Especially in the field of information, developed countries further consolidate their cultural and political advantages by controlling the implementation of information flows “information colonization”. Digital platforms became the vehicles of this colonial process, the countries of the Global South were highly dependent on Western-dominated technology platforms and social networks for information dissemination, and in sub-Saharan Africa, Facebook has become synonymous with “the Internet”. This dependence not only generates huge advertising revenues for Western businesses, but also has a profound impact on indigenous African cultures and values through algorithmic recommendations, especially in terms of gender, family, and religious beliefs, making cultural penetration the norm.

Digital inequality is another manifestation of information colonization. The dominance of developed countries in digital technology and information resources has increasingly marginalized countries of the South in the economic, educational and cultural fields. Palestine’s inability to effectively integrate into the global digital economy due to inadequate infrastructure and technological blockade both limits local economic development and further weakens its voice in global information dissemination. Through technological blockades and economic sanctions, the world’s major economies and information powers restrict other countries’ access to key technological and innovation resources, which not only hinders the development of science and technology in target countries, but also exacerbates the rupture of the global technology and innovation ecosystem. Since withdrawing from the Iran Nuclear Deal in 2018, U.S. economic sanctions on Iran have blocked its development in the semiconductor and 5G sectors, and the asymmetry between technology and innovation has widened the gap in the global technology ecosystem, putting many countries at a disadvantage in information competition.

IV Reflection and discussion: the battle for the right to speak in the asymmetric communication landscape

In the competitive landscape of “Asymmetric Communication”, strong parties often dominate public opinion through channels such as mainstream media and international news organizations, while weak parties need to use innovative communication technologies and means to make up for their disadvantages and compete for the right to speak. At the heart of this communication landscape lies Information Geopolitics, the idea that the contest of power between states depends not only on geographical location, military power, or economic resources, but also on control over information, data, and technology. The game between the great powers is no longer limited to the control of physical space, but extends to the competition for public opinion space. These “information landscapes” involve the right to speak, information circulation and media influence in the global communication ecosystem. In this process, the country continuously creates landscapes to influence international public opinion and shape the global cognitive framework, thereby achieving its strategic goals. The strategy of asymmetric communication is not only related to the transmission of information content, but more importantly, how to bridge the gap between resources and capabilities with the help of various communication technologies, platforms and means. The core of information communication is no longer limited to the content itself, but revolves around the right to speak. The competition unfolds. With the rise of information warfare and cognitive warfare, whoever has the information will have a head start in global competition.

(1) Technology catching up under the advantage of latecomers

Traditional large countries or strong communicators control the dominance of global public opinion, and by contrast, weak countries often lack communication channels to compete with these large countries. The theory of latecomer advantage advocates that latecomer countries can rapidly rise and circumvent inefficient and outdated links in early technological innovation by leaping forward and bypassing traditional technological paths and introducing existing advanced technologies and knowledge. In the context of weaponized communication, this theory provides information-weak countries with a path to break through the barriers of communication in large countries through emerging technologies, helping them to catch up at the technical level. Traditional media are often constrained by resources, influence and censorship mechanisms, with slow dissemination of information, limited coverage and vulnerability to manipulation by specific countries or groups. The rise of digital media has brought about a fundamental change in the landscape of information dissemination, enabling disadvantaged countries, with the help of globalized Internet platforms, to directly target international audiences without having to rely on traditional news organizations and mainstream media. Through emerging technologies, disadvantaged countries can not only transmit information more precisely, but also rapidly expand their influence in international public opinion through targeted communication and emotional guidance. Later-developing countries can use advanced technologies (such as big data, artificial intelligence, 5G networks, etc.) to achieve precise information dissemination and create efficient communication channels. Taking “big data analysis” as an example, latecomer countries can gain an in-depth understanding of audience needs and public opinion trends, quickly identify the pulse of global public opinion, implement targeted communication, and quickly expand international influence. AI technology not only predicts the direction of public opinion development, but also optimizes communication strategies in real time. The popularization of 5G networks has greatly improved the speed and coverage of information dissemination, allowing latecomer countries to break through the limitations of traditional communication models in a low-cost and efficient manner and form unique communication advantages.

Through transnational cooperation, late-developing countries can integrate more communication resources and expand the breadth and depth of communication. For example, Argentina has established “Latin American News Network” with other Latin American countries to push Latin American countries to speak with a single voice in international public opinion and counter the single narrative of Western media through news content sharing. In Africa, South Africa has partnered with Huawei to promote the “Smart South Africa” project to build a modern information infrastructure and promote digital transformation and efficiency improvements in public services. Governments of late-developing countries should invest more in technological research and development and innovation, and encourage the development of local enterprises and talent. At the same time, attention should be paid to the export of culture and the construction of the media industry, so as to enhance the country’s voice in the international information space through globalized cooperation and decentralized communication models. Governments can fund digital cultural creations, support the growth of local social media platforms, and integrate more communication resources through an international cooperation framework.

(2) Construction of barriers in information countermeasures

Unlike a full-scale conflict that may be triggered by military action, or the risks that economic sanctions may pose, weaponized dissemination is able to achieve strategic objectives without triggering full-scale war, and it is extremely attractive based on cost and strategic considerations. Because weaponized communication is characterized by low cost and high returns, an increasing number of State and non-State actors have chosen to manipulate information in order to reach strategic objectives. The spread of this means of dissemination makes countries face even more complex and variable threats in the face of attacks involving information from outside and inside. With the increasing intensity of information warfare, mere traditional military defense can no longer meet the needs of modern warfare. Instead, building a robust information defense system becomes a key strategy for the country to maintain political stability, safeguard social identity, and enhance international competitiveness. Therefore, how to effectively deal with external interference in information and manipulation of public opinion, as well as counter-information, has become an urgent issue for all countries to address. A complete cybersecurity infrastructure is key to maintaining national security against the manipulation or tampering of sensitive information from outside. Take, for example, the European Union’s push to strengthen cybersecurity in member states through its “Digital Single Market” strategy, which requires internet companies to be more aggressive in dealing with disinformation and external interference. The EU’s cybersecurity directives also provide for member states to establish emergency response mechanisms to protect critical information infrastructure from cyberattacks. In addition, the EU has established cooperation with social platform companies, such as Facebook, Twitter and Google, to combat the spread of fake news by providing anti-disinformation tools and data analysis technologies. Artificial intelligence, big data, and automation technologies are becoming important tools for information defense, used to monitor information propagation paths in real time, identify potential disinformation, and resist public opinion manipulation. In the field of cybersecurity, big data analysis helps decision makers identify and warn against malicious attacks, and optimize countermeasures. The application of these technologies will not only enhance information defence capabilities at the domestic level, but also enhance national initiative and competitiveness in the international information space.

Counter-mechanisms are another important component of the information defence system, especially under pressure from international public opinion, where real-time monitoring of the spread of external information and timely correction of disinformation become key to safeguarding the initiative of public opinion. Since the 2014 Crimean crisis, Ukraine has built a rather large-scale cyber defense system through cooperation with NATO and the United States. Ukraine’s National Cyber Security Service has set up “information countermeasures teams” to counter cyberthreats, using social media and news release platforms to refute false Russian reports in real time, a tactic that has significantly boosted Ukraine’s reputation and trust in international public opinion.

(3) Agenda setting in public opinion guidance

In the global competitive landscape of informatization and digitalization, public opinion guidance involves not only the content of information dissemination, but more importantly, how to set the agenda and focus on hot topics of global concern. The agenda-setting theory suggests that whoever can take control of the topics of information circulation can guide the direction of public opinion. Agenda setting influences public attention and evaluation of events by controlling the scope and focus of discussion of topics, and the rise of social media provides a breakthrough for information-disadvantaged countries to compete for dominance in information dissemination through multi-platform linkage. In the case of Ukraine, for example, during the Russo-Ukrainian War, it disseminated the actual war situation through social media, not only publishing the actual combat situation, but also incorporating the emotional demands of the people, and using the tragic narrative of civilian encounters and urban destruction to inspire sympathy and attention from the international community. While resisting interference from external information, the State also needs to proactively disseminate positive narratives and tell cultural stories that can resonate with the international community. The story should correspond to the emotional needs of international public opinion, while at the same time showing the uniqueness of the country and strengthening the link with the international community. Taking my country’s “One Belt, One Road” co-construction as an example, in the “One Belt, One Road” co-construction country, my country has invested in and constructed a large number of infrastructure projects. These projects not only helped improve local economic basic conditions, but also demonstrated China’s globalization process. Responsibility provides a window for cultural cooperation and exchange activities, showing the rich history and culture of the Chinese nation to the world It has demonstrated the inclusiveness and responsibility of Chinese culture to the international community.

However, because countries of the Global South often face constraints in terms of resources, technology and international communication platforms, and have difficulty in competing directly with developed countries, they rely on more flexible and innovative means of communication to participate in the setting of the global agenda. For example, Brazil is under negative public opinion pressure from the Western media when it comes to dealing with issues of environmental protection and climate change, especially the deforestation of the Amazon forest. To this end, the Brazilian government actively creates the country’s image in the field of environmental protection by using social media to publish recent data and success stories about Amazon protection. At the same time, Brazil has strengthened its voice on climate issues by engaging with other developing countries in global climate change negotiations and promoting South-South cooperation. Large international events, humanitarian activities and the production of cultural products, among others, are also effective ways of telling national stories. International sports events such as the World Cup and the Olympic Games are not only a display platform for sports competitions, but also an exhibition venue for national image and cultural soft power. By hosting or actively participating in these global events, the country can show its strength, value and cultural charm to the world, promoting a positive public opinion agenda.

“War is nothing more than the continuation of politics through another means”[23]. This classic Clausewitz assertion is modernized in the context of weaponized communication. Weaponized communication breaks through the physical boundaries of traditional warfare and becomes a modern strategic means of integrating information warfare, cognitive warfare, and psychological warfare. It manipulates the flow of information and public perception in a non-violent form, so that State and non-State actors can achieve political goals without relying on direct military action, reflecting a highly strategic and targeted nature. By manipulating information, emotions and values, weaponized communication can achieve strategic goals while avoiding all-out war, and in global competition and conflict, it has become an important means of political suppression by powerful countries against weak ones.

The core of weaponized communication lies in weakening the enemy’s decision-making and operational capabilities through information manipulation, but its complexity makes the communication effect difficult to fully predict. Although information-powerful countries suppress information-weak countries through technological advantages and communication channels, the effectiveness of communication is uncertain. Especially in the context of the globalization of social media and digital platforms, the boundaries and effects of information flow are becoming increasingly difficult to control. This complexity offers the weak countries the opportunity to break through the hegemony of discourse and promote the reverse game of information dissemination. Weak countries can use these platforms to launch confrontations, challenge the information manipulation of powerful countries, and take their place in global public opinion. The asymmetric game reflects the dynamic balance of international public opinion, whereby communication is no longer one-way control, but more complex interaction and dialogue, giving the weak the possibility of influencing public opinion. The current international public opinion landscape is still dominated by the one-way suppression of information-weak countries by information-powerful countries, but this situation is not unbreakable. Information warfare has a high degree of asymmetry, and information-weak countries can counter it step by step with technological innovation, flexible strategies and transnational cooperation. By exerting “asymmetric advantages”, weak countries are not only able to influence global public opinion, but also to enhance their voice with the help of joint action and information-sharing. Transnational cooperation and the establishment of regional alliances provide the weak countries with a powerful tool to counter the powerful, enabling them to form a synergy in international public opinion and challenge the dominance of the information powers. Under the “war framework”, countries can flexibly adjust their strategies and proactively shape the information dissemination pattern, rather than passively accepting information manipulation by powerful countries.

Sociology of war emphasizes the role of social structure, cultural identity, and group behavior in warfare. Weaponized communication is not only a continuation of military or political behavior, but also profoundly affects the psychosocial, group emotions, and cultural identity. Powerful countries use information dissemination to shape other countries’ perceptions and attitudes in order to achieve their own strategic goals. However, from a sociological perspective, weaponized transmission is not a one-way suppression, but rather the product of complex social interactions and cultural responses. In this process, the information-weak countries are not completely vulnerable, but, on the contrary, they can counter external manipulation with “soft power” with the help of cultural communication, social mobilization and dynamic confrontation of global public opinion, shaping a new collective identity and demonstrating the legitimacy of “weak weapons”.

(Fund Project: Research results of the National Social Science Fund Major Project to Study and Interpret the Spirit of the Third Plenary Session of the 20th Central Committee of the Communist Party of China “Research on Promoting the Integrated Management of News Publicity and Online Public Opinion” (Project No.: 24ZDA084))

現代國語:

作者:

郭小安 康如诗来源:

  发布时间:

2025-05-06

【摘要】在國際輿論戰中,武器化傳播已滲透軍事、經濟、外交等領域,帶來“一切皆可武器化”的想像與實踐。武器化傳播通過技術、平台和政策操控公眾認知,體現了權力分配與文化博弈的複雜互動。在全球化和數字化的推動下,認知操控、社會分裂、情感極化、數字監控、信息殖民已成為影響國家穩定的新型手段,這不僅加劇了信息強國與弱國間的競爭,也為信息弱國提供了通過靈活策略和技術創新實現逆轉的機會。在全球非對稱傳播格局下,如何在技術創新與倫理責任、戰略目標與社會平衡間找到契合點和平衡點,將是影響未來國際輿論格局的關鍵要素。

【關鍵詞】輿論戰;武器化傳播;信息操縱;非對稱傳播;信息安全

如果說“宣傳是對現代世界的理性認可”[1],那麼武器化傳播則是對現代技術手段的理性應用。在輿論戰中,各參與主體通過不同傳播手段實現戰略目標,做到表面合理且隱蔽。與傳統軍事衝突不同,現代戰爭不僅涉及物理對抗,還涵蓋信息、經濟、心理及技術等多個領域的競爭。隨著技術進步和全球化的推動,戰爭形態發生深刻變化,傳統的物理對抗逐漸轉向多維度、多領域的綜合作戰。在這一過程中,武器化傳播作為一種現代戰爭形式,成為通過控制、引導和操縱輿論,影響敵對方或目標受眾的心理、情感與行為,進而實現政治、軍事或戰略目的的隱形暴力手段。 《戰爭論》認為,戰爭是讓敵人無力抵抗,且屈從於我們意志的一種暴力行為。 [2]在現代戰爭中,這一目標的實現不僅依賴於軍事力量的對抗,更需要信息、網絡與心理戰等非傳統領域的支持。第六代戰爭(Sixth Generation Warfare)預示戰爭形態的進一步轉變,強調人工智能、大數據、無人系統等新興技術的應用,以及信息、網絡、心理和認知領域的全面博弈。現代戰爭的“前線”已擴展到社交媒體、經濟制裁和網絡攻擊等層面,要求參與者俱備更強的信息控制與輿論引導能力。

當前,武器化傳播已滲透到軍事、經濟、外交等領域,帶來“一切皆可武器化”的憂慮。在戰爭社會學中,傳播被視為權力的延伸工具,信息戰爭深刻滲透並伴隨傳統戰爭。武器化傳播正是在信息控制的框架下,通過塑造公眾認知與情感,鞏固或削弱國家、政權或非國家行為者的權力。這一過程不僅發生在戰時,也在非戰斗狀態下影響著國家內外的權力關係。在國際政治傳播中,信息操控已成為大國博弈的關鍵工具,各國通過傳播虛假信息、發動網絡攻擊等手段,試圖影響全球輿論和國際決策。輿論戰不僅是信息傳播的手段,更涉及國家間權力博弈與外交關係的調整,直接影響國際社會的治理結構與權力格局。基於此,本文將深入探討武器化傳播的概念流變,分析其背後的社會心態,闡述具體的技術手段及所帶來的風險,並從國家層面提出多維應對策略。

一、從傳播武器化到武器化傳播:概念流變及隱喻

武器在人類歷史上一直是戰爭的象徵和工具,戰爭則是人類社會中最極端、暴力的衝突形式。因此,“被武器化”是指將某些工具用於戰爭中的對抗、操控或破壞,強調這些工具的使用方式。 “武器化”(weaponize)譯為“使得使用某些東西攻擊個人或團體成為可能”。 1957年,“武器化”一詞作為軍事術語被提出,V-2彈道導彈團隊的領導者沃納·馮·布勞恩表示,他的主要工作是“將軍方的彈道導彈技術‘武器化’”[3]。

“武器化”最早出現在太空領域,時值美蘇軍備競賽時期,兩個大國力圖爭奪外太空主導權。 “太空武器化”是指將太空用於發展、部署或使用軍事武器系統的過程,包括衛星、反衛星武器和導彈防禦系統等,目的是進行戰略、戰術或防禦性行動。 1959年至1962年,美蘇提出了一系列倡議,禁止將外太空用於軍事目的,尤其是禁止在外層空間軌道部署大規模毀滅性武器。 2018年,當時的美國總統特朗普簽署了《空間政策指令-3》,啟動“太空軍”建設,將太空視為與陸地、空中、海洋同等的重要作戰領域。 2019年,《中華人民共和國和俄羅斯聯邦關於加強當代全球戰略穩定的聯合聲明》中倡議“禁止在外空放置任何類型武器”[4]。

除太空領域的武器化外,軍事、經濟、外交等領域也顯現武器化趨勢。 “軍事武器化”是將資源(如無人機、核武器等)用於軍事目的、部署武器系統或發展軍事能力。 2022年俄烏戰爭期間,英國皇家聯合軍種研究所的報告顯示,烏克蘭每月因俄羅斯干擾站的影響,損失約10000架無人機。 [5]“武器化”也常出現在“金融戰爭”“外交戰場”等表述中。在經濟領域,武器化通常指國家或組織對全球金融系統中的共享資源或機制的利用;外交武器化則表現為國家通過經濟制裁、外交孤立、輿論操控等手段,追求自身利益並對他國施加壓力。隨著時間的推移,“武器化”概念逐漸擴展到政治、社會、文化等領域,尤其在信息領域,自2016年美國總統大選以來,輿論操縱已成為政治鬥爭的普遍工具。美國前中央情報局局長戴維·彼得雷烏斯曾在國家戰略研究所會議上表示,“萬物武器化”(the weaponization of everything)的時代已經來臨。 [6]

作為一種隱喻,“武器化”不僅指實際物理工具的使用,還像徵著對抗性和攻擊性行為的轉化,強調“武器”這一概念如何滲透至日常生活、文化生產和政治策略中,展現社會行動者如何利用各種工具達成戰略目的。時下,許多本應保持中立的領域,如媒體、法律和政府機構,常被描述為“武器化”,用以批判它們的過度政治化和被不正當利用,突出其非法性及對社會的負面影響。通過這一隱喻,人們無意識地將當前的政治環境與理想化的、看似更溫和的過去進行對比,使人們認為過去的政治氛圍更加理性和文明,而現今則顯得過於極端和對立。 [7]因此,“武器化”的實質是政治中介化的過程,是政治力量通過各種手段和渠道,影響或控製本應保持中立的領域,使其成為政治目的和政治鬥爭的工具。

在信息領域,傳播武器化是長期存在的一種戰略手段。第一、二次世界大戰期間,各國就廣泛使用了宣傳和輿論戰,傳播手段被作為一種心理戰術使用。武器化傳播是傳播武器化在現代信息社會中的體現,其利用算法和大數據分析精準地控制信息的傳播速度和範圍,進而操控輿論和情感,反映了技術、平台和策略的結合,使得政治力量可以更加精準和高效地操控公眾認知與輿論環境。信息作為輿論的本體,被“武器化”並用於影響社會認知和群體行為,“戰爭”的概念也隨之變化,不再只是傳統的軍事對抗,還包括通過信息傳播和輿論操控實現的心理戰和認知戰。這種轉變促生了一系列新術語,例如無限制戰爭(unrestricted warfare)、新一代戰爭(new generation warfare)、非對稱戰爭(asymmetric warfare)和非常規戰爭(irregular warfare)等。這些術語幾乎都藉用“戰爭”(warfare)強調信息領域中的多樣化衝突,信息成為被“武器化”的核心內容。

儘管有部分觀點認為“戰爭”一詞不適用於未正式宣布敵對行動的情況[8],但武器化傳播通過弱化戰爭的傳統政治屬性,將各領域的公開或隱蔽的力量和形式籠統地視作傳播行為,從而擴展了“戰爭”這一概念的外延。值得注意的是,在英文術語中“武器化”有兩種表述方式:一種是“weaponized noun(名詞)”,即表示某物已經“被武器化”,具備武器功能或用途;另一種是“weaponization of noun”,指將某物轉化為武器或具有武器性質的過程。在學術領域,儘管weaponized communication和weaponization of communication尚未嚴格區分,但中文翻譯有所區別。 “武器化傳播”更側重於傳播手段或信息本身“被武器化”,以實現某種戰略目標;“傳播武器化”則強調傳播過程本身作為武器的轉化過程。在討論具體技術手段時,多數學術論文采用weaponed或weaponizing作為前綴,以修飾具體的傳播手段。

本文重點討論的是國際輿論戰中的具體傳播策略,著重描述已經發生的武器化現象,故統一使用“武器化傳播”,其是一種利用傳播手段、技術工具和信息平台,通過精確操控信息流動、公眾認知與情感反應,達到特定軍事、政治或社會目的的策略性傳播方式。武器化傳播也並非單純的戰爭或戰時狀態,而是一種持續的傳播現象,它反映了各主體間的互動與博弈,是信息共享和意義空間的流動。

二、武器化傳播的應用場景及實施策略

如果說20世紀90年代末,信息領域的武器化仍是一個“死話題”,各國主要追逐導彈、無人機等實體武器的升級競賽,那麼步入21世紀,網絡戰爭則真正衝進了公眾視野,並深刻嵌入人們的日常生活,經由社交媒體和智能設備,公眾不可避免地捲入輿論戰爭,不自覺地成為參與者或傳播節點。隨著技術的普及,武器化手段逐漸從國家主導的戰爭工具擴展到社會化和政治化領域,對個人和社會的控制從顯性的國家機器轉向更隱蔽的觀念操控。棱鏡計劃(PRISM)的曝光引發了全球對隱私洩露的強烈擔憂,凸顯了國家利用先進技術進行監視和控制的潛力,這被視為一種新型的武器化。自2016年特朗普當選美國總統以來,社交機器人等信息武器的大規模應用,成為全球政治博弈中的常見現象。信息作戰——包括電子戰、計算機網絡作戰、心理戰和軍事欺騙——被廣泛用於操控信息流動,影響輿論格局。這些手段不僅在軍事戰爭和政治選舉中發揮作用,還逐漸滲透到文化衝突、社會運動及跨國博弈之中,傳統的信息作戰邏輯得以延續。如今,武器化傳播作為一種社會政治工具,深刻影響著輿論生態、國際關係以及個人的日常生活。

(一)軍事領域的信息操縱戰

信息流能夠直接影響軍事衝突的走向,塑造公眾和軍隊的認知與決策,進而影響士氣、戰略判斷和社會穩定。在現代戰爭中,信息不再是單純的輔助工具,信息領域已成為核心戰場。通過操控信息流向,敵方的形勢評估可能被誤導,戰鬥意志被削弱,民眾的信任與支持被動搖,進而影響戰爭的決策過程與持續性。

海灣戰爭(Gulf War)被視為現代信息戰的開端。在這場戰爭中,美國通過高科技手段——包括電子戰、空中打擊和信息操作——實施了對伊拉克的系統性打擊。美軍利用衛星和AWACS預警機實時監控戰場態勢,通過空投傳單和廣播電台向伊拉克士兵傳遞美軍優勢及投降後的優待政策,從心理層面誘使伊軍投降。這場戰爭標誌著信息控制在軍事衝突中的關鍵地位,展示了信息戰在現代戰爭中的潛力。進入21世紀,網絡戰成為信息戰的重要組成部分。網絡戰不僅涉及信息的傳播和操控,還包括通過攻擊關鍵基礎設施實現對敵方社會功能的控制。 2007年愛沙尼亞遭遇大規模DDoS(Distributed Denial of Service Attack)攻擊,展示了信息操縱與網絡攻擊融合的趨勢。 2017年在WannaCry勒索軟件事件中,攻擊者利用Windows系統漏洞(EternalBlue)加密全球150個國家約20萬台計算機文件,要求支付贖金,嚴重影響英國國家健康服務體系(NHS),導致急診服務中斷和醫院系統癱瘓,進一步揭示了網絡戰對關鍵基礎設施的威脅。此外,在長期衝突中,基礎設施控制因能夠直接決定信息傳播的速度、範圍和方向,被廣泛用於削弱對手的戰略能力,爭奪公共信息空間。以色列通過限制無線電頻譜使用、控制互聯網帶寬和破壞通信設施,有效削弱了巴勒斯坦的通信能力。同時,以色列還通過經濟制裁和法律框架限制巴勒斯坦電信市場的發展,壓制巴勒斯坦在信息流動中的競爭力,鞏固自身在衝突中的戰略優勢[9],以維持信息的不平等流動。

社交媒體為信息操縱提供了即時、廣泛的信息傳播渠道,使其能夠跨越國界,影響全球公眾情緒和政治局勢,也使戰爭焦點從單純的物理破壞轉向輿論操控。俄烏戰爭期間,深度偽造技術作為視覺武器,對公眾認知和戰爭輿論產生了顯著干擾。 2022年3月15日,烏克蘭總統澤連斯基的偽造視頻在Twitter上傳播,視頻中他“呼籲”烏克蘭士兵放下武器,引發了短時間內的輿論混亂。同樣,俄羅斯總統普京的偽造視頻也被用以混淆視聽。儘管這些視頻被平台迅速標註“Stay informed”(等待了解情況)的說明,但其在短時間內仍然對公眾情緒和認知造成明顯干擾。這些事件凸顯了社交媒體在現代信息戰中的關鍵作用,國家和非國家行為體可以通過虛假信息、情感操控等手段對軍事衝突施加干擾。

信息操縱戰的複雜性還體現在其雙重特性上——既是攻擊工具,也是防禦的手段。在軍事領域,各國通過防禦和反擊網絡攻擊來確保國家安全、保護關鍵基礎設施、維護軍事機密,並在某些情況下影響對手的戰鬥力與決策。 2015年和2017年,俄羅斯黑客發起了針對烏克蘭的大規模網絡攻擊(如BlackEnergy和NotPetya),烏克蘭通過迅速升級網絡防禦系統,成功抵禦部分攻擊並採取反制措施,避免了更大規模的基礎設施癱瘓。此外,北約戰略傳播卓越中心和英國第77旅等單位專注研究和平時期的輿論塑造[10],利用戰略傳播、心理戰和社交媒體監控等手段,擴大信息領域的戰略控制,並強化了防禦與輿論塑造能力,進一步提高了信息戰的戰略高度。

如今,信息操縱戰已經成為現代軍事衝突中的關鍵環節。通過信息技術與心理操控的高度結合,它不僅改變了傳統戰爭的規則,也深刻影響著公眾認知和全球安全格局。國家、跨國公司或其他行為體通過掌控關鍵基礎設施和社交媒體平台,限制信息流動、操控傳播路徑,從而在全球信息生態中獲得戰略優勢。

(二)政治選舉的輿論干預戰

政治選舉是民主政治中最直接的權力競爭場域,信息傳播在此過程中對選民決策具有重要影響。通過計算宣傳等手段,外部勢力或政治團體能夠操縱選民情緒、誤導公眾認知,從而左右選舉結果、破壞政治穩定或削弱民主進程,選舉因此成為武器化傳播最具效果的應用場景。

近年來,全球政治選舉呈現極化趨勢,持不同政治立場的群體之間存在巨大的意識形態差異。極化導致公眾選擇性接受與自身觀點一致的信息,同時排斥其他信息,這種“回音室效應”加劇了公眾對立場的片面認知,為輿論干預提供了更大的空間。而信息傳播技術,尤其是計算宣傳的興起,使外部勢力能夠更加精準地操控輿論和影響選民決策。計算宣傳(Computational Propaganda)指利用計算技術、算法和自動化系統操控信息流動,以傳播政治信息、干預選舉結果和影響輿論,其核心特徵在於算法驅動的精準性和自動化傳播的規模化,通過突破傳統人工傳播的限制,顯著增強了輿論操控的效果。 2016年美國總統選舉中,特朗普團隊通過劍橋分析公司分析Facebook用戶數據,為選民定向推送定制化的政治廣告,精準影響了選民的投票意向[11]。這一事件被視為計算宣傳干預選舉的典型案例,也為其他政客提供了操作模板,推動了計算宣傳在全球範圍內的廣泛應用。 2017年法國總統選舉中,候選人埃馬紐埃爾·馬克龍(Emmanuel Macron)團隊遭遇黑客攻擊,內部郵件被竊取並公開,內容稱馬克龍在海外擁有秘密賬戶並涉及逃稅,企圖抹黑其形象。 2018年巴西總統選舉期間,候選人雅伊爾·博索納羅(Jair Bolsonaro)團隊利用WhatsApp群組傳播煽動性政治內容,定向推送大量圖像、視頻和煽動性消息以影響選民情緒。據統計,自2017年至2019年,全球採用計算宣傳的國家由28個增加至70個,2020年這一數量上升至81個。這表明,計算宣傳正通過技術手段和傳播策略,重新定義全球選舉中的輿論規則。

計算宣傳也是國家行為者在輿論干預戰中的重要工具。 2011年,美國國防高級研究計劃局(DARPA)在中東地區開展“歐內斯特之聲”行動,通過建立和管理多個虛假身份(sockpuppets),扭曲阿拉伯語社交媒體的對話。俄羅斯也頻繁利用計算宣傳實施干預,在加拿大操作約20萬個社交媒體賬戶,借助極右翼和極左翼運動散佈親俄言論,製造虛假的社會熱點,試圖破壞加拿大對烏克蘭的支持[12]。作為計算宣傳的重要組成部分,社交機器人通過自動化和規模化手段製造輿論熱度,藉由特定標籤在社交平台上增加信息的曝光率,操控議題的優先級。 2016年美國大選期間,俄羅斯利用社交機器人發布支持普京和攻擊反對派的內容,通過信息過載(information overload)掩蓋反對派聲音,強化親普京的輿論氛圍。 [13]2017年海灣危機期間,沙特阿拉伯和埃及通過Twitter機器人製造反卡塔爾標籤#AlJazeeraInsultsKingSalman的熱度,使其成為熱門話題,虛構了反卡塔爾情緒的高峰,進而影響了全球範圍內對卡塔爾的輿論態度。 [14]深度偽造技術則進一步提升了計算宣傳的精準性與隱蔽性。 2024年,美國總統喬·拜登的偽造視頻在X(原Twitter)上迅速傳播,視頻顯示其在橢圓形辦公室使用攻擊性語言,引發輿論爭議並影響選民情緒。據網絡安全公司McAfee調查,63%的受訪者在兩個月內觀看過政治深度偽造視頻,近半數表示這些內容影響了他們的投票決定。 [15]

在全球範圍內,計算宣傳已滲透各國輿論戰中,影響著社會穩定與國家安全。以色列國防軍通過數字武器對巴勒斯坦展開輿論戰,土耳其培養了“愛國巨魔軍隊”操控國內外輿論,墨西哥政府利用殭屍網絡影響輿論。作為現代輿論干預戰的重要手段,計算宣傳正在改變全球政治傳播的格局。隨著人工智能、量子計算等技術的發展,計算宣傳還可能通過更隱蔽和高效的方式乾預選舉流程,甚至直接威脅民主制度的核心運行邏輯。

(三)文化領域的符號認同戰

武器化傳播通過操控信息、符號和價值觀,試圖影響公眾的思想、情感和行為,進而塑造或改變社會的集體認知與文化認同。這種傳播方式不僅在於信息的傳遞,更通過特定的敘事框架、文化符號和情感共鳴,推動某種特定的意識形態或政治理念的傳播與認同。通過操縱文化符號、社會情感和集體記憶,武器化傳播在文化領域干擾社會結構與文化認同,成為符號認同戰的核心手段。

模因(Meme)作為一種集視覺元素和簡潔文字於一體的文化符號,以幽默、諷刺或挑釁的方式激發觀眾的情感反應,影響他們的政治態度和行為。佩佩模因(Pepe the Frog)起初是一個無害的漫畫角色,被極右翼群體重新利用並武器化,用以傳播仇恨言論,逐漸演變為種族主義和反移民的象徵。模因將復雜的政治情緒轉化為便於傳播的視覺符號,迅速激起公眾對政策的不信任和憤怒,被視為“武器化的偶像破壞主義”(Iconoclastic Weaponization)。這一過程通過操控文化符號,以達到政治或社會鬥爭的目的[16],加劇了公眾對社會和政治的分裂。例如,在英國脫歐期間,帶有“Take Back Control”(奪回控制權)字樣的模因迅速傳播,強化了民族主義情緒。

除了文化符號的製造外,符號的篩选和屏蔽同樣能夠塑造或加深某種文化認同或政治立場。審查制度自古以來就是權力控制信息的重要手段,早在古希臘和古羅馬時期,政府就對公共演講和文學作品進行審查,以維持社會秩序和權力穩定。進入數字時代,互聯網和社交媒體的興起推動了審查制度的現代化,平台審查逐漸取代傳統的審查方式,成為當代信息控制和輿論引導的核心工具。算法審查通過人工智能檢測敏感話題、關鍵詞和用戶行為數據,自動刪除或屏蔽被視為“違規”的內容,社交媒體的審核團隊會對用戶生成的內容進行人工篩選,確保其符合平台政策和法律法規。平台審查的作用不僅是限制某些內容的傳播,更是通過推送、刪除和屏蔽等方式引導輿論,塑造公眾認知框架。儘管主流社交平台通過嚴格的內容審核機制控制信息傳播,但一些邊緣平台,如Gab、Gettr、Bitchute等因缺乏有效審查,成為極端言論和惡意信息的溫床。這些平台未對內容髮布做出足夠限制,極端觀點和虛假信息得以肆意擴散,例如,Gab因極端主義內容屢遭批評,被指助長暴力和仇恨。在迴聲室中,用戶只能接觸與自身觀點一致的信息,這種信息環境更強化了極端思想,導致社會群體間的對立加劇。 [17]

語言作為信息傳播的載體和工具,能夠通過情感操控、符號政治和社會動員等方式,深刻影響群體行為和文化認同。語言武器化聚焦於語言形式和文化語境如何影響信息的接收方式,強調語言如何被用來操控、引導或改變人們的認知與行為。這不僅涉及特定詞彙和修辭手法的使用,更包括通過語言表述建構特定的社會意義和文化框架。作為符號認同戰的另一重要工具,語言塑造了“敵我對立”的敘事框架。大翻譯運動(Great Translation Movement)通過選擇性翻譯中國網民的民族主義言論,將其傳播到國際社交媒體平台,引發了對中國的負面認知。這種語言操控通過情緒化表達放大了爭議性內容,加深了國際社會的文化偏見。

語言武器化的深層邏輯在於情緒化和煽動性的語言形式。西方國家常以“人權”與“民主”等正義化標籤為乾預行為辯護,合法化政治或軍事行動。白人至上主義者使用“另類右翼”等模糊標籤重塑意識形態,將傳統的帶有強烈負面含義的“白人至上主義”轉化為一個較為中立的概念,降低了該詞彙的社會抵抗力,用寬泛的“傘式”身份擴大其支持者的基礎。通過對世俗話語的滲透,仇恨政治和極端言論被正當化,逐漸形成一種政治常態。當公眾將這種政治日常化後,語言實現了真正的武器化。 [18]在尼日利亞,煽動仇恨的內容通過種族、宗教和地區話題擴散,深刻惡化了社會關係。 [19]語言的模糊性和合理否認策略也成為傳播者規避責任的有力工具,在被簡化的敘事中傳播複雜的社會和政治議題。特朗普的美國優先(America First)政策通過否定性標籤和情緒化話語,以反對全球化、質疑氣候變化科學、抨擊傳統盟友等方式,故意提出與主流意見相對立的觀點,激發公眾對全球化的不信任,重塑國家利益優先的文化認同。 [20]

三、武器化傳播的風險與挑戰:正當性與破壞性

儘管武器化傳播給國際輿論格局帶來了巨大風險,但特定情形下,其可能會被某些國家或團體通過法律、政治或道德框架賦予一定的正當性。如“9·11”事件後,美國通過《愛國法案》擴大了情報部門的監控權限,以“反恐”為名實施廣泛的信息控制,這種“正當性”常被批評為破壞公民自由,侵蝕了民主社會的核心價值。

在國際政治博弈中,武器化傳播更常被視為“灰色區域”(Gray Zone)的手段。國家間的對抗不再局限於經濟制裁或外交壓力,而是通過信息操控、社交媒體干預等非傳統方式展開。部分國家以“保護國家利益”為藉口傳播虛假信息,辯稱其行為是合規的,儘管這些行為可能在國際法上存在爭議,但往往被合理化為“反制外部威脅”的必要手段。在一些信息監管缺乏嚴格法律框架的國家,選舉的干預行為往往被容忍,甚至被視為一種“正當”的政治活動。在文化層面,某些國家通過傳播特定的文化符號和意識形態,試圖在全球範圍內塑造自身的文化影響力。西方國家常以“文化共享”和“文明傳播”為名,推動其價值觀的傳播,而在實際操作中,卻通過操控文化符號和敘事框架,削弱其他文化的認同感,導致全球文化生態的不平衡。法律框架也在一定程度上為武器化傳播的正當性提供了支持。一些國家以“反恐”和“反對極端主義”為名,通過信息審查、內容過濾等手段限制所謂“有害信息”的傳播。然而,這種正當性往往突破了道德邊界,導致信息封鎖和言論壓制。以“國家安全”為理由的信息治理,雖然在一定程度上獲得了內部認可,卻為武器化傳播的氾濫提供了空間。

相較於正當性,武器化傳播的破壞性尤為顯著。目前,武器化傳播已成為權力結構操控輿論的重要工具,其不僅扭曲了信息內容,還通過隱私侵犯、情感動員和文化滲透等方式,深刻影響了公眾認知、社會情緒以及國際關係。

(一)信息失真與認知操控

信息失真指信息在傳播過程中被故意或無意扭曲,導致公眾接收到的內容與原始信息存在顯著差異。在社交媒體上,虛假信息和誤導性內容的傳播日益猖獗,人工智能模型(如GPT)的生成內容,可能因訓練數據的偏見而加劇這一問題。性別、種族或社會偏見可能被反映在自動生成的文本中,放大信息失真的風險。社交媒體的快速傳播特性也使傳統的事實核查機制難以跟上虛假信息的擴散速度。虛假信息在短時間內往往佔據輿論主導地位,跨平台傳播和匿名性使得澄清與糾正變得更加複雜。傳播的不對稱性削弱了傳統新聞機構的權威性,公眾更傾向於相信即時更新的社交平台信息,而非傳統新聞機構的深入報導,這進一步削弱了新聞機構在抵制虛假信息中的作用。

除了信息本身的失真,武器化傳播還深刻利用了認知失調的心理機制。認知失調指個體接觸到與其已有信念或態度相衝突的信息時產生的心理不適感。傳播者通過製造認知失調,動搖目標受眾的既有態度,甚至誘導其接受新的意識形態。在政治選舉中,定向傳播負面信息常迫使選民重新審視政治立場,甚至改變投票傾向。武器化傳播通過選擇性暴露進一步加劇了“信息繭房”的形成,讓受眾傾向於接觸與自身信念一致的信息,忽視或排斥相反觀點。這不僅強化了個體的認知偏見,也讓虛假信息在群體內部快速擴散,難以被外界的事實和理性聲音打破,最終形成高度同質化的輿論生態。

(二)隱私洩露與數字監控

近年來,深度偽造技術的濫用加劇了隱私侵權問題。 2019年,“ZAO”換臉軟件因默認用戶同意肖像權而被下架,揭示了生物特徵數據的過度採集風險。用戶上傳的照片經深度學習處理後,既可能生成精確的換臉視頻,也可能成為隱私洩露的源頭。更嚴重的是,深度偽造等技術被濫用於性別暴力,多名歐美女演員的面孔被非法植入虛假性視頻並廣泛傳播,儘管平台在部分情況下會刪除這些內容,但開源程序的普及讓惡意用戶能夠輕鬆複製和分享偽造內容。此外,用戶在使用社交媒體時,往往默認授權平台訪問其設備的照片、相機、麥克風等應用權限。通過這些權限,平台不僅收集了大量個人數據,還能夠通過算法分析用戶的行為特徵、興趣偏好和社交關係,進而精準投放廣告、內容推薦甚至實施信息操控。這種大規模數據採集推動了對隱私保護的全球討論。在歐洲,《通用數據保護條例》(General Data Protection Regulation)試圖通過嚴格的數據收集和使用規定,加強個人隱私權保障。然而,由於“隱性同意”或複雜的用戶協議,平台常常繞過相關規定,使數據處理過程缺乏透明度,導致普通用戶難以了解數據的實際用途。美國《通信規範法》第230條規定,網絡平台無需為用戶生成的內容承擔法律責任,這一規定推動了平台內容審核的發展,但也使其在應對隱私侵權時缺乏動力。平台出於商業利益的考慮,往往滯後處理虛假信息和隱私問題,導致審核責任被持續擱置。

在數字監控方面,社交平台與政府的合作使用戶數據成為“監控資本主義”的核心資源。美國國家安全局(NSA)通過電話記錄、互聯網通信和社交媒體數據,實施大規模監控,並與Google、Facebook等大型企業合作,獲取用戶的在線行為數據,用於全球範圍內的情報收集和行為分析。跨國監控技術的濫用更是將隱私侵犯推向國際層面。以色列網絡安全公司NSO開發的Pegasus間諜軟件,通過“零點擊攻擊”入侵目標設備,可實時竊取私人信息和通信記錄。 2018年,沙特記者賈馬爾·卡舒吉(Jamal Khashoggi)被謀殺一案中,沙特政府通過Pegasus監聽其通信,揭示了這種技術對個體隱私和國際政治的深遠威脅。

(三)情感極化與社會分裂

情感在影響個體認知與決策中起著關鍵作用。武器化傳播通過煽動恐懼、憤怒、同情等情緒,影響理性判斷,推動公眾在情緒驅動下做出非理性反應。戰爭、暴力和民族主義常成為情感動員的主要內容,傳播者通過精心設計的議題,將愛國主義、宗教信仰等元素植入信息傳播,迅速引發公眾情感共鳴。數字技術的廣泛應用,特別是人工智能和社交媒體平台的結合,進一步放大了情感極化的風險。虛假信息與極端言論在平台上的快速傳播,不僅來自普通用戶的分享行為,更受到算法的驅動。平台傾向優先推送情緒化和互動性高的內容,這些內容常包含煽動性語言和極端觀點,從而加劇了仇恨言論和偏激觀點的傳播。

社交媒體標籤和算法推薦在情感極化中扮演著關鍵角色。在查理周刊事件後,#StopIslam標籤成為仇恨言論的傳播工具,用戶借助該標籤發布仇視和暴力傾向的信息。在美國2020年總統選舉期間,社交平台上的極端政治言論和錯誤信息也在激烈的黨派鬥爭中被放大。通過精確的情感操控,武器化傳播不僅撕裂了公共對話,還極大影響了社會的民主進程。另一種特殊的極端主義動員策略是“武器化自閉症”(Weaponized Autism),即極右翼團體利用自閉症個體的技術專長,實施情感操控。這些團體招募技術能力較強但有社交障礙的個體,通過賦予虛假的歸屬感,將其轉化為信息戰的執行者。這些個體在極端組織的指引下,被用於傳播仇恨言論、執行網絡攻擊和推動極端主義。這種現像不僅揭示了情感操控的深層機制,也表明技術如何被極端團體利用來服務於更大的政治和社會議程。 [21]

(四)信息殖民與文化滲透

“武器化相互依賴”理論(Weaponized Interdependence Theory)揭示了國家如何利用政治、經濟和信息網絡中的關鍵節點,對其他國家施加壓力。 [22]特別是在信息領域,發達國家通過控制信息流實施“信息殖民”,進一步鞏固其文化和政治優勢。數字平台成為這一殖民過程的載體,全球南方國家在信息傳播中高度依賴西方主導的技術平台和社交網絡,在撒哈拉以南非洲地區,Facebook已成為“互聯網”的代名詞。這種依賴不僅為西方企業帶來了巨大的廣告收入,還通過算法推薦對非洲本土文化和價值觀,尤其是在性別、家庭和宗教信仰等方面,產生了深遠影響,使文化滲透成為常態。

數字不平等是信息殖民的另一表現。發達國家在數字技術和信息資源上的主導地位,使南方國家在經濟、教育和文化領域日益邊緣化。巴勒斯坦因基礎設施不足和技術封鎖,難以有效融入全球數字經濟,既限制了本地經濟發展,又進一步削弱了其在全球信息傳播中的話語權。全球主要經濟體和信息強國通過技術封鎖和經濟制裁,限制他國獲取關鍵技術與創新資源,這不僅阻礙了目標國的科技發展,也加劇了全球技術與創新生態的斷裂。自2018年退出《伊朗核協議》以來,美國對伊朗的經濟制裁導致其在半導體和5G領域發展受阻,技術與創新的不對稱拉大了全球技術生態的差距,使許多國家在信息競爭中處於劣勢。

四、反思與討論:非對稱傳播格局中的話語權爭奪

在國際非對稱傳播(Asymmetric Communication)競爭格局下,強勢方常常通過主流媒體和國際新聞機構等渠道佔據輿論的主導地位,而弱勢方則需要藉助創新傳播技術和手段來彌補劣勢,爭奪話語權。這一傳播格局的核心在於信息地緣政治(Information Geopolitics),即國家之間的權力較量不僅僅取決於地理位置、軍事力量或經濟資源,更取決於對信息、數據和技術的控制。大國間的博弈已不再僅限於物理空間的控制,而擴展至輿論空間的爭奪。這些“信息景觀”涉及全球傳播生態中的話語權、信息流通和媒體影響力等,在這一過程中,國家通過不斷製造景觀,以影響國際輿論、塑造全球認知框架,進而實現其戰略目標。非對稱傳播的策略不僅關乎信息內容的傳遞,更重要的是如何借助各種傳播技術、平台和手段彌補資源與能力上的差距,信息傳播的核心不再局限於內容本身,而圍繞著話語權的爭奪展開。隨著信息戰和認知戰的興起,誰掌握了信息,誰就能在全球競爭中占得先機。

(一)後發優勢下的技術赶超

傳統的大國或強勢傳播者掌控著全球輿論的主導權,相比之下,弱勢國家往往缺乏與這些大國抗衡的傳播渠道。後發優勢理論主張後發國家能夠通過跳躍式發展,繞過傳統的技術路徑,引進現有的先進技術和知識,從而迅速崛起並規避早期技術創新中的低效和過時環節。在武器化傳播的背景下,這一理論為信息弱國提供了通過新興科技突破大國傳播壁壘的路徑,有助於其在技術層面上實現赶超。傳統媒體往往受到資源、影響力和審查機制的限制,信息傳播速度慢、覆蓋面有限,且容易受到特定國家或集團的操控。數字媒體的崛起使信息傳播的格局發生了根本性變化,弱勢國家能夠借助全球化的互聯網平台,直接面向國際受眾,而不必依賴傳統的新聞機構和主流媒體。通過新興技術,弱勢國家不僅能更精準地傳遞信息,還能通過定向傳播和情感引導,迅速擴大其在國際輿論中的影響力。後發國家可以利用先進技術(如大數據、人工智能、5G網絡等)實現精準的信息傳播,打造高效的傳播渠道。以大數據分析為例,後發國家可以深入了解受眾需求和輿情趨勢,快速識別全球輿論脈搏,實施定向傳播,快速擴大國際影響力。人工智能技術不僅能夠預測輿論發展方向,還能實時優化傳播策略。 5G網絡的普及大大提升了信息傳播的速度與覆蓋範圍,使後發國家能夠以低成本、高效率的方式突破傳統傳播模式的局限,形成獨特的傳播優勢。

通過跨國合作,後發國家可以整合更多的傳播資源,擴大傳播的廣度與深度。例如,阿根廷與拉美其他國家共同建立了“拉美新聞網絡”,通過新聞內容共享,推動拉美國家在國際輿論中發出統一的聲音,反擊西方媒體的單一敘事。在非洲,南非與華為合作推動“智慧南非”項目,建設現代化信息基礎設施,促進數字化轉型和公共服務效率的提升。後發國家政府應加大對技術研發和創新的投入,鼓勵本土企業和人才的發展。同時,還應注重文化輸出和媒體產業建設,通過全球化合作和去中心化傳播模式提升國家在國際信息空間中的話語權。政府可以資助數字文化創作,支持本地社交媒體平台的成長,並通過國際合作框架整合更多傳播資源。

(二)信息反制中的壁壘構建

與軍事行動可能引發的全面衝突,或經濟制裁可能帶來的風險不同,武器化傳播能夠在不觸發全面戰爭的情況下實現戰略目標,基於成本和戰略考量,其具有極大的吸引力。由於武器化傳播具備低成本、高回報的特點,越來越多的國家和非國家行為體選擇通過操控信息來達到戰略目標。這種傳播手段的普及,使得國家在面對來自外部和內部的信息攻擊時,面臨更加複雜和多變的威脅。隨著信息戰爭的日益激烈,單純的傳統軍事防禦已經無法滿足現代戰爭的需求。相反,構建強有力的信息防禦體系,成為國家保持政治穩定、維護社會認同和提升國際競爭力的關鍵策略。因此,如何有效應對外部信息干擾和輿論操控,並進行信息反制,已成為各國迫切需要解決的問題。完善的網絡安全基礎設施是維護國家安全的關鍵,用以防范敏感信息不被外部操控或篡改。以歐盟為例,歐盟通過“數字單一市場”戰略推動成員國加強網絡安全建設,要求互聯網公司更積極地應對虛假信息和外部干預。歐盟的網絡安全指令還規定各成員國建立應急響應機制,保護重要信息基礎設施免受網絡攻擊。此外,歐盟還與社交平台公司,如Facebook、Twitter和Google等建立合作,通過提供反虛假信息工具和數據分析技術來打擊假新聞傳播。人工智能、大數據和自動化技術正在成為信息防禦的重要工具,被用以實時監控信息傳播路徑,識別潛在的虛假信息和抵禦輿論操控。在網絡安全領域,大數據分析幫助決策者識別和預警惡意攻擊,並優化反制策略。這些技術的應用不僅能夠在國內層面增強信息防禦能力,還能提高國家在國際信息空間中的主動性和競爭力。

反制機制是信息防禦體系的另一重要組成部分,尤其是在國際輿論壓力下,實時監控外部信息傳播並及時糾正虛假信息成為維護輿論主動權的關鍵。烏克蘭自2014年克里米亞危機以來,通過與北約和美國合作,建立了頗具規模的網絡防禦體系。烏克蘭的國家網絡安全局為應對網絡威脅設立了“信息反制小組”,利用社交媒體和新聞發布平台實時駁斥俄羅斯的虛假報導,這一策略顯著提升了烏克蘭在國際輿論中的聲譽和信任度。

(三)輿論引導中的議程設置

在信息化和數字化的全球競爭格局中,輿論引導不僅涉及信息傳播內容,更關鍵的是如何設置議程並聚焦全球關注的熱點話題。議程設置理論表明,誰能掌控信息流通的議題,誰就能引導輿論的方向。議程設置通過控制話題的討論範圍和焦點,影響公眾對事件的關注與評價,社交媒體的興起為信息弱勢國提供了突破口,使其可以通過多平台聯動來爭奪信息傳播的主導權。以烏克蘭為例,其在俄烏戰爭中通過社交媒體傳播戰爭實況,不僅發布戰鬥實況,還融入民眾的情感訴求,借助平民遭遇和城市破壞的悲情敘事,激發國際社會的同情與關注。在抵禦外部信息干擾的同時,國家還需要主動傳播正面敘事,講述能夠引發國際社會共鳴的文化故事。故事應該符合國際輿論的情感需求,同時展現國家的獨特性,強化與國際社會的聯繫。以我國的“一帶一路”共建為例,在“一帶一路”共建國家,我國投資建設了大量基礎設施項目,這些項目不僅幫助改善了當地的經濟基礎條件,也展示了中國在全球化進程中的責任擔當,更為文化合作和交流活動提供了窗口,向世界展示了中華民族豐富的歷史文化,為國際社會展現了中華文化的包容性和責任感。

但由於全球南方國家往往面臨資源、技術與國際傳播平台的限制,難以直接與發達國家競爭,因此它們依賴更加靈活、創新的傳播手段來參與全球議程的設置。例如,巴西在應對環保和氣候變化議題上,尤其是亞馬遜森林的砍伐問題,面臨來自西方媒體的負面輿論壓力。為此,巴西政府利用社交媒體發布關於亞馬遜保護的最新數據和成功案例,積極塑造國家在環境保護領域的形象。同時,巴西通過與其他發展中國家合作,參與全球氣候變化談判,推動南南合作,增強了在氣候問題上的話語權。大型國際事件、人道主義活動和製作文化產品等,也是講述國家故事的有效方式。國際體育賽事如世界杯、奧運會等,不僅是體育競技的展示平台,更是國家形象和文化軟實力的展現場所,通過承辦或積極參與這些全球性事件,國家能夠向世界展示其實力、價值和文化魅力,推動積極的輿論議程。

“戰爭無非是政治通過另一種手段的延續”[23]。這一克勞塞維茨的經典論斷在武器化傳播的語境下得到了現代化的詮釋。武器化傳播突破了傳統戰爭的物理邊界,成為一種融合信息戰、認知戰和心理戰的現代戰略手段。它以非暴力的形式操控信息流向和公眾認知,使國家和非國家行為者無須依賴直接軍事行動即可實現政治目標,體現出極強的戰略性和目標性。通過操控信息、情緒和價值觀,武器化傳播能夠在避免全面戰爭的同時達成戰略目的,在全球競爭和衝突中,已成為強國對弱國進行政治壓制的重要手段。

武器化傳播的核心在於通過信息操控削弱敵方的決策力與行動能力,但其複雜性使得傳播效果難以完全預測。儘管信息強國通過技術優勢和傳播渠道壓制信息弱國,傳播效果卻充滿不確定性。尤其是在社交媒體和數字平台全球化的背景下,信息流動的邊界和效果愈加難以控制。這種複雜性為弱國提供了突破話語霸權的機會,推動信息傳播的反向博弈。弱國可以利用這些平台發起對抗,挑戰強國的信息操控,在全球輿論中佔據一席之地。非對稱性博弈反映了國際輿論的動態平衡,傳播不再是單向的控制,而是更為複雜的交互和對話,賦予弱者影響輿論的可能性。當前國際輿論格局仍以信息強國對信息弱國的單向壓制為主,但這一局面並非不可打破。信息戰爭具有高度的不對稱性,信息弱國可以憑藉技術創新、靈活策略和跨國合作逐步反制。通過發揮“非對稱優勢”,弱國不僅能夠影響全球輿論,還能藉助聯合行動和信息共享提升話語權。跨國合作與地區聯盟的建立,為弱國提供了反制強國的有力工具,使其能夠在國際輿論上形成合力,挑戰信息強國的主導地位。在戰爭框架下,各國可以靈活調整策略,主動塑造信息傳播格局,而非被動接受強國的信息操控。

戰爭社會學強調社會結構、文化認同和群體行為在戰爭中的作用。武器化傳播不僅是軍事或政治行為的延續,更深刻影響社會心理、群體情感和文化認同。強國利用信息傳播塑造他國的認知與態度,以實現自己的戰略目標。然而,從社會學視角來看,武器化傳播並非單向的壓制,而是複雜的社會互動和文化反應的產物。在這一過程中,信息弱國並非完全處於弱勢,相反,它們可以藉助文化傳播、社會動員和全球輿論的動態對抗,以“軟實力”反擊外部操控,塑造新的集體認同,展示“弱者武器”的正當性。

(基金項目:研究闡釋黨的二十屆三中全會精神國家社科基金重大專項“推進新聞宣傳和網絡輿論一體化管理研究”(項目編號:24ZDA084)的研究成果)

References:

[1] Lasswell H D Propaganda techniques in the world wars [M] Beijing: Renmin University Press, 2003

[2] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978.

[3]Herrman J. If everything can be ‘weaponized,’ what should we fear? [EB/OL]. (2017-03-14)[2024-12-20].https://www.nytimes.com/2017/03/14/magazine/if-everything-can-be-weaponized-what-should-we-fear.html.

[4] Ministry of Foreign Affairs of the People’s Republic of China Joint statement by the People’s Republic of China and the Russian Federation on strengthening contemporary global strategic stability (full text) [EB/OL].https://www.mfa.gov.cn/web/ziliao_674904/1179_674909/201906/t20190606_7947892.shtml.

[5]Mazarr M J, Casey A, Demus A, et al. Hostile social manipulation: present realities and emerging trends[M]. Santa Monica, CA USA: Rand Corporation, 2019.

[6]Bob Y J. Ex-CIA director Petraeus: Everything can be hijacked, weaponized[EB/OL].(2018-01-30)[2024-12-20].https://www.jpost.com/israel-news/ex-cia-director-petraeus-everything-can-be-hijacked-weaponized-540235.

[7]Mattson G. Weaponization: Metaphorical Ubiquity and the Contemporary Rejection of Politics[EB/OL].OSF(2019-01-08)[2024-12-20].osf.io/5efrw.

[8]Robinson L, Helmus T C, Cohen R S, et al. Modern political warfare[J]. Current practises and possible responses, 2018.

[9]Kreitem H M. Weaponization of Access, Communication Inequalities as a Form of Control: Case of Israel/Palestine[J]. Digital Inequalities in the Global South, 2020: 137-157.

[10]Laity M. The birth and coming of age of NATO StratCom: a personal history[J]. Defence Strategic Communications, 2021, 10(10): 21-70.

[11]Confessore N. Cambridge Analytica and Facebook: The scandal and the fallout so far[J]. The New York Times, 2018(4).

[12]McQuinn B, Kolga M, Buntain C, et al. Russia Weaponization of Canada’s far Right and far Left to Undermine Support for Ukraine[J]. International Journal,(Toronto,Ont),2024,79(2):297-311.

[13]Stukal D, Sanovich S, Bonneau R, et al. Why botter: how pro-government bots fight opposition in Russia[J]. American political science review, 2022, 116(3): 843-857.

[14]Jones M O. The gulf information war| propaganda, fake news, and fake trends: The weaponization of twitter bots in the gulf crisis[J]. International journal of communication13(2019):27.

[15]Genovese D. Nearly 50% of voters said deepfakes had some influence on election decision. [EB/OL].(2024-10-30)[2024-12-20].https://www.foxbusiness.com/politics/nearly-50-voters-said-deepfakes-had-some-influence-election-decision.

[16]Peters C, Allan S. Weaponizing memes: The journalistic mediation of visual politicization[J]. Digital Journalism, 2022, 10(02):217-229.

[17]Gorissen S. Weathering and weaponizing the# TwitterPurge: digital content moderation and the dimensions of deplatforming[J]. Communication and Democracy, 2024, 58(01): 1-26.

[18]Pascale C M. The weaponization of language: Discourses of rising right-wing authoritarianism[J]. Current Sociology, 2019, 67(06): 898-917.

[19]Ridwa1ah A O, Sule S Y, Usman B, et al. Politicization of Hate and Weaponization of Twitter/X in a Polarized Digital Space in Nigeria[J]. Journal of Asian and African Studies, 2024.

[20]Mercieca J R. Dangerous demagogues and weaponized communication[J]. Rhetoric Society Quarterly, 2019, 49(03): 264-279.

[21]Welch C, Senman L, Loftin R, et al. Understanding the use of the term “Weaponized autism” in an alt-right social media platform[J]. Journal of Autism and Developmental Disorders, 2023, 53(10): 4035-4046.

[22]Farrell H, Newman A L. Weaponized interdependence: How global economic networks shape state coercion[J]. International security,2019,44(01):42-79.

[23] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978

作者簡介:郭小安,重慶大學新聞學院教授、博士生導師,重慶市哲學社會科學智能傳播與城市國際推廣重點實驗室執行主任(重慶 400044);康如詩,重慶大學新聞學院碩士生(重慶 400044)。

中國原創軍事資源:https://www.cjwk.cn/journal/guidelinesDetails/192031322246497484888

Implementation of the “Outline of Joint Cooperation” Within the People’s Liberation Army of China

中國人民解放軍內部實施《聯合合作綱要》

現代英語:

With the approval of Xi Jinping, Chairman of the Central Military Commission, the Central Military Commission issued the “Outline of Joint Cooperation between the People’s Liberation Army of China (Trial Implementation)”, which will come into effect on November 7, 2020.

The Outline focuses on building a legal system for joint operations and strengthening the clear orientation of preparing for war. It is of great significance to consolidate and deepen the results of the reform of the leadership and command system, scale structure and force composition, and to promote the liberation and development of our military’s joint operations capabilities.

The Outline is the top-level regulation of our military’s new-era combat doctrine system. It focuses on clarifying the basic issues of joint combat organization and implementation, unifying combat thinking, clarifying responsibilities and procedures, and guiding combat operations. It also clarifies major principles, requirements, and basic procedures for joint combat command, combat operations, combat support, national defense mobilization, and political work.

The Central Military Commission requires that all levels should earnestly study and implement the “Outline”, adhere to combat effectiveness as the only fundamental standard, use the “Outline” as the basic basis for organizing and implementing joint operations and joint training, and comprehensively improve the ability to win in the new era.

The battle flag hunt, the military parade ground was full of ups and downs, and the climaxes continued——

From north to south, the surging iron torrents train elite soldiers; in the deep blue ocean, soldiers step on the waves to forge sharp swords; above the vast sky, eagles fly thousands of miles towards the blue sky; deep in the dense forests, the east wind roars to the sky; the skynet controls power, and the invisible war defeats the visible… One after another joint combat exercises are gradually unfolding in multiple domains and all dimensions, presenting a picture of a strong army that trains together to plan for war, uses training to promote war, and wins war through strong training, sounding the strong note of a new era in the history of our army’s training and preparation.

Over the past year, the world has been undergoing unprecedented changes unseen in a century, intertwined with the global COVID-19 pandemic. Under the sky shrouded by the epidemic, the international situation has been in constant turmoil and confrontation. The drone warfare that has shined in the Nagorno-Karabakh conflict has shown the world the unique characteristics of modern warfare.

“When times change, things change. When things change, we must be prepared for change.” In the future, “what kind of war to fight and how to fight it” carries the heavy mission, and the entire military is surging with enthusiasm for researching and winning wars.

Faced with new changes in the national security situation, new threats from powerful enemies and adversaries, and new developments in the form of warfare, we urgently need to provide answers to strengthening the military, winning battles, and meeting the needs of the times.

“Overall, modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are regularities behind them. The fundamental thing is that the winning mechanism of war has changed.” Faced with the rapid development of the new world military revolution and changes in the war situation, under the guidance of the commander-in-chief and in accordance with the unified deployment of the CMC’s policy and system reforms, the CMC Joint Staff Department organized experts from the Academy of Military Sciences and capable personnel from relevant departments of the CMC, various theater commands, various military services and armed police forces to form a joint research group to pool wisdom and strength to tackle key problems and advance the formulation of new-era combat regulations.

On November 7, 2020, the “Outline of the Joint Cooperation Warfare of the People’s Liberation Army of China (Trial Implementation)” was implemented throughout the army, marking a new coordinate system for our army’s joint cooperation war in the new era.

Since the issuance of the Outline, commanders have taken the lead in learning it, agencies have taken the lead in studying it, and troops have practiced learning it. The officers and soldiers of the whole army have been enthusiastic about learning and publicizing the Outline. A great discussion on joint operations in the new era, a great liberation of thoughts, and a great practice of preparation for war have been vigorously carried out in the whole army.

Pointing to victory, leading the new practice of preparing for war in the new era

“Following the main road, who would you follow to seek a shortcut?” In the world of soldiers, there is no such thing as “easy”. The only way to win a battle is to be prepared.

What kind of war we will fight in the future will require innovative tactics; if we cannot innovate tactics, it will be difficult to win future wars.

In essence, combat regulations are about solving the problem of how to fight and how to win, and are the refinement, deepening and concretization of military strategic policies. The Outline of Joint Cooperation of the People’s Liberation Army of China (Trial) (hereinafter referred to as the Outline) deeply studies the characteristics and laws of future wars, accurately grasps the era characteristics of the integrated development of mechanization, informatization and intelligentization of our army, and through the forward-looking and concrete design of future operations, implements the spiritual essence and content requirements of the new era’s military strategic policy into the troops’ preparation for war.

The Outline is not only a guideline for preparing for war, but also a guideline for winning joint operations.

At the beginning of the new year of 2021, a certain area of the Eastern Theater Command is organizing a multi-service, multi-directional, systematic combat training. Under the guidance of the newly issued “Outline”, this exercise involves the full-domain linkage of land, sea, air, space, network and electric power, close coordination of political and public opinion, and information-led throughout the entire process from combat preparation to situation shaping to mission implementation. All units work closely together, demonstrating the firm determination and strong ability to maintain national unity with a thunderous momentum, and also witnessing the transformation of our military joint cooperation from “formal linkage” to “spiritual linkage”.

In the west, at midnight in mid-spring 2021, a series of urgent alarm bells rang. According to the level transfer order of a certain base of the Western Theater Air Force, the officers and soldiers of a certain air defense battalion of the Army quickly rushed to their positions, and the level transfer time was further shortened. According to the unified deployment, more than 10 Army air defense forces in the theater air force responsibility area entered the Air Force command chain in an organized manner, breaking the information barrier of the services, sharing early warning information, and jointly taking on combat readiness duty, and initially forming a joint air defense combat system. “You lend me the ‘eye in the sky’, and I will help you with the ‘iron fist'”, the integrated joint air defense combat across the services has taken a new step and entered a new stage.

In the north, at the beginning of the summer of 2021, war eagles soared and iron currents rolled, and an exercise with the theme of air-ground joint operations was in full swing. According to the plan, a certain command post of the Air Force of the Northern Theater Command and a certain group army of the Army jointly organized a brigade-level command post exercise to study and explore the composition of joint command institutions and test the integrated joint combat command capabilities of the command post personnel. Intelligence analysis and processing, joint firepower strikes, and integrated rear-end support were coordinated and planned and carried out in an integrated manner, and the command institutions were organized in an integrated manner with all elements. Through repeated joint combat and training, the policy of leading training through combat and carrying out combat through training has been further implemented, and the joint combat and command capabilities of commanders of all services and arms have been significantly improved.

In the direction of the South China Sea, war eagles roared and attacked fiercely, dragons took off and stepped on the sea and waves, radars flew and missiles raised their heads… Under the unified command of the theater joint command, all mission forces worked as a whole and coordinated closely to quickly build a battlefield layout that was multi-domain joint, both offensive and defensive, and deployed in echelons. They adopted a combination of centralized command and decentralized command, and flexibly carried out sea and air escort and deterrence and expulsion in a reasonable, forceful and restrained manner, effectively maintaining peace and tranquility in the South China Sea.

In the past year since the implementation of the Outline, the orientation of preparing for war has become clearer and firmer, the sole fundamental standard of combat effectiveness has been more firmly established, training and preparation for war as the main responsibility of the troops has become more prominent, researching and planning war as the primary responsibility of officers and soldiers has become clearer, the ideas and measures for joint operations and victory have become increasingly effective, and the entire army has continued to set off a new upsurge in training and preparation for war.

Keep pace with the times and clarify the new mechanism of joint cooperation in the new era

“All beneficial ways go with the times.”

Military theorist Douhet once said: “Victory smiles only on those who can foresee the changes in the character of war, not on those who wait for the changes to happen and then adapt to them.”

Looking around the world, the game and struggle among major powers are intensifying, the threat of war exists, the war situation continues to evolve, new military reforms are booming, stealth, unmanned and intelligent weapons and equipment have become the mainstream trend, the battlefield space has expanded to all domains and dimensions, the integrated linkage of combat forces has become the norm, combat command, action and support have become more sophisticated, and winning future wars requires the support of more advanced combat theories.

The gap in combat concepts is the fundamental gap, and the backwardness of combat theory is the biggest backwardness. When modern wars are surging in the world, what is most needed is newer and braver minds.

The new-era combat regulations, led by the Outline, adhere to Xi Jinping’s military strategic thinking and the new-era military strategic policy as the soul and outline, deeply grasp the new changes in national security, new adjustments in combat opponents, new designs in strategic layout, new connotations of active defense, and new developments in combat guidance, and materialize the principles and methods of commanders’ understanding and guidance of war into norms and standards for the specific implementation of the troops, so as to promote our military-joint cooperation war to a higher level.

——It comprehensively expounds the contemporary connotation of war guidance under information conditions.

The Outline aims to win future high-end wars, accurately grasps the characteristics of lowered thresholds for future armed conflicts, blurred boundaries of war, and increasingly prominent mutual influence and efficiency between the war field and other fields, strengthens the political and social attributes of combat operations, innovatively develops military struggle paradigms, emphasizes relying on the country’s integrated strategic system and capabilities, emphasizes the integration of war and non-war domains, emphasizes the comprehensive implementation of military and political, diplomatic, economic, cultural and other means, and gives full play to the overall advantages of the party, government, military, police and people. It reflects the modern war concept and the war guidance for winning the people’s war and total war in the new era.

——All elements standardize the style and methods of our joint military operations.

The Outline is based on the tasks and development of our army, and systematically expounds on the possible joint operations in the future, covering the core missions of various strategic directions, covering land, sea, air, space, network and electromagnetic multi-dimensional space. At the same time, it also creatively summarizes the basic types of joint operations, highlights the basic actions that run through the joint operations and have common characteristics, and forms a closed-loop chain of joint operations with all elements and in all fields.

——The joint combat command system and organizational operation mode were designed throughout the entire process.

The implementation of joint operations organizations is extremely complex and difficult. Whether they can be “coordinated” in terms of strength, “joined” in operations, and “excellent” in effectiveness depends crucially on whether they can achieve “unification” in command. The “Outline” focuses on building a strong and efficient joint operations command structure, closely integrates the Central Military Commission and the theater joint command operation model mechanism, fully considers that it not only complies with the general direction and general requirements of the reform, but also leaves room for flexible formation in practice. It focuses on solving major issues such as the construction of a joint operations command system, the differentiation of command authority and responsibility interfaces, and the integration of services into the joint system, so as to ensure that thousands of troops and horses can jointly act under unified orders.

Taking joint training as the guideline, promoting a new leap forward in joint training in the new era

At the Central Military Commission’s military training conference, President Xi Jinping stressed the need to strengthen joint training, adhere to joint training as the key, develop a joint training system with Chinese characteristics, and accelerate the improvement of integrated joint combat capabilities. Soldiers should be trained in the way they fight, and troops should be trained in what is needed for fighting. Today’s world-class armies all regard improving joint training as the top priority for war preparation.

The Outline is the opening chapter of the new era combat doctrine and the guiding principle for the transformation of joint training in the new era. The Outline provides direction, inspires vitality, and gives birth to a new pattern of joint training in the new era.

——Incorporate combat into training to present an “integrated posture” of training.

In the Taiwan Strait, the naval and air fleets carried out joint combat readiness patrols to test and enhance the joint combat capabilities of multiple services, maintain a high state of alert at all times, and resolutely defend national sovereignty and territorial integrity. Exercise preparation is combat preparation, and the exercise state is the combat state. Joint military exercises are no longer simple training activities, but have become a preparation process to promote combat readiness and enhance capabilities. Joint training, the “source” and “main stream” full of power, is guiding and driving the in-depth advancement and vigorous development of military struggle preparations, and fully unleashing the role and effectiveness of training to carry out combat and training to promote preparations.

——Systematic training has become the “new normal” of joint training.

“East”, “South”, “West”, “North”, and “Central” are joint live-fire exercises organized by various theater commands, “Crossing”, “Mobility”, “Red Sword”, “Sky Sword”, and “Joint Logistics Mission” are series of systematic exercises organized by various services, covering all seasons, all weather, and all regions. The CMC, theater commands, and services are responsible for division of labor, overall design, and systematic organization. They are decomposed from top to bottom and integrated from bottom to top, driving the operation and inspection of the joint combat system. Joint exercises and systematic training present a new look, and new changes have taken place in the training and preparation mode. Our military’s joint training has entered a new stage of all-round transformation and overall improvement.

——Joint training between China and foreign countries highlights the “integration” of joint exercises.

At the foot of the Helan Mountains and in the heart of the Bronze Gorge Desert, the “Western Joint-2021” China-Russia joint exercise was booming. In this joint exercise, the Chinese and Russian militaries were mixed and planned together. The two sides shared their positions, coordinated closely, and acted together. They practiced more than 20 subjects such as joint air defense, joint obstacle removal, and joint three-dimensional seizure. With the support of the deeply integrated combat system between China and Russia, new breakthroughs in joint exercises and training were achieved. “Maritime Joint”, “Common Destiny”, “Peace Mission”… With the joint training between China and foreign countries as a “window”, the new changes in the joint training of the Chinese military are being brilliantly presented to the world.

——Intensive training in new domains, demonstrating an “open attitude” in research and warfare.

In joint exercises, underwater unmanned “fish schools”, land unmanned “wolf packs”, and air unmanned “bee swarms” began to emerge. New domains and new types of forces such as land aviation, special operations, electric power, unmanned, network, and aerospace were deeply integrated into the joint combat system and the joint exercise process, and realistic combat scenarios were carefully constructed to accurately experiment with modern war organization and management. As the most active practice area for preparing for war, joint training, with an innovative and open attitude, boldly tried and made great strides towards the new combat areas pointed out in the Outline.

Integrating war and construction to shape a new pattern of system construction in the new era

President Xi stressed that we must adhere to the principle of building the country in accordance with war, strengthen the coordination of war and construction, speed up the promotion of major strategic, leading and fundamental projects, and accelerate the creation of a high-level strategic deterrence and joint combat system.

If the “trouble” in the construction of the joint combat system is not resolved quickly, once the “interest” of the debt accumulates, it will become a “pain” on the battlefield tomorrow. From the perspective of war, the “Outline” calibrates the “sight” of construction and firmly points to the correct direction of military construction.

——Calibrate the construction “sight” to point to the needs of joint operations.

Under the guidance of the Outline, the concept of jointness has been gradually established, and the barriers of “coordination” of military operations and “integration” of combat domain capabilities have been gradually broken down. The land, sea, air, and fire arms have been combined in the same domain, and cross-domain integration of combat domains such as space, network, and electromagnetic space has gradually become a reality. With the support of the network information system and combat data information as the link, a full-time and smooth command link has been built. The system is internally connected to each combat sub-center, and is connected to each combat group (team) command post. When necessary, it can directly reach the end of the individual platform to achieve joint command to the end. All operational forces worked together around the overall intention, realizing the transformation of the joint combat concept from focusing on the “service attributes” of combat forces to focusing on the “operational domain”, which has become the main feature of future joint combat. Studying, planning, and training for war with the “Outline” has become a trend throughout the military.

——Calibrate construction’s “sights” to point to system shortcomings and weaknesses.

Based on the Outline, our army insists on combining inheritance and innovation, theory and practice, innovatively designs strategies for winning future wars, focuses on highlighting problem orientation, takes root in training and preparation for war, promotes the construction of joint combat command system and new combat force construction, and effectively solves the outstanding shortcomings and weaknesses in military combat preparation. In mid-May 2021, the Party Committee of the Northern Theater Command held a special war meeting, and in accordance with the Outline, thoroughly identified contradictions and problems in joint combat research, command and control mode transformation, joint handling level, and efficient command capabilities. According to the Outline, it optimized system support, improved command and control methods, and improved command means, which promoted the transformation of the operation mode of the theater joint command center and the improvement of command effectiveness. Looking across the entire military, similar practices are becoming more and more common. Referring to the Outline to find gaps, ideas, and methods in the near and long term has become the new mainstream for planning and promoting construction at all levels and in all fields.

——Calibrate the construction “sight” to point to the urgent need to balance powerful enemies.

To implement the principle of building the military in accordance with war and coordinating the military construction, we must not only focus on solving current practical problems, but also pay attention to solving long-term development problems. The Outline is anchored on the future of defeating the strong and contains a far-sighted plan to build a world-class military. Guided by the Outline and focusing on changes in the war situation and changes in scientific and technological development, the construction of asymmetric means to check and balance powerful enemies has ushered in a qualitative leap. Batches of new drones, new helicopters and other advanced weapons and equipment have been tested and deployed, and a series of high-tech equipment has been deployed and developed, which has given us more confidence and stronger capabilities to win the war. The Outline condenses the “war code” of historical wisdom and also integrates the way to build first-class and win the future in the new era.

“But look at the path you have come from, and you will see verdant and green mountains.” One year after the implementation of the Outline, the new-era combat regulations are releasing capabilities and increasing efficiency in building a joint combat system with Chinese military characteristics.

In the new era and new journey, our path of joint military operations will surely become broader, our ability to defend the country’s strategic development interests will surely become stronger, our confidence in winning future informationized wars will surely become firmer, and the great goal of building a world-class military will surely be fully realized.

“We have a string that is tightly tied to us, a mission that we shoulder, and a storm that we are watching closely… We are always ready!”

現代國語:

經中央軍委主席習近平批准,中央軍委印發《中國人民解放軍聯合作戰綱要(試行)》,於2020年11月7日起施行。

《綱要》著眼構建聯合作戰法規體系,強化備戰打仗的鮮明導向,對鞏固深化領導指揮體制、規模結構和力量編成改革成果,對推動我軍聯合作戰能力解放和發展,具有重要意義。

《綱要》是我軍新時代作戰條令體系的頂層法規,重在明確聯合作戰組織實施的基本問題,重在統一作戰思想、釐清權責程序、指導作戰行動,明確聯合作戰指揮、作戰行動、作戰保障、國防動員、政治工作等重大原則、要求和基本程序。

中央軍委要求,各級要認真抓好《綱要》的學習貫徹,堅持戰斗力這個唯一的根本的標准,將《綱要》作為組織實施聯合作戰和聯合訓練的基本依據,全面提高新時代打贏能力。

戰旗獵獵,演兵場上風起雲湧、高潮迭起——

大江南北,鐵流澎湃礪精兵;深藍大洋,蹈海踏浪鑄利劍;蒼穹之上,鵬飛萬裡向碧空;密林深處,東風浩蕩嘯九天;天網制權,無形之戰勝有形……一場場聯合作戰演練在多域全維漸次展開,鋪陳出一幅幅聯訓謀戰、以訓促戰、強訓勝戰的強軍畫卷,奏響著我軍練兵備戰史上新的時代強音。

一年來,世界百年未有之大變局交織全球新冠疫情之大流行,疫霾籠罩的天空之下,國際局勢波瀾不斷,伴隨著動蕩和對抗,納卡沖突中大放異彩的無人機作戰,向世界展現出現代戰爭獨有的特征。

“世異則事異,事異則備變。”未來“打什麼仗、怎麼打仗”承載著使命之重,全軍上下處處湧動著研戰謀勝的熱潮。

面對國家安全形勢新的變化,面對強敵對手新的威脅,面對戰爭形態新的演進,迫切需要我們給出強軍答案,給出勝戰答案,給出時代答案。

“總的看,現代戰爭確實發生了深刻變化。這些變化看上去眼花繚亂,但背後是有規律可循的,根本的是戰爭的制勝機理變了。”面對迅猛發展的世界新軍事革命和戰爭形態變化,在統帥指引下,按照軍委政策制度改革統一部署,軍委聯合參謀部組織軍事科學院專家力量和軍委機關有關部門、各戰區、各軍兵種和武警部隊精干人員成立聯合課題組,集智聚力攻關,緊前推動新時代作戰條令制定工作。

2020年11月7日,《中國人民解放軍聯合作戰綱要(試行)》在全軍施行,標定了新時代我軍聯合作戰新的坐標系。

《綱要》頒發以來,指揮員率先領學、機關帶頭熱學、部隊實際踐學,全軍官兵學習宣貫《綱要》熱潮奔湧,一場新時代聯合作戰大討論、思想大解放、備戰大實踐,在全軍部隊蓬勃開展。

劍指勝戰,引領新時代備戰打仗新實踐

“遵通衢之大道兮,求捷徑欲從誰?”軍人的世界,沒有“容易”二字。勝戰之道,唯有備戰。

未來打什麼樣的仗,就要創新什麼樣的戰法;創新不了戰法,就難以打贏未來的戰爭。

作戰條令實質上就是解決如何打仗、怎麼打贏的問題,是對軍事戰略方針的細化、深化和具體化。《中國人民解放軍聯合作戰綱要(試行)》(以下簡稱《綱要》)深入研究未來戰爭特點規律,准確把握我軍機械化、信息化、智能化融合發展的時代特征,通過對未來作戰的前瞻性具象化設計,將新時代軍事戰略方針的精神實質和內容要求具體落實到部隊備戰打仗實踐中去。

《綱要》既是備戰指導綱要,更是聯戰勝戰綱要。

2021年新春伊始,東部戰區某區域,正在組織一場多軍種多方向成體系實戰化訓練。此次演練,在新出台的《綱要》引領下,陸海空天網電全域聯動,政治輿論密切配合,從作戰准備到態勢塑造再到任務實施,全流程信息主導,各單位密切協同,以雷霆萬鈞之勢彰顯了維護國家統一的堅定決心和強大能力,也見證了我軍聯合作戰由“形聯”到“神聯”的蛻變。

西部方向,2021年仲春午夜,一陣急促的警鈴聲響起,根據西部戰區空軍某基地等級轉進指令,陸軍某防空營官兵迅速奔向戰位,等級轉進時間進一步縮短。按照統一部署,戰區空軍責任區內,10余支陸軍防空力量成建制進入空軍指揮鏈條,打破軍種信息壁壘,實現共享預警信息、共同擔負戰備值班,初步形成聯合防空作戰體系。“你借我‘天眼’,我助你‘鐵拳’”,跨軍兵種的一體化聯合防空作戰邁出了新步伐,進入了新階段。

北部方向,2021年盛夏之初,戰鷹翱翔,鐵流滾滾,一場以空地聯合為主題的演習正在火熱進行。根據計劃,北部戰區空軍某指揮所與陸軍某集團軍共同組織軍旅兩級指揮所演習,研究探索聯合指揮機構編成,檢驗指揮所人員一體化聯合作戰指揮能力。情報分析處理、聯合火力打擊、綜合後裝保障等環節協同籌劃、一體展開,指揮機構人員一體編設、要素齊全。在一次次聯戰聯訓的淬煉下,以戰領訓、以訓載戰進一步落地落實,各軍兵種指揮員的聯合作戰指揮能力得到明顯提升。

南海方向,戰鷹呼嘯、攻勢凌厲,蛟龍出動、蹈海踏浪,雷達飛轉、導彈昂首……在戰區聯指的統一指揮下,各任務部隊一體聯動、密切協同,迅速構建起多域聯合、攻防兼備、梯次部署的戰場布勢,采取集中指揮與分散指揮相結合的方式,靈活機動開展海空護航和威懾驅離,有理有力有節,有效維護了南海的和平與安寧。

《綱要》施行一年來,備戰打仗的導向更加鮮明堅定,戰斗力這個唯一的根本的標准樹得更牢,練兵備戰作為部隊主責主業更加突出,研戰謀戰作為官兵第一責任更加清晰,聯戰勝戰的思路舉措越來越見成效,全軍持續掀起練兵備戰新的熱潮。

與時俱進,釐清新時代聯合作戰新機理

“凡益之道,與時偕行。”

軍事理論家杜黑曾言:“勝利只向那些能預見戰爭特性變化的人微笑,而不是向那些等待變化發生再去適應的人微笑。”

放眼世界,大國博弈斗爭加劇,戰爭威脅現實存在,戰爭形態持續演進,新軍事變革蓬勃發展,武器裝備隱身化、無人化、智能化成為主流趨勢,戰場空間向全域全維拓展,作戰力量一體聯動成為常態,作戰指揮、行動和支援保障更趨精細,打贏未來戰爭需要更加先進的作戰理論支撐。

作戰理念的差距才是根本的差距,作戰理論的落後才是最大的落後。當現代化戰爭在世界洶湧澎湃的時候,最需要的是更新銳、更勇敢的頭腦。

以《綱要》為統領的新時代作戰條令,堅持把習近平軍事戰略思想、新時代軍事戰略方針作為魂和綱,深刻把握國家安全新變化、作戰對手新調整、戰略布局新設計、積極防御新內涵、作戰指導新發展,將統帥認知戰爭、指導戰爭的原則和方法,物化為部隊具體執行的規范標准,推進我軍聯合作戰邁向更高層次。

——全維度闡述了信息化條件下戰爭指導的時代內涵。

《綱要》瞄准打贏未來高端戰爭,准確把握未來武裝沖突門檻降低、戰爭界限模糊,戰爭領域與其他領域的斗爭相互影響增效日漸突出等特點,強化作戰行動的政治、社會屬性,創新發展軍事斗爭范式模式,強調依托國家一體化戰略體系和能力,強調戰與非戰多域融合,強調軍事與政治、外交、經濟、文化等多手段綜合施策,發揮黨政軍警民整體優勢,反映了現代戰爭理念和打贏新時代人民戰爭、總體戰的戰爭指導。

——全要素規范了我軍聯合作戰行動樣式和行動方法。

《綱要》立足我軍擔負任務和建設發展實際,對未來可能實施的聯合作戰樣式進行了系統闡述,覆蓋各戰略方向核心使命,遍及陸、海、空、天、網絡和電磁多維空間。同時,還創造性地總結歸納了聯合作戰基本行動類型,將貫穿聯合作戰始終並具有共性特征的基本行動突出出來,形成全要素全領域聯合行動的閉環鏈路。

——全流程設計了聯合作戰指揮體系及組織運行方式。

聯合作戰組織實施復雜度極高、難度極大,能否在力量上“合”、行動上“聯”、效能上“優”,關鍵要看指揮上能否實現“統”。《綱要》圍繞打造堅強高效的聯合作戰指揮機構,緊密結合軍委、戰區聯指運行模式機制,充分考慮到既順應改革大方向和總要求,又為實際中靈活編組留有余地,重點解決聯合作戰指揮體系構建、指揮權責界面區分、軍種融入聯合體系等重大問題,確保千軍萬馬在統一號令下聯合行動。

以聯為綱,推動新時代聯合訓練新躍升

一引其綱,萬目皆張。習主席在中央軍委軍事訓練會議上強調,要強化聯合訓練,堅持以聯為綱,發展我軍特色聯合訓練體系,加速提升一體化聯合作戰能力。仗怎麼打、兵就怎麼練,打仗需要什麼、部隊就應該練什麼。當今世界一流軍隊,無不把提高聯合訓練水平視為戰爭准備的第一要務。

《綱要》是新時代作戰條令的開篇之作,也是新時代聯合訓練轉型的指向遵循。《綱要》指引著方向,《綱要》激發著活力,催生了新時代聯合訓練的新格局。

——寓戰於訓,呈現訓備“一體態”。

台灣海峽,海空編隊實施聯合戰備警巡,檢驗提升多軍兵種聯合作戰能力,時刻保持高度戒備狀態,堅決捍衛國家主權和領土完整。演練准備就是作戰准備,演練狀態就是作戰狀態,聯合演兵不再是單純的訓練活動,已經成為推進備戰、提升能力的准備過程。聯合訓練這個充滿力量的“源頭”“干流”,正在牽引、帶動軍事斗爭准備深入推進、蓬勃發展,充分釋放以訓載戰、以訓促備的作用功效。

——體系實訓,成為聯訓“新常態”。

“東部”“南部”“西部”“北部”“中部”,各戰區組織的一場場聯合實兵演習,“跨越”“機動”“紅劍”“天劍”“聯勤使命”,各軍兵種組織的系列體系化演訓,覆蓋了全季節、全天候、全地域。軍委機關、戰區、軍兵種分工負責,整體化設計、體系化組織,從上到下逐級分解,從下向上逐級集成,帶動聯合作戰體系運轉檢驗。聯合演訓、體系練兵呈現新氣象,練兵備戰模式出現新變化,我軍聯合訓練進入了全方位變革、整體性提升的新階段。

——中外聯訓,突顯聯演“融合態”。

賀蘭山下,青銅峽大漠腹地,“西部·聯合-2021”中俄聯演炮聲隆隆。此次聯演,中俄兩軍混合編組、合帳籌劃,雙方態勢共享、密切協同、聯合行動,演練聯合防空、聯合破障、聯合立體奪要等20余個課目,在中俄深度融合的作戰體系支撐下,實現聯演聯訓的新突破。 “海上聯合”“共同命運”“和平使命”……以中外聯訓為“窗口”,中國軍隊聯合訓練的新變化正在向世界精彩呈現。

——新域精訓,展現研戰“開放態”。

一場場聯合演練活動中,水下無人“魚群”、陸上無人“狼群”、空中無人“蜂群”開始真正湧現,陸航、特戰、電抗、無人、網絡、空天等新域新質力量,深度融入聯合作戰體系,深度進入聯合演練流程,精細構設現實作戰場景,精准實驗現代戰爭組織管理。作為備戰打仗最活躍的實踐領域,聯合訓練以創新、開放的姿態,朝著《綱要》指出的新型作戰領域,大膽嘗試、闊步前進。

戰建一體,塑造新時代體系建設新格局

習主席強調指出,要堅持以戰領建,加強戰建統籌,抓緊推進戰略性、引領性、基礎性重大工程,加快打造高水平戰略威懾和聯合作戰體系。

聯合作戰體系建設上的“患”,如不加快解決,一旦欠賬“復息”疊加,就將成為明天戰場上的“痛”。《綱要》從戰的角度,校准建的“准星”,堅定地指向軍隊建設正確的方向。

——校准建設“准星”指向聯合作戰所需。

在《綱要》指引下,聯合理念逐步確立,軍兵種行動“配合”、作戰域能力“整合”的壁壘逐漸被打破,陸、海、空、火等軍兵種並域聯合,太空、網絡、電磁空間等作戰域跨域融合逐步成為現實。以網絡信息體系為支撐,以作戰數據信息為紐帶,構建起全時暢通的指揮鏈路。系統內聯各作戰分中心,下接各作戰群(隊)指揮所,必要時直達單兵平台末端,實現聯合指揮到底到邊。各行動力量圍繞整體意圖共同發力,實現了聯合作戰理念以作戰力量“軍種屬性”為著眼,向以“作戰域”歸屬為著眼的轉變,成為未來聯合作戰的主要特征。拿著《綱要》研打仗、謀打仗、練打仗,在全軍上下蔚然成風。

——校准建設“准星”指向體系短板弱項。

以《綱要》為依據,我軍堅持繼承與創新、理論與實踐相結合,創新設計未來戰爭制勝之策,注重突出問題導向,植苗扎根練兵備戰,推進聯合作戰指揮體系建設、新型作戰力量建設,有效解決了軍事斗爭准備的突出短板弱項。2021年5月中旬,北部戰區黨委召開專題議戰會,對照《綱要》深入查找聯合作戰研究、指控模式轉變、聯合處置層次、高效指揮能力等方面的矛盾問題,依據《綱要》優化體系支撐、改進指控方法、完善指揮手段,推動了戰區聯指中心運行模式轉變和指揮效能提升。放眼全軍,類似的做法越來越多,參照《綱要》顧近及遠找差距、找思路、找方法,成為各層級各領域謀劃推動建設的新主流。

——校准建設“准星”指向制衡強敵所急。

落實以戰領建、戰建統籌,既要立足解決當前實際問題,又要注重解決長遠發展問題。《綱要》錨定未來制強勝強,蘊含著建設世界一流軍隊的深遠謀劃。以《綱要》為引領,著眼戰爭形態之變、科技發展之變,制衡強敵非對稱手段建設迎來了質的飛越。一批批新型無人機、新式直升機等先進武器裝備試驗列裝,一系列高新技術裝備部署研發,我們勝戰的底氣更足、能力更強。《綱要》濃縮了歷史智慧的“戰爭法典”,也融匯了新時代建設一流、制勝未來的勝戰之道。

“卻顧所來徑,蒼蒼橫翠微。”《綱要》施行一年來,新時代作戰條令正在為構建我軍特色的聯合作戰體系釋能增效。

新時代新征程,我軍聯合作戰之路必將更加寬廣,捍衛國家戰略發展利益的能力必將更加強大,打贏未來信息化戰爭的信心必將更加堅定,建設世界一流軍隊的偉大目標必將全面實現。

“有一根弦我們緊繃著,有一種使命我們肩扛著,有一片風浪我們緊盯著……我們時刻准備著!”

中國原創軍事資源:http://www.mod.gov.cn/gfbw/qwfb/4902340888.html

What are the Advantages of Chinese Navy Distributed Maritime Operations?

中國海軍分散式海上作戰有哪些優勢?

現代英語:

In recent years, with the development of intelligent unmanned technology, the navies of developed countries in the world have proposed the concept of “distributed lethality” with surface ships as the main body, aiming to achieve distributed maritime operations and gain battlefield advantages. Distributed maritime operations aim to integrate combat platforms in multiple domains, build an all-round three-dimensional situational awareness network, and form a seamlessly linked combat system of manned platforms and distributed unmanned platforms through communication networks throughout various domains and an integrated command and control system, thereby improving the overall combat and strike effectiveness.

The concept of distributed maritime operations

Distributed maritime operations are the integration and expansion of combat concepts such as “distributed lethality” and “manned-unmanned collaborative operations”. The main idea is that large-scale, multi-purpose, high-value combat platforms are no longer required to independently complete diversified combat missions, but rather the main combat capabilities such as reconnaissance, command, strike, and interference are dispersedly deployed on various heterogeneous unmanned platforms in various combat domains. A highly resilient combat system is formed by the fusion of a small number of manned platforms and a large number of distributed unmanned platforms, which can complete various complex combat missions through efficient, precise, and real-time collaboration. This combat system includes a small number of high-value manned platforms and a large number of low-cost unmanned platforms. The manned platforms serve as battlefield decision makers, responsible for relatively complex tasks such as combat plan planning and combat mission allocation and implementation; the unmanned platforms are used to perform relatively dangerous or simple tasks such as situational awareness and fire strikes. Manned/unmanned platforms work closely together to complete combat missions.

The essence of distributed maritime operations is to seamlessly link and organically integrate high-value manned platforms and low-cost unmanned platforms at sea, and to achieve common operational goals through high information sharing, precise task aggregation, and efficient operational coordination. It has the remarkable characteristics of on-demand sharing of operational information, deep integration of operational tasks, precise planning of operational resources, and optimized organization of operational processes. Through manned/unmanned distributed coordination, a new type of efficient maritime combat system can be formed that complements each other’s strengths, integrates functions, and has complementary capabilities. Distributed maritime operations highlight the combinability, consumability, and “decentralization” of force utilization, and focus on the deep embedding and comprehensive application of artificial intelligence technology, which can enhance the resilience of the combat system and promote the development of joint global operations in the maritime direction towards intelligence.

Typical characteristics of distributed maritime operations

At present, intelligent unmanned equipment is developing rapidly, and is increasingly possessing advantages such as human-equipment integration, cross-domain coordination, cluster confrontation, and autonomous combat. Distributed maritime combat is accelerating to present typical characteristics such as wide-area distribution coordination, cross-domain multi-dimensional integration, and manned and unmanned integration.

Wide-area distributed coordination. Wide-area distributed coordination means that various combat elements or combat resources can be adaptively optimized and combined and dispatched according to the battlefield situation, so as to realize the precise energy concentration and release of the combat system. The first is the distributed deployment of the combat system. In distributed maritime operations, the combat space is deeply embedded in various combat domains, and the combat forces can be distributed and deployed in a decentralized wide area. The second is the intelligent reconstruction of the combat system. The combat system is lighter, more capable, and more agile, and its battlefield environment adaptability and system dynamic optimization and reconstruction capabilities are significantly enhanced, and it can quickly and flexibly adjust the required combat forces and battlefield resources. The third is the concentrated release of combat energy. The combat system can achieve rapid mobility, real-time response and coordinated operations of various combat platforms and combat forces in the global combat space through semi-autonomous or autonomous coordinated control of equipment, ensuring the precise concentration and release of combat forces.

Cross-domain multi-dimensional integration. Distributed maritime operations transform the centralized combat group mode into a distributed, agile combat mode. Various combat units are distributed in multiple combat domains, which can realize the monitoring and positioning of cross-domain targets, and then implement effective strikes. The first is the cross-domain integration of combat forces. The combat forces deployed in multiple domains will be dynamically networked through intelligent systems to form a cross-domain combat system. The second is the seamless connection between strategy, campaign, and tactics. New domain and new quality combat forces will directly participate in intelligent naval warfare as the main combat role, achieving comprehensive coverage from strategy to campaign, seamless connection from campaign to tactics, giving birth to a new quality combat capability of rapid assault, multi-dimensional integration, and full-domain offense and defense, and realizing cross-domain coordinated strikes on combat targets.

Manned and unmanned are one. Distributed maritime operations can rely on a large number of intelligent unmanned equipment to form a “manned-unmanned” joint strike system with high autonomy and coordination. By accelerating the development of unmanned equipment such as ship-borne drones, surface unmanned boats, and underwater unmanned vehicles, long-, medium-, and short-range echelon configurations can be achieved, and cross-domain integration of unmanned equipment such as air, surface, underwater, and land can be achieved. The unmanned and manned equipment systems are seamlessly integrated, and the mission domain is expanded from information assurance to firepower strikes. This will promote changes in maritime combat styles, accelerate the formation of new combat styles such as manned system collaborative operations, unmanned system single operations, unmanned system cluster operations, and frontier preset operations, and achieve a subversion of traditional manned combat styles.

The winning mechanism of distributed maritime operations

The reason why major scientific and technological progress can promote the evolution of the war situation is largely because it has profoundly changed the mechanism of winning wars. At present, cutting-edge technology has significantly improved the level of equipment intelligence, profoundly changed the combat power generation mode, and accelerated the evolution of the mechanism of winning naval battles.

“Distributed interconnection, human-machine collaboration” wins. The distributed, intelligent, and networked command information system built on cloud computing, data chain, Internet of Things and other technologies has brought profound changes to modern naval warfare. Supported by the cloud edge, the command information system realizes real-time interaction between various combat platforms through high-speed and secure network connections, significantly improving the information interconnection, interoperability and interoperability between different combat platforms; it can efficiently analyze and process massive battlefield information, accurately judge the battlefield situation, and transform combat command to an intelligent decision-making method centered on “data, algorithms and models”; commanders at each node share information in real time in the cloud network, synchronously judge the situation, and coordinate command, so that command and control activities are concise and optimized, and combat decisions are more efficient and accurate. In addition, under “distributed interconnection”, intelligent unmanned combat has developed from a single platform to a multi-platform cluster, and from remote-controlled combat to semi-autonomous and autonomous combat. Multiple “single-person-single-machine” command chains running in parallel have gradually formed a single simple command chain of “commander-unmanned combat cluster”. Through the efficient and autonomous coordination of manned platforms and unmanned platforms and their clusters, the combat potential of intelligent unmanned equipment can be fully activated, and the advantages of various advanced equipment can be maximized.

“Algorithm-driven, fast and accurate cognition” wins. In intelligent warfare, advanced algorithms replace commanders’ thinking through precise and high-speed calculations, promoting the accelerated integration of rational combat knowledge and emotional commander experience. With advanced algorithms, we can quickly and accurately understand the situation on the naval battlefield, and then accurately and quickly plan scientific and feasible combat plans for changes in the situation on the naval battlefield, disrupting the opponent’s established deployment and combat intentions. Algorithms can effectively process massive amounts of high-value intelligence information and increase the speed of the “OODA” cycle. Mastering the advantages of algorithms can achieve fast and accurate cognition of the enemy’s situation, our situation, and the battlefield environment, thereby accurately predicting the enemy’s combat actions and innovating and optimizing our own action plans in a targeted manner.

“Cloud brain support, network failure and disconnection” will win. In distributed maritime operations, the command and control system will operate in a collaborative way of “human brain + cloud brain”, and the intelligent advantage will become an “advanced” advantage based on information advantage, and “network failure and disconnection” will become one of the main patterns of maritime operations. On the one hand, unmanned intelligent combat actions supported by cloud brain will penetrate the entire process of operations. In distributed maritime operations, the collaborative mode of “human brain + cloud brain” runs through all aspects of operations such as intelligent assisted command decision-making, automatic intelligence reconnaissance, automatic combat planning, autonomous precision strikes, and intelligent logistics support. On the other hand, targeting the intelligent ubiquitous network structure covering the entire domain and multiple dimensions, using intelligent equipment or means to attack key nodes and hubs such as its reconnaissance and surveillance network, information transmission network, command and control network, and comprehensive support network can paralyze its combat network system.

“Cross-domain integration, integrated energy release” wins. Distributed maritime operations will leap from integrated joint operations under information conditions to autonomous cross-domain collaborative operations under intelligent conditions. Different types of new-quality combat capabilities will be integrated and coordinated across domains, and flexibly and accurately integrated to release combat effectiveness. On the one hand, relying on the cross-domain, distributed, and networked collaborative combat system supported by the cloud edge, through the cross-domain mobility of the main combat platform, the cross-domain complementation of equipment functions, the cross-domain sharing of information and intelligence, the cross-domain coordination of combat command, the cross-domain response of mission actions, and the cross-domain interconnection of channel links, a variety of new-quality combat capabilities can be efficiently linked. On the other hand, cross-domain integration highlights the close coordination between the main domain master control and cross-domain support. For example, the navy will be the main control force in maritime offensive and defensive operations, and other forces will implement cross-domain coordinated support through the integration of air and space, sea and space, and network and space.

“Strike at acupoints and lure at agglomeration” to win. Distributed maritime operations will transform from traditional concentrated annihilation warfare to precise strike at acupoints, and high-value targets will face the threat of long-range autonomous precision strikes from intelligent combat equipment; from traditional large-scale manned attrition warfare to global unmanned cluster lure warfare, and important strategic targets will face the threat of saturation attacks and deceptive strikes from low-cost unmanned clusters. In the process of distributed maritime operations, unmanned equipment such as drones and unmanned submarines can be deployed to form a widely distributed, self-organized and coordinated reconnaissance network. Through autonomous reconnaissance, identification and strike actions, long-range and precise attacks can be carried out on the opponent’s high-value targets. Under the condition of minimizing collateral damage as much as possible, the opponent’s hand-wave network can be paralyzed from top to bottom to destroy its command system. Under the intelligent ubiquitous network system, based on the self-organized “swarm” combat of large-scale machine intelligent agents, full coverage reconnaissance of the opponent’s core area can be achieved, deceiving and luring the enemy, and consuming the opponent’s combat resources to the maximum extent.

現代國語:

中國軍網 國防部網
2024年8月15日 星期四

邱志明

近年來,隨著智慧無人技術的發展,世界發達國家海軍提出以水面艦艇為主體的「分散式殺傷」概念,意在實現分散式海上作戰,獲得戰場優勢。分散式海上作戰旨在融合多域空間的作戰平台,構建全方位立體式的態勢感知網,透過遍布各域的通訊網絡和一體化的指揮控制系統,形成有人平台與分散式無人平台無縫鉸鏈的作戰體系,從而提高整體作戰與打擊效能。

分散式海上作戰的概念內涵

分散式海上作戰是「分散式殺傷性」與「有人無人協同作戰」等作戰理念的融合與拓展,主要思路是不再由大型的、集多用途於一體的高價值作戰平台獨立完成多樣化作戰任務,而是將偵察、指揮、打擊、幹擾等主要作戰能力分散部署到各類作戰域的多異構體作戰平台上,由少量平台和海量協同發展為一般人的綜合設施,通過大量的綜合操作,有人這個作戰體系包括少量高價值有人平台和大量低成本無人平台,其中有人平台作為戰場決策者,負責作戰方案籌劃以及作戰任務分配和實施等相對復雜的任務;無人平台用於執行態勢感知、火力打擊等相對危險或簡單的任務,有人/無人密切協同完成作戰任務。

分散式海上作戰的本質是將海上高價值有人平台與低成本無人平台無縫鉸鏈與有機融合,透過高度的資訊共享、精準的任務聚合、高效的作戰協同來實現共同的作戰目標,具有作戰資訊按需共享、作戰任務深度整合、作戰資源精準規劃、作戰過程優化組織等顯著特點。透過有人/無人分散式協同,可以形成取長補短、功能銜接、能力相濟的新型海上高效作戰體系。分散式海上作戰突顯了兵力運用的可組合性、可消耗性和“去中心化”,注重人工智慧技術深度嵌入與全面應用,可以提升作戰體系韌性,推動實現海上方向聯合全局作戰向智能化方向發展。

分散式海上作戰的典型特徵

當前,智慧無人裝備加速發展,日益具備人裝融合、跨域協同、群集對抗、自主作戰等優勢,分散式海上作戰加速呈現廣域分佈協同、跨域多維融合、有人無人一體等典型特徵。

廣域分佈協同。廣域分佈協同是指,各作戰要素或作戰資源能根據戰場態勢進行自適應優化組合與調度,實現作戰體系精確聚能釋能。一是作戰體系分散部署。分散式海上作戰,作戰空間深度嵌入各個作戰域,作戰力量能夠進行分散式廣域分佈與部署。二是作戰體系智能重構。作戰體系更為輕便、精幹、靈敏,戰場環境自適應能力與體係動態優化重組能力顯著增強,能快速靈活調整所需作戰兵力與戰場資源。三是作戰能量集中釋放。作戰體系能夠透過裝備半自主或自主協調控制,實現全域作戰空間內各種作戰平台、作戰力量的快速機動、即時反應和協同作戰,確保作戰力量的精確集中能。

跨域多維融合。分散式海上作戰將集中式的戰鬥群模式轉變為分散式、敏捷式作戰模式,各種作戰單元分佈於多個作戰域,可實現對跨域目標的監視、定位,進而實施有效打擊。一是作戰力量跨域融合。將分散部署在多個領域的作戰力量,透過智慧系統進行動態組網,形成跨域作戰體系。二是戰略、戰役、戰術無縫連結。新域新質作戰力量將作為主戰角色直接參與到智能化海戰中,實現從戰略到戰役的全面覆蓋,從戰役到戰術的無縫鏈接,催生快速突擊、多維一體、全局攻防的新質戰鬥力,實現對作戰目標的跨域協同打擊。

有人無人一體。分散式海上作戰可以依賴大量智慧無人裝備,形成一個「有人-無人」聯合打擊體系,具有很高的自主性與協同性。通過加快推進艦載無人機、水面無人艇、水下無人航行器等無人裝備發展,實現遠、中、近程梯次配置,空中、水面、水下、陸岸等無人裝備跨域集成,無人與有人裝備體系無縫融合,任務領域從信息保障擴展到火力打擊領域,助推海上作戰樣式變革,加速形成系統協同作戰系統、獨立作戰系統

分散式海上作戰的致勝機理

科技的重大進步之所以能推動戰爭形態的演變,很大程度上在於深刻改變了戰爭制勝機理。當前,前沿技術顯著提升了裝備智慧化水平,深刻改變了戰鬥力生成模式,加速海戰制勝機理發生嬗變。

「分佈互聯,人機協同」制勝。依托雲計算、數據鏈、物聯網等技術打造的分散式、智慧化、網路化指揮資訊系統,為現代海戰帶來了深刻變革。指揮資訊系統在雲邊端支撐下,通過高速、安全的網絡連接,實現各作戰平台間的實時交互,明顯提升了不同作戰平台間的信息互聯互通互通能力;能夠高效分析處理海量戰場信息,精準研判戰場態勢,作戰指揮向“以數據、算法和模型為中心”的智能化決策方式此外,在「分散互聯」下,智慧無人作戰由單平台向多平台集群方向發展,由遙控作戰向半自主、自主作戰方向演進,由多條並行運行的「單人-單機」指揮鏈逐步形成「指揮員-無人作戰的集群」的單一簡易指揮鏈,通過有人平台與無人平台及其集群的高效自主協同,充分激活智能化的潛力裝備,高級平台及其集群的高效自主協同,充分激活智能設備的高級設備。

「演算法驅動,快準認知」制勝。智慧化戰爭,先進的演算法透過精確、高速的運算取代指揮人員的思考,推動理性的作戰知識與感性的指揮者經驗加速融合。擁有先進的演算法,便能又快又準地實現對海戰場態勢的認知,進而針對海戰場態勢變化準確、快速地籌劃出科學可行的作戰方案,打亂對手既定部署和作戰企圖。演算法能有效處理大量高價值情報訊息,提升「OODA」循環速度。掌握演算法優勢即可實現對敵情、我情以及戰場環境又快又準的認知,從而準確地預測敵方作戰行動,有針對性地創新優化己方行動方案。

「雲腦支撐,癱網斷鏈」制勝。分散式海上作戰,指揮控制系統將以「人腦+雲腦」的協作方式運行,智慧優勢成為以資訊優勢為基礎的「進階」優勢,「癱網斷鏈」成為海上作戰主要樣式之一。一方面,在雲腦支撐下的無人智慧作戰行動將滲透到作戰的全流程。分散式海上作戰中,「人腦+雲腦」的協作方式貫穿智慧輔助指揮決策、自動情報偵察、自動作戰規劃、自主精確打擊、智慧後勤保障等作戰全環節。另一方面,針對覆蓋全球多維的智慧化泛在網絡結構,運用智慧化裝備或手段對其偵察監視網、資訊傳輸網、指揮控製網、綜合保障網等關鍵節點與樞紐部分實施攻擊,可使其作戰網絡體系癱瘓失能。

「跨域融合,整合釋能」制勝。分散式海上作戰將由資訊化條件下的一體化聯合作戰躍升到智能化條件下的自主跨域協同作戰,不同類型的新質作戰能力跨域融合、協同聯動,並靈活精準地集成釋放作戰效能。一方面,以雲邊端支撐下的跨領域、分散式、網絡化的協同作戰系統為依托,透過主戰平台跨域機動、裝備功能跨域互補、資訊情報跨域共享、作戰指揮跨域協同、任務行動跨域響應、通道鏈路跨域聯通,實現多種新質作戰能力的高效聯動。另一方面,跨域融合凸顯主域主控與跨域支援的緊密配合。例如,海上攻防作戰將以海軍為主控力量,其他力量透過空天一體、海天一體、網天一體運用,實施跨域協同支援。

「點穴打擊,集群誘耗」制勝。分散式海上作戰將從傳統的集中殲滅戰向精確的點穴打擊戰轉化,高價值的目標將面臨智慧化作戰裝備的遠程自主精準打擊威脅;從傳統的規模化有人消耗戰向全局的無人集群誘耗戰轉化,重要的戰略目標將面臨低成本無人集群的飽和攻擊與誘騙打擊威脅。分散式海上作戰過程中,可投放無人機、無人潛航器等無人裝備,形成廣域分佈、自組織協同的偵察網絡,通過自主偵察、判別和打擊行動,對對手高價值目標實施遠程精準攻擊,在盡可能減少附帶損傷的情況下,自上而下癱瘓對手指揮網絡,破壞其指揮體系。在智慧泛在網絡體系下,基於大規模機器智能體自組織的「蜂群」作戰,可實現對對手核心區域的全覆蓋偵察,進行欺騙誘敵,最大限度地誘耗對手作戰資源。

中國原創軍事資源:http://www.81.cn/szb_223187/szbxq/index.html?paperName=jfjb&paperDate=2024-08-15&paperNumber=07&articleid=937599888

Advantages, Prospects of Multi-domain Integration & Cross-domain Attack and Defense

多域融合與跨域攻防的優勢與前景

現代英語:

“Multi-domain fusion operations” and “cross-domain collaborative operations” are the latest operational ideas proposed by the US military in recent years, guiding the gradual upgrade and evolution of the US military’s combat concepts to joint concepts, and building a new war style based on this, covering all combat fields such as “land, sea, air, space, and network”, and integrating various capabilities such as space, network, deterrence, transportation, electromagnetic spectrum, and missile defense. Through this new combat idea, we can compete with competitors such as Russia in various fields, develop asymmetric advantages, and ensure the leading position of our country’s military strength. What advantages do multi-domain fusion operations and cross-domain offense and defense have in actual combat, and what are their development prospects?

The evolution of the concept of global warfare

After the mid-1970s, the U.S. Army successively proposed combat concepts such as “central combat”, “expanded battlefield” and “integrated battlefield”, forming the “air-ground integrated combat” combat theory. Air-ground integrated combat requires the coordination and unity of ground forces and the air force, and conducts deep operations on the basis of the air force’s battlefield air interdiction and offensive air support. For the first time, the combat concept of multi-service coordinated operations appeared, and this combat theory was also tested in actual combat in the Gulf War. This is the starting point for the birth of the concept of multi-domain warfare and even global warfare.

On October 3, 2016, at the annual meeting of the Association of the United States Army, General David G. Perkins, then commander of the U.S. Army Training and Doctrine Command, delivered a public speech in which he used the word “domain” for the first time to accurately summarize the new form of international warfare, and put forward the view that “all domains of the United States are challenged” and “advantages in a single domain cannot win the war”, and then introduced the concept of “multi-domain combat”. The operational concept of “multi-domain combat” requires close cooperation between the combat forces of various services, abandoning the inertia of the service thinking of pursuing control in a single domain, and providing a “multi-domain solution” for the national command authorities.

In October 2018, the U.S. Army Training and Doctrine Command issued the 1.5 version of the concept of “U.S. Army Multi-Domain Operations 2028”. As the most mature version of the concept, it replaced the original word “battle” with “operation” and extended the concept of “multi-domain combat”. The concept of “multi-domain combat” is only applicable to the conflict stage, but in the case that the competition between nation states has become a new factor in the world situation, simply winning the actual conflict has very limited significance for the overall combat background, so the concept of “multi-domain” must be extended and deepened. The concept of “multi-domain combat” introduces relevant cross-government and cross-institutional elements into the “competition continuum” of “competition, armed conflict and return to competition”, and puts forward the three core concepts of “calibrating force posture, using multi-domain formations, and achieving multi-domain aggregation” in “multi-domain warfare”, clarifies the specific needs of “multi-domain formations”, and refines the corresponding combat capabilities that troops at different levels need to have in “multi-domain warfare”.

“Cross-domain coordination” refers to the mutual cooperation of various services to make up for the deficiencies of other forces in combat, thereby achieving complementary efficiency in various fields and successfully completing combat missions. Guided by the basic ideas of multi-domain integration and cross-domain coordination, the US military has formed the concept of “full-domain warfare”, that is, to develop the joint combat capabilities of various services throughout the entire process of combat and training, and realize the transformation of the army into a joint combat force.

The advantages of all-domain operations are obvious

Judging from the current international military development situation, countries will face an increasingly complex, deadly, extremely active, and urbanized battlefield. The combat environment is becoming increasingly fragile, and the combat mode of the traditional battlefield is no longer applicable to contemporary warfare. Against this background, the US military has proposed the concept of full-domain warfare in order to cope with the increasingly complex international environment. What are the advantages of multi-domain warfare and cross-domain attack and defense on the modern battlefield?

Multi-domain integration enables the advantages of different arms to overlap and their disadvantages to complement each other. The predecessor of multi-domain warfare, “Air-Land Integrated Warfare”, was a combat style of joint operations between the Air Force and the Army that the U.S. military attempted to establish in the early 1980s in response to the huge threat posed by Soviet tank clusters to NATO on the European plains. This combat mode requires a high degree of coordination between ground forces and air forces. Ground forces conduct offensive mobile defense operations on the front line, while the Air Force blocks the replenishment of front-line forces by striking the enemy’s rear, thereby providing tactical support to the front-line army. This is also the first time in the history of the U.S. military that the Air Force and the Army have conducted in-depth cooperation, which has increased the complexity and flexibility of the U.S. military’s operations, made the U.S. military’s tactical options richer and more dynamic, and posed a greater strategic deterrence to the enemy.

On the other hand, cross-domain attack and defense can expand asymmetric advantages and impose greater restrictions on the enemy’s power. Since the concept of cross-domain attack and defense emphasizes the coordination of offensive and defensive forces in different fields, during the battle, the army can exert greater pressure on the enemy through its own advantageous fields, making it difficult for the enemy’s power to be maximized, thereby expanding the asymmetric advantage, maximizing its own strength and weakening the enemy’s power. In recent years, all countries have attached great importance to the technical development and research in the field of network electromagnetics. To some extent, this is because the field of network electromagnetics is a new product that came with the information age. Emerging powers that try to catch up with old powers can establish their own advantages through the development of this field, while old powers do not want to be overtaken and have fields that can be used as weaknesses by the enemy. Therefore, all countries have unanimously regarded the research and development of the field of network electromagnetics as one of their current key areas of development, which also reflects the great power of cross-domain attack and defense in modern information-based intelligent warfare.

Global war has broad prospects for development

At present, the concept of “global warfare” only has a theoretical basis, and it still takes a lot of effort to convert theory into practice. The vice chairman of the US Joint Chiefs of Staff clearly stated in an interview: “The seamless integration of various fields and effective command and control are still a daunting challenge. We are not sure how to do it, and no one has a ready-made answer.”

In the process of achieving true joint operations, there are obstacles in various aspects, including culture, economy, and politics. These problems will affect the establishment of truly joint combat forces and joint combat modes. First, each service has formed its own unique combat style and combat culture in the long-term development process. The differences in the culture of different services may lead to different concepts of combat focus on the construction of joint combat forces, which in turn leads to unclear directions and goals for force construction. Secondly, the budget for military construction is limited, and each service will try its best to use it for the update and research and development of its own weapons and equipment, resulting in the budget giving priority to meeting the needs of each service rather than joint combat needs. Finally, it is difficult for the Ministry of National Defense to obtain the power of integrated government and allies. “Cross-domain coordination” is a game of national comprehensive power, which includes politics, economy, diplomacy, intelligence and other aspects. It requires the coordination and coordination of government agencies in various fields of the country, and relying solely on the Ministry of National Defense does not have enough power to achieve the integration of various forces.

These issues all affect the development of “all-domain warfare”, but in any case, as a new combat concept, “all-domain warfare” will surely become an important mode of future combat. The United States released the “Joint All-Domain Combat Software” in April this year, aiming to develop theater-level joint all-domain combat software to allocate combat resources and achieve coordinated killing in the fields of land, sea, air, space, and electromagnetic fields. This action also shows the United States’ determination to achieve “all-domain warfare.” (Zhang Haoyue, Shen Qiyou, Ma Jianguang)

(Editors: Huang Zijuan, Chen Yu)

現代國語:

“多域融合作戰”與“跨域協同作戰”是美軍近年來最新提出的作戰思想,指導著美國軍種作戰概念逐步向聯合概念升級演進,並以此為基礎打造全新戰爭樣式,建設涵蓋“陸、海、空、天、網”等全部作戰領域,融合太空、網絡、威懾、運輸、電磁頻譜、導彈防禦等各種能力的聯合作戰部隊。透過這種全新的作戰思想與俄羅斯等競爭對手在各領域內角力較量,發展不對稱優勢,確保本國軍事實力的領先地位。多域融合作戰與跨域攻防在實戰中有著怎樣的優勢,發展前景又如何呢?

全局戰概念演變過程

1970年代中期後,美國陸軍先後提出了「中心戰」、「擴大的戰場」和「一體化戰場」等作戰思想,形成了「空地一體戰」作戰理論。空地一體作戰要求地面部隊與空軍協調統一,在空軍實施戰場空中遮斷和進攻性空中支援的基礎上進行縱深作戰,首次出現了多兵種協同作戰的作戰思想,這一作戰理論也在海灣戰爭中得到了實戰檢驗。這就是多域戰乃至全局戰思想誕生的起點。

2016年10月3日,美陸軍協會年會上,時任美國陸軍訓練與條令司令部司令的大衛·G·珀金斯將軍發表公開演講,首次使用“域”一詞精確概括出了國際戰爭的新形式,提出美國“所有領域均受到挑戰”、“單一領域的優勢 無法贏得戰爭”等觀點,進而推出了“多域戰鬥”的概念。 「多域戰鬥」的作戰思想要求各軍種作戰力量之間密切合作,摒棄追求各自單一領域制權的軍種思維慣性,為國家指揮當局提供一種「多域方案」。

2018年10月,美國陸軍訓練與條令司令部頒布了《美國陸軍多域作戰2028》概念1.5版本,作為目前最為成熟的一版概念,它以“作戰”一詞替換了原有的“戰鬥”,對“多域戰鬥”概念進行了延伸拓展。 「多域戰鬥」的概念僅適用於衝突階段,但在民族國家競爭成為世界局勢新要素的情況下,僅僅贏得實戰衝突的勝利對於作戰大背景的意義是非常有限的,因此必須將「多域」概念延拓深化。 「多域作戰」這個概念就是在「競爭、武裝衝突和重回競爭」這個「競爭連續體」中引入了跨政府、跨機構的相關要素,提出「多域戰」中的「校準力量態勢、運用多域編隊、達成多域聚合」三項核心理念,明確了「多域編隊」的具體需求,細化了不同層級部隊在「多域作戰」中具備的具體領域作戰能力」。

「跨域協同」指的是各軍種透過相互合作彌補其他部隊在戰鬥中存在的不足進而實現各領域的互補增效,最終成功完成戰鬥任務。在多域融合與跨域協同的基本思想指引下,美軍形成了「全域戰」的概念,即在戰訓的全過程中發展各兵種聯合作戰的能力,實現軍隊向聯合作戰部隊轉型。

全局作戰優勢顯著

就目前國際軍事發展情勢來看,各國面對的將是一個日益複雜、致命、極度活躍、都市化的戰場,作戰環境越來越脆弱,傳統戰場的作戰模式已經不再適用於當代戰爭。在這種背景下,美軍提出了全域戰的理念,以期應對日益複雜的國際環境。多域作戰與跨域攻防在現代化戰場上究竟有何優勢呢?

多域融合能使不同兵種力量優勢疊加,劣勢互補。多域戰的前身「空地一體戰」就是20世紀80年代初,美軍為應對蘇聯坦克集群在歐洲平原對北約造成的巨大威脅而試圖建立的空軍與陸軍協同作戰的作戰樣式。這種作戰模式要求地面部隊與空中力量高度協同,地面部隊進行前線進攻性機動防禦作戰,空軍則透過打擊敵軍後方阻滯其對前線兵力的充實,進而為前線陸軍提供戰術支援。這也是美軍歷史上 首次進行空軍與陸軍的深度協作,提高了美軍軍隊作戰的複雜度與靈活性,使美軍戰術選擇更加豐富且具有活力,對敵人造成更大了戰略威懾。

另一方面,跨域攻防能擴大不對稱優勢,對敵軍力量發揮產生更大限制。由於跨域攻防的概念強調不同領域攻防力量相互配合,因此,在戰鬥過程中,軍隊可以透過自己的優勢領域向敵軍施加更大壓力,使敵人的力量難以得到最大程度的發揮,進而擴大不對稱優勢,最大程度展現自身實力而削弱敵軍力量。各國近年都來非常重視網路電磁領域的技術開發研究,某種程度上就是因為網路電磁領域是隨著資訊時代而來的新產物,試圖趕超老牌強國的新興大國能夠透過這個領域的發展建立自身優勢,而老牌強國不希望被追趕,出現能夠被敵軍當作弱點打擊的領域。因此各國都不約而同地將網路電磁領域的研究發展作為了自己目前發展的重點領域之一,這也體現了跨域攻防在現代資訊化智慧戰爭中的巨大力量。

全局戰發展前景廣闊

目前,「全局戰」這一理念只是擁有了理論基礎,要將理論轉換為實踐仍需許多努力,美軍參聯會副主席在接受采訪時明確表示:“各領域的無縫融合和有效 指揮控制仍是一項艱鉅的挑戰,我們還不清楚究竟要如何做到,沒人有現成的答案。”

在實現真正的聯合作戰過程中,存在著包括文化、經濟、政治等各方面的阻礙,這些問題都會影響真正意義上的聯合作戰部隊、聯合作戰模式的建立。首先,各軍種在長期發展過程中都形成了本軍種特有的作戰樣式與戰鬥文化,不同軍種文化的分歧可能導致對聯合作戰部隊建設的作戰重點觀念不同,進而造成部隊建設的方向模糊,目標不明確。其次,軍隊建設預算有限,各軍種都會盡力爭取用於自身武器裝備更新研發,導致預算優先滿足各軍種需求而非聯合作戰需求。最後,國防部難以獲取整合政府與盟國力量,「跨域協同」是國家綜合力量的博弈,包含了政治、經濟、外交、情報等各個方面,需要國家各領域政府機構力量的配合協同,而僅依靠國防部是沒有足夠的權力實現各力量的整合。

這些問題都影響著“全局戰”的發展進程,但無論如何,作為新型作戰理念的“全局戰”都必將成為未來作戰的重要模式,美國更是在今年4月發布了“聯合全局作戰軟體”,旨在開發戰區級聯合全局作戰軟體,以編配作戰資源,實現陸、海、空、天、電磁等領域的協同殺傷。這項行動也昭示了美國實現「全域戰」的決心。 (張顴月、申起有、馬建光)

(編按:黃子娟、陳羽)

中國原創軍事資源:https://military.people.com.cn/n1/2020/0817/c1011-31824792888.html

Chinese Military Self-coupled Operations: China’s New Trend in Future Joint Operations

中國軍隊自主耦合作戰:中國未來聯合作戰新趨勢

現代英語:

Faced with changes in technology, warfare, and opponents, the combat mode of fixed formation, task balance, and tree-shaped command formed in traditional warfare will be difficult to adapt to battlefield needs. It is urgent to change the concept and innovate the implementation of self-coupling operations. The so-called self-coupling operations refer to the support of big data, cloud computing, and intelligent network information systems. The participating forces focus on the commander’s intentions, based on mission objectives and combat needs, breaking through regional, organizational, and field restrictions, and instantly perceive the situation, quickly and dynamically form groups, and autonomously match tasks, aggregate system advantages, and maximize the release of system combat capabilities.

Using the most appropriate forces to carry out the most appropriate tasks and achieve the best release of combat effectiveness has always been the highest level of war guidance.

Turning over the pages of human war history, coupling energy release is closely related to the development of war and command coordination. What has changed is the coupling organizational form – evolving from “other coupling” to “self coupling”; what remains unchanged is the pursuit of coupling value – the pursuit of the best release of combat effectiveness and the pursuit of the best combat benefits.

In the cold weapon era, the two sides formed simple formations and fought face to face. The war leaders often relied on their own exemplary role or simple organization to achieve effective coordination of different combat forces and combat actions, thereby maximizing the release of combat energy. In this sense, in the cold weapon era, combat was mainly organized by the commander’s orders, that is, “hetero-coupling”.

In the era of hot weapons, with the increase of the strike distance, weapons and equipment such as artillery, aircraft, tanks, and ships have appeared one after another. Combat operations have become more complicated and mutual coordination has become more important. Commanders and their command agencies must make careful pre-war planning and rely on wired/wireless communications to implement wartime control. The release of combat effectiveness is mainly achieved by the force organization, task allocation, action sequence, and support guarantee determined by the commander, that is, it has not yet gotten rid of the constraints of “other coupling”. However, due to the rapid changes in the battlefield situation, pre-war planning and organization have been difficult to adapt to actual combat needs. In response to battlefield uncertainty, with a focus on giving full play to the subjective initiative of the task force, command methods such as decentralized command, delegated command, and task-based command have emerged one after another. From the perspective of energy release, these command methods can be used as self-coupling operations based on command authorization.

In modern joint operations, unmanned forces have emerged, long-range precision strikes have become the new cutting-edge, stealth and high speed have gradually become the main force, multi-dimensional battlefields are deployed in full depth, multiple forces are mixed, and multi-domain operations are coordinated and efficient. Although the release of combat effectiveness still relies on “other coupling”, more emphasis is placed on “self-coupling”. The concept of “mosaic warfare” proposed by foreign militaries in recent years aims to emphasize the use of technical architecture to enable existing systems to be flexibly networked and quickly configured, and to provide the desired combat capabilities at the time and place specified by the commander. In recent years, in local wars and armed conflicts, the military of some countries has reconstructed the killing link based on the network information system, issued tasks based on the network, and the combat units implemented “order-based” strikes, which has begun to show signs of self-coupling operations.

Information and intelligent technology provides a means to support the best release of combat effectiveness, and it is mandatory to migrate to self-coupling combat.

With the widespread use of new technologies such as big data, cloud computing, artificial intelligence, and quantum communications, it has become possible to distribute combat forces in all dimensions and to make heterogeneous isomorphism, to make extreme use of combat resources and to release them on demand, thus forcing the transformation of combat methods to self-coupled combat.

Real-time battlefield situation perception provides a “smart eye” for self-coupled operations. Supported by information network technology, multi-domain, multi-dimensional and multi-dimensional early warning and reconnaissance means such as space-based monitoring, air early warning, maritime detection, underwater surveillance, and ground perception can obtain battlefield intelligence information in real time and efficiently process and integrate various types of information, so that combat units distributed in various fields and full depth can obtain complete, accurate, and real-time battlefield situations, so that the entire combat system can clearly perceive potential threats and accurately judge the targets of attack, providing a “clairvoyance” for its autonomous implementation of combat operations.

Cross-domain operations and real-time strikes provide an “arm” for self-coupling operations. The concept of “multi-domain warfare” proposed by foreign militaries is actually a combination of the strengths of multiple domains to overcome the weaknesses of other domains. In recent local wars, foreign militaries have practiced cross-generational integration, system-based counterattacks, division-based counterattacks, and unmanned clusters to attack high-value targets with humans, which mostly reflect this asymmetric balance concept of multi-domain operations. The development of intelligent technology will further change this way of fighting. The “perception-decision-strike-assessment” link of various combat units will achieve instantaneous transmission from “sensor to shooter”, and strike preparations will achieve “zero warm-up”, and “discovery is destruction” can be truly realized. This “zero reaction” of cross-domain operations provides a “fist” for the implementation of self-coupling operations.

Highly intelligent decision-making systems provide the “brain” for self-coupled operations. With the evolution of artificial intelligence, the “external brain” functions of staff officers, such as auxiliary decision-making, command and control, and evaluation and deduction, will be increasingly replaced by artificial intelligence “smart brains”, and ubiquitous “intelligent staff officers” will replace the large group of staff officers. With the support of intelligence, force allocation will shift to real-time task-based combination, force selection will shift to domain aggregation, system selection, and on-demand selection, combat operations will shift to immediate response, synchronous collaboration, and precise energy release, the command system will be reshaped into a command structure with star-point distribution and different authority, and the command method will shift to task issuance and node control. Strike power, information power, and protection power will be released on the most appropriate target at the most needed time and in the most appropriate way to achieve the maximum transformation of combat potential.

The network information system provides the “meridians” for self-coupling operations. With the development of information technology, the network aggregation function of the network information system is more powerful than ever before. The dispersed combat forces, combat units, and weapons and equipment become equal network information nodes based on various information links, and can obtain and use information without distinction. Just like the meridians of the human body, this characteristic of the network information system not only facilitates the command organization to issue instructions and control actions, but also transports blood and provides nutrients for combat units. Based on the network information system, the joint combat command organization can not only issue tasks in the cloud to truly achieve “decentralization”, but also monitor the battlefield situation, perceive the effects of operations, and deploy force resources; combat units can carry out “order-based” task selection, and carry out autonomous actions based on network intelligence brains to minimize internal consumption of forces and form local optimal combat capabilities.

Strive to explore the way of combat operations dominated by “other coupling” in strategic campaigns and “self coupling” in tactics

Victory always smiles upon those who can foresee the changes in the nature of war. In response to changes in technology, warfare, and opponents, we must base ourselves on the current reality of the troops, look forward to future combat developments, and step up efforts to promote concept renewal, training transformation, and condition building, so as to get closer and closer to actual combat.

Actively promote the renewal of combat concepts. At present, intelligent unmanned combat forces have been widely used in modern battlefields, and joint operations are rapidly developing towards cohesive integration. We should break through the constraints of the concept of controlling platform weapons and transform to system optimization, highlight the rapid combination of forces and planning actions in battle, and build a modular and resilient combat system; we should break through the constraints of the traditional concept of the number of combat resources and transform to micro-group multi-function, build a highly intelligent combat group, and promote the transformation of the combat system to adaptive and system-emergent functions; we should break through the constraints of the traditional concept of overall control and transform to task command, set tasks, goals, and forces based on the situation, and promote the action mode of superior card point command and multi-level parallel implementation; we should break through the constraints of the traditional concept of coordination and transform to autonomous combat, based on task allocation, rule coordination, and situation collaboration, to promote the optimal release of combat energy.

Speed up the improvement of the combat rules system. The promotion of self-coupling combat is inseparable from the rules and constraints of unified action, mutual integration, and coordination of various combat forces within the system. These rules are not only the necessary prerequisites for intelligent decision-making support systems, but also the key to avoiding arbitrary actions and coordination disorders. An efficiency priority rule should be established, that is, according to the combat capabilities and strike effects of multi-domain combat units, the effectiveness of paralysis and disability should be used as the force selection standard to provide a basis for the integration of combat forces in different domains and of different qualities; a force-dominant rule should be established, that is, the coordination relationship between different forces should be clarified, and force-dominant rules should be established according to tasks, sub-targets, and fields, to provide a basis for the timing and coordination of combined domain actions; an authorization rule should be established, that is, combat units perform the command and responsibility of a certain field, a certain direction, or a certain action according to the authorization of the commander, to provide a basis for responding to the battlefield and commanding the lower level; a control rule should be established to clarify the timing, method, and authority of the commander’s control to ensure that the operation is always carried out according to the commander’s intention.

Focus on building a strong information support network. The joint combat system supported by cloud connection is the prerequisite for achieving system confrontation and system optimization. We should focus on the high-speed flow of information, build a cloud battlefield network chain that penetrates the barriers of military services, shares intelligence information, and connects combat units, to provide support for the dispersed deployment, network-based reorganization, and cross-domain integration of combat forces; we should aim at intelligent decision-making, accelerate the development of intelligent auxiliary models for rapid information processing and rapid solution generation, and provide support for cloud-based task release and intelligent order matching; we should improve the data resource pool, distinguish between enemy and friendly combat targets, platform equipment, combat units, and combat groups, and build a resource pool with fresh and authentic data and dynamic updates to provide objective support for mission operations.

現代國語:

來源:中國軍網-解放軍報 作者:彭海 劉孝良 張付林 責任編輯:黃敏

2023-03-30 06:52:00

面對科技之變、戰爭之變、對手之變,傳統戰爭中形成的固定編組、任務衡定、樹形指揮的作戰模式將難以適應戰場需要,亟需轉變觀念,創新實施自耦合作戰。所謂自耦合作戰,是指依託大數據、雲計算、智能化的網絡資訊體系支撐,參戰力量圍繞指揮員意圖,基於任務目標與作戰需求,打破地域、建制和領域限制,即時感知態勢、快速動態組群、自主匹配任務,聚合體系優勢,最大限度地釋放體係作戰能力。

用最合適力量遂行最恰當任務,達到作戰效能最佳釋放,歷來是戰爭指導的最高境界

翻開人類戰爭史的畫卷,耦合釋能與戰爭發展相生相伴、與指揮協同緊密關聯。變化的是耦合組織形式——從「他耦合」到「自耦合」演進;不變的是耦合價值追求——追求作戰效能最佳釋放,尋求最佳作戰效益。

冷兵器時代作戰,雙方擺成簡單隊形,展開面對面廝殺,戰爭指導者往往依靠自身的表率作用或簡單的組織,來實現不同的作戰力量、作戰行動的有效配合,從而最大限度地釋放作戰能量。從這種意義上看,冷兵器時代作戰,主要是透過將帥的發號施令,即「他耦合」來組織能量釋放。

熱兵器時代,隨著打擊距離的增大,火砲、飛機、坦克、艦艇等武器裝備相繼出現,作戰行動更加復雜,相互配合更加重要,必須由指揮員及其指揮機關進行周密戰前籌劃,依靠有線/無線通信實施戰中調控。作戰效能釋放,主要依靠指揮者所確定的力量編組、任務分配、行動時序、支援保障來實現,即仍沒有擺脫「他耦合」束縛。但由於戰場態勢的快速變化,戰前規劃組織已經難以適應實戰需求。應對戰場不確定性,著重發揮任務部隊主觀能動性,分散指揮、委託式指揮、任務式指揮等指揮方式相繼出現。從能量釋放角度來看,這些指揮方式可以作為基於指揮授權實施的自耦合作戰。

現代聯合作戰,無人力量嶄露頭角,遠程精打成為新銳,隱身高速漸成主力,多維戰場全縱深布勢,多元力量混合發力,多域行動協同增效,雖然作戰效能釋放還依靠“他耦合”,但更加註重“自耦合”。近年外軍提出的「馬賽克戰」概念,旨在強調透過技術架構使已有系統靈活組網並快速配置,在指揮官指定時間與地點提供期望的作戰能力。近年來,局部戰爭和武裝沖突中,有的國家軍隊基於網絡資訊體系,重構殺傷鏈路,依網發布任務,作戰單元實施「接單式」打擊,已經初現自耦合作戰端倪。

資訊化智慧化技術為作戰效能最佳釋放提供了手段支撐,強制要求向自耦合作戰遷移

隨著大數據、雲計算、人工智慧、量子通訊等新技術的廣泛運用,使作戰力量全維分佈、異質同構,作戰資源極限運用、按需釋放成為可能,強制推動作戰方式向自耦合作戰轉變。

戰場態勢即時感知為自耦合作戰提供了「慧眼」。在資訊網絡技術支撐下,天基監控、空中預警、海上探測、水下偵監、地面感知等多域多維多元預警偵察手段,實時獲取戰場情報信息,高效處理融合各類信息,使得分佈於各領域、全縱深的作戰單元,可以獲得完整、精準、實時的戰場態,使整個作戰體係可以清晰感知潛在威脅、準確性打擊目標

跨域行動即時打擊為自耦合作戰提供了「臂膀」。外軍提出的「多域戰」概念,其實質是集多域之所長克他域之所短。在近幾場局部戰爭中,外軍實踐的跨代融合、體系抗擊、以分抗散,以無人集群打有人高價值目標等大都體現了多域作戰的這一非對稱制衡理念。智慧技術發展將進一步改變這種作戰方式,各類作戰單元“感知—決策—打擊—評估”鏈路將實現從“傳感器到射手”的瞬間傳遞,打擊準備實現“零預熱”,“發現即摧毀”得以真正實現。這種跨域行動“零反應”,為實施自耦合作戰提供了“拳頭”。

高度智慧決策系統為自耦合作戰提供了「大腦」。隨著人工智慧的演進,參謀人員的輔助決策、指揮控制和評估推演等「外腦」功能,將更多地被人工智慧「智腦」所取代,泛在的「智慧參謀」將取代龐大的參謀人員群體。在智能化加持下,力量編配將向基於任務的實時組合轉變,力量選用將向並域聚優、體系選優、按需擇優轉變,作戰行動將向即時反應、同步協作、精準釋能轉變,指揮體係將重塑為星點分佈、權限不同的指揮架構,指揮方式向任務下達、節點把控轉變,打擊力、信息力、最成功

網絡資訊體係為自耦合作戰提供了「經絡」。隨著資訊科技的發展,網絡資訊體系的網聚功能較之以往任何時代都更加強大,分散配置的作戰力量、作戰單元、武器裝備基於各種資訊連結成為地位平等網絡資訊節點,可無差別獲取與使用資訊。正如人體的經絡一樣,網絡資訊體系這一特性,不僅為指揮機構下達指令、調控行動提供便利,也為作戰單元輸送血液、提供養分。基於網絡資訊體系,聯合作戰指揮機構不僅可以雲發布任務,真正實現“去中心化”,也可監控戰場態勢、感知行動效果、調配力量資源;作戰單元可以進行“接單式”任務選擇,基於網絡智腦進行自主式行動,最大限度地降低力量內耗,形成局部最優作戰能力。

努力探索戰略戰役上「他耦合」為主導、戰術上「自耦合」為主體的作戰行動之道

勝利總是向那些能預見戰爭特性變化的人微笑。應對科技之變、戰爭之變、對手之變,必須立足當前部隊實際、前瞻未來作戰發展,加緊推動觀念更新、訓練轉型、條件建設,向著實戰貼近再貼近。

積極推動作戰理念更新。當前,智慧無人作戰力量已大量運用於現代戰場,聯合作戰正向內聚式融合快速發展。應突破掌控平台利器觀念束縛向體系聚優轉變,突出戰中快速組合力量、規劃行動,打造模塊化韌性強的作戰體系;應突破傳統作戰資源多少觀念束縛向微群多能轉變,打造高度智能化作戰群,推動作戰體係向自適應、系統湧現功能轉變;應突破傳統統攬統管觀念束縛向任務指揮轉變,基於態勢定任務、定目標、定力量,推動上級卡點指揮、多級並行實施的行動方式;應突破傳統協同觀念束縛向自主作戰轉變,基於任務編配,基於規則配合,基於態勢協作,推動作戰能量最佳釋放。

加緊完善作戰規則體系。推動實現自耦合作戰,離不開對體系內部各作戰力量統一行動、互相融合、協調配合的規則約束。這些規則,既是智慧化輔助決策系統必備的前提,也是避免行動隨意、協同失調的關鍵。應建立效能優先規則,即根據多域作戰單元作戰能力、打擊效果,以癱體失能成效為力量選用標準,為不同域、不同質作戰力量融合提供依據;應建立力量主導規則,即明確不同力量間協同關系,按任務、分目標、逐領域建立力量主導規則,為並域行動時序、配合提供依據;應建立授權性規則,即作戰單元根據指揮員授權履行某一領域、某一方向或某一行動指揮權責,為響應戰場、指揮下沉提供依據;應建立調控性規則,明確指揮員調控時機、調控方式、調控權限,確保作戰始終按指揮員意圖實施。

著力建強資訊支撐網系。雲聯支撐的聯合作戰體系,是實現體系對抗、體系聚優的前提基礎。應著眼資訊高速流轉,打造貫通軍種壁壘、共享情報資訊、銜接作戰單元的雲態戰場網鏈,為作戰力量分散部署、依網重組、跨域融合提供支撐;應瞄準智能決策,加速研發信息快速處理、方案快速生成的智能輔助模型,為任務雲發布、依網重組、跨域融合提供支撐;應瞄準智能決策,加速研發信息快速處理、方案快速生成的智能輔助模型,為任務雲發布、接單智能匹配.

中國原創軍事資源:http://www.81.cn/ll_208543/16213160888.html