With the widespread use of advanced technologies such as big data, neural networks, and cloud computing, artificial intelligence is driving the transformation of decision-making thinking, models, and methods with unprecedented power. Decisions based on intuition and experience in the era of small data will give way to decisions based on full sample data in the era of intelligence, and the latter will become a new paradigm for winning on the battlefield. Accelerating the integration of artificial intelligence into modern command decision-making and better realizing the complementary advantages of human brain thinking and machine computing can promote the overall improvement of the level of military command decision-making.
Clarify the advantages of intelligent integration
The intelligent nature of future wars will continue to increase, and it is necessary to make the best decision quickly according to the changes in the enemy situation, our situation and battlefield environment. Simple human brain decision-making is no longer able to adapt to the rhythm of modern warfare. It is necessary to actively use artificial intelligence to achieve rapid and efficient military command decision-making through human-machine collaboration and complementarity. Data-driven decision-making focuses on big data resources for data mining and comprehensive analysis, discovers data associations and unknown laws, and assists commanders in making decisions based on this. Autonomous decision-making relies on the big data analysis platform, combines perception, cognition and decision support, and accurately generates and optimizes decision-making plans on the basis of ensuring timeliness. Pre-practice decision-making, by using the decision simulation system, experiments, tests, demonstrates and optimizes the combat plan before the combat decision results are converted into combat actions, and extracts the best action plan. From this point of view, artificial intelligence will become the “all-source analyst” of the battlefield. With its powerful data and algorithm advantages, it will expand the commander’s breadth and depth of cognition of the battlefield, and can achieve more accurate situation perception, more reliable battle situation judgment, and faster command and control.
Focus on integrating quasi-intelligent
Algorithms, computing power and data are both the internal driving force and core support for the development of artificial intelligence, and should be integrated into the key links of the entire command and control process. We should enhance situational awareness and provide an intelligence basis for command decision-making. We should network and connect the perception systems in the multi-dimensional battlefield, use data mining, deep learning and other technologies to process and utilize a large number of heterogeneous data streams obtained from multiple sources, extract useful battlefield intelligence, and grasp the changes in battlefield situation, so as to achieve effective transformation from information advantage to decision-making advantage. We should strengthen cognitive decision-making capabilities and provide important support for command decision-making. We should focus on the objective reality that the battlefield situation is changing rapidly and the weight of the time factor is constantly increasing. Based on data information technology and artificial intelligence technology, we should organically combine new technologies, new tactics and experience decisions, so as to combine qualitative and quantitative analysis, improve the single-loop decision-making speed of our own OODA loop, expand the breadth of parallel decision-making, and seize cognitive initiative by using speed to defeat slowness, so as to form an effect similar to dimensionality reduction strike. We should optimize coordination and control capabilities and provide solid guarantees for command decision-making. We should use big data analysis technology to explore and compare anomalies in enemy data, quickly capture opportunities for enemy confusion, errors, weaknesses, etc., change the past command model of determining the next action based on the results of the action, adjust decisions in advance, dynamically deploy troops, simulate and measure the effects of actions, and coordinate and control troops to launch troop maneuvers.
Avoiding the risks and challenges of integrating intelligence
Artificial intelligence is susceptible to defective data input, and there are problems such as “garbage in, garbage out”. At the same time, the black box nature of artificial intelligence makes it difficult for people to understand why and how the machine makes decisions, and it is difficult to identify whether the data is damaged and produces wrong results. Therefore, we must work hard on the input end of artificial intelligence. Focus on the application scenarios of artificial intelligence, identify false, forged, and low-quality data, deeply explore data relationships, and improve the integrity of information required for decision-making. Remove the false and retain the true, and increase the accuracy of training data. We must work hard on the interactive end of human-machine collaboration. The biggest dilemma of human-machine collaborative decision-making lies in the interaction between people and machines. There is uncertainty in human-machine interaction, and poor information communication may produce unpredictable and inexplicable results. It is necessary to accelerate the development of intelligent human-machine communication models. We must work hard on the operation end of machine inference. The current “machine learning”, “supervised learning” and “reinforcement learning” have been realized, but we should continue to seek breakthroughs, fully absorb various technical means, optimize model design, and improve database construction. We must work hard on the distribution end of human-machine decision-making. The human brain and machines each have their own advantages. We should focus on strengthening artificial intelligence with “human participation”, reasonably define the level, scope and degree of integration of artificial intelligence into command decision-making, intervene in human brain judgment at critical times, and control the overall safety and reliability of human-machine collaboration.
Realize efficient and orderly integration of intelligence
At present, military intelligence, with intelligence as the core, informatization as the basis, and networking as the symbol, is developing rapidly. Major countries in the world are actively exploring the advantages of artificial intelligence, hoping to make faster and better military decisions than their opponents, while creating more decision-making dilemmas for their opponents. We must keep up with the world trend, focus on top-level design, fully understand and give play to the auxiliary support role of intelligent technology in command decision-making, explore the human-machine collaborative decision-making model that conforms to the characteristics of our army, and guide the construction of the command capability system. We must adhere to systematic guidance and optimize the structure to design the human-machine collaborative path. According to the decision-making purpose and capacity requirements of strategic, campaign, and tactical combat command, distinguish between command, control, communication and other task areas, take into account the respective advantages and characteristics of “man and unmanned”, fully demonstrate the adaptability of artificial intelligence in the field of military command decision-making and possible problems, and systematically design the fields, methods and integration degree of artificial intelligence integration. We must adhere to the division of labor principles of human-led, machine-assisted, learning from each other’s strengths and weaknesses, and coordinated cooperation, design our respective exploration boundaries, and realize the transformation from auxiliary decision-making to intelligent decision-making.
Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.
Characteristics of the cognitive domain of value attack and defense
Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:
Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.
Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.
Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.
The mechanism of cognitive domain of value attack and defense
Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.
Impacting the value “protection zone”. Occupying the commanding heights of values is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values that are beneficial to themselves in order to achieve combat objectives.
Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.
Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.
The main means of cognitive domain in value attack and defense
Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.
Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.
Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.
In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.
Most of the local wars and armed conflicts in recent years have been “hybrid” confrontations carried out in multiple dimensions and fields, emphasizing the use of military, political, economic and other means to implement systematic control in the dimension of comprehensive decision-making, creating all kinds of chaos in the dimension of international communication, and creating various chaos in the dimension of international communication. Conduct targeted strikes in the strategic focus dimension, actively shape the battlefield situation, and seek to seize the strategic initiative. In future wars, in order to successfully fight political and military battles and military and political battles, we should deeply grasp the characteristics and laws of offensive and defensive operations in the cognitive domain and improve our ability to fight the “five battles” well.
Be proactive in cognitive operations, shape the situation and control the situation, and fight proactively. Before the war begins, cognition comes first. With the continuous development and evolution of war forms, the status and role of cognitive domain operations continue to be highlighted. Aiming to win future wars, cognitive deployment should be carried out in advance. Through strategies, information, technology and other means and carriers, the physiological, psychological, values and other cognitive factors of target objects should be affected, intervened and manipulated, and cognitive attack and defense should be used to cover military operations and accurately Efficiently dominate cognitive space. Fully understand the importance of being first, grasp the definition and interpretation power of “narrative” flexibly and autonomously, emphasize pre-emption to win the initiative in the cognitive narrative struggle dimension, create a favorable situation in which legal principles are in hand and morality is on our side, and occupy the moral commanding heights.
Cognitive operations focus on attacking the heart, and implement layered strategies to fight precise battles. “Those who are good at fighting will benefit others without killing them.” In future wars, the combat space will extend to the deep sea, deep space, deep network and other fields, and the battlefield space and time will present the characteristics of being extremely far, extremely small, extremely intelligent and uninhabited, invisible, and silent. We should keep a close eye on cognitive gaps to improve effectiveness, and use methods such as big data simulation, artificial intelligence matching, and psychological model evaluation to analyze and control the key information of cognitive subjects to achieve effective penetration and early deterrence of cognitive subject information. Closely focus on cognitive blind spots to enhance penetration, target the ideological consensus points, psychological connection points, and spiritual pillar points that maintain the unity of powerful enemy alliances to carry out effective strikes, and use their cognitive differences and interest conflicts to achieve differentiation and disintegration at all levels.
Based on cognitive combat strategies, we must penetrate the entire territory and fight for deterrence and control. In future wars, the strategic competition and tactical confrontation between the two warring parties will be extremely fierce. We should pay close attention to the decision-making process and make comprehensive efforts to increase the opponent’s decision-making dilemma and form our own decision-making advantages. On the one hand, we must pay more attention to key nodes such as the enemy’s decision-making center, command hub, reconnaissance and early warning system, and use advanced strike methods to physically destroy these nodes. On the other hand, we must pay more attention to the “soft kill” effects of cognitive shaping, cognitive induction, cognitive intervention and cognitive control, and embed cognitive domain operations into “hard destruction”, which not only creates a strong deterrent through precise strikes with high-tech weapons, but also integrates new qualities The combat power is expanded to the cognitive dimension, thus forming an asymmetric check and balance advantage.
Cognitive combat information is king, expand the field and fight for support. Future wars cannot be separated from strong information support, and system integration should be accelerated to gain data advantages. First of all, speed up the construction of cognitive offensive and defensive operations theory library, database, talent library, case library, and tactics library, dynamically collect and update the current status of the enemy’s cognitive offensive and defensive operations capabilities, and provide all-round support for cognitive offensive and defensive operations. Secondly, speed up the creation of the integrated media communication matrix, improve the self-owned platform system, speed up the deployment of network platforms, focus on system integration and collaboration, break down the “barriers” of information interconnection as soon as possible, and achieve cognitive integration and sharing, and comprehensive results. Thirdly, accelerate the coupling and linkage of information and cognitive domain operations, vigorously develop core technologies such as neural network systems, artificial intelligence applications, cognitive decision-making, psychological attack and defense, mine and analyze cross-domain and heterogeneous cognitive information, and improve the information fusion system of cognitive means to win the future. War provides “clairvoyance” and “early ears”.
Cognitive combat coordination is the key, and multi-dimensional efforts are used to fight the overall battle. Future wars are joint operations carried out in land, sea, air, space, network, electromagnetic and other fields. System thinking should be adhered to, the awareness of collaboration should be strengthened, and the compatibility and coordination of cognitive domain operations and other military operations should be improved. For example, it can integrate human intelligence, geographical intelligence, open source intelligence, etc., quickly collect and process massive data, remove falsehoods while retaining truth, seize cognitive space accurately and efficiently, achieve complementary advantages, and form cognitive advantages through full domain coverage. By networking dispersed multi-domain forces, we can establish an all-domain joint force with high connectivity, collective action, and overall attack to achieve the effect of “integrated deterrence.” By integrating national resources, strengthening strategic communication, using cognitive momentum to amplify the effects of political disruption, economic sanctions, and diplomatic offensives, and cooperating with military operations to put pressure on target targets in an all-round way, we strive to defeat the enemy without fighting.
(Author’s unit: University of Aerospace Engineering)
With the continuous development of science and technology, the form of war has entered the era of information warfare. Information has become the dominant element of combat effectiveness. Both combatants are engaged in fierce confrontation around the collection, transmission and processing of information. Cyberspace is a channel for the transmission of data and information. The bridge between modern combat units.
The U.S. military was the first to militarize cyberspace. In 2008, the United States established the Air Force Cyber Command and defined cyberspace as the entire electromagnetic spectrum space, extending cognition and practice from the narrow information domain to the broad cyber domain. . In January 2018, the U.S. Army Training and Doctrine Command (TRADOC) released “TP 525-8-6 U.S. Army Cyberspace and Electronic Warfare Operational Concept 2025-2040”, which describes how the U.S. Army will operate in cyberspace and electronic warfare. operate in the electromagnetic spectrum to meet the challenges of future operational environments. Compared with other traditional combat domains, what impact will cyberspace have on future operations? In the context of future integrated joint operations, what breakthroughs can it bring to multi-domain joint operations?
Mysterious – Cyberspace Operations
The fifth major area of information warfare. The term cyberspace first appeared in the 1982 Canadian science fiction novel “Fragments of the Holographic Rose”, which describes a cyberspace where the Internet and human consciousness are integrated. According to the U.S. Department of Defense Military Vocabulary Dictionary, cyberspace is a global domain within the information environment that consists of independent information technology infrastructure networks, including the Internet, telecommunications networks, various local area networks and computer systems, and embedded processors and controller. With the continuous development of network technology, cyberspace has expanded from computer networks to the invisible electromagnetic spectrum, which is a physical field in the electromagnetic environment. It includes not only computer networks as we usually recognize them, but also all physical systems that use various types of electromagnetic energy.
In addition, in modern warfare, cyberspace is a new field of information warfare. It has been listed by the US military as one of the five areas that are as important as land, sea, air and space and must maintain decisive advantages. It involves network warfare, information warfare, electronic warfare, space warfare, command and control warfare, C4ISR and other fields. It is a fifth-dimensional battle space that transcends the traditional four-dimensional battle space of land, sea, air and space. It is both relatively independent and embedded in other fields. Compared with traditional fields, cyberspace has the characteristics of blurred border boundaries, wide coverage, and complex and changeable situations.
Cyberspace operations transcend the limitations of time and space. Due to the lack of geographical boundaries and natural boundaries in the electromagnetic spectrum, cyberspace transcends the limitations of geographical boundaries, time and distance, allowing cyberspace operations to occur almost anywhere, across land, sea, space and air operations, integrating traditional In the four-dimensional combat space field, attacks on remote targets can be carried out instantly. Since the propagation speed of information in cyberspace is close to the speed of light, high-speed information transmission will greatly improve combat efficiency and capabilities, and provide the ability to make quick decisions, guide operations, and achieve expected combat effects. More importantly, according to operational needs, achieving military goals or military effects in or through cyberspace can be divided into two types: offensive cyber operations and defensive cyber operations.
Offensive cyber operations refer to preventing, weakening, interrupting, destroying or deceiving the enemy’s network in cyber space to ensure one’s own freedom of action in cyber space. Its main actions include the implementation of electronic system attacks, electromagnetic system blockade and attack , network attacks and infrastructure attacks, etc. Defensive cyber operations include activities to defend, detect, characterize, counter and mitigate cyberspace threat events, aiming to protect the U.S. Department of Defense network or other friendly networks, maintain the ability to passively and proactively exploit friendly cyberspace, and protect data , network and other specified system capabilities.
Electromagnetic warfare in cyberspace
Strategic deterrence, public opinion wins. In recent years, there have been an increasing number of cyber attacks against economic, political, military and other targets. Due to the characteristics of large scale, good concealment, and ability to attack infrastructure networks, these attacks have become an advantage for some countries in political conflicts. means of advantage. During the conflict between Russia and Ukraine, Russia used cyberspace as its position and radio-electronic warfare as assistance to cut off the Ukrainian system in communications and interrupt the Ukrainian command; it resisted negative news in public opinion and released positive news; it paralyzed the enemy on the Internet. Use the enemy’s website to create panic, and then cooperate with the frontal attack of the troops to achieve the goal of quick victory.
Global layout, capturing enemies from thousands of miles away. In the process of establishing a cyberspace security framework dominated by its own country, the United States has mastered the cyberspace operations of its allies and established global military bases and cyberspace interconnectivity. Relevant intelligence personnel complete network presets through intelligence operations in peacetime, such as using the Internet and other means to monitor and collect enemy network data through intelligence analysis. Through network presets, when necessary, network vulnerabilities can be exploited to invade the enemy’s network, control the system, destroy data, etc., to achieve “taking the enemy’s life thousands of miles away.” In July 2010, the United States invaded Iran’s nuclear power plant through a certain worm virus and took control of its core equipment, greatly delaying Iran’s nuclear program.
Give full play to the advantages of asymmetric combat and improve combat benefits. The “Shute” plan was proposed by the U.S. Air Force to suppress the enemy’s air defense capabilities. It uses asymmetric combat theory to destroy the enemy’s air defense system. The core goal is to invade the enemy’s communications, radar, computer and other network power systems. In war, the “Shute” attack can invade the computer network of the enemy’s air defense early warning system and communication system through remote radio, and then attack and paralyze the enemy’s air defense system, or attack the enemy’s available electronic systems and network systems to break through the enemy’s network. Block, and then use corresponding professional algorithms (mainly “Trojan horse” viruses) to invade the enemy’s radar or network system, monitor or steal relevant information, and leak important information about the enemy’s combat plan, troop deployment, and weapons and equipment, thereby helping Adjust the combat plan, combat structure and weapon ratio to your own side to obtain the maximum benefits at the minimum cost.
The future development of cyberspace operations
Paying increasing attention to it, countries are vigorously developing it. As countries’ understanding deepens, developing cyber capabilities and winning cyber wars have become an important part of countries seeking military advantages and winning future wars. In 2015, based on comments and photos posted online by members of an “Islamic State” organization, the U.S. military used big data analysis and reconnaissance positioning, and finally destroyed an “Islamic State” command post within 22 hours. At present, the United States has established a Cyberspace Command, organized a cyberspace combat force, deepened research on combat theory, and developed preliminary cyberspace combat capabilities. Other countries have also launched cyber competitions. In order to strengthen its cyberspace combat capabilities, France established a new Information Systems Security Agency. The British government released the National Communications Security Strategy and announced the establishment of a Cybersecurity Office and a Cybersecurity Action Center. Japan has established a cyber warfare force mainly composed of computer experts, which shows that cyber space warfare has aroused the interest of more and more countries.
Integration of multiple technologies to enhance cyberspace combat capabilities. With the breakthrough of new technologies, big data technology, 5G technology, and artificial intelligence technology can be applied to cyberspace operations. Big data technology can store large amounts of data, collect complex types of data, and can quickly calculate and obtain useful information. It can speed up the execution of all aspects of cyberspace warfare and make it more accurate. 5G technology has the characteristics of low latency, high transmission and large capacity, making cyberspace warfare more threatening in a global environment and multi-domain coordinated operations. In addition, artificial intelligence deep learning, reasoning and other capabilities can be used to simulate cyberspace warfare. In the process, the weaknesses of one’s own weapon systems can be found and improved. Through the deep integration of these technologies, cyberspace can be built into an intelligent A network environment with high transmission and precision can create an intelligent brain for future information-based joint operations and grasp the initiative in future operations.
Effectively promote joint operations. The use of cross-domain information-based joint operations is essentially a new combat form that jointly achieves operational goals by establishing a stable and efficient cyberspace information activity situation based on the deployment of geographical space. The joint forces have different information capabilities. Achieve a high degree of sharing and deep integration to enhance real-time situational awareness, improve command efficiency, and improve integrated combat effectiveness. Cyber capabilities can not only serve a single service branch or unit, but can also prioritize the protection of strategic-level goals, organize cyber wars and operations of various arms with a high overall level, and plan cyber operations in land, sea, air, and space dimensions. battle target.
Future wars will be intelligent and systematic wars. The “joint information environment” is a strategic move to achieve “cross-domain collaboration” and build “global integrated operations” capabilities. With the continuous improvement and development of technology, cyberspace Operations will become one of the core operational domains, which will greatly improve the effectiveness of future systematic operations and provide important support for seeking information advantages and winning wars.
Since the 21st century, with the deepening of the world’s new military revolution, the world’s military powers have proposed a series of new combat concepts and continuously improved them in war practice, thus leading to the accelerated evolution of war. With the rapid development of information technologies such as cloud computing, blockchain, artificial intelligence, and big data, as well as their widespread application in the military field, people’s mode of understanding war has gradually changed from summarizing actual combat experience to studying and judging future wars. At present, as the source of military capability building, the strength of operational concept development capabilities will directly affect the opportunity to win the war. In particular, the new military revolution in the world is booming, calling for innovation in combat theory all the time. Only by developing new combat concepts and designing future wars with a forward-looking perspective can we gain the initiative in preparing for military struggles.
The concept of combat fundamentally solves how to fight a war
First-rate armies design wars, second-rate armies respond to wars, and third-rate armies follow wars. The so-called “real war happens before the war” means that before the war begins, the theory, style, and fighting methods of the war have already been designed. How can it be unwinnable to fight a war according to the design? The key to designing a war is to design and develop new combat concepts based on understanding the characteristics and laws of war, promote innovation in combat styles and tactics, and fundamentally solve “how to fight a war.”
In designing a war, theory comes first. In recent years, the US military has proposed new concepts such as “network-centric warfare”, “air-sea warfare” and “hybrid warfare”, and the Russian military has proposed theories such as “non-nuclear containment strategy”, “strategic air and space campaign” and “national information security doctrine”, reflecting The world’s military powers are vigorously studying combat theories and seizing the military commanding heights. To a certain extent, operational concepts are the “organizing cells” for the formation of operational theories. Without complete concept generation capabilities, it is difficult to generate advanced theories. When a combat theory is proposed, relevant combat concepts need to be developed so that the combat theory can be “sinked” concretely, better improved, and transformed into military practice. When there is no operational theory concept, operational concept innovation can provide “raw materials” for studying operational theory. The military field is the most uncertain field, and people’s understanding of war is always evolving. However, innovation in combat theory cannot wait until the understanding matures before starting. Instead, it needs to actively develop and innovate combat concepts on the basis of existing understanding, construct a future combat picture, explore future winning mechanisms, and guide and guide military practice. Take the initiative in war. Therefore, innovation in operational concepts is becoming a strategic fulcrum and lever for military construction and development.
Operational concept development focuses on designing core operational concepts. The core combat concept is the nucleus and embryo of the combat concept. It reflects the essential requirements of combat and contains the “gene” for the growth of the combat concept. The entire concept system is derived and developed from this. At present, the understanding of the winning mechanisms of informatization and intelligent warfare is gradually becoming clearer, and it is time to focus the focus of designing wars on the development of main combat theories and key combat concepts.
The operational concept is an abstract expression of operational thoughts.
The term “operational concept” originated from the US military. It is a description of how to fight in the future. It is increasingly becoming an important starting point to promote the construction and development of the military. The U.S. Army Training and Doctrine Command Concept Development Guide points out that an operational concept is a concept, an idea, an overall understanding, and an inference based on specific events in the operational environment. It outlines what will be done in the broadest sense, and in more specific measures The above describes how the battle is fought. The US Marine Corps Combat Development Command Operational Development and Integration Directive states that an operational concept expresses how to fight a war and is used to describe future combat scenarios and how to use military art and scientific capabilities to meet future challenges. The US Air Force Operational Concept Development Doctrine points out that an operational concept is a conceptual description at the theoretical level of war. It realizes established operational concepts and intentions through the orderly organization of combat capabilities and combat tasks.
To sum up, the operational concept can be understood as an abstract understanding of operational ideas and action plans for specific current or future operational problems. Generally speaking, the operational concept includes three parts: first, the description of the operational problem, that is, the background of the operational concept, operational environment, operational opponents, etc.; second, the description of the solution, that is, the conceptual connotation, application scenarios, and action styles. , winning mechanism, capability characteristics and advantages, etc.; the third is the description of capability requirements, that is, the equipment technology, basic conditions, implementation means, etc. required to implement the operational concept. It can be seen that the operational concept should have the characteristics of pertinence, scientificity, adaptability and feasibility, and its connotation and extension will be continuously adjusted with changes in strategic background, military policy, threatening opponents, time and space environment, capability conditions and other factors.
In a sense, the operational concept is actually a transitional form of operational theory, and its ultimate value is to guide and pull military practice. The purpose and destination of developing new combat concepts is to tap into and enhance the military’s combat effectiveness. Only by transforming combat concepts into combat doctrine and combat plans can their value be fully exerted.
Innovation in combat concepts drives changes in combat styles
Since the beginning of the 21st century, the world’s military powers, in accordance with national strategic requirements and in response to new threats and challenges, have regarded the development of new operational concepts as a key step in the transformation of military capabilities, promoted changes in operational styles, and sought to gain opportunities for victory in future battlefields. In order to further strengthen their military leadership, the world’s military powers are accelerating the launch of a series of new combat concepts.
The U.S. military actively seizes the opportunities brought by scientific and technological progress, comprehensively uses cutting-edge technologies such as new generation information technology, artificial intelligence technology, and unmanned autonomous technology to propose mosaic warfare, multi-domain operations, distributed destruction, decision-centered warfare, and joint full-domain command and control. and a series of new operational concepts, promoting fundamental changes in operational thinking, combat styles, combat spaces and combat systems.
Unlike the US military, the Russian army implements iterative innovation in operational concepts in military practice. Recently, the Russian military has been committed to promoting the construction of joint combat capabilities, accelerating the development and deployment of new unmanned equipment, focusing on creating network information battlefield advantages, constantly enriching the connotation of its traditional combat concepts, and integrating them with new combat concepts such as hybrid warfare and mental warfare. Used to guide war practice.
Generally speaking, in recent years, the new combat concepts proposed by the world’s military powers are leading to profound changes in combat styles. Their capabilities, characteristics and advantages are mainly reflected in the following five aspects: First, unmanned combat equipment, based on the new combat concepts The proportion of unmanned equipment systems has increased significantly, and manned and unmanned coordinated operations have become one of the main combat styles, forming the advantage of using unmanned systems to control manned forces. Second, the deployment method is decentralized. The deployment of forces based on new combat concepts is distributed and inter-system They are interconnected and have interoperability capabilities, forming the advantage of separate systems and combinations; third, the kill network is complex. The kill network based on new combat concepts has more diverse functions. A single system can perform a variety of tasks, and its failure has a greater impact on the combat system. Small, forming the advantage of using more to control single orders; fourth, the response time is agile, and the new combat concept emphasizes quick decisions, taking the enemy by surprise, and forming the advantage of using speed to control the slow; fifth, the combat field is multi-dimensional, and the new combat concept Pay more attention to multi-domain linkage, expanding the battlefield from traditional land, sea and air to electromagnetic, network and cognitive domains, forming intangible and tangible advantages.
Operation concept development should adhere to systematic design ideas
Using operational concepts to guide the construction of military forces is a common practice among the world’s military powers. Comparatively speaking, the U.S. military has a relatively complete operational concept development mechanism and has built a relatively complete operational concept development system, which consists of concept types, organizational structures, specifications and standards, and support means.
In terms of concept types, U.S. military operational concepts can be basically divided into three categories: First, a series of operational concepts developed under the leadership of each service. They mainly start from the perspective of their own services to study potential enemies and future battlefields, redefine combat styles, and seek to win. new ways. The second is a series of joint operations concepts developed under the leadership of the Joint Chiefs of Staff, which are mainly composed of three levels: top-level concepts, operational concepts and supporting concepts. The third is the operational concepts developed by academia, think tanks, etc. The number of such operational concepts is not as large as the first two categories, but it is still an important part of the operational concept system. Through this system, the US military implements grand military strategies layer by layer through operational concepts into various combat operations, various combat capabilities, and various types of weapons and equipment performance for the troops, guiding the construction of joint forces and various services and arms.
In terms of organizational structure, taking the development of joint operations concepts as an example, the US military has established a working system composed of five types of organizations. The first is the Joint Concept Working Group, whose main responsibility is to review the concept outline and overall issues of concept development; the second is the Joint Concept Steering Committee, whose main responsibility is to supervise and guide the concept development plan; the third is the core writing team, whose main responsibility is to compile the concept outline The original concepts in the concept are transformed into joint operational concepts; the fourth is the concept research and development team, whose main responsibility is to provide operational concept development methods and plans; the fifth is the independent red team, whose main responsibility is to carry out independent evaluation to judge the rigor and scientificity of the concept.
In terms of norms and standards, for the development of joint operations concepts, the U.S. military has complete institutional system constraints and guidance to standardize, standardize and program the concept development, which is mainly reflected in a series of joint chiefs of staff chairman Directives and joint publications. For example, the “Joint Concept Development and Implementation Guide” aims to establish a governance structure for joint concept development, clarify the framework for joint operational concept planning, execution and evaluation, and promote the implementation of joint operational concepts; the “Joint Doctrine Preparation Process” aims to develop joint doctrine Standardize the preparation process and provide a clear process framework for transforming operational concepts into operational doctrine.
In terms of support means, the design, development and verification of operational concepts is a systematic project that cannot be separated from the support of various development tools and means. For example, tools such as DODAF2.0 model, IDEFO model and SYSML modeling language can provide standardized structured analysis models and logical description models for combat concept designers; model-based system engineering methods can provide combat concept designers and evaluation Verifiers provide capability models of equipment elements in the operational concept, which are used to design and build the operational concept framework. The U.S. military’s joint operations concept development uses network-based digital software, which has strong interconnection capabilities. All agencies involved in the development can share information in real time and improve development efficiency.
The mature development of operational concepts requires the cooperation of multiple parties
Developing an operational concept is a multi-disciplinary, multi-field work involving military science, philosophy, operations research, systems science and many other fields. It requires the cooperation of multiple parties to ensure that it is both advanced and forward-looking at the theoretical level and It is applicable and feasible at the practical level.
Establish a small core and large peripheral research team. The department initiating the development of operational concepts should give full play to its leading role and coordinate and schedule the research work from an overall perspective; establish a joint research and development team to give full play to the role of group wisdom and widely obtain new ideas and new ideas from all parties on the research of operational concepts. Methods and new perspectives; establish a cross-field and cross-department expert committee to supervise, review and guide related work from multiple perspectives.
Form a multi-departmental linkage working mechanism. In order to ensure smooth communication and efficient operation among various departments, it is necessary to first clarify their respective tasks and responsibilities. For example, the concept initiating department is responsible for overall planning and implementation, the laboratory is responsible for technical verification, the industrial department is responsible for equipment research and development, and the combat force is responsible for actual combat testing. Secondly, it is necessary to formulate relevant normative documents to ensure that all work is carried out in an orderly manner and to provide institutional support for the research and development of operational concepts. Finally, a demand traction mechanism, a collaborative research mechanism, an iterative feedback mechanism, etc. must be established to open up the link from research and development to practical application of combat concepts.
Promote the organic integration of theory and practice. Only through the cyclic iteration of “design research-deduction verification-actual military testing” can operational concepts be gradually adjusted, optimized and improved, and drive the development of war theory. Therefore, the development of operational concepts must pay special attention to the combination of theoretical innovation and practical application. Through the mutual driving of theory and practice, the fundamental purpose of leading the generation of new quality combat capabilities can be achieved. Specific methods include incorporating mature combat concepts into combat doctrine in a timely manner, preparing training syllabuses or teaching materials accordingly, and gradually promoting them to the troops; organizing relevant drills or tests to test the maturity and feasibility of combat concepts under conditions close to actual combat. nature, find and solve problems; use the capability indicators determined by the combat concept as a reference for equipment demand demonstration, drive the development of equipment technology, and promote the improvement of combat capabilities.
The rapid development of science and technology in the new era has brought many new opportunities and challenges to military capability building. Developing new combat concepts can help to keenly seize the military opportunities brought by scientific and technological progress, actively respond to threats and challenges caused by scientific and technological development, and timely grasp the direction and laws of the evolution of war forms, which can provide guidance for leading future war styles and seizing the opportunity to win. important support. At present, the international security situation is complex and ever-changing. To win future information-based wars, we need to regard the development of operational concepts as the starting point of national defense and military construction, actively carry out military technological innovation, promote the upgrading of weapons and equipment, achieve leapfrog development, and thus lead the new era. Military revolutionary trends.
(Author’s unit: Second Research Institute of China Aerospace Science and Industry Corporation)