Insight into the evolution of the winning mechanism of intelligent warfare
■Xie Kai, Zhang Dongrun, Liang Xiaoping
introduction
Military theorists often say that victory tends to smile on those who can foresee changes in the character of warfare, rather than on those who wait for changes to occur and then adapt. In recent years, disruptive technologies represented by artificial intelligence have developed rapidly and are widely used in the military field, accelerating the evolution of war into intelligence. Correspondingly, the concept of war is also changing. Only by discovering changes in a timely manner, proactively responding to changes, and actively adapting to changes can we remain invincible in future wars.
From “using the strong to defeat the weak” to “using wisdom to control the weak”
“The strong wins and the weak loses” is a certain universal law for winning wars. Even in those battles in which the weak defeat the strong, it is often necessary to form a strength advantage over the enemy locally and at a specific period of time in order to truly win. In the era of intelligent warfare, the contribution rate of intelligence superiority to combat effectiveness is much higher than other factors.
In intelligent warfare, human intelligence has widely penetrated into the combat field and been transplanted into weapon systems. All-domain, multi-dimensional, and various types of intelligent combat platforms can quickly couple combat forces, build combat systems based on mission requirements, and independently implement collaborative operations. After the mission ends, it quickly returns to the ready-to-fight state, showing a trend of intelligent autonomy. The side with higher and stronger intelligence can better develop and use the “wisdom to control” mechanism, and even design wars based on this, dominate the development of the war situation, and achieve final victory. It should also be noted that in the era of intelligent warfare, there are likely to be multiple stages of development from low to high. Try to keep yourself in an advanced stage and attack the opponent to a low-dimensional stage. This is also the mechanism of “outsmarting” by using high to defeat low. application.
From “destroying power” to “destroying cognition”
As the form of war accelerates to evolve towards intelligence, the combat space gradually expands from the physical domain and information domain to the cognitive domain, and extends from the tangible battlefield to the invisible battlefield. The cognitive space composed of human spirit and psychological activities has become a new combat space. space. Different from the main purpose of traditional war, which is to eliminate the enemy’s physical strength, intelligent warfare will pay more attention to weakening the enemy’s morale, disintegrating the enemy’s will, and destroying the enemy’s cognition.
By intelligently analyzing the opponent’s personality preferences, psychological characteristics, and decision-making habits, deterrence information can be “tailored” in a targeted manner, and the advantages of cutting-edge technologies such as intelligence can be used to demonstrate powerful strength to the opponent in a realistic way, making anxiety and suspicion Emotions such as fear and fear continued to ferment within it, eventually leading to its self-defeat. Big data, known as the “new oil”, not only enriches the source of intelligence, but also becomes an important “weapon” that affects the opponent’s cognition. By processing big data and deliberately “leaking” it to the opponent, a new “fog of war” will be created for it, making it fall into a state of cognitive confusion. In intelligent warfare, the struggle for the heart and mind will become more intense, and the party with the cognitive advantage will be better than the other party, making it easier to seize the initiative and take advantage of opportunities.
From “people-oriented” to “human-machine collaboration”
In traditional warfare, the organization and use of military force are dominated by people. With the widespread application of smart technology, the proportion of unmanned equipment continues to increase. In intelligent warfare, combat tasks will be completed by man-machine collaboration, and the two will achieve organic integration and complementary advantages. The third “offset strategy” proposed by foreign military forces focuses on human-machine collaboration as a key technology for development. Concepts such as “loyal wingman” proposed by them are also aimed at exploring the realization of manned/unmanned collaborative operations. It is foreseeable that human-machine collaboration will play an important role in future wars.
The use of unmanned reconnaissance forces to carry out three-dimensional and multi-dimensional battlefield situation awareness can provide real-time intelligence support for manned combat forces; the use of unmanned platforms to carry relay loads can continuously provide communication relay support for manned combat forces; the use of unmanned combat forces can provide in-depth The forward battlefield can attract enemy attacks, force the enemy to expose their positions, and provide target guidance and fire support for manned combat forces; using unmanned transportation equipment to provide material supplies to the front line can improve logistics support efficiency, reduce transportation costs, and reduce unnecessary Casualties. With the assistance of artificial intelligence, manned combat forces and unmanned combat forces will achieve scientific division of labor and reasonable coordination in terms of quantity, scale, functions, etc., thereby maximizing overall effectiveness.
From “eating the small with the big” to “eating the slow with the fast”
In traditional wars, it is often necessary to increase the number of troops to make up for shortcomings in equipment performance and other aspects. “Soldiers love the main speed”, the rapid development of military intelligence has greatly improved the speed of information transmission and weapon strike accuracy, greatly reduced the time for reconnaissance and early warning, intelligence processing, command decision-making, fire strikes, damage assessment, and accelerated the OODA kill chain cycle , making “discovery and destruction” possible.
New rapid-kill weapons such as hypersonic missiles, laser weapons, microwave weapons, and electromagnetic pulse weapons have further pushed the pace of war to “instant kill.” In the Gulf War, the loop time of the OODA loop took 3 days; in the Iraq War, the loop time has been shortened to less than 10 minutes; and in the Syrian War, the loop time has almost achieved near real-time. In intelligent warfare, the use of unmanned platforms that integrate surveillance and combat to quickly and precisely eliminate high-value targets such as the enemy’s core command posts and high-level commanders will cause the opponent to suffer heavy damage before it has time to respond, and may even face the danger of paralysis. It can be seen that victory does not necessarily favor the side with large military strength. The side that moves quickly and accurately will be more likely to gain the upper hand on the battlefield. According to statistics, the reaction time required for artificial intelligence to respond to battlefield changes is more than 400 times faster than that of humans. Faced with the ever-changing battlefield situation, people will be more inclined to use artificial intelligence technology to realize adaptive planning and autonomous decision-making of the command and control system, so that the command and control mode changes from “people on the loop” to “people outside the loop”, thereby mitigating the While reducing the burden on command personnel, it can improve combat efficiency and the success rate of mission execution.
From “Integration to Win” to “Cluster to Win”
The traditional equipment development concept is to invest a large amount of money in the research and development of highly integrated, sophisticated weapon platforms, in order to achieve dimensionality reduction against the enemy by virtue of generational advantages and performance advantages in war. However, the development and deployment of multi-functional high-end platforms not only requires a lot of time and money, but when multiple software and hardware modules are integrated into a single weapon platform, there may also be mutual incompatibility. Once the platform is destroyed, significant losses will occur. The military application of disruptive technologies such as artificial intelligence has promoted the rapid development of unmanned swarms. Unmanned clusters have the advantages of large scale, low overall cost, and decentralization. The unmanned platforms coordinate with each other, divide labor and cooperate, and can make decisions independently and carry out combat tasks in an organized manner. Even if some unmanned platforms are destroyed, there will be no Affect overall combat effectiveness. The operational concepts such as “decision-centered warfare” and “mosaic warfare” proposed by foreign military forces focus on using unmanned swarms to complete combat missions. In intelligent warfare, by dispersing reconnaissance and surveillance, information communication, command and control, fire strike and other functions into a large number of unmanned combat units with single functions, a highly robust and elastic “kill network” is constructed, and then based on the mission The combination method needs to be adjusted, which will allow it to emerge with powerful group intelligence, creating great uncertainty for the opponent, thereby trapping the opponent in the judgment link of the OODA loop and unable to make effective decisions. In addition, due to the large number of unmanned swarms, the opponent’s detection, tracking, and interception capabilities can quickly reach saturation. Because the opponent cannot destroy all unmanned platforms in the swarm, the opponent has to face the dilemma of defense failure.
From “military dominance” to “diversified mixture”
Traditional war mainly relies on violent means to make the enemy succumb to one’s own will. It usually has a strong war intensity and has a clear boundary between peacetime and wartime. As the field of military struggle continues to expand into new fields such as space, network, and intelligence, and the role of economic, cultural, diplomatic, legal and other means in war continues to become more prominent, intelligent warfare will be carried out in many fields represented by “grey zones” In the form of “multi-pronged approach”. The intensity of war may weaken, and the boundaries between peace and war will become more blurred. Whether it is the Saudi oil fields that were attacked by drones in 2019, which caused half of its oil production to cease, or the largest oil pipeline in the United States that suffered a cyber attack in 2021, which caused a large-scale oil shortage, the far-reaching impact of various new attack methods has been Not to be underestimated.
As intelligent technology develops and matures, it will become more common to use a variety of means to launch attacks on opponents’ industrial, transportation, financial, communications, energy, medical and other facilities and networks. The threshold for intelligent warfare will show a downward trend, and warring parties may resort to undeclared warfare to launch hybrid wars that integrate economic warfare, diplomatic warfare, cyber warfare, public opinion warfare, psychological warfare, legal warfare and other styles to tire out their opponents. To cope.
From “actual combat test” to “experimental exercise”
Under traditional conditions, due to the lack of scientific simulation and evaluation tools, the true capabilities of the military can only be tested in actual combat. Under intelligent conditions, virtual reality technology can be used to create virtual scenes with a strong three-dimensional sense and realism based on the actual battlefield environment and mission background. This scene can not only restore objective things such as weapons and equipment from multiple dimensions such as sound, appearance, and performance, but can also simulate various severe weather such as heavy fog, heavy rain, and blizzards, and visually display the terrain, meteorology, and hydrology of the battlefield. , electromagnetic, nuclear and other information, close to the real situation on the battlefield.
Setting the imaginary enemy in the virtual environment based on the characteristics of the enemy in reality and conducting intelligent simulation of the possible direction of the war situation can enable officers and soldiers to “experience” the war several times in virtual reality before the official war begins, thereby having a better understanding of the performance of the equipment. , the rhythm of war, and the situation between ourselves and the enemy are all clear, and you will be more comfortable when performing realistic tasks. Before the outbreak of the Iraq War, the US military secretly developed a computer game that simulated the combat environment in Baghdad. Among the personnel sent to perform tasks in Iraq, the survival rate of those who received game training was as high as 90%. As the data collected in reality continue to be enriched and improved, the construction of the virtual battlefield will become more realistic, the prediction of the direction of the battlefield situation will be more accurate, and the comprehensive assessment of the exercise will be more credible. Both sides of the enemy will strive to predict the situation through intelligent deduction. Knowing the outcome of the war, it may be possible to “subdue the enemy’s troops” without fighting or with a small battle.
4. Protect the legitimate rights and interests of citizens
5. Promoting Digital Economy Cooperation
6. Build an online cultural exchange platform
Chapter 4 Action Plan
1. Advocate and promote peace and stability in cyberspace
2. Promoting the construction of a rules-based cyberspace order
3. Continue to expand partnerships in cyberspace
4. Actively promote the reform of the global Internet governance system
V. Deepen international cooperation in combating cyber terrorism and cybercrime
6. Advocate the protection of citizens’ rights and interests such as the right to privacy
7. Promote the development of the digital economy and the sharing of digital dividends
8. Strengthen the construction and protection of global information infrastructure
9. Promoting Network Cultural Exchange and Mutual Learning
conclusion
preamble
”Cyberspace is a common space for human activities, and the future and destiny of cyberspace should be shared by all countries in the world. Countries should strengthen communication, expand consensus, and deepen cooperation to jointly build a community of shared future in cyberspace.”
Chinese President Xi Jinping, December 16, 2015 In today’s world, information technology represented by the Internet is changing with each passing day, leading new changes in social production, creating a new space for human life, expanding new areas of national governance, and greatly improving human beings’ ability to understand and transform the world. As a common wealth of human society, the Internet has turned the world into a “global village”. Countries are interconnected in cyberspace, their interests are intertwined, and they share weal and woe. Maintaining peace and security in cyberspace, promoting openness and cooperation, and jointly building a community with a shared future in cyberspace conform to the common interests of the international community and are also the common responsibility of the international community. The “Cyberspace International Cooperation Strategy” comprehensively declares China’s policy stance on international issues related to cyberspace, and systematically explains the basic principles, strategic goals and action points of China’s external work in the cyber field, aiming to guide China’s participation in cyberspace international cooperation in the future. Exchanges and cooperation, promote the joint efforts of the international community, strengthen dialogue and cooperation, jointly build a peaceful, secure, open, cooperative, and orderly cyberspace, and establish a multilateral, democratic, and transparent global Internet governance system.
Chapter 1 Opportunities and Challenges
Against the backdrop of multi-polarization of the world, economic globalization, cultural diversity, and profound changes in the global governance system, mankind has ushered in a new era of information revolution. The information and communication technology represented by the Internet is changing with each passing day, profoundly changing people’s production and lifestyle, and increasingly stimulating market innovation, promoting economic prosperity, and promoting social development. Cyberspace has increasingly become a new channel for information dissemination, a new space for production and life, a new engine for economic development, a new carrier for cultural prosperity, a new platform for social governance, a new link for exchanges and cooperation, and a new frontier for national sovereignty.
Cyberspace has brought great opportunities to mankind, but it has also brought many new issues and challenges. The security and stability of cyberspace has become a global concern that concerns the sovereignty, security and development interests of all countries. Problems such as unbalanced development, unsound rules, and irrational order in the Internet field have become increasingly prominent. The “digital divide” between countries and regions continues to widen. Critical information infrastructure has relatively large risks and hidden dangers. It is difficult for the global Internet basic resource management system to reflect the wishes and interests of most countries. Cyber terrorism has become a global public hazard, and cybercrime is spreading. Misuse of information and communication technologies to interfere in the internal affairs of other countries and engage in large-scale network surveillance occurs from time to time. Cyberspace lacks international rules that generally and effectively regulate the behavior of al
l parties, and its own development is constrained.
In the face of problems and challenges, no country can survive alone. The international community should conduct dialogue and cooperation in the spirit of mutual respect, mutual understanding and mutual accommodation, and realize global governance of cyberspace based on rules.
Chapter II Basic Principles
China has always been a builder of world peace, a contributor to global development, and a defender of international order. China unswervingly follows the path of peaceful development, adheres to the correct concept of justice and interests, and promotes the establishment of a new type of international relations featuring win-win cooperation. The theme of China’s cyberspace international cooperation strategy is peaceful development, with win-win cooperation as the core, and advocating peace, sovereignty, co-governance, and universal benefits as the basic principles of international exchanges and cooperation in cyberspace.
1. The principle of peace
Cyberspace is interconnected and the interests of all countries are increasingly intertwined. A safe, stable and prosperous cyberspace is of great significance to all countries and the world.
The international community must earnestly abide by the purposes and principles of the Charter of the United Nations, especially the principles of non-use or threat of use of force and peaceful settlement of disputes to ensure peace and security in cyberspace. All countries should jointly oppose the use of information and communication technologies to carry out hostile and aggressive acts, prevent cyber arms races, prevent conflicts in cyberspace, and insist on peacefully resolving disputes in cyberspace. We should abandon the Cold War mentality, zero-sum game and double standards, and seek peace through cooperation on the basis of fully respecting the security of other countries, and strive to realize our own security in common security.
Cyber terrorism is a new threat affecting international peace and security. The international community should take practical measures to prevent and cooperate in combating cyber terrorism. Prevent terrorists from using the Internet to spread terrorist extremist ideas, plan and implement terrorist activities.
2. Principle of Sovereignty
The principle of sovereign equality established in the Charter of the United Nations is the basic norm of contemporary international relations, covering all areas of state-to-state exchanges, and should also apply to cyberspace. Countries should respect each other’s right to independently choose the path of network development, network management model, Internet public policy, and equal participation in international cyberspace governance, and refrain from engaging in cyber hegemony, not interfering in the internal affairs of other countries, and not engaging in, condoning or supporting cyberspace that endangers the national security of other countries. Activity.
Clarifying the sovereignty of cyberspace can not only reflect the responsibilities and rights of governments to manage cyberspace in accordance with the law, but also help countries build a platform for positive interaction between governments, enterprises and social groups, and create a platform for the development of information technology and international exchanges and cooperation. A healthy ecological environment.
The governments of all countries have the right to manage the network according to law, have jurisdiction over the information and communication infrastructure, resources, and information and communication activities within their own borders, and have the right to protect their own information systems and information resources from threats, interference, attacks and destruction, and to ensure the security of citizens in cyberspace. legal interest. Governments of all countries have the right to formulate their own Internet public policies, laws and regulations without any external interference. While exercising their own rights in accordance with the principle of sovereign equality, countries also need to fulfill corresponding obligations. Countries must not use information and communication technology to interfere in other countries’ internal affairs, and must not use their own advantages to damage the security of other countries’ information and communication technology product and service supply chains.
3. The principle of co-governance
Cyberspace is a common activity space for mankind, and it needs to be jointly built and governed by all countries in the world. The international governance of cyberspace should first adhere to multilateral participation. Countries, regardless of size, strength, wealth or poverty, are equal members of the international community and have the right to equally participate in the construction of international order and rules in cyberspace through international network governance mechanisms and platforms, so as to en
sure that the future development of cyberspace is shared by people of all countries. master.
Second, multi-party participation should be adhered to. The role of the government, international organizations, Internet companies, technical communities, non-governmental organizations, and individual citizens should be brought into play to build an all-round and multi-level governance platform. Countries should strengthen communication and exchanges, improve dialogue and consultation mechanisms in cyberspace, and jointly formulate international rules in cyberspace. As an important channel, the United Nations should give full play to its coordinating role, coordinate the positions of all parties, and build international consensus. Other international mechanisms and platforms should also give play to their respective advantages and provide useful supplements. The international community should jointly manage and fairly distribute basic Internet resources, establish a multilateral, democratic, and transparent global Internet governance system, and realize Internet resource sharing, responsibility sharing, and cooperative governance.
4. The principle of inclusiveness
The integrated development of the Internet and various industries has had an overall and revolutionary impact on the economic structure, social form and innovation system of various countries, providing a strong impetus for world economic growth and the realization of sustainable development goals. Promoting the universal benefits of the Internet to benefit all regions and countries will provide assistance for the effective implementation of the 2030 Agenda for Sustainable Development.
The international community should continue to promote openness and cooperation in the Internet field, enrich the connotation of openness, improve the level of openness, build more platforms for communication and cooperation, promote complementary advantages and common development in cyberspace, ensure that everyone shares the fruits of Internet development, and realize the goals set by the United Nations World Summit on the Information Society. The goal of building a people-oriented, development-oriented and inclusive information society.
Countries should actively promote bilateral, regional and international development cooperation, especially increase financial and technical assistance to developing countries in network capacity building to help them seize digital opportunities and bridge the “digital divide”.
Chapter III Strategic Objectives
The strategic objectives of China’s participation in international cooperation in cyberspace are to firmly safeguard China’s cyber sovereignty, security and development interests, ensure the safe and orderly flow of Internet information, improve the level of international connectivity, maintain peace, security and stability in cyberspace, promote the international rule of law in cyberspace, and promote The development of the global digital economy will deepen cultural exchanges and mutual learning on the Internet, so that the achievements of Internet development will benefit the whole world and better benefit the people of all countries.
1. Safeguarding Sovereignty and Security
China is committed to maintaining peace and security in cyberspace, and building a fair and reasonable international order in cyberspace on the basis of national sovereignty, and is actively promoting and consolidating international consensus in this regard. China firmly opposes any country interfering in the internal affairs of other countries through the Internet, and maintains that all countries have the right and responsibility to maintain their own cyber security, and protect the legitimate rights and interests of all parties in cyberspace through national laws and policies. The tendency to strengthen armaments and strengthen deterrence in cyberspace is not conducive to international security and strategic mutual trust. China is committed to promoting all parties to effectively abide by the basic norms of international relations such as peaceful settlement of disputes and non-use or threat of use of force, establish consultation and mediation mechanisms, prevent and avoid conflicts, and prevent cyberspace from becoming a new battlefield.
The construction of national defense forces in cyberspace is an important part of China’s national defense and military modernization, and it follows the consistent military strategy of active defense. China will give full play to the important role of the military in safeguarding national cyberspace sovereignty, security and development interests, accelerate the construction of cyberspace forces, improve cyberspace situational awareness, network defense, support national cyberspace operations and participate in international cooperation capabilities, and curb and control cyberspace. A major crisis in space, to ensure national network security, maintain national security and social stability.
Building an international rule system As a new frontier, cyberspace urgently needs to formulate relevant rules and codes of conduct. China advocates the formulation of international rules and norms of national behavior in cyberspace that are generally accepted by all countries under the framework of the United Nations, establish the basic norms that countries and various actors should follow in cyberspace, regulate the behavior of all parties, and promote cooperation among countries to maintain cyberspace security. , stability and prosperity. China supports and actively participates in the international rule-making process, and will continue to strengthen dialogue and cooperation with the international community and make its own contribution. China is a staunch defender of cyber security. China is also a victim of hacker attacks. China opposes any form of hacker attacks. No matter what kind of hacker attacks are illegal and criminal, they should be cracked down in accordance with laws and relevant international conventions. Cyber attacks are usually transnational and difficult to trace. China advocates that all countries jointly maintain cyberspace security through constructive consultation and cooperation. 3. Promoting Fair Internet Governance China advocates building a multilateral, democratic and transparent global Internet governance system through equal participation and joint decision-making by the international community. All countries should enjoy equal rights to participate in Internet governance. Basic Internet resources should be allocated fairly, and key information infrastructure such as Internet root servers should be jointly managed. It is necessary to ensure the inclusiveness and openness of relevant international processes and strengthen the representation and voice of developing countries. China supports the strengthening of communication and cooperation among various stakeholders, including governments, international organizations, Internet companies, technical communities, non-governmental organizations, and individual citizens. All stakeholders should play a role that matches their own roles in the above-mentioned governance model, and the government should play a key leading role in Internet governance, especially public policy and security, to achieve joint participation, scientific management, and democratic decision-making. 4. Protect the legitimate rights and interests of citizens China supports the freedom and openness of the Internet, fully respects the rights and basic freedoms of citizens in cyberspace, protects the public’s right to know, participate, express, and supervise in cyberspace, and protects personal privacy in cyberspace. At the same time, cyberspace is not a “place outside the law”. Like the real society, cyberspace should not only promote freedom, but also maintain order. China is committed to promoting the effective governance of cyberspace and realizing the organic integration of free flow of information with national security and public interests. 5. Promoting Digital Economy Cooperation China vigorously implements the strategy of network power, national informatization strategy, national big data strategy, and “Internet +” action plan, vigorously develops e-commerce, strives to promote the deep integration of the Internet and the real economy, promotes the optimization of resource allocation, and promotes the improvement of total factor productivity. Play an active role in promoting innovative development, transforming the mode of economic growth, and adjusting the economic structure. China upholds the market concept of fairness, openness and competition, and while developing itself, adheres to the principles of cooperation and inclusiveness, promotes the development of investment and trade around the world, and promotes the development of the global digital economy. China advocates the promotion of fair and free trade in the international community, opposes trade barriers and trade protectionism, promotes the establishment of an open and secure digital economic environment, and ensures that the Internet serves economic development and innovation. China advocates further promoting the realization of fair, reasonable and universal Internet access, the popularization of Internet technology, and the diversity of Internet languages, strengthening exchanges and cooperation between China and other countries and regions in network security and information technology, and jointly promoting the development of Internet technology and innovation, to ensure that everyone can share the digital dividend equally, and to achieve sustainable development of cyberspace. China insists on ensuring development through security and promoting security through development. To maintain the healthy and strong development of the digital economy, we should neither pursue absolute security to hinder the vitality of development, restrict openness an
d interoperability, and imprison technological innovation, nor should we avoid necessary security supervision measures on the grounds of market liberalization and trade liberalization. Different countries and regions have different levels of Internet development and network security protection capabilities. We should provide assistance within our capabilities to developing countries to improve their network security capabilities, bridge the “digital divide” between developing countries and developed countries, and achieve mutual benefit and win-win digital economy. Make up for the shortcomings of global network security.
6. Build an online cultural exchange platform
The Internet is an important carrier for spreading the excellent culture of mankind and promoting positive energy. Cyberspace is the common spiritual home of mankind. All countries should strengthen cooperation, jointly shoulder the heavy responsibility of using the Internet to inherit excellent culture, cultivate and develop a positive Internet culture, give full play to the important role of culture in nourishing human beings, conserving society, and promoting economic development, and jointly promote the construction of Internet civilization and the prosperity and development of Internet culture .
China is willing to work with other countries to give full play to the advantages of the Internet communication platform, build a bridge of international exchanges through the Internet, and promote exchanges and mutual learning of excellent cultures of various countries. Strengthen the capacity building of network culture dissemination, promote the diversified development of international network culture, enrich people’s spiritual world, and promote the progress of human civilization.
Chapter 4 Action Plan
China will actively participate in relevant international processes in the cyber field, strengthen bilateral, regional and international dialogue and cooperation, enhance international mutual trust, seek common development, and jointly deal with threats, with a view to finally reaching international rules for cyberspace that are generally accepted by all parties, and building a fair and reasonable global Cyberspace Governance System.
1. Advocate and promote peace and stability in cyberspace
Participate in discussions on bilateral and multilateral confidence-building measures, take preventive diplomacy measures, and respond to various cyber security threats through dialogue and consultation.
Strengthen dialogue, study new threats in the cyber domain that affect international peace and security, jointly curb the abuse of information technology, and prevent an arms race in cyberspace.
Promote discussions in the international community on the peaceful nature of cyberspace, and study the application of international law to cyberspace from the perspective of maintaining international security and strategic mutual trust and preventing cyber conflicts.
2. Promoting the construction of a rules-based cyberspace order
Give full play to the important role of the United Nations in the formulation of international rules in cyberspace, support and promote the adoption of information and network security-related resolutions by the United Nations General Assembly, and actively promote and participate in processes such as the United Nations Group of Governmental Experts on Information Security.
The member states of the Shanghai Cooperation Organization submitted the updated text of the “International Code of Conduct for Information Security” to the UN General Assembly in January 2015. The “Code of Conduct” is the first document in the world that comprehensively and systematically expounds the code of conduct in cyberspace. It is an important public security product provided by China and other SCO member states to promote the international community to formulate a code of conduct in cyberspace. China will continue to strengthen international dialogue on this initiative and strive for broad international understanding and support for it.
Support the universal participation of the international community in international discussions and consultations on cyber issues on an equal basis.
3. Continue to expand partnerships in cyberspace
China is committed to establishing extensive cooperative partnerships with all parties in the international community, actively expanding dialogue mechanisms on cyber affairs with other countries, and extensively carrying out bilateral cyber foreign policy exchanges and practical cooperation.
Hold international conferences such as the World Internet Conference (Wuzhen Summit), continue to hold bilateral Internet forums with relevant countries, hold seminars on Internet issues under the framework of China, Japan, South Korea, the ASEAN Regional Forum, and the Boao Forum for Asia, etc., to expand the network dialogue and cooperation platform.
Promote and deepen practical cooperation in cyber s
ecurity between the SCO and BRICS countries. Promote the balanced development of the ASEAN Regional Forum cyber security process. Actively promote and support CICA, Forum on China-Africa Cooperation, China-Arab Cooperation Forum, China-CELAC Forum, Asian-African Legal Consultative Organization and other regional organizations to carry out cyber security cooperation. Promote the initiative of APEC, G20 and other organizations to cooperate in the fields of Internet and digital economy. Explore exchange dialogues with other regional organizations in the cyber arena.
4. Actively promote the reform of the global Internet governance system
Participate in the follow-up process of the implementation of the outcomes of the United Nations World Summit on the Information Society, promote the international community to consolidate and implement the consensus on the outcomes of the summit, and fairly share the results of the development of the information society.
Promote the mechanism reform of the United Nations Internet Governance Forum, and promote the forum to play a greater role in Internet governance. Strengthen the forum’s decision-making capabilities on Internet governance matters, promote the forum to obtain a stable source of funding, and develop open and transparent procedures for selecting relevant members and submitting reports.
Participate in international discussions aimed at promoting the fair distribution and management of key Internet resources, actively promote the international reform of ICANN, make it a truly independent international organization, and continuously improve its representativeness and openness in decision-making and operation transparent. Actively participate in and promote global Internet governance platform activities such as the “Future of the Internet” action initiative of the World Economic Forum.
V. Deepen international cooperation in combating cyber terrorism and cybercrime
Discuss the code of conduct and specific measures for the international community to cooperate in combating cyber terrorism, including exploring the formulation of an international convention against terrorism in cyberspace, to enhance the consensus of the international community on combating cybercrime and cyberterrorism, and provide a basis for countries to carry out specific law enforcement cooperation.
Support and promote the UN Security Council to play an important role in international cooperation against cyber terrorism.
Support and promote the work of the United Nations to combat cybercrime, participate in the work of the United Nations Commission on Crime Prevention and Criminal Justice, the United Nations Group of Governmental Experts on Cybercrime and other mechanisms, and promote the discussion and formulation of global international legal instruments against cybercrime within the framework of the United Nations.
Strengthen regional cooperation, rely on the Asia-Pacific region’s annual meeting and coordination mechanism to carry out cooperation in combating information technology crimes, actively participate in relevant cooperation with regional organizations such as the ASEAN Regional Forum, and promote the institutional arrangements for the BRICS countries to combat cybercrime and cyberterrorism.
Strengthen policy exchanges and law enforcement cooperation with other countries to combat cybercrime and cyberterrorism. Actively explore the establishment of an institutionalized dialogue and exchange platform for combating cyber terrorism, establish a bilateral police cooperation mechanism with the police of other countries, improve the judicial assistance mechanism for combating cybercrime, and strengthen the exchange of technical experience in combating cybercrime.
6. Advocate the protection of citizens’ rights and interests such as the right to privacy
Support the discussions of the United Nations General Assembly and the Human Rights Council on privacy protection issues, and promote the establishment of principles of personal privacy protection in cyberspace. Promote countries to take measures to stop the use of the Internet to infringe on personal privacy, and exchange practices and practices on respecting and protecting personal privacy in cyberspace.
Promote enterprises to raise awareness of data security protection, support enterprises to strengthen industry self-discipline, and discuss best practices in cyberspace personal information protection. Promote cooperation between the government and enterprises to jointly protect personal privacy in cyberspace.
7. Promote the development of the digital economy and the sharing of digital dividends
Promote the implementation of the goal of building a people-centered, development-oriented, and inclusive information society set by the United Nations World Summit on the Information Society, so as to promote the implementation of the 2030 Agenda for Sustainable Development.
Support Internet-based innovation and entrepreneurship, and promote the digital transformation of industry, agriculture, and service industries. Promote the informatization development of small, medium and micro enterprises. Promote investment in the ICT sector. Expand broadband access and improve broadband quality. Improve the digital skills of the public and increase digital inclusion. Enhance the availability, integrity, confidentiality and reliability of online transactions, and develop credible, stable and reliable Internet applications.
Support the provision of cyber security capacity building assistance to developing countries, including technology transfer, key information infrastructure construction and personnel training, etc., to transform the “digital divide” into digital opportunities, and allow more developing countries and their people to share the benefits brought by the Internet. Development Opportunities.
Promote the formulation of comprehensive cyberspace trade rules and promote the effective coordination of relevant policies of various countries. Carry out international cooperation in e-commerce, and improve the level of facilitation in customs clearance and logistics. Protect intellectual property rights, oppose trade protectionism, form a world network market, and promote the prosperity and development of the global network economy.
Strengthen Internet technology cooperation and sharing, promote technical cooperation among countries in the fields of network communications, mobile Internet, cloud computing, Internet of Things, and big data, jointly solve Internet technology development problems, and jointly promote the development of new industries and new formats. Strengthen talent exchanges and jointly cultivate innovative network talents.
Closely combined with the “Belt and Road” construction, promote and support China’s Internet companies in the joint manufacturing, finance, information and communication fields to take the lead in going out, participate in international competition in accordance with the principle of fairness, jointly explore the international market, and build a cross-border industrial chain system. Encourage Chinese enterprises to actively participate in the capacity building of other countries, help developing countries develop distance education, telemedicine, e-commerce and other industries, and promote the social development of these countries.
8. Strengthen the construction and protection of global information infrastructure
Jointly promote the construction of global information infrastructure and pave the way for smooth information flow. Promote the interconnection of information infrastructure with neighboring countries and other countries and the construction of the “Belt and Road”, so that more countries and people can share the development opportunities brought by the Internet.
Strengthen international cooperation, raise the awareness of protecting critical information infrastructure, promote the establishment of an orderly sharing mechanism for government, industry and enterprise network security information, and strengthen the security protection of critical information infrastructure and its important data.
Promote countries to reach a consensus on the protection of critical information infrastructure, formulate cooperation measures for the protection of critical information infrastructure, and strengthen legislation, experience and technical exchanges on the protection of critical information infrastructure.
Promote the strengthening of cooperation among countries in early warning and prevention, emergency response, technological innovation, standards and regulations, and information sharing, and improve the ability to prevent and respond to cyber risks.
9. Promoting Network Cultural Exchange and Mutual Learning
Promote the development of network cultural cooperation among countries, let the Internet fully display the achievements of civilizations of all countries and nations, become a platform for cultural exchanges and mutual learning, and enhance emotional exchanges and spiritual communication between people of all countries. Taking the animation and game industry as one of the key areas, pragmatically carry out cultural cooperation with countries along the “Belt and Road”, and encourage Chinese enterprises to fully rely on local cultural resources to provide differentiated online cultural products and services. Utilize domestic and foreign online culture expo trading platforms to promote Chinese online cultural products to go global. Support Chinese enterprises to participate in important international network cultural exhibitions. Promote the overseas landing of Internet cultural enterprises.
conclusion
The 21st century is the era of network and information technology. At a new historical starting point, China has proposed the grand goal of building a cyber power. This is an important measure to implement the “Four Comprehensives” strategi
The 21st century is the era of network and information technology. At a new historical starting point, China has proposed the grand goal of building a cyber power. This is an important measure to implement the “Four Comprehensives” strategi
c layout, and it is inevitable to realize the “Two Centenary” goals and the Chinese Dream of the great rejuvenation of the Chinese nation. choose. China has always been a builder, maintainer and contributor of cyberspace. The development of China’s Internet information industry will not only benefit the Chinese people, but also contribute to the security and development of the global Internet.
While promoting the strategic deployment of building a cyber power, China will uphold the concept of a new type of international relations centered on win-win cooperation, and is committed to joining hands with the international community to strengthen communication and exchanges, deepen mutually beneficial cooperation, build new partners for cooperation, and create A community with a shared future for mankind, making greater contributions to building a safe, stable, and prosperous cyberspace.