Category Archives: China National Cyber Security Strategy

China’s Blurred War: Trends of Future Battlefields // 中國模糊戰爭:未來戰場的發展趨勢

China’s Blurred War: Trends of Future Battlefields //

中國模糊戰爭:未來戰場的發展趨勢

With the continuous development of information technology, changing the form, nature and scale of war, so that the combat style, combat methods, combat environment, combat conditions and other elements have been a lot of changes in the past, the future battlefield becomes more blurred, Can be summarized as the following:

War scale and level ambiguity

War in size and level, can be divided into strategies, campaigns and tactics, in the past, the difference between the three very obvious. From the three interrelationships, the strategy decides the battle, the battle determines the tactics, and the tactics reacts to the battle, the battle reacts to the strategy, which is the inherent law of the existence of the war itself. With the development of information technology, the development of high-tech war as information war, although not fundamentally change the strategic, campaign, tactical and counter-role of this dialectical relationship, but it makes the strategy, battle, tactical action scale increasingly blurred. This is because, under the conditions of information under the conditions of local war, the size and use of troops, weapons, limited duration of war, political prominence, war and strategy, battle, tactics combined very closely, tend to one. Information weapons and weapons to combat high precision, powerful, long range, with all-weather, all-weather combination of peaceful reconnaissance and combat integration capabilities for the rapid realization of the purpose of war to provide an effective means, sometimes do not use large forces can Reach the strategy, the battle target. Any combat unit, and even the individual combat operations, can get a strong information and fire support. Under their influence, tactical combat can directly achieve strategic objectives, strategic command can be involved in the tactical level is no longer a dream at any time. Thus, in the past through the local small victory gradually integrated into a strategic victory of the operational theory of the impact of the strategy, campaign, tactical three combat levels between the increasingly blurred.

With the extensive use of precision strike weapons, stealth weapons, unmanned aerial vehicles, and thus through the first and second fire assault can be reached a battle or strategic objectives. In the Gulf War, the multinational force first through a large-scale strategic air raids, and then through the ground operations of the various forces reached a war purpose; US invasion of Panama, through the use of the Army to implement the five-way center of the campaign to achieve the desired purpose; In the war in Afghanistan, the US military, through the air strike and the special forces to achieve the purpose of the war; the Iraq war, the US military in the air against the cover, the US Army division through tactical action reached a war purpose. The scale of operation and the ambiguity of the level are the reflection of the essential characteristics of information warfare. In the information war, the hostile parties for the rapid completion of the established strategic objectives, will be extraordinary use of combat power, to maximize the advanced technical weapons and elite troops, and strive to destroy each other in a short time the command and control system to win the battlefield The advantage of making information right. This feature of the information warfare, so that the battle of combat and strategic purposes there is no obvious distinction between the scale of operations there is no clear battle battle difference. A battle may determine the outcome of the war, a battle may also achieve the purpose of war, thus greatly improving the strategic role of the battle battle. Especially the various precision guidance weapons, ballistic missile defense system, reconnaissance surveillance system, stealth weapon, C4ISR system and other information weapons and the extensive use of rapid reaction forces, special forces, strategic reserve and other frequently into the battlefield, making the definition of combat scale fuzzy More prominent.

Therefore, in the future information operations, the two sides will fight with the uncertainty of the scale of operations, to take over-the-line precision strike, non-programmatic “acupuncture” and structural damage and other tactics, against each other’s battlefield awareness system and information systems Quickly achieve the purpose of fighting. In this way, the special operations forces on the battlefield may be able to show their talents, that is, before the war secretly penetrate the enemy, direct attack and paralyze the enemy command and control system, so that the enemy lost control of its combat forces, and thus into the chaos of command, The Although the scale of the operation of the smaller, but for the outcome of the war can play a very important role.

Weapon equipment and functional blur

Technical decision tactics, also determines the army’s system and the composition of military and arms. For example, the emergence of weapons and equipment such as artillery, chemical weapons and radio telegraphy, laid the material foundation for the emergence of new arms such as artillery, chemical warfare, and communications. In terms of military services, due to the emergence of the aircraft, and then produced the Air Force; ship advent, gave birth to the Navy. Industrial era, the requirements of the division of labor, so refined and produced more and more professional, reflected in the composition of the army, is the division of arms and branches more and more fine; information age, requires the overall combat, the professional Close cooperation, and take the road of integrated and integrated operations. Reflected in the composition of the military trend, is the integration of combat systems. For example, many of the future weapons and equipment system will form an independent combat unit, both to complete the army requirements of the combat mission, but also to achieve the Air Force’s operational requirements, but also to achieve the purpose of naval combat. In other words, when the future combat aircraft’s infinite capacity to extend, and beyond the atmosphere combat; Army bid farewell to the “ground crawling” to achieve global arrival, global operations; the Navy to the sea to land, to the air combat capability transformation, Battle will inevitably lead to integrated forces. Integrated combat troops, generally composed of armored forces, artillery, mechanized infantry, missiles, attack and transport helicopters, naval vessels and other components, can independently combat, will realize the professional army to the professional army transition.

Future integration forces will be the main performance, will break the traditional land, sea, air, days and other military system, in accordance with the requirements of system integration, the establishment of “super-integrated” integrated combat forces. The future of information warfare is a highly integrated joint operations, the use of traditional forces of the implementation of joint operations, it is difficult to adapt to this highly integrated joint operations needs. To this end, the future composition of the military organization, will break the traditional land, sea, air, days and other military system, in accordance with the reconnaissance surveillance, command and control, precision strike and support to protect the four operational functions, built four subsystems, namely: Subsystems, command and control subsystems, precision strike and combat subsystems, and support assurance subsystems. The functions of these four subsystems are closely linked and organically linked to form an interdependent large integrated joint combat system. The army constructed in accordance with this idea will fundamentally abandon the pattern of military construction in the industrial age, eliminate the disadvantages of playing the military expertise and pursuing the interests of a single service, so that the combat forces form a “systematic system” or “system integration” Give full play to the overall power, the implementation of the true sense of “super-joint” integrated joint operations.

 

Military combat operations and the preparation of fuzzy war

Military combat forces have different targets and perform different combat missions. World War II, combat forces mainly infantry-based, basically infantry and infantry confrontation; the Second World War, due to the development of weapons and equipment, aircraft, tanks, cannons for war, arms and arms between the combat The task has a distinct distinction, usually performing a different combat mission. However, under the conditions of information in the local war, due to the development of weapons and equipment to the direction of multi-functional integration, the establishment of the army, not only the arms, as well as various services. Combat forces can perform both ground combat missions, but also the implementation of the fight against air and sea objectives and tasks, so that the boundaries between the military operations will be difficult to distinguish. For example: destroy the enemy tank weapons, may have been the Army’s tanks or anti-tank weapons, it may be the Air Force aircraft or naval submarines launched “smart” missiles. The US military plans to form four integrated forces: an integrated ground force composed of armored forces, artillery, flying warriors, attack and transport helicopters: air-to-air mechanized units with “flying tanks”; air force mixed knits composed of multiple models and A “joint task force” consisting of various military units. The Russian army intends to form a “multi-purpose mobile force”, an “aerospace force” composed of ground, air and space forces, and a “non-nuclear strategic deterrent force” composed of non-strategic nuclear forces.

In the future of localized information warfare, weapons and equipment to the multi-functional, integrated direction, the development of the trend of the trend of mixing, miniaturization. Combat, the arms and arms around the established operational objectives, each other, integrated into the organic whole. On the battlefield, the arms and services will be in the land, sea, air, days, electricity and other multi-dimensional areas, around the purpose of a unified combat, both in the activities of space is relatively independent, but also in the combat operations on a high degree of integration, making different arms and arms The task line becomes more vague.

War motives and ambiguity

The motive of the traditional war is generally the political struggle to cover up the economic interests of the dispute. In the information age, the economic interests of the dispute will continue to lead to the root causes of the war, but in addition, due to the international and domestic political forces between the various contacts increased, closely linked, which will inevitably lead to various countries, And the conflicts between the societies caused by political, diplomatic and spiritual factors have increased, so that the contradictions between religions and nationalities have increased, so that violence can be smuggled and drug trafficking and terrorist activities are internationalized. These contradictions and conflicts are not only the direct cause of the “sub-war operations”, but also one of the causes of the war. The direct cause of the Gulf War in 1991 was the convening of the United Nations Security Council immediately after Iraq’s invasion of Kuwait on 2 August 1990, the adoption of resolution 660, condemning Iraq’s invasion of Kuwait, and demanding that Iraq be unconditionally withdrawn from its forces. The United States for the protection of Western oil sources and in order to establish a new order in line with the interests of the world’s new order, take the lead in the implementation of economic sanctions against Iraq, followed by the United States led the multinational force to implement the UN Security Council resolution in the name of the troops to the Gulf. Through 42 days of war, the US military reached the purpose of the war. The war in Iraq, the United States to Iraq has a weapons of mass destruction on the grounds, without the authorization of the United Nations launched an injustice war. Throughout the war, the focus of US military operations against Saddam Hussein and a handful of Iraqi high-level leaders, and to find weapons of mass destruction and launched the attack. Although the war has overthrew the Saddam regime, the United States still has not found strong evidence that Iraq has such banned weapons. In this war military purpose, the United States is also to test the new operational theory.

In recent years, the US military vigorously advocated military reform. The theory of the war in Iraq is the theory of “cyber-centric warfare” and uses the new theory of “shock and deterrence” put forward in 1996: emphasizing the use of violent firepower, shocking against opponents, regardless of frontier and depth, The enemy to combat, the use of advanced precision guidance technology, against each other’s goals when one side of the pursuit of both sides less casualties; air and ground operations at the same time, the purpose is to destroy each other’s will, so that its regime collapse, so as to achieve war and subdue The purpose of the soldiers. In the Iraq war, the US military did not carry out large-scale strategic bombing, but the use of high-tech and special forces tactics to combat, which is one of the main achievements of US military reform.

War attack and defense blur

The process of attack and defense in the past is very clear, the attacking party usually in accordance with the offensive preparation, breakthrough, shock, deep combat and other step by step attack procedures, defense side in accordance with the defense preparation, fire against the preparation, anti-impact, deep combat and other sub-combat operations Attack and defense both sides of the various stages of combat orderly. The development of high-tech weapons and equipment and information technology, the new military revolution will change the future combat procedures, combat operations will break through the fixed battlefield and position constraints in the entire operational space at all levels, all directions, all aspects of the same time. In this way, the front and rear lines in the past are blurred, the relatively stable front and fixed battlefields no longer exist, the line of offensive action and defensive action because the battlefield’s high mobility and uncertainty also become blurred and influence World military force balance. Offensive and defensive both offensive and defensive combat, especially offensive and defensive information war will become the focus of future combat art, so that every war has attack in the defense, anti-attack.

Attack and defense operations will be in the land, sea, air, days, electricity and outer space and front and depth, front and wing side, front and rear at the same time, the battlefield frequent mobility, line combat style has not adapted to the conditions of local war development Need to, instead of non-line operations, the formation of a “island-based combat base”, front and rear of the line, the enemy and the two sides of the front becomes blurred, the battlefield of the flow of non-linear or non-state state of the multi-dimensional battlefield.

Measure the outcome of the war with the standard fuzzy

In the past, the criteria for measuring the outcome of a war usually refer to how many troops are wiped out, how many weapons are seized, how many cities and territories are occupied, but in the case of local warfare, the criteria for measuring the outcome of a war are not just that. Under the conditions of information, local warfare, political purpose and war are closely integrated, war attempts often not through the invasion of each other’s territory, wiped out the enemy or the enemy completely surrendered, so as not to lead the world public opinion and the people’s strong opposition, resulting in political Passive.

One of the hallmarks of information warfare is that it minimizes casualties, in particular, collateral damage, and often uses precision-guided weapons to strike precisely, to avoid heavy assault, face-to-face fights, and fight against Libya “Surgical” operations, the implementation of air long-range maneuvers, to achieve the purpose of war; also the implementation of missiles, thousands of miles away siege warfare, but also to achieve the purpose of local war; also like the Gulf War, do not occupy its territory, Do not kill their soldiers a soldier, not seized its weapons, ammunition, the implementation of large-scale air strikes, weakened its military facilities, destroyed its regime.

The war army is blurred with the people

In previous wars, the links between the army and the society were relatively “loose” due to restrictions on information infrastructure and technology; pure war weapons and equipment also led to military organizations that were completely independent of the people. Information age, information has become a link between the military and the people, this combination, with the social and military information degree of development, integration will also continue to improve. This makes society and ordinary people no longer a spectator of war, and even not only in support and subordinate status, but with the army, from the back of the war to the front desk.

As people see, on the one hand, the purpose of modern warfare is no longer simply pursuing siege and the greatest annihilation of enemy forces, the target is no longer confined to the enemy’s heavy military and military facilities, but includes Corresponding to the survival and operation of the infrastructure, such as: financial networks, power grids, transport networks, administrative networks, communications networks. On the other hand, the war has a tendency to “civilians”. For example, information makes the “non-state” has the ability to confront national power. Any “non-state subject”, as long as there is a certain technical and information equipment, you can attack the vital goal of a country, its harm is sometimes no less than a traditional sense of the war. Such as Al Qaeda attacks on the United States launched the 9.11 attack, that is the case. Although the composition of the information warfare forces, although still have traces of the war in the past war, but in the form of form and combat quality, due to more information to join the content, in particular, more to join the information of the whole society Warfare ability, so no doubt to determine the specific role of information warfare when the thinking tends to blur, but for combat decision-making and command to bring greater difficulties. With the in-depth development of information technology, the degree of social information will be greatly improved. In this case the information war, it is more prominent military and civilian compatibility characteristics. Especially in the information warfare, many high-tech work, alone, the strength of the army is difficult to complete independently, but also the need for the whole social forces of collaboration, which makes the information warfare combat power, more into the national factors.

Combat both forces with contrast and blur

In the past, the strength of the war between the two sides, usually the number of military personnel, the number of weapons to measure the number of weapons to determine the strength of the advantages of planning and combat operations. But in the information under the conditions of local war, concentrated forces of content and methods have changed. The strength of the comparison is not only the number of considerations, but also mainly consider the quality, in particular, to consider the concentration of firepower and information, a variety of long-range strike weapons do not need to focus on deployment, you can focus on the implementation of the target surprise. To make the concentration of fire after the effective role, but also must focus on a lot of information, otherwise they can not capture, track and destroy the target. The most important weapon in military forces will no longer be a high-performance fighter, bomber, tank, warships, but a huge flood of data from the information system. Invisible information and knowledge, like armored masters, play a huge role in combat and are increasingly becoming the most important combat and power multiplier. Computing power, communication ability, reconnaissance ability, processing ability, decision-making ability, computer simulation ability, network warfare and other information and knowledge factors will become a key factor in measuring military power.

The contrast of military forces is increasingly dependent on the invisible and difficult potential of the intelligence and structural forces of the information weapons system. Therefore, in the past according to the number of combatants and tanks, aircraft, artillery, warships and other weapons and equipment performance, quantity and other static indicators to assess the strength of military strength is clearly challenged. Because of the intelligence of the information weapon system, the structural force has great potential for dynamic. The strength of the Gulf War contrast and the outcome of the war can explain this problem. Before the war, Iraq and the multinational force compared to 1.6: 1, but the result of the war is the Iraqi army casualties for the multinational force 100 times. Obviously, if not a large number of multinational force weapons system to play a multiplier combat potential, there will be no such a war situation. It can be seen that the principle of force assessment of the number of static quantities will be replaced by a new force theory.

Battlefield information is true and false

Because of the development of information technology, and widely used in future war, so that a large amount of modern war information, processing information has been very difficult. Such as: the US Strategic Air Force Command, an average of more than 815,000 per month to deal with military information, almost 26,500 copies per day. In the Gulf War, the multinational force in the 42 days of combat, dealing with up to millions of military information. Only the US Army logistics will handle 10,700 copies of military information every day. After the military, weapons and equipment and the battlefield are digitized, the military information highway will cover the entire combat space, the information is true and false, there are new and old, heavy and light, there is real, there are thick and so on, information Like the tide to the red and blue both sides of the command came. In such a fast-paced, fighter fleeting, information massive battlefield environment, to the red and blue commander of a brief decision-making time, forcing both commanders in the complex battlefield information forging discrimination, analysis and judgment, quick decision-making , Through the phenomenon to seize the essence, improve the command ability.

Battlefield space and scope is blurred

Battlefield is the enemy of the two sides of the interaction between combat forces and combat forces and firepower to kill the maximum distance. In the past war, due to the level of weapons and equipment constraints, cold weapons era battlefield space, basically confined to the war between the two sides of the visual distance; hot weapons and mechanized war era, battlefield space by the firearms and the two sides of the maneuverability And the battlefield space is expanding, and from a single land battlefield, to the development of the marine battlefield and air battlefield; combat distance from the visual distance to the development of remote and ultra-long-range , The depth and dimension of the battlefield continue to expand. After entering the information warfare, with the development of military weapons and equipment and structure changes, modern warfare space from the traditional land, sea and air to space, computer space, especially information, psychology, electromagnetic, cognitive and other virtual space expansion , In addition to the range of modern weapons and equipment and a substantial increase in mobility, the future battlefield in front and rear become increasingly blurred, in addition to the solid space in the solid before and after the exception, in the dynamic action space has no difference. Fighting may start from the front, it may start from the depth. Especially the establishment of digital forces, so that the army choose the way of combat operations, with greater freedom and flexibility. At the same time, but also to accurately determine the other side of the operational space and the exact location of the space, increasing the complexity. First, information weapons greatly improve the military’s ability to war, so that the military battlefield combat more flexible way. Second, information weapons greatly enhance the military’s full-time, all-round rapid mobility, so that information warfare warfare areas to expand.

Military aerospace capacity and long-range air transport capacity, the extensive use of armed helicopters, to achieve long-range rapid maneuver provides a good material basis. Future information warfare, or in three-dimensional space or in four-dimensional space, generally difficult to accurately grasp. And only when the other side of the combat operations to a certain size, it is possible to make a relatively accurate judgments, which to some extent increased the difficulty of command and control. The ambiguity of combat space is also manifested in the fuzzy scope of combat operations. As the future of information operations will break through the frontier to the depth of the gradual advance of the pattern, in a multi-dimensional space within the full range, full depth of the war, so that the scope of combat operations increased, combat space has become elusive. The uncertainty of the scale of combat operations in the information warfare determines the diversity of combat space. This also makes it possible to judge the space of the other combat operations, become blurred, and show the characteristics of difficult to predict and control.

Combat methods and methods are blurred

Advanced information technology, not only to achieve the real-time reconnaissance intelligence and digital battlefield, greatly improving the combat effectiveness of the army, more importantly, there have been many new means of warfare: such as information warfare momentum and power to make enemies Information deterrence; to disperse, conceal and open the information channel of the information shielding; on the enemy battlefield awareness system and information system implementation of information attacks; through the information system hidden false information fraud and information cut, computer virus attacks , Special operations, psychological warfare, non-contact operations, non-fatal attacks, structural damage warfare, these combat methods used in information warfare, completely changed the past offensive and defensive procedures clear and coherent characteristics, so that the use of combat means Order, combat form of non-model and other characteristics of more and more prominent, and then led to the information warfare, the use of the enemy means of warfare, timing and methods, become more difficult to guess. In the process of the combination of fuzzy, that is, in the course of the war, due to the enemy due to the appropriate choice of means of attack, and flexible combination, so that the enemy can not determine what the other side will take the means of combat, can not effectively take the appropriate protective measures. In the use of the timing of the fuzzy, that is, according to the intention of war and combat purposes, for different stages of combat and different areas of combat, to take different means of attack, reduce the enemy resistance will make it in trouble. In the fight against the ambiguity of the target, that is, the use of information warfare means of diversification, for the needs of information operations, both sound East West, but also the East and East, the flexibility to combat the enemy command center, communication center or radar station, air defense system , Logistical support systems and other key nodes, so that the enemy is difficult to use the means of my war to make accurate predictions.
原文網址:https://read01.com/j7m0M8.html

Original Mandarin Chinese:

隨著信息技術的不斷發展,改變了戰爭的形態、性質和規模,使作戰樣式、作戰方法、作戰環境、作戰條件等諸要素已較以往發生了諸多變化,未來戰場變得更加模糊不清,可歸納為以下幾種:

戰爭規模與層次模糊

戰爭在規模和層次上,可劃分為戰略、戰役和戰術,在以往戰爭中三者之間的區別十分明顯。從三者相互關係上,戰略決定戰役,戰役決定戰術,而且戰術反作用於戰役,戰役又反作用於戰略,這是戰爭本身存在的內在規律。隨著信息技術的發展,高技術戰爭發展為信息化戰爭,雖然未從根本上改變戰略、戰役、戰術這種作用與反作用的辯證關係,但是卻使戰略、戰役、戰術行動規模的日益模糊。這是因為,信息化條件下局部戰爭目的、規模和使用兵力、兵器有限,戰爭持續時間短,政治性突出,戰爭與戰略、戰役、戰術結合得十分緊密,趨於一體。信息化武器和兵器打擊精度高、威力大、射程遠,具有全天候、全時空的平戰結合的偵察與打擊一體化能力,為迅速達成戰爭目的提供了有效手段,有時不動用大部隊也能達成戰略、戰役目標。任何一個作戰單元,甚至是單兵的戰鬥行動,都能得到強大的信息和火力支援。在它們的作用下,戰術打擊可以直接達成戰略目的,戰略指揮可以隨時介入戰術層次已不再是夢想。由此可見,以往通過局部小勝逐步匯集成戰略性勝利的作戰理論受到衝擊,戰略、戰役、戰術三個作戰層次間的界線日益模糊。

隨著大量使用精確打擊兵器、隱形兵器、無人機,因而通過一、二次火力突擊就可達成戰役或戰略目標。海灣戰爭中,多國部隊首先是通過大規模的戰略空襲行動,爾後通過地面諸軍種聯合作戰達成了戰爭目的;美軍入侵巴拿馬,是通過動用陸軍實施五路重心攻擊的戰役行動達成了預期目的;阿富汗戰爭中,美軍主要通過空中精確打擊和特種部隊搜剿達成了戰爭目的;伊拉克戰爭中,美軍在空中打擊掩護下,美國陸軍師通過戰術行動達成了戰爭目的。作戰規模、層次的模糊性,是信息戰本質特徵的反映。在信息戰中,敵對雙方為迅速達成既定的戰略目的,將會超常使用作戰力量,最大限度地投入先進的技術兵器和精銳部隊,力求在短時間內摧毀對方的指揮控制系統,以奪取戰場上制信息權的優勢。信息戰的這一特點,使戰役戰鬥與戰略目的沒有明顯的區分,作戰規模也沒有明確的戰役戰鬥的區別。一次戰役既可能決定戰爭的勝負,一次戰鬥也可能實現戰爭的目的,從而大幅度地提高了戰役戰鬥的戰略作用。特別是各種精確制導武器、彈道飛彈防禦系統、偵察監視系統、隱形武器、C4ISR系統等信息化兵器的廣泛運用和快速反應部隊、特種部隊、戰略預備隊等頻繁投入戰場,使得作戰規模的界定模糊性更加突出。

因此,在未來信息作戰中,作戰雙方都將以不確定的作戰規模,採取超視距精確打擊、非程式化「點穴」和結構破壞等戰法,打擊對方的戰場感知系統與信息系統,以便迅速地達成作戰目的。這樣,戰場上的特種作戰部隊就可能大顯身手,即在戰前秘密地深入敵後,直接攻擊和癱瘓敵指揮控制系統,使敵失去對其作戰力量的控制,從而陷入指揮混亂、協調無序的困境。這種規模的作戰雖然較小,但對於作戰的勝負卻能起到極其重要的作用。

武器裝備與功能模糊

技術決定戰術,同樣也決定著軍隊的編制體制和軍兵種構成。例如,火炮、化學武器、無線電報機等武器裝備的出現,為炮兵、防化兵、通信兵等新兵種的出現奠定了物質基礎。就軍種而言,由於飛機的出現,進而產生了空軍;船舶的問世,催生出了海軍。工業時代,要求的是分工合作,所以細化和產生的專業越來越多,體現在軍隊的構成上,就是軍兵種劃分得越來越細;資訊時代,要求的是整體作戰,各專業之間密切協同,走集成一體化聯合作戰之路。反映在軍隊的構成趨勢上,就是作戰系統的一體化。比如,未來許多武器裝備系統將形成一個獨立的作戰單元,既可完成陸軍要求的作戰任務,也可實現空軍的作戰要求,還可達到海軍的作戰目的。換句話說,當未來作戰飛機的續航能力無限延長,並超越大氣層作戰;陸軍告別「地面爬行」,實現全球抵達、全球作戰;海軍實現由海到陸、到空的作戰能力轉化之時,一體化作戰必然催生一體化部隊。一體化作戰部隊,一般由裝甲兵、炮兵、機械化步兵、飛彈、攻擊和運輸直升機、海軍艦艇等組成,能獨立作戰,將實現專業軍隊向職業化軍隊過渡。

未來一體化部隊將主要表現為,將打破傳統的陸、海、空、天等軍種體制,按照系統集成的要求,建立「超聯合」的一體化作戰部隊。未來信息化戰爭是高度一體化聯合作戰,使用傳統的諸軍種力量實施聯合作戰,已難以適應這種高度一體化聯合作戰的需要。為此,未來軍隊組織的編成,將打破傳統的陸、海、空、天等軍種體制,按照偵察監視、指揮控制、精確打擊和支援保障四大作戰職能,建成四個子系統,即:探測預警子系統、指揮控制子系統、精確打擊與作戰子系統和支援保障子系統。這四個子系統的功能緊密銜接,有機聯繫,構成一個相互依存龐大的一體化聯合作戰系統。按照這個思路構建的軍隊,將從根本上拋棄工業化時代軍隊建設的模式,革除偏重發揮軍種專長和追求單一軍種利益的弊端,使作戰力量形成「系統的系統」或「系統的集成」,從而能夠充分發揮整體威力,實施真正意義上「超聯合」的一體化聯合作戰。

軍兵種作戰任務與編制模糊

軍兵種作戰力量具有不同的打擊目標和執行不同作戰任務。第一次世界大戰,作戰力量主要以步兵為主,基本上是步兵與步兵的對抗;第二次世界大戰,由於武器裝備的發展,飛機、坦克、大炮用於戰爭,軍兵種之間的作戰任務有了明顯區分,通常執行不同的作戰任務。但是在信息化條件下局部戰爭中,由於武器裝備向多功能一體化方向上發展,部隊的編制內,不僅有各兵種,還有各軍種。作戰部隊既能執行地面作戰任務,又能執行打擊空中和海上目標任務,使軍種間作戰的界線將不易區分。例如:摧毀敵方坦克的兵器,可能是已方陸軍的坦克或反坦克兵器,也可能是空軍的飛機或海軍潛艇發射的「智能」型飛彈。美軍計劃組建四種一體化部隊:由裝甲兵、炮兵、飛彈兵、攻擊與運輸直升機組成的一體化地面部隊:編有「飛行坦克」的陸空機械化部隊;由多機種組成的空軍混編聯隊和中隊;由各軍種部隊組成的「聯合特遣部隊」。俄軍擬組建集各軍兵種於一體的「多用途機動部隊」,由地面、空中和太空兵力組成的「航空航天部隊」,以及由各軍種非戰略核力量組成的「非核戰略威懾部隊」。

在未來信息化局部戰爭中,武器裝備向多功能、一體化方向發展,部隊的編制趨向混合化、小型化。作戰中,各軍兵種圍繞既定的作戰目標,彼此依存,融為有機的整體。在戰場上,各軍兵種將在陸、海、空、天、電等多維領域,圍繞統一的作戰目的,既在活動空間上相對獨立,又在作戰行動上高度融合,使得不同軍兵種所執行的任務界線變得更加模糊。

戰爭動因與目的模糊

傳統戰爭的動因一般是政治鬥爭掩蓋下的經濟利益之爭。在資訊時代,經濟利益之爭仍將是導致戰爭的根本原因,但除此之外,由於各國之間、國際國內各派政治力量之間交往增多,聯繫密切,這就必然導致各個國家、民族、社團之間由政治、外交、精神等因素引發的衝突增多,使宗教、民族矛盾上升,使暴力活動、走私販毒、恐怖活動國際化。這些矛盾與衝突不僅是「亞戰爭行動」的直接根源,也是導致戰爭的動因之一。1991年海灣戰爭直接動因,是1990年8月2日伊拉克入侵科威特之後,聯合國安理會立即召開會議,通過了660號決議,譴責伊拉克入侵科威特,要求伊拉克無條件從科撤軍。美國出於保護西方石油來源和為建立符合其利益的世界新秩序的目的,乘虛而入帶頭對伊拉克實施經濟制裁,隨後以美國為首的多國部隊以執行聯合國安理會決議為名,出兵海灣。通過42天的交戰,美軍達到了戰爭目的。伊拉克戰爭,美國以伊拉克擁有大規模殺傷性武器為由,沒有經過聯合國授權而發動的一場非正義戰爭。整個戰爭中,美軍作戰的重心是針對薩達姆等少數伊拉克高層領導人,並以尋找大規模殺傷性武器而展開的攻擊行動。雖然戰爭已經推翻了薩達姆政權,但是美國至今仍然沒有找到伊拉克擁有這種違禁武器的有力證據。在這場戰爭軍事目的上,美國也是為了試驗新的作戰理論。

近幾年,美軍大力倡導軍事變革。指導伊拉克戰爭的理論是「網絡中心戰」理論,並運用1996年提出的「震撼與威懾」的新理論:強調運用猛烈的火力,震撼性打擊對手,不分前沿和縱深,全方位迅速地對敵人進行打擊,運用先進的精確制導技術,打擊對方目標時片面追求雙方較少的傷亡;空中與地面行動同時展開,目的是摧毀對方的意志,使其政權崩潰,從而達到不戰而屈人之兵的目的。伊拉克戰爭中,美軍沒有進行大規模的戰略轟炸,而是利用高技術加特種兵的戰術進行作戰,這是美軍軍事變革的主要成果之一。

戰爭進攻與防禦模糊

以往攻防作戰的程序十分明,進攻一方通常按照進攻準備、突破、衝擊、縱深作戰等步步進攻程序進行,防禦一方按照防禦準備、火力反準備、反衝擊、縱深抗擊等分段抗擊作戰程序進行,攻防雙方各個作戰階段展開有序。而高技術武器裝備和信息技術的發展,新軍事革命將改變未來作戰程序,作戰行動將突破固定的戰場和陣地的限制,在整個作戰空間的各個層次、各個方向、各個方面同時進行。這樣一來,以往戰爭中的前後方界線模糊,相對穩定的正面和固定的戰場不復存在,進攻行動和防禦行動的界線因為戰場的高度流動性和不確定性也變得模糊不清並影響世界軍事力量平衡。攻防兼備、攻防一體作戰尤其是攻防一體的信息戰將成為今後作戰藝術的焦點,使每一次戰爭都有攻中有防、防中有攻。

攻防作戰將在陸、海、空、天、電以及外層空間和前沿與縱深、正面與翼側、前方與後方同時展開,戰場機動頻繁,線式作戰樣式已不適應信息化條件下局部戰爭發展的需要,取而代之的是非線式作戰,形成一種「島嶼式作戰基點」,前方與後方的界線、敵我雙方的戰線變得模糊,戰場呈現流動的非線性或無戰線狀態的多維立體戰場。

衡量戰爭勝負與標準模糊

以往衡量一場戰爭勝負的標準通常指的是殲滅對方多少兵力,繳獲多少武器,占領多少城鎮和領土,然而在未來信息化條件下局部戰爭中,衡量一場戰爭勝負的標準已不只是這些。信息化條件下的局部戰爭,政治目的與戰爭結合得緊密,戰爭企圖往往不通過侵入對方領土,全殲敵軍或使敵方徹底投降,以免引發世界輿論的和民眾的強烈反對,造成政治上的被動。

信息化戰爭的一大特點是,將使傷亡、破壞,特別是附帶性破壞減少到最低限度,通常使用精確制導武器精確打擊,避免重兵集結進行面對面的拼殺,打一場像美軍懲罰利比亞發動的「外科手術式」作戰,實施空中遠程機動空襲,達成戰爭目的;也可實施飛彈,進行遠隔千里的攻城戰,也能達成局部戰爭的目的;也可像海灣戰爭那樣,不占領其國土,不殺傷其一兵一卒,不繳獲其武器、彈藥,實施的大規模的空襲戰,削弱其軍事設施,搗毀其國政權。

戰爭軍隊與民眾模糊

以往的戰爭,由於受信息基礎設施和技術的限制,軍隊與社會的聯繫相對「鬆散」;純戰爭的武器裝備亦導致完全獨立於民間之外的軍事組織。資訊時代,信息成為軍民結合的紐帶,這種結合,隨著社會和軍隊的信息化程度的發展,融合程度也將不斷提高。這就使得社會和普通民眾不再是戰爭的旁觀者,甚至也不僅處於支援和從屬地位,而是與軍隊一樣,從戰爭的幕後走向了前台。

正如人們看到的,一方面,現代戰爭的目的已不再單純地追求攻城掠地和最大限度地殲滅敵有生力量,打擊目標亦不再局限於敵方的重兵集團和軍事設施,而是包括對應賴以生存和運轉的基礎設施,如:金融網、電力網、交通網、行政網、通信網等。另一方面,戰爭有向「平民化」發展的趨勢。比如,信息化使得「非國家主體」具備了與國家力量進行對抗的能力。任何一個「非國家主體」,只要具備一定的技術和信息設備,就可以對一個國家的要害目標進行攻擊,其危害有時並不亞於一場傳統意義上的戰爭。比如基地組織對美發動的9·11襲擊,就是如此。信息戰力量的構成,雖然仍具有以往戰爭全民參戰的痕跡,但是在構成的形式和作戰的質量上,由於較多地加入了信息化的含量,特別是較多地加入了全社會民眾的信息戰能力,所以無疑使判斷信息戰具體參與力量時的思維趨於模糊,而為作戰決策與指揮帶來較大的困難。隨著信息技術深入發展,社會民眾的信息化程度也將極大地提高。在這種情況下的信息戰,就更加突出軍民兼容的特徵。特別在信息戰中,許多高技術工作,僅靠軍隊的力量難以獨立完成,還需要全社會力量的協作,這就使信息戰的作戰力量,較多地融入了全民皆兵的因素。

作戰雙方力量對比與能力模糊

以往交戰雙方力量對比,通常以軍隊人員數量多少、各種武器多少的比數來衡量力量優勢,進行籌劃攻防作戰。但在信息化條件下局部戰爭中,集中兵力的內容和方式有所改變。力量的對比不只是考慮數量多少,更主要是考慮質量,尤其是要考慮集中火力和信息,各種遠程打擊兵器不需要集中部署,就可對目標實施集中突擊。要使集中後的火力有效地發揮作用,還必須集中大量信息,否則就無法捕捉、跟蹤和摧毀目標。軍事力量中最重要的武器將不再是高性能的戰鬥機、轟炸機、坦克、戰艦,而是由信息系統湧現的巨大數據洪流。無形的信息和知識像裝甲雄師一般,在作戰中發揮巨大的作用,並日益成為最重要的戰鬥力和力量倍增器。計算能力、通信能力、偵察能力、處理能力、決策能力、計算機模擬能力、網絡戰等信息和知識因素都將成為衡量軍事力量的關鍵因素。

軍事力量的對比,越來越多地取決於信息武器系統的智力和結構力所帶來的無形的、難以量化的巨大潛力。因此,以往根據作戰人數和坦克、飛機、大炮、軍艦等武器裝備的性能、數量等靜態指標評定軍事力量強弱的方法顯然受到了挑戰。因為信息武器系統的智力、結構力具有巨大的動態潛力。海灣戰爭的兵力對比和戰爭結局就可說明這個問題。戰前,伊拉克與多國部隊的兵力對比是1.6:1,但戰爭結果是伊軍的傷亡為多國部隊的100倍。顯然,如果不是多國部隊的大量信息武器系統發揮出成倍的作戰潛力,是不會有如此戰局。可見,靜態數質量指標的力量評估原則將會被一種全新的力量理論所取代。

戰場信息真與假模糊

由於信息技術的發展,並廣泛運用於未來戰爭,使現代戰爭信息量很大,處理信息已經十分困難。如:美國戰略空軍司令部,平均每月要處理軍事信息815000多份,差不多每天處理26500份。在海灣戰爭中,多國部隊在42 天作戰中,處理軍事信息多達數百萬份。僅美國陸軍後勤每天就要處理軍事信息10700份。在軍隊、武器裝備和戰場都實現數字化以後,軍事信息高速公路將覆蓋整個作戰空間,這些信息有真有假、有新有舊、有重有輕、有虛有實、有粗有細等,信息像潮水般地向紅藍雙方指揮所湧來。在這樣快節奏、戰機稍縱即逝、信息海量戰場環境中,給紅藍雙方指揮員短暫決策處理時間,逼著雙方指揮員在錯綜複雜的戰場信息中鍛鍊辨別力、分析判斷力、快速決策力,透過現象抓住本質,提高指揮能力。

戰場空間與範圍模糊

戰場是指敵對雙方作戰力量相互作用並加上作戰力量機動和火力殺傷的最大距離。以往戰爭中,由於受武器裝備水平的限制,冷兵器時代的戰場空間,基本局限在交戰雙方的目視距離之內;熱兵器和機械化戰爭時代,戰場空間由火器的射程和雙方兵力的機動能力所決定,並隨著火器(炮)射程和兵力機動能力的不斷提高,戰場空間日漸擴大,並由單一的陸地戰場,發展到海洋戰場和空中戰場;作戰距離則由目視距離發展到遠程和超遠程,戰場的縱深和維度不斷拓展。進入信息化作戰後,隨著軍隊武器裝備和結構的發展變化,現代戰爭的作戰空間又從傳統的陸、海、空向太空、計算機空間,特別是信息、心理、電磁、認知等虛擬空間拓展,加之現代武器裝備的射程及機動能力大幅提高,未來戰場的前方和後方變得日漸模糊,除了在固態的地理空間上有前後之分外,在動態的行動空間上已無先後之別。戰鬥既可能從前方打響,也可能從縱深開始。特別是數字化部隊的建立,使軍隊選擇作戰行動的方式,具備了更大的自由度和靈活性。同時,也為準確地判斷對方作戰行動空間的具體範圍和準確位置,增加了複雜度。一是信息化武器大大提高了軍隊的遠戰能力,使軍隊的戰場打擊方式更加靈活。二是信息化武器大大增強了軍隊的全時空、全方位快速機動能力,使信息戰的交戰區域更加擴大。

軍事航天能力和遠程空運能力的提高,武裝直升機的廣泛運用,為實現遠距離快速機動提供了良好的物質基礎。未來信息戰,或在三維空間或在四維空間進行,一般不易準確把握。而只有當對方的作戰行動達到一定規模時,才有可能作出相對準確的判斷,這在一定程度上增加了指揮和控制的難度。作戰空間的模糊性,還表現在作戰行動範圍的模糊。由於未來信息作戰將打破由前沿向縱深逐次推進的格局,在多維的空間內進行全方位、全縱深的交戰,就使作戰行動的範圍增大,作戰空間變得難以捉摸。信息戰所具有的作戰行動規模的不確定性,決定了作戰空間的多樣性。這也使判斷對方作戰行動的空間,變得模糊起來,而呈現出不易預測和控制的特點。

作戰手段與方法模糊

先進的信息技術,不僅實現了偵察情報的實時化和戰場數字化,極大地提高了軍隊的戰鬥效能,更重要的是出現了許多嶄新的作戰手段:如以信息戰的聲勢和威力使敵懾服的信息威懾;以分散、隱蔽和廣開信息通道的方法進行的信息屏蔽;對敵戰場認識系統和信息系統實施的信息攻擊;通過信息系統隱真示假行動的信息欺騙以及信息割斷、計算機病毒襲擊、特種作戰、心理戰、非接觸作戰、非致命攻擊、結構破壞戰等,這些作戰手段運用於信息戰,完全改變了以往攻防作戰程序清晰、連貫性強的特點,使作戰手段運用的非有序性、作戰形式的非模式化等特點越來越突出,進而導致了在信息戰中,對敵方作戰手段運用的規律、時機和方法,變得更加難以揣度。在手段組合上的模糊,即在作戰過程中,因勢因敵恰當地選擇打擊手段,並靈活地進行組合,使敵無法判斷對方將要採取何種作戰手段,無法有效地採取相應的防護措施。在運用時機上的模糊,即根據作戰的意圖和作戰目的,針對不同的作戰階段和不同的作戰領域,採取不同的打擊手段,降低敵抵抗意志,使之陷入困境。在打擊目標上的模糊,即利用信息戰作戰手段多樣化的特點,針對信息作戰的需要,既可聲東擊西,亦可聲東擊東,靈活地打擊敵指揮中心、通信中心或雷達站、防空系統、後勤保障系統等關鍵節點,使敵難以對我作戰手段的運用作出準確的預測。
原文網址:https://read01.com/j7m0M8.html

Original Source: https://read01.com/j7m0M8.html

 

中國優先發展網絡戰略信息化戰 // China to give priority to the development of network strategy & information warfare

中國優先發展網絡戰略信息化戰 //

China to give priority to the development of network strategy & information warfare

Cyberspace has become the national comprehensive security of the door. Network warfare reality, the network battlefield globalization, network confrontation normalization, the network attack heart white hot, the network to build the army of the general trend, no one can block. Give priority to the development of network strategy, and actively seize the commanding heights of network strategy, for my army building is of great significance.

  The main features of network strategy

Network strategic strength refers to the ability to achieve the desired results through cyberspace. From the current development and possible future trends, mainly with the following characteristics.

Composed of multiple. In recent years, the major network events in the world have shown that the strategic power of the military network is the main force of cyberspace competition. The strategic power of the government departments and the private sector is an important part of the cyberspace competition. The “cyber warrior” An important addition.

Strong professionalism. Network strategy strength has a strong latent and difficult to predict, and the speed of light, instantaneous effect, monitoring and early warning is difficult; once the action is effective, damage effect superimposed magnification or non-linear step, with a typical “butterfly effect.” In 2010, the “shock net” virus attacked the centrifuges of the Iranian Bushehr nuclear power plant and the Natanz uranium enrichment plant, resulting in nearly a thousand centrifuge scrapped, forcing Iran’s nuclear capacity building to delay 2 to 3 years, opened the network attack soft means Destroy the national hard facilities.

Destructive. The strategic power of the network is no less than the weapons of mass destruction. Russia and Georgia in 2008, “the five-day war”, the Russian military to Georgia’s television media, government websites and transportation systems as the goal, to carry out a comprehensive “bee group” type of network paralysis attacks, leading to grid government agencies operating chaos, Logistics and communication system collapse, much-needed war materials can not be delivered in a timely manner, the potential of the war has been seriously weakened, a direct impact on the grid of social order, operational command and troop scheduling. The Russian military doctrine has identified cybercrime as a weapon of mass destruction and has retained the right to use weapons of mass destruction or nuclear weapons to counterattack.

Advanced technology and phase. Network strategy strength development speed, replacement fast, technical materialization for the equipment cycle is short. At present, the speed of the microprocessor doubles every 18 months, the backbone bandwidth doubled every six months, a variety of new electronic information equipment after another, all kinds of application software dizzying. Cyber ​​space confrontation is the field of information in the field of offensive and defensive struggle, the use of network strategy forces in the confrontation of the phase with grams, constantly renovated. The development of the firewall and the information monitoring technology makes the software of the anti-wall software upgrade continuously. The development of the firewall and the information monitoring technology has led to the development of the firewall. , Can be described as “a foot high, magic high ten feet.”

  The Developing Trend of Network Strategic

From the subordinate force to the development of key forces. In the past, the network strategic power is mainly for other forces to provide information security, in a subordinate position; with the development of network information technology, network system control of other rights, network strategic forces from subordinate status to the dominant position to accelerate into, to maintain the country The key to safety. There is no network security there is no sovereign security, “no net” to become a new law of war, the world’s major countries around the network space development rights, dominance and control of a new round of competition, especially the United States and Russia adhere to the practice In the use and continue to develop.

From the maintenance of force to the development of specialized forces. In the past, the network strategy is mainly to maintain the network information system and all kinds of network transmission system, network attack and defense attributes are not clear. At present, all areas of the network space in depth, the world’s major countries are hard to build cyberspace offensive and defensive capabilities, the main military power of the network strategy has become a network of reconnaissance, network attacks, network defense and other clear division of labor, professional regular military forces. The United States has so far built the world’s most complete and powerful network of the army, and held a series of “network storm” series of exercises. The new “cyberspace strategy” in the United States, the first public to cyberspace combat as one of the tactical options for future military conflict, clearly proposed to improve the US military in the cyberspace of deterrence and offensive capability. In order to adapt to the new strategy, the US Department of Defense proposed 2018 to build a offensive and defensive, flexible form, with full combat capability of the network forces construction goals.

From the military to the integration of military and civilian development. The development of the strategic power of the military network started relatively late compared with the civil field, and because of the confidentiality of military confrontation and the specificity of the operational objectives, it is often developed independently. With the development of network technology, the military’s own network strategic strength is difficult to meet the needs of diversified tasks, we must learn from local folk technical means, integrate local network resources, realize the integration of military and civilian development. Network space capacity building on the talent, intelligence, experience and other software environment is extremely high, coupled with the local convergence of a wealth of network resources, military and civilian forces to promote the development of cyberspace capabilities become the strong tone of the times.

From a single model to the “network integration” development. At present, the network includes both the computer IP system network and the non-computer IP system network including a large number of complex early warning detection network, satellite communication network and tactical data link. The traditional single network confrontation model is difficult to meet the challenge of cyberspace. With the development of information technology, especially the Internet of Things technology, the relationship between the network and the power of the battlefield network more and more closely, which for the “network integration” in the technical means to provide the possibility. The use of electronic warfare and network warfare means, for different systems around the open bow, broken chain broken network, to achieve complementary advantages, system damage, as the latest guidance on the construction of network space. Data show that the US military typical network of integrated attack equipment “Shu special” system has been from the “Shu-1” to the current development of “Shu-5”. According to reports, “Shute” system through the enemy radar antenna, microwave relay station, network processing nodes to invade the enemy air defense network system, real-time monitoring of enemy radar detection results, even as a system administrator to take over the enemy network, Control of the sensor.

From non-state actors to state actors. At present, the network attack has developed from a single hacker behavior for the national, political, military confrontation, the attack object has been developed from the personal website to the country, the army’s important information system, attack “unit” has grown from stand-alone to tens of thousands Hundreds of thousands of terminals, and can instantly release the amazing attack energy. Although many of the intentions of malicious acts of non-State actors are non-state, the consequences are national, whether they are espionage, political opinions, or personal discontent, or terrorist activities , Have a direct impact on social stability, disrupt the economic order, endanger the stability of state power. Once the relevant reaction is made, the subject of the act must be the state and the army, and not the non-state actors themselves.

  The Construction of Network Strategic Strength

Strengthen strategic planning. Cyberspace competition is the first strategic battle of the contest. From the national level, the network strategy of the power of the main function is to reduce the risk of cyberspace, maintaining the normal operation of the country. We must understand the extreme importance and realistic urgency of cyberspace security from the perspective of national security, raise the focus of cyberspace capacity building to the strategic level, and try to reduce the national cyberspace security while trying to solve the problem of how to make good use of cyberspace Risk, so that cyberspace security has become an important support for national prosperity and security. From the military level, the network strategy is mainly to seize the system of network power. We must expand the military vision, the cyberspace as an important area of ​​action, to seize the system as the core, change the military ideas and ideas, adjust the structure and composition of armed forces, the development of weapons and equipment and take a new tactics.

Speed ​​up the construction of the power system. Maintain cyberspace security in the final analysis depends on the strength. We must base ourselves on the characteristics and laws of cyberspace capacity building, focus on the core elements of network capability system and the overall layout of network strategy, and systematically design the system structure which conforms to the law and characteristics of cyberspace confrontation in our country, and perfect the system of leadership and command Functional tasks, straighten out the relationship between command and management. We should take the network strategic power as an important new combat force, from the organization construction, personnel training, equipment development, elements of training and other aspects, to take extraordinary measures to give priority construction, focus on protection. To normalize the national network of offensive and defensive exercises, test theory, tactics, equipment and technology effectiveness, and comprehensively enhance the comprehensive prevention of cyberspace capabilities.

Promote technological innovation. The essence of cyberspace confrontation is the competition of core technology, and it is necessary to accelerate the independent innovation of network information technology. To improve the ability of independent innovation as a strategic basis to the national innovation system as the basic support, focus on breaking the forefront of network development technology and international competitiveness of the key core technology, advanced deployment and focus on the development of information technology and information industry. To speed up the process of localization of key core technologies, strengthen the construction of safety testing and active early warning means, and gradually improve the equipment system of cyberspace in China, and comprehensively improve our network space capability. To follow the basic laws of cyberspace confrontation, in accordance with the “asymmetric checks and balances” strategy, increase the quantum technology, Internet of things and cloud computing and other new technology research and development efforts to create unique combat capability, master the initiative of cyberspace security development The

Promote the integration of military and civilian development. The integration of the military space ability of military and civilian development is not only the overall situation of national security and development strategy, the overall planning of national defense and economic and social development, but also the objective fact that cyberspace security can not be avoided. We must actively promote the deep integration of military and civilian development, to promote China’s network space capacity supporting the construction. It is necessary to formulate top-level planning in the form of policies and regulations, clarify the objectives, methods, organizational division and basic requirements of the deepening development of cyberspace in the form of policies and regulations, and make the integration of military and civilian development into law enforcement and organizational behavior; To establish a sound military coordination, demand docking, resource sharing mechanism, through a unified leadership management organization and coordination of military needs and major work, to achieve risk sharing, sharing of resources and common development of the new situation. We should pay attention to the distinction between the boundaries of military and civilian integration, clear the concept of development-oriented people and the main battle concept of the army, and actively explore the military and the people, the advantages of complementary channels.

Original Mandarin Chinese:

网络空间成为国家综合安全的命门。网络战争现实化、网络战场全球化、网络对抗常态化、网络攻心白热化、网络建军正规化的大势,无人可挡。优先发展网络战略力量,积极抢占网络战略制高点,对于我军队建设具有重要意义。

  网络战略力量的主要特点

网络战略力量,是指通过网络空间来实现预期结果的能力。从当前发展及未来可能的走势看,主要有以下特点。

组成多元。近年来发生在全球范围内的重大网络事件表明,军队网络战略力量是网络空间竞争的主力军,政府部门、私营机构网络战略力量是网络空间竞争的重要部分,民间“网络战士”是网络空间竞争的重要补充。

专业性强。网络战略力量具有极强的潜伏性和难预测性,且以光速进行、瞬时产生效果,监测预警难度大;一旦行动奏效,损害效果叠加放大或非线性阶跃,具有典型的“蝴蝶效应”。2010年,“震网”病毒攻击了伊朗布什尔核电站和纳坦兹铀浓缩厂的离心机,造成近千台离心机报废,迫使伊朗核能力建设延迟2至3年,开启了网络攻击软手段摧毁国家硬设施的先河。

破坏性大。网络战略力量破坏力不亚于大规模杀伤性武器。2008年俄国与格鲁吉亚“五日战争”中,俄军以格方的电视媒体、政府网站和交通系统等为目标,开展全面的“蜂群”式网络阻瘫攻击,导致格政府机构运作混乱,物流和通信系统崩溃,急需的战争物资无法及时投送,战争潜力受到严重削弱,直接影响了格的社会秩序、作战指挥和部队调度。俄罗斯军事学说已将网络攻击手段定性为大规模毁灭性武器,并保留了运用大规模毁灭性武器或核武器反击的权利。

技术先进且相生相克。网络战略力量发展速度快、更新换代快,技术物化为装备的周期短。当前,微处理器的速度每18个月翻一番,主干网带宽每6个月增加一倍,各种新型电子信息设备层出不穷,各种应用软件目不暇接。网络空间对抗是信息领域的攻防斗争,网络战略力量使用的手段在对抗中相生相克、不断翻新。常规通信受干扰催生了跳、扩频通信体制,跳、扩频通信的出现又催生了频率跟踪干扰、相关信号干扰等新型电子干扰手段;防火墙、信息监控技术的发展,使翻墙软件不断升级,可谓“道高一尺,魔高一丈”。

  网络战略力量的发展趋势

由从属性力量向关键性力量发展。以往网络战略力量主要是为其他力量提供信息保障,处于从属地位;随着网络信息技术的发展,制网权统揽其他制权,网络战略力量由从属地位向主导地位加速转进,成为维护国家安全的关键。没有网络安全就没有主权安全,“无网不胜”成为战争的新定律,世界各主要国家围绕网络空间的发展权、主导权和控制权展开了新一轮的角逐,特别是美俄坚持在实践中运用并不断发展。

由维护型力量向专业化力量发展。以往网络战略力量主要是维护网络化信息系统和各类网络传输系统,网络攻击和防御属性均不鲜明。当下各领域对网络空间深度依赖,世界主要国家无不竭力打造网络空间攻防能力,主要军事强国的网络战略力量业已成为集网络侦察、网络攻击、网络防御等分工明确、专业化的正规军事力量。美国迄今已建成全球编制最齐全、力量最庞大的网军,并多次举行“网络风暴”系列演习。美国新版《网络空间战略》,首次公开把网络空间作战作为今后军事冲突的战术选项之一,明确提出要提高美军在网络空间的威慑和进攻能力。为适应新战略,美国防部提出2018年建成一支攻防兼备、形式灵活,具备全面作战能力的网络部队的建设目标。

由军地自主向军民融合发展。军队网络战略力量的发展相对于民用领域起步较晚,且由于军事对抗的保密性和作战目标的特定性,往往自主发展。随着网络技术的发展,军队自身的网络战略力量难满足多样化任务的需要,必须学习借鉴地方民间技术手段,整合地方网络资源,实现军民融合发展。网络空间能力建设对人才、智力、经验等软件环境要求极高,加上地方汇聚了丰富的网络资源,军民联手推进网络空间能力发展成为时代的强音。

由单一模式向“网电一体”发展。现阶段,网络既包括计算机IP体制网络,更包含大量复杂的预警探测网、卫星通信网、战术数据链等非计算机IP体制网络,传统的单一网络对抗模式难以应对网络空间的挑战。随着信息技术特别是物联网技术的发展,战场网中网与电的关系越来越紧密,这为“网电一体”在技术手段上提供了可能。综合运用电子战与网络战手段,针对不同体制的网络左右开弓、断链破网,实现优势互补、体系破击,成为网络空间能力建设的最新指导。有资料显示,美军典型网电一体攻击装备“舒特”系统已从“舒特-1”发展到目前的“舒特-5”。据报道,“舒特”系统可通过敌方雷达天线、微波中继站、网络处理节点入侵敌方防空网络系统,能够实时监视敌方雷达的探测结果,甚至以系统管理员身份接管敌方网络,实现对传感器的控制。

由非国家行为体向国家行为体发展。目前,网络攻击已从单个的黑客行为发展为国家、政治、军事上的对抗行为,攻击对象已从个人网站发展到国家、军队的重要信息系统,攻击“单元”已从单机发展到数万乃至数十万台终端,且能在瞬时释放惊人的攻击能量。尽管非国家行为体的恶意网络行为目的许多是非国家的,但由此所造成的后果却是国家的,无论是进行间谍活动,还是发表政治主张,或是发泄个人不满情绪,或是进行恐怖活动,都直接影响社会稳定、扰乱经济秩序、危及国家政权稳固。一旦因之作出相关反应,其行为主体一定是国家和军队,而不再是非国家行为体本身。

  网络战略力量的建设指向

加强战略统筹谋划。网络空间竞争首先是战略运筹的较量。从国家层面看,网络战略力量的职能主要是降低网络空间的风险,维护国家正常运转。必须从国家安全的视角认清网络空间安全的极端重要性和现实紧迫性,将网络空间能力建设的着眼点上升到战略层面,在着力解决如何利用好网络空间的同时,努力降低国家网络空间安全风险,使网络空间安全成为国家繁荣与安全的重要支撑。从军队层面看,网络战略力量主要是夺取制网权。必须拓展军事视野,把网络空间作为制权行动的一个重要领域,以夺取制网权为核心,变革军事思想和观念,调整武装力量结构与构成,发展武器装备并采取新的战法。

加快力量体系构建。维护网络空间安全说到底要靠实力。必须立足于网络空间能力建设的特点、规律,围绕我国网络能力体系核心要素和网络战略力量建设总体布局,以系统思维设计符合我国网络空间对抗规律和特点的体系架构,健全领导指挥体制机制,明确职能任务,理顺指挥管理关系。要把网络战略力量作为重要的新型作战力量突出出来,从组织建设、人才培养、装备发展、要素演训等各方面,采取超常举措,给予重点建设、重点保障。要常态化开展国家级网络攻防演练,检验理论、战法、装备及技术的有效性,全面提升网络空间综合防范能力。

推进技术自主创新。网络空间对抗的实质是核心技术的比拼,必须加快推进网络信息技术自主创新。要把提高自主创新能力作为战略基点,以国家创新体系为基本依托,集中力量突破网络发展的前沿技术和具有国际竞争力的关键核心技术,超前部署和重点发展信息技术和信息产业。要加速关键核心技术的国产化进程,加强安全测试和主动预警手段的建设,逐步完善我国网络空间的装备体系,全面提高我国网络空间能力。要遵循网络空间对抗的基本规律,按照“非对称制衡”方略,加大对量子科技、物联网和云计算等新技术的研发力度,以独创技术塑造实战能力,掌握网络空间安全发展的主动权。

推动军民融合发展。网络空间能力的军民融合式发展,既是站在国家安全与发展的战略全局,对国防和经济社会发展统筹谋划,也是网络空间安全不能回避的客观事实。必须积极推动军民深度融合发展,全力推进我国网络空间能力配套建设。要综合军民需求制定顶层规划,以政策法规的形式明确网络空间军民融合深度发展的目标任务、方法路径、组织分工和基本要求等关系全局的重大问题,变军民融合发展为执法行为、组织行为;要建立健全军地协调、需求对接、资源共享机制,通过统一的领导管理机构组织协调军地的各类需求和重大工作,达成风险共担、资源共享、共同发展的新局面。要注重军民融合的界限区分,明确以民为主的发展理念和以军为主的作战理念,积极探索军民一体、优势互补的可行性渠道。

Source URL:

http://theory.people.com.cn/n1/2016/1226/c40531-28977153.html

Full Text of China’s National Cyberspace Security Strategy // 國家網絡空間安全戰略全文

Full Text of China’s National Cyberspace Security Strategy

國家網絡空間安全戰略全文

Beijing,People’s Republic of China

27 DEC 2017

December 27, approved by the Central Network Security and Information Technology Leading Group, the National Internet Information Office released the “national cyberspace security strategy”, the full text is as follows.

The extensive application of information technology and the rise and development of cyberspace have greatly promoted the economic and social prosperity and progress, but also brought new security risks and challenges. Cyberspace security (hereinafter referred to as cybersecurity) concerns the common interests of mankind, related to world peace and development, and national security. Safeguarding China’s network security is an important measure to coordinate and promote the comprehensive construction of a well-off society, comprehensively deepen reform, comprehensively administer the country according to law, and strictly pursue the strategic layout of the party, and realize the goal of “two hundred years” and realize the great rejuvenation of the Chinese nation An important guarantee. In order to implement the “four principles” of promoting the transformation of the global Internet governance system and the “five-point proposition” to build the cyberspace destiny community, we have clarified China’s important position on cyberspace development and security, guided China’s network security work, The state in the cyberspace of sovereignty, security, development interests, the development of this strategy.

First, opportunities and challenges

(A) a major opportunity

With the rapid development of information revolution, Internet, communication network, computer system, automation control system, digital equipment and its application, service and data, such as the network space, is a comprehensive change in people’s production and lifestyle, profound impact on human society Development process.

New channels for information dissemination. The development of network technology, breaking the time and space constraints, expanding the scope of communication, innovative means of communication, triggering a fundamental change in the pattern of communication. The network has become a new channel for people to access information and learn to communicate, and become a new carrier of human knowledge transmission.

Production and life of the new space. In today’s world, the depth of the network into people’s learning, life, work and other aspects of online education, entrepreneurship, health care, shopping, finance and other increasingly popular, more and more people through the network exchange ideas, achievements and dreams.

The new engine of economic development. The Internet is becoming the leading force of innovation-driven development. Information technology is widely used in all sectors of the national economy. It has promoted the upgrading of traditional industries, promoted new technologies, new forms, new industries and new models, promoted the adjustment of economic structure and economic development , For economic and social development has injected new impetus.

Cultural prosperity of the new carrier. The network promotes the cultural exchange and the popularization of knowledge, the release of cultural development vitality, the promotion of cultural innovation creation, the enrichment of people’s spiritual and cultural life, has become a new way to spread culture, provide a new means of public cultural services. Network culture has become an important part of cultural construction.

A new platform for social governance. The role of the network in advancing the national governance system and the modernization of the governance capability has become increasingly prominent. The application of e-government has been deepened, and the government information has been shared and publicized. The government has made scientific decision-making, democratization and rule of law, and has smoothed the channels of citizens’ participation in social governance. An important way to protect citizens’ right to know, to participate, to express and to supervise.

Exchange and cooperation of the new link. The development of information and globalization has promoted the global flow of information, capital, technology, talent and other elements, and promoted the integration of different civilizations. Network to the world into a global village, the international community more and more you have me, I have your fate in the community.

National sovereignty of the new territory. Cyber ​​space has become an important part of human activity with land, sea, sky and space. National sovereignty extension extends to cyberspace, and cyberspace sovereignty becomes an important part of national sovereignty. Respect for cyberspace sovereignty, safeguard network security, seek co-governance, achieve win-win situation, is becoming the international community consensus.

(B) severe challenges

The security situation of the network is becoming more and more serious, the national politics, economy, culture, society, national defense security and the legitimate rights and interests of citizens in cyberspace are facing severe risks and challenges.

Network penetration threatens political security. Political stability is the basic prerequisite for national development and people’s happiness. The use of the network to interfere in the internal affairs of other countries, to attack other countries political system, incite social unrest, subversion of other countries, as well as large-scale network monitoring, network theft and other activities seriously endanger the national political security and user information security.

Network attacks threaten economic security. Network and information systems have become the key infrastructure and the entire economic and social center of the nerve, suffered damage, a major security incident, will lead to energy, transportation, communications, financial and other infrastructure paralysis, resulting in catastrophic consequences, seriously endangering national economic security And public interest.

Network Harmful Information Erosion Cultural Security. Various ideological and cultural networks on the network agitation, confrontation, excellent traditional culture and mainstream values ​​facing the impact. Network rumors, decadent culture and obscenity, violence, superstition and other harmful information contrary to the socialist core values ​​erode the physical and mental health of young people, corrupt the social atmosphere, misleading the value orientation, endangering cultural security. Online moral anomie, the phenomenon of lack of integrity frequent, the degree of network civilization need to be improved.

Network terror and criminals undermine social security. Terrorism, separatism, extremism and other forces to use the network to incite, plan, organize and implement violent terrorist activities, a direct threat to people’s lives and property security, social order. Computer viruses, Trojans and other cyberspace spread spread, cyber-fraud, hacking, infringement of intellectual property rights, abuse of personal information and other illegal acts exist, some organizations want to steal user information, transaction data, location information and business secrets, serious damage to the country , Business and personal interests, affecting social harmony and stability.

The international competition in cyberspace is in the ascendant. International competition and control of cyberspace strategic resources, to seize the right to formulate rules and strategic high ground, to seek strategic competition in the increasingly fierce. Individual countries to strengthen the network deterrence strategy, intensify the cyberspace arms race, world peace by new challenges.

Cyberspace opportunities and challenges coexist, opportunities are greater than challenges. We must insist on active use, scientific development, management according to law, ensure safety, resolutely safeguard network security, make maximum use of cyberspace development potential, and benefit more than 1.3 billion Chinese people for the benefit of all mankind and firm maintenance of world peace.

Second, the goal

With the overall national security concept as the guide, implement the innovation, coordination, green, open and shared development concept, enhance the sense of risk and crisis awareness, the overall situation of domestic and international, overall development of security two major events, active defense, effective response, Promote network space peace, security, openness, cooperation and orderly, safeguard national sovereignty, security, development interests, and realize the strategic goal of building a network power.

Peace: the abuse of information technology has been effectively curbed, cyberspace arms race and other activities threatening international peace have been effectively controlled, cyberspace conflict has been effectively prevented.

Security: network security risks are effectively controlled, the national network security system is sound and perfect, the core technology and equipment are safe and controllable, and the network and information system are stable and reliable. Network security personnel to meet the needs of the whole society of network security awareness, basic protection skills and the use of network confidence greatly improved.

Open: Information technology standards, policies and markets open, transparent, product circulation and information dissemination more smoothly, the digital divide is increasingly bridging. Regardless of size, strength, rich and poor, countries around the world, especially developing countries can share development opportunities, share the fruits of development, fair participation in cyberspace governance.

Cooperation: the world in the technical exchanges, the fight against cyber terrorist and cyber crime and other areas of cooperation more closely, multilateral, democratic and transparent Internet governance system sound and perfect, win-win cooperation as the core of the network space fate community gradually formed.

Order: public interest in the cyberspace, participation, expression, supervision and other legitimate rights and interests are fully protected, cyberspace personal privacy is effectively protected, human rights are fully respected. The network environment of the domestic and international legal system, the standard norms gradually established, the network space to achieve effective management according to law, network environment integrity, civilization, health, freedom of information flow and safeguard national security, public interests to achieve organic unity.

Third, the principle

A safe, stable and prosperous cyberspace is of great significance to all countries and the world. China is willing to work with all countries to strengthen communication, expand consensus, deepen cooperation, and actively promote the global Internet governance system changes, and jointly safeguard the peace and security of cyberspace.

(A) respect for the maintenance of cyberspace sovereignty

Cyberspace sovereignty is inviolable, respect for the independent choice of development path, network management model, Internet public policy and equal participation in international network space management rights. The network affairs within the sovereign scope of each country are made by the people of each country, and each country has the right to take the necessary measures to manage the network activities of its own information system and its own territory according to its own national conditions and draw lessons from international experience, formulate laws and regulations on cyberspace, National information systems and information resources from intrusion, interference, attack and destruction, to protect the legitimate rights and interests of citizens in cyberspace; to prevent, prevent and punish harmful information harmful to national security and interests in the national network to disseminate and maintain cyberspace order. Any country does not engage in network hegemony, do not engage in double standards, do not use the network to interfere in the internal affairs of other countries, do not engage in, condone or support national activities against national security.

(B) the peaceful use of cyberspace

Peaceful use of cyberspace is in the common interest of mankind. States should abide by the principles of the Charter of the United Nations concerning the non-use or threat of use of force and prevent the use of information technology in the context of the maintenance of international security and stability, to boycott cyberspace arms races and prevent cyberspace conflicts. Adhere to mutual respect, equal treatment, seeking common ground while reserving differences, tolerance and mutual trust, respect for each other in cyberspace security interests and major concerns, to promote the construction of a harmonious network world. Against the use of national security as an excuse to use technological advantages to control other countries network and information systems, to collect and steal other countries data, but can not sacrifice the security of other countries to seek their own so-called absolute security.

(C) to manage cyberspace according to law

Comprehensively promote the legalization of cyberspace, adhere to the rule of law network, according to the law network, according to the Internet, so that the Internet in the rule of law on the healthy operation of the track. According to the law to build a good network order, the protection of cyber space information according to the law of free flow, protection of personal privacy, protection of intellectual property rights. Any organization and individual in the cyberspace to enjoy freedom, exercise the rights at the same time, to comply with the law, respect for the rights of others, their own words and deeds on the network.

(4) co-ordinate network security and development

There is no national security without national security, there is no information without modernization. Network security and information is one of the two wings, driven by the two wheels. Correctly handle the development and security of the relationship, adhere to the security development, to promote the development of security. Security is the prerequisite for development, and any development at the expense of security is difficult to sustain. Development is the foundation of security, and development is not the greatest insecurity. No information development, network security is not guaranteed, the existing security and even lost.

Fourth, strategic tasks

China’s Internet users and network size of the world’s first, to maintain China’s network security, not only their own needs, for the maintenance of global network security and world peace are of great significance. China is committed to safeguarding the national cyberspace sovereignty, security, development interests, promote the Internet for the benefit of mankind, and promote the peaceful use of cyberspace and co-governance.

(A) firmly defended cyberspace sovereignty

According to the Constitution and laws and regulations to manage China’s sovereignty within the network activities to protect China’s information facilities and information resources security, including economic, administrative, scientific and technological, legal, diplomatic, military and other measures, unswervingly maintain China’s cyberspace sovereignty. Resolutely oppose all the acts of subverting China’s state power through the Internet and undermining our national sovereignty.

(B) firmly uphold national security

To prevent, stop and punish any act of using the Internet for treason, secession, incitement to rebellion, subversion or incitement to subdue the people’s democratic dictatorship; to prevent, stop and punish the use of the Internet to steal, to disclose state secrets and other acts endangering national security; Prevent, stop and punish foreign forces to use the network to penetrate, destroy, subvert, split the activities.

(Iii) Protection of critical information infrastructures

The key information infrastructure of the country refers to the information facilities that are related to national security, national economy and people’s livelihood, which have been damaged, destroyed or lost, which may seriously endanger the national security and public interests, including but not limited to the provision of public communication, radio and television transmission Information network, energy, finance, transportation, education, scientific research, water conservancy, industrial manufacturing, health care, social security, public utilities and other areas of important information systems, important Internet applications. Take all necessary measures to protect critical information infrastructures and their important data from attack damage. Adhere to the combination of technology and management, protection and deterrence simultaneously, focus on identification, protection, detection, early warning, response, disposal and other aspects, the establishment of the implementation of key information infrastructure protection system, from management, technology, personnel, Comprehensive measures to effectively strengthen the key information infrastructure security protection.

Key information infrastructure protection is the common responsibility of the government, enterprises and society as a whole. The supervisors, the operating units and organizations shall take the necessary measures to ensure the safety of the key information infrastructure in accordance with the requirements of laws, regulations and system standards. Strengthen critical information infrastructure risk assessment. Strengthen the party and government organs and key areas of the site security protection, grassroots party and government organs to build an intensive mode of operation and management. The establishment of government, industry and business network security information orderly sharing mechanism, give full play to enterprises in the protection of key information infrastructure in the important role.

Adhere to open to the outside world, based on open environment to maintain network security. Establish and implement the network security review system, strengthen the supply chain security management, the party and government organs, key industries procurement and use of important information technology products and services to carry out security review, improve product and service security and control, to prevent product service providers And other organizations use information technology to implement unfair competition or harm the interests of users.

(D) to strengthen the construction of network culture

Strengthen the construction of online ideological and cultural positions, vigorously cultivate and practice the socialist core values, the implementation of network content construction projects, the development of a positive network culture, the dissemination of positive energy, gather a strong spiritual strength, and create a good network atmosphere. Encourage the development of new business, create new products, to create the spirit of the times reflect the network culture brand, and constantly improve the network culture industry scale. The implementation of the outstanding culture of Chinese online communication project, and actively promote the excellent traditional culture and contemporary culture of digital, network production and dissemination. Play the advantages of Internet communication platform, promote the excellent cultural exchange between China and foreign countries, so that people understand the Chinese culture, so that the Chinese people understand the excellent culture of all countries, and jointly promote the prosperity and development of network culture, enrich people’s spiritual world and promote the progress of human civilization.

Strengthen the network ethics, network civilization construction, play moral education guide role, with human civilization excellent results nourish network space, repair network ecology. The construction of civilized integrity of the network environment, advocate civilization network, civilized Internet, the formation of safe, civilized and orderly information dissemination order. Resolutely crack down on rumors, obscenity, violence, superstition, cults and other harmful information spread in cyberspace spread. Improve the youth network literacy literacy, strengthen the protection of minors online, through the government, social organizations, communities, schools, families and other aspects of the joint efforts for the healthy growth of young people to create a good network environment.

(5) to combat cyber terror and crime

Strengthen the network anti-terrorism, anti-spy, anti-stealing capacity building, crack down on cyber terror and cyber espionage.

Adhere to comprehensive management, source control, according to the law to prevent, crack down on cyber fraud, Internet theft, trafficking in drug trafficking, infringement of personal information, dissemination of pornography, hacking, infringement of intellectual property rights and other criminal acts.

(6) improve the network management system

Adhere to the law, open, transparent network management network, and effectively do law, according to law, law enforcement must be strict, illegal research. Improve the network security laws and regulations system, enacted network security law, minor network protection regulations and other laws and regulations, a clear social responsibility and obligations, a clear network security management requirements. To speed up the revision and interpretation of existing laws, so that it applies to cyberspace. Improve the network security related system, establish a network trust system, improve the network security management of the scientific standardization level.

Speed ​​up the construction of legal norms, administrative supervision, industry self-discipline, technical support, public supervision, social education, a combination of network governance system to promote the network of social organization and management innovation, improve the basic management, content management, industry management and network crime prevention and combat Work linkage mechanism. Strengthen the cyberspace communication secrets, freedom of speech, trade secrets, as well as the right to reputation, property rights and other legitimate rights and interests of protection.

Encourage social organizations to participate in network governance, the development of network public welfare undertakings, strengthen the new network of social organization. Encourage Internet users to report network violations and bad information.

(7) reinforce the network security foundation

Adhere to innovation-driven development, and actively create a policy environment conducive to technological innovation, co-ordinate resources and strength to enterprises as the main body, combining production and research, collaborative research to point to the surface, the overall advance, as soon as possible in the core technology breakthrough. Attention to software security, accelerate the application of secure and credible products. The development of network infrastructure, rich network space information content. The implementation of “Internet +” action, vigorously develop the network economy. The implementation of national large data strategy, the establishment of large data security management system to support large data, cloud computing and other new generation of information technology innovation and application. Optimize the market environment, encourage network security enterprises bigger and stronger, to protect the national network security and consolidate the industrial base.

Establish and improve the national network security technology support system. Strengthening the basic theory and major problems of network security. Strengthen the network security standardization and certification work, more use of standard norms cyberspace behavior. Do a good job of level protection, risk assessment, vulnerability discovery and other basic work, improve the network security monitoring and early warning and network security emergency response mechanism.

The implementation of network security personnel projects, strengthen the network security professional construction, build first-class network security college and innovation park, the formation of personnel training and innovation and entrepreneurship of the ecological environment. Run the network security publicity week activities, vigorously carry out the national network security publicity and education. Promote the network security education into the teaching materials, into the school, into the classroom, improve the network media literacy, enhance the whole society network security awareness and protection skills, improve the network of Internet users harmful information, network fraud and other illegal and criminal activities identification and resistance.

(8) to enhance the ability of network space protection

Cyberspace is the new territory of national sovereignty. Construction and international status commensurate with the network power to adapt to the network space protection, and vigorously develop the network security and defense means to detect and resist the network invasion, casting and maintenance of national network security strong backing.

(9) to strengthen international cooperation in cyberspace

On the basis of mutual respect and mutual trust, strengthen cooperation in international cyberspace dialogue and promote the transformation of the global governance system of the Internet. Deepen cooperation with the bilateral and multilateral network security dialogue and information communication, effective control of differences, and actively participate in global and regional organizations, network security cooperation, to promote the Internet address, root domain name servers and other basic resource management internationalization.

Support the United Nations to play a leading role in promoting the development of international agreements on cyberspace, international cyberspace international anti-terrorism conventions, and sound legal mechanisms to combat cybercrime, deepening policy and legal, technical innovation, standards, emergency response, critical information infrastructure Protection and other fields of international cooperation.

Strengthen support for assistance in the development of Internet technologies and infrastructure in developing and backward regions, and strive to bridge the digital divide. To promote “along the way” building, improve the level of international communication interoperability, smooth information Silk Road. To build the World Internet Conference and other global Internet sharing system, and jointly promote the healthy development of the Internet. We will build a multilateral, democratic and transparent international Internet governance system through active and effective international cooperation to build a peaceful, safe, open, cooperative and orderly cyberspace.

Original Mandarin Chinese:

12月27日,經中央網絡安全和信息化領導小組批准,國家互聯網信息辦公室發布《國家網絡空間安全戰略》,全文如下。

信息技術廣泛應用和網絡空間興起發展,極大促進了經濟社會繁榮進步,同時也帶來了新的安全風險和挑戰。網絡空間安全(以下稱網絡安全)事關人類共同利益,事關世界和平與發展,事關各國國家安全。維護我國網絡安全是協調推進全面建成小康社會、全面深化改革、全面依法治國、全面從嚴治黨戰略佈局的重要舉措,是實現“兩個一百年”奮鬥目標、實現中華民族偉大復興中國夢的重要保障。為貫徹落實習近平主席關於推進全球互聯網治理體系變革的“四項原則”和構建網絡空間命運共同體的“五點主張”,闡明中國關於網絡空間發展和安全的重大立場,指導中國網絡安全工作,維護國家在網絡空間的主權、安全、發展利益,制定本戰略。

一、機遇和挑戰

(一)重大機遇

伴隨信息革命的飛速發展,互聯網、通信網、計算機系統、自動化控制系統、數字設備及其承載的應用、服務和數據等組成的網絡空間,正在全面改變人們的生產生活方式,深刻影響人類社會歷史發展進程。

信息傳播的新渠道。網絡技術的發展,突破了時空限制,拓展了傳播範圍,創新了傳播手段,引發了傳播格局的根本性變革。網絡已成為人們獲取信息、學習交流的新渠道,成為人類知識傳播的新載體。

生產生活的新空間。當今世界,網絡深度融入人們的學習、生活、工作等方方面面,網絡教育、創業、醫療、購物、金融等日益普及,越來越多的人通過網絡交流思想、成就事業、實現夢想。

經濟發展的新引擎。互聯網日益成為創新驅動發展的先導力量,信息技術在國民經濟各行業廣泛應用,推動傳統產業改造升級,催生了新技術、新業態、新產業、新模式,促進了經濟結構調整和經濟發展方式轉變,為經濟社會發展注入了新的動力。

文化繁榮的新載體。網絡促進了文化交流和知識普及,釋放了文化發展活力,推動了文化創新創造,豐富了人們精神文化生活,已經成為傳播文化的新途徑、提供公共文化服務的新手段。網絡文化已成為文化建設的重要組成部分。

社會治理的新平台。網絡在推進國家治理體系和治理能力現代化方面的作用日益凸顯,電子政務應用走向深入,政府信息公開共享,推動了政府決策科學化、民主化、法治化,暢通了公民​​參與社會治理的渠道,成為保障公民知情權、參與權、表達權、監督權的重要途徑。

交流合作的新紐帶。信息化與全球化交織發展,促進了信息、資金、技術、人才等要素的全球流動,增進了不同文明交流融合。網絡讓世界變成了地球村,國際社會越來越成為你中有我、我中有你的命運共同體。

國家主權的新疆域。網絡空間已經成為與陸地、海洋、天空、太空同等重要的人類活動新領域,國家主權拓展延伸到網絡空間,網絡空間主權成為國家主權的重要組成部分。尊重網絡空間主權,維護網絡安全,謀求共治,實現共贏,正在成為國際社會共識。

(二)嚴峻挑戰

網絡安全形勢日益嚴峻,國家政治、經濟、文化、社會、國防安全及公民在網絡空間的合法權益面臨嚴峻風險與挑戰。

網絡滲透危害政治安全。政治穩定是國家發展、人民幸福的基本前提。利用網絡干涉他國內政、攻擊他國政治制度、煽動社會動亂、顛覆他國政權,以及大規模網絡監控、網絡竊密等活動嚴重危害國家政治安全和用戶信息安全。

網絡攻擊威脅經濟安全。網絡和信息系統已經成為關鍵基礎設施乃至整個經濟社會的神經中樞,遭受攻擊破壞、發生重大安全事件,將導致能源、交通、通信、金融等基礎設施癱瘓,造成災難性後果,嚴重危害國家經濟安全和公共利益。

網絡有害信息侵蝕文化安全。網絡上各種思想文化相互激盪、交鋒,優秀傳統文化和主流價值觀面臨衝擊。網絡謠言、頹廢文化和淫穢、暴力、迷信等違背社會主義核心價值觀的有害信息侵蝕青少年身心健康,敗壞社會風氣,誤導價值取向,危害文化安全。網上道德失範、誠信缺失現象頻發,網絡文明程度亟待提高。

網絡恐怖和違法犯罪破壞社會安全。恐怖主義、分裂主義、極端主義等勢力利用網絡煽動、策劃、組織和實施暴力恐怖活動,直接威脅人民生命財產安全、社會秩序。計算機病毒、木馬等在網絡空間傳播蔓延,網絡欺詐、黑客攻擊、侵犯知識產權、濫用個人信息等不法行為大量存在,一些組織肆意竊取用戶信息、交易數據、位置信息以及企業商業秘密,嚴重損害國家、企業和個人利益,影響社會和諧穩定。

網絡空間的國際競爭方興未艾。國際上爭奪和控製網絡空間戰略資源、搶占規則制定權和戰略制高點、謀求戰略主動權的競爭日趨激烈。個別國家強化網絡威懾戰略,加劇網絡空間軍備競賽,世界和平受到新的挑戰。

網絡空間機遇和挑戰並存,機遇大於挑戰。必須堅持積極利用、科學發展、依法管理、確保安全,堅決維護網絡安全,最大限度利用網絡空間發展潛力,更好惠及13億多中國人民,造福全人類,堅定維護世界和平。

二、目標

以總體國家安全觀為指導,貫徹落實創新、協調、綠色、開放、共享的發展理念,增強風險意識和危機意識,統籌國內國際兩個大局,統籌發展安全兩件大事,積極防禦、有效應對,推進網絡空間和平、安全、開放、合作、有序,維護國家主權、安全、發展利益,實現建設網絡強國的戰略目標。

和平:信息技術濫用得到有效遏制,網絡空間軍備競賽等威脅國際和平的活動得到有效控制,網絡空間衝突得到有效防範。

安全:網絡安全風險得到有效控制,國家網絡安全保障體系健全完善,核心技術裝備安全可控,網絡和信息系統運行穩定可靠。網絡安全人才滿足需求,全社會的網絡安全意識、基本防護技能和利用網絡的信心大幅提升。

開放:信息技術標準、政策和市場開放、透明,產品流通和信息傳播更加順暢,數字鴻溝日益彌合。不分大小、強弱、貧富,世界各國特別是發展中國家都能分享發展機遇、共享發展成果、公平參與網絡空間治理。

合作:世界各國在技術交流、打擊網絡恐怖和網絡犯罪等領域的合作更加密切,多邊、民主、透明的國際互聯網治理體系健全完善,以合作共贏為核心的網絡空間命運共同體逐步形成。

有序:公眾在網絡空間的知情權、參與權、表達權、監督權等合法權益得到充分保障,網絡空間個人隱私獲得有效保護,人權受到充分尊重。網絡空間的國內和國際法律體系、標準規範逐步建立,網絡空間實現依法有效治理,網絡環境誠信、文明、健康,信息自由流動與維護國家安全、公共利益實現有機統一。

三、原則

一個安全穩定繁榮的網絡空間,對各國乃至世界都具有重大意義。中國願與各國一道,加強溝通、擴大共識、深化合作,積極推進全球互聯網治理體系變革,共同維護網絡空間和平安全。

(一)尊重維護網絡空間主權

網絡空間主權不容侵犯,尊重各國自主選擇發展道路、網絡管理模式、互聯網公共政策和平等參與國際網絡空間治理的權利。各國主權範圍內的網絡事務由各國人民自己做主,各國有權根據本國國情,借鑒國際經驗,制定有關網絡空間的法律法規,依法採取必要措施,管理本國信息系統及本國疆域上的網絡活動;保護本國信息系統和信息資源免受侵入、干擾、攻擊和破壞,保障公民在網絡空間的合法權益;防範、阻止和懲治危害國家安全和利益的有害信息在本國網絡傳播,維護網絡空間秩序。任何國家都不搞網絡霸權、不搞雙重標準,不利用網絡干涉他國內政,不從事、縱容或支持危害他國國家安全的網絡活動。

(二)和平利用網絡空間

和平利用網絡空間符合人類的共同利益。各國應遵守《聯合國憲章》關於不得使用或威脅使用武力的原則,防止信息技術被用於與維護國際安全與穩定相悖的目的,共同抵製網絡空間軍備競賽、防範網絡空間衝突。堅持相互尊重、平等相待,求同存異、包容互信,尊重彼此在網絡空間的安全利益和重大關切,推動構建和諧網絡世界。反對以國家安全為藉口,利用技術優勢控制他國網絡和信息系統、收集和竊取他國數據,更不能以犧牲別國安全謀求自身所謂絕對安全。

(三)依法治理網絡空間

全面推進網絡空間法治化,堅持依法治網、依法辦網、依法上網,讓互聯網在法治軌道上健康運行。依法構建良好網絡秩序,保護網絡空間信息依法有序自由流動,保護個人隱私,保護知識產權。任何組織和個人在網絡空間享有自由、行使權利的同時,須遵守法律,尊重他人權利,對自己在網絡上的言行負責。

(四)統籌網絡安全與發展

沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化。網絡安全和信息化是一體之兩翼、驅動之雙輪。正確處理髮展和安全的關係,堅持以安全保發展,以發展促安全。安全是發展的前提,任何以犧牲安全為代價的發展都難以持續。發展是安全的基礎,不發展是最大的不安全。沒有信息化發展,網絡安全也沒有保障,已有的安全甚至會喪失。

四、戰略任務

中國的網民數量和網絡規模世界第一,維護好中國網絡安全,不僅是自身需要,對於維護全球網絡安全乃至世界和平都具有重大意義。中國致力於維護國家網絡空間主權、安全、發展利益,推動互聯網造福人類,推動網絡空間和平利用和共同治理。

(一)堅定捍衛網絡空間主權

根據憲法和法律法規管理我國主權範圍內的網絡活動,保護我國信息設施和信息資源安全,採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權。堅決反對通過網絡顛覆我國國家政權、破壞我國國家主權的一切行為。

(二)堅決維護國家安全

防範、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為;防範、制止和依法懲治利用網絡進行竊取、洩露國家秘密等危害國家安全的行為;防範、制止和依法懲治境外勢力利用網絡進行滲透、破壞、顛覆、分裂活動。

(三)保護關鍵信息基礎設施

國家關鍵信息基礎設施是指關係國家安全、國計民生,一旦數據洩露、遭到破壞或者喪失功能可能嚴重危害國家安全、公共利益的信息設施,包括但不限於提供公共通信、廣播電視傳輸等服務的基礎信息網絡,能源、金融、交通、教育、科研、水利、工業製造、醫療衛生、社會保障、公用事業等領域和國家機關的重要信息系統,重要互聯網應用系統等。採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞。堅持技術和管理並重、保護和震懾並舉,著眼識別、防護、檢測、預警、響應、處置等環節,建立實施關鍵信息基礎設施保護製度,從管理、技術、人才、資金等方面加大投入,依法綜合施策,切實加強關鍵信息基礎設施安全防護。

關鍵信息基礎設施保護是政府、企業和全社會的共同責任,主管、運營單位和組織要按照法律法規、制度標準的要求,採取必要措施保障關鍵信息基礎設施安全,逐步實現先評估後使用。加強關鍵信息基礎設施風險評估。加強黨政機關以及重點領域網站的安全防護,基層黨政機關網站要按集約化模式建設運行和管理。建立政府、行業與企業的網絡安全信息有序共享機制,充分發揮企業在保護關鍵信息基礎設施中的重要作用。

堅持對外開放,立足開放環境下維護網絡安全。建立實施網絡安全審查制度,加強供應鏈安全管理,對黨政機關、重點行業採購使用的重要信息技術產品和服務開展安全審查,提高產品和服務的安全性和可控性,防止產品服務提供者和其他組織利用信息技術優勢實施不正當競爭或損害用戶利益。

(四)統籌網絡安全與發展

沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化。網絡安全和信息化是一體之兩翼、驅動之雙輪。正確處理髮展和安全的關係,堅持以安全保發展,以發展促安全。安全是發展的前提,任何以犧牲安全為代價的發展都難以持續。發展是安全的基礎,不發展是最大的不安全。沒有信息化發展,網絡安全也沒有保障,已有的安全甚至會喪失。

四、戰略任務

中國的網民數量和網絡規模世界第一,維護好中國網絡安全,不僅是自身需要,對於維護全球網絡安全乃至世界和平都具有重大意義。中國致力於維護國家網絡空間主權、安全、發展利益,推動互聯網造福人類,推動網絡空間和平利用和共同治理。

(一)堅定捍衛網絡空間主權

根據憲法和法律法規管理我國主權範圍內的網絡活動,保護我國信息設施和信息資源安全,採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權。堅決反對通過網絡顛覆我國國家政權、破壞我國國家主權的一切行為。

(二)堅決維護國家安全

防範、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為;防範、制止和依法懲治利用網絡進行竊取、洩露國家秘密等危害國家安全的行為;防範、制止和依法懲治境外勢力利用網絡進行滲透、破壞、顛覆、分裂活動。

(三)保護關鍵信息基礎設施

國家關鍵信息基礎設施是指關係國家安全、國計民生,一旦數據洩露、遭到破壞或者喪失功能可能嚴重危害國家安全、公共利益的信息設施,包括但不限於提供公共通信、廣播電視傳輸等服務的基礎信息網絡,能源、金融、交通、教育、科研、水利、工業製造、醫療衛生、社會保障、公用事業等領域和國家機關的重要信息系統,重要互聯網應用系統等。採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞。堅持技術和管理並重、保護和震懾並舉,著眼識別、防護、檢測、預警、響應、處置等環節,建立實施關鍵信息基礎設施保護製度,從管理、技術、人才、資金等方面加大投入,依法綜合施策,切實加強關鍵信息基礎設施安全防護。

關鍵信息基礎設施保護是政府、企業和全社會的共同責任,主管、運營單位和組織要按照法律法規、制度標準的要求,採取必要措施保障關鍵信息基礎設施安全,逐步實現先評估後使用。加強關鍵信息基礎設施風險評估。加強黨政機關以及重點領域網站的安全防護,基層黨政機關網站要按集約化模式建設運行和管理。建立政府、行業與企業的網絡安全信息有序共享機制,充分發揮企業在保護關鍵信息基礎設施中的重要作用。

堅持對外開放,立足開放環境下維護網絡安全。建立實施網絡安全審查制度,加強供應鏈安全管理,對黨政機關、重點行業採購使用的重要信息技術產品和服務開展安全審查,提高產品和服務的安全性和可控性,防止產品服務提供者和其他組織利用信息技術優勢實施不正當競爭或損害用戶利益。

(四)加強網絡文化建設

加強網上思想文化陣地建設,大力培育和踐行社會主義核心價值觀,實施網絡內容建設工程,發展積極向上的網絡文化,傳播正能量,凝聚強大精神力量,營造良好網絡氛圍。鼓勵拓展新業務、創作新產品,打造體現時代精神的網絡文化品牌,不斷提高網絡文化產業規模水平。實施中華優秀文化網上傳播工程,積極推動優秀傳統文化和當代文化精品的數字化、網絡化製作和傳播。發揮互聯網傳播平台優勢,推動中外優秀文化交流互鑑,讓各國人民了解中華優秀文化,讓中國人民了解各國優秀文化,共同推動網絡文化繁榮發展,豐富人們精神世界,促進人類文明進步。

加強網絡倫理、網絡文明建設,發揮道德教化引導作用,用人類文明優秀成果滋養網絡空間、修復網絡生態。建設文明誠信的網絡環境,倡導文明辦網、文明上網,形成安全、文明、有序的信息傳播秩序。堅決打擊謠言、淫穢、暴力、迷信、邪教等違法有害信息在網絡空間傳播蔓延。提高青少年網絡文明素養,加強對未成年人上網保護,通過政府、社會組織、社區、學校、家庭等方面的共同努力,為青少年健康成長創造良好的網絡環境。

(五)打擊網絡恐怖和違法犯罪

加強網絡反恐、反間諜、反竊密能力建設,嚴厲打擊網絡恐怖和網絡間諜活動。

堅持綜合治理、源頭控制、依法防範,嚴厲打擊網絡詐騙、網絡盜竊、販槍販毒、侵害公民個人信息、傳播淫穢色情、黑客攻擊、侵犯知識產權等違法犯罪行為。

(六)完善網絡治理體系

堅持依法、公開、透明管網治網,切實做到有法可依、有法必依、執法必嚴、違法必究。健全網絡安全法律法規體系,制定出台網絡安全法、未成年人網絡保護條例等法律法規,明確社會各方面的責任和義務,明確網絡安全管理要求。加快對現行法律的修訂和解釋,使之適用於網絡空間。完善網絡安全相關製度,建立網絡信任體系,提高網絡安全管理的科學化規範化水平。

加快構建法律規範、行政監管、行業自律、技術保障、公眾監督、社會教育相結合的網絡治理體系,推進網絡社會組織管理創新,健全基礎管理、內容管理、行業管理以及網絡違法犯罪防範和打擊等工作聯動機制。加強網絡空間通信秘密、言論自由、商業秘密,以及名譽權、財產權等合法權益的保護。

鼓勵社會組織等參與網絡治理,發展網絡公益事業,加強新型網絡社會組織建設。鼓勵網民舉報網絡違法行為和不良信息。

(七)夯實網絡安全基礎

堅持創新驅動發展,積極創造有利於技術創新的政策環境,統籌資源和力量,以企業為主體,產學研用相結合,協同攻關、以點帶面、整體推進,盡快在核心技術上取得突破。重視軟件安全,加快安全可信產品推廣應用。發展網絡基礎設施,豐富網絡空間信息內容。實施“互聯網+”行動,大力發展網絡經濟。實施國家大數據戰略,建立大數據安全管理制度,支持大數據、雲計算等新一代信息技術創新和應用。優化市場環境,鼓勵網絡安全企業做大做強,為保障國家網絡安全夯實產業基礎。

建立完善國家網絡安全技術支撐體系。加強網絡安全基礎理論和重大問題研究。加強網絡安全標準化和認證認可工作,更多地利用標準規範網絡空間行為。做好等級保護、風險評估、漏洞發現等基礎性工作,完善網絡安全監測預警和網絡安全重大事件應急處置機制。

實施網絡安全人才工程,加強網絡安全學科專業建設,打造一流網絡安全學院和創新園區,形成有利於人才培養和創新創業的生態環境。辦好網絡安全宣傳周活動,大力開展全民網絡安全宣傳教育。推動網絡安全教育進教材、進學校、進課堂,提高網絡媒介素養,增強全社會網絡安全意識和防護技能,提高廣大網民對網絡違法有害信息、網絡欺詐等違法犯罪活動的辨識和抵禦能力。

(八)提升網絡空間防護能力

網絡空間是國家主權的新疆域。建設與我國國際地位相稱、與網絡強國相適應的網絡空間防護力量,大力發展網絡安全防御手段,及時發現和抵禦網絡入侵,鑄造維護國家網絡安全的堅強後盾。

(九)強化網絡空間國際合作

在相互尊重、相互信任的基礎上,加強國際網絡空間對話合作,推動互聯網全球治理體系變革。深化同各國的雙邊、多邊網絡安全對話交流和信息溝通,有效管控分歧,積極參與全球和區域組織網絡安全合作,推動互聯網地址、根域名服務器等基礎資源管理國際化。

支持聯合國發揮主導作用,推動制定各方普遍接受的網絡空間國際規則、網絡空間國際反恐公約,健全打擊網絡犯罪司法協助機制,深化在政策法律、技術創新、標準規範、應急響應、關鍵信息基礎設施保護等領域的國際合作。

加強對發展中國家和落後地區互聯網技術普及和基礎設施建設的支持援助,努力彌合數字鴻溝。推動“一帶一路”建設,提高國際通信互聯互通水平,暢通信息絲綢之路。搭建世界互聯網大會等全球互聯網共享共治平台,共同推動互聯網健康發展。通過積極有效的國際合作,建立多邊、民主、透明的國際互聯網治理體系,共同構建和平、安全、開放、合作、有序的網絡空間。

Original Source: http://politics.people.com.cn/n1/2016/1227/c1001-28980829.html