Category Archives: 中國軍隊對耗散戰的戰術運用

China’s Military: “Changes” of Combat Guidance, Revolution in Military Affairs, Achieving Superiority

中國軍隊:作戰指導“變”,軍事革命,取得優勢

現代英語:

At present, the war situation is evolving into an informationized war with intelligent characteristics, and the mechanism of winning the war has also undergone profound changes. Actively analyzing the new mechanisms of winning the informationized war, such as information dominance, overall linkage, precise energy release, and system destruction, and accurately revealing its internal laws, is of great significance for innovating the combat guidance of local informationized wars with intelligent characteristics.

The dominant factor for victory has shifted from energy dominance to information dominance, and combat guidance has shifted from focusing on manpower and firepower to focusing on “information + firepower”

Human warfare has gone through a long process from force dominance, firepower dominance to information dominance. In the agricultural era, wars were mainly won by human combat, and the combat performance was mainly a “physical battle” of conquering cities and territories. Force dominance was the basis for winning the war. In combat guidance, the size of the force was exchanged for the improvement of combat effectiveness, advocating more the better and using more to defeat fewer. In the industrial era, firepower gradually occupied a dominant position. The war was mainly manifested in a “firepower battle” to destroy the enemy’s war material base and annihilate the enemy’s living forces. Firepower dominance was the basis for winning the war. The mechanism for winning the war is to release energy from materials and win by scale. Therefore, in combat guidance, more emphasis is placed on concentrating superior forces and firepower to destroy the enemy.

In information warfare, information becomes the “blood” and “nerves” of the combat system, penetrating into all aspects such as reconnaissance intelligence, command and control, joint strikes, and comprehensive support. The combat is mainly manifested in “information firepower warfare”, and information dominance is the foundation for winning the war. At this stage, information concentration and information empowerment are important winning mechanisms. The integration of information and firepower has changed the traditional combat method of simply competing in scale and firepower, and greatly improved the speed and accuracy of firepower strikes. Whoever has a strong ability to obtain, process, transmit, use and control information, and whoever has a high degree of integration between information and firepower, will win the war. The result of information dominance is the precise focus and rapid release of firepower. Therefore, in terms of combat guidance, more emphasis is placed on gaining information superiority, paralyzing and controlling the enemy through information attacks and firepower strikes, and using information-led, “information + firepower”-based system confrontation advantages to gain combat victory. In the early morning of April 14, 2018, the US, UK and France dispatched an EA-6B electronic warfare aircraft to carry out “deceptive + repressive” interference on the Syrian air defense missile system, and launched 105 missiles in coordination, attacking and destroying many important targets in Damascus in the form of information firepower warfare.

The winning form has changed from force coordination to overall linkage, and combat guidance has changed from pursuing joint operations among various services to pursuing multi-domain joint operations.

Wars have always focused on winning with overall power. In mechanized joint operations, due to the constraints of information technology, the various forces cannot achieve a high degree of battlefield information sharing and common perception of battlefield situations. The combat functions of the army, navy, air force and other services are difficult to break through the constraints of spatial factors. The degree of jointness in operations is not high. Although there are joint combat forms, it emphasizes that two or more military forces cooperate with each other and work closely in different combat spaces, so as to achieve complementary advantages and coordinated attacks on the enemy. The winning form is mainly manifested in the coordination of forces. The combat effectiveness mainly depends on the extreme release of the energy of each combat force and the physical superposition of effects, and the pursuit is “linear concentration”. Therefore, in combat guidance, more emphasis is placed on implementing joint operations of various services in two-dimensional or three-dimensional spatial forces. Through careful pre-war planning and impromptu coordination during the war, various services and combat platforms can achieve strong coordination and cooperation to form overall power.

Informatized joint operations, the battlefield has expanded from land, sea and air to space, network and electronics, the combat domain has extended from the physical domain to the information domain and cognitive domain, the combat space is full and multi-dimensional, the virtual and the real are dependent and integrated, the action range of various services has broken through the inherent spatial limitations, and combat activities are no longer achieved by the various services in their own activity space through external coordination and cooperation with other services, but have evolved into breaking the boundaries between services and aggregating the advantages of each domain to achieve it. Overall linkage has become the basic form of victory. All combat forces have moved from simple “cooperation” to deep “integration”, and formed a combat system of “dispersed deployment in space, coordinated in time, and integrated in multiple domains in energy release”, which has changed combat actions from loose coordination and linear superposition of combat effects in the past to today’s overall linkage and amplification of combat effectiveness index, and finally achieved an asymmetric advantage over the enemy. Therefore, in combat guidance, more emphasis is placed on multi-domain joint operations, emphasizing the complementary advantages of cross-domain advantages and seeking overall combat advantages. It is mainly supported by the network information system, coordinating and utilizing multi-dimensional space combat forces such as land, sea, air, space, network and electricity to achieve the integration of air and ground, sea and air, and multiple forces, and highly integrating network warfare, electronic warfare, etc. with troop and firepower operations. It also relies on the system to quickly and accurately maneuver and concentrate forces to carry out concentrated energy strikes on important targets of the enemy’s combat system, transforming the information advantage, speed advantage and firepower advantage formed by the joint efforts of multiple domains into an action advantage to defeat the enemy and quickly achieve the combat objectives.

The winning method has changed from extensive energy release to precise energy release, and combat guidance has changed from seeking large-scale destruction and depletion of the opponent’s strength to seeking precise control of the battle situation.

During the mechanized warfare period, due to insufficient information acquisition capabilities and limited command and control means, there was a lot of “fog” in the war, and the low accuracy of weapons strikes led to the inability to effectively control energy release. Usually, carpet bombing and saturation attacks were used to increase the probability of killing, and the scale of troops and firepower was exchanged for the improvement of combat effectiveness. The winning method was extensive energy release, following the law of quantitative change to qualitative change. Therefore, in combat guidance, more emphasis was placed on consuming the opponent’s strength through large-scale killings and achieving strategic goals in exchange for military victory.

In the information warfare period, the “fog” of war still exists, but because information technology is integrated into the combat system, each combat system uses information to achieve real-time rapid response, which greatly improves the detection accuracy, positioning accuracy, and strike accuracy, so that the “fog” of war is minimized as much as possible. In particular, the development and application of network information systems have made it possible to make precise plans, select targets, use forces, strike at key points, make precise assessments, control actions, and provide precise guarantees. In combat, long-range precise strikes such as beheading, acupuncture, and surgical operations are usually used to directly hit the enemy’s key points. The winning method is mainly precise energy release, which follows the principles of systems theory and cybernetics. Therefore, in combat guidance, more emphasis is placed on elite troops and quick decisions, so as to achieve combat objectives at the lowest cost, fastest speed, and lowest risk. A small-scale precision combat operation may achieve the same combat effectiveness as a large-scale war in the past. In modern warfare, precision warfare is not only a military means of application, but also has important political significance, because human life, property and the environment on which human beings depend for survival can be protected as much as possible under this combat method, rather than using unlimited violence, making precise control of the battle situation an important combat guide.

The path to victory shifted from destroying the enemy and seizing territory to destroying the system, and combat guidance shifted from emphasizing annihilation warfare to emphasizing system destruction warfare.

During the mechanized warfare period, the way to win the war mainly depends on destroying the enemy and seizing the territory. The direct purpose of the war is to destroy the enemy, often by destroying a large number of enemy manpower, seizing or occupying enemy territory, and forcing the enemy to surrender. Therefore, in combat guidance, more emphasis is placed on the idea of ​​annihilation warfare. In the Battle of Verdun during World War I, the German and French armies deployed nearly 2 million troops, with more than 700,000 casualties, becoming a terrible “meat grinder”.

In the information warfare period, the destruction of the enemy’s manpower is still of great value in winning the war, and the number of casualties is still an important variable in the effectiveness and tolerance of war. In several local wars in this century, the US military pursued the so-called “zero casualties”, which also shows the sensitivity of casualties in war, and on the other hand, it also reflects the importance of destroying the enemy’s manpower. However, the connection and integration of information, the updating of weapons and equipment, and the improvement of combat methods have made the confrontation between the two sides manifest as a confrontation between systems. The overlap of tactical objectives, campaign objectives and even strategic objectives is getting higher and higher. The large-scale destruction of the enemy’s manpower is no longer a necessary condition for winning the war. The way to win the war usually relies on system destruction, and the direct purpose of combat is to scare and control the enemy. The side with system advantage mainly achieves victory in the war by precisely striking the key nodes and key systems that support the operation of the enemy’s war system and combat system. Therefore, in combat guidance, more emphasis is placed on the idea of ​​system destruction warfare, with information as the main guide and system as the support, and the enemy’s “Achilles’ heel” is precisely struck. Through the collapse effect of the system, the purpose of disintegrating the system and winning the hearts and minds is achieved. During the Kosovo War, NATO carried out air strikes for 78 days. The casualties of the Yugoslav army were not many, but because the high-value targets in the combat system, such as the command information system, transportation hubs, energy bases, and power facilities, were hit hard, the war potential of the Yugoslavia was greatly weakened, and the will of the military and civilians to fight was gradually destroyed, leading to the defeat of the war. The limited purpose of information warfare makes the warring parties usually directly target the weaknesses of the opponent’s system to carry out precise destruction, making small-scale and clever system confrontation operations more popular, with few casualties, but can also achieve combat objectives.

國語中文:

■李海濱 霍雲超

引言

當前,戰爭形態正演進為具有智慧化特徵的資訊化戰爭,戰爭制勝機理也隨之發生深刻變化。積極研析資訊化戰爭制勝所蘊含的資訊主導、整體聯動、精確釋能、體系破擊等新機理,準確揭示其內在規律,對於創新具有智能化特徵的信息化局部戰爭作戰指導具有重要意義。

制勝主導因素由能量主導向資訊主導轉變,作戰指導從注重兵力火力主戰轉變為註重「資訊+火力」主戰

人類戰爭經歷了從兵力主導、火力主導到資訊主導的漫長過程。農業時代的戰爭,主要依靠人力搏擊制勝,作戰表現形式主要是攻城略地的“體力戰”,兵力主導是戰爭制勝的根本。在作戰指導上,以兵力規模換取作戰效能的提高,主張多多益善、以多擊少。工業時代的戰爭,火力逐漸佔據主導地位,戰爭的表現形式主要是摧毀敵戰爭物質基礎、殲滅敵有生力量的“火力戰”,火力主導是戰爭制勝的根本。戰爭制勝機理是以物釋能、規模製勝。因此,在作戰指導上,更強調集中優勢兵力火力殲敵。

在資訊化戰爭中,訊息成為作戰體系的“血液”和“神經”,滲透到偵察情報、指揮控制、聯合打擊、綜合保障等各個環節,作戰的表現形式主要是“信息火力戰”,信息主導是戰爭制勝的根本。此階段,資訊聚能、資訊賦能是重要的製勝機理,資訊火力的融合,改變了單純拼規模、拼火力的傳統作戰方法,大大提高了火力打擊的速度與精準度。誰獲取、處理、傳輸、利用和控制資訊的能力強,誰的資訊與火力的融合度高,誰就能在戰爭中獲勝。資訊主導的結果是火力的精確聚焦與快速釋放。因此,在作戰指導上,更強調奪取資訊優勢、透過資訊攻擊和火力打擊癱敵控敵,以資訊主導、「資訊+火力」主戰的體系對抗優勢換取作戰勝勢。 2018年4月14日凌晨,美英法聯軍出動1架EA-6B電子戰飛機對敘利亞防空飛彈系統實施「欺騙性+壓制性」幹擾,配合發射了105枚導彈,以資訊火力戰的方式襲擊並摧毀了大馬士革許多重要目標。

制勝形式由力量協同向整體聯動轉變,作戰指導從追求諸軍兵種聯合作戰轉變為追求多域聯合作戰

戰爭歷來注重整體威力製勝。機械化聯合作戰,由於受資訊技術水準的製約,各力量之間不能實現戰場資訊高度共享、戰場態勢共同感知,陸、海、空等諸軍兵種的作戰功能難以突破空間因素制約,在作戰上彼此聯合度還不高,雖有聯合作戰形式,但強調兩個以上軍種力量在不同作戰空間相互配合、密切協同,從而實現優勢互補、協調一致地打擊敵人。制勝形式主要表現為力量協同,作戰效能主要依靠各作戰力量能量的極限釋放和效果的物理疊加,追求的是「線性聚力」。因此,在作戰指導上,更強調實施諸軍兵種二維或三維空間力量上的聯合作戰,透過戰前周密計劃和戰中臨機協同,使各軍兵種、各作戰平台得到有力的協同配合從而形成整體威力。

資訊化聯合作戰,戰場由陸海空向天網電拓展,作戰域由物理域向資訊域、認知域延伸,作戰空間全局多維,虛與實依存、融合,諸軍兵種的行動範圍已突破固有空間限制,作戰活動已不再是諸軍兵種在自身活動空間通過與其他軍兵種的外部協調聯合來實現,而是演變為打破軍兵種界限、聚合各域的優勢來實現,整體聯動成為製勝的基本形式。各作戰力量已從簡單的“聯合”走向深度的“融合”,並形成“空間上分散部署,時間上協調一致,能量釋放上多域一體”的作戰體系,使作戰行動由過去的鬆散配合、作戰效果線性疊加,變為現今的整體聯動、作戰效能指數放大,最終達成對敵的非對稱優勢。因此,在作戰指導上,更突顯多域聯合作戰,強調以跨領域優勢互補,謀求整體作戰優勢。主要以網絡資訊體係為支撐,統籌運用陸海空天網電等多維空間作戰力量,達成空地一體、海空一體、多種力量一體,網絡戰、電子戰等與兵力、火力行動高度融合,並依托體系快速精確機動聚力,對敵作戰體系重要目標實施聚能打擊,將多域聯合形成的資訊優勢、速度優勢和火力優勢,轉化為製敵的行動優勢,並迅速達成作戰目的。

制勝方法由粗放釋能向精確釋能轉變,作戰指導從謀求大規模殺傷消耗對手實力轉變為謀求精確控制戰局

機械化戰爭時期,由於資訊獲取能力不足,指揮控製手段有限,使戰爭中存在許多“迷霧”,加之武器打擊精度不高,導致能量釋放無法得到有效控制。通常以地毯式轟炸、飽和式攻擊增加殺傷機率,以兵力火力的規模換取作戰效能的提升,制勝方法屬粗放釋能,遵循的是由量變到質變的規律。因此,在作戰指導上,更強調透過大規模殺傷力消耗對手實力,以軍事勝利換取戰略目標的實現。

在資訊化戰爭時期,戰爭「迷霧」仍然存在,但由於資訊科技融入作戰體系,各作戰系統借助資訊實現即時快速響應,大大提高了探測精度、定位精度、打擊精度,使戰爭「迷霧」盡可能降到最低。特別是網絡資訊體系的發展運用,使精確籌劃、精選目標、精用力量、精打要害、精準評估、精控行動、精細保障成為可能。作戰中,通常以斬首式、點穴式、外科手術式等遠程精確打擊方式直擊敵要害,制勝方法主要是精確釋能,遵循的是系統論、控制論的原理。因此,在作戰指導上,更強調精兵精打、速決作戰,以最小代價、最快速度和最低風險達成作戰目的。小規模的精確作戰行動可能會達到以往大規模戰爭的作戰效能。在現代戰爭中,精確作戰不僅是一種軍事手段的運用,更具有重要的政治意義,因為人的生命財產和人類賴以生存的環境在這種作戰方式下可以得到盡可能多的保護,而不是無限制地使用暴力,致使精確控制戰局成為重要的作戰指導。

制勝途徑由殲敵奪地向體系破擊轉變,作戰指導從強調殲滅戰轉變為強調體系破擊戰

機械化戰爭時期,戰爭制勝的途徑主要靠殲敵奪地,作戰的直接目的是將敵人消滅,往往通過大量殲滅敵有生力量、奪取或占領敵方領土,迫使敵人從意誌上屈服。因此,在作戰指導上,更強調殲滅戰思想。一戰時期的凡爾登戰役,德法雙方軍隊共投入兵力近200萬人,傷亡人數達70多萬,成為可怕的「絞肉機」。

在資訊化戰爭時期,殲滅敵有生力量對戰爭制勝仍有重要價值,人員傷亡數字仍是戰爭效益和戰爭承受力的重要變數。本世紀的幾場局部戰爭,美軍追求所謂的“零傷亡”,也說明傷亡數字在戰爭中的敏感性,從另一方面也反映出殲滅敵人有生力量的重要性。但資訊的連結與融合,以及武器裝備的更新、作戰方法的改進,使對抗雙方表現為體係與體系的對抗,戰術目的、戰役目的甚至是戰略目的的重合度越來越高,大量殲滅敵有生力量不再是取得戰爭勝利的必要條件,戰爭制勝的途徑通常靠體系破擊,作戰的直接目的是懾敵控敵。具有體系優勢的一方,主要透過精確打擊支撐敵戰爭體系和作戰體系運作的要害節點和關鍵系統,癱體攻心奪志即意味著作戰的勝利。因此,在作戰指導上,更強調體系破擊戰思想,以信息為主導、以體係為支撐,精打敵“阿喀琉斯之踵”,通過體系的坍塌效應,達成瓦解體系、攻心奪志的目的。在科索沃戰爭中,北約實施了78天的空襲作戰,南聯盟軍隊傷亡並不多,但由於作戰體系中的指揮資訊系統、交通樞紐、能源基地、電力設施等高價值目標遭到重點打擊,南聯盟的戰爭潛力被大大削弱,軍民的戰爭意志逐漸被摧毀,導致戰爭失敗。資訊化戰爭目的的有限性,使得交戰雙方通常直接瞄準對方的體系弱點實施精確破擊,使小打、巧打的體系對抗作戰更加流行,人員傷亡很小,但同樣能達成作戰目的。

來源:解放軍報 作者:李海濱 霍雲超 責任編輯:劉上靖 2023-02-02 06:54:53

國防部原文來源:http://www.mod.gov.cn/gfbw/jmsd/4931741.html

Chinese Military’s Three Core Focuses on Understanding Winning Mechanisms of Information Warfare

中國軍隊三大核心聚焦資訊戰制勝機制

2016-11-22 03:03

現代英語:

Naval Command College Research Group

The winning mechanism of war is the most prominent and core characteristic of war. The winning mechanism of informationized war mainly includes three core contents: winning by information advantage, winning by structural destruction and winning by joint action.

Winning with information advantage

In the information age, wars are won mainly by information. Information is the first element of modern warfare, information resources are the first resource of modern warfare, and information advantage is the first advantage of modern warfare, and it determines the victory of the war.

The core of winning with information advantage is the right to control information. War is conducted under the guidance of information, which is implemented according to the law of events turning into information, information turning into situation, situation turning into cognition, cognition turning into decision, and decision turning into action. Information supports command and control, and dominates combat operations and the course of war. Only by gaining the right to control information can we seize the initiative and freedom on the battlefield.

Ways to achieve victory with information advantage. First, information flow leads material flow and energy flow, and information advantage multiplies cognitive power, control power and attack power, thereby regulating the course, direction, target and action of war. Second, information system leads weapon platform, combat force, unit and element are in the loop, the loop is under human control, under the guidance of information system, material energy can produce geometric series “fusion” and extremely precise “energy release”, so that combat power will have a qualitative leap. Then realize long-range rapid precision strike, system structure fixed point destruction and paralysis, and multi-method comprehensive victory. Third, cyberspace is based on physical space, penetrates physical space, transcends physical space and dominates physical space. Occupying the new field and new height of cyberspace warfare will gain new means and advantages of information warfare, and then evolve new concepts, new tactics and new ways to win in combat. Fourth, advanced technology, high-tech equipment, brilliant achievements and public opinion propaganda can have a strong deterrent and striking effect on the enemy’s psychology, fully disintegrate the enemy’s political will, resistance determination and public confidence, and then achieve all-round victory.

Structural destruction wins

Modern warfare is a confrontation between systems. The essence of system confrontation is a holistic and comprehensive confrontation. The formation, development and function of any overall comprehensive capability depends on the structure of the system.

The structure of the system determines the function, and the function generates the capability. Structural damage causes the system elements to be missing and the relationships to be out of order, which destroys the technical structure and system structure, and causes the loss of the organizational structure and functional structure, making it impossible to generate system capabilities.

The core of winning by structural destruction is network control. Network energy gathering, network energy empowerment, and network energy empowerment are the major functions of the network, which are based on the inherent characteristics of the information network system and the combat system. The first is network energy gathering. Through the network, various information is gathered together, and combat forces, units and elements are integrated into an organic whole. This whole is actually a collection of information energy, energy energy, and material energy, forming a full-factor advantage of information, energy, and material. The second is network energy empowerment. The combat forces, units, and elements in the system obtain all kinds of required information and support and coordination through the network, and have capabilities that they did not originally have, thereby improving their combat effectiveness. The third is network energy empowerment. In the combat system, target information, guidance information, coordination information, and command information are distributed to combat forces and units through the network, so that they are integrated into the system from the original passive listeners and executors, and become equal participants, executors, and advisers in the system, forming a flat charge. To control the network is to destroy the foundation and remove the fuel from under the cauldron, so that the combat system cannot gather energy; to break the network is to destroy the “hub”, cut off the flow of information, and make it impossible for the combat system to empower and authorize.

The strength of a system is based on its structure, the benefits of a system depend on its structure, and the strength of a system also lies in its structure. If you knock out the key nodes, the system will collapse; if you hit the vital point, the system will collapse. First, destroy the technical structure. The technical structure refers to the network structure, data structure, and software structure in the system. By destroying the key nodes of the network structure, destroying the software system of the network, destroying the database and information nodes, the various elements in the system cannot be interconnected and become a mess. Second, destroy the system structure. The combat system based on the information network is composed of a reconnaissance and early warning system, a command and control system, a precision strike system, an information confrontation system, and an integrated support system. Destroying the reconnaissance and early warning system will make the system “blind” and “deaf”. Destroying the command and control system will knock out the “vital point”, making the system leaderless and out of order. Destroying the integrated support system will make the system lose its support and become a water without a source and a tree without roots. Third, destroy the overall structure. The power structure, organizational structure, operation structure, and functional structure are the core of the overall structure. Destroying the power structure will cause the system elements to be missing, destroying the organizational structure will cause the system to be disordered, and destroying the operation structure will cause the system to malfunction, ultimately achieving the purpose of destroying the functional structure.

Joint action wins

Joint operations are the organic integration of combat forces, units, and element functions, which maximizes the combat effectiveness of the system. There is no joint operation without war, no war without joint operation, and no victory without joint operation. This has become the basic consensus of the world’s military powers and is an inevitable trend in future wars.

The connotation of joint operations is technology + tactics, system + system, plan + autonomy, action + support, discovery + destruction. It is a vivid manifestation of 1+1>2, the combination of combat operations, the integration of combat functions, and the concentrated release of combat effectiveness.

The core of winning joint operations is force control. Mechanized warfare pursues firepower, mobility, protection and support. Informationized warfare pursues the system’s reconnaissance and early warning capabilities, command and control capabilities, precision strike capabilities, information confrontation capabilities, and comprehensive support capabilities.

The implementation of joint operations must follow the rigid requirements of combat planning and the internal logic of “situation map”, “combat process”, “combat list”, “combat planning”, “autonomous action” and “effectiveness evaluation”. The first is the situation map that concerns the overall situation. Use a picture to fully present the battlefield situation. The second is a strict combat process, that is, the action process of detection, control, attack and evaluation, the command process of target discovery, target determination and action control, and the information process of information acquisition, transmission and processing. The third is a clear combat list, that is, the task list, target list and strike list. The task list is the clarification and summary of the combat tasks of the combat forces, units and elements. The target list is the batch numbering and sorting of the enemy’s targets. The strike list is the sorting and allocation of the strike targets according to the threat level of the enemy’s targets. The fourth is a detailed combat plan, that is, force planning, firepower planning, and information planning. It is a deepening, refinement and concretization of the combat plan, and it is also a substitute for the extensive combat plan. The fifth is flexible autonomous action, that is, self-organization, self-coordination, and self-action. It is the highest realm of joint action and the development of coordinated operations and contract operations, which enables temporary groups to effectively organize and coordinate and smoothly implement joint operations. The “three selfs” are organized and implemented in strict accordance with the combat process, based on the task list and strike list, and in accordance with the combat plan. Without the above prerequisites, it is impossible to achieve a real joint action. The sixth is a complete evaluation system to conduct timely and accurate evaluation of battlefield combat effectiveness and strike effects, providing a basis for subsequent combat planning.

In joint operations, the goal is the premise, calculation is the key, and precision is the core, and combat calculations run through the entire combat process, among which “one picture” is the preliminary calculation, “three processes” are the actuarial calculation, “three lists” are the in-depth calculation, three plans are the detailed calculation, three autonomies are the planning, and performance evaluation is the settlement.

國語中文:

海軍指揮學院主題組

戰爭制勝機理是戰爭最突出、最核心的特質。資訊化戰爭制勝機制主要包含資訊優勢制勝、結構破壞制勝和聯合行動制勝三個核心內容。

資訊優勢制勝

資訊時代的戰爭,主要靠資訊制勝。資訊是現代戰爭的第一要素,資訊資源是現代戰爭第一資源,資訊優勢是現代戰爭的第一優勢,決定戰爭勝勢。

資訊優勢制勝的核心是製資訊權。戰爭在資訊主導下進行,主導是依照事件轉化為資訊、資訊轉化為態勢、態勢轉化為認知、認知轉化為決策、決策轉化為行動的規律實施的。資訊支撐著指揮控制,主導作戰行動和戰爭進程。只有取得制資訊權,才能掌握戰場主動權、自由權。

資訊優勢制勝的實現途徑。一是以資訊流主導物質流、能量流,以資訊優勢倍增認知力、控制力和攻擊力,進而調控戰爭的進程、方向、目標和行動。二是資訊系統主導武器平台,作戰力量、單元、要素在迴路中,迴路在人的控制中,在資訊系統的引導下,使物質能產生幾何級數“聚變”和極其精準的“能量釋放” ,使戰鬥力產生質的飛躍。進而實現遠程快速精確打擊、體系結構定點毀癱、多法綜合製勝。第三是網路空間基於實體空間、滲透物理空間、超越實體空間、主導實體空間。佔領網路空間作戰這個新領域、新高點,便獲得了資訊作戰新手段、新優勢,進而演化出作戰制勝的新觀念、新戰法、新途徑。四是先進技術、高新裝備、輝煌戰果、輿論宣傳都能對敵方心理產生強大的威懾和打擊作用,充分瓦解敵方的政治意志、抵抗決心和民眾信心,進而實現全方位勝利。

結構破壞制勝

現代戰爭是體系與體系的對抗,體系對抗實質是整體性對抗、綜合性對抗,而任何一個整體綜合能力的形成、發展和發揮作用,都在於體系的結構。

體系的結構決定功能,功能產生能力。結構破壞就是造成體係要素缺失、關係失序,使技術結構、系統結構破壞,組織結構、功能結構喪失,無法產生體系能力。

結構破壞制勝的核心是製網。網能聚能、網能賦能、網能賦權,這是網路的重大作用,是基於資訊網路體系、作戰體系的內在特徵。一是網能聚能。透過網路把各種資訊聚在一起,把作戰力量、單元和要素融合為有機整體。這個整體其實就是資訊能、能量能、物質能的集合體,形成了資訊、能量、物質的全要素優勢。二是網能賦能。體系內的作戰力量、單元、要素,透過網路獲得各種所需的資訊和支援配合,具備了自身原來不具備的能力,因而提高了其作戰效能。三是網能賦權。在作戰體系內,透過網路給作戰力量、單元分配目標訊息、引導訊息、協同訊息、指令訊息,使之由原來的被動聽令者、執行者融入體系,成為體系內平等的參與者、執行者、建議者,形成扁平化的指控。制網就是破根基,釜底抽薪,使作戰體係不能聚能;破網就是毀“中樞”,切斷資訊流,使作戰體係不能賦能、賦權。

體系之堅基礎在結構,體系之利取決於結構,體系之肋也在於結構。打掉關鍵節點,體係不攻自破;打準命門,體系土崩瓦解。一是破壞技術結構。技術結構指的是體系中網路結構、資料結構和軟體結構。透過破壞網路結構的關鍵節點、毀癱網路的軟體系統、破壞資料庫和資訊節點,使體系中的各要素無法互聯互通,成為一盤散沙。二是破壞系統結構。基於資訊網路的作戰體係是由偵察預警系統、指揮控制系統、精確打擊系統、資訊對抗系統、綜合保障系統所構成的。毀癱偵察預警系統,就會使體系變成「瞎子」和「聾子」。毀癱指控系統,就打掉了“命門”,使體系群龍無首、運行失序。毀癱綜合保障系統,體係就失去了支撐,成為無源之水、無本之木。三是破壞總體結構。力量結構、組織結構、運作結構、功能結構是整體結構的內核,破壞力量結構就會使體係要素缺失,破壞組織結構就會使體系失序,破壞運作結構就會使體系運作失靈,最終達到破壞功能結構的目的。

聯合行動制勝

聯合作戰是對作戰力量、單元、要素功能的有機融合,使體係作戰效能能最大限度地釋放。無戰不聯、無聯不戰、無聯不勝,已成為世界軍事強國的基本共識,是未來戰爭的必然趨勢。

聯合行動的內涵是技術+戰術、系統+系統、計畫+自主、行動+保障、發現+摧毀,是1+1>2的生動體現,是作戰行動的聯合,是作戰功能的融合,是作戰效能集中釋放。

聯合行動制勝的核心是製力。機械化戰爭追求的是火力、機動性、防護力和保障力。資訊化戰爭追求的是體系的偵察預警能力、指揮控制能力、精確打擊能力、資訊對抗能力、綜合保障能力。

實施聯合行動必須遵循作戰規劃的剛性要求和「態勢圖」「作戰流程」「作戰清單」「作戰規劃」「自主行動」「效能評估」的內在邏輯。一是事關全局的態勢圖。用一張圖把戰場態勢全面呈現出來。二是嚴格的作戰流程,即偵、控、打、評的行動流程,目標發現、目標確定、行動控制的指控流程,資訊取得、傳遞、處理的資訊流程。三是明確的作戰清單,即任務清單、目標清單、打擊清單。任務清單是己方對作戰力量、單元、要素作戰任務的明確和匯總,目標清單是對敵方目標的分批編號和梳理,打擊清單是根據敵方目標的威脅程度,對打擊目標的排序和分配。四是詳盡的作戰規劃,即兵力規劃、火力規劃、資訊規劃。它是對作戰方案的深化、細化和具體化,也是對粗放作戰計畫的替代品。五是靈活的自主行動,即自組織、自協同、自行動,它是聯合行動的最高境界,是協同作戰、合約作戰的發展,使臨時編組進行有效的組織和協同,順利實施聯合行動。 「三自」是嚴格遵循作戰流程,依據任務清單和打擊清單,依照作戰規劃組織實施的,沒有上述的前提條件,就無法實現真正意義上的聯合行動。六是完善的評估體系,對戰場作戰效能和打擊效果進行及時且準確的評估,為後續作戰規劃提供基礎。

聯合行動,目標是前提、計算是關鍵、精準是核心,且作戰計算貫穿作戰全過程,其中「一張圖」是初算、「三個流程」是精算、「三個清單」是深算、三個規劃是細算、三個自主是謀算、效能評估是結算。

資料來源:解放軍報作者:海軍指揮學院研究小組責任編輯:菅琳

中國軍事資源:https://www.81.cn/jwzl/2016-11/22/content_73788.htm

China’s Military Emphasizing Research of System-based Superior Warfare: How to Fight Using Informationized Warfare? Analysis of Nine Typical Combat Styles

中國軍隊重視系統優勢戰爭研究:資訊化戰爭如何打仗?九種典型戰鬥風格解析

現代英語:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics. It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and action tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on “combination punches”, multiple strategies, and overall victory.
In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them.

System concentration warfare – a “combination punch” that flexibly uses a variety of combat styles. Author: Academic Plus Senior Observer Dong Zhou
The main content and keywords of this article

  1. Overall deterrence warfare: emphasize multi-domain joint deterrence; the implementation of overall deterrence warfare should have three major elements; strong overall strength is the core of achieving effective deterrence
  2. Electromagnetic interference warfare: the key to competing for information advantage; in terms of combined means and methods, information empowerment is achieved through “connection + sharing”; an effective method to crack unmanned cluster warfare
  3. Network attack warfare: mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
  4. Cognitive control and interference warfare: control the cognitive right of situational awareness, compete for information advantage; control the right to command and decision-making, compete for decision-making advantage; control the “brain” right, and seize the brain control advantage
  5. Agile mobile warfare: high-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
  6. Swarm autonomous warfare: conducive to forming a system advantage to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
  7. Precision point killing war: achieve high efficiency and cost-effectiveness in operations; hitting key node targets is an important option; large-scale system support is a basic condition; it is inseparable from accurate intelligence support
  8. Supply chain disruption war: the supply guarantee chain has a huge impact on the overall operation; the focus of attack is the key node of the enemy’s supply guarantee chain; the key is to choose the right time to use tactics
  9. System destruction and paralysis war: the combat goal is to make the enemy’s combat system disordered; hit the key nodes of the combat system with a heavy punch; implement a soft attack on the enemy’s combat system

For learning reference only, welcome to communicate and correct! The views of the article do not represent the position of this organization
The concept of operation is first proposed as a new combat style. Innovative combat style is the core content of the development of combat concepts. It can be said that system-based optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system-based optimization warfare. They are: First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.

  1. Overall deterrence warfare
    Overall deterrence warfare refers to actively organizing static power displays and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that the overall deterrence warfare in the system-based superior warfare is an important means or tactics to achieve “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If you want to contain the war, you must first deter your opponent from the overall strength.
    1.1 Emphasize multi-domain joint deterrence
    Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. In particular, with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new means of deterrence. Space deterrence mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming an “interference and blocking” deterrence against the enemy’s space information. Network deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed in the implementation of overall deterrence warfare
    To implement overall deterrence warfare and achieve the expected deterrence effect, three elements are usually required: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capability and determination.
    Historically, there are three main changes in the criteria for judging deterrence strength: first, active military strength; second, comprehensive national strength or war potential; third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength directly depended on the size of the active army, the number of important weapons and equipment, and non-material factors such as military training and organization morale. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size, etc. The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system, and the joint full-domain deterrence capability formed under the integration of the system.
    1.3 Strong overall strength is the core of achieving effective deterrence
    The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by the network information system and makes full use of the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve military system combat advantages, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, into the national war mobilization system, gathers various forces and resources to form an overall force, realizes the emergence effect of system capabilities, and shows the overall strength advantage. It forms a powerful invisible deterrent of unity and common hatred of the enemy, and creates a situation where the enemy “has power but cannot act” and “can act but has no effect”, which plays a role in containing and winning the war.
    In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
  2. Electromagnetic interference warfare
    Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
    2.1 The key to competing for information advantage Local information warfare is highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capability, and enable the enemy to ensure the rapid and effective flow of information in the scenario where the enemy has the right to control information, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the dominance and initiative of the operation.
    2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superior warfare is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the enemy, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, and provide support for the seizure of information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling the enemy’s entire combat system.
    2.3 Effective tactics to crack unmanned swarm warfare
    Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local warfare with intelligent characteristics. There are a large number of various unmanned autonomous clusters, with various types and complex characteristics, and each individual can complement each other and replace each other to play a role. It will be very difficult to intercept and destroy the entire unmanned cluster. However, from a technical perspective, in order to achieve effective coordination in unmanned combat clusters, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to implement communication interception and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned clusters, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective coordination, thereby losing combat capability.
  3. Network attack warfare
    Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft killing and hard destruction, mainly soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attack, virus attack and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision firepower strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities.
    The focus is on breaking the network and reducing the ability to fail. Organizing network attack in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction actions against the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the enemy’s combat system function decline or even disabled as a whole. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electricity coordinated attack, deception confusion, link blocking, takeover and control, so that the enemy’s intelligent combat network system is disabled and ineffective, and achieve a key victory in paralyzing the enemy system.
  1. Cognitive control and disturbance warfare
    Cognitive control and disturbance warfare refers to the interference, destruction or control of enemy thinking and cognition through information attack, public opinion attack and brain attack in the system-based superiority warfare, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
    The cognitive domain, that is, the human thinking space and consciousness space, is a field that has a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its wide application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the status of cognition in intelligent warfare operations more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
    4.1 Controlling situational awareness and cognitive rights and fighting for information advantages
    In the system-based superiority warfare, information flow drives material flow and energy flow, and information advantage determines decision advantage. The rapid and accurate recognition of intelligence information and battlefield situation has an important impact on gaining command and decision-making advantages. Therefore, in order to organize and implement system-based optimization, we must make full use of intelligent technology and big data technology to analyze massive intelligence information data.

國語中文:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。


4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行

中國軍事資料來源:https//www.81it.com/2022/0901/13716.html

Chinese Military Analysis of Japan’s Space and Cyberspace Deterrence Strategy

中國對日本太空和網路空間威懾戰略的軍事分析

現代英語:

The development of new military forces is changing the style of warfare. After years of development, space (also known as outer space) and cyberspace (hereinafter referred to as cyberspace) forces have transformed from conceptual forces to real forces. How to use these two new forces has become a key research topic for major powers in the world. In March 2024, the Security Research Group of the Sasakawa Peace Foundation of Japan released a research report entitled “War 3.0: Fundamental Changes in War” (hereinafter referred to as the “Report”), which explored how to use space and cyberspace to achieve strategic deterrence from the perspective of maintaining Japan’s national security. It also proposed a typical scenario of cyberspace confrontation against the background of an emergency in the Taiwan Strait, showing Japan’s thinking on the use of combat forces in emerging fields. The main contents are summarized as follows for readers.

1

War 3.0 is coming

The report believes that during the Cold War, the boundaries between civilians, the state and the military were clear, and the economic dependence between the two sides was low. This was the era of War 1.0. After the Cold War, globalization accelerated, and in 2001, the era of the war on terror began. The main body of the confrontation became state and non-state actors, which was the era of War 2.0. Around 2010, the confrontation between major powers reappeared. Due to the high degree of economic globalization, “war” occurred more in dimensions other than military. The conflict between Russia and Ukraine shows that in modern warfare, other means are becoming as important as military means. At the same time, commercial companies are also more involved in the research and development and use of emerging military technologies, and the government’s control over military power has been weakened. Since then, a new concept can be used to describe modern warfare, namely War 3.0.

As long as war occurs in the context of globalization, the characteristics of War 3.0 will appear. In the era of War 3.0, the target of deterrence is mainly state actors, but the specific form of conflict may be similar to hybrid warfare or conventional warfare. When formulating deterrence strategies in the space and cyberspace domains, both types of conflict should be taken into account. It is necessary to recognize that emerging domain capabilities are multipliers of traditional capabilities. The significance of competing for control in emerging domains lies in enhancing one’s own physical forces such as land, sea, and air forces or weakening the physical forces of opponents.

The report points out that using emerging field forces to carry out attacks can cause no tangible physical damage, is conducive to conflict management, and is the best tool for gray zone operations. Japan currently faces two main problems. One is that the emerging field forces owned by law enforcement agencies are not in line with mission requirements. The other is that it needs to consider how to use emerging field forces to achieve effective conflict management.

2

Strategic Deterrence in Emerging Fields

The report uses traditional deterrence theory for analysis and concludes that space and cyberspace have five common characteristics: difficult situational awareness, high defense difficulty, low attack threshold, mixed actors, and lack of international codes of conduct. Easy to attack and difficult to defend are the common characteristics of these two fields, so it is difficult to achieve effective strategic deterrence. In this regard, action should be taken in four aspects: First, improve situational awareness capabilities so that when problems occur, the cause of the failure can be quickly determined, the attacker can be identified, and the damage effect can be evaluated when counterattacked. Second, improve resilience to ensure that the loss of some functions will not cause the entire system to become disabled. Third, strengthen offensive capabilities, which can be used to attack in a certain field, or to use means in other fields to conduct cross-domain attacks. Fourth, achieve arms control cooperation between countries and build trust, formulate codes of conduct, etc.

3

Strengthening deterrence in air and space

1. The connotation of air and space control continues to be enriched

The report believes that the air and space can control the entire battlefield. In order to compete for air and space dominance, various types of equipment are constantly updated, combat systems are becoming more and more complex, and the scope of operations is becoming wider and wider. In combat, both sides often focus on the “find, locate, track, decide, engage, and assess (Find Fix Track Targeting Engage Assess, F2T2EA)” full kill chain, and simultaneously confront in emerging fields such as space, cyberspace, and electromagnetic space, which greatly expands the connotation of traditional dominance. In future high-end wars, the side with a higher level of space, cyberspace, and electromagnetic space capabilities may have an overwhelming advantage in overall combat capabilities.

2. How to exert the deterrent function of space power

The report emphasizes that space systems play an important role in intelligence collection, surveillance and reconnaissance (ISR), communications, positioning, navigation and timing (PNT), missile warning, environmental monitoring, etc., and also provide increasingly important support for the use of nuclear and conventional forces. In order to form a strong space deterrence, first, we must possess and demonstrate the corresponding capabilities, mainly the resilience, defense, counter-retaliation and situational awareness capabilities of the space system. Second, we must show the enemy our determination to use retaliatory capabilities. Third, we must form a cross-domain deterrence to ensure the security of the entire space system. In addition, systems in other fields such as land, sea and air must be able to supplement some of the functions of the space system. In the face of enemy attacks on our satellites, we must retaliate not only from space, but also through land, sea, air and cyberspace.

As space systems play an increasingly important role in Japan’s national defense, we will further enhance our deterrence against hostile offensive actions. While improving the resilience of space assets, we will attach great importance to the effective use of commercial space services.

3. How to enhance the deterrent effect of Japan’s aerospace power

The report points out that Japan should attach importance to cross-domain coordination of sea, land, air and space forces, especially to strengthen cooperation with the United States. It is necessary to closely monitor the surrounding airspace, use aircraft to perform denial missions when the situation escalates, and take active defense measures to prevent missile attacks. It is necessary to strengthen the construction of Self-Defense Force bases and realize the mutual use of air bases between Japan and the United States. Japan is surrounded by the sea, and it is necessary to attach importance to developing the ability to use air means to strike maritime targets to ensure the security of the homeland.

Faced with the vast Indo-Pacific region, it is difficult for Japan to accurately grasp the regional situation by relying solely on its own aerospace power. It is necessary to share intelligence information through multilateral cooperation and build a Common Operational Picture (COP) in the Indo-Pacific region to accurately and comprehensively grasp the regional situation and have a deterrent effect on potential enemies. It is necessary to strengthen cooperation with countries other than the United States, especially Australia. Japan, the United States and Australia should establish joint ammunition and fuel depots in their respective countries. In the field of space, Japan will expand cooperation in hosting payloads. If it can cooperate with European countries, then future attacks on Japanese satellites can be regarded as attacks on multiple countries. It is becoming increasingly important to make full use of the power of allies and use their aerospace power to achieve deterrence goals.

4

Strengthening Deterrence in Cyberspace

1. Characteristics of Cyberspace Operations

The report believes that cyberspace has an increasing impact on the course of war, and cyberspace combat capabilities can even deter the occurrence of an entire conflict. Cyberspace security plays an important role in protecting various systems from cyber attacks, ensuring that confidential information is not leaked, and ensuring the normal operation of other systems such as critical infrastructure. It is also of great significance for cognitive domain protection.

There are two main characteristics of cyberspace at present. First, the boundary between military and civilian is blurred. The potential of military application of Internet is constantly emerging. In the conflict between Russia and Ukraine, the artillery combat management system (GIS Art for Artillery, GIS ARTA) used by Ukraine is to send data through drones and smartphones to determine the target location and launch attacks, which is very effective. Second, the security concept based on closed system is outdated. Even with physical isolation, it is impossible to completely prevent attacks. Cyberspace is easy to attack but difficult to defend, and the offense and defense are asymmetric. In addition, cyberspace operations can control the rhythm of conflict escalation in a low-intensity form, and can also be upgraded to a powerful weapon with high-intensity offensiveness after the official outbreak of military conflict.

2. Developing emerging technologies to enhance cyber warfare capabilities

The report points out that the development of emerging technologies will continue to change the rules of warfare, and the Japanese Ministry of Defense has begun to study the use of cloud computing to build a basic computing environment. It plans to build a diversified network environment, use Starlink satellites and 5G networks to provide Internet services, and consider enabling the new Internet communication protocol QUIC (Quick UDP Internet Connection). The first quantum computer has been developed, and related research on anti-quantum cryptography has been carried out. At the same time, it also pays close attention to the specific ways of combining artificial intelligence with cyber warfare.

3. Ways to strengthen cyber deterrence

The report emphasizes that the development of artificial intelligence technology and the adjustment of the network component supply chain are two uncertain factors. Japan should focus on improving its cyber warfare capabilities from the following aspects: (1) vigorously promote intelligence information sharing; (2) build active defense systems; (3) introduce zero trust and risk management frameworks; (4) establish the ability to attack adversary networks; (5) accelerate legislation in the field of cybersecurity; (6) expand the scale of talent training and increase support for commercial enterprises. By carrying out the above work, Japan can achieve early detection and response to cyber attacks. Even if it encounters a cyber attack, it can be discovered, processed and recovered at an early stage to ensure the resilience of the system to continue to operate. In addition, when Japan is attacked, it should coordinate actions with the US military. In peacetime, joint training should be strengthened so that it can carry out joint operations with the Cyber ​​Mission Force (CMF) composed of relevant forces of the US Cyber ​​Command.

Responsible for directing, coordinating and conducting cyber operations

5

Conception of cyberspace combat scenarios

The report describes a basic scenario of cyber warfare between the Red and Blue sides, with the Taiwan Strait incident as the background, and puts forward the following important viewpoints: First, when the Blue side has an absolute advantage, the Blue side should focus on taking defensive actions to achieve deterrence. When the forces of the two sides tend to be balanced, the Blue side should actively take offensive actions to seize the initiative. Second, the Blue side can launch cyber attacks around the Red side’s observation, adjustment, decision-making, and action (OODA) links to weaken the Red side’s military capabilities, especially its maritime and landing combat capabilities, and carry out “anti-military cyber attack missions.” When necessary, strike the Red side’s social infrastructure to weaken its overall strength. At the same time, take cyber attacks to induce and divide public opinion, weaken the Red side’s willingness to take action, and carry out “anti-value cyber attack missions.” Third, in the anti-military cyber attack mission, the Blue side can attack the Red side’s aircraft, and can also take measures such as data pollution, deception cloud, and communication network interruption to attack the Red side’s command and control system. In the action of attacking the civilian network system, cyber attacks can be carried out on key entities of railway and ship operations in the Red coastal areas and key infrastructure such as the power grid in coastal metropolises that support social and economic systems. There are also options for attacking Red Team financial systems, media servers, and water and gas supply networks.

In order to deal with possible cyber attacks from the Red side in the event of an emergency in the Taiwan Strait, Japan should do the following: First, adopt an active defense strategy, require commercial operators to share information with the government, and introduce artificial intelligence to improve cyber situational awareness and network resilience. Second, introduce a large-scale data forensics platform to identify the authenticity of massive image data and counter false information. Third, give priority to countermeasures against domestic cyber attacks, effectively defend the networks of defense, government departments, law enforcement agencies and private enterprises through various active cyber defense measures, and deal with cognitive domain actions against the Japanese public.

6

Conclusion

The report proposed the concept of War 3.0 and launched a series of discussions on achieving cyberspace and space deterrence. While suggesting strengthening its own relevant capacity building, it repeatedly emphasized the need to strengthen cooperation with the United States, especially with countries related to the Quadrilateral Security Dialogue (QUAD) and AUKUS. With Japan’s application to join AUKUS on April 25, 2024, the Asia-Pacific version of the “mini-NATO” alliance has taken shape, and regional peace and stability will be severely impacted.

Disclaimer: This article is reprinted from Military High-Tech Online, the original author is Shi Honglin. The content of the article is the original author’s personal opinion. This public account is translated/reprinted only for sharing and conveying different opinions. If you have any objections, please contact us!

Reprinted from Military High-Tech Online

Author: Shi Honglin

Introduction to the Institute

The International Institute of Technology and Economics (IITE) was established in November 1985. It is a non-profit research institution affiliated to the Development Research Center of the State Council. Its main functions are to study major policy, strategic and forward-looking issues in my country’s economic, scientific and technological social development, track and analyze the development trends of world science and technology and economy, and provide decision-making consulting services to the central government and relevant ministries. “Global Technology Map” is the official WeChat account of the International Institute of Technology and Economics, dedicated to delivering cutting-edge technology information and technological innovation insights to the public.

Address: Block A, Building 20, Xiaonanzhuang, Haidian District, Beijing

Tel: 010-82635522

繁體中文國語:

新領域軍事力量的發展正在改變戰爭樣式,其中太空(也稱為外層空間)和網路空間(以下簡稱網空)力量經過多年的發展,已由概念力量轉變為現實力量。如何利用這兩種新質力量,已成為世界各主要強國重點研究的內容。 2024年3月日本笹川和平財團安全研究小組發布研究報告《戰爭3.0:戰爭的根本變化》(以下簡稱《報告》),從維護日本國家安全的角度出發,探討如何利用太空和網空實現戰略威懾等問題,並以台海突發事件為背景,提出了一個網空對抗的典型場景,展示了日本在運用新興領域作戰力量上的思考。現將其主要內容整理如下,以颯讀者。

01

戰爭3.0時代到來

《報告》認為,在冷戰時期,平民、國家和軍隊之間的界線很清晰,對峙雙方經濟依賴度較低,此時是戰爭1.0時代。冷戰後全球化加速發展,2001年進入反恐戰爭時代,對抗的主體變成國家與非國家行為體,此時是戰爭2.0時代。 2010年前後大國對抗再次出現,由於經濟全球化發展程度較高,「戰爭」較多發生在軍事以外的維度。俄烏衝突顯示在現代戰爭中,其他手段正變得與軍事手段同等重要。同時,商業公司也更參與新興軍事技術的研發和使用,政府對軍事力量的控製程度受到了削弱。自此可以用一個新的概念來描述現代戰爭,即戰爭3.0。

只要戰爭在全球化背景下發生,就會出現戰爭3.0所包含的特徵。進入戰爭3.0時代,威懾的目標主要是國家行為體,但具體衝突形式可能類似混合戰爭,也可能是常規戰爭。在製定太空和網空領域威懾戰略時,要同時考慮這兩類衝突形式。要體認到新興領域能力是傳統能力的倍增器,爭奪新興領域制權的意義,在於提升己方陸、海、空軍等實體力量或削弱對手的實體力量。

《報告》指出,運用新興領域力量實施攻擊,可以不造成有形的物理破壞,有利於管控衝突,是在灰色地帶行動的最佳工具。日本當前主要面臨兩個問題,一是執法機構擁有的新興領域力量和任務需求不相適應。二是需要考慮具體如何運用新興領域力量,以達到衝突的有效管控。

02

新興領域的戰略威懾

《報告》利用傳統威懾理論進行分析,得出太空和網空具有五個共同特徵:態勢感知難、防禦難度大、攻擊門檻低、行動主體混雜、缺乏國際行為準則。易攻難守是這兩個領域的共同特點,因此較難實現有效的戰略威懾。對此,應從四個方面採取行動:一是提高態勢感知能力,以便在出現問題後,能夠迅速確定故障原因,識別攻擊者,並在反擊時評估毀傷效果。二是提升復原力,確保喪失部分功能不會導致整個系統失能。三是強化進攻能力,可在某一領域進行攻擊,也可利用其他領域手段進行跨域攻擊。四是實現國家間軍備控制合作並建立信任,制定行為準則等。

03

加強空中和太空的威懾

(一)空天制權的內涵不斷豐富

《報告》認為,空中和太空可以瞰整個戰場,為爭奪空天制權,各類裝備不斷更新,作戰系統越來越複雜,作戰範圍也越來越寬廣。在作戰中,雙方往往會圍繞「發現、定位、追蹤、決策、交戰、評估(Find Fix Track Targeting Engage Assess,F2T2EA)」全殺傷鏈各環節,在太空、網空、電磁空間等新興領域同時進行對抗,大大拓展了傳統制權的內涵。在未來高端戰爭中,利用太空、網空和電磁空間能力水準較高的一方,可能會在整體作戰能力上擁有壓倒性的優勢。
(二)如何發揮太空力量的嚇阻功能

《報告》強調,太空系統在情報收集、監視和偵察(Intelligence, Surveillance, and Reconnaissance,ISR),通信,定位、導航和授時(Positioning, Navigation and Timing, PNT),導彈預警,環境監測等方面發揮著重要作用,也為使用核武力量和常規力量提供越來越重要的支持。為了形成強大的太空威懾,一要擁有並展現對應能力,主要是太空系統的復原力、防禦力、反制報復能力以及態勢感知能力。二要向敵方展示使用報復能力的決心。三要形成跨域威懾以確保太空全系統安全。此外,陸海空等其他領域系統要能補充太空系統的部分功能,面對敵方對己方衛星的攻擊,不僅要從太空報復,還要透過陸海空和網空進行報復。

由於太空系統在日本國防中的作用越來越大,所以要進一步提升對敵對進攻行為的威懾。在提升太空資產復原力的同時,要高度重視商業太空服務的有效運用。

(三)如何增強日本空天肌力嚇阻效果

《報告》指出,日本應重視海陸空天力量的跨域協同,特別是加強與美國的合作。若要緊密監視週邊空域,在局勢升級時使用飛機執行拒止任務,採取主動防禦措施,防止遭遇飛彈攻擊。要加強自衛隊基地建設,實現日美兩國空軍基地的互相使用。日本四面環海,要重視發展使用空中手段打擊海上目標的能力,以確保本土安全。

面對廣袤的印太地區,日本僅靠自身的空天力量,難以準確掌握區域態勢,要透過多邊合作分享情報訊息,建構印太地區通用作戰態勢圖(Common Operational Picture, COP),以精準全面地掌握地區態勢,對潛在敵人產生嚇阻效果。要加強與美國以外的國家,特別是澳洲的合作。日本、美國和澳洲應在各自國家建立聯合彈藥和燃料庫。在太空領域,日本將拓展託管有效載荷合作,如能和歐洲國家合作,那麼未來攻擊日本衛星的行為,將可以被視為對多個國家的攻擊。要充分借助盟友力量,利用其空天力量達成威懾目的,這一點正變得越來越重要。

04

加強網空的威懾

(一)網空作戰的特點

《報告》認為,網空對戰爭進程的影響越來越大,而網空作戰能力甚至可以嚇阻整個衝突的發生。網空安全對於保護自身各類系統免受網路攻擊、確保機密資訊不會外洩、確保關鍵基礎設施等其他系統正常運作發揮重要作用,對於認知域防護也有著十分重大的意義。

目前網空主要有兩個特點,一是軍民界線模糊。網路的軍事應用潛力不斷顯現,在俄烏衝突中,烏克蘭使用的砲兵作戰管理系統(GIS Art for Artillery, GIS ARTA),就是透過無人機和智慧型手機,發送資料確定目標位置並發動攻擊,且非常有效。二是基於封閉系統的安全觀念已經過時。即便是進行物理隔離,也不可能完全防止被攻擊,網空易攻難守,攻防呈現不對稱特徵。此外,網空作戰既可以低強度形式控制衝突升級的節奏,也可以在正式爆發軍事衝突後,升級為具有高強度攻擊性的強大武器。
(二)發展新興科技提升網路戰能力

《報告》指出,新興技術的發展將持續改變作戰規則,日本防衛省已開始研究使用雲端運算建構基本運算環境。計畫建置多樣化網路環境,使用「星鏈」衛星和5G網路提供網路服務,考慮啟用新的網路通訊協定QUIC(Quick UDP Internet Connection)。已研發首台量子計算機,並進行反量子密碼的相關研究。同時,也高度關注人工智慧與網路戰結合的具體方式。

(三)強化網空威懾的辦法

《報告》強調,人工智慧技術的發展和網路部件供應鏈的調整是兩個不確定的影響因素。日本應著重從以下幾點提升網路戰能力:(1)大力促進情報資訊共享;(2)建構主動防禦系統;(3)引入零信任和風險管理框架;(4)建立攻擊對手網路的能力; (5)加速網路安全領域立法;(6)擴大人才培育規模,增加對商業企業的支持。透過進行以上工作,日本可以實現提前發現和應對網路攻擊。即使遭遇網路攻擊,也可在早期階段發現、處理和恢復,確保系統繼續運作的彈性。此外,當日本受到攻擊時,要與美軍協調行動。平時要加強聯合訓練,以便能夠與由美國網路司令部相關部隊組成網路任務部隊(The Cyber​​ Mission Force, CMF)實施聯合行動。
負責指導、協調和執行網路行動

05

對網空作戰場景的構想

《報告》以台海突發事件為背景,描述了一個紅藍雙方網路戰的基本場景,提出了以下幾個重要觀點:一是當藍方擁有絕對優勢時,藍方應側重於採取防禦行動實現威懾。當雙方力量趨於平衡時,藍方則應積極採取攻擊行動以爭取主動權。二是藍方可以圍繞紅方觀察、調整、決策、行動(Observe Orient Decide Act, OODA)的各環節展開網絡攻擊,削弱紅方軍事能力,特別是海上作戰和登陸作戰能力,開展「反軍事網絡攻擊任務」。在必要時候打擊紅方社會基礎設施,削弱其整體實力。同時,採取網路攻擊誘導和分裂公眾輿論,削弱紅方採取行動的意願,進行「反價值網路攻擊任務」。第三是在反軍事網路攻擊任務中,藍方可以攻擊紅方飛機,還可以採取資料污染、欺騙雲以及通訊網路中斷等措施,攻擊紅方指控系統。在攻擊民用網路系統的行動中,可以對紅方沿海地區鐵路和船舶運營的關鍵實體以及支持社會和經濟系統的沿海大城市電網等關鍵基礎設施進行網路攻擊。還可以選擇攻擊紅方金融系統、媒體伺服器以及供水和天然氣供應網路。

為因應台海突發事件發生時紅方可能的網路攻擊,日本應做好以下幾點:一是採取主動防禦策略,要求商業業者要與政府分享訊息,引入人工智慧以提高網空態勢感知和網路彈性。二是引進大規模資料取證平台以辨識海量影像資料的真實性,反制假資訊。第三是優先採取針對本國網路攻擊的反制措施,透過各種積極網路防禦措施有效保衛防衛、政府部門、執法機構和私人企業的網絡,並處理針對日本公眾的認知域行動。
06

結語

該報告提出了戰爭3.0的概念,圍繞實現網空和太空威懾展開了一系列論述,在建議加強自身相關能力建設的同時,多次強調要加強與美國,特別是四方安全對話(Quadrilateral Security Dialogue, QUAD)和奧庫斯(AUKUS)相關國家的合作。隨著2024年4月25日日本申請加入“奧庫斯”,亞太版的“小北約”聯盟已現雛形,地區和平穩定將受到嚴重衝擊。

免責聲明:本文轉自軍事高科技在線,原作者史宏林。文章內容係原作者個人觀點,本公眾號編譯/轉載僅為分享、傳達不同觀點,如有任何異議,歡迎聯絡我們!

轉自丨軍事高科技在線

作者丨史宏林

研究所簡介

國際技術經濟研究所(IITE)成立於1985年11月,是隸屬於國務院發展研究中心的非營利研究機構,主要功能是研究我國經濟、科技社會發展中的重大政策性、策略性、前瞻性問題,追蹤分析世界科技、經濟發展態勢,為中央和相關部會提供決策諮詢服務。 「全球技術地圖」為國際技術經濟研究所官方微信帳號,致力於向大眾傳遞尖端技術資訊與科技創新洞見。

地址:北京市海淀區小南莊20號樓A座

中文原文來源:https://www.163.com/dy/article/J5UO0ID90514R8DE.html

Chinese Military Analysis of New Features and Trends of US Information Warfare

中國軍事分析美國資訊戰新特色新趨勢

由國語音譯為現代英語

Information warfare has become an important topic in today’s international politics and security. As the world’s largest military and intelligence agency, the United States has very strong strength and resources in information warfare. It is an important initiator and participant in information warfare, and its information warfare capabilities have attracted much attention. In addition to adjusting the goals of information warfare, comprehensively advancing in various ways, and integrating domestic departments to unify actions, the US government is also actively expanding its information warfare alliances, by absorbing more countries to form a broad information warfare alliance, enhancing the effectiveness of information warfare, and further restricting the activity environment of rival countries.

    【Key words】Information warfare, U.S. national strategy 【Chinese Library Classification Number】D815 【Document Identification Code】A

    After the Biden administration came to power, the US national strategy has been further strengthened in terms of offensiveness and targeting, which has also brought about many new changes in the US information warfare. On the one hand, the Biden administration proposed the “integrated containment” strategy in the national security strategy, and information warfare has become an important tool to contain opponents in diplomacy, intelligence, economy and trade. On the other hand, the United States uses the Internet as the main field and widely uses modern information technology to comprehensively promote information warfare in various ways, trying to influence and change the public opinion and cognition of the target country. In addition, the United States has also vigorously expanded its information warfare alliances and included more countries in its alliance system to further restrict the activity environment of its competitors. Domestic academic circles have also conducted some research on US information warfare, such as: discussing the development of US information warfare from the aspects of origin, method, technical support and equipment, analyzing the implementation basis of information warfare from the perspective of US information security strategy, or exploring the training of US military information warfare talents. However, there is still a lack of relevant discussions in the academic community on the new changes and trends of US information warfare in recent years, especially under the Biden administration. This article focuses on analyzing the new characteristics and new trends of US information warfare.

    The historical origins of the United States launching information warfare around the world

    On May 4, 2023, the latest report released by the National Virus Emergency Response Center and 360 Company disclosed the main technical means by which the CIA planned, organized and implemented “color revolution” events around the world, including a non-traditional regime change technology called “swarming”, which was used to encourage young people connected by the Internet to join the “shoot and change places” mobile protests. For a long time, the Central Intelligence Agency (CIA) of the United States has secretly implemented “peaceful evolution” and “color revolutions” around the world and continued to carry out espionage activities. Information communication and on-site command are the decisive factors affecting the success or failure of “peaceful evolution” and “color revolutions”. The United States’ communication technology and its media applications are in a leading position internationally, which provides unprecedented technical support for the US intelligence agencies to launch “peaceful evolution” and “color revolutions” abroad.

    Entering the 21st century, with the further development of the Internet, driven by social media, the speed, diversity and breadth of information dissemination have been unprecedentedly improved. All over the world, information can be shared and transmitted in real time. Due to the development of information technology, many countries have begun to realize the importance of information warfare: on the one hand, countries can contain opponents and create an information environment that is beneficial to their own country through information transmission and control. On the other hand, the mobility and uncontrollability of information will pose a threat to national security. Therefore, information warfare has become an important issue in today’s international politics and security. The United States has the world’s largest military and intelligence agencies, has very strong strength and resources in information warfare, is an important participant and initiator of information warfare, and its information warfare capabilities have attracted much attention.

    After the 9/11 terrorist attacks, the United States mainly adopted a defensive posture in information warfare, strengthening the construction and security monitoring of network facilities to prevent attacks from terrorism and opponents. Although during the Obama and Trump administrations, the United States gradually moved from defense to active offense, proposing “preemptive” cyber sanctions against countries suspected of cyber attacks. However, judging from the National Cybersecurity Strategy released in March 2023, the United States focuses mainly on cyber deterrence, using “forward defense” to prevent attacks and infringements on key national facilities. According to media reports, when Musk announced the “amnesty” of Twitter, Meta, the parent company of another American social platform Facebook, announced a list of banned accounts, among which a group of accounts were related to the US military. This shows that the purpose, method and characteristics of the United States in information warfare are undergoing major changes, from cyber defense and deterrence to the field of influencing and shaping cognition.

    In 1995, Colonel Szafranski of the US Army defined information warfare as a conflict that directly attacks information systems to attack the knowledge or concept fields of the opponent. Information warfare can be conducted as part of a larger, more comprehensive hostile activity (such as cyber warfare), or as the only form of hostility. In 2021, Field, an expert at the Hoover Institution in the United States, also made a similar definition: information warfare aims to convey information to the target audience, which is selected to influence emotions, motivations, reasoning, attitudes, understandings, beliefs or behaviors, thereby promoting the interests of the actors. This shows that there is a general consensus among American elites on the form and purpose of information warfare, that is, to influence the cognitive system of the target object in a variety of ways. Previously, although the United States mainly adopted network defense and attack to target the opponent’s network facilities, with the changes in the international environment and the comprehensive strength of the United States, the United States gradually shifted the operational field and goals of information warfare to the cognitive system of the target country to create an international environment more favorable to the United States.

    Information warfare is an important part of the U.S. national strategy and changes with strategic adjustments.

    Information warfare is an important part of the US national strategy and an important means to achieve its national strategic goals. Today is an information age. Information and information technology not only determine the direction of social change, but are also key factors affecting competition between countries. Countries adjust their national strategies based on changes in the external environment and their own strength, and the content, characteristics, methods and fields of information warfare will also change accordingly.

    In 2016, the Obama administration issued a cybersecurity strategy called the National Cybersecurity Action Plan, which mainly includes: innovation and protection of networks, prevention of cybercrime, strengthening cybersecurity education, enhancing international cooperation and strengthening government cybersecurity management. During this period, the US government’s information warfare mainly focused on preventing cyber attacks from opponents and protecting its own network facilities and security. In September 2018, the Trump administration also issued the National Cybersecurity Strategy, which also emphasized the protection of network facilities and ensuring network security. However, in this strategy, Trump proposed the concept of “forward defense”. When it is believed that there is a possibility of an attack, the United States will take the lead in attacking the opponent, which means that the US information warfare has shifted from defense to active offense. In March 2023, the Biden administration released the latest National Cybersecurity Strategy, which further emphasized the offensive posture and greatly expanded the scope of information warfare. In this strategy, five pillars are proposed. In addition to protecting critical infrastructure and establishing international partnerships, it also emphasizes the need to combat and destroy threat actors, expand the scope of information warfare, expand public-private cooperation, combat adversaries through cooperation between public and private sectors, and shape market forces to promote security and resilience. This shows that in information warfare, the United States will further infiltrate the private sector through various means, promote American ideology and rules through the market and investment, and restrict the development environment of its competitors.

    After the Biden administration came to power, the US national strategy has also added more targeted and offensive elements. In the 2021 National Security Strategic Guidance, it is proposed to build a global strategy around the long-term competition with China and Russia; strengthen the US presence and cooperation in the Pacific region, while strengthening cooperation with Asian allies and partners to deal with the so-called “China threat”. The 2022 National Security Strategy clearly proposes the implementation of an “integrated containment strategy”, requiring the comprehensive use of comprehensive national security tools, including military, diplomatic, intelligence, economic, trade and financial means, to prevent any potential challenges to the United States and its allies. According to this strategy, information warfare is no longer just a function of defending against adversary cyber attacks and protecting domestic infrastructure. Information warfare occupies an important position in the “integrated containment strategy”. It not only undertakes the function of military strikes, but will also become an important tool for containing opponents in diplomacy, intelligence, economy and trade.

    The United States is comprehensively advancing information warfare with cognitive systems as its target

    Some scholars believe that the Gulf War was the beginning of information warfare, but as early as during the Cold War, the United States had conducted large-scale information warfare against the Soviet Union. The United States used the media it controlled to carry out extensive and in-depth false news propaganda on the Soviet people, instilling American ideology, and to a certain extent affecting the cognition of the Soviet people. After the end of the Cold War, American decision-makers are believed to have gradually reduced their emphasis on the non-material elements of war because they have defeated their ideological opponents. In the following decades, regarding information warfare, the United States is more inclined to frame these activities in a narrower military context. The “integrated containment strategy” proposed by the Biden administration shows that relying solely on a defense-oriented strategy may no longer be enough to limit competitors. The United States intends to contain its opponents in all areas of national strength, including diplomacy, economy, and information. This comprehensive containment approach focuses on mobilizing all elements of national power in competition other than military means. It requires not only the coordination of various important U.S. agencies, including the Department of Defense, the State Department, the CIA, the FBI, and the U.S. Agency for International Development, but also conventional military capabilities – focusing on destroying the target country and occupying its territory. It also requires the development of unconventional military capabilities – competing for influence and legitimacy among the people of various countries, enhancing the influence of the United States by influencing and changing the cognitive system of the people of the target country, and thereby undermining the opponent’s information environment and decision-making ability.

    The information market assumes that people will process information rationally, but psychological research shows that people often do not do so. Instead, the information environment in which people live affects their cognition, decision-making, and behavior, and the information environment is the operational environment of information warfare. In recent years, the U.S. Department of Defense has adopted an increasingly comprehensive understanding of the information environment. In the updated definition of the information environment, it points out that it “contains and aggregates many social, cultural, cognitive, technological, and physical attributes that affect the knowledge, understanding, beliefs, worldview, and ultimate actions of individuals, groups, systems, communities, or organizations.” Information warfare acts on the opponent’s information environment, by analyzing the opponent’s decision-making methods, psychological advantages and weaknesses, changing the information environment, and then affecting the “key factor” of the cognitive system, changing its national behavior to achieve the goal of winning.

    In the networked era, the transmission, aggregation and processing of information are mostly carried out through the network. The network constitutes the most important information environment, and the combat field of information warfare is also concentrated on the network. The United States not only uses its global media and cultural communication power to spread American culture and values ​​to the world through television, movies, music, games, etc., to strengthen its international influence and soft power. In addition, the US government and military also make extensive use of social media, search engines, artificial intelligence, the Internet and other information means, and through professional and systematic information operation agencies and cross-border cooperation between different agencies and departments, they carry out various forms of information warfare, such as posting political propaganda on social media, launching cyber attacks, conducting network monitoring and surveillance, and organizing network sabotage activities. It should be noted that social media is increasingly becoming an important medium for the United States to launch information warfare. This is because social media platforms can have a huge impact on a large number of people with their speed and breadth of information dissemination. At the same time, because people are irrational in cognition, large-scale simple repetition on social media has become a reliable way for people to believe in fallacies. The United States is deploying a large number of fake accounts on social media platforms to widely spread false information, manipulate information, incite emotions, create public opinion, mislead opponents’ decision-making behavior, and formulate and disseminate strategic narratives to prompt national behavior to change in a direction that is beneficial to the United States.

    Expanding the information warfare alliance and further constraining the environment for competitors

    In addition to adjusting the goals of information warfare, advancing it comprehensively in a variety of ways, and integrating domestic departments into unified actions, the U.S. government is also actively expanding its information warfare alliances by absorbing more countries to form a broad information warfare alliance, thereby enhancing the effectiveness of information warfare and further restricting the environment in which rival countries can operate.

    In Europe, the United States has been strengthening its cooperation with its NATO allies on information warfare. In November 2010, NATO updated the “Lisbon Strategic Concept”, emphasizing the need to more thoroughly respond to the rapidly evolving security challenges of the 21st century, including cyber attacks. The policy focuses not only on protecting NATO’s own networks, but also on establishing agreed benchmarks to protect the national networks of allies. The 2014 Wales Summit proposed a policy to strengthen cyber defense, making the cyber field one of its key political and strategic priorities, emphasizing the cooperation and unified action of member states, and linking the cyberspace with the collective defense of the alliance. At the 2016 Warsaw Summit, NATO recognized cyberspace as a new field of military operations. In February 2018, NATO member states established a cyber operations center within the NATO military command structure, which aims to strengthen the defense and response capabilities of NATO member states in cyberspace and improve the overall level of cyber security. These measures show that under the leadership of the United States, NATO has gradually established a strong cyber cooperation platform for information warfare. On the basis of this platform, the United States will implement information warfare more comprehensively and across fields. During the Ukrainian crisis, the United States and its allies used this platform to provide cyber defense for Ukraine and launch a large number of cyber attacks. They also used the Internet to spread various false information, distorting and shaping the country’s image that was unfavorable to Russia.

    In Asia, based on the existing military alliance, the United States has been deepening its security alliances to maintain its interests in the Indo-Pacific region, vigorously promoting the “four-country mechanism” consisting of the United States, Japan, India and Australia, deepening its relations with India, and striving to promote trilateral cooperation between the United States, Japan and South Korea, further promoting network rules that are beneficial to the United States and expanding the alliances led by the United States. This makes it easier for the United States to insert information operators in the networks of allied countries, spread information that is beneficial to the United States in multiple networks, and shape the information environment dominated by the United States to exclude and restrict competing countries in the information environment. At the same time, this transnational network is still expanding, and the United States’ network standards and norms are constantly being implemented in other countries, which has greatly helped the US government and military to infiltrate these networks and conduct information warfare. The United States has also actively engaged with ASEAN countries and their individual member states, including Indonesia, Singapore and Vietnam, and has achieved certain results in network expansion. Despite the differences in governance systems and technical capabilities among these countries, as well as competing domestic priorities, ASEAN has become the first region among developing countries to adopt a consistent e-commerce legal framework. They have adopted the cybersecurity framework of the National Institute of Standards and Technology (NIST) of the United States as a global common language to communicate with different industry sectors and other countries.

    In February 2022, the Biden administration issued a new Indo-Pacific Strategy, which is the first Indo-Pacific Strategy issued by the Biden administration and the second Indo-Pacific Strategy issued by the US government. The strategy proposes five major policy goals, including promoting freedom and openness, regional security and prosperity in the Indo-Pacific region, and also proposes an “integrated containment” strategy. For China, the Indo-Pacific Strategy points out that “our goal is not to change China, but to shape the strategic environment in which it operates.” Especially in such a media age, the transmission and release of information are more convenient, and we need to pay more attention to the importance of information warfare. In this regard, we may also need to grasp the psychological demands and emotional needs of the masses more accurately. Taking the latest report released by the National Virus Emergency Response Center and 360 Company as an example, it is particularly important for domestic government agencies, scientific research institutions, industrial enterprises and commercial institutions to quickly “see” and deal with the highly systematic, intelligent and concealed cyber attacks launched by the CIA against my country in the first place. The report recommends that in order to effectively respond to imminent network and real threats, while adopting independent and controllable domestic equipment, we should organize self-inspection and self-examination of APT attacks as soon as possible, and gradually establish a long-term defense system to achieve comprehensive and systematic prevention and control to resist advanced threat attacks.

    As the US information warfare continues to advance, the meaning of shaping the environment has become more prominent, that is, not only to contain China politically, economically and militarily, but also to “shape” China’s activity environment in terms of network and information. For China, facing the more complex and severe international situation under the impact of the COVID-19 pandemic and the Ukrainian crisis and the US’s continuously advancing information warfare strategy, it should make the following responses: First, strengthen network and information security construction to improve its own information security level and guard against attacks on network facilities and key infrastructure. Be vigilant against the spread of false information on the Internet and in the media, trace the source of the spread, and prevent the spread of information by large-scale false accounts and the conscious guidance of the public’s cognitive system. Secondly, continue to promote high-level reform and opening up, actively develop foreign trade, and further strengthen economic ties with countries around the world. This is the most effective strategy to prevent the US “integrated containment” and information warfare. Tell the Chinese story well in foreign exchanges, let the world know more about China, and promote mutual trust and cooperation with other countries through extensive exchanges and strengthening economic interdependence. Thirdly, adhere to economic development. Developing the economy is a necessary condition for the rejuvenation of the Chinese nation and is also a core task of the country. Through economic development, the world can also understand the Chinese plan and the Chinese road more clearly and vividly, and thus more effectively defend against false information and information distortion in information warfare. Finally, in terms of Sino-US relations, while maintaining the bottom line and preventing conflicts, China can also establish and restore exchanges and cooperation in certain important areas or important groups, increase and accumulate trust, and further expand cooperation to divide and ease the US integrated containment strategy.

    (The author is a professor at the Institute of Contemporary Socialism of Shandong University, a researcher at the Institute of National Governance of Shandong University, and a researcher at the Institute of South Asian Studies of Shandong University)

    【references】

    ① Liu Boran and Wei Xiuming: “U.S. Cyber ​​Security Strategy: Development Process, Evolutionary Characteristics and Essence”, Journal of Liaoning University (Philosophy and Social Sciences Edition), Issue 3, 2019.

    ②Huang Yingxin: “Information Warfare and Its Development”, “Intelligence Command Control System and Simulation Technology”, Issue 6, 2000.

    ③Lu Xinde: “On the Expansiveness of the US Information Security Strategy”, Contemporary Asia-Pacific, Issue 7, 2005.

    ④Liu Xiaoyuan and Pang Bo, “A Perspective on the Training of Information Warfare Talents in the US Military and Its Implications”, Journal of Higher Education Research, No. 3, 2005.

    ⑤[Japan] Kosawa Kunio and Jiang Xinfeng, translators: “IT Revolution and the Development of the U.S. and Japanese Navies”, International Outlook, No. 15, 2001.

    ⑥Wu Fei and Li Xuan: “The Role of the Media in the Information War between Russia and the United States under Geopolitical Game”, “External Communication”, Issue 6, 2022.

    ⑦Yang Guangbin et al.: “Characteristics of the Era of Turbulent Change”, “World Economy and Politics”, Issue 2, 2023.

繁體中文

《 人民論壇 》( 2023年10月09日 第 04 版)
【摘要】資訊戰已成為當今國際政治和安全領域的重要議題。因其全球最大的軍事和情報機構,在資訊戰方面有著非常強的實力和資源,是資訊戰的重要發起者和參與者,其資訊戰的能力備受關注。除了調整資訊戰的目標,以多種方式全面推進,整合國內各部門而統一行動外,美國政府還積極擴展資訊戰的同盟,透過吸收更多國家以形成廣泛的資訊戰聯盟,增強資訊戰的效果,並進一步限制對手國家的活動環境。

【關鍵字】資訊戰 美國國家戰略 【中圖分類號】D815 【文獻標識碼】A

拜登政府上台後,在美國國家戰略上進一步加強了攻擊性和針對性,這也使美國的資訊戰發生了許多新的變化。一方面,拜登政府在國家安全戰略中提出了「一體化遏制」策略,資訊戰在外交、情報、經濟和貿易等方面成為遏制對手的重要工具;另一方面,美國以網路為主要場域,廣泛運用現代資訊科技以多種方式全面推進資訊戰,試圖影響和改變目標國家的輿論風向和認知;此外,美國還大力擴展資訊戰同盟,將更多國家納入其同盟體係以進一步限制競爭對手的活動環境。國內學界對美國資訊戰也進行了一定的研究,例如:從起源、方式、技術支援和裝備等方面討論美國資訊戰的發展,從美國資訊安全戰略角度分析資訊戰的實施基礎,抑或探析美軍信息戰人才的培養。但對於近年來,特別是拜登政府治下美國資訊戰的新變化及其趨勢,學界仍缺乏相關討論,本文則聚焦於剖析美國資訊戰的新特徵與新動向。

美國在世界各地發動資訊戰的歷史溯源

2023年5月4日,國家病毒緊急處理中心和360公司發布的最新報告披露了CIA在全球各地策劃組織實施「顏色革命」事件的主要技術手段,其中包括一款被稱為「蜂擁」的非傳統政權更迭技術,用於推動透過網路連線的年輕人加入「打一槍換一個地方」的流動性抗議活動。長期以來,美國中央情報局(CIA)在世界各地秘密實施“和平演變”和“顏色革命”,並持續進行間諜竊密活動。資訊通信和現場指揮是影響「和平演變」和「顏色革命」成敗的決定性因素。美國的通訊技術及其媒體應用在國際上處於領先地位,這給美國情報部門對外發動「和平演變」和「顏色革命」提供了前所未有的技術支援。

進入21世紀,隨著網路的進一步發展,在社群媒體的推動下,資訊傳播的高速性、多樣性和廣泛性得到了空前的提升。在世界範圍內,各地資訊都能夠即時共享和飛速傳遞。因資訊科技的發展,許多國家開始意識到資訊戰的重要性:一方面,國家可以透過資訊傳遞和控制來遏制對手並創造有利於本國的資訊環境。另一方面,資訊的流動性和不可控性會對國家安全造成威脅。因此,資訊戰已成為當今國際政治和安全領域的重要議題。美國擁有全球最大的軍事和情報機構,在資訊戰方面有著非常強的實力和資源,是資訊戰的重要參與者和發起者,其資訊戰的能力備受關注。

在「911」恐怖事件後,美國在資訊戰方面主要是採用防禦為主的態勢,加強網路設施的建設和安全監控,以防止恐怖主義和對手的攻擊。雖然在歐巴馬和川普政府時期,美國由防禦逐漸走向主動進攻,提出對疑似網路攻擊國進行「先發制人」的網路制裁。但從2023年3月發布的《國家網路安全戰略》來看,美國的重點主要放在網路威懾上,透過「向前防禦」來防備對國家關鍵設施的攻擊和侵害。根據媒體報道,馬斯克宣布「大赦」推特之際,美國另一家社群平台臉書(Facebook)的母公司Meta公佈了一份封禁帳號名單,在名單中,有一批帳號與美國軍方有關。這顯示美國在資訊戰上的目的、方式和特徵正在發生重大變化,由網路防禦和威懾進入到影響和塑造認知領域。

美軍上校沙弗蘭斯基(Szafranski)在1995年對資訊戰進行過界定,資訊戰是一種直接攻擊資訊系統以攻擊對手知識或觀念領域的衝突。資訊戰可以作為更大規模、更全面的敵對活動的組成部分(如網路戰),或作為唯一的敵對形式進行。 2021年,美國胡佛研究所專家菲爾德(Field)也做出了類似的定義:資訊戰旨在向目標受眾傳達訊息,這些訊息被挑選出來,以影響情感、動機、推理、態度、理解、信仰或行為,從而促進行動者的利益。這說明在美國菁英中對於資訊戰的形式和目的有大致一致的認識,即透過多種方式影響目標對象的認知系統。此前,美國雖然主要採用網路防禦和攻擊,有針對性地打擊對手的網路設施,但隨著國際環境和美國綜合實力的變化,美國逐步將資訊戰的作戰領域和目標轉移到對象國的認知系統,以營造更有利於美國的國際環境。

資訊戰是美國國家戰略的重要組成部分,隨戰略調整而變化

資訊戰是美國國家戰略的重要組成部分,也是實現其國家戰略目標的重要手段。當今時代是資訊化時代,資訊與資訊科技不僅決定社會變革的方向,同時也是影響國家間競爭的關鍵因素。國家依據外部環境和自身實力的變化調整國家戰略,而資訊戰的內容、特徵、方式和領域也會隨之改變。

歐巴馬政府在2016年推出了名為《網路安全國家行動計畫》的網路安全策略,其主要內容包括:創新和保護網絡,預防網路犯罪,加強網路安全教育,增強國際合作與加強政府網路安全管理。在這段時期,美國政府在資訊戰上主要是防範對手的網路攻擊,保護自身的網路設施和安全。在2018年9月,川普政府也頒布了《國家網路安全戰略》,同樣強調對網路設施的防護,並確保網路安全。但在這份戰略中,川普提出了「向前防禦」的概念,當認為有可能遭遇到襲擊時,美國將率先攻擊對方,這意味著美國資訊戰由防禦轉向了主動進攻。 2023年3月,拜登政府公佈了最新的《國家網路安全戰略》,進一步強調了進攻的態勢,並大大擴展了資訊戰的範圍。在該戰略中,提出了5項支柱,除了保護關鍵基礎設施和建立國際夥伴關係外,還強調要打擊和摧毀威脅行為體,並且擴展資訊戰的範圍,擴大公私合作,透過公私部門間的合作來打擊敵手,並塑造市場力量以推動安全和彈性。這說明在資訊戰上美國將進一步透過各種方式滲透入私人領域,透過市場和投資宣揚美國的意識形態和規則,以限制競爭對手的發展環境。

拜登政府上台後,美國國家戰略中也加入了更多的針對性和攻擊性。在2021年的《國家安全戰略指導》中提出:圍繞與中國和俄羅斯的長期競爭,建構全球性戰略;強化美國在太平洋地區的存在和合作,同時加強與亞洲盟友和夥伴的合作,以應對所謂「中國的威脅」。 2022年的《國家安全戰略》更是明確提出實施“一體化遏制戰略”,要求綜合運用全面的國家安全工具,包括軍事、外交、情報、經濟、貿易和金融等手段,以防止對美國和其盟友的任何潛在挑戰。依照這個策略,資訊戰就不再只是發揮防禦對手網路攻擊和保護國內基礎設施的功能,資訊戰在「一體化遏制戰略」中佔據著重要的地位,不僅承擔著軍事打擊的功能,在外交、情報、經濟和貿易等方面也將成為遏制對手的重要工具。

美國以認知系統為目標全面廣泛推進資訊戰

有些學者認為海灣戰爭是資訊戰的開端,但早在冷戰期間,美國就對蘇聯進行大規模的資訊戰。美國利用掌控的媒體對蘇聯民眾進行了廣泛深入的假新聞宣傳,灌輸美國的意識形態,在一定程度上影響了蘇聯民眾的認知。冷戰結束後,美國的決策者被認為對於戰爭的非物質元素的強調逐漸減少,因為已經戰勝了其意識形態對手,在其後幾十年中,關於信息作戰,美國更傾向於在更狹窄的軍事背景下框定這些活動。而拜登政府所提出的「一體化遏制戰略」則表明僅依賴一種以防禦為主的策略,可能已不足以限制競爭對手,美國意圖在包括外交、經濟和資訊在內的所有國家實力領域去遏制對手。這種全面遏制方式著重於在軍事手段之外的競爭中調動國家力量的所有要素,不僅要求能夠協調美國各個重要機構,包括國防部、國務院、中情局、聯邦調查局和美國國際開發署等,並且除了常規軍事能力——專注於摧毀目標國並佔領其領土,還要發展非常規軍事能力——在各國民眾中爭奪影響力和合法性,透過影響和改變目標國家民眾的認知系統,增強美國的影響力,進而破壞對手的資訊環境與決策能力。

資訊市場假定人們會理性處理訊息,但心理學研究表明,人們往往不會這樣做。相反,人們所處的資訊環境會影響其認知、決策和行為,而資訊環境就是資訊戰的作戰環境。近年來,美國國防部對資訊環境採取了越來越全面的理解,在關於資訊環境的定義更新中指出,它「包含和聚合了許多社會、文化、認知、技術和物理屬性,這些屬性對個人、群體、系統、社區或組織的知識、理解、信仰、世界觀和最終行動產生影響」。資訊戰則是作用於對手的資訊環境,透過分析對手的決策方法、心理優勢和弱點,改變資訊環境,進而影響認知系統這一“關鍵因素”,改變其國家行為以實現制勝目的。

在網路化時代,資訊的傳遞、聚合與處理絕大部分經由網絡,網絡構成了最主要的資訊環境,資訊戰的作戰場域也集中在網絡。美國不僅運用其全球性的媒體和文化傳播力量,透過電視、電影、音樂、遊戲等方式向全球傳播美國文化和價值觀,加強其國際影響力和軟實力。並且,美國政府和軍方也大量使用如社群媒體、搜尋引擎、人工智慧和網路以及其他資訊手段,並透過專業化和系統化的資訊操作機構以及不同機構和部門的跨界合作,進行各種形式的資訊戰,例如在社群媒體上發布政治宣傳、發動網路攻擊、進行網路監聽和監控、組織網路破壞活動等。需要注意的是,社群媒體越來越成為美國發起資訊戰的重要媒介。這是由於社群媒體平台以其訊息傳播的速度和廣度,能夠對龐大人群產生巨大影響,同時又因為人們在認知上的非理性,使得社群媒體的大規模簡單重複成為人們相信謬誤的可靠方法。美國正大量地在社群媒體平台中投放虛假帳號,廣泛傳播假訊息、操縱訊息、煽動情緒、製造輿論導向,誤導對手的決策行為,並制定和傳播戰略大敘事,促使國家行為朝著有利於美國的方向轉變。

擴大資訊戰同盟並進一步限制競爭對手的環境

除了調整資訊戰的目標,以多種方式全面推進,整合國內各部門而統一行動外,美國政府還積極擴展資訊戰的同盟,透過吸收更多國家以形成廣泛的資訊戰聯盟,增強資訊戰的效果,並進一步限制對手國家的活動環境。

在歐洲,美國不斷強化與其北約盟友在資訊戰上的合作。 2010年11月,北約更新了“里斯本戰略概念”,強調需要更徹底地應對快速發展的21世紀的安全挑戰,包括網路攻擊。該政策的重點不僅是保護北約自身的網絡,還包括建立商定的基準來保護盟國的國家網絡。 2014年的威爾斯高峰會提出了加強網路防禦的政策,將網路領域作為其關鍵的政治和戰略重點之一,強調成員國的合作與統一行動,把網路與聯盟的集體防禦聯繫起來。 2016年華沙峰會上,北約承認網路空間是軍事行動的新領域。 2018年2月,北約成員國在北約軍事指揮機構內設立了一個網路行動中心,該中心旨在加強北約成員國在網路空間的防禦和應變能力,並提升網路安全的整體水準。這些舉措顯示在美國主導下,北約在資訊戰上逐步建立起一個強大的網路合作平台。在這一平台的基礎上,美國將更為全面且跨領域地實施資訊戰。在烏克蘭危機中,美國及其盟友就利用這個平台,為烏克蘭提供網路防禦,並實施大量的網路攻擊,也利用網路散播各種虛假訊息,歪曲和塑造對俄羅斯不利的國家形象。

在亞洲,在原有的軍事同盟基礎上,美國為維持其在印度—太平洋地區的利益,不斷深化其安全聯盟,大力推動「美、日、印、澳」組成的四國機制,深化與印度的​​關係,努力促進美、日、韓三邊合作,進一步推廣有利於美國的網路規則和擴展美國主導的同盟。這使得美國可以更為便利地在同盟國家的網絡中安插信息操作人員,在多個網絡中散佈有利於美國的信息,塑造美國主導的信息環境,以形成在信息環境上對競爭國家的排斥和限制。同時,這個跨國網絡仍在不斷擴展,美國的網路標準和規範不斷在其他國家得以實施,這為美國政府和軍方滲入這些網路並實施資訊戰提供了極大助益。美國也積極與東協國家及其個別成員國,包括印尼、新加坡和越南等國接觸,在網路擴展上取得了一定的成效。儘管這些國家在治理體系和技術能力上存在差異,並且存在競爭性國內優先事項,但東協成為發展中國家中第一個採用一致的電子商務法律框架的地區,他們採用了美國國家標準技術研究所

(NIST)的網路安全框架作為全球通用語言,以與不同產業部門和其他國家溝通。

2022年2月,拜登政府推出了新的《印太戰略》,這是拜登政府發布的首份,也是美國政府發布的第二份印太戰略。該戰略提出了促進印太地區的自由開放、區域安全和繁榮等五大政策目標,也提出了「一體化遏制」策略。對於中國,《印太戰略》指出「我們的目標不是改變中國,而是塑造其運作的戰略環境」。尤其是在這樣一個媒體時代,訊息的傳遞和發布更加方便,我們更需要重視資訊戰的重要性。在這方面,我們也可能需要更精確地抓住群眾的心理訴求和情感需求。以國家病毒緊急處理中心和360公司發布的最新報告為例,針對CIA對我國發起的高度體系化、智慧化、隱蔽化的網路攻擊,境內政府機構、科研院校、工業企業和商業機構如何快速「看見」並第一時間進行處置尤為重要。報告建議,為有效應對迫在眉睫的網路和現實威脅,我們在採用自主可控國產化設備的同時,應盡快組織開展APT攻擊的自檢自查工作,並逐步建立起長效的防禦體系,實現全面系統化防治,抵禦高階威脅攻擊。

隨著美國資訊戰的不斷推進,塑造環境的意義得以彰顯,即不僅是在政治、經濟和軍事上對中國進行遏制,同時在網路和資訊上也要「塑造」中國的活動環境。對中國而言,面對在新冠疫情和烏克蘭危機衝擊下更為複雜嚴峻的國際局勢以及美國不斷推進的信息戰策略,應該做好以下應對:首先,加強網絡和信息安全建設提高自身信息安全水平,防備對網路設施和關鍵基礎設施的攻擊。警惕網路和媒體中的假訊息傳播,追溯傳播源頭,防範大規模假帳號所進行的資訊散播和有意識地對民眾認知系統的引導。其次,持續推動高水準的改革開放,積極發展對外貿易,進一步加強與世界各國的經濟聯繫。這是防範美國「一體化遏制」和資訊戰最有效的策略。在對外交往中講好中國故事,讓世界更了解中國,透過廣泛交流和加強經濟互賴,促進和其他國家的互信與合作。再次,堅持經濟發展。發展經濟是中華民族復興的必要條件,同時也是國家的核心任務。透過經濟發展也可以讓世界更清楚、形象化地理解中國方案和中國道路,進而更有效地防禦資訊戰中的假訊息和訊息扭曲。最後,在中美關係上,中國在守住底線、防止衝突的同時,也可以建立和恢復某些重要領域或重要團體的交往與合作,增加和積累信任,並進​​一步擴展合作,分化和緩解美國的一體化遏制戰略。

(作者為山東大學當代社會主義研究所教授、山東大學國家治理研究院研究員、山東大學南亞研究所研究員)

【參考文獻】

①劉勃然、魏秀明:《美國網路資訊安全戰略:發展歷程、演進特徵與實質》,《遼寧大學學報(哲學社會會科學版)》,2019年第3期。

②黃迎馨:《資訊戰及其發展》,《情報指揮控制系統與模擬技術》,2000年第6期。

③盧新德:《論美國資訊安全戰略的擴張性》,《當代亞太》,2005年第7期。

④劉曉元、龐波:《美軍資訊戰人才培養透視及其啟示》,《高等教育研究期刊》,2005年第3期。

⑤[日]小繩國雄,江新鳳編譯:《IT革命與美日海軍發展》,《國際展望》,2001年第15期。

⑥吳非、李旋:《地緣政治博弈下俄美訊息戰中的媒體角色》,《對外傳播》,2022年第6期。

⑦楊光斌等:《動盪變革期的時代特徵》,《世界經濟與政治》,2023年第2期。

原始中國政府資源:http://paper.people.com.cn/rmlt/html/2023-10/09/content_26023698.htm

People’s Republic of China’s Ten Major Military Principles and Dialectical Opposition Intent for Adversaries

中華人民共和國十大軍事原則與辯證對敵意圖

現代英語音譯:

July 28, 2022 08:14 Source: People’s Liberation Army Daily

People’s Liberation Army Daily – China Military Network

Editor’s note

The Ten Military Principles are our Party’s scientific summary of the practical experience of the People’s Army in combat during the revolutionary war years. They are a concentrated reflection of Comrade Mao Zedong’s profound military thought and the commanding art of using troops like a god. They embody the basic principles and tactics of the People’s War strategy and tactics. The methodological principle of seeking truth from facts is full of materialism and dialectics, and has vitality that spans time and space. It is the historical responsibility of our generation of soldiers to continue to inherit the winning magic weapon of the people’s army. Of course, all military principles are moving forward. Today, when intelligent warfare has gradually become a new form of warfare, this article focuses on the ten major military principles, summarizes and sorts out the dialectical implications and enlightenment of the times in nine aspects, and provides readers with reference.

Strategic contempt and tactical attention

Operational judgment is the prerequisite for planning operations. Comrade Mao Zedong pointed out that we must despise the enemy strategically and attach great importance to the enemy tactically. Strategic contempt and tactical attention are a complete idea. The first is to strategically despise the enemy, dare to fight against them, and dare to win. At the same time, we must pay attention to the enemy tactically, adopt a cautious attitude, and pay attention to the art of struggle. If you cannot see the weak side of the enemy and cannot despise the enemy strategically, then paying attention to the enemy tactically may become a fear of the enemy; if you ignore the strong side of the enemy and ignore the enemy tactically, despising the enemy strategically will become underestimating the enemy. Recognizing the dual nature of struggle and preventing one tendency from overshadowing the other is the key to defeating the enemy. The victory in the War to Resist U.S. Aggression and Aid Korea was a victory in which our army despised the enemy strategically and paid attention to the enemy tactically. It was a victory in which our army had the courage to fight and was good at fighting.

In today’s era, a century of changes and a century’s epidemic are superimposed on each other, and the strategic game between countries has become more intense. We must always remain clear-headed and determined, defy all dangers and difficulties, organically combine strategic contempt for the enemy with tactical attention to the enemy, and deal with the enemy. Be fully prepared for all possible situations, be neither afraid of nor underestimate the enemy, dare to fight and be good at winning.

Careful preparation and cautious initial battle

Combat preparation is the basis for winning the battle. Comrade Mao Zedong emphasized that we should never fight an unprepared battle or a battle that we are not sure of; he called for caution in the first battle, believing that the victory or defeat in the first battle would have a great impact on the overall situation of the war, and it would be especially important for the army at a disadvantage or in a defensive position. Long-term war practice tells us that the more complex and difficult the situation, the more detailed the preparation for combat is to analyze the strength and situation of friends and foes, and to put ourselves in their shoes and analyze what the opponent will think and do. In particular, we should strive to be prepared for every battle, anticipate the most difficult and dangerous possible situations, and strive to be sure of victory under the contrasting conditions between the enemy and ourselves. The Battle of Yijiangshan Island was our army’s first three-service joint operation. The planning of the battle lasted for several years, and the preparation for the battle lasted for more than 2 months. It is an example of careful preparation and cautious initial battle.

In today’s era, China, which is at a critical stage of development from big to strong, faces complex and diverse challenges. This requires us to strengthen the concept of combat readiness, improve the ability to win, be prepared for war at any time, and truly carry out construction, development, and preparation for war in accordance with the standards of war. We must anticipate the most difficult and complex situations and treat such situations as The starting point for all combat preparations is to make sufficient and detailed preparations and formulate a comprehensive plan for integrated implementation, so as to achieve the goal of winning if we do not fight and win if we fight.

Destroy enemies and capture places

The purpose of combat is the core of implementing operations. Comrade Mao Zedong demanded that the main goal be to annihilate the enemy’s effective forces and not to defend or capture cities and places. He vividly pointed out that for a person, it is better to cut off one of his ten fingers than to hurt him; for the enemy, it is better to annihilate one of his divisions than to defeat his ten divisions. When the enemy is large and we are small, the enemy is strong and we are weak, it is generally impossible to achieve the two goals of annihilating the enemy and seizing the place at the same time. Only after annihilating the enemy’s effective strength can the place be finally defended or captured. Therefore, annihilating the enemy is a means to seize territory, and seizing territory is the result of annihilating the enemy. Therefore, annihilating the enemy should be the first priority, and consolidating the territory second. During the Yan’an Defense War, the Party Central Committee resolutely withdrew from Yan’an, and while annihilating the effective strength of the Kuomintang army on a large scale, it realized the strategic concept of “save people and lose land, and save both people and land”.

In today’s era, system breaking and precise victory are becoming key words in modern combat theory. We must change the traditional operational thinking of annihilating the enemy and seizing territory, and regard the pursuit of deterrence effects and depriving the enemy of combat power as important operational options. We must step up efforts to forge capabilities and means to seize comprehensive control and take the initiative on the battlefield, so as to destroy the enemy’s key support elements and deprive them of their combat power. The objective material basis for its continued operations and the operational purpose of disintegrating its will to carry out war.

Pay attention to the overall situation and grasp the key points

Combat guidance is the criterion for controlling combat. Comrade Mao Zedong pointed out that the overall situation and the local part of a war are the unity of opposites. The key to combat guidance is to unify focusing on the overall situation and grasping the key points, “seizing the strategic key point to deploy the campaign, and seizing the operational key point to deploy the battle.” Only in this way can the war situation be effectively promoted in a direction that is beneficial to oneself. In particular, a weak army must follow the objective laws of the development of things, start from the local area, and continue to accumulate the quantity of local victories to cause a qualitative leap and achieve overall changes. In the long-term revolutionary war, our army was good at firmly grasping strategic pivots to promote the development of the war situation, and firmly grasping the main contradictions to promote the transformation of contradictions. Only then did our army turn from passive to active, and from disadvantage to advantage. In the Liaoshen Campaign, our army made comprehensive considerations and decided to “attack Jinzhou first”, which effectively promoted the battle process and won the victory.

In today’s era, wars are becoming more and more hybrid, security threats are complex, diverse and multi-dimensional, and they are characterized by multi-domain linkage. Changes in war practice require us to consider the overall situation and the overall situation in operational guidance, focus on the actual situation on the battlefield, coordinate the struggle in the main strategic direction and other strategic directions, coordinate the military struggle in the traditional security field and the new security field, and coordinate the political, The economic, diplomatic, military, cultural, public opinion and other fronts realize the mutual superposition and accumulation of combat effects, forming an overall emergence of anti-hybrid warfare capabilities and ensuring the strategic goal of complete victory.

Fight weak enemies first and strong enemies later

The focus of operations is the key to implementing operations. Comrade Mao Zedong emphasized that we must first attack dispersed and isolated enemies, and then attack concentrated and powerful enemies. In the practice of long-term revolutionary wars, our army is often at a disadvantage in terms of quantity, scale and equipment. We must first annihilate the enemies that are isolated, dispersed, weakly defended, and garrisoned in small and medium-sized cities. Then, the enemies that are concentrated, strong, well-garrisoned, and garrisoned in large cities will become weaker. , which creates conditions for the next attack and annihilation. If we attack the strong enemy first, not only will it be difficult to deal with the strong enemy quickly, but the weak enemy will also easily become a strong enemy, which will make us passive. Of course, sometimes when you are really sure, you can also wait for an opportunity to attack a strong enemy first to quickly weaken the enemy’s strategic advantage. In the Battle of Menglianggu, Su Yu made the first attack and completely annihilated the reorganized 74th Division, the “first of the five main forces” of the Kuomintang army. This defeated the Kuomintang army’s key attack on the Shandong Liberated Areas and reversed the strategic situation on the East China battlefield.

In today’s era, war is a confrontation between systems. The fundamental goal of defeating the system is to attack the enemy’s center of gravity and key points. Combat operations must be carried out closely around the enemy’s center of gravity, and the selected targets must be the “keys”, “vital points” and “joints” in the enemy’s entire war system. These enemy targets may be “strong enemies” or “weak enemies” in the traditional sense. However, once they are identified as centers of gravity, all efforts should be concentrated on destroying these centers of gravity in order to paralyze the enemy’s entire combat system and quickly complete the operation. Purpose.

Concentrate and disperse forces

Combat posture is the posture in which troops are deployed. Comrade Mao Zedong demanded that operations must focus on eliminating the enemy’s effective strength and concentrate superior forces to annihilate the enemy one by one. The essence of concentrating superior forces is to use forces intensively to obtain local advantages and initiative against the enemy based on the overall needs of the operation and to ensure a decisive victory in the decisive battle. In traditional wars, the concentration of troops is mainly reflected in the concentration of personnel and weapons, relying on quantitative advantages to make up for qualitative deficiencies. In battles, our army’s consistent thinking is to concentrate its absolutely superior forces, adopt roundabout encirclement tactics, and annihilate enemies one by one. The opposite of concentrated force is decentralization or military egalitarianism. Military egalitarianism may result in having neither an overall strength advantage nor a local strength advantage, making it impossible to control the enemy and to be controlled by the enemy. During the Red Army’s fifth counter-campaign against “encirclement and suppression”, the “six-way division of troops” and “all-front resistance” were manifestations of military egalitarianism.

In today’s era, information power, mobility, strike power, etc. have all increased unprecedentedly. Concentrating superior forces requires concentrating and using one’s own advantages in more diverse fields, and more adopting the approach of “dispersed appearance but concentrated spirit, scattered form but combined strength”. Dynamically combine the various combat forces distributed on the multi-dimensional battlefield, rely on the quality accumulation, efficiency integration, and real-time optimization of multiple combat elements to suddenly change the contrast with the opponent’s combat power, forming a hammer effect to defeat the enemy.

Weapons and equipment and fighting spirit

Combat elements are the components of combat strength. Comrade Mao Zedong pointed out that weapons and equipment are important factors in the victory or defeat of a war, but they are not the decisive factor. The decisive factor is people, not things. He asked the troops to carry forward the style of fighting bravely, not afraid of sacrifice, not afraid of fatigue and continuous fighting. Obviously, war is not only a confrontation of hard power such as weapons and equipment between the opposing parties, but also a competition of soft power such as will and quality. As an important component of combat effectiveness, fighting spirit plays a key role in the outcome of war. Material causes and effects are but the hilt of the knife; spiritual causes and effects are the sharp edge. Why in history has our army been able to defeat powerful enemies one after another and create miracles one after another even if it does not have an advantage in weapons and equipment? One of the most fundamental reasons is that we have the courage to “show swords when facing the enemy, be brave and tenacious” and have the fighting spirit of “not being afraid of hardship and not being afraid of death.”

In today’s era, war forms and combat styles are evolving at an accelerated pace, science and technology have become the core combat effectiveness, and weapons and equipment are becoming more and more important to winning wars. The contribution rate of scientific and technological innovation to military construction and combat effectiveness development must be continuously increased. At the same time, we must forge the spiritual edge to defeat the enemy while inheriting the glorious tradition and fine style, and combine advanced science and technology with tenacious will, so that the majority of commanders and soldiers have a high degree of revolutionary consciousness and spirit of self-sacrifice, and master advanced Weapons, equipment and complex military technology form a powerful combat force to achieve victory in every attack and victory.

You hit yours and I hit mine

Combat methods are the carrier of strategy and tactics. Comrade Mao Zedong emphasized that people should give full play to their conscious initiative and seize the initiative in war. Starting from the overall situation of the revolutionary war, he successively proposed a series of flexible strategies and tactics, such as “Fight if you can win, leave if you can’t”, “You fight yours, I’ll fight mine”, “Mobile warfare, positional warfare, guerrilla warfare”. Cooperate with each other” and so on. This set of strategies and tactics that seek advantages and avoid disadvantages and are flexible and mobile reveals the laws and methods of war guidance for defeating enemies with superior equipment with inferior equipment, and raises flexible strategies and tactics to a new level. During the War to Resist U.S. Aggression and Aid Korea, in response to the U.S. military’s strong land and sea support and strong land firepower and mobility, our military emphasized small-scale annihilation wars, which enriched the implementation of annihilation wars. It relied on tunnels to carry out small-scale counterattacks and found a new way to fight positional warfare. .

In today’s era, wars will be carried out in multiple domains simultaneously, and combat operations such as networked and electronic operations, air and space attacks, and unmanned operations are prominent. Proactive, flexible and changeable strategies and tactics are still a weapon to gain the initiative and defeat the enemy. It is necessary to follow the winning mechanism of modern warfare, step up the forging of new quality and new domain combat capability means, flexibly use “total war”, “cognitive warfare”, “cross-domain warfare” and “intelligent warfare” and other tactics to temper dimensionality reduction strikes and asymmetric strikes. Wait for the way of fighting, do not follow the enemy’s routines, focus on the enemy’s weaknesses, use our army’s strengths and strengths to control the battle, and win the victory.

Continuous combat and rest supplement

Combat support is the cornerstone of sustaining operations. Comrade Mao Zedong always believed that the deepest roots of the power of war exist among the people, and that soldiers and people are the foundation of victory. During the long-term revolutionary war, our army’s manpower and material resources supplementation mainly emphasized obtaining them from the enemy and relying on the support of the base areas. At the same time, we used the gaps between campaigns to reorganize and train the troops, improve military and political quality, and enhance the combat effectiveness of the troops. These are all necessary conditions for carrying out another battle. However, in order to prevent the enemy from taking a breather and to inflict continuous blows to the enemy, sometimes even without supplementary rest and recuperation, it is necessary to develop a style of not being afraid of sacrifice or fatigue and achieve continuous operations. Just after the Liaoshen Campaign, the Northeast Field Army changed its plan to use three months to half a year to rest and reorganize its troops. It took a shortcut and quickly sent troops into the pass to participate in the Pingjin Campaign, which changed the battlefield situation in North China in one fell swoop.

In today’s era, in a sense, fighting a war is fighting for security. With the profound changes in the international military competition landscape, national interests and military missions continue to expand, and the time and space span of combat support has expanded dramatically. In particular, the intensity, difficulty, and With the unprecedented increase in speed, we must continue to deepen national defense mobilization, build an integrated national strategic system and capabilities, and form strong war capabilities and war potential that can achieve both quick and lasting strategic victory.

現代繁體中文:

2022年07月28日08:14    來源:解放軍報

原標題:十大軍事原則的辯証意蘊及時代啟示 – 解放軍報 – 中國軍網

編者按

十大軍事原則是革命戰爭年代我們黨對人民軍隊作戰實踐經驗的科學總結,是毛澤東同志博大精深的軍事思想、用兵如神的指揮藝術的集中反映,它所體現的人民戰爭戰略戰術的基本原理和實事求是的方法論原則,充滿了唯物論、洋溢著辯証法,具有跨越時空的生命力。賡續傳承好人民軍隊的制勝法寶,是我們這代軍人的歷史責任。當然,一切軍事原則都是向前發展的,在智能化戰爭逐漸成為新戰爭形態的今天,本文聚焦十大軍事原則,總結梳理了9個方面辯証意蘊及時代啟示,供讀者參考借鑒。

戰略藐視與戰術重視

作戰判斷是籌劃作戰的前提。毛澤東同志指出,要在戰略上藐視敵人和在戰術上重視敵人。戰略藐視與戰術重視是一個完整的思想。首先是要戰略上藐視敵人,敢於同它們斗爭,敢於奪取勝利。同時,在戰術上重視敵人,要採取謹慎態度,講究斗爭藝術。如果看不到敵人脆弱的一面,不能在戰略上藐視敵人,那麼在戰術上重視就可能成了畏敵如虎﹔如果忽視敵人強大的一面,離開戰術上重視敵人,戰略上藐視便成了輕敵。認清斗爭的兩重性,防止一種傾向掩蓋另一種傾向,是克敵制勝的關鍵。抗美援朝戰爭勝利就是我軍戰略上藐視敵人和在戰術上重視敵人的勝利,就是敢於斗爭和善於斗爭的勝利。

當今時代,百年變局與世紀疫情相互疊加,國家間戰略博弈更加激烈,我們要時刻保持清醒和堅定,不畏一切險阻,不怕一切困難,把戰略上藐視敵人同戰術上重視敵人有機結合起來,對各種可能發生的情況做好充分的准備,既不畏敵、亦不輕敵,敢於斗爭、善於勝利。

周密備戰與慎重初戰

作戰准備是贏得作戰的基礎。毛澤東同志強調,不打無准備之仗,不打無把握之仗﹔要求慎重初戰,認為初戰的勝敗對戰爭的全局影響極大,尤其對劣勢或處於防御地位的軍隊更加重要。長期的戰爭實踐告訴我們,越是復雜困難的形勢下,作戰准備越是要細致地分析敵我友的力量、敵我友的情況,並換位思考分析對手會怎麼想、怎麼做。特別是每戰都應力求有准備,必須預計到最困難最危險的各種可能情況,力求在敵我條件對比下有勝利的把握。一江山島戰役,是我軍首次三軍聯合作戰,戰役籌劃長達幾年,戰役准備長達2個多月,是周密備戰與慎重初戰的范例。

當今時代,處在由大向強發展關鍵階段的中國,面臨的挑戰復雜多樣。這要求我們必須強化戰備觀念,提高打贏本領,做好隨時打仗的准備,真正按照打仗的標准搞建設、謀發展、抓備戰﹔必須預計到最困難最復雜的情況,並把這種情況當作一切作戰准備的出發點,做充分細致准備,制訂一體實施的周密計劃,實現不打則已、打則必勝。

殲滅敵人與奪取地方

作戰目的是實施作戰的中心。毛澤東同志要求,以殲滅敵人有生力量為主要目標,不以保守或奪取城市和地方為主要目標。他形象指出,對於人,傷其十指不如斷其一指﹔對於敵,擊潰其十個師不如殲滅其一個師。在敵大我小、敵強我弱條件下,殲滅敵人和奪取地方這兩個目標,一般不可能同時達到。隻有在殲滅敵人有生力量之后,才能最后保守或奪取地方。因此,殲滅敵人是奪取地方的手段,奪取地方是殲滅敵人的結果,所以要殲敵為主、略地次之。延安保衛戰,黨中央毅然撤出延安,在大規模殲滅國民黨軍有生力量的同時實現了“存人失地,人地皆存”的戰略構想。

當今時代,體系破擊、精打制勝等正成為現代作戰理論的關鍵詞。我們必須轉變傳統殲敵奪地的作戰思維,把追求震懾效應、剝奪敵方戰力作為作戰重要選項,加緊鍛造奪控綜合制權、佔據戰場主動的能力手段,達成摧毀敵方作戰關鍵支持要素、剝奪其持續作戰的客觀物質基礎、瓦解其遂行戰爭意志的作戰目的。

關照全局與抓住重點

作戰指導是駕馭作戰的准繩。毛澤東同志指出,戰爭的全局與局部是對立的統一物。作戰指導的關鍵就是把著眼全局與抓住樞紐統一起來,“抓住戰略樞紐去部署戰役,抓住戰役樞紐去部署戰斗”,如此方能切實推動戰局向著有利於己的方向發展。特別是弱小之軍必須遵循事物發展的客觀規律,從局部入手,不斷通過局部勝利的量的積累,以引起質的飛躍,達到全局的變化。在長期的革命戰爭中,我軍善於緊緊抓住戰略樞紐推動戰局發展,緊緊抓住主要矛盾推動矛盾轉化,才使我軍由被動轉為主動、劣勢轉為優勢。遼沈戰役,我軍通盤考量決定“首打錦州”,有力地推動了戰役進程並贏得了勝利。

當今時代,戰爭越來越呈現出混合化態勢,安全威脅復雜多樣多維,並呈現多域聯動的特點。戰爭實踐變化要求我們,作戰指導要通盤考慮、全局考量,從戰場實際出發抓樞紐,統籌好主要戰略方向和其他戰略方向斗爭,統籌好傳統安全領域與新型安全領域的軍事斗爭,統籌好政治、經濟、外交、軍事、文化、輿論等各條戰線,實現作戰效果相互疊加、累積,形成反混合戰爭能力的整體涌現,確保實現全勝的戰略目標。

先打弱敵與后打強敵

作戰重心是實施作戰的要害。毛澤東同志強調,要先打分散和孤立之敵,后打集中和強大之敵。在長期革命戰爭實踐中,我軍在數量、規模和裝備上常常處於劣勢,首先殲滅孤立分散、守備薄弱和據守中小城市之敵,則集中強大、守備堅固和據守大城市之敵即變弱了,這就為下一步攻殲創造了條件。若先打強敵,則不僅強敵難以迅速解決,弱敵也易變成強敵,反而使我方陷入被動。當然,有時在確有把握的情況下,也可伺機先打強敵,以迅速削弱敵方戰略優勢。孟良崮戰役,粟裕首打且全殲國民黨軍“五大主力之首”的整編第74師,挫敗了國民黨軍對山東解放區的重點進攻,扭轉了華東戰場戰略態勢。

當今時代,戰爭是體系與體系的對抗,體系破擊的根本是要打敵重心、要害。作戰行動必須緊緊圍繞打敵重心展開,所選目標必須是敵整個戰爭系統中的“關鍵”“要害”與“關節”。這些敵之目標在傳統意義上可能是“強敵”,也可能是“弱敵”,然而一旦被確定為打擊重心,就應集中全力摧毀這些重心,以毀癱敵整個作戰體系,快速達成作戰目的。

集中兵力與分散兵力

作戰布勢是兵力部署的態勢。毛澤東同志要求,作戰必須著眼於消滅敵人有生力量,集中優勢兵力各個殲滅敵人。集中優勢兵力的實質是根據作戰全局的需要,集中使用兵力以獲得對敵之局部優勢和主動,確保決戰決勝。傳統戰爭中,集中兵力主要體現為人員、武器的規模集中,依靠數量上的優勢來彌補質量上的不足。在戰役戰斗上,集中絕對優勢兵力,採取迂回包圍戰術,各個殲滅敵人,是我軍作戰的一貫思想。與集中兵力對立的是分散兵力亦或軍事平均主義。軍事平均主義可能導致既沒有全局力量優勢,更沒有局部力量優勢,不能制敵反被敵所制。紅軍第五次反“圍剿”時“六路分兵”“全線抵御”就是軍事平均主義的表現。

當今時代,信息力、機動力、打擊力等都空前增強,集中優勢兵力要求在更加多元領域中集中和運用己方優勢,更多採取“貌散而神聚,形散而力合”的方式,將分布在多維戰場的諸作戰力量動態集中聯合起來,依靠多種戰斗要素的質量累聚、效能融合、即時聚優,突然改變與對方戰斗力量的對比,形成重錘效應,克敵制勝。

武器裝備與戰斗精神

作戰要素是作戰實力的構成。毛澤東同志指出,武器裝備是戰爭勝負的重要因素,但不是決定性因素,決定性因素是人而不是物。他要求部隊要發揚勇敢戰斗、不怕犧牲、不怕疲勞和連續作戰的作風。顯然,打仗既是敵對雙方武器裝備等硬實力的對抗,也是意志品質等軟實力的比拼。戰斗精神作為戰斗力的重要組成部分,對戰爭勝負起著關鍵性作用。物質的原因和結果不過是刀柄,精神的原因和結果才是鋒利的刀刃。為什麼我軍歷史上即使在武器裝備上不佔優勢,卻總能戰勝一個又一個強敵,創造一個又一個奇跡?其中一個最根本的原因,就是我們具有“逢敵亮劍、英勇頑強”的血性膽氣,具有“一不怕苦、二不怕死”的戰斗精神。

當今時代,戰爭形態和作戰樣式加速演變,科技成為核心戰斗力,武器裝備對打贏戰爭越來越重要,必須不斷提高科技創新對軍隊建設和戰斗力發展的貢獻率。與此同時,我們要在傳承光榮傳統和優良作風中鍛造克敵制勝的精神利刃,把先進科技與頑強意志很好地結合起來,使廣大指戰員既具備高度的革命覺悟和自我犧牲精神,又掌握先進的武器裝備和復雜的軍事技術,從而形成強大的戰斗力量,實現攻必克、戰必勝。

你打你的與我打我的

作戰方法是戰略戰術的承載。毛澤東同志強調,要發揮人的自覺能動性,掌握戰爭的主動權。從革命戰爭全局出發,他先后提出過一系列靈活機動的戰略戰術,比如“打得贏就打,打不贏就走”“你打你的,我打我的”“運動戰、陣地戰、游擊戰相互配合”等等。這一整套趨利避害、靈活機動的戰略戰術,揭示了以劣勢裝備戰勝優勢裝備之敵的戰爭指導規律、作戰指導方法,把靈活機動的戰略戰術提高到嶄新境界。抗美援朝戰爭中,針對美軍有海空支援以及陸上火力、機動力強的特點,我軍強調打小殲滅戰,豐富了殲滅戰的實現形式﹔依托坑道實施小規模反擊,找到了打陣地戰的新辦法。

當今時代,戰爭將在多域同時展開,網電作戰、空天襲擊、無人作戰等作戰行動地位凸顯,積極主動靈活多變的戰略戰術仍然是贏得主動、克敵制勝的利器。要遵循現代戰爭制勝機理,加緊鍛造新質新域的作戰能力手段,靈活運用“總體戰”“認知戰”“跨域戰”“智能戰”等戰法,錘煉降維打擊、非對稱打擊等打法,不按敵人套路打、盯著敵人軟肋打、發揮我軍優長打,在“以能擊不能”中掌控作戰制權,進而贏得勝利。

持續作戰與休整補充

作戰保障是維持作戰的基石。毛澤東同志始終認為,戰爭偉力之最深厚的根源存在於民眾之中,兵民是勝利之本。長期革命戰爭中,我軍人力物力的補充主要強調取之於敵和依靠根據地的支持,同時利用戰役間隙整頓訓練部隊,提高軍政素質,增強部隊戰斗力,這些都是實行再戰的必要條件。但是,為了不讓敵人喘息,給敵連續打擊,有時即使在未得到補充休整的情況下,亦須發揚不怕犧牲、不怕疲勞的作風,實現連續作戰。遼沈戰役剛結束,東北野戰軍改變利用三個月至半年時間休整部隊的計劃,取捷徑迅即揮師入關參加平津戰役,一舉改變了華北戰場態勢。

當今時代,從某種意義上講,打仗就是打保障。隨著國際軍事競爭格局深刻變化,國家利益和軍隊使命任務不斷拓展,作戰保障時空跨度急劇擴大,特別是戰爭作戰進程快、毀傷能力強、力量控制精、技術含量高,保障的強度、難度和速度空前增加,必須不斷深化國防動員,構建一體化國家戰略體系和能力,形成既能戰略速勝又能戰略持久的強大戰爭能力和戰爭潛力。

中國共產黨原文參考:http://cpc.people.com.cn/BIG5/n1/2022/0728/c443712-32487888.html

Chinese Military and Determining A Winning Mechanism of Intelligent Warfare Strategy

中國軍隊與智慧戰爭戰略制勝機制的確定

現代英語音譯:

Through the smoke of war, we can see that today’s war has developed from barbaric flesh-and-blood battles and battles to capture cities and territories to information-led precise beheadings and fierce competition on the intellectual battlefield. This objective fact tells us that war, as a specific complex social phenomenon, will present different war forms and winning mechanisms in different historical periods. As American futurist Toffler pointed out, “Artificial intelligence is like previous missiles and satellites. Whether you are prepared or not, it will enter the historical stage of human civilization war.” President Xi clearly pointed out: “If we do not understand the winning mechanism of modern war, then we can only look at a diorama and miss the point.” The winning mechanism of war refers to the way in which various war factors play a role in winning a war. and the laws and principles of interconnection and interaction. Compared with information-based warfare in the traditional sense, the winning mechanism of future intelligent warfare has undergone significant changes.

The method of confrontation has changed from “system confrontation” to “algorithmic game”, and algorithmic advantages dominate war advantages.

Algorithms are strategic mechanisms for solving problems. In fact, an “algorithm” is a series of clear instructions for solving a problem. It is a clear step to solve a certain type of problem according to certain rules. In future wars, the party that masters the advantages of algorithms can quickly and accurately predict battlefield situations, innovate optimal combat methods, and achieve the war goal of “victory before fighting”.

Algorithms are the key to leading intelligent warfare. First, algorithmic advantages dominate cognitive advantages. After big data is processed through high-performance and efficient algorithms, massive data is quickly converted into useful intelligence. Therefore, the party with the advantage of the algorithm can dispel the “battlefield fog” caused by the lack of timely processing of data, making the understanding more profound. Second, the algorithm advantage dominates the speed advantage. Compared with classical algorithms, quantum algorithms have achieved exponential acceleration effects. In addition, quantum computers have increased from 1 qubit in 2003 to 1,000 qubits in 2015. The computing efficiency is 100 million times faster than that of classical computers. Artificial intelligence has achieved a qualitative leap. Third, algorithmic advantages dominate decision-making advantages. Algorithms, with their high-speed and precise calculations, replace people’s “meditation” and repeated exploration, thereby accelerating knowledge iteration. Mastering super powerful algorithms can quickly propose flexible and diverse combat plans and countermeasures in response to changes in the enemy’s situation, constantly disrupting the enemy’s established intentions and deployment.

Algorithms are at the heart of the jump in war effectiveness. First, war is more efficient. With the support of algorithms, artificial intelligence can react hundreds to thousands of times faster than humans. In 2016, the “Alpha” intelligent software developed by the United States has a reaction speed 250 times faster than humans. It controlled a third-generation aircraft to defeat a manned fourth-generation aircraft in a simulated air battle. Second, the war endurance is stronger. Artificial intelligence is not limited by physiological functions and can continuously perform repetitive and mechanical tasks. In September 2016, an F-16 fighter jet reached 8 times gravity during training, causing the pilot to lose consciousness. However, before the plane hit the ground, the onboard “automatic anti-collision system” automatically pulled the plane up, avoiding the tragedy. occur. Third, the outcome of the war is better. With the support of massive data and supercomputing capabilities, artificial intelligence judgment and prediction results are more accurate. The combined use of manned and unmanned equipment in the U.S. military’s search and hunt for bin Laden is a successful example.

Combat elements are changing from “information-led” to “machine-based warfare”, and machine-based warfare reshapes the combat process

In the future, intelligent technology will penetrate into all elements and processes of war. The Internet of Things, the Internet of Intelligence, and the Internet of Brains have become the basis of war. The four domains of physical domain, information domain, cognitive domain, and social domain are deeply integrated, making the battlefield holographically transparent. There are people to control the war and no one to fight on the battlefield. Intelligent weapons and equipment will reshape the combat process “from sensor to shooter”.

“Detection” with a keen eye. “Reconnaissance” refers to intelligent intelligence reconnaissance. It can use multi-dimensional sensors such as land, sea, air, space, and electricity for virtualized collaborative networking, self-organized dynamic scheduling, automatic mining of multi-source intelligence, and order-based on-demand use to maximize information shortage or information redundancy. The “fog of war” brought about by the epidemic has opened up the “eyes” to see through intelligent warfare.

Loop “control”. “Control” refers to intelligent command and control. Focusing on the core of decision-making advantages, we use the human-machine collaboration technology of “human in the loop” and adopt three decision-making and control methods of “human in the loop”, “human in the loop” and “human outside the loop” according to the autonomous authority of the machine. , forming a comprehensive advantage with superior decision-making quality and action speed.

Smart “hit”. “Strike” refers to intelligent offensive and defensive operations. Relying on the advantages of system structure and algorithm, it mobilizes all-domain multi-dimensional, manned and unmanned combat platforms in real time, quickly couples combat forces, builds combat systems on demand, focuses on targets, independently implements “distributed” and “swarm” collaborative operations, and quickly resolves battles after they are completed. Couple and wait for the battle, so that the troops can gather and disperse randomly. At the end of 2015, Russia invested 6 tracked unmanned combat vehicles, 4 wheeled unmanned combat vehicles and 1 drone to support the Syrian government forces in storming Islamic extremist strongholds and achieved the world’s first unmanned combat victory. Victory in the tough battle dominated by cars. During the battle, about 70 extremist militants were killed, while only four Syrian government troops were injured.

The decision-making method changes from “human brain decision-making” to “intelligent decision-making”, and intelligent decision-making optimizes combat operations

With the emergence of intelligent auxiliary decision-making technology and “cloud brain”, “digital staff” and “virtual warehousing”, war decision-making has evolved from pure human brain decision-making to human-machine hybrid decision-making, cloud-brain intelligent decision-making and neural network decision-making.

Human-machine hybrid decision-making. Reasonable division of labor and interaction and collaboration between humans and machines are the best solutions to explore and solve problems. The advantages of the human brain are creativity, flexibility, and initiative; the advantages of machines are fast speed, high precision, and resistance to fatigue. Artistic tasks such as high-level decision-making are handled by the human brain, and big data calculations are completed by machines. Human-computer interaction allows machines to “listen” to understand human language, “see” human movements and expressions, “understand” human emotions and intentions, and present the calculation process and results in a way that is easy for humans to understand.

Cloud brain intelligent decision-making. In future intelligent warfare, there will be a “brain” metaphor center, and distributed combat units will be linked through the cloud brain. This cloud brain is not only a physical information, physiological information and psychological information center, but also a military command center. Cloud brain decision-making is based on the intelligent “network, cloud and terminal” system. “Net” is an intelligent combat basic network integrating intelligent battlefield perception, decision-making and weapons control systems. “Cloud” is built on the basis of “network”, with the intelligent resource service layer as the main body. It is not only a “resource pool” that integrates various combat resources, but also an “intelligent cloud” that provides intelligent services for combat operations. Due to the coupling of multiple centers, rapid networking and decision-making can be achieved even when bombarded by information. “End” refers to the combat resource end, discrete intelligence and networked intelligence in combat processes, which can not only make independent decisions, but also provide distributed intelligent resources for the war system, allowing the new war system to emerge with group intelligence.

Neural network decision-making. In July 2018, Russia developed artificial neural network fully automatic software that can destroy immediately upon discovery. The intelligent decision-making tool developed by the US military is intended to shorten the decision-making cycle and improve decision-making efficiency. The application of neural networks was once limited to tactical-level calculations, making it difficult to make qualitative analysis and decisions on strategic-level macro-complex situations. “AlphaGo” has made a breakthrough in the field of Go by simulating the working mechanism of the human brain’s neural network. In the future, the super self-evolution and strategic decision-making capabilities of deep neural networks will realize a combat cycle of “people outside the loop”.

The combat style has changed from “breaking links and breaking bodies” to “extreme operations”, which subvert traditional combat methods.

Extreme warfare breaks through the boundaries of traditional warfare, subverts traditional combat styles, dramatically increases war effectiveness, and creates a truly all-weather, all-time, all-dimensional, all-domain intelligent warfare.

Break through the limits of human physiology and thinking. First, the combat space and fields have been extremely expanded. Intelligent warfare in the future will be three-dimensional, all-dimensional, and all-domain operations. The war space will expand from the traditional space field to the polar regions, deep seas, outer space, and other extremes. It will especially penetrate into the cognitive domain, information domain, and penetrate into other fields, including combat fields. More blurry. Second, the combat process has been extremely accelerated. Unmanned autonomous warfare has greatly compressed the “observation-judgment-decision-action” cycle, developing from the “instant destruction” of information warfare to the “instant destruction” of intelligent warfare. The victory of intelligent warfare is achieved by advancing the warning time, shortening the decision-making time, and extending the combat operations forward to achieve the effect of preemptive layout and preemptive strike. Third, combat operations are extremely flexible. In intelligent warfare, artificial intelligence can propose extremely rich combat plans, and the unmanned combat platform can quickly switch between different functional roles, making combat operations more bold and adventurous, and tactics more unexpected. Even if one of the combat elements loses its function, the “decentralization” function will ensure that the function of the group is not affected.

Subvert the traditional combat style. The first is intrusive lone wolf operations. That is, a single unmanned system operates independently. The second is the manned and unmanned coordinated system attack battle. That is, based on intelligent unmanned systems, through mixed operations with and without unmanned equipment, combat objectives can be quickly achieved. The third is the independent operation of unmanned system formations. Multiple sets of unmanned systems constitute a combat unit that can perform complex tasks such as multi-target attacks. The fourth is mothership swarm operations. Using the mothership as the transportation carrier and command center, a manned and unmanned hybrid swarm combat style is formed.

It has the combat effectiveness of “nuclear power”. Intelligent warfare maximizes the characteristics and potential of intelligent robots, leading to combat effectiveness approaching the limit. First, the target is small and difficult to find. For example, miniaturized stealth robots are difficult to detect with radar and sonar. The U.S. hybrid UAV with an Optode chip embedded in the Dragonfly is smaller, lighter and more stealthy, with a battery life of up to several months. Second, confrontation is difficult and costly. For example, as long as a beetle-sized micro-drone scans a human face, it can directly hit the target’s head after data analysis and determination, and it can carry enough ammunition to penetrate the brain. Third, the cost is low and the damage is great. In the future, the use of intelligent weapons in extreme operations will have the power of nuclear weapons, especially extremely large-scale intelligent weapons and equipment, extremely low-cost robot automatic production, and extremely flexible robot swarm operations, which may exceed the maximum explosion power of nuclear weapons.

國語音譯:

2019年01月15日08:00 | 来源:解放军报

透过战争的硝烟,我们可以看到,今天的战争已经从蒙昧野蛮的血肉之搏、攻城略地的兵戎相见发展到信息主导的精确斩首、智域疆场的激烈角逐。这一客观事实告诉我们,战争作为一种特定的复杂社会现象,在不同的历史时期会呈现出不同的战争形态与制胜机理。正如美国未来学家托夫勒指出,“人工智能就像先前的导弹、卫星一样,无论你是否有所准备都将登上人类文明战争的历史舞台”。 习主席明确指出:“如果不把现代战争的制胜机理搞清楚,那就‘只能是看西洋镜,不得要领’。”战争制胜机理,是指为赢得战争胜利,战争诸因素发挥作用的方式及相互联系、相互作用的规律和原理。未来智能化战争与传统意义上的信息化战争相比,制胜机理发生了显著变化。

对抗方式从“体系对抗”向“算法博弈”转变,算法优势主导战争优势

算法是求解问题的策略机制。实际上,“算法”是一系列解决问题的清晰指令,是按照一定规则解决某一类问题的明确步骤。未来战争掌握算法优势的一方,能快速准确预测战场态势,创新最优作战方法,实现“未战而先胜”的战争目的。

算法是主导智能化战争的关键。第一,算法优势主导认知优势。大数据通过高性能、高效率的算法进行处理后,将海量数据快速转换为有用的情报。因此,占有算法优势的一方,能驱散因数据得不到及时处理而产生的“战场迷雾”,使得认知更为深刻。第二,算法优势主导速度优势。量子算法相比于经典算法,实现了指数级的加速效果,再加上量子计算机从2003年的1位量子比特,到2015年1000位量子比特,计算效率比经典计算机快了一亿倍,使人工智能实现了质的飞跃。第三,算法优势主导决策优势。算法以其高速、精确的计算,代替人的“冥思苦想”和反复探索,从而加速知识迭代。掌握超强算法能够针对敌情变化快速提出灵活多样的作战方案与应对之策,不断打乱敌既定企图和部署。

算法是战争效能跃升的核心。一是战争效率更高。在算法的支撑下,人工智能的反应速度是人类的成百上千倍。2016年,美国研发的“阿尔法”智能软件,反应速度比人类快250倍,在模拟空战中操控三代机击败了有人驾驶的四代机。二是战争耐力更强。人工智能不受生理机能限制,可连续执行重复性、机械性任务。2016年9月,一架F-16战机在训练中达到8倍重力过载,导致飞行员失去知觉,然而,在飞机撞击地面前,机载“自动防撞系统”自动将飞机拉起,避免了悲剧发生。三是战争结局更好。在海量数据和超算能力支持下,人工智能的判断和预测结果更加准确。美军寻找和捕杀本·拉登行动,有人和无人装备的组合运用就是一个成功的战例。

作战要素从“信息主导”向“机器主战”转变,机器主战重塑作战流程

未来智能科技将渗透到战争全要素全过程。物联网、智联网与脑联网成为战争的基础,物理域、信息域、认知域、社会域四域深度融合,使战场全息透明,战争控制有人,战场交锋无人。智能化武器装备将重塑“从传感器到射手”的作战流程。

慧眼“侦”。“侦”,即智能化情报侦察。能将陆、海、空、天、电等多维传感器,进行虚拟化协同组网、自组织动态调度、多源情报自动挖掘、订单式按需使用,最大程度上拨开信息不足或信息冗余带来的“战争迷雾”,开启透视智能化战争的“慧眼”。

回路“控”。“控”,即智能化指挥控制。围绕决策优势这一核心,运用“人在回路”的人机协同技术,按照机器的自主权限,采取“人在回路中”“人在回路上”“人在回路外”三种决策与控制方式,以高敌一筹的决策质量和行动速度形成全面优势。

智能“打”。“打”,即智能化攻防作战。依托体系结构和算法优势,实时调集全域多维、有人无人作战平台,快速耦合作战力量,按需构建作战体系,聚焦目标,自主实施“分布式”“蜂群式”协同作战,交战完毕迅速解耦待战,做到兵无常势、聚散随机。2015年底,俄罗斯投入6台履带式无人战车、4台轮式无人战车和1架无人机,支援叙利亚政府军强攻伊斯兰极端势力据点,取得了世界上第一场以无人战车为主的攻坚战胜利。战斗中约70名极端势力武装分子被击毙,而叙利亚政府军只有4人受伤。

决策方式从“人脑决策”向“智能决策”转变,智能决策优化作战行动

随着智能辅助决策技术和“云端大脑”“数字参谋”“虚拟仓储”的出现,战争决策由单纯的人脑决策发展为人机混合决策、云脑智能决策和神经网络决策。

人机混合决策。人与机器的合理分工与交互协同是探索解决问题的最优方案。人脑的优势在于创造性、灵活性、主动性;机器的优势在于速度快、精度高、抗疲劳。高层决策等艺术性强的工作由人脑来处理,大数据计算由机器完成。人机交互是让机器能“听”懂人类语言、“看”懂人类动作与表情、“理解”人的情绪和意图,把计算过程和结果用人容易理解的方式呈现出来。

云脑智能决策。未来智能化战争,将有一个“大脑”的隐喻中心,分布式的作战单元将通过云大脑链接。这个云大脑既是物理信息、生理信息和心理信息中心,也是军事指控中心。云脑决策以智能“网、云、端”体系为依托。“网”,是集智能化战场感知、决策和武器控制系统于一体的智能型作战基础网络。“云”,依“网”而建,以智能型资源服务层为主体,既是融合各类作战资源的“资源池”,也是为作战行动提供智能化服务的“智能云”。由于多中心的耦合,即使遭受信息轰炸也能快速组网和决策。“端”,是指作战资源端,作战流程上的分立智能和联网智能,既能自主决策,又能为战争体系提供分布式智能资源,使新的战争体系涌现出群体智能。

神经网络决策。2018年7月,俄罗斯研制的人工神经网络全自动软件,能做到发现即摧毁。美军研发的智能化决策工具,意在缩短决策周期,提高决策效率。神经网络的应用曾局限于战术级计算,难以对战略级宏观复杂态势做出定性分析和决策。“阿尔法狗”通过模拟人脑神经网络工作机制在围棋领域取得突破。未来深度神经网络的超强自我进化和战略决策能力,将实现“人在回路外”的作战循环。

作战样式从“断链破体”向“极限作战”转变,极限作战颠覆传统作战手段

极限作战突破了传统战争的界限,颠覆了传统的作战样式,使战争效能剧增,出现了真正意义上的全天候、全时空、全方位、全领域的智能化战争。

突破人类生理和思维极限。一是作战空间和领域极度拓展。未来智能化作战是立体、全维、全领域作战,战争空间将从传统的空间领域,向极地、深海、太空等极限拓展,特别是向认知域、信息域渗透并贯穿其他领域,作战领域更加模糊。二是作战进程极度加快。无人自主作战大幅压缩“观察—判断—决策—行动”周期,从信息化战争的“瞬时摧毁”发展为智能化战争的“即时摧毁”。智能化战争的胜利,是通过预警时间提前、决策时间缩短,作战行动向前延伸,达到先手布局、先发制人的效果。三是作战行动极度灵活。智能化战争中,人工智能能够提出极为丰富的作战方案,加之无人作战平台,能够在不同功能角色之间快速切换,作战行动更为大胆冒险,战术战法更为出乎意料。即使作战要素中的某一个丧失功能,“去中心化”的功能也会确保群体功能不受影响。

颠覆传统作战样式。一是侵入式独狼作战。即单套无人系统独立作战。二是有人无人协同体系破击战。即基于智能无人系统,通过有无人装备混合作战,快速达成作战目的。三是无人系统编队独立作战。多套无人系统构成作战单元,可执行多目标攻击等复杂任务。四是母舰蜂群集群作战。以母舰为运输载体和指挥中心,形成有人无人混合集群作战样式。

具备“核威力”的作战效能。智能化战争把智能机器人的特性和潜能发挥到极致,导致作战效能接近极限。一是目标小、难发现。比如微型化隐身机器人,雷达和声呐很难发现。美国在“蜻蜓”中嵌入“光极”芯片的混合无人机,更小更轻更隐秘,续航时间高达几个月。二是对抗难,代价高。比如甲虫大小的微型无人机只要扫描到人脸景象,经数据分析和确定即可直接撞向目标头部,携带的弹药足以穿透大脑。三是造价低、破坏大。未来运用智能化武器极限作战具有核武器的威力,特别是极大体量的智能化武器装备,极低成本的机器人自动生产,极度灵活的机器人集群作战,可能会超越核武器爆炸威力的极大化。

中國政府原文來源:https://military.people.com.cn/n1/2019/0115/c1011-3053888.html

Chinese Military Multidimensional Command Post -An Interactive Military Planning Sandbox for Effective Cyber Warfare Operations

中國軍事多維指揮所-有效網路戰行動的互動式軍事規劃沙箱

The military electronic sandbox is a modern information system platform that can grasp the three-dimensional battlefield space situation, implement efficient command, and support scientific command training. Its core is to use geographical information technology, military simulation technology, advanced display technology, etc. to replace traditional maps and sandbox tools to achieve The integrated display of geographical information and situational information allows commanders to deeply understand the combat environment. With the assistance of the command operation system, it greatly improves the command’s decision-making capabilities and response speed, and improves the quality effect of command training.

The software platform of the military interactive electronic sandbox system is the core of the electronic sandbox system. Its working principle is to access multi-source external data, integrate, process and store data, analyze data based on business needs, and dynamically display data in two or three dimensions. Therefore, the data processing platform is the foundation, and the data access platform and visual display platform are the support. The visual display terminal is the most intuitive cognitive image of the electronic sandbox, including mobile terminals, desktop terminals and large-screen display terminals. Among them, large-screen display terminals can support multi-point infrared touch and are the main form of human-computer interaction.

1. System introduction

In military applications, electronic sandbox systems are generally deployed in fixed command centers or mobile command posts. They are an important part of the command training system. Their basic functions are two- and three-dimensional geographic information display and battlefield simulation.

In order to achieve the effect of stable integration of the electronic sandbox and the real environment, for example, a multi-channel interactive system is constructed based on multi-AI methods to provide commanders with a more efficient and natural interaction method, thereby improving the commander’s command efficiency. Achieve full-element, multi-category, multi-level, and multi-granularity three-dimensional real-scene holographic display, provide commanders with intuitive and realistic battlefield situation elements, and provide the ability to observe the situation from multiple perspectives and directions, helping to grasp the overall situation and ensure the smooth operation of combat missions Complete it in time to improve combat effectiveness. The military plotting electronic sandbox is based on natural interaction (including voice, movement, gesture, line of sight, etc.), augmented reality, collaborative plotting and other technologies, and allows commanding combatants with different roles to conduct virtual and real interactions and collaborative discussions in real command posts. , jointly plotting, formulating plans, etc. to provide technical support, which will become a strong driving force for the leapfrog development of electronic sandboxes.

The multi-dimensional interactive military plotting electronic sandbox developed by a company is based on a practical perspective and is compatible with the terrain description function of the traditional physical sandbox and inherits the geographical information display function of the traditional electronic sandbox. It is oriented to the combat and training needs of senior commanders and focuses on achieving Through the interconnection of the electronic sand table and other operating seats in the command center, a set of intelligent interactive command and training operating platforms are designed and proposed for command operations during wartime and for drills and drills in peacetime.

During wartime, the electronic sand table serves as the display and control terminal for the commander to command operations. It integrates the support information of combat elements at each operating seat, receives battlefield information in real time, displays two- and three-dimensional battlefield situation maps, and provides basic auxiliary means such as plotting, measurement, and calculation. At the same time, it is based on data Mining and artificial intelligence technology provide the commander with a combat plan that can be intelligently learned and adjusted and conduct deduction simulations to assist the commander in making combat decisions. In normal times, the electronic sand table serves as the command and control terminal for the chief’s training exercises. It has the functions of scenario setting and training guidance, and supports data recording, auxiliary evaluation, review deduction and historical data query in the entire process of training scenarios from formulation, deployment to training. At the same time, it can also be used as a research platform for personnel exchange and training in the command center and a service platform for the release, display, and application of military intelligence information.

The multi-dimensional interactive military plotting electronic sand table developed by a company is based on a two-dimensional geographical information platform and a three-dimensional digital earth, combining multimedia display and control technology, simulation visualization technology, network communication technology, massive data management technology and multi-touch technology. A new two- and three-dimensional interactive military simulation and simulation integrated platform.

The software platform is the core of the electronic sandbox system. Its working principle is to access multi-source external data, integrate, process and store data, analyze data based on business needs, and dynamically display data in two or three dimensions. Therefore, the data processing platform is the foundation, and the data access platform and visual display platform are the support. The visual display terminal is the most intuitive cognitive image of the electronic sandbox, including mobile terminals, desktop terminals and large-screen display terminals. Among them, large-screen display terminals can support multi-point infrared touch and are the main form of human-computer interaction.

Working principle diagram of military interactive electronic sandbox system

(1) Infrastructure layer

The infrastructure layer is the basic environment that supports system operation, including graphics workstations, storage devices, computing devices, network devices, display devices, operating systems, etc. It provides a unified, high-speed, and secure basic network and host operating platform for the prototype system.

(2) Basic service layer

The basic service layer is the data resource carrying and basic service providing layer of the system. It supports the platform application layer and provides basic functions such as database management system, communication manager, and specific engines. On this basis, it develops and provides business-related basic services. Core services include geographical information services, data access services, situation display services, simulation deduction services, interconnection services, military marking services, etc. Service types can be customized and developed according to needs to meet the needs of different business applications.

(3) Platform application layer

Including business platform and user-oriented application plug-ins. The business platform includes a data access platform, a data processing platform, and a visual display platform.

(4) Data access platform

It is used to access, process, store and distribute various types of information and build a customized professional military intelligence database. Specifically, it is able to receive data from different sources, formats, and characteristics on combat processes, comprehensive support, geographical information, simulations, and other data, and integrate them logically or physically to provide information for situation display, combat discussions, command decisions, training evaluation, etc. Different applications provide data support. In peacetime, all kinds of basic military information, such as equipment information, personnel information, position information, target information, combat plans, etc., are collected, processed into a data format that can be called by the data processing platform, and saved in the form of local storage or cloud storage; During wartime, the meteorological and hydrological, electromagnetic environment, geographical environment, and humanistic environment data from each operating seat of the command center, the real-time location and attributes of personnel and equipment on the battlefield, Beidou information, video information, etc. are accessed in real time and processed into a data processing platform. The data format of the call.

(5) Data processing platform

With geographical information data as the background, various types of data from the data access platform are received or called, and a situation map is constructed to realize the visualization of the enemy’s situation, our situation, battlefield environment, target analysis, action progress, plotting and intervention process. On this basis, it provides standardized interfaces to achieve effective data connection with other systems, ensures function expansion and access to other systems, supports customized development of business application plug-ins, and provides support for the expansion of combat command business. In peacetime, based on the accumulated data, a simulated battlefield situation is constructed, combat plans and plans are formulated, exercises, training and simulations are conducted, and relevant results are stored in the data access platform for use in wartime.

(6) Visual display platform

Based on the independent 3D simulation engine, real-time rendering generates a 3D battlefield environment that is consistent with the combat and training areas. It uses structured data technology and flexible and editable logical data models to realize “layered” information data fusion display and output, and realizes multiple Click on infrared touch control and voice control, etc.

(7) Platform plug-ins

Relevant plug-ins are designed to meet the needs of operational planning, including functional plug-ins for data connection and management, process analysis and display, and program deduction and evaluation. They are customized to realize the connection and comprehensive management of operational planning business data. A “one picture” comprehensive display of the battlefield environment and battlefield situation during the combat process, as well as a comprehensive simulation deduction and display of various plans for reconnaissance, troop operations, battlefield defense and fire strikes involved in the combat process.

3. System composition

(1) Data engine

1. Diverse data

Supports massive, multi-source data processing, mainly including: images, vectors, DEM, 3D models, sea maps, land maps, aerial maps, etc.;

2.Data update

Supports rapid updating of multi-level mixed-precision geographical data;

3.Data distribution

Support data distribution based on C/S mode and quickly build electronic sandbox;

4.Data access

Supports distributed deployment and access of massive data from multiple sources, and can access cloud data.

(2) Comprehensive display and control

1.Full space expression

Supports full-space, multi-view, and multi-granularity simulation visual expression;

2. Two-dimensional and three-dimensional integration

Supports two- and three-dimensional integrated visual expression;

3.Multi-touch

Support new human-computer interaction methods based on multi-touch technology;

4. Interactive annotation

Supports interactive annotation of 3D models, landmarks, paths, regions, 360 panoramas and mounting of multimedia information.

(3) Sand table situation

1. Situation visualization

Supports multi-target and multi-batch battlefield situation visualization, and has functions such as scene saving and playback;

2. Diverse data sources

Compatible with multi-source surveillance data such as GPS, Beidou, radar, and AIS, and has an expandable data interface;

3. Editing and deduction

Supports 2D and 3D integrated editing and deduction of situational scenarios;

4. Situation special effects library

It has a rich library of battlefield simulation effects such as flame, explosion, smoke, infrared, electromagnetic, and radar.

(4) Military standard drawing

1. Collaborative plotting

Supports multi-person and multi-client synchronous and asynchronous collaborative military plotting;

2. Two-dimensional and three-dimensional plotting

Supports 2D and 3D simultaneous plotting and editing of military standards;

3. Sketch drawing

Supports intelligent recognition and plotting of sketches;

4.Same screen plotting

Supports multi-person 3D model plotting and editing on the same screen;

5. Military standard deduction

It has the function of 2D and 3D military standard situation deduction.

(5) Simulation engine

1. Natural environment simulation

Professional game-level rendering, supporting natural environment simulations such as three-dimensional clouds, fog, rain, snow, seawater, etc.;

2. Meteorological numerical simulation

Supports efficient processing, analysis and numerical simulation of large-scale, multi-source battlefield meteorological environment data;

3. Simulation deduction

Use human-computer interaction to deploy and perform deductions on deduction targets, and can expand simulation algorithms and combat rules;

4.Effectiveness evaluation

Supports assessment of operational effectiveness.

(6) Collaborative discussion

1. Electronic whiteboard

Distributed collaborative discussion and plotting based on electronic whiteboard, supporting conventional graphics, military standards, multimedia files, etc.;

2. Video conferencing

It has conference room mode collaborative discussion functions based on text, voice, and video communication to improve communication efficiency;

3. File sharing

Supports file sharing such as txt, PPT, PDF, picture files, compressed files, videos, etc.

(7) Software and hardware integration

Supports perfect integration with desktop interactive hardware;

Supports perfect integration with multi-touch hardware;

Support integration with video conferencing system hardware;

Support cross-platform applications.

(8) Key functional indicators

It has the display effects, fault simulation, and data connection functions of the existing aviation police information reconnaissance system; it has the functions of world sea and air area division display and air defense identification zone;

Have the ability to quickly configure existing business data into learning resources, and quickly configure learning resources and learning duration based on professional knowledge learning templates;

It has a variety of preset scenarios for sand table deduction and a variety of countries, including the United States, India, Japan and other countries;

Supports multi-source massive data storage, processing and update functions.

(9) Advantages and Features

1. Complete industry solutions

The electronic sandbox solution involves sandbox data processing, import, update, sandbox information sharing, collaborative work, command decision-making, military plotting, simulation, sandbox deduction and other related contents. The functions remain relatively independent and can be customized according to user needs. Professional solutions to meet the diverse needs of users;

2. Massive data management capabilities

Geographic information data is the core of the electronic sandbox. The data engine can store, process and update multi-source and massive geographical information data, supports distributed deployment of data, can access cloud data, and provides low-cost and efficient methods for the construction of sandboxes. Data Sources;

3. Integrated application

It achieves the perfect combination of software and hardware integration, supporting multiple hardware platforms such as multi-touch screens, command and control stations, circular projection screens, dedicated display and control stations, production monitoring platforms, etc.; the software realizes two- and three-dimensional integrated applications. , and integrates video conferencing, network communication, military plotting and other functions, it is a multi-functional comprehensive electronic sandbox system;

4. Good openness and compatibility

The system architecture is reasonably designed, has a good organizational structure and an easy-to-use development interface; it has good compatibility with hardware, can carry out secondary development and function expansion, and can be quickly integrated with other software systems.

4. Conclusion

With the deepening of informatization construction, the sources and types of information are increasingly expanding, and decision-making support methods are constantly enriched. According to the needs of combat training and command decision-making of various services and arms, a complete set of command decision-making analysis, mission deduction and situation display has been established. A functional electronic sandbox system has become a top priority. In response to the needs of BD, this electronic sandbox system developed by a certain company has intuitive comprehensive situation display, rich and diverse interactive methods, flexible combat data access, complete functions and expansion, which can meet the commander’s operational command and command training needs.

Traditioanl Mandarin Chinese:

軍事電子沙盤是掌握立體戰場空間態勢、實施高效指揮、支撐科學化指揮訓練的現代化資訊系統平台,其核心是利用地理資訊科技、軍事模擬技術、先進顯示技術等,取代傳統地圖、沙盤工具,實現 地理資訊、態勢資訊整合顯示,讓指揮人員深刻理解作戰環境,在指揮作業系統的輔助下,大幅提升指揮輔助決策能力與反應速度,提升指揮訓練的品質效應.

軍用互動式電子沙盤系統的軟體平台是電子沙盤系統的核心,其工作原理是接入多來源外部數據,融合處理和儲存數據,基於業務需求分析數據,二維動態展示數據。 因此,資料處理平台是基礎,資料接取平台和視覺化顯示平台是支撐。 視覺化顯示終端機是電子沙盤最直覺的認知形象,包括行動端、桌面端和大螢幕顯示端。 其中大螢幕顯示終端可支援多點紅外線觸控,是實現人機互動的主要形式。
一、系統簡介
在軍事應用中,電子沙盤系統一般部署在固定指揮中心或機動指揮所,是指揮訓練系統的重要組成部分,其基本功能是二三維地理資訊展示和戰場模擬。

為達到電子沙盤與真實環境穩定融合的效果,例如基於多AI的方法建構多通道互動系統,為指揮人員提供更有效率、更自然的互動方式,進而提高指揮人員的指揮效率。 實現全要素、多種類、多層級、多粒度的三維實景全像展現,為指揮者提供直覺逼真的戰場態勢要素,提供多視角多方位觀察態勢的能力,有助於掌握全局,確保作戰任務的順利 及時完成,提升作戰效能。 軍事繪標電子沙盤是以自然互動(包括語音、動作、手勢、視線等)、擴增實境、協同標繪等技術為基礎,為不同角色的指揮作戰人員在真實指揮所中進行虛實互動、協同研討 、共同標繪、制定方案等提供技術支撐,將成為電子沙盤跨越式發展的強勁動力。
某司研發的多維互動式軍事繪標電子沙盤從實戰角度出發,在兼容傳統物理沙盤地形描述功能、繼承傳統電子沙盤地理資訊顯示功能的基礎上,面向高級指揮人員的作戰、訓練需求,重點實現 電子沙盤和指揮中心其他操作席位的互聯互通,設計提出了一套戰時用於指揮作戰、平時用於演訓演練的智能化互動式指揮訓練作業平台。
戰時,電子沙盤作為首長指揮作戰的顯控終端,融合各操作席位作戰要素保障信息,實時接收戰場信息,顯示戰場二三維態勢圖,提供標繪、測量、計算等基礎輔助手段,同時基於數據 挖掘、人工智慧技術,為首長提供可智慧學習調整的作戰預案並進行推演仿真,輔助首長定下作戰決心。 平時,電子沙盤作為首長演訓演練的指控終端,具備想定設定、訓練導調功能,支援訓練想定從制定、部署到訓練全過程的資料記錄、輔助評估、複盤推演及歷史資料查詢。 同時也可作為指揮中心機關部隊人員交流、訓練的研究平台及部隊軍情資訊發布、展示、應用的服務平台。
某司研發的多維互動式軍事繪標電子沙盤是基於二維地理資訊平台和三維數位地球,結合多媒體顯控技術、模擬視覺化技術、網路通訊技術、海量資料管理技術及多點觸控技術於一體 的新型的二三維互動式軍事模擬與模擬一體化平台。

軟體平台是電子沙盤系統的核心,其工作原理是接入多源外部數據,融合處理和存儲數據,基於業務需求分析數據,二三維動態展示數據。 因此,資料處理平台是基礎,資料存取平台和視覺化顯示平台是支撐。 視覺化顯示終端是電子沙盤最直覺的認知形象,包括行動端、桌面端和大螢幕顯示終端。 其中大螢幕顯示終端可支援多點紅外線觸控,是實現人機互動的主要形式。

军用交互式电子沙盘系统工作原理图

(一)基础设施层

基础设施层是支撑系统运行的基础环境,包括图形工作站、存储设备、计算设备、网络设备、显示设备、操作系统等,为原型系统提供统一、高速、安全的网络和主机运行基础平台。

(二)基础服务层

基础服务层是系统的数据资源承载与基础服务提供层,对上支撑平台应用层,提供数据库管理系统、通信管理器、特定引擎等基础功能,并在此基础上开发提供业务相关的基础服务。核心服务包括地理信息服务、数据接入服务、态势显示服务、仿真推演服务、互联互通服务、军标标绘服务等等,服务类型可根据需求进行定制开发,满足不同业务应用需求。

(三)平台应用层

包括业务平台和面向用户的应用类插件。业务平台包括数据接入平台、数据处理平台、可视化显示平台。

(四)数据接入平台

用于接入、处理、存储、分发各类型信息,构建自定义的专业军情数据库。具体表现为:能够接收不同来源、格式、特点的作战过程、综合保障、地理信息、仿真推演等数据,并在逻辑或物理上有机综合集成,为态势显示、作战研讨、指挥决策、训练评估等不同应用提供数据支撑。在平时,收集各类军用基础信息,如装备信息、人员信息、阵地信息、目标信息、作战方案等,处理为可供数据处理平台调用的数据格式,以本地存储或云存储的形式保存;在战时,实时引接指挥中心各操作席位的气象水文、电磁环境、地理环境、人文环境数据,战场中人员和装备的实时位置及属性、北斗信息、视频信息等,并处理为可供数据处理平台调用的数据格式。

(五)数据处理平台

以地理信息数据为背景,接收或调用数据接入平台的各类数据,构建态势一张图,实现敌情、我情、战场环境、目标分析、行动进程、标绘和干预过程可视化。在此基础上,提供标准化接口,与其他系统实现有效数据衔接,保障功能扩展和其他系统接入,支持业务应用插件定制开发,为作战指挥业务扩展提供支撑。在平时,基于积累的数据构建仿真战场态势,制定作战计划和方案,进行演习训练和仿真推演,相关成果存入数据接入平台,供战时调用。

(六)可视化显示平台

基于自主化三维仿真引擎实时渲染生成与作战及训练区域一致的三维战场环境,运用结构化数据技术及灵活可编辑的逻辑数据模型,实现“图层化”信息数据融合显示及输出,并实现多点红外触摸控制及语音控制等。

(七)平台插件

相关插件是针对作战规划需求进行设计,包括数据引接与管理类、过程分析与展示类以及方案推演与评估类的功能插件,定制实现了作战规划业务数据的引接和综合管理。作战过程中战场环境与战场态势的“一幅图”综合展示,以及作战过程涉及的侦察、部队行动、战场防抗和火力打击各类方案的综合仿真推演与展示。

三、系统组成

(一)数据引擎

1.数据多样

支持海量、多源数据处理,主要包括:影像、矢量、DEM、三维模型、海图、陆图、空图等;

2.数据更新

支持多级混合精度地理数据的快速更新;

3.数据分发

支持基于C/S模式的数据分发,快速构建电子沙盘;

4.数据访问

支持多源海量数据的分布式部署和访问,可以访问云端数据。

(二)綜合顯控
1.全空間表達
支援全空間、多視角、多粒度模擬視覺化表達;
2.二維一體化
支持二維一體化可視化表達;
3.多點觸控
支援基於多點觸控技術的新型人機互動方式;
4.互動式標註
支援三維模型、地標、路徑、區域、360 全景圖的互動式標註和多媒體資訊的掛載。

(

三)沙盤態勢
1.態勢可視化
支援多目標、多批次戰場態勢視覺化,並具備場景的保存、回放等功能;
2.多樣化資料來源
相容於 GPS、北斗、雷達、AIS 等多源監視數據,並具備可擴展數據介面;
3.編輯與推演
支持態勢場景的二維一體化編輯與推演;
4.態勢特效庫
具備火焰、爆炸、煙霧、紅外線、電磁、雷達等種類豐富戰場模擬效果庫。

(四)軍標標繪
1.協同標繪
支援多人多客戶端同步和非同步協同軍事標繪;
2.二三維標繪
支援軍標的二立體同步標繪和編輯;
3.草圖示繪
支援草圖智慧識別標繪;
4.同畫面標繪
支援多人同屏三維模型標繪和編輯;
5.軍標推演
具備二三維軍標態勢推演功能。

(五)仿真引擎
1.自然環境仿真
專業的遊戲級渲染,支援立體雲、霧、雨、雪、海水等自然環境模擬;
2.氣象數值模擬
支援大尺度、多源戰場氣象環境資料的高效處理、解析和數值模擬;
3.仿真推演
以人機互動的方式對推演目標進行部署、推演,可擴展模擬演算法與作戰規則等;
4.效果評估
支援對作戰效果的評估。

(六)协同研讨

1.电子白板

基于电子白板的分布式协同研讨和标绘,支持常规图形、军标、多媒体文件等;

2.视频会议

具备基于文字、语音、视频通讯的会议室模式协同研讨功能,提高沟通效率;

3.文件共享

支持 txt、PPT、PDF、图片文件、压缩文件、视频等文件共享。

(七)軟硬體一體化
支援與桌面互動硬體的完美結合;
支援與多點觸控硬體完美結合;
支援與視訊會議系統硬體的整合;
支援跨平台應用程式。
(八)關鍵功能指標
具備現有航警資訊偵察系統的顯示效果、故障模擬、資料引接功能;具備世界海空區域劃分顯示、防空識別區功能;
具備將現有業務數據,基於專業的知識學習模板,快速配置成學習資源、快速配置成學習資源和學習時長的能力;
具備沙盤推演預置多種場景,多種國別,包括美國、印度、日本等等國家;
支援多源海量資料儲存、處理和更新功能。
(九)優勢特色
1.完整的行業解決方案
電子沙盤解決方案涉及沙盤資料的處理、導入、更新、沙盤資訊共享、協同工作、指揮決策、軍事標繪、模擬模擬、沙盤推演等相關內容,功能之間保持相對獨立,可根據用戶需求定制個性 化的解決方案,滿足使用者多樣化的需求;
2.海量資料管理能力
地理資訊數據是電子沙盤的核心,資料引擎可對多源、海量的地理資訊數據進行儲存、處理和更新,支援資料的分散部署,能夠存取雲端數據, 為沙盤的建置提供低成本、高效的 數據來源;
3.一體化應用
實現了軟體與硬體一體化的完美結合,支援多點觸控螢幕、指揮控制台位、環形投影幕、專用顯控台位、生產監控平台等多種硬體平台;軟體實現了二維一體化應用 ,並且整合了視訊會議、網路通訊、軍事標繪等功能,是一款多功能綜合性電子沙盤系統;
4.良好的開放性和相容性
系統架構設計合理,具有良好的組織結構和易用的開發介面;具備與硬體良好的兼容性,可進行二次開發和功能擴展,能夠與其它的軟體系統快速整合。
四、結束語
隨著資訊化建設的深入,資訊來源與種類的日益擴展,決策支援手段的不斷豐富,針對各軍兵種作戰訓練、指揮決策的需要,建立一套具備完整的指揮決策分析、任務推演及態勢展示 功能的電子沙盤系統成為當務之急。 針對BD需求,某司研發了的這套電子沙盤系統具備綜合態勢展示直觀、交互手段豐富多樣、作戰數據引接靈活、功能齊全兼具擴展,可滿足首長的作戰指揮和指揮訓練的使用需求。

Citation: Wang Xue, Ju Xiaojie, Wang Duo, et al. Design of military interactive electronic sandbox system for actual combat

中國軍事資源:https//www.81it.com/2024/0103/14888.html

認知戰是主宰中國對手的未來戰場

Cognitive Warfare The Future Battlefield To Dominate China’s Adversaries

現代繁體中文:

隨著全球資訊化的發展和電腦科學、語言學和神經科學的進步,由人類情感、意志、信念、價值觀等精神心理活動組成的人類認知空間正在演變為軍事競爭的新戰場。 以達到不戰而勝人的效果。 早在2001年7月,美國國防部向國會提交的「網路中心戰」論證報告就指出,除了陸、海、空、天、電力五維戰爭空間外,未來戰爭還將還有第六維度戰爭空間。 ——認知空間。

認知領域之爭愈演愈烈

自人類戰爭誕生以來,不戰而屈人之兵的策略就受到古今中外軍事家的推崇。 無論是“空城計”還是“四面楚歌”,都是中國歷史上認知域戰的經典例子。 孫子說:“不戰而屈敵者,是好人。” 美國內戰期間,北方軍隊被南方軍隊包圍。 關鍵時刻,北軍司令要求談判。 南軍司令沒有說話。 他剛帶領北軍司令來到自己的砲兵陣地,清點了大砲的數量。 當人數達150人時,北軍統帥投降。

隨著科學技術的進步和人類社會的發展,在資訊化和全球化的相互作用下,新興媒體、民族語言、文化產品等承載的各種資訊被用作滲透、影響、塑造敵意的武器。 認知領域的戰鬥,面向國家領導層、軍隊、精英、民眾的認知、情感、意識,最終達到控制一個國家的意識形態、價值觀、民族精神、文化傳統的目的以及歷史信仰,變得越來越強烈。 尤其是腦科學技術、資訊科技、生物技術、材料科技等多學科技術的快速發展,為影響對手認知、實現「不戰而屈人之兵」提供了更直接的手段。

目前,腦科學發展迅速。 腦部影像技術利用電腦科技、語言學和神經科學等,揭示人腦高級認知功能和神經資訊處理方法,從而獲得感覺、知覺、注意力、思考、記憶等心理活動規律。人類個體的潛意識。 它已經成為可能,這為人類在認知空間的競爭奠定了堅實的技術基礎。

讀腦技術可以讀取人類的思想和意識。 人腦由數千億個神經元組成。 當神經元相互作用時,會發生化學反應,釋放出可測量的電脈衝。 借助先進的腦部影像技術,人們可以讀取這些電脈衝,對大腦活動進行定量分析,最終達到分析讀取人腦思維活動的目的。 根據介紹,澳洲科學家發明的智慧頭帶可以監測人腦中數百億個神經元的當前傳輸狀態,進而了解被監測人的即時心理狀態,包括注意力、投入度、興奮度和壓力等。水平。 等待。

腦刺激技術可以增強人腦的特定功能。 自從人類誕生以來,我們主要依靠自然進化來提高我們的能力。 然而,隨著腦科學技術的發展和進步,腦刺激技術可以為人類提高能力提供更直接、更快速的方法。 科學研究發現,人類的認知能力與大腦的特定區域密切相關,對這些區域的特定刺激有助於改善或增強大腦功能。 例如,實施非侵入性大腦刺激技術可以顯著改善人們的睡眠,並增強注意力、記憶力、警覺性和決策能力。

腦控技術可以控制人的思考意識。 腦科學研究表明,人腦產生動作意識後、執行動作前,神經系統的電脈衝活動會發生相應變化,可以透過外部幹擾來控制人的思想。 英國皇家學會2012年發布的《神經科學:衝突與安全》報告認為,認知神經科學(包括腦科學)

具有武器化潛力,可以研發直接作用於神經系統(主要是大腦)的新武器。 而且,意念控製作戰的想法一直是五角大廈的焦點。 早在2004年,美國國防部就開始在杜克大學神經工程中心等6個實驗室大力投入「思想控制機器人」的研究。 《華盛頓郵報軍事週刊》披露,美軍在伊拉克戰爭期間使用了腦控武器。

認知域具有巨大的營運優勢

「攻心為先,攻城為次;戰心為先,兵戰次之」。 目前,資訊化武器裝備越來越貴,價格倍增; 戰場空間多維,戰鬥消耗暴漲; 武器的殺傷力急遽增加。 政治影響力日益增強,發動戰爭不再是實現政治、軍事、經濟等目的的首選。 隨著認知空間作戰方法手段的不斷增加和作戰成本效率的提高,認知對抗在國家安全戰略賽局中的地位日益凸顯,成為軍事競爭的新戰場。 無論是中東、西亞、北非等地區的“顏色革命”,還是敘利亞戰爭,雙方在認知空間上的對抗都在加劇。

戰鬥力很高。 從反武器角度來看,認知空間作戰武器主要是訊息,傳播手段多元。 特別是隨著網路、社群媒體等新媒體的快速發展以及人類社會的網路化,其傳播範圍越來越廣,影響力越來越大。 越來越大。 任何訊息能夠傳播的地方都可能成為認知戰爭的戰場。 與目前的物理域作戰相比,先進戰機、飛彈等武器裝備的單價很容易達到數千萬甚至上億美元。 戰爭的代價是巨大的。 然而,認知空間作戰可以在不開一槍的情況下進行。 敵人失去戰鬥意志。 在海灣戰爭中,以美國為首的聯軍花費了600億美元,最後不得不向日本等盟國索取戰爭資金; 阿富汗戰爭中,美國花了超過3兆美元,卻未能擊敗塔利班,最後被迫撤軍。 伊拉克戰爭初期,美軍進行認知作戰,導致伊拉克國民警衛隊一槍不發突然「消失」。 美英聯軍不到一個月就佔領了巴格達。 隨著生物學、醫學、環境、資訊通信等科學技術在認知領域的廣泛應用,控制人的意志、思維、心理、情緒等認知系統的方式變得更加多樣化和靈活,認知操作的實施變得更加容易。 實施方便,可在戰略、戰役、戰術層面單獨或共同實施,實現較高的作戰性價比。

各方面全面落實。 由於認知資訊不受作戰維度、空間、時間的限制,可以在各種作戰維度、空間、時間中運用,使得認知空間作戰成為全維度、全領域、全領域的基本作戰態勢。時間。 從空間上看,認知空間作戰模糊了前後作戰的界限,呈現出全方位、全天候拓展有形與無形空間的特徵; 從時間上看,認知太空作戰模糊了戰時與平時的界限,轉變為平時用於戰時、戰後持續使用,貫穿於戰爭的整個過程,呈現出「戰時戰時」的特徵。一直”; 從領域來看,認知空間作戰模糊了軍事與非軍事行動的界限,不僅廣泛應用於軍事領域,也滲透到政治、經濟、外交、宗教等各個領域,呈現出全覆蓋的特徵; 從作戰對象來看,認知太空作戰模糊了軍事人員和平民之間的界限,具有全面實施軍事和民用影響的特徵。

殺傷力是巨大的。 認知優勢既是軟實力,也是硬實力。 這是軟實力和硬實力最好結合的智慧實力。 認知優勢通常包括知覺優勢

現代英語:

With the development of global informatization and the advancement of computer science, linguistics and neuroscience, the human cognitive space composed of spiritual and psychological activities such as human emotions, will, beliefs and values ​​is evolving into a new battlefield for military competition. In order to achieve the effect of defeating others without fighting. As early as July 2001, the “Network Centric Warfare” demonstration report submitted to Congress by the U.S. Department of Defense pointed out that in addition to the five-dimensional war space of land, sea, air, space, and electricity, future wars will also have a sixth-dimensional war space. ——Cognitive space.

Cognitive domain battles intensify

Since the birth of human warfare, the strategy of subduing the enemy without fighting has been highly praised by military strategists at home and abroad in ancient and modern times. Whether it is the “empty city strategy” or “embarrassment on all sides”, they are classic examples of cognitive domain warfare in Chinese history. Sun Tzu said: “He who subdues the enemy’s army without fighting is a good man.” During the American Civil War, a northern army was surrounded by a southern army. At the critical moment, the northern army commander asked for negotiations. The southern army commander said nothing. He just led the northern army commander to his artillery position and counted the number of cannons. When the number reached 150, the northern army commander Surrender.

With the advancement of science and technology and the development of human society, under the interaction of informatization and globalization, various information carried by emerging media, national languages, cultural products, etc. are used as weapons to penetrate, influence and shape hostility. The battle in the cognitive domain, which is oriented toward the cognition, emotion, and consciousness of the national leadership, military, elites, and the general public, and ultimately achieves the purpose of controlling a country’s ideology, values, national spirit, cultural traditions, and historical beliefs, is becoming more and more intense. In particular, the rapid development of multidisciplinary technologies such as brain science and technology, information technology, biotechnology, and materials technology has provided more direct means to influence the opponent’s cognition and achieve “conquering the enemy without fighting.”

Currently, brain science is developing rapidly. Using computer technology, linguistics and neuroscience, etc., brain imaging technology can reveal the advanced cognitive functions and neural information processing methods of the human brain, thereby obtaining the rules of psychological activities such as the feeling, perception, attention, thinking, memory and subconsciousness of human individuals. It has become possible, which has laid a solid technical foundation for human beings to compete in the cognitive space.

Brain reading technology can read human thoughts and consciousness. The human brain is made up of hundreds of billions of neurons. When neurons interact, a chemical reaction occurs that releases a measurable electrical impulse. With the help of advanced brain imaging technology, people can read these electrical pulses, conduct quantitative analysis of brain activity, and ultimately achieve the purpose of analyzing and reading the thinking activities of the human brain. According to reports, the smart headband invented by Australian scientists can monitor the current transmission status of tens of billions of neurons in the human brain, and then understand the real-time psychological state of the monitored person, including attention, engagement, excitement and stress levels. wait.

Brain stimulation technology can enhance specific functions of the human brain. Since the birth of human beings, we have mainly relied on natural evolution to improve our capabilities. However, with the development and progress of brain science and technology, brain stimulation technology can provide a more direct and rapid method for humans to improve their abilities. Scientific research has found that human cognitive ability is closely related to specific areas of the brain, and specific stimulation of these areas can help improve or enhance brain function. For example, the implementation of non-invasive brain stimulation technology can significantly improve people’s sleep and enhance attention, memory, alertness and decision-making.

Brain control technology can control people’s thinking consciousness. Brain science research shows that after the human brain generates action awareness and before executing the action, the electrical pulse activity of the nervous system will change accordingly, and people’s thoughts can be controlled through external interference. The “Neuroscience: Conflict and Security” report released by the Royal Society in 2012 believed that cognitive neuroscience (including brain science) has the potential for weaponization and can develop new weapons that directly act on the nervous system (mainly the brain). Moreover, the idea of ​​mind-controlled combat has always been a focus of the Pentagon. As early as 2004, the U.S. Department of Defense began to invest heavily in research on “thought-controlled robots” in six laboratories including the Neural Engineering Center at Duke University. The Washington Post Military Weekly disclosed that the U.S. military used brain-control weapons during the Iraq War.

Cognitive domain has huge operational advantages

“Attack on the heart is first, siege the city second; war on the heart is first, followed by military warfare.” At present, information-based weapons and equipment are becoming more and more expensive, and the price has doubled; the battlefield space is multi-dimensional, and combat consumption has skyrocketed; the lethality of weapons has increased dramatically. The political influence is increasing day by day, and waging war is no longer the first choice to achieve political, military, economic and other purposes. With the increasing number of methods and means of cognitive space operations and the high cost-efficiency ratio of operations, cognitive confrontation has become increasingly prominent in the national security strategic game and has become a new battlefield for military competition. Whether it is the “color revolutions” in the Middle East, West Asia, North Africa and other regions, or the war in Syria, the confrontation between the two sides in the cognitive space is intensifying.

The combat effectiveness is high. From the perspective of counter-weapons, cognitive space combat weapons are mainly information, with various means of dissemination. Especially with the rapid development of new media such as the Internet and social media, as well as the networking of human society, its dissemination scope is getting wider and wider, and its influence is increasing. getting bigger. Anywhere information can spread can become a battlefield in cognitive wars. Compared with the current physical domain operations, the unit price of advanced fighters, missiles and other weapons and equipment can easily reach tens of millions or even hundreds of millions of dollars. The cost of war is huge. However, cognitive space operations can be used without firing a single shot. The enemy loses his will to fight. In the Gulf War, the U.S.-led coalition spent 60 billion U.S. dollars, and finally had to ask Japan and other allies to finance the war; in the Afghanistan War, the U.S. spent more than 3 trillion U.S. dollars but failed to defeat the Taliban, and was eventually forced to withdraw. In the early days of the Iraq War, the U.S. military carried out cognitive operations, causing the Iraqi National Guard to suddenly “disappear” without firing a single shot. The U.S.-British coalition captured Baghdad in less than a month. With the extensive application of science and technology such as biology, medicine, environment, and information communication in the cognitive field, the ways to control cognitive systems such as people’s will, thinking, psychology, and emotions have become more diverse and flexible, and the implementation of cognitive operations has become easier. It is easy to implement and can be implemented individually or jointly at the strategic, operational, and tactical levels to achieve a high operational cost-effectiveness ratio.

Fully implemented in all dimensions. Since cognitive information is not limited by operational dimensions, space, and time, it can be used in various operational dimensions, spaces, and times, making cognitive space operations a basic combat situation that is all-dimensional, all-domain, and all-time. From a spatial point of view, cognitive space operations blur the boundaries between front and rear operations, showing the characteristics of all-round and all-weather expansion of tangible and invisible spaces; from a time point of view, cognitive space operations blur the boundaries between wartime and peacetime, transforming In peacetime, it is used in wartime, and it continues after the war, throughout the entire process of the war, showing the characteristics of “war at all times”; from a field perspective, cognitive space operations blur the boundaries between military and non-military operations, and are not only widespread It is used in the military field, and penetrates into various fields such as politics, economy, diplomacy, religion, etc., showing the characteristics of full coverage; from the perspective of combat objects, cognitive space operations blur the boundaries between military personnel and civilians, and have the ability to comprehensively implement military and civilian Characteristics of impact.

The lethality is huge. Cognitive advantage is both soft power and hard power. It is the smart power that best combines soft and hard power. Cognitive advantages usually include perceptual advantages, knowledge advantages, psychological advantages and decision-making advantages. Perceptual advantages can help the military improve the lethality of weapon platforms. U.S. Air Force combat tests show that after a combat aircraft gains a perception advantage, its lethality can be increased by 2.5 times. However, if the aircraft is at a disadvantage in perception, it will be in a state of information confusion to a large extent, and will not only become “blind” or “deaf”, They may also become “idiots” who act blindly and “idiots” who are deceived by the enemy’s false information. In the future, intelligent warfare will, to some extent, be a contest of knowledge. Knowledge has become an important military element. Only by forming a knowledge advantage can we fully utilize the performance of high-tech weapons and equipment and achieve the best combination of people and weapons. Decision-making advantage is the core of cognitive space advantage and the key to winning future wars. Establishing and protecting one’s own decision-making advantages, and attacking and weakening the enemy’s decision-making advantages will be the focus of future war confrontations. Only by gaining a decision-making advantage can we form a full-spectrum advantage and ultimately win the war.

Give full play to the advantages of non-military power. Future wars are hybrid wars, involving not only the military field, but also many non-military fields. Due to restrictions such as the laws of war, military power cannot be used in non-military fields, but cognitive space operations can exert its unique advantages to achieve war goals. For example, during the Second Lebanon War, the Lebanese military made full use of the power of the media to publicize a large number of civilian casualties to win the support of international public opinion; internally, it used pictures of destroyed Israeli military equipment to publicize the results of the war, which not only forced the Israeli military to compress as much as possible The duration of the operation resulted in its inability to achieve its operational objectives, and it also received support from Arab countries, thus gaining strategic initiative. As cognitive space becomes a new battlefield space, non-military forces are likely to become the main force in cognitive space operations, and combat operations will become more and more frequent. According to statistics, in recent local wars, the ratio of non-military forces to military combat forces has reached 4:1, with non-military forces engaged in cognitive operations accounting for the vast majority.

Cognitive domain combat methods are diverse

In essence, cognitive domain operations start from the spiritual level of war, taking people’s will, beliefs, thinking, psychology, etc. as the objects of combat, triggering cognitive imbalances by attacking the opponent’s perceptual system, and attacking their value system to promote combat. The target is emotionally disturbed and attacks its belief system, causing the target’s will to collapse, thereby achieving the combat goal. According to the cognitive space combat mechanism, its combat methods mainly include the following.

Destroy the will to fight. To dismantle the will to war is to declare to hostile countries the determination to fight and the will to use force by displaying powerful new weapons and equipment, new combat forces, mobilizing and deploying troops, and large-scale military exercises, so as to intimidate and deter the enemy’s military and civilians. The opponent retreats or surrenders, abandoning war operations. As for the timing of use, it is mainly used before war, aiming to defeat the enemy without fighting, and can also be used during combat. At the operational level, operations to disrupt the will to fight are mainly used at the strategic and operational levels, reflecting the will and determination of a country or group to safeguard interests. In peacetime, it usually manifests itself in the form of revelations in the cognitive field, exercises in the military field, blockades in the diplomatic field, sanctions in the economic field, etc.; in times of war, it usually manifests itself in the use of battlefield information advantages to show the enemy the results of the battle and directly express the will to fight. and determination to achieve cognitive enhancement of combat effectiveness. For example, pictures of the precise destruction of important targets in war are transmitted to enemy soldiers and civilians in the form of images or videos, which enhances the memory of the combat effects in the enemy’s cognitive field, creates a psychological shadow on the enemy, and makes them lose their will to fight.

Attack the idea of ​​faith. Attacking beliefs and concepts refers to using various means to guide enemy soldiers and civilians to abandon or form certain beliefs and concepts, so as to disintegrate the spiritual pillars of enemy soldiers and civilians, change their attitude towards war, and then force the enemy to give up resistance. The main means of attacking beliefs and concepts include: vilifying the enemy’s political or spiritual leaders, destroying the values ​​​​of the enemy’s military and civilians, and inducing young people to change their “three views.” For example, in the Iraq war and the Libyan war, the US military vilified Saddam Hussein and Gaddafi were typical examples. Another example is to use the Internet, social media and other channels to attack the beliefs of the enemy’s military and civilians, induce cognitive confusion among the enemy’s military and civilians, change their concepts, and thereby destroy the enemy’s public opinion foundation for war.

Public opinion attacks psychology. The psychology of public opinion attack refers to the use of various cognitive operations, such as creating a combat situation and atmosphere, to strongly stimulate the normal psychological state of enemy soldiers and civilians, thereby affecting combat judgment, decision-making, and actions. Public opinion attack psychological operations are not about eliminating the impact, but about controlling and minimizing the impact on one’s own military and civilians, and maximizing the impact on the enemy’s military and civilians. The U.S. military predicts through analysis of the wars in Afghanistan and Iraq that the proportion of attrition due to psychological problems will reach 10% to 25% in future operations. In recent local wars, the US military has always used psychological warfare as a “multiplier” of combat effectiveness and a “reducer” of combat costs. It must be used in every battle and every battle. Israel’s “Debka Files” website disclosed that in order to isolate Syrian President Bashar al-Assad, the US military called senior Syrian military officials and said bluntly: “General, we have used the global positioning system to determine your position, and then sent snipers Hand. What do you want to do now? If I were you, I would definitely think twice about who I should be loyal to.”

The battlefield conceals truth and reveals lies. Concealing truth and showing falsehood refers to concealing the true battlefield situation and combat intentions through various actions, creating and displaying illusions, inducing the enemy to make wrong decisions, and achieving the purpose of controlling the war situation. For example, in ancient times, “hanging sheep beats drums”, “thatched boats borrow arrows”, and “empty city strategy” all infiltrated the idea of ​​concealing the truth and revealing the false. In future wars, both combatants will usually use false information in the information acquisition process to induce confusion in the enemy’s situation; use saturated information blocking in the information processing process to induce the enemy to make inaccurate analysis and judgment; use viruses in the information feedback process , Trojan horse attack means to make the enemy’s command decision-making errors.

中國軍隊在認知領域建構網路戰作戰節奏

Chinese Military Establishes Battle Rhythm of Cyber Warfare in the Cognitive Domain

目前,認知域已作為獨立一域登上戰爭舞台,日益成為大國博弈的常鬥之域、必爭之地、勝戰砝碼。 分析認知域作戰特徵及發展趨勢,至少反映為以下八個面向。

認知域是軍事優勢轉化為政治勝勢的關鍵域

軍事對抗,表面上看來是雙方硬實力的對抗,深層看不管戰爭是什麼性質、何種目的,終歸是人的意志的較量。 勝利的關鍵是將己方意志強加在受眾身上的能力。 只要剝奪、擊潰了敵人的戰爭意志,就意味著贏得了戰爭。 認知域作戰,以人的意志、精神、心理等為對抗目標,增強己方意志的同時削弱敵方的意志,進而達成攻心奪志的政治目的。 從這個意義上講,認知域是軍事優勢轉化為政治勝勢的關鍵領域。 隨著戰爭形態加速向智慧化演進,認知品質優勢帶來決策行動優勢,不僅可在道德、法理上佔據制高點,塑造正義合法的有利態勢,還可透過混合戰爭、綜合博弈手段,實現小戰 甚至不戰而勝的目的。 尤其是大國競爭背景下戰爭成本高昂,各方都希望透過加大認知域爭奪力度,以「人道」且「經濟」的形式,迫使對手知難而退。

透過改變對手認知,可改變其決策和行動

實施認知攻擊的目的,就是用一隻“看不見的手”操控對手意志,讓對手感到“我不能”“我不敢”,從而達到“我不想”的效果。 外軍實踐表明,對人的意志、信念、思維、心理實施認知攻擊,可以是長期的文化植入,可以是「資訊海洋+摀嘴封聲」式的資訊壓制,可以是先入為主、搶先發聲 的主動塑造,也可以利用歷史積怨來挑動矛盾爆發。 目前,資訊科技、人工智慧技術、媒體科技強化了對認知域的直接作用,利用智慧生成軟體,可製造大量認知“彈藥”,精準作用於作戰目標的認知層,直接將“意志強加 於對手”,快速改變戰略態勢。 展望資訊化智慧化戰場,態勢感知力量與平台廣泛分佈於陸海空天網等作戰域,規劃、決策、控制等認知行為主導各作戰域行動,尤其是未來智能化戰爭中人機混合的認知 優勢將主導戰場,可以透過認知幹擾、認知混淆、認知阻斷等手段,製造戰爭認知“迷霧”,誘使對手誤判態勢,做出錯誤決策和行動。

認知域作戰是全時攻防、全員覆蓋、全程使用、全域塑造、全政府行動

認知域作戰呈現出全方位、多層次、超時空、跨領域等特點,模糊了戰時和平時、前方和後方的界限,跨越了戰場和國界,超越了單純的軍事領域,廣泛滲透於政治 、經濟、外交等各社會領域,表現為「五全」特質。 全時攻防,沒有平時戰時之分,沒有前方後方之別,表現為全時在線、全時在戰。 全員覆蓋,任何人甚至包括智慧機器人,都可能成為認知域作戰的目標對象。 全程使用,貫穿聯合作戰的戰前戰中戰後,聯合軍事行動未展開,認知塑勢行動已開始,並且伴隨軍事行動而行,不隨軍事行動停而停。 全域塑造,認知塑造貫穿戰略、戰役、戰術各層,作用範圍涵蓋陸海空天網各域,跨域賦能,對全域行動都有影響。 全政府行動,認知塑造自然具有戰略性,需要跨部門、跨領域、跨軍地、跨層級一致協調行動,以求達到最佳傳播效果。

關鍵在於奪控行動或活動的性質定義權、過程主導權、結局評判權

認知賽局鬥爭,涉及多個對抗方,看似紛繁複雜,關鍵在於圍繞認知域的「三權」展開爭奪。 其一,爭奪事件性質定義權。 即這個事件該怎麼看,是正義的還是非正義的,是合法的還是非法的。 通常採取先發制人搶先定義、建群結盟強行定義、資訊壓制單方定義、設定議題套用定義等,引導塑造民眾形成定性認知。 其二,爭奪事件過程主導權。 即這事該怎麼幹、不該怎麼做,誰做的是對的、誰做的是錯的,通常採取設局布阱等方式,試圖按照己方所期望出現的狀態,主導目標事件發展方向、 快慢、暫停、繼續與終結。 其三,爭奪事件結局評判權。 即對這事該怎麼評,誰是獲利方、誰是受損方,誰是眼前的失利者、誰是長遠的受損者,等等。 各方都試圖透過掌控事件結局的評判權,放大於己有利之處、放大於敵不利之處,目的是利用事件延伸效應,持續傷敵利己。

道義和法理是各方爭奪的焦點

軍事行動歷來講究「師出有名」。 雖然戰爭形態加速演變,但是戰爭從屬於政治的本質屬性不會改變;戰爭性質和人心向背,仍是影響戰爭勝負的關鍵因素。 認知域戰場上,佔據了政治、道義、法理的製高點,就能夠贏得民心、道義支持,營造得道多助的輿論氛圍,進而掌握制敵先機。 每次戰爭或衝突,無論是強者或弱者,無論是進攻方防守方或第三方,各方都會全力搶佔認知主導權、輿論主動權,千方百計用道義包裝自己、注重宣示正義立場,設法為 戰爭定性、為行動正名,以消除阻力、增加助力,塑造以「有道」伐「無道」的有利態勢。 戰爭雙方實力對比不同,瞄準佔據道德法理制高點進行的認知對抗方式也會不同。 近幾場戰爭表明,當一方軟硬實力均很強大時,即軍事實力強、盟友夥伴眾多、國際話語權佔有率大,常常高調宣戰;當軍事行動有可能引發連鎖反應時,則常常模糊處理 「戰」的提法。

資訊是認知攻防的基本“彈藥”

網路資訊時代,人類溝通方式持續發生複雜深刻變化。 現場互動互動逐漸讓位給網路線上連線,一些大型社群平台成為認知博弈鬥爭的主陣地、影響民眾認知的主管道,以資訊為彈藥進行國際網路封鎖權、話語控制權爭奪成為當今認 知對抗的主要行動之一。 在這些平台上,各種短視頻成為公眾了解戰況的“第一現場”,訊息比砲彈跑得快。 圍繞平台的使用與封鎖、主導與規製成為認知域作戰爭奪的焦點,各方努力透過操控社交平台來傳播、放大己方宣傳,聲討、壓制對方宣傳,形成「我說的多、你說的少 」「我說的對、你說的錯」「只能我說、不讓你說」的局面。 民眾作為大型社群平台的使用者,在「聽」與「說」甚至「做」的過程中,受別人影響,也影響別人,不知不覺地成為幕後推手的代理人和攻擊道具。

軍事行動對認知塑造有關鍵支撐作用

人類戰爭史表明,兵戰永遠是政治較量的基礎支撐,心戰則是兵戰的效能倍增器。 戰場上拿不回來的東西,不能指望在談判桌上拿回來,更不能指望在輿論場上拿回來。 現代戰爭中,認知傳播行動總是與聯合軍事行動如影隨形,心戰與兵戰互相影響、互為支撐,兵戰心戰化和心戰兵戰化趨勢更為明顯。 從戰爭實踐看,沒有軍事實力是萬萬不能的,但僅有軍事行動又不是萬能的。 戰場上的多次勝利,並不是奪取戰爭勝利的充分條件。 越戰中,美雖「贏得了每次戰鬥,卻輸掉了整場戰爭」。 21世紀初,美國連續打的伊拉克戰爭、阿富汗戰爭,贏得了戰場勝利,也沒有贏得政治勝勢。 同樣的道理,軍事上的勝勢不等於贏得輿論上的強勢,贏得戰場勝利也不意味著贏得戰略的勝利。 現代戰爭中,兩類人員的角色越來越大,一類人員透過編寫成千上萬行程式碼謀勝,一類人員透過編寫成千上萬條資訊謀勝。 這兩類人員數品質都佔優的一方,取勝的機率往往就大。

認知對抗技術越來越直接運用於戰爭

過去戰爭中,對認知域的影響和作用,主要是透過物理域的大量毀傷行動,逐級逐層傳遞到認知域。 隨著資訊通訊、人工智慧、生物交叉、腦科學等技術的發展和突破,新的認知戰工具和技術直接瞄準軍事人員。 認知對抗不僅使用傳統的資訊戰武器,也使用以大腦為作戰目標的神經武器庫。 屆時,機器將可以讀懂人腦,人腦也將能夠直接控制機器,智慧指控系統可以直接提供戰場態勢和決策輔助,逼真的認知彈藥和精準的受眾投放將極大增強社會影響效果。 認知對抗技術越來越直接運用於戰爭,原來資訊化所隱含的間接認知,正逐步轉變為直接對人的認知進行影響與控制。 可以說,先進科技的支撐,使認知域作戰透過建構現代網路架構、開發資料視覺化平台,快速了解資訊環境並有效影響目標人群,可以更直接且有效率地達成政治目的。

(作者單位:軍事科學學院戰爭研究院)

Modern English:

Analysis of the characteristics and development trends of cognitive domain operations

Cognitive domain operations take people’s will, beliefs, thinking, psychology, etc. as direct combat objects, and then affect their decisions and actions by changing the opponent’s cognition. Entering the era of information-based and intelligent warfare, cognitive domain warfare has become an important form of great power game, with all parties striving to achieve political goals in a relatively controllable manner. Gaining insight into the characteristics and development trends of cognitive domain operations is of urgent and important practical significance for winning future wars.

At present, the cognitive domain has entered the war stage as an independent domain, and has increasingly become a common domain, a battleground, and a weight for victory in the game between great powers. Analyze the characteristics and development trends of cognitive domain operations, which are reflected in at least the following eight aspects.

The cognitive domain is the key domain for transforming military advantage into political victory.

On the surface, military confrontation is a confrontation between the hard power of both sides. On a deeper level, no matter what the nature of the war is and for what purpose, it is ultimately a contest of human wills. The key to victory is the ability to impose your will on your audience. As long as the enemy’s will to fight is deprived and defeated, the war is won. Cognitive domain warfare uses human will, spirit, psychology, etc. as the target of confrontation, strengthening one’s own will while weakening the enemy’s will, thereby achieving the political goal of conquering the heart and mind. In this sense, the cognitive domain is the key domain for transforming military advantage into political victory. As war accelerates its evolution toward intelligence, cognitive quality advantages bring decision-making and action advantages, which can not only occupy the moral and legal high ground and create a favorable situation of justice and legality, but also realize small wars through hybrid warfare and comprehensive game means. Even the purpose of winning without fighting. Especially in the context of great power competition, the cost of war is high. All parties hope to intensify the competition for cognitive domains and force their opponents to retreat in a “humane” and “economic” manner.

By changing the opponent’s perception, it can change its decisions and actions

The purpose of implementing cognitive attacks is to use an “invisible hand” to control the opponent’s will, making the opponent feel “I can’t” and “I dare not”, and then achieve the effect of “I don’t want to”. Foreign military practice has shown that cognitive attacks on people’s will, beliefs, thinking, and psychology can be long-term cultural implantation, information suppression in the form of “information ocean + covering one’s mouth to silence”, or preemptive speech. Active shaping of political power can also use historical grievances to provoke the outbreak of conflicts. At present, information technology, artificial intelligence technology, and media technology have strengthened their direct effects on the cognitive domain. Using intelligent generation software, a large amount of cognitive “munitions” can be produced to accurately act on the cognitive layer of combat targets, directly imposing “will” “to rivals” and quickly change the strategic situation. Looking forward to the informationized and intelligent battlefield, situational awareness forces and platforms are widely distributed in combat domains such as land, sea, air, and space networks. Cognitive behaviors such as planning, decision-making, and control dominate operations in various combat domains, especially the cognition of human-machine hybrids in future intelligent warfare. Advantages will dominate the battlefield. Cognitive interference, cognitive confusion, cognitive blocking and other means can be used to create a “fog” of war cognition, inducing opponents to misjudge the situation and make wrong decisions and actions.

Cognitive domain operations are full-time offense and defense, full personnel coverage, full use, full domain shaping, and full government action

Cognitive domain operations are all-round, multi-level, hyper-temporal, and cross-domain. They blur the boundaries between wartime and peacetime, front and rear, cross battlefields and national boundaries, go beyond the pure military field, and widely penetrate into politics. , economy, diplomacy and other social fields, showing the characteristics of “five completes”. Full-time offense and defense, there is no distinction between peacetime and wartime, and there is no difference between the front and the rear. It is expressed as being online all the time and in war all the time. Covering all personnel, anyone, including intelligent robots, may become the target of cognitive domain operations. It is used throughout the whole process of joint operations before and during the war. Before the joint military operation is launched, the cognitive shaping operation has begun and will accompany the military operation and will not stop with the military operation. Global shaping, cognitive shaping runs through all levels of strategy, operations, and tactics, and its scope covers all domains of land, sea, air, and space networks. Cross-domain empowerment has an impact on all-domain operations. As a whole-of-government action, cognitive shaping is naturally strategic and requires consistent and coordinated actions across departments, fields, military and localities, and levels to achieve the best communication effect.

The key is to seize control over the right to define the nature of an action or activity, the right to dominate the process, and the right to judge the outcome.

The cognitive game struggle involves multiple opposing parties and seems complicated. The key is to compete for the “three powers” in the cognitive domain. First, fight for the right to define the nature of the event. That is, how to view this incident, whether it is just or unjust, legal or illegal. Usually, pre-emptive definitions, group alliances and forced definitions, information suppression and unilateral definitions, setting issues and applying definitions are usually adopted to guide and shape the public to form qualitative perceptions. Second, compete for dominance over the event process. That is, how to do something, how not to do it, who did it right and who did it wrong, usually by setting up a trap and other methods, trying to dominate the development direction of the target event according to the state that one’s own side expects. Fast and slow, pause, continue and end. Third, compete for the right to judge the outcome of the incident. That is, how to evaluate this matter, who is the gainer and who is the loser, who is the immediate loser, who is the long-term loser, etc. All parties strive to control the outcome of the incident by amplifying their own advantages and amplifying the disadvantages of the enemy. The purpose is to use the extended effect of the incident to continue to harm the enemy and benefit themselves.

Morality and legal principles are the focus of contention between all parties

Military operations have always paid attention to the principle of “discipline and reputation”. Although the shape of war is evolving at an accelerated pace, the essential nature of war as subordinate to politics will not change; the nature of war and the support of people’s hearts are still the key factors that affect the outcome of a war. On the battlefield in the cognitive domain, by occupying the commanding heights of politics, morality, and law, we can win the hearts and minds of the people and moral support, create a public opinion atmosphere in which moral support is abundant, and then seize the opportunity to defeat the enemy. In every war or conflict, whether it is the strong or the weak, whether the attacker, the defender, or a third party, all parties will try their best to seize cognitive dominance and the initiative of public opinion. They will do everything possible to package themselves with morality, focus on declaring a just position, and try to find ways to defend themselves. Qualify the war, justify the action, eliminate resistance, increase support, and create a favorable situation in which “righteousness” defeats “unrighteousness”. The strength balance between the two sides in the war is different, and the cognitive confrontation methods aimed at occupying the moral and legal high ground will also be different. Recent wars have shown that when a party has strong soft and hard power, that is, it has strong military strength, many allies and partners, and a large share of international voice, it often declares war in a high-profile manner; when military actions may trigger chain reactions, it is often handled in a vague manner. The word “war”.

Information is the basic “ammunition” for cognitive attack and defense

In the network information age, the way humans communicate continues to undergo complex and profound changes. On-site interactive interactions have gradually given way to online connections. Some large-scale social platforms have become the main battleground for cognitive games and the main channels for influencing public cognition. Using information as ammunition to fight for the right to block international networks and control discourse has become a common practice today. One of the main actions of confrontation. On these platforms, various short videos have become the “first scene” for the public to understand the war situation, and information travels faster than cannonballs. The use and blocking, dominance and regulation of platforms have become the focus of battles in the cognitive domain. All parties strive to spread and amplify their own propaganda, denounce and suppress the other party’s propaganda by manipulating social platforms, forming a “I say more, you say less” “What I said is right and what you said is wrong” is a situation where “I can only say it and you are not allowed to say it”. As users of large-scale social platforms, the public is influenced by and affects others in the process of “listening”, “speaking” and even “doing”, and unknowingly becomes the agents and attack props of those behind the scenes.

Military operations play a key supporting role in shaping cognition

The history of human war shows that military warfare is always the basic support of political contests, while psychological warfare is the effectiveness multiplier of military warfare. What cannot be retrieved on the battlefield cannot be expected to be retrieved at the negotiation table, let alone in the field of public opinion. In modern warfare, cognitive communication operations always go hand in hand with joint military operations. Mental warfare and military warfare influence and support each other. The trend of military warfare becoming mental warfare and mental warfare becoming military warfare is more obvious. From the perspective of war practice, it is absolutely impossible without military strength, but military actions alone are not omnipotent. Multiple victories on the battlefield are not a sufficient condition for victory in war. In the Vietnam War, although the United States “won every battle, it lost the entire war.” At the beginning of the 21st century, the United States fought successive wars in Iraq and Afghanistan, winning battlefield victories but not political victory. By the same token, military victory does not mean winning public opinion, and winning the battlefield does not mean winning strategic victory. In modern warfare, two types of people play an increasingly important role: those who win by writing thousands of lines of code, and those who win by writing thousands of messages. The side with superior quantity and quality of these two types of personnel will often have a higher probability of winning.

Cognitive countermeasures technology is increasingly used directly in warfare

In past wars, the influence and effect on the cognitive domain were mainly transmitted to the cognitive domain level by level through a large number of damaging actions in the physical domain. With the development and breakthroughs of information communications, artificial intelligence, biocrossing, brain science and other technologies, new cognitive warfare tools and technologies are directly targeting military personnel. Cognitive countermeasures use not only traditional information warfare weapons, but also an arsenal of neural weapons that target the brain. By then, machines will be able to read human brains, and human brains will also be able to directly control machines. Intelligent command and control systems can directly provide battlefield situation and decision-making assistance. Realistic cognitive ammunition and precise audience placement will greatly enhance the social impact. Cognitive countermeasures technology is increasingly being used directly in warfare. The indirect cognition implicit in informatization is gradually transforming into a direct influence and control of people’s cognition. It can be said that with the support of advanced technology, cognitive domain operations can achieve political goals more directly and efficiently by building a modern network architecture and developing a data visualization platform to quickly understand the information environment and effectively influence target groups.

(Author’s unit: Institute of War Studies, Academy of Military Sciences)

原來的 中国军网 国防部网: https://www.81.cn/jfjbmap/content/2022-08/888沒有湯給你.htm