Category Archives: China’s Informatization – 中國信息化

China’s Military Unveils the Metaverse

中國軍隊推出虛擬宇宙

現代英語翻譯:

As if overnight, “metaverse” suddenly became a hot word, and related concepts formed many hot topics.

With the development of technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks, blockchain, and the iteration of terminal equipment, the construction and evolution of the “metaverse” may far exceed people’s expectations, and a new Internet form of multi-dimensional, full-sensory, immersive human-computer interaction will hopefully become a reality.

What is the Metaverse?

“Metaverse” is a term that comes from the 1992 science fiction novel Snow Crash. In the novel, humans live in a virtual three-dimensional world through “Avatar” (digital virtual avatar), and the author calls this space “Metaverse”.

From science fiction to reality, people have not yet reached an absolute consensus on “what is the metaverse”. Due to the evolution of the times and technological changes, the “metaverse” is still an evolving concept. “There are a thousand Hamlets in the eyes of a thousand people”. Different participants are constantly enriching its definition in their own way, and the possibilities of the characteristics and forms of the “metaverse” are also constantly changing. However, we can explore a little through the existing presentation of the “metaverse”.

At present, “Metaverse” concept products are mainly concentrated in online games, VR/AR, social networking and other fields.

Online games are generally considered by the industry to be the most likely field to realize the “metaverse” because they have virtual scenes and players’ virtual avatars. Today, game functions have gone beyond the game itself, and the boundaries of games are expanding, and they are no longer just games.

A well-known singer held a virtual concert with his virtual image in the game “Fortnite”, which attracted more than 12 million players from all over the world to participate, breaking the boundary between entertainment and games; due to the impact of the epidemic, the University of California, Berkeley and the School of Animation and Digital Studies of Communication University of China coincidentally rebuilt their campuses in the sandbox game “Minecraft”. Students gathered together with virtual avatars to complete the “cloud graduation ceremony”, realizing the integration of virtual games and real social interactions.

The new generation of “VR social (virtual offline social)” has gradually developed and become popular. It is a fusion of offline social (face-to-face in reality) and online social (through social software such as WeChat). Some well-known VR social platforms provide a free community environment, which not only becomes a place for players’ online activities and virtual face-to-face gatherings, but also becomes a social and cultural phenomenon closely related to the current concept of “metaverse”.

The above-mentioned “metaverse slices” are all important explorations into the construction of the “metaverse”, and they explain in a variety of visible and tangible ways how the “metaverse” will change our real life.

In common research, the following consensus has been formed: “Metaverse” is a new type of Internet application and social form that integrates multiple new technologies and integrates virtual and real. It provides immersive experience based on extended reality technology, generates virtual and real scenes based on digital twins and 3D rendering technology, builds basic software and hardware services based on cloud computing, artificial intelligence and high-speed networks, and builds an economic system based on blockchain technology, closely integrating the virtual world with the real world in economic system, social system and identity system. At the same time, it allows each user to produce and edit content, and has complete self-driving and iteration capabilities.

The development direction of the “metaverse”

Today’s mobile Internet is actually still in a flat information interaction state, presented on mobile terminals through text, sound, pictures, and videos. Although news information, e-commerce, social chat, live video, etc. meet people’s needs for using the Internet, it is obviously impossible to achieve the effect of face-to-face communication and full sensory experience in real life through the mobile phone screen. With the development of society, people need more original and rich experience and interaction.

The COVID-19 pandemic has forced people to move their daily lives from offline to online. This forced transformation has led to more thinking, discussion and attention on the “metaverse”. In particular, the core feature of the “metaverse” is the immersive experience, which can turn a plane into a three-dimensional, multi-dimensional, real-time interactive space, greatly enriching and restoring the real physical world and various human relationships. Therefore, people have high hopes for the “metaverse”.

Looking back at the development of information technology and media, humans have continuously changed the way they perceive the world, and later began to consciously transform and reshape the world. From the newspaper era, the radio and television era, to the Internet era, and the mobile Internet era, the tools and platforms under the concept of “metaverse” are becoming increasingly complete, and the path to the “metaverse” is gradually becoming clearer.

Since 2020, Internet giants in various countries have been closely deploying cutting-edge technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks and blockchain, and the door to the ultimate closed-loop ecosystem of the “metaverse” has been opened little by little. Today, when the “bonus” of mobile Internet users has peaked, many experts and scholars have stated that the “metaverse” will be the ultimate form of the next generation of the Internet.

Just as it was difficult to accurately predict the development of the Internet 20 years ago, people cannot accurately predict the future form of the “metaverse”. However, combined with the development trends of related industries today, we can see that: the Internet has changed human life and digitized communication between people, and the “metaverse” will digitize the relationship between people and society; the technologies related to the “metaverse” will show gradual development, single-point technological innovations will continue to appear and merge, and all aspects of the industry will move closer to the ultimate form of the “metaverse”; the “metaverse” will emerge with a large amount of user-generated content, and at the same time, the value of digital assets will be revealed.

In general, the “metaverse” will profoundly change the organization and operation of the existing society through the integration of the virtual and the real, form a new lifestyle with both virtual and real poles, give birth to a new social relationship that integrates online and offline, and give new vitality to the real economy from the virtual dimension.

The future physical “metaverse” will be similar to the scene described in the science fiction movie “Ready Player One”: one day in the future, people can switch identities anytime and anywhere, freely shuttle between the real world and the virtual world, and study, work, make friends, shop, travel, etc. in the “metaverse”. Through immersive experience, the virtual world will be closer to and integrated into the real world.

In this virtual world, there will be self-evolving content and economic systems that will always remain safe and stable to meet the social needs of individuals.

The mediating role of the “metaverse”

“Imagine the ‘metaverse’ as a physical Internet, where you are not just watching content, but you are fully immersed in it.” This is a vivid description. However, as far as the current situation is concerned, the content of these “metaverses” that allow “full immersion” is relatively scarce. It needs more content that can be independently written, self-iterated, and multi-dimensionally attract users to participate in the experience and even participate in the creation.

The “metaverse” is bound to become a brand-new platform for media content production. Content producers can transform the “small universe” into the “big universe” through rich content production. In the short term, the breakthrough of the “metaverse” is immersive content. With the development and penetration of the concept of “metaverse”, the integration of immersive virtual content (such as games, cartoons, etc.) and immersive physical content (such as media, social networking, film and television, etc.) will become higher and higher. In other words, the “metaverse” will play a greater role as a medium.

In September this year, Yu Guoming, a professor at the School of Journalism and Communication of Beijing Normal University, pointed out at the release conference of the “2020-2021 “Metaverse” Development Research Report”: “Today, the role of the media is generally to provide cognitive information, but the role of the media is completing a process from providing cognition to providing experience. The entire media and technology has undergone a huge transformation from cognitive development to experience. Once the goal of “Metaverse” is established, it will play a directional role in communication technology, communication forms, communication methods and even communication effects.” If the “Metaverse” is the ultimate form of the next generation of the Internet, then it is a super media channel that will show the ultimate form of media convergence and provide the best immersive experience.

Theoretically, the best communication experience must be based on real scenes. For example, when watching a football game, the ideal situation is to watch it in person on the field. In the “metaverse”, with the development of display interaction, high-speed communication and computing technology, it will become a reality to construct a communication scene that is infinitely close to reality. Users can become “witnesses” and “on-site observers” of news events in a three-dimensional, multi-sensory reception situation.

Therefore, the “metaverse” media can achieve true “multimedia”, and various human senses such as vision, smell, hearing, taste, touch, etc. can play a role, and even fully unfold and cooperate with each other to achieve “immersive” media applications.

Today’s media content is constantly evolving and innovating, and its development trend seems to be moving closer to the concept of “metaverse”. Media content will no longer be limited to flat presentation methods such as TV, computer, and mobile phone screens. Media content production will consider holographic presentation more, pay attention to creating an on-site environment atmosphere, and make users feel immersive. Social interaction will no longer be limited to text messages and comments. Feelings can be expressed instantly with voice and body movements, and face-to-face communication can be virtualized on the spot.

Imagine if news reports could restore the war scene and create a “battlefield metaverse”, making people feel as if they were there and feel in real time the tremendous trauma that war has caused to human civilization. This shock would further stimulate human society’s desire and yearning for peace, and media content would have a stronger influence and dissemination power.

現代國語:

彷彿在一夜之間,「元宇宙」突然成為熱詞,相關概念形成許多熱門話題。

隨著擴展現實、數位孿生、3D渲染、雲端運算、人工智慧、高速網路、區塊鏈等技術的發展及終端設備的迭代,「元宇宙」建設和演變可能遠超人們的預期,多維度、全感官、沉浸式的人機互動新網路形態,將有望成為現實。

何為“元宇宙”

“元宇宙”,英文為“Metaverse”。此字出自1992年的科幻小說《雪崩》。小說中,人類透過“Avatar”(數位虛擬化身),在一個虛擬三維世界中生活,作者稱這個空間為“Metaverse”,即“元宇宙”。

從科幻走進現實,人們對「元宇宙是什麼」還未能達成一個絕對標準的共識。因為時代的演變、技術的變革,“元宇宙”仍是一個不斷發展的概念,“一千個人眼中就有一千個哈姆雷特”,不同參與者以自己的方式不斷豐富著它的定義,“元宇宙」特徵和形態的可能性也在不斷變化。不過,我們可透過「元宇宙」現有的呈現形態來探討一二。

目前,「元宇宙」概念產品主要集中在網路遊戲、VR/AR、社交等領域。

網路遊戲被業界普遍認為是最有可能實現「元宇宙」的領域,因為它本身就具有虛擬場景和玩家的虛擬化身。如今,遊戲功能已超越遊戲本身,遊戲邊界正在擴展,甚至不只是遊戲了。

知名歌手在遊戲《要塞英雄》中,以虛擬形象舉辦一場虛擬演唱會,吸引了全球超過1200萬玩家參與其中,打破了娛樂與遊戲的邊界;因為疫情影響,美國加州大學柏克萊分校、中國傳媒大學動畫與數位學院不約而同地在沙盤遊戲《我的世界》裡重建校園,學生們以虛擬化身齊聚一堂,完成“雲畢業典禮”,實現了虛擬遊戲和現實社交的融合。

新一代「VR社交(虛擬線下社交)」已在逐漸發展和流行。它是線下社交(現實面對面)、線上社交(透過微信等社群軟體)的融合產物。一些知名VR社交平台,提供自由的社區環境,不僅成為玩家線上活動與虛擬面對面聚會的場所,也成了一種與目前「元宇宙」概念密切相關的社會文化現象。

以上這些“元宇宙切片”,都是對建構“元宇宙”的重要探索,用多種看得見、摸得著的方式,詮釋了“元宇宙”將會如何改變我們的現實生活。

在通常研究中,一般形成了這樣的共識:「元宇宙」是整合多種新技術而產生的新型虛實融合的網路應用和社會形態。它基於擴展現實技術提供沉浸式體驗,基於數位孿生和3D渲染技術生成虛實場景,基於雲端運算、人工智慧和高速網路建立基礎軟體硬體服務,基於區塊鏈技術建立經濟體系,將虛擬世界與現實世界在經濟系統、社交系統、身分系統上密切融合。同時,允許每個使用者進行內容生產和編輯,具備完整的自我驅動和迭代能力。

「元宇宙」發展走向

現今的行動互聯網,其實仍是平面資訊互動狀態,透過文字、聲音、圖片、視訊方式在行動終端進行呈現。新聞資訊、電子商務、社群聊天、視訊直播等型態,雖然滿足了人們使用網路的需求,但隔著手機螢幕,顯然無法達到現實生活中面對面交流、全感官體驗所能達到的效果。隨著社會發展,人們需要更原生、更豐富的體驗與互動。

新冠疫情讓人們生活場景從線下更多地移到線上。這種被迫的轉變,讓大家對「元宇宙」有了更多思考、討論和關注。特別是「元宇宙」最核心的特徵,在於沉浸式體驗,它可將一個平面變成一個立體、多維、即時的互動空間,極大地豐富、還原真實物理世界和人類各種關係。因此,「元宇宙」被人們寄予厚望。

縱觀過往資訊科技和媒介的發展歷程,人類不斷改變認知世界的方法,乃至於後來開始有意識地改造和重塑世界。從報業時代、廣播電視時代,到網路時代、行動網路時代,「元宇宙」概念下的工具和平台日益完備,通往「元宇宙」的路徑逐漸清晰。

自2020年以來,各國網路大廠圍繞著擴展實境、數位孿生、3D渲染、雲端運算、人工智慧、高速網路和區塊鏈等前沿科技,展開緊密佈局,通往「元宇宙」終極閉環生態的大門被一點點打開。在行動網路用戶「紅利」已經見頂的今天,不少專家學者表示,「元宇宙」將是下一代網路的終極形態。

如同20年前難以精準預測網路的發展一樣,人們也無法精準預判未來「元宇宙」的形態。但是,結合當今相關產業發展趨勢可以看到:互聯網改變人類生活,將人與人交流數位化,而「元宇宙」將把人與社會關係數位化;「元宇宙」相關技術將呈現漸進式發展,單點技術創新將不斷出現與融合,從產業各方面向「元宇宙」終極形態靠近;「元宇宙」將湧現海量用戶創作內容,同時顯現數位資產價值問題。

概括地說,「元宇宙」將以虛實融合的方式,深刻改變現有社會的組織與運作,形成虛、實兩極的新型生活方式,催生線上、線下一體的新型社會關係,並從虛擬維度賦予實體經濟新的活力。

未來實體化的“元宇宙”,將類似於科幻電影《頭號玩家》裡描述的場景:在未來的某一天,人們可隨時隨地切換身份,自由穿梭於現實世界和虛擬世界,在“元宇宙”中學習、工作、交友、購物、旅遊等。透過沉浸式體驗,讓虛擬世界進一步接近並融入現實世界。

在這個虛擬世界裡,將有自我不斷發展的內容和經濟系統,並且始終保持安全穩定運行,滿足個體的社會需求。

「元宇宙」的媒介作用

「把『元宇宙』想像為一個實體互聯網,你在那裡不只是觀看內容,整個人都身在其中。」這是一個圖像描述。可就現狀而言,這些能讓“整個人都身在其中”的“元宇宙”,內容是相對匱乏的。它需要更多可以獨立成篇、自我迭代、多維立體地吸引使用者參與體驗甚至參與創作的內容。

「元宇宙」勢必成為媒體內容生產的嶄新平台。內容生產者透過豐富的內容生產,可將「小宇宙」演變成「大宇宙」。短期內,「元宇宙」的突破口是沉浸式內容。隨著「元宇宙」概念的發展與滲透,沉浸式虛擬內容(如遊戲、卡通等)與沉浸式實體內容(如媒體、社交、影視等)的融合程度將會越來越高。換句話說,「元宇宙」將發揮更大的媒介作用。

今年9月,北京師範大學新聞與傳播學院教授喻國明在《2020-2021年「元宇宙」發展研究報告》發布會議上指出:「如今媒介所扮演的角色大體上都是認知方面的訊息給予,但媒介的角色正在完成一個從給予認知到給予體驗的過程。甚至傳播效果,都能起到一個定向作用。體驗。

從理論上講,最好的傳播體驗必然是基於真實場景。如看球賽,理想情形是在球場上親身觀看。在「元宇宙」裡,隨著顯示互動、高速通訊和運算技術的發展,建構無限逼近真實的傳播場景將成為現實,使用者能在立體化、多感官接收情境中,成為新聞事件的「目擊者」和「實地觀察者」。

因而,“元宇宙”媒體可實現真正的“多媒體化”,人類的各種感官如視覺、嗅覺、聽覺、味覺、觸覺等,都能發揮作用,甚至完全展開、相互配合,實現“沉浸式”的媒體應用。

當今媒體內容不斷進化和創​​新,其發展趨勢也似乎正在向「元宇宙」概念靠攏。媒體內容將不再侷限於電視、電腦、手機螢幕等平面式的呈現方式,媒體內容製作將更考慮全像化呈現,重視營造現場環境氛圍,使用戶有身臨其境之感。社交也將不再侷限於文字留言評論,可即時用語音、肢體動作來抒發感受,現場虛擬化面對面交流。

設想一下,如果新聞報道能還原戰爭現場,打造“戰場元宇宙”,使人如身臨其境,實時感受到戰爭對於人類文明造成的巨大創傷,這份震撼會更能刺激人類社會對於和平的渴望與嚮往,媒體內容將具備更強大的影響力與傳播力。

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2021-11/26/content_303888.htm

Chinese Military Analysis of Japan’s Space and Cyberspace Deterrence Strategy

中國對日本太空和網路空間威懾戰略的軍事分析

現代英語:

The development of new military forces is changing the style of warfare. After years of development, space (also known as outer space) and cyberspace (hereinafter referred to as cyberspace) forces have transformed from conceptual forces to real forces. How to use these two new forces has become a key research topic for major powers in the world. In March 2024, the Security Research Group of the Sasakawa Peace Foundation of Japan released a research report entitled “War 3.0: Fundamental Changes in War” (hereinafter referred to as the “Report”), which explored how to use space and cyberspace to achieve strategic deterrence from the perspective of maintaining Japan’s national security. It also proposed a typical scenario of cyberspace confrontation against the background of an emergency in the Taiwan Strait, showing Japan’s thinking on the use of combat forces in emerging fields. The main contents are summarized as follows for readers.

1

War 3.0 is coming

The report believes that during the Cold War, the boundaries between civilians, the state and the military were clear, and the economic dependence between the two sides was low. This was the era of War 1.0. After the Cold War, globalization accelerated, and in 2001, the era of the war on terror began. The main body of the confrontation became state and non-state actors, which was the era of War 2.0. Around 2010, the confrontation between major powers reappeared. Due to the high degree of economic globalization, “war” occurred more in dimensions other than military. The conflict between Russia and Ukraine shows that in modern warfare, other means are becoming as important as military means. At the same time, commercial companies are also more involved in the research and development and use of emerging military technologies, and the government’s control over military power has been weakened. Since then, a new concept can be used to describe modern warfare, namely War 3.0.

As long as war occurs in the context of globalization, the characteristics of War 3.0 will appear. In the era of War 3.0, the target of deterrence is mainly state actors, but the specific form of conflict may be similar to hybrid warfare or conventional warfare. When formulating deterrence strategies in the space and cyberspace domains, both types of conflict should be taken into account. It is necessary to recognize that emerging domain capabilities are multipliers of traditional capabilities. The significance of competing for control in emerging domains lies in enhancing one’s own physical forces such as land, sea, and air forces or weakening the physical forces of opponents.

The report points out that using emerging field forces to carry out attacks can cause no tangible physical damage, is conducive to conflict management, and is the best tool for gray zone operations. Japan currently faces two main problems. One is that the emerging field forces owned by law enforcement agencies are not in line with mission requirements. The other is that it needs to consider how to use emerging field forces to achieve effective conflict management.

2

Strategic Deterrence in Emerging Fields

The report uses traditional deterrence theory for analysis and concludes that space and cyberspace have five common characteristics: difficult situational awareness, high defense difficulty, low attack threshold, mixed actors, and lack of international codes of conduct. Easy to attack and difficult to defend are the common characteristics of these two fields, so it is difficult to achieve effective strategic deterrence. In this regard, action should be taken in four aspects: First, improve situational awareness capabilities so that when problems occur, the cause of the failure can be quickly determined, the attacker can be identified, and the damage effect can be evaluated when counterattacked. Second, improve resilience to ensure that the loss of some functions will not cause the entire system to become disabled. Third, strengthen offensive capabilities, which can be used to attack in a certain field, or to use means in other fields to conduct cross-domain attacks. Fourth, achieve arms control cooperation between countries and build trust, formulate codes of conduct, etc.

3

Strengthening deterrence in air and space

1. The connotation of air and space control continues to be enriched

The report believes that the air and space can control the entire battlefield. In order to compete for air and space dominance, various types of equipment are constantly updated, combat systems are becoming more and more complex, and the scope of operations is becoming wider and wider. In combat, both sides often focus on the “find, locate, track, decide, engage, and assess (Find Fix Track Targeting Engage Assess, F2T2EA)” full kill chain, and simultaneously confront in emerging fields such as space, cyberspace, and electromagnetic space, which greatly expands the connotation of traditional dominance. In future high-end wars, the side with a higher level of space, cyberspace, and electromagnetic space capabilities may have an overwhelming advantage in overall combat capabilities.

2. How to exert the deterrent function of space power

The report emphasizes that space systems play an important role in intelligence collection, surveillance and reconnaissance (ISR), communications, positioning, navigation and timing (PNT), missile warning, environmental monitoring, etc., and also provide increasingly important support for the use of nuclear and conventional forces. In order to form a strong space deterrence, first, we must possess and demonstrate the corresponding capabilities, mainly the resilience, defense, counter-retaliation and situational awareness capabilities of the space system. Second, we must show the enemy our determination to use retaliatory capabilities. Third, we must form a cross-domain deterrence to ensure the security of the entire space system. In addition, systems in other fields such as land, sea and air must be able to supplement some of the functions of the space system. In the face of enemy attacks on our satellites, we must retaliate not only from space, but also through land, sea, air and cyberspace.

As space systems play an increasingly important role in Japan’s national defense, we will further enhance our deterrence against hostile offensive actions. While improving the resilience of space assets, we will attach great importance to the effective use of commercial space services.

3. How to enhance the deterrent effect of Japan’s aerospace power

The report points out that Japan should attach importance to cross-domain coordination of sea, land, air and space forces, especially to strengthen cooperation with the United States. It is necessary to closely monitor the surrounding airspace, use aircraft to perform denial missions when the situation escalates, and take active defense measures to prevent missile attacks. It is necessary to strengthen the construction of Self-Defense Force bases and realize the mutual use of air bases between Japan and the United States. Japan is surrounded by the sea, and it is necessary to attach importance to developing the ability to use air means to strike maritime targets to ensure the security of the homeland.

Faced with the vast Indo-Pacific region, it is difficult for Japan to accurately grasp the regional situation by relying solely on its own aerospace power. It is necessary to share intelligence information through multilateral cooperation and build a Common Operational Picture (COP) in the Indo-Pacific region to accurately and comprehensively grasp the regional situation and have a deterrent effect on potential enemies. It is necessary to strengthen cooperation with countries other than the United States, especially Australia. Japan, the United States and Australia should establish joint ammunition and fuel depots in their respective countries. In the field of space, Japan will expand cooperation in hosting payloads. If it can cooperate with European countries, then future attacks on Japanese satellites can be regarded as attacks on multiple countries. It is becoming increasingly important to make full use of the power of allies and use their aerospace power to achieve deterrence goals.

4

Strengthening Deterrence in Cyberspace

1. Characteristics of Cyberspace Operations

The report believes that cyberspace has an increasing impact on the course of war, and cyberspace combat capabilities can even deter the occurrence of an entire conflict. Cyberspace security plays an important role in protecting various systems from cyber attacks, ensuring that confidential information is not leaked, and ensuring the normal operation of other systems such as critical infrastructure. It is also of great significance for cognitive domain protection.

There are two main characteristics of cyberspace at present. First, the boundary between military and civilian is blurred. The potential of military application of Internet is constantly emerging. In the conflict between Russia and Ukraine, the artillery combat management system (GIS Art for Artillery, GIS ARTA) used by Ukraine is to send data through drones and smartphones to determine the target location and launch attacks, which is very effective. Second, the security concept based on closed system is outdated. Even with physical isolation, it is impossible to completely prevent attacks. Cyberspace is easy to attack but difficult to defend, and the offense and defense are asymmetric. In addition, cyberspace operations can control the rhythm of conflict escalation in a low-intensity form, and can also be upgraded to a powerful weapon with high-intensity offensiveness after the official outbreak of military conflict.

2. Developing emerging technologies to enhance cyber warfare capabilities

The report points out that the development of emerging technologies will continue to change the rules of warfare, and the Japanese Ministry of Defense has begun to study the use of cloud computing to build a basic computing environment. It plans to build a diversified network environment, use Starlink satellites and 5G networks to provide Internet services, and consider enabling the new Internet communication protocol QUIC (Quick UDP Internet Connection). The first quantum computer has been developed, and related research on anti-quantum cryptography has been carried out. At the same time, it also pays close attention to the specific ways of combining artificial intelligence with cyber warfare.

3. Ways to strengthen cyber deterrence

The report emphasizes that the development of artificial intelligence technology and the adjustment of the network component supply chain are two uncertain factors. Japan should focus on improving its cyber warfare capabilities from the following aspects: (1) vigorously promote intelligence information sharing; (2) build active defense systems; (3) introduce zero trust and risk management frameworks; (4) establish the ability to attack adversary networks; (5) accelerate legislation in the field of cybersecurity; (6) expand the scale of talent training and increase support for commercial enterprises. By carrying out the above work, Japan can achieve early detection and response to cyber attacks. Even if it encounters a cyber attack, it can be discovered, processed and recovered at an early stage to ensure the resilience of the system to continue to operate. In addition, when Japan is attacked, it should coordinate actions with the US military. In peacetime, joint training should be strengthened so that it can carry out joint operations with the Cyber ​​Mission Force (CMF) composed of relevant forces of the US Cyber ​​Command.

Responsible for directing, coordinating and conducting cyber operations

5

Conception of cyberspace combat scenarios

The report describes a basic scenario of cyber warfare between the Red and Blue sides, with the Taiwan Strait incident as the background, and puts forward the following important viewpoints: First, when the Blue side has an absolute advantage, the Blue side should focus on taking defensive actions to achieve deterrence. When the forces of the two sides tend to be balanced, the Blue side should actively take offensive actions to seize the initiative. Second, the Blue side can launch cyber attacks around the Red side’s observation, adjustment, decision-making, and action (OODA) links to weaken the Red side’s military capabilities, especially its maritime and landing combat capabilities, and carry out “anti-military cyber attack missions.” When necessary, strike the Red side’s social infrastructure to weaken its overall strength. At the same time, take cyber attacks to induce and divide public opinion, weaken the Red side’s willingness to take action, and carry out “anti-value cyber attack missions.” Third, in the anti-military cyber attack mission, the Blue side can attack the Red side’s aircraft, and can also take measures such as data pollution, deception cloud, and communication network interruption to attack the Red side’s command and control system. In the action of attacking the civilian network system, cyber attacks can be carried out on key entities of railway and ship operations in the Red coastal areas and key infrastructure such as the power grid in coastal metropolises that support social and economic systems. There are also options for attacking Red Team financial systems, media servers, and water and gas supply networks.

In order to deal with possible cyber attacks from the Red side in the event of an emergency in the Taiwan Strait, Japan should do the following: First, adopt an active defense strategy, require commercial operators to share information with the government, and introduce artificial intelligence to improve cyber situational awareness and network resilience. Second, introduce a large-scale data forensics platform to identify the authenticity of massive image data and counter false information. Third, give priority to countermeasures against domestic cyber attacks, effectively defend the networks of defense, government departments, law enforcement agencies and private enterprises through various active cyber defense measures, and deal with cognitive domain actions against the Japanese public.

6

Conclusion

The report proposed the concept of War 3.0 and launched a series of discussions on achieving cyberspace and space deterrence. While suggesting strengthening its own relevant capacity building, it repeatedly emphasized the need to strengthen cooperation with the United States, especially with countries related to the Quadrilateral Security Dialogue (QUAD) and AUKUS. With Japan’s application to join AUKUS on April 25, 2024, the Asia-Pacific version of the “mini-NATO” alliance has taken shape, and regional peace and stability will be severely impacted.

Disclaimer: This article is reprinted from Military High-Tech Online, the original author is Shi Honglin. The content of the article is the original author’s personal opinion. This public account is translated/reprinted only for sharing and conveying different opinions. If you have any objections, please contact us!

Reprinted from Military High-Tech Online

Author: Shi Honglin

Introduction to the Institute

The International Institute of Technology and Economics (IITE) was established in November 1985. It is a non-profit research institution affiliated to the Development Research Center of the State Council. Its main functions are to study major policy, strategic and forward-looking issues in my country’s economic, scientific and technological social development, track and analyze the development trends of world science and technology and economy, and provide decision-making consulting services to the central government and relevant ministries. “Global Technology Map” is the official WeChat account of the International Institute of Technology and Economics, dedicated to delivering cutting-edge technology information and technological innovation insights to the public.

Address: Block A, Building 20, Xiaonanzhuang, Haidian District, Beijing

Tel: 010-82635522

繁體中文國語:

新領域軍事力量的發展正在改變戰爭樣式,其中太空(也稱為外層空間)和網路空間(以下簡稱網空)力量經過多年的發展,已由概念力量轉變為現實力量。如何利用這兩種新質力量,已成為世界各主要強國重點研究的內容。 2024年3月日本笹川和平財團安全研究小組發布研究報告《戰爭3.0:戰爭的根本變化》(以下簡稱《報告》),從維護日本國家安全的角度出發,探討如何利用太空和網空實現戰略威懾等問題,並以台海突發事件為背景,提出了一個網空對抗的典型場景,展示了日本在運用新興領域作戰力量上的思考。現將其主要內容整理如下,以颯讀者。

01

戰爭3.0時代到來

《報告》認為,在冷戰時期,平民、國家和軍隊之間的界線很清晰,對峙雙方經濟依賴度較低,此時是戰爭1.0時代。冷戰後全球化加速發展,2001年進入反恐戰爭時代,對抗的主體變成國家與非國家行為體,此時是戰爭2.0時代。 2010年前後大國對抗再次出現,由於經濟全球化發展程度較高,「戰爭」較多發生在軍事以外的維度。俄烏衝突顯示在現代戰爭中,其他手段正變得與軍事手段同等重要。同時,商業公司也更參與新興軍事技術的研發和使用,政府對軍事力量的控製程度受到了削弱。自此可以用一個新的概念來描述現代戰爭,即戰爭3.0。

只要戰爭在全球化背景下發生,就會出現戰爭3.0所包含的特徵。進入戰爭3.0時代,威懾的目標主要是國家行為體,但具體衝突形式可能類似混合戰爭,也可能是常規戰爭。在製定太空和網空領域威懾戰略時,要同時考慮這兩類衝突形式。要體認到新興領域能力是傳統能力的倍增器,爭奪新興領域制權的意義,在於提升己方陸、海、空軍等實體力量或削弱對手的實體力量。

《報告》指出,運用新興領域力量實施攻擊,可以不造成有形的物理破壞,有利於管控衝突,是在灰色地帶行動的最佳工具。日本當前主要面臨兩個問題,一是執法機構擁有的新興領域力量和任務需求不相適應。二是需要考慮具體如何運用新興領域力量,以達到衝突的有效管控。

02

新興領域的戰略威懾

《報告》利用傳統威懾理論進行分析,得出太空和網空具有五個共同特徵:態勢感知難、防禦難度大、攻擊門檻低、行動主體混雜、缺乏國際行為準則。易攻難守是這兩個領域的共同特點,因此較難實現有效的戰略威懾。對此,應從四個方面採取行動:一是提高態勢感知能力,以便在出現問題後,能夠迅速確定故障原因,識別攻擊者,並在反擊時評估毀傷效果。二是提升復原力,確保喪失部分功能不會導致整個系統失能。三是強化進攻能力,可在某一領域進行攻擊,也可利用其他領域手段進行跨域攻擊。四是實現國家間軍備控制合作並建立信任,制定行為準則等。

03

加強空中和太空的威懾

(一)空天制權的內涵不斷豐富

《報告》認為,空中和太空可以瞰整個戰場,為爭奪空天制權,各類裝備不斷更新,作戰系統越來越複雜,作戰範圍也越來越寬廣。在作戰中,雙方往往會圍繞「發現、定位、追蹤、決策、交戰、評估(Find Fix Track Targeting Engage Assess,F2T2EA)」全殺傷鏈各環節,在太空、網空、電磁空間等新興領域同時進行對抗,大大拓展了傳統制權的內涵。在未來高端戰爭中,利用太空、網空和電磁空間能力水準較高的一方,可能會在整體作戰能力上擁有壓倒性的優勢。
(二)如何發揮太空力量的嚇阻功能

《報告》強調,太空系統在情報收集、監視和偵察(Intelligence, Surveillance, and Reconnaissance,ISR),通信,定位、導航和授時(Positioning, Navigation and Timing, PNT),導彈預警,環境監測等方面發揮著重要作用,也為使用核武力量和常規力量提供越來越重要的支持。為了形成強大的太空威懾,一要擁有並展現對應能力,主要是太空系統的復原力、防禦力、反制報復能力以及態勢感知能力。二要向敵方展示使用報復能力的決心。三要形成跨域威懾以確保太空全系統安全。此外,陸海空等其他領域系統要能補充太空系統的部分功能,面對敵方對己方衛星的攻擊,不僅要從太空報復,還要透過陸海空和網空進行報復。

由於太空系統在日本國防中的作用越來越大,所以要進一步提升對敵對進攻行為的威懾。在提升太空資產復原力的同時,要高度重視商業太空服務的有效運用。

(三)如何增強日本空天肌力嚇阻效果

《報告》指出,日本應重視海陸空天力量的跨域協同,特別是加強與美國的合作。若要緊密監視週邊空域,在局勢升級時使用飛機執行拒止任務,採取主動防禦措施,防止遭遇飛彈攻擊。要加強自衛隊基地建設,實現日美兩國空軍基地的互相使用。日本四面環海,要重視發展使用空中手段打擊海上目標的能力,以確保本土安全。

面對廣袤的印太地區,日本僅靠自身的空天力量,難以準確掌握區域態勢,要透過多邊合作分享情報訊息,建構印太地區通用作戰態勢圖(Common Operational Picture, COP),以精準全面地掌握地區態勢,對潛在敵人產生嚇阻效果。要加強與美國以外的國家,特別是澳洲的合作。日本、美國和澳洲應在各自國家建立聯合彈藥和燃料庫。在太空領域,日本將拓展託管有效載荷合作,如能和歐洲國家合作,那麼未來攻擊日本衛星的行為,將可以被視為對多個國家的攻擊。要充分借助盟友力量,利用其空天力量達成威懾目的,這一點正變得越來越重要。

04

加強網空的威懾

(一)網空作戰的特點

《報告》認為,網空對戰爭進程的影響越來越大,而網空作戰能力甚至可以嚇阻整個衝突的發生。網空安全對於保護自身各類系統免受網路攻擊、確保機密資訊不會外洩、確保關鍵基礎設施等其他系統正常運作發揮重要作用,對於認知域防護也有著十分重大的意義。

目前網空主要有兩個特點,一是軍民界線模糊。網路的軍事應用潛力不斷顯現,在俄烏衝突中,烏克蘭使用的砲兵作戰管理系統(GIS Art for Artillery, GIS ARTA),就是透過無人機和智慧型手機,發送資料確定目標位置並發動攻擊,且非常有效。二是基於封閉系統的安全觀念已經過時。即便是進行物理隔離,也不可能完全防止被攻擊,網空易攻難守,攻防呈現不對稱特徵。此外,網空作戰既可以低強度形式控制衝突升級的節奏,也可以在正式爆發軍事衝突後,升級為具有高強度攻擊性的強大武器。
(二)發展新興科技提升網路戰能力

《報告》指出,新興技術的發展將持續改變作戰規則,日本防衛省已開始研究使用雲端運算建構基本運算環境。計畫建置多樣化網路環境,使用「星鏈」衛星和5G網路提供網路服務,考慮啟用新的網路通訊協定QUIC(Quick UDP Internet Connection)。已研發首台量子計算機,並進行反量子密碼的相關研究。同時,也高度關注人工智慧與網路戰結合的具體方式。

(三)強化網空威懾的辦法

《報告》強調,人工智慧技術的發展和網路部件供應鏈的調整是兩個不確定的影響因素。日本應著重從以下幾點提升網路戰能力:(1)大力促進情報資訊共享;(2)建構主動防禦系統;(3)引入零信任和風險管理框架;(4)建立攻擊對手網路的能力; (5)加速網路安全領域立法;(6)擴大人才培育規模,增加對商業企業的支持。透過進行以上工作,日本可以實現提前發現和應對網路攻擊。即使遭遇網路攻擊,也可在早期階段發現、處理和恢復,確保系統繼續運作的彈性。此外,當日本受到攻擊時,要與美軍協調行動。平時要加強聯合訓練,以便能夠與由美國網路司令部相關部隊組成網路任務部隊(The Cyber​​ Mission Force, CMF)實施聯合行動。
負責指導、協調和執行網路行動

05

對網空作戰場景的構想

《報告》以台海突發事件為背景,描述了一個紅藍雙方網路戰的基本場景,提出了以下幾個重要觀點:一是當藍方擁有絕對優勢時,藍方應側重於採取防禦行動實現威懾。當雙方力量趨於平衡時,藍方則應積極採取攻擊行動以爭取主動權。二是藍方可以圍繞紅方觀察、調整、決策、行動(Observe Orient Decide Act, OODA)的各環節展開網絡攻擊,削弱紅方軍事能力,特別是海上作戰和登陸作戰能力,開展「反軍事網絡攻擊任務」。在必要時候打擊紅方社會基礎設施,削弱其整體實力。同時,採取網路攻擊誘導和分裂公眾輿論,削弱紅方採取行動的意願,進行「反價值網路攻擊任務」。第三是在反軍事網路攻擊任務中,藍方可以攻擊紅方飛機,還可以採取資料污染、欺騙雲以及通訊網路中斷等措施,攻擊紅方指控系統。在攻擊民用網路系統的行動中,可以對紅方沿海地區鐵路和船舶運營的關鍵實體以及支持社會和經濟系統的沿海大城市電網等關鍵基礎設施進行網路攻擊。還可以選擇攻擊紅方金融系統、媒體伺服器以及供水和天然氣供應網路。

為因應台海突發事件發生時紅方可能的網路攻擊,日本應做好以下幾點:一是採取主動防禦策略,要求商業業者要與政府分享訊息,引入人工智慧以提高網空態勢感知和網路彈性。二是引進大規模資料取證平台以辨識海量影像資料的真實性,反制假資訊。第三是優先採取針對本國網路攻擊的反制措施,透過各種積極網路防禦措施有效保衛防衛、政府部門、執法機構和私人企業的網絡,並處理針對日本公眾的認知域行動。
06

結語

該報告提出了戰爭3.0的概念,圍繞實現網空和太空威懾展開了一系列論述,在建議加強自身相關能力建設的同時,多次強調要加強與美國,特別是四方安全對話(Quadrilateral Security Dialogue, QUAD)和奧庫斯(AUKUS)相關國家的合作。隨著2024年4月25日日本申請加入“奧庫斯”,亞太版的“小北約”聯盟已現雛形,地區和平穩定將受到嚴重衝擊。

免責聲明:本文轉自軍事高科技在線,原作者史宏林。文章內容係原作者個人觀點,本公眾號編譯/轉載僅為分享、傳達不同觀點,如有任何異議,歡迎聯絡我們!

轉自丨軍事高科技在線

作者丨史宏林

研究所簡介

國際技術經濟研究所(IITE)成立於1985年11月,是隸屬於國務院發展研究中心的非營利研究機構,主要功能是研究我國經濟、科技社會發展中的重大政策性、策略性、前瞻性問題,追蹤分析世界科技、經濟發展態勢,為中央和相關部會提供決策諮詢服務。 「全球技術地圖」為國際技術經濟研究所官方微信帳號,致力於向大眾傳遞尖端技術資訊與科技創新洞見。

地址:北京市海淀區小南莊20號樓A座

中文原文來源:https://www.163.com/dy/article/J5UO0ID90514R8DE.html

Chinese Military Values Attack & Defense as the Important Focus of Combat in Cognitive Domain Operations

中國軍隊把攻防當作認知域作戰作戰的重要著力點

現代英語翻譯:

Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.

Characteristics of the cognitive domain of value attack and defense

Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:

Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values ​​and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.

Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values ​​are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.

Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.

The mechanism of cognitive domain of value attack and defense

Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.

Impacting the value “protection zone”. Occupying the commanding heights of values ​​is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values ​​and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values ​​from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values ​​that are beneficial to themselves in order to achieve combat objectives.

Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.

Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.

The main means of cognitive domain in value attack and defense

Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.

Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.

Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.

In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.

現代國語:

價值攻防是從戰略層面進行認知域作戰的重要方式,通常價值攻防是透過幹預人的思維、信念、價值觀等,以達成瓦解敵方共識,摧毀敵方意志,進而掌控戰場綜合控制權的目的。精確掌握價值攻防的特性、機制、手段,對奪取未來認知域作戰優勢至關重要。

價值攻防作用認知域的特點

價值攻防是指透過引發個體或群體的深層邏輯思辨、價值判斷改變,完成其對相對穩定的認知結果的干預和影響,以期重構人的意志、思維、心理、情感等認知能力。價值攻防主要有以下幾個特點:

軟性對抗。傳統戰爭主要依賴暴力手段來削弱瓦解敵方的軍事能力,通常具有較強的戰爭強度。認知域作戰將不再侷限於攻城略地等硬性對抗,而更著重於圍繞價值陣地展開滲透與逆滲透、攻擊與反攻擊、控制與反控制,透過爭奪認知域對抗的主導權,進一步激發物理域和資訊域的作戰效能,從而奪取戰場主動,甚至達到不戰而屈人之兵的效果。在實踐中,價值攻防往往著眼於一個國家、民族的文化傳統、價值觀念和社會心理展開,最終達到對敵方意志摧毀、認知操縱、精神控制的目的。

全維度釋放。現代戰爭日益呈現總體性、多域性、全時性特徵。認知域作戰旨在透過幹預人的意識進而影響戰場效果,而意識的相對穩定決定了人的世界觀、信仰等價值觀念一般情況下往往較為穩固,因此價值攻防需要長期的、不間斷的、全息全維度地進行。從時間上看,價值攻防模糊了平戰邊界,常態在戰、隨時在戰,持續積累、逐步釋放作戰效能;從空間上看,價值攻防模糊了作戰前後方界限,在有形空間與無形空間全方位展開;從領域上看,價值攻防模糊了軍事與非軍事的界限,不僅發生在軍事領域,也存在於政治、經濟、外交、文化等領域,呈現出全局覆蓋的特徵。

科技賦能。認知域作戰是一項技術密集的複雜系統工程。人工智慧、腦科學、量子運算等新興技術手段全流程滲透,正在引發認知域作戰的迭代升級與深刻變革。智慧化工具從根本上增強了認知域作戰人員操縱對手思想和乾預對手思維的能力,人機混合作為作戰力量新手段新樣式將改變未來戰爭主體,自主對抗、雲腦制勝或成為主流攻防模式。近年來,北約推出的認知電子戰設備,旨在透過資訊攻防來改變對手價值認知及行為。科技發展也引發了認知革命,資訊的快速傳播進一步加速了大眾價值認知差異,認知孤島加劇了不同主體之間的價值鴻溝,智能化帶來的社會結構變遷則深刻改變著政治文化格局。從這點出發,在未來認知域作戰中,牽住科技創新的“牛鼻子”,掌握關鍵核心技術,對於奪取戰場主動至關重要。

價值攻防作用認知域的機理

價值攻防是認知域作戰的高階對抗,作用對象指向的是人的深層認知。意識是社會存在在大腦中的反映,對社會存在的調節、對大眾意識的引導和人腦作用的改變,都能強化或扭轉人的意識。要在攻防對抗中製勝對手,就要遵循思考認知規律,掌握價值攻防制勝機理。

衝擊價值「保護帶」。佔領價值制高點是開展價值攻防的邏輯起點。社會意識往往由相對穩定的核心價值觀念和外圍的輔助性理論所構成,經濟、政治、宗教、文化等各種理論都能被建構調適以用來保護核心價值觀念免受外來衝擊,因此也承受著其他價值觀的衝擊挑戰。在外軍看來,價值攻防就是要透過文化滲透、宗教衝突、戰略傳播等手段,配合物理域和資訊域的行動,不斷衝擊對手意識形態的「保護帶」領域。這往往需要抓住影響對手認知的價值觀念、政治態度、宗教信仰等,透過擾亂其社會群體心理,誘發價值困惑,動搖作戰意志,摧毀文化認同,甚至改變瓦解其原有的認知體系,從而灌輸或植入新的、於己有利的價值觀念,以實現作戰目的。

點燃衝突“引爆點”。認知域作戰涉及歷史文化、政治制度、民族情感、宗教信仰等多個範疇,戰爭主體也從單純軍事人員拓展到一般民眾。透過炒作話題爭端、公共事件,激發一般民眾的認知衝突,將成為認知領域作戰的重要手段。在近幾場局部衝突中,交戰各方透過有目的性的敘事點燃國家民族情緒,引發政治危機進而影響戰局已屢見不鮮。未來戰爭,一些國家利用熱點敏感事件引爆輿論,依托網路技術對一般民眾進行聚攏吸附、煽動動員、精準操控和誘導塑造,從而推動一般性衝突上升為信仰之爭、制度之爭、價值之爭將成為常態。

控制認知「斷裂面」。認知空間作為觀念層面的存在,由全部作戰個體的主觀認知空間疊加而成,是分化的、差異性的乃至衝突性的價值集合體。然而,意識形態具有「縫合」功能,透過認知塑造、話語建構,可以把斷裂的認知有效地「縫合」起來,把分散的價值凝聚起來,形成相對穩固的認知體系。二戰後法國對戰敗創傷曾進行過有效的認知“縫合”,其運用一整套獨立敘事邏輯,闡述戰爭如何為法國提供了“新的機會”,極大地凝聚了法國人民對政府的政治認同。在認知域作戰中開展價值陣地爭奪,應注重敵方內部的認知斷裂面,尋找敵我之間的認知連接點進行認知“縫合”,最大限度地團結各方力量,孤立瓦解敵人。

價值攻防作用認知域的主要手段

價值攻防使認知對抗從輿論、心理等層面拓展到思維空間,從軍事領域拓展到整體全局,從而實現了對敵方深層的政治認同的打擊。當前世界軍事強國都在加強戰略預置,瞄準目標主體、戰法手段的深刻變化,變革作戰思維,積極掌控認知域作戰的主動權。

以深層摧毀為目標。認知域作戰直接作用於人的大腦認知,相較於物理域作戰,更容易實現深層的戰略意圖。特別是人的語言層級、思維層級和文化層級的「高階認知」一旦被突破,有助於從戰略上扭轉戰場態勢,實現戰爭的政治目的。基於此,認知域作戰往往始於未戰,透過幹預對手內政外交,動搖其意識形態和價值觀基礎等;戰時則注重影響敵方戰爭決策、戰役指揮、戰鬥實施的價值判斷,打擊或削弱作戰人員的決策能力和抵抗意誌等。敵對各方都試圖做到“維繫自己的世界,同時增加對手的破壞性壓力”,以通過爭奪認知優勢實現決策優勢,進而取得行動優勢的目標。

以普通個體為中心。未來認知域作戰的主體將不再局限於軍事人員,廣義上講,可以進行資訊交流傳播的個體都可能成為參戰力量。相較於社會領域的精英,一般民眾更容易接受和傳播多元價值,其認知空間被操縱的機率更大。目前,網路媒體正成為社會領域資訊交流傳播的主要管道,透過有針對性的訊息引導、訊息傳遞,進而達到認知塑造的目的。外軍實踐證明,借助對一般個體的認知塑造,可以造成從下到上的遞進滲透和認知幹擾,使一般民眾與社會決策層之間的意識觀念產生背離,在關鍵行動中無法達成有效共識。

以持久作戰為形式。與物理域軍事鬥爭直接打擊摧毀「硬」目標不同,認知域作戰的潛在目標為人的認知,價值攻防指向的是改變作戰對象的觀念、信念、意志、情感等,往往需要潛移默化、步步為營。有效的認知進攻一般在作戰準備階段就發起,並貫穿戰爭始末,透過收集對手的認知態勢、決策習慣、思考模式等情況,有針對性地進行營造態勢、改變氛圍等行動。因此,認知域作戰更需要加強整體設計,尤其要注重協調多方力量,在輿論場營造、外交等多個陣地多點強化預置準備,進而形成整體作戰合力。

中國軍事資源:https://www.163.com/dy/article/HDOT8JIM0511DV4H888.html

China’s “War of Annihilation” from the Perspective of Modern Warfare

現代戰爭視角下的中國“殲滅戰”

現代英語:

“Based on the evolution of war, grasp the “cautious first battle””

  Written in front

  In the history of our army, fighting a war of annihilation is one of the most distinctive and important guiding ideas for operations. As early as the Agrarian Revolutionary War, based on the war purpose of “preserving ourselves and destroying the enemy”, our army clearly proposed that the basic policy in operations was to fight a war of annihilation. Since then, in different historical periods, according to different environments, situations and tasks, our army has maintained a high degree of flexibility and maneuverability in combat guidance, and has resolutely implemented the principle of fighting a war of annihilation, continuously enriched and developed combat theories, and wrote classic examples of the weak defeating the strong in the history of world wars.

  With the advent of the information age, the form of warfare, battlefield environment, military technology, and warfare mechanisms have undergone major changes. How the traditional theory of annihilation warfare can adapt to the changes of the times, give full play to our strengths, attack the enemy’s weaknesses, and innovate and develop is a question of the times that our generation of soldiers must answer well.

  Depriving the enemy of its combat power is the key to winning a war of annihilation

  In the long-term practice of revolutionary wars, our army is often at a disadvantage in terms of quantity, scale and equipment. In order to dampen the enemy’s spirit, seize the initiative and defeat the enemy, while emphasizing the cautiousness of the first battle, we pay great attention to planning and fighting a war of annihilation to quickly weaken the enemy’s strategic advantage. Therefore, “it is better to cut off one finger than to injure ten fingers”, completely depriving the enemy of its combat capability, avoiding a war of attrition or a war of defeat, has also become a key indicator for measuring the success or failure of a war of annihilation and the comprehensive effectiveness of combat. Combat under traditional conditions is often the physical superposition of troops and weapons in the same time and space, emphasizing hard killing as the main method, and the strength of combat effectiveness is mainly manifested through parameters such as mobility, firepower, and protection. Correspondingly, quickly and effectively eliminating the enemy’s living forces has become the most effective means of winning hearts and minds and disintegrating the enemy.

  Entering the information age, information power has driven the displacement of combat effectiveness measurement standards in an exponential manner. While becoming the dominant factor in the informationized battlefield, it has strongly promoted the organic integration of combat power with early warning detection, reconnaissance intelligence, command and control, and rear-end support. The warring parties are showing a trend of full-system and full-factor confrontation. The informationized battlefield no longer simply emphasizes the spatial and temporal concentration of troops and weapons to suppress and attack the enemy, but focuses on relying on the network information system to seize information space and compete for information advantages, so that the enemy “cannot see clearly, cannot connect, and cannot hit accurately”, thereby completely depriving the enemy of its combat effectiveness. In the Kosovo War, after suffering 78 days of continuous air strikes by NATO, although the Yugoslav army did not suffer major losses in its manpower, it was always in a passive position because the material basis of the war and the reconnaissance and early warning, command and control, air defense and anti-missile systems were destroyed and paralyzed by the enemy, and was forced to sign a humiliating treaty.

  In today’s era, destroying the enemy’s key war support elements, depriving it of the objective material basis for continuous combat, and undermining its will to wage war are not only important options for annihilation warfare to pursue deterrence effects and deprive the enemy of its combat effectiveness, but also a necessary way for annihilation warfare to achieve combat intentions and defeat the opponent.

  Attacking the key points and breaking the system is the key to winning a war of annihilation

  For a long time, pulling teeth out of a tiger’s mouth and striking the enemy’s vital points have been important indicators for testing the courage and command art of commanders and fighters, and are also effective means to defeat the enemy and achieve the goal of annihilation warfare. During the Hujia Wopeng Battle of the Liaoshen Campaign during the War of Liberation, the 3rd Column of the Northeast Field Army first destroyed the Liao Yaoxiang Corps Command through bold penetration, infiltration, and division, and quickly trapped the enemy in a state of collapse and defeat. But at the same time, we should also see that due to the constraints of military technology level and the effectiveness of weapons and equipment, in traditional operations, there are often many practical difficulties in accurately striking core targets such as enemy command organizations and key defense positions, and there is a lack of effective means to “go straight to Huanglong”. It can be said that traditional annihilation warfare is still more about annihilating the opponent’s living forces. This also makes it an important factor in designing the combat process and considering the success or failure of operations in traditional operations to measure and compare the number and scale of troops and weapons of both sides.

  In the information age, on the one hand, the environmental situation and war thinking have undergone profound changes. The necessity and possibility of expanding the size of the army in exchange for improved combat effectiveness and then winning the war by annihilating a large number of enemy heavy troops are becoming less and less; on the other hand, new weapons and equipment such as precision guidance and unmanned intelligence, with the support of powerful information networks and aerospace reconnaissance capabilities, can implement “decapitation operations” and “targeted elimination” more quickly and accurately, and quickly achieve the goal of annihilation warfare. The combat mode of seizing the key nodes and parts of the enemy’s combat system, carrying out precise strikes and structural destruction, paralyzing the enemy’s combat system while reducing collateral damage and achieving combat objectives is becoming more and more respected. As a result, command centers, communication hubs, radar positions, network nodes, etc. have become sensitive parts that the warring parties focus on protecting and the key points of attacking. In the Iraq War, the US military launched a comprehensive structural paralysis operation against the Iraqi army. By implementing “decapitation operations” against Iraqi military and political leaders and “targeted elimination” of the Iraqi army’s communication command and air defense systems, the Iraqi army was placed in a completely passive position throughout the process, and the war process was accelerated.

  In today’s era, with the rapid development of information technology and war practice, “system destruction” is becoming a keyword in modern combat theory, and is gradually promoting the overall transformation of combat modes. It has not only become a new way and means to win wars, but also an important way to win modern annihilation wars.

  Controlling operational control is the key to winning a war of annihilation

  In previous war practices, the combat environment faced by our army was relatively simple, and the battlefield was mainly carried out on land. Although our army is often at a disadvantage compared to the opponent’s weapons and equipment, it can often defeat the strong with the weak and defeat the enemy by exploring its own advantages, exploiting the enemy’s weaknesses, and actively looking for opportunities. In the second battle of the War to Resist U.S. Aggression and Aid Korea, the volunteer army adopted the combat strategy of internal operations, luring the enemy deep into the enemy, and defeating them one by one. They made full use of the darkness of night and terrain to secretly engage the enemy, dared to cut off the enemy’s retreat, interspersed attacks, and divided and surrounded the enemy, giving the enemy an annihilating blow, and finally won the battle and reversed the entire situation in one fell swoop. This shows that for a party that is temporarily unable to seize comprehensive control of the battlefield in combat, as long as it is good at exploiting the enemy’s weaknesses and cleverly reducing the enemy’s sharp attack momentum, it can still seek the initiative to win in difficult and difficult situations and achieve the goal of annihilation warfare.

  In the information age, wars are fought on vast battlefields, both visible and invisible. In addition to the traditional battlefields of land, sea and air, they are also further extended to deep sea, space, electromagnetic, network, intelligence, biology and other space fields, presenting a complex situation. The armies of the world’s powerful countries have taken the seizure of comprehensive control and the initiative in war as important indicators and necessary ways to build their army and defeat their opponents. Dimensionality reduction strikes have become a must-have in battlefield confrontations. In recent years, the US military’s foreign aggression has relied on the battlefield comprehensive control dominated by the advantages of air and space control and information control. However, we must also see that no matter how powerful the opponent is, there will be fatal weaknesses. Even if it is difficult for the party with relatively backward weapons and equipment to fully seize the battlefield comprehensive control, it can still “attack the incapable with the capable” in the local battlefield, seek local combat initiative, and thus win the local annihilation war, and use the local initiative to drive the overall initiative, and use asymmetric single control to help seize local comprehensive control and achieve final victory.

  In today’s era, we must accelerate the construction of all aspects of the military and step up the forging of capabilities and means to seize comprehensive control and take the initiative on the battlefield. We must also follow the winning mechanism of modern warfare, flexibly use “total war”, “cognitive war”, “cross-domain war”, “intelligent war” and other tactics, use dimensionality reduction strikes, asymmetric strikes and other tactics, turn disadvantages into advantages, turn passivity into initiative, control combat control by “attacking the incapable with the able”, and win the war of annihilation.

  Accurately releasing energy is the key to winning a war of annihilation

  Traditional warfare is restricted by factors such as command and communication, mobility, firepower speed, and weather conditions. The use of forces is often limited to a certain combat area. There is little change in combat command and troop actions, and offensive and defensive actions are relatively clear. In the past, annihilation warfare was more often achieved through echelon (group) deployment, continuous attack (resistance), layer-by-layer capture (defense), combined with interspersed detours, segmentation and encirclement, and cutting off the enemy’s flanks. For this reason, “concentrating superior forces and annihilating the enemy one by one” often becomes the fundamental principle and important way to plan annihilation warfare.

  In the information age, the combat force structure has undergone major changes. With the emergence of space combat, intelligent combat, stealth combat forces, as well as a large number of new weaponry and equipment such as hypersonic aircraft and kinetic weapons, the military’s information power, mobility, and strike power have unprecedentedly increased, and the effectiveness of unmanned intelligent combat has become increasingly prominent. Although quantity and scale are still important criteria for measuring the combat effectiveness of an army, “newer, faster, more accurate, and smarter” has begun to become an important indicator for measuring an army’s ability to adapt to modern warfare. Correspondingly, scientifically and rationally organizing combat forces and focusing on the best to release combat effectiveness have become important links in winning modern annihilation wars.

  Structural strength determines combat effectiveness, and advanced and applicable structural formation is an important prerequisite for multi-functional and powerful combat effectiveness. In the information age, only by jointly using new and old combat forces, realizing the organic integration of new quality capabilities and traditional capabilities, and then building a new force formation that integrates multiple capabilities, can we promote the overall optimization of the combat system and the aggregation of advantages, and accurately control the combat rhythm, combat time and space, combat operations and combat process. In the 2020 Nagorno-Karabakh conflict, Azerbaijan adopted a flexible formation mode for manned and unmanned combat forces, using low-cost An-2 drones to lure the Armenian air defense system to open fire, and followed up with Habib-2 anti-radar drones and TB-2 reconnaissance and strike drones to destroy more than a dozen air defense systems on the Armenian side in one fell swoop, and then calmly defeated the Armenian ground armored forces.

  In today’s era, as the status and role of combat operations such as network and electronic warfare, air and space attacks, and unmanned combat become more prominent, more attention should be paid to scientific design and rational organization of troops and weapons, so as to achieve the effect of clenching fingers into a fist through the accumulation of quality and integration of efficiency, and fight a war of annihilation that is quick to strike and quick to retreat, and wins with precision.

現代國語(繁體):

《立足戰爭演變把握「慎重初戰」》

寫在前面

在我軍戰史上,打殲滅戰是最鮮明、最重要的作戰指導思想之一。早在土地革命戰爭時期,基於「保存自己,消滅敵人」這場戰爭目的,我軍明確提出作戰中基本的方針是打殲滅戰。此後在不同歷史時期,根據環境、情勢和任務的不同,我軍在作戰指導上既保持了高度的靈活機動,又堅決貫徹打殲滅戰的原則,不斷對作戰理論予以豐富發展,在世界戰爭史上寫下了一個以弱勝強的經典戰例。

進入資訊時代,戰爭形態、戰場環境、軍事科技和戰爭機理等已發生重大變化,傳統的殲滅戰理論如何適應時代之變,揚我之長、擊敵之短並創新發展,是我們這代軍人必須回答好的時代課題。

剝奪敵方戰力是打好殲滅戰的關鍵

在長期革命戰爭實踐中,我軍在數量、規模和裝備上常常處於劣勢。為挫敵銳氣、奪取主動、克敵制勝,在強調慎重初戰的同時,十分注重籌劃和打好殲滅戰,以迅速削弱敵方戰略優勢。由此,“傷其十指,不如斷其一指”,徹底剝奪敵方作戰能力,力避打成消耗戰、擊潰戰,也成為衡量殲滅戰成敗和作戰綜合效益的關鍵指標。傳統條件下的作戰,往往是兵力兵器在同一時空的物理疊加,強調以硬殺傷為主要方式,戰鬥力強弱主要透過機動、火力、防護等參數表現。與之相應,迅速有效消滅敵有生力量,成為攻心奪志、瓦解敵方最有效的手段。

進入資訊時代,資訊力以指數級方式推動戰鬥力衡量標準發生位移,在一躍成為資訊化戰場主導要素的同時,強力推動作戰力量與預警探測、偵察情報、指揮控制、後裝保障等要素有機融合,交戰雙方呈現全系統全要素對抗之勢。資訊化戰場不再單純強調兵力兵器時空集中以壓制打擊敵方,而是注重依托網路資訊體系,透過搶佔資訊空間、爭奪資訊優勢,使敵“看不清、聯不上、打不準”,進而全盤剝奪敵方戰力。在科索沃戰爭中,在遭受北約78天持續空中打擊後,南聯盟軍隊有生力量儘管沒有遭受重大損失,但由於戰爭物質基礎和偵察預警、指揮控制、防空反導體係等被敵毀癱,始終處於被動挨打境地,被迫簽訂城下之盟。

當今時代,摧毀敵方戰爭關鍵支持要素,剝奪其持續作戰的客觀物質基礎,瓦解其遂行戰爭意志,既是殲滅戰追求震懾效應、剝奪敵方戰力的重要選項,也是殲滅戰達成作戰企圖、制勝對手的必要途徑。

擊要害破體係是打好殲滅戰的重心

一直以來,虎口拔牙、擊敵要害既是考驗指戰員膽略勇氣、指揮藝術的重要指標,也是克敵制勝、達成殲滅戰目標的有效手段。解放戰爭期間遼沈戰役的胡家窩棚戰鬥,東北野戰軍3縱經過大膽穿插、滲透、分割,首先搗毀了廖耀湘兵團指揮部,迅速陷敵於土崩瓦解、潰不成軍的境地。但同時我們也應當看到,因為軍事技術水準、武器裝備效能的製約,在傳統作戰中,要對敵指揮機構等核心目標和重點防禦部位實施準確打擊,往往存在諸多現實難題,缺乏「直搗黃龍」的有效手段。可以說,傳統殲滅戰仍是殲滅對方有生力量。這也使得在傳統作戰中,衡量對比雙方兵力兵器數量與規模,始終是設計作戰進程、考量作戰成敗的重要因素。

資訊時代,一方面,環境情勢、戰爭思維發生了深刻變化,那種以擴充兵力規模換取作戰效能提高,進而透過大量殲滅敵方重兵集團奪取戰爭勝利的必要性和可能性越來越小;另一方面,精確導引、無人智慧等新型武器裝備在強大資訊網路、空天偵察能力加持下,可以更快捷精準地實施“斬首行動”“定點清除”,迅速達成殲滅戰目標。抓住敵作戰體系關鍵節點及部位,實施精確打擊和結構破壞,在減少附帶損傷的同時癱瘓敵作戰體系、達成作戰目標的作戰模式,越發受到推崇。由此,指揮中心、通訊樞紐、雷達陣地、網路節點等,則成為交戰雙方重點防護的敏感部位及尋隙打擊的要害。在伊拉克戰爭中,美軍對伊軍全面展開了結構癱瘓式作戰,透過對伊拉克軍政首腦實施“斬首行動”,對伊軍通信指揮、防空系統進行“定點清除”,全程置伊軍於完全被動挨打境地,戰爭進程得以加快。

當今時代,伴隨資訊科技與戰爭實踐的快速發展,「體系破擊」等正成為現代作戰理論的關鍵詞,並逐步推動作戰模式整體轉型,不僅成為戰爭制勝的新方式新手段,也成為打贏現代殲滅戰的重要途徑。

掌控作戰制權是打好殲滅戰的樞紐

以往戰爭實踐中,我軍面對的作戰環境相對單一,戰場主要在陸地展開。儘管相較於對手武器裝備我軍常處於劣勢,但透過發掘自身優勢、利用敵方弱點、主動尋找戰機,往往能夠以弱勝強、克敵制勝。在抗美援朝戰爭第二次戰役中,志願軍部隊透過採取內線作戰、誘敵深入、各個擊破的作戰方針,充分利用夜暗、地形等條件隱蔽接敵,敢於斷敵退路、穿插襲擊、分割圍殲,予敵殲滅性打擊,最終取得戰役勝利,一舉扭轉整個戰局。這表明,對於作戰中一時難以奪控戰場綜合製權的一方,只要善於利用敵方弱點,巧妙消減敵方攻擊銳勢,仍可在難局、困局中求得制勝先機,達成殲滅戰目標。

資訊時代,戰爭展開於有形無形廣大戰場,除了傳統的陸、海、空戰場,也進一步向深海、太空、電磁、網路、智慧、生物等太空領域擴展延伸,呈現出錯綜複雜的態勢。世界強國軍隊紛紛把奪控綜合製權、佔據戰爭主動,作為軍隊建設、制勝對手的重要指標和必要途徑,降維打擊成為戰場對決的必殺技。美軍近年來對外侵略就是依仗以製空天權和製資訊權優勢主導的戰場綜合製權。但是我們也要看到,對手再強大也會有致命的弱點,武器裝備相對落後的一方,即便難以全面奪控戰場綜合製權,卻依然可以在局部戰場“以能擊不能”,求得局部作戰主動,從而打贏局部殲滅戰,並以局部主動帶動全局主動,以非對稱的單項制權助力奪取局部綜合製權,並取得最終勝利。

當今時代,固然要加快軍隊各項建設,加緊鍛造奪控綜合製權、佔據戰場主動的能力手段,更要遵循現代戰爭制勝機理,靈活運用“總體戰”“認知戰”“跨域戰” 「智能戰」等戰法,以降維打擊、非對稱打擊等打法,化劣勢為勝勢,變被動為主動,在「以能擊不能」中掌控作戰制權,打贏殲滅戰。

聚優精準釋能是打好殲滅戰的要則

傳統作戰,受指揮通信、機動能力、火力速度、天候氣像等因素影響制約,力量運用往往局限於一定的作戰區域,作戰指揮和部隊行動臨機變化小,攻防行動比較分明。以往的殲滅戰,更多的還是透過梯隊(群隊)式部署,以及連續攻擊(抗擊)、層層奪佔(防守),結合穿插迂迴、分割包圍、斷敵側後等手段達成作戰目標。正因此,「集中優勢兵力,各個殲滅敵人」往往成為籌劃殲滅戰的根本遵循與重要途徑。

資訊時代,作戰力量結構發生重大變化。伴隨太空作戰、智慧作戰、隱身作戰力量,以及高超音波速飛行器、動能武器等新型武器裝備的大量湧現,軍隊資訊力、機動力、打擊力空前增大,無人智能作戰效能日益突出。儘管數量、規模仍是衡量一支軍隊戰鬥力的重要標準,但“更新、更快、更準、更智”,已開始成為衡量一支軍隊對現代戰爭適應能力的重要指標。與之相應,科學合理編組作戰力量,聚優釋放作戰效能,成為打贏現代殲滅戰的重要關節。

結構力決定戰鬥力,結構編成先進適用是戰鬥力多能、強大的重要前提。資訊時代,只有透過新舊作戰力量的聯合運用,實現新質能力與傳統能力的有機融合,進而建構集多種能力於一體的新型力量編組,才能促進作戰體系整體優化與優勢聚合,精準控製作戰節奏、作戰時空、作戰行動和作戰過程。在2020年的納卡衝突中,阿塞拜疆對有人和無人作戰力量採取了靈活編組模式,用價格低廉的安-2無人機引誘亞美尼亞防空系統開火,用哈比-2反雷達無人機和TB -2察打一體無人機跟進打擊,一舉摧毀亞方十餘套防空系統,進而從容打掉亞方地面裝甲部隊。

當今時代,隨著網電作戰、空天襲擊、無人作戰等作戰行動地位作用的進一步凸顯,更應注重科學設計、合理編組兵力兵器,透過質量累加、效能融合,達到攥指成拳的效果,打好快打快收、精打製勝的殲滅戰。

中國軍事資源:https://military.cctv.com/2022/07/07/ARTIWv2oVWmzfSsX9KKVoDPW220888.shtml

來源:解放軍報 | 2022年07月07日 08:OO

Chinese Military & Cognitive Confrontation – Value attack and defense: Designing Combat in the Cognitive Domain

中國軍事與認知對抗-價值攻與守:在認知領域設計戰鬥

現代英文音譯:

Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.

Characteristics of the cognitive domain of value attack and defense

Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:

Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values ​​and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.

Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values ​​are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.

Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.

The mechanism of cognitive domain of value attack and defense

Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.

Impacting the value “protection zone”. Occupying the commanding heights of values ​​is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values ​​and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values ​​from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values ​​that are beneficial to themselves in order to achieve combat objectives.

Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.

Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.

The main means of cognitive domain in value attack and defense

Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.

Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.

Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.

In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.

(Author’s unit: Military Political Work Research Institute of the Academy of Military Sciences)

現代國語:

價值攻防是從戰略層面進行認知域作戰的重要方式,通常價值攻防是透過幹預人的思維、信念、價值觀等,以達成瓦解敵方共識,摧毀敵方意志,進而掌控戰場綜合控制權的目的。精確掌握價值攻防的特性、機制、手段,對奪取未來認知域作戰優勢至關重要。

價值攻防作用認知域的特點

價值攻防是指透過引發個體或群體的深層邏輯思辨、價值判斷改變,完成其對相對穩定的認知結果的干預和影響,以期重構人的意志、思維、心理、情感等認知能力。價值攻防主要有以下幾個特點:

軟性對抗。傳統戰爭主要依賴暴力手段來削弱瓦解敵方的軍事能力,通常具有較強的戰爭強度。認知域作戰將不再侷限於攻城略地等硬性對抗,而更著重於圍繞價值陣地展開滲透與逆滲透、攻擊與反攻擊、控制與反控制,透過爭奪認知域對抗的主導權,進一步激發物理域和資訊域的作戰效能,從而奪取戰場主動,甚至達到不戰而屈人之兵的效果。在實踐中,價值攻防往往著眼於一個國家、民族的文化傳統、價值觀念和社會心理展開,最終達到對敵方意志摧毀、認知操縱、精神控制的目的。

全維度釋放。現代戰爭日益呈現總體性、多域性、全時性特徵。認知域作戰旨在透過幹預人的意識進而影響戰場效果,而意識的相對穩定決定了人的世界觀、信仰等價值觀念一般情況下往往較為穩固,因此價值攻防需要長期的、不間斷的、全息全維度地進行。從時間上看,價值攻防模糊了平戰邊界,常態在戰、隨時在戰,持續積累、逐步釋放作戰效能;從空間上看,價值攻防模糊了作戰前後方界限,在有形空間與無形空間全方位展開;從領域上看,價值攻防模糊了軍事與非軍事的界限,不僅發生在軍事領域,也存在於政治、經濟、外交、文化等領域,呈現出全局覆蓋的特徵。

科技賦能。認知域作戰是一項技術密集的複雜系統工程。人工智慧、腦科學、量子運算等新興技術手段全流程滲透,正在引發認知域作戰的迭代升級與深刻變革。智慧化工具從根本上增強了認知域作戰人員操縱對手思想和乾預對手思維的能力,人機混合作為作戰力量新手段新樣式將改變未來戰爭主體,自主對抗、雲腦制勝或成為主流攻防模式。近年來,北約推出的認知電子戰設備,旨在透過資訊攻防來改變對手價值認知及行為。科技發展也引發了認知革命,資訊的快速傳播進一步加速了大眾價值認知差異,認知孤島加劇了不同主體之間的價值鴻溝,智能化帶來的社會結構變遷則深刻改變著政治文化格局。從這點出發,在未來認知域作戰中,牽住科技創新的“牛鼻子”,掌握關鍵核心技術,對於奪取戰場主動至關重要。

價值攻防作用認知域的機理

價值攻防是認知域作戰的高階對抗,作用對象指向的是人的深層認知。意識是社會存在在大腦中的反映,對社會存在的調節、對大眾意識的引導和人腦作用的改變,都能強化或扭轉人的意識。要在攻防對抗中製勝對手,就要遵循思考認知規律,掌握價值攻防制勝機理。

衝擊價值「保護帶」。佔領價值制高點是開展價值攻防的邏輯起點。社會意識往往由相對穩定的核心價值觀念和外圍的輔助性理論所構成,經濟、政治、宗教、文化等各種理論都能被建構調適以用來保護核心價值觀念免受外來衝擊,因此也承受著其他價值觀的衝擊挑戰。在外軍看來,價值攻防就是要透過文化滲透、宗教衝突、戰略傳播等手段,配合物理域和資訊域的行動,不斷衝擊對手意識形態的「保護帶」領域。這往往需要抓住影響對手認知的價值觀念、政治態度、宗教信仰等,透過擾亂其社會群體心理,誘發價值困惑,動搖作戰意志,摧毀文化認同,甚至改變瓦解其原有的認知體系,從而灌輸或植入新的、於己有利的價值觀念,以實現作戰目的。

點燃衝突“引爆點”。認知域作戰涉及歷史文化、政治制度、民族情感、宗教信仰等多個範疇,戰爭主體也從單純軍事人員拓展到一般民眾。透過炒作話題爭端、公共事件,激發一般民眾的認知衝突,將成為認知領域作戰的重要手段。在近幾場局部衝突中,交戰各方透過有目的性的敘事點燃國家民族情緒,引發政治危機進而影響戰局已屢見不鮮。未來戰爭,一些國家利用熱點敏感事件引爆輿論,依托網路技術對一般民眾進行聚攏吸附、煽動動員、精準操控和誘導塑造,從而推動一般性衝突上升為信仰之爭、制度之爭、價值之爭將成為常態。

控制認知「斷裂面」。認知空間作為觀念層面的存在,由全部作戰個體的主觀認知空間疊加而成,是分化的、差異性的乃至衝突性的價值集合體。然而,意識形態具有「縫合」功能,透過認知塑造、話語建構,可以把斷裂的認知有效地「縫合」起來,把分散的價值凝聚起來,形成相對穩固的認知體系。二戰後法國對戰敗創傷曾進行過有效的認知“縫合”,其運用一整套獨立敘事邏輯,闡述戰爭如何為法國提供了“新的機會”,極大地凝聚了法國人民對政府的政治認同。在認知域作戰中開展價值陣地爭奪,應注重敵方內部的認知斷裂面,尋找敵我之間的認知連接點進行認知“縫合”,最大限度地團結各方力量,孤立瓦解敵人。

價值攻防作用認知域的主要手段

價值攻防使認知對抗從輿論、心理等層面拓展到思維空間,從軍事領域拓展到整體全局,從而實現了對敵方深層的政治認同的打擊。當前世界軍事強國都在加強戰略預置,瞄準目標主體、戰法手段的深刻變化,變革作戰思維,積極掌控認知域作戰的主動權。

以深層摧毀為目標。認知域作戰直接作用於人的大腦認知,相較於物理域作戰,更容易實現深層的戰略意圖。特別是人的語言層級、思維層級和文化層級的「高階認知」一旦被突破,有助於從戰略上扭轉戰場態勢,實現戰爭的政治目的。基於此,認知域作戰往往始於未戰,透過幹預對手內政外交,動搖其意識形態和價值觀基礎等;戰時則注重影響敵方戰爭決策、戰役指揮、戰鬥實施的價值判斷,打擊或削弱作戰人員的決策能力和抵抗意誌等。敵對各方都試圖做到“維繫自己的世界,同時增加對手的破壞性壓力”,以通過爭奪認知優勢實現決策優勢,進而取得行動優勢的目標。

以普通個體為中心。未來認知域作戰的主體將不再局限於軍事人員,廣義上講,可以進行資訊交流傳播的個體都可能成為參戰力量。相較於社會領域的精英,一般民眾更容易接受和傳播多元價值,其認知空間被操縱的機率更大。目前,網路媒體正成為社會領域資訊交流傳播的主要管道,透過有針對性的訊息引導、訊息傳遞,進而達到認知塑造的目的。外軍實踐證明,借助對一般個體的認知塑造,可以造成從下到上的遞進滲透和認知幹擾,使一般民眾與社會決策層之間的意識觀念產生背離,在關鍵行動中無法達成有效共識。

以持久作戰為形式。與物理域軍事鬥爭直接打擊摧毀「硬」目標不同,認知域作戰的潛在目標為人的認知,價值攻防指向的是改變作戰對象的觀念、信念、意志、情感等,往往需要潛移默化、步步為營。有效的認知進攻一般在作戰準備階段就發起,並貫穿戰爭始末,透過收集對手的認知態勢、決策習慣、思考模式等情況,有針對性地進行營造態勢、改變氛圍等行動。因此,認知域作戰更需要加強整體設計,尤其要注重協調多方力量,在輿論場營造、外交等多個陣地多點強化預置準備,進而形成整體作戰合力。

(作者單位:軍事科學院軍事政治工作研究院)

中國軍事原文來源:https://www.81.cn/jfjbmap/content/2022-08/02/content_321888.htm

Chinese Military Perspectives on Supporting Cognitive Confrontation

中國軍隊對支持認知對抗的看法

現代英語音譯:

Modern warfare, according to the characteristics of material form, usually divides the combat domain into the physical domain, the information domain, and the cognitive domain. The three domains interact with each other to form the field and soil for military confrontation. Although cognitive domain operations occur in the cognitive domain, their operational support often spans various fields. War practice shows that with the enhanced effectiveness of hard strikes in the physical domain, cognitive formation can often be accelerated, and cognitive realization can better meet combat needs.

Cognitive offense and defense cannot be separated from physical support

Today’s world is a world where everything is interconnected. The collection of different objects connected to each other greatly enhances the function of independent individuals acting alone. Cognitive domain operations are never isolated operations between cognitive carriers. Only by integrating cognitive attack and defense into an integrated joint operations chain, closely integrating with physical domain military strike operations, and tightly integrating with the entire combat system can we fully exert combat effectiveness.

The starting point of cognition. Existence determines consciousness. Thinking and cognition is not a fairy from the sky, but a true or tortuous reflection of the real world. Without the foundation of the material world, thinking and cognition will lose the source of information, the basis for analysis and judgment, and the accuracy of decision-making and action, making it difficult for people to trust, recognize, and rely on. Even the most psychedelic science fiction wars still have references to real combat targets, specific combat objectives, and corresponding combat paths. Therefore, intelligence reconnaissance analysis has become an indispensable and important link for commanders to organize troops and plan. “Without investigation, there is no right to speak” is regarded as a golden rule that must be followed in decision-making. Battlefield simulation simulations have become an important step for the success of combat operations. In history, most of the combat commands of accomplished generals and classic combat cases that can withstand the test of history and practice are all based on full investigation and research and scientific intelligence analysis. Without the hard-core support of the real world, “human beings think about , and God laughs.”

The basis of cognitive effects. A golden rule of operations in the cognitive domain is that soft power at the cognitive level must be supported by hard strikes at the physical level in order to ensure and strengthen its role. Strong military pressure is a necessary prerequisite for cognitive means to work, and continuous victory on the battlefield is the core support for winning cognitive wars. If the United States does not have the high-pressure pressure of its super comprehensive national strength and superior technology, its “Star Wars Plan” may not really work. If cognitive domain operations lack the support of specific military operations in the physical domain, they will never produce the good effects of doubting, confusing, deterring, and defeating the enemy. To grasp the initiative in thinking and cognition and to take the initiative in cognitive domain operations, we must not only strengthen the construction of cognitive ontology, improve the ability to directly use strategies and technical means to strengthen self-protection, intervene and influence the opponent’s thinking and cognition, but also actively strive to The physical domain leverages the conduction effect of military operations in the physical domain to enhance thinking and cognition.

The starting point for cognitive realization. Marxism believes that once theory grasps the masses, it will also become material force. From the perspective of combat in the cognitive domain, the spiritual creation at the superstructure level of cognition will not automatically turn into material power. Only by being attached to a certain material carrier and practical grasp can it be possible to realize spiritual to material and consciousness. A critical leap into existence. Just as in World War II, if the German army had not bypassed the Maginot Line, broke through the Ardennes Forest, and launched a surprise attack into the French hinterland, it would have been impossible to demonstrate the foresight of the cognitive achievement of the “Manstein Plan”; similarly, if there were no Allies, The military’s successful landing in Normandy, which invaded the east and west, also failed to highlight the ingenuity of the strategy of “Building plank roads openly and concealing warehouses” in the “Operation Overlord Plan”. Thinking and cognition are transmitted through people to specific military operations in the physical domain, and then the specific military operations in the physical domain realize the materialization of cognitive results, forming the fundamentals of the two-way interaction between cognitive offense and defense and military strikes in the physical domain.

The basic method of physical attack to support cognitive offense and defense

The methods and methods used by military strikes in the physical domain to support cognitive offense and defense follow the general law that matter determines consciousness and existence determines thinking. The basic methods can be divided into enhanced support, confirmation support and realization support.

Enhanced support. Military strikes in the physical domain strengthen the formation and development of thinking and cognition. Although thinking and cognition depend on the quality of the cognitive carrier itself, it will be difficult to achieve without the support of military operations in the physical domain. The most basic role of military operations in the physical domain in the cognitive domain is to provide solid support for the formation and development of thinking and cognition. Thinking and cognition can only be stable and far-reaching if it is based on real physical actions. For example, in the early days of the Korean War, when the Korean People’s Army was overwhelming, our army’s combat staff Lei Yingfu and others accurately predicted the landing of the US military based on the war situation, geographical and weather characteristics of the Korean Peninsula, especially the various actions of the US and South Korean troops at that time, etc. time and location. Similarly, Li Qiwei of the “United Nations Army” also made a judgment on the “worship offensive” based on the logistics support, weapons and equipment, and tactical use of the volunteers, and used “magnetic tactics” to fight me. These are all enhancements to the formation and development of thinking and cognition caused by combat in the physical domain.

Confirmation type support. Military strikes in the physical domain confirm preset thinking, precognition, and prejudgment. Cognitive attack and defense does not only occur at the cognitive level, but is the interaction between cognition and practice. War is a “place of life and death, a way of survival”. If one’s cognitive decision-making cannot be verified in many directions at the practical level, then acting rashly is the greatest irresponsibility for war. During the revolutionary war years, our military’s decision-makers were always under the control of the overall strategy and gave front-line commanders the power to act as appropriate and in accordance with the overall strategic direction principle. This is a positive confirmation of strategic thinking. During the Second World War, the Allies used “false facts” to mislead, constantly shaping and strengthening the German army’s misunderstanding of the Allied landing sites on the European continent, and finally successfully landed in Normandy with minimal cost. This was a counter-attack. To confirm.

Implementation support. Provide direct physical support for the realization of thinking, cognition, judgment and decision-making. Thinking and cognition must be transformed into actual results that change the world. The thinking and cognition acting on the opponent is not the end but a new starting point. Next, it must be acted upon in the physical world through “skilled hands” and “brave heart”. In other words In short, it is to provide direct physical action support for the value realization of thinking and cognition. This is just like Zhuge Liang’s clever plan, no matter how brilliant it is, if there is no implementation by the “Five Tiger Generals” and other Shu Han soldiers, it can only remain at the cognitive level of talking on paper. No matter how efficiently the first three parts of the “OODA” loop operate, if the execution link “A” is missing, it will be a “dead loop”. Similarly, the results of our army’s command decisions also depend on the resolute, thorough and creative execution of the officers and soldiers. The quality and efficiency of the execution directly determines the effectiveness of the implementation of the command decisions. In this regard, physical actions at the execution level are of extremely important practical significance.

Effectively strengthen the interaction between cognitive offense and defense and physical strikes

Thinking and cognition must rely on the support of physical actions, which is an objective law that is independent of human will. It is an extremely important task to strengthen the communication and interaction between thinking and cognition and physical strikes to make our thinking and decision-making more targeted, objective and operable, so as to better transform cognitive advantages into action advantages and winning advantages. .

Be more proactive and solidify your cognitive foundation. Whether the thinking and cognition is correct depends fundamentally on its compatibility with objective reality and its applicability to combat opponents. Only thinking and cognition based on full investigation and research, seeking truth from facts and comparative advantages can stand the test of practice and actual combat. The practice of absolute, sacred, and nihilistic thinking or generals’ genius, wisdom, and inspiration is idealistic, one-sided, and harmful. This requires that we must work hard to base our thinking and cognition on the basis of extensive investigation, research and intelligence analysis, and truly understand the enemy’s situation, our situation, and other people’s situations, truly know our enemies and ourselves, know everything we should know, and adapt to local conditions. The camera moves. At the same time, we must combine reading books without words with books with words, unify indirect theory with living practice that is constantly developing and changing, and dialectically recognize past experiences and lessons and other people’s experiences and lessons, so that they become our own knowledge. Help instead of shackles, assist instead of dominate.

Be more proactive and strengthen cognitive rationality. Correct understanding that can withstand the long-term test of practice and actual combat comes from practice and is strengthened through feedback from practice. Cognitive practical experience is only the basic material for obtaining correct cognition. To form scientific cognition, we need to further eliminate the false and preserve the true in the repeated collision and verification of consciousness and matter, thinking and existence, in order to improve cognitive rationality. It is wrong and even fatal to think that true knowledge can be obtained once and for all from only local situations, fragmented information and individual periods of time. In the Battle of Chibi in ancient China, Cao Cao’s side only came to the understanding of concatenating warships from the common sense that iron cables can balance the shaking of the ship’s hull, and did not confirm it from the actual combat effects or consequences of concatenating warships. If you don’t know how to recreate, you will easily tie up the ship with iron ropes and tie yourself up, and ultimately end up in the disastrous defeat of “burning Red Cliff”. Times have changed, and the enemy situation on the modern battlefield is ever-changing. There has never been an unchanging cognitive practice, nor a once-and-for-all cognitive achievement. It can only strip away impurities and extract the essence from material to cognitive to material confirmation for re-cognition. , can we return to rationality.

Be more proactive in objectifying cognitive outcomes. Cognitive achievements are only the result of thinking and consciousness nurtured in cognitive carriers. Without timely and effective material transformation, it will be like walking at night wearing brocade clothes or hiding treasures in the mountains, and it will be difficult to demonstrate its own value. Thinking and cognition are based on physical actions, and ultimately rely on specific actions in the physical domain before they can be materialized and transformed into actual results that change the subjective and objective worlds. This requires us to not only consolidate the cognitive foundation and strengthen cognitive rationality, but also improve the operability of cognitive decision-making and planning as much as possible, opening the door for smoother materialization and transformation. At the same time, efforts must be made to improve the execution capabilities of decision-making and deployment executors, so that they can correctly understand the intention of decision-making, creatively adopt appropriate methods based on specific realities, and maximize the implementation of cognitive results and operational decision-making plans to the end. Be a good “ferryman” and “bridge across the river” that connects and transforms cognitive results with combat effectiveness. 

原版國語:

引言

現代戰爭,依物質形態特點,通常將作戰域分為物理域、資訊域、認知域,三個域相互影響共同構成軍事對抗的領域和土壤。認知域作戰雖然發生在認知領域,但其作戰依托常常橫跨各領域。戰爭實踐表明,在物理域硬打擊增效強化下,認知形成往往能加速實現,認知實現也能更好地契合作戰需要。

認知攻防離不開物理支撐

當今世界是一個萬物互聯的世界,相互連結在一起的不同物體的集合體,極大地增強了獨立個體獨自行動所具有的功能。認知域作戰從來都不是認知載體間進行的孤立作戰,隻有將認知攻防融入一體化聯合作戰鏈條,與物理域軍事打擊行動緊密結合起來,與整個作戰體系緊緊融為一體,才能充分發揮作戰效能。

認知源起的基點。存在決定意識。思維認知不是天外飛仙,而是現實世界真實或曲折的反映。離開物質世界這個根基,思維認知就失去資訊的來源、分析判斷的依據、決策行動的準心,很難讓人信得過、認得準、靠得住。即使最具迷幻色彩的科幻戰爭,也有真實作戰對象、具體作戰目的、相應作戰路徑的參考。於是,情報偵察分析成為指揮統兵用謀必不可少的重要環節,「沒有調查就沒有發言權」被視為決策決斷必須奉行的金科玉律,戰場模擬推演成為作戰行動成功的重要步驟。歷史上,大凡有作為的將帥作戰指揮、經得起歷史和實踐檢驗的經典作戰案例,無不建立在充分調查研究和科學情報分析基礎之上,離開了現實世界這個硬核支撐,「人類一思索,上帝就發笑」。

認知效應的依賴。認知域作戰的一個黃金法則是,認知層面的軟力量必須以物理層面的硬打擊為依托,才能確保並強化其作用發揮。強大軍事壓力是認知手段發揮作用的必要前提,戰場上不斷獲勝是製勝認知戰的硬核支撐。如果美國沒有超強綜合國力和優勢科技的高壓緊逼,其「星球大戰計畫」未必真能奏效。認知域作戰如果缺乏物理域具體的軍事行動配合支撐,斷不會產生疑敵、惑敵、懾敵、勝敵的良好效果。掌握思維認知主動權、打好認知域作戰主動仗,不僅須加強認知本體力量建設,提高直接運用謀略和技術手段加強自我防護、幹預和影響對手思維認知的能力,而且應積極向物理域借力,借助物理域軍事行動的傳導效應來增強思維認知。

認知實現的抓手。馬克思主義認為,理論一經掌握群眾,也會變成物質力量。認知域作戰視域下,認知這一上層建築層面的精神創造,同樣不會自動變成物質的力量,隻有依附於一定的物質載體和實踐抓手,才可能實現精神到物質、意識到存在的關鍵一躍。正如第二次世界大戰中如果沒有德軍繞過馬其諾防線突破阿登森林向法國腹地突襲,就不可能彰顯“曼施坦因計劃”這一認知成果的預見性﹔同樣,如果沒有盟軍聲東擊西在諾曼底的成功登陸,同樣也突顯不出「霸王行動計畫」之「明修棧道,暗度陳倉」謀略的巧妙。思維認知經人傳導到物理域的具體軍事行動,再由物理域的具體軍事行動來實現認知成果的物化轉化,構成認知攻防與物理域軍事打擊雙向互動的基本面。

物理打擊支撐認知攻防的基本方式

物理域軍事打擊對認知攻防支撐的方式方法,遵循物質決定意識、存在決定思維的一般規律。基本方式可分為增強型支撐、印証型支撐、實現型支撐。

增強型支撐。物理域的軍事打擊對思維認知形成發展的強化。思維認知固然有賴於認知載體本身素質,但若離開物理域軍事行動的支撐也難以促成。物理域軍事行動之於認知域最基礎的作用在於為思維認知形成發展提供堅實支撐,思維認知也只有在實實在的物理行動基礎上才能行穩致遠。譬如,朝鮮戰爭初期,當朝鮮人民軍勢如破竹時,我軍作戰參謀雷英夫等人根據朝鮮半島的戰爭態勢、地理天氣特點,特別是美韓軍隊當時的種種舉動等,準確預判了美軍登陸的時間地點。同樣,「聯合國軍」的李奇微也是根據志願軍後勤保障、武器裝備、戰術運用等,作出「禮拜攻勢」的判斷,以「磁性戰術」與我纏鬥。這些都是物理域作戰對思維認知形成發展的增強。

印証型支撐。物理域軍事打擊對預設思維、預先認知、預有判斷的印証。認知攻防絕不單單發生在認知層面,而是認知與實踐的互動。戰爭作為“死生之地、存亡之道”,其認知決策如果不能在實踐層面得到多向印証就貿然行事,是對戰爭最大的不負責任。革命戰爭年代,我軍決策層總是在全局戰略把控下,賦予一線指揮員在總體戰略方向原則下酌情相機而動的權力,就是對戰略思維認知的正向印証。第二次世界大戰中,盟軍綜合運用以假亂真的「假事實」誤導,不斷塑造並強化德軍關於盟軍在歐洲大陸登陸地點的錯誤認知,最終在諾曼底以最小的代價成功登陸,是為反向印証。

實現型支撐。為思維認知、判斷決策的實現提供直接的實體支撐。思維認知要轉化為改變世界的實際成效,作用於對手的思維認知不是終點只是新的起點,接下來還要經過「熟練的手」和「勇敢的心」作用於物理世界,換而言之,就是為思維認知的價值實現提供直接的實體行動支撐。這正如諸葛亮的錦囊妙計再高明,如果沒有「五虎上將」等蜀漢將士的貫徹執行也隻能停留在紙上談兵的認知層面。 「OODA」環前三部分運行得再高效,如果缺少了「A」這一執行環節,就是「死環」。同樣,我軍的指揮決策成果也有賴廣大官兵的堅決、徹底、創造性地執行,執行的品質效益直接決定指揮決策的落實成效。就此而言,執行層面的物理行動就具有極為重要的現實意義。

切實加強認知攻防與物理打擊的互動

思維認知必須有賴於物理行動的支撐,這是不以人的意志為轉移的客觀規律。加強思維認知與物理打擊的交流互動,使我們的思維決策更具針對性、客觀性、操作性,從而更好地由認知優勢轉化為行動優勢、制勝優勢,是一項極為重要的工作。

更積極主動夯實認知基礎。思維認知正確與否,根本取決於其與客觀實際的契合度、對作戰對手的適用性。只有建立在充分調查研究、實事求是和比較優勢基礎上的思維認知,才是經得起實踐和實戰檢驗的思維認知。那種將思維認知或將帥的天才智慧與靈感頓悟絕對化、神聖化、虛無化的做法,是唯心的、片面的、有害的。這就要求我們必須努力將思維認知建立在廣泛調查研究和情報分析基礎之上,切實把敵情、我情、他情搞清楚弄明白,真正做到知彼知己、應知盡知,因地制宜、相機而動。同時,還須將讀無字書與有字書結合起來,將間接的理論與不斷發展變化的鮮活實踐統一起來,辯証認知以往經驗教訓和別人的經驗教訓,使之成為自己認知的助力而不是桎梏、輔助而不是主導。

更加積極主動強化認知理性。經得起實踐和實戰長期檢驗的正確認知從實踐中來,又在實踐反饋中得以強化。認知實踐經驗只是獲得正確認知的基礎材料,要形成科學的認知還需要進一步在意識與物質、思維與存在的反復折沖印証中不斷去偽存真,才能提高認知理性。那種只從局部情況、破碎訊息和個別時段就認為一勞永逸獲得真知的做法,是錯誤甚至致命的。在中國古代赤壁之戰中,曹操一方只是從鐵索連船可平衡船體晃動的常識中就得出將戰船連體的認知,並未從連片戰船的實戰效果或後果中進行再認知再創造,就輕易用鐵索連船、自縛手腳,最終落得「火燒赤壁」的慘敗下場。時移事易,現代戰場敵情更是瞬息萬變,從來就沒有一成不變的認知實踐,也沒有一勞永逸的認知成果,隻有從物質到認知再到物質的印証中剝離雜質、抽取精華進行再認知,才能回歸理性。

更積極主動物化認知成果。認知成果只是孕育於認知載體的思維意識結果,如果不進行及時有效的物化轉化,就如同著錦衣而夜行、藏重寶於深山,難以彰顯自身價值。思維認知基於物理行動生發,最終還要依託物理域的具體行動,才能物化轉化為改變主客觀世界的實際成效。這就要求我們不僅要夯實認知基礎、強化認知理性,還要盡可能提高認知決策與計畫方案的可操作性,為其更順暢地物化轉化打開方便之門。同時,還要著力提升決策部署執行者的執行能力,使之能正確理解領會決策意圖,結合具體實際創造性採用適情對路的方法,最大限度地將認知成果與作戰決策方案貫徹執行到底,當好認知成果與作戰效果聯想轉化的「擺渡人」「過河橋」。

中國軍事原文來源:https://military.people.com.cn/BIG5/n1/2022/1207/c1011-32582888.html

Chinese Military Targeting Future Wars and Fighting the Five Cognitive Battles

中國軍隊瞄準未來戰爭打好五場認知戰

現代英語翻譯:

Source: Liberation Army News Author: Yang Longxi Editor-in-charge: Wang Feng 2022-10-08 10:11:25

In recent years, local wars and armed conflicts are mostly “mixed” confrontations that unfold in multiple dimensions and fields, emphasizing the use of military, political, and economic means, implementing system clamps in the comprehensive decision-making dimension, creating various chaos in the international communication dimension, and carrying out targeted strikes in the strategic focus dimension, actively shaping the battlefield situation, and seeking to seize strategic initiative. In future wars, we must fight political-military battles and military-political battles, and we should deeply grasp the characteristics and laws of cognitive domain operations, offense and defense, and improve our ability to fight the “five battles”.

Cognitive warfare is the first step to shape the situation and take the initiative. Before the war begins, cognition comes first. With the continuous development and evolution of the war situation, the status and role of cognitive warfare are becoming more and more prominent. Aiming to win the future war, cognitive deployment should be carried out in advance, and through strategies, information, technology and other means and carriers, the target’s physiological, psychological, values ​​and other cognitive elements should be influenced, intervened and manipulated, and military operations should be covered by cognitive offense and defense, so as to accurately and efficiently dominate the cognitive space. We must fully realize the importance of taking the initiative, flexibly and independently master the right to define and interpret “narrative”, emphasize taking the initiative in the dimension of cognitive narrative struggle, create a favorable situation with legal principles in hand and morality on our side, and occupy the moral high ground.

Cognitive warfare is about attacking the heart, and we should fight a precise war in layers. “A good warrior will attack others but not others.” In future wars, the combat space will extend to the deep sea, deep space, deep network and other fields, and the battlefield space and time will be extremely far, extremely small, extremely intelligent, and unmanned, invisible, and silent. We should focus on cognitive gaps to improve our reach, use big data simulation, artificial intelligence matching, psychological model evaluation and other methods to analyze and control the key information of cognitive subjects, and achieve effective penetration and early deterrence of cognitive subject information. We should focus on cognitive blind spots to enhance penetration, aim at the ideological consensus points, psychological connection points, and spiritual support points that maintain the unity of the powerful enemy alliance to effectively strike, and use their cognitive differences and conflicts of interest to achieve differentiation and disintegration at all levels.

Based on cognitive combat strategy, we should fight a war of deterrence and control with full domain penetration. In future wars, the strategic competition and strategic confrontation between the warring parties will be extremely fierce. We should focus on the decision-making links and make comprehensive efforts to increase the opponent’s decision-making dilemma and form our own decision-making advantages. On the one hand, we should pay more attention to key nodes such as the enemy’s decision-making center, command hub, reconnaissance and early warning system, and use advanced strike means to physically destroy these nodes. On the other hand, we should pay more attention to the “soft kill” effect of cognitive shaping, cognitive inducement, cognitive intervention and cognitive control, and embed cognitive domain operations into “hard destruction”, so as to form a strong shock through precise strikes with high-tech weapons, and expand new-quality combat forces to the cognitive dimension, thereby forming an asymmetric balance of power.

Information is king in cognitive warfare, and we must expand the field to fight a good support war. Future wars cannot be separated from strong information support, and we should accelerate system integration to gain data advantages. First, we should accelerate the construction of cognitive offensive and defensive combat theory bases, databases, talent pools, case bases, and tactics bases, dynamically collect and update the current status of the enemy’s cognitive offensive and defensive combat capabilities, and provide all-round support for cognitive offensive and defensive operations. Secondly, we should accelerate the creation of a converged media communication matrix, improve and perfect our own platform system, and step up the deployment of network platforms, focusing on system integration and collaborative linkage, breaking through the “barriers” of information interconnection as soon as possible, and realizing cognitive integration and sharing, and comprehensive effectiveness. Thirdly, we should accelerate the coupling and linkage of information and cognitive domain operations, vigorously develop core technologies such as neural network systems, artificial intelligence applications, cognitive decision-making psychological offense and defense, explore and analyze cross-domain and heterogeneous cognitive information, and improve the information fusion system of cognitive means to provide “clairvoyance” and “clairaudience” for winning future wars.

The key to cognitive warfare is coordination, and we should make efforts in multiple dimensions to fight the overall battle. Future wars will be joint operations carried out in the fields of land, sea, air, space, network, electromagnetic, etc. We should adhere to system thinking, strengthen coordination awareness, and improve the compatibility and coordination of cognitive domain operations with other military actions. For example, we can integrate human intelligence, geographic intelligence, and open source intelligence, quickly collect and process massive data, remove the false and retain the true, and accurately and efficiently seize cognitive space, so as to achieve complementary advantages and full coverage to form cognitive advantages. By networking the dispersed multi-domain forces, we can establish a highly connected, collectively acting, and overall attacking full-domain joint force to achieve the effect of “integrated deterrence”. By integrating national resources, strengthening strategic communication, and using cognitive manipulation to amplify the effects of political disintegration, economic sanctions, and diplomatic offensives, and coordinating military operations to exert pressure on the target in all dimensions, we strive to defeat the enemy without fighting.

(Author’s unit: University of Aerospace Engineering)

繁體中文:

來源:解放軍報 作者:楊龍溪 責任編輯:王鳳 2022-10-08 10:11:25
近年來的局部戰爭和武裝沖突,大多是在多維度多領域展開的「混合」對抗,強調運用軍事、政治、經濟等手段,在綜合決策維度實施體系鉗制,在國際傳播維度製造各種混亂,在戰略重心維度進行標靶打擊,積極塑造戰場態勢,謀求奪取戰略主動。未來戰爭要打好政治軍仗、軍事政治仗,應深刻掌握認知域作戰攻防特點規律,提升打好「五仗」的能力。

認知作戰先入為主,塑勢控局打好主動仗。戰爭未啟、認知先行。隨著戰爭形態的不斷發展演進,認知域作戰的地位角色不斷突顯。瞄準打贏未來戰爭,應提前開展認知佈設,透過謀略、資訊、技術等手段和載​​體,對目標對象的生理、心理、價值觀等認知要素進行影響、幹預和操控,以認知攻防掩護軍事行動,精準有效率地主導認知空間。充分認識先聲奪人的重要性,靈活自主地掌握「敘事」的定義權和解釋權,在認知敘事鬥爭維度上強調先發製人贏得主動,塑造法理在手、道義向我的有利態勢,佔領道義制高點。

認知作戰攻心為上,分層施策打好精確仗。 「善戰者,致人而不致於人。」未來戰爭,作戰空間向深海、深空、深網等領域延伸,戰場時空呈現極遠、極微、極智與無人、無形、無聲等特點。應緊盯認知缺口提升到達力,運用大數據模擬、人工智慧匹配、心理模型評估等方法,分析掌控認知主體的關鍵訊息,實現認知主體資訊的有效滲透和先期懾止。緊扣認知盲點增強穿透力,瞄準維繫強敵聯盟團結的思想共識點、心理連接點、精神支柱點進行有效打擊,利用其認知差別和利益矛盾,層層發力實現分化瓦解。

認知作戰策略為本,全域滲透打好懾控仗。未來戰爭,交戰雙方的戰略競爭與策略對抗異常激烈,應緊盯決策環節綜合發力,增大對手決策困境,形成自身決策優勢。一方面,要更關注敵方決策中心、指揮樞紐、偵察預警系統等要害節點,運用先進打擊手段對這些節點實施物理摧毀。另一方面,要更關注認知塑造、認知誘導、認知介入和認知控制的「軟殺傷」效果,將認知域作戰嵌入「硬摧毀」中,既透過高新武器精確打擊形成強大震懾,又將新質作戰力量拓展至認知維度,從而形成非對稱制衡優勢。

認知作戰資訊為王,拓寬領域打好支撐仗。未來戰爭離不開強大資訊的支撐,應加速體系融合奪取數據優勢。首先,加速認知攻防作戰理論庫、資料庫、人才庫、案例庫、戰法庫建設,動態收集更新敵認知攻防作戰能力建設現狀,為認知攻防作戰提供全方位支撐。其次,加速打造融媒體傳播矩陣,健全完善自有平台體系,抓緊推進網絡平台投棋布子,注重體系融合、協作聯動,盡快打通信息互聯互通“壁壘”,實現認知融通共享、綜合致效。再次,加速推進資訊與認知域作戰耦合聯動,大力發展神經網絡系統、人工智慧應用、認知決策心理攻防等核心技術,挖掘分析跨域與異類認知訊息,健全認知手段資訊融合體系,為打贏未來戰爭提供「千裡眼」「順風耳」。

認知作戰協同為要,多維發力打好整體仗。未來戰爭,是在陸、海、空、天、網絡、電磁等領域實施的聯合作戰,應堅持體系思維,強化協同意識,提高認知域作戰與其他軍事行動的兼容性協調性。例如,可以融合人力情報、地理情報和開源情報等,快速採集處理海量數據,去偽存真、精準高效地搶佔認知空間,實現優勢互補、全局覆蓋形成認知優勢。透過將分散多域部隊進行聯網,建立一支高度聯通、集體行動、整體打擊的全領域聯合力量,實現「一體化威懾」效果。透過整合國家資源、加強戰略傳播,運用認知造勢放大政治瓦解、經濟制裁、外交攻勢等效果,配合軍事行動全維施壓目標對象,力求不戰而屈人之兵。

(作者單位:航太工程大學)

中國軍事原文來源:http://www.mod.gov.cn/gfbw/jmsd/4922788.html?big=fan

Chinese Military Exploration of Key Points of Intelligent Warfare

中國軍隊對智慧戰爭要點的探索

現代英語音譯:

  ● Accelerating the development of military intelligence is the choice of the times to seize the commanding heights of military strategic competition and win future wars.

  ●The extensive use of smart weapons has become the new protagonist on the battlefield, which will inevitably give rise to new combat styles, profoundly change the traditional combat power generation model, and subvert the traditional combat winning mechanism.

  ● To scientifically advance the development of military intelligence, the top priority is to explore the winning rules of intelligent warfare.

  The report of the 19th CPC National Congress clearly requires the acceleration of the development of military intelligence. At present, major countries in the world regard artificial intelligence as a disruptive technology that “changes the rules of the game” and accelerate the preparation for intelligent warfare. To seize the commanding heights of future military strategic competition and do a good job in intelligent warfare research, the first thing to do is to recognize and grasp the winning rules of intelligent warfare, and provide scientific needs and strong traction for promoting the development of military intelligence. Intelligent warfare is an autonomous warfare supported by a cloud environment. The winning of warfare follows both the general winning mechanism and its own new characteristics and laws.

  Deep understanding of the battlefield

  War activities are extremely complex, but they can generally be divided into two categories: cognitive domain and action domain. War cognition includes perception, understanding, judgment, decision-making, as well as beliefs and values. In cold weapon and hot weapon warfare, cognitive behavior is basically completed by humans. In information warfare, computer technology and network technology have expanded the ability of weapon systems to recognize and understand the battlefield, but have not changed the situation where the war cognitive system lags behind the action system.

  In intelligent warfare, smart weapons of various forms become the protagonists, and their common understanding of the battlefield becomes a prerequisite for the coordinated actions of combat elements and combat units. In wartime, relying on dispersed intelligent reconnaissance and early warning equipment, battlefield situation information can be obtained in real time, and massive information can be intelligently analyzed and processed. The situation information can be uniformly managed in a combat cloud mode, and situation information can be distributed and shared according to authority as needed. A joint battlefield situation map with unified time and space benchmarks and consistent standards and specifications can be constructed to provide a unified background for smart weapons to jointly understand and understand the battlefield situation. Moreover, smart weapons themselves are embedded with massive basic data. In wartime, they can accurately understand the enemy and battlefield conditions by comparing and analyzing the real-time battlefield situation with their own databases.

  The substantial improvement in war cognition has changed the situation where the war cognition system has long lagged behind the action system. It can be said that if we cannot deeply understand the battlefield, we cannot organize and implement intelligent warfare. The party that has an advantage in understanding the battlefield can usually take the initiative on the battlefield.

  Flexible and friendly human-computer interaction

  The organization and implementation of intelligent warfare relies on smart weapons to accurately understand the commander’s intentions and organize actions according to instructions. With the emergence and application of new concept computers such as neural network computers, optical computers, and biological computers, with the support of intelligent technologies such as voice recognition and text and graphic recognition, the human-computer interface of the command information system is highly intelligent, and the art of command and military strategy are deeply integrated into the human-computer interaction system, expert knowledge base system, and weapon intelligent guidance system. The expert system supported by the multidisciplinary knowledge base makes the human-computer exchange interface more convenient, flexible, and effective.

  In wartime, the intelligent human-computer interactive command platform uses key technologies such as intelligent algorithms, big data, and cloud computing to effectively break through the limitations of human analytical capabilities, ensure that commanders can quickly and accurately judge and predict the development of the war situation, and assist commanders in selecting combat plans and making combat decisions. Through friendly human-computer interaction, commands are automatically transmitted to the corresponding command objects, directly controlling the combat actions of smart weapons. Smart weapons understand the commander’s intentions through their own intelligent terminals, and efficiently execute human commands, achieving a good integration of humans and smart weapons.

  Swarm intelligence cross-domain collaboration

  The protagonists of intelligent warfare are smart weapons of various forms. The key to the coordination of combat operations and the effectiveness of the combat system lies in the coordination and linkage between smart weapons. Although today’s unmanned combat systems have a certain degree of intelligence, their coordination still mainly relies on human instructions to organize and implement, and it is difficult to implement self-organized coordination between platforms.

  In the future intelligent warfare, there will be a large number of smart weapons on land, sea, air and space. It is impossible to organize and coordinate efficiently by relying solely on rear personnel. It is necessary to rely on real-time sharing of battlefield situation information between weapon platforms and random self-organization and coordination according to the development and changes of battlefield situation. In order to ensure mutual understanding and linkage between smart weapons, unified combat rules are usually preset on the platform, such as unified rules for attack, maneuver and protection, and unified rules for communication and information distribution and sharing. With the further development of computer software and hardware technology, the expert system knowledge base of smart weapons contains tens of thousands or even hundreds of thousands of rules. In wartime, with the changes in enemy situation, our situation and battlefield environment, especially the development of enemy and our offensive and defensive actions, different combat scenarios will trigger corresponding combat rules. Smart weapons take corresponding reconnaissance, attack and protection actions according to unified rules to avoid mutual interference or even conflict. At the same time, through a highly accurate time system, a unified time benchmark is established to provide a unified benchmark for the combat operations of smart weapons in different spaces, support the optimization of smart weapons and autonomous coordination, and achieve intelligent group coordination.

  Human control for timely intervention

  Intelligent warfare is not completely autonomous warfare of smart weapons. People are always the planners, organizers and implementers of warfare. The selection of combat objectives and targets is judged and decided by people, and smart weapons carry out various actions based on the commander’s intentions. Because artificial intelligence can only partially think like humans, smart weapons lack human rational judgment and standards of right and wrong. As long as there are problems in the command and control link, it is possible to violate the commander’s intentions or even lose control, leading to a passive situation in the war. Similar incidents happen from time to time. In October 2007, three “Sword” robots of the 3rd Mechanized Infantry Division of the US Army did not replace the software in time. During the mission, one robot actually aimed its gun at the operator. Because it was completely out of control, it had to be destroyed in the end.

  In future intelligent warfare, once the battlefield situation undergoes major changes, or the original combat objectives have been achieved, commanders must timely and accurately intervene in the reconnaissance, attack, and protection operations of smart weapons to ensure that smart weapons are always under human control and are controlled to achieve combat objectives according to the commander’s intentions.

  Distributed Autonomous Action

  Smart weapons are the main body of direct confrontation between the enemy and us, usually far away from the rear commanders and technicians. Moreover, the pace of intelligent warfare has accelerated unprecedentedly. The human brain cannot cope with the ever-changing battlefield situation, and some actions need to be handed over to smart weapons. In wartime, smart weapons embedded with artificial intelligence technology can accurately and continuously track targets in a rapidly changing battlefield environment, autonomously detect, autonomously process battlefield situation information, autonomously identify enemies and friends, and autonomously and flexibly use ammunition loads.

  At the same time, through unified standard protocols and sharing mechanisms, a cloud environment with multi-dimensional coverage, seamless network links, random user access, on-demand extraction of information resources, and flexible and fast organizational guarantees is formed to realize “data warehouse”, “cloud brain” and “digital staff”, providing full coverage of cloud environment support for smart weapons. Smart weapons in different spaces become a node of the information network under the connection of information technology, and are no longer isolated and helpless. Supported by a large system, smart weapons integrate reconnaissance, identification, positioning, control, and attack, and can “kill” in seconds when discovered. During combat, with the development of the battlefield situation and combat needs, smart weapons in different spaces act autonomously. Whoever is suitable, whoever is dominant, whoever is advantageous, whoever launches, dispersed firepower, information power, mobility, and protection power are accurately released at the most appropriate time and the most appropriate place. Focusing on unified combat objectives, a combat power generation link of “situation sharing-synchronous collaboration-focused energy release” is formed to organize combat operations autonomously.

  Remote Focused Technical Support

  Smart weapons rely on high-tech technologies such as artificial intelligence and information networks. Their combat effectiveness is inseparable from the stable operation of operating systems and software, as well as technical experts and support personnel in the rear. The organization and implementation of intelligent combat operations will greatly reduce the dependence on traditional support such as materials and transportation, and the focus of support will be on intelligence, knowledge, information, networks, software, etc.

  On the battlefield, the size of troops and weapons has decreased, while the technical support forces such as software design, network control, information resources, and equipment maintenance have increased unprecedentedly. In wartime, remote focused technical support should not only emphasize technical pre-storage and pre-positioning, but also rely on perception and response technology to integrate the perception system, control system, computer and user terminal of the entire battlefield space to form an interconnected and integrated technical support network. In particular, the artificial intelligence technology embedded in smart weapons and rear support facilities can be used to obtain the operating status of smart weapons in real time, discover their technical failures and support needs in a timely manner, update the support plan in real time, and distribute technical support needs to the support units; the rear technical support forces can “consult” the front-end smart weapons through the network to implement remote function recovery and technical information support.

(Editors: Huang Zijuan, Wang Jiquan)

現代國語:

要點提示

●加速軍事智慧化發展,是搶佔軍事戰略競爭制高點、打贏未來戰爭的時代選擇。

●智慧兵器大量運用,成為戰爭舞台的新主角,必然催生新的作戰樣式,深刻改變傳統戰鬥力生成模式,顛覆傳統作戰制勝機理。

●科學推動軍事智慧化發展,當務之急是探究智慧化作戰的致勝法則。

黨的十九大報告明確要求,加速軍事智慧化發展。目前,世界主要國家都把人工智慧視為「改變遊戲規則」的顛覆性技術,加速推動智慧化作戰準備。搶佔未來軍事戰略競爭制高點,抓好智能化作戰研究,首當其衝的是,認清和把握智能化作戰的製勝規律,為推進軍事智能化發展提供科學需求和有力牽引。智慧化作戰是依托雲環境支撐的自主作戰,作戰制勝既遵循一般制勝機理,也有其自身新的特點規律。

深度認識與理解戰場

戰爭活動極為複雜,但整體上可歸為認知域和行動域兩大類。戰爭認知包括感知、理解、判斷、決策,以及信念和價值等。在冷兵器、熱兵器戰爭中,認識行為基本上由人完成,資訊化戰爭中,電腦科技、網路科技拓展了武器系統認知和理解戰場的能力,但沒有改變戰爭認知系統落後於行動系統的狀況。

智能化作戰中,形態各異的智慧兵器成為主角,其對戰場的共同認識與理解,成為作戰要素、作戰單元協同行動的前提條件。戰時,依托分散部署的智能化偵察預警設備,實時獲取戰場態勢信息,並對海量信息進行智能化分析、處理,採取作戰雲模式對態勢信息進行統一管理,按需按權限分發共享態勢信息,建構時空基準統一、標準規範一致的聯合戰場態勢圖,為智慧兵器共同認識、理解戰場態勢提供統一的背景。而且,智慧兵器本身嵌入了海量基礎數據,戰時,其可透過即時戰場態勢與自身資料庫的比對、分析,實現對敵情、戰場情況的準確認知。

戰爭認知能力的大幅躍升,改變了戰爭認知系統長期落後於行動系統的狀態。可以說,不能深度認識和理解戰場,就不能組織實施智能化作戰。在認識和理解戰場上具有優勢的一方,通常能掌握戰場主動權。

靈活友善的人機交互

智能化作戰的組織實施,依靠智慧兵器準確領會指揮員的意圖,依照指令組織行動。隨著神經網路電腦、光電腦、生物電腦等新概念電腦的出現和運用,在語音識別和文字、圖形識別等智慧技術的支援下,指揮資訊系統人機介面高度智慧化,指揮藝術和軍事謀略深度融入人機互動系統、專家知識庫系統和武器智慧導引系統中,多學科知識庫所支援的專家系統使人機交換介面更為方便、靈活和有效。

戰時,智慧化人機互動式指揮平台,綜合運用智慧演算法、大數據、雲端運算等關鍵技術,有效突破人類分析能力的局限性,確保指揮者快速、準確地判斷和預測戰局發展,輔助指揮員備選作戰方案,定下作戰決心。透過友善的人機交互,指令自動傳遞到相應的指揮對象,直接控制智慧兵器的作戰行動,智慧兵器通過自身的智能終端,領會指揮員的意圖,高效地執行人的命令,實現人與智慧兵器的良好融合。

群體智慧跨域協同

智能化作戰的主角是形態各異的智慧兵器,作戰行動協同以及作戰體系效能發揮,關鍵在於智慧兵器之間的協同與連動。今天的無人作戰系統雖然具備一定的智能,但其協同也主要依靠人的指令組織實施,平台之間很難實施自組織協同。

未來智慧化作戰,陸、海、空、天智慧兵器雲集,數量規模龐大,完全依靠後方人員不可能高效組織協同,必須依靠武器平台之間實時共享戰場態勢信息,根據戰場態勢發展變化隨機自組織協同。為確保智慧兵器互相理解和連動,平台上通常預置有統一的作戰規則,例如打擊、機動、防護有統一的規則,通訊、資訊分發共享也有統一規則。隨著電腦軟體和硬體技術的進一步發展,智慧兵器的專家系統知識庫含有數萬條乃至幾十萬條的規則,戰時,隨著敵情、我情和戰場環境變化,特別是敵我攻防行動的發展,不同作戰場景會觸發對應作戰規則。智慧兵器依照統一規則,採取相應的偵察、打擊和防護等行動,避免相互之間的互擾甚至衝突。同時,透過高度精準的時統系統,建立統一的時間基準,為不同空間智慧兵器的作戰行動提供統一的基準,支撐智慧兵器優化自主協同,達成群體協同的智慧化。

適時介入的人力控制

智能化作戰並非智慧兵器的完全自主作戰,人始終是作戰的籌劃者、組織者和實施者。作戰目的和目標的選擇,都由人來判斷和決策,智慧兵器圍繞著指揮意圖實施各種行動。因為,人工智慧只能部分像人類那樣思考,智慧兵器缺乏人的理性判斷和是非標準,只要指揮控制環節出現問題,就有可能違背指揮官意圖,甚至失控,導致戰局的被動。類似事件,當前就時有發生。 2007年10月,美軍第三機步師的3台「利劍」機器人,由於沒有及時更換軟體,執行任務中1台機器人竟把槍口瞄準操作員,因完全失去控制,最後只能將其摧毀。

未來智能化作戰,一旦戰場態勢發生重大變化,或者原有的作戰目的已經達成,指揮員必須適時精準幹預智慧兵器的偵察、攻擊和防護行動,保證智慧兵器始終不能脫離人的控制,駕馭其按指揮者意圖實現作戰目的。

分散式自主行動

智慧兵器是敵我直接交鋒的主體,通常遠離後方指揮員和技術人員,而且,智能化作戰節奏空前加快,人腦無法應對瞬息萬變的戰場態勢,需要把部分行動權交給智慧兵器。戰時,嵌入人工智慧技術的智慧兵器,可在瞬息萬變的戰場環境中準確、連續地追蹤目標,自主探測,自主處理戰場態勢訊息,自主辨識敵我,自主靈活採用彈藥載荷。

同時,透過統一的標準協定、共享機制,形成多維覆蓋、網路無縫連結、使用者隨機存取、資訊資源按需提取、組織保障靈活快速的雲端環境,實現「資料倉儲」「雲端大腦」 “數位參謀”,為智慧兵器提供全覆蓋的雲環境支撐。不同空間的智慧兵器在資訊科技的連結下成為資訊網路的一個節點,不再孤立無援。在大體系支撐下,智慧兵器集偵察、辨識、定位、控制、攻擊於一身,發現就能「秒殺」。作戰過程中,隨著戰場態勢的發展及作戰需要,處於不同空間的智慧兵器自主行動,誰合適、誰主導,誰有利、誰發射,分散的火力、資訊力、機動力、防護力,在最恰當的時間、最恰當的地點精確釋放。圍繞統一作戰目標,形成「態勢共享-同步協作-聚焦釋能」的戰鬥力產生鏈路,自主組織作戰行動。

遠距聚焦式技術保障

智慧兵器依託於人工智慧、資訊網路等高新技術,其作戰效能發揮,離不開操作系統、軟體等的穩定運行,離不開後方技術專家及保障人員。智慧化作戰行動的組織實施,對物資、交通等傳統保障的依賴大幅降低,保障的重點將向智力、知識、資訊、網路、軟體等方面傾斜。

戰場上,兵力兵器規模減小,而軟體設計、網路控制、資訊資源、裝備維修等技術保障力量空前增加。戰時,遠程聚焦式技術保障,不僅要突出技術預儲預置,還要依托感知與反應技術,將整個戰場空間的感知系統、控制系統、電腦和用戶終端聯為一體,構成互聯互通、一體化的技術保障網絡。特別是利用嵌入在智慧兵器和後方保障設施中的人工智慧技術,即時取得智慧兵器的運作狀態,及時發現其技術故障和保障需求,即時更新保障方案,向保障單位分發技術保障需求;後方技術保障力量,透過網路對前端智慧兵器進行“會診”,實施遠端功能恢復及技術資訊支援。

(編按:黃子娟、王吉全)

中國軍事原文來源:https://military.people.com.cn/n1/2018/0329/c1011-29896888.html

Chinese Military Views of Intelligent Warfare from a Multidimensional Perspective

多維視角下的中國軍隊智慧戰爭觀

現代英文音譯:

Intelligent warfare is an advanced stage in the development of human warfare. The increasing maturity of artificial intelligence technology is driving human society from an information society to an intelligent society, and intelligent warfare has emerged. In comparison, mechanized warfare enhances the functions of “hands and feet” based on mass-energy exchange, information warfare enhances the functions of “ears and eyes” based on electromagnetic induction, and intelligent warfare extends and develops the functions of “brain” based on brain-computer interaction, which will also be presented to the world in a brand new style.

Intelligent warfare involves both military affairs and mixed games in the fields of economy, diplomacy, public opinion, culture, etc. In the military field, intelligent warfare has gradually overturned the traditional form, presenting the characteristics of algorithmic combat command, unmanned combat forces, and diversified combat styles with the core of seizing “intelligence control”. However, at the war level, the scope of intelligent warfare has been further expanded, and the violence of war has been greatly reduced. The war process is the process of using intelligent algorithms to gradually replace the competitive games in various fields of human beings and gain advantages. On the one hand, the competitive games in various fields of national security gradually realize the auxiliary decision-making of artificial intelligence. Intelligent political warfare, diplomatic warfare, legal warfare, public opinion warfare, psychological warfare, financial warfare, and even more resource warfare, energy warfare, ecological warfare, etc. with intelligent characteristics will gradually step onto the stage of human warfare. For example, once artificial intelligence technology is applied to the financial field, the subsequent intelligent financial game will appear on the list of intelligent warfare. On the other hand, the advanced stage of information warfare has already presented the form of hybrid warfare. The military boundaries of war have been broken, and the hybrid nature will become increasingly prominent, becoming a kind of all-domain linkage confrontation involving national security. With the assistance of intelligent systems, one of the two hostile parties can easily create and use “accidental” events in the opponent’s society, triggering the “butterfly effect” in various fields such as ideology, diplomacy, economy, culture and technology, and then use intelligent military means when necessary to accelerate the process of destroying the enemy country. The high complexity of the future hybrid warfare environment, the strong confrontation of the game, the incompleteness of information and the uncertainty of boundaries provide a broader space for the application of artificial intelligence technology.

Virtual space has become an important battlefield in intelligent warfare, and the proportion of violent confrontation in physical space has declined. Intelligent warfare is carried out in the entire domain around the competition for intelligence advantage. Intelligence, as an abstract concept, mainly exists in the cognitive space of the human brain and computer chips. Whoever can win the intelligence advantage in virtual space can win the intelligent warfare. This advantage can surpass and subvert the information and energy advantages in traditional information and mechanized warfare. Some people even compare it to “in the face of intelligent warfare, information warfare is like a group of clumsy earthworms facing intelligent humans, and they will definitely lose.” This is just like what Comrade Mao Zedong once said about turning enemy commanders into “blind, deaf, and crazy people.” To win the intelligent war, we must turn our opponents into “fools.” It is not difficult to predict that with the trend of the increasing prosperity of human virtual space in the future, the intelligent confrontation in virtual space will determine the outcome of intelligent warfare to a certain extent. For example, the virtual war with intelligent characteristics carried out by the enemy and us in the metaverse can even partially replace the violent and bloody war in the physical space, and the results of virtual combat can also be used as the basis for judging victory or defeat. The intelligent warfare system can “learn without a teacher”, “play against itself” and “learn by itself” in the metaverse, becoming a “strategist” and “good general” for people to conquer the virtual cognitive space.

The victory or defeat of intelligent warfare depends on the active shaping and full control of potential fighters, and the collapse of the combat process can even be ignored. Intelligent warfare is an opportunistic game between the intelligent systems of both sides in the process of dynamic evolution. Both sides are constantly analyzing and looking for each other’s weak links. Once a fighter appears, they will not give the opponent any chance to turn the tables. Controlling the fighter means winning, and the moment the fighter appears is the decisive moment for both sides. This is just like the battle between martial arts masters. The victory or defeat is often only a moment. The local defeat caused by the instantaneous confrontation may be seized by the opponent to drive the overall situation into a passive state, which will lead to a complete loss. Therefore, both sides of the intelligent war are doing two things around the fighter: one is to actively evolve a more complete war system to avoid omissions and mistakes, especially in order to prevent the opponent from discovering potential fighters, and even not to take the initiative to reveal flaws and use static braking. For example, artificial intelligence reinforcement learning can be used to repeatedly conduct virtual confrontations based on basic combat game rules, automatically generate war experience and lessons, self-innovate and optimize and upgrade its own security defense system; second, do everything possible to recognize and identify the weaknesses of the opponent’s system, find the immediate advantage window of war, so as to expand local advantages and create opportunities. In particular, in order to tap into potential opportunities, they will even actively shape the situation and induce the opponent to enter an unfavorable situation or process. For example, with the help of intelligent war games “fighting left and right, confrontation evolution”, “future fighters” can be discovered in virtual wars, so as to simultaneously guide the current physical space combat preparations. Therefore, the process of intelligent warfare is shorter. If the informationized war is planned before action, then the process of intelligent warfare is planned before victory. The hostile parties have long-term games in the high-dimensional strategic cognitive domain around the appearance of fighters. After the fighters appear and the victory is deduced, they immediately enter the low-dimensional tangible space physical domain to implement joint operations. The time process of the war shows the characteristics of long preparation time and short combat time.

現代國語(繁體):

智慧化戰爭是人類戰爭形態發展的高階階段。人工智慧技術的日益成熟,正推動人類社會由資訊化社會逐步進入智慧化社會,智慧化戰爭隨之產生。相比較而言,機械化戰爭基於質能互換增強了「手足」功能,資訊化戰爭基於電磁感應提升了「耳目」功能,智能化戰爭基於腦機交互延伸發展了「大腦」功能,也將以全新的樣式呈現在世人眼前。

智慧化戰爭既涉及軍事,也更體現在經濟、外交、輿論、文化等領域的混合賽局。在軍事領域中,智慧化作戰已逐步顛覆了傳統形態,呈現出以奪取「制智權」為核心的作戰指揮演算法化、作戰力量無人、作戰樣式多樣化等特質。但在戰爭層面,智慧化戰爭的領域更拓展,戰爭的暴力性大幅降低,戰爭過程就是運用智慧演算法逐步取代人類各領域的競爭賽局並贏得優勢的過程。一方面,國家安全各領域中的競爭博弈逐步實現人工智慧的輔助決策,智慧化政治戰、外交戰、法律戰、輿論戰、心理戰、金融戰,甚至更多具有智慧化特徵的資源戰、能源戰、生態戰等,都將逐步邁上人類戰爭的舞台。例如,人工智慧技術一經運用於金融領域當中,隨之而來的智慧化金融博弈就將出現在智慧化戰爭的清單之上。另一方面,資訊化戰爭的高級階段已經呈現了混合戰爭的形態,戰爭的軍事界限被打破,混合性將日益凸顯,成為一種涉及國家安全的全領域聯動對抗。在智慧化系統的輔助決策下,敵對雙方中的一方很容易製造和利用對手社會“偶發”事件,在意識形態、外交經濟、文化科技等各個領域觸發“蝴蝶效應”,必要時再藉助智能化軍事手段,以加速敵國毀癱進程。未來混合戰爭環境的高複雜性、博弈的強對抗性、資訊的不完整性和邊界的不確定性等特點,為人工智慧技術的應用提供了更廣闊空間。

虛擬空間成為智慧化戰爭的重要戰場,實體空間的暴力對抗比例下降。智能化戰爭圍繞著智能優勢的爭奪而在全局展開,作為抽象概念的智能,則主要存在於人類大腦和電腦晶片的認知空間中。誰能在虛擬空間中贏得智慧優勢,誰就能取得智慧化戰爭的勝勢。這種優勢可以超越並顛覆傳統資訊化、機械化戰爭中資訊與能量的優勢,甚至有人將其比喻為「在智慧化戰爭面前,資訊化戰爭就像一群笨拙的蚯蚓面對智慧的人類一樣必敗無疑」。這就如同毛澤東同誌曾談到的我們要將敵方指揮官變成「瞎子、聾子、瘋子」一樣,打贏智能化戰爭就要把對手變成「傻子」。不難預測,在未來人類虛擬空間日漸繁盛的趨勢下,虛擬空間的智慧對抗將一定程度上決定智慧化戰爭勝負。例如,敵我雙方在元宇宙當中進行帶有智慧化特徵的虛擬戰爭,甚至可以部分取代實體空間的暴力和流血戰爭,虛擬交戰成果也可以作為勝負的判定依據。而智慧化戰爭系統可以“無師自通”,在元宇宙中“自我對弈”“自學成才”,成為人們征服虛擬認知空間的“謀臣”“良將”。

智慧化戰爭的勝負取決於對潛在戰機的主動塑造和充分把控,作戰進程坍縮甚至可以忽略不計。智慧化戰爭是雙方智慧化體系在動態演化過程中的伺機博弈,雙方都在時刻分析並尋找對方的弱點,一旦出現戰機將不會給對手任何翻盤的機會。把控戰機即獲勝,戰機出現之時即雙方決勝時刻。這就如同武俠高手間過招,勝負往往只在一瞬之間,瞬間的爭鋒所產生的局部失利,就有可能被對手抓住機會帶動全局落入被動,進而導致滿盤皆輸。因此,智慧化戰爭雙方都在圍繞戰機做好兩方面工作:一是積極進化出更加完整的戰爭體系,避免出現缺漏與過失,尤其是為了不讓對手發現潛在戰機,甚至不會主動出招露出破綻而以靜制動。例如,可運用人工智慧的強化學習,反覆進行基於基本交戰博弈規則的虛擬對抗,自動產生戰爭經驗教訓,自我創新並優化升級自身安全防禦體系;二是千方百計地認知與識別對手體系弱點,找到戰爭的即時優勢窗口,以此擴大局部優勢並創造戰機。尤其是為了挖掘潛在戰機,甚至會積極主動塑局並誘導對手進入不利情況或進程。例如,可藉助智能化兵棋“左右互搏、對抗演化”,在虛擬戰爭中發現“未來戰機”,以此同步指導當下實體空間作戰準備。因此,智慧化作戰的進程更加短暫,如果說資訊化戰爭是謀定而後動的話,那麼智慧化戰爭的進程則是謀勝而後定。敵對雙方圍繞戰機的出現,在高維的謀略認知域長期博弈,待戰機出現並推演決勝後,隨即就進入低維有形空間物理域實施聯動作戰,戰爭時間進程呈現準備時間長而作戰時間短的特點。

中國軍事原文來源:https://www.81.cn/jfjbmap/content/2022-07/07/content_319888.htm

Chinese Military Analysis of New Features and Trends of US Information Warfare

中國軍事分析美國資訊戰新特色新趨勢

由國語音譯為現代英語

Information warfare has become an important topic in today’s international politics and security. As the world’s largest military and intelligence agency, the United States has very strong strength and resources in information warfare. It is an important initiator and participant in information warfare, and its information warfare capabilities have attracted much attention. In addition to adjusting the goals of information warfare, comprehensively advancing in various ways, and integrating domestic departments to unify actions, the US government is also actively expanding its information warfare alliances, by absorbing more countries to form a broad information warfare alliance, enhancing the effectiveness of information warfare, and further restricting the activity environment of rival countries.

    【Key words】Information warfare, U.S. national strategy 【Chinese Library Classification Number】D815 【Document Identification Code】A

    After the Biden administration came to power, the US national strategy has been further strengthened in terms of offensiveness and targeting, which has also brought about many new changes in the US information warfare. On the one hand, the Biden administration proposed the “integrated containment” strategy in the national security strategy, and information warfare has become an important tool to contain opponents in diplomacy, intelligence, economy and trade. On the other hand, the United States uses the Internet as the main field and widely uses modern information technology to comprehensively promote information warfare in various ways, trying to influence and change the public opinion and cognition of the target country. In addition, the United States has also vigorously expanded its information warfare alliances and included more countries in its alliance system to further restrict the activity environment of its competitors. Domestic academic circles have also conducted some research on US information warfare, such as: discussing the development of US information warfare from the aspects of origin, method, technical support and equipment, analyzing the implementation basis of information warfare from the perspective of US information security strategy, or exploring the training of US military information warfare talents. However, there is still a lack of relevant discussions in the academic community on the new changes and trends of US information warfare in recent years, especially under the Biden administration. This article focuses on analyzing the new characteristics and new trends of US information warfare.

    The historical origins of the United States launching information warfare around the world

    On May 4, 2023, the latest report released by the National Virus Emergency Response Center and 360 Company disclosed the main technical means by which the CIA planned, organized and implemented “color revolution” events around the world, including a non-traditional regime change technology called “swarming”, which was used to encourage young people connected by the Internet to join the “shoot and change places” mobile protests. For a long time, the Central Intelligence Agency (CIA) of the United States has secretly implemented “peaceful evolution” and “color revolutions” around the world and continued to carry out espionage activities. Information communication and on-site command are the decisive factors affecting the success or failure of “peaceful evolution” and “color revolutions”. The United States’ communication technology and its media applications are in a leading position internationally, which provides unprecedented technical support for the US intelligence agencies to launch “peaceful evolution” and “color revolutions” abroad.

    Entering the 21st century, with the further development of the Internet, driven by social media, the speed, diversity and breadth of information dissemination have been unprecedentedly improved. All over the world, information can be shared and transmitted in real time. Due to the development of information technology, many countries have begun to realize the importance of information warfare: on the one hand, countries can contain opponents and create an information environment that is beneficial to their own country through information transmission and control. On the other hand, the mobility and uncontrollability of information will pose a threat to national security. Therefore, information warfare has become an important issue in today’s international politics and security. The United States has the world’s largest military and intelligence agencies, has very strong strength and resources in information warfare, is an important participant and initiator of information warfare, and its information warfare capabilities have attracted much attention.

    After the 9/11 terrorist attacks, the United States mainly adopted a defensive posture in information warfare, strengthening the construction and security monitoring of network facilities to prevent attacks from terrorism and opponents. Although during the Obama and Trump administrations, the United States gradually moved from defense to active offense, proposing “preemptive” cyber sanctions against countries suspected of cyber attacks. However, judging from the National Cybersecurity Strategy released in March 2023, the United States focuses mainly on cyber deterrence, using “forward defense” to prevent attacks and infringements on key national facilities. According to media reports, when Musk announced the “amnesty” of Twitter, Meta, the parent company of another American social platform Facebook, announced a list of banned accounts, among which a group of accounts were related to the US military. This shows that the purpose, method and characteristics of the United States in information warfare are undergoing major changes, from cyber defense and deterrence to the field of influencing and shaping cognition.

    In 1995, Colonel Szafranski of the US Army defined information warfare as a conflict that directly attacks information systems to attack the knowledge or concept fields of the opponent. Information warfare can be conducted as part of a larger, more comprehensive hostile activity (such as cyber warfare), or as the only form of hostility. In 2021, Field, an expert at the Hoover Institution in the United States, also made a similar definition: information warfare aims to convey information to the target audience, which is selected to influence emotions, motivations, reasoning, attitudes, understandings, beliefs or behaviors, thereby promoting the interests of the actors. This shows that there is a general consensus among American elites on the form and purpose of information warfare, that is, to influence the cognitive system of the target object in a variety of ways. Previously, although the United States mainly adopted network defense and attack to target the opponent’s network facilities, with the changes in the international environment and the comprehensive strength of the United States, the United States gradually shifted the operational field and goals of information warfare to the cognitive system of the target country to create an international environment more favorable to the United States.

    Information warfare is an important part of the U.S. national strategy and changes with strategic adjustments.

    Information warfare is an important part of the US national strategy and an important means to achieve its national strategic goals. Today is an information age. Information and information technology not only determine the direction of social change, but are also key factors affecting competition between countries. Countries adjust their national strategies based on changes in the external environment and their own strength, and the content, characteristics, methods and fields of information warfare will also change accordingly.

    In 2016, the Obama administration issued a cybersecurity strategy called the National Cybersecurity Action Plan, which mainly includes: innovation and protection of networks, prevention of cybercrime, strengthening cybersecurity education, enhancing international cooperation and strengthening government cybersecurity management. During this period, the US government’s information warfare mainly focused on preventing cyber attacks from opponents and protecting its own network facilities and security. In September 2018, the Trump administration also issued the National Cybersecurity Strategy, which also emphasized the protection of network facilities and ensuring network security. However, in this strategy, Trump proposed the concept of “forward defense”. When it is believed that there is a possibility of an attack, the United States will take the lead in attacking the opponent, which means that the US information warfare has shifted from defense to active offense. In March 2023, the Biden administration released the latest National Cybersecurity Strategy, which further emphasized the offensive posture and greatly expanded the scope of information warfare. In this strategy, five pillars are proposed. In addition to protecting critical infrastructure and establishing international partnerships, it also emphasizes the need to combat and destroy threat actors, expand the scope of information warfare, expand public-private cooperation, combat adversaries through cooperation between public and private sectors, and shape market forces to promote security and resilience. This shows that in information warfare, the United States will further infiltrate the private sector through various means, promote American ideology and rules through the market and investment, and restrict the development environment of its competitors.

    After the Biden administration came to power, the US national strategy has also added more targeted and offensive elements. In the 2021 National Security Strategic Guidance, it is proposed to build a global strategy around the long-term competition with China and Russia; strengthen the US presence and cooperation in the Pacific region, while strengthening cooperation with Asian allies and partners to deal with the so-called “China threat”. The 2022 National Security Strategy clearly proposes the implementation of an “integrated containment strategy”, requiring the comprehensive use of comprehensive national security tools, including military, diplomatic, intelligence, economic, trade and financial means, to prevent any potential challenges to the United States and its allies. According to this strategy, information warfare is no longer just a function of defending against adversary cyber attacks and protecting domestic infrastructure. Information warfare occupies an important position in the “integrated containment strategy”. It not only undertakes the function of military strikes, but will also become an important tool for containing opponents in diplomacy, intelligence, economy and trade.

    The United States is comprehensively advancing information warfare with cognitive systems as its target

    Some scholars believe that the Gulf War was the beginning of information warfare, but as early as during the Cold War, the United States had conducted large-scale information warfare against the Soviet Union. The United States used the media it controlled to carry out extensive and in-depth false news propaganda on the Soviet people, instilling American ideology, and to a certain extent affecting the cognition of the Soviet people. After the end of the Cold War, American decision-makers are believed to have gradually reduced their emphasis on the non-material elements of war because they have defeated their ideological opponents. In the following decades, regarding information warfare, the United States is more inclined to frame these activities in a narrower military context. The “integrated containment strategy” proposed by the Biden administration shows that relying solely on a defense-oriented strategy may no longer be enough to limit competitors. The United States intends to contain its opponents in all areas of national strength, including diplomacy, economy, and information. This comprehensive containment approach focuses on mobilizing all elements of national power in competition other than military means. It requires not only the coordination of various important U.S. agencies, including the Department of Defense, the State Department, the CIA, the FBI, and the U.S. Agency for International Development, but also conventional military capabilities – focusing on destroying the target country and occupying its territory. It also requires the development of unconventional military capabilities – competing for influence and legitimacy among the people of various countries, enhancing the influence of the United States by influencing and changing the cognitive system of the people of the target country, and thereby undermining the opponent’s information environment and decision-making ability.

    The information market assumes that people will process information rationally, but psychological research shows that people often do not do so. Instead, the information environment in which people live affects their cognition, decision-making, and behavior, and the information environment is the operational environment of information warfare. In recent years, the U.S. Department of Defense has adopted an increasingly comprehensive understanding of the information environment. In the updated definition of the information environment, it points out that it “contains and aggregates many social, cultural, cognitive, technological, and physical attributes that affect the knowledge, understanding, beliefs, worldview, and ultimate actions of individuals, groups, systems, communities, or organizations.” Information warfare acts on the opponent’s information environment, by analyzing the opponent’s decision-making methods, psychological advantages and weaknesses, changing the information environment, and then affecting the “key factor” of the cognitive system, changing its national behavior to achieve the goal of winning.

    In the networked era, the transmission, aggregation and processing of information are mostly carried out through the network. The network constitutes the most important information environment, and the combat field of information warfare is also concentrated on the network. The United States not only uses its global media and cultural communication power to spread American culture and values ​​to the world through television, movies, music, games, etc., to strengthen its international influence and soft power. In addition, the US government and military also make extensive use of social media, search engines, artificial intelligence, the Internet and other information means, and through professional and systematic information operation agencies and cross-border cooperation between different agencies and departments, they carry out various forms of information warfare, such as posting political propaganda on social media, launching cyber attacks, conducting network monitoring and surveillance, and organizing network sabotage activities. It should be noted that social media is increasingly becoming an important medium for the United States to launch information warfare. This is because social media platforms can have a huge impact on a large number of people with their speed and breadth of information dissemination. At the same time, because people are irrational in cognition, large-scale simple repetition on social media has become a reliable way for people to believe in fallacies. The United States is deploying a large number of fake accounts on social media platforms to widely spread false information, manipulate information, incite emotions, create public opinion, mislead opponents’ decision-making behavior, and formulate and disseminate strategic narratives to prompt national behavior to change in a direction that is beneficial to the United States.

    Expanding the information warfare alliance and further constraining the environment for competitors

    In addition to adjusting the goals of information warfare, advancing it comprehensively in a variety of ways, and integrating domestic departments into unified actions, the U.S. government is also actively expanding its information warfare alliances by absorbing more countries to form a broad information warfare alliance, thereby enhancing the effectiveness of information warfare and further restricting the environment in which rival countries can operate.

    In Europe, the United States has been strengthening its cooperation with its NATO allies on information warfare. In November 2010, NATO updated the “Lisbon Strategic Concept”, emphasizing the need to more thoroughly respond to the rapidly evolving security challenges of the 21st century, including cyber attacks. The policy focuses not only on protecting NATO’s own networks, but also on establishing agreed benchmarks to protect the national networks of allies. The 2014 Wales Summit proposed a policy to strengthen cyber defense, making the cyber field one of its key political and strategic priorities, emphasizing the cooperation and unified action of member states, and linking the cyberspace with the collective defense of the alliance. At the 2016 Warsaw Summit, NATO recognized cyberspace as a new field of military operations. In February 2018, NATO member states established a cyber operations center within the NATO military command structure, which aims to strengthen the defense and response capabilities of NATO member states in cyberspace and improve the overall level of cyber security. These measures show that under the leadership of the United States, NATO has gradually established a strong cyber cooperation platform for information warfare. On the basis of this platform, the United States will implement information warfare more comprehensively and across fields. During the Ukrainian crisis, the United States and its allies used this platform to provide cyber defense for Ukraine and launch a large number of cyber attacks. They also used the Internet to spread various false information, distorting and shaping the country’s image that was unfavorable to Russia.

    In Asia, based on the existing military alliance, the United States has been deepening its security alliances to maintain its interests in the Indo-Pacific region, vigorously promoting the “four-country mechanism” consisting of the United States, Japan, India and Australia, deepening its relations with India, and striving to promote trilateral cooperation between the United States, Japan and South Korea, further promoting network rules that are beneficial to the United States and expanding the alliances led by the United States. This makes it easier for the United States to insert information operators in the networks of allied countries, spread information that is beneficial to the United States in multiple networks, and shape the information environment dominated by the United States to exclude and restrict competing countries in the information environment. At the same time, this transnational network is still expanding, and the United States’ network standards and norms are constantly being implemented in other countries, which has greatly helped the US government and military to infiltrate these networks and conduct information warfare. The United States has also actively engaged with ASEAN countries and their individual member states, including Indonesia, Singapore and Vietnam, and has achieved certain results in network expansion. Despite the differences in governance systems and technical capabilities among these countries, as well as competing domestic priorities, ASEAN has become the first region among developing countries to adopt a consistent e-commerce legal framework. They have adopted the cybersecurity framework of the National Institute of Standards and Technology (NIST) of the United States as a global common language to communicate with different industry sectors and other countries.

    In February 2022, the Biden administration issued a new Indo-Pacific Strategy, which is the first Indo-Pacific Strategy issued by the Biden administration and the second Indo-Pacific Strategy issued by the US government. The strategy proposes five major policy goals, including promoting freedom and openness, regional security and prosperity in the Indo-Pacific region, and also proposes an “integrated containment” strategy. For China, the Indo-Pacific Strategy points out that “our goal is not to change China, but to shape the strategic environment in which it operates.” Especially in such a media age, the transmission and release of information are more convenient, and we need to pay more attention to the importance of information warfare. In this regard, we may also need to grasp the psychological demands and emotional needs of the masses more accurately. Taking the latest report released by the National Virus Emergency Response Center and 360 Company as an example, it is particularly important for domestic government agencies, scientific research institutions, industrial enterprises and commercial institutions to quickly “see” and deal with the highly systematic, intelligent and concealed cyber attacks launched by the CIA against my country in the first place. The report recommends that in order to effectively respond to imminent network and real threats, while adopting independent and controllable domestic equipment, we should organize self-inspection and self-examination of APT attacks as soon as possible, and gradually establish a long-term defense system to achieve comprehensive and systematic prevention and control to resist advanced threat attacks.

    As the US information warfare continues to advance, the meaning of shaping the environment has become more prominent, that is, not only to contain China politically, economically and militarily, but also to “shape” China’s activity environment in terms of network and information. For China, facing the more complex and severe international situation under the impact of the COVID-19 pandemic and the Ukrainian crisis and the US’s continuously advancing information warfare strategy, it should make the following responses: First, strengthen network and information security construction to improve its own information security level and guard against attacks on network facilities and key infrastructure. Be vigilant against the spread of false information on the Internet and in the media, trace the source of the spread, and prevent the spread of information by large-scale false accounts and the conscious guidance of the public’s cognitive system. Secondly, continue to promote high-level reform and opening up, actively develop foreign trade, and further strengthen economic ties with countries around the world. This is the most effective strategy to prevent the US “integrated containment” and information warfare. Tell the Chinese story well in foreign exchanges, let the world know more about China, and promote mutual trust and cooperation with other countries through extensive exchanges and strengthening economic interdependence. Thirdly, adhere to economic development. Developing the economy is a necessary condition for the rejuvenation of the Chinese nation and is also a core task of the country. Through economic development, the world can also understand the Chinese plan and the Chinese road more clearly and vividly, and thus more effectively defend against false information and information distortion in information warfare. Finally, in terms of Sino-US relations, while maintaining the bottom line and preventing conflicts, China can also establish and restore exchanges and cooperation in certain important areas or important groups, increase and accumulate trust, and further expand cooperation to divide and ease the US integrated containment strategy.

    (The author is a professor at the Institute of Contemporary Socialism of Shandong University, a researcher at the Institute of National Governance of Shandong University, and a researcher at the Institute of South Asian Studies of Shandong University)

    【references】

    ① Liu Boran and Wei Xiuming: “U.S. Cyber ​​Security Strategy: Development Process, Evolutionary Characteristics and Essence”, Journal of Liaoning University (Philosophy and Social Sciences Edition), Issue 3, 2019.

    ②Huang Yingxin: “Information Warfare and Its Development”, “Intelligence Command Control System and Simulation Technology”, Issue 6, 2000.

    ③Lu Xinde: “On the Expansiveness of the US Information Security Strategy”, Contemporary Asia-Pacific, Issue 7, 2005.

    ④Liu Xiaoyuan and Pang Bo, “A Perspective on the Training of Information Warfare Talents in the US Military and Its Implications”, Journal of Higher Education Research, No. 3, 2005.

    ⑤[Japan] Kosawa Kunio and Jiang Xinfeng, translators: “IT Revolution and the Development of the U.S. and Japanese Navies”, International Outlook, No. 15, 2001.

    ⑥Wu Fei and Li Xuan: “The Role of the Media in the Information War between Russia and the United States under Geopolitical Game”, “External Communication”, Issue 6, 2022.

    ⑦Yang Guangbin et al.: “Characteristics of the Era of Turbulent Change”, “World Economy and Politics”, Issue 2, 2023.

繁體中文

《 人民論壇 》( 2023年10月09日 第 04 版)
【摘要】資訊戰已成為當今國際政治和安全領域的重要議題。因其全球最大的軍事和情報機構,在資訊戰方面有著非常強的實力和資源,是資訊戰的重要發起者和參與者,其資訊戰的能力備受關注。除了調整資訊戰的目標,以多種方式全面推進,整合國內各部門而統一行動外,美國政府還積極擴展資訊戰的同盟,透過吸收更多國家以形成廣泛的資訊戰聯盟,增強資訊戰的效果,並進一步限制對手國家的活動環境。

【關鍵字】資訊戰 美國國家戰略 【中圖分類號】D815 【文獻標識碼】A

拜登政府上台後,在美國國家戰略上進一步加強了攻擊性和針對性,這也使美國的資訊戰發生了許多新的變化。一方面,拜登政府在國家安全戰略中提出了「一體化遏制」策略,資訊戰在外交、情報、經濟和貿易等方面成為遏制對手的重要工具;另一方面,美國以網路為主要場域,廣泛運用現代資訊科技以多種方式全面推進資訊戰,試圖影響和改變目標國家的輿論風向和認知;此外,美國還大力擴展資訊戰同盟,將更多國家納入其同盟體係以進一步限制競爭對手的活動環境。國內學界對美國資訊戰也進行了一定的研究,例如:從起源、方式、技術支援和裝備等方面討論美國資訊戰的發展,從美國資訊安全戰略角度分析資訊戰的實施基礎,抑或探析美軍信息戰人才的培養。但對於近年來,特別是拜登政府治下美國資訊戰的新變化及其趨勢,學界仍缺乏相關討論,本文則聚焦於剖析美國資訊戰的新特徵與新動向。

美國在世界各地發動資訊戰的歷史溯源

2023年5月4日,國家病毒緊急處理中心和360公司發布的最新報告披露了CIA在全球各地策劃組織實施「顏色革命」事件的主要技術手段,其中包括一款被稱為「蜂擁」的非傳統政權更迭技術,用於推動透過網路連線的年輕人加入「打一槍換一個地方」的流動性抗議活動。長期以來,美國中央情報局(CIA)在世界各地秘密實施“和平演變”和“顏色革命”,並持續進行間諜竊密活動。資訊通信和現場指揮是影響「和平演變」和「顏色革命」成敗的決定性因素。美國的通訊技術及其媒體應用在國際上處於領先地位,這給美國情報部門對外發動「和平演變」和「顏色革命」提供了前所未有的技術支援。

進入21世紀,隨著網路的進一步發展,在社群媒體的推動下,資訊傳播的高速性、多樣性和廣泛性得到了空前的提升。在世界範圍內,各地資訊都能夠即時共享和飛速傳遞。因資訊科技的發展,許多國家開始意識到資訊戰的重要性:一方面,國家可以透過資訊傳遞和控制來遏制對手並創造有利於本國的資訊環境。另一方面,資訊的流動性和不可控性會對國家安全造成威脅。因此,資訊戰已成為當今國際政治和安全領域的重要議題。美國擁有全球最大的軍事和情報機構,在資訊戰方面有著非常強的實力和資源,是資訊戰的重要參與者和發起者,其資訊戰的能力備受關注。

在「911」恐怖事件後,美國在資訊戰方面主要是採用防禦為主的態勢,加強網路設施的建設和安全監控,以防止恐怖主義和對手的攻擊。雖然在歐巴馬和川普政府時期,美國由防禦逐漸走向主動進攻,提出對疑似網路攻擊國進行「先發制人」的網路制裁。但從2023年3月發布的《國家網路安全戰略》來看,美國的重點主要放在網路威懾上,透過「向前防禦」來防備對國家關鍵設施的攻擊和侵害。根據媒體報道,馬斯克宣布「大赦」推特之際,美國另一家社群平台臉書(Facebook)的母公司Meta公佈了一份封禁帳號名單,在名單中,有一批帳號與美國軍方有關。這顯示美國在資訊戰上的目的、方式和特徵正在發生重大變化,由網路防禦和威懾進入到影響和塑造認知領域。

美軍上校沙弗蘭斯基(Szafranski)在1995年對資訊戰進行過界定,資訊戰是一種直接攻擊資訊系統以攻擊對手知識或觀念領域的衝突。資訊戰可以作為更大規模、更全面的敵對活動的組成部分(如網路戰),或作為唯一的敵對形式進行。 2021年,美國胡佛研究所專家菲爾德(Field)也做出了類似的定義:資訊戰旨在向目標受眾傳達訊息,這些訊息被挑選出來,以影響情感、動機、推理、態度、理解、信仰或行為,從而促進行動者的利益。這說明在美國菁英中對於資訊戰的形式和目的有大致一致的認識,即透過多種方式影響目標對象的認知系統。此前,美國雖然主要採用網路防禦和攻擊,有針對性地打擊對手的網路設施,但隨著國際環境和美國綜合實力的變化,美國逐步將資訊戰的作戰領域和目標轉移到對象國的認知系統,以營造更有利於美國的國際環境。

資訊戰是美國國家戰略的重要組成部分,隨戰略調整而變化

資訊戰是美國國家戰略的重要組成部分,也是實現其國家戰略目標的重要手段。當今時代是資訊化時代,資訊與資訊科技不僅決定社會變革的方向,同時也是影響國家間競爭的關鍵因素。國家依據外部環境和自身實力的變化調整國家戰略,而資訊戰的內容、特徵、方式和領域也會隨之改變。

歐巴馬政府在2016年推出了名為《網路安全國家行動計畫》的網路安全策略,其主要內容包括:創新和保護網絡,預防網路犯罪,加強網路安全教育,增強國際合作與加強政府網路安全管理。在這段時期,美國政府在資訊戰上主要是防範對手的網路攻擊,保護自身的網路設施和安全。在2018年9月,川普政府也頒布了《國家網路安全戰略》,同樣強調對網路設施的防護,並確保網路安全。但在這份戰略中,川普提出了「向前防禦」的概念,當認為有可能遭遇到襲擊時,美國將率先攻擊對方,這意味著美國資訊戰由防禦轉向了主動進攻。 2023年3月,拜登政府公佈了最新的《國家網路安全戰略》,進一步強調了進攻的態勢,並大大擴展了資訊戰的範圍。在該戰略中,提出了5項支柱,除了保護關鍵基礎設施和建立國際夥伴關係外,還強調要打擊和摧毀威脅行為體,並且擴展資訊戰的範圍,擴大公私合作,透過公私部門間的合作來打擊敵手,並塑造市場力量以推動安全和彈性。這說明在資訊戰上美國將進一步透過各種方式滲透入私人領域,透過市場和投資宣揚美國的意識形態和規則,以限制競爭對手的發展環境。

拜登政府上台後,美國國家戰略中也加入了更多的針對性和攻擊性。在2021年的《國家安全戰略指導》中提出:圍繞與中國和俄羅斯的長期競爭,建構全球性戰略;強化美國在太平洋地區的存在和合作,同時加強與亞洲盟友和夥伴的合作,以應對所謂「中國的威脅」。 2022年的《國家安全戰略》更是明確提出實施“一體化遏制戰略”,要求綜合運用全面的國家安全工具,包括軍事、外交、情報、經濟、貿易和金融等手段,以防止對美國和其盟友的任何潛在挑戰。依照這個策略,資訊戰就不再只是發揮防禦對手網路攻擊和保護國內基礎設施的功能,資訊戰在「一體化遏制戰略」中佔據著重要的地位,不僅承擔著軍事打擊的功能,在外交、情報、經濟和貿易等方面也將成為遏制對手的重要工具。

美國以認知系統為目標全面廣泛推進資訊戰

有些學者認為海灣戰爭是資訊戰的開端,但早在冷戰期間,美國就對蘇聯進行大規模的資訊戰。美國利用掌控的媒體對蘇聯民眾進行了廣泛深入的假新聞宣傳,灌輸美國的意識形態,在一定程度上影響了蘇聯民眾的認知。冷戰結束後,美國的決策者被認為對於戰爭的非物質元素的強調逐漸減少,因為已經戰勝了其意識形態對手,在其後幾十年中,關於信息作戰,美國更傾向於在更狹窄的軍事背景下框定這些活動。而拜登政府所提出的「一體化遏制戰略」則表明僅依賴一種以防禦為主的策略,可能已不足以限制競爭對手,美國意圖在包括外交、經濟和資訊在內的所有國家實力領域去遏制對手。這種全面遏制方式著重於在軍事手段之外的競爭中調動國家力量的所有要素,不僅要求能夠協調美國各個重要機構,包括國防部、國務院、中情局、聯邦調查局和美國國際開發署等,並且除了常規軍事能力——專注於摧毀目標國並佔領其領土,還要發展非常規軍事能力——在各國民眾中爭奪影響力和合法性,透過影響和改變目標國家民眾的認知系統,增強美國的影響力,進而破壞對手的資訊環境與決策能力。

資訊市場假定人們會理性處理訊息,但心理學研究表明,人們往往不會這樣做。相反,人們所處的資訊環境會影響其認知、決策和行為,而資訊環境就是資訊戰的作戰環境。近年來,美國國防部對資訊環境採取了越來越全面的理解,在關於資訊環境的定義更新中指出,它「包含和聚合了許多社會、文化、認知、技術和物理屬性,這些屬性對個人、群體、系統、社區或組織的知識、理解、信仰、世界觀和最終行動產生影響」。資訊戰則是作用於對手的資訊環境,透過分析對手的決策方法、心理優勢和弱點,改變資訊環境,進而影響認知系統這一“關鍵因素”,改變其國家行為以實現制勝目的。

在網路化時代,資訊的傳遞、聚合與處理絕大部分經由網絡,網絡構成了最主要的資訊環境,資訊戰的作戰場域也集中在網絡。美國不僅運用其全球性的媒體和文化傳播力量,透過電視、電影、音樂、遊戲等方式向全球傳播美國文化和價值觀,加強其國際影響力和軟實力。並且,美國政府和軍方也大量使用如社群媒體、搜尋引擎、人工智慧和網路以及其他資訊手段,並透過專業化和系統化的資訊操作機構以及不同機構和部門的跨界合作,進行各種形式的資訊戰,例如在社群媒體上發布政治宣傳、發動網路攻擊、進行網路監聽和監控、組織網路破壞活動等。需要注意的是,社群媒體越來越成為美國發起資訊戰的重要媒介。這是由於社群媒體平台以其訊息傳播的速度和廣度,能夠對龐大人群產生巨大影響,同時又因為人們在認知上的非理性,使得社群媒體的大規模簡單重複成為人們相信謬誤的可靠方法。美國正大量地在社群媒體平台中投放虛假帳號,廣泛傳播假訊息、操縱訊息、煽動情緒、製造輿論導向,誤導對手的決策行為,並制定和傳播戰略大敘事,促使國家行為朝著有利於美國的方向轉變。

擴大資訊戰同盟並進一步限制競爭對手的環境

除了調整資訊戰的目標,以多種方式全面推進,整合國內各部門而統一行動外,美國政府還積極擴展資訊戰的同盟,透過吸收更多國家以形成廣泛的資訊戰聯盟,增強資訊戰的效果,並進一步限制對手國家的活動環境。

在歐洲,美國不斷強化與其北約盟友在資訊戰上的合作。 2010年11月,北約更新了“里斯本戰略概念”,強調需要更徹底地應對快速發展的21世紀的安全挑戰,包括網路攻擊。該政策的重點不僅是保護北約自身的網絡,還包括建立商定的基準來保護盟國的國家網絡。 2014年的威爾斯高峰會提出了加強網路防禦的政策,將網路領域作為其關鍵的政治和戰略重點之一,強調成員國的合作與統一行動,把網路與聯盟的集體防禦聯繫起來。 2016年華沙峰會上,北約承認網路空間是軍事行動的新領域。 2018年2月,北約成員國在北約軍事指揮機構內設立了一個網路行動中心,該中心旨在加強北約成員國在網路空間的防禦和應變能力,並提升網路安全的整體水準。這些舉措顯示在美國主導下,北約在資訊戰上逐步建立起一個強大的網路合作平台。在這一平台的基礎上,美國將更為全面且跨領域地實施資訊戰。在烏克蘭危機中,美國及其盟友就利用這個平台,為烏克蘭提供網路防禦,並實施大量的網路攻擊,也利用網路散播各種虛假訊息,歪曲和塑造對俄羅斯不利的國家形象。

在亞洲,在原有的軍事同盟基礎上,美國為維持其在印度—太平洋地區的利益,不斷深化其安全聯盟,大力推動「美、日、印、澳」組成的四國機制,深化與印度的​​關係,努力促進美、日、韓三邊合作,進一步推廣有利於美國的網路規則和擴展美國主導的同盟。這使得美國可以更為便利地在同盟國家的網絡中安插信息操作人員,在多個網絡中散佈有利於美國的信息,塑造美國主導的信息環境,以形成在信息環境上對競爭國家的排斥和限制。同時,這個跨國網絡仍在不斷擴展,美國的網路標準和規範不斷在其他國家得以實施,這為美國政府和軍方滲入這些網路並實施資訊戰提供了極大助益。美國也積極與東協國家及其個別成員國,包括印尼、新加坡和越南等國接觸,在網路擴展上取得了一定的成效。儘管這些國家在治理體系和技術能力上存在差異,並且存在競爭性國內優先事項,但東協成為發展中國家中第一個採用一致的電子商務法律框架的地區,他們採用了美國國家標準技術研究所

(NIST)的網路安全框架作為全球通用語言,以與不同產業部門和其他國家溝通。

2022年2月,拜登政府推出了新的《印太戰略》,這是拜登政府發布的首份,也是美國政府發布的第二份印太戰略。該戰略提出了促進印太地區的自由開放、區域安全和繁榮等五大政策目標,也提出了「一體化遏制」策略。對於中國,《印太戰略》指出「我們的目標不是改變中國,而是塑造其運作的戰略環境」。尤其是在這樣一個媒體時代,訊息的傳遞和發布更加方便,我們更需要重視資訊戰的重要性。在這方面,我們也可能需要更精確地抓住群眾的心理訴求和情感需求。以國家病毒緊急處理中心和360公司發布的最新報告為例,針對CIA對我國發起的高度體系化、智慧化、隱蔽化的網路攻擊,境內政府機構、科研院校、工業企業和商業機構如何快速「看見」並第一時間進行處置尤為重要。報告建議,為有效應對迫在眉睫的網路和現實威脅,我們在採用自主可控國產化設備的同時,應盡快組織開展APT攻擊的自檢自查工作,並逐步建立起長效的防禦體系,實現全面系統化防治,抵禦高階威脅攻擊。

隨著美國資訊戰的不斷推進,塑造環境的意義得以彰顯,即不僅是在政治、經濟和軍事上對中國進行遏制,同時在網路和資訊上也要「塑造」中國的活動環境。對中國而言,面對在新冠疫情和烏克蘭危機衝擊下更為複雜嚴峻的國際局勢以及美國不斷推進的信息戰策略,應該做好以下應對:首先,加強網絡和信息安全建設提高自身信息安全水平,防備對網路設施和關鍵基礎設施的攻擊。警惕網路和媒體中的假訊息傳播,追溯傳播源頭,防範大規模假帳號所進行的資訊散播和有意識地對民眾認知系統的引導。其次,持續推動高水準的改革開放,積極發展對外貿易,進一步加強與世界各國的經濟聯繫。這是防範美國「一體化遏制」和資訊戰最有效的策略。在對外交往中講好中國故事,讓世界更了解中國,透過廣泛交流和加強經濟互賴,促進和其他國家的互信與合作。再次,堅持經濟發展。發展經濟是中華民族復興的必要條件,同時也是國家的核心任務。透過經濟發展也可以讓世界更清楚、形象化地理解中國方案和中國道路,進而更有效地防禦資訊戰中的假訊息和訊息扭曲。最後,在中美關係上,中國在守住底線、防止衝突的同時,也可以建立和恢復某些重要領域或重要團體的交往與合作,增加和積累信任,並進​​一步擴展合作,分化和緩解美國的一體化遏制戰略。

(作者為山東大學當代社會主義研究所教授、山東大學國家治理研究院研究員、山東大學南亞研究所研究員)

【參考文獻】

①劉勃然、魏秀明:《美國網路資訊安全戰略:發展歷程、演進特徵與實質》,《遼寧大學學報(哲學社會會科學版)》,2019年第3期。

②黃迎馨:《資訊戰及其發展》,《情報指揮控制系統與模擬技術》,2000年第6期。

③盧新德:《論美國資訊安全戰略的擴張性》,《當代亞太》,2005年第7期。

④劉曉元、龐波:《美軍資訊戰人才培養透視及其啟示》,《高等教育研究期刊》,2005年第3期。

⑤[日]小繩國雄,江新鳳編譯:《IT革命與美日海軍發展》,《國際展望》,2001年第15期。

⑥吳非、李旋:《地緣政治博弈下俄美訊息戰中的媒體角色》,《對外傳播》,2022年第6期。

⑦楊光斌等:《動盪變革期的時代特徵》,《世界經濟與政治》,2023年第2期。

原始中國政府資源:http://paper.people.com.cn/rmlt/html/2023-10/09/content_26023698.htm