Category Archives: China’s Informatization – 中國信息化

China’s Military Emphasizing Research of System-based Superior Warfare: How to Fight Using Informationized Warfare? Analysis of Nine Typical Combat Styles

中國軍隊重視系統優勢戰爭研究:資訊化戰爭如何打仗?九種典型戰鬥風格解析

現代英語:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics. It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and action tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on “combination punches”, multiple strategies, and overall victory.
In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them.

System concentration warfare – a “combination punch” that flexibly uses a variety of combat styles. Author: Academic Plus Senior Observer Dong Zhou
The main content and keywords of this article

  1. Overall deterrence warfare: emphasize multi-domain joint deterrence; the implementation of overall deterrence warfare should have three major elements; strong overall strength is the core of achieving effective deterrence
  2. Electromagnetic interference warfare: the key to competing for information advantage; in terms of combined means and methods, information empowerment is achieved through “connection + sharing”; an effective method to crack unmanned cluster warfare
  3. Network attack warfare: mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
  4. Cognitive control and interference warfare: control the cognitive right of situational awareness, compete for information advantage; control the right to command and decision-making, compete for decision-making advantage; control the “brain” right, and seize the brain control advantage
  5. Agile mobile warfare: high-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
  6. Swarm autonomous warfare: conducive to forming a system advantage to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
  7. Precision point killing war: achieve high efficiency and cost-effectiveness in operations; hitting key node targets is an important option; large-scale system support is a basic condition; it is inseparable from accurate intelligence support
  8. Supply chain disruption war: the supply guarantee chain has a huge impact on the overall operation; the focus of attack is the key node of the enemy’s supply guarantee chain; the key is to choose the right time to use tactics
  9. System destruction and paralysis war: the combat goal is to make the enemy’s combat system disordered; hit the key nodes of the combat system with a heavy punch; implement a soft attack on the enemy’s combat system

For learning reference only, welcome to communicate and correct! The views of the article do not represent the position of this organization
The concept of operation is first proposed as a new combat style. Innovative combat style is the core content of the development of combat concepts. It can be said that system-based optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system-based optimization warfare. They are: First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.

  1. Overall deterrence warfare
    Overall deterrence warfare refers to actively organizing static power displays and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that the overall deterrence warfare in the system-based superior warfare is an important means or tactics to achieve “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If you want to contain the war, you must first deter your opponent from the overall strength.
    1.1 Emphasize multi-domain joint deterrence
    Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. In particular, with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new means of deterrence. Space deterrence mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming an “interference and blocking” deterrence against the enemy’s space information. Network deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed in the implementation of overall deterrence warfare
    To implement overall deterrence warfare and achieve the expected deterrence effect, three elements are usually required: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capability and determination.
    Historically, there are three main changes in the criteria for judging deterrence strength: first, active military strength; second, comprehensive national strength or war potential; third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength directly depended on the size of the active army, the number of important weapons and equipment, and non-material factors such as military training and organization morale. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size, etc. The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system, and the joint full-domain deterrence capability formed under the integration of the system.
    1.3 Strong overall strength is the core of achieving effective deterrence
    The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by the network information system and makes full use of the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve military system combat advantages, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, into the national war mobilization system, gathers various forces and resources to form an overall force, realizes the emergence effect of system capabilities, and shows the overall strength advantage. It forms a powerful invisible deterrent of unity and common hatred of the enemy, and creates a situation where the enemy “has power but cannot act” and “can act but has no effect”, which plays a role in containing and winning the war.
    In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
  2. Electromagnetic interference warfare
    Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
    2.1 The key to competing for information advantage Local information warfare is highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capability, and enable the enemy to ensure the rapid and effective flow of information in the scenario where the enemy has the right to control information, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the dominance and initiative of the operation.
    2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superior warfare is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the enemy, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, and provide support for the seizure of information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling the enemy’s entire combat system.
    2.3 Effective tactics to crack unmanned swarm warfare
    Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local warfare with intelligent characteristics. There are a large number of various unmanned autonomous clusters, with various types and complex characteristics, and each individual can complement each other and replace each other to play a role. It will be very difficult to intercept and destroy the entire unmanned cluster. However, from a technical perspective, in order to achieve effective coordination in unmanned combat clusters, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to implement communication interception and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned clusters, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective coordination, thereby losing combat capability.
  3. Network attack warfare
    Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft killing and hard destruction, mainly soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attack, virus attack and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision firepower strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities.
    The focus is on breaking the network and reducing the ability to fail. Organizing network attack in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction actions against the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the enemy’s combat system function decline or even disabled as a whole. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electricity coordinated attack, deception confusion, link blocking, takeover and control, so that the enemy’s intelligent combat network system is disabled and ineffective, and achieve a key victory in paralyzing the enemy system.
  1. Cognitive control and disturbance warfare
    Cognitive control and disturbance warfare refers to the interference, destruction or control of enemy thinking and cognition through information attack, public opinion attack and brain attack in the system-based superiority warfare, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
    The cognitive domain, that is, the human thinking space and consciousness space, is a field that has a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its wide application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the status of cognition in intelligent warfare operations more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
    4.1 Controlling situational awareness and cognitive rights and fighting for information advantages
    In the system-based superiority warfare, information flow drives material flow and energy flow, and information advantage determines decision advantage. The rapid and accurate recognition of intelligence information and battlefield situation has an important impact on gaining command and decision-making advantages. Therefore, in order to organize and implement system-based optimization, we must make full use of intelligent technology and big data technology to analyze massive intelligence information data.

國語中文:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。


4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行

中國軍事資料來源:https//www.81it.com/2022/0901/13716.html

Chinese Military Training and the Metaverse: Challenges & Opportunities Coexist

中國軍事訓練與虛擬世界:挑戰與機會並存

現代英語:

 In the field of military training, the basic technology of the Metaverse has long been used as a virtual resource by the military to varying degrees. It must be acknowledged that the value and potential of the Metaverse in military training is immeasurable and is the focus of current and future military competition. However, due to the immaturity of the development of Metaverse-related technologies and their application in military training, the bright prospects are accompanied by potential risks.

1. The past and present of the military training metaverse
       
 The metaverse relies on a technology group with virtual reality technology as its core. In its early form in the military field, it is also called virtual simulation or simulated Internet. It can be said that virtual simulation training is very close to today’s concept of the metaverse and is the primary form of the military training metaverse. From ancient times to the present, the progress that has brought great influence in the field of science and technology is generally for winning wars or maintaining combat effectiveness. As the leading technology of the third scientific and technological revolution, the metaverse is used for military training in different forms of basic metaverses in the global military field.
      The US military began to deploy the “Military Metaverse” plan very early. In 1978, Jack Thorpe, a captain of the US Air Force, proposed the idea of ​​a military simulator network in his paper, hoping to establish a distributed or networked military modeling system to facilitate training. In 1983, the Advanced Research Projects Agency (DARPA) of the US Department of Defense developed the Virtual Battlefield Network Simulator (SIMNET Simulator), which uses computers to generate virtual battlefields, simulate the situation of fighting between the two sides, and summarize errors and failures. Replacing field exercises in this way saves costs to a certain extent and improves the effectiveness of training. Although the SIMNET simulator, as the earliest version, was still at a lower level of battlefield simulation, it pioneered distributed or networked modeling and simulation. By the end of the 1980s, the project reached its peak, and eventually more than 200 simulated interconnected tank and aircraft simulators based on local area networks and wide area networks were formed across the United States and across Europe, and used for large-scale training and exercises. The distributed interactive simulation (DIS) protocol developed at that time is still in use today, and through more advanced high-level architectures, different military simulations can be linked to provide a richer collective training or mission preparation experience. It can be said that the SIMNET simulator project directly or indirectly promoted the development of many key technologies of the current metaverse. Today, the US military is very interested in the metaverse that has sprung up like mushrooms after rain. The newly established military branch, the United States Space Force (USSF), wants to create a military-specific metaverse for collaborative operations, training, and mission execution. Its chief technology officer, Lisa Costa, declared: “Soldiers cannot go to space in person. The only way they can experience their own combat territory is through visual data display. The virtual reality environment will provide them with situational awareness and understand their options in order to make decisions.”
       In recent years, virtual reality and augmented reality technologies of the metaverse have been incorporated into the regular military training of the US military. In 2014, the BlueShark project developed by the Office of Naval Research and the Institute for Creative Technologies at the University of Southern California allowed soldiers to collaborate in a virtual environment to conduct driving technology training; in 2018, the US Army and Microsoft cooperated to develop an integrated visual enhancement system IVAS for soldiers to conduct regular training; in 2020, the US Navy launched the Avengers Project to conduct flight course training through virtual reality, artificial intelligence and biometric technology; in 2021, Boeing created a military aircraft training system that enables maintenance personnel to use AR technology for related simulated maintenance drills; on May 10, 2022, two US fighter pilots took a jet and completed a high-altitude prototype metaverse experiment over the California desert. Refueling operations were performed using a virtual tanker through a specially designed augmented reality display connected to a computer system that displayed a glowing image of a virtual refueling aircraft.

 (I) The US military uses virtual reality technology for military training on a large scale
       
 . At the same time, Russia is also a leader in the development of virtual training systems. Almost all of its advanced weapons and equipment are equipped with corresponding virtual training systems, and are developing in the direction of universalization and embeddedness. For example, the Sound M universal virtual training system is a universal virtual training equipment for combat personnel of surface-to-air missile weapon systems. The Tor M1 surface-to-air missile system is also equipped with a special virtual training vehicle, which can complete battlefield simulation training while searching for targets and conducting weapon operations.

 (II) The Tor M1 surface-to-air missile system is also equipped with a dedicated virtual training vehicle.
        
 In addition, other countries have also begun to explore the combination of metaverse technology and military training. The British Army has been committed to studying the use of extended reality technology, which can put more than 30 soldiers in the same virtual training scene. The British Ministry of Defense’s “Single Synthetic Environment” has used this technology in soldier training. In South Korea, a developer and supplier of a military training simulator called “Optimus Prime” completed the development of the DEIMOS military training system based on metaverse technology in 2019 and applied it to the training of the armed forces. The system can create various environments for professional military training, including precision shooting training, tactical behavior training and observation training.

       2. The inherent advantages of the metaverse in military training Military training
       
is a commonplace in the military, specifically referring to the military theory and related professional knowledge education, combat skills training and military operations exercises conducted by the armed forces and other trainees. The continuous innovation of technologies such as artificial intelligence and virtual reality has accelerated the trend of intelligentization in future wars. Single actual combat exercises in traditional forms will be difficult to meet the combat requirements under the new situation. As a huge group of new technologies, the metaverse plays an increasingly important role in military training. If training is an important support for combat effectiveness, then the primary use of the metaverse in military training is as an important “enabler” for simulation training.       Immersive experience can improve the effectiveness of battlefield environment simulation. As a practical science, military training is centered on experience and the key to training is immersion. The virtual space created by the metaverse makes people feel a “common sense of embodied presence”, allowing trainees to fully immerse themselves in the virtual space and experience a war close to reality. Battlefield environment simulation uses virtual reality technology to process battlefield element data such as battlefield terrain, battlefield personnel, weapons and equipment through computer systems, and finally creates a realistic three-dimensional battlefield environment. Soldiers are immersed in digital environments such as deserts, mountains or plateaus. Each environment has different tactics, techniques and procedures, and soldiers can constantly practice tasks. Even if the soldiers are not in the actual battlefield environment, this technology is enough to restore the authenticity of the environment. More importantly, through battlefield simulation training, not only can soldiers become familiar with the battlefield environment and obtain information to the greatest extent, but they can also improve their ability to observe things from multiple angles and solve emergencies. The US military has developed a virtual reality system called a laser sand table, which can identify and convert photos and videos sent back by satellites, and turn them into realistic three-dimensional maps, presenting the battlefield environment thousands of miles away to commanders. Before the wars in Afghanistan and Iraq, the US military used virtual reality technology to create real war scenes, including battlefield conditions, personnel appearances, etc., in order to allow soldiers to adapt to the environment in advance and improve their combat capabilities.

 (II) On the eve of the wars in Afghanistan and Iraq, the U.S. military used virtual reality technology to create real war scenes
        
. Open interconnection better supports synthetic training. The various parts of the Metaverse ecosystem can be interconnected and operated, and information can be transmitted across platforms and across the world (between virtual worlds or between the virtual world and the real world) without hindrance. Synthetic training uses the open interconnection advantage of Metaverse technology to supplement actual combat training. According to statistics, since 2015, the number of non-combat deaths in the U.S. military has exceeded the number of deaths in actual military operations each year, and many of the deaths in non-combat operations are caused by conventional military training. Therefore, the U.S. Army has begun to use Metaverse to carry out synthetic training in an attempt to establish a virtual synthetic training environment (STE) to reduce casualties in training. From urban warfare to mountain warfare, the “synthetic training environment” integrates “real-time, virtual and constructive training environments into a single synthetic training environment, and provides training functions to ground, transport and air platforms and command posts where needed.” Practice has proved that the synthetic training environment built by the metaverse, with the help of multi-sensory simulation and restoration, can help soldiers break through the limitations of theoretical learning and cognition, and improve the quality and ability of team combat coordination, injury treatment and safe evacuation. On the eve of the Iraq War, the US military stationed in Kuwait conducted synthetic training on Iraq’s urban conditions, which enhanced the soldiers’ urban combat capabilities while minimizing casualties in actual combat. The
      imaginative space stimulates innovation in military training thinking to the greatest extent. War exercises have been valued by military strategists since ancient times. During the Warring States Period, Mozi and Gongshu Ban’s deduction games of “untying belts to make a city” and “wooden pieces to make weapons” rehearsed the real situation on the battlefield, thus avoiding fighting between the two armies. In the deep scene era opened by the future metaverse, the military system will become highly intelligent, and the two sides of the war may be able to conduct war deductions in the battlefield metaverse, and even compete in the virtual world. Based on the information obtained in the virtual world, the two sides of the deduction capture and predict the changes in the battlefield through thinking processes such as association, reasoning and logical judgment, which is not only conducive to learning more war laws, but also can exercise the soldiers’ logical deduction ability. In the Gulf War of 1991, the U.S. military conducted war games based on the training level of the troops, the possible course of the war, and the time required for actual combat before implementing Operation Desert Storm. Practice has proved that the U.S. military used the problems found in this war game to transform the combat concept into an actual action plan and ultimately won. This also fully demonstrates that the real battlefield is full of uncertainties, so it is necessary to be fully prepared through continuous war exercises. Undoubtedly, it is almost impossible for the enemy and us to conduct coordinated deductions in the real world, but if the deployment of the enemy and us can be made public to a certain extent by their respective satellites, air and ground reconnaissance equipment, then at a certain time point, between two or more parties about to break out a military crisis, it is expected that the deployment of troops in the metaverse can be carried out first, and the actual military conflict can be resolved.
      The application of metaverse technology in military training can not only avoid accidental casualties during training, but also allow a single or many trainees to complete training tasks in different virtual environments without leaving home and without actual contact. And this kind of non-contact training plays a more obvious role in the regular form of the new crown epidemic.
       3. Potential risks of the metaverse in military training
      
Although the metaverse provides technical support for military training to a large extent, it should never be simply understood as a training program or considered as a means of conducting training. Even if the metaverse technology brings convenience and innovation to military training, the technology itself and its accompanying challenges and uncertainties cannot be ignored.
      The development of metaverse technology may cause security issues. The metaverse is a huge technology group. Its system architecture, core algorithms and immersive technology are still in a stage of continuous development. The supporting industry, value consensus, management standards, etc. have not yet been reached. In general, the metaverse is still a new thing, and its application in military training is even more so. Although the use of virtual training systems can reduce casualties to a certain extent, it is worth thinking about whether such training can be truly used in combat sites. It is still an unknown. And whether the technology is safe enough in operation is also an urgent problem to be solved. James Crowley of Virtual City Training Experts pointed out that computer power may be the most influential part of it. Unless the delay can be reduced to a level that does not make people uncomfortable and feels real, and unless the movement and communication data between different people can be stored in different simulators, it will not be able to provide practical training tools. At the same time, another challenge is the security issue of mutual contact between the armies of different countries in the open virtual world of the Metaverse.
      Virtual training environments are prone to cognitive illusions. Military training in the Metaverse world is the result of a contest between human intelligence and technology. War simulations and military training conducted in a virtual environment can have a powerful deterrent effect on future wars, just like “nuclear weapons”. Although it makes up for the limited senses of people at the physiological level, it also brings psychological cognitive illusions to trainees. Taking unmanned combat military training as an example, long-term combat training under a virtual system will cause the operator to have a gaming mentality. Because the audiovisual senses are out of touch with the real battlefield situation, they are alienated from the real people and society, and have a numb mentality towards the behavior of depriving others of their lives. With the continuous maturity of Metaverse technology, the interaction between the virtual world and the real world will become closer and closer, forming a mixed world that is difficult to distinguish between the real and the virtual. By then, it will not only cause a distinction dilemma for the cognitive psychology of soldiers, but also a major challenge for future military training. The
      “decentralization” of the Metaverse deviates from the traditional military training structure. In the world of the metaverse, all parties involved are virtual entities with equal status after computer processing and digitization. They can act autonomously in the metaverse, so they pursue “decentralization”. However, the traditional military training organizational structure is highly centralized and hierarchical management from top to bottom, which is contrary to the value needs of the metaverse. The US military has made a lot of efforts in pursuing “decentralized” operations, such as the “network-centric warfare” proposed in the 1990s, and the current distributed lethality and mosaic warfare. However, the traditional military training structure and thinking inertia are still obstacles to “decentralization”, and this situation is common in the armies of various countries.
     Yuval Noah Harari said in “Sapiens: A Brief History of Humankind” that humans conquer the world by relying on the ability of fiction and imagination. The metaverse gives us the ability to fiction and imagine, and at the same time, the uncertainty of the metaverse in the field of military training also increases the element of fear. Therefore, we must pay attention to innovative scientific and technological theories, develop cutting-edge metaverse technologies, continuously stimulate the potential of the military training metaverse, and at the same time improve relevant laws, regulations and moral and ethical regulations to make advance preparations for winning future intelligent wars.

國語中文:

在軍事訓練領域,元宇宙的基本技術其實早就作為一種虛擬資源,在不同程度上為軍方使用。必須承認,元宇宙在軍事訓練中的價值潛力不可估量,是當下和未來軍事領域爭鋒的焦點。但由於元宇宙相關技術的發展及其在軍事訓練中的應用尚不成熟,美好前景背後也伴隨著潛在風險。
一、軍事訓練元宇宙的前世今生
元宇宙依賴的是以虛擬實境技術為核心的技術群,在軍事領域的早期形態又稱為虛擬模擬或模擬互聯網。可以說,虛擬模擬訓練已經非常接近今天的元宇宙概念,是軍事訓練元宇宙的初級形態。從古至今,科技領域帶來巨大影響力的進步普遍都是為了贏得戰爭或保持戰鬥力。作為第三次科技革命的領導技術,元宇宙在全球軍事領域,以不同形式的基本元宇宙被用於軍事訓練。
美軍很早就開始部署「軍事元宇宙」計畫。 1978年,美空軍上尉傑克·索普在自己的論文中提出了軍事模擬器網路的構想,希望建立一個分散式或網路化的軍事建模系統方便訓練。 1983年美國防部高級研究計畫局(DARPA),開發了虛擬戰場網路模擬器(SIMNET模擬器),以電腦生成虛擬戰場,模擬雙方交戰的情形進行推演,總結錯誤和失敗。用這樣的方式取代實地演習,一定程度上節省了成本,也提高了訓練的效果。雖然SIMNET模擬器作為最早的版本仍處於較低階的戰場仿真,但卻開闢了分散式或網路化建模仿真的先河。到了20世紀80年代末,該計畫達到頂峰,最終落地形成200多個遍布美國、橫跨歐洲,基於區域網路和廣域網路的模擬互聯坦克和飛機模擬器,並用於大規模訓練與演習。而當時開發的分散式互動式模擬(DIS)協議,至今仍在使用,並且透過更先進的高階體系結構,可以連結不同的軍事模擬,以提供更豐富的集體訓練或任務準備體驗。可以說SIMNET模擬器專案直接或間接推動了當前元宇宙的許多關鍵技術的發展。時至今日,美軍對如雨後春筍般崛起的元宇宙興趣正濃,新成立的軍種——美國太空部隊(USSF)欲打造軍事專用元宇宙,用於協同作戰、訓練、執行任務。其技術主管利薩·科斯塔宣稱:「軍人們並不能親自上太空,他們體驗自身作戰疆域的唯一途徑就是視覺數據顯示,虛擬現實環境會為他們提供態勢感知,並了解自己的選項,以便做出決策。
近年來,元宇宙的虛擬實境和擴增實境技術已納入美軍的常規軍事訓練。 2014年,南加州大學海軍研究辦公室和創意技術研究所開發的BlueShark項目,讓士兵在虛擬環境中協作配合,進行駕駛技術訓練;2018年,美陸軍與微軟合作開發了一款集成視覺增強系統IVAS ,供士兵進行常規訓練;2020年,美海軍又推出了復仇者計劃,透過虛擬現實、人工智慧以及生物識別技術,開展飛行課程培訓;2021年,波音公司打造了一個軍用飛機培訓系統,使維修人員利用AR技術進行相關模擬維修演練;2022年5月10日,兩名美軍戰鬥機飛行員乘坐噴射機,在加州沙漠上空完成了一次高空原型元宇宙實驗。透過特製的擴增實境顯示器,連接到一個虛擬加油飛機發光影像的電腦系統,使用虛擬加油機進行了加油操作。
(一)美軍大量採用虛擬實境技術進行軍事訓練
同時,俄羅斯在虛擬訓練系統的開發上也是領先者,其先進武器裝備幾乎都配有相應的虛擬訓練系統,並且正在朝著通用化和嵌入式的方向發展。如音色M通用虛擬訓練系統就是用於地對空飛彈武器系統作戰人員的通用虛擬訓練裝備。道爾M1型地對空飛彈系統也配備有專用虛擬訓練車,可在目標搜尋和武器作戰的同時完成戰地模擬訓練。

(二)道爾M1型地空飛彈系統也配備有專用虛擬訓練車
此外,其他國家也紛紛開始探索元宇宙技術與軍事訓練的結合。英陸軍一直致力於研究擴展實境技術的使用,可以讓30多名士兵處於相同的虛擬訓練場景。英國防部的「單一合成環境」已經在士兵訓練中使用了這項技術。在韓國,一家名為「擎天柱」的軍事訓練模擬器的開發商和供應商,在2019年完成了基於元宇宙技術的DEIMOS軍事訓練系統研發並應用於武裝部隊的訓練。該系統能夠為專業軍事訓練創造各種環境,包括精準射擊訓練、戰術行為訓練和觀察訓練。
二、軍事訓練元宇宙的內在優勢
軍事訓練乃是兵家常事,具體指武裝力量及其他受訓對象所進行的軍事理論及相關專業知識教育、作戰技能教練和軍事行動演練的活動。人工智慧、虛擬實境等技術的不斷革新,加速了未來戰爭的智慧化趨勢。傳統形式下的單一實戰演練將難以滿足新情勢下的作戰要求。而元宇宙作為一個龐大的新技術群,在軍事訓練中扮演越來越重要的角色。如果說訓練是戰鬥效能的重要支撐,那麼元宇宙在軍事訓練中的首要用途便是作為模擬訓練重要的「賦能器」。
沉浸式體驗能夠提升戰場環境模擬效能。軍事訓練作為實踐科學,訓練的核心在體驗,訓練的關鍵在沉浸。元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”,讓受訓者完全沉浸虛擬空間,體驗一場接近真實的戰爭。戰場環境模擬正是利用虛擬實境技術,透過電腦系統對取得的戰場要素資料如戰場地形、戰場人員、武器裝備等進行處理,最終創設出逼真的立體戰場環境。士兵們沉浸在沙漠、山區或高原的數位環境中,每個環境都有不同的戰術、技術和程序,士兵們可以不斷地演練任務。即便士兵不是在實際的戰場環境中,但這項技術足以還原環境的真實度,更重要的是透過戰場模擬訓練,不僅能夠讓士兵熟悉戰場環境,最大程度獲取信息,而且還能提升其多角度觀察事物、解決突發狀況的能力。美軍目前已研發出一款被稱為雷射沙盤的虛擬實境系統,能夠辨識和轉換衛星發回的照片和錄像,並將其轉變成逼真的立體地圖,將遠在千里外的戰場環境呈現給指揮員。在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術來打造真實的戰爭場景,包括戰地狀況、人員樣貌等。旨在讓士兵提前適應環境,提升作戰能力。

(一)元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”

(二)在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術打造真實的戰爭場景
開放式互聯較能支撐合成訓練開展。元宇宙生態系統各部分之間可以實現相互連接和操作,資訊可以暢通無阻地實現跨平台和跨世界傳輸(在虛擬世界之間或虛擬世界與現實世界之間)。合成訓練正是利用元宇宙技術的這一開放式互聯優勢,來實現實戰訓練的補充。根據統計,從2015年開始,美軍每年的非戰鬥死亡人數超出了在實際軍事行動中犧牲的人數,而在非戰鬥行動中喪生的人員很多是由常規軍事訓練造成的。因此,美陸軍已經開始採用元宇宙進行合成訓練,試圖建立虛擬合成訓練環境(STE)來減少訓練中的傷亡。從城市作戰到山地作戰,「合成訓練環境」將「即時、虛擬和建設性的訓練環境整合到一個單一的合成訓練環境中,並在有需要的地方向地面、運載和空中平台以及指揮所提供訓練功能」。實務證明,透過元宇宙建構的合成訓練環境,藉助多感官模擬還原,能夠幫助戰士突破理論學習和認知局限,提升團隊作戰協同、傷情處置和安全撤離等素質和能力。伊拉克戰爭前夕,駐紮在科威特的美軍就對伊拉克的城市狀況進行了合成訓練,增強了士兵城市作戰能力的同時,把實戰中的傷亡降到了最低。
想像性空間最大程度激發軍事訓練思維創新。戰爭演習自古就受到兵家重視,戰國時期墨子和公輸班「解帶為城」「木片為械」的推演遊戲將戰場上的真實情況演練出來,從而避免了兩軍交戰。在未來元宇宙開啟的深度場景時代,軍事體系將走向高度智慧化,作戰雙方或許能在戰場元宇宙進行戰爭推演,甚至在虛擬世界一決高下。推演雙方根據虛擬世界獲取的信息,透過聯想、推理和邏輯判斷等思維過程,對戰場風雲變化進行捕捉和預判,不僅有利於習得更多戰爭規律,還能夠鍛鍊士兵的邏輯推演能力。 1991年的海灣戰爭中,美軍就在實施「沙漠風暴」行動前,根據部隊的訓練水準和可能的戰爭進程,以及實際作戰所需時間進行了兵棋推演。實踐證明,美軍借助這次兵棋推演發現的問題,將作戰設想轉化為實際行動方案,最終取得勝利。這也充分說明了真實的戰場充滿了種種不確定性,因此需要透過不斷進行戰爭演習來做好充分準備。毋庸置疑,敵我雙方在現實世界中進行協同推演幾乎是不可能的,但若敵我雙方的兵力部署可以被各自的衛星、空中和地面偵查設備進行一定程度的公開,那麼在某個時間節點,在即將爆發軍事危機的雙方或多方之間,先在元宇宙中進行排兵布陣,可以化解現實的軍事衝突則有望實現。
元宇宙技術在軍事訓練中的應用不僅可以避免訓練中的人員意外傷亡,還可以讓單一或眾多參訓者在足不出戶,無需實際接觸便可在不同虛擬環境下完成訓練任務。而這種非接觸式訓練在新冠疫情的常規化形態下,所扮演的角色更加明顯。
三、軍事訓練元宇宙的潛在風險
元宇宙在很大程度上雖然為軍事訓練提供技術支撐,但絕不能僅僅將其簡單地理解為一種訓練項目,或者被認為是一種開展訓練的手段。即使元宇宙技術為軍事訓練帶來便利和創新,也不能忽視科技本身及其伴生的挑戰和不確定性。
元宇宙技術發展或引發安全問題。元宇宙是一個龐大的技術群,其體系架構、核心演算法和沈浸技術等尚處於不斷開發的階段,配套產業、價值共識、管理標準等還沒有達成,總的來說,元宇宙還是一個新事物,在軍事訓練中的應用更是如此。儘管使用虛擬訓練系統能夠在一定程度上減少傷亡,但值得思考的是這樣的訓練是否能夠真正用於作戰現場,目前仍是一個未知數。而技術在運作中是否夠安全也是一個亟待解決的問題。虛擬城市訓練專家公司的詹姆斯·克勞利指出,電腦能力可能是其中最有影響力的部分,除非可以將延遲降低到不會讓人不適並且感覺真實的程度,除非可以在不同的模擬器中儲存不同人之間的行動和通訊數據,否則將無法提供實用的訓練工具。同時,另一個擺在眼前的挑戰則是在開放的元宇宙虛擬世界中,不同國家軍隊之間相互接觸的安全問題。
虛擬訓練環境易造成認知錯覺。元宇宙世界裡的軍事訓練是人類智力和技術較量的結果,在虛擬環境下進行的戰爭推演、軍事訓練等對未來戰爭的作用,如同「核武」一般,不用動用實槍實彈也能起到強大的威懾效果。儘管在生理層面彌補了人的有限感官,同時也帶來了受訓者在心理上的認知錯覺。以無人作戰的軍事訓練為例,長期在虛擬系統下進行作戰訓練,將會造成操縱者的遊戲心態。由於視聽感官與真實戰場情況脫節,而疏離了現實的人與社會,對於剝奪他人生命的行為產生麻木心態。隨著元宇宙技術的不斷成熟,虛擬世界、現實世界的互動將會越來越緊密,形成虛實難分的混合世界。到那時,不僅對士兵的認知心理造成區分困境,對於未來的軍事訓練也是重大挑戰。
元宇宙「去中心化」與傳統軍事訓練結構相背離。在元宇宙的世界中,參與各方都是經過電腦處理、資料化後產生的地位平等的虛擬主體,可以在元宇宙中自主活動,因而其追求「去中心化」。但傳統的軍事訓練組織結構則是高度集中、自上而下的分層化管理,這一方面與元宇宙的價值需求是背離的。美軍在追求“去中心化”作戰上做出了很多努力,如20世紀90年代提出的“網絡中心戰”,以及當前的分散式殺傷以及馬賽克戰等。但傳統的軍事訓練結構和思維慣性仍然是「去中心化」的阻力,而這種情況普遍存在於各國軍隊。
尤瓦爾·赫拉利在《人類簡史》中談道,人類靠著的是虛構和想像的能力征服世界。元宇宙給了我們虛構和想像的能力,同時元宇宙在軍事訓練領域的不確定性也增加了恐懼的成分。因此,我們必須關注創新科技理論、發展元宇宙前沿科技,不斷激發軍事訓練元宇宙的潛力,同時完善相關法律法規和道德倫理規約,為打贏未來智慧化戰爭做好超前準備。
版權聲明:本文刊於2023年1期《軍事文摘》雜誌,作者:張愷悅、李傑春,如需轉載請務必註明「轉自《軍事文摘》」。

中國軍事原文來源:https//www.81it.com/2023/0321/14167.html

China’s Military Unveils the Metaverse

中國軍隊推出虛擬宇宙

現代英語翻譯:

As if overnight, “metaverse” suddenly became a hot word, and related concepts formed many hot topics.

With the development of technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks, blockchain, and the iteration of terminal equipment, the construction and evolution of the “metaverse” may far exceed people’s expectations, and a new Internet form of multi-dimensional, full-sensory, immersive human-computer interaction will hopefully become a reality.

What is the Metaverse?

“Metaverse” is a term that comes from the 1992 science fiction novel Snow Crash. In the novel, humans live in a virtual three-dimensional world through “Avatar” (digital virtual avatar), and the author calls this space “Metaverse”.

From science fiction to reality, people have not yet reached an absolute consensus on “what is the metaverse”. Due to the evolution of the times and technological changes, the “metaverse” is still an evolving concept. “There are a thousand Hamlets in the eyes of a thousand people”. Different participants are constantly enriching its definition in their own way, and the possibilities of the characteristics and forms of the “metaverse” are also constantly changing. However, we can explore a little through the existing presentation of the “metaverse”.

At present, “Metaverse” concept products are mainly concentrated in online games, VR/AR, social networking and other fields.

Online games are generally considered by the industry to be the most likely field to realize the “metaverse” because they have virtual scenes and players’ virtual avatars. Today, game functions have gone beyond the game itself, and the boundaries of games are expanding, and they are no longer just games.

A well-known singer held a virtual concert with his virtual image in the game “Fortnite”, which attracted more than 12 million players from all over the world to participate, breaking the boundary between entertainment and games; due to the impact of the epidemic, the University of California, Berkeley and the School of Animation and Digital Studies of Communication University of China coincidentally rebuilt their campuses in the sandbox game “Minecraft”. Students gathered together with virtual avatars to complete the “cloud graduation ceremony”, realizing the integration of virtual games and real social interactions.

The new generation of “VR social (virtual offline social)” has gradually developed and become popular. It is a fusion of offline social (face-to-face in reality) and online social (through social software such as WeChat). Some well-known VR social platforms provide a free community environment, which not only becomes a place for players’ online activities and virtual face-to-face gatherings, but also becomes a social and cultural phenomenon closely related to the current concept of “metaverse”.

The above-mentioned “metaverse slices” are all important explorations into the construction of the “metaverse”, and they explain in a variety of visible and tangible ways how the “metaverse” will change our real life.

In common research, the following consensus has been formed: “Metaverse” is a new type of Internet application and social form that integrates multiple new technologies and integrates virtual and real. It provides immersive experience based on extended reality technology, generates virtual and real scenes based on digital twins and 3D rendering technology, builds basic software and hardware services based on cloud computing, artificial intelligence and high-speed networks, and builds an economic system based on blockchain technology, closely integrating the virtual world with the real world in economic system, social system and identity system. At the same time, it allows each user to produce and edit content, and has complete self-driving and iteration capabilities.

The development direction of the “metaverse”

Today’s mobile Internet is actually still in a flat information interaction state, presented on mobile terminals through text, sound, pictures, and videos. Although news information, e-commerce, social chat, live video, etc. meet people’s needs for using the Internet, it is obviously impossible to achieve the effect of face-to-face communication and full sensory experience in real life through the mobile phone screen. With the development of society, people need more original and rich experience and interaction.

The COVID-19 pandemic has forced people to move their daily lives from offline to online. This forced transformation has led to more thinking, discussion and attention on the “metaverse”. In particular, the core feature of the “metaverse” is the immersive experience, which can turn a plane into a three-dimensional, multi-dimensional, real-time interactive space, greatly enriching and restoring the real physical world and various human relationships. Therefore, people have high hopes for the “metaverse”.

Looking back at the development of information technology and media, humans have continuously changed the way they perceive the world, and later began to consciously transform and reshape the world. From the newspaper era, the radio and television era, to the Internet era, and the mobile Internet era, the tools and platforms under the concept of “metaverse” are becoming increasingly complete, and the path to the “metaverse” is gradually becoming clearer.

Since 2020, Internet giants in various countries have been closely deploying cutting-edge technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks and blockchain, and the door to the ultimate closed-loop ecosystem of the “metaverse” has been opened little by little. Today, when the “bonus” of mobile Internet users has peaked, many experts and scholars have stated that the “metaverse” will be the ultimate form of the next generation of the Internet.

Just as it was difficult to accurately predict the development of the Internet 20 years ago, people cannot accurately predict the future form of the “metaverse”. However, combined with the development trends of related industries today, we can see that: the Internet has changed human life and digitized communication between people, and the “metaverse” will digitize the relationship between people and society; the technologies related to the “metaverse” will show gradual development, single-point technological innovations will continue to appear and merge, and all aspects of the industry will move closer to the ultimate form of the “metaverse”; the “metaverse” will emerge with a large amount of user-generated content, and at the same time, the value of digital assets will be revealed.

In general, the “metaverse” will profoundly change the organization and operation of the existing society through the integration of the virtual and the real, form a new lifestyle with both virtual and real poles, give birth to a new social relationship that integrates online and offline, and give new vitality to the real economy from the virtual dimension.

The future physical “metaverse” will be similar to the scene described in the science fiction movie “Ready Player One”: one day in the future, people can switch identities anytime and anywhere, freely shuttle between the real world and the virtual world, and study, work, make friends, shop, travel, etc. in the “metaverse”. Through immersive experience, the virtual world will be closer to and integrated into the real world.

In this virtual world, there will be self-evolving content and economic systems that will always remain safe and stable to meet the social needs of individuals.

The mediating role of the “metaverse”

“Imagine the ‘metaverse’ as a physical Internet, where you are not just watching content, but you are fully immersed in it.” This is a vivid description. However, as far as the current situation is concerned, the content of these “metaverses” that allow “full immersion” is relatively scarce. It needs more content that can be independently written, self-iterated, and multi-dimensionally attract users to participate in the experience and even participate in the creation.

The “metaverse” is bound to become a brand-new platform for media content production. Content producers can transform the “small universe” into the “big universe” through rich content production. In the short term, the breakthrough of the “metaverse” is immersive content. With the development and penetration of the concept of “metaverse”, the integration of immersive virtual content (such as games, cartoons, etc.) and immersive physical content (such as media, social networking, film and television, etc.) will become higher and higher. In other words, the “metaverse” will play a greater role as a medium.

In September this year, Yu Guoming, a professor at the School of Journalism and Communication of Beijing Normal University, pointed out at the release conference of the “2020-2021 “Metaverse” Development Research Report”: “Today, the role of the media is generally to provide cognitive information, but the role of the media is completing a process from providing cognition to providing experience. The entire media and technology has undergone a huge transformation from cognitive development to experience. Once the goal of “Metaverse” is established, it will play a directional role in communication technology, communication forms, communication methods and even communication effects.” If the “Metaverse” is the ultimate form of the next generation of the Internet, then it is a super media channel that will show the ultimate form of media convergence and provide the best immersive experience.

Theoretically, the best communication experience must be based on real scenes. For example, when watching a football game, the ideal situation is to watch it in person on the field. In the “metaverse”, with the development of display interaction, high-speed communication and computing technology, it will become a reality to construct a communication scene that is infinitely close to reality. Users can become “witnesses” and “on-site observers” of news events in a three-dimensional, multi-sensory reception situation.

Therefore, the “metaverse” media can achieve true “multimedia”, and various human senses such as vision, smell, hearing, taste, touch, etc. can play a role, and even fully unfold and cooperate with each other to achieve “immersive” media applications.

Today’s media content is constantly evolving and innovating, and its development trend seems to be moving closer to the concept of “metaverse”. Media content will no longer be limited to flat presentation methods such as TV, computer, and mobile phone screens. Media content production will consider holographic presentation more, pay attention to creating an on-site environment atmosphere, and make users feel immersive. Social interaction will no longer be limited to text messages and comments. Feelings can be expressed instantly with voice and body movements, and face-to-face communication can be virtualized on the spot.

Imagine if news reports could restore the war scene and create a “battlefield metaverse”, making people feel as if they were there and feel in real time the tremendous trauma that war has caused to human civilization. This shock would further stimulate human society’s desire and yearning for peace, and media content would have a stronger influence and dissemination power.

現代國語:

彷彿在一夜之間,「元宇宙」突然成為熱詞,相關概念形成許多熱門話題。

隨著擴展現實、數位孿生、3D渲染、雲端運算、人工智慧、高速網路、區塊鏈等技術的發展及終端設備的迭代,「元宇宙」建設和演變可能遠超人們的預期,多維度、全感官、沉浸式的人機互動新網路形態,將有望成為現實。

何為“元宇宙”

“元宇宙”,英文為“Metaverse”。此字出自1992年的科幻小說《雪崩》。小說中,人類透過“Avatar”(數位虛擬化身),在一個虛擬三維世界中生活,作者稱這個空間為“Metaverse”,即“元宇宙”。

從科幻走進現實,人們對「元宇宙是什麼」還未能達成一個絕對標準的共識。因為時代的演變、技術的變革,“元宇宙”仍是一個不斷發展的概念,“一千個人眼中就有一千個哈姆雷特”,不同參與者以自己的方式不斷豐富著它的定義,“元宇宙」特徵和形態的可能性也在不斷變化。不過,我們可透過「元宇宙」現有的呈現形態來探討一二。

目前,「元宇宙」概念產品主要集中在網路遊戲、VR/AR、社交等領域。

網路遊戲被業界普遍認為是最有可能實現「元宇宙」的領域,因為它本身就具有虛擬場景和玩家的虛擬化身。如今,遊戲功能已超越遊戲本身,遊戲邊界正在擴展,甚至不只是遊戲了。

知名歌手在遊戲《要塞英雄》中,以虛擬形象舉辦一場虛擬演唱會,吸引了全球超過1200萬玩家參與其中,打破了娛樂與遊戲的邊界;因為疫情影響,美國加州大學柏克萊分校、中國傳媒大學動畫與數位學院不約而同地在沙盤遊戲《我的世界》裡重建校園,學生們以虛擬化身齊聚一堂,完成“雲畢業典禮”,實現了虛擬遊戲和現實社交的融合。

新一代「VR社交(虛擬線下社交)」已在逐漸發展和流行。它是線下社交(現實面對面)、線上社交(透過微信等社群軟體)的融合產物。一些知名VR社交平台,提供自由的社區環境,不僅成為玩家線上活動與虛擬面對面聚會的場所,也成了一種與目前「元宇宙」概念密切相關的社會文化現象。

以上這些“元宇宙切片”,都是對建構“元宇宙”的重要探索,用多種看得見、摸得著的方式,詮釋了“元宇宙”將會如何改變我們的現實生活。

在通常研究中,一般形成了這樣的共識:「元宇宙」是整合多種新技術而產生的新型虛實融合的網路應用和社會形態。它基於擴展現實技術提供沉浸式體驗,基於數位孿生和3D渲染技術生成虛實場景,基於雲端運算、人工智慧和高速網路建立基礎軟體硬體服務,基於區塊鏈技術建立經濟體系,將虛擬世界與現實世界在經濟系統、社交系統、身分系統上密切融合。同時,允許每個使用者進行內容生產和編輯,具備完整的自我驅動和迭代能力。

「元宇宙」發展走向

現今的行動互聯網,其實仍是平面資訊互動狀態,透過文字、聲音、圖片、視訊方式在行動終端進行呈現。新聞資訊、電子商務、社群聊天、視訊直播等型態,雖然滿足了人們使用網路的需求,但隔著手機螢幕,顯然無法達到現實生活中面對面交流、全感官體驗所能達到的效果。隨著社會發展,人們需要更原生、更豐富的體驗與互動。

新冠疫情讓人們生活場景從線下更多地移到線上。這種被迫的轉變,讓大家對「元宇宙」有了更多思考、討論和關注。特別是「元宇宙」最核心的特徵,在於沉浸式體驗,它可將一個平面變成一個立體、多維、即時的互動空間,極大地豐富、還原真實物理世界和人類各種關係。因此,「元宇宙」被人們寄予厚望。

縱觀過往資訊科技和媒介的發展歷程,人類不斷改變認知世界的方法,乃至於後來開始有意識地改造和重塑世界。從報業時代、廣播電視時代,到網路時代、行動網路時代,「元宇宙」概念下的工具和平台日益完備,通往「元宇宙」的路徑逐漸清晰。

自2020年以來,各國網路大廠圍繞著擴展實境、數位孿生、3D渲染、雲端運算、人工智慧、高速網路和區塊鏈等前沿科技,展開緊密佈局,通往「元宇宙」終極閉環生態的大門被一點點打開。在行動網路用戶「紅利」已經見頂的今天,不少專家學者表示,「元宇宙」將是下一代網路的終極形態。

如同20年前難以精準預測網路的發展一樣,人們也無法精準預判未來「元宇宙」的形態。但是,結合當今相關產業發展趨勢可以看到:互聯網改變人類生活,將人與人交流數位化,而「元宇宙」將把人與社會關係數位化;「元宇宙」相關技術將呈現漸進式發展,單點技術創新將不斷出現與融合,從產業各方面向「元宇宙」終極形態靠近;「元宇宙」將湧現海量用戶創作內容,同時顯現數位資產價值問題。

概括地說,「元宇宙」將以虛實融合的方式,深刻改變現有社會的組織與運作,形成虛、實兩極的新型生活方式,催生線上、線下一體的新型社會關係,並從虛擬維度賦予實體經濟新的活力。

未來實體化的“元宇宙”,將類似於科幻電影《頭號玩家》裡描述的場景:在未來的某一天,人們可隨時隨地切換身份,自由穿梭於現實世界和虛擬世界,在“元宇宙”中學習、工作、交友、購物、旅遊等。透過沉浸式體驗,讓虛擬世界進一步接近並融入現實世界。

在這個虛擬世界裡,將有自我不斷發展的內容和經濟系統,並且始終保持安全穩定運行,滿足個體的社會需求。

「元宇宙」的媒介作用

「把『元宇宙』想像為一個實體互聯網,你在那裡不只是觀看內容,整個人都身在其中。」這是一個圖像描述。可就現狀而言,這些能讓“整個人都身在其中”的“元宇宙”,內容是相對匱乏的。它需要更多可以獨立成篇、自我迭代、多維立體地吸引使用者參與體驗甚至參與創作的內容。

「元宇宙」勢必成為媒體內容生產的嶄新平台。內容生產者透過豐富的內容生產,可將「小宇宙」演變成「大宇宙」。短期內,「元宇宙」的突破口是沉浸式內容。隨著「元宇宙」概念的發展與滲透,沉浸式虛擬內容(如遊戲、卡通等)與沉浸式實體內容(如媒體、社交、影視等)的融合程度將會越來越高。換句話說,「元宇宙」將發揮更大的媒介作用。

今年9月,北京師範大學新聞與傳播學院教授喻國明在《2020-2021年「元宇宙」發展研究報告》發布會議上指出:「如今媒介所扮演的角色大體上都是認知方面的訊息給予,但媒介的角色正在完成一個從給予認知到給予體驗的過程。甚至傳播效果,都能起到一個定向作用。體驗。

從理論上講,最好的傳播體驗必然是基於真實場景。如看球賽,理想情形是在球場上親身觀看。在「元宇宙」裡,隨著顯示互動、高速通訊和運算技術的發展,建構無限逼近真實的傳播場景將成為現實,使用者能在立體化、多感官接收情境中,成為新聞事件的「目擊者」和「實地觀察者」。

因而,“元宇宙”媒體可實現真正的“多媒體化”,人類的各種感官如視覺、嗅覺、聽覺、味覺、觸覺等,都能發揮作用,甚至完全展開、相互配合,實現“沉浸式”的媒體應用。

當今媒體內容不斷進化和創​​新,其發展趨勢也似乎正在向「元宇宙」概念靠攏。媒體內容將不再侷限於電視、電腦、手機螢幕等平面式的呈現方式,媒體內容製作將更考慮全像化呈現,重視營造現場環境氛圍,使用戶有身臨其境之感。社交也將不再侷限於文字留言評論,可即時用語音、肢體動作來抒發感受,現場虛擬化面對面交流。

設想一下,如果新聞報道能還原戰爭現場,打造“戰場元宇宙”,使人如身臨其境,實時感受到戰爭對於人類文明造成的巨大創傷,這份震撼會更能刺激人類社會對於和平的渴望與嚮往,媒體內容將具備更強大的影響力與傳播力。

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2021-11/26/content_303888.htm

Chinese Military Analysis of Japan’s Space and Cyberspace Deterrence Strategy

中國對日本太空和網路空間威懾戰略的軍事分析

現代英語:

The development of new military forces is changing the style of warfare. After years of development, space (also known as outer space) and cyberspace (hereinafter referred to as cyberspace) forces have transformed from conceptual forces to real forces. How to use these two new forces has become a key research topic for major powers in the world. In March 2024, the Security Research Group of the Sasakawa Peace Foundation of Japan released a research report entitled “War 3.0: Fundamental Changes in War” (hereinafter referred to as the “Report”), which explored how to use space and cyberspace to achieve strategic deterrence from the perspective of maintaining Japan’s national security. It also proposed a typical scenario of cyberspace confrontation against the background of an emergency in the Taiwan Strait, showing Japan’s thinking on the use of combat forces in emerging fields. The main contents are summarized as follows for readers.

1

War 3.0 is coming

The report believes that during the Cold War, the boundaries between civilians, the state and the military were clear, and the economic dependence between the two sides was low. This was the era of War 1.0. After the Cold War, globalization accelerated, and in 2001, the era of the war on terror began. The main body of the confrontation became state and non-state actors, which was the era of War 2.0. Around 2010, the confrontation between major powers reappeared. Due to the high degree of economic globalization, “war” occurred more in dimensions other than military. The conflict between Russia and Ukraine shows that in modern warfare, other means are becoming as important as military means. At the same time, commercial companies are also more involved in the research and development and use of emerging military technologies, and the government’s control over military power has been weakened. Since then, a new concept can be used to describe modern warfare, namely War 3.0.

As long as war occurs in the context of globalization, the characteristics of War 3.0 will appear. In the era of War 3.0, the target of deterrence is mainly state actors, but the specific form of conflict may be similar to hybrid warfare or conventional warfare. When formulating deterrence strategies in the space and cyberspace domains, both types of conflict should be taken into account. It is necessary to recognize that emerging domain capabilities are multipliers of traditional capabilities. The significance of competing for control in emerging domains lies in enhancing one’s own physical forces such as land, sea, and air forces or weakening the physical forces of opponents.

The report points out that using emerging field forces to carry out attacks can cause no tangible physical damage, is conducive to conflict management, and is the best tool for gray zone operations. Japan currently faces two main problems. One is that the emerging field forces owned by law enforcement agencies are not in line with mission requirements. The other is that it needs to consider how to use emerging field forces to achieve effective conflict management.

2

Strategic Deterrence in Emerging Fields

The report uses traditional deterrence theory for analysis and concludes that space and cyberspace have five common characteristics: difficult situational awareness, high defense difficulty, low attack threshold, mixed actors, and lack of international codes of conduct. Easy to attack and difficult to defend are the common characteristics of these two fields, so it is difficult to achieve effective strategic deterrence. In this regard, action should be taken in four aspects: First, improve situational awareness capabilities so that when problems occur, the cause of the failure can be quickly determined, the attacker can be identified, and the damage effect can be evaluated when counterattacked. Second, improve resilience to ensure that the loss of some functions will not cause the entire system to become disabled. Third, strengthen offensive capabilities, which can be used to attack in a certain field, or to use means in other fields to conduct cross-domain attacks. Fourth, achieve arms control cooperation between countries and build trust, formulate codes of conduct, etc.

3

Strengthening deterrence in air and space

1. The connotation of air and space control continues to be enriched

The report believes that the air and space can control the entire battlefield. In order to compete for air and space dominance, various types of equipment are constantly updated, combat systems are becoming more and more complex, and the scope of operations is becoming wider and wider. In combat, both sides often focus on the “find, locate, track, decide, engage, and assess (Find Fix Track Targeting Engage Assess, F2T2EA)” full kill chain, and simultaneously confront in emerging fields such as space, cyberspace, and electromagnetic space, which greatly expands the connotation of traditional dominance. In future high-end wars, the side with a higher level of space, cyberspace, and electromagnetic space capabilities may have an overwhelming advantage in overall combat capabilities.

2. How to exert the deterrent function of space power

The report emphasizes that space systems play an important role in intelligence collection, surveillance and reconnaissance (ISR), communications, positioning, navigation and timing (PNT), missile warning, environmental monitoring, etc., and also provide increasingly important support for the use of nuclear and conventional forces. In order to form a strong space deterrence, first, we must possess and demonstrate the corresponding capabilities, mainly the resilience, defense, counter-retaliation and situational awareness capabilities of the space system. Second, we must show the enemy our determination to use retaliatory capabilities. Third, we must form a cross-domain deterrence to ensure the security of the entire space system. In addition, systems in other fields such as land, sea and air must be able to supplement some of the functions of the space system. In the face of enemy attacks on our satellites, we must retaliate not only from space, but also through land, sea, air and cyberspace.

As space systems play an increasingly important role in Japan’s national defense, we will further enhance our deterrence against hostile offensive actions. While improving the resilience of space assets, we will attach great importance to the effective use of commercial space services.

3. How to enhance the deterrent effect of Japan’s aerospace power

The report points out that Japan should attach importance to cross-domain coordination of sea, land, air and space forces, especially to strengthen cooperation with the United States. It is necessary to closely monitor the surrounding airspace, use aircraft to perform denial missions when the situation escalates, and take active defense measures to prevent missile attacks. It is necessary to strengthen the construction of Self-Defense Force bases and realize the mutual use of air bases between Japan and the United States. Japan is surrounded by the sea, and it is necessary to attach importance to developing the ability to use air means to strike maritime targets to ensure the security of the homeland.

Faced with the vast Indo-Pacific region, it is difficult for Japan to accurately grasp the regional situation by relying solely on its own aerospace power. It is necessary to share intelligence information through multilateral cooperation and build a Common Operational Picture (COP) in the Indo-Pacific region to accurately and comprehensively grasp the regional situation and have a deterrent effect on potential enemies. It is necessary to strengthen cooperation with countries other than the United States, especially Australia. Japan, the United States and Australia should establish joint ammunition and fuel depots in their respective countries. In the field of space, Japan will expand cooperation in hosting payloads. If it can cooperate with European countries, then future attacks on Japanese satellites can be regarded as attacks on multiple countries. It is becoming increasingly important to make full use of the power of allies and use their aerospace power to achieve deterrence goals.

4

Strengthening Deterrence in Cyberspace

1. Characteristics of Cyberspace Operations

The report believes that cyberspace has an increasing impact on the course of war, and cyberspace combat capabilities can even deter the occurrence of an entire conflict. Cyberspace security plays an important role in protecting various systems from cyber attacks, ensuring that confidential information is not leaked, and ensuring the normal operation of other systems such as critical infrastructure. It is also of great significance for cognitive domain protection.

There are two main characteristics of cyberspace at present. First, the boundary between military and civilian is blurred. The potential of military application of Internet is constantly emerging. In the conflict between Russia and Ukraine, the artillery combat management system (GIS Art for Artillery, GIS ARTA) used by Ukraine is to send data through drones and smartphones to determine the target location and launch attacks, which is very effective. Second, the security concept based on closed system is outdated. Even with physical isolation, it is impossible to completely prevent attacks. Cyberspace is easy to attack but difficult to defend, and the offense and defense are asymmetric. In addition, cyberspace operations can control the rhythm of conflict escalation in a low-intensity form, and can also be upgraded to a powerful weapon with high-intensity offensiveness after the official outbreak of military conflict.

2. Developing emerging technologies to enhance cyber warfare capabilities

The report points out that the development of emerging technologies will continue to change the rules of warfare, and the Japanese Ministry of Defense has begun to study the use of cloud computing to build a basic computing environment. It plans to build a diversified network environment, use Starlink satellites and 5G networks to provide Internet services, and consider enabling the new Internet communication protocol QUIC (Quick UDP Internet Connection). The first quantum computer has been developed, and related research on anti-quantum cryptography has been carried out. At the same time, it also pays close attention to the specific ways of combining artificial intelligence with cyber warfare.

3. Ways to strengthen cyber deterrence

The report emphasizes that the development of artificial intelligence technology and the adjustment of the network component supply chain are two uncertain factors. Japan should focus on improving its cyber warfare capabilities from the following aspects: (1) vigorously promote intelligence information sharing; (2) build active defense systems; (3) introduce zero trust and risk management frameworks; (4) establish the ability to attack adversary networks; (5) accelerate legislation in the field of cybersecurity; (6) expand the scale of talent training and increase support for commercial enterprises. By carrying out the above work, Japan can achieve early detection and response to cyber attacks. Even if it encounters a cyber attack, it can be discovered, processed and recovered at an early stage to ensure the resilience of the system to continue to operate. In addition, when Japan is attacked, it should coordinate actions with the US military. In peacetime, joint training should be strengthened so that it can carry out joint operations with the Cyber ​​Mission Force (CMF) composed of relevant forces of the US Cyber ​​Command.

Responsible for directing, coordinating and conducting cyber operations

5

Conception of cyberspace combat scenarios

The report describes a basic scenario of cyber warfare between the Red and Blue sides, with the Taiwan Strait incident as the background, and puts forward the following important viewpoints: First, when the Blue side has an absolute advantage, the Blue side should focus on taking defensive actions to achieve deterrence. When the forces of the two sides tend to be balanced, the Blue side should actively take offensive actions to seize the initiative. Second, the Blue side can launch cyber attacks around the Red side’s observation, adjustment, decision-making, and action (OODA) links to weaken the Red side’s military capabilities, especially its maritime and landing combat capabilities, and carry out “anti-military cyber attack missions.” When necessary, strike the Red side’s social infrastructure to weaken its overall strength. At the same time, take cyber attacks to induce and divide public opinion, weaken the Red side’s willingness to take action, and carry out “anti-value cyber attack missions.” Third, in the anti-military cyber attack mission, the Blue side can attack the Red side’s aircraft, and can also take measures such as data pollution, deception cloud, and communication network interruption to attack the Red side’s command and control system. In the action of attacking the civilian network system, cyber attacks can be carried out on key entities of railway and ship operations in the Red coastal areas and key infrastructure such as the power grid in coastal metropolises that support social and economic systems. There are also options for attacking Red Team financial systems, media servers, and water and gas supply networks.

In order to deal with possible cyber attacks from the Red side in the event of an emergency in the Taiwan Strait, Japan should do the following: First, adopt an active defense strategy, require commercial operators to share information with the government, and introduce artificial intelligence to improve cyber situational awareness and network resilience. Second, introduce a large-scale data forensics platform to identify the authenticity of massive image data and counter false information. Third, give priority to countermeasures against domestic cyber attacks, effectively defend the networks of defense, government departments, law enforcement agencies and private enterprises through various active cyber defense measures, and deal with cognitive domain actions against the Japanese public.

6

Conclusion

The report proposed the concept of War 3.0 and launched a series of discussions on achieving cyberspace and space deterrence. While suggesting strengthening its own relevant capacity building, it repeatedly emphasized the need to strengthen cooperation with the United States, especially with countries related to the Quadrilateral Security Dialogue (QUAD) and AUKUS. With Japan’s application to join AUKUS on April 25, 2024, the Asia-Pacific version of the “mini-NATO” alliance has taken shape, and regional peace and stability will be severely impacted.

Disclaimer: This article is reprinted from Military High-Tech Online, the original author is Shi Honglin. The content of the article is the original author’s personal opinion. This public account is translated/reprinted only for sharing and conveying different opinions. If you have any objections, please contact us!

Reprinted from Military High-Tech Online

Author: Shi Honglin

Introduction to the Institute

The International Institute of Technology and Economics (IITE) was established in November 1985. It is a non-profit research institution affiliated to the Development Research Center of the State Council. Its main functions are to study major policy, strategic and forward-looking issues in my country’s economic, scientific and technological social development, track and analyze the development trends of world science and technology and economy, and provide decision-making consulting services to the central government and relevant ministries. “Global Technology Map” is the official WeChat account of the International Institute of Technology and Economics, dedicated to delivering cutting-edge technology information and technological innovation insights to the public.

Address: Block A, Building 20, Xiaonanzhuang, Haidian District, Beijing

Tel: 010-82635522

繁體中文國語:

新領域軍事力量的發展正在改變戰爭樣式,其中太空(也稱為外層空間)和網路空間(以下簡稱網空)力量經過多年的發展,已由概念力量轉變為現實力量。如何利用這兩種新質力量,已成為世界各主要強國重點研究的內容。 2024年3月日本笹川和平財團安全研究小組發布研究報告《戰爭3.0:戰爭的根本變化》(以下簡稱《報告》),從維護日本國家安全的角度出發,探討如何利用太空和網空實現戰略威懾等問題,並以台海突發事件為背景,提出了一個網空對抗的典型場景,展示了日本在運用新興領域作戰力量上的思考。現將其主要內容整理如下,以颯讀者。

01

戰爭3.0時代到來

《報告》認為,在冷戰時期,平民、國家和軍隊之間的界線很清晰,對峙雙方經濟依賴度較低,此時是戰爭1.0時代。冷戰後全球化加速發展,2001年進入反恐戰爭時代,對抗的主體變成國家與非國家行為體,此時是戰爭2.0時代。 2010年前後大國對抗再次出現,由於經濟全球化發展程度較高,「戰爭」較多發生在軍事以外的維度。俄烏衝突顯示在現代戰爭中,其他手段正變得與軍事手段同等重要。同時,商業公司也更參與新興軍事技術的研發和使用,政府對軍事力量的控製程度受到了削弱。自此可以用一個新的概念來描述現代戰爭,即戰爭3.0。

只要戰爭在全球化背景下發生,就會出現戰爭3.0所包含的特徵。進入戰爭3.0時代,威懾的目標主要是國家行為體,但具體衝突形式可能類似混合戰爭,也可能是常規戰爭。在製定太空和網空領域威懾戰略時,要同時考慮這兩類衝突形式。要體認到新興領域能力是傳統能力的倍增器,爭奪新興領域制權的意義,在於提升己方陸、海、空軍等實體力量或削弱對手的實體力量。

《報告》指出,運用新興領域力量實施攻擊,可以不造成有形的物理破壞,有利於管控衝突,是在灰色地帶行動的最佳工具。日本當前主要面臨兩個問題,一是執法機構擁有的新興領域力量和任務需求不相適應。二是需要考慮具體如何運用新興領域力量,以達到衝突的有效管控。

02

新興領域的戰略威懾

《報告》利用傳統威懾理論進行分析,得出太空和網空具有五個共同特徵:態勢感知難、防禦難度大、攻擊門檻低、行動主體混雜、缺乏國際行為準則。易攻難守是這兩個領域的共同特點,因此較難實現有效的戰略威懾。對此,應從四個方面採取行動:一是提高態勢感知能力,以便在出現問題後,能夠迅速確定故障原因,識別攻擊者,並在反擊時評估毀傷效果。二是提升復原力,確保喪失部分功能不會導致整個系統失能。三是強化進攻能力,可在某一領域進行攻擊,也可利用其他領域手段進行跨域攻擊。四是實現國家間軍備控制合作並建立信任,制定行為準則等。

03

加強空中和太空的威懾

(一)空天制權的內涵不斷豐富

《報告》認為,空中和太空可以瞰整個戰場,為爭奪空天制權,各類裝備不斷更新,作戰系統越來越複雜,作戰範圍也越來越寬廣。在作戰中,雙方往往會圍繞「發現、定位、追蹤、決策、交戰、評估(Find Fix Track Targeting Engage Assess,F2T2EA)」全殺傷鏈各環節,在太空、網空、電磁空間等新興領域同時進行對抗,大大拓展了傳統制權的內涵。在未來高端戰爭中,利用太空、網空和電磁空間能力水準較高的一方,可能會在整體作戰能力上擁有壓倒性的優勢。
(二)如何發揮太空力量的嚇阻功能

《報告》強調,太空系統在情報收集、監視和偵察(Intelligence, Surveillance, and Reconnaissance,ISR),通信,定位、導航和授時(Positioning, Navigation and Timing, PNT),導彈預警,環境監測等方面發揮著重要作用,也為使用核武力量和常規力量提供越來越重要的支持。為了形成強大的太空威懾,一要擁有並展現對應能力,主要是太空系統的復原力、防禦力、反制報復能力以及態勢感知能力。二要向敵方展示使用報復能力的決心。三要形成跨域威懾以確保太空全系統安全。此外,陸海空等其他領域系統要能補充太空系統的部分功能,面對敵方對己方衛星的攻擊,不僅要從太空報復,還要透過陸海空和網空進行報復。

由於太空系統在日本國防中的作用越來越大,所以要進一步提升對敵對進攻行為的威懾。在提升太空資產復原力的同時,要高度重視商業太空服務的有效運用。

(三)如何增強日本空天肌力嚇阻效果

《報告》指出,日本應重視海陸空天力量的跨域協同,特別是加強與美國的合作。若要緊密監視週邊空域,在局勢升級時使用飛機執行拒止任務,採取主動防禦措施,防止遭遇飛彈攻擊。要加強自衛隊基地建設,實現日美兩國空軍基地的互相使用。日本四面環海,要重視發展使用空中手段打擊海上目標的能力,以確保本土安全。

面對廣袤的印太地區,日本僅靠自身的空天力量,難以準確掌握區域態勢,要透過多邊合作分享情報訊息,建構印太地區通用作戰態勢圖(Common Operational Picture, COP),以精準全面地掌握地區態勢,對潛在敵人產生嚇阻效果。要加強與美國以外的國家,特別是澳洲的合作。日本、美國和澳洲應在各自國家建立聯合彈藥和燃料庫。在太空領域,日本將拓展託管有效載荷合作,如能和歐洲國家合作,那麼未來攻擊日本衛星的行為,將可以被視為對多個國家的攻擊。要充分借助盟友力量,利用其空天力量達成威懾目的,這一點正變得越來越重要。

04

加強網空的威懾

(一)網空作戰的特點

《報告》認為,網空對戰爭進程的影響越來越大,而網空作戰能力甚至可以嚇阻整個衝突的發生。網空安全對於保護自身各類系統免受網路攻擊、確保機密資訊不會外洩、確保關鍵基礎設施等其他系統正常運作發揮重要作用,對於認知域防護也有著十分重大的意義。

目前網空主要有兩個特點,一是軍民界線模糊。網路的軍事應用潛力不斷顯現,在俄烏衝突中,烏克蘭使用的砲兵作戰管理系統(GIS Art for Artillery, GIS ARTA),就是透過無人機和智慧型手機,發送資料確定目標位置並發動攻擊,且非常有效。二是基於封閉系統的安全觀念已經過時。即便是進行物理隔離,也不可能完全防止被攻擊,網空易攻難守,攻防呈現不對稱特徵。此外,網空作戰既可以低強度形式控制衝突升級的節奏,也可以在正式爆發軍事衝突後,升級為具有高強度攻擊性的強大武器。
(二)發展新興科技提升網路戰能力

《報告》指出,新興技術的發展將持續改變作戰規則,日本防衛省已開始研究使用雲端運算建構基本運算環境。計畫建置多樣化網路環境,使用「星鏈」衛星和5G網路提供網路服務,考慮啟用新的網路通訊協定QUIC(Quick UDP Internet Connection)。已研發首台量子計算機,並進行反量子密碼的相關研究。同時,也高度關注人工智慧與網路戰結合的具體方式。

(三)強化網空威懾的辦法

《報告》強調,人工智慧技術的發展和網路部件供應鏈的調整是兩個不確定的影響因素。日本應著重從以下幾點提升網路戰能力:(1)大力促進情報資訊共享;(2)建構主動防禦系統;(3)引入零信任和風險管理框架;(4)建立攻擊對手網路的能力; (5)加速網路安全領域立法;(6)擴大人才培育規模,增加對商業企業的支持。透過進行以上工作,日本可以實現提前發現和應對網路攻擊。即使遭遇網路攻擊,也可在早期階段發現、處理和恢復,確保系統繼續運作的彈性。此外,當日本受到攻擊時,要與美軍協調行動。平時要加強聯合訓練,以便能夠與由美國網路司令部相關部隊組成網路任務部隊(The Cyber​​ Mission Force, CMF)實施聯合行動。
負責指導、協調和執行網路行動

05

對網空作戰場景的構想

《報告》以台海突發事件為背景,描述了一個紅藍雙方網路戰的基本場景,提出了以下幾個重要觀點:一是當藍方擁有絕對優勢時,藍方應側重於採取防禦行動實現威懾。當雙方力量趨於平衡時,藍方則應積極採取攻擊行動以爭取主動權。二是藍方可以圍繞紅方觀察、調整、決策、行動(Observe Orient Decide Act, OODA)的各環節展開網絡攻擊,削弱紅方軍事能力,特別是海上作戰和登陸作戰能力,開展「反軍事網絡攻擊任務」。在必要時候打擊紅方社會基礎設施,削弱其整體實力。同時,採取網路攻擊誘導和分裂公眾輿論,削弱紅方採取行動的意願,進行「反價值網路攻擊任務」。第三是在反軍事網路攻擊任務中,藍方可以攻擊紅方飛機,還可以採取資料污染、欺騙雲以及通訊網路中斷等措施,攻擊紅方指控系統。在攻擊民用網路系統的行動中,可以對紅方沿海地區鐵路和船舶運營的關鍵實體以及支持社會和經濟系統的沿海大城市電網等關鍵基礎設施進行網路攻擊。還可以選擇攻擊紅方金融系統、媒體伺服器以及供水和天然氣供應網路。

為因應台海突發事件發生時紅方可能的網路攻擊,日本應做好以下幾點:一是採取主動防禦策略,要求商業業者要與政府分享訊息,引入人工智慧以提高網空態勢感知和網路彈性。二是引進大規模資料取證平台以辨識海量影像資料的真實性,反制假資訊。第三是優先採取針對本國網路攻擊的反制措施,透過各種積極網路防禦措施有效保衛防衛、政府部門、執法機構和私人企業的網絡,並處理針對日本公眾的認知域行動。
06

結語

該報告提出了戰爭3.0的概念,圍繞實現網空和太空威懾展開了一系列論述,在建議加強自身相關能力建設的同時,多次強調要加強與美國,特別是四方安全對話(Quadrilateral Security Dialogue, QUAD)和奧庫斯(AUKUS)相關國家的合作。隨著2024年4月25日日本申請加入“奧庫斯”,亞太版的“小北約”聯盟已現雛形,地區和平穩定將受到嚴重衝擊。

免責聲明:本文轉自軍事高科技在線,原作者史宏林。文章內容係原作者個人觀點,本公眾號編譯/轉載僅為分享、傳達不同觀點,如有任何異議,歡迎聯絡我們!

轉自丨軍事高科技在線

作者丨史宏林

研究所簡介

國際技術經濟研究所(IITE)成立於1985年11月,是隸屬於國務院發展研究中心的非營利研究機構,主要功能是研究我國經濟、科技社會發展中的重大政策性、策略性、前瞻性問題,追蹤分析世界科技、經濟發展態勢,為中央和相關部會提供決策諮詢服務。 「全球技術地圖」為國際技術經濟研究所官方微信帳號,致力於向大眾傳遞尖端技術資訊與科技創新洞見。

地址:北京市海淀區小南莊20號樓A座

中文原文來源:https://www.163.com/dy/article/J5UO0ID90514R8DE.html

Chinese Military Values Attack & Defense as the Important Focus of Combat in Cognitive Domain Operations

中國軍隊把攻防當作認知域作戰作戰的重要著力點

現代英語翻譯:

Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.

Characteristics of the cognitive domain of value attack and defense

Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:

Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values ​​and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.

Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values ​​are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.

Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.

The mechanism of cognitive domain of value attack and defense

Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.

Impacting the value “protection zone”. Occupying the commanding heights of values ​​is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values ​​and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values ​​from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values ​​that are beneficial to themselves in order to achieve combat objectives.

Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.

Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.

The main means of cognitive domain in value attack and defense

Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.

Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.

Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.

In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.

現代國語:

價值攻防是從戰略層面進行認知域作戰的重要方式,通常價值攻防是透過幹預人的思維、信念、價值觀等,以達成瓦解敵方共識,摧毀敵方意志,進而掌控戰場綜合控制權的目的。精確掌握價值攻防的特性、機制、手段,對奪取未來認知域作戰優勢至關重要。

價值攻防作用認知域的特點

價值攻防是指透過引發個體或群體的深層邏輯思辨、價值判斷改變,完成其對相對穩定的認知結果的干預和影響,以期重構人的意志、思維、心理、情感等認知能力。價值攻防主要有以下幾個特點:

軟性對抗。傳統戰爭主要依賴暴力手段來削弱瓦解敵方的軍事能力,通常具有較強的戰爭強度。認知域作戰將不再侷限於攻城略地等硬性對抗,而更著重於圍繞價值陣地展開滲透與逆滲透、攻擊與反攻擊、控制與反控制,透過爭奪認知域對抗的主導權,進一步激發物理域和資訊域的作戰效能,從而奪取戰場主動,甚至達到不戰而屈人之兵的效果。在實踐中,價值攻防往往著眼於一個國家、民族的文化傳統、價值觀念和社會心理展開,最終達到對敵方意志摧毀、認知操縱、精神控制的目的。

全維度釋放。現代戰爭日益呈現總體性、多域性、全時性特徵。認知域作戰旨在透過幹預人的意識進而影響戰場效果,而意識的相對穩定決定了人的世界觀、信仰等價值觀念一般情況下往往較為穩固,因此價值攻防需要長期的、不間斷的、全息全維度地進行。從時間上看,價值攻防模糊了平戰邊界,常態在戰、隨時在戰,持續積累、逐步釋放作戰效能;從空間上看,價值攻防模糊了作戰前後方界限,在有形空間與無形空間全方位展開;從領域上看,價值攻防模糊了軍事與非軍事的界限,不僅發生在軍事領域,也存在於政治、經濟、外交、文化等領域,呈現出全局覆蓋的特徵。

科技賦能。認知域作戰是一項技術密集的複雜系統工程。人工智慧、腦科學、量子運算等新興技術手段全流程滲透,正在引發認知域作戰的迭代升級與深刻變革。智慧化工具從根本上增強了認知域作戰人員操縱對手思想和乾預對手思維的能力,人機混合作為作戰力量新手段新樣式將改變未來戰爭主體,自主對抗、雲腦制勝或成為主流攻防模式。近年來,北約推出的認知電子戰設備,旨在透過資訊攻防來改變對手價值認知及行為。科技發展也引發了認知革命,資訊的快速傳播進一步加速了大眾價值認知差異,認知孤島加劇了不同主體之間的價值鴻溝,智能化帶來的社會結構變遷則深刻改變著政治文化格局。從這點出發,在未來認知域作戰中,牽住科技創新的“牛鼻子”,掌握關鍵核心技術,對於奪取戰場主動至關重要。

價值攻防作用認知域的機理

價值攻防是認知域作戰的高階對抗,作用對象指向的是人的深層認知。意識是社會存在在大腦中的反映,對社會存在的調節、對大眾意識的引導和人腦作用的改變,都能強化或扭轉人的意識。要在攻防對抗中製勝對手,就要遵循思考認知規律,掌握價值攻防制勝機理。

衝擊價值「保護帶」。佔領價值制高點是開展價值攻防的邏輯起點。社會意識往往由相對穩定的核心價值觀念和外圍的輔助性理論所構成,經濟、政治、宗教、文化等各種理論都能被建構調適以用來保護核心價值觀念免受外來衝擊,因此也承受著其他價值觀的衝擊挑戰。在外軍看來,價值攻防就是要透過文化滲透、宗教衝突、戰略傳播等手段,配合物理域和資訊域的行動,不斷衝擊對手意識形態的「保護帶」領域。這往往需要抓住影響對手認知的價值觀念、政治態度、宗教信仰等,透過擾亂其社會群體心理,誘發價值困惑,動搖作戰意志,摧毀文化認同,甚至改變瓦解其原有的認知體系,從而灌輸或植入新的、於己有利的價值觀念,以實現作戰目的。

點燃衝突“引爆點”。認知域作戰涉及歷史文化、政治制度、民族情感、宗教信仰等多個範疇,戰爭主體也從單純軍事人員拓展到一般民眾。透過炒作話題爭端、公共事件,激發一般民眾的認知衝突,將成為認知領域作戰的重要手段。在近幾場局部衝突中,交戰各方透過有目的性的敘事點燃國家民族情緒,引發政治危機進而影響戰局已屢見不鮮。未來戰爭,一些國家利用熱點敏感事件引爆輿論,依托網路技術對一般民眾進行聚攏吸附、煽動動員、精準操控和誘導塑造,從而推動一般性衝突上升為信仰之爭、制度之爭、價值之爭將成為常態。

控制認知「斷裂面」。認知空間作為觀念層面的存在,由全部作戰個體的主觀認知空間疊加而成,是分化的、差異性的乃至衝突性的價值集合體。然而,意識形態具有「縫合」功能,透過認知塑造、話語建構,可以把斷裂的認知有效地「縫合」起來,把分散的價值凝聚起來,形成相對穩固的認知體系。二戰後法國對戰敗創傷曾進行過有效的認知“縫合”,其運用一整套獨立敘事邏輯,闡述戰爭如何為法國提供了“新的機會”,極大地凝聚了法國人民對政府的政治認同。在認知域作戰中開展價值陣地爭奪,應注重敵方內部的認知斷裂面,尋找敵我之間的認知連接點進行認知“縫合”,最大限度地團結各方力量,孤立瓦解敵人。

價值攻防作用認知域的主要手段

價值攻防使認知對抗從輿論、心理等層面拓展到思維空間,從軍事領域拓展到整體全局,從而實現了對敵方深層的政治認同的打擊。當前世界軍事強國都在加強戰略預置,瞄準目標主體、戰法手段的深刻變化,變革作戰思維,積極掌控認知域作戰的主動權。

以深層摧毀為目標。認知域作戰直接作用於人的大腦認知,相較於物理域作戰,更容易實現深層的戰略意圖。特別是人的語言層級、思維層級和文化層級的「高階認知」一旦被突破,有助於從戰略上扭轉戰場態勢,實現戰爭的政治目的。基於此,認知域作戰往往始於未戰,透過幹預對手內政外交,動搖其意識形態和價值觀基礎等;戰時則注重影響敵方戰爭決策、戰役指揮、戰鬥實施的價值判斷,打擊或削弱作戰人員的決策能力和抵抗意誌等。敵對各方都試圖做到“維繫自己的世界,同時增加對手的破壞性壓力”,以通過爭奪認知優勢實現決策優勢,進而取得行動優勢的目標。

以普通個體為中心。未來認知域作戰的主體將不再局限於軍事人員,廣義上講,可以進行資訊交流傳播的個體都可能成為參戰力量。相較於社會領域的精英,一般民眾更容易接受和傳播多元價值,其認知空間被操縱的機率更大。目前,網路媒體正成為社會領域資訊交流傳播的主要管道,透過有針對性的訊息引導、訊息傳遞,進而達到認知塑造的目的。外軍實踐證明,借助對一般個體的認知塑造,可以造成從下到上的遞進滲透和認知幹擾,使一般民眾與社會決策層之間的意識觀念產生背離,在關鍵行動中無法達成有效共識。

以持久作戰為形式。與物理域軍事鬥爭直接打擊摧毀「硬」目標不同,認知域作戰的潛在目標為人的認知,價值攻防指向的是改變作戰對象的觀念、信念、意志、情感等,往往需要潛移默化、步步為營。有效的認知進攻一般在作戰準備階段就發起,並貫穿戰爭始末,透過收集對手的認知態勢、決策習慣、思考模式等情況,有針對性地進行營造態勢、改變氛圍等行動。因此,認知域作戰更需要加強整體設計,尤其要注重協調多方力量,在輿論場營造、外交等多個陣地多點強化預置準備,進而形成整體作戰合力。

中國軍事資源:https://www.163.com/dy/article/HDOT8JIM0511DV4H888.html

China’s “War of Annihilation” from the Perspective of Modern Warfare

現代戰爭視角下的中國“殲滅戰”

現代英語:

“Based on the evolution of war, grasp the “cautious first battle””

  Written in front

  In the history of our army, fighting a war of annihilation is one of the most distinctive and important guiding ideas for operations. As early as the Agrarian Revolutionary War, based on the war purpose of “preserving ourselves and destroying the enemy”, our army clearly proposed that the basic policy in operations was to fight a war of annihilation. Since then, in different historical periods, according to different environments, situations and tasks, our army has maintained a high degree of flexibility and maneuverability in combat guidance, and has resolutely implemented the principle of fighting a war of annihilation, continuously enriched and developed combat theories, and wrote classic examples of the weak defeating the strong in the history of world wars.

  With the advent of the information age, the form of warfare, battlefield environment, military technology, and warfare mechanisms have undergone major changes. How the traditional theory of annihilation warfare can adapt to the changes of the times, give full play to our strengths, attack the enemy’s weaknesses, and innovate and develop is a question of the times that our generation of soldiers must answer well.

  Depriving the enemy of its combat power is the key to winning a war of annihilation

  In the long-term practice of revolutionary wars, our army is often at a disadvantage in terms of quantity, scale and equipment. In order to dampen the enemy’s spirit, seize the initiative and defeat the enemy, while emphasizing the cautiousness of the first battle, we pay great attention to planning and fighting a war of annihilation to quickly weaken the enemy’s strategic advantage. Therefore, “it is better to cut off one finger than to injure ten fingers”, completely depriving the enemy of its combat capability, avoiding a war of attrition or a war of defeat, has also become a key indicator for measuring the success or failure of a war of annihilation and the comprehensive effectiveness of combat. Combat under traditional conditions is often the physical superposition of troops and weapons in the same time and space, emphasizing hard killing as the main method, and the strength of combat effectiveness is mainly manifested through parameters such as mobility, firepower, and protection. Correspondingly, quickly and effectively eliminating the enemy’s living forces has become the most effective means of winning hearts and minds and disintegrating the enemy.

  Entering the information age, information power has driven the displacement of combat effectiveness measurement standards in an exponential manner. While becoming the dominant factor in the informationized battlefield, it has strongly promoted the organic integration of combat power with early warning detection, reconnaissance intelligence, command and control, and rear-end support. The warring parties are showing a trend of full-system and full-factor confrontation. The informationized battlefield no longer simply emphasizes the spatial and temporal concentration of troops and weapons to suppress and attack the enemy, but focuses on relying on the network information system to seize information space and compete for information advantages, so that the enemy “cannot see clearly, cannot connect, and cannot hit accurately”, thereby completely depriving the enemy of its combat effectiveness. In the Kosovo War, after suffering 78 days of continuous air strikes by NATO, although the Yugoslav army did not suffer major losses in its manpower, it was always in a passive position because the material basis of the war and the reconnaissance and early warning, command and control, air defense and anti-missile systems were destroyed and paralyzed by the enemy, and was forced to sign a humiliating treaty.

  In today’s era, destroying the enemy’s key war support elements, depriving it of the objective material basis for continuous combat, and undermining its will to wage war are not only important options for annihilation warfare to pursue deterrence effects and deprive the enemy of its combat effectiveness, but also a necessary way for annihilation warfare to achieve combat intentions and defeat the opponent.

  Attacking the key points and breaking the system is the key to winning a war of annihilation

  For a long time, pulling teeth out of a tiger’s mouth and striking the enemy’s vital points have been important indicators for testing the courage and command art of commanders and fighters, and are also effective means to defeat the enemy and achieve the goal of annihilation warfare. During the Hujia Wopeng Battle of the Liaoshen Campaign during the War of Liberation, the 3rd Column of the Northeast Field Army first destroyed the Liao Yaoxiang Corps Command through bold penetration, infiltration, and division, and quickly trapped the enemy in a state of collapse and defeat. But at the same time, we should also see that due to the constraints of military technology level and the effectiveness of weapons and equipment, in traditional operations, there are often many practical difficulties in accurately striking core targets such as enemy command organizations and key defense positions, and there is a lack of effective means to “go straight to Huanglong”. It can be said that traditional annihilation warfare is still more about annihilating the opponent’s living forces. This also makes it an important factor in designing the combat process and considering the success or failure of operations in traditional operations to measure and compare the number and scale of troops and weapons of both sides.

  In the information age, on the one hand, the environmental situation and war thinking have undergone profound changes. The necessity and possibility of expanding the size of the army in exchange for improved combat effectiveness and then winning the war by annihilating a large number of enemy heavy troops are becoming less and less; on the other hand, new weapons and equipment such as precision guidance and unmanned intelligence, with the support of powerful information networks and aerospace reconnaissance capabilities, can implement “decapitation operations” and “targeted elimination” more quickly and accurately, and quickly achieve the goal of annihilation warfare. The combat mode of seizing the key nodes and parts of the enemy’s combat system, carrying out precise strikes and structural destruction, paralyzing the enemy’s combat system while reducing collateral damage and achieving combat objectives is becoming more and more respected. As a result, command centers, communication hubs, radar positions, network nodes, etc. have become sensitive parts that the warring parties focus on protecting and the key points of attacking. In the Iraq War, the US military launched a comprehensive structural paralysis operation against the Iraqi army. By implementing “decapitation operations” against Iraqi military and political leaders and “targeted elimination” of the Iraqi army’s communication command and air defense systems, the Iraqi army was placed in a completely passive position throughout the process, and the war process was accelerated.

  In today’s era, with the rapid development of information technology and war practice, “system destruction” is becoming a keyword in modern combat theory, and is gradually promoting the overall transformation of combat modes. It has not only become a new way and means to win wars, but also an important way to win modern annihilation wars.

  Controlling operational control is the key to winning a war of annihilation

  In previous war practices, the combat environment faced by our army was relatively simple, and the battlefield was mainly carried out on land. Although our army is often at a disadvantage compared to the opponent’s weapons and equipment, it can often defeat the strong with the weak and defeat the enemy by exploring its own advantages, exploiting the enemy’s weaknesses, and actively looking for opportunities. In the second battle of the War to Resist U.S. Aggression and Aid Korea, the volunteer army adopted the combat strategy of internal operations, luring the enemy deep into the enemy, and defeating them one by one. They made full use of the darkness of night and terrain to secretly engage the enemy, dared to cut off the enemy’s retreat, interspersed attacks, and divided and surrounded the enemy, giving the enemy an annihilating blow, and finally won the battle and reversed the entire situation in one fell swoop. This shows that for a party that is temporarily unable to seize comprehensive control of the battlefield in combat, as long as it is good at exploiting the enemy’s weaknesses and cleverly reducing the enemy’s sharp attack momentum, it can still seek the initiative to win in difficult and difficult situations and achieve the goal of annihilation warfare.

  In the information age, wars are fought on vast battlefields, both visible and invisible. In addition to the traditional battlefields of land, sea and air, they are also further extended to deep sea, space, electromagnetic, network, intelligence, biology and other space fields, presenting a complex situation. The armies of the world’s powerful countries have taken the seizure of comprehensive control and the initiative in war as important indicators and necessary ways to build their army and defeat their opponents. Dimensionality reduction strikes have become a must-have in battlefield confrontations. In recent years, the US military’s foreign aggression has relied on the battlefield comprehensive control dominated by the advantages of air and space control and information control. However, we must also see that no matter how powerful the opponent is, there will be fatal weaknesses. Even if it is difficult for the party with relatively backward weapons and equipment to fully seize the battlefield comprehensive control, it can still “attack the incapable with the capable” in the local battlefield, seek local combat initiative, and thus win the local annihilation war, and use the local initiative to drive the overall initiative, and use asymmetric single control to help seize local comprehensive control and achieve final victory.

  In today’s era, we must accelerate the construction of all aspects of the military and step up the forging of capabilities and means to seize comprehensive control and take the initiative on the battlefield. We must also follow the winning mechanism of modern warfare, flexibly use “total war”, “cognitive war”, “cross-domain war”, “intelligent war” and other tactics, use dimensionality reduction strikes, asymmetric strikes and other tactics, turn disadvantages into advantages, turn passivity into initiative, control combat control by “attacking the incapable with the able”, and win the war of annihilation.

  Accurately releasing energy is the key to winning a war of annihilation

  Traditional warfare is restricted by factors such as command and communication, mobility, firepower speed, and weather conditions. The use of forces is often limited to a certain combat area. There is little change in combat command and troop actions, and offensive and defensive actions are relatively clear. In the past, annihilation warfare was more often achieved through echelon (group) deployment, continuous attack (resistance), layer-by-layer capture (defense), combined with interspersed detours, segmentation and encirclement, and cutting off the enemy’s flanks. For this reason, “concentrating superior forces and annihilating the enemy one by one” often becomes the fundamental principle and important way to plan annihilation warfare.

  In the information age, the combat force structure has undergone major changes. With the emergence of space combat, intelligent combat, stealth combat forces, as well as a large number of new weaponry and equipment such as hypersonic aircraft and kinetic weapons, the military’s information power, mobility, and strike power have unprecedentedly increased, and the effectiveness of unmanned intelligent combat has become increasingly prominent. Although quantity and scale are still important criteria for measuring the combat effectiveness of an army, “newer, faster, more accurate, and smarter” has begun to become an important indicator for measuring an army’s ability to adapt to modern warfare. Correspondingly, scientifically and rationally organizing combat forces and focusing on the best to release combat effectiveness have become important links in winning modern annihilation wars.

  Structural strength determines combat effectiveness, and advanced and applicable structural formation is an important prerequisite for multi-functional and powerful combat effectiveness. In the information age, only by jointly using new and old combat forces, realizing the organic integration of new quality capabilities and traditional capabilities, and then building a new force formation that integrates multiple capabilities, can we promote the overall optimization of the combat system and the aggregation of advantages, and accurately control the combat rhythm, combat time and space, combat operations and combat process. In the 2020 Nagorno-Karabakh conflict, Azerbaijan adopted a flexible formation mode for manned and unmanned combat forces, using low-cost An-2 drones to lure the Armenian air defense system to open fire, and followed up with Habib-2 anti-radar drones and TB-2 reconnaissance and strike drones to destroy more than a dozen air defense systems on the Armenian side in one fell swoop, and then calmly defeated the Armenian ground armored forces.

  In today’s era, as the status and role of combat operations such as network and electronic warfare, air and space attacks, and unmanned combat become more prominent, more attention should be paid to scientific design and rational organization of troops and weapons, so as to achieve the effect of clenching fingers into a fist through the accumulation of quality and integration of efficiency, and fight a war of annihilation that is quick to strike and quick to retreat, and wins with precision.

現代國語(繁體):

《立足戰爭演變把握「慎重初戰」》

寫在前面

在我軍戰史上,打殲滅戰是最鮮明、最重要的作戰指導思想之一。早在土地革命戰爭時期,基於「保存自己,消滅敵人」這場戰爭目的,我軍明確提出作戰中基本的方針是打殲滅戰。此後在不同歷史時期,根據環境、情勢和任務的不同,我軍在作戰指導上既保持了高度的靈活機動,又堅決貫徹打殲滅戰的原則,不斷對作戰理論予以豐富發展,在世界戰爭史上寫下了一個以弱勝強的經典戰例。

進入資訊時代,戰爭形態、戰場環境、軍事科技和戰爭機理等已發生重大變化,傳統的殲滅戰理論如何適應時代之變,揚我之長、擊敵之短並創新發展,是我們這代軍人必須回答好的時代課題。

剝奪敵方戰力是打好殲滅戰的關鍵

在長期革命戰爭實踐中,我軍在數量、規模和裝備上常常處於劣勢。為挫敵銳氣、奪取主動、克敵制勝,在強調慎重初戰的同時,十分注重籌劃和打好殲滅戰,以迅速削弱敵方戰略優勢。由此,“傷其十指,不如斷其一指”,徹底剝奪敵方作戰能力,力避打成消耗戰、擊潰戰,也成為衡量殲滅戰成敗和作戰綜合效益的關鍵指標。傳統條件下的作戰,往往是兵力兵器在同一時空的物理疊加,強調以硬殺傷為主要方式,戰鬥力強弱主要透過機動、火力、防護等參數表現。與之相應,迅速有效消滅敵有生力量,成為攻心奪志、瓦解敵方最有效的手段。

進入資訊時代,資訊力以指數級方式推動戰鬥力衡量標準發生位移,在一躍成為資訊化戰場主導要素的同時,強力推動作戰力量與預警探測、偵察情報、指揮控制、後裝保障等要素有機融合,交戰雙方呈現全系統全要素對抗之勢。資訊化戰場不再單純強調兵力兵器時空集中以壓制打擊敵方,而是注重依托網路資訊體系,透過搶佔資訊空間、爭奪資訊優勢,使敵“看不清、聯不上、打不準”,進而全盤剝奪敵方戰力。在科索沃戰爭中,在遭受北約78天持續空中打擊後,南聯盟軍隊有生力量儘管沒有遭受重大損失,但由於戰爭物質基礎和偵察預警、指揮控制、防空反導體係等被敵毀癱,始終處於被動挨打境地,被迫簽訂城下之盟。

當今時代,摧毀敵方戰爭關鍵支持要素,剝奪其持續作戰的客觀物質基礎,瓦解其遂行戰爭意志,既是殲滅戰追求震懾效應、剝奪敵方戰力的重要選項,也是殲滅戰達成作戰企圖、制勝對手的必要途徑。

擊要害破體係是打好殲滅戰的重心

一直以來,虎口拔牙、擊敵要害既是考驗指戰員膽略勇氣、指揮藝術的重要指標,也是克敵制勝、達成殲滅戰目標的有效手段。解放戰爭期間遼沈戰役的胡家窩棚戰鬥,東北野戰軍3縱經過大膽穿插、滲透、分割,首先搗毀了廖耀湘兵團指揮部,迅速陷敵於土崩瓦解、潰不成軍的境地。但同時我們也應當看到,因為軍事技術水準、武器裝備效能的製約,在傳統作戰中,要對敵指揮機構等核心目標和重點防禦部位實施準確打擊,往往存在諸多現實難題,缺乏「直搗黃龍」的有效手段。可以說,傳統殲滅戰仍是殲滅對方有生力量。這也使得在傳統作戰中,衡量對比雙方兵力兵器數量與規模,始終是設計作戰進程、考量作戰成敗的重要因素。

資訊時代,一方面,環境情勢、戰爭思維發生了深刻變化,那種以擴充兵力規模換取作戰效能提高,進而透過大量殲滅敵方重兵集團奪取戰爭勝利的必要性和可能性越來越小;另一方面,精確導引、無人智慧等新型武器裝備在強大資訊網路、空天偵察能力加持下,可以更快捷精準地實施“斬首行動”“定點清除”,迅速達成殲滅戰目標。抓住敵作戰體系關鍵節點及部位,實施精確打擊和結構破壞,在減少附帶損傷的同時癱瘓敵作戰體系、達成作戰目標的作戰模式,越發受到推崇。由此,指揮中心、通訊樞紐、雷達陣地、網路節點等,則成為交戰雙方重點防護的敏感部位及尋隙打擊的要害。在伊拉克戰爭中,美軍對伊軍全面展開了結構癱瘓式作戰,透過對伊拉克軍政首腦實施“斬首行動”,對伊軍通信指揮、防空系統進行“定點清除”,全程置伊軍於完全被動挨打境地,戰爭進程得以加快。

當今時代,伴隨資訊科技與戰爭實踐的快速發展,「體系破擊」等正成為現代作戰理論的關鍵詞,並逐步推動作戰模式整體轉型,不僅成為戰爭制勝的新方式新手段,也成為打贏現代殲滅戰的重要途徑。

掌控作戰制權是打好殲滅戰的樞紐

以往戰爭實踐中,我軍面對的作戰環境相對單一,戰場主要在陸地展開。儘管相較於對手武器裝備我軍常處於劣勢,但透過發掘自身優勢、利用敵方弱點、主動尋找戰機,往往能夠以弱勝強、克敵制勝。在抗美援朝戰爭第二次戰役中,志願軍部隊透過採取內線作戰、誘敵深入、各個擊破的作戰方針,充分利用夜暗、地形等條件隱蔽接敵,敢於斷敵退路、穿插襲擊、分割圍殲,予敵殲滅性打擊,最終取得戰役勝利,一舉扭轉整個戰局。這表明,對於作戰中一時難以奪控戰場綜合製權的一方,只要善於利用敵方弱點,巧妙消減敵方攻擊銳勢,仍可在難局、困局中求得制勝先機,達成殲滅戰目標。

資訊時代,戰爭展開於有形無形廣大戰場,除了傳統的陸、海、空戰場,也進一步向深海、太空、電磁、網路、智慧、生物等太空領域擴展延伸,呈現出錯綜複雜的態勢。世界強國軍隊紛紛把奪控綜合製權、佔據戰爭主動,作為軍隊建設、制勝對手的重要指標和必要途徑,降維打擊成為戰場對決的必殺技。美軍近年來對外侵略就是依仗以製空天權和製資訊權優勢主導的戰場綜合製權。但是我們也要看到,對手再強大也會有致命的弱點,武器裝備相對落後的一方,即便難以全面奪控戰場綜合製權,卻依然可以在局部戰場“以能擊不能”,求得局部作戰主動,從而打贏局部殲滅戰,並以局部主動帶動全局主動,以非對稱的單項制權助力奪取局部綜合製權,並取得最終勝利。

當今時代,固然要加快軍隊各項建設,加緊鍛造奪控綜合製權、佔據戰場主動的能力手段,更要遵循現代戰爭制勝機理,靈活運用“總體戰”“認知戰”“跨域戰” 「智能戰」等戰法,以降維打擊、非對稱打擊等打法,化劣勢為勝勢,變被動為主動,在「以能擊不能」中掌控作戰制權,打贏殲滅戰。

聚優精準釋能是打好殲滅戰的要則

傳統作戰,受指揮通信、機動能力、火力速度、天候氣像等因素影響制約,力量運用往往局限於一定的作戰區域,作戰指揮和部隊行動臨機變化小,攻防行動比較分明。以往的殲滅戰,更多的還是透過梯隊(群隊)式部署,以及連續攻擊(抗擊)、層層奪佔(防守),結合穿插迂迴、分割包圍、斷敵側後等手段達成作戰目標。正因此,「集中優勢兵力,各個殲滅敵人」往往成為籌劃殲滅戰的根本遵循與重要途徑。

資訊時代,作戰力量結構發生重大變化。伴隨太空作戰、智慧作戰、隱身作戰力量,以及高超音波速飛行器、動能武器等新型武器裝備的大量湧現,軍隊資訊力、機動力、打擊力空前增大,無人智能作戰效能日益突出。儘管數量、規模仍是衡量一支軍隊戰鬥力的重要標準,但“更新、更快、更準、更智”,已開始成為衡量一支軍隊對現代戰爭適應能力的重要指標。與之相應,科學合理編組作戰力量,聚優釋放作戰效能,成為打贏現代殲滅戰的重要關節。

結構力決定戰鬥力,結構編成先進適用是戰鬥力多能、強大的重要前提。資訊時代,只有透過新舊作戰力量的聯合運用,實現新質能力與傳統能力的有機融合,進而建構集多種能力於一體的新型力量編組,才能促進作戰體系整體優化與優勢聚合,精準控製作戰節奏、作戰時空、作戰行動和作戰過程。在2020年的納卡衝突中,阿塞拜疆對有人和無人作戰力量採取了靈活編組模式,用價格低廉的安-2無人機引誘亞美尼亞防空系統開火,用哈比-2反雷達無人機和TB -2察打一體無人機跟進打擊,一舉摧毀亞方十餘套防空系統,進而從容打掉亞方地面裝甲部隊。

當今時代,隨著網電作戰、空天襲擊、無人作戰等作戰行動地位作用的進一步凸顯,更應注重科學設計、合理編組兵力兵器,透過質量累加、效能融合,達到攥指成拳的效果,打好快打快收、精打製勝的殲滅戰。

中國軍事資源:https://military.cctv.com/2022/07/07/ARTIWv2oVWmzfSsX9KKVoDPW220888.shtml

來源:解放軍報 | 2022年07月07日 08:OO

Chinese Military & Cognitive Confrontation – Value attack and defense: Designing Combat in the Cognitive Domain

中國軍事與認知對抗-價值攻與守:在認知領域設計戰鬥

現代英文音譯:

Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.

Characteristics of the cognitive domain of value attack and defense

Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:

Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values ​​and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.

Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values ​​are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.

Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.

The mechanism of cognitive domain of value attack and defense

Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.

Impacting the value “protection zone”. Occupying the commanding heights of values ​​is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values ​​and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values ​​from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values ​​that are beneficial to themselves in order to achieve combat objectives.

Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.

Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.

The main means of cognitive domain in value attack and defense

Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.

Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.

Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.

In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.

(Author’s unit: Military Political Work Research Institute of the Academy of Military Sciences)

現代國語:

價值攻防是從戰略層面進行認知域作戰的重要方式,通常價值攻防是透過幹預人的思維、信念、價值觀等,以達成瓦解敵方共識,摧毀敵方意志,進而掌控戰場綜合控制權的目的。精確掌握價值攻防的特性、機制、手段,對奪取未來認知域作戰優勢至關重要。

價值攻防作用認知域的特點

價值攻防是指透過引發個體或群體的深層邏輯思辨、價值判斷改變,完成其對相對穩定的認知結果的干預和影響,以期重構人的意志、思維、心理、情感等認知能力。價值攻防主要有以下幾個特點:

軟性對抗。傳統戰爭主要依賴暴力手段來削弱瓦解敵方的軍事能力,通常具有較強的戰爭強度。認知域作戰將不再侷限於攻城略地等硬性對抗,而更著重於圍繞價值陣地展開滲透與逆滲透、攻擊與反攻擊、控制與反控制,透過爭奪認知域對抗的主導權,進一步激發物理域和資訊域的作戰效能,從而奪取戰場主動,甚至達到不戰而屈人之兵的效果。在實踐中,價值攻防往往著眼於一個國家、民族的文化傳統、價值觀念和社會心理展開,最終達到對敵方意志摧毀、認知操縱、精神控制的目的。

全維度釋放。現代戰爭日益呈現總體性、多域性、全時性特徵。認知域作戰旨在透過幹預人的意識進而影響戰場效果,而意識的相對穩定決定了人的世界觀、信仰等價值觀念一般情況下往往較為穩固,因此價值攻防需要長期的、不間斷的、全息全維度地進行。從時間上看,價值攻防模糊了平戰邊界,常態在戰、隨時在戰,持續積累、逐步釋放作戰效能;從空間上看,價值攻防模糊了作戰前後方界限,在有形空間與無形空間全方位展開;從領域上看,價值攻防模糊了軍事與非軍事的界限,不僅發生在軍事領域,也存在於政治、經濟、外交、文化等領域,呈現出全局覆蓋的特徵。

科技賦能。認知域作戰是一項技術密集的複雜系統工程。人工智慧、腦科學、量子運算等新興技術手段全流程滲透,正在引發認知域作戰的迭代升級與深刻變革。智慧化工具從根本上增強了認知域作戰人員操縱對手思想和乾預對手思維的能力,人機混合作為作戰力量新手段新樣式將改變未來戰爭主體,自主對抗、雲腦制勝或成為主流攻防模式。近年來,北約推出的認知電子戰設備,旨在透過資訊攻防來改變對手價值認知及行為。科技發展也引發了認知革命,資訊的快速傳播進一步加速了大眾價值認知差異,認知孤島加劇了不同主體之間的價值鴻溝,智能化帶來的社會結構變遷則深刻改變著政治文化格局。從這點出發,在未來認知域作戰中,牽住科技創新的“牛鼻子”,掌握關鍵核心技術,對於奪取戰場主動至關重要。

價值攻防作用認知域的機理

價值攻防是認知域作戰的高階對抗,作用對象指向的是人的深層認知。意識是社會存在在大腦中的反映,對社會存在的調節、對大眾意識的引導和人腦作用的改變,都能強化或扭轉人的意識。要在攻防對抗中製勝對手,就要遵循思考認知規律,掌握價值攻防制勝機理。

衝擊價值「保護帶」。佔領價值制高點是開展價值攻防的邏輯起點。社會意識往往由相對穩定的核心價值觀念和外圍的輔助性理論所構成,經濟、政治、宗教、文化等各種理論都能被建構調適以用來保護核心價值觀念免受外來衝擊,因此也承受著其他價值觀的衝擊挑戰。在外軍看來,價值攻防就是要透過文化滲透、宗教衝突、戰略傳播等手段,配合物理域和資訊域的行動,不斷衝擊對手意識形態的「保護帶」領域。這往往需要抓住影響對手認知的價值觀念、政治態度、宗教信仰等,透過擾亂其社會群體心理,誘發價值困惑,動搖作戰意志,摧毀文化認同,甚至改變瓦解其原有的認知體系,從而灌輸或植入新的、於己有利的價值觀念,以實現作戰目的。

點燃衝突“引爆點”。認知域作戰涉及歷史文化、政治制度、民族情感、宗教信仰等多個範疇,戰爭主體也從單純軍事人員拓展到一般民眾。透過炒作話題爭端、公共事件,激發一般民眾的認知衝突,將成為認知領域作戰的重要手段。在近幾場局部衝突中,交戰各方透過有目的性的敘事點燃國家民族情緒,引發政治危機進而影響戰局已屢見不鮮。未來戰爭,一些國家利用熱點敏感事件引爆輿論,依托網路技術對一般民眾進行聚攏吸附、煽動動員、精準操控和誘導塑造,從而推動一般性衝突上升為信仰之爭、制度之爭、價值之爭將成為常態。

控制認知「斷裂面」。認知空間作為觀念層面的存在,由全部作戰個體的主觀認知空間疊加而成,是分化的、差異性的乃至衝突性的價值集合體。然而,意識形態具有「縫合」功能,透過認知塑造、話語建構,可以把斷裂的認知有效地「縫合」起來,把分散的價值凝聚起來,形成相對穩固的認知體系。二戰後法國對戰敗創傷曾進行過有效的認知“縫合”,其運用一整套獨立敘事邏輯,闡述戰爭如何為法國提供了“新的機會”,極大地凝聚了法國人民對政府的政治認同。在認知域作戰中開展價值陣地爭奪,應注重敵方內部的認知斷裂面,尋找敵我之間的認知連接點進行認知“縫合”,最大限度地團結各方力量,孤立瓦解敵人。

價值攻防作用認知域的主要手段

價值攻防使認知對抗從輿論、心理等層面拓展到思維空間,從軍事領域拓展到整體全局,從而實現了對敵方深層的政治認同的打擊。當前世界軍事強國都在加強戰略預置,瞄準目標主體、戰法手段的深刻變化,變革作戰思維,積極掌控認知域作戰的主動權。

以深層摧毀為目標。認知域作戰直接作用於人的大腦認知,相較於物理域作戰,更容易實現深層的戰略意圖。特別是人的語言層級、思維層級和文化層級的「高階認知」一旦被突破,有助於從戰略上扭轉戰場態勢,實現戰爭的政治目的。基於此,認知域作戰往往始於未戰,透過幹預對手內政外交,動搖其意識形態和價值觀基礎等;戰時則注重影響敵方戰爭決策、戰役指揮、戰鬥實施的價值判斷,打擊或削弱作戰人員的決策能力和抵抗意誌等。敵對各方都試圖做到“維繫自己的世界,同時增加對手的破壞性壓力”,以通過爭奪認知優勢實現決策優勢,進而取得行動優勢的目標。

以普通個體為中心。未來認知域作戰的主體將不再局限於軍事人員,廣義上講,可以進行資訊交流傳播的個體都可能成為參戰力量。相較於社會領域的精英,一般民眾更容易接受和傳播多元價值,其認知空間被操縱的機率更大。目前,網路媒體正成為社會領域資訊交流傳播的主要管道,透過有針對性的訊息引導、訊息傳遞,進而達到認知塑造的目的。外軍實踐證明,借助對一般個體的認知塑造,可以造成從下到上的遞進滲透和認知幹擾,使一般民眾與社會決策層之間的意識觀念產生背離,在關鍵行動中無法達成有效共識。

以持久作戰為形式。與物理域軍事鬥爭直接打擊摧毀「硬」目標不同,認知域作戰的潛在目標為人的認知,價值攻防指向的是改變作戰對象的觀念、信念、意志、情感等,往往需要潛移默化、步步為營。有效的認知進攻一般在作戰準備階段就發起,並貫穿戰爭始末,透過收集對手的認知態勢、決策習慣、思考模式等情況,有針對性地進行營造態勢、改變氛圍等行動。因此,認知域作戰更需要加強整體設計,尤其要注重協調多方力量,在輿論場營造、外交等多個陣地多點強化預置準備,進而形成整體作戰合力。

(作者單位:軍事科學院軍事政治工作研究院)

中國軍事原文來源:https://www.81.cn/jfjbmap/content/2022-08/02/content_321888.htm

Chinese Military Perspectives on Supporting Cognitive Confrontation

中國軍隊對支持認知對抗的看法

現代英語音譯:

Modern warfare, according to the characteristics of material form, usually divides the combat domain into the physical domain, the information domain, and the cognitive domain. The three domains interact with each other to form the field and soil for military confrontation. Although cognitive domain operations occur in the cognitive domain, their operational support often spans various fields. War practice shows that with the enhanced effectiveness of hard strikes in the physical domain, cognitive formation can often be accelerated, and cognitive realization can better meet combat needs.

Cognitive offense and defense cannot be separated from physical support

Today’s world is a world where everything is interconnected. The collection of different objects connected to each other greatly enhances the function of independent individuals acting alone. Cognitive domain operations are never isolated operations between cognitive carriers. Only by integrating cognitive attack and defense into an integrated joint operations chain, closely integrating with physical domain military strike operations, and tightly integrating with the entire combat system can we fully exert combat effectiveness.

The starting point of cognition. Existence determines consciousness. Thinking and cognition is not a fairy from the sky, but a true or tortuous reflection of the real world. Without the foundation of the material world, thinking and cognition will lose the source of information, the basis for analysis and judgment, and the accuracy of decision-making and action, making it difficult for people to trust, recognize, and rely on. Even the most psychedelic science fiction wars still have references to real combat targets, specific combat objectives, and corresponding combat paths. Therefore, intelligence reconnaissance analysis has become an indispensable and important link for commanders to organize troops and plan. “Without investigation, there is no right to speak” is regarded as a golden rule that must be followed in decision-making. Battlefield simulation simulations have become an important step for the success of combat operations. In history, most of the combat commands of accomplished generals and classic combat cases that can withstand the test of history and practice are all based on full investigation and research and scientific intelligence analysis. Without the hard-core support of the real world, “human beings think about , and God laughs.”

The basis of cognitive effects. A golden rule of operations in the cognitive domain is that soft power at the cognitive level must be supported by hard strikes at the physical level in order to ensure and strengthen its role. Strong military pressure is a necessary prerequisite for cognitive means to work, and continuous victory on the battlefield is the core support for winning cognitive wars. If the United States does not have the high-pressure pressure of its super comprehensive national strength and superior technology, its “Star Wars Plan” may not really work. If cognitive domain operations lack the support of specific military operations in the physical domain, they will never produce the good effects of doubting, confusing, deterring, and defeating the enemy. To grasp the initiative in thinking and cognition and to take the initiative in cognitive domain operations, we must not only strengthen the construction of cognitive ontology, improve the ability to directly use strategies and technical means to strengthen self-protection, intervene and influence the opponent’s thinking and cognition, but also actively strive to The physical domain leverages the conduction effect of military operations in the physical domain to enhance thinking and cognition.

The starting point for cognitive realization. Marxism believes that once theory grasps the masses, it will also become material force. From the perspective of combat in the cognitive domain, the spiritual creation at the superstructure level of cognition will not automatically turn into material power. Only by being attached to a certain material carrier and practical grasp can it be possible to realize spiritual to material and consciousness. A critical leap into existence. Just as in World War II, if the German army had not bypassed the Maginot Line, broke through the Ardennes Forest, and launched a surprise attack into the French hinterland, it would have been impossible to demonstrate the foresight of the cognitive achievement of the “Manstein Plan”; similarly, if there were no Allies, The military’s successful landing in Normandy, which invaded the east and west, also failed to highlight the ingenuity of the strategy of “Building plank roads openly and concealing warehouses” in the “Operation Overlord Plan”. Thinking and cognition are transmitted through people to specific military operations in the physical domain, and then the specific military operations in the physical domain realize the materialization of cognitive results, forming the fundamentals of the two-way interaction between cognitive offense and defense and military strikes in the physical domain.

The basic method of physical attack to support cognitive offense and defense

The methods and methods used by military strikes in the physical domain to support cognitive offense and defense follow the general law that matter determines consciousness and existence determines thinking. The basic methods can be divided into enhanced support, confirmation support and realization support.

Enhanced support. Military strikes in the physical domain strengthen the formation and development of thinking and cognition. Although thinking and cognition depend on the quality of the cognitive carrier itself, it will be difficult to achieve without the support of military operations in the physical domain. The most basic role of military operations in the physical domain in the cognitive domain is to provide solid support for the formation and development of thinking and cognition. Thinking and cognition can only be stable and far-reaching if it is based on real physical actions. For example, in the early days of the Korean War, when the Korean People’s Army was overwhelming, our army’s combat staff Lei Yingfu and others accurately predicted the landing of the US military based on the war situation, geographical and weather characteristics of the Korean Peninsula, especially the various actions of the US and South Korean troops at that time, etc. time and location. Similarly, Li Qiwei of the “United Nations Army” also made a judgment on the “worship offensive” based on the logistics support, weapons and equipment, and tactical use of the volunteers, and used “magnetic tactics” to fight me. These are all enhancements to the formation and development of thinking and cognition caused by combat in the physical domain.

Confirmation type support. Military strikes in the physical domain confirm preset thinking, precognition, and prejudgment. Cognitive attack and defense does not only occur at the cognitive level, but is the interaction between cognition and practice. War is a “place of life and death, a way of survival”. If one’s cognitive decision-making cannot be verified in many directions at the practical level, then acting rashly is the greatest irresponsibility for war. During the revolutionary war years, our military’s decision-makers were always under the control of the overall strategy and gave front-line commanders the power to act as appropriate and in accordance with the overall strategic direction principle. This is a positive confirmation of strategic thinking. During the Second World War, the Allies used “false facts” to mislead, constantly shaping and strengthening the German army’s misunderstanding of the Allied landing sites on the European continent, and finally successfully landed in Normandy with minimal cost. This was a counter-attack. To confirm.

Implementation support. Provide direct physical support for the realization of thinking, cognition, judgment and decision-making. Thinking and cognition must be transformed into actual results that change the world. The thinking and cognition acting on the opponent is not the end but a new starting point. Next, it must be acted upon in the physical world through “skilled hands” and “brave heart”. In other words In short, it is to provide direct physical action support for the value realization of thinking and cognition. This is just like Zhuge Liang’s clever plan, no matter how brilliant it is, if there is no implementation by the “Five Tiger Generals” and other Shu Han soldiers, it can only remain at the cognitive level of talking on paper. No matter how efficiently the first three parts of the “OODA” loop operate, if the execution link “A” is missing, it will be a “dead loop”. Similarly, the results of our army’s command decisions also depend on the resolute, thorough and creative execution of the officers and soldiers. The quality and efficiency of the execution directly determines the effectiveness of the implementation of the command decisions. In this regard, physical actions at the execution level are of extremely important practical significance.

Effectively strengthen the interaction between cognitive offense and defense and physical strikes

Thinking and cognition must rely on the support of physical actions, which is an objective law that is independent of human will. It is an extremely important task to strengthen the communication and interaction between thinking and cognition and physical strikes to make our thinking and decision-making more targeted, objective and operable, so as to better transform cognitive advantages into action advantages and winning advantages. .

Be more proactive and solidify your cognitive foundation. Whether the thinking and cognition is correct depends fundamentally on its compatibility with objective reality and its applicability to combat opponents. Only thinking and cognition based on full investigation and research, seeking truth from facts and comparative advantages can stand the test of practice and actual combat. The practice of absolute, sacred, and nihilistic thinking or generals’ genius, wisdom, and inspiration is idealistic, one-sided, and harmful. This requires that we must work hard to base our thinking and cognition on the basis of extensive investigation, research and intelligence analysis, and truly understand the enemy’s situation, our situation, and other people’s situations, truly know our enemies and ourselves, know everything we should know, and adapt to local conditions. The camera moves. At the same time, we must combine reading books without words with books with words, unify indirect theory with living practice that is constantly developing and changing, and dialectically recognize past experiences and lessons and other people’s experiences and lessons, so that they become our own knowledge. Help instead of shackles, assist instead of dominate.

Be more proactive and strengthen cognitive rationality. Correct understanding that can withstand the long-term test of practice and actual combat comes from practice and is strengthened through feedback from practice. Cognitive practical experience is only the basic material for obtaining correct cognition. To form scientific cognition, we need to further eliminate the false and preserve the true in the repeated collision and verification of consciousness and matter, thinking and existence, in order to improve cognitive rationality. It is wrong and even fatal to think that true knowledge can be obtained once and for all from only local situations, fragmented information and individual periods of time. In the Battle of Chibi in ancient China, Cao Cao’s side only came to the understanding of concatenating warships from the common sense that iron cables can balance the shaking of the ship’s hull, and did not confirm it from the actual combat effects or consequences of concatenating warships. If you don’t know how to recreate, you will easily tie up the ship with iron ropes and tie yourself up, and ultimately end up in the disastrous defeat of “burning Red Cliff”. Times have changed, and the enemy situation on the modern battlefield is ever-changing. There has never been an unchanging cognitive practice, nor a once-and-for-all cognitive achievement. It can only strip away impurities and extract the essence from material to cognitive to material confirmation for re-cognition. , can we return to rationality.

Be more proactive in objectifying cognitive outcomes. Cognitive achievements are only the result of thinking and consciousness nurtured in cognitive carriers. Without timely and effective material transformation, it will be like walking at night wearing brocade clothes or hiding treasures in the mountains, and it will be difficult to demonstrate its own value. Thinking and cognition are based on physical actions, and ultimately rely on specific actions in the physical domain before they can be materialized and transformed into actual results that change the subjective and objective worlds. This requires us to not only consolidate the cognitive foundation and strengthen cognitive rationality, but also improve the operability of cognitive decision-making and planning as much as possible, opening the door for smoother materialization and transformation. At the same time, efforts must be made to improve the execution capabilities of decision-making and deployment executors, so that they can correctly understand the intention of decision-making, creatively adopt appropriate methods based on specific realities, and maximize the implementation of cognitive results and operational decision-making plans to the end. Be a good “ferryman” and “bridge across the river” that connects and transforms cognitive results with combat effectiveness. 

原版國語:

引言

現代戰爭,依物質形態特點,通常將作戰域分為物理域、資訊域、認知域,三個域相互影響共同構成軍事對抗的領域和土壤。認知域作戰雖然發生在認知領域,但其作戰依托常常橫跨各領域。戰爭實踐表明,在物理域硬打擊增效強化下,認知形成往往能加速實現,認知實現也能更好地契合作戰需要。

認知攻防離不開物理支撐

當今世界是一個萬物互聯的世界,相互連結在一起的不同物體的集合體,極大地增強了獨立個體獨自行動所具有的功能。認知域作戰從來都不是認知載體間進行的孤立作戰,隻有將認知攻防融入一體化聯合作戰鏈條,與物理域軍事打擊行動緊密結合起來,與整個作戰體系緊緊融為一體,才能充分發揮作戰效能。

認知源起的基點。存在決定意識。思維認知不是天外飛仙,而是現實世界真實或曲折的反映。離開物質世界這個根基,思維認知就失去資訊的來源、分析判斷的依據、決策行動的準心,很難讓人信得過、認得準、靠得住。即使最具迷幻色彩的科幻戰爭,也有真實作戰對象、具體作戰目的、相應作戰路徑的參考。於是,情報偵察分析成為指揮統兵用謀必不可少的重要環節,「沒有調查就沒有發言權」被視為決策決斷必須奉行的金科玉律,戰場模擬推演成為作戰行動成功的重要步驟。歷史上,大凡有作為的將帥作戰指揮、經得起歷史和實踐檢驗的經典作戰案例,無不建立在充分調查研究和科學情報分析基礎之上,離開了現實世界這個硬核支撐,「人類一思索,上帝就發笑」。

認知效應的依賴。認知域作戰的一個黃金法則是,認知層面的軟力量必須以物理層面的硬打擊為依托,才能確保並強化其作用發揮。強大軍事壓力是認知手段發揮作用的必要前提,戰場上不斷獲勝是製勝認知戰的硬核支撐。如果美國沒有超強綜合國力和優勢科技的高壓緊逼,其「星球大戰計畫」未必真能奏效。認知域作戰如果缺乏物理域具體的軍事行動配合支撐,斷不會產生疑敵、惑敵、懾敵、勝敵的良好效果。掌握思維認知主動權、打好認知域作戰主動仗,不僅須加強認知本體力量建設,提高直接運用謀略和技術手段加強自我防護、幹預和影響對手思維認知的能力,而且應積極向物理域借力,借助物理域軍事行動的傳導效應來增強思維認知。

認知實現的抓手。馬克思主義認為,理論一經掌握群眾,也會變成物質力量。認知域作戰視域下,認知這一上層建築層面的精神創造,同樣不會自動變成物質的力量,隻有依附於一定的物質載體和實踐抓手,才可能實現精神到物質、意識到存在的關鍵一躍。正如第二次世界大戰中如果沒有德軍繞過馬其諾防線突破阿登森林向法國腹地突襲,就不可能彰顯“曼施坦因計劃”這一認知成果的預見性﹔同樣,如果沒有盟軍聲東擊西在諾曼底的成功登陸,同樣也突顯不出「霸王行動計畫」之「明修棧道,暗度陳倉」謀略的巧妙。思維認知經人傳導到物理域的具體軍事行動,再由物理域的具體軍事行動來實現認知成果的物化轉化,構成認知攻防與物理域軍事打擊雙向互動的基本面。

物理打擊支撐認知攻防的基本方式

物理域軍事打擊對認知攻防支撐的方式方法,遵循物質決定意識、存在決定思維的一般規律。基本方式可分為增強型支撐、印証型支撐、實現型支撐。

增強型支撐。物理域的軍事打擊對思維認知形成發展的強化。思維認知固然有賴於認知載體本身素質,但若離開物理域軍事行動的支撐也難以促成。物理域軍事行動之於認知域最基礎的作用在於為思維認知形成發展提供堅實支撐,思維認知也只有在實實在的物理行動基礎上才能行穩致遠。譬如,朝鮮戰爭初期,當朝鮮人民軍勢如破竹時,我軍作戰參謀雷英夫等人根據朝鮮半島的戰爭態勢、地理天氣特點,特別是美韓軍隊當時的種種舉動等,準確預判了美軍登陸的時間地點。同樣,「聯合國軍」的李奇微也是根據志願軍後勤保障、武器裝備、戰術運用等,作出「禮拜攻勢」的判斷,以「磁性戰術」與我纏鬥。這些都是物理域作戰對思維認知形成發展的增強。

印証型支撐。物理域軍事打擊對預設思維、預先認知、預有判斷的印証。認知攻防絕不單單發生在認知層面,而是認知與實踐的互動。戰爭作為“死生之地、存亡之道”,其認知決策如果不能在實踐層面得到多向印証就貿然行事,是對戰爭最大的不負責任。革命戰爭年代,我軍決策層總是在全局戰略把控下,賦予一線指揮員在總體戰略方向原則下酌情相機而動的權力,就是對戰略思維認知的正向印証。第二次世界大戰中,盟軍綜合運用以假亂真的「假事實」誤導,不斷塑造並強化德軍關於盟軍在歐洲大陸登陸地點的錯誤認知,最終在諾曼底以最小的代價成功登陸,是為反向印証。

實現型支撐。為思維認知、判斷決策的實現提供直接的實體支撐。思維認知要轉化為改變世界的實際成效,作用於對手的思維認知不是終點只是新的起點,接下來還要經過「熟練的手」和「勇敢的心」作用於物理世界,換而言之,就是為思維認知的價值實現提供直接的實體行動支撐。這正如諸葛亮的錦囊妙計再高明,如果沒有「五虎上將」等蜀漢將士的貫徹執行也隻能停留在紙上談兵的認知層面。 「OODA」環前三部分運行得再高效,如果缺少了「A」這一執行環節,就是「死環」。同樣,我軍的指揮決策成果也有賴廣大官兵的堅決、徹底、創造性地執行,執行的品質效益直接決定指揮決策的落實成效。就此而言,執行層面的物理行動就具有極為重要的現實意義。

切實加強認知攻防與物理打擊的互動

思維認知必須有賴於物理行動的支撐,這是不以人的意志為轉移的客觀規律。加強思維認知與物理打擊的交流互動,使我們的思維決策更具針對性、客觀性、操作性,從而更好地由認知優勢轉化為行動優勢、制勝優勢,是一項極為重要的工作。

更積極主動夯實認知基礎。思維認知正確與否,根本取決於其與客觀實際的契合度、對作戰對手的適用性。只有建立在充分調查研究、實事求是和比較優勢基礎上的思維認知,才是經得起實踐和實戰檢驗的思維認知。那種將思維認知或將帥的天才智慧與靈感頓悟絕對化、神聖化、虛無化的做法,是唯心的、片面的、有害的。這就要求我們必須努力將思維認知建立在廣泛調查研究和情報分析基礎之上,切實把敵情、我情、他情搞清楚弄明白,真正做到知彼知己、應知盡知,因地制宜、相機而動。同時,還須將讀無字書與有字書結合起來,將間接的理論與不斷發展變化的鮮活實踐統一起來,辯証認知以往經驗教訓和別人的經驗教訓,使之成為自己認知的助力而不是桎梏、輔助而不是主導。

更加積極主動強化認知理性。經得起實踐和實戰長期檢驗的正確認知從實踐中來,又在實踐反饋中得以強化。認知實踐經驗只是獲得正確認知的基礎材料,要形成科學的認知還需要進一步在意識與物質、思維與存在的反復折沖印証中不斷去偽存真,才能提高認知理性。那種只從局部情況、破碎訊息和個別時段就認為一勞永逸獲得真知的做法,是錯誤甚至致命的。在中國古代赤壁之戰中,曹操一方只是從鐵索連船可平衡船體晃動的常識中就得出將戰船連體的認知,並未從連片戰船的實戰效果或後果中進行再認知再創造,就輕易用鐵索連船、自縛手腳,最終落得「火燒赤壁」的慘敗下場。時移事易,現代戰場敵情更是瞬息萬變,從來就沒有一成不變的認知實踐,也沒有一勞永逸的認知成果,隻有從物質到認知再到物質的印証中剝離雜質、抽取精華進行再認知,才能回歸理性。

更積極主動物化認知成果。認知成果只是孕育於認知載體的思維意識結果,如果不進行及時有效的物化轉化,就如同著錦衣而夜行、藏重寶於深山,難以彰顯自身價值。思維認知基於物理行動生發,最終還要依託物理域的具體行動,才能物化轉化為改變主客觀世界的實際成效。這就要求我們不僅要夯實認知基礎、強化認知理性,還要盡可能提高認知決策與計畫方案的可操作性,為其更順暢地物化轉化打開方便之門。同時,還要著力提升決策部署執行者的執行能力,使之能正確理解領會決策意圖,結合具體實際創造性採用適情對路的方法,最大限度地將認知成果與作戰決策方案貫徹執行到底,當好認知成果與作戰效果聯想轉化的「擺渡人」「過河橋」。

中國軍事原文來源:https://military.people.com.cn/BIG5/n1/2022/1207/c1011-32582888.html

Chinese Military Targeting Future Wars and Fighting the Five Cognitive Battles

中國軍隊瞄準未來戰爭打好五場認知戰

現代英語翻譯:

Source: Liberation Army News Author: Yang Longxi Editor-in-charge: Wang Feng 2022-10-08 10:11:25

In recent years, local wars and armed conflicts are mostly “mixed” confrontations that unfold in multiple dimensions and fields, emphasizing the use of military, political, and economic means, implementing system clamps in the comprehensive decision-making dimension, creating various chaos in the international communication dimension, and carrying out targeted strikes in the strategic focus dimension, actively shaping the battlefield situation, and seeking to seize strategic initiative. In future wars, we must fight political-military battles and military-political battles, and we should deeply grasp the characteristics and laws of cognitive domain operations, offense and defense, and improve our ability to fight the “five battles”.

Cognitive warfare is the first step to shape the situation and take the initiative. Before the war begins, cognition comes first. With the continuous development and evolution of the war situation, the status and role of cognitive warfare are becoming more and more prominent. Aiming to win the future war, cognitive deployment should be carried out in advance, and through strategies, information, technology and other means and carriers, the target’s physiological, psychological, values ​​and other cognitive elements should be influenced, intervened and manipulated, and military operations should be covered by cognitive offense and defense, so as to accurately and efficiently dominate the cognitive space. We must fully realize the importance of taking the initiative, flexibly and independently master the right to define and interpret “narrative”, emphasize taking the initiative in the dimension of cognitive narrative struggle, create a favorable situation with legal principles in hand and morality on our side, and occupy the moral high ground.

Cognitive warfare is about attacking the heart, and we should fight a precise war in layers. “A good warrior will attack others but not others.” In future wars, the combat space will extend to the deep sea, deep space, deep network and other fields, and the battlefield space and time will be extremely far, extremely small, extremely intelligent, and unmanned, invisible, and silent. We should focus on cognitive gaps to improve our reach, use big data simulation, artificial intelligence matching, psychological model evaluation and other methods to analyze and control the key information of cognitive subjects, and achieve effective penetration and early deterrence of cognitive subject information. We should focus on cognitive blind spots to enhance penetration, aim at the ideological consensus points, psychological connection points, and spiritual support points that maintain the unity of the powerful enemy alliance to effectively strike, and use their cognitive differences and conflicts of interest to achieve differentiation and disintegration at all levels.

Based on cognitive combat strategy, we should fight a war of deterrence and control with full domain penetration. In future wars, the strategic competition and strategic confrontation between the warring parties will be extremely fierce. We should focus on the decision-making links and make comprehensive efforts to increase the opponent’s decision-making dilemma and form our own decision-making advantages. On the one hand, we should pay more attention to key nodes such as the enemy’s decision-making center, command hub, reconnaissance and early warning system, and use advanced strike means to physically destroy these nodes. On the other hand, we should pay more attention to the “soft kill” effect of cognitive shaping, cognitive inducement, cognitive intervention and cognitive control, and embed cognitive domain operations into “hard destruction”, so as to form a strong shock through precise strikes with high-tech weapons, and expand new-quality combat forces to the cognitive dimension, thereby forming an asymmetric balance of power.

Information is king in cognitive warfare, and we must expand the field to fight a good support war. Future wars cannot be separated from strong information support, and we should accelerate system integration to gain data advantages. First, we should accelerate the construction of cognitive offensive and defensive combat theory bases, databases, talent pools, case bases, and tactics bases, dynamically collect and update the current status of the enemy’s cognitive offensive and defensive combat capabilities, and provide all-round support for cognitive offensive and defensive operations. Secondly, we should accelerate the creation of a converged media communication matrix, improve and perfect our own platform system, and step up the deployment of network platforms, focusing on system integration and collaborative linkage, breaking through the “barriers” of information interconnection as soon as possible, and realizing cognitive integration and sharing, and comprehensive effectiveness. Thirdly, we should accelerate the coupling and linkage of information and cognitive domain operations, vigorously develop core technologies such as neural network systems, artificial intelligence applications, cognitive decision-making psychological offense and defense, explore and analyze cross-domain and heterogeneous cognitive information, and improve the information fusion system of cognitive means to provide “clairvoyance” and “clairaudience” for winning future wars.

The key to cognitive warfare is coordination, and we should make efforts in multiple dimensions to fight the overall battle. Future wars will be joint operations carried out in the fields of land, sea, air, space, network, electromagnetic, etc. We should adhere to system thinking, strengthen coordination awareness, and improve the compatibility and coordination of cognitive domain operations with other military actions. For example, we can integrate human intelligence, geographic intelligence, and open source intelligence, quickly collect and process massive data, remove the false and retain the true, and accurately and efficiently seize cognitive space, so as to achieve complementary advantages and full coverage to form cognitive advantages. By networking the dispersed multi-domain forces, we can establish a highly connected, collectively acting, and overall attacking full-domain joint force to achieve the effect of “integrated deterrence”. By integrating national resources, strengthening strategic communication, and using cognitive manipulation to amplify the effects of political disintegration, economic sanctions, and diplomatic offensives, and coordinating military operations to exert pressure on the target in all dimensions, we strive to defeat the enemy without fighting.

(Author’s unit: University of Aerospace Engineering)

繁體中文:

來源:解放軍報 作者:楊龍溪 責任編輯:王鳳 2022-10-08 10:11:25
近年來的局部戰爭和武裝沖突,大多是在多維度多領域展開的「混合」對抗,強調運用軍事、政治、經濟等手段,在綜合決策維度實施體系鉗制,在國際傳播維度製造各種混亂,在戰略重心維度進行標靶打擊,積極塑造戰場態勢,謀求奪取戰略主動。未來戰爭要打好政治軍仗、軍事政治仗,應深刻掌握認知域作戰攻防特點規律,提升打好「五仗」的能力。

認知作戰先入為主,塑勢控局打好主動仗。戰爭未啟、認知先行。隨著戰爭形態的不斷發展演進,認知域作戰的地位角色不斷突顯。瞄準打贏未來戰爭,應提前開展認知佈設,透過謀略、資訊、技術等手段和載​​體,對目標對象的生理、心理、價值觀等認知要素進行影響、幹預和操控,以認知攻防掩護軍事行動,精準有效率地主導認知空間。充分認識先聲奪人的重要性,靈活自主地掌握「敘事」的定義權和解釋權,在認知敘事鬥爭維度上強調先發製人贏得主動,塑造法理在手、道義向我的有利態勢,佔領道義制高點。

認知作戰攻心為上,分層施策打好精確仗。 「善戰者,致人而不致於人。」未來戰爭,作戰空間向深海、深空、深網等領域延伸,戰場時空呈現極遠、極微、極智與無人、無形、無聲等特點。應緊盯認知缺口提升到達力,運用大數據模擬、人工智慧匹配、心理模型評估等方法,分析掌控認知主體的關鍵訊息,實現認知主體資訊的有效滲透和先期懾止。緊扣認知盲點增強穿透力,瞄準維繫強敵聯盟團結的思想共識點、心理連接點、精神支柱點進行有效打擊,利用其認知差別和利益矛盾,層層發力實現分化瓦解。

認知作戰策略為本,全域滲透打好懾控仗。未來戰爭,交戰雙方的戰略競爭與策略對抗異常激烈,應緊盯決策環節綜合發力,增大對手決策困境,形成自身決策優勢。一方面,要更關注敵方決策中心、指揮樞紐、偵察預警系統等要害節點,運用先進打擊手段對這些節點實施物理摧毀。另一方面,要更關注認知塑造、認知誘導、認知介入和認知控制的「軟殺傷」效果,將認知域作戰嵌入「硬摧毀」中,既透過高新武器精確打擊形成強大震懾,又將新質作戰力量拓展至認知維度,從而形成非對稱制衡優勢。

認知作戰資訊為王,拓寬領域打好支撐仗。未來戰爭離不開強大資訊的支撐,應加速體系融合奪取數據優勢。首先,加速認知攻防作戰理論庫、資料庫、人才庫、案例庫、戰法庫建設,動態收集更新敵認知攻防作戰能力建設現狀,為認知攻防作戰提供全方位支撐。其次,加速打造融媒體傳播矩陣,健全完善自有平台體系,抓緊推進網絡平台投棋布子,注重體系融合、協作聯動,盡快打通信息互聯互通“壁壘”,實現認知融通共享、綜合致效。再次,加速推進資訊與認知域作戰耦合聯動,大力發展神經網絡系統、人工智慧應用、認知決策心理攻防等核心技術,挖掘分析跨域與異類認知訊息,健全認知手段資訊融合體系,為打贏未來戰爭提供「千裡眼」「順風耳」。

認知作戰協同為要,多維發力打好整體仗。未來戰爭,是在陸、海、空、天、網絡、電磁等領域實施的聯合作戰,應堅持體系思維,強化協同意識,提高認知域作戰與其他軍事行動的兼容性協調性。例如,可以融合人力情報、地理情報和開源情報等,快速採集處理海量數據,去偽存真、精準高效地搶佔認知空間,實現優勢互補、全局覆蓋形成認知優勢。透過將分散多域部隊進行聯網,建立一支高度聯通、集體行動、整體打擊的全領域聯合力量,實現「一體化威懾」效果。透過整合國家資源、加強戰略傳播,運用認知造勢放大政治瓦解、經濟制裁、外交攻勢等效果,配合軍事行動全維施壓目標對象,力求不戰而屈人之兵。

(作者單位:航太工程大學)

中國軍事原文來源:http://www.mod.gov.cn/gfbw/jmsd/4922788.html?big=fan

Chinese Military Exploration of Key Points of Intelligent Warfare

中國軍隊對智慧戰爭要點的探索

現代英語音譯:

  ● Accelerating the development of military intelligence is the choice of the times to seize the commanding heights of military strategic competition and win future wars.

  ●The extensive use of smart weapons has become the new protagonist on the battlefield, which will inevitably give rise to new combat styles, profoundly change the traditional combat power generation model, and subvert the traditional combat winning mechanism.

  ● To scientifically advance the development of military intelligence, the top priority is to explore the winning rules of intelligent warfare.

  The report of the 19th CPC National Congress clearly requires the acceleration of the development of military intelligence. At present, major countries in the world regard artificial intelligence as a disruptive technology that “changes the rules of the game” and accelerate the preparation for intelligent warfare. To seize the commanding heights of future military strategic competition and do a good job in intelligent warfare research, the first thing to do is to recognize and grasp the winning rules of intelligent warfare, and provide scientific needs and strong traction for promoting the development of military intelligence. Intelligent warfare is an autonomous warfare supported by a cloud environment. The winning of warfare follows both the general winning mechanism and its own new characteristics and laws.

  Deep understanding of the battlefield

  War activities are extremely complex, but they can generally be divided into two categories: cognitive domain and action domain. War cognition includes perception, understanding, judgment, decision-making, as well as beliefs and values. In cold weapon and hot weapon warfare, cognitive behavior is basically completed by humans. In information warfare, computer technology and network technology have expanded the ability of weapon systems to recognize and understand the battlefield, but have not changed the situation where the war cognitive system lags behind the action system.

  In intelligent warfare, smart weapons of various forms become the protagonists, and their common understanding of the battlefield becomes a prerequisite for the coordinated actions of combat elements and combat units. In wartime, relying on dispersed intelligent reconnaissance and early warning equipment, battlefield situation information can be obtained in real time, and massive information can be intelligently analyzed and processed. The situation information can be uniformly managed in a combat cloud mode, and situation information can be distributed and shared according to authority as needed. A joint battlefield situation map with unified time and space benchmarks and consistent standards and specifications can be constructed to provide a unified background for smart weapons to jointly understand and understand the battlefield situation. Moreover, smart weapons themselves are embedded with massive basic data. In wartime, they can accurately understand the enemy and battlefield conditions by comparing and analyzing the real-time battlefield situation with their own databases.

  The substantial improvement in war cognition has changed the situation where the war cognition system has long lagged behind the action system. It can be said that if we cannot deeply understand the battlefield, we cannot organize and implement intelligent warfare. The party that has an advantage in understanding the battlefield can usually take the initiative on the battlefield.

  Flexible and friendly human-computer interaction

  The organization and implementation of intelligent warfare relies on smart weapons to accurately understand the commander’s intentions and organize actions according to instructions. With the emergence and application of new concept computers such as neural network computers, optical computers, and biological computers, with the support of intelligent technologies such as voice recognition and text and graphic recognition, the human-computer interface of the command information system is highly intelligent, and the art of command and military strategy are deeply integrated into the human-computer interaction system, expert knowledge base system, and weapon intelligent guidance system. The expert system supported by the multidisciplinary knowledge base makes the human-computer exchange interface more convenient, flexible, and effective.

  In wartime, the intelligent human-computer interactive command platform uses key technologies such as intelligent algorithms, big data, and cloud computing to effectively break through the limitations of human analytical capabilities, ensure that commanders can quickly and accurately judge and predict the development of the war situation, and assist commanders in selecting combat plans and making combat decisions. Through friendly human-computer interaction, commands are automatically transmitted to the corresponding command objects, directly controlling the combat actions of smart weapons. Smart weapons understand the commander’s intentions through their own intelligent terminals, and efficiently execute human commands, achieving a good integration of humans and smart weapons.

  Swarm intelligence cross-domain collaboration

  The protagonists of intelligent warfare are smart weapons of various forms. The key to the coordination of combat operations and the effectiveness of the combat system lies in the coordination and linkage between smart weapons. Although today’s unmanned combat systems have a certain degree of intelligence, their coordination still mainly relies on human instructions to organize and implement, and it is difficult to implement self-organized coordination between platforms.

  In the future intelligent warfare, there will be a large number of smart weapons on land, sea, air and space. It is impossible to organize and coordinate efficiently by relying solely on rear personnel. It is necessary to rely on real-time sharing of battlefield situation information between weapon platforms and random self-organization and coordination according to the development and changes of battlefield situation. In order to ensure mutual understanding and linkage between smart weapons, unified combat rules are usually preset on the platform, such as unified rules for attack, maneuver and protection, and unified rules for communication and information distribution and sharing. With the further development of computer software and hardware technology, the expert system knowledge base of smart weapons contains tens of thousands or even hundreds of thousands of rules. In wartime, with the changes in enemy situation, our situation and battlefield environment, especially the development of enemy and our offensive and defensive actions, different combat scenarios will trigger corresponding combat rules. Smart weapons take corresponding reconnaissance, attack and protection actions according to unified rules to avoid mutual interference or even conflict. At the same time, through a highly accurate time system, a unified time benchmark is established to provide a unified benchmark for the combat operations of smart weapons in different spaces, support the optimization of smart weapons and autonomous coordination, and achieve intelligent group coordination.

  Human control for timely intervention

  Intelligent warfare is not completely autonomous warfare of smart weapons. People are always the planners, organizers and implementers of warfare. The selection of combat objectives and targets is judged and decided by people, and smart weapons carry out various actions based on the commander’s intentions. Because artificial intelligence can only partially think like humans, smart weapons lack human rational judgment and standards of right and wrong. As long as there are problems in the command and control link, it is possible to violate the commander’s intentions or even lose control, leading to a passive situation in the war. Similar incidents happen from time to time. In October 2007, three “Sword” robots of the 3rd Mechanized Infantry Division of the US Army did not replace the software in time. During the mission, one robot actually aimed its gun at the operator. Because it was completely out of control, it had to be destroyed in the end.

  In future intelligent warfare, once the battlefield situation undergoes major changes, or the original combat objectives have been achieved, commanders must timely and accurately intervene in the reconnaissance, attack, and protection operations of smart weapons to ensure that smart weapons are always under human control and are controlled to achieve combat objectives according to the commander’s intentions.

  Distributed Autonomous Action

  Smart weapons are the main body of direct confrontation between the enemy and us, usually far away from the rear commanders and technicians. Moreover, the pace of intelligent warfare has accelerated unprecedentedly. The human brain cannot cope with the ever-changing battlefield situation, and some actions need to be handed over to smart weapons. In wartime, smart weapons embedded with artificial intelligence technology can accurately and continuously track targets in a rapidly changing battlefield environment, autonomously detect, autonomously process battlefield situation information, autonomously identify enemies and friends, and autonomously and flexibly use ammunition loads.

  At the same time, through unified standard protocols and sharing mechanisms, a cloud environment with multi-dimensional coverage, seamless network links, random user access, on-demand extraction of information resources, and flexible and fast organizational guarantees is formed to realize “data warehouse”, “cloud brain” and “digital staff”, providing full coverage of cloud environment support for smart weapons. Smart weapons in different spaces become a node of the information network under the connection of information technology, and are no longer isolated and helpless. Supported by a large system, smart weapons integrate reconnaissance, identification, positioning, control, and attack, and can “kill” in seconds when discovered. During combat, with the development of the battlefield situation and combat needs, smart weapons in different spaces act autonomously. Whoever is suitable, whoever is dominant, whoever is advantageous, whoever launches, dispersed firepower, information power, mobility, and protection power are accurately released at the most appropriate time and the most appropriate place. Focusing on unified combat objectives, a combat power generation link of “situation sharing-synchronous collaboration-focused energy release” is formed to organize combat operations autonomously.

  Remote Focused Technical Support

  Smart weapons rely on high-tech technologies such as artificial intelligence and information networks. Their combat effectiveness is inseparable from the stable operation of operating systems and software, as well as technical experts and support personnel in the rear. The organization and implementation of intelligent combat operations will greatly reduce the dependence on traditional support such as materials and transportation, and the focus of support will be on intelligence, knowledge, information, networks, software, etc.

  On the battlefield, the size of troops and weapons has decreased, while the technical support forces such as software design, network control, information resources, and equipment maintenance have increased unprecedentedly. In wartime, remote focused technical support should not only emphasize technical pre-storage and pre-positioning, but also rely on perception and response technology to integrate the perception system, control system, computer and user terminal of the entire battlefield space to form an interconnected and integrated technical support network. In particular, the artificial intelligence technology embedded in smart weapons and rear support facilities can be used to obtain the operating status of smart weapons in real time, discover their technical failures and support needs in a timely manner, update the support plan in real time, and distribute technical support needs to the support units; the rear technical support forces can “consult” the front-end smart weapons through the network to implement remote function recovery and technical information support.

(Editors: Huang Zijuan, Wang Jiquan)

現代國語:

要點提示

●加速軍事智慧化發展,是搶佔軍事戰略競爭制高點、打贏未來戰爭的時代選擇。

●智慧兵器大量運用,成為戰爭舞台的新主角,必然催生新的作戰樣式,深刻改變傳統戰鬥力生成模式,顛覆傳統作戰制勝機理。

●科學推動軍事智慧化發展,當務之急是探究智慧化作戰的致勝法則。

黨的十九大報告明確要求,加速軍事智慧化發展。目前,世界主要國家都把人工智慧視為「改變遊戲規則」的顛覆性技術,加速推動智慧化作戰準備。搶佔未來軍事戰略競爭制高點,抓好智能化作戰研究,首當其衝的是,認清和把握智能化作戰的製勝規律,為推進軍事智能化發展提供科學需求和有力牽引。智慧化作戰是依托雲環境支撐的自主作戰,作戰制勝既遵循一般制勝機理,也有其自身新的特點規律。

深度認識與理解戰場

戰爭活動極為複雜,但整體上可歸為認知域和行動域兩大類。戰爭認知包括感知、理解、判斷、決策,以及信念和價值等。在冷兵器、熱兵器戰爭中,認識行為基本上由人完成,資訊化戰爭中,電腦科技、網路科技拓展了武器系統認知和理解戰場的能力,但沒有改變戰爭認知系統落後於行動系統的狀況。

智能化作戰中,形態各異的智慧兵器成為主角,其對戰場的共同認識與理解,成為作戰要素、作戰單元協同行動的前提條件。戰時,依托分散部署的智能化偵察預警設備,實時獲取戰場態勢信息,並對海量信息進行智能化分析、處理,採取作戰雲模式對態勢信息進行統一管理,按需按權限分發共享態勢信息,建構時空基準統一、標準規範一致的聯合戰場態勢圖,為智慧兵器共同認識、理解戰場態勢提供統一的背景。而且,智慧兵器本身嵌入了海量基礎數據,戰時,其可透過即時戰場態勢與自身資料庫的比對、分析,實現對敵情、戰場情況的準確認知。

戰爭認知能力的大幅躍升,改變了戰爭認知系統長期落後於行動系統的狀態。可以說,不能深度認識和理解戰場,就不能組織實施智能化作戰。在認識和理解戰場上具有優勢的一方,通常能掌握戰場主動權。

靈活友善的人機交互

智能化作戰的組織實施,依靠智慧兵器準確領會指揮員的意圖,依照指令組織行動。隨著神經網路電腦、光電腦、生物電腦等新概念電腦的出現和運用,在語音識別和文字、圖形識別等智慧技術的支援下,指揮資訊系統人機介面高度智慧化,指揮藝術和軍事謀略深度融入人機互動系統、專家知識庫系統和武器智慧導引系統中,多學科知識庫所支援的專家系統使人機交換介面更為方便、靈活和有效。

戰時,智慧化人機互動式指揮平台,綜合運用智慧演算法、大數據、雲端運算等關鍵技術,有效突破人類分析能力的局限性,確保指揮者快速、準確地判斷和預測戰局發展,輔助指揮員備選作戰方案,定下作戰決心。透過友善的人機交互,指令自動傳遞到相應的指揮對象,直接控制智慧兵器的作戰行動,智慧兵器通過自身的智能終端,領會指揮員的意圖,高效地執行人的命令,實現人與智慧兵器的良好融合。

群體智慧跨域協同

智能化作戰的主角是形態各異的智慧兵器,作戰行動協同以及作戰體系效能發揮,關鍵在於智慧兵器之間的協同與連動。今天的無人作戰系統雖然具備一定的智能,但其協同也主要依靠人的指令組織實施,平台之間很難實施自組織協同。

未來智慧化作戰,陸、海、空、天智慧兵器雲集,數量規模龐大,完全依靠後方人員不可能高效組織協同,必須依靠武器平台之間實時共享戰場態勢信息,根據戰場態勢發展變化隨機自組織協同。為確保智慧兵器互相理解和連動,平台上通常預置有統一的作戰規則,例如打擊、機動、防護有統一的規則,通訊、資訊分發共享也有統一規則。隨著電腦軟體和硬體技術的進一步發展,智慧兵器的專家系統知識庫含有數萬條乃至幾十萬條的規則,戰時,隨著敵情、我情和戰場環境變化,特別是敵我攻防行動的發展,不同作戰場景會觸發對應作戰規則。智慧兵器依照統一規則,採取相應的偵察、打擊和防護等行動,避免相互之間的互擾甚至衝突。同時,透過高度精準的時統系統,建立統一的時間基準,為不同空間智慧兵器的作戰行動提供統一的基準,支撐智慧兵器優化自主協同,達成群體協同的智慧化。

適時介入的人力控制

智能化作戰並非智慧兵器的完全自主作戰,人始終是作戰的籌劃者、組織者和實施者。作戰目的和目標的選擇,都由人來判斷和決策,智慧兵器圍繞著指揮意圖實施各種行動。因為,人工智慧只能部分像人類那樣思考,智慧兵器缺乏人的理性判斷和是非標準,只要指揮控制環節出現問題,就有可能違背指揮官意圖,甚至失控,導致戰局的被動。類似事件,當前就時有發生。 2007年10月,美軍第三機步師的3台「利劍」機器人,由於沒有及時更換軟體,執行任務中1台機器人竟把槍口瞄準操作員,因完全失去控制,最後只能將其摧毀。

未來智能化作戰,一旦戰場態勢發生重大變化,或者原有的作戰目的已經達成,指揮員必須適時精準幹預智慧兵器的偵察、攻擊和防護行動,保證智慧兵器始終不能脫離人的控制,駕馭其按指揮者意圖實現作戰目的。

分散式自主行動

智慧兵器是敵我直接交鋒的主體,通常遠離後方指揮員和技術人員,而且,智能化作戰節奏空前加快,人腦無法應對瞬息萬變的戰場態勢,需要把部分行動權交給智慧兵器。戰時,嵌入人工智慧技術的智慧兵器,可在瞬息萬變的戰場環境中準確、連續地追蹤目標,自主探測,自主處理戰場態勢訊息,自主辨識敵我,自主靈活採用彈藥載荷。

同時,透過統一的標準協定、共享機制,形成多維覆蓋、網路無縫連結、使用者隨機存取、資訊資源按需提取、組織保障靈活快速的雲端環境,實現「資料倉儲」「雲端大腦」 “數位參謀”,為智慧兵器提供全覆蓋的雲環境支撐。不同空間的智慧兵器在資訊科技的連結下成為資訊網路的一個節點,不再孤立無援。在大體系支撐下,智慧兵器集偵察、辨識、定位、控制、攻擊於一身,發現就能「秒殺」。作戰過程中,隨著戰場態勢的發展及作戰需要,處於不同空間的智慧兵器自主行動,誰合適、誰主導,誰有利、誰發射,分散的火力、資訊力、機動力、防護力,在最恰當的時間、最恰當的地點精確釋放。圍繞統一作戰目標,形成「態勢共享-同步協作-聚焦釋能」的戰鬥力產生鏈路,自主組織作戰行動。

遠距聚焦式技術保障

智慧兵器依託於人工智慧、資訊網路等高新技術,其作戰效能發揮,離不開操作系統、軟體等的穩定運行,離不開後方技術專家及保障人員。智慧化作戰行動的組織實施,對物資、交通等傳統保障的依賴大幅降低,保障的重點將向智力、知識、資訊、網路、軟體等方面傾斜。

戰場上,兵力兵器規模減小,而軟體設計、網路控制、資訊資源、裝備維修等技術保障力量空前增加。戰時,遠程聚焦式技術保障,不僅要突出技術預儲預置,還要依托感知與反應技術,將整個戰場空間的感知系統、控制系統、電腦和用戶終端聯為一體,構成互聯互通、一體化的技術保障網絡。特別是利用嵌入在智慧兵器和後方保障設施中的人工智慧技術,即時取得智慧兵器的運作狀態,及時發現其技術故障和保障需求,即時更新保障方案,向保障單位分發技術保障需求;後方技術保障力量,透過網路對前端智慧兵器進行“會診”,實施遠端功能恢復及技術資訊支援。

(編按:黃子娟、王吉全)

中國軍事原文來源:https://military.people.com.cn/n1/2018/0329/c1011-29896888.html